SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Downloaden Sie, um offline zu lesen
1
Face Recognition Technology
Presented by: -
Vivek Kumar Soni
B.Tech. (CSE), 6th
Semester
Regd. No: 1234567890
Silicon Institute of Technology
Bhubaneswar
2
Contents
1. Abstract.......................................................................................................................................................3
2. Introduction ................................................................................................................................................3
2.1 Introduction to Biometrics....................................................................................................................4
2.2 Introduction to FRT...............................................................................................................................4
3. History.........................................................................................................................................................4
4. FRT in Operation .........................................................................................................................................5
4.1 Verification............................................................................................................................................5
4.2 Identification.........................................................................................................................................6
4.3 Watch List Task .....................................................................................................................................7
5. Development of Face Recognition System .................................................................................................8
5.1 Detecting a Face....................................................................................................................................8
5.2 Normalization........................................................................................................................................9
5.3 Feature Extraction.................................................................................................................................9
5.4 Recognition ...........................................................................................................................................9
6. Face Recognition Algorithms ....................................................................................................................10
6.1 Principal Components Analysis (PCA).................................................................................................10
6.2 Linear Discriminant Analysis (LDA) .....................................................................................................11
6.3 Elastic Bunch Graph Matching (EBGM)...............................................................................................12
7. Performance..............................................................................................................................................12
8. Applications of FRT....................................................................................................................................13
8.1 Security ...............................................................................................................................................13
8.2 Authentication ....................................................................................................................................13
8.3 Back-end Verification..........................................................................................................................13
9. Conclusion.................................................................................................................................................14
10. References ..............................................................................................................................................14
11. Appendix.................................................................................................................................................15
3
1. Abstract
Machine recognition of human faces from still or video has attracted a great deal of attention in
the psychology, image processing, pattern recognition, neural science, and computer security
and computer vision communities. A screensaver equipped with face recognition technology can
automatically unlock whenever the authorized user approaches the computer.
Facial recognition software is designed to pinpoint a face and measure its features. Each face has
certain distinguishable landmarks, which make up the different facial features. These landmarks
are referred to as nodal points. There are about 80 nodal points on a human face. These nodal
points are measured to create a numerical code, a string of numbers that represents the face in
a database. This code is called a face-print. Only 14 to 22 nodal points are needed for such
software to complete the recognition process. This software can pick someone's face out of a
crowd, extract that face from the rest of the scene and compare it to a database full of stored
images.
Facial Recognition System has proved to be a very robust and reliable system in security and
other solving threats.
2. Introduction
The information age is quickly revolutionizing the way transactions are completed. Everyday
actions are increasingly being handled electronically, instead of with pencil and paper or face to
face. This growth in electronic transactions has resulted in a greater demand for fast and
accurate user identification and authentication. Access codes for buildings, banks accounts and
computer systems often use PIN's for identification and security clearances. Using the proper PIN
gains access, but the user of the PIN is not verified. When credit and ATM cards are lost or
stolen, an unauthorized user can often come up with the correct personal codes. Despite
warning, many people continue to choose easily guessed PINs and passwords viz. birthdays,
phone numbers and social security numbers. Recent cases of identity theft have increased the
need for methods to prove that someone is truly who he/she claims to be.
4
2.1 Introduction to Biometrics
Although there has always been a need to identify individuals, the requirements of identification
have changed in radical ways as populations have expanded and grown increasingly mobile. This
is particularly true for the relationships between institutions and individuals, which are crucial to
the well-being of societies, and necessarily and increasingly conducted impersonally-that is,
without persistent direct and personal interaction. Importantly, these impersonal interactions
include relationships between governments and citizens for purposes of fair allocation of
entitlements, mediated transactions with e-government, and security and law enforcement.
Increasingly, these developments also encompass relationships between actors and clients or
consumers based on financial transactions, commercial transactions, provision of services, and
sales conducted among strangers, often mediated through the telephone, Internet, and the
World Wide Web. Biometric technologies have emerged as promising tools to meet these
challenges of identification, based not only on the faith that “the body doesn’t lie,” but also on
dramatic progress in a range of relevant technologies. These developments, according to some,
herald the possibility of automated systems of identification that are accurate, reliable, and
efficient.
2.2 Introduction to FRT
Facial recognition research and FRT is a subfield in a larger field of pattern recognition research
and technology. Pattern recognition technology uses statistical techniques to detect and extract
patterns from data in order to match it with patterns stored in a database. The data upon which
the recognition system works (such as a photo of a face) is no more than a set of discernible
pixel-level patterns for the system, that is, the pattern recognition system does not perceive
meaningful “faces” as a human would understand them.
3. History
Automated facial recognition is a relatively new concept. Developed in the 1960s, the first
semi-automated system for facial recognition required the administrator to locate features
(such as eyes, ears, nose, and mouth) on photographs before it calculated distances and ratios
to a common reference point, which were then compared to reference data.
5
The Facial Recognition Technology program started in September 1993, with Dr. P. Jonathon
Phillips, Army Research Laboratory, Adelphi, Maryland, serving as technical agent. Initially, the
FRT program consisted of three phases, each one year in length. The goals of the first phase
were to establish the viability of automatic face recognition algorithms and to establish a
performance baseline against which to measure future progress. The goals of phases 2 and 3
were to further develop face recognition technology. After the successful conclusion of phase 2,
the DoD Counterdrug Technology Development Program Office initiated the FRT demonstration
effort. The goals of this effort were to port FRT evaluated algorithms to real-time experimental/
demonstration systems.
4. FRT in Operation
The first step in the facial recognition process is the capturing of a face image, also known as the
probe image. This would normally be done using a still or video camera. In principle, the
capturing of the face image can be done with or without the knowledge (or cooperation) of the
subject. This is indeed one of the most attractive features of FRT. As such, it could, in principle,
be incorporated into existing good quality “passive” CCTV systems.
Figure 1: Overview of Face Recognition System
4.1 Verification
Verification or authentication is the simplest task for a FRS. An individual with a pre-existing
relationship with an institution (and therefore already enrolled in the reference database
6
or gallery) presents his or her biometric characteristics (face or probe image) to the
system, claiming to be in the reference database or gallery (i.e. claiming to be a legitimate
identity). The system must then attempt to match the probe image with the particular, claimed
template in the reference database. This is a one-to-one matching task since the system does
not need to check every record in the database but only that which corresponds to the
claimed identity (using some form of identifier such as an employee number to access the
record in the reference database). There are two possible outcomes: (1) the person is not
recognized or (2) the person is recognized. If the person is not recognized (i.e., the
identity is not verified) it might be because the person is an imposter (i.e., is making an
illegitimate identity claim) or because the system made a mistake (this mistake is referred to as a
false reject). The system may also make a mistake in accepting a claim when it is in fact
false (this is referred to as a false accept).
Figure 2: Possible Outcomes in the Verification Task
4.2 Identification
Identification is a more complex task than verification. In this case, the FRS is provided a probe
image to attempt to match it with a biometric reference in the gallery (or not). This represents a
one-to-many problem. In addition, we need to further differentiate between closed-set
identification problems and open-set identification problems. In a closed-set identification
problem we want to identify a person that we know is in the reference database or gallery (in
other words for any possible identification we want to make we know beforehand that the
7
person to be identified is in the database). Open-set identification is more complex in that we do
not know in advance whether the person to be identified is or is not in the reference database.
The outcome of these two identification problems will be interpreted differently. If there is no
match in the closed-set identification then we know the system has made a mistake (i.e.,
identification has failed (a false negative)). However in the open-set problem we do not know
whether the system made a mistake or whether the identity is simply not in the reference
database in the first instance. Real-world identification applications tend to be open-set
identification problems rather than closed set identification problems.
Figure 3: Possible Outcomes in Identification Task
4.3 Watch List Task
The watch list task is a specific case of an open-set identification task. In the watch list
task, the system determines if the probe image corresponds to a person on the watch list and
then subsequently identifies the person through the match (assuming the identities of the watch
list are known). It is therefore also a one-to-many problem but with an open-set assumption.
When a probe is given to the system, the system compares it with the entire gallery (also known
8
in this case as the watch list). If any match is above the operating threshold, an alarm will be
triggered. If the top match is identified correctly, then the task was completed successfully. If
however the person in the probe image is not someone in the gallery and the alarm was
nonetheless triggered, then it would be a false alarm (i.e., a false alarm occurs when the top
match score for someone not in the watch list is above the operating threshold).
Figure 4: Possible Outcomes in Watch List Task
5. Development of Face Recognition System
The facial recognition process normally has four interrelated phases or steps. The first step is
face detection, the second is normalization, the third is feature extraction, and the final
cumulative step is face recognition. These steps depend on each other and often use similar
techniques.
5.1 Detecting a Face
Detecting a face in a probe image may be a relatively simple task for humans, but it is not
so for a computer. The computer has to decide which pixels in the image is part of the face and
which are not. In atypical passport photo, where the background is clear, it is easy to do, but
as soon as the background becomes cluttered with other objects, the problem becomes
extremely complex. Traditionally, methods that focus on facial landmarks (such as eyes), that
9
detect face-like colours in circular regions, or that use standard feature templates, were used to
detect faces.
5.2 Normalization
Once the face has been detected (separated from its background), the face needs to be
normalized. This means that the image must be standardized in terms of size, pose, illumination,
etc., relative to the images in the gallery or reference database. To normalize a probe image, the
key facial landmarks must be located accurately. Using these landmarks, the normalization
algorithm can (to some degree) reorient the image for slight variations. Such corrections are,
however, based on statistical inferences or approximations which may not be entirely accurate.
Thus, it is essential that the probe is as close as possible to a standardized face. Facial landmarks
are the key to all systems, irrespective of the overall method of recognition. If the facial
landmarks cannot be located, then the recognition process will fail. Recognition can only
succeed if the probe image and the gallery images are the same in terms of pose orientation,
rotation, scale, size, etc. Normalization ensures that this similarity is achieved—to a greater or
lesser degree.
5.3 Feature Extraction
Once the face image has been normalized, the feature extraction and recognition of the face can
take place. In feature extraction, a mathematical representation called a biometric template
or biometric reference is generated, which is stored in the database and will form the
basis of any recognition task. Facial recognition algorithms differ in the way they translate or
transform a face image (represented at this point as grayscale pixels) into a simplified
mathematical representation (the “features”) in order to perform the recognition task.
5.4 Recognition
It is important for successful recognition that maximal information is retained in this
transformation process so that the biometric template is sufficiently distinctive. If this cannot be
achieved, the algorithm will not have the discriminating ability required for successful
recognition. The problem of biometric templates from different individuals being
insufficiently distinctive (or too close to each other) is often referred to as the generation of
biometric doubles. It is in this process of mathematical transformation (feature extraction) and
10
matching (recognition) of a biometric template that particular algorithms differ significantly in
their approach.
Figure 5: Steps in Facial Recognition process
6. Face Recognition Algorithms
The early work in face recognition was based on the geometrical relationships between facial
landmarks as a means to capture and extract facial features. This method is obviously highly
dependent on the detection of these landmarks (which may be very difficult is variations in
illumination, especially shadows) as well as the stability of these relationships across pose
variation. These problems were and still remain significant stumbling blocks for face detection
and recognition.
6.1 Principal Components Analysis (PCA)
The PCA technique converts each two dimensional image into a one dimensional vector. This
vector is then decomposed into orthogonal (uncorrelated) principle components (known as
Eigen faces)—in other words, the technique selects the features of the image (or face) which
vary the most from the rest of the image. Each face image is represented as a weighted sum
(feature vector) of the principle components (or Eigen faces), which are stored in a one
dimensional array. Each component (Eigen face) represents only a certain feature of the face,
which may or may not be present in the original image. A probe image is compared against a
gallery image by measuring the distance between their respective feature vectors. For PCA to
11
work well the probe image must be similar to the gallery image in terms of size (or scale), pose,
and illumination. It is generally true that PCA is reasonably sensitive to scale variation.
6.2 Linear Discriminant Analysis (LDA)
LDA is a statistical approach based on the same statistical principles as PCA. LDA classifies faces
of unknown individuals based on a set of training images of known individuals. The technique
finds the underlying vectors in the facial feature space (vectors) that would maximize the
variance between individuals (or classes) and minimize the variance within a number of samples
of the same person (i.e., within a class). If this can be achieved, then the algorithm would be able
to discriminate between individuals and yet still recognize individuals in some varying conditions
(minor variations in expression, rotation, illumination, etc.). If we look at Figure 6 we can see
that there is a relatively large amount of variation between the individuals and small variations
between the varieties of poses of the same individual. To do this the algorithm must have an
appropriate training set. The database should contain several examples of face images for each
subject in the training set and at least one example in the test set. These examples should
represent different frontal views of subjects with minor variations in view angle. They should
also include different facial expressions, different lighting and background conditions, also
examples with and without glasses if appropriate. Obviously, an increase in the number of
varying samples of the same person will allow the algorithm to optimize the variance between
classes and therefore become more accurate. This may be a serious limitation in some contexts
(also known as the small sample size problem). As for PCA, LDA works well if the probe
image is relatively similar to the gallery image in terms of size, pose, and illumination. With a
good variety in sampling this can be somewhat varied, but only up to a point. For more
significant variation other non-linear approaches are necessary.
12
Figure 6: Example of Variations between and within Classes
6.3 Elastic Bunch Graph Matching (EBGM)
EBGM relies on the concept that real face images have many nonlinear characteristics that
are not addressed by the linear analysis methods such as PCA and LDA—such as variations in
illumination, pose, and expression. The EBGM method places small blocks of numbers
(called “Gabor filters”) over small areas of the image, multiplying and adding the blocks with
the pixel values to produce numbers (referred to as “jets”) at various locations on the image.
These locations can then be adjusted to accommodate minor variations. The success of Gabor
filters is in the fact that they remove most of the variability in images due to variation in lighting
and contrast. At the same time they are robust against small shifts and deformations. The Gabor
filter representation increases the dimensions of the feature space (especially in places around
key landmarks on the face such as the eyes, nose, and mouth) such that salient features can
effectively be discriminated. This new technique has greatly enhanced facial recognition
performance under variations of pose, angle, and expression. New techniques for illumination
normalization also enhance significantly the discriminating ability of the Gabor filters.
7. Performance
False Acceptance Rate (FAR) is the probability that a system will incorrectly identify an individual
or will fail to reject an imposter.
FAR = (Number of False Acceptances) / (Number of Imposter Identification Attempts)
False Rejection Rate (FRR) is the probability that a system will fail to identify an enrolee.
13
FRR = (Number of False Rejection Rates) / (Number of Enrolee Identification Attempts)
For an efficient FRS the FAR and FRR values should be less.
8. Applications of FRT
Armed with this description of the core technical components of facial recognition and how
they function together to form a system, I consider a few typical applications scenarios
envisioned in the academic literature and promoted by systems developers and vendors.
8.1 Security
In a scenario an FRS would pick out targeted individuals in a crowd. Such are the hopes for FRS
serving purposes of law enforcement, national security, and counterterrorism. Potentially
connected to video surveillance systems (CCTV) already monitoring outdoor public spaces
like town centres, the systems would alert authorities to the presence of known or suspected
terrorists or criminals whose images are already enrolled in a system’s gallery, or could also be
used for tracking down lost children or other missing persons.
8.2 Authentication
Scenarios in which FRS may be used for authentication or verification purposes include entry and
egress to secured high-risk spaces, for example military bases, border crossings, and nuclear
power plants, as well as access to restricted resources, such as personal devices, computers,
networks, banking transactions, trading terminals, and medical records. In these
environments, not only is movement controlled, cooperation is structured by the way
incentives are organized, for example, subjects benefiting in some way from successful
operation of a FRS.
8.3 Back-end Verification
FRS might be used as back-end verification systems to uncover duplicate applications for
benefits in scenarios that require other forms of identification. The United States, United
Kingdom, New Zealand, Pakistan, and other countries have explored this approach for
passport and visa applications and the states of Colorado and Illinois for issuance of drivers’
licenses. Another typical scenario, in the context of law-enforcement, is for police to apply FRS
14
to the task of verifying the identity of lawfully detained and previously known individuals and
to check whether the individual matches the images in a gallery of “mug shots.”
9. Conclusion
Acceptance of facial recognition and other biometric identification systems has generally
been driven by security concerns and the belief that these technologies offer solutions. Yet,
less salient are the security threats posed by these very systems, particularly threats of harm
posed by lax practices dealing with system databases. In the case of biometric data, this fear is
magnified many times over since it is generally assumed to be a non-falsifiable anchor of
identity. If the biometric template of my face or fingerprint is used to gain access to a location, it
will be difficult for me to argue that it was not me, given general, if problematic, faith in the
claim that “the body never lies.” Once my face or fingerprint has been digitally encoded,
however, it can potentially be used to act “as if ” it were me and, thus, the security of biometric
data is a pressing matter, usefully considered on a par with DNA data and evidence. A similar
level of caution and security needs to be established.
Two other issues seldom identified as security issues, bear mentioning. One is the indirect harm
to people who opt out, that is, refuse to enrol. About any system whose implementation is
justified on grounds that subjects have consented to enrol or participate, it is essential to
ask what the cost is to those who choose not to. Consent cannot be considered meaningful
if the harm of not enrolling is too great. Finally, a system whose threshold allows too many false
negatives, that is, offenders to be systematically overlooked, poses an almost greater threat than
no system at all as it imbues us with a false sense of security.
10. References
[1]. http://www.fbi.gov/about-us/cjis/fingerprints_biometrics/biometric-center-of-excellence/modalities/
Downloaded on 14/01/14 at 23:58
[2]. Lucas D. Introna, Helen Nissenbaum, “Facial Recognition Technology: A Survey of Policy and
Implementation Issues”, New York University, pp. 10-40
[3]. http://en.wikipedia.org/wiki/Facial_recognition_system, Downloaded on 17/01/14 at 18.38
15
11. Appendix
16
17

Weitere ähnliche Inhalte

Was ist angesagt?

Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyShubhamLamichane
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdarraihansikdar
 
FACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTFACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTSaghir Hussain
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/TechnologyRahulSingh3034
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhavVaibhav P
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionNikyaa7
 
Face Recognition
Face Recognition Face Recognition
Face Recognition nialler27
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyranjit banshpal
 
Attendence management system using face detection
Attendence management system using face detectionAttendence management system using face detection
Attendence management system using face detectionSaurabh Sutone
 
FAKE CURRENCY DETECTION PDF NEW PPT.pptx
FAKE CURRENCY DETECTION PDF NEW PPT.pptxFAKE CURRENCY DETECTION PDF NEW PPT.pptx
FAKE CURRENCY DETECTION PDF NEW PPT.pptxBasavaPrabhu14
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologySYED HOZAIFA ALI
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyPushkar Dutt
 
Face Recognition Techniques
Face Recognition TechniquesFace Recognition Techniques
Face Recognition TechniquesDaksh Verma
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognitionMazin Alwaaly
 

Was ist angesagt? (20)

Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
Face recognisation system
Face recognisation systemFace recognisation system
Face recognisation system
 
FACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTFACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPT
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/Technology
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
Face recogntion
Face recogntionFace recogntion
Face recogntion
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
 
Face Recognition
Face Recognition Face Recognition
Face Recognition
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Attendence management system using face detection
Attendence management system using face detectionAttendence management system using face detection
Attendence management system using face detection
 
Finger vein technology
Finger vein technologyFinger vein technology
Finger vein technology
 
FAKE CURRENCY DETECTION PDF NEW PPT.pptx
FAKE CURRENCY DETECTION PDF NEW PPT.pptxFAKE CURRENCY DETECTION PDF NEW PPT.pptx
FAKE CURRENCY DETECTION PDF NEW PPT.pptx
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face Recognition Techniques
Face Recognition TechniquesFace Recognition Techniques
Face Recognition Techniques
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
 

Andere mochten auch

Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyAgrani Rastogi
 
Master_Thesis_FilipeSilva
Master_Thesis_FilipeSilvaMaster_Thesis_FilipeSilva
Master_Thesis_FilipeSilvaFilipe Silva
 
basis of infromation retrival part 2
basis of infromation retrival part 2basis of infromation retrival part 2
basis of infromation retrival part 2Saroj Suwal
 
Hack4dk presentation
Hack4dk presentationHack4dk presentation
Hack4dk presentationKevin Simper
 
140320702029 maurya ppt
140320702029 maurya ppt140320702029 maurya ppt
140320702029 maurya pptMaurya Shah
 
Facial Expression Recognition Using Local Binary Pattern and Support Vector M...
Facial Expression Recognition Using Local Binary Pattern and Support Vector M...Facial Expression Recognition Using Local Binary Pattern and Support Vector M...
Facial Expression Recognition Using Local Binary Pattern and Support Vector M...AM Publications
 
Recognition of Facial Expressions using Local Binary Patterns of Important Fa...
Recognition of Facial Expressions using Local Binary Patterns of Important Fa...Recognition of Facial Expressions using Local Binary Patterns of Important Fa...
Recognition of Facial Expressions using Local Binary Patterns of Important Fa...CSCJournals
 
computer vision and face recognition
 computer vision and face recognition computer vision and face recognition
computer vision and face recognitionhananhelal
 
The Future of Cataloging and Catalogers
The Future of Cataloging and CatalogersThe Future of Cataloging and Catalogers
The Future of Cataloging and Catalogerskramsey
 
Face recognition a survey
Face recognition a surveyFace recognition a survey
Face recognition a surveyieijjournal
 
What is pattern recognition field?
What is pattern recognition field?What is pattern recognition field?
What is pattern recognition field?Randa Elanwar
 
Emotion recognition from facial expression using fuzzy logic
Emotion recognition from facial expression using fuzzy logicEmotion recognition from facial expression using fuzzy logic
Emotion recognition from facial expression using fuzzy logicFinalyear Projects
 
Recent Advances in Face Analysis: database, methods, and software.
Recent Advances in Face Analysis: database, methods, and software.Recent Advances in Face Analysis: database, methods, and software.
Recent Advances in Face Analysis: database, methods, and software.Taowei Huang
 
Seminar Report on Wisenet Technology
Seminar Report on Wisenet TechnologySeminar Report on Wisenet Technology
Seminar Report on Wisenet TechnologyVivek Soni
 
Face recognition tech1
Face recognition tech1Face recognition tech1
Face recognition tech1Ankit Gupta
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
Facial expression recognition based on local binary patterns final
Facial expression recognition based on local binary patterns finalFacial expression recognition based on local binary patterns final
Facial expression recognition based on local binary patterns finalahmad abdelhafeez
 

Andere mochten auch (20)

Mini Project- Face Recognition
Mini Project- Face RecognitionMini Project- Face Recognition
Mini Project- Face Recognition
 
Pca seminar final report
Pca seminar final reportPca seminar final report
Pca seminar final report
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Master_Thesis_FilipeSilva
Master_Thesis_FilipeSilvaMaster_Thesis_FilipeSilva
Master_Thesis_FilipeSilva
 
basis of infromation retrival part 2
basis of infromation retrival part 2basis of infromation retrival part 2
basis of infromation retrival part 2
 
Hack4dk presentation
Hack4dk presentationHack4dk presentation
Hack4dk presentation
 
140320702029 maurya ppt
140320702029 maurya ppt140320702029 maurya ppt
140320702029 maurya ppt
 
Facial Expression Recognition Using Local Binary Pattern and Support Vector M...
Facial Expression Recognition Using Local Binary Pattern and Support Vector M...Facial Expression Recognition Using Local Binary Pattern and Support Vector M...
Facial Expression Recognition Using Local Binary Pattern and Support Vector M...
 
Recognition of Facial Expressions using Local Binary Patterns of Important Fa...
Recognition of Facial Expressions using Local Binary Patterns of Important Fa...Recognition of Facial Expressions using Local Binary Patterns of Important Fa...
Recognition of Facial Expressions using Local Binary Patterns of Important Fa...
 
computer vision and face recognition
 computer vision and face recognition computer vision and face recognition
computer vision and face recognition
 
The Future of Cataloging and Catalogers
The Future of Cataloging and CatalogersThe Future of Cataloging and Catalogers
The Future of Cataloging and Catalogers
 
Face recognition a survey
Face recognition a surveyFace recognition a survey
Face recognition a survey
 
What is pattern recognition field?
What is pattern recognition field?What is pattern recognition field?
What is pattern recognition field?
 
Emotion recognition from facial expression using fuzzy logic
Emotion recognition from facial expression using fuzzy logicEmotion recognition from facial expression using fuzzy logic
Emotion recognition from facial expression using fuzzy logic
 
Face recognition software system by Junyu Tech.(China)
Face recognition software system by Junyu Tech.(China)Face recognition software system by Junyu Tech.(China)
Face recognition software system by Junyu Tech.(China)
 
Recent Advances in Face Analysis: database, methods, and software.
Recent Advances in Face Analysis: database, methods, and software.Recent Advances in Face Analysis: database, methods, and software.
Recent Advances in Face Analysis: database, methods, and software.
 
Seminar Report on Wisenet Technology
Seminar Report on Wisenet TechnologySeminar Report on Wisenet Technology
Seminar Report on Wisenet Technology
 
Face recognition tech1
Face recognition tech1Face recognition tech1
Face recognition tech1
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Facial expression recognition based on local binary patterns final
Facial expression recognition based on local binary patterns finalFacial expression recognition based on local binary patterns final
Facial expression recognition based on local binary patterns final
 

Ähnlich wie Seminar Report face recognition_technology

Biometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesBiometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesSwapnil Jagtap
 
Multi-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachMulti-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachJigisha Aryya
 
SMSECURITY: SECURITY SYSTEM AND SMS NOTIFICATION CUM FACE RECOGNITION
SMSECURITY: SECURITY SYSTEM AND SMS NOTIFICATION CUM FACE RECOGNITIONSMSECURITY: SECURITY SYSTEM AND SMS NOTIFICATION CUM FACE RECOGNITION
SMSECURITY: SECURITY SYSTEM AND SMS NOTIFICATION CUM FACE RECOGNITIONijcsit
 
HMM-Based Face Recognition System with SVD Parameter
HMM-Based Face Recognition System with SVD ParameterHMM-Based Face Recognition System with SVD Parameter
HMM-Based Face Recognition System with SVD Parameterijtsrd
 
Jss academy of technical education
Jss academy of technical educationJss academy of technical education
Jss academy of technical educationArhind Gautam
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to BiometricsYogeshIJTSRD
 
Implementation of Multimodal Biometrics Systems in Handling Security of Mobil...
Implementation of Multimodal Biometrics Systems in Handling Security of Mobil...Implementation of Multimodal Biometrics Systems in Handling Security of Mobil...
Implementation of Multimodal Biometrics Systems in Handling Security of Mobil...ijtsrd
 
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionA Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionCSCJournals
 
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...IRJET Journal
 
attendence system face detection
attendence system face detectionattendence system face detection
attendence system face detectionStudentRocks
 
Introduction of Biometrics
Introduction of BiometricsIntroduction of Biometrics
Introduction of BiometricsAnit Thapaliya
 
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...ijait
 
Profile Identification through Face Recognition
Profile Identification through Face RecognitionProfile Identification through Face Recognition
Profile Identification through Face Recognitionijtsrd
 
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)sachin yadav
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)JIEMS Akkalkuwa
 
Transaction Authentication using Face and OTP Verification
Transaction Authentication using Face and OTP VerificationTransaction Authentication using Face and OTP Verification
Transaction Authentication using Face and OTP Verificationijtsrd
 

Ähnlich wie Seminar Report face recognition_technology (20)

Biometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesBiometrics system penetration in mobile devices
Biometrics system penetration in mobile devices
 
Multi-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachMulti-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and Approach
 
SMSECURITY: SECURITY SYSTEM AND SMS NOTIFICATION CUM FACE RECOGNITION
SMSECURITY: SECURITY SYSTEM AND SMS NOTIFICATION CUM FACE RECOGNITIONSMSECURITY: SECURITY SYSTEM AND SMS NOTIFICATION CUM FACE RECOGNITION
SMSECURITY: SECURITY SYSTEM AND SMS NOTIFICATION CUM FACE RECOGNITION
 
HMM-Based Face Recognition System with SVD Parameter
HMM-Based Face Recognition System with SVD ParameterHMM-Based Face Recognition System with SVD Parameter
HMM-Based Face Recognition System with SVD Parameter
 
Jss academy of technical education
Jss academy of technical educationJss academy of technical education
Jss academy of technical education
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
Implementation of Multimodal Biometrics Systems in Handling Security of Mobil...
Implementation of Multimodal Biometrics Systems in Handling Security of Mobil...Implementation of Multimodal Biometrics Systems in Handling Security of Mobil...
Implementation of Multimodal Biometrics Systems in Handling Security of Mobil...
 
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionA Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
 
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
attendence system face detection
attendence system face detectionattendence system face detection
attendence system face detection
 
Introduction of Biometrics
Introduction of BiometricsIntroduction of Biometrics
Introduction of Biometrics
 
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
 
Profile Identification through Face Recognition
Profile Identification through Face RecognitionProfile Identification through Face Recognition
Profile Identification through Face Recognition
 
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)
 
Cover page
Cover pageCover page
Cover page
 
H029044050
H029044050H029044050
H029044050
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
Transaction Authentication using Face and OTP Verification
Transaction Authentication using Face and OTP VerificationTransaction Authentication using Face and OTP Verification
Transaction Authentication using Face and OTP Verification
 
13_2
13_213_2
13_2
 

Kürzlich hochgeladen

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 

Kürzlich hochgeladen (20)

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 

Seminar Report face recognition_technology

  • 1. 1 Face Recognition Technology Presented by: - Vivek Kumar Soni B.Tech. (CSE), 6th Semester Regd. No: 1234567890 Silicon Institute of Technology Bhubaneswar
  • 2. 2 Contents 1. Abstract.......................................................................................................................................................3 2. Introduction ................................................................................................................................................3 2.1 Introduction to Biometrics....................................................................................................................4 2.2 Introduction to FRT...............................................................................................................................4 3. History.........................................................................................................................................................4 4. FRT in Operation .........................................................................................................................................5 4.1 Verification............................................................................................................................................5 4.2 Identification.........................................................................................................................................6 4.3 Watch List Task .....................................................................................................................................7 5. Development of Face Recognition System .................................................................................................8 5.1 Detecting a Face....................................................................................................................................8 5.2 Normalization........................................................................................................................................9 5.3 Feature Extraction.................................................................................................................................9 5.4 Recognition ...........................................................................................................................................9 6. Face Recognition Algorithms ....................................................................................................................10 6.1 Principal Components Analysis (PCA).................................................................................................10 6.2 Linear Discriminant Analysis (LDA) .....................................................................................................11 6.3 Elastic Bunch Graph Matching (EBGM)...............................................................................................12 7. Performance..............................................................................................................................................12 8. Applications of FRT....................................................................................................................................13 8.1 Security ...............................................................................................................................................13 8.2 Authentication ....................................................................................................................................13 8.3 Back-end Verification..........................................................................................................................13 9. Conclusion.................................................................................................................................................14 10. References ..............................................................................................................................................14 11. Appendix.................................................................................................................................................15
  • 3. 3 1. Abstract Machine recognition of human faces from still or video has attracted a great deal of attention in the psychology, image processing, pattern recognition, neural science, and computer security and computer vision communities. A screensaver equipped with face recognition technology can automatically unlock whenever the authorized user approaches the computer. Facial recognition software is designed to pinpoint a face and measure its features. Each face has certain distinguishable landmarks, which make up the different facial features. These landmarks are referred to as nodal points. There are about 80 nodal points on a human face. These nodal points are measured to create a numerical code, a string of numbers that represents the face in a database. This code is called a face-print. Only 14 to 22 nodal points are needed for such software to complete the recognition process. This software can pick someone's face out of a crowd, extract that face from the rest of the scene and compare it to a database full of stored images. Facial Recognition System has proved to be a very robust and reliable system in security and other solving threats. 2. Introduction The information age is quickly revolutionizing the way transactions are completed. Everyday actions are increasingly being handled electronically, instead of with pencil and paper or face to face. This growth in electronic transactions has resulted in a greater demand for fast and accurate user identification and authentication. Access codes for buildings, banks accounts and computer systems often use PIN's for identification and security clearances. Using the proper PIN gains access, but the user of the PIN is not verified. When credit and ATM cards are lost or stolen, an unauthorized user can often come up with the correct personal codes. Despite warning, many people continue to choose easily guessed PINs and passwords viz. birthdays, phone numbers and social security numbers. Recent cases of identity theft have increased the need for methods to prove that someone is truly who he/she claims to be.
  • 4. 4 2.1 Introduction to Biometrics Although there has always been a need to identify individuals, the requirements of identification have changed in radical ways as populations have expanded and grown increasingly mobile. This is particularly true for the relationships between institutions and individuals, which are crucial to the well-being of societies, and necessarily and increasingly conducted impersonally-that is, without persistent direct and personal interaction. Importantly, these impersonal interactions include relationships between governments and citizens for purposes of fair allocation of entitlements, mediated transactions with e-government, and security and law enforcement. Increasingly, these developments also encompass relationships between actors and clients or consumers based on financial transactions, commercial transactions, provision of services, and sales conducted among strangers, often mediated through the telephone, Internet, and the World Wide Web. Biometric technologies have emerged as promising tools to meet these challenges of identification, based not only on the faith that “the body doesn’t lie,” but also on dramatic progress in a range of relevant technologies. These developments, according to some, herald the possibility of automated systems of identification that are accurate, reliable, and efficient. 2.2 Introduction to FRT Facial recognition research and FRT is a subfield in a larger field of pattern recognition research and technology. Pattern recognition technology uses statistical techniques to detect and extract patterns from data in order to match it with patterns stored in a database. The data upon which the recognition system works (such as a photo of a face) is no more than a set of discernible pixel-level patterns for the system, that is, the pattern recognition system does not perceive meaningful “faces” as a human would understand them. 3. History Automated facial recognition is a relatively new concept. Developed in the 1960s, the first semi-automated system for facial recognition required the administrator to locate features (such as eyes, ears, nose, and mouth) on photographs before it calculated distances and ratios to a common reference point, which were then compared to reference data.
  • 5. 5 The Facial Recognition Technology program started in September 1993, with Dr. P. Jonathon Phillips, Army Research Laboratory, Adelphi, Maryland, serving as technical agent. Initially, the FRT program consisted of three phases, each one year in length. The goals of the first phase were to establish the viability of automatic face recognition algorithms and to establish a performance baseline against which to measure future progress. The goals of phases 2 and 3 were to further develop face recognition technology. After the successful conclusion of phase 2, the DoD Counterdrug Technology Development Program Office initiated the FRT demonstration effort. The goals of this effort were to port FRT evaluated algorithms to real-time experimental/ demonstration systems. 4. FRT in Operation The first step in the facial recognition process is the capturing of a face image, also known as the probe image. This would normally be done using a still or video camera. In principle, the capturing of the face image can be done with or without the knowledge (or cooperation) of the subject. This is indeed one of the most attractive features of FRT. As such, it could, in principle, be incorporated into existing good quality “passive” CCTV systems. Figure 1: Overview of Face Recognition System 4.1 Verification Verification or authentication is the simplest task for a FRS. An individual with a pre-existing relationship with an institution (and therefore already enrolled in the reference database
  • 6. 6 or gallery) presents his or her biometric characteristics (face or probe image) to the system, claiming to be in the reference database or gallery (i.e. claiming to be a legitimate identity). The system must then attempt to match the probe image with the particular, claimed template in the reference database. This is a one-to-one matching task since the system does not need to check every record in the database but only that which corresponds to the claimed identity (using some form of identifier such as an employee number to access the record in the reference database). There are two possible outcomes: (1) the person is not recognized or (2) the person is recognized. If the person is not recognized (i.e., the identity is not verified) it might be because the person is an imposter (i.e., is making an illegitimate identity claim) or because the system made a mistake (this mistake is referred to as a false reject). The system may also make a mistake in accepting a claim when it is in fact false (this is referred to as a false accept). Figure 2: Possible Outcomes in the Verification Task 4.2 Identification Identification is a more complex task than verification. In this case, the FRS is provided a probe image to attempt to match it with a biometric reference in the gallery (or not). This represents a one-to-many problem. In addition, we need to further differentiate between closed-set identification problems and open-set identification problems. In a closed-set identification problem we want to identify a person that we know is in the reference database or gallery (in other words for any possible identification we want to make we know beforehand that the
  • 7. 7 person to be identified is in the database). Open-set identification is more complex in that we do not know in advance whether the person to be identified is or is not in the reference database. The outcome of these two identification problems will be interpreted differently. If there is no match in the closed-set identification then we know the system has made a mistake (i.e., identification has failed (a false negative)). However in the open-set problem we do not know whether the system made a mistake or whether the identity is simply not in the reference database in the first instance. Real-world identification applications tend to be open-set identification problems rather than closed set identification problems. Figure 3: Possible Outcomes in Identification Task 4.3 Watch List Task The watch list task is a specific case of an open-set identification task. In the watch list task, the system determines if the probe image corresponds to a person on the watch list and then subsequently identifies the person through the match (assuming the identities of the watch list are known). It is therefore also a one-to-many problem but with an open-set assumption. When a probe is given to the system, the system compares it with the entire gallery (also known
  • 8. 8 in this case as the watch list). If any match is above the operating threshold, an alarm will be triggered. If the top match is identified correctly, then the task was completed successfully. If however the person in the probe image is not someone in the gallery and the alarm was nonetheless triggered, then it would be a false alarm (i.e., a false alarm occurs when the top match score for someone not in the watch list is above the operating threshold). Figure 4: Possible Outcomes in Watch List Task 5. Development of Face Recognition System The facial recognition process normally has four interrelated phases or steps. The first step is face detection, the second is normalization, the third is feature extraction, and the final cumulative step is face recognition. These steps depend on each other and often use similar techniques. 5.1 Detecting a Face Detecting a face in a probe image may be a relatively simple task for humans, but it is not so for a computer. The computer has to decide which pixels in the image is part of the face and which are not. In atypical passport photo, where the background is clear, it is easy to do, but as soon as the background becomes cluttered with other objects, the problem becomes extremely complex. Traditionally, methods that focus on facial landmarks (such as eyes), that
  • 9. 9 detect face-like colours in circular regions, or that use standard feature templates, were used to detect faces. 5.2 Normalization Once the face has been detected (separated from its background), the face needs to be normalized. This means that the image must be standardized in terms of size, pose, illumination, etc., relative to the images in the gallery or reference database. To normalize a probe image, the key facial landmarks must be located accurately. Using these landmarks, the normalization algorithm can (to some degree) reorient the image for slight variations. Such corrections are, however, based on statistical inferences or approximations which may not be entirely accurate. Thus, it is essential that the probe is as close as possible to a standardized face. Facial landmarks are the key to all systems, irrespective of the overall method of recognition. If the facial landmarks cannot be located, then the recognition process will fail. Recognition can only succeed if the probe image and the gallery images are the same in terms of pose orientation, rotation, scale, size, etc. Normalization ensures that this similarity is achieved—to a greater or lesser degree. 5.3 Feature Extraction Once the face image has been normalized, the feature extraction and recognition of the face can take place. In feature extraction, a mathematical representation called a biometric template or biometric reference is generated, which is stored in the database and will form the basis of any recognition task. Facial recognition algorithms differ in the way they translate or transform a face image (represented at this point as grayscale pixels) into a simplified mathematical representation (the “features”) in order to perform the recognition task. 5.4 Recognition It is important for successful recognition that maximal information is retained in this transformation process so that the biometric template is sufficiently distinctive. If this cannot be achieved, the algorithm will not have the discriminating ability required for successful recognition. The problem of biometric templates from different individuals being insufficiently distinctive (or too close to each other) is often referred to as the generation of biometric doubles. It is in this process of mathematical transformation (feature extraction) and
  • 10. 10 matching (recognition) of a biometric template that particular algorithms differ significantly in their approach. Figure 5: Steps in Facial Recognition process 6. Face Recognition Algorithms The early work in face recognition was based on the geometrical relationships between facial landmarks as a means to capture and extract facial features. This method is obviously highly dependent on the detection of these landmarks (which may be very difficult is variations in illumination, especially shadows) as well as the stability of these relationships across pose variation. These problems were and still remain significant stumbling blocks for face detection and recognition. 6.1 Principal Components Analysis (PCA) The PCA technique converts each two dimensional image into a one dimensional vector. This vector is then decomposed into orthogonal (uncorrelated) principle components (known as Eigen faces)—in other words, the technique selects the features of the image (or face) which vary the most from the rest of the image. Each face image is represented as a weighted sum (feature vector) of the principle components (or Eigen faces), which are stored in a one dimensional array. Each component (Eigen face) represents only a certain feature of the face, which may or may not be present in the original image. A probe image is compared against a gallery image by measuring the distance between their respective feature vectors. For PCA to
  • 11. 11 work well the probe image must be similar to the gallery image in terms of size (or scale), pose, and illumination. It is generally true that PCA is reasonably sensitive to scale variation. 6.2 Linear Discriminant Analysis (LDA) LDA is a statistical approach based on the same statistical principles as PCA. LDA classifies faces of unknown individuals based on a set of training images of known individuals. The technique finds the underlying vectors in the facial feature space (vectors) that would maximize the variance between individuals (or classes) and minimize the variance within a number of samples of the same person (i.e., within a class). If this can be achieved, then the algorithm would be able to discriminate between individuals and yet still recognize individuals in some varying conditions (minor variations in expression, rotation, illumination, etc.). If we look at Figure 6 we can see that there is a relatively large amount of variation between the individuals and small variations between the varieties of poses of the same individual. To do this the algorithm must have an appropriate training set. The database should contain several examples of face images for each subject in the training set and at least one example in the test set. These examples should represent different frontal views of subjects with minor variations in view angle. They should also include different facial expressions, different lighting and background conditions, also examples with and without glasses if appropriate. Obviously, an increase in the number of varying samples of the same person will allow the algorithm to optimize the variance between classes and therefore become more accurate. This may be a serious limitation in some contexts (also known as the small sample size problem). As for PCA, LDA works well if the probe image is relatively similar to the gallery image in terms of size, pose, and illumination. With a good variety in sampling this can be somewhat varied, but only up to a point. For more significant variation other non-linear approaches are necessary.
  • 12. 12 Figure 6: Example of Variations between and within Classes 6.3 Elastic Bunch Graph Matching (EBGM) EBGM relies on the concept that real face images have many nonlinear characteristics that are not addressed by the linear analysis methods such as PCA and LDA—such as variations in illumination, pose, and expression. The EBGM method places small blocks of numbers (called “Gabor filters”) over small areas of the image, multiplying and adding the blocks with the pixel values to produce numbers (referred to as “jets”) at various locations on the image. These locations can then be adjusted to accommodate minor variations. The success of Gabor filters is in the fact that they remove most of the variability in images due to variation in lighting and contrast. At the same time they are robust against small shifts and deformations. The Gabor filter representation increases the dimensions of the feature space (especially in places around key landmarks on the face such as the eyes, nose, and mouth) such that salient features can effectively be discriminated. This new technique has greatly enhanced facial recognition performance under variations of pose, angle, and expression. New techniques for illumination normalization also enhance significantly the discriminating ability of the Gabor filters. 7. Performance False Acceptance Rate (FAR) is the probability that a system will incorrectly identify an individual or will fail to reject an imposter. FAR = (Number of False Acceptances) / (Number of Imposter Identification Attempts) False Rejection Rate (FRR) is the probability that a system will fail to identify an enrolee.
  • 13. 13 FRR = (Number of False Rejection Rates) / (Number of Enrolee Identification Attempts) For an efficient FRS the FAR and FRR values should be less. 8. Applications of FRT Armed with this description of the core technical components of facial recognition and how they function together to form a system, I consider a few typical applications scenarios envisioned in the academic literature and promoted by systems developers and vendors. 8.1 Security In a scenario an FRS would pick out targeted individuals in a crowd. Such are the hopes for FRS serving purposes of law enforcement, national security, and counterterrorism. Potentially connected to video surveillance systems (CCTV) already monitoring outdoor public spaces like town centres, the systems would alert authorities to the presence of known or suspected terrorists or criminals whose images are already enrolled in a system’s gallery, or could also be used for tracking down lost children or other missing persons. 8.2 Authentication Scenarios in which FRS may be used for authentication or verification purposes include entry and egress to secured high-risk spaces, for example military bases, border crossings, and nuclear power plants, as well as access to restricted resources, such as personal devices, computers, networks, banking transactions, trading terminals, and medical records. In these environments, not only is movement controlled, cooperation is structured by the way incentives are organized, for example, subjects benefiting in some way from successful operation of a FRS. 8.3 Back-end Verification FRS might be used as back-end verification systems to uncover duplicate applications for benefits in scenarios that require other forms of identification. The United States, United Kingdom, New Zealand, Pakistan, and other countries have explored this approach for passport and visa applications and the states of Colorado and Illinois for issuance of drivers’ licenses. Another typical scenario, in the context of law-enforcement, is for police to apply FRS
  • 14. 14 to the task of verifying the identity of lawfully detained and previously known individuals and to check whether the individual matches the images in a gallery of “mug shots.” 9. Conclusion Acceptance of facial recognition and other biometric identification systems has generally been driven by security concerns and the belief that these technologies offer solutions. Yet, less salient are the security threats posed by these very systems, particularly threats of harm posed by lax practices dealing with system databases. In the case of biometric data, this fear is magnified many times over since it is generally assumed to be a non-falsifiable anchor of identity. If the biometric template of my face or fingerprint is used to gain access to a location, it will be difficult for me to argue that it was not me, given general, if problematic, faith in the claim that “the body never lies.” Once my face or fingerprint has been digitally encoded, however, it can potentially be used to act “as if ” it were me and, thus, the security of biometric data is a pressing matter, usefully considered on a par with DNA data and evidence. A similar level of caution and security needs to be established. Two other issues seldom identified as security issues, bear mentioning. One is the indirect harm to people who opt out, that is, refuse to enrol. About any system whose implementation is justified on grounds that subjects have consented to enrol or participate, it is essential to ask what the cost is to those who choose not to. Consent cannot be considered meaningful if the harm of not enrolling is too great. Finally, a system whose threshold allows too many false negatives, that is, offenders to be systematically overlooked, poses an almost greater threat than no system at all as it imbues us with a false sense of security. 10. References [1]. http://www.fbi.gov/about-us/cjis/fingerprints_biometrics/biometric-center-of-excellence/modalities/ Downloaded on 14/01/14 at 23:58 [2]. Lucas D. Introna, Helen Nissenbaum, “Facial Recognition Technology: A Survey of Policy and Implementation Issues”, New York University, pp. 10-40 [3]. http://en.wikipedia.org/wiki/Facial_recognition_system, Downloaded on 17/01/14 at 18.38
  • 16. 16
  • 17. 17