2. Outlines
Introduction
History
Applications
Types of comparisons
Components of Face Recognition
How Face Recognition works
Face Recognition techniques
Popular Face Recognition algorithms
Databases
Advantages and disadvantages
Sample of devices
Important things
Conclusions
3. Introduction
Facial recognition (or face recognition) is a type
of biometric software application that can identify a
specific individual in a digital image by analyzing and
comparing patterns This growth in electronic transactions
results in great demand for fast and accurate user
identification and authentication.
Facial recognition systems are commonly used for security
purposes but are increasingly being used in a variety of
other applications. For example, Facebook uses facial
recognition software to help automate user tagging in
photographs.
4. History
In 1960s, the first semi-automated system for facial
recognition to locate the features(such as eyes, ears,
nose and mouth) on the photographs.
In 1970s, Goldstein and Harmon used 21 specific
subjective markers such as hair color and lip thickness to
automate the recognition.
In 1988, Kirby and Sirovich used standard linear algebra
technique, to the face recognition
5. Applications
Security/Counterterrorism. Access control, comparing
surveillance images to Know terrorist.
Day Care: Verify identity of individuals picking up the
children.
Residential Security: Alert homeowners of approaching
personnel
Voter verification: Where eligible politicians are required
to verify their identity during a voting process this is
intended to stop voting where the vote may not go as
expected.
Banking using ATM: The software is able to quickly verify
a customer’s face.
6. Types of comparisons
In Facial recognition there are two types of comparisons:-
IDENTIFICATION- The system compares the given
individual to all the Other individuals in the database and
gives a ranked list of matches
7. VERIFICATION- The system compares the given
individual with who they say they are and gives a yes or
no decision.
8. Stages of identification
Capture- Capture the behavioral and physical sample.
Extraction- Unique data is extracted from the sample and
a template is created.
Comparison- The template is compared with a new
sample.
Match/non match- The system decides whether the new
samples are matched or not
Accept/Project
9. Components of face Recognition
Enrollment module-An automated mechanism that scans and
captures a digital or analog image of a living personal
characteristics.
Database-Another entity which handles compression ,processing
,data storage and compression of the captured data with stored
data.
Identification module-The third interfaces with the application
system
10. How Face Recognition works
Facial recognition software is based on the ability to first
recognize faces, which is a technological feat in itself.
If you look at the mirror, you can see that your face has certain
distinguishable landmarks. These are the peaks and valleys that
make up the different facial features.
There are about 80 nodal points on a human face.
11. Here are few nodal points that are measured by the
software :
• Distance between the eyes
• Width of the nose
• Depth of the eye socket
• Cheekbones
• Jaw line and
• Chin
12. Detection- when the system is attached to a video surveillance
system, the recognition software searches the field of view of a
video camera for faces. If there is a face in the view, it is
detected within a fraction of a second. A multi-scale algorithm is
used to search for faces in low resolution. The system switches
to a high-resolution search only after a head-like shape is
detected.
Alignment- Once a face is detected, the system determines the
head's position, size and pose. A face needs to be turned at
least 35 degrees toward the camera for the system to register it.
13. Normalization-The image of the head is scaled and rotated so
that it can be registered and mapped into an appropriate size and
pose. Normalization is performed regardless of the head's
location and distance from the camera. Light does not impact the
normalization process.
Representation-The system translates the facial data into a
unique code. This coding process allows for easier comparison of
the newly acquired facial data to stored facial data.
Matching- The newly acquired facial data is compared to the
stored data and (ideally) linked to at least one stored facial
representation.
14. Face Recognition Techniques
1 . Feature-based methods :Properties and geometric relations such
as the areas, distances, and angles between the facial feature
points are used as descriptors for face recognition.
15. Face Recognition Techniques
2 . Appearance-based methods: appearance-based methods
consider the global properties of the face image intensity pattern.
16. Popular Face Recognition Algorithms
1. Eigenfaces (PCA-Principal Component Analysis).
2. Linear Discriminant Analysis (LDA) and Fisherfaces.
3. Independent Component Analysis (ICA)
4. Local Feature Analysis (LFA).
5. Elastic Bunch Graph Matching (EBGM).
6. Neural Networks (NN) and Support Vector Machines (SVM).
7. Tensorfaces.
8. Manifolds.
9. Kernel Methods.
10. correlation filters.
17. Databases
There are several publicly available face databases for the research
community to use for algorithm development, which provide a standard
benchmark when reporting results.
• Face Recognition Grand Challenge (FRGC) database
• FERET database
• Pose Illumination Expression (PIE) data base
• AR database
• Yale Face database
24. Important things
Cost : Face recognition is also one of the most inexpensive biometric in
the market .
Easiest: It easy to use( camera take a picture ) .
Authentication : It is authenticate because is it not use password(my be
forget ) or card ( my be loss) .
Identification : It Identification from the face .
Physiological and/or behavioral characteristics : It is Physiological
characteristics.
25. Important things
Ability to applied: One of it applications is for attendance register.
Community Acceptance: It is accepted because its Fast and convenient
in identifying a person , Great use in society.
Automatic real time : System is online because the Verification Speed
less than one Second ( Real time ).
Life cycle : database need update because human face changing.
Maintenance requirement : maintenance for the hardware and
software .
26. Conclusion
Face recognition technologies have been associated generally with
very costly top secure applications. Today the core technologies have
evolved and the cost of equipment is going down dramatically due to
the integration and the increasing processing power. Certain
applications of face recognition technology are now cost effective,
reliable and highly accurate .