SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Face Recognition
  By: Deirdre Keane and Kathleen Reilly
“the ability of a
computer to scan, store,
and recognize human
faces for use in
identifying people.”




     http://dictionary.reference.com/browse/face+recognition
Biometrics
 “Biometrics consists of methods for uniquely recognizing
  humans based upon one or more intrinsic physical or
  behavioral traits.”

 Examples of biometric systems are:


   •   Signature         • Retina
   •   Finger Prints     • Hand
   •   Voice               Geometry
   •   Iris              • Ear Geometry
                         • Face
The History of Face
                  Recognition

1964-1965   1970      1973    “Connectionist” 1988       1991         2001



Bledsoe, Wolf, and Bison created the first semi-automated
system
 Goldstein, Harmon, and Lesk use markers to automate the
 recognition
Fisher and Elshlagerb take a face template and map it onto a global
template
    Connectionist Approach: uses gestures and identifying
    markers and Sirovich pioneered the eigenface
     Kirby
      approach
Turk and Pentland enabled a reliable real-time automated face recognition
system
    Face Recognition first captured the public’s
Face
Detection
                     Face
                  Recognition




            Face             Face
        Identification    Verification
Face Recognition Process
                  Image
                Acquisition



  Declaring A                     Image
    Match                     Preprocessing




        Feature
                       Face Detection
       Extraction
Face Recognition Methods
    Direct Correlation
    Function-Based Method
      Principal Component Analysis
    Geometry-Based Methods
      Elastic Graph Matching
      Face Geometry
    Three-Dimensional Face
     Recognition
Direct Correlation
Principal Component Analysis
            (PCA)
Elastic Graph Matching
Face Geometry
Three- Dimensional
Benefits                             Limitations
1.   Checks for criminal                 1. Quality of Database
     records                                Images
2.   Enhances security by
     using surveillance                  2. Quality of Captured
     cameras                                Images
3.   Finding lost children from
     public cameras                 v    3. Database Sizes
4.   Know in advance if a VIP
     is entering                    s.   4. Ineffectiveness in Public
                                            Places
5.   Detection of a criminal at a
     certain place
6.   Pattern recognition                 5. False Identifications
7.   Used in science to
     compare an entity with a            6. Ethical issues
     set of entities                        surrounding facial
                                            recognition technology
Question?
 Name something face recognition is used in our
  generation today.
Face recognition in marketing


     “Once the stuff of science fiction and high-
     tech crime fighting, facial recognition
     technology has become one of the newest
     tools in marketing, even though privacy
     concerns abound”




    http://www.youtube.com/watch?v=OXz6fr5HPBk
Facial Recognition in
       Business
Face Recognition in advertising
Companies using facial
recognition:                           Where we
                                      can expect to
                                      be advertised
Kraft                    Type of person    to:


Adidas                     advertising
                                          Kiosks
Scenetap

                                       Vending
                                       Machines




                                      Digital Signs
Tag
             Uses face recognition software to
Suggestion   suggest peoples names to tag in
    s
             pictures without their permission
Question for discussion:
 Do you think the tagging feature is perceived as a
  positive or negative feature to most of the cyber
  community?
Facebook and Facial
    Recognition
Carnegie-Mellon Facebook study
Goal: "that it is possible to start from an anonymous face in the street,
and end up with very sensitive information about that person." The results
were "made possible by the convergence of face recognition, social
networks, data mining and cloud computing - that [is referred] to as
augmented reality."




   Facial Recognition in the future                 Tests performed:
   could used to..                      -On campus identification via collected
                                                   facebook pictures
   • Identify strangers                - Dating site profiles matched to faceook
   • Get social security numbers                         profiles
   • Gain personal information
Facial Recognition Major Risk: Privacy
                Handing stalkers their material
   “and its new face-recognition feature could become the latest example of a
    seemingly innocuous development morphing into a serious threat to the privacy of
    our (visual) data.”
Cloud Based Facial Recognition

 PittPatt rely’s on finding publicly available pictures of
  you online
   whether it's a profile image for social networks
        Facebook
         Google Plus
        company website
        college athletic portrait.



                          Just recently acquired
                                by Google
Facial Recognition in smart phones




Augmented ID




                      And all of this data can be
                       accessed just by aiming
                        your mobile phone at
                          someone's face
Questions
1) What application has Google consistently used face
   recognition on since 2009?        Picasa
2) This local place has same kind of photo database as
Facebook and some of them have wisely incorporated facial
recognition technology to prevent identity theft (and identity
creation)…                Your local
                              DMV



  3.) When was face recognition introduced to the world?

Weitere ähnliche Inhalte

Ähnlich wie Sit powerpoint

Facial recognition powerpoint
Facial recognition powerpointFacial recognition powerpoint
Facial recognition powerpoint12206695
 
Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Herman Kurnadi
 
Facial powerpoint
Facial powerpointFacial powerpoint
Facial powerpoint12202843
 
Fog computing based on face identification in internet
Fog computing based on face identification in internetFog computing based on face identification in internet
Fog computing based on face identification in internetummeHani43
 
Face Recognition Dissertation
Face Recognition Dissertation Face Recognition Dissertation
Face Recognition Dissertation Sandeep Garg
 
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?Kavika Roy
 
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...ijbuiiir1
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition TechnologyAvinash Singh
 
Trends in Facial Recognition.pptx
Trends in Facial Recognition.pptxTrends in Facial Recognition.pptx
Trends in Facial Recognition.pptxnishiyath
 
Facial Recognition.pptx
Facial Recognition.pptxFacial Recognition.pptx
Facial Recognition.pptxRazaAliAnjum
 
Facial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptxFacial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptxkakimetu
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Webinar: How Police Are Using Facial Recognition to Catch Bad Guys
Webinar: How Police Are Using Facial Recognition to Catch Bad GuysWebinar: How Police Are Using Facial Recognition to Catch Bad Guys
Webinar: How Police Are Using Facial Recognition to Catch Bad GuysAnimetrics
 
Biometric Facial Recognition
Biometric Facial RecognitionBiometric Facial Recognition
Biometric Facial RecognitionJennifer York
 
Face Recognition Human Computer Interaction
Face Recognition Human Computer InteractionFace Recognition Human Computer Interaction
Face Recognition Human Computer Interactionines beltaief
 
418 Automated Criminal Identification System using Face Detection and.pptx
418 Automated Criminal Identification System using Face Detection and.pptx418 Automated Criminal Identification System using Face Detection and.pptx
418 Automated Criminal Identification System using Face Detection and.pptxShivanig12
 

Ähnlich wie Sit powerpoint (20)

Facial recognition powerpoint
Facial recognition powerpointFacial recognition powerpoint
Facial recognition powerpoint
 
Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)
 
Facial powerpoint
Facial powerpointFacial powerpoint
Facial powerpoint
 
Fog computing based on face identification in internet
Fog computing based on face identification in internetFog computing based on face identification in internet
Fog computing based on face identification in internet
 
Face Recognition Dissertation
Face Recognition Dissertation Face Recognition Dissertation
Face Recognition Dissertation
 
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
 
Face Detection Technology
Face Detection TechnologyFace Detection Technology
Face Detection Technology
 
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
 
Face Detection Technology
Face Detection TechnologyFace Detection Technology
Face Detection Technology
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
 
Trends in Facial Recognition.pptx
Trends in Facial Recognition.pptxTrends in Facial Recognition.pptx
Trends in Facial Recognition.pptx
 
Facial Recognition.pptx
Facial Recognition.pptxFacial Recognition.pptx
Facial Recognition.pptx
 
Facial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptxFacial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptx
 
Frs
FrsFrs
Frs
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Best biometric system in market with AI.pdf
Best biometric system in market with AI.pdfBest biometric system in market with AI.pdf
Best biometric system in market with AI.pdf
 
Webinar: How Police Are Using Facial Recognition to Catch Bad Guys
Webinar: How Police Are Using Facial Recognition to Catch Bad GuysWebinar: How Police Are Using Facial Recognition to Catch Bad Guys
Webinar: How Police Are Using Facial Recognition to Catch Bad Guys
 
Biometric Facial Recognition
Biometric Facial RecognitionBiometric Facial Recognition
Biometric Facial Recognition
 
Face Recognition Human Computer Interaction
Face Recognition Human Computer InteractionFace Recognition Human Computer Interaction
Face Recognition Human Computer Interaction
 
418 Automated Criminal Identification System using Face Detection and.pptx
418 Automated Criminal Identification System using Face Detection and.pptx418 Automated Criminal Identification System using Face Detection and.pptx
418 Automated Criminal Identification System using Face Detection and.pptx
 

Kürzlich hochgeladen

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Sit powerpoint

  • 1. Face Recognition By: Deirdre Keane and Kathleen Reilly
  • 2. “the ability of a computer to scan, store, and recognize human faces for use in identifying people.” http://dictionary.reference.com/browse/face+recognition
  • 3. Biometrics  “Biometrics consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits.”  Examples of biometric systems are: • Signature • Retina • Finger Prints • Hand • Voice Geometry • Iris • Ear Geometry • Face
  • 4. The History of Face Recognition 1964-1965 1970 1973 “Connectionist” 1988 1991 2001 Bledsoe, Wolf, and Bison created the first semi-automated system Goldstein, Harmon, and Lesk use markers to automate the recognition Fisher and Elshlagerb take a face template and map it onto a global template Connectionist Approach: uses gestures and identifying markers and Sirovich pioneered the eigenface Kirby approach Turk and Pentland enabled a reliable real-time automated face recognition system Face Recognition first captured the public’s
  • 5. Face Detection Face Recognition Face Face Identification Verification
  • 6. Face Recognition Process Image Acquisition Declaring A Image Match Preprocessing Feature Face Detection Extraction
  • 7. Face Recognition Methods  Direct Correlation  Function-Based Method  Principal Component Analysis  Geometry-Based Methods  Elastic Graph Matching  Face Geometry  Three-Dimensional Face Recognition
  • 13. Benefits Limitations 1. Checks for criminal 1. Quality of Database records Images 2. Enhances security by using surveillance 2. Quality of Captured cameras Images 3. Finding lost children from public cameras v 3. Database Sizes 4. Know in advance if a VIP is entering s. 4. Ineffectiveness in Public Places 5. Detection of a criminal at a certain place 6. Pattern recognition 5. False Identifications 7. Used in science to compare an entity with a 6. Ethical issues set of entities surrounding facial recognition technology
  • 14. Question?  Name something face recognition is used in our generation today.
  • 15. Face recognition in marketing “Once the stuff of science fiction and high- tech crime fighting, facial recognition technology has become one of the newest tools in marketing, even though privacy concerns abound” http://www.youtube.com/watch?v=OXz6fr5HPBk
  • 17. Face Recognition in advertising Companies using facial recognition: Where we can expect to be advertised Kraft Type of person to: Adidas advertising Kiosks Scenetap Vending Machines Digital Signs
  • 18. Tag Uses face recognition software to Suggestion suggest peoples names to tag in s pictures without their permission
  • 19. Question for discussion:  Do you think the tagging feature is perceived as a positive or negative feature to most of the cyber community?
  • 20. Facebook and Facial Recognition
  • 21. Carnegie-Mellon Facebook study Goal: "that it is possible to start from an anonymous face in the street, and end up with very sensitive information about that person." The results were "made possible by the convergence of face recognition, social networks, data mining and cloud computing - that [is referred] to as augmented reality." Facial Recognition in the future Tests performed: could used to.. -On campus identification via collected facebook pictures • Identify strangers - Dating site profiles matched to faceook • Get social security numbers profiles • Gain personal information
  • 22. Facial Recognition Major Risk: Privacy  Handing stalkers their material  “and its new face-recognition feature could become the latest example of a seemingly innocuous development morphing into a serious threat to the privacy of our (visual) data.”
  • 23. Cloud Based Facial Recognition  PittPatt rely’s on finding publicly available pictures of you online  whether it's a profile image for social networks  Facebook  Google Plus  company website  college athletic portrait. Just recently acquired by Google
  • 24. Facial Recognition in smart phones Augmented ID And all of this data can be accessed just by aiming your mobile phone at someone's face
  • 25. Questions 1) What application has Google consistently used face recognition on since 2009? Picasa 2) This local place has same kind of photo database as Facebook and some of them have wisely incorporated facial recognition technology to prevent identity theft (and identity creation)… Your local DMV 3.) When was face recognition introduced to the world?

Hinweis der Redaktion

  1. -Face Recognition is the ability of a computer to scan, store, and recognize human faces for use in identifying people. One of its main goals is to understand the complex human visual system and the knowledge of how humans represent faces in order to discriminate different identities with high accuracy. This is made possible by complex algorithms that compare the faces observed with a database. It is increasingly becoming a popular area of research in computer vision and it is also known as one of the most successful applications of image analysis and understanding.
  2. When a strong demand rose for user-friendly systems that secured peoples’ assets and protected their privacy without losing their identity in a sea of numbers, scientists geared their attention and studies towards biometrics. Biometrics is an automatic process that identifies a person based on their behavorial and physiological characteristics. There are many different biometrics systems such as signature, finger prints and voice. Out of all the above examples, facial recognition has become the most universal, collectable, and accessible systems.
  3. -In 1964 and 1965, Woody Bledsoe, Helen Chan Wolf, and Charles Bison, also known as the pioneers of automated facial recognition created the first semi-automated system. However, it was still considered a man- machine because humans had to extract the coordinates of a set of features (such as eyes, ears, nose, or mouth) from a photograph before the computer calculated distances and ratios to a common reference point. From these coordinates, a list of 20 different distances, such as pupil to pupil, were computed. This when then compared to the database that was previously configured and stored into the computer. The distances match up with the database and the results are returned. Although it was able to compare 40 pictures per hour, this failed because it is highly unlikely that any two pictures would match in head rotation, tilt, lean and scale.-In 1970’s, Goldstein, Harmon and Lesk used a system of 21 subjective markers such as hair color and lip thickness attempting to automate the recognition. However, this just proved even harder to automate due to the fact that many of the measurements still had to be manually computed.In 1973, Fisher and Elschlagerb measured the features from the previous experiments using templates of features of different pieces of the face, which it then mapped them all onto a global template. However, this failed because after continued research, it was found that these features do not contain enough unique data to represent an adult face.-The “Connectionist” approach sought to classify the human face using a combination of both a range of gestures and a set of identifying markers. This was implemented by using 2-dimensional pattern recognition and neural net principles(A real or virtual device, modeled after the human brain, in which several interconnected elements process information simultaneously, adapting and learning from past patterns). Although this seemed like it could be successful, it required a huge number of training forces to achieve decent accuracy and it has yet to be implemented on a large scale.In 1988, at Brown University, Kirby and Sirovich, the pioneers of eigenface approach, applied the Principle Component Analysis, which was a standard linear algebra technique. This was somewhat of a milestone because it showed that less than one hundred values were required to accurately code a suitably aligned and normalized face image. Many people have built and expanded on this basic idea.In 1991, Turk and Pentland discovered that while using the eigenface technique, the residual error could be used to detect faces in images. This discovery enabled a reliable real-time automated face recognition systems. Although this process was somewhat constrained by environmental factors, it created a tremendous amount of interest in furthering the development of automated face recognition technologies.At the Super Bowl in January 2001, technology first captured the public’s attention by using surveillance images and compared them to a database of digital mugshots. This significantly increased security.All of these events in history have made face recognition systems one of the most popular and rising technologies around.
  4. Face Detection is the first stage and it is necessary for Face Recognition to work. When given any image, Face Detection tells whether there is any human face and, if there is, it tells where the face or faces are. Face recognition is the second stage and divided into two main parts. These two parts are:Face Identification: Given a face image that belongs to a person in a database, the face recognition system is able to tell whose image it is.Face Verification: Verifies whether the face image is from the person it is claimed to be in the database.The difference between Detection and Recognition is that Detection is a two-class classification (face vs. non-face) while Recognition is a multi-class classification (one person vs. all the others).
  5. The Face Recognition Process is accomplished in a five steps, no matter what algorithm is used. The first three steps are in the Face Detection stage while the last two deal with Face Recognition.The first step is image acquisition. This step is accomplished by digitally scanning an existing photograph or by acquiring a live picture of the subject. The next step is Image Preprocessing. In this step, the image is enhanced to bring out detail that is obscured, or to highlight certain features of interest. This improves the recognition performance of the system. Histogram equalization is used to accomplish this. This enhances important features by modifying the contrast of the image, reducing the noise, resulting in an improved quality image. The third step is Face Detection. This stage is a computer technology that determines the sizes and locations of human faces in images. This technology detects facial features and ignores anything else, such as the surroundings. This is possible because software is downloaded into the device that contain generalized patterns of what a face looks like and to detect location of faces. The fourth step is Feature Extraction. This step is responsible for composing a feature vector that is well enough to represent the face image. The main goal is to extract the relevant data from the specific image. The step is divided into two categories. The different methods for facial recognition, which I will talk about later, is used here to extract the identifying features of a face. Holistic feature category- deals with the input face image as a wholeLocal features category- tries to automatically locate specific facial features (eyes, nose, mouth) based on the known distances between them A template is then composed and is ready to be compared to the database. 5. Finally, the last step is Declaring a Match. In this step, the template that was previously generated is compared to the templates in a database of known faces.
  6. The main purpose of these methods is to reduce a facial image containing thousands of pixels before making comparisons. This is done by taking a face image and transforming it into a space that is spanned by basis image functions.
  7. In Direct Correlation, two images are superimposed and the correlation between corresponding pixels is computed for different alignments.
  8. PCA is a data-reduction method that finds an alternative set of parameters for a set of raw data or features such that most of the variability in the data is compressed down to the first few parameters. These transformed PCA parameters are orthogonal (intersecting or lying at right angles). The PCA diagonalizes the covariance matrix, and the resulting diagonal elements are the variances of the transformed PA parameters. Next, a face image defines a point in the high-dimensional image space. Different face images share a number of similarities with each other and they can be described by a relatively low-dimensional subspace. They are then projected into an appropriately chosen subspace of eigenfaces and classification can be performed by similarity computation (distance).
  9. In Elastic Graph Matching, each face is represented by a set of feature vectors positioned on the nodes of a coarse 2D grid placed on the face. Each one of these vectors is comprised of a set of responses of 2D Gabor wavelets, differing in orientation and scale. Two faces are then compared by matching and adapting the grid of a test image to the grid of a reference image, where both grids have the same number of nodes. The elasticity of the test grid allows accommodation of face distortions and changes in view point, to a lesser extent. The quality of the resulted match is evaluated by using a distance function.
  10. The purpose of Face Geometry is to model a human face in terms of particular face features (such as eyes, mouth, etc.) and the geometry of the layout of these features. Face Recognition is then a matter of matching feature constellations.
  11. In this method, the three-dimensional geometry of the human face is used. 3D face recognition can achieve significantly higher accuracy because it measures the geometry of the rigid features on the face. This helps avoid 2D pitfalls such as lighting, change in facial expressions, make-up or head orientation. Another benefit of the 3D method is the transformation of the head into a known view. However, the limitation of this method is that it requires a range camera in order to acquire 3D images or a 3D model needs to be created with significant post-processing.
  12. There are many advantages to facial recognition that create benefits for everyone. Face recognition systems are the least intrusive from a biometric sampling point of view because it requires no contact or no awareness by the subject. With the thousands of photos of faces from passports and driver’s licenses, the database is always increasing and because of the possession authentication protocol, there is a wide public acceptance. This biometric works with photograph data-bases, videos or other image sources and with the screening, unwanted individuals can be located in an area. With facial recognition, security is improving and people feel a sense of safety. The disadvantages include the fact that a face needs to be well lighted by controlled light sources in automated face recognition systems, along with many other technical challenges.
  13. Researchers at Carnegie-Mellon University warn that it is possible to identify strangers and gain their personal information — perhaps even their social security numbers — by using face recognition software and social media profiles
  14. . Tools like PittPatt and other cloud-based facial recognition services rely on finding publicly available pictures of you online, whether it's a profile image for social networks like Facebook and Google Plus or from something more official from a company website or a college athletic portrait.