SlideShare une entreprise Scribd logo
1  sur  17
FACE

RECOGNITION

TECHNOLOGY
Contents

   Introduction
   Biometrics
   Why FRT is having edge over other biometrics?
   Components of Face Recognition Technology
   Working of Face Recognition
   Merits and Demerits
   Applications
Introduction


   In today's networked world, the need to maintain the security of
    information or physical property is becoming both increasingly
    important and increasingly difficult.
   We all know that bank and computer system uses PIN, Password,
    ID’s ,Keys for identification/authentication. These system do not
    grant access by “who we are” but by “what we have”.
   Recent cases of identity theft have heighten the needs for the
    method to prove that someone is truly he/she claims to be.
   Technology become available to allow verification of “true”
    individual identity. This tech. is based on field called
    “biometrics”.
   Face Recognition is the fastest biometric technology. It works
    with the most obvious individual identifier i.e. the human face
    because it is undeniably connected to its owner and is non-
    transferable.
Biometrics

   Biometrics includes the methods for uniquely recognizing
    humans based on one or more physical or behavioral traits.
    Physiological biometrics : Based on measurements and data
    derived from direct measurement of a part of the human body.
           Finger-scan
           Facial Recognition
           Iris-scan
           Retina-scan
           Hand-scan
   Behavioral biometrics : Based on measurements and data
    derived from an action.
           Voice-scan
           Signature-scan
           Keystroke-scan
Biometrics

   The first time an individual uses a biometric system is called
    an enrollment. During the enrollment, biometric information
    from an individual is stored.
“Biometric System” Working


                                                    t            Stored
                                                m en
                                        r oll                  Templates
                 Biometric System     En
                                                                      Test

                                                        Test
                   Feature          Template
Pre-Processing                                                  Matcher
                   Extractor        Generator




   Sensor

                                                                Application
                                                                 Devices
Why FRT is having edge over other Biometrics


    It requires no physical interaction on behalf of the user.
    It is accurate and allows for high verification rates.
    It does not require an expert to interpret the comparison result.
    It is the only biometric that allow you to perform passive
    identification in a one to many environments.
“ Face Recognition System “ Components


   Enrollment Module
   Database
   Identification Module
Enrollment Module

            Preprocessing                       Analysis
                 and            Analysis          Data
            Segmentation




  User                                                  System
Interface                                               Database

 Face

                     Verification / Identification Module

            Preprocessing                       Face Recognition
                 and            Analysis              and
            Segmentation                            Scoring


                                              Accept / Reject
How “FRT” Work

   2D
 3D
STA (Surface Texture Analysis)


   It uses visual details of the skin, as captured in the standard
    digital or scanned images.
   This technique does not scan the entire face but a patch of skin
    on it. This patch is divided into blocks. The skin texture, the
    pores on the skin and other such characteristics are converted
    to a code, which is used for comparison.
Merits

   It is convenient and socially acceptable. All you need is your
    picture taken for it to work.
   It is one of the most inexpensive biometric available in the
    market.
   It is very Fast. Face matching template algorithm compares
    1,00,000 faces per second.
Demerits

   Face Recognition has been working well with frontal faces and
    20 degree off but as you move towards the profile there have
    been problems.
   Does not work well because of poor lighting, sunglasses, long
    hair, or other objects partially covering the subject’s face.
   Many systems are less effective if facial expressions vary. Even a
    big smile can make the system less effective.
Applications

   Government Use
          Security/counterterrorism
          Immigration
          Voter verification

   Commercial Use
          Day care
          Residential security
          Banking using ATM
Questions ?
Thank You

Contenu connexe

Tendances

Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1
leenak770
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
Siddharth Modi
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
Santosh Kumar
 

Tendances (20)

Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face recognisation system
Face recognisation systemFace recognisation system
Face recognisation system
 
Face Recognition Techniques
Face Recognition TechniquesFace Recognition Techniques
Face Recognition Techniques
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face recognization
Face recognizationFace recognization
Face recognization
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)
 
Facial Recognition: The Science, The Technology, and Market Applications
Facial Recognition: The Science, The Technology, and Market ApplicationsFacial Recognition: The Science, The Technology, and Market Applications
Facial Recognition: The Science, The Technology, and Market Applications
 
Face Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaFace Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun Sharma
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
 

En vedette

Face Recognition
Face RecognitionFace Recognition
Face Recognition
laknatha
 
Facial recognition powerpoint
Facial recognition powerpointFacial recognition powerpoint
Facial recognition powerpoint
12206695
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance System
Karmesh Maheshwari
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
Divya Tirunagari
 
Face recognition using neural network
Face recognition using neural networkFace recognition using neural network
Face recognition using neural network
Indira Nayak
 
Detection and recognition of face using neural network
Detection and recognition of face using neural networkDetection and recognition of face using neural network
Detection and recognition of face using neural network
Smriti Tikoo
 
Face recognition using artificial neural network
Face recognition using artificial neural networkFace recognition using artificial neural network
Face recognition using artificial neural network
Sumeet Kakani
 

En vedette (20)

Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Facial recognition powerpoint
Facial recognition powerpointFacial recognition powerpoint
Facial recognition powerpoint
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance System
 
Mini Project- Face Recognition
Mini Project- Face RecognitionMini Project- Face Recognition
Mini Project- Face Recognition
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face recognition vaishali
Face recognition vaishaliFace recognition vaishali
Face recognition vaishali
 
Face Recognition Device F710
Face Recognition Device F710Face Recognition Device F710
Face Recognition Device F710
 
Face recognition tech1
Face recognition tech1Face recognition tech1
Face recognition tech1
 
Face recognition using neural network
Face recognition using neural networkFace recognition using neural network
Face recognition using neural network
 
Face detection and recognition
Face detection and recognitionFace detection and recognition
Face detection and recognition
 
Detection and recognition of face using neural network
Detection and recognition of face using neural networkDetection and recognition of face using neural network
Detection and recognition of face using neural network
 
Eigenface For Face Recognition
Eigenface For Face RecognitionEigenface For Face Recognition
Eigenface For Face Recognition
 
Face recognition using artificial neural network
Face recognition using artificial neural networkFace recognition using artificial neural network
Face recognition using artificial neural network
 
Face recogntion
Face recogntionFace recogntion
Face recogntion
 
Face recognition software system by Junyu Tech.(China)
Face recognition software system by Junyu Tech.(China)Face recognition software system by Junyu Tech.(China)
Face recognition software system by Junyu Tech.(China)
 
Face recognization using artificial nerual network
Face recognization using artificial nerual networkFace recognization using artificial nerual network
Face recognization using artificial nerual network
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
 
FACE RECOGNITION USING NEURAL NETWORK
FACE RECOGNITION USING NEURAL NETWORKFACE RECOGNITION USING NEURAL NETWORK
FACE RECOGNITION USING NEURAL NETWORK
 
Face Recognition using PCA-Principal Component Analysis using MATLAB
Face Recognition using PCA-Principal Component Analysis using MATLABFace Recognition using PCA-Principal Component Analysis using MATLAB
Face Recognition using PCA-Principal Component Analysis using MATLAB
 
face recognition system using LBP
face recognition system using LBPface recognition system using LBP
face recognition system using LBP
 

Similaire à Face Recognition Technology

Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
Sampat Patnaik
 
Fingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New DelhiFingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New Delhi
Nishikant Taksande
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
AnkitaVerma776806
 
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof security
Srikanth457
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
Rekha Yadav
 

Similaire à Face Recognition Technology (20)

Fingerprint detection
Fingerprint detectionFingerprint detection
Fingerprint detection
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Fingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New DelhiFingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New Delhi
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
 
G041041047
G041041047G041041047
G041041047
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
 
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof security
 
Fake Multi Biometric Detection using Image Quality Assessment
Fake Multi Biometric Detection using Image Quality AssessmentFake Multi Biometric Detection using Image Quality Assessment
Fake Multi Biometric Detection using Image Quality Assessment
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 
Face recognition
Face recognition Face recognition
Face recognition
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
Bio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdkBio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdk
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median Filter
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition System
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
 
Assessment and Improvement of Image Quality using Biometric Techniques for Fa...
Assessment and Improvement of Image Quality using Biometric Techniques for Fa...Assessment and Improvement of Image Quality using Biometric Techniques for Fa...
Assessment and Improvement of Image Quality using Biometric Techniques for Fa...
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Dernier (20)

Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 

Face Recognition Technology

  • 2. Contents  Introduction  Biometrics  Why FRT is having edge over other biometrics?  Components of Face Recognition Technology  Working of Face Recognition  Merits and Demerits  Applications
  • 3. Introduction  In today's networked world, the need to maintain the security of information or physical property is becoming both increasingly important and increasingly difficult.  We all know that bank and computer system uses PIN, Password, ID’s ,Keys for identification/authentication. These system do not grant access by “who we are” but by “what we have”.  Recent cases of identity theft have heighten the needs for the method to prove that someone is truly he/she claims to be.  Technology become available to allow verification of “true” individual identity. This tech. is based on field called “biometrics”.  Face Recognition is the fastest biometric technology. It works with the most obvious individual identifier i.e. the human face because it is undeniably connected to its owner and is non- transferable.
  • 4. Biometrics  Biometrics includes the methods for uniquely recognizing humans based on one or more physical or behavioral traits.  Physiological biometrics : Based on measurements and data derived from direct measurement of a part of the human body.  Finger-scan  Facial Recognition  Iris-scan  Retina-scan  Hand-scan  Behavioral biometrics : Based on measurements and data derived from an action.  Voice-scan  Signature-scan  Keystroke-scan
  • 5. Biometrics  The first time an individual uses a biometric system is called an enrollment. During the enrollment, biometric information from an individual is stored.
  • 6. “Biometric System” Working t Stored m en r oll Templates Biometric System En Test Test Feature Template Pre-Processing Matcher Extractor Generator Sensor Application Devices
  • 7. Why FRT is having edge over other Biometrics  It requires no physical interaction on behalf of the user.  It is accurate and allows for high verification rates.  It does not require an expert to interpret the comparison result.  It is the only biometric that allow you to perform passive identification in a one to many environments.
  • 8. “ Face Recognition System “ Components  Enrollment Module  Database  Identification Module
  • 9. Enrollment Module Preprocessing Analysis and Analysis Data Segmentation User System Interface Database Face Verification / Identification Module Preprocessing Face Recognition and Analysis and Segmentation Scoring Accept / Reject
  • 12. STA (Surface Texture Analysis)  It uses visual details of the skin, as captured in the standard digital or scanned images.  This technique does not scan the entire face but a patch of skin on it. This patch is divided into blocks. The skin texture, the pores on the skin and other such characteristics are converted to a code, which is used for comparison.
  • 13. Merits  It is convenient and socially acceptable. All you need is your picture taken for it to work.  It is one of the most inexpensive biometric available in the market.  It is very Fast. Face matching template algorithm compares 1,00,000 faces per second.
  • 14. Demerits  Face Recognition has been working well with frontal faces and 20 degree off but as you move towards the profile there have been problems.  Does not work well because of poor lighting, sunglasses, long hair, or other objects partially covering the subject’s face.  Many systems are less effective if facial expressions vary. Even a big smile can make the system less effective.
  • 15. Applications  Government Use  Security/counterterrorism  Immigration  Voter verification  Commercial Use  Day care  Residential security  Banking using ATM