SlideShare une entreprise Scribd logo
FACE

RECOGNITION

TECHNOLOGY
Contents

   Introduction
   Biometrics
   Why FRT is having edge over other biometrics?
   Components of Face Recognition Technology
   Working of Face Recognition
   Merits and Demerits
   Applications
Introduction


   In today's networked world, the need to maintain the security of
    information or physical property is becoming both increasingly
    important and increasingly difficult.
   We all know that bank and computer system uses PIN, Password,
    ID’s ,Keys for identification/authentication. These system do not
    grant access by “who we are” but by “what we have”.
   Recent cases of identity theft have heighten the needs for the
    method to prove that someone is truly he/she claims to be.
   Technology become available to allow verification of “true”
    individual identity. This tech. is based on field called
    “biometrics”.
   Face Recognition is the fastest biometric technology. It works
    with the most obvious individual identifier i.e. the human face
    because it is undeniably connected to its owner and is non-
    transferable.
Biometrics

   Biometrics includes the methods for uniquely recognizing
    humans based on one or more physical or behavioral traits.
    Physiological biometrics : Based on measurements and data
    derived from direct measurement of a part of the human body.
           Finger-scan
           Facial Recognition
           Iris-scan
           Retina-scan
           Hand-scan
   Behavioral biometrics : Based on measurements and data
    derived from an action.
           Voice-scan
           Signature-scan
           Keystroke-scan
Biometrics

   The first time an individual uses a biometric system is called
    an enrollment. During the enrollment, biometric information
    from an individual is stored.
“Biometric System” Working


                                                    t            Stored
                                                m en
                                        r oll                  Templates
                 Biometric System     En
                                                                      Test

                                                        Test
                   Feature          Template
Pre-Processing                                                  Matcher
                   Extractor        Generator




   Sensor

                                                                Application
                                                                 Devices
Why FRT is having edge over other Biometrics


    It requires no physical interaction on behalf of the user.
    It is accurate and allows for high verification rates.
    It does not require an expert to interpret the comparison result.
    It is the only biometric that allow you to perform passive
    identification in a one to many environments.
“ Face Recognition System “ Components


   Enrollment Module
   Database
   Identification Module
Enrollment Module

            Preprocessing                       Analysis
                 and            Analysis          Data
            Segmentation




  User                                                  System
Interface                                               Database

 Face

                     Verification / Identification Module

            Preprocessing                       Face Recognition
                 and            Analysis              and
            Segmentation                            Scoring


                                              Accept / Reject
How “FRT” Work

   2D
 3D
STA (Surface Texture Analysis)


   It uses visual details of the skin, as captured in the standard
    digital or scanned images.
   This technique does not scan the entire face but a patch of skin
    on it. This patch is divided into blocks. The skin texture, the
    pores on the skin and other such characteristics are converted
    to a code, which is used for comparison.
Merits

   It is convenient and socially acceptable. All you need is your
    picture taken for it to work.
   It is one of the most inexpensive biometric available in the
    market.
   It is very Fast. Face matching template algorithm compares
    1,00,000 faces per second.
Demerits

   Face Recognition has been working well with frontal faces and
    20 degree off but as you move towards the profile there have
    been problems.
   Does not work well because of poor lighting, sunglasses, long
    hair, or other objects partially covering the subject’s face.
   Many systems are less effective if facial expressions vary. Even a
    big smile can make the system less effective.
Applications

   Government Use
          Security/counterterrorism
          Immigration
          Voter verification

   Commercial Use
          Day care
          Residential security
          Banking using ATM
Questions ?
Thank You

Contenu connexe

Tendances

Detection and recognition of face using neural network
Detection and recognition of face using neural networkDetection and recognition of face using neural network
Detection and recognition of face using neural network
Smriti Tikoo
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
Siddharth Modi
 

Tendances (20)

Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
 
Detection and recognition of face using neural network
Detection and recognition of face using neural networkDetection and recognition of face using neural network
Detection and recognition of face using neural network
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
 
Image recognition
Image recognitionImage recognition
Image recognition
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
 
Face recognization
Face recognizationFace recognization
Face recognization
 
Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
 
Computer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and PythonComputer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and Python
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system ppt
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face detection ppt
Face detection pptFace detection ppt
Face detection ppt
 
Face recognisation system
Face recognisation systemFace recognisation system
Face recognisation system
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Face detection presentation slide
Face detection  presentation slideFace detection  presentation slide
Face detection presentation slide
 
Face recognition
Face recognitionFace recognition
Face recognition
 
face detection
face detectionface detection
face detection
 
EMOTION DETECTION USING AI
EMOTION DETECTION USING AIEMOTION DETECTION USING AI
EMOTION DETECTION USING AI
 
Face detection and recognition
Face detection and recognitionFace detection and recognition
Face detection and recognition
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 

En vedette

Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
Santosh Kumar
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
laknatha
 
Facial recognition powerpoint
Facial recognition powerpointFacial recognition powerpoint
Facial recognition powerpoint
12206695
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance System
Karmesh Maheshwari
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
Divya Tirunagari
 
Face recognition using neural network
Face recognition using neural networkFace recognition using neural network
Face recognition using neural network
Indira Nayak
 
Face recognition using artificial neural network
Face recognition using artificial neural networkFace recognition using artificial neural network
Face recognition using artificial neural network
Sumeet Kakani
 

En vedette (20)

Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
face recognition
face recognitionface recognition
face recognition
 
Facial recognition powerpoint
Facial recognition powerpointFacial recognition powerpoint
Facial recognition powerpoint
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance System
 
Mini Project- Face Recognition
Mini Project- Face RecognitionMini Project- Face Recognition
Mini Project- Face Recognition
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face recognition vaishali
Face recognition vaishaliFace recognition vaishali
Face recognition vaishali
 
Face Recognition Device F710
Face Recognition Device F710Face Recognition Device F710
Face Recognition Device F710
 
Face recognition tech1
Face recognition tech1Face recognition tech1
Face recognition tech1
 
Face recognition using neural network
Face recognition using neural networkFace recognition using neural network
Face recognition using neural network
 
Face detection and recognition
Face detection and recognitionFace detection and recognition
Face detection and recognition
 
Eigenface For Face Recognition
Eigenface For Face RecognitionEigenface For Face Recognition
Eigenface For Face Recognition
 
Face recognition using artificial neural network
Face recognition using artificial neural networkFace recognition using artificial neural network
Face recognition using artificial neural network
 
Face recognition software system by Junyu Tech.(China)
Face recognition software system by Junyu Tech.(China)Face recognition software system by Junyu Tech.(China)
Face recognition software system by Junyu Tech.(China)
 
Face Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaFace Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun Sharma
 
Face recognization using artificial nerual network
Face recognization using artificial nerual networkFace recognization using artificial nerual network
Face recognization using artificial nerual network
 
FACE RECOGNITION USING NEURAL NETWORK
FACE RECOGNITION USING NEURAL NETWORKFACE RECOGNITION USING NEURAL NETWORK
FACE RECOGNITION USING NEURAL NETWORK
 
Face Recognition using PCA-Principal Component Analysis using MATLAB
Face Recognition using PCA-Principal Component Analysis using MATLABFace Recognition using PCA-Principal Component Analysis using MATLAB
Face Recognition using PCA-Principal Component Analysis using MATLAB
 
face recognition system using LBP
face recognition system using LBPface recognition system using LBP
face recognition system using LBP
 

Similaire à Face Recognition Technology

Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
Sampat Patnaik
 
Fingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New DelhiFingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New Delhi
Nishikant Taksande
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
AnkitaVerma776806
 
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof security
Srikanth457
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
Rekha Yadav
 

Similaire à Face Recognition Technology (20)

Fingerprint detection
Fingerprint detectionFingerprint detection
Fingerprint detection
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Fingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New DelhiFingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New Delhi
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
G041041047
G041041047G041041047
G041041047
 
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometricSEMINAR_BIOMETRIC  of hand fingerprint,voice bsed biometric ,eye based biometric
SEMINAR_BIOMETRIC of hand fingerprint,voice bsed biometric ,eye based biometric
 
13 biometrics - fool proof security
13 biometrics  - fool proof security13 biometrics  - fool proof security
13 biometrics - fool proof security
 
Fake Multi Biometric Detection using Image Quality Assessment
Fake Multi Biometric Detection using Image Quality AssessmentFake Multi Biometric Detection using Image Quality Assessment
Fake Multi Biometric Detection using Image Quality Assessment
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 
Face recognition
Face recognition Face recognition
Face recognition
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
Bio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdkBio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdk
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median Filter
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition System
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
 

Dernier

Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Dernier (20)

Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
The architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdfThe architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdf
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
Server-Driven User Interface (SDUI) at Priceline
Server-Driven User Interface (SDUI) at PricelineServer-Driven User Interface (SDUI) at Priceline
Server-Driven User Interface (SDUI) at Priceline
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 

Face Recognition Technology

  • 2. Contents  Introduction  Biometrics  Why FRT is having edge over other biometrics?  Components of Face Recognition Technology  Working of Face Recognition  Merits and Demerits  Applications
  • 3. Introduction  In today's networked world, the need to maintain the security of information or physical property is becoming both increasingly important and increasingly difficult.  We all know that bank and computer system uses PIN, Password, ID’s ,Keys for identification/authentication. These system do not grant access by “who we are” but by “what we have”.  Recent cases of identity theft have heighten the needs for the method to prove that someone is truly he/she claims to be.  Technology become available to allow verification of “true” individual identity. This tech. is based on field called “biometrics”.  Face Recognition is the fastest biometric technology. It works with the most obvious individual identifier i.e. the human face because it is undeniably connected to its owner and is non- transferable.
  • 4. Biometrics  Biometrics includes the methods for uniquely recognizing humans based on one or more physical or behavioral traits.  Physiological biometrics : Based on measurements and data derived from direct measurement of a part of the human body.  Finger-scan  Facial Recognition  Iris-scan  Retina-scan  Hand-scan  Behavioral biometrics : Based on measurements and data derived from an action.  Voice-scan  Signature-scan  Keystroke-scan
  • 5. Biometrics  The first time an individual uses a biometric system is called an enrollment. During the enrollment, biometric information from an individual is stored.
  • 6. “Biometric System” Working t Stored m en r oll Templates Biometric System En Test Test Feature Template Pre-Processing Matcher Extractor Generator Sensor Application Devices
  • 7. Why FRT is having edge over other Biometrics  It requires no physical interaction on behalf of the user.  It is accurate and allows for high verification rates.  It does not require an expert to interpret the comparison result.  It is the only biometric that allow you to perform passive identification in a one to many environments.
  • 8. “ Face Recognition System “ Components  Enrollment Module  Database  Identification Module
  • 9. Enrollment Module Preprocessing Analysis and Analysis Data Segmentation User System Interface Database Face Verification / Identification Module Preprocessing Face Recognition and Analysis and Segmentation Scoring Accept / Reject
  • 12. STA (Surface Texture Analysis)  It uses visual details of the skin, as captured in the standard digital or scanned images.  This technique does not scan the entire face but a patch of skin on it. This patch is divided into blocks. The skin texture, the pores on the skin and other such characteristics are converted to a code, which is used for comparison.
  • 13. Merits  It is convenient and socially acceptable. All you need is your picture taken for it to work.  It is one of the most inexpensive biometric available in the market.  It is very Fast. Face matching template algorithm compares 1,00,000 faces per second.
  • 14. Demerits  Face Recognition has been working well with frontal faces and 20 degree off but as you move towards the profile there have been problems.  Does not work well because of poor lighting, sunglasses, long hair, or other objects partially covering the subject’s face.  Many systems are less effective if facial expressions vary. Even a big smile can make the system less effective.
  • 15. Applications  Government Use  Security/counterterrorism  Immigration  Voter verification  Commercial Use  Day care  Residential security  Banking using ATM