Presentation On Face Recognition Security System
Presentation On Face Recognition Security System
on
Face Recognition security system
Content
Introduction
Facial Recognition
Implementation
How it work
Applications
Advantages
Disadvantages
Conclusion
References
Introduction
In our daily life most of the things are increasingly
being handled electronically.
The growth in electronic uses results in great demand
for fast and accurate user identification and
authentication.
Access codes for buildings, banks accounts and
computer systems often use PIN's for identification
and security clearances.
Using the proper PIN gains access, but the user of the
PIN is not verified. When credit and ATM cards are lost
or stolen, an unauthorized user can often come up
with the correct personal codes.
Facial Recognition ???
It requires no physical interaction on behalf of the user.
It is accurate and allows for high enrolment and
verification rates.
It can use our existing hardware infrastructure, existing
cameras and image capture Devices will work with no
problems
In Facial recognition there are two types of comparisons:-
VERIFICATION- The system compares the given individual
with who they say they are and gives a yes or no decision.
IDENTIFICATION- The system compares the given
individual to all the Other individuals in the database and
gives a ranked list of matches.
All identification or authentication technologies
operate using the following four stages:
Capture: A physical or behavioral sample is captured
by the system during Enrollment and also in
identification or verification process.
Extraction: unique data is extracted from the sample
and a template is created.
Comparison: the template is then compared with a
new sample.
Match/non-match: the system decides if the features
extracted from the new Samples are a match or a non
match.
Implementation
The implementation of face recognition
technology includes the following four stages:
• Image acquisition
• Image processing
• Distinctive characteristic location
• Template creation
• Template matching
Image acquisition
• Facial-scan technology can acquire faces from
almost any static camera or video system that
generates images of sufficient quality and
resolution.
• High-quality enrolment is essential to eventual
verification and identification enrolment
images define the facial characteristics to be
used in all future authentication events.
Image Processing
Images are cropped such that the ovoid facial
image remains, and colour images are normally
converted to black and white in order to facilitate
initial comparisons based on greyscale
characteristics.
First the presence of faces or face in a scene
must be detected. Once the face is detected, it
must be localized and Normalization process may
be required to bring the dimensions of the live
facial sample in alignment with the one on the
template.
Distinctive characteristic location
All facial-scan systems attempt to match visible facial
features in a fashion similar to the way people recognize
one another.
The features most often utilized in facial-scan systems are
those least likely to change significantly over time: upper
ridges of the eye sockets, areas around the cheekbones,
sides of the mouth, nose shape, and the position of major
features relative to each other.
Behavioural changes such as alteration of hairstyle, changes
in makeup, growing or shaving facial hair, adding or
removing eyeglasses are behaviours that impact the ability
of facial-scan systems to locate distinctive features, facial-
scan systems are not yet developed to the point where they
can overcome such variables.
Template creation
• Enrolment templates are normally created from a
multiplicity of processed facial images.
• These templates can vary in size from less than
100 bytes, generated through certain vendors
and to over 3K for templates.
• The 3K template is by far the largest among
technologies considered physiological biometrics.
• Larger templates are normally associated with
behavioural biometrics,
Template matching
• It compares match templates against enrolment
templates.
• A series of images is acquired and scored against the
enrolment, so that a user attempting 1:1 verification
within a facial-scan system may have 10 to 20 match
attempts take place within 1 to 2 seconds.
• facial-scan is not as effective as finger-scan or iris-scan
in identifying a single individual from a large database,
a number of potential matches are generally returned
after large-scale facial-scan identification searches.
How Facial Recognition System Works