0% found this document useful (0 votes)
68 views

Face Recognition Technology

The document is a presentation on face recognition technology by Team Genesis. It includes sections on the history of face recognition, how the technology works, its implementation process, strengths and weaknesses, applications, and advantages and disadvantages. The presentation describes how face recognition systems detect facial landmarks to create templates for identification and verification purposes, with applications in security and access control.

Uploaded by

SANDIP PODDAR
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
68 views

Face Recognition Technology

The document is a presentation on face recognition technology by Team Genesis. It includes sections on the history of face recognition, how the technology works, its implementation process, strengths and weaknesses, applications, and advantages and disadvantages. The presentation describes how face recognition systems detect facial landmarks to create templates for identification and verification purposes, with applications in security and access control.

Uploaded by

SANDIP PODDAR
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 26

TEAM GENESIS

Face Recognition

PRESENTED BY:
• DONA GANGULLY ROLL-04
• SANDIP PODDAR ROLL-05
• ANURUPA PAUL ROLL-26
• PRADIP SARKAR ROLL-20
• TANAY CHAKRABORTY ROLL-21
• TRISROTA CHAUDHURY ROLL-
12
• SUBARNA GHOSH ROLL-10
Content
 Introduction
 History
 Facial Recognition
 Implementation
 How it works
 Strengths & Weaknesses
 Applications
 Advantages
 Disadvantages
 Conclusion
 References
Introduction

 Everyday actions are increasingly being


handled electronically, instead of pencil
and paper or face to face.

 This growth in electronic


results in great demand for fast
transactions
accurate and
user
authentication. identification
and
 Access codes for buildings, banks accounts and
computer systems often use PIN's for
identification and security clearences.

 Using the proper PIN gains access, but the user


of the PIN is not verified. When credit and ATM
cards are lost or stolen, an unauthorized user
can often come up with the correct personal
codes.

 Face recognition technology may solve this


problem since a face is undeniably connected to
its owner expect in the case of identical twins.
History

 In 1960s, the first semi-automated system for


facial recognition to locate the features(such
as eyes, ears, nose and mouth) on the
photographs.
 In 1970s, Goldstein and Harmon used 21
specific subjective markers such as hair color
and lip thickness to automate the recognition.
 In 1988, Kirby and Sirovich used standard linear
algebra technique, to the face recognition.
Facial Recognition

In Facial recognition there are twotypes of


comparisons:-

 VERIFICATION- The system compares the


given individual with who they say they are and
gives a yes or no decision.

 IDENTIFICATION- The system compares the given


individual to all the Other individuals in the
database and gives a ranked list of matches.
 All identification or authentication
technologies using the following four
operate
 stages:
Capture: A physical or behavioural sample is
captured by the system during Enrollment and
also in identification or verification process.
 Extraction: unique data is extracted from the
sample and a template is created.
 Comparison: the template is then compared
with a new sample.
 Match/non-match: the system decides if
the features extracted from the new Samples
are a match or a non match.
Implementatio
n
The implementation of face recognition
technology includes the following five stages:
 Image acquisition
 Image processing
 Distinctive characteristic location
 Template creation
 Template matching
Image acquisition

 Facial-scan technology can acquire


faces from almost any static camera or
video system that generates images of
sufficient quality and resolution.
 High-quality enrollment is essential to
eventual verification and identification
enrollment images define the facial
characteristics to be used in all future
authentication events.
Image Processing

 Images are cropped such that the ovoid facial


image remains, and color images are normally
converted to black and white in order to
facilitate initial comparisons based on
grayscale characteristics.
 First the presence of faces or face in a
scene must be detected. Once the face is
detected, it must be localized and
Normalization process may be required to
bring the dimensions of the live facial sample
in alignment with the one on the template.
Distinctive characteristic
location
 All facial-scan systems attempt to match
visible facial features in a fashion similar
to the way people recognize one another.
 The features most often utilized in facial-
scan systems are those least likely to
change significantly over time: upper
ridges of the eye sockets, areas around
the cheekbones, sides of the mouth, nose
shape, and the position of major features
relative to each other.
 Behavioural changes such alteration of
hairstyle, changes in as growing or
shaving facial hair makeup, or removing
,
eyeglasses are behavioursadding
that impact the
ability of facial-scan systems to locate
distinctive features, facial-scan systems are
not yet developed to the point where they can
overcome such variables.
Template creation
 Enrollment templates are normally created
from a multiplicity of processed facial
images.
 These templates can vary in size from less
than 100 bytes, generated through certain
vendors and to over 3K for templates.
 The 3K template is by far the largest among
technologies considered physiological
biometrics.
 Larger templates are normally associated
with behavioral biometrics,
Template matching

 It compares match templates against


enrollment templates.
 A series of images is acquired and scored
against the enrollment, so that a user
attempting 1:1 verification within a facial-
scan system may have 10 to 20 match
attempts take place within 1 to 2 seconds.
 facial-scan is not as effective as finger-scan
or iris-scan in identifying a single individual
from a large database, a number of potential
matches are generally returned after large-
scale facial-scan identification searches.
How Facial Recognition System
Works
 First recognize faces, which is a
technological feat in itself.
 General process involves few steps.
 Face has certain distinguishable landmarks.
 VISIONICS defines these as nodal
landmarks points.
 80 nodal points on human face
Contd..

Few nodal points that are measured by


the software.
1. distance between the eyes
2. width of the nose
3. depth of the eye socket
4. cheekbones
5. jaw line
6. chin
Strengths

 Ability to leverage existing image


acquisition equipment.
 Search against static images
 Only biometric able to operate without
user cooperation.
 Quickly process and match faces
against database in real or near real time.
Weaknesses

 Changes in acquisition environment, physiological characteristics


reduce matching accuracy.
 Can be vulnerable to various attacks
 Has potential for privacy abuse to non-cooperative
due and identification capabilities.
enrollment
Applications

 Replacement of PIN, physical tokens


 No need of human assistance for identification
 Prison visitor systems
 Border control
 Voting system
 Computer security
 Banking using ATM
 Physical access control of buildings ,areas
etc.
Advantages

 Convenient, social acceptability


 Easy to use
 Inexpensive technique of identification
Disadvantage

 Problem with false rejection when people change their


hair style, grow or shave a beard or wear glasses.
 Identical twins
Conclusio
n
Factors such as environmental changes
and mild changes in appearance
impact the technology to a greater
degree than many expect.
 For implementations where the
biometric system must verify and
identify users reliably over time, facial
scan can be a very difficult, but not
impossible, technology to implement
successfully.
References

 www.google.com

 www.wikipedia.com

 www.studymafia.org
Thank
You…

You might also like