SlideShare a Scribd company logo
Submitted To: Submitted By:
Prof. Sandeep Santosh Kashish Garg
1130319
Face Recognition
Contents
 Introduction
 History
 Facial Recognition
 Implementation
 How it works
 Strengths & Weaknesses
 Applications
 Advantages
 Disadvantages
 Conclusion
 References
Introduction
 Everyday actions are increasingly being
handled electronically, instead of pencil and
paper or face to face.
 This growth in electronic transactions results
in great demand for fast and accurate user
identification and authentication.
 Access codes for buildings, banks accounts and
computer systems often use PIN's for
identification and security clearances.
Contd…
 Using the proper PIN gains access, but the
user of the PIN is not verified. When
credit and ATM cards are lost or stolen, an
unauthorized user can often come up
with the correct personal codes.
 Face recognition technology may solve
this problem since a face is undeniably
connected to its owner except in the case
of identical twins.
Facial Recognition ???
 It requires no physical interaction on
behalf of the user.
 It is accurate and allows for high
enrolment and verification rates.
 It can use your existing hardware
infrastructure, existing cameras and image
capture Devices will work with no
problems
History
 In 1960s, the first semi-automated system for
facial recognition to locate the features(such
as eyes, ears, nose and mouth) on the
photographs.
 In 1970s, Goldstein and Harmon used 21
specific subjective markers such as hair Color
and lip thickness to automate the recognition.
 In 1988, Kirby and Sirovich used standard linear
algebra technique, to the face recognition.
Facial Recognition
In Facial recognition there are two types
of comparisons:-
 VERIFICATION- The system compares
the given individual with who they say
they are and gives a yes or no
decision.
 IDENTIFICATION- The system
compares the given individual to all
the Other individuals in the database
and gives a ranked list of matches.
Contd…
 All identification or authentication technologies
operate using the following four stages:
 Capture: A physical or behavioral sample is
captured by the system during Enrollment and also
in identification or verification process.
 Extraction: unique data is extracted from the
sample and a template is created.
 Comparison: the template is then compared with
a new sample.
 Match/non-match: the system decides if the
features extracted from the new Samples are a
match or a non match.
Implementation
The implementation of face recognition
technology includes the following four stages:
• Image acquisition
• Image processing
• Distinctive characteristic location
• Template creation
• Template matching
Image acquisition
• Facial-scan technology can acquire faces from
almost any static camera or video system that
generates images of sufficient quality and
resolution.
• High-quality enrollment is essential to
eventual verification and identification
enrollment images define the facial
characteristics to be used in all future
authentication events.
Face recognigion system ppt
Image Processing
Images are cropped such that the ovoid facial image
remains, and color images are normally converted to
black and white in order to facilitate initial
comparisons based on grayscale characteristics.
 First the presence of faces or face in a scene must be
detected. Once the face is detected, it must be
localized and Normalization process may be required
to bring the dimensions of the live facial sample in
alignment with the one on the template.
Distinctive characteristic
location
 All facial-scan systems attempt to match
visible facial features in a fashion similar to
the way people recognize one another.
 The features most often utilized in facial-
scan systems are those least likely to
change significantly over time: upper ridges
of the eye sockets, areas around the
cheekbones, sides of the mouth, nose
shape, and the position of major features
relative to each other.
Contd..
 Behavioural changes such as alteration of
hairstyle, changes in makeup, growing or
shaving facial hair, adding or removing
eyeglasses are behaviours that impact the
ability of facial-scan systems to locate
distinctive features, facial-scan systems are not
yet developed to the point where they can
overcome such variables.
Template creation
Template matching
• It compares match templates against enrollment
templates.
• A series of images is acquired and scored against
the enrollment, so that a user attempting 1:1
verification within a facial-scan system may have
10 to 20 match attempts take place within 1 to 2
seconds.
• facial-scan is not as effective as finger-scan or
iris-scan in identifying a single individual from a
large database, a number of potential matches
are generally returned after large-scale facial-
scan identification searches.
How Facial Recognition System Works
 Facial recognition software is based on the
ability to first recognize faces, which is a
technological feat in itself. If you look at the
mirror, you can see that your face has certain
distinguishable landmarks. These are the peaks
and valleys that make up the different facial
features.
 VISIONICS defines these landmarks as nodal
points. There are about 80 nodal points on a
human face.
Contd..
Here are few nodal points that are
measured by the software.
1. distance between the eyes
2. width of the nose
3. depth of the eye socket
4. cheekbones
5. jaw line
6. chin
SOFTWARE
 Detection- when the system is attached to a
video surveilance system, the recognition
software searches the field of view of a video
camera for faces. If there is a face in the view, it
is detected within a fraction of a second. A
multi-scale algorithm is used to search for faces
in low resolution. The system switches to a high-
resolution search only after a head-like shape is
detected.
 Alignment- Once a face is detected, the system
determines the head's position, size and pose. A
face needs to be turned at least 35 degrees
toward the camera for the system to register it.
Contd…
 Normalization-The image of the head is scaled and
rotated so that it can be registered and mapped into an
appropriate size and pose. Normalization is performed
regardless of the head's location and distance from the
camera. Light does not impact the normalization
process.
 Representation-The system translates the facial data
into a unique code. This coding process allows for easier
comparison of the newly acquired facial data to stored
facial data.
 Matching- The newly acquired facial data is compared
to the stored data and (ideally) linked to at least one
stored facial representation.
 The system maps the face and creates a
faceprint, a unique numerical code for that
face. Once the system has stored a
faceprint, it can compare it to the
thousands or millions of faceprints stored in
a database.
 Each faceprint is stored as an 84-byte file.
Strengths
 It has the ability to leverage existing image
acquisition equipment.
 It can search against static images such as
driver’s license photographs.
 It is the only biometric able to operate without
user cooperation.
Weaknesses
 Changes in acquisition environment reduce
matching accuracy.
 Changes in physiological characteristics reduce
matching accuracy.
 It has the potential for privacy abuse due to
noncooperative enrollment and identification
capabilities.
Applications
Replacement of PIN, physical tokens
No need of human assistance for identification
Prison visitor systems
Border control
Voting system
Computer security
Banking using ATM
Physical access control of buildings ,areas etc.
Advantages
• Convenient, social acceptability
• Easy to use
• Inexpensive technique of identification
Disadvantage
• Problem with false rejection when people
change their hair style, grow or shave a beard
or wear glasses.
• Identical twins
Conclusion
• Factors such as environmental changes
and mild changes in appearance impact
the technology to a greater degree
than many expect.
• For implementations where the
biometric system must verify and
identify users reliably over time, facial
scan can be a very difficult, but not
impossible, technology to implement
successfully.
References
• www.google.com
• www.wikipedia.com
Thank You…

More Related Content

PPTX
Face recognition
PPTX
Face Recognition Technology by Vishal Garg
PPTX
face recognition
PPTX
Face Detection Attendance System By Arjun Sharma
PPTX
Face Recognition Technology
PPTX
Face Recognition System/Technology
PPTX
Face recognization 1
PPTX
Face recognization
Face recognition
Face Recognition Technology by Vishal Garg
face recognition
Face Detection Attendance System By Arjun Sharma
Face Recognition Technology
Face Recognition System/Technology
Face recognization 1
Face recognization

What's hot (20)

PPTX
Face Recognition Technology
PPTX
Facial recognition system
PPT
Facial recognition technology by vaibhav
PPTX
Attendance system based on face recognition using python by Raihan Sikdar
PPT
Face Detection and Recognition System
PPTX
Face recognition technology
PPTX
Face recognisation system
PPTX
Face recognition technology
PPT
Face recognition
PPSX
Face recognition technology - BEST PPT
PPT
Face recognition technology
PDF
Face recognition Face Identification
PPTX
Face recognition technology
PPTX
Face Recognition
PPTX
Face Recognition
PPTX
Face Recognition
PPTX
Face Recognition Proposal Presentation
PPTX
Final year ppt
PPTX
Detection and recognition of face using neural network
PPT
Face recognition ppt
Face Recognition Technology
Facial recognition system
Facial recognition technology by vaibhav
Attendance system based on face recognition using python by Raihan Sikdar
Face Detection and Recognition System
Face recognition technology
Face recognisation system
Face recognition technology
Face recognition
Face recognition technology - BEST PPT
Face recognition technology
Face recognition Face Identification
Face recognition technology
Face Recognition
Face Recognition
Face Recognition
Face Recognition Proposal Presentation
Final year ppt
Detection and recognition of face using neural network
Face recognition ppt
Ad

Viewers also liked (20)

PPTX
FACE RECOGNITION ACROSS NON-UNIFORM MOTION BLUR
PDF
Face recognition across non uniform motion
PDF
A survey on human face recognition invariant to illumination
PDF
Recognition of Facial Expressions using Local Binary Patterns of Important Fa...
PPTX
Face recognition using arm 7
PDF
C# simplified
PPTX
Face recognization using artificial nerual network
PDF
PPTX
Human detection iccv09
PPTX
Voice recognition system
PPTX
Text to speech converter in C#.NET
PPTX
Face Recognition on MATLAB
PPTX
Facial expression recognition based on local binary patterns final
PPTX
Face recognition using neural network
PPT
Face Detection techniques
PPTX
Face recognition using artificial neural network
PPT
Face Recognition Technology
PPT
C#/.NET Little Wonders
PPTX
Text Detection and Recognition
FACE RECOGNITION ACROSS NON-UNIFORM MOTION BLUR
Face recognition across non uniform motion
A survey on human face recognition invariant to illumination
Recognition of Facial Expressions using Local Binary Patterns of Important Fa...
Face recognition using arm 7
C# simplified
Face recognization using artificial nerual network
Human detection iccv09
Voice recognition system
Text to speech converter in C#.NET
Face Recognition on MATLAB
Facial expression recognition based on local binary patterns final
Face recognition using neural network
Face Detection techniques
Face recognition using artificial neural network
Face Recognition Technology
C#/.NET Little Wonders
Text Detection and Recognition
Ad

Similar to Face recognigion system ppt (20)

PPTX
face-recognition-technology-ppt[1].pptx
PPTX
face-recognition-technology-ppt.pptx
PPT
Face recognization technology
PPTX
Facial recognition
PPTX
Facial_recognition_systtem.pptx
PPTX
Movie on face recognition in e attendace
PPTX
Face Recognition Technology by Rohit
PPTX
Face recognition Technology By Rohit
PPTX
Face recognition
PPTX
Biometric
PPTX
Biometric
PPTX
Facial Recognition Technology
PPTX
Pattern recognition 3d face recognition
PPTX
Pattern recognition facial recognition
PDF
Facial Recognition Mini project 3.pdf
PPT
Face Recognition
PPT
Automatic Attendance system using Facial Recognition
PDF
facerecognitiontechnology-131025121934-phpapp01.pdf
DOC
face-recognition-technology-08012013131029-face-recognition-technology.doc
PPTX
Pattern recognition
face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt.pptx
Face recognization technology
Facial recognition
Facial_recognition_systtem.pptx
Movie on face recognition in e attendace
Face Recognition Technology by Rohit
Face recognition Technology By Rohit
Face recognition
Biometric
Biometric
Facial Recognition Technology
Pattern recognition 3d face recognition
Pattern recognition facial recognition
Facial Recognition Mini project 3.pdf
Face Recognition
Automatic Attendance system using Facial Recognition
facerecognitiontechnology-131025121934-phpapp01.pdf
face-recognition-technology-08012013131029-face-recognition-technology.doc
Pattern recognition

Recently uploaded (20)

PPTX
Spectroscopy.pptx food analysis technology
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Approach and Philosophy of On baking technology
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
cuic standard and advanced reporting.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Encapsulation theory and applications.pdf
PPTX
Cloud computing and distributed systems.
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPT
Teaching material agriculture food technology
PPTX
sap open course for s4hana steps from ECC to s4
Spectroscopy.pptx food analysis technology
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Approach and Philosophy of On baking technology
Network Security Unit 5.pdf for BCA BBA.
cuic standard and advanced reporting.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Per capita expenditure prediction using model stacking based on satellite ima...
Encapsulation theory and applications.pdf
Cloud computing and distributed systems.
Spectral efficient network and resource selection model in 5G networks
Chapter 3 Spatial Domain Image Processing.pdf
Machine learning based COVID-19 study performance prediction
Mobile App Security Testing_ A Comprehensive Guide.pdf
Understanding_Digital_Forensics_Presentation.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Teaching material agriculture food technology
sap open course for s4hana steps from ECC to s4

Face recognigion system ppt

  • 1. Submitted To: Submitted By: Prof. Sandeep Santosh Kashish Garg 1130319 Face Recognition
  • 2. Contents  Introduction  History  Facial Recognition  Implementation  How it works  Strengths & Weaknesses  Applications  Advantages  Disadvantages  Conclusion  References
  • 3. Introduction  Everyday actions are increasingly being handled electronically, instead of pencil and paper or face to face.  This growth in electronic transactions results in great demand for fast and accurate user identification and authentication.  Access codes for buildings, banks accounts and computer systems often use PIN's for identification and security clearances.
  • 4. Contd…  Using the proper PIN gains access, but the user of the PIN is not verified. When credit and ATM cards are lost or stolen, an unauthorized user can often come up with the correct personal codes.  Face recognition technology may solve this problem since a face is undeniably connected to its owner except in the case of identical twins.
  • 5. Facial Recognition ???  It requires no physical interaction on behalf of the user.  It is accurate and allows for high enrolment and verification rates.  It can use your existing hardware infrastructure, existing cameras and image capture Devices will work with no problems
  • 6. History  In 1960s, the first semi-automated system for facial recognition to locate the features(such as eyes, ears, nose and mouth) on the photographs.  In 1970s, Goldstein and Harmon used 21 specific subjective markers such as hair Color and lip thickness to automate the recognition.  In 1988, Kirby and Sirovich used standard linear algebra technique, to the face recognition.
  • 7. Facial Recognition In Facial recognition there are two types of comparisons:-  VERIFICATION- The system compares the given individual with who they say they are and gives a yes or no decision.  IDENTIFICATION- The system compares the given individual to all the Other individuals in the database and gives a ranked list of matches.
  • 8. Contd…  All identification or authentication technologies operate using the following four stages:  Capture: A physical or behavioral sample is captured by the system during Enrollment and also in identification or verification process.  Extraction: unique data is extracted from the sample and a template is created.  Comparison: the template is then compared with a new sample.  Match/non-match: the system decides if the features extracted from the new Samples are a match or a non match.
  • 9. Implementation The implementation of face recognition technology includes the following four stages: • Image acquisition • Image processing • Distinctive characteristic location • Template creation • Template matching
  • 10. Image acquisition • Facial-scan technology can acquire faces from almost any static camera or video system that generates images of sufficient quality and resolution. • High-quality enrollment is essential to eventual verification and identification enrollment images define the facial characteristics to be used in all future authentication events.
  • 12. Image Processing Images are cropped such that the ovoid facial image remains, and color images are normally converted to black and white in order to facilitate initial comparisons based on grayscale characteristics.  First the presence of faces or face in a scene must be detected. Once the face is detected, it must be localized and Normalization process may be required to bring the dimensions of the live facial sample in alignment with the one on the template.
  • 13. Distinctive characteristic location  All facial-scan systems attempt to match visible facial features in a fashion similar to the way people recognize one another.  The features most often utilized in facial- scan systems are those least likely to change significantly over time: upper ridges of the eye sockets, areas around the cheekbones, sides of the mouth, nose shape, and the position of major features relative to each other.
  • 14. Contd..  Behavioural changes such as alteration of hairstyle, changes in makeup, growing or shaving facial hair, adding or removing eyeglasses are behaviours that impact the ability of facial-scan systems to locate distinctive features, facial-scan systems are not yet developed to the point where they can overcome such variables.
  • 16. Template matching • It compares match templates against enrollment templates. • A series of images is acquired and scored against the enrollment, so that a user attempting 1:1 verification within a facial-scan system may have 10 to 20 match attempts take place within 1 to 2 seconds. • facial-scan is not as effective as finger-scan or iris-scan in identifying a single individual from a large database, a number of potential matches are generally returned after large-scale facial- scan identification searches.
  • 17. How Facial Recognition System Works  Facial recognition software is based on the ability to first recognize faces, which is a technological feat in itself. If you look at the mirror, you can see that your face has certain distinguishable landmarks. These are the peaks and valleys that make up the different facial features.  VISIONICS defines these landmarks as nodal points. There are about 80 nodal points on a human face.
  • 18. Contd.. Here are few nodal points that are measured by the software. 1. distance between the eyes 2. width of the nose 3. depth of the eye socket 4. cheekbones 5. jaw line 6. chin
  • 19. SOFTWARE  Detection- when the system is attached to a video surveilance system, the recognition software searches the field of view of a video camera for faces. If there is a face in the view, it is detected within a fraction of a second. A multi-scale algorithm is used to search for faces in low resolution. The system switches to a high- resolution search only after a head-like shape is detected.  Alignment- Once a face is detected, the system determines the head's position, size and pose. A face needs to be turned at least 35 degrees toward the camera for the system to register it.
  • 20. Contd…  Normalization-The image of the head is scaled and rotated so that it can be registered and mapped into an appropriate size and pose. Normalization is performed regardless of the head's location and distance from the camera. Light does not impact the normalization process.  Representation-The system translates the facial data into a unique code. This coding process allows for easier comparison of the newly acquired facial data to stored facial data.  Matching- The newly acquired facial data is compared to the stored data and (ideally) linked to at least one stored facial representation.
  • 21.  The system maps the face and creates a faceprint, a unique numerical code for that face. Once the system has stored a faceprint, it can compare it to the thousands or millions of faceprints stored in a database.  Each faceprint is stored as an 84-byte file.
  • 22. Strengths  It has the ability to leverage existing image acquisition equipment.  It can search against static images such as driver’s license photographs.  It is the only biometric able to operate without user cooperation.
  • 23. Weaknesses  Changes in acquisition environment reduce matching accuracy.  Changes in physiological characteristics reduce matching accuracy.  It has the potential for privacy abuse due to noncooperative enrollment and identification capabilities.
  • 24. Applications Replacement of PIN, physical tokens No need of human assistance for identification Prison visitor systems Border control Voting system Computer security Banking using ATM Physical access control of buildings ,areas etc.
  • 25. Advantages • Convenient, social acceptability • Easy to use • Inexpensive technique of identification
  • 26. Disadvantage • Problem with false rejection when people change their hair style, grow or shave a beard or wear glasses. • Identical twins
  • 27. Conclusion • Factors such as environmental changes and mild changes in appearance impact the technology to a greater degree than many expect. • For implementations where the biometric system must verify and identify users reliably over time, facial scan can be a very difficult, but not impossible, technology to implement successfully.

Editor's Notes