SlideShare a Scribd company logo
By
Nagham
1.Introduction
2. Facial recognition system
3. Facial Recognition
4. 2 face recognition
5. 3 face recognition
6. Implementation
7. How it works
8. Advantages & Disadvantage s
9. Applications
10. Conclusion
Everyday actions are increasingly
being handled electronically,
instead of pencil and paper or face
to face. This growth in electronic
transactions results in great
demand for fast and accurate user
identification and authentication.
Access codes for buildings, banks accounts
and computer systems often use PINs for
identification and security clearances. Using
the proper PIN gains access, but the user of
the PIN is not verified. When credit and
ATM cards are lost or stolen, an
unauthorized user can often come up with
the correct personal codes. Face recognition
technology may solve this problem since a
face is undeniably connected to its owner
expect in the case of identical twins.
A facial recognition system is a computer
application capable of identifying or verifying a
person from a digital image or a video frame from
a video source. One of the ways to do this is by
comparing selected facial features from the image
and a facial database
1.It requires no physical interaction on
behalf of the user.
2. It is accurate and allows for high
enrolment and verification rates.
3. It can use existing hardware
infrastructure, existing cameras and
image capture Devices will work with
no problems.
In the past, facial recognition software has relied on a 2D image to
compare or identify another 2D image from the database. To be
effective and accurate, the image captured needed to be of a face
that was looking almost directly at the camera, with little variance
of light or facial expression from the image in the database. This
created quite a problem.
The problems which still present problems to 2D
face recognition systems are:
1.Illumination
2.Pose
3.Expression
4.Occlusion
5.Ageing
A newly-emerging trend in facial recognition
software uses a 3D model, which claims to
provide more accuracy. Capturing a real-time 3D
image of a person's facial surface, 3D facial
recognition uses distinctive features of the face
-- where rigid tissue and bone is most apparent
, such as the curves of the eye socket, nose and
chin -- to identify the subject. These areas are all
unique and don't change over time.
Using depth and an axis of measurement that is
not affected by lighting, 3D facial recognition
can even be used in darkness and has the ability
to recognize a subject at different view angles
with the potential to recognize up to 90 degrees
(a face in profile).
In Facial recognition there are two types
of comparisons:-
 VERIFICATION- The system compares the
given individual with who they say they are
and gives a yes or no decision. ( one to one)
 IDENTIFICATION- The system compares the
given individual to all the Other individuals in
the database and gives a ranked list of matches
(one to many).
All identification or authentication
technologies operate using the following four
stages:
 Capture: A physical or behavioral sample is
captured by the system during Enrollment and
also in identification or verification process.
 Extraction: unique data is extracted from the
sample and a template is created.
 Comparison: the template is then compared
with a new sample.
 Match/non-match: the system decides if the
features extracted from the new Samples are a
match or a non match.
The implementation of 3d face recognition
technology includes the following five stages:
• Image acquisition
• Image processing
• Distinctive characteristic location
• Template creation
• Template matching
• Facial-scan technology can acquire faces
from almost any static camera or video system
that generates images of sufficient quality and
resolution.
• High-quality enrollment is essential to
eventual verification and identification
enrollment images define the facial
characteristics to be used in all future
authentication events.
1. 3D Laser Scanners: The acquisition itself is via laser stripe and triangulation.
2. Stereo: . to use two images of an object or scene taken from slightly different
viewpoints.
3. Structured Light:
4. Time of Flight : measuring or inferring the distance that a beam of reflected light
has travelled.
5. Shape from Shading (Photoclinometry) : uses shading from an individual image
in order to estimate the surface orientation.
6. Photometric Stereo (PS): It constructs a 3D form from three or more images of
the same object each lit from a different and known direction and estimating surface
normal at each pixel coordinate
.
• Images are cropped such that the ovoid facial
image remains, and color images are normally
converted to black and white in order to
facilitate initial comparisons based on grayscale
characteristics.
• Once the face is detected, it must be localized
and Normalization process may be required to
bring the dimensions of the live facial sample
in alignment with the one on the template.
1. All facial-scan systems attempt to match visible
facial features in a fashion similar to the way
people recognize one another.
2. The features most often utilized in facial-scan
systems are those least likely to change
significantly over time: upper ridges of the eye
sockets, areas around the cheekbones, sides of the
mouth, nose shape, and the position of major
features relative to each other.
3. Behavioral changes such as alteration of
hairstyle, changes in makeup, growing or
shaving facial hair, adding or removing
eyeglasses are behaviors that impact the ability
of facial-scan systems to locate distinctive
features, facial-scan systems are developed to
the point where they can overcome such
variables
• Enrollment templates are normally created from a
multiplicity of processed facial images.
• These templates can vary in size from less than
100 bytes, generated through certain vendors and to
over 3K for templates.
• The 3K template is by far the largest among
technologies considered physiological biometrics.
• Larger templates are normally associated with
behavioral biometrics
• It compares match templates against enrollment
templates.
• A series of images is acquired and scored
against the enrollment, so that a user attempting
1:1 verification within a facial-scan system may
have 10 to 20 match attempts take place within 1
to 2 seconds.
• facial-scan is not as effective as finger-scan or
iris- scan in identifying a single individual from a
large database, a number of potential matches are
generally returned after large-scale facial-scan
identification searches.






Every face has numerous, distinguishable landmarks, the different peaks and
valleys that make up facial features. these landmarks defined as nodal points.
Each human face has approximately 80 nodal points. Some of these measured by
the software are:
Distance between the eyes
Width of the nose
Depth of the eye sockets
The shape of the cheekbones
The length of the jaw line.
Chin
These nodal points are measured creating a numerical code, called a faceprint,
representing the face in the database.
Detection
Acquiring an image can be accomplished by digitally scanning an existing
photograph (2D) or by using a video image to acquire a live picture of a
subject (3D).
Alignment
Once it detects a face, the system determines the head's position, size and
pose. As stated earlier, the subject has the potential to be recognized up to
90 degrees, while with 2D, the head must be turned at least 35 degrees
toward the camera.
Measurement
The system then measures the curves of the face on a sub-millimeter (or
microwave) scale and creates a template.
Representation
The system translates the template into a unique code. This coding gives
each template a set of numbers to represent the features on a subject's
face.
Matching
1. If the image is 3D and the database contains 3D images, then
matching will take place without any changes being made to the
image.
2. If the databases is still in 2D images.
When a 3D image is taken, different points (usually three) are
identified. For example, the outside of the eye, the inside of
the eye and the tip of the nose will be pulled out and measured.
3. Once those measurements are in place, an algorithm (a step-by-
step procedure) will be applied to the image to convert it to a 2D
image.
4. After conversion, the software will then compare the image with the
2D images in the database to find a potential match.
Verification or Identification
1. In verification, an image is matched to only one
image in the database (1:1). For example, an image taken
of a subject may be matched to an image in the database to
verify the subject is who he says he is.
2. If identification is the goal, then the image is compared to
all images in the database resulting in a score for each
potential match (1:N).
Pattern recognition 3d face recognition
 It has the ability to leverage existing image
acquisition equipment.
 It can search against static images such as
driver’s license photographs.
 It is the only biometric able to operate
without user cooperation.
 Changes in acquisition environment reduce
matching accuracy.
 Changes in physiological characteristics reduce
matching accuracy.
 It has the potential for privacy abuse due to non
cooperative enrollment and identification
capabilities.
complexity of the sensor
 Security/Counterterrorism. Access control,
comparing surveillance images to Know terrorist.
 Day Care: Verify identity of individuals picking
up the children.
 Residential Security: Alert homeowners of
approaching personnel
 Voter verification: Where eligible politicians are
required to verify their identity during a voting
process this is intended to stop voting where the
vote may not go as expected.
 Banking using ATM: The software is able to
quickly verify a customer’s face.
• Factors such as environmental changes and mild
changes in appearance impact the technology to a
greater degree than many expect.
• For implementations where the biometric system
must verify and identify users reliably over time,
facial scan can be a very difficult, but not
impossible, technology to implement successfully.
The level of interest in 3D face recognition is high among
biometric techniques. 3D face recognition has potential to
be a strong biometric.
THANK YOU

More Related Content

PPTX
Multi modal biometric system
PPTX
Biometrics iris recognition
PPTX
Pattern recognition Hand Geometry
PPT
1.4 Performance Measures.ppt
PPTX
Hand geometry recognition
PPTX
Biometrics
PPTX
IRIS &RETINAL SCANNING PPT
PPTX
biometrics
Multi modal biometric system
Biometrics iris recognition
Pattern recognition Hand Geometry
1.4 Performance Measures.ppt
Hand geometry recognition
Biometrics
IRIS &RETINAL SCANNING PPT
biometrics

What's hot (20)

PPTX
Face recognition
PPTX
Face recognization
PPTX
Biometrics Technology In the 21st Century
PPT
Retinal Recognition
PPTX
Iris recognition
PPT
Multimodal Biometric Systems
PPTX
Bio-metric Gait Recognition
PPTX
Biometrics
PPTX
Face Recognition Technology
PPTX
Face recognisation system
PPT
Biometrics Technology PPT
PPTX
IRIS RECOGNITION
PPT
Fingerprint Images Enhancement ppt
PPTX
Face recognigion system ppt
PPT
Facial recognition technology by vaibhav
PPTX
Iris recognition
PPTX
Facial recognition
PPT
Face recognition technology
PPTX
face recognition
PDF
Biometrics/fingerprint sensors
Face recognition
Face recognization
Biometrics Technology In the 21st Century
Retinal Recognition
Iris recognition
Multimodal Biometric Systems
Bio-metric Gait Recognition
Biometrics
Face Recognition Technology
Face recognisation system
Biometrics Technology PPT
IRIS RECOGNITION
Fingerprint Images Enhancement ppt
Face recognigion system ppt
Facial recognition technology by vaibhav
Iris recognition
Facial recognition
Face recognition technology
face recognition
Biometrics/fingerprint sensors
Ad

Similar to Pattern recognition 3d face recognition (20)

PPTX
Face Recognition
PPTX
Biometric
PPTX
Biometric
PPTX
Face Recognition
DOC
Facerecognition
DOC
Facerecognition
PPTX
Face recognition
PPT
biometric technology
PPTX
face-recognition-technology-ppt[1].pptx
DOC
face-recognition-technology-08012013131029-face-recognition-technology.doc
PPTX
Facial_recognition_systtem.pptx
PPTX
face-recognition-technology-ppt.pptx
PPT
Face recognition ppt
PDF
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
PDF
G041041047
PPTX
Face Recognition Technology by Vishal Garg
PDF
Development of Real Time Face Recognition System using OpenCV
PPTX
Attendance system based on face recognition using python by Raihan Sikdar
PPTX
Face Recognition
PPSX
Face recognition technology - BEST PPT
Face Recognition
Biometric
Biometric
Face Recognition
Facerecognition
Facerecognition
Face recognition
biometric technology
face-recognition-technology-ppt[1].pptx
face-recognition-technology-08012013131029-face-recognition-technology.doc
Facial_recognition_systtem.pptx
face-recognition-technology-ppt.pptx
Face recognition ppt
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
G041041047
Face Recognition Technology by Vishal Garg
Development of Real Time Face Recognition System using OpenCV
Attendance system based on face recognition using python by Raihan Sikdar
Face Recognition
Face recognition technology - BEST PPT
Ad

More from Mazin Alwaaly (20)

PPTX
Pattern recognition voice biometrics
PPTX
Pattern recognition palm print authentication system
PPTX
Pattern recognition on line signature
PPTX
Pattern recognition multi biometrics using face and ear
PPTX
Pattern recognition IRIS recognition
PPT
Pattern recognition hand vascular pattern recognition
PPTX
Pattern recognition forensic dental identification
PPT
Pattern recognition fingerprints
PPTX
Pattern recognition facial recognition
PPTX
Pattern recognition ear as a biometric
PPTX
Multimedia multimedia over wireless and mobile networks
PPT
Multimedia network services and protocols for multimedia communications
PPTX
Multimedia content based retrieval in digital libraries
PPTX
Multimedia lossy compression algorithms
PPTX
Multimedia lossless compression algorithms
PPTX
Multimedia basic video compression techniques
PPT
Multimedia image compression standards
PPTX
Multimedia fundamental concepts in video
PPT
Multimedia color in image and video
PPTX
Multimedia graphics and image data representation
Pattern recognition voice biometrics
Pattern recognition palm print authentication system
Pattern recognition on line signature
Pattern recognition multi biometrics using face and ear
Pattern recognition IRIS recognition
Pattern recognition hand vascular pattern recognition
Pattern recognition forensic dental identification
Pattern recognition fingerprints
Pattern recognition facial recognition
Pattern recognition ear as a biometric
Multimedia multimedia over wireless and mobile networks
Multimedia network services and protocols for multimedia communications
Multimedia content based retrieval in digital libraries
Multimedia lossy compression algorithms
Multimedia lossless compression algorithms
Multimedia basic video compression techniques
Multimedia image compression standards
Multimedia fundamental concepts in video
Multimedia color in image and video
Multimedia graphics and image data representation

Recently uploaded (20)

PPTX
ECG_Course_Presentation د.محمد صقران ppt
PDF
Mastering Bioreactors and Media Sterilization: A Complete Guide to Sterile Fe...
PDF
. Radiology Case Scenariosssssssssssssss
PPTX
The KM-GBF monitoring framework – status & key messages.pptx
PDF
AlphaEarth Foundations and the Satellite Embedding dataset
PPTX
neck nodes and dissection types and lymph nodes levels
PDF
Biophysics 2.pdffffffffffffffffffffffffff
PPTX
2. Earth - The Living Planet Module 2ELS
PPTX
Microbiology with diagram medical studies .pptx
PPTX
TOTAL hIP ARTHROPLASTY Presentation.pptx
PPTX
microscope-Lecturecjchchchchcuvuvhc.pptx
PPTX
INTRODUCTION TO EVS | Concept of sustainability
PPTX
ognitive-behavioral therapy, mindfulness-based approaches, coping skills trai...
PPTX
Comparative Structure of Integument in Vertebrates.pptx
PPTX
Classification Systems_TAXONOMY_SCIENCE8.pptx
PPTX
Protein & Amino Acid Structures Levels of protein structure (primary, seconda...
PDF
The scientific heritage No 166 (166) (2025)
PPT
The World of Physical Science, • Labs: Safety Simulation, Measurement Practice
PPTX
BIOMOLECULES PPT........................
PDF
Unveiling a 36 billion solar mass black hole at the centre of the Cosmic Hors...
ECG_Course_Presentation د.محمد صقران ppt
Mastering Bioreactors and Media Sterilization: A Complete Guide to Sterile Fe...
. Radiology Case Scenariosssssssssssssss
The KM-GBF monitoring framework – status & key messages.pptx
AlphaEarth Foundations and the Satellite Embedding dataset
neck nodes and dissection types and lymph nodes levels
Biophysics 2.pdffffffffffffffffffffffffff
2. Earth - The Living Planet Module 2ELS
Microbiology with diagram medical studies .pptx
TOTAL hIP ARTHROPLASTY Presentation.pptx
microscope-Lecturecjchchchchcuvuvhc.pptx
INTRODUCTION TO EVS | Concept of sustainability
ognitive-behavioral therapy, mindfulness-based approaches, coping skills trai...
Comparative Structure of Integument in Vertebrates.pptx
Classification Systems_TAXONOMY_SCIENCE8.pptx
Protein & Amino Acid Structures Levels of protein structure (primary, seconda...
The scientific heritage No 166 (166) (2025)
The World of Physical Science, • Labs: Safety Simulation, Measurement Practice
BIOMOLECULES PPT........................
Unveiling a 36 billion solar mass black hole at the centre of the Cosmic Hors...

Pattern recognition 3d face recognition

  • 2. 1.Introduction 2. Facial recognition system 3. Facial Recognition 4. 2 face recognition 5. 3 face recognition 6. Implementation 7. How it works 8. Advantages & Disadvantage s 9. Applications 10. Conclusion
  • 3. Everyday actions are increasingly being handled electronically, instead of pencil and paper or face to face. This growth in electronic transactions results in great demand for fast and accurate user identification and authentication.
  • 4. Access codes for buildings, banks accounts and computer systems often use PINs for identification and security clearances. Using the proper PIN gains access, but the user of the PIN is not verified. When credit and ATM cards are lost or stolen, an unauthorized user can often come up with the correct personal codes. Face recognition technology may solve this problem since a face is undeniably connected to its owner expect in the case of identical twins.
  • 5. A facial recognition system is a computer application capable of identifying or verifying a person from a digital image or a video frame from a video source. One of the ways to do this is by comparing selected facial features from the image and a facial database
  • 6. 1.It requires no physical interaction on behalf of the user. 2. It is accurate and allows for high enrolment and verification rates. 3. It can use existing hardware infrastructure, existing cameras and image capture Devices will work with no problems.
  • 7. In the past, facial recognition software has relied on a 2D image to compare or identify another 2D image from the database. To be effective and accurate, the image captured needed to be of a face that was looking almost directly at the camera, with little variance of light or facial expression from the image in the database. This created quite a problem.
  • 8. The problems which still present problems to 2D face recognition systems are: 1.Illumination 2.Pose 3.Expression 4.Occlusion 5.Ageing
  • 9. A newly-emerging trend in facial recognition software uses a 3D model, which claims to provide more accuracy. Capturing a real-time 3D image of a person's facial surface, 3D facial recognition uses distinctive features of the face -- where rigid tissue and bone is most apparent , such as the curves of the eye socket, nose and chin -- to identify the subject. These areas are all unique and don't change over time. Using depth and an axis of measurement that is not affected by lighting, 3D facial recognition can even be used in darkness and has the ability to recognize a subject at different view angles with the potential to recognize up to 90 degrees (a face in profile).
  • 10. In Facial recognition there are two types of comparisons:-  VERIFICATION- The system compares the given individual with who they say they are and gives a yes or no decision. ( one to one)  IDENTIFICATION- The system compares the given individual to all the Other individuals in the database and gives a ranked list of matches (one to many).
  • 11. All identification or authentication technologies operate using the following four stages:  Capture: A physical or behavioral sample is captured by the system during Enrollment and also in identification or verification process.  Extraction: unique data is extracted from the sample and a template is created.  Comparison: the template is then compared with a new sample.  Match/non-match: the system decides if the features extracted from the new Samples are a match or a non match.
  • 12. The implementation of 3d face recognition technology includes the following five stages: • Image acquisition • Image processing • Distinctive characteristic location • Template creation • Template matching
  • 13. • Facial-scan technology can acquire faces from almost any static camera or video system that generates images of sufficient quality and resolution. • High-quality enrollment is essential to eventual verification and identification enrollment images define the facial characteristics to be used in all future authentication events.
  • 14. 1. 3D Laser Scanners: The acquisition itself is via laser stripe and triangulation. 2. Stereo: . to use two images of an object or scene taken from slightly different viewpoints. 3. Structured Light: 4. Time of Flight : measuring or inferring the distance that a beam of reflected light has travelled. 5. Shape from Shading (Photoclinometry) : uses shading from an individual image in order to estimate the surface orientation. 6. Photometric Stereo (PS): It constructs a 3D form from three or more images of the same object each lit from a different and known direction and estimating surface normal at each pixel coordinate .
  • 15. • Images are cropped such that the ovoid facial image remains, and color images are normally converted to black and white in order to facilitate initial comparisons based on grayscale characteristics. • Once the face is detected, it must be localized and Normalization process may be required to bring the dimensions of the live facial sample in alignment with the one on the template.
  • 16. 1. All facial-scan systems attempt to match visible facial features in a fashion similar to the way people recognize one another. 2. The features most often utilized in facial-scan systems are those least likely to change significantly over time: upper ridges of the eye sockets, areas around the cheekbones, sides of the mouth, nose shape, and the position of major features relative to each other.
  • 17. 3. Behavioral changes such as alteration of hairstyle, changes in makeup, growing or shaving facial hair, adding or removing eyeglasses are behaviors that impact the ability of facial-scan systems to locate distinctive features, facial-scan systems are developed to the point where they can overcome such variables
  • 18. • Enrollment templates are normally created from a multiplicity of processed facial images. • These templates can vary in size from less than 100 bytes, generated through certain vendors and to over 3K for templates. • The 3K template is by far the largest among technologies considered physiological biometrics. • Larger templates are normally associated with behavioral biometrics
  • 19. • It compares match templates against enrollment templates. • A series of images is acquired and scored against the enrollment, so that a user attempting 1:1 verification within a facial-scan system may have 10 to 20 match attempts take place within 1 to 2 seconds. • facial-scan is not as effective as finger-scan or iris- scan in identifying a single individual from a large database, a number of potential matches are generally returned after large-scale facial-scan identification searches.
  • 20.       Every face has numerous, distinguishable landmarks, the different peaks and valleys that make up facial features. these landmarks defined as nodal points. Each human face has approximately 80 nodal points. Some of these measured by the software are: Distance between the eyes Width of the nose Depth of the eye sockets The shape of the cheekbones The length of the jaw line. Chin These nodal points are measured creating a numerical code, called a faceprint, representing the face in the database.
  • 21. Detection Acquiring an image can be accomplished by digitally scanning an existing photograph (2D) or by using a video image to acquire a live picture of a subject (3D). Alignment Once it detects a face, the system determines the head's position, size and pose. As stated earlier, the subject has the potential to be recognized up to 90 degrees, while with 2D, the head must be turned at least 35 degrees toward the camera.
  • 22. Measurement The system then measures the curves of the face on a sub-millimeter (or microwave) scale and creates a template. Representation The system translates the template into a unique code. This coding gives each template a set of numbers to represent the features on a subject's face.
  • 23. Matching 1. If the image is 3D and the database contains 3D images, then matching will take place without any changes being made to the image. 2. If the databases is still in 2D images. When a 3D image is taken, different points (usually three) are identified. For example, the outside of the eye, the inside of the eye and the tip of the nose will be pulled out and measured. 3. Once those measurements are in place, an algorithm (a step-by- step procedure) will be applied to the image to convert it to a 2D image. 4. After conversion, the software will then compare the image with the 2D images in the database to find a potential match.
  • 24. Verification or Identification 1. In verification, an image is matched to only one image in the database (1:1). For example, an image taken of a subject may be matched to an image in the database to verify the subject is who he says he is. 2. If identification is the goal, then the image is compared to all images in the database resulting in a score for each potential match (1:N).
  • 26.  It has the ability to leverage existing image acquisition equipment.  It can search against static images such as driver’s license photographs.  It is the only biometric able to operate without user cooperation.
  • 27.  Changes in acquisition environment reduce matching accuracy.  Changes in physiological characteristics reduce matching accuracy.  It has the potential for privacy abuse due to non cooperative enrollment and identification capabilities. complexity of the sensor
  • 28.  Security/Counterterrorism. Access control, comparing surveillance images to Know terrorist.  Day Care: Verify identity of individuals picking up the children.  Residential Security: Alert homeowners of approaching personnel  Voter verification: Where eligible politicians are required to verify their identity during a voting process this is intended to stop voting where the vote may not go as expected.  Banking using ATM: The software is able to quickly verify a customer’s face.
  • 29. • Factors such as environmental changes and mild changes in appearance impact the technology to a greater degree than many expect. • For implementations where the biometric system must verify and identify users reliably over time, facial scan can be a very difficult, but not impossible, technology to implement successfully. The level of interest in 3D face recognition is high among biometric techniques. 3D face recognition has potential to be a strong biometric.