RAJAT GOEL E.C.-09. The information age is quickly revolutionizing the way transactions are completed. Using the proper PIN gains access, but the user.

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.
FACE RECOGNITION TECHNOLOGY. OUTLINE WHAT IS BIOMETRICS? WHAT IS BIOMETRICS? WHAT IS FACIAL RECOGNITION TECHNOLOGY? WHAT IS FACIAL RECOGNITION TECHNOLOGY?
66: Priyanka J. Sawant 67: Ayesha A. Upadhyay 75: Sumeet Sukthankar.
By: Monika Achury and Shuchita Singh
Introduction to Fingerprint Biometrics By Tamar Bar.
FIT3105 Biometric based authentication and identity management
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
PALM VEIN TECHNOLOGY.
Iris Recognition By Mohammed, Ashfaq Ahmed. Introduction Iris Recognition is a Biometric Technology which deals with identification based on the human.
Biometrics and Authentication Shivani Kirubanandan.
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
Facial Recognition Facial recognition software - based on the ability to recognize a face and then measure the various features of the face. Each human.
TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems.
Facial Recognition. 1. takes a picture of a person 2. runs that image through the database 3. finds a match and identifies the person Humans have always.
Biometrics: Voice Recognition
Marjie Rodrigues
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
BIOMETRICS THE FUTURE OF SECURITY (ARE YOU SECURE YET?)
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
The solution is at your fingertips!. BARTEX 2000 Corp. BARTEX brings You integrated security solutions using the most advanced technology available in.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
BIOMETRICS.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Access Control Via Face Recognition. Group Members  Thilanka Priyankara  Vimalaharan Paskarasundaram  Manosha Silva  Dinusha Perera.
A Seminar Report On Face Recognition Technology A Seminar Report On Face Recognition Technology 123seminarsonly.com.
Biometrics Authentication Technology
Iris Scanning By, rahul vijay 1. Introduction  Biometrics provides a secure method of authentication and identification.  Biometric identification utilises.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
Background established on June 18, 1951 Universal Bank since 1994 publicly listed as “SECB” has one of the lowest non- performing loan ratios (NPL) capital.
1 Machine Vision. 2 VISION the most powerful sense.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
Face Recognition Technology By Catherine jenni christy.M.sc.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from.
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Biometrics Security in Banking Systems Image processing in ATM
A Seminar Report On Face Recognition Technology
FACE RECOGNITION TECHNOLOGY
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
Face Recognition 1.
FACE RECOGNITION TECHNOLOGY
BIOMETRICS Presented By Sapin.M.
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Facial Recognition in Biometrics
Biometric technology.
BIOMETRICS: FACIAL RECOGNITION TECHNOLOGY
Asst. Prof. Arvind Selwal, CUJ,Jammu
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Hybrid Finger print recognition
Presentation transcript:

RAJAT GOEL E.C.-09

The information age is quickly revolutionizing the way transactions are completed. Using the proper PIN gains access, but the user of the PIN is not verified. Face recognition technology may solve this problem since a face is undeniably connected to its owner. Its nontransferable. The system can then compare scans to records stored in a central or local database or even on a smart card.

A biometric is a unique, measurable characteristic of a human being that can be used to automatically recognize an individual or verify an individual’s identity. Biometrics can measure both physiological and behavioral characteristics.

Physiological biometrics (based on measurements and data derived from direct measurement of a part of the human body) include:  Finger-scan  Facial Recognition  Iris-scan  Retina-scan  Hand-scan

Behavioral biometrics (based on measurements and data derived from an action) include:  Voice-scan  Signature-scan A “biometric system” refers to the integrated hardware and software used to conduct biometric identification or verification.

 It is accurate and allows for high enrolment and verification rates.  It does not require an expert to interpret the comparison result.  It can use your existing hardware infrastructure, existing camaras and image capture devices will work with no problems.  It is the only biometric that allow you to perform passive identification in a one to many environment (eg: identifying a terrorist in a busy Airport terminal).

For face recognition there are two types of comparisons.  The first is verification. This is where the system compares the given individual with who that individual says they are and gives a yes or no decision.  The second is identification. This is where the system compares the given individual to all the other individuals in the database and gives a ranked list of matches.

All identification or authentication technologies operate using the following four stages:  Capture: a physical or behavioural sample is captured by the system during enrollment and also in identification or verification process.  Extraction: unique data is extracted from the sample and a template is created.  Comparison: the template is then compared with a new sample.  Match/non match : the system decides if the features extracted from the new sample are a match or a non match.

There are essentially two methods of capture. One is video imaging and the other is thermal imaging. Video imaging is more common as standard video cameras can be used. The complete facial image is usually captured and a number of points on the face can then be mapped. Thermal imaging has better accuracy as it uses facial temperature variations caused by vein structure as the distinguishing traits. As the heat pattern is emitted from the face itself without source of external radiation these systems can capture images despite the lighting condition, even in the dark. The drawback is high cost.

CAPTURE EXTRACTIONCOMPARISON MATCH/ NON-MATCH ACCEPT/ PROJECT

 An automated mechanism that scans and captures a digital or an analog image of a living personal characteristics.(enrollment module)  Another entity which handles compression, processing, storage and compression of the captured data with stored data (database).  The third interfaces with the application system ( identification module)

The implementation of face recognition technology include the following four stages:  data acquisition  input processing  face image classification  decision making

The input can be recorded video of the speaker or a still image. A sample of 1 sec duration consists of a 25 frame video sequence. More than one camera can be used to produce a 3D representation of the face and to protect against the usage of photographs to gain unauthorized access.

FACE IMAGE FACE EXTRACTION SYNERGETIC COMPUTER LIP MOVEMENT SYNERGETIC COMPUTER DECISION STRATEGY

Synergetic computer are used to classify optical and audio features, respectively. A synergetic computer is a set of algorithm that simulate synergetic phenomena. In training phase the BIOID creates a prototype called faceprint for each person. A newly recorded pattern is preprocessed and compared with each faceprint stored in the database. As comparisons are made, the system assigns a value to the comparison using a scale of one to ten. If a score is above a predetermined threshold, a match is declared.

When the system is attached to a video surveillance system, the recognition software searches the field of view of a video camera for faces. If there is a face in the view, it is detected within a fraction of a second. A multiscale algorithm is used to search for faces in low resolution.The system switches to a high-resolution search only after a head- like shape is detected.

Once a face is detected, the system determines the head's position, size and pose. A face needs to be turned at least 35 degrees toward the camera for the system to register it. The image of the head is scaled and rotated so that it can be registered and mapped into an appropriate size and pose. Normalization isperformed regardless of the head's location and distance from the camera. Light does not impact the normalization process.

The system translates the facial data into a unique code. This coding process allows for easier comparison of the newly acquired facial data to stored facial data. The newly acquired facial data is compared to the stored data and (ideally) linked to at least one stored facial representation. The heart of the FaceIt facial recognition system is the Local Feature Analysis (LFA) algorithm.

This is the mathematical technique the system uses to encode faces. The system maps the face and creates a faceprint, a unique numerical code for that face. Once the system has stored a faceprint, it can compare it to the thousands or millions of faceprints stored in a database. Each faceprint is stored as an 84-byte file. Using facial recognition software, police can zoom in with cameras and take a snapshot of a face.

1. There are many benefits to face recognition systems such as its convinence and social acceptability. All you need is your picture taken for it to work. 2. Face recognition is easy to use and in many cases it can be performed without a person even knowing. 3. Face recognition is also one of the most inexpensive biometric in the market and its prices should continue to go down.

1. Face recognition systems cant tell the difference between identical twins.

1. Day Care: Verify identity of individuals picking up the children. 2. Voter verification: Where eligible persons are required to verify their identity during a voting process. this is intended to stop 'proxy' voting where the vote may not go as expected. 3. Banking using ATM: The software is able to quickly verify a customers face.