FACE RECOGNITION TECHNOLOGY

Slides:



Advertisements
Similar presentations
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Advertisements

NC DMV License and Theft Bureau
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Improving ATM Security via Facial Recognition CPSC510 James Maxlow November 25 th, 2002.
Face Recognition & Biometric Systems, 2005/2006 Face recognition process.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
Biometrics 101 You are the Key. A Need for Better Security One person can have a greater negative impact on society than ever before. More individuals.
Liveness Testing Shivankush Aras. Threats to Biometric System Artificially created biometrics: e.g. image of a face or iris, lifted latent fingerprints,
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
PALM VEIN TECHNOLOGY.
FACE RECOGNITION BY: TEAM 1 BILL BAKER NADINE BROWN RICK HENNINGS SHOBHANA MISRA SAURABH PETHE.
Face Recognition By: Thanh Do Warren Ju. Face Recognition By: Thanh Do Warren Ju.
EECE 279: Real-Time Systems Design Vanderbilt University Ames Brown & Jason Cherry MATCH! Real-Time Facial Recognition.
Biometrics and Authentication Shivani Kirubanandan.
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Facial Recognition Facial recognition software - based on the ability to recognize a face and then measure the various features of the face. Each human.
TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems.
Facial Recognition. 1. takes a picture of a person 2. runs that image through the database 3. finds a match and identifies the person Humans have always.
Marjie Rodrigues
Security-Authentication
Facial Recognition CSE 391 Kris Lord.
Vision-Based Biometric Authentication System by Padraic o hIarnain Final Year Project Presentation.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Face Recognition System By Arthur. Introduction  A facial recognition system is a computer application for automatically identifying or verifying a person.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Information about Biometrics and its security By Ridham Bhatt.
BIOMETRICS.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Access Control Via Face Recognition. Group Members  Thilanka Priyankara  Vimalaharan Paskarasundaram  Manosha Silva  Dinusha Perera.
A Seminar Report On Face Recognition Technology A Seminar Report On Face Recognition Technology 123seminarsonly.com.
Biometrics Authentication Technology
(Team 1)Jackie Abbazio, Sasha Perez, Denise Silva and Robert Tesoriero (Team 2) Faune Hughes, Daniel Lichter, Richard Oswald and Michael Whitfield Clients:
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
Industrial Vision Industrial Vision: components.
Iris Scanning By, rahul vijay 1. Introduction  Biometrics provides a secure method of authentication and identification.  Biometric identification utilises.
Final Year Project Vision based biometric authentication system By Padraic ó hIarnain.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
Face Recognition Technology By Catherine jenni christy.M.sc.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from.
Tom Face Recognition Software in a border control environment: Non-zero-effort-attacks' effect on False Acceptance Rate.
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
RAJAT GOEL E.C.-09. The information age is quickly revolutionizing the way transactions are completed. Using the proper PIN gains access, but the user.
CONTENTS:  Introduction.  Face recognition task.  Image preprocessing.  Template Extraction and Normalization.  Template Correlation with image database.
By: Suvigya Tripathi (09BEC094) Ankit V. Gupta (09BEC106) Guided By: Prof. Bhupendra Fataniya Dept. of Electronics and Communication Engineering, Nirma.
FACE RECOGNITION. A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a.
Presented By Bhargav (08BQ1A0435).  Images play an important role in todays information because A single image represents a thousand words.  Google's.
Intelligent Face Recognition
Hand Geometry Recognition
Secure authentication with Windows Hello
A Seminar Report On Face Recognition Technology
BLIND AUTHENTICATION: A SECURE CRYPTO-BIOMETRIC VERIFICATION PROTOCOL
Face Recognition 1.
PRESENTED BY Yang Jiao Timo Ahonen, Matti Pietikainen
FACE RECOGNITION TECHNOLOGY
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Seminar Presentation on Biometrics
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
A maximum likelihood estimation and training on the fly approach
Presentation transcript:

FACE RECOGNITION TECHNOLOGY 123seminarsonly.com 123seminarsonly.com FACE RECOGNITION TECHNOLOGY JITHIN.S.J. S7 CSE. 123seminarsonly.com 123seminarsonly.com

FACE RECOGNITION All identification and authentication technologies operate using the 4 stage procedure capture extraction comparison match/nonmatch 123seminarsonly.com

There are two methods of capture Video imaging 123seminarsonly.com 123seminarsonly.com There are two methods of capture Video imaging Video imaging uses video cameras. System performance depends on precise position, angle of the head and surrounding lighting condition. Thermal imaging Thermal imaging has better accuracy as it uses facial temperature variation. Disadvantage is that its very costly. 123seminarsonly.com 123seminarsonly.com

CAPTURING OF IMAGE BY STANDARD VIDEO CAMERAS 123seminarsonly.com

COMPONENTS OF FACE RECONITION SYSTEM Consists of three modules Enrollment module Database Identification 123seminarsonly.com

Performance Parameters False acceptance rate,FAR= NFA/NIIA NFA= number of false acceptance NIIA=no of imposter identification attempt False rejection rate,FRR = NFR/NEIA NFR=number of false rejection NEIA=number of enrollee identification attempt Threshold/decision threshold Equal error rate 123seminarsonly.com

IMPLEMENTATION OF FACE RECOGNITION TECHNOLOGY Data acquisition Input processing Face image classification and decision making 123seminarsonly.com

HOW FACE RECOGNITION SYSTEMS WORKS-an example Visionics, a company based in New Jersey Faceit There are distinguishable landmark on your face called peaks and valleys-nodal points 80 nodal points on human face like -distance between eyes -width of nose -depth of eye socket -cheek bones -jawline -chin faceit needs 14 to 20 nodal points 123seminarsonly.com

THE SOFTWARE The basic process used by Faceit system are Detection Alignment Normalisation Representation Matching 123seminarsonly.com

ADVANTAGES AND DISADVANTAGES Convenient, social acceptability Easy to use Inexpensive technique of identification DISADVANTAGES Problem with false rejection when people change their hair style, grow or shave a beard or wear glasses. Identical twins 123seminarsonly.com

WHY WE CHOOSE FACE RECOGNITION No physical interaction on behalf of the user Does not require an expert to interpret the comparison Can use existing hardware infrastructure Can use existing image without having to re-enroll everytime Only biometric that allows you to perform passive identification in a one to many environment 123seminarsonly.com

APPLICATIONS Replacement of PIN,physical tokens No need of human assistance for identification Prison visitor systems Border control Voting system Computer security Banking using ATM Physical access control of buildings,areas etc 123seminarsonly.com

CONCLUSION Cost of equipments is going down-cost effective Reliable No technological or financial barriers 123seminarsonly.com

Thank you 123seminarsonly.com