TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems.

Slides:



Advertisements
Similar presentations
Dr. Marc Valliant, VP & CTO
Advertisements

Overview of biometric technology. Contents: 1. What is Biometrics The term “biometrics” is derived from the Greek words “bio” (life) and “metrics” (to.
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
Chapter 9 Creating and Maintaining Database Presented by Zhiming Liu Instructor: Dr. Bebis.
Face Alignment with Part-Based Modeling
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.
Facial feature localization Presented by: Harvest Jang Spring 2002.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
Biometrics & Security Tutorial 7. 1 (a) Please compare two different kinds of biometrics technologies: Retina and Iris. (P8:2-3)
Biometrics in New Zealand Passport issuing Border crossing System and information access Building access.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Face Biometric Applications Team Members: Faune Hughes, Daniel Lichter, Richard Oswald, and Michael Whitfield Clients: Fred Penna and Robert Zack.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
FIT3105 Biometric based authentication and identity management
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
PALM VEIN TECHNOLOGY.
FACE RECOGNITION BY: TEAM 1 BILL BAKER NADINE BROWN RICK HENNINGS SHOBHANA MISRA SAURABH PETHE.
Investigation of Two Licensed Biometric Products Using Neurotechnology’s VeriLook and VeriFinger software.
Integrating Information Dr. Pushkin Kachroo. Integration Matcher 1 Matcher 2 Integration Decision Match No Match B1B1 B2B2.
Identification System Errors Guide to Biometrics – Chapter 6 Handbook of Fingerprint Recognition Presented By: Chris Miles.
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
Authors: Anastasis Kounoudes, Anixi Antonakoudi, Vasilis Kekatos
Facial Recognition. 1. takes a picture of a person 2. runs that image through the database 3. finds a match and identifies the person Humans have always.
Facial Recognition CSE 391 Kris Lord.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Biometrics: Ear Recognition
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
FACE RECOGNITION AUTHOR: Łukasz Przywarty
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Keystroke Biometric System Client: Dr. Mary Villani Instructor: Dr. Charles Tappert Team 4 Members: Michael Wuench ; Mingfei Bi ; Evelin Urbaez ; Shaji.
Rotation Invariant Neural-Network Based Face Detection
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
“Fingerprint Recognition based on Silicon Chips”.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #23 Biometrics Standards - II November 14, 2005.
A Seminar Report On Face Recognition Technology A Seminar Report On Face Recognition Technology 123seminarsonly.com.
Biometrics Authentication Technology
(Team 1)Jackie Abbazio, Sasha Perez, Denise Silva and Robert Tesoriero (Team 2) Faune Hughes, Daniel Lichter, Richard Oswald and Michael Whitfield Clients:
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
PRESENTATION ON BIOMETRICS
Biometric for Network Security. Finger Biometrics.
GENDER AND AGE RECOGNITION FOR VIDEO ANALYTICS SOLUTION PRESENTED BY: SUBHASH REDDY JOLAPURAM.
Final Year Project Vision based biometric authentication system By Padraic ó hIarnain.
L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometric Keystroke Dynamics Technology Overview.
Application of Facial Recognition in Biometric Security Kyle Ferris.
Managing Secure Biometric Systems Meghan Armes IA Management April 24, 2007.
Face Recognition Technology By Catherine jenni christy.M.sc.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
Tom Face Recognition Software in a border control environment: Non-zero-effort-attacks' effect on False Acceptance Rate.
Face Detection 蔡宇軒.
RAJAT GOEL E.C.-09. The information age is quickly revolutionizing the way transactions are completed. Using the proper PIN gains access, but the user.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
EE368 Final Project Spring 2003
A Seminar Report On Face Recognition Technology
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Application of Facial Recognition in Biometric Security
Biometric technology.
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Hybrid Finger print recognition
Research Institute for Future Media Computing
Presentation transcript:

TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems

Overview: Face Biometrics Facial recognition through the use of computer analysis of facial structure. Software measures a number of points of facial characteristics such as eyes, nose, mouth, angles of key features, and lengths of various portions. Collected data is used to create a template through a mathematical algorithm (Neural-Networks, Eigenface) and the file is stored within the database. File is compared to other files within the database in search of an identity match.

Face Biometrics Continued Face biometric systems employee the capturing of facial pattern characteristics through the use of still photography or video clips. Pattern recognition software relies on:  Data collection – raw data  Feature extraction – eyes, nose, mouth, etc  Classification – class the object is placed into (male or female, skin tone, etc)

FAR & FRR FAR ( False Acceptance Rating) – the false acceptance rating is the probability that the software will incorrectly declare a successful match between the input data against the database. FRR (False Rejection Rating) – the false rejection rating is the probability that the software will declare a failure to match the input data against the database.

Face Biometric Systems Project The face biometric systems project involved the research and testing of various facial biometric software’s based on criteria set by the clients. Two face biometric software’s were chosen and tested (Luxand FaceSDK & VeriLook).

Software Comparison Table

Luxand’s FaceSDK 1.7 After extensive testing and researching the Face Biometric Systems, we recommend purchasing Luxand’s FaceSDK 1.7 software. It has the following strengths:  Easy to use  Ability to enroll all images  Matches work best at FAR of 50%, but produces matches at FAR of 10%.  Works best for aging *Free demo version used

Enrolled into class database This 1979 image matched with 2007 image 2008 image with 51% similarity This 1979 image matched with 2007 image 2008 image with 51% similarity Luxand FaceSDK Example

Luxand FaceSDK Similarity Matrix

VeriLook 3.2 Designed for biometric system developers and integrators. Allows for easy integration and rapid development of biometric applications using functionality. Can perform simultaneous multiple face detections with the ability to process 100,000 faces per second and it recommends the minimum image size to be 640x480 pixels.

VeriLook Test Result Software works best with high resolution photos. False Acceptance Rating set for 100% All images matched 100% against the same image in the database. The score of 180 is interpreted as an exact match. Free demo version used

VeriLook Aging Result The results show that the photo from 1969 matched a photo from 2008 with a similarity score of 18 or 10%. This result is comparable with the FaceSDK age identification test, where the same image from 1969 matched the same photo from 2008 with a 61.9% similarity rate.

Software Comparison Test Luxand FaceSDK - VeriLook Tests were run using both Luxand FaceSDK 1.7 and VeriLook using the four photos seen here. Similarity ratings varied from one software to the other. Luxand FaceSDK results provided more results based on Similarity Rating than VeriLook.

VeriLook Identification and Authentication Results FaceSDK Identification and Authentication Results Luxand – VeriLook Comparison

Conclusion Luxand FaceSDK 1.7  works very well in identifying face similarity among people in a group  worked relatively well matching an image of the subject as a child VeriLook 3.2  had more limitations than FaceSDK, it only accepted high-res images.  results for the similarity test were lower than the FaceSDK software PDA Security  none of the software tested was suitable for PDA security use Further Work  we recommend further work using 3-D face biometrics software and scanners to find optimal solution for PDA security