Project overview Face Recognition Security System Based on “Image Passport” Algorithm (FRSS)

Slides:



Advertisements
Similar presentations
Bill Roettger Feature Updates for HCV-ID. Overview For Patients Collect: - Patient Information - Insurance Cards - Acceptance of Data Privacy Policy -
Advertisements

Dr. Marc Valliant, VP & CTO
Accel Computerized Maintenance Management System.
Configuration Management
DIGIDOC A web based tool to Manage Documents. System Overview DigiDoc is a web-based customizable, integrated solution for Business Process Management.
A new Network Concept for transporting and storing digital video…………
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
Auditing Computer-Based Information Systems
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.
HORIZONT 1 ProcMan ® The Handover Process Manager Product Presentation HORIZONT Software for Datacenters Garmischer Str. 8 D München Tel ++49(0)89.
Designing new systems or modifying existing ones should always be aimed at helping an organization achieve its goals State the purpose of systems design.
Requirements Specification
Supervised by Prof. LYU, Rung Tsong Michael Department of Computer Science & Engineering The Chinese University of Hong Kong Prepared by: Chan Pik Wah,
Fundamentals of Information Systems, Second Edition
Face Recognition By: Thanh Do Warren Ju. Face Recognition By: Thanh Do Warren Ju.
1 Mon. December 3, 2001A Secure National ID Card Group 8 Chris Marinak Mike Cuvelier Adam Sowers Saud Bangash.
Software Self-Testing
Software Testing Introduction. Agenda Software Testing Definition Software Testing Objectives Software Testing Strategies Software Test Classifications.
TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems.
Facial Recognition CSE 391 Kris Lord.
System Design/Implementation and Support for Build 2 PDS Management Council Face-to-Face Mountain View, CA Nov 30 - Dec 1, 2011 Sean Hardman.
Karthiknathan Srinivasan Sanchit Aggarwal
Web Development Process Description
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
Agenda Topics • Overview of the accounting cycle from e-doc creation to decision support Components of the accounting cycle (ledger attributes, back office.
Visitor Management Solution Wednesday, September 16, 2015.
© 2003 East Collaborative e ast COLLABORATIVE ® eC SoftwareProducts TrackeCHealth.
Chapter 7: Database Systems Succeeding with Technology: Second Edition.
Mi-Gyeong Gwak, Christian Vargas, Jonathan Vinson
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Configuration Management (CM)
Faculty of Computer & Information Software Engineering Third year
1 Schema Registries Steven Hughes, Lou Reich, Dan Crichton NASA 21 October 2015.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #23 Biometrics Standards - II November 14, 2005.
CSCI 152.  A computer database is a structured collection of records or data that is stored in a computer system. A database relies upon software to.
Module 4: Systems Development Chapter 14: Design And Implementation.
1 CSCD 326 Data Structures I Software Design. 2 The Software Life Cycle 1. Specification 2. Design 3. Risk Analysis 4. Verification 5. Coding 6. Testing.
Transforming video & photo collections into valuable resources John Waugaman President - Tygart Technology, Inc.
Principles of Information Systems, Sixth Edition 1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Chapter 1 Introduction to Systems Design and Analysis Systems Analysis and Design Kendall and Kendall Sixth Edition.
Computer Basics SystemsViruses Alternative Input Speech.
Big traffic data processing framework for intelligent monitoring and recording systems 學生 : 賴弘偉 教授 : 許毅然 作者 : Yingjie Xia a, JinlongChen a,b,n, XindaiLu.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Oman College of Management and Technology Course – MM Topic 7 Production and Distribution of Multimedia Titles CS/MIS Department.
Project management Topic 8 Configuration Management.
Face Recognition Technology By Catherine jenni christy.M.sc.
AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM
ZAGAZIG UNIVERSITY-BENHA BRANCH SHOUBRA FACULTY OF ENGINEERING ELECTRICAL ENGINGEERING DEPT. COMPUTER SYSTEM DIVISION GRAUDATION PROJECT 2003.
RAJAT GOEL E.C.-09. The information age is quickly revolutionizing the way transactions are completed. Using the proper PIN gains access, but the user.
WHY ANPR  Enhance the parameter security.  Access control based on Number Plate and ability to restrict of stolen vehicles.  Tracking the wanted.
Advanced Higher Computing Science The Project. Introduction Worth 60% of the total marks for the course Must include: An appropriate interface using input.
Submitted by: Siddharth Jain (08EJCIT075) Shirin Saluja (08EJCIT071) Shweta Sharma (08EJCIT074) VIII Semester, I.T Department Submitted to: Mr. Abhay Kumar.
By: Suvigya Tripathi (09BEC094) Ankit V. Gupta (09BEC106) Guided By: Prof. Bhupendra Fataniya Dept. of Electronics and Communication Engineering, Nirma.
Advanced Higher Computing Science
Configuration Management
Configuration Management
System Design.
FACE RECOGNITION TECHNOLOGY
Applied Software Implementation & Testing
Facial Recognition in Biometrics
ACTi ALPR - Automatic License Plate Recognition
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Test Case Test case Describes an input Description and an expected output Description. Test case ID Section 1: Before execution Section 2: After execution.
Faculty of Science IT Department Lecturer: Raz Dara MA.
Software Requirements Specification (SRS) Template.
Final Design Authorization
Overview Activities from additional UP disciplines are needed to bring a system into being Implementation Testing Deployment Configuration and change management.
Jiwon Kim Steve Seitz Maneesh Agrawala
Presentation transcript:

Project overview Face Recognition Security System Based on “Image Passport” Algorithm (FRSS)

Project targets  Target of this project is creating security system based on face recognition algorithm.  Development will take 1 years.  Target of this project is creating security system based on face recognition algorithm.  Development will take 1 years.

Organization structure Project Leader Prof.Dr. Lead Programmer-1 Programmers 2 ppl Research conlultant-1 Dr. Research conlultant-2 Dr. Lead Programmer-1 Programmers 2 ppl Usability Design Consultant (?)

Other expenses  Other expenses: equipment (for example, particular type of video camera, software, etc.)  On stage 4-5 we will recommend to hire consultant in usability design for 2-3 consultation in order to improve interface design.  Other expenses: equipment (for example, particular type of video camera, software, etc.)  On stage 4-5 we will recommend to hire consultant in usability design for 2-3 consultation in order to improve interface design.

Calendar plan  First stage: Preparations – 2-3 weeks.  Second stage. Alpha version –3 months.  Third stage. Beta version – 2.5 months.  Fourth stage. Beta testing – 1 month.  Fifth stage.Prerelease – 2 months.  Sixth stage. Final testing – 1 month.  Seventh stage. Master release – 2-3 months.  First stage: Preparations – 2-3 weeks.  Second stage. Alpha version –3 months.  Third stage. Beta version – 2.5 months.  Fourth stage. Beta testing – 1 month.  Fifth stage.Prerelease – 2 months.  Sixth stage. Final testing – 1 month.  Seventh stage. Master release – 2-3 months. Extra... This is not final version of plan and it can be changed after budget approval.

First stage: Preparation StageStage descriptionResult Stage 1Security system conception development. Some mathematical algorithm are developed and ready for implimintation on software level. Report Project Leader Concept document development.Concept document ProgrammersLearning engine capabilities and functionality. Initial porgramm modules are programmed and tested. Creating of testing image data base. Report. Image data base. Research Consultants To develop mathematical and algorithmic details of the FRSS at a level sufficient for implementation in software (program source code) during the subsequent stages Report, Algorithms

Second stage: Alpha Version StageStage descriptionResult Stage 2Alpha version FRSS is developed and some parts are ready for presentation. Report Project LeaderFull system concept.System concept. PorgrammersAlpha version is developed and some parts are ready for presentation. Code documentation. Creating of testing image data base. Report: Program, code documentation Research Consultant To develop mathematical and algorithmic details of the FRSS at a level sufficient for implementation in software (program source code) during the subsequent stages Report, Algorithms.

Third stage: Beta Version StageStage descriptionResult Stage 3 Beta version FRSS is developed and ready for the presentation purposes. Operational/source code of FRSS-Beta is fully documented, such as any computer programmer unfamiliar with the code can modify and maintain it. Report, Demo, Program code documentation Project Leader FRSS complete concepte and arhitecture.Report. ProgrammersBuild of demo version. Creating of testing image data base. Report Research Consultant Helping project leader and programmers tracking bugs and solving appearing mathematical and algorithmical problems Report

Fourth stage: Beta Testing StageStage descriptionResult Stage 4Beta version testing. Additional program features Report, Program Project LeaderTracking bugs. Controlling all others to follow main FRSS concept. Improving FRSS concept Report ProgrammersTesting, improving, searching bugs. Working on interface design. Usability design testing. Report, Program Research conlultant Helping project leader and programmers tracking bugs and solving appearing mathematical and algorithmical problems Report

Fifth stage: Prerelease StageStage descriptionResult Stage 5 Completion of FRSS up to prerelease.Prerelease Project leaderComplete FRSS description. Documentation.Report ProgrammersCatching of all possible bugs and development of FRSS up to prerelease version. Interface design. Usability design testing. Report Research consultant Helping project leader and programmers tracking bugs and solving appearing mathematical and algorithmical problems Report, algorithms

Sixth stage: Final Testing StageStage descriptionResult Stage 6 Final testing.Report. Bugreport. Project leaderFinal testing.Report ProgrammersElimination of last bugs.Final release. Research consultant Helping project leader and programmers tracking bugs and solving appearing mathematical and algorithmical problems Report, algorithms.

Seventh stage: Master Release StageStage descriptionResult Stage 7Complete productRelease. ProgrammersTo eliminate last bugs. Complete testing image data base. Release and demo version All others To eliminate last mathematical and algorithmical problems. Report

Calendar Plan: Chart Stage 1 Stage 2 Stage 3 Stage 4 Stage 5 Stage 6 Stage 7

Attachment 1: FRSS FRSS is an automated system of face video-capture, recognition and identification of person. The FRSS scans of observed scene and stores face images of every person passing camera. It analyzes and authenticates input data, calculates invariant features of input face, compares calculated features of input face with features of template faces stored at database and recognizes a person. Face recognition technologies The technology of biometric identification of a person by face image is based on algorithms of recognition and comparison of images. The algorithms are based on a modified method of independent components analysis (ICA). It requires calculation of maximally independent features specific for images of human faces. The system receives digitized video image. Special-purpose algorithms search for a face image, outline it, define exact locations of eyes, position the image and normalize it with respect to perspective transformations. Then the system automatically codes the selected face image for the purpose of definition of the major specific invariant features. Then, the biometric identification system gives out a list of face images with a maximum similarity with the person. The list is sorted by correlation rate of appropriate vectors. In case the index of vector correlation is high and exceeds a specified peak value, it is possible to consider the person being identified. FRSS is an automated system of face video-capture, recognition and identification of person. The FRSS scans of observed scene and stores face images of every person passing camera. It analyzes and authenticates input data, calculates invariant features of input face, compares calculated features of input face with features of template faces stored at database and recognizes a person. Face recognition technologies The technology of biometric identification of a person by face image is based on algorithms of recognition and comparison of images. The algorithms are based on a modified method of independent components analysis (ICA). It requires calculation of maximally independent features specific for images of human faces. The system receives digitized video image. Special-purpose algorithms search for a face image, outline it, define exact locations of eyes, position the image and normalize it with respect to perspective transformations. Then the system automatically codes the selected face image for the purpose of definition of the major specific invariant features. Then, the biometric identification system gives out a list of face images with a maximum similarity with the person. The list is sorted by correlation rate of appropriate vectors. In case the index of vector correlation is high and exceeds a specified peak value, it is possible to consider the person being identified.

Attachment 1: FRSS (cont.) FRSS Features  Face detection, segmentation and database storage  Feature Extraction  Person identification  Operative notification by preset schemes - for instance, in case a captured face is similar to an image of a criminal stored at the database  Quality transfer of video data via low-bandwidth communication channels  High level of access control and automated management: every access attempt, including unauthorized, are registered by the module  Compact backup archives containing large volumes of data  Export of specified images  Export, printing and transfer of images  Support of external execution devices  Registration of all events (movements, changes of background)  Flexible choice of recording modes - for instance, registration of faces stored at the database  Sorting and search of events by date, time and type  Simultaneous playback, recording and search of backup data FRSS Features  Face detection, segmentation and database storage  Feature Extraction  Person identification  Operative notification by preset schemes - for instance, in case a captured face is similar to an image of a criminal stored at the database  Quality transfer of video data via low-bandwidth communication channels  High level of access control and automated management: every access attempt, including unauthorized, are registered by the module  Compact backup archives containing large volumes of data  Export of specified images  Export, printing and transfer of images  Support of external execution devices  Registration of all events (movements, changes of background)  Flexible choice of recording modes - for instance, registration of faces stored at the database  Sorting and search of events by date, time and type  Simultaneous playback, recording and search of backup data

Attachment 1: FRSS (cont.) Applications FRSS is designed for operation at public places, airports, stadiums, plants, prisons, and military sites.  Investigation and search activities. Upon recognition of a person, operator receives all available information and notifies law-enforcement authorities, if required.  Entrance and security check-points. Every person passing check-point is automatically registered at database (date, time, images). It is always possible to get later information on every person passed through.  Closed objects, requiring stronger access control measures. Traditional access control systems give intruders an opportunity of unauthorized access with false or another person's ID card. The FRSS module authenticates card holder automatically - by comparing faces with database data.  Face identification at frontier posts (by means of databases containing images of terrorists and wanted criminals), simultaneous authentication of a face with passport or ID photo.  Issuing authorities. Prevention of issue of duplicated documents, such as driver licenses, ID cards, etc. Applications FRSS is designed for operation at public places, airports, stadiums, plants, prisons, and military sites.  Investigation and search activities. Upon recognition of a person, operator receives all available information and notifies law-enforcement authorities, if required.  Entrance and security check-points. Every person passing check-point is automatically registered at database (date, time, images). It is always possible to get later information on every person passed through.  Closed objects, requiring stronger access control measures. Traditional access control systems give intruders an opportunity of unauthorized access with false or another person's ID card. The FRSS module authenticates card holder automatically - by comparing faces with database data.  Face identification at frontier posts (by means of databases containing images of terrorists and wanted criminals), simultaneous authentication of a face with passport or ID photo.  Issuing authorities. Prevention of issue of duplicated documents, such as driver licenses, ID cards, etc.