SlideShare a Scribd company logo
1 of 13
FACE RECOGNITION
TECHNOLOGY
INTRODUCTION
Facial recognition (or face recognition) is a type of biometric software
application that can identify a specific individual in a digital image by analyzing and
comparing patterns.
Facial recognition systems are commonly used for security purposes but are
increasingly being used in a variety of other applications. For example, Facebook uses
facial recognition software to help automate user tagging in photographs.
1. What are biometrics?
Ans: A biometric is a unique, measurable characteristic of a human being that can be
used to automatically recognize an individual or verify an individual identity. Biometrics
can measure both physiological and behavioral characteristics.
Physiological biometrics (based on measurements and data derived from direct the
human body) include:
a. Finger-scan ,
b. Facial Recognition,
c. Iris-scan ,
d. Retina-scan and
e. Hand-scan.
Behavioral biometrics (based on measurements and data derived from an action)
include:
a. Voice-scan ,
b. Signature-scan and
c. Keystroke-scan .
FACE RECOGNITION
The face is an important part of who you are and how people identify you.
For face recognition there are two types of comparisons.
The first is verification and the second is identification.
verification is where the system compares the given individual with who that
individual says they are and gives a yes or no decision..
identification is where the system compares the given individual to all the
Other individuals in the database and gives a ranked list of matches.
All identification or authentication technologies operate using the following
four stages:
1. Capture: A physical sample is captured by the system during enrollment and
also in identification or Verification process.
2. Extraction: unique data is extracted from the sample and a template is
created.
3. Comparison: the template is then compared with a new sample.
4. Match/Non match: the system decides if the features extracted from the
new
CAPTURING OF IMAGE BY STANDARD
VIDEO CAMERAS
The image is optical in characteristics and may be thought of as a collection of a
large number of bright and dark areas representing the picture details.
In other words the picture information is a function of two variables:
Time and Space.
It would require infinite number of channels to transmit optical information
corresponding to picture elements simultaneously. There is practical difficulty in
transmitting all information simultaneously so we use a method called scanning.
COMPONENTS OF FACE RECOGNITION
SYSTEMS
The 3 main components of face recognition systems, they are as follows
 Enrollment module,
 Database and
 Identification module.
HOW FACE RECOGNITION SYSTEMS WORK
Facial recognition software is based on the ability to first recognize faces, which
is a technological feat in itself.
If you look at the mirror, you can see that your face has certain distinguishable
landmarks. These are the peaks and valleys that make up the different facial features.
There are about 80 nodal points on a human face. Here are few nodal points that
are measured by the software.
• Distance between the eyes
• Width of the nose
• Depth of the eye socket
• Cheekbones
• Jaw line and
• Chin
These nodal points are measured to create a numerical code, a string of numbers
that represents a face in the database. This code is called face print.
Only 14 to 22 nodal points are needed for faceit software to complete the
recognition process
IMPLEMENTATION OF FACE RECOGNITION
TECHNOLOGY
The implementation of face recognition technology includes the following four
stages:
1. Data acquisition,
2. Input processing ,
3. Face image classification and
4. Decision making .
PERFORMANCE
1. False rejection rates (FRR) :
The probability that a system will fail to identify an enrollee. It is also called
type 1 error rate.
FRR= NFR/NEIA
Where
FRR= false rejection rates
NFR= number of false rejection rates
NEIA= number of enrollee identification attempt
2. False acceptance rate (FAR) :
The probability that a system will incorrectly identify an individual or will fail
to reject an imposter. It is also called as type 2 error rate
FAR= NFA/NIIA
Where
FAR= false acceptance rate
NFA= number of false acceptance
NIIA= number of imposter identification attempts
SOFTWARES
Facial recognition software falls into a larger group of technologies known as
biometrics. Facial recognition methods may vary, but they generally involve a series of
steps that serve to capture, analyze and compare your face to a database of stored images.
The basic process that is used by the Faceit system to capture and compare
images:
1. Detection,
2. Alignment,
3. Normalization,
4. Representation and
5. Matching.
Advantages :
1. There are many benefits to face recognition systems such as its convenience
and Social acceptability. All you need is your picture taken for it to work.
2. Face recognition is easy to use and in many cases it can be performed without
a Person even knowing.
3. Face recognition is also one of the most inexpensive biometric in the market
and Its price should continue to go down.
ADVANTAGES AND DISADVANTAGES
Disadvantage:
1. Face recognition systems cant tell the difference between identical twins.
There are numerous applications for face recognition technology:
Commercial Use:
a. Day Care: Verify identity of individuals picking up the children.
b. Residential Security: Alert homeowners of approaching personnel
c. Voter verification: Where eligible politicians are required to verify
their identity during a voting process.
d. Banking using ATM: The software is able to quickly verify a customer.
APPLICATIONS
Face recognition technologies have been associated generally with very costly
top secure applications. Today the core technologies have evolved and the cost of
equipment is going down dramatically due to the integration and the increasing
processing power. Certain applications of face recognition technology are now cost
effective, reliable and highly accurate.
CONCLUSION
THANK YOU
For any mistakes and suggestion’s feel free to text here
idamakanti.jaswanth@gmail.com

More Related Content

What's hot

Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyShubhamLamichane
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition SystemZara Tariq
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyranjit banshpal
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdarraihansikdar
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 
FACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTFACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTSaghir Hussain
 
biometric technology
biometric technologybiometric technology
biometric technologyAnmol Bagga
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyPushkar Dutt
 
Facial recognition
Facial recognitionFacial recognition
Facial recognitionSonam1891
 
Face Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaFace Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaArjun Agnihotri
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShravan Halankar
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemKarmesh Maheshwari
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionNikyaa7
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1leenak770
 
Face recognition
Face recognition Face recognition
Face recognition Chandan A V
 

What's hot (20)

Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
 
Face recognisation system
Face recognisation systemFace recognisation system
Face recognisation system
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
FACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTFACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPT
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Final year ppt
Final year pptFinal year ppt
Final year ppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
 
Face Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaFace Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun Sharma
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance System
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
 
Face Detection
Face DetectionFace Detection
Face Detection
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face recognition
Face recognition Face recognition
Face recognition
 

Viewers also liked

Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection SystemAbhiroop Ghatak
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition systemDivya Sushma
 
Pattern recognition palm print authentication system
Pattern recognition palm print authentication systemPattern recognition palm print authentication system
Pattern recognition palm print authentication systemMazin Alwaaly
 
Palmprint recognition presentation
Palmprint recognition presentationPalmprint recognition presentation
Palmprint recognition presentationAlexandru Dorobantu
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognitionsunjaysahu
 
Automated attendance system based on facial recognition
Automated attendance system based on facial recognitionAutomated attendance system based on facial recognition
Automated attendance system based on facial recognitionDhanush Kasargod
 
Enhancement in spatial domain
Enhancement in spatial domainEnhancement in spatial domain
Enhancement in spatial domainAshish Kumar
 

Viewers also liked (9)

Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection System
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
 
Pattern recognition palm print authentication system
Pattern recognition palm print authentication systemPattern recognition palm print authentication system
Pattern recognition palm print authentication system
 
gait analysis
gait analysisgait analysis
gait analysis
 
Palmprint recognition presentation
Palmprint recognition presentationPalmprint recognition presentation
Palmprint recognition presentation
 
Kb gait-recognition
Kb gait-recognitionKb gait-recognition
Kb gait-recognition
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Automated attendance system based on facial recognition
Automated attendance system based on facial recognitionAutomated attendance system based on facial recognition
Automated attendance system based on facial recognition
 
Enhancement in spatial domain
Enhancement in spatial domainEnhancement in spatial domain
Enhancement in spatial domain
 

Similar to FACE RECOGNITION TECHNOLOGY

Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by RohitRohit Shrivastava
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By RohitRohit Shrivastava
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdfPoooi2
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
46835255-Face-Recognition-Technology.pptx
46835255-Face-Recognition-Technology.pptx46835255-Face-Recognition-Technology.pptx
46835255-Face-Recognition-Technology.pptx4GH20CS408Rajeshk
 
seminar presentation on Face ricognition technology
seminar presentation on Face ricognition technologyseminar presentation on Face ricognition technology
seminar presentation on Face ricognition technologyJawhar Ali
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONLisa Cain
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendacesbk50000
 
Face detection By Abdul Hanan
Face detection By Abdul HananFace detection By Abdul Hanan
Face detection By Abdul HananAbdul Hanan
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognitionMazin Alwaaly
 
Face Recognition
Face Recognition Face Recognition
Face Recognition nialler27
 
ppt minor project.pptx
ppt minor project.pptxppt minor project.pptx
ppt minor project.pptxDakshthakur9
 
Facial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdfFacial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdftalkaton
 
Keep secure data with biometric system
Keep secure data with biometric systemKeep secure data with biometric system
Keep secure data with biometric systemdominichilton98
 
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET Journal
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition applicationawadhesh kumar
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face RecognitionIRJET Journal
 

Similar to FACE RECOGNITION TECHNOLOGY (20)

Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by Rohit
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By Rohit
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
 
46835255-Face-Recognition-Technology.pptx
46835255-Face-Recognition-Technology.pptx46835255-Face-Recognition-Technology.pptx
46835255-Face-Recognition-Technology.pptx
 
seminar presentation on Face ricognition technology
seminar presentation on Face ricognition technologyseminar presentation on Face ricognition technology
seminar presentation on Face ricognition technology
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITION
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendace
 
Face detection By Abdul Hanan
Face detection By Abdul HananFace detection By Abdul Hanan
Face detection By Abdul Hanan
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
 
Biometrics
BiometricsBiometrics
Biometrics
 
Face Recognition
Face Recognition Face Recognition
Face Recognition
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
ppt minor project.pptx
ppt minor project.pptxppt minor project.pptx
ppt minor project.pptx
 
Facial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdfFacial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdf
 
Keep secure data with biometric system
Keep secure data with biometric systemKeep secure data with biometric system
Keep secure data with biometric system
 
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric Learning
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition application
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face Recognition
 

More from JASHU JASWANTH

TYPES OF TESTS ON CONCRETE
TYPES OF TESTS ON CONCRETETYPES OF TESTS ON CONCRETE
TYPES OF TESTS ON CONCRETEJASHU JASWANTH
 
Fiber Reinforced Concrete (FRC)
Fiber Reinforced Concrete (FRC)Fiber Reinforced Concrete (FRC)
Fiber Reinforced Concrete (FRC)JASHU JASWANTH
 
MAINTENANCE STRATEGIES & CASE STUDIES
MAINTENANCE STRATEGIES & CASE STUDIESMAINTENANCE STRATEGIES & CASE STUDIES
MAINTENANCE STRATEGIES & CASE STUDIESJASHU JASWANTH
 
Non-Destructive Testing (NDT)
Non-Destructive Testing (NDT)Non-Destructive Testing (NDT)
Non-Destructive Testing (NDT)JASHU JASWANTH
 
SHANGHAI TOWER - Shanghai, China
SHANGHAI TOWER - Shanghai, ChinaSHANGHAI TOWER - Shanghai, China
SHANGHAI TOWER - Shanghai, ChinaJASHU JASWANTH
 
Concept & Construction of PALM ISLAND
Concept & Construction of PALM ISLANDConcept & Construction of PALM ISLAND
Concept & Construction of PALM ISLANDJASHU JASWANTH
 
COMPUTER VISION SYNDROME( CVS ) with SOFTWARE LINK involved in it.
COMPUTER VISION SYNDROME( CVS ) with SOFTWARE LINK involved in it.COMPUTER VISION SYNDROME( CVS ) with SOFTWARE LINK involved in it.
COMPUTER VISION SYNDROME( CVS ) with SOFTWARE LINK involved in it.JASHU JASWANTH
 
The Empowerment of Women
The Empowerment of WomenThe Empowerment of Women
The Empowerment of WomenJASHU JASWANTH
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYJASHU JASWANTH
 
DETAILS OF TOUGHENED GLASS OR TEMPER GLASS
DETAILS OF TOUGHENED GLASS OR TEMPER GLASSDETAILS OF TOUGHENED GLASS OR TEMPER GLASS
DETAILS OF TOUGHENED GLASS OR TEMPER GLASSJASHU JASWANTH
 
MULTIPLE CHOICE QUESTIONS for civil engineering students or may be for engine...
MULTIPLE CHOICE QUESTIONS for civil engineering students or may be for engine...MULTIPLE CHOICE QUESTIONS for civil engineering students or may be for engine...
MULTIPLE CHOICE QUESTIONS for civil engineering students or may be for engine...JASHU JASWANTH
 
WIRELESS MOBILE CHARGING USING MICROWAVES
 WIRELESS MOBILE CHARGING USING MICROWAVES  WIRELESS MOBILE CHARGING USING MICROWAVES
WIRELESS MOBILE CHARGING USING MICROWAVES JASHU JASWANTH
 

More from JASHU JASWANTH (15)

TYPES OF TESTS ON CONCRETE
TYPES OF TESTS ON CONCRETETYPES OF TESTS ON CONCRETE
TYPES OF TESTS ON CONCRETE
 
Fiber Reinforced Concrete (FRC)
Fiber Reinforced Concrete (FRC)Fiber Reinforced Concrete (FRC)
Fiber Reinforced Concrete (FRC)
 
MAINTENANCE STRATEGIES & CASE STUDIES
MAINTENANCE STRATEGIES & CASE STUDIESMAINTENANCE STRATEGIES & CASE STUDIES
MAINTENANCE STRATEGIES & CASE STUDIES
 
Non-Destructive Testing (NDT)
Non-Destructive Testing (NDT)Non-Destructive Testing (NDT)
Non-Destructive Testing (NDT)
 
SHANGHAI TOWER - Shanghai, China
SHANGHAI TOWER - Shanghai, ChinaSHANGHAI TOWER - Shanghai, China
SHANGHAI TOWER - Shanghai, China
 
Concept & Construction of PALM ISLAND
Concept & Construction of PALM ISLANDConcept & Construction of PALM ISLAND
Concept & Construction of PALM ISLAND
 
COMPUTER VISION SYNDROME( CVS ) with SOFTWARE LINK involved in it.
COMPUTER VISION SYNDROME( CVS ) with SOFTWARE LINK involved in it.COMPUTER VISION SYNDROME( CVS ) with SOFTWARE LINK involved in it.
COMPUTER VISION SYNDROME( CVS ) with SOFTWARE LINK involved in it.
 
The Empowerment of Women
The Empowerment of WomenThe Empowerment of Women
The Empowerment of Women
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
 
UNITS & CONVERSIONS
UNITS & CONVERSIONSUNITS & CONVERSIONS
UNITS & CONVERSIONS
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
HOW TO TEMPER GLASS ?
HOW TO TEMPER GLASS ?HOW TO TEMPER GLASS ?
HOW TO TEMPER GLASS ?
 
DETAILS OF TOUGHENED GLASS OR TEMPER GLASS
DETAILS OF TOUGHENED GLASS OR TEMPER GLASSDETAILS OF TOUGHENED GLASS OR TEMPER GLASS
DETAILS OF TOUGHENED GLASS OR TEMPER GLASS
 
MULTIPLE CHOICE QUESTIONS for civil engineering students or may be for engine...
MULTIPLE CHOICE QUESTIONS for civil engineering students or may be for engine...MULTIPLE CHOICE QUESTIONS for civil engineering students or may be for engine...
MULTIPLE CHOICE QUESTIONS for civil engineering students or may be for engine...
 
WIRELESS MOBILE CHARGING USING MICROWAVES
 WIRELESS MOBILE CHARGING USING MICROWAVES  WIRELESS MOBILE CHARGING USING MICROWAVES
WIRELESS MOBILE CHARGING USING MICROWAVES
 

Recently uploaded

Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 

Recently uploaded (20)

Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 

FACE RECOGNITION TECHNOLOGY

  • 2. INTRODUCTION Facial recognition (or face recognition) is a type of biometric software application that can identify a specific individual in a digital image by analyzing and comparing patterns. Facial recognition systems are commonly used for security purposes but are increasingly being used in a variety of other applications. For example, Facebook uses facial recognition software to help automate user tagging in photographs. 1. What are biometrics? Ans: A biometric is a unique, measurable characteristic of a human being that can be used to automatically recognize an individual or verify an individual identity. Biometrics can measure both physiological and behavioral characteristics. Physiological biometrics (based on measurements and data derived from direct the human body) include: a. Finger-scan , b. Facial Recognition, c. Iris-scan , d. Retina-scan and e. Hand-scan. Behavioral biometrics (based on measurements and data derived from an action) include: a. Voice-scan , b. Signature-scan and c. Keystroke-scan .
  • 3. FACE RECOGNITION The face is an important part of who you are and how people identify you. For face recognition there are two types of comparisons. The first is verification and the second is identification. verification is where the system compares the given individual with who that individual says they are and gives a yes or no decision.. identification is where the system compares the given individual to all the Other individuals in the database and gives a ranked list of matches. All identification or authentication technologies operate using the following four stages: 1. Capture: A physical sample is captured by the system during enrollment and also in identification or Verification process. 2. Extraction: unique data is extracted from the sample and a template is created. 3. Comparison: the template is then compared with a new sample. 4. Match/Non match: the system decides if the features extracted from the new
  • 4. CAPTURING OF IMAGE BY STANDARD VIDEO CAMERAS The image is optical in characteristics and may be thought of as a collection of a large number of bright and dark areas representing the picture details. In other words the picture information is a function of two variables: Time and Space. It would require infinite number of channels to transmit optical information corresponding to picture elements simultaneously. There is practical difficulty in transmitting all information simultaneously so we use a method called scanning.
  • 5. COMPONENTS OF FACE RECOGNITION SYSTEMS The 3 main components of face recognition systems, they are as follows  Enrollment module,  Database and  Identification module.
  • 6. HOW FACE RECOGNITION SYSTEMS WORK Facial recognition software is based on the ability to first recognize faces, which is a technological feat in itself. If you look at the mirror, you can see that your face has certain distinguishable landmarks. These are the peaks and valleys that make up the different facial features. There are about 80 nodal points on a human face. Here are few nodal points that are measured by the software. • Distance between the eyes • Width of the nose • Depth of the eye socket • Cheekbones • Jaw line and • Chin These nodal points are measured to create a numerical code, a string of numbers that represents a face in the database. This code is called face print. Only 14 to 22 nodal points are needed for faceit software to complete the recognition process
  • 7. IMPLEMENTATION OF FACE RECOGNITION TECHNOLOGY The implementation of face recognition technology includes the following four stages: 1. Data acquisition, 2. Input processing , 3. Face image classification and 4. Decision making .
  • 8. PERFORMANCE 1. False rejection rates (FRR) : The probability that a system will fail to identify an enrollee. It is also called type 1 error rate. FRR= NFR/NEIA Where FRR= false rejection rates NFR= number of false rejection rates NEIA= number of enrollee identification attempt 2. False acceptance rate (FAR) : The probability that a system will incorrectly identify an individual or will fail to reject an imposter. It is also called as type 2 error rate FAR= NFA/NIIA Where FAR= false acceptance rate NFA= number of false acceptance NIIA= number of imposter identification attempts
  • 9. SOFTWARES Facial recognition software falls into a larger group of technologies known as biometrics. Facial recognition methods may vary, but they generally involve a series of steps that serve to capture, analyze and compare your face to a database of stored images. The basic process that is used by the Faceit system to capture and compare images: 1. Detection, 2. Alignment, 3. Normalization, 4. Representation and 5. Matching.
  • 10. Advantages : 1. There are many benefits to face recognition systems such as its convenience and Social acceptability. All you need is your picture taken for it to work. 2. Face recognition is easy to use and in many cases it can be performed without a Person even knowing. 3. Face recognition is also one of the most inexpensive biometric in the market and Its price should continue to go down. ADVANTAGES AND DISADVANTAGES Disadvantage: 1. Face recognition systems cant tell the difference between identical twins.
  • 11. There are numerous applications for face recognition technology: Commercial Use: a. Day Care: Verify identity of individuals picking up the children. b. Residential Security: Alert homeowners of approaching personnel c. Voter verification: Where eligible politicians are required to verify their identity during a voting process. d. Banking using ATM: The software is able to quickly verify a customer. APPLICATIONS
  • 12. Face recognition technologies have been associated generally with very costly top secure applications. Today the core technologies have evolved and the cost of equipment is going down dramatically due to the integration and the increasing processing power. Certain applications of face recognition technology are now cost effective, reliable and highly accurate. CONCLUSION
  • 13. THANK YOU For any mistakes and suggestion’s feel free to text here idamakanti.jaswanth@gmail.com