Professional Documents
Culture Documents
com
INTRODUCTION
Using the proper PIN gains access, but the user of the PIN is not
verified. When credit and ATM cards are lost or stolen, an unauthorized user
can often come up with the correct personal codes. Despite warning, many
people continue to choose easily guessed PIN's and passwords: birthdays,
phone numbers and social security numbers. Recent cases of identity theft have
hightened the nee for methods to prove that someone is truly who he/she
claims to be.
Finger-scan
Facial Recognition
Iris-scan
Retina-scan
Hand-scan
Voice-scan
Signature-scan
Keystroke-scan
FACE RECOGNITION
THE FACE:
The face is an important part of who you are and how people
identify you. Except in the case of identical twins, the face is arguably a
person's most unique physical characteristics. While humans have the innate
ability to recognize and distinguish different faces for millions of years ,
computers are just now catching up.
For face recognition there are two types of comparisons .the first
is verification. This is where the system compares the given individual with
who that individual says they are and gives a yes or no decision. The second is
identification. This is where the system compares the given individual to all the
101seminartopics.com
other individuals in the database and gives a ranked list of matches. All
identification or authentication technologies operate using the following four
stages:
Accept/
Project
Figure 1
101seminartopics.com
Figure 2
101seminartopics.com
Figure 3.
Enrollement Module
Preprossesing Analysed
and Analysis data
segmentation
Verification Module
Preprossesing Face reg
and Analysis &
segmentation scoring
Accept/Reject
Figure 4
PERFORMANCE
Response time:
The time period required by a biometric system to return a
decision on identification of a sample.
101seminartopics.com
Enrollment time:
The time period a person must spend to have his/her facial
reference template successfully created.
Data acquisition:
Input processing:
Block diagram:
Talking Face
Lip Tracker
Normalization
Thresholding
alignment
Figure 5
101seminartopics.com
FACE SYNERGETIC
EXTRACTION COMPUTER
DECISION
FACE IMAGE STRATEG
Y
LIP SYNERGETIC
MOVEMENT COMPUTER
Figure 6
If you look at the mirror, you can see that your face has certain
distinguishable landmarks. These are the peaks and valleys that make up the
different facial features. Visionics defines these landmarks as nodal points.
101seminartopics.com
There are about 80 nodal points on a human face. Here are few nodal points
that are measured by the software.
Figure 7
THE SOFTWARE
Detection
When the system is attached to a video surveillance system, the
recognition software searches the field of view of a video camera for faces. If
there is a face in the view, it is detected within a fraction of a second. A multi-
scale algorithm is used to search for faces in low resolution. (An algorithm is a
program that provides a set of instructions to accomplish a specific task). The
system switches to a high-resolution search only after a head-like shape is
detected.
Alignment
Once a face is detected, the system determines the head's position,
size and pose. A face needs to be turned at least 35 degrees toward the camera
for the system to register it.
Normalization
The image of the head is scaled and rotated so that it can be
registered and mapped into an appropriate size and pose. Normalization is
performed regardless of the head's location and distance from the camera.
Light does not impact the normalization process.
101seminartopics.com
Representation
The system translates the facial data into a unique code. This
coding process allows for easier comparison of the newly acquired facial data
to stored facial data.
Matching
The newly acquired facial data is compared to the stored data and
(ideally) linked to at least one stored facial representation. The heart of the
FaceIt facial recognition system is the Local Feature Analysis (LFA)
algorithm. This is the mathematical technique the system uses to encode faces.
The system maps the face and creates a faceprint, a unique numerical code for
that face. Once the system has stored a faceprint, it can compare it to the
thousands or millions of faceprints stored in a database. Each faceprint is
stored as an 84-byte file. Using facial recognition software, police can zoom in
with cameras and take a snapshot of a face.
Advantages:
Disadvantage:
APPLICATIONS
Government Use
1. Law Enforcement: Minimizing victim trauma by narrowing mugshot
searches, verifying identify for court records, and comparing school
surveillance camera images to known child molesters.
2. Security/Counterterrorism. Access control, comparing surveillance images
to known terrorists.
3. Immigration: Rapid progression through Customs.
Commercial Use
1. Day Care: Verify identity of individuals picking up the children.
2. Residential Security: Alert homeowners of approaching personnel.
3. Voter verification: Where eligible politicians are required to verify their
identity during a voting process. this is intended to stop 'proxy' voting
where the vote may not go as expected.
4. Banking using ATM: The software is able to quickly verify a customers
face .
5. Physical access control of buildings areas ,doors, cars or net access.
101seminartopics.com
CONCLUSION
BIBLIOGRAPHY
1. ELECTRONICS FOR YOU- Part 1 April 2001
Part 2 May 2001
2. ELECTRONIC WORLD - DECEMBER 2002
3. MODERN TELEVISION ENGINEERING- Gulati R.R
4. IEEE INTELLIGENT SYSTEMS - MAY/JUNE 2003
5. WWW.FACEREG.COM
6. WWW. IMAGESTECHNOLOGY.COM
7. WWW.IEEE.COM
101seminartopics.com
ABSTRACT
CONTENTS
1. INTRODUCTION
2. FACE RECOGNITION
3. CAPTURING OF IMAGE BY STANDARD VIDEO
CAMERAS
4. COMPONENTS OF FACE RECOGNITION SYSTEMS
5. PERFORMANCE
6. IMPLEMENTATION OF FACE RECOGNITION
TECHNOLOGY
7. HOW FACE RECOGNITION SYSTEMS WORK -An
example
8. THE SOFTWARE
9. ADVANTAGES AND DISADVANTAGES
10. APPLICATIONS
11. CONCLUSION
12. REFERENCES
101seminartopics.com
ACKNOWLEDGEMENT
I also thank all the other faculty members of AEI department and my
friends for their help and support.