Professional Documents
Culture Documents
Performance and comparison with other forms of biometrics p.14 Implementing a facial recognition system
p.16
- The origins - Facial recognition with good quality portraits - General facial recognition
The applications
- Criminal Justice
p.6
- Integrating facial recognition in the existing technical environment - Managing the expectations of customers and operators - Developing the expertise of operators
- Expertise in data acquisition - Expertise in checking searches
- Identification and maintenance of a portrait reference database - Identity checks in the field - Criminal investigations and information - Prevention
p.18
The Technology
- The different steps of automatic facial recognition
p.22 p.23
- Step 1 - image acquisition - Step 2 - face searches with scaling and alignment - Step 3 - enhancement of face images - Step 4 - extraction of characteristics - Step 5 - representation as a template and comparison - Step 6 - thresholding and decision-making
Introduction
For obvious reasons, the human brain and visual organs can be considered the best existing
face recognition machine ever and forever. A specific area of the human brain called fusiform face area (FFA) has been proven to be totally dedicated to this task. Because face recognition is the most natural thing for any human being, facial recognition would appear to be the most natural of biometric techniques. Human face recognition is the most widely used way of identification or authentication of identity, and accounts for the presence of portraits on most of the identification documents that we carry in our purses and wallets, be it an ID card, driver license, credit card, library card or gym club card. This apparent ease of use is the cause for many fantasies, inconsistencies and difficulties while implementing automatic face recognition systems in the field. Because the technology has an outstanding competitor : the human brain, trained from birth to somehow do the exact same thing There are many applications. Automatic facial recognition is actually used in civil spheres in order to guarantee the unique nature of identity documents and in military or law enforcement applications, since the human face easily leaves traces when crimes are recorded by CCTV cameras or the cameras of witnesses. The acquisition of portrait images is simple, contactless and does not require any highly specific equipment; a fact that facilitates the implementation of automatic facial recognition. Rapid advances are being made in facial recognition technology, and it thus has every trait expected of a major biometric technique, up to the point where it is on the verge of taking on its greatest challenge: beat the human brain, best face recognition machine ever, but not forever. Still, in order to deliver its full efficiency, a number of caveats have to be taken into account during implementation. In an effort to answer the increasing number of questions being put forward, Morpho has taken stock of facial recognition in general, its use, the state of the art of the technology and its technical and commercial potential.
A brief background
The origins
From the very advent of photography, both government agencies and private organizations have kept collections of portraits and ID photos have gradually made their way onto all personal identification documents, from the most official passports to informal membership cards issued by sports clubs. Before the use of computers to recognize faces was even considered a possibility, facial recognition was already the subject of a great deal of research. Examples include: the development of identification parade or lineup(1) techniques in the United Kingdom, in which a witness is confronted with a group of physically similar people, one of whom is a suspect. The witness must decide whether one of the persons in the group was present at the scene of the crime. the work done by Bertillon on face classification. In order to recognize delinquents who are repeatedly arrested, without having to resort to large collections of portraits, Bertillon suggested that the portraits be sorted by common morphological characteristics, i.e. the specific shapes of the different parts of the face. This classification is known as the spoken portrait.
(1)
the distinctive characteristics of faces from a broad sample of portraits using each complete image rather than local characteristics (e.g. the eyes, nose or mouth).
The Applications
Automatic facial recognition is a form of biometrics. It is used for authentication (checking that a person really is who they say they are) and identification (finding out who someone is from a group of known persons). Like most biometric techniques, facial recognition has applications in the policing and civil fields and for access control. Facial recognition is special due to the portraits themselves, which are widely available and easy to acquire. Their use is acceptable to the general public. Criminal Justice
Identification and maintenance of a portrait reference database
Just like automatic fingerprint recognition, facial recognition allows police forces to manage the files of people of interest by making sure that there are not several different records for a single person. While this task is already performed using fingerprints, facial recognition provides more benefits: it increases population coverage of the identification scheme, enabling identification of individuals whose fingerprints cannot be acquired for various reasons by combining the two biometric modalities, superior identification performance can be achieved, therefore reducing the workload involved in the verification process The Pierce County Sheriffs Office in Washington, USA, demonstrated the high precision of the automatic facial identification of suspects and that identification is possible without calling on fingerprint experts.
successfully close investigations if the film only shows the top of the suspects head or if the images are blurred. The combined advances of video surveillance systems and facial recognition technology should enable more crimes to be solved using video data in the next few years. Another source of facial images is the facial composite picture. If the recollections of the victim or the witnesses are precise enough to make a facial composite picture resembling the offender, then investigation by facial recognition may lead to success.
Prevention
Facial recognition can also be used for preventive purposes. It can be used to search for precedents. By way of example, if a file of pedophiles is available, then ID photos can be used to check whether people who work with children are in the file. In some cases, facial recognition can also be used to interactively locate persons wanted by the police in video footage. This application is subject to controversy, since it is often considered to infringe civil liberties. In any case, it is not currently suited to cases in which a very small number of persons need to be identified in a crowd. Even if this technique were to reach the excellent accuracy level of 90% of persons actually found with just 0.1% false alarms, looking for one person amongst a crowd of 100,000 passing people per day would operationally generate 100 false alarms per day. This would have a negative impact on the vigilance of control operators.
On the other hand, interactive facial recognition is already possible in controlled passages. By way of example, when travelers approach the border police for a travel document check using facial biometry, they must be cooperative and show their face. In this case, it is quite easy to check the travel documents and make a comparison with the lists of wanted persons. The operators who check passport control processes can also check any alerts received in response to these searches.
As a consequence, facial recognition applications can be used to guarantee that a single motorist cannot possess several driving licenses. Morpho developed a solution for this very purpose for the state of New South Wales in Australia. With regard to travel documents, the ICAO has recommended that the portrait should be the only compulsory biometric record.
This application is so easy to use that a broad range of usages is possible. For example, it would be easy for universities to check the identity of students when they arrive to take an exam (authentication checks).
Access control
The purpose of access control is to check that anyone attempting to access a secure zone is entitled to do so. Access controls are made in the same way as ID checks. They are very easy for the user if facial recognition is used. The main advantage of portraits is that checks can still be made once the person has passed through the access barrier. If the access control gates are unmanned, then staff members could easily allow strangers to enter limited-access zones. But thanks to portraits, which can be acquired without any special cooperation, it is possible to check permanently that the people in protected zones are indeed entitled to be there. Facial recognition can therefore be used to extend access control by checking presence in particularly sensitive environments.
The Technology
This chapter describes the different steps in the facial recognition process and describes the main technologies that are available today.
Step 3: enhancement of face images
Once the faces have been found and calibrated, they need to be enhanced. By way of example, the effects of compression can be minimized, inconsistent lighting can be corrected or unusable zones (masked by a veil, for example) can be detected and excluded. In this step, models can be applied to correct the orientation of the face, the effects of ageing and expressions. While some enhancements can be made automatically, the assistance of an operator may prove to be very useful when working on difficult images.
10
learning algorithms, which apply a mathematical logic in order to define and use the criteria that an operator may not be capable of interpreting. Both categories of algorithms can be used for different types of face data: fixed images, videos, or 3D acquisitions.
Procedural algorithms
The main procedural algorithms use the visible facial landmarks, such as the corner of the eye, the middle of the upper lip, the lowest point of the chin or the details and color of the skin. After detecting the landmarks of the face - a process that may be manually assisted - the procedural algorithms attempt to measure the coherence between the parts of the two faces. They do this by using models designed to demonstrate how a face is distorted by its expression, age, orientation and lighting. The most commonly used algorithms in this category are Elastic Bunch Graph Matching (EBGM) and the comparison of facial texture. Facial texture analysis is used in particular to distinguish twins. These algorithms are used (at step 5 above) to convert images into templates in order to compare them.
11
Training algorithms
Training methods rely on an abstract process in order to find independently an optimal organization based on examples. There is a great number of training algorithms. Examples include: Vector projections. The input used by these methods is a large vector - the characteristics extracted in step4 - which is then projected in a smaller space. If the two original images match the same person, they must have close projected vectors. If they represent two different persons, then the projected vectors are more distant. It is the definition of the projection that is complex, and leads to the training process. The most common methods are: Principal component analysis (PCA), which extracts the most distinctive vectors from a space. Eigenfaces apply this principle.
Y Y
Independent component analysis (ICA), which keeps the axes as independent from one another as possible. Non-linear methods, including Kernels and SVMs* (Support Vector Machines).
Separation may be easier in higher dimensions
Feature map
N eural networks. These networks use a set of cells that transform the information that they exchange with one another. They resemble neurons, synapses and nervous influx. Neural networks are defined by training. In the comparison phase, the characteristics extracted from the portrait are entered for input into the network. The network output is used to decide whether the face resembles the different faces in the reference database.
DB
I1 H1 25 x 25 Original image I3 O40 H50 I2 H2 O2 O1
Detection boundary
I625
1.060
1.062
1.064
1.066
1;068
1.070
1.072
1.074
Statistical methods. These methods seek to measure the probability that a photo matches a statistical model of the face. Each face is represented in the comparator by its statistical model, e.g. by a number of states, their respective probability and the probability of transition from one state to another. New facial images are represented as a sequence of successive
12
states. For each face in the reference database, the level of probability of the sequence can be determined in order to decide whether the resemblance between the two images is high or not. Training algorithms are obviously used in step 5 (representation as templates and comparison), but they can also be used to locate faces in images (step 2) and to extract visible facial landmarks.
face or by stereoscopy*. Morpho has developed an innovative 3D acquisition concept based on stereoscopy that is capable of acquiring a face on the fly when a person passes through a control gate without stopping. It is called Face on the Fly* technology. 3D technology can be used, even without any 3D sensors. 3D morphable models can be used to take one or more images of the same face and associate a 3D shape that matches the face as closely as possible. This association significantly improves the robustness of the comparison of oriented faces.
Light sources
The images used for facial recognition are usually taken in visible light. But infrared images can also be used and research is currently looking into other data types, such as terahertz*.
Special features of 3D
Faces are naturally three-dimensional. If a face is to be completely represented, then its shape and the color or texture of every part of the face must be known. Photos only contain the color of part of the face. Therefore they only contain partial, or 2D, information. Traditional face comparison techniques rely on these incomplete data. Using all the information of the face can only serve to improve the precision of facial recognition. The European 3D Face project (http://www.3dface.org/) has demonstrated how the association of 2D data (texture) and 3D data (shape) improves precision compared with the use of only the texture or the shape. The acquisition of three-dimensional images requires special sensors that are not yet widely available. These sensors work by projecting structured light onto the
13
with 0.1% of false acceptances. This means that, for example, in the ideal passport control application, out of 1,000 authentic passport holders, only 10 would not get through the automatic check and would have to call on an operator, while out of 1,000 fraudsters carrying passports that do not belong to them, 999 would be detected by the automatic control system. But we all know that the ideal conditions implemented by the NIST for FRVT 2006 are difficult to achieve operationally. In addition to orientation, resolution and lighting, facial recognition is also confronted with problems due to physical changes and changes in appearance: expression, changes of hair, changes in weight, spectacles, hats, ageing, injuries, illness, etc. The current facial recognition algorithms can only tolerate limited variations in the portrait. For example, if a person allows his beard to grow, then the automatic portrait recognition system will recognize him with almost the same reliability, as if his beard had not changed. If the same person allows his beard to grow and pulls a face, the probability that the system will recognize him drops a little, but still remains high. But if a number of small changes are accumulated (by way of example, if the person allows his beard to grow, pulls a face, does not face the camera, remains a long way away from the camera and conceals a large part of one of the sides of his face with his hand), then the
The lower the rate of false acceptances, the more secure is the application. The lower the rate of false rejections, the greater the comfort for users and the more limited the work done by operators. The tests in NISTs FRVT 2006 demonstrated that, with frontal portraits taken in a strictly controlled environment, with high resolution and only slight differences in age, facial recognition is a very precise biometric technique. False rejections totaled just 1%,
14
probability that he will be recognized is much lower. Since there are no test samples that can be used to measure the impact, with the appropriate statistical validity, of the different criteria that minimize the precision of facial recognition, and since these criteria are not independent, the drop in the precision of facial recognition is not predictable in absolute terms. Consequently, Morpho advises every potential user to proceed with tests and measurements of their own data, depending on their own operational needs. But these tests must not simply take account of the purely algorithmic precision. They must also take the speed of
execution of the algorithms into consideration. A very slow system will necessarily find fewer hits than a fast system, with the same power and precision, and will be more difficult to adapt to the working procedures of the operators. If one compares facial recognition with fingerprinting and iris recognition, then it becomes clear that facial recognition is intrinsically trickier than other biometric techniques. Facial recognition already works well and still has plenty of potential for improvement. Nevertheless, it is quite improbable that it will achieve the same levels of precision as iris or fingerprint recognition in the short term.
Uniqueness Every iris is unique Every fingerprint is unique Number of images Two irises per person to be acquired 10 fingerprints per person, plus other parts of the body where friction ridges are located
Stability over time Invariable from birth Invariable from childhood Representation in the dimensions Easy to represent in 2D and few problems due to orientation
Easy to represent in 2D
Intrinsically 3D
Distortion limited by the elasticity of the skin Usually standard 500 dpi Strong command of the identification process by generations of fingerprinting experts
15
processes and the benefits of using a number of methods that increase the performance of searches and require operators to verify only the most difficult cases. Even if biometric searches are not natively consolidated, multi-biometrics does increase performance: it allows cases to be processed, when one modality is absent or is of poor quality, it can make more extensive, and consequently more efficient links. For example, in a criminal police system, if it is known that a first offense of bank card fraud and a second offense of shoplifting were committed by the same person, because the images show the same face, and if the bank card fraud is solved using fingerprints, then it is highly likely that the shoplifting offense will also be solved. Two isolated systems would not come to the same conclusion. In an effort to facilitate the integration of facial recognition with other information systems, Morpho has developed generic interfaces that meet the ANSI/NISTITL 1-2007 standard for the data format for fingerprints, faces and other biometric data.
Integration with databases allows for a simplified recovery of existing data and allows legacy data acquisition processes to be used. By way of example, in order to add a facial recognition function to a civil status register in order to detect identity fraud, it is always preferable to keep the same civil status register and operate the facial recognition system in back office mode, without impacting the potentially complex processes that are used with the civil status register. Integration with other biometric systems provides for both optimized, redundancy-free data acquisition
16
applications before proceeding with deployment. The independent tests conducted in 2006 by the BKA(1) and also the NPIA(2) serve as an example. Research reports explain perfectly the state of the art, the tests conducted, the conclusions and the outlook. In order to conduct these tests, Morpho has developed a very simple pilot system containing the most recent advances in algorithms that can be installed and programmed in less than one day. In this way, it is possible to test facial recognition usage scenarios, check the results that may be obtained for a given target application and measure the workload required to obtain these results. Morpho can provide support to its potential customers in this assessment process.
(1)
BKA, Bundeskriminalamt, the German police authorities. NPIA: National Police Improvement Agency. An organization tasked with making technological recommendations to the British police force in order to improve efficiency.
(2)
17
16%
84%
The creation of an international standard (ICAO) for travel documents. This standard specifies three possible forms of biometrics: iris recognition, fingerprinting and facial recognition. It has resulted in the creation of a reference database of high quality portraits.
SW Development
System Integration
Development of high accuracy face recognition algorithms, in 2D and 3D, for static images and video
18
The highly favorable conclusions of FRVT 2006. Facial recognition of good quality images is a mature biometric technique and the algorithms continue to progress, opening the way for the combination of 2D and 3D facial recognition techniques. Existing implementations. Notably, governmental or inter-governmental identity programs (electronic passports, ID cards, driving licenses, etc.) and automatic border passport control programs. These implementations have been a real success and the expectations of potential users are becoming more precise and realistic. The proven benefits of multi-biometrics. Multibiometrics cut staffing costs in biometric research, can solve difficult cases in which the data from one of the biometric techniques is of poor quality and can
correlate the connections made by different biometric techniques. T he availability of video cameras with improved resolution. These cameras take better pictures, which allow for more precise facial recognition.
The obstacles
Facial recognition is intrinsically more difficult than other major biometric techniques. Facial recognition is often quoted as an infringement of civil liberties. A pplications are broader than for other biometric techniques and the potential new users must be introduced to the field of biometrics and understand its benefits.
19
2002 assessment of the algorithms on the market: we opted to start with technology from Cognitec, which was found to be the best on the market at the time by the NISTs FRVT 2002. Since then, Morpho has significantly improved the technology. Morpho deployed a pilot tool designed to assess the technology with simple and efficient user interfaces. The tool allowed numerous police agencies to test the possible applications of facial recognition. This pilot allowed a number of conclusions to be drawn: The Morpho subsidiary MorphoTrak received the Best Biometric Identification Technology award for its facial recognition pilot system when it was exhibited at the Global Border Security Conference and Expo in Austin, Texas in May 2008. The Australian police force concluded that facial recognition offered decisive benefits for the correlation of criminal cases and now uses Morpho technology in operational applications.
The University of Lausanne, in cooperation with the Romande regional police force in Switzerland, successfully developed a strategy for the use of Morphos facial recognition for demonstrations. The Pierce County Sheriffs Office in Washington, USA, demonstrated how Morphos facial recognition reached a level of precision higher than 94% when identifying individuals in its collections, even with significant differences in age. It also surmised that the combined use of Morphos facial recognition and fingerprinting technology could allow subjects to be identified without calling on fingerprinting experts. In 2008, the Mexican police confirmed that Morphos technology was the fastest and the most accurate on the market in operational tests. In 2009, the Paris police authorities helped investigators by piloting a Morpho facial recognition system on a reference database of 470,000 faces. Morpho developed the SmartGate border control system that is now used in all international airports in Australia and will soon be deployed in New Zealand. This project uses the photos on biometric passports to speed up and facilitate passport controls. By the end of 2008, 150,000 people had passed through a SmartGate.
20
Morpho also developed MorphoFace Investigate* on the basis of recommendations made by our users working in dedicated Focus Groups. This product is designed to perform identification tasks, to help the police to solve criminal cases or simply for identification purposes in civil applications. Morphos research laboratories continuously develop and improve the basic technology. Research focuses on facial recognition algorithms, but also the optimization of portrait acquisition and the extraction of portraits from surveillance video footage. As a result of this research work, Morpho finished first in the NISTs portal challenge in March 2009. In May 2009, Morpho received the HCFDC (French High Committee for Civil Defense) innovation trophy for its Face on the fly face acquisition technology.
Morpho takes part in cooperative research projects in the United States and Europe, including the 3D Face project, which has concluded that the use of both 2D and 3D facial data improves the precision of facial recognition for travel document applications (http://www.3dface. org/). Morpho is making significant investments in innovation and the development of its facial recognition technology in order to consolidate its position as leader in biometrics. Major advances are continuously being made in terms of both the quality and diversity of the algorithms and the development of dedicated products adapted to the needs of the market.
Websites:
http://face.nist.gov/mbgc/mbgc_presentations.htm http://www.hcfdc.org/trophees2009/palmares.php http://www.3dface.org/ NB : On May 27 2010, Sagem Scurit changed its name to Morpho. For events, benchmarks having taken place before this date, we are listed or quoted under the name of Sagem Scurit.
21
I
ICAO - International Civil Aviation Organization. An international organization that is part of the United Nations. Its mission is to contribute to the development of standards used to standardize international air transport ISO - International Organization for Standardization. An international organization made up of the national standardization institutes from more than 100 countries.
N
NIST - National Institute of Standards a n d Te c h n o l o g y. T h e A m e r i c a n standardization organization and a member of ISO.
R
Reference database - A database of persons of interest to be identified in the images and videos to be processed.
F
FA - False Acceptance. False acceptances and false rejections are used to measure the performance of a biometric system. False acceptances correspond to fraudsters that the biometric control fails to detect. Face on the Fly - Face On The Fly is an innovative technology developed by Morpho. The purpose of this technology is to acquire facial images when a person passes through a control gate, without stopping and without having to look at a particular camera. Several images are acquired by a series of cameras to create a three dimensional view of the face. A frontal projection of this image can then be compared and used for authentication or identification purposes. Face On The Fly technology won the French High Committee for Civil Defenses award for technological innovation in May 2009. FR - False Rejection. False rejections correspond to authorized users that the biometric control fails to recognize. Frame - An image extracted from a video recording or stream. FRVT - Face Recognition Vendor Test.
S
SmartGate - SmartGate is a project run by Australian customs. The purpose of the project is to speed up customs clearance in Australias international airports using the portraits on electronic passports and facial recognition. Morpho deploys a system in Australian airports as part of this project. Stereoscopy - Stereoscopy refers to all the techniques used to reproduce a perception of a contour from several flat images. SVM - Support Vector Machine. A prominent technique used to solve classification problems.
L
Line-up - Line-up techniques are used by the police to determine whether a witness has spotted a suspect. The suspect is presented to the witness amongst a group of physically similar people. Witnesses must then decide whether they recognize one of the members of the group.
M
MBGC - Multi Biometric Grand Challenge (http://face.nist.gov/mbgc/). A test organized by the NIST to make advances in research into the recognition of persons from a distance using facial recognition and iris recognition. MFI - MorphoFace Investigate. A facial recognition system developed by Morpho. This system is essentially designed for use in police investigations. It can be used to solve cases from portrait traces left on the scene of the crime. Modality - A type of biometrics.
T
Template - The code extracted from an image of a face by image processing. Facial comparison is carried out via extracted templates. Terahertz - An electromagnetic wave in the electromagnetic spectrum between infrared (the optical domain) and microwaves (the electronic domain).
22
Bibliography
ForshungsProjekt, Gesichtserkennung als Fahndungshilfsmittel, Foto-Fahndung, Abschlussbericht, BKA, 2007, www.bka.de/kriminalwissenschaften/fotofahndung/pdf/ fotofahndung_abschlussbericht.pdf - See also: http://www.bka. de/kriminalwissenschaften/fotofahndung/faq.html Automatic Face Recognition, applications within law enforcement, Market and technology review, Ambika Suman, October 2006, www.npia.police.uk/en/docs/Face_Recognition_ Report.pdf CCTV on trials, Josh P Davis and Tim Valentine, Goldsmiths, University of London, London, UK, 2007. Morphological Classification of Facial Features in Adult Caucasian Males Vanezis, et al. - Journal of Forensic Sciences, 1996. Low-dimensional procedure for the characterization of human Limitations in Facial Identification: The Evidence , R. Jenkins, M. Burton, Department of Psychology, University of Glasgow, Glasgow, UK, Justice Of The Peace Volume 172, January 2008. Quality Standards for Forensic Opinions on the Identity of Living Offenders in Pictures, 9th Biennial Scientific Meeting of the International Association for Craniofacial Identification, F.W. Rosing, Institut fur Humangenetik und Anthropologie Universitatsklinikum, Ulm, Germany. Facial Comparisons by Subject Matter Experts: Their Role in Failure of Anthropometry as a Facial Identification Technique Using High-Quality Photographs, Kleinber, Pharm, Vanezis, and Burton - Journal of Forensic Science, July 2007. Photo identification: facial metrical and morphological features in South African males, Roelofse, Steyn, Becker, - Forensic Science International, 2008. Facial comparison area of expertise: formulation of the issues, and international inventory, Arnout C. Ruifrok, Ph.D, Laan van Ypenburg 6, 2497 GB Den Haag. Biometrics and Their Training, Federal Bureau of Investigation Forensic Audio, Video and Image Analysis Unit, Nicole A. Spaun, Advances in Biometrics, June 2009. World Biometrics Market, Frost & Sullivan (2007). Privacy and technologies of identity: a cross-disciplinary conversation, Katherine Jo Strandburg, Daniela Stan Raicu, Springer, 2005, ISBN 0387260501, 9780387260501, page 146. Prfecture de Police de Paris, Identit judiciaire, Etude du signalement descriptif, Portrait parl. faces. L Sirovich and M. Kirby, Journal of the Optical Society of America A 4: 519524, 1987. Face recognition using eigenfaces, M. Turk and A. Pentland, Proc. IEEE Conference on Computer Vision and Pattern Recognition: 586591, 1991. Eigenfaces for recognition, M. Turk, A. Pentland, Journal of Cognitive Neuroscience, 3(1), 1991. ISO/IEC 19794-5, Biometric Data Interchange Format - Part 5: Face Image Data. Forensic Art and Illustration Karen T. Taylor, CRC Press, 2000, ISBN 0849381185, 9780849381188. ANSI / NIST: Data Format for the Interchange of Fingerprint, Facial, & Other Biometric Information.
Polyvalence.com - Photos : Getty Images / Fotolia / PhotoAlto. Printed on paper made from responsibly managed forests - D-10156
Phone: +33 (0) 58 11 88 76 - Fax: +33 (0) 58 11 87 81 www.morpho.com Registered Office: Le Ponant de Paris - 27, rue Leblanc - F-75512 PARIS CEDEX 15 - France Socit anonyme au capital de 159.876.075 e 440 305 282 RCS PARIS