You are on page 1of 15

Presentation

On
Image As Password

By --
Himanshu Saurabh
C07516
EECE 8th sem
CONTENTS
 
 
 
 
 INTRODUCTION

 COMPONENTS OF IMAGE AS PASSWORD SYSTEM

 IMPLEMENTATION OF IMAGE AS PASSWORD SYSTEMS


  
 HOW IMAGE AS PASSWORD SYSTEMS WORK- an example
  
 ADVANTAGES AND DISADVANTAGES

 WHY WE CHOOSE FACE RECONITION TECHNOLOGY

 APPLICATIONS

 CONCLUTION
INTRODUCTION
 

  All identification and authentication technologies operate using the 4


stage procedure
 
 capture
 extraction
 comparison
 match/nonmatch

 
 There are two methods of capture
 Video imaging
 Thermal imaging
INTRODUCTION
 

  
 Video imaging uses video cameras.

 System performance depends on precise position, angle of the head and surrounding lighting
condition.

 Thermal imaging has better accuracy as it uses facial temperature variation.

 Disadvantage is that its very costly.


COMPONENTS OF IMAGE AS PASSWORD
SYSTEM
 

 Consists of three modules

 
 Enrollment module

 Database

 Identification
Performance Parameters
 
False acceptance rate,FAR= NFA/NIIA

NFA= number of false acceptance


NIIA=no of imposter identification attempt
 
False rejection rate,FRR = NFR/NEIA
 
NFR=number of false rejection
NEIA=number of enrollee identification attempt
 
Threshold/decision threshold
Equal error rate
IMPLEMENTATION OF IMAGE AS
PASSWORD TECHNOLOGY
 
 

 Data acquisition

 Input processing

 Face image classification and decision making


IMAGE AS PASSWORD BASED COMPANIES

 Visionics, a company based in New Jersey

 Faceit
HOW IMAGE AS PASSWORD SYSTEMS
WORKS-an example

 Visionics, a company based in New Jersey


 Faceit
 There are distinguishable landmark on your face called peaks and valleys-nodal
points
 80 nodal points on human face like
 distance between eyes
 width of nose
 depth of eye socket
 cheek bones
 jawline
 chin
 Faceit needs 14 to 20 nodal points
THE SOFTWARE
 
 
 The basic processes used by Faceit systems are
 

 Detection

 Alignment

 Normalisation

 Representation

 Matching
ADVANTAGES AND DISADVANTAGES
 
 ADVANTAGES
 Convenient, social acceptability

 Easy to use

 Inexpensive technique of identification

 
  DISADVANTAGE

 Problem with false rejection when people change their hair style, grow or shave a
beard or wear glasses.

 Identical twins
WHY WE CHOOSE IMAGE AS PASSWORD

 No physical interaction on behalf of the user

 Does not require an expert to interpret the comparison

 Can use existing hardware infrastructure

 Can use existing image without having to re-enroll everytime

 Only biometric that allows you to perform passive identification in a one to many
environment
APPLICATIONS
 
 
 Replacement of PIN,physical tokens

 No need of human assistance for identification

 Prison visitor systems

 Border control

 Voting system

 Computer security

 Banking using ATM

 Physical access control of buildings,areas etc


CONCLUTION
 
 

 Cost of equipments is going down-cost effective

 Reliable

 No technological or financial barriers


 
! !
o u
k Y
a n : )
T h

You might also like