Professional Documents
Culture Documents
Presentation On Image As Password: by - Himanshu Saurabh C07516 Eece 8 Sem
Presentation On Image As Password: by - Himanshu Saurabh C07516 Eece 8 Sem
On
Image As Password
By --
Himanshu Saurabh
C07516
EECE 8th sem
CONTENTS
INTRODUCTION
APPLICATIONS
CONCLUTION
INTRODUCTION
There are two methods of capture
Video imaging
Thermal imaging
INTRODUCTION
Video imaging uses video cameras.
System performance depends on precise position, angle of the head and surrounding lighting
condition.
Enrollment module
Database
Identification
Performance Parameters
False acceptance rate,FAR= NFA/NIIA
Data acquisition
Input processing
Faceit
HOW IMAGE AS PASSWORD SYSTEMS
WORKS-an example
Detection
Alignment
Normalisation
Representation
Matching
ADVANTAGES AND DISADVANTAGES
ADVANTAGES
Convenient, social acceptability
Easy to use
DISADVANTAGE
Problem with false rejection when people change their hair style, grow or shave a
beard or wear glasses.
Identical twins
WHY WE CHOOSE IMAGE AS PASSWORD
Only biometric that allows you to perform passive identification in a one to many
environment
APPLICATIONS
Replacement of PIN,physical tokens
Border control
Voting system
Computer security
Reliable