This document provides an overview of face recognition technology. It discusses the history of face recognition, which began in the 1960s. It also outlines how face recognition works by capturing images, measuring geometric facial features, calculating a formula to represent the face, and comparing it to images in a database. The document lists applications such as security, immigration, and banking. It discusses advantages like improved security and speed, and disadvantages like data storage needs and accuracy issues. The conclusion states that face recognition will have many applications in smart environments.
This document provides an overview of face recognition technology. It discusses the history of face recognition, which began in the 1960s. It also outlines how face recognition works by capturing images, measuring geometric facial features, calculating a formula to represent the face, and comparing it to images in a database. The document lists applications such as security, immigration, and banking. It discusses advantages like improved security and speed, and disadvantages like data storage needs and accuracy issues. The conclusion states that face recognition will have many applications in smart environments.
This document provides an overview of face recognition technology. It discusses the history of face recognition, which began in the 1960s. It also outlines how face recognition works by capturing images, measuring geometric facial features, calculating a formula to represent the face, and comparing it to images in a database. The document lists applications such as security, immigration, and banking. It discusses advantages like improved security and speed, and disadvantages like data storage needs and accuracy issues. The conclusion states that face recognition will have many applications in smart environments.
20RH1A05K0 CONTENTS: •Introduction •History •Implementation •How it works •Applications •Uses •Advantages •Disadvantages •Security •Conclusion INTRODUCTION: It is a category of biometric software for automatic identification. It makes use the most usual human identifier,face and unique facial characteristics. It was invented by WOODROW WILSON BLEDSOE HISTORY: The earliest pioneers of facial recognition were Wood Bledsoe,Helen Chan Wolf and Charles Bisson. In 1964 and 1965,Beldsoe along with Wolf and Bisson began work using computers to recognise the human face. EBL approach by Sung and Poggio(1994) The neural network approach by Rowley etal(1998). Face Recognition Vendor Test(2002) Face Recognition Grand Challenges(2006) CHARLES HELEN CHAN WOLF BISSON IMPLEMENTATION: The implementation of face recognition technology includes the following stages: •Image acquisation •Image processing •Distinctive characteristic location •Template matching •Template creation These nodal points are measured creating a numerical
code,called a face print,
representing the face in the database. HOW IT WORKS: Step-1: Captures images or vedios. Step-2: Reads the geometric measurements on the face. Step-3: Calculates a mathematical formula for the captured face. Step-4: Compares it with the image in the database. APPLICATIONS: Government use: a)Security/Counterterrorism b)Immigration c)Voter verification Commercial use: a)Day care b)Residential security c)Banking using ATM Fraud detection Payments Healthcare Advertising USES: It can be used for a multitude of applications,from security to advertisements.Here are some of them: Mobile phone manufactures,such as Apple,for consumer security. Modernizing public safety Creating a better shopping experience Streamlining customer service Diagnosing rare diseases Tracking school attendance Locating lost pets Unlock phones Prevent Retail crime Find missing persons ADVANTAGES: No need to physically contact a device for authentication purpose. Improved level of security. High security High accuracy Fully automated Low invasiveness High speed Identification support system DISADVANTAGES: Scarce Data Storage Insufficient camera angle Not as accurate as other biometrics Large amounts of storage needed Good quality of images required Can’t tell differance between identical twins Problem when the person change the hairstyle,shave or beard or wear glasses. SECURITY: Currently there are no laws in United States that specially protect an individual’s biometric data. This is being studied or deployed for airport security.
Data from facial recognition system may be captured
and stored and an individual may not even know it. This information can be accessed by hackers. CONCLUSION: A face recognition system must be able to recognise a face in many different imaging situations. It will find faces efficiently without exhaustively searching the image.
Face recognition systems are going to have widespread