Professional Documents
Culture Documents
Class-ECE(e) TOPIC
FACE RECOGNITION TECHNOLOGY
BY
NAME; A.Nikhil
ROLL NUMBER: 20311A04U9
1
Contents
Introduction
History
Biometrics
Working of face recognition Technology
Applications
Advantages
Disadvantages
Conclusion
References
Introduction
Everyday actions are increasingly being handled
electrically,instead of Pencil and paper or face to face.
The growth in electronic transactions results in great demand
for fast and accurate user identification and authentication.
Access codes of bank accounts, Computer systems etc..
often use of PIN’s for identification and security clearance.
Using proper PIN gains access, but the user of pin is not verified.
As Credit and ATM cards are lost or stolen, an unauthorized use
can often come up with personal correct codes.
Face recognition technology may slove this problem Since face
is undeniably connected.
History
-In 1960,the first semi-automated system for facial recognition to locate the features (such as
ears, eyes, nose etc) on the photographs by Woodrow wilson Bledsoe. He developed a system
that classified photos Of faces through RAND tablet. The tablet allowed Bledsoe to see
manually record the co-ordinate locations of facial features.
-In 1970 Harmon, Goldstein and Lesk made the system more accurate detecting faces
automatically using biometrics recorded manually. They used 21 subjective markers such as hair
colour, thickness of lip to automate recognition
-In 1988,Kirby and Sirovich used standard linear Algebra technique to the face
recognition
Biometrics
• It is a unique measurable
characteristics of human being , used
to recognize automatically on
individual identity
1.Phsiological characteristics
2.Behavioural characteristics
• A “biometric system” refers to
integrated hardware and
software used to conduct
biometric identification.
Working of Face Recognition Technology
Two types in process in FRT
1. Verification:The System compares
the given individual with the
individual says they are and gives a
yes or no decision.
2.Identification:The system compares
the given individual to all the other
individuals in the database and
gives a ranked list of matches.
How it works?
All identification and authenfication technologies operate using the
following four stages.
1.Capture: A physical or behavioural sample is captured by the system
during enrollment or identification
or verification process.
2.Extraction: Unique data is extracted
from the sample and template is created.
3.Comparision: The template is then
Compare with a new sample.
4.Match/Non-match: The system decides if the features extracted from the new
samples are an match or a non-match.
Implementation of Face recognition technology
• This includes the following stages
1. Data accquisation
2. Input processing
3. Face image classification
4. Decision making
.
ANY QUARIES??