Download - Facial Recognition Technology
NISHANT KUMAR SINHA
FACIAL RECOGNITION TECHNOLOGY
INFORMATION TECHNOLOGY
0801291260
Road Map Introduction to Facial Recognition Technology History and Development Identification Procedure Motivation Implementation & Performance Algorithm Used
INFO
RM
ATIO
N T
EC
HN
OLO
GY
INTRODUCTION
INTRODUCTION
Facial recognition is a form of computer vision that uses faces to attempt to identify a person or verify a person’s claimed identity. Regardless of specific method used, the facial recognition is accomplished in a five step process.
INFO
RM
ATIO
N T
EC
HN
OLO
GY
HISTORY AND DEVELOPMENT
HISTORY & DEVELOPMENT•Late 1980s: Research• Mid 1990s: Commercialization• Current
- Authentication
- ID
- Law Enforcement
INFO
RM
ATIO
N T
EC
HN
OLO
GY
HISTORY & DEVELOPMENT• September 24, 1999: OLETC ILEFIS
- 64 facial features
- 256 unique shapes / feature
- quicker processing, look-up time• January 2001: Privacy Debate
- Super Bowl
- Tampa Entertainment District• September 11, 2001: Impact on Market
- Visionics
INFO
RM
ATIO
N T
EC
HN
OLO
GY
HISTORY & DEVELOPMENT•September 21, 2001: Looking Ahead
- Colorado DMV: July 2001
- Neighborhoods (ie, Tampa Police Department)
INFO
RM
ATIO
N T
EC
HN
OLO
GY
IDENTIFICATION PROCEDURE
FACE RECOGNITIONTwo types of comparison in face recognition
1. Verification- The system compare the given individual with who that individual says they are.
2. Identification-The system compares a given individual to all the other individuals in the database and gives a ranked list of matches.
INFO
RM
ATIO
N T
EC
HN
OLO
GY
FOUR STAGES OF IDENTIFICATION
Capture-Capture the behavioral sample
Extraction-unique data is extracted from the sample and a
template is created.
Comparison-the template is compared with a new sample.
Match/non match-the system decides whether the new
samples are matched or not.
INFO
RM
ATIO
N T
EC
HN
OLO
GY
MOTIVATION
MOTIVATION - SECURITY Recognize criminals
1. In public spaces (airports, shopping centers)
2. In stores Verify identity to grant access in restricted
areas: non-invasive Biometrics1.Airports
2.Office
3.Risk: privacy rights
INFO
RM
ATIO
N T
EC
HN
OLO
GY
MOTIVATION–HUMAN MACHINE INTERFACE
Government Use1. Law enforcement2.Security/counterterrorism3.Immigration
Commercial Use1. Cell phones (Omron, Iphone, etc)2. Residential security3. Voter verification4. Banking using ATM
5. Computers
6. Intelligent buildings
INFO
RM
ATIO
N T
EC
HN
OLO
GY
IMPLEMENTATION & PERFORMANCE
IMPLEMENTATION & PERFORMANCE
IMPLEMENTATION•Data acquisition•Input processing•Face image classification•Decision making
IMPLEMENTATION• False Acceptance Rate [FAR]• False Rejection Rates [FRR]• Response time• Decision Threshold• Enrollment time
ALGORITHM
PRINCIPAL COMPONENT ANALYSISIN
FO
RM
ATIO
N T
EC
HN
OLO
GY
PRINCIPAL COMPONENT ANALYSISIN
FO
RM
ATIO
N T
EC
HN
OLO
GY
LINEAR DISCRIMINANT ANALYSISIN
FO
RM
ATIO
N T
EC
HN
OLO
GY
LINEAR DISCRIMINANT ANALYSISIN
FO
RM
ATIO
N T
EC
HN
OLO
GY
CONCLUSION
CONCLUSION
Face recognition technologies have been associated generally with very costly top secure applications. Today the core technologies have evolved and the cost of equipments is going down dramatically due to the integration and the increasing processing power. Certain applications of face recognition technology are now cost effective ,reliable and highly accurate. As a result there are no technological or financial barriers for stepping from the pilot project to widespread deployment.
INFO
RM
ATIO
N T
EC
HN
OLO
GY