Sie sind auf Seite 1von 34

A facial recognition system is a computer application for

automatically identifying or verifying a person from a digital


image or a video frame from a video source. One of the ways
to do this is by comparing selected facial features from the
image and a facial database.
It is typically used in security systems and can be compared to
other biometrics such as fingerprint or eye iris recognition
system.

Every face has at least 80 distinguishable parts called


nodal points. Some of them are:

Every face has at least 80 distinguishable parts called


nodal points. Some of them are:
1. Distance between the eyes

Every face has at least 80 distinguishable parts called


nodal points. Some of them are:
1. Distance between the eyes
2. Width of the nose

Every face has at least 80 distinguishable parts called


nodal points. Some of them are:
1. Distance between the eyes
2. Width of the nose
3. Depth of eye sockets

Every face has at least 80 distinguishable parts called


nodal points. Some of them are:
1.
2.
3.
4.

Distance between the eyes


Width of the nose
Depth of eye sockets
Structure of cheek bones

Every face has at least 80 distinguishable parts called


nodal points. Some of them are:
1.
2.
3.
4.
5.

Distance between the eyes


Width of the nose
Depth of eye sockets
Structure of the cheek bones
Length of jaw line

A general face recognition software conducts a comparison of


these parameters to the images in its database.
Depending upon the matches found, it determines the result.
This technique is known as feature based matching and it is the
most basic method of facial recognition.

A 3D facial recognition model provides greater accuracy


than the feature extraction model.
It can also be used in a dark surroundings and has an
ability to recognize the subject at different view angles.
Using 3D software, the system
Goes through a number of steps
to verify the identity of an
individual.

Acquiring an image can be done


through a digital scanning device.
Once it detects the face, the system
determines heads position, size and
pose.

The system then measures the curves


of the face on a sub-millimeter scale
and creates a template.
The system translates this template
into a unique code.

The image thus acquired will be


compared to the images in the data
base and if 3D images are not
available to the database, then
algorithms used to get a straight face
are applied to the 3D image to be
matched.
Finally in verification, the image is
matched to only one image in the
database and the result is displayed as
shown alongside.

The most commonly used unique feature for facial recognition is


iris of the eye. No two human beings, even twins have exactly
similar iris.

Image acquisition
Segmentation

Images obtained from CASIA.

Employs Canny edge detector &


Hough Transform.
& use of
Log-Gabor filter.

Encoding

Normalization

Matching

HD calculation used for


determining matches

SEGMENTATION: Involves locating the iris region and


isolating it.
ENCODING: Creating a template that contains the most
discriminating features of the iris.
MATCHING: Comparison of two iris templates and
determining if they belong to the same
individual

This system was a success as 93% of samples gave perfect


recognition. Salient features of iris were identified,
extracted, encoded then matched as desired.
The only setback was the fact that Matlab processed the
images slowly thus would not suit real time processing.
APPLICATION:
Immigration department.
ATM identity verification.

-Principal Component Analysis using eigenfaces


-Linear Discriminate Analysis
-Elastic Bunch Graph Matching using Fisherface algorithm
-Hidden Markov model
-Neuronal motivated dynamic link matching.

The only way to overcome this challenge is better


equipment, i.e. basically , use of high tech cameras.
It is very much essential for the system to catch the
image accurately.

The only way to overcome this challenge is better


ALGORITHMS for facial recognitions. If the systems are
programmed for every possible permutation and combination of
the image, an accurate match can be achieved.
Some algorithms that try to overcome this problem are as
follows:
-Half-face based algorithm
-Local binary pattern
-Neural network, etc.

The kind of equipment used for facial recognition depends upon


the purpose of using the technology. A facial recognition
technique may be used for the following purposes.
1.Domestic security systems
2.Police surveillance
3.Domestic Computer / phone identification systems
4.Employee management systems in Companies.
5.National and International security systems.
Let us consider equipment for basic police surveillance.

The facial recognition equipment used for basic surveillance


purpose has 3 important components.
1.The camera or scanning device
2.Infrared illuminator
3.An efficient software

An IR-illuminator is a device that emits infrared light-low frequency


electromagnetic radiation that's outside the visible spectrum. In other
words, it gives off light that a camera can pick up and use, but that a
person can't see-so while it's still dark to the human eye, the camera
can see just fine.
There are 3 main types of infrared illuminators namely diodes, lamps
& lasers.

IR-illuminator

Without IR-illuminator

Other FR equipments generally use variations in software.


For a domestic Computer user recognition system, a basic 2D face
recognition algorithm is sufficient. With some basic verifications,
the user of the phone or Computer can be identified. Complex
algorithms and equipment are used in cases of national and
international security issues.

BIOMETRIC FACIAL RECOGNITIION


The image may not always be verified or identified in facial
recognition alone. Identix has created a new product to help
with precision. The development of FaceItArgus uses skin
biometrics, the uniqueness of skin texture, to yield even more
accurate results.
The process, called Surface Texture Analysis, works much the
same way facial recognition does. A picture is taken of a patch
of skin, called a skinprint. That patch is then broken up into
smaller blocks. Using algorithms to turn the patch into a
mathematical, measurable space, the system will then
distinguish any lines, pores and the actual skin texture. It can
identify differences between identical twins, which is not yet
possible using facial recognition software alone

HOW IT WORKS?
The vector template is very small and is used for rapid searching over the entire
database primarily for one-to-many searching.
The local feature analysis (LFA) template performs a secondary search of
ordered matches following the vector template.
The surface texture analysis (STA) is the largest of the three. It performs a final
pass after the LFA template search, relying on the skin features in the image, which
contains the most detailed information.
By combining all three templates, FaceIt has an
advantage over other systems. It is relatively
insensitive to changes in expression, including
blinking, frowning or smiling and has the ability
to compensate for mustache or beard growth and
the appearance of eyeglasses. The system is also
uniform with respect to race and gender.

Due to these strides in technology, facial and skin recognition


systems are more widely used than just a few years ago. In the
next section, we'll look at where and how they are being used
and what's in store for the future.

What's the Future?


The U.S. government has recently begun a program called US-VISIT (United States
Visitor and Immigrant Status Indicator Technology), aimed at foreign travelers
gaining entry to the United States. When a foreign traveler receives his visa, he will
submit fingerprints and have his photograph taken. The fingerprints and photograph
are checked against a database of known criminals and suspected terrorists. When
the traveler arrives in the United States at the port of entry, those same fingerprints
and photographs will be used to verify that the person who received the visa is the
same person attempting to gain entry.
Other potential applications include ATM and check-cashing security. The software
is able to quickly verify a customer's face. After a customer consents, the ATM or
check-cashing kiosk captures a digital image of him. The FaceIt software then
generates a faceprint of the photograph to protect customers against identity theft
and fraudulent transactions. By using the facial recognition software, there's no
need for a picture ID, bankcard or personal identification number (PIN) to verify a
customer's identity. This way businesses can prevent fraud from occurring.

Pros:
1.Better security systems.
2.Easy user verifications.
3.Greatly reduces current load on security and judicial systems.
Cons:
1.Privacy issues.
2.In wrong hands the personal data can be disatrous!
3.Errors in detection may cause inconvenience to innocent users.

Presented by :
Monami, Sakshi, Pabitra, Akash
& Aritra
IT-6

Das könnte Ihnen auch gefallen