Sie sind auf Seite 1von 8

Digital image processing using theory of biometrics

CIHAN09
A TECHNICAL PAPER PRESENTATION
ON

DIGITAL IMAGE PROCESSING


USING
THEORY OF BIO-METRICS
PRESENTED BY:
MOHD AMEENUDDIN
E.C.E III YEAR II SEM
06801A0423
E-mail: ameen0723@gmail.com
Ph:09966589254

b. ashok Kumar
E.C.E III YEAR II SEM
06801A0404
E-mail: akumar063@gmail.com
Ph:09014119932

ARKAY COLLEGE
OF
ENGINEERING AND
TECHNOLOGY
ACHANPALLY, BODHAN
DIST: NIZAMABAD

Page 1 of 8

Digital image processing using theory of biometrics

IMAGE PROCESSING USING


THEORYOF
BIO-METRICS
Introduction
Abstract

What is a Biometrics system?

While humans have had the


innate ability to recognize and distinguish
different

faces

for

millions

of

years,

computers are just now catching up. In this


paper, we'll learn how computers are turning
your face into computer code so it can be
compared to thousands, if not millions, of
other faces. We'll also look at how facial
recognition

software

is

being

used

in

elections, criminal investigations and to


secure your personal computer.
Facial recognition methods
may vary, but they generally involve a series
of steps that serve to capture, analyze and
compare your face to a database of stored
images. A Software company called Visionics
developed Facial Recognition software called
Faceit. Potential applications even include
ATM and check-cashing security, Security
Law Enforcement & Security Surveillance
and voter database for duplicates. This
biometrics technology could also be used to
secure your computer files. By mounting a
Webcam to your computer and installing the
facial recognition software, your face can
become the password you use to get into your
computer. By implementing this technology
and the normal password security you are
getting double security to your valuable data.

Biometrics is a form of bioinformatics


that uses biological properties to identify
individuals.There are two main modules in a
biometrics system. "storing" and "comparing".
The systems must first store your information
before it can use this stored information to
compare and verify. The storing process however
differs

between

different

systems.

For instance, if the biometrics system


uses

thumb impression as

the

mode

of

verification, then your thumb impression will be


first captured in film and stored in the biometrics
database system. Instead of storing as it is, the
system

will

compress

and

store

it.

If for instance your face is used as the


mode of verification, then your face will be
photographed in different angles and stored in
the biometrics database systems. The same goes
for

voice

recording

and

eyes

mode

of

verification.
Once this storing process is done, the
'comparing' process is done daily or as and when
required. For example let us assume that your
company uses finger print biometrics systems.
When you come to office daily, there will be a
finger print reader at the entrance. You will have
to put your finger on this finger print reader
which will capture your finger print and send to
the biometrics system. The biometrics system
will then 'compare' this finger print to the finger
print that was previously stored in the database.

Page 2 of 8

Digital image processing using theory of biometrics


If

both

of

them

match

then

you

are

'employees pass are allowed access to

authenticated.

the company premises.


In all these above scenarios, signature

What is Face Recognition?

and photographs are used to verify a person's


Face recognition technology is the least
intrusive and fastest biometric technology. It
works with the most obvious individual
identifier the human face. Instead of requiring
people to place their hand on a reader or
precisely position their eye in front of a scanner,

identity. In reality any person can learn to use


another person's signature. Worse still are they
can replace your photograph with their own
photograph on these cards. Therefore, these
existing authentication methods are not secure
enough.
Biometrics solves these above issues.

face recognition systems unobtrusively take


pictures of people's faces as they enter a defined
area. There is no intrusion or delay, and in most
cases the subjects are entirely unaware of the
process. They do not feel "under surveillance"

Every person's face is unique. Each person's


thumb impression is also unique. Everyone's
voice is different from others. The eyes are also
unique for every person. Therefore it makes
sense to use these unique features of each person

or that their privacy has been invaded.

as

that doors can be opened by giving voice


commands. In some Hollywood movies, you
would have seen thumb impressions are used to
these

are

nothing

of

authentication.

passwords are no longer required. To enter one's

We have seen in James Bond movies

doors. All

means

Therefore for using computers,

What is Biometrics Security?

open

but

company, employee passes are no longer


required. Your body is sufficient. Using any parts
of your body the biometrics system can identify
you. America, Canada and some European
nations already use these security systems.

Biometrics.

The Face:

Think of these scenarios.


1.

2.

3.

You go to a bank to withdraw money.

Your face is an important part of who

You fill up the withdrawal form, sign it

you are and how people identify you. Imagine

and give it to the bank clerk. Your

how hard it would be to recognize an individual

signature is used to verify your identity

if all faces looked the same. Except in the case of

You are shopping using your credit

identical twins, the face is arguably a person's

cards. While paying the photograph on

most unique physical characteristic. While

the credit cards and the signature on

humans have had the innate ability to recognize

the credit cards are used to verify your

and distinguish different faces for millions of

identity.

years, computers are just now catching up.

In big companies, all employees are

Visionics, a company based in New

issued an 'employee pass' with their

Jersey, is one of many developers of facial

photograph.

recognition technology. The twist to its particular

People

with

these

Page 3 of 8

Digital image processing using theory of biometrics


software, FaceIt, is that it can pick someone's
face out of a crowd, extract that face from the
rest of the scene and compare it to a database
full of stored images. In order for this software
to work, it has to know what a basic face looks
like.

These nodal points are measured to


create a numerical code, a string of numbers that
represents the face in a database. This code is
called a face print. Only 14 to 22 nodal points
are needed for the FaceIt software to complete
the recognition process.
In the next section, we'll look at how
Facial recognition software can be
used to find criminals in a crowd, turning a

the system goes about detecting, capturing and


storing faces.

mass of people into a big line up.

The Software:
Facial recognition software is based on
Facial recognition software falls into a

the ability to first recognize a face, which is a


technological feat in itself, and then measure
the various features of each face. If you look in
the mirror, you can see that your face has
certain distinguishable landmarks. These are the
peaks and valleys that make up the different
facial

features.

Visionics

defines

these

landmarks as nodal points. There are about 80


nodal points on a human face. Here are a few of
the nodal points that are measured by the
software:

Distance between eyes


Width of nose
Depth of eye sockets
Cheekbones
Jaw line
Chin

larger

group

biometrics.

of

technologies

Biometrics

uses

known

as

biological

information to verify identity. The basic idea


behind biometrics is that our bodies contain
unique properties that can be used to distinguish
us from others. Besides facial recognition,
biometric authentication methods also include

:
Fingerprint scan
Retina scan
Voice identification
Facial recognition methods may vary,
but they generally involve a series of steps that
serve to capture, analyze and compare your face
to a database of stored images. Here is the basic
process that is used by the FaceIt system to
capture and compare images:

Page 4 of 8

Digital image processing using theory of biometrics


Normalization is performed regardless of the
head's location and distance from the camera.
Light does not impact the normalization process.

Representation:
The system translates the facial data

into a unique code. This coding process allows


for easier comparison of the newly acquired
To identify someone, facial
recognition software compares newly
captured images to databases of stored
images.

facial data to stored facial data.

Matching:
The newly acquired facial data is

compared to the stored data and (ideally) linked


to at least one stored facial representation.

Detection:

The heart of the FaceIt

When the system is attached to a

facial

recognition system is the Local Feature

video surveillance system, the recognition

Analysis

software searches the field of view of a video

mathematical technique the system uses to

camera for faces. If there is a face in the view, it

encode faces. The system maps the face and

is detected within a fraction of a second. A

creates a face print, a unique numerical code for

multi-scale algorithm is used to search for

that face. Once the system has stored a face

faces in low resolution. (An algorithm is a

print, it can compare it to the thousands or

program that provides a set of instructions to

millions of face prints stored in a database. Each

accomplish a specific task). The system

face print is stored as an 84-byte file.

switches to a high-resolution search only after a

(LFA)

algorithm.

This

is

the

The system can match multiple face

head-like shape is detected.

prints at a rate of 60 million per minute from

memory or 15 million per minute from hard disk.

Alignment :

As comparisons are made, the system assigns a


Once a face is detected, the system

value to the comparison using a scale of one to

determines the head's position, size and pose. A

10. If a score is above a predetermined threshold,

face needs to be turned at least 35 degrees

a match is declared. The operator then views the

toward the camera for the system to register it.

two photos that have been declared a match to be


certain that the computer is accurate.

Facial recognition, like other forms of

Normalization :

biometrics, is considered a technology that will


The image of the head is scaled and

have many uses in the near future. In the next

rotated so that it can be registered and mapped

section, we will look how it is being used right

into

now.

an

appropriate

size

and

pose.

Page 5 of 8

Digital image processing using theory of biometrics


recognition
APPLICATIONS
OF
FACIAL

could eliminate possible criminal

activity.

RECOGNITION:
Potential

In addition to law enforcement and


security

surveillance,

facial

recognition

applications

even

include ATM and check-cashing security. The

software has several other uses, including:

software is able to quickly verify a customer's

face. After the user consents, the ATM or check-

Eliminating voter fraud


ATM and Check-cashing identity
verification

Computer security

Eliminating voter fraud:


One of the most innovative uses of

cashing kiosk captures a digital photo of the


customer. The facial recognition software then
generates a face print of the photograph to
protect customers against identity theft and
fraudulent

transactions.

By

using

facial

recognition software, there's no need for a


picture ID, bank card or personal identification

facial recognition is being employed by the

number (PIN) to verify a customer's identity.

Mexican government, which is using the

Computer security:

technology to weed out duplicate voter


registrations. To sway an election, people
will register several times under different
names so they can vote more than once.
Conventional methods have not been very
successful at catching these people. Using
the facial recognition technology, officials
can search through facial images in the
voter database for duplicates at the time of

This

biometric

technology

could also be used to secure your computer files.


By mounting a Webcam to your computer and
installing the facial recognition software, your
face can become the password you use to get
into your computer. IBM has incorporated the
technology into a screensaver for its A, T and X
series ThinkPad laptops.

registration. New images are compared to


the records already on file to catch those
who attempt to register under aliases.

ATM and Check-cashing


identity verification:

The major Advantage of a facial


recognition system over other
verification methods:

use

Many people who don't use banks


check-cashing
machines.
Facial

Page 6 of 8

Digital image processing using theory of biometrics


There are several practical reasons for
favoring

facial

recognition

over

other

biometrics for the purposes of identification.

recognition using Biometrics gives a new scope


to the modern era.

The finger print of those people


working in Chemical industries is
often

technologies, the incredible potential of facial

affected.

Therefore

Further, if we add both the facial

these

recognition and the normal password security we

companies should not use the finger

can have an added Double Security which is

print mode of authentication.

more reliable than one shield security, Just same

It is found that with age, the voice of a

as the quote Two heads are better than one.

person differs. Also when the person


has flu or throat infection the voice
changes or if there are too much noise
in the environment this method may
not authenticate correctly. Therefore
this method of verification is not
workable all the time

For people affected with diabetes, the


eyes

get

affected

resulting

in

differences.

Biometrics is an expensive security


solution.

Swiss European surveillance: facial


recognition and vehicle make,
model, color and license plate reader.

Conclusion
We conclude our paper on Facial
Recognition using Biometrics.
Potential applications are as follows:

Eliminating voter fraud

ATM and Check-cashing identity


verification

Computer security

Security law enforcement


Security surveillance

and

Side View.

While facial recognition can be used to


protect your private information, it can just as
easily be used to invade your privacy by taking
you picture when you are entirely unaware of
the

camera.

As

with

many

developing

Page 7 of 8

Digital image processing using theory of biometrics


Close-up of the Infrared Illuminator. This
light is invisible to the human eye but it
creates a day like environment for the
surveillance cameras.

Page 8 of 8

Das könnte Ihnen auch gefallen