Beruflich Dokumente
Kultur Dokumente
CIHAN09
A TECHNICAL PAPER PRESENTATION
ON
b. ashok Kumar
E.C.E III YEAR II SEM
06801A0404
E-mail: akumar063@gmail.com
Ph:09014119932
ARKAY COLLEGE
OF
ENGINEERING AND
TECHNOLOGY
ACHANPALLY, BODHAN
DIST: NIZAMABAD
Page 1 of 8
faces
for
millions
of
years,
software
is
being
used
in
between
different
systems.
thumb impression as
the
mode
of
will
compress
and
store
it.
voice
recording
and
eyes
mode
of
verification.
Once this storing process is done, the
'comparing' process is done daily or as and when
required. For example let us assume that your
company uses finger print biometrics systems.
When you come to office daily, there will be a
finger print reader at the entrance. You will have
to put your finger on this finger print reader
which will capture your finger print and send to
the biometrics system. The biometrics system
will then 'compare' this finger print to the finger
print that was previously stored in the database.
Page 2 of 8
both
of
them
match
then
you
are
authenticated.
as
are
nothing
of
authentication.
doors. All
means
open
but
Biometrics.
The Face:
2.
3.
identity.
photograph.
People
with
these
Page 3 of 8
The Software:
Facial recognition software is based on
Facial recognition software falls into a
features.
Visionics
defines
these
larger
group
biometrics.
of
technologies
Biometrics
uses
known
as
biological
:
Fingerprint scan
Retina scan
Voice identification
Facial recognition methods may vary,
but they generally involve a series of steps that
serve to capture, analyze and compare your face
to a database of stored images. Here is the basic
process that is used by the FaceIt system to
capture and compare images:
Page 4 of 8
Representation:
The system translates the facial data
Matching:
The newly acquired facial data is
Detection:
facial
Analysis
(LFA)
algorithm.
This
is
the
Alignment :
Normalization :
into
now.
an
appropriate
size
and
pose.
Page 5 of 8
activity.
RECOGNITION:
Potential
surveillance,
facial
recognition
applications
even
Computer security
transactions.
By
using
facial
Computer security:
This
biometric
technology
use
Page 6 of 8
facial
recognition
over
other
affected.
Therefore
these
get
affected
resulting
in
differences.
Conclusion
We conclude our paper on Facial
Recognition using Biometrics.
Potential applications are as follows:
Computer security
and
Side View.
camera.
As
with
many
developing
Page 7 of 8
Page 8 of 8