Vous êtes sur la page 1sur 9

Facial Recognition using the theory of biometrics

%age - of .

NARAYANA ENGINEERING COLLEGE GUDUR(A.P)


USING THEORY OF BIO !ETRI"S #I!$GE %RO"ESSING&

BY D.ANIL KUMAR V.KISHORE BABU

III/IV B.Tech(E.C.E.)

E mail 'anil()*+yahoo,co,in,

Facial Recognition using the theory of biometrics

%age < of .

ABSTRACT
/hile humans ha0e ha( the innate ability to recogni1e an( (istinguish (ifferent faces for millions of years2 com3uters are 4ust no5 catching u3, In this 3a3er2 5e6ll learn ho5 com3uters are turning your face into com3uter co(e so it can be com3are( to thousan(s2 if not millions2 of other faces, /e6ll also loo7 at ho5 facial recognition software is being use( in elections2 criminal in0estigations an( to secure your 3ersonal com3uter, Facial recognition soft5are falls into a larger grou3 of technologies 7no5n as biometrics, Biometrics uses biological information to 0erify i(entity, The basic i(ea behin( biometrics is that our bo(ies contain uni8ue 3ro3erties that can be use( to (istinguish us from others, Facial recognition metho(s may 0ary2 but they generally in0ol0e a series of ste3s that ser0e to capture, analyze an( compare your face to a (atabase of store( images,

$ Soft5are com3any calle( 9isionics (e0elo3e( Facial Recognition soft5are calle( Faceit. The heart of this facial recognition system is the Local Feature Analysis #:F$& algorithm, This is the mathematical techni8ue the system uses to enco(e faces, The system ma3s the face an( creates a faceprint2 a uni8ue numerical co(e for that face, Once the system has store( a face3rint2 it can com3are it to the thousan(s or millions of face3rints store( in a (atabase, %otential a33lications e0en inclu(e $T! an( chec7 cashing security2 Security :a5 Enforcement ; Security Sur0eillance an( 0oter (atabase for (u3licates, This biometrics technology coul( also be use( to secure your com3uter files, By mounting a /ebcam to your com3uter an( installing the facial recognition soft5are2 your face can become the 3ass5or( you use to get into your com3uter, By im3lementing this technology an( the normal 3ass5or( security you are getting (ouble security to your 0aluable (ata,

E mail 'anil()*+yahoo,co,in,

Facial Recognition using the theory of biometrics

%age ? of .

Intro uction
%eo3le ha0e an ama1ing ability to recogni1e an( remember thousan(s of faces, /hile humans ha0e ha( the innate ability to recogni1e an( (istinguish (ifferent faces for millions of years2 com3uters are 4ust no5 catching u3, In this 3a3er2 you6ll learn ho5 com3uters are turning your face into com3uter co(e so it can be com3are( to thousan(s2 if not millions2 of other faces, /e6ll also loo7 at ho5 facial recognition software is being use( in elections2 criminal in0estigations an( to secure your 3ersonal com3uter,

T!e Face
Your face is an im3ortant 3art of 5ho you are an( ho5 3eo3le i(entify you, Imagine ho5 har( it 5oul( be to recogni1e an in(i0i(ual if all faces loo7e( the same, E=ce3t in the case of i(entical t5ins2 the face is arguably a 3erson6s most uni8ue 3hysical characteristic, /hile humans ha0e ha( the innate ability to recogni1e an( (istinguish (ifferent faces for millions of years2 com3uters are 4ust no5 catching u3, "isionics2 a com3any base( in Ne5 >ersey2 is one of many (e0elo3ers of facial recognition technology, The t5ist to its 3articular soft5are2 FaceIt2 is that it can 3ic7 someone6s face out of a cro5(2 e=tract that face from the rest of the scene an( com3are it to a (atabase full of store( images, In or(er for this soft5are to 5or72 it has to 7no5 5hat a basic face loo7s li7e,

E mail 'anil()*+yahoo,co,in,

Facial Recognition using the theory of biometrics

%age @ of .

Facial recognition software can be use to fin criminals in a crow , turning a mass of people into a big line up. Facial recognition soft5are is base( on the ability to first recogni1e a face2 5hich is a technological feat in itself2 an( then measure the 0arious features of each face, If you loo7 in the mirror2 you can see that your face has certain (istinguishable lan(mar7s, These are the 3ea7s an( 0alleys that ma7e u3 the (ifferent facial features, 9isionics (efines these lan(mar7s as no(al 3oints, There are about .) no(al 3oints on a human face, Here are a fe5 of the no(al 3oints that are measure( by the soft5are'

#istance between eyes $i t! of nose #ept! of eye soc%ets C!ee%bones &aw line C!in

These no(al 3oints are measure( to create a numerical co(e2 a string of numbers that re3resents the face in a (atabase, This co(e is calle( a face3rint, Only -@ to << no(al 3oints are nee(e( for the FaceIt soft5are to com3lete the recognition 3rocess, In the ne=t section2 5e6ll loo7 at ho5 the system goes about (etecting2 ca3turing an( storing faces,

T!e Software
Facial recognition soft5are falls into a larger grou3 of technologies 7no5n as biometrics, Biometrics uses biological information to 0erify i(entity, The basic i(ea behin( biometrics is

E mail 'anil()*+yahoo,co,in,

Facial Recognition using the theory of biometrics

%age * of .

that our bo(ies contain uni8ue 3ro3erties that can be use( to (istinguish us from others, Besi(es facial recognition2 biometric authentication metho(s also inclu(e'

Fingerprint scan Retina scan "oice i entification

Facial recognition metho(s may 0ary2 but they generally in0ol0e a series of ste3s that ser0e to ca3ture2 analy1e an( com3are your face to a (atabase of store( images, Here is the basic 3rocess that is use( by the FaceIt system to ca3ture an( com3are images'

To i entify someone, facial recognition software compares newly capture images to atabases of store images.

-, #etection

/hen the system is attache( to a 0i(eo sur0eillance system2 the

recognition soft5are searches the fiel( of 0ie5 of a 0i(eo camera for faces, If there is a face in the 0ie52 it is (etecte( 5ithin a fraction of a secon(, $ multi'scale algorit!m is use( to search for faces in lo5 resolution, #$n algorithm is a 3rogram that 3ro0i(es a set of instructions to accom3lish a s3ecific tas7&, The system s5itches to a high resolution search only after a hea( li7e sha3e is (etecte(, <, Alignment Once a face is (etecte(2 the system (etermines the hea(6s 3osition2 si1e an( 3ose, $ face nee(s to be turne( at least () egrees to5ar( the camera for the system to register it, ?, *ormalization The image of the hea( is scale( an( rotate( so that it can be registere( an( ma33e( into an a33ro3riate si1e an( 3ose, Normali1ation is 3erforme( regar(less of the hea(6s location an( (istance from the camera, :ight (oes not im3act the normali1ation 3rocess,

E mail 'anil()*+yahoo,co,in,

Facial Recognition using the theory of biometrics

%age A of .

@, Representation store( facial (ata, *, +atc!ing

The system translates the facial (ata into a uni8ue co(e, This

co(ing 3rocess allo5s for easier com3arison of the ne5ly ac8uire( facial (ata to

The ne5ly ac8uire( facial (ata is com3are( to the store( (ata an(

#i(eally& lin7e( to at least one store( facial re3resentation, The heart of the FaceIt facial recognition system is the Local Feature Analysis #:F$& algorithm, This is the mathematical techni8ue the system uses to enco(e faces, The system ma3s the face an( creates a faceprint2 a uni8ue numerical co(e for that face, Once the system has store( a face3rint2 it can com3are it to the thousan(s or millions of face3rints store( in a (atabase, Each face3rint is store( as an ,-'byte file, The system can match multi3le face3rints at a rate of A) million 3er minute from memory or -* million 3er minute from har( (is7, $s com3arisons are ma(e2 the system assigns a 0alue to the com3arison using a scale of one to -), If a score is abo0e a 3re(etermine( threshol(2 a matc! is (eclare(, The o3erator then 0ie5s the t5o 3hotos that ha0e been (eclare( a match to be certain that the com3uter is accurate, Facial recognition2 li7e other forms of biometrics2 is consi(ere( a technology that 5ill ha0e many uses in the near future, In the ne=t section2 5e 5ill loo7 ho5 it is being use( right no5,

.otc!a/
The 3rimary users of facial recognition soft5are li7e FaceIt ha0e been la5 enforcement agencies2 5hich use the system to ca3ture ran(om faces in cro5(s, These faces are com3are( to a (atabase of criminal mug shots, In a((ition to la5 enforcement an( security sur0eillance2 facial recognition soft5are has se0eral other uses2 inclu(ing'

0liminating 1oter frau C!ec%'cas!ing i entity 1erification Computer security

One of the most inno0ati0e uses of facial recognition is being em3loye( by the !e=ican go0ernment2 5hich is using the technology to 5ee( out uplicate 1oter registrations, To s5ay an election2 3eo3le 5ill register se0eral times un(er (ifferent names so they can 0ote more than once, "on0entional metho(s ha0e not been 0ery successful at catching these 3eo3le, Using the facial recognition technology2 officials can search through facial images in

E mail 'anil()*+yahoo,co,in,

Facial Recognition using the theory of biometrics

%age E of .

the 0oter (atabase for (u3licates at the time of registration, Ne5 images are com3are( to the recor(s alrea(y on file to catch those 5ho attem3t to register un(er aliases, %otential a33lications e0en inclu(e $T! an( chec7 cashing security, The soft5are is able to 8uic7ly 0erify a customer6s face, $fter the user consents2 the $T! or chec7 cashing 7ios7 ca3tures a (igital 3hoto of the customer, The facial recognition soft5are then generates a face3rint of the 3hotogra3h to 3rotect customers against i(entity theft an( frau(ulent transactions, By using facial recognition soft5are2 there6s no nee( for a 3icture IB2 ban7 car( or 3ersonal i(entification number #%IN& to 0erify a customer6s i(entity, +any people w!o on2t use ban%s use c!ec%'cas!ing mac!ines. Facial recognition coul eliminate possible criminal acti1ity. This biometric technology coul( also be use( to secure your com3uter files, By mounting a /ebcam to your com3uter an( installing the facial recognition soft5are2 your face can become the 3ass5or( you use to get into your com3uter, IB! has incor3orate( the technology into a screensa0er for itCs $2 T an( D series Thin7%a( la3to3s, $ebcam an Facial Recognition Software installe

Newly Captured Image

Comparing newly captured Image

Database Image

Facial recognition software can be use to loc% your computer.

E mail 'anil()*+yahoo,co,in,

Facial Recognition using the theory of biometrics

%age . of .

Conclusion
/ith the follo5ing a(0antages an( also some of the (ra5bac7s2 5e conclu(e our 3a3er on Facial Recognition using Biometrics, %otential a33lications are as follo5s'

0liminating 1oter frau Security law enforcement an Security sur1eillance AT+ an C!ec%'cas!ing i entity 1erification Computer security

/hile facial recognition can be use( to 3rotect your 3ri0ate information2 it can 4ust as easily be use( to in0a(e your 3ri0acy by ta7ing you 3icture 5hen you are entirely una5are of the camera, $s 5ith many (e0elo3ing technologies2 the incre(ible 3otential of facial recognition comes 5ith (ra5bac7s, But if 5e a(( both the facial recognition an( the normal 3ass5or( security 5e can ha0e an a((e( #ouble Security 5hich is more reliable than one shiel( security2 >ust same as the 8uote FTwo !ea s are better t!an oneG,

+AILI*. A##R0SS3

#.Anil 4umar
S5o #.".Rao 6pp.appolo !ospital, 7ina%ini a1enue, #argamitta post,

E mail 'anil()*+yahoo,co,in,

Facial Recognition using the theory of biometrics

%age H of .

*ellore 8 )9- ::).

E mail 'anil()*+yahoo,co,in,

Vous aimerez peut-être aussi