Documente Academic
Documente Profesional
Documente Cultură
INTRODUCTION:
1) Finger scan
2) Facial recognition
3) Iris scan
4) Hand scan and
5) Retina scan
1) keystroke scan
2) voice scan
3) signature scan
IMPLEMENTATION:
These type of technologies are operated using four step:
1) Capture:
A sample of face of any person is captured during identification process.
2) Extraction:
Unique data from that persons face is extracted (like specific characteristics) and
template is created
3) Comparison:
The sample is then compared to the many other samples that are stored in a data base.
4) Match/non match:
The system then decides that whether the specifications of that particular individual
matches with the other samples.
HOW FACE RECOGNITION SYSTEM WORKS?
This software has the ability to first recognize face and if we look ourselves in the mirror we will
notice that we have some distinguishable landmarks on our face. There are about 80 nodal
points on our face thorough which our face can be recognized. However only a few are
measured by a software and these are:
1) Width of nose
2) Cheek bone
3) Distance between our eyes
4) Width of our nose
5) Chin and
6) Jaw line
It is basically obtained from 70 nodal points and after that it gets the representation of the face.
After that it matches the image with the given sample .These nodal points are measured and
they create a numerical code, basically a string of numbers that represents a face. Only 14-22
nodal points are needed to recognize a face.
3-D FACIAL RECOGNITION:
Feature extraction model does not provide as accurate results as that of a 3D facial recognition
model as it can recognize the sample or the person from various angles. The main thing which it
focuses is the iris of the eye. Unlike the finger prints people have different iris , even the
identical twins have different pattern of iris. So there won’t be any problem while using this
model
1) Enrollment module:
2) Data base:
Another entity handles the compression, processing and storage of the captured data
with stored data.
3) Verification module:
It consists of a preprocessing system. In this system the newly added sample is matched
with the sample stored in the database and the decision is made on the data stored in
the data base
ADVANTAGES:
1) It is performed without even a person even knowing of it
2) It is inexpensive and a appropriate way of recognition
3) It is a very fast system , it compares 1,00,000 faces per second.
DISADVANTAGES:
APPLICATION:
Day care: identifies who is going to pick your children.
Residential Security: helps to alert the home owner on the entrance of a stranger
Voter verification: eligible politicians are required their identity during voting process.
CONCLUSION:
Face recognition technology has been associated with a very top secure application but this
technology is now a day’s being widely used in all application, even this technology is being
found in our cell phone but as mentioned before it is not able to identify the identical twins.