Uploaded on Jan 27, 2020
PPT on All about Facial Recognition Technology.
All about Facial Recognition Technology.
All about Facial
Recognition Technology
Introduction
Facial recognition is a class of biometric programming that
maps a person's facial highlights scientifically and stores
the information as a face print.
The product utilizes profound learning calculations to think
about a live catch or computerized picture to the put away
face print so as to confirm a person's character.
How does it work ?
The product recognizes 80 nodal points on a human face.
Nodal points are endpoints used to quantify factors of an
individual's face, for example, the length or width of the
nose, the profundity of the eye attachments and the state of
the cheekbones.
Step-1
An image of your face is caught from a photograph or
video.
Your face may show up alone or in a group. Your picture
may give you looking straight ahead or almost in profile.
Step-2
Facial recognition peruses the geometry of your face. Key
elements incorporate the separation between your eyes and
the good ways from temple to jaw.
The product recognizes facial tourist spots, where one
framework recognizes 68 of them that are vital to
recognizing your face. The outcome: your facial mark.
Step-3
Your facial mark, a scientific equation is contrasted with a
database of known countenances.
Furthermore, think about this: in any event 117 million
Americans have pictures of their appearances in at least
one police database. As indicated by a May 2018 report, the
FBI has approached 412 million facial pictures for the look.
Step-4
An assurance is made. Your face print may coordinate that
of a picture in a facial acknowledgment framework
database.
Facial Recognition For whom ?
Mostly found in the below areas:
Crowded airports
Mobile phones
Colleges
Companies
Worship places
Reasons to be concerned about Privacy
Here are some:
Security
Prevalence
Ownership
Safety
Mistaken identity
Benefits
1. No need to physically contact a device for
authentication
2. Improved level of security
3. Requires less processing compared to other
biometric authentication techniques.
4. Easy to integrate with existing security
features
5. Accuracy of readings has improved over time
6. Can be used to help automate authentication
Comments