SlideShare a Scribd company logo
Face detection issues
Biometrics Issues
By:
Mohamed F. Soliman
Electrical & Computer Engineering
Face detection issues
Today’s Agenda
Presentation Title Here
• After completing this lesson you will be able
to:
– have an overview knowledge about Biometric
Technologies image issues.
– have an overview knowledge about Biometric
Technologies privacy issues.
 It requires almost no interaction on behalf of the
user.
 It is accurate and allows for high enrolment and
verification rates.
 It can use your existing hardware infrastructure,
existing cameras and image capture Devices will
work with no problems
9/28/2013 6
In Face recognition there are two types of comparisons:-

9/28/2013 7
 All identification or authentication technologies
operate using the following four stages:
9/28/2013 8
Capture
Extraction
Comparison
Match
Non-match
Issues with Face Recognition
• Resolution/Quality
• Orientation
• Scale
• Lighting
• Image Currency
– Physiologic changes due
to aging
• Face expression
Face detection issues
Face detection issues
Face detection issues
• Video Surveillance or privacy?
• Personal data security
Video Surveillance, Biometrics, and Privacy
In what public places do you already
assume you are under video surveillance?
When you walk
into a building
from a parking
lot?
Video Surveillance, Biometrics, and Privacy
In what public places do you already
assume you are under video surveillance?
When you shop
at your favorite
store? Or go to
your bank?
Video Surveillance, Biometrics, and Privacy
In what public places do you already
assume you are under video surveillance?
When you buy
gas for your car?
Video Surveillance, Biometrics, and Privacy
Is it possible to use the technology to
track you? Or study your habits?
What about my information which is
captured?
……..
Video Surveillance, Biometrics, and Privacy
Biometrics technology are going to be every where,
but we need to be aware of its issues and
limitations:
• Image issues
• Personal data security
• ……
Next lesson…
- What about other issues like:
- Design
- Matching
- …
- This will be our next lesson.
- For more information www.biometric.org
Face detection issues
Ad

More Related Content

Viewers also liked (15)

fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
priyanka reddy
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computing
Ahmed Banafa
 
Fog computing technology
Fog computing technologyFog computing technology
Fog computing technology
Nikhil Sabu
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
priyanka reddy
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and Applications
Dr. Mazlan Abbas
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
Anastasios Economides
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
Liwei Ren任力偉
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt
sravya raju
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
Saisharan Amaravadhi
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?
Felix Grovit
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
ForgeRock
 
What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?
Dr. Mazlan Abbas
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
Pasquale Puzio
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Dr. Mazlan Abbas
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Mohan Kumar G
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
priyanka reddy
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computing
Ahmed Banafa
 
Fog computing technology
Fog computing technologyFog computing technology
Fog computing technology
Nikhil Sabu
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
priyanka reddy
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and Applications
Dr. Mazlan Abbas
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
Liwei Ren任力偉
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt
sravya raju
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?
Felix Grovit
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
ForgeRock
 
What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?
Dr. Mazlan Abbas
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
Pasquale Puzio
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Dr. Mazlan Abbas
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Mohan Kumar G
 

Similar to Face detection issues (20)

Computer vision ppt
Computer vision pptComputer vision ppt
Computer vision ppt
RachitSogani1
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition System
StudentRocks
 
Secure Mobile Banking
Secure Mobile BankingSecure Mobile Banking
Secure Mobile Banking
Veridium
 
Face detection security system & setting raspberry pi (1)
Face detection security system & setting raspberry pi (1)Face detection security system & setting raspberry pi (1)
Face detection security system & setting raspberry pi (1)
satyamswet
 
IRJET- IoT based Door Access Control using Face Recognition
IRJET- IoT based Door Access Control using Face RecognitionIRJET- IoT based Door Access Control using Face Recognition
IRJET- IoT based Door Access Control using Face Recognition
IRJET Journal
 
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET Journal
 
Face recognition
Face recognition Face recognition
Face recognition
Chandan A V
 
Facial Recognition Door unlock using Machine Learning.
Facial Recognition Door unlock using Machine Learning.Facial Recognition Door unlock using Machine Learning.
Facial Recognition Door unlock using Machine Learning.
YuvrajGanguly2
 
Seecure Columbia
Seecure ColumbiaSeecure Columbia
Seecure Columbia
Stanford University
 
Face recognition
Face recognitionFace recognition
Face recognition
Avinash Prakash
 
Rothke Tomhave The Biometric Devils In The Details
Rothke Tomhave The Biometric Devils In The DetailsRothke Tomhave The Biometric Devils In The Details
Rothke Tomhave The Biometric Devils In The Details
Ben Rothke
 
ppt minor project.pptx
ppt minor project.pptxppt minor project.pptx
ppt minor project.pptx
Dakshthakur9
 
Portable Biometrics (1)
Portable Biometrics (1)Portable Biometrics (1)
Portable Biometrics (1)
Torrey Hutchison
 
MBA SYSTEMS To study on Public Safety through Innovative Face Recognition Tec...
MBA SYSTEMS To study on Public Safety through Innovative Face Recognition Tec...MBA SYSTEMS To study on Public Safety through Innovative Face Recognition Tec...
MBA SYSTEMS To study on Public Safety through Innovative Face Recognition Tec...
suvidhakamble12
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
priyabratamansingh1
 
Mobile Solutions and Privacy – Not One at the Expense of the Other
 Mobile Solutions and Privacy – Not One at the Expense of the Other Mobile Solutions and Privacy – Not One at the Expense of the Other
Mobile Solutions and Privacy – Not One at the Expense of the Other
bradley_g
 
Markus Paasovaara: Face recognition
Markus Paasovaara: Face recognitionMarkus Paasovaara: Face recognition
Markus Paasovaara: Face recognition
Futurice
 
Car Cybersecurity: The Gap Still Exists
Car Cybersecurity: The Gap Still ExistsCar Cybersecurity: The Gap Still Exists
Car Cybersecurity: The Gap Still Exists
Security Innovation
 
Strategies for Choosing eKYC Solutions.pdf
Strategies for Choosing eKYC Solutions.pdfStrategies for Choosing eKYC Solutions.pdf
Strategies for Choosing eKYC Solutions.pdf
KMSSolutionsMarketin
 
Guide - How to choose Liveness detection - Oz Forensics
Guide - How to choose Liveness detection - Oz ForensicsGuide - How to choose Liveness detection - Oz Forensics
Guide - How to choose Liveness detection - Oz Forensics
Oz Forensics
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition System
StudentRocks
 
Secure Mobile Banking
Secure Mobile BankingSecure Mobile Banking
Secure Mobile Banking
Veridium
 
Face detection security system & setting raspberry pi (1)
Face detection security system & setting raspberry pi (1)Face detection security system & setting raspberry pi (1)
Face detection security system & setting raspberry pi (1)
satyamswet
 
IRJET- IoT based Door Access Control using Face Recognition
IRJET- IoT based Door Access Control using Face RecognitionIRJET- IoT based Door Access Control using Face Recognition
IRJET- IoT based Door Access Control using Face Recognition
IRJET Journal
 
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET Journal
 
Face recognition
Face recognition Face recognition
Face recognition
Chandan A V
 
Facial Recognition Door unlock using Machine Learning.
Facial Recognition Door unlock using Machine Learning.Facial Recognition Door unlock using Machine Learning.
Facial Recognition Door unlock using Machine Learning.
YuvrajGanguly2
 
Rothke Tomhave The Biometric Devils In The Details
Rothke Tomhave The Biometric Devils In The DetailsRothke Tomhave The Biometric Devils In The Details
Rothke Tomhave The Biometric Devils In The Details
Ben Rothke
 
ppt minor project.pptx
ppt minor project.pptxppt minor project.pptx
ppt minor project.pptx
Dakshthakur9
 
MBA SYSTEMS To study on Public Safety through Innovative Face Recognition Tec...
MBA SYSTEMS To study on Public Safety through Innovative Face Recognition Tec...MBA SYSTEMS To study on Public Safety through Innovative Face Recognition Tec...
MBA SYSTEMS To study on Public Safety through Innovative Face Recognition Tec...
suvidhakamble12
 
Mobile Solutions and Privacy – Not One at the Expense of the Other
 Mobile Solutions and Privacy – Not One at the Expense of the Other Mobile Solutions and Privacy – Not One at the Expense of the Other
Mobile Solutions and Privacy – Not One at the Expense of the Other
bradley_g
 
Markus Paasovaara: Face recognition
Markus Paasovaara: Face recognitionMarkus Paasovaara: Face recognition
Markus Paasovaara: Face recognition
Futurice
 
Car Cybersecurity: The Gap Still Exists
Car Cybersecurity: The Gap Still ExistsCar Cybersecurity: The Gap Still Exists
Car Cybersecurity: The Gap Still Exists
Security Innovation
 
Strategies for Choosing eKYC Solutions.pdf
Strategies for Choosing eKYC Solutions.pdfStrategies for Choosing eKYC Solutions.pdf
Strategies for Choosing eKYC Solutions.pdf
KMSSolutionsMarketin
 
Guide - How to choose Liveness detection - Oz Forensics
Guide - How to choose Liveness detection - Oz ForensicsGuide - How to choose Liveness detection - Oz Forensics
Guide - How to choose Liveness detection - Oz Forensics
Oz Forensics
 
Ad

Recently uploaded (20)

AsyncAPI v3 : Streamlining Event-Driven API Design
AsyncAPI v3 : Streamlining Event-Driven API DesignAsyncAPI v3 : Streamlining Event-Driven API Design
AsyncAPI v3 : Streamlining Event-Driven API Design
leonid54
 
On-Device or Remote? On the Energy Efficiency of Fetching LLM-Generated Conte...
On-Device or Remote? On the Energy Efficiency of Fetching LLM-Generated Conte...On-Device or Remote? On the Energy Efficiency of Fetching LLM-Generated Conte...
On-Device or Remote? On the Energy Efficiency of Fetching LLM-Generated Conte...
Ivano Malavolta
 
IT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information TechnologyIT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information Technology
SHEHABALYAMANI
 
machines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdfmachines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdf
AmirStern2
 
Top-AI-Based-Tools-for-Game-Developers (1).pptx
Top-AI-Based-Tools-for-Game-Developers (1).pptxTop-AI-Based-Tools-for-Game-Developers (1).pptx
Top-AI-Based-Tools-for-Game-Developers (1).pptx
BR Softech
 
Smart Investments Leveraging Agentic AI for Real Estate Success.pptx
Smart Investments Leveraging Agentic AI for Real Estate Success.pptxSmart Investments Leveraging Agentic AI for Real Estate Success.pptx
Smart Investments Leveraging Agentic AI for Real Estate Success.pptx
Seasia Infotech
 
Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025
Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025
Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025
João Esperancinha
 
AI 3-in-1: Agents, RAG, and Local Models - Brent Laster
AI 3-in-1: Agents, RAG, and Local Models - Brent LasterAI 3-in-1: Agents, RAG, and Local Models - Brent Laster
AI 3-in-1: Agents, RAG, and Local Models - Brent Laster
All Things Open
 
UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à Genève
UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à GenèveUiPath Automation Suite – Cas d'usage d'une NGO internationale basée à Genève
UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à Genève
UiPathCommunity
 
Unlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web AppsUnlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web Apps
Maximiliano Firtman
 
Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)
Kaya Weers
 
DevOpsDays SLC - Platform Engineers are Product Managers.pptx
DevOpsDays SLC - Platform Engineers are Product Managers.pptxDevOpsDays SLC - Platform Engineers are Product Managers.pptx
DevOpsDays SLC - Platform Engineers are Product Managers.pptx
Justin Reock
 
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Maarten Verwaest
 
IT484 Cyber Forensics_Information Technology
IT484 Cyber Forensics_Information TechnologyIT484 Cyber Forensics_Information Technology
IT484 Cyber Forensics_Information Technology
SHEHABALYAMANI
 
Top 5 Benefits of Using Molybdenum Rods in Industrial Applications.pptx
Top 5 Benefits of Using Molybdenum Rods in Industrial Applications.pptxTop 5 Benefits of Using Molybdenum Rods in Industrial Applications.pptx
Top 5 Benefits of Using Molybdenum Rods in Industrial Applications.pptx
mkubeusa
 
An Overview of Salesforce Health Cloud & How is it Transforming Patient Care
An Overview of Salesforce Health Cloud & How is it Transforming Patient CareAn Overview of Salesforce Health Cloud & How is it Transforming Patient Care
An Overview of Salesforce Health Cloud & How is it Transforming Patient Care
Cyntexa
 
Dark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanizationDark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanization
Jakub Šimek
 
Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?
Eric Torreborre
 
fennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solutionfennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solution
shallal2
 
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
Lorenzo Miniero
 
AsyncAPI v3 : Streamlining Event-Driven API Design
AsyncAPI v3 : Streamlining Event-Driven API DesignAsyncAPI v3 : Streamlining Event-Driven API Design
AsyncAPI v3 : Streamlining Event-Driven API Design
leonid54
 
On-Device or Remote? On the Energy Efficiency of Fetching LLM-Generated Conte...
On-Device or Remote? On the Energy Efficiency of Fetching LLM-Generated Conte...On-Device or Remote? On the Energy Efficiency of Fetching LLM-Generated Conte...
On-Device or Remote? On the Energy Efficiency of Fetching LLM-Generated Conte...
Ivano Malavolta
 
IT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information TechnologyIT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information Technology
SHEHABALYAMANI
 
machines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdfmachines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdf
AmirStern2
 
Top-AI-Based-Tools-for-Game-Developers (1).pptx
Top-AI-Based-Tools-for-Game-Developers (1).pptxTop-AI-Based-Tools-for-Game-Developers (1).pptx
Top-AI-Based-Tools-for-Game-Developers (1).pptx
BR Softech
 
Smart Investments Leveraging Agentic AI for Real Estate Success.pptx
Smart Investments Leveraging Agentic AI for Real Estate Success.pptxSmart Investments Leveraging Agentic AI for Real Estate Success.pptx
Smart Investments Leveraging Agentic AI for Real Estate Success.pptx
Seasia Infotech
 
Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025
Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025
Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025
João Esperancinha
 
AI 3-in-1: Agents, RAG, and Local Models - Brent Laster
AI 3-in-1: Agents, RAG, and Local Models - Brent LasterAI 3-in-1: Agents, RAG, and Local Models - Brent Laster
AI 3-in-1: Agents, RAG, and Local Models - Brent Laster
All Things Open
 
UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à Genève
UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à GenèveUiPath Automation Suite – Cas d'usage d'une NGO internationale basée à Genève
UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à Genève
UiPathCommunity
 
Unlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web AppsUnlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web Apps
Maximiliano Firtman
 
Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)
Kaya Weers
 
DevOpsDays SLC - Platform Engineers are Product Managers.pptx
DevOpsDays SLC - Platform Engineers are Product Managers.pptxDevOpsDays SLC - Platform Engineers are Product Managers.pptx
DevOpsDays SLC - Platform Engineers are Product Managers.pptx
Justin Reock
 
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Maarten Verwaest
 
IT484 Cyber Forensics_Information Technology
IT484 Cyber Forensics_Information TechnologyIT484 Cyber Forensics_Information Technology
IT484 Cyber Forensics_Information Technology
SHEHABALYAMANI
 
Top 5 Benefits of Using Molybdenum Rods in Industrial Applications.pptx
Top 5 Benefits of Using Molybdenum Rods in Industrial Applications.pptxTop 5 Benefits of Using Molybdenum Rods in Industrial Applications.pptx
Top 5 Benefits of Using Molybdenum Rods in Industrial Applications.pptx
mkubeusa
 
An Overview of Salesforce Health Cloud & How is it Transforming Patient Care
An Overview of Salesforce Health Cloud & How is it Transforming Patient CareAn Overview of Salesforce Health Cloud & How is it Transforming Patient Care
An Overview of Salesforce Health Cloud & How is it Transforming Patient Care
Cyntexa
 
Dark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanizationDark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanization
Jakub Šimek
 
Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?
Eric Torreborre
 
fennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solutionfennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solution
shallal2
 
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
Lorenzo Miniero
 
Ad

Face detection issues

  • 2. Biometrics Issues By: Mohamed F. Soliman Electrical & Computer Engineering
  • 5. • After completing this lesson you will be able to: – have an overview knowledge about Biometric Technologies image issues. – have an overview knowledge about Biometric Technologies privacy issues.
  • 6.  It requires almost no interaction on behalf of the user.  It is accurate and allows for high enrolment and verification rates.  It can use your existing hardware infrastructure, existing cameras and image capture Devices will work with no problems 9/28/2013 6
  • 7. In Face recognition there are two types of comparisons:-  9/28/2013 7
  • 8.  All identification or authentication technologies operate using the following four stages: 9/28/2013 8 Capture Extraction Comparison Match Non-match
  • 9. Issues with Face Recognition
  • 10. • Resolution/Quality • Orientation • Scale • Lighting • Image Currency – Physiologic changes due to aging • Face expression
  • 14. • Video Surveillance or privacy? • Personal data security
  • 15. Video Surveillance, Biometrics, and Privacy In what public places do you already assume you are under video surveillance? When you walk into a building from a parking lot?
  • 16. Video Surveillance, Biometrics, and Privacy In what public places do you already assume you are under video surveillance? When you shop at your favorite store? Or go to your bank?
  • 17. Video Surveillance, Biometrics, and Privacy In what public places do you already assume you are under video surveillance? When you buy gas for your car?
  • 18. Video Surveillance, Biometrics, and Privacy Is it possible to use the technology to track you? Or study your habits? What about my information which is captured? ……..
  • 19. Video Surveillance, Biometrics, and Privacy Biometrics technology are going to be every where, but we need to be aware of its issues and limitations: • Image issues • Personal data security • ……
  • 20. Next lesson… - What about other issues like: - Design - Matching - … - This will be our next lesson. - For more information www.biometric.org
  翻译: