SlideShare a Scribd company logo
FACE DETECTION SECURITY SYSTEM
ABOUT THE PROJECT
• To secure our assets and protect our privacy, there is a strong demand for
user-friendly biometric security systems. There are various types of biometric
systems that use signatures, fingerprints, voice, hand geometry, ear geometry,
face detection and so on. Among these, face recognition appears to be quite
exciting and is catching attention
• Face Detection is a computer technology being used in variety of
applications that identifies human faces in digital images.
INTRODUCTION
A. Everyday actions are increasingly being handled
electronically,instead of paper and pencil.
B. This growth in electronics transactions results in
great demand for fast and accurate user
identification and authentication.
C. Access bank accounts,computer systems,personal
lockers ands cars using PIN’s for identification
and security.
D. When credit cards and ATM cards are lost or
stolen,an unauthorized user can often come up
with correct personal codes.
E. Face recognition technology may solve this
problem since a face is undeniably connected to
its owner except in case of identical twins.
FACE RECOGNITION
A. It requires no physical interaction on behalf of the user.
B. The system captures the image of the individual and verify with
other individual in the databases.
C. Then system identifies the image of individual and sends the picture
of that person to the owner of the object with the name of the person
accessing the object otherwise it sends picture with tagline written
“unknown”.
APPLICATIONS
• Personal computer/laptop
• Locker
• Cars
• Residential security
Nodal point that are measured by the software.
• Distance between the eyes
• Width of the nose
• Depth of eye socket
• Cheekbones
• Jawline
• Chin
ADVANTAGES
• It is the only biometric able to operate without user cooperation.
• It can search against static images such as driver’s license photographs.
• Provides verification that is convenient,quick and accurate.
• It enhances safety and security as there is no key,badge or password that can
be stolen or lost.
• People don’t have to worry about the potential drawbacks related to
fingerprint identification technology,such as germs or smudges.
DISADVANTAGES
• The video and high quality images required for facial recognition take up a
signigificant amount of storage .
• Face recognition requires top quality cameras and advanced software to
ensure accuracy and speed.
• Change in physiological characteristics and acquisition environment reduce
matching accuracy.
CONCLUSION
• Factors such as environment changes and mild changes in appearance impact
the technology to a greater degree.
• For implementation where the biometric system must verify and identify
users reliably over time,facial scan can be very difficult but not impossible.
THANK YOU
Ad

More Related Content

What's hot (20)

Biometrics
BiometricsBiometrics
Biometrics
Shubham Singh
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
Dharmik
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
preeti tripathi
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
Adoitya Kaila
 
IRJET- Design, Test the Performance Evaluation of Automobile Security Tec...
IRJET-  	  Design, Test the Performance Evaluation of Automobile Security Tec...IRJET-  	  Design, Test the Performance Evaluation of Automobile Security Tec...
IRJET- Design, Test the Performance Evaluation of Automobile Security Tec...
IRJET Journal
 
Biometrics
BiometricsBiometrics
Biometrics
anjalika sinha
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
Navin Kumar
 
Biometric
 Biometric Biometric
Biometric
apekdm_91
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
rs2003
 
Biometrics
BiometricsBiometrics
Biometrics
Adothu Ram Babu
 
Biometrics presentation
Biometrics presentationBiometrics presentation
Biometrics presentation
Roshen Berenger
 
Biometric systems quiz materials
Biometric systems quiz materialsBiometric systems quiz materials
Biometric systems quiz materials
yasmeenreem
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
Rajesh Anupoju
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
Niharika Gupta
 
Face recognition
Face recognitionFace recognition
Face recognition
Avinash Prakash
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
palsantosh
 
Biometrics Pros & cons
Biometrics Pros & consBiometrics Pros & cons
Biometrics Pros & cons
Gagan Gowda
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
Awal
 
Biometrics
BiometricsBiometrics
Biometrics
shweta-sharma99
 
Biometrics
BiometricsBiometrics
Biometrics
anoop80686
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
Dharmik
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
preeti tripathi
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
Adoitya Kaila
 
IRJET- Design, Test the Performance Evaluation of Automobile Security Tec...
IRJET-  	  Design, Test the Performance Evaluation of Automobile Security Tec...IRJET-  	  Design, Test the Performance Evaluation of Automobile Security Tec...
IRJET- Design, Test the Performance Evaluation of Automobile Security Tec...
IRJET Journal
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
Navin Kumar
 
Biometric Presentation
Biometric PresentationBiometric Presentation
Biometric Presentation
rs2003
 
Biometric systems quiz materials
Biometric systems quiz materialsBiometric systems quiz materials
Biometric systems quiz materials
yasmeenreem
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
Niharika Gupta
 
Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
palsantosh
 
Biometrics Pros & cons
Biometrics Pros & consBiometrics Pros & cons
Biometrics Pros & cons
Gagan Gowda
 
Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
Awal
 

Similar to Face detection security system & setting raspberry pi (1) (20)

ppt minor project.pptx
ppt minor project.pptxppt minor project.pptx
ppt minor project.pptx
Dakshthakur9
 
presentation on Biometric authentication.ppsx
presentation on Biometric authentication.ppsxpresentation on Biometric authentication.ppsx
presentation on Biometric authentication.ppsx
sagarskp108
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
branjith
 
Facial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdfFacial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdf
talkaton
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
Siddharth Modi
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
Poooi2
 
Biometrics 2.pptx
Biometrics 2.pptxBiometrics 2.pptx
Biometrics 2.pptx
Mayank Raiborde
 
Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...
Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...
Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...
Easy Solutions Inc
 
Envisioning the future using iris scanning biometrics
Envisioning the future using iris scanning biometricsEnvisioning the future using iris scanning biometrics
Envisioning the future using iris scanning biometrics
rtambe171
 
Face recognition
Face recognition Face recognition
Face recognition
Chandan A V
 
Biometrics
BiometricsBiometrics
Biometrics
Don Caeiro
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
Sampat Patnaik
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
sravya raju
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition System
StudentRocks
 
Markus Paasovaara: Face recognition
Markus Paasovaara: Face recognitionMarkus Paasovaara: Face recognition
Markus Paasovaara: Face recognition
Futurice
 
Biometrics-Authentication-Securing-the-Future (1).pptx
Biometrics-Authentication-Securing-the-Future (1).pptxBiometrics-Authentication-Securing-the-Future (1).pptx
Biometrics-Authentication-Securing-the-Future (1).pptx
allinmovie32
 
Biometrics-Authentication-Securing-the-Future (1).pptx
Biometrics-Authentication-Securing-the-Future (1).pptxBiometrics-Authentication-Securing-the-Future (1).pptx
Biometrics-Authentication-Securing-the-Future (1).pptx
allinmovie32
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendace
sbk50000
 
Mini project in 3rd year student for presentation topic "Biometric"
Mini project in 3rd year student for presentation topic "Biometric"Mini project in 3rd year student for presentation topic "Biometric"
Mini project in 3rd year student for presentation topic "Biometric"
dolyprajapati263
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
Dhara k
 
ppt minor project.pptx
ppt minor project.pptxppt minor project.pptx
ppt minor project.pptx
Dakshthakur9
 
presentation on Biometric authentication.ppsx
presentation on Biometric authentication.ppsxpresentation on Biometric authentication.ppsx
presentation on Biometric authentication.ppsx
sagarskp108
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
branjith
 
Facial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdfFacial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdf
talkaton
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
Siddharth Modi
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
Poooi2
 
Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...
Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...
Authentication Simple as a Selfie - How Biometrics are Reducing Customer Fric...
Easy Solutions Inc
 
Envisioning the future using iris scanning biometrics
Envisioning the future using iris scanning biometricsEnvisioning the future using iris scanning biometrics
Envisioning the future using iris scanning biometrics
rtambe171
 
Face recognition
Face recognition Face recognition
Face recognition
Chandan A V
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
Sampat Patnaik
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
sravya raju
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition System
StudentRocks
 
Markus Paasovaara: Face recognition
Markus Paasovaara: Face recognitionMarkus Paasovaara: Face recognition
Markus Paasovaara: Face recognition
Futurice
 
Biometrics-Authentication-Securing-the-Future (1).pptx
Biometrics-Authentication-Securing-the-Future (1).pptxBiometrics-Authentication-Securing-the-Future (1).pptx
Biometrics-Authentication-Securing-the-Future (1).pptx
allinmovie32
 
Biometrics-Authentication-Securing-the-Future (1).pptx
Biometrics-Authentication-Securing-the-Future (1).pptxBiometrics-Authentication-Securing-the-Future (1).pptx
Biometrics-Authentication-Securing-the-Future (1).pptx
allinmovie32
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendace
sbk50000
 
Mini project in 3rd year student for presentation topic "Biometric"
Mini project in 3rd year student for presentation topic "Biometric"Mini project in 3rd year student for presentation topic "Biometric"
Mini project in 3rd year student for presentation topic "Biometric"
dolyprajapati263
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
Dhara k
 
Ad

Recently uploaded (20)

Understanding SEO in the Age of AI.pdf
Understanding SEO in the Age of AI.pdfUnderstanding SEO in the Age of AI.pdf
Understanding SEO in the Age of AI.pdf
Fulcrum Concepts, LLC
 
AI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamsonAI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamson
UXPA Boston
 
Config 2025 presentation recap covering both days
Config 2025 presentation recap covering both daysConfig 2025 presentation recap covering both days
Config 2025 presentation recap covering both days
TrishAntoni1
 
Cybersecurity Threat Vectors and Mitigation
Cybersecurity Threat Vectors and MitigationCybersecurity Threat Vectors and Mitigation
Cybersecurity Threat Vectors and Mitigation
VICTOR MAESTRE RAMIREZ
 
DNF 2.0 Implementations Challenges in Nepal
DNF 2.0 Implementations Challenges in NepalDNF 2.0 Implementations Challenges in Nepal
DNF 2.0 Implementations Challenges in Nepal
ICT Frame Magazine Pvt. Ltd.
 
Unlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web AppsUnlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web Apps
Maximiliano Firtman
 
Top-AI-Based-Tools-for-Game-Developers (1).pptx
Top-AI-Based-Tools-for-Game-Developers (1).pptxTop-AI-Based-Tools-for-Game-Developers (1).pptx
Top-AI-Based-Tools-for-Game-Developers (1).pptx
BR Softech
 
Why Slack Should Be Your Next Business Tool? (Tips to Make Most out of Slack)
Why Slack Should Be Your Next Business Tool? (Tips to Make Most out of Slack)Why Slack Should Be Your Next Business Tool? (Tips to Make Most out of Slack)
Why Slack Should Be Your Next Business Tool? (Tips to Make Most out of Slack)
Cyntexa
 
UiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptx
UiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptxUiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptx
UiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptx
anabulhac
 
ACE Aarhus - Team'25 wrap-up presentation
ACE Aarhus - Team'25 wrap-up presentationACE Aarhus - Team'25 wrap-up presentation
ACE Aarhus - Team'25 wrap-up presentation
DanielEriksen5
 
Dark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanizationDark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanization
Jakub Šimek
 
React Native for Business Solutions: Building Scalable Apps for Success
React Native for Business Solutions: Building Scalable Apps for SuccessReact Native for Business Solutions: Building Scalable Apps for Success
React Native for Business Solutions: Building Scalable Apps for Success
Amelia Swank
 
Build With AI - In Person Session Slides.pdf
Build With AI - In Person Session Slides.pdfBuild With AI - In Person Session Slides.pdf
Build With AI - In Person Session Slides.pdf
Google Developer Group - Harare
 
Artificial_Intelligence_in_Everyday_Life.pptx
Artificial_Intelligence_in_Everyday_Life.pptxArtificial_Intelligence_in_Everyday_Life.pptx
Artificial_Intelligence_in_Everyday_Life.pptx
03ANMOLCHAURASIYA
 
Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025
Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025
Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025
João Esperancinha
 
Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025
Damco Salesforce Services
 
Agentic Automation - Delhi UiPath Community Meetup
Agentic Automation - Delhi UiPath Community MeetupAgentic Automation - Delhi UiPath Community Meetup
Agentic Automation - Delhi UiPath Community Meetup
Manoj Batra (1600 + Connections)
 
論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...
論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...
論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...
Toru Tamaki
 
fennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solutionfennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solution
shallal2
 
IT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information TechnologyIT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information Technology
SHEHABALYAMANI
 
Understanding SEO in the Age of AI.pdf
Understanding SEO in the Age of AI.pdfUnderstanding SEO in the Age of AI.pdf
Understanding SEO in the Age of AI.pdf
Fulcrum Concepts, LLC
 
AI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamsonAI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamson
UXPA Boston
 
Config 2025 presentation recap covering both days
Config 2025 presentation recap covering both daysConfig 2025 presentation recap covering both days
Config 2025 presentation recap covering both days
TrishAntoni1
 
Cybersecurity Threat Vectors and Mitigation
Cybersecurity Threat Vectors and MitigationCybersecurity Threat Vectors and Mitigation
Cybersecurity Threat Vectors and Mitigation
VICTOR MAESTRE RAMIREZ
 
Unlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web AppsUnlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web Apps
Maximiliano Firtman
 
Top-AI-Based-Tools-for-Game-Developers (1).pptx
Top-AI-Based-Tools-for-Game-Developers (1).pptxTop-AI-Based-Tools-for-Game-Developers (1).pptx
Top-AI-Based-Tools-for-Game-Developers (1).pptx
BR Softech
 
Why Slack Should Be Your Next Business Tool? (Tips to Make Most out of Slack)
Why Slack Should Be Your Next Business Tool? (Tips to Make Most out of Slack)Why Slack Should Be Your Next Business Tool? (Tips to Make Most out of Slack)
Why Slack Should Be Your Next Business Tool? (Tips to Make Most out of Slack)
Cyntexa
 
UiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptx
UiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptxUiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptx
UiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptx
anabulhac
 
ACE Aarhus - Team'25 wrap-up presentation
ACE Aarhus - Team'25 wrap-up presentationACE Aarhus - Team'25 wrap-up presentation
ACE Aarhus - Team'25 wrap-up presentation
DanielEriksen5
 
Dark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanizationDark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanization
Jakub Šimek
 
React Native for Business Solutions: Building Scalable Apps for Success
React Native for Business Solutions: Building Scalable Apps for SuccessReact Native for Business Solutions: Building Scalable Apps for Success
React Native for Business Solutions: Building Scalable Apps for Success
Amelia Swank
 
Artificial_Intelligence_in_Everyday_Life.pptx
Artificial_Intelligence_in_Everyday_Life.pptxArtificial_Intelligence_in_Everyday_Life.pptx
Artificial_Intelligence_in_Everyday_Life.pptx
03ANMOLCHAURASIYA
 
Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025
Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025
Could Virtual Threads cast away the usage of Kotlin Coroutines - DevoxxUK2025
João Esperancinha
 
Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025
Damco Salesforce Services
 
論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...
論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...
論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...
Toru Tamaki
 
fennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solutionfennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solution
shallal2
 
IT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information TechnologyIT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information Technology
SHEHABALYAMANI
 
Ad

Face detection security system & setting raspberry pi (1)

  • 2. ABOUT THE PROJECT • To secure our assets and protect our privacy, there is a strong demand for user-friendly biometric security systems. There are various types of biometric systems that use signatures, fingerprints, voice, hand geometry, ear geometry, face detection and so on. Among these, face recognition appears to be quite exciting and is catching attention • Face Detection is a computer technology being used in variety of applications that identifies human faces in digital images.
  • 3. INTRODUCTION A. Everyday actions are increasingly being handled electronically,instead of paper and pencil. B. This growth in electronics transactions results in great demand for fast and accurate user identification and authentication. C. Access bank accounts,computer systems,personal lockers ands cars using PIN’s for identification and security. D. When credit cards and ATM cards are lost or stolen,an unauthorized user can often come up with correct personal codes. E. Face recognition technology may solve this problem since a face is undeniably connected to its owner except in case of identical twins.
  • 4. FACE RECOGNITION A. It requires no physical interaction on behalf of the user. B. The system captures the image of the individual and verify with other individual in the databases. C. Then system identifies the image of individual and sends the picture of that person to the owner of the object with the name of the person accessing the object otherwise it sends picture with tagline written “unknown”.
  • 5. APPLICATIONS • Personal computer/laptop • Locker • Cars • Residential security
  • 6. Nodal point that are measured by the software. • Distance between the eyes • Width of the nose • Depth of eye socket • Cheekbones • Jawline • Chin
  • 7. ADVANTAGES • It is the only biometric able to operate without user cooperation. • It can search against static images such as driver’s license photographs. • Provides verification that is convenient,quick and accurate. • It enhances safety and security as there is no key,badge or password that can be stolen or lost. • People don’t have to worry about the potential drawbacks related to fingerprint identification technology,such as germs or smudges.
  • 8. DISADVANTAGES • The video and high quality images required for facial recognition take up a signigificant amount of storage . • Face recognition requires top quality cameras and advanced software to ensure accuracy and speed. • Change in physiological characteristics and acquisition environment reduce matching accuracy.
  • 9. CONCLUSION • Factors such as environment changes and mild changes in appearance impact the technology to a greater degree. • For implementation where the biometric system must verify and identify users reliably over time,facial scan can be very difficult but not impossible.
  翻译: