Uploaded on Jan 27, 2020
PPT on All about Facial Recognition Technology.
All about Facial Recognition Technology.
All about Facial Recognition Technology Introduction Facial recognition is a class of biometric programming that maps a person's facial highlights scientifically and stores the information as a face print. The product utilizes profound learning calculations to think about a live catch or computerized picture to the put away face print so as to confirm a person's character. How does it work ? The product recognizes 80 nodal points on a human face. Nodal points are endpoints used to quantify factors of an individual's face, for example, the length or width of the nose, the profundity of the eye attachments and the state of the cheekbones. Step-1 An image of your face is caught from a photograph or video. Your face may show up alone or in a group. Your picture may give you looking straight ahead or almost in profile. Step-2 Facial recognition peruses the geometry of your face. Key elements incorporate the separation between your eyes and the good ways from temple to jaw. The product recognizes facial tourist spots, where one framework recognizes 68 of them that are vital to recognizing your face. The outcome: your facial mark. Step-3 Your facial mark, a scientific equation is contrasted with a database of known countenances. Furthermore, think about this: in any event 117 million Americans have pictures of their appearances in at least one police database. As indicated by a May 2018 report, the FBI has approached 412 million facial pictures for the look. Step-4 An assurance is made. Your face print may coordinate that of a picture in a facial acknowledgment framework database. Facial Recognition For whom ? Mostly found in the below areas: Crowded airports Mobile phones Colleges Companies Worship places Reasons to be concerned about Privacy Here are some: Security Prevalence Ownership Safety Mistaken identity Benefits 1. No need to physically contact a device for authentication 2. Improved level of security 3. Requires less processing compared to other biometric authentication techniques. 4. Easy to integrate with existing security features 5. Accuracy of readings has improved over time 6. Can be used to help automate authentication
Comments