Anda di halaman 1dari 39

Computer Science Department

FACE RECOGNITION

Face Recognition Technology


A SEMINAR REPORT
Submitted By

XXXXXX XXXXXX
In partial fulfillment for the award of the degree of

BACHELOR OF TECHNOLOGY
IN

COMPUTER SCIENCE & ENGINEERING AT College logo

Yagyavalkya Institute of Technology


JAIPUR
SESSION 2009-2010

Computer Science Department

FACE RECOGNITION

Preface
Engineering is associated with skill, creativity and judgment, which is not a theory subject but an art which can be obtained with systematic study, observation and practice. To bridge the gap of theoretical and practical study and to provide a solution for the same practical knowledge is indispensable. In the college circulation we usually get the theoretical knowledge of industries, as how it works. But how can we prove our theoretical knowledge to increase the productivity or efficiency of the industry? To overcome the same problem, we, the students of XXXXXXXXXXXX Institute of Technology are supposed to go a practical training of 30 days at the end of sixth semester as the time is predefined to be familiar with industrial environment. This report briefly describes a study-cum-report Recognition Technology and other related features. on Face

Without such practical works, only theoretical Engineering is of little value. Surely, it will be highly beneficial for us.

XXXX X XXXXX
FINAL B. [COMPUTER SCIENCE]

Computer Science Department

FACE RECOGNITION

Acknowledgment
I sincerely acknowledge Mr. XXXXXX XXXXX Head, Computer engineering Department, YIT, Jaipur who helped us a lot so that project was completed within specified period. We are extremely grateful to him for his kind consent, co-operation and encouragement. We are greatly motivated by his character of looking everything from completely differently angle and his never ending enthusiasm work. I also learned a lot from while attending his sessions.

We acknowledge Mr. XXXXXX XXXXX (Seminar Coordinator), who has helped and guided us throughout in the completion of this project as well as the challenges that lie behind us. He is always there to meet and talk about my ideas, to proofread and mark up my project. We are really fortunate to work under this guidance .He was instrumental in making us understand how to implement the project and also provided continuous supervision of the project.

This project has been benefited from the many useful comments provided to me by the numerous of my colleagous. In addition many other of my friends have checked it and have offered many suggestions and comments. Besides there are some books and some online helps. Although I cannot mention all these people here, I thank each and everyone who supported me on this.

Computer Science Department

FACE RECOGNITION

CERTIFICATE
Date:

This is to certify that the seminar titled Face Recognition


Technology

submitted

by

XXXXX

XXXX

in

partial

fulfillment for the award of degree of Bachelor of Technology of Rajasthan Technical University, Kota has been carried out under my supervision during the academic year 2009-2010.This work has not been submitted partially or wholly to any other University or Institute for the award of this or any other degree or diploma.

Signature Signature Mr. XXXX XXXXX

Computer Science Department

FACE RECOGNITION

Mr. XXXXX XXXXX HOD CS Seminar Guide

Contents Page no. 1. Abstract 6 2. Introduction .. 7 3. FRT operation 8 4. FRT task.. . .10 5. Step of facial recognition..13

Computer Science Department

FACE RECOGNITION

6. Moral consideration of FRT.. .15 7. Difficulties 18 8. Conclusion 21 9. References 22

Computer Science Department

FACE RECOGNITION

ABSTRACT
A face recognition technology is used to automatically identify a person through a digital image. It is mainly used in security systems. The face recognition will directly capture information about the shapes of faces. The main advantage of facial recognition is it identifies each individuals skin tone of a human faces surface, like the curves of the eye hole, nose, and chin, etc. this technology may also be used in very dark condition. It can view the face in different angles to identify. It is mainly used in airports were it ill recognize the face and we can avoid some unwanted terrorist. When compared with other biometrics systems using fingerprint and iris, face recognition has different advantages because it is without touching the person. Trough Face images we can capture the person identification from a distance without touching or interacting with them. And also face recognition is used for crime restriction purpose because face images that have been recorded and archived, so that it ill help us to identify a person later. This report develops a socio-political analysis that bridges the technical and socialscientific literatures on FRT and addresses the unique challenges and concerns that attend its development, evaluation, and specific operational uses, contexts, and goals. It highlights the potential and limitations of the technology, noting those tasks for which it seems ready for deployment, those areas where performance obstacles may be overcome by future technological developments or sound operating procedures, and still other issues which appear intractable. Its concern with efficacy extends to ethical considerations

Computer Science Department

FACE RECOGNITION

Introduction to FRT (how does it work?)


Facial recognition research and FRT is a subfield in a larger field of pattern recognition research and technology. Pattern recognition technology uses statistical techniques to detect and extract patterns from data in order to match it with patterns stored in a database. The data upon which the recognition system works (such as a photo of a face) is no more than a set of discernable pixel-level patterns for the system, that is, the pattern recognition system does not perceive meaningful faces as a human would understand them. Nevertheless, it is very important for these systems to be able to locate or detect a face in a field of vision so that it is only the image pattern of the face (and not the background noise) that is processed and analyzed. This problem, as well as other issues, will be discussed as the report proceeds.

In these discussions we will attempt to develop the readers understanding of the technology without going into too much technical detail. This obviously means that our attempts to simplify some of the technical detail might also come at the cost of some rigor. Thus, readers need to be careful to bear this in mind when they draw conclusions about the technology.

Nevertheless, we do believe that our discussion will empower the policymaker to ask the right questions and make sense of the pronouncements that come from academic and commercial sources.

Computer Science Department

FACE RECOGNITION

FRT in operation Overview

Figure 1 below depicts the typical way that a FRT can be used for identification purposes. The first step in the facial recognition process is the capturing of a face image, also known as the probe image. This would normally be done using a still or video camera.

In principle, the capturing of the face image can be done with or without the knowledge (or cooperation) of the subject. This is indeed one of the most attractive features of FRT. As such, it could, in principle, be incorporated into existing good quality passive CCTV systems. However, as we will show below, locating a face in a stream of video data is not a trivial matter.

The effectiveness of the whole system is highly dependent on the quality7 and characteristics of the captured face image. The process begins with face detection and extraction from the larger image, which generally contains a background and often more complex patterns and even other faces. The system will, to the extent possible, normalize (or standardize) the probe image so that it is in the same format (size, rotation, etc.) as the images in the database. The normalized face image is then passed to the recognition software. This normally involves a number of steps such as extracting the features to create a biometric template or mathematical representation to be compared to those in the reference database (often referred to as the gallery).

In an identification application, if there is a match, an alarm solicits an operators attention to verify the match and initiate the appropriate actions. The match may either be true, calling for whatever action is deemed appropriate for the context, or it may be false (a false positive), meaning the recognition algorithm made a mistake. The process we describe here is a typical identification task.

Computer Science Department

FACE RECOGNITION

Figure 1: Overview of FRS

FRT can be used for a variety of tasks. Let us consider these in more detail.

Computer Science Department

FACE RECOGNITION

FRT tasks
FRT can typically be used for three different tasks, or combinations of tasks: verification, identification, and watch list. Each of these represents distinctive challenges to the implementation and use of FRT as well as other biometric technologies.
Home Safety and Security Systems

Because Z-Wave can transceive commands based on real time conditions, and is able to control devices in intelligent groupings, it allows novel extensions of traditional home security concepts. As an example, the opening of a Z-Wave enabled door lock can de-activate a security system and turn on lights when children arrive home from school, and send a notification to a parent's PC or cell phone via the Internet. Opening a Z-Wave enabled garage door can trigger exterior and interior home lights, while a Z-Wave motion detector can trigger an outdoor security light and a webcam, which would allow the end user to monitor the home while away.

Home Entertainment

Z-Wave's ability to command multiple devices as a unified event makes it well suited for home audio and video applications. For example, a simple "Play DVD" command on the remote control could turn on the needed components, set them to the correct inputs and even lower motorized shades and dim the room lights. ZWave's RF technology is also well suited as an evolution of conventional infrared (IR) based remote controls for home electronics, as it is not constrained by IR's line of sight and distance limitations. In January of 2008, Zensys announced a singlechip solution that pairs Z-Wave with IR control, positioning the technology as an all encompassing solution for home remote controls.

1.3 Setting up a Z-Wave network

Computer Science Department

FACE RECOGNITION

Z-Wave mesh networks can begin with a single controllable device and a controller. Additional devices can be added at any time, as can multiple controllers, including traditional hand-held controllers, key-fob controllers, wall-switch controllers and PC applications designed for management and control of a Z-Wave network.

A device must be "included" to the Z-Wave network before it can be controlled via Z-Wave. This process (also known as "pairing" and "adding") is usually achieved by pressing a sequence of buttons on the controller and the device being added to the network. This sequence only needs to be performed once, after which the device is always recognized by the controller. Devices can be removed from the Z-Wave network by a similar process of button strokes.

This inclusion process is repeated for each device in the system. Because the controller is learning the signal strength between the devices during the inclusion process, the devices themselves should be in their intended final location before they are added to the system.

However, once a device has been introduced into a network, it can become troublesome to remove the unit without actually having the functional unit present. A number of Z-Wave users have complained that a Z-Wave controller can be functionally destroyed by the bulb that it controls blowing and any controlling units then report errors every time a command that would affect that unit is sent, i.e., group commands / scene commands / all-on / all-off, etc. The only way to restore the service to a non-error reporting state is to factory reset all controllers and then relearn all Z-Wave devices.

1.4 Z-Wave Alliance

The Z-Wave Alliance is a consortium of over 160 independent manufacturers who have agreed to build wireless home control products based on the Z-Wave standard. Principal members include Cooper Wiring Devices, Danfoss, Fakro, Ingersoll-Rand, Intel, Intermatic, Leviton, Universal Electronics, Wayne-Dalton, ZWave and Zensys.

Computer Science Department

FACE RECOGNITION

Products and applications from the Z-Wave Alliance fall into all major market sectors for residential and light commercial control applications. These include lighting, HVAC and security control, as well as home theaters, automated window treatments, pool and spa controls, garage and access controls and more.

1.5 Radio specifications

Bandwidth: 9,600 bit/s or 40 kbit/s, fully interoperable

Modulation: GFSK

Range: Approximately 100 feet (or 30 meters) assuming "open air" conditions, with reduced range indoors depending on building materials, etc.

Frequency band: The Z-Wave Radio uses the 900 MHz ISM band: 908.42MHz (United States); 868.42MHz (Europe); 919.82MHz (Hong Kong); 921.42MHz (Australia/New Zealand).

1.6 Radio specifics


In Europe, the 868 MHz band has a 1% duty cycle limitation, meaning that a Z-Wave unit can only transmit 1% of the time. This limitation is not present in the U.S. 908 MHz band, but U.S. legislation imposes a 1 mW transmission power limit, as opposed to 25 mW in Europe. Z-Wave units can be in power-save mode and only be active 0.1% of the time, thus reducing power consumption dramatically.

1.7 Topology and routing


Z-Wave uses a Source-routed mesh network topology and has one or more master controllers that control routing and security. Devices can communicate to another by using intermediate nodes to actively route around household obstacles or radio dead spots that might occur. A message from node A to node C can be successfully delivered even if the two nodes are not within range, providing that a third node B can communicate with nodes A and C. If the

Computer Science Department

FACE RECOGNITION

preferred route is unavailable, the message originator will attempt other routes until a path is found to the "C" node. Therefore a Z-Wave network can span much further than the radio range of a single unit, however with several of these hops a delay may be introduced between the control command and the desired result. In order for Z-Wave units to be able to route unsolicited messages, they cannot be in sleep mode. Therefore, most battery-operated devices are not designed as repeater units. A Z-Wave network can consist of up to 232 devices with the option of bridging networks if more devices are required.

2. What is Z-Wave?
Home networking. Home communication. Home automation. Security.

2.1 Wireless sensor network


A wireless sensor network (WSN) consists of spatially distributed autonomous sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants. The development of wireless sensor networks was motivated by military applications such as battlefield surveillance. They are now used in many industrial and civilian application areas, including industrial process monitoring and control, machine health monitoring, environment and habitat monitoring, healthcare applications, home automation, and traffic control. In addition to one or more sensors, each node in a sensor network is typically equipped with a radio transceiver or other wireless communications device, a small microcontroller, and an energy source, usually a battery. A sensor node might vary in size from that of a shoebox down to the size of a grain of dust, although functioning "motes" of genuine microscopic dimensions have yet to be created. The cost of sensor nodes is similarly variable, ranging from hundreds of dollars to a few pennies, depending on the size of the sensor network and the complexity required of individual sensor nodes. Size and cost constraints on sensor nodes result in corresponding constraints on resources such as energy, memory, computational speed and bandwidth. A sensor network normally constitutes a wireless ad-hoc network, meaning that each sensor supports a multi-hop routing algorithm (several nodes may forward data packets to the base station).

Computer Science Department

FACE RECOGNITION

2.2 HOME AUTOMATION


Home automation (also called domotics) designates an emerging practice of increased automation of household appliances and features in residential dwellings, particularly through electronic means that allow for things impracticable, overly expensive or simply not possible in recent past decades. The term may be used in contrast to the more mainstream "building automation", which refers to industrial uses of similar technology, particularly the automatic or semi-automatic control of lighting, doors and windows, Heating, Ventilation and Air Conditioning, and security and surveillance systems. The techniques employed in home automation include those in building automation as well as the control of home entertainment systems, houseplant watering, pet feeding, changing the ambiance "scenes" for different events (such as dinners or parties), and the use of domestic robots. Typically, it is easier to more fully outfit a house during construction due to the accessibility of the walls, outlets, and storage rooms, and the ability to make design changes specifically to accommodate certain technologies. Wireless systems are commonly installed when outfitting a pre-existing house, as they obviate the need to make major structural changes. These communicate via radio or infrared signals with a central controller.

Overview and Benefits


As the amount of controllable fittings and domestic appliances in the home rises, the ability of these devices to interconnect and communicate with each other digitally becomes a useful and desirable feature. The consolidation of control or monitoring signals from appliances, fittings or basic services is an aim of Home automation. In simple installations this may be as straightforward as turning on the lights when a person enters the room. In advanced installations, rooms can sense not only the presence of a person inside but know who that person is and perhaps set appropriate lighting, temperature, music levels or television channels, taking into account the day of the week, the time of day, and other factors. Other automated tasks may include setting the air conditioning to an energy saving setting when the house is unoccupied, and restoring the normal setting when an occupant is about to return. More sophisticated systems can maintain an inventory of products, recording their usage through an RFID tag, and prepare a shopping list or even automatically order replacements. Home automation can also provide a remote interface to home appliances or the automation system itself, via telephone line, wireless transmission or the internet, to provide control and monitoring via a Smart Phone or Web browser An example of a remote monitoring implementation of home automation could be when a smoke detector detects a fire or smoke condition, then all lights in the house will blink to alert any

Computer Science Department

FACE RECOGNITION

occupants of the house to the possible fire. If the house is equipped with a home theatre, a home automation system can shut down all audio and video components to display the alert or make an audible announcement. The system could also call the home owner on their mobile phone to alert them, or call the fire brigade or alarm monitoring company to bring it to their attention.

Standards and bridges


There have been many attempts to standardize the forms of hardware, electronic and communication interfaces needed to construct a home automation system. Specific domestic wiring and communication standards include: BACnet INSTEON X10 KNX (standard) LonWorks C-Bus SCS BUS with OpenWebNet Universal powerline bus (UPB) ZigBee and, Z-Wave Some standards use additional communication and control wiring, some embed signals in the existing power circuit of the house, some use radio frequency (RF) signals, and some use a combination of several methods. Control wiring is hardest to retrofit into an existing house. Some appliances include USB that is used to control it and connect it to a domotics network. Bridges translate information from one standard to another (eg. from

The New Standard in Wireless Remote Control


Z-Wave powers Z~Series. And to do so it takes the principals of modern, wireless technology and applies it to home automation and control. To do so it uses all the principals that are important to modern home automation: reliability, affordability, and the ability to install without laying down cables or knocking holes in walls.

Computer Science Department

FACE RECOGNITION

Z-Wave makes any home a smart home quickly, easily and affordably! Z-Wave is a next-generation wireless ecosystem that lets all your home electronics talk to each other, and to you, via remote control. It uses simple, reliable, low-power radio waves that easily travel through walls, floors and cabinets. Z-Wave control can be added

Verification (Am I the identity I claim to be?)

Verification or authentication is the simplest task for a FRT. An individual with a pre-existing relationship with an institution (and therefore already enrolled in the reference database or gallery) presents his or her biometric characteristics (face or probe image) to the system, claiming to be in the reference database or gallery (i.e. claiming to be a legitimate identity). The system must then attempt to match the probe image with the particular, claimed template in the reference database. This is a one-to-one matching task since the system does not need to check every record in the database but only that which corresponds to the claimed identity (using some form of identifier such as an employee number to access the record in the reference database). There are two possible outcomes: (1) the person is not recognized or (2) the person is recognized. If the person is not recognized (i.e., the identity is not verified) it might be because the person is an imposter (i.e., is making an illegitimate identity claim) or because the system made a mistake (this mistake is referred to as a false reject). The system may also make a mistake in accepting a claim when it is in fact false (this is referred to as a false accept).

The relationship between these different outcomes in the verification task is indicated in Figure 2

Computer Science Department

FACE RECOGNITION

Figure 2: Possible outcomes in the verification task

Identification (Who am I or What is my identity?)

Identification is a more complex task than verification. In this case, the FRT is provided a probe image to attempt to match it with a biometric reference in the gallery (or not). This represents a one-to-many problem. In addition, we need to further differentiate between closed-set identification problems and open-set identification problems. In a closed-set identification problem we want to identify a person that we know is in the reference database or gallery (in other words for any possible identification we want to make we know beforehand that the person to be identified is in the database). Open-set identification is more complex in that we do not know in advance whether the person to be identified is or is not in the reference database. The outcome of these two identification problems will be interpreted differently. If there is no match in the closed-set identification then we know the system has made a mistake (i.e., identification has failed (a false negative)).

Computer Science Department

FACE RECOGNITION

However in the open-set problem we do not know whether the system made a mistake or whether the identity is simply not in the reference database in the first instance. Real-world identification applications tend to be open-set identification problems rather than closed-set identification problems.

Figure 3: Possible outcomes in the identification task

Computer Science Department

FACE RECOGNITION

Five Steps to Facial Recognition

1.Capture image

2. Find face in image 3. Extract features 4. Compare templates 5. Declare matches

As a biometric, facial recognition is a form of computer vision that uses faces to attempt to identify a person or verify a persons claimed identity. Regardless of specific method used, facial recognition is accomplished in a five step process.

1. First, an image of the face is acquired. This acquisition can be accomplished by digitally scanning an existing photograph or by using an electro-optical camera to acquire a live picture of a subject. As video is a rapid sequence of individual still images, it can also be used as a source of facial images. 2. Second, software is employed to detect the location of any face in the acquired image. This task is difficult, and often generalized patterns of what a face looks like (two eyes and a mouth set in an oval shape) are employed to pick out the faces. 3. Once the facial detection software has targeted a face, it can be analyzed. As noted in slide three, facial recognition analyzes the spatial geometry of distinguishing features of the face. Different vendors use different methods to extract the identifying features of a face.

Computer Science Department

FACE RECOGNITION

Thus, specific details on the methods are proprietary. The most popular method is called Principle Components Analysis (PCA), which is commonly referred to as the eigen face method. PCA has also been combined with neural networks and local feature analysis in efforts to enhance its performance.

Template generation is the result of the feature extraction process. A template is a reduced set of data that represents the unique features of an enrollees face. It is important to note that because the systems use spatial geometry of distinguishing facial features, they do not use hairstyle, facial hair, or other similar factors.

4. The fourth step is to compare the template generated in step three with those in a database of known faces. In an identification application, this process yields scores that indicate how closely the generated template matches each of those in the database. In a verification application, the generated template is only compared with one template in the database that of the claimed identity.

5. The final step is determining whether any scores produced in step four are high enough to declare a match. The rules governing the declaration of a match are often configurable by the end user, so that he or she can determine how the facial recognition system should behave based on security and operational considerations.

Computer Science Department

FACE RECOGNITION

Computer Science Department

FACE RECOGNITION

Moral considerations of FRT


This report has considered technical merits of FRT and FRS, particularly as they function in real-world settings in relation to specific goals. Although certain barriers to performance might be overcome by technical breakthroughs or mitigated by policies and guidelines, there remains a class of issues deserving attention not centered on functional efficiency but on moral and political concerns. These concerns may be grouped under general headings of privacy, fairness, freedom and autonomy, and security. While some of these are characteristically connected to facial recognition and other biometric and surveillance systems, generally, others are exacerbated, or mitigated, by details of the context, installation, and deployment policies. Therefore, the brief discussion that follows not only draws these general connections, it suggests questions that need addressing in order to anticipate and minimize impacts that are morally and politically problematic.

Privacy is one of the most prominent concerns raised by critics of FRS. This is not surprising because, at root, FRS disrupts the flow of information by connecting facial images with identity, in turn connecting this with whatever other information is held in a systems database. Although this need not in itself be morally problematic, it is important to ascertain, for any given installation, whether these new connections constitute morally unacceptable disruptions of entrenched flows (often regarded as violations of privacy) or whether they can be justified by the needs of the surrounding context. We recommend that an investigation into potential threats to privacy be guided by the following questions: Are subjects aware that their images have been obtained for and included in the gallery database? Have they consented? In what form? Have policies on access to the gallery been thoughtfully determined and explicitly stated?

Computer Science Department

FACE RECOGNITION

Are people aware that their images are being captured for identification purposes? Have and how have they consented? Have policies on access to all information captured and generated by the system been thoughtfully determined and explicitly stated? Does the deployment of an FRS in a particular context violate reasonable expectations of subjects? Have policies on the use of information captured via the FRS been thoughtfully determined and explicitly stated?

Freedom and Autonomy


In asking how facial recognition technology affects freedom and autonomy, the concern is constraints it may impose on peoples capacity to act and make decisions (agency), as well as to determine their actions and decisions according to their own values and beliefs.

Computer Science Department

FACE RECOGNITION

Human Difficulties with Facial Recognition Surveillance


Inherent Operator Limitations Humans are not good at recognizing faces of people they do not know . Operator Overload Vast amounts of information Limited attention span Limited accuracy Operator Reliability Dedication Honesty

People are generally very good at recognizing faces that they know. However, people experience difficulties when they perform facial recognition in a surveillance or watch post scenario. Several factors account for these difficulties: most notably, humans have a hard time recognizing unfamiliar faces. Combined with relatively short attention spans, it is difficult for humans to pick out unfamiliar faces.

Computer Science Department

FACE RECOGNITION

Technical Difficulties with Facial Recognition Surveillance


Finding Faces Uncontrolled background Subjects non-cooperation Subject not looking at camera Subject wearing hat, sunglasses, etc. Moving target Identifying Faces Uncontrolled environmental conditions Lighting (shadows, glare) Camera angle Image resolution Machines also experience difficulties when they perform facial recognition in a surveillance or watch post scenario.A leading biometrics expert, has explained that performing facial recognition processes with relatively high fidelity and at long distances remains technically challenging for automated systems. At the most basic level, detecting whether a face is present in a given electronic photograph is a difficult technical problem. A expert has noted that subjects should ideally be photographed under tightly controlled conditions. For example, each subject should look directly into the camera and fill the area of the photo for an automated system to reliably identify the individual or even detect his face in the photograph. The Facial Recognition Vendor Test 2000 study makes clear that the technology is not yet perfected. This comprehensive study of current facial recognition technologies, sponsored by the Department of Defense (DoD) , the Defense Advanced Research Projects Agency (DARPA), showed that environmental factors such as differences in camera angle, direction of lighting, facial expression, and other parameters can have significant effects on the ability of the systems to recognize individuals

Computer Science Department

FACE RECOGNITION

How to Reduce Difficulties


Finding and Identifying Faces Maximize control of subjects pose Maximize control of environment Backup Checks Biometric system only shows probable matches Human operator should verify potential matches By controlling a persons facial expression, as well as his distance from the camera, the camera angle, and the scenes lighting, a posed image minimizes the number of variables in a photograph. This control allows the facial recognition software to operate under near ideal conditions greatly enhancing its accuracy. Similarly, using a human operator to verify the systems results enhances performance because the operator can detect machine-generated false alarms.

Open questions and speculations (what about the future?)

6. How they are different There are several of the important ways in which the WiFi and 3G approaches to offering broadband wireless access services are substantively different. 6.1. Current business models/deployment are different 3G represents an extension of the mobile serviceprovider model. This is the technology of choice for upgrading existing mobile telephone services to expand capacity and add enhanced services.

Computer Science Department

FACE RECOGNITION

In contrast, Wi-Fi comes out of the data communications industry (LANs) which is a byproduct of the computer industry. The basic business model is the telecommunications services model in which service providers own and manage the infrastructure (including the spectrum) and sell service on that infrastructure. In contrast the basic business model is one of equipment makers who sell boxes to consumers. The services provided by the equipment are free to the equipment owners. With respect to deployment, 3G will require substantial investment in new infrastructure to upgrade existing 2G networks, however, when deployed by an existing mobile provider, much of the 2G infrastructure (e.g., towers and backhaul network) will remain useable. For WiFi, it is hoped that deployment can piggyback on the large existing base of WLAN equipment already in the field. In both cases, end-users will need to buy (or be subsidized) to purchase suitable interface devices (e.g., PC cards for 3G or WiFi access). In contrast to 3G, Wi-Fi wireless access can emerge in a decentralized, bottomup fashion (although it is also possible for this to be centrally coordinated and driven by a wireline or mobile service provider). While the

Computer Science Department

FACE RECOGNITION

prevailing business model for 3G services and infrastructure is vertically integrated, this need not be the case for WiFi. This opens up the possibility of a more heterogeneous and complex industry value chain. 6.2 Spectrum policy and management One of the key distinctions between 3G and WiFi that we have only touched upon lightly thus far is that 3G and other mobile technologies use licensed spectrum, while WiFi uses unlicensed shared spectrum. This has important implications for (1) cost of service; (2) quality of service (QoS) and congestion management; and (3) industry structure. First, the upfront cost of acquiring a spectrum license represents a substantial share of the capital costs of deploying 3G services. This cost is not faced by Wi-Fi which uses the shared 2.4GHz unlicensed, shared spectrum. The cost of a spectrum license represents a substantial entry barrier that makes it less likely that 3G services (or other services requiring licensed spectrum) could emerge in a decentralized fashion. Of course, with increased flexibility in spectrum licensing rules and with the emergence of secondary markets that are being facilitated by these rules, it is possible that the upfront costs of obtaining a spectrum license could be shared to allow decentralized infrastructure deployment to proceed.

Computer Science Department

FACE RECOGNITION

Under the traditional licensing approach, the licensing of the spectrum, the construction of the network infrastructure, and the management/operation of the service were all undertaken by a single firm. Moreover, rigid licensing rules (motivated in part by interference concerns, but also in part, by interest group politics) limited the ability of spectrum license holders to flexibly innovate with respect to the technologies used, the services offered, or their mode of operation. In the face of rapid technical progress, changing supply and demand dynamics, this lack of flexibility increased the costs and reduced the efficiency of spectrum utilization. Second, while licensed spectrum is expensive, it does have the advantage of facilitating QoS management. With licensed spectrum, the licensee is protected from interference from other service providers. This means that the licensee can enforce centralized allocation of scarce frequencies to adopt the congestion management strategy that is most appropriate. In contrast, the unlicensed spectrum used by Wi-Fi imposes strict power limits on users (i.e., responsibility not to interfere with other users) and forces users to accept interference from others. This makes it easier for a 3G provider to market a service with a predictable level of service and to support delay-sensitive services such as real-time telephony.

Computer Science Department

FACE RECOGNITION

In contrast, while a Wi-Fi network can address the problem of congestion associated with users on the same Wi-Fi network, it cannot control potential interference from other Wi-Fi service providers or other RF sources that are sharing the unlicensed spectrum (both of which will appear as elevated background noise). This represents a serious challenge to supporting delay-sensitive services and to scaling service in the face of increasing competition from multiple and overlapping service provider. Third, the different spectrum regimes have direct implications for industry structure. For example, the FreeNet movement is not easily conceivable in the 3G world of licensed spectrum. Alternatively, it seems that the current licensing regime favors incumbency and, because it raises entry barriers, may make wireless-facilities-based competition less feasible. 6.3 Status of technology development different The two technologies differ with respect to their stage of development in a number of ways. These are discussed in the following subsections. 6.3.1. Deployment status

In most OECD countries, cell phone penetration of 2G services is quite high, and consumers have a choice among multiple facilities-based providers in most markets. Additionally, most of the 2G mobile service providers have announced plans to offer 3G

Computer Science Department

FACE RECOGNITION

broadband data services. Nevertheless, 3G services are emerging only slowly. There are a number of reasons for this, including the high costs of obtaining 3G licenses, the lack of 3G handsets, increased deployment cost expectations, and diminished prospects for short-term revenue. In contrast, we have a large installed base of Wi-Fi networking equipment that is growing rapidly as WiFi vendors have geared up to push wireless home networks using the technology. The large installed base of Wi-Fi provides substantial learning, scale, and scope economies to both the vendor community and end-users. The commoditization of Wi-Fi equipment has substantially lowered prices and simplified the installation and management of WiFi networks, making it feasible for non-technical home users to self-install these networks. However, although there a large installed base of Wi-Fi equipment, there has been only limited progress in developing the business models and necessary technical and business infrastructure to support distributed service provisioning. In addition, many of the pioneers in offering wireless access services such as Mobilstar and Metricom went bankrupt in 2001 as a consequence of the general downturn in the telecom sector and the drying up of capital for infrastructure investment. 6.3.2. Embedded support for services Another important difference between 3G and WiFi is their embedded support for voice services. 3G was expressly designed as an upgrade technology for

Computer Science Department

FACE RECOGNITION

wireless voice telephony networks, so voice services are an intrinsic part of 3G. In contrast, WiFi provides a lower layer data communications service that can be used as the substrate on which to layer services such as voice telephony. For example, with IP running over WiFi it is possible to support voice-overIP telephony. However, there is still great market uncertainty as to how voice services would be implemented and quality assured over WLAN networks. Another potential advantage of 3G over Wi-Fi is that 3G offers better support for secure/private communications than does Wi-Fi. However, this distinction may be more apparent than real. First, we have only limited operational experience with how secure 3G communications are. Hackers are very ingenious and once 3G systems are operating, we will find holes that we were not previously aware of. Second, the security lapses of Wi-Fi have attracted quite a bit of attention and substantial resources are being devoted to closing this gap. Although wireless communications may pose higher risks to privacy (e.g., follow-me anywhere tracking capabilities) and security (i.e., passive monitoring of RF transmissions is easier) than do wireline networks, we do not believe that this is likely to be a long-term differentiating factor between 3G and Wi-Fi technologies. 6.3.3. Standardization

Computer Science Department

FACE RECOGNITION

It is also possible to compare the two technologies with respect to the extent to which they are standardized. Broadly, it appears that the formal standards picture for 3G is perhaps more clear than for WLAN. For 3G, there is a relatively small family of internationally sanctioned standards, collectively referred to as IMT-2000.36 However, there is still uncertainty as to which of these (or even if multiple ones) will be selected by service providers. In contrast, Wi-Fi is one of the family of continuously evolving 802.11x wireless Ethernet standards, which is itself one of many WLAN technologies that are under development. Although it appears that Wi-Fi is emerging as the market winner, there is still a substantial base of HomeRF and other open standard and proprietary technologies that are installed and continue to be sold to support WLANs. Thus, it may appear that the standards picture for WLANs is less clear than for 3G, but the market pressure to select the 802.11x family of technologies appears much less ambiguousat least today. Because ubiquitous WLAN access coverage would be constructed from the aggregation of many independent WLANs, there is perhaps a greater potential for the adoption of heterogeneous WLAN technologies than might be the case with 3G. With 3G, although competing service providers may adopt heterogeneous and incompatible versions of 3G, there is little risk that there will be incompatibilities within a carriers own 3G network. Of course in the context of a mesh of WLANs, reliance on IP as the basic transport layer may reduce compatibility issues

Computer Science Department

FACE RECOGNITION

at the data networking level, although these could be significant at the air interface (i.e., RF level). Unless coordinated, this could be a significant impediment to realizing scale economies and network externality benefits in a bottomup, decentralized deployment of Wi-Fi local access infrastructure. 6.3.4. Service/business model 3G is more developed than Wi-Fi as a business and service model. It represents an extension of the existing service-provider industry to new services, and as such, does not represent a radical departure from underlying industry structure. The key market uncertainties and portions of the valuation that remain undeveloped are the upstream equipment and application/content supplier markets and ultimate consumer demand. In contrast, Wi-Fi is more developed with respect to the upstream supplier markets, at least with respect to WLAN equipment which has become commoditized. Moreover, consumer demand certainly business demand and increasingly residential broadband home user demandfor WLAN equipment is also well established. However, commercialization of Wi-Fi services as a access service is still in its early stages with the emergence of Boingo and others. Of course, both 3G and WiFi access face great supplier and demand uncertainty with respect to what the next killer applications will be and how

Computer Science Department

FACE RECOGNITION

these services may be used once a rich set of interactive, multimedia services become available. There are also some form factor issues that may impact the way these services will be used. Initially, it seems likely that the first 3G end-user devices will be extensions of the cell phone while the first Wi-Fi end-user devices are PCs. Of course, there are also 3G PC cards to allow the PC to be used as an interface device for 3G services, and with the evolution of Internet appliances (post- PC devices), we should expect to see new types of devices connecting to both types of networks.

There are good reasons to believe that it will still be some time before FRT will be able to identify a face in the crowd (in uncontrolled environments) with any reasonable level of accuracy and consistency. It might be that this is ultimately an unattainable goal, especially for larger populations. Not because the technology is not good enough but because there is not enough information (or variation) in faces to discriminate over large populationsi.e. with large populations it will create many biometric doubles that then need to be sorted out using another biometric. This is why many researchers are arguing for multi-modal biometric systems. Thus, in the future we would expect an increased emphasis on the merging of various biometric technologies. For example, one can imagine the merging of face recognition with gait recognition (or even voice recognition) to do identification at a distance. It seems self-evident that these multi-modal systems are even more complex to develop and embed in operational context than single mode systems. It is our view that the increasing reliance on biometric and pattern recognition technologies do represent a significant shift in the way investigation and security is conducted.

Computer Science Department

FACE RECOGNITION

There is an ongoing need to evaluate and scrutinize biometric identification systems given the powerful nature of these technologiesdue to the assumption that falsification is either impossible or extremely difficult to do. End of report

CONCLUSION
There is the risk with FRT that individuals are treated as guilty until proven innocent. In an identification scenario, we recommend that all matches be treated,

Computer Science Department

FACE RECOGNITION

in the first instance, as potential false positives until verified by other independent sources (such as attributed and biographical identifiers). This underscores the fact that the FRS must form part of an overall identity management program within a security and intelligence infrastructure. Identity management and security cannot be delegated to FRT. It can only act in support of specific targeted security and intelligence activities. Further, how one deals with matches and alarms must be suitable for the context. For example, one might have a very different set of practices in an airport, casino, or a prison. This means that one needs to consider carefully the timeframe, physical space, and control over the subject as they flow through the system.

REFERENCES

http://www.amazon.com/exec/obidos/tg/detai...il/-/04713091 41

Computer Science Department

FACE RECOGNITION

Bolle, R.M. et al. (2004) Guide to Biometrics, New York: Springer-Verlag: 1-5

Bronstein, A.M. et al. (2003) Expression-Invariant 3D Face Recognition AVBPA, LNCS (2688): 62-70, Springer-Verlag Berlin Heidelbert Huang, J et al. (2003) Component-based Face Recognition with 3D Morphable Models Center for Biological and Computational Learning, MIT

Jeng, SH. Et al. (1998) Facial Feature Detection Using Geometrical Face Model: An Efficient Approach Pattern Recognition, vol 31(3): 273-282

Http: http://www.foresight.org

www.zyvex.com www.amazon.com/exec/obidos/tg/detai...l/-/0387983341/

Anda mungkin juga menyukai