4/7/12
FACE RECOGNITION
MATCH!
Face Recognition
4/7/12
CONTENTS
Introduction
Drawbacks Tests
Conclusion
Face Recognition
4/7/12
Introduction
Face recognition is a computer based security system capable of automatically verifying or identifying a person. Biometrics identifies or verifies a person based on individuals physical characteristics by matching the real time patterns against the enrolled ones.
31
History
The
Face Recognition
4/7/12
first attempts to do this began in the 1960s with a semi-automated system. The first attempts to do this began in the 1960s with a semiautomated system. In 1970s Goldstein, Harmon and Lesk created a system of 21 subjective markers such as hair color and lip thickness. 1988, when Kirby and Sirovich 42 used a standard linear algebra
In
Face Recognition
4/7/12
Biometrics
Biometric consists of several authentication techniques based on unique physical characteristics such as face, fingerprints, iris, hand geometry, retina, and voice. Biometric Technologies fill the role of analyzing and measuring unique biological properties in order to produce unique identifications which is then digitalized and stored
53
Face Recognition
4/7/12
64
Face Recognition
4/7/12
Face Recognition
4/7/12
Facial recognition technologies have recently developed into two areas Facial metric Eigen faces.
q q
86
Finger-scan
Face Recognition
4/7/12
A fingerprint is an impression of the friction ridges of all or any part of the finger. A friction ridge is a raised portion of the on the palmar(palm)or digits (fingers and toes) or plantar (sole) skin, consisting of one or more connected ridge units of friction ridge skin.
97
Face Recognition
4/7/12
Iris-scan
This recognition method uses the iris of the eye which is colored area that surrounds the pupil. Iris patterns are unique and are obtained through video based image acquisition system.
108
Face Recognition
4/7/12
Retina-scan:
It is based on the blood vessel pattern in the retina of the eye as the blood vessels at the back of the eye have a unique pattern, from eye to eye and person to person.
119
Face Recognition
4/7/12
Hand-scan:
These techniques include the estimation of length, width, thickness and surface area of the hand. Various method are used to measure the hands- Mechanical or optical principle.
1210
Face Recognition
4/7/12
Voice-scan:
q
1311
Signature-scan:
Face Recognition
4/7/12
The signature dynamics recognition is based on the dynamics of making the signature, rather than a direct comparison of the signature itself afterwards. There are various kinds of devices used to capture the signature dynamics traditional tablets or special purpose devices.
1412
Face Recognition
4/7/12
q q
Face Recognition
4/7/12
Challenges
q
involved
frontal, 45 degree,
q q q q q
Presence of beard, mustache, glasses etc Occlusions by long hair, hand In-Plane Rotation Image conditions:
Size condition
1614
Lighting
Distortion
Face Recognition
4/7/12
q q q q q q
Lighting variation Orientation variation (face angle) Size variation Large database Processor intensive Time requirements
1715
Face Recognition
4/7/12
FACE AUTHENTICATION
Face Recognition
4/7/12
MODEL
Face databas e
ID
Face Recognition
4/7/12
Algorithms in Use
Face Recognition
4/7/12
Face image
Face detection
Feature extractio n
Feature match
Face id
Face Recognition
4/7/12
2218
Face Recognition
4/7/12
Face Recognition
4/7/12
Based on the geometric characteristics of faces Parts of human faces such as eyes, nose, and mouth are located together with their attributes Distinguish faces based on information. This approach is quite effective for small database, with steady lighting and viewpoint.
2419
Face Recognition
4/7/12
Disadvantages:
Not effective for unstable lighting condition and changing viewpoint. The scanning technology is not yet reliable. The information extracted is not enough for an information-rich organ like face.
2520
Face Recognition
4/7/12
Face Recognition
4/7/12
Appearance-based approach
Based on human appearance.. Transforms the face space into subspaces Fewer dimensions Principal Component Analysis (PCA) KLT Karhunen- Love Transform.
2722
Face Recognition
4/7/12
2823
Face Recognition
4/7/12
Eigenface Algorithm
Face Recognition
4/7/12
Eigenfaces Initialization
1.Acquire an initial set of face images
3024
Face Recognition
2.Calculate the eigen faces from the training set, keeping only the M images that correspond to the highest eigenvalues. These M images define the face space. As new faces are experienced, the eigen faces can be updated or recalculated
3125
Face Recogniton
3.
Calculate the corresponding distribution in Mdimensional weight space for each known individual, by projecting their face images onto the face space.
3226
Face Recognition
4/7/12
Eigenfaces Recognition
1.
Calculate a set of weights based on the input image and the M eigenfaces by projecting the input image onto each of the eigenfaces. Determine if the image is a face at all by checking to see if the image is sufficiently close to face space.
3.
If it is a face, classify the weight pattern as either a known person or as unknown. (Optional) Update the eigenfaces and/or weight patterns.
4.
2.
3327
Face Recognition
4/7/12
Facial image is analyzed and reduced to small set of parameters describing prominent facial features Major features analyzed are: eyes, nose, mouth and cheekbone curvature These features are then matched to a database Advantage: recognition task is not very expensive Disadvantage: the image processing required is very expensive and parameter selection3428
Face Recognition
4/7/12
Salient regions of the facial image are extracted These regions are then compared on a pixelby-pixel basis with an image in the database Advantage is that the image preprocessing is simpler Disadvantage is the database search and comparison is very expensive
3529
Face Recognition
4/7/12
Other approach
Local Features Analysis (LFA) method. Gabor wavelet-based features method. Local Binary Pattern (LBP) method.
3630
Face Recognition
4/7/12
Three-dimensional geometry of the human face is used. Higher accuracy than their 2D counterparts angles images from different from a common 3731
Multiple
Face Recognition
4/7/12
Face Recognition
4/7/12
3932
Asus SmartLogin
Face Recognition
4/7/12
4033
4134
Face Recognition
4/7/12
DRAWBACKS
Face Recognition
4/7/12
The security threat posed to Lenovos Asuss Toshibas products, based on the basis face recognition algorithms and the tests performed on them: Face Recognition in comparison with other biometric recognition systems. Influences of varied lighting Influences of image capturing devices Influences of Image Processing
4335
Face Recognition
4/7/12
4436
Face Recognition
4/7/12
Finger Print Technology Face Recognition Technology Iris Technology Hand Geometry Technique Retina Geometry Speaker Recognition Technique (voice) Signature Verification Technique
4537
Face Recognition
4/7/12
BYPASS MODEL
Face Recognition
4/7/12
4738
Face Recognition
4/7/12
FAKE FACE
Face Recognition
4/7/12
4938
Face Recognition
4/7/12
5039
Face Recognition
4/7/12
Face Recognition
4/7/12
2)
5240
Face Recognition
4/7/12
1)
5341
Face Recognition
4/7/12
5442
Face Recognition
4/7/12
RESULT ESTIMATION
Face Recognition
4/7/12
CONCLUSION
The weak points that might allow one to bypass into the systems of the three big computer manufacturers Lenovo Asus Toshiba is to give sufficient evidences that the authentication technologies being used by these three manufacturers are not efficient and secure enough as they are prone to be bypassed putting users data at serious risk.
5644
Face Recognition
4/7/12
Thank You
Face Recognition
4/7/12
Questions??
5858