0% found this document useful (0 votes)
75 views6 pages

Bio Fasokey: Keywords: Forged, Biometry

This document discusses face recognition technology for user identification and authentication. It has three main points: 1. Face recognition technology can be used to identify and authenticate users based on their facial features, which are unique and cannot be easily stolen, borrowed, or forged. This provides a more secure alternative to passwords or ID cards. 2. A face recognition system works by capturing a facial image, extracting distinguishing features from it, and comparing those features to templates stored in a database to determine if there is a match. 3. Implementing face recognition involves four stages: data acquisition through image capture, input processing of the facial image, classification by comparing features to templates, and final decision making on authentication or identification.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
75 views6 pages

Bio Fasokey: Keywords: Forged, Biometry

This document discusses face recognition technology for user identification and authentication. It has three main points: 1. Face recognition technology can be used to identify and authenticate users based on their facial features, which are unique and cannot be easily stolen, borrowed, or forged. This provides a more secure alternative to passwords or ID cards. 2. A face recognition system works by capturing a facial image, extracting distinguishing features from it, and comparing those features to templates stored in a database to determine if there is a match. 3. Implementing face recognition involves four stages: data acquisition through image capture, input processing of the facial image, classification by comparing features to templates, and final decision making on authentication or identification.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 6

BIO FASOKEY

1.2arthika (a5aratna6777789:; Third <ear, Electronics and =ommunication Engineering, !ational Engineering =ollege, 2ovilpatti. Email ' rathna7>>9?yahoo.com people continue to choose easily guessed P !"s and passwords' birthdays, phone ABSTRACT Conventional method of identification based on possession of ID cards or exclusive knowledge like a social security number or a password are not all together reliable. ID cards can be lost forged or misplaced; passwords can be forgotten or compromised. Face recognition technology may solve this problem since a face is undeniably connected to its owner. It cannot be borrowed ,stolen or easily forged and they are not transferable. Growth in electronic transactions has resulted in a greater demand for fast and accurateuser identification and authentication Biometry finds solution to face recognition using the integrated hardware and software. Keywords: Forged,Biometry INTRODUCTION The information age is quickly evolutionizing the way transactions are completed. Everyday actions are increasingly being handled electronically , instead of with pencil and paper or face to face. This growth in electronic transactions has resulted in a greater demand for fast and accurate user identification and authentication. Access codes for buildings, bank accounts and computer systems often use P !"s for identification and security clearences. #sing the proper P ! gains access, but the user of the P ! is not verified. $hen credit and AT% cards are lost or stolen, an unauthorized user can often come up with the correct personal codes. &espite warning, many numbers and social security numbers. (ecent cases of identity theft have hightened the need for methods to prove that someone is truly who he)she claims to be. *ace recognition technology may solve this problem since a face is undeniably connected to its owner e+pect in the case of identical twins. ts nontransferable. The system can then compare scans to records stored in a central or local database or even on a smart card. ,iometric is a unique, measurable characteristic of a human being that can be used to automatically recognize an individual or verify an individual-s identity. ,iometrics can measure both physiological and behavioral characteristics. Physiological biometrics includes., *inger.scan, *acial (ecognition, ris.scan, (etina.scan, /and.scan. ,ehavioral biometrics includes' 0oice.scan, 1ignature.scan, 2eystroke.scan. A 3biometric system4 refers to the integrated hardware and software used to conduct biometric identification or verification.. t requires no physical inetraction on behalf of the user. t is accurate and allows for high enrolment and verification rates.. t does not require an e+pert to interpret the comparison result.. t can use your e+isting hardware infrastructure, e+isting camaras and image capture devices will work with no problems.. t is the only biometric that allow us to perform passive identification in a one to many environment.

The face is an important part of identification. $hile humans have the innate ability to recognize and distinguish different faces for millions of years ,computers are 5ust now catching up. *or face recognition there are two types of comparisons .the first is verification. This is where the system compares the given individual with who that individual says they are and gives a yes or no decision. The second is identification. This is where the system compares the given individual to all the other individuals in the database and gives a ranked list of matches.
1. COMPONENTS OF FACE RECOGNITION SYSTEMS

An automated mechanism that scans and captures a digital or an analog image of a living personal characteristics.6enrollment module; Another entity which handles compression, processing, storage and compression of the captured data with stored data 6database;.The third interfaces with the application system identification module

sample and stores it. t should have retrival property also that is it compares all the stored sample with the newly obtained sample and retrives the matched sample for the purpose of verification by the user and determine whether the match declared is right or wrong.The verification module also consists of a preprocessing system. 0erification means the system checks as to who the person says he or she is and gives a yes or no decision. n this module the newly obtained sample is preprocessed and compared with the sample stored in the database. The decision is taken depending on the match obtained from the database. =orrespondingly the sample is accepted or re5ected. nstead of verification module we can make use of identification module. n this the sample is compared with all the other samples stored in the database. *or each comparison made a match score is given. The decision to accept or re5ect the sample depends on this match score falling above or below a predetermined threshold. 1.a.STAGES OF FACE

RECOGNITION SYSTEM:
All identification or authentication technologies operate using the following four stages' A physical or behavioural sample is captured by the system during enrollment and also in identification or verification process. nique data is e+tracted from the sample and a template is created then compared with a new sample. The system decides if the features e+tracted from the new sample are a match or a non match.*ace recognition is very comple+ technology and is largely software based. This ,iometric %ethodology establishes the analysis framework with tailored algorithms for each type of biometric

#ser interface captures the analog or digital image of the person"s face. n the enrollment module the obtained sample is preprocessed and analyzed. This analyzed data is stored in the database for the purpose of future comparison. The database compresses the obtained

device.*ace recognition starts with a picture, attempting to find a person in the image. A matri+ is then developed based on the characteristics of the individual-s face. The method of defining the matri+ varies according to the algorithm6the mathematical process used by the computer to perform the comparison;. This matri+ is then compared to matrices that are in a database and a similarity score is generated for each comparison. n order to increase the accuracy and adaptability, some kind of machine learning has to be implemented.There are essentially two methods of capture. @ne is video imaging and the other is thermal imaging. 0ideo imaging is more common as standard video cameras can be used. The precise position and the angle of the head and the surrounding lighting conditions may affect the system performance. The complete facial image is usually captured and a number of points on the face can then be mapped, position of the eyes, mouth and the nostrils as a e+ample. %ore advanced technologies make :.& map of the face which multiplies the possible measurements that can be made. Thermal imaging has better accuracy as it uses facial temperature variations caused by vein structure as the distinguishing traits.

* A#(E 7 2. CAPTURING OF IMAGE BY STANDARD VIDEO CAMERAS The image is optical in characteristics and may be thought of as a collection of

a large number of bright and dark areas representing the picture details. At an instant there will be large number of picture details e+isting simultaneously each representing the level of brightness of the scene to be reproduced. Therefore it would require infinite number of channels to transmit optical information corresponding to picture elements simultaneously. There are practical difficulty in transmitting all information simultaneously so we use a method called scanning./ere the conversion of optical information to electrical form and its transmission is carried out element by element one at a time in a sequential manner to cover the entire image. A T0 camera converts optical information into electrical information, the amplitude of which varies in accordance with variation of brightness.An optical image of the scene to be transmitted is focused by lens assembly on the rectangular glass plate of the camera tube. The inner side of this has a transparent coating on which is laid a very thin layer of photoconductive material. The photolayer has very high resistance when no light is falling on it but decreases depending on the intensity of light falling on it. An electron beam is formed by an electron gun in the T0 camera tube. This beam is used to pick up the picture information now avilable on the target plate of varying resistace at each point.The electron beam is deflected by a pair of deflecting coils mounted on the glass envelope and kept mutually perpendicular to each other to achive scanning of the entire target area. The deflecting coils are fed seperately from two sweep oscillators, each operating at different frequencies.The magnetic deflection caused by current in one coil gives horizontal motion to the beam from left to right at a uniform rate

and brings it back to the left side to commence the trace of the ne+t line. The other coil is used to deflect the beam from top to bottom. As the beam moves from element to element it encounters different resistance across the target plate depending on the resistance of the photoconductive coating. The result is flow of current which varies in magnitude as elements are scanned. The current passes through the load resistance (l connected to conductive coating on one side of the &= supply source on the other. &epending on the magnitude of current a varying voltage appears across the resistance (l and this corresponds to the optical information of picture.

3. IMPLEMENTATION OF FACE RECOGNITION TECHNOLOGY The implementation of face recognition technology include thefollowing four stages' data acquisition,input processing face image, classification and decision makingThe input can be recorded video of the speaker or a still image. A sample of 7 sec duration consists of a BC frame video sequence. %ore than one camera can be used to produce a :&

representation of the face and to protect against the usage of photographs to gain unauthorized access.A pre.processing module locates the eye position and takes care of the surrounding lighting condition and colour variance. *irst the presence of faces or face in a scene must be detected. @nce the face is detected, it must be localized and normalization process may be required to bring the dimensions of the live facial sample in alignment with the one on the template. 1ome facial recognition approaches use the whole face while others concentrate on facial components and) or regions6such as lips, eyes etc;.the appearance of the face can change considerably during speech and due to facial e+pressions. n particular the mouth is sub5ected to fundemental changes but is also very important source for discriminating faces. 1o an approach to persons recognition is developed based on spatio.temporal modeling of features e+tracted from talking face. %odels are trained specific to a persons speech articulate and the way that the person speaks. Person identification is performed by tracking mouth movements of the talking face and by estimating the likelyhood of each model of having generated the observed sequence of features. The model with the highest likelyhood is chosen as the recognized person.

1ynergetic computer are used to classify optical and audio features, respectively. A synergetic computer is a set of algorithm that simulate synergetic phenomena. n training phase the , @ & creates a prototype called faceprint for each person. A newly recorded pattern is preprocessed and compared with each faceprint stored in the database. As comparisons are made, the system assigns a value to the comparison using a scale of one to ten. f a score is above a predetermined threshold, a match is declared.*rom the image of the face, a particular trait is e+tracted. t may measure various nodal points of the face like the distance between the eyes ,width of nose etc. it is fed to a synergetic computer which consists of algorithm to capture, process, compare the sample with the one stored in the database. $e can also track the lip movements which is also fed to the synergetic computer. @bserving the likelyhood each of the sample with the one stored in the database we can accept or re5ect the sample. 9. WORKING MECHANISM: 0isionics, company based in a !ew Dersey is one of the many developers of facial recognition technology. The twist to its particular software, *ace it is that it can pick someone"s face from the rest of the scene and compare it to a database full of stored images. n order for this software to work, it has to know what a basic face looks like. *acial recognition software is based on the ability to first recognize faces, which is a technological feat in itself and then measure the various features of each face. f you look at the mirror, you can see that your face has certain distinguishable landmarks. These are the peaks and valleys that make up

the different facial features. 0isionics defines these landmarks as nodal points.There are about E8 nodal points on a human face. /ere are few nodal points that are measured by the software.distance between the eyes, width of the nose depth of the eye socket, cheekbones, 5aw line,chin.

*igure F These nodal points are measured to create a numerical code, a string of numbers that represents a face in the database. This code is called faceprint. @nly 79 to BB nodal points are needed for faceit software to complete the recognition process. 5. PERFORMANCE *alse acceptance rate 6*A(; The probability that a system will incorrectly identify an individual or will fail to re5ect an imposter. t is also called as type B error rate. FAR= NFA/NIIA $here *A(G false acceptance rate,!*AG number of false acceptance,! AG number of imposter identification attempts *alse re5ection rates 6*((; The probability that a system will fail to identify an enrolee. t isalso called type 7 error rate FRR= NFR/NEIA $here *((G false re5ection rates !*(G number of false re5ection rates !E AG number of enrolee identification attempt Response time'The time period required by a biometric system to return a decision on identification of a sample.

Threshold/ decision Threshold' The acceptance or re5ection of a data is dependent on the match score falling above or below the threshold. The threshold is ad5ustable so that the system can be made more or less strictH depending on the requirements of any given application. Enrollment time'The time period a person must spend to have his)her facial reference template successfully created. Equal error rate:$hen the decision threshold of a system is set so that the proportion of false re5ection will be appro+imately equal to the proportion of false acceptance. This synonym is "crossover rate". The facial verification process involves computing the distance between the stored pattern and the live sample. The decision to accept or re5ect is dependent on a predetermined threshold. 6&ecision threshold;. I. ADVANTAGES' There are many benefits to face recognition systems such as its convinence and social acceptability. All you need is your picture taken for it to work. *ace recognition is easy to use and in many cases it can be performed without a person even knowing. *ace recognition is also one of the most ine+pensive biometric in the market and its prices should continue to go down. The natural use of face recognition technology is the replacement of P !, physical tokens or both needed in automatic authorization or identification schemes.There are numerous applications for face recognition technology' Jaw Enforcement' %inimizing victim trauma by narrowing mugshot searches, verifying identify for court records, and comparing school surveillance camera images to known child molesters.1ecurity)=ounterterrorism'Acc

ess control, comparing surveillance images to known terrorists. mmigration' (apid progression through =ustoms. &ay =are' 0erify identity of individuals picking up the children.B.(esidential 1ecurity' Alert home owners of approaching personnel. 0oter verification ' $here eligible politicians are required to verify their identity during a voting process. this is intended to stop "pro+y" voting where the vote may not go as e+pected. ,anking using AT%' The software is able to quickly verify a customers face. Physical access control of buildings areas ,doors, cars or net access. 7. DISADVANTAGES: *ace recognition systems can-t tell the difference between identical twins. . CONCLUSION *ace recognition technologies have been associated generally with very costly top secure applications. Today the core technologies have evolved and the cost of equipments is going down dramatically due to the intergration and the increasing processing power. =ertain application of face recognition technology are now cost effective, reliable and highly accurate. As a result there are no technological or financial barriers for stepping from the pilot pro5ect to widespread deployment. !. REFERENCES. 7. EJE=T(@! =1 *@( <@#. Part 7 April B887 Part B %ay B887 B. EJE=T(@! = $@(J& . &E=E%,E( B88B :. %@&E(! TEJE0 1 @! E!A !EE( !A. Aulati (.( 9. EEE !TEJJ AE!T 1<1TE%1 . %A<)D#!E B88: C. $$$.*A=E(EA.=@% I.$$$. %AAE1TE=/!@J@A<.. ! F. $$$. EEE.=@%

You might also like