Global Institute of Management Sciences: Department of Computer Applications
Global Institute of Management Sciences: Department of Computer Applications
“Face Recognition”
Submitted
By
HARISH . V
18XHSB7018
HEMANTH KASHYAP
18XHSB7021
Under the guidance
of
DR.BHANU K.N.
Department of Computer Applications
Towards
Project
Prescribed By the Bangalore University for the
ABSTRACT
Keywords : Face Recognition, Gray Scale Algorithm, Har cascade algorithm, open cv .
INDEX
Contents
1. Introduction
Biometrics
Face Recognition
2.Literature Survey
3.Plan of Work and Project Status
4.Summary
5. References
1 Introduction
1.1 Biometrics
Biometrics is used in the process of authentication of a person by verifying or identifying
that a user requesting a network resource is who he, she, or it claims to be, and vice versa.
It uses the property that a human trait associated with a person itself like structure of data
with the incoming data we can verify the identity of a particular person [1]. There are many
types of biometric system like detection and recognition, iris recognition etc., these traits
are used for human identification in surveillance system, criminal identification , face details
etc. By comparing the existing fingerprint recognition.
Literature Survey
Several algorithms and techniques for face recognition have been developed in the past
by researchers. These are discussed briefly in this section.
A number of current face recognition algorithms use face representations found by unsuper-
vised statistical methods. Typically these methods _and a set of basis images and represent
faces as a linear combination of those images. Principal component analysis (PCA) is a
popular example of such methods. The basis images found by PCA depend only on pairwise
relationships between pixels in the image database. In a task such as face recognition, in
which important information may be contained in the high-order relationships among pixels.
Plan of work
No. Description Duration Complexity
1 Literature Survey of basics of Face Recognition 1 week 5
2 Literature Survey of various methods available for face recognition 2 weeks 5
3 Literature Survey on Face Recognition from practical point of view 2 weeks 5
4 Coding: python GrayScale Algorithm 1 week 5
Summary
Face recognition systems are useful in law enforcement and justice solutions by staying
one step ahead of the world's ever-advancing criminals. This includes acclaimed CABS-
computerized arrest and booking system and the child base protection which is a software
solution for global law enforcement agencies to help protect and recover missing and sexually
exploited children, particularly as it relates to child pornography. It is also useful
in Homeland defence which includes everything from preventing terrorists from boarding
aircraft, to protecting critical infrastructure from attack or tampering (e.g. dams, bridges,
water reservoirs, energy plants, etc.), to the identification of known terrorists. It is also
applicable in airport and other transportation terminal security. Face recognition software,
can enhance the effectiveness of immigration and customs personnel. The _nancial services
industry revolves around the concept of security. Face recognition software, can improve
the security of the _nancial services industry, saving the institution time and money both
through a reduction of fraud case and the administration expenses of dealing with forgotten
passwords. Furthermore, biometric-based access control units can safeguard vaults, teller
areas, and safety deposit boxes to protect against theft. The use of biometrics can also
ensure that con_dential information remains con_dential while deterring identity theft, par-
ticularly as it relates to ATM terminals and card-not-present e-commerce transactions. It
allows capturing, archiving, and retrieving identifying characteristics as tattoos, marks, or
scars. It can also analyze scenes from either streaming or archived video, "looking" for
out-of-the-ordinary occurrences, the presence of certain vehicles, speci_c faces, etc. This is
bene_cial and can save signi_cant time and money to those individuals who spend hours,
days, or weeks monitoring video streams (i.e. examining a bank's security in a criminal
investigation).
References