0% found this document useful (0 votes)
72 views9 pages

L.J.Institute of Engineering & Technology: Seminar

This document is a seminar report on facial recognition technology submitted by students Sheetal Raval and Donika Pear to the Computer Engineering Department at L. J. Institute of Engineering & Technology in Ahmedabad, India. It provides an overview of facial recognition technology, including the typical flow of a facial recognition system, common algorithms like eigenfaces and neural networks, and applications in fields like law enforcement, security, and access control. It was prepared under the guidance of faculty member Bhautik Trivedi.

Uploaded by

Dhanvant Vyas
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
72 views9 pages

L.J.Institute of Engineering & Technology: Seminar

This document is a seminar report on facial recognition technology submitted by students Sheetal Raval and Donika Pear to the Computer Engineering Department at L. J. Institute of Engineering & Technology in Ahmedabad, India. It provides an overview of facial recognition technology, including the typical flow of a facial recognition system, common algorithms like eigenfaces and neural networks, and applications in fields like law enforcement, security, and access control. It was prepared under the guidance of faculty member Bhautik Trivedi.

Uploaded by

Dhanvant Vyas
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

L.J.

Institute of Engineering & Technology


Ahmedabad

Affiliated To Gujarat Technological University, Ahmedabad

SEMINAR
Submitted To Department of Computer Engineering
_______________________________________________________________________________

Prepared By : Sheetal (09bce058) Donika (09bce036)

Guided By : Bhautik Trivedi

Seminar report on

Facial Recognition Technology


By
Raval Sheetal (ID No.09bce058) Pear Donika (ID No. 09bce036)
A Seminar submitted TO Computer Engineering Department

L J Institute of Engineering & Technology Ahmedabad

L. J. Institute of Engineering & Technology Ahmedabad

CERTIFICATE

This is to certify that the Seminar entitled FACE RECOGNITION TECHNOLOGY is a bonafied report of the work carried out by 1) Raval Sheetal M., ID No: 09BCE058 2) Pear Donika M., ID No: 09BCE036 Of Department of Computer Engineering, Semester V, under the guidance and supervision for the award of the degree of Bachelor of Engineering in CE at L.J.Institute of Engineering & Technology , Ahmedabad.

Mr.Bhautik Trivedi Assistant Professor CE Department L.J.I.E.T

ACKNOWLEDGEMENT
We owe a great many thanks to many people who helped and supported us during the writing of this seminar. Our deepest thanks to Faculty, [Mr. Bhautik Trivedi] the Guide of the project for guiding and correcting various document with attention and care. He has taken pain to go through the seminar and make necessary correction as and when needed. Finally, yet importantly, we would like to express our heartfelt thanks to our beloved parents for their blessings, our friends/classmates for their help and wishes for the successful completion of this seminar.

INDEX

ABSTRACT....i

1. INTRODUCTION.........1
1.1 What is biometrics?....................................................................................2 1.2 Why choose face recognition over other biometrics?.............................3 1.3 What is face recognition system?................................................................3

2. FACIAL RECOGNITION FLOW.....3


2.1 Technologies used for face recognition.......................4
2.1.1Eigen face..5 2.1.2 Feature analysis...5 2.2.3. Neural network mapping technology....6 2.2.4 Automatic face processing.......................6

3. ALGORITHMS FOR FACE RECOGNITION..7

3.1 Algorithm for eigen face....7


3.1.1 Following is the technique used to initialize the system.7 3.1.2. Advantages..8 3.1.3. Disadvantages...............................................................................8 3.1.4. Solutions...8

3.2. Feature based recognition...8


3.2.1. Algorithm for feature based recognition...9 3.2.2. Advantages....9 3.2.3. Disadvantages..10

3.3 Neural network based face recognition.10


3.3.1 Algorithm for neural network...10 3.3.2 Advantages11

3.4 An Automatic System for Detection, Recognition & Coding of Faces12


3.4.1 Detection and Alignment.12 3.4.2 Recognition and Coding ..13 3.4.3 Advantages.13

CH. 4 HARDWARE REQUIREMENTS13 CH. 5 APPLICATIONS OF FACE RECOGNITION SYSTEM.14


5.1 Law enforcement and justice solutions...14
5.1.1 CABS.14 5.1.2 Childbase protection14

5.2 Identification solutions.15 5.3 Homeland defence...15 5.4 Airport security15 5.5 Immigration..16 5.6 Access control..16

5.7 Financial services.16 5.8 Scene analysis and surveillance solutions..17

Ch.6 CONCLUSION17

ABSTRACT

Wouldnt you love to replace password based access control to avoid having to reset forgotten password and worry about the integrity of your system? Wouldnt you like to rest secure in comfort that your healthcare system does not merely on your social security number as proof of your identity for granting access to your medical records? Because each of these questions is becoming more and more important, access to a reliable personal identification is becoming increasingly essential .Conventional method of identification based on possession of ID cards or exclusive knowledge like a social security number or a password are not all together reliable. ID cards can be lost forged or misplaced; passwords can be forgotten or compromised. But a face is undeniably connected to its owner. It cannot be borrowed stolen or easily forged. Face recognition technology may solve this problem since a face is undeniably connected to its owner expect in the case of identical twins. Its nontransferable. The system can then compare scans to records stored in a central or local database or even on a smart card.

You might also like