Technical Seminar Topic 1
Technical Seminar Topic 1
Presented by:
Under the guidance of: G.MADHU
21UJ1A0525
CSE IV YEAR
INDEX
Introduction
History/Survey
How it works/Architecture
Applications
Advantages
Disadvantages
Future Scope
Conclusion
References
Introduction
Face recognition technology is a biometric system that
identifies a person’s identify by analyzing facial features. It
uses algorithms to compare facial patterns and converts
images into numerical data for recognition purposes.
Applications include security, user authentication, and social
media tagging
History
Evolution of Face Recognition
Technology
• 1960s: Early experiments in facial
recognition by Woodrow W. Bledsoe.
• 1980s: Development of first algorithms by
Turk and Pentland using eigenfaces.
• 1990s: Introduction of commercial systems;
significant improvements in accuracy.
• 2000s: Rise of machine learning techniques;
emergence of real-time face recognition.
• 2010s: Widespread adoption in smart phones
and social media platforms.
• 2020s: Integration of deep learning and AI
for enhanced recognition capabilities.
How it works..?
1.Image Acquisition: Capturing the image using cameras or
sensors.
2.Face Detection: Identifying and locating human faces in
images.
3.Feature Extraction: Analyzing facial landmarks and
extracting unique features.
4.Face Matching: Comparing extracted features against a
database of known faces.
5.Output Decision: Returning a match or no match based
on predefined thresholds.
Architecture
1. Image Preprocessing: Normalizing
lighting conditions and resizing.
2. Face Detection Module: Algorithms that
locate faces in images (e.g., Haar cascades).
3. Feature Extraction Module: Employs
methods like Local Binary Patterns (LBP)
or deep learning models.
4. Database: Stores facial features for
comparison.
5. Matching Algorithm: Determines
similarity between captured and stored
facial features.
6. User Interface: Displays results and
facilitates user interaction.
Applications
Retail
Advantages
High Accuracy.
User Convenience.
Non-Instrusive.
Scalability.
Enhanced Security.
Disadvantages
Environmental Regulatory
Factors Issues