26
FACE RECOGNITION FACE RECOGNITION HOW BIOMETRICS WILL BE UTILIZED HOW BIOMETRICS WILL BE UTILIZED TO COUNTER TERRORISM TO COUNTER TERRORISM Presented By: Presented By: Carlos Buskey Carlos Buskey THE LAST MINUTE ADDTION

FACE RECOGNITION HOW BIOMETRICS WILL BE UTILIZED TO COUNTER TERRORISM

  • Upload
    makoto

  • View
    43

  • Download
    0

Embed Size (px)

DESCRIPTION

FACE RECOGNITION HOW BIOMETRICS WILL BE UTILIZED TO COUNTER TERRORISM. Presented By: Carlos Buskey. THE LAST MINUTE ADDTION. THIS PRESENTATION WILL COVER…. INTRODUCTION TO BIOMETRICS HISTORY OF BIOMETRICS TYPES OF BIOMETRIC TECHNOLOGY INTRO TO FACE RECOGNITION - PowerPoint PPT Presentation

Citation preview

Page 1: FACE RECOGNITION HOW BIOMETRICS WILL BE UTILIZED TO COUNTER TERRORISM

FACE RECOGNITIONFACE RECOGNITIONHOW BIOMETRICS WILL BE UTILIZED HOW BIOMETRICS WILL BE UTILIZED

TO COUNTER TERRORISMTO COUNTER TERRORISM

Presented By:Presented By:Carlos BuskeyCarlos Buskey

THE LAST MINUTE ADDTION

Page 2: FACE RECOGNITION HOW BIOMETRICS WILL BE UTILIZED TO COUNTER TERRORISM

BIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEY

THIS PRESENTATION WILL COVER…THIS PRESENTATION WILL COVER…

• INTRODUCTION TO BIOMETRICSINTRODUCTION TO BIOMETRICS• HISTORY OF BIOMETRICSHISTORY OF BIOMETRICS• TYPES OF BIOMETRIC TECHNOLOGYTYPES OF BIOMETRIC TECHNOLOGY• INTRO TO FACE RECOGNITIONINTRO TO FACE RECOGNITION• FACE RECOGNITION USAGE IN FACE RECOGNITION USAGE IN

AIRPORTS TO COUNTER TERRORISMAIRPORTS TO COUNTER TERRORISM• FUTURE OF FACE RECOGNITIONFUTURE OF FACE RECOGNITION

Page 3: FACE RECOGNITION HOW BIOMETRICS WILL BE UTILIZED TO COUNTER TERRORISM

INTRODUCTION TO INTRODUCTION TO BIOMETRICSBIOMETRICS

Page 4: FACE RECOGNITION HOW BIOMETRICS WILL BE UTILIZED TO COUNTER TERRORISM

BIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEY

QUESTIONQUESTION

Biometrics stands for:Biometrics stands for:(A)(A)The measurement of nuclear The measurement of nuclear

weaponsweapons(B)(B)Life-measurementsLife-measurements(C)(C)The study of whether house hold The study of whether house hold

plants will someday become a treeplants will someday become a tree(D)(D)Measuring size of DNA strandsMeasuring size of DNA strands

Page 5: FACE RECOGNITION HOW BIOMETRICS WILL BE UTILIZED TO COUNTER TERRORISM

BIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEY

INTRODUCTION TO BIOMETRICSINTRODUCTION TO BIOMETRICS

• Biometrics (“Bio-“ stands for life Biometrics (“Bio-“ stands for life and“metric” is to measure) and“metric” is to measure)

Page 6: FACE RECOGNITION HOW BIOMETRICS WILL BE UTILIZED TO COUNTER TERRORISM

BIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEY

INTRODUCTION TO BIOMETRICSINTRODUCTION TO BIOMETRICS

““Biometric is using a computer to Biometric is using a computer to recognized physical and behavior recognized physical and behavior characteristics of a human. These characteristics of a human. These trait are captured by a computer trait are captured by a computer and used to make one-to-one and used to make one-to-one authentication and one-to-many authentication and one-to-many comparison based on unique comparison based on unique features[Visonics, 2001]features[Visonics, 2001]””

Page 7: FACE RECOGNITION HOW BIOMETRICS WILL BE UTILIZED TO COUNTER TERRORISM

BRIEF HISTORY OF BRIEF HISTORY OF BIOMETRICSBIOMETRICS

AND I MEAN BRIEF!!!!

Page 8: FACE RECOGNITION HOW BIOMETRICS WILL BE UTILIZED TO COUNTER TERRORISM

BIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEY

QUESTIONQUESTION

Biometrics was first used:Biometrics was first used:(A)(A)During the first DPS SessionDuring the first DPS Session(B)(B)In the first James Bond MovieIn the first James Bond Movie(C)(C)Prehistoric timesPrehistoric times(D)(D)During the Nixon AdministrationDuring the Nixon Administration

Page 9: FACE RECOGNITION HOW BIOMETRICS WILL BE UTILIZED TO COUNTER TERRORISM

BIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEY

HISTORY OF BIOMETRICSHISTORY OF BIOMETRICS

• Biometrics was used during Biometrics was used during prehistoric times.prehistoric times.

• Chinese used fingerprinting in the Chinese used fingerprinting in the 1414thth Century for identification. Century for identification.

• In the 17In the 17thth century fingerprinting century fingerprinting was used to seal official was used to seal official documents.documents.

Page 10: FACE RECOGNITION HOW BIOMETRICS WILL BE UTILIZED TO COUNTER TERRORISM

TYPES OF BIOMETRICSTYPES OF BIOMETRICS

Page 11: FACE RECOGNITION HOW BIOMETRICS WILL BE UTILIZED TO COUNTER TERRORISM

BIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEY

TYPES OF BIOMETRICS TYPES OF BIOMETRICS

• Finger printsFinger prints• Retina ScansRetina Scans• Iris ScansIris Scans• Voice recognitionVoice recognition• Face recognition.Face recognition.

Page 12: FACE RECOGNITION HOW BIOMETRICS WILL BE UTILIZED TO COUNTER TERRORISM

BIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEY

TYPES OF BIOMETRICS TYPES OF BIOMETRICS

Other forms of emerging Biometrics: Other forms of emerging Biometrics: • thermal scansthermal scans• DNA (actually actively used in forensics)DNA (actually actively used in forensics)• SignaturesSignatures• hand geometryhand geometry• ear structureear structure• heart rhythmheart rhythm

Page 13: FACE RECOGNITION HOW BIOMETRICS WILL BE UTILIZED TO COUNTER TERRORISM

INTRODUCTION TO FACE INTRODUCTION TO FACE RECOGNITIONRECOGNITION

Page 14: FACE RECOGNITION HOW BIOMETRICS WILL BE UTILIZED TO COUNTER TERRORISM

BIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEY

QUESTIONQUESTION

What is face recognition?:What is face recognition?:(A)(A)Discovering whether Michael Discovering whether Michael

Jackson has made a new changeJackson has made a new change(B)(B)Remembering a person at your Remembering a person at your

class reunionclass reunion(C)(C)The ability to identify which The ability to identify which

President is on the 10 dollar bill.President is on the 10 dollar bill.(D)(D)The capturing of a facial image The capturing of a facial image

Page 15: FACE RECOGNITION HOW BIOMETRICS WILL BE UTILIZED TO COUNTER TERRORISM

BIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEY

INTRO TO FACE RECOGNITIONINTRO TO FACE RECOGNITION

• Face recognition is the capturing of a Face recognition is the capturing of a facial image, which is then transformed facial image, which is then transformed into a unique face printinto a unique face print

• The image is transformed using a The image is transformed using a technique called “elastic graph technique called “elastic graph matching”.matching”.

• Algebraic algorithms are used to make a Algebraic algorithms are used to make a perfect match.perfect match.

• Images are sent to a back-end database Images are sent to a back-end database for comparison and possible matches.for comparison and possible matches.

Page 16: FACE RECOGNITION HOW BIOMETRICS WILL BE UTILIZED TO COUNTER TERRORISM

FACE RECOGNITION IN FACE RECOGNITION IN AIRPORTSAIRPORTS

ANTI- TERROISM TECHNOLOGYANTI- TERROISM TECHNOLOGY

Page 17: FACE RECOGNITION HOW BIOMETRICS WILL BE UTILIZED TO COUNTER TERRORISM

BIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEY

FACE RECOGNITION USAGE IN AIRPORTS FACE RECOGNITION USAGE IN AIRPORTS TO COUNTER TERRORISMTO COUNTER TERRORISM

Image is sent to computer

for manipulation.

Hi I am

Dr. Larr

y Bliss

Page 18: FACE RECOGNITION HOW BIOMETRICS WILL BE UTILIZED TO COUNTER TERRORISM

BIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEY

FACE RECOGNITION USAGE IN AIRPORTS FACE RECOGNITION USAGE IN AIRPORTS TO COUNTER TERRORISMTO COUNTER TERRORISM

Page 19: FACE RECOGNITION HOW BIOMETRICS WILL BE UTILIZED TO COUNTER TERRORISM

BIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEY

FACE RECOGNITION USAGE IN AIRPORTS FACE RECOGNITION USAGE IN AIRPORTS TO COUNTER TERRORISMTO COUNTER TERRORISM

Page 20: FACE RECOGNITION HOW BIOMETRICS WILL BE UTILIZED TO COUNTER TERRORISM

BIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEY

FACE RECOGNITION USAGE IN AIRPORTS FACE RECOGNITION USAGE IN AIRPORTS TO COUNTER TERRORISMTO COUNTER TERRORISM

Examples of jetting and Gabor waveletsExamples of jetting and Gabor wavelets

Ruhr-Universitat Bochum Research Ins. 2001

Page 21: FACE RECOGNITION HOW BIOMETRICS WILL BE UTILIZED TO COUNTER TERRORISM

BIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEY

Image is passed to database for possible match

FACE RECOGNITION USAGE IN AIRPORTS FACE RECOGNITION USAGE IN AIRPORTS TO COUNTER TERRORISMTO COUNTER TERRORISM

Page 22: FACE RECOGNITION HOW BIOMETRICS WILL BE UTILIZED TO COUNTER TERRORISM

BIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEY

WARNING!WARNING!!!!!!!HOLD FOR QUESTIONING

FACE RECOGNITION USAGE IN AIRPORTS FACE RECOGNITION USAGE IN AIRPORTS TO COUNTER TERRORISMTO COUNTER TERRORISM

Page 23: FACE RECOGNITION HOW BIOMETRICS WILL BE UTILIZED TO COUNTER TERRORISM

FUTURE OF FACE FUTURE OF FACE RECOGNITIONRECOGNITION

The Future is NOW!!

Page 24: FACE RECOGNITION HOW BIOMETRICS WILL BE UTILIZED TO COUNTER TERRORISM

BIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEY

FUTURE OF FACE RECOGNITION FUTURE OF FACE RECOGNITION

• Neural Nets to improve accuracy and Neural Nets to improve accuracy and predictions.predictions.

• Wearable computing will make face Wearable computing will make face recognition ubiquitous .recognition ubiquitous .

• Hybrids-face recognition/thermal scansHybrids-face recognition/thermal scans• Hybrids-face recognition/voice Hybrids-face recognition/voice

recognitionrecognition• Digitized imagesDigitized images

Page 25: FACE RECOGNITION HOW BIOMETRICS WILL BE UTILIZED TO COUNTER TERRORISM

BIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEY

FUTURE OF FACE RECOGNITION FUTURE OF FACE RECOGNITION

• May replace monetary exchange - credit May replace monetary exchange - credit cards and moneycards and money

• Utilized for security access to buildings Utilized for security access to buildings and computersand computers

• Utilized to augment normal access to Utilized to augment normal access to automobiles and homesautomobiles and homes

• Face recognition will work with ATM’s to Face recognition will work with ATM’s to authenticate bank users by matching authenticate bank users by matching face prints with bank cardsface prints with bank cards

Page 26: FACE RECOGNITION HOW BIOMETRICS WILL BE UTILIZED TO COUNTER TERRORISM

THANK YOUTHANK YOUA NEGOTIATED A NEGOTIATED

OPTIONS OPTIONS PRODUCTION PRODUCTION