58
FACE RECOGNITION Sangeetha:4SO10MCA39 Roofi Nafeesa:4SO10MCA37 Roopa:4SO10MCA38 MATCH!

ppt

  • Upload
    pmak8

  • View
    90

  • Download
    1

Embed Size (px)

Citation preview

Page 1: ppt

FACE RECOGNITION

Sangeetha:4SO10MCA39 Roofi Nafeesa:4SO10MCA37

Roopa:4SO10MCA38

MATCH!

Page 2: ppt

CONTENTS

Introduction History Biometrics Face Authentication Drawbacks Tests and Results Conclusion

Page 3: ppt

Face Recognition

INTRODUCTION

Face recognition is a computer based security system capable of automatically verifying or identifying a person.

Biometrics identifies or verifies a person based on individual’s physical characteristics by matching the real time patterns against the enrolled ones.

1

Page 4: ppt

Face Recognition

HISTORY

The first attempts to do this began in the 1960’s with a semi-automated system. The first attempts to do this began in the 1960’s with a semi-automated system.

In 1970’s Goldstein, Harmon and Lesk created a system of 21 subjective markers such as hair color and lip thickness.

In 1988, when Kirby and Sirovich used a standard linear algebra technique, ‘Principle Component analysis’ that reduced the computation to less than a hundred values to code a normalized face image.

In 1991, scientists finally succeeded in developing real time automated face recognition system.

2

Page 5: ppt

Face Recognition

BIOMETRICS

Biometric consists of several authentication techniques based on unique physical characteristics such as face, fingerprints, iris, hand geometry, retina, and voice.

Biometric Technologies fill the role of analyzing and measuring unique biological properties in order to produce unique identifications which is then digitalized and stored

3

Page 6: ppt

Face Recognition

Biometrics can be divided into two main classes

Physiological biometrics -related to the shape of the body

Behavioral biometrics -related to the behavior of a person.

4

Page 7: ppt

Face Recognition

Physiological biometrics is related to the shape of the body

• Face Recognition

A facial recognition technique is an application of computer for automatically identifying or verifying a person from a digital image or a video frame from a video source.

 

Fig: Recognition of face from Body

5

Page 8: ppt

Face Recognition

Facial recognition technologies have recently developed into two areas

Facial metric Eigen faces.

Fig: Eigen Face.

6

Page 9: ppt

Face Recognition

• Finger-scan

A fingerprint is an impression of the friction ridges of all or any part of the finger.

A friction ridge is a raised portion of the on the palmar(palm)or digits (fingers and toes) or plantar (sole) skin, consisting of one or more connected ridge units of friction ridge skin.

Fig: Fingerprint Bitmap

7

Page 10: ppt

Face Recognition

• Iris-scan This recognition method uses the iris of the

eye which is colored area that surrounds the

pupil. Iris patterns are unique and are obtained

through video based image acquisition system.

Fig: Image of IRIS.

8

Page 11: ppt

Face Recognition

• Retina-scan: It is based on the blood vessel pattern in

the retina of the eye as the blood vessels at the back of the eye have a unique pattern, from eye to eye and person to person.

Fig: Image of Retina

9

Page 12: ppt

Face Recognition

• Hand-scan: These techniques include the estimation of

length, width, thickness and surface area of the hand.

Various method are used to measure the hands- Mechanical or optical principle.

Fig: Hand Geometry Scanner Fig: Acquired Image of Hand.

10

Page 13: ppt

Face Recognition

Behavioral biometrics is related to the behavior of a person.

• Voice-scan: Voice is also physiological trait because

every person has different pitch, but voice recognition is mainly based on the study of the way a person speaks.

11

Page 14: ppt

Face Recognition

• Signature-scan:

The signature dynamics recognition is based on the dynamics of making the signature, rather than a direct comparison of the signature itself afterwards.

There are various kinds of devices used to capture the signature dynamics traditional tablets or special purpose devices.

12

Page 15: ppt

Face Recognition

Access Control System using Face Recognition

 Face recognition applications are more and more being taken interest in and developed

They are non-intrusive. Biometric data of the faces (photos, videos)

can be easily taken with available devices like cameras.

One biometric data is used in many different environments.

And facial recognition sounds rather interesting in comparison with other biometric technologies.

13

Page 16: ppt

Face Recognition

Challenges involved out-of-Plane Rotation: frontal, 45 degree, profile,

upside down Presence of beard, mustache, glasses etc Facial Expressions Occlusions by long hair, hand In-Plane Rotation Image conditions:

Size Lighting condition Distortion Noise Compression

14

Page 17: ppt

Face Recognition

Lighting variation Orientation variation (face angle) Size variation Large database Processor intensive Time requirements

15

Page 18: ppt

FACE AUTHENTICATION

Page 19: ppt

Face Recognition

MODEL

Access Control System Based on Face Authentication Model

16

Image digital

processing

Face Capture devices

Face databas

e

Face detecti

on

ID

Page 20: ppt

ALGORITHMS IN USE

Page 21: ppt

Face Recognition

FACE RECOGNITION MODEL

17

Facedetection

Featureextraction

Databaseof enrolled

users

Feature match

Face image

Face id

Face Recognition Processing Flow

Page 22: ppt

Face Recognition

FACE RECOGNITION MODEL CONTD…

Face Detection Feature Extraction Feature Match 

18

Page 23: ppt

FACE RECOGNITION ALGORITHM

Page 24: ppt

Face Recognition

GEOMETRIC FEATURE-BASED APPROACH

Based on the geometric characteristics of faces

Parts of human faces such as eyes, nose, and mouth are located together with their attributes

Distinguish faces based on information. This approach is quite effective for small

database, with steady lighting and viewpoint.

19

Page 25: ppt

Face Recognition

DISADVANTAGES:

Not effective for unstable lighting condition and changing viewpoint.

The scanning technology is not yet reliable. The information extracted is not enough for

an information-rich organ like face.

20

Page 26: ppt

Face Recognition

Geometric feature-based approach

21

Page 27: ppt

Face Recognition

APPEARANCE-BASED APPROACH

Based on human appearance.. Transforms the face space into subspaces Fewer dimensions Principal Component Analysis (PCA) KLT – Karhunen- Loève Transform.

22

Page 28: ppt

Face Recognition

23

Page 29: ppt

EIGENFACE ALGORITHM

Page 30: ppt

Face Recognition

Eigenfaces Initialization1.Acquire an initial set of face images

24

Page 31: ppt

2.Calculate the eigen

faces from the training set, keeping only the M images that correspond to the highest eigenvalues. These M images define the face space. As new faces are experienced, the eigen faces can be updated or recalculated

Face Recognition

25

Page 32: ppt

3. Calculate the corresponding distribution in M-

dimensional weight space for each known individual, by projecting their face images onto the “face space.”

Face Recogniton

26

Page 33: ppt

Face Recognition

EIGENFACES RECOGNITION

1. Calculate a set of weights based on the input image and the M eigenfaces by projecting the input image onto each of the eigenfaces.

2. Determine if the image is a face at all by checking to see if the image is sufficiently close to “face space.”

3. If it is a face, classify the weight pattern as either a known person or as unknown.

4. (Optional) Update the eigenfaces and/or weight patterns.

27

Page 34: ppt

Face Recognition

PARAMETER BASED FACIAL RECOGNITION:

Facial image is analyzed and reduced to small set of parameters describing prominent facial features

Major features analyzed are: eyes, nose, mouth and cheekbone curvature

These features are then matched to a database   Advantage: recognition task is not very expensive Disadvantage: the image processing required is

very expensive and parameter selection must be unambiguous to match an individual’s face

28

Page 35: ppt

Face Recognition

TEMPLATE BASED FACIAL RECOGNITION

Salient regions of the facial image are extracted

These regions are then compared on a pixel-by-pixel basis with an image in the database

Advantage is that the image preprocessing is simpler

Disadvantage is the database search and comparison is very expensive

29

Page 36: ppt

Face Recognition

OTHER APPROACH

Local Features Analysis (LFA) method. Gabor wavelet-based features method. Local Binary Pattern (LBP) method.

30

Page 37: ppt

Face Recognition

THREE-DIMENSIONAL FACE RECOGNITION (3D FACE RECOGNITION)

Three-dimensional geometry of the human face is used.

Higher accuracy than their 2D counterparts Multiple images from different angles from a common

camera may be used to create the 3D model with significant post-processing. 

The main technological limitation of 3D face recognition methods is the acquisition of 3D images, which usually requires a range camera.

3D face recognition is still an active research field, though several vendors offer commercial solution.

31

Page 38: ppt

Lenovo – Asus – Toshiba

Page 39: ppt

Face Recognition

LENOVO VERIFACE III

User interface of Veriface III, released on Aug 06th 2008. Lenovo has had interesting ads with Robinson and his wife.

32

Page 40: ppt

Face Recognition

ASUS SMARTLOGIN

33

Page 41: ppt

Face Recognition

 TOSHIBA FACE RECOGNITION

34

Page 42: ppt

DRAWBACKS

Page 43: ppt

Face Recognition

The security threat posed to Lenovo’s – Asus’s – Toshiba’s products, based on the basis face recognition algorithms and the tests performed on them:

• Face Recognition in comparison with other biometric recognition systems.

• Influences of varied lighting• Influences of image capturing devices• Influences of Image Processing

35

Page 44: ppt

Face Recognition

Table 1: State of art of biometric recognition systems

36

Page 45: ppt

Face Recognition

Biometric recognition systemsFinger Print TechnologyFace Recognition TechnologyIris TechnologyHand Geometry TechniqueRetina GeometrySpeaker Recognition Technique (voice)Signature Verification Technique

37

Page 46: ppt

BYPASS MODEL

Page 47: ppt

Face Recognition

38

Page 48: ppt

FAKE FACE

Page 49: ppt

Face Recognition

How to get a target’s image

38

Page 50: ppt

Face Recognition

Fake Face Bruteforce

There are several things to concern about in image editing so as the Brute Force to be successful, including:The image’s viewpoint.Lighting effect.

39

Page 51: ppt

TESTS AND RESULTS

Page 52: ppt

Face Recognition

2) Asus SmartLogon V1.0.0005

40

Page 53: ppt

Face Recognition

1) Lenovo Veriface III

41

Page 54: ppt

Face Recognition

42

3) Toshiba Face Recognition 2.0.2.32

Page 55: ppt

Face Recognition

RESULT ESTIMATION

Table 2:results of the tests on the Bypass Model

43

Page 56: ppt

Face Recognition

44

CONCLUSION 

•The weak points that might allow one to bypass into the systems of the three big computer manufacturers Lenovo – Asus – Toshiba is to give sufficient evidences that the authentication technologies being used by these three manufacturers are not efficient and secure enough as they are prone to be bypassed putting users’ data at serious risk.

Page 57: ppt

Thank You

Page 58: ppt

Face Recognition

58

Questions??