Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 10

A SEMINAR

REPORT ON

FACE RECOGNITION
TECHNOLOGY
A Seminar submitted to Mrs. R.SUREKHA

Jawaharlal Nehru Technological University Anantapur, Anantapuramu


In partial fulfillment of the requirements for

the award of the degree of

BACHELOR OF TECHNOLOGY
IN
COMPUTER SCIENCE & ENGINEERING (12 size, TR)

Submitted by

T DHARMA RAO 17JE1A0521

Under the esteemed guidance of

Mrs. R.SUREKHA, M.Tech.,Assistant Professor

Department of CSE

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING


SHREE RAMA EDUCATIONAL SOCIETY GROUP OF INSTITUTIONS
(Affiliated to JNTUA, Anantapuramu and approved by AICTE, New Delhi)
Rami Reddy Nagar, Karakambadi Road, Tirupathi – 517 507, A.P

2017-2021
FACE RECOGNITION
TECHNOLOGY
A Seminar submitted to Mrs. R.SUREKHA

Jawaharlal Nehru Technological University Anantapur, Anantapuramu


In partial fulfillment of the requirements for

the award of the degree of

BACHELOR OF TECHNOLOGY
IN
COMPUTER SCIENCE & ENGINEERING

Submitted by

T DHARMA RAO 17JE1A0521

Under the esteemed guidance of

Mrs. R.SUREKHA, M.Tech.,Assistant Professor

Department of CSE

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING


SHREE RAMA EDUCATIONAL SOCIETY GROUP OF INSTITUTIONS
(Affiliated to JNTUA, Anantapuramu and approved by AICTE, New Delhi)
Rami Reddy Nagar, Karakambadi Road, Tirupathi – 517 507, A.P
2017 -2021
Certificate

This is to certify that An Seminar entitled

FACE DETECTION TECHNOLOGY


Is the bonafide work done by

T DHARMA RAO 17JE1A0521

In the Department of Computer Science & Engineering, SHREE RAMA EDUCATIONAL SOCIETY
GROUP OF INSTITUTIONS, Tirupati and is submitted to Jawaharlal Nehru Technological University
Anantapur, Anantapuramu in partial fulfillment of the requirements for the award of the degree of
Computer Science & Engineering.

This work has been carried out under the guidance of

Head of the Department Guide

Mr B. RAVEENDRA NAICK, M.Tech Mrs R.Surekha,M.Tech,


Associate Professor &HOD, Assistant professor,
Department of CSE, Department of CSE,
SHREE RAMA EDUCATIONAL SOCIETY SHREE RAMA EDUCATIONAL SOCIETY
GROUP OF INSTITUTIONS GROUP OF INSTITUTIONS
Tirupathi. Tirupathi.

Viva- Voce held on ……………………………………………………..

INTERNAL EXAMINER EXTERNAL EXAMINER


ACKNOWLEDGEMENT

We consider it is our privilege to express our gratitude and respect to all those who
guided, inspired and helped us in the completion of an Seminar.

We are thankful to our chairman Sri MANNEM RAMI REDDY, Director Sri MANNEM
ARAVIND KUMAR REDDY and Vice principal Sri B.THRIVIKRAM for permitting us to use
facilities available in this college to accomplish the Seminar completely.

We express our deep sense of gratitude to Mr B. RAVEENDRA NAICK, Head of the


department of CSE for his kind help that he extended at every stage of our work for all provisions
made us to complete this endeavor successfully.

We are thankful to our guide Mrs.R.SUREKHA, M.Tech,Assistant Professor, all of his


guidance and co- operation of Seminar work.

We are also thankful to all our staff members of Computer Science and Engineering for
their co-operation.

Last but not least, we wish to thank to all my friends, and who helped directly or indirectly
in completion of our Semester.

is developing an independent
ABSTRACT
research subject. So, there are
Face detection technology has widely attracted attention due to its
many approaches to solve face
enormous application value and market potential, such as face
detection. Here the modified
recognition and video surveillance system. Real-time face detection
AdaBoost algorithm based on
not only is one part of the automatic face recognition system but also
OpenCV is presented, and
experiments of real-time face detecting are also given through two
methods of timer and dual-thread. The result shows that the method
of face detection with dual-thread is simpler, smoother and more
precise.

CONTENTS
1.INTRODUCTION
2.BIOMETRICS
3.BEHAVIOUR BIOMETRICS
3.1 BIOMETRICS
3.2 BIOMETRIC SYSTEM WORKING
4. WHY FRT IS HAVING EDGE OVER OTHER
BIOMETRICS
5. PROPOSED SYSTEM
6. FACE RECOGNITION SYSTEM COMPONENTS
7.ADVANTAGES OF FACE RECOGNITION
TECHNOLOGY
8. DISADVANTAGES OF FACE RECOGNITION
9.MODULES OF FACE RECOGNITION
10.APPLICATIONS
11.CONCLUSION
FACE RECOGNITION TECHNOLOGY
1.Introduction
 In todays networked world, the need to maintain the security of information or physical property is
becoming both increasingly important and increasingly difficult.
 We all know that bank and computer system uses PIN, Password, ID’s, Keys for
identification/authentication. These system do not grant access by “who we are” but by “what we
have”.
 Recent cases of identity theft have heighten the needs for the method to prove that someone is truly
he/she claims to be.
 Technology become available to allow verification of “true” individual identity. This tech. is based
on field called “biometrics”.
 Face Recognition is the fastest biometric technology. It works with the most obvious individual
identifier i.e. the human face because it is undeniably connected to its owner and is non-
transferable.

2. BIOMETRICS
 Biometrics includes the methods for uniquely recognizing humans based on one or more physical
or behavioral traits.
 Physiological biometrics : Based on measurements and data derived from direct measurement of a
part of the human body.
 Finger-scan
 Facial Recognition
 Iris-scan
 Retina-scan
 Hand-scan

3. Behavioral biometrics
Based on measurements and data derived from an action.
 Voice-scan
 Signature-scan
 Keystroke-scan
3.1 Biometrics
The first time an individual uses a biometric system is called an enrollment. During the enrollment,
biometric information from an individual is stored.
3.2 “Biometric System” Working
Stored m en r oll Templates Biometric System En Test Test Feature TemplatePre-Processing Matcher
Extractor Generator Sensor Application Devices

4.WHY FRT IS HAVING EDGE OVER OTHER BIOMETRICS


 It requires no physical interaction on behalf of the user.
 It is accurate and allows for high verification rates.
 It does not require an expert to interpret the comparison result.
 It is the only biometric that allow you to perform passive identification in a one to many
environments.

5.PROPOSED SYSTEM
Face recognition is a personal identification system that uses personal characteristics of a person to
identify the person's identity.
 
Facial image recognition 
Eigen face method is based on the reduction of face- dimensional space using Principal Component
Analysis (PCA) for facial features

6.FACE RECOGNITION SYSTEM COMPONENTS


 Enrollment Module
 Database
 Identification Module
7.ADVANTAGES OF FACE RECOGNITION TECHNOLOGY:
 Improved Public Security
 Fast and Non-Invasive Identity Verification
  Benefits of Facial Recognition in Banking
 Benefits of Facial Recognition in Retail
 Better Worker Attendance Systems
 Face Recognition Furthers Enables Computer Vision

8.DISADVANTAGES OF FACE RECOGNITION


 Individual Privacy Concerns
 Data Privacy Concern with Facial Recognition
 Facial Recognition and Racial Bias
 Low Reliability
 Lack of Regulation

9.MODULES OF FACE RECOGNITION


10.APPLICATIONS
 Security/Counterterrorism: Access control, comparing surveillance images to Know terrorist.
 Day Care: Verify identity of individuals picking up the children.
 Voter verification: Where eligible politicians are required to verify their identity during a
voting process this is intended to stop voting where the vote may not go as expected.
 Residential Security: Alert homeowners of approaching personnel.
 Banking using ATM: The software is able to quickly verify a customer’s face.

11.CONCLUSION
Face recognition technologies have been associated generally with very costly top secure applications.
Today the core technologies have evolved and the cost of equipment is going down dramatically due
to the integration and the increasing processing power . Certain applications of face recognition
technology are now cost effective , reliable and highly accurate .As a result there are no technological
or financial barriers for stepping from the pilot project to widespread deployment .

You might also like