Professional Documents
Culture Documents
Biometric Systems: ITC571 Assignment-2 (Project Proposal & Plan)
Biometric Systems: ITC571 Assignment-2 (Project Proposal & Plan)
BIOMETRIC
SYSTEMS
(Face Recognition)
Prepared by
AVINASH KANAPARTHI
(11559587)
ATHER SAEED
TABLE OF CONTENTS
RATIONALE.............................................................................................................................................................................. 1
DEFINING PROBLEM....................................................................................................................................................... 1
PURPOSE AND JUSTIFICATION................................................................................................................................. 3
RESEARCH QUESTIONS...................................................................................................................................................... 4
PREVIOUS WORK.................................................................................................................................................................. 4
METHODOLOGY..................................................................................................................................................................... 5
Research and System Development Method..................................................................................................... 5
Data Collection Methods.............................................................................................................................................. 5
Ethical Issues..................................................................................................................................................................... 6
Requirement OF Compliance......................................................................................................................................... 6
Data Analysis...................................................................................................................................................................... 6
PROJECT PLAN........................................................................................................................................................................ 7
Deliverables........................................................................................................................................................................ 7
Work Breakdown Structure...................................................................................................................................... 7
Risk analysis....................................................................................................................................................................... 8
Duration............................................................................................................................................................................... 9
Gantt chart........................................................................................................................................................................... 9
REFERENCES......................................................................................................................................................................... 10
RATIONALE
DEFINING PROBLEM
Biometric is the new technology that is being used mainly for authentication purpose by identify
the human being from their physical characteristics such as fingerprints, retina scan, face
recognition etc. Biometric security in the present world is being considered the best technique in
ensuring safety. Among all the different biometric methods human face recognition has gained a
lot of popularity in the past few years and is mainly used by many security agencies to identify
the individuals. The added advantage that is there associated with facial recognition is that in
facial recognition there is no need for the person to be in contact with the system as the image of
the person can be captured from a distance. In face recognition the various patterns of the face
are identified with the image of the face that is there in the database and then if the person is
identified (Achmad & Firdausy, 2012). Mostly this system was developed to provide security but
over the years face recognition is also been used in various other applications.
The issues that are associated with this technology are being discussed below:
Highly dependent over the surroundings: Face recognition process is highly dependent
on the surrounding of the user and in situation where the lighting is not proper it can
cause problems in recognizing the person. Even if the person is wearing a cap or is
Privacy: Privacy is another area of concerns that is associated with facial recognition as
any person can use facial recognition software to capture the face of a person with his or
her knowledge and can then access personal information or other accounts of the person.
position of the face and only works properly when the user is fully facing the system or is
not more than 20 degree off from the system. Even the distance can be a concern in
situation where the person is too close to the system (Agrawal & Sharma, 2016).
Difference in the facial expression: Another issue that can affect the working of the
biometric face recognition system is that in situations where the facial expression of a
person are different from the previous instance. Even if the system is asked to predict the
expression of a person it can wrongly interpret the expression (Arca, Campadelli, &
Lanzarotti, 2006).
biometric system may fail to adapt to the facial changes that a person is bound to have
concern as it can be a tough and a highly expensive task. Organizations may be able to
spend a lot of money to install a face recognition system but may lag in maintain the
system due to the amount of cost that is required for its maintenance.
Efficient Threat models: For facial recognition system the threat models should be well
considered as this system is used to provide security and there can be instances where this
system will attacked by intruders or other malicious parties (Chen, Liao, Lin, & Han,
2001).
High implementation cost: The cost that is levied over the implementation of face
Biometrics face recognition is an emerging technology which has gained a lot of popularity and
importance over the year in ensuring security and providing authorization only to the authorized
in using certain services. The purpose of this research is to gain complete knowledge over the
topic and deliver the best and adequate knowledge about the face recognition.
The reason for using this topic for research is that face recognition is considered to be the future
in providing security and personal identification. It is now being used in many applications like
Facebook where face recognition is used to tag people over the photographs. It is considered to
be the faster and most reliable method in authentication (Firdausy & Achmad, 2011).
RESEARCH QUESTIONS
The research questions that are associated with biometric face recognition technique are:
PREVIOUS WORK
In this paper the author (Lin, 2000) have provided a framework explaining the face recognition
system and the various issues that are there associated with this new emerging technology. In the
recent years face recognition has fathered much attention in various fields and is being
implemented by various organizations. The areas that have benefitted most from this technology
are network security, content indexing and video compression as in this the people are the main
point of attraction. Face recognition not only makes it impossible for the intruders to gain access
of the user’s information but also provides user friendly interface. The author in this paper has
The research and system development method that is deployed for the development of the
describes the face recognition system that deploy human verification and identification model.
The development model that is proposed for the face recognition system would implement pre-
processing, representation and identification module (Moon, Seo, & Pan, 2016). For the purpose
of identification of the development method literature review were done so that complete
information of the topic can be gathered. The literature review provides complete in depth
knowledge about the topic, its areas of use and the area of concerns that are there associated with
it.
The various data collection methods that are used in this research are:
Questionnaires: Questionnaires are set of questions that are prepared so that they can be
asked from researchers. The questionnaires are mailed to the researchers so that they can
answer the questions asked in the questionnaire later on. The questions that are asked
through the questionnaires are very simple and thus produce effective results.
Interviews: Interviews of the researchers are conducted to get instant answers and quick
results. Interviews will allow collecting the information very quickly and is very cost
regard are searched so that complete information regarding face recognition system can
be accumulated.
ETHICAL ISSUES
The ethical issues that are associated with the research on face recognition are described below:
Conflict of interest: Conflict of interest between the researchers can be an ethical issue
Tampering the information: Another ethical issue that is there is related to the
REQUIREMENT OF COMPLIANCE
The compliance requirements that are associated with this research work are:
The data that is collected should be from reliable resources and the integrity of the data
should be maintained.
DATA ANALYSIS
The data analysis method that is used to analyze the information is qualitative data analysis
method. This method allows analyzing useful information from large sources of data. This
method is about interpretations and impressions made by key researchers in their work (Hock
DELIVERABLES
The deliverable of the research is that to provide complete knowledge about the biometric face
recognition system. The various areas where it is useful and what are the risks and issues that are
RISK ANALYSIS
may exceed.
Deadline The project may exceed Medium The timeline schedule should be
DURATION
GANTT CHART
REFERENCES
Achmad, B. & Firdausy, K. (2012). Neural Network-based Face Pose Tracking for Interactive
Agrawal, A. & Sharma, P. (2016). Pose Invarient Face Recognition System. International Journal
Arca, S., Campadelli, P., & Lanzarotti, R. (2006). A face recognition system based on
http://dx.doi.org/10.1016/j.patcog.2005.06.015
Chen, L., Liao, H., Lin, J., & Han, C. (2001). Why recognition in a statistics-based face
recognition system should be based on the pure face portion: a probabilistic decision-based
Firdausy, K. & Achmad, B. (2011). Automatic Frontal Face Pose Tracking for Face Recognition
Hock Koh, L., Ranganath, S., & Venkatesh, Y. (2002). An integrated automatic face detection
3203(01)00117-0
Hsieh, C. & Chen, W. (2011). A Face Recognition System Based on ASM Facial
60.2314
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.100.8398&rep=rep1&type=pdf
Moon, H., Seo, C., & Pan, S. (2016). A face recognition system based on convolution neural