Download as pdf or txt
Download as pdf or txt
You are on page 1of 16

MICRO PROJECT

Academic year
2020-21

Unlock Phone Using Face ID

Program: Computer Engineering

Program code: CO6I

Course: Emerging Trends in Computer and Information Technology

Course code: 22618


MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION

Certificate
This is to certify that Mr./Ms. Sanjay Vaidya, Prachi Shinde, Sirisree Achanta, Alden Farias. Roll No.

37, 38, 39, 40 of Sixth Semester of Diploma in Computer Engineering of Institute, VES

POLYTECHNIC (Code: 0004) has completed the Micro Project satisfactorily in Emerging Trends

in Computer and Information Technology (22618) for the academic year 2020- 2021 as prescribed in

the curriculum.

Place: Chembur, Mumbai. Enrollment No: 1800040277-1800040280

Date: ……………………… Exam Seat No: ………………….

Subject Teacher Head of the Department Principal


INDEX

Academic year: 2020-21 Name of the faculty: Mrs. Sangita Bhoyar

Program code: CO6I

Course & course code: Emerging Trends in Computer and Information Technology (22618)

Name of the candidates: Sanjay Vaidya, Prachi Shinde, Sirisree Achanta, Alden Farias

Roll No. 37, 38, 39, 40

Enrollment No. 1800040277-1800040280

Sr. No Content Page No.

1 Brief Introduction 1

2 Aim of Microproject 1

3 Action Plan and Resources Required 2-3

4 Brief Description 4

5 Implementation of Result 8

Skill Developed /Learning out of this


6 10
Micro Project

7 Teacher Evaluation Sheet 12


Annexure – I

Micro-Project Proposal

Unlock Phone Using Face ID

1.0 Aim/Benefits of the Micro-Project


1. Face detection technique has emerged as one of the most successful applications in the
computer vision field.

2. More convenient and quicker than Touch ID. Face ID uses machine learning so that it can
learn from changes to your face over time.

3. The hard-to-break layer of security keeps your Phone safe and, like Touch ID, you can bypass
Face ID by using a passcode.

4. Face ID it can provide better security compared to using passwords and passcodes in some
situations.

2.0 Course Outcomes Addressed


1. Describe Artificial Intelligence, Machine learning and deep learning [ ]

2. Describe Evidence Handling procedures [ ]

3. Detect Network, Operating System and applications vulnerabilities [ ]

3.0 Proposed Methodology


1. Search content to select topic & finalize it accordingly.

2. Now, search information and related media for the topic selected.

3. Make a PPT Presentation on the topic selected using Microsoft PowerPoint 2007 or above.

4. Make a report on the topic selected using Microsoft Word 2007 or above.

1
4.0 Action Plan:

Planned
Planned Name of Responsible
Sr. No. Details of activity Finish
Start date Team Members
date

Discussion and finalization 03/04/21 10/04/21 All Team Members


1 of topic

Preparation and submission 10/04/21 17/04/21 All Team Members


2
of project proposal

3 Literature Review 17/04/21 24/04/21 All Team Members

4 Collection of Data 24/04/21 01/05/21 All Team Members

Summarizing and 01/05/21 08/05/21 All Team Members


5 organizing the content

Editing and 08/05/21 15/05/21 All Team Members


6 proofreading of
Content

7 Finalization of content 15/05/21 22/05/21 All Team Members

8 Presentation and Viva voce 22/05/21 29/05/21 All Team Members

Final submission of Project 29/05/21 05/05/21 All Team Members.


9 Report

2
5.0 Resources Required

S. No. Name of Specifications Qty Remarks


Resource/material

1 Smartphone iPhone X and above 1 ✓

2 Operating system iOS 10 and above 1 ✓

3 Software MS PowerPoint 1 ✓

Name of Team Members with Roll No.

Name of Student Roll Nos.


Sanjay Vaidya 37
Prachi Shinde 38
Sirisree Achanta 39
Alden Farias 40

Mrs. Sangita Bhoyar

3
Annexure – II

Micro-Project Report

Unlock phone using Face ID

1.0 Rationale
Face ID is a facial recognition and authentication technology developed by Apple. It was announced
on September 12, 2017 in conjunction with iPhone X, which will be the first device equipped with
the technology.
Face ID is based on a facial recognition sensor that consists of two parts: a dot projector module
that projects more than 30,000 infrared dots onto the user's face, and an infrared camera module
that reads the pattern. The pattern is encrypted and sent to a local "Secure Enclave" in the
device's CPU to confirm a match with the registered face. The stored facial data is a mathematical
representation of key details of the face, and it is inaccessible to Apple or other parties. To avoid
involuntary authentication, the system requires the user to open their eyes and look at the device to
attempt a match, although this can be disabled through an accessibility setting. Face ID is
temporarily disabled and the user's passcode is required after 5 unsuccessful scans, 48 hours of
inactivity, restarting the device, or if two of the device's both side buttons are held briefly.

2.0 Aim of the Micro-Project


1. Face detection technique has emerged as one of the most successful applications in the
computer vision field

2. More convenient and quicker than Touch ID, Face ID uses machine learning, so that it can
learn from changes to your face over time.

3. The hard-to-break layer of security keeps your Phone safe and, like Touch ID, you can
bypass Face ID by using a passcode.

4. Face ID it can provide better security compared to using passwords and passcodes in some
situations.

3.0 Course Outcomes Addressed


1. Describe Artificial Intelligence, Machine learning and deep learning [ ]

2. Describe Evidence Handling procedures [ ]

3. Detect Network, Operating System and applications vulnerabilities [ ]

4
4.0 Literature Review

What Is Facial Recognition Technology?


Facial recognition is a biometric software application capable of uniquely identifying or verifying
a person by comparing and analyzing patterns based on the person’s facial contours. The technology is
mostly used for security purposes, though there is increasing interest in other areas of use. Facial
recognition technology has received significant attention as it has the potential for a wide range of
application related to law enforcement as well as other enterprises.

We, humans, recognize others by looking at their faces, not by fingerprint or iris scan. As a result,
facial recognition technology is less invasive and more natural to integrate into our daily lives and
processes.

Recent advances in Artificial Intelligence have allowed tech companies to begin offering new face
recognition online services. Companies such as Microsoft, Amazon, and new players like Kairos, Beta
face and Bio-ID are leading the effort. As a result, many new startups can now bring to market
applications with face recognition.

How Does Face ID Work?


There are a number of hardware factors involved in Face ID, such as the True Depth camera system,
neural networks and the Bionic chips. The True Depth camera uses three new components to accomplish face
recognition:
1. The flood illuminator uses infrared light to invisibly illuminate the user’s face, even in low-light
situations.
2. The dot projector projects over 30,000 individual dots of focused infrared light onto the user’s face.
3. The infrared camera reads the combined data of the “flood illuminator” and “dot projector”.
4. Information photographed by the infrared camera is sent to the secure enclave in the phone’s Bionic
CPU.
5. The processor’s Neural Engine uses Machine Learning to identify the user’s face, even if the user is
wearing a hat or glasses, grows facial hair, or otherwise change their hairstyle.

5
What is True Depth camera system:
Each time you glance at your phone, the True Depth camera system will detect your face with flood
illuminator, even in the dark.
An infrared camera will then take an image, and a dot projector will project out over 30,000
invisible infrared dots. This system uses the infrared image and the infrared dots, and pushes them
through neural network to create mathematical model of your face.

What is Neural Network:


Your phone will check scans (or mathematical models) of your face against the one you have setup
and stored on your device to see if it’s a match, and if it is, it will unlock your phone
This all happens in real-time and invisibly. it worked with thousands of people across the world
and took over a billion images, and with that, it developed multiple neural networks to form its Face ID
technology.

What is Bionic Neural Engine:


In order to process all the data needed for Face ID, via machine learning, using Bionic neural
engine.
In a nutshell, the chips are specialized hardware built for a set of machine learning algorithms. They can
handle hundreds of billions of operations per second and can therefore be used for technology, such as
real-time Face ID recognition.

Advantages and disadvantages of Face ID:

Advantages:
1. Improved Public Security.
2. Fast and Non-Invasive identity verification.
3. Benefits of Facial Recognition in banking.
4. Benefits of Facial Recognition in Retail.
5. Better worker attendance system.
6. Face Recognition furthers enables computer vision.

Disadvantages:
1. Individual privacy concerns (In case of twins).
2. Data privacy concern with facial recognition.

6
Examples of facial recognition technology :
1. Apple : Apple facial recognition to help users quick unlock their phones, log in to apps, and make
purchases.

2. Coca-Cola : Coca-Cola has used facial recognition in several ways across the world. Example
include rewarding customers for recycling at some of its vending machines in China, delivering
personalized ads on its vending machines in Australia, and for event marketing in Israel.

3. British Airways : British Airways enables facial recognition for passengers boarding flights
from the US. Travelers faces can be scanned by a camera to have their identity verified to board
their plane without showing their passport or boarding pass. The airline has been using the
technology on UK domestic flights from Heathrow and is working towards biometric boarding
on international flights from the airport.

4. Facebook : Facebook began using facial recognition in the US in 2010 when it automatically
tagged people in photos using its tag suggestions tool. The tool scans a user's face and offers
suggestions about who that person is. Since 2019, Facebook has made the feature opt-in as part
of a drive to become more privacy focused. Facebook provides information on how you can opt-
in or out of face recognition here.

5. Google : Goggle incorporates the technology into Google Photos and uses it to sort pictures and
automatically tag them based on the people recognized.

6. Snapchat : Snapchat is one of the pioneers of facial recognition software: it allows brands and
organizations to create filters which mold to the user’s face hence the ubiquitous puppy dog faces
and flower crown filters seen on social media.

5.0 Actual Procedure Followed


1. The first step was that we finalized our topic with our respective members.
2. We divided the project work equally between all the members of our group.
3. Then we researched on our topic via google as well as in E-books.
4. Then we collected information related to topic.
5. We edited all the information with given respected format.
6. And finally, we made our Report & PowerPoint presentation.

6.0 Actual Resources Used

S. No. Name of Specifications Qty Remarks


Resource/material

1 Smartphone iPhone X and above 1 ✓

2 Operating system iOS 10 and above 1 ✓

3 Software MS PowerPoint 1 ✓

7
7.0 Implementation of Result

8
References:
● https://geeksmodo.com/touch-id-vs-face-id-differences-similarities-pros-cons-iphone-ipad/
● https://en.wikipedia.org/wiki/Face_ID
● https://justaskthales.com/en/how-does-face-id-work/
● https://www.computerhope.com/jargon/f/face-id.htm
● https://techbusinessguide.com/disadvantages-facial-recognition
● https://techbusinessguide.com/benefits-facial-recognition-everyone-should-know/

9
8.0 Skill Developed / learning out of this Micro-Project
The following skills were developed while performing and developing this micro-project-
• Teamwork: Learned to work in a team and boost individual confidence.
• Good research skills: Because of this micro project we are able to search in a good way.
• Time Management: Timely completion of micro project as scheduled.
• Problem-solving: Develop good problem-solving habits.
• Technical writing: Preparing a report of the proposed plan and final report.

9.0 Application of this Micro-Project

• Problem Solving

The right skill set empowers managers to identify, face, and overcome various problems that
might arise in the workplace. This first requires outstanding attention to detail. Top managers can
spot emerging problems before they're apparent to everyone in the company and identify the root
of the trouble.
• Analytical skills
Important in management. You should know what data is most relevant to your industry, how to
gather it, and what the resulting numbers mean.
• Communication

One of the most important responsibilities that managers have is communicating effectively,
both with the employees who work under them and with other managers throughout the company.
They're part of an intricate web and must act as a strong connection point that bridges the gaps
between lower-level employees and top brass or between sales, marketing, and production
departments.

• Technical Skills

Technical skills are more important for low-level managers than for those at the top of the
chain. If you're angling for your first managerial spot, it's crucial that you demonstrate a keen
understanding of the business as a whole. Many companies promote their managers from within
for this very purpose.

• Innovation

Innovation is a keyword for nearly every company. Your competitors are always striving to
develop the best new products and services ahead of you. Businesses that innovate well stay at the
top of the pack, netting new customers with their fresh offerings and keeping existing clients happy
with a continuous selection of upgrades. Hiring managers have a keen eye for new hires who will
bring different perspectives and new ideas to the company.
10
Annexure – III

Suggested Rubric for Assessment of Micro-Project

S. Characteristic to Poor Average Good Excellent


No. be assessed ( Marks 1 - 3 ) ( Marks 4 - 5 ) ( Marks 6 - 8 ) ( Marks 9- 10 )
Relevance to the Relate to very Related to Take care of at-least Take care of more
1
course few LOs some LOs one CO than one CO
Not more than At-least 5
Literature review About 10 relevant
2 two sources relevant sources, At –least 7 relevant
/information sources, most latest
very old at least sources, most latest
collection reference 2 latest

Completion of the
Completed Completed 50 Completed 60 to Completed more
3 Target as per
less than to 60% 80% than 80 %
project proposal
50%
Sufficient and
Data neither appropriate Sufficient and Enough data
Analysis of Data organized nor enough data appropriate enough collected and
4 and representation presented well generated but not data generated sufficient and
organized which is organized presenting data.
and not presented and but not used.
well.
Well assembled
Just assembled Well assembled and
Quality of Incomplete with proper
and some code is functioning parts.
5 Prototype/Model Programming functioning parts.
not functioning But no creativity in
code Creativity in
well. design and use of
graphics function design and use of
graphics function
Nearly sufficient
Very short,
and correct details Detailed, correct and Very detailed,
Details about
about methods, clear description of correct, clear
Report methods, and
6 and conclusion. but methods and description of
Preparation conclusions
clarity is Conclusions. methods, and
omitted, some
not there in Sufficient Graphic conclusions.
details are
presentation. Description.
wrong
Major Includes major
information is information but not Includes major Well organized,
7 Presentation of the not included, well organized and information and includes major
micro project information is not presented well well organized but information, well
not well not presented well presented
organized
Replied to
Could not
considerable Replied properly to Replied most of the
reply to
8 Viva number of considerable questions properly
considerable
questions but number of
number of
not very properly question.
question.

11
Annexure – IV

Micro Project Evaluation Sheet

Name of Students: Sanjay Vaidya, Prachi Shinde, Sirisree Achanta, Alden Farias
Enrollment No: 1800040277-1800040280
Name of Program: Computer Engineering Semester: Sixth
Course Title: Emerging Trends in Computer and Information Technology
Course Code: 22618

Title of the Micro-Project: Unlock Phone Using Face ID.

Cos addressed by Micro Project:

1. Describe Artificial Intelligence, Machine learning and deep learning [ ]

2. Describe Evidence Handling procedures [ ]

3. Detect Network, Operating System and applications vulnerabilities [ ]

Sr. Characteristic to be Poor


( Marks1-3 Average Good Excellent
No. assessed Sub Total
) (Marks 4-5 ) (Marks 6-8) ( Marks9-10)

(A) Process and Product Assessment (Convert Above Total marks out of 6 Marks)
1 Relevance to the course

2 Information Collection

Completion of the Target as


3
per project proposal

Analysis of Data and


4
representation

5 Quality of Prototype/Model

6 Report Preparation

(B) Individual Presentation / Viva (Convert above total marks out of 4 marks)

7 Presentation

8 Defense

12
Total
Roll Process and Product Assessment (6 Individual Presentation / Viva (4
Marks
No. Marks) Marks)
10

37

38

39

40

Comments/Suggestions about team work/leadership/inter-personal communication (if any)


……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………
……………………………………………………………………………………………

Name and designation of the Teacher: Mrs. Sangita Bhoyar (Lecturer)

Dated Signature:

13

You might also like