Professional Documents
Culture Documents
Unlock Phone Using Face ID: Micro Project Academic Year 2020-21
Unlock Phone Using Face ID: Micro Project Academic Year 2020-21
Unlock Phone Using Face ID: Micro Project Academic Year 2020-21
Academic year
2020-21
Certificate
This is to certify that Mr./Ms. Sanjay Vaidya, Prachi Shinde, Sirisree Achanta, Alden Farias. Roll No.
37, 38, 39, 40 of Sixth Semester of Diploma in Computer Engineering of Institute, VES
POLYTECHNIC (Code: 0004) has completed the Micro Project satisfactorily in Emerging Trends
in Computer and Information Technology (22618) for the academic year 2020- 2021 as prescribed in
the curriculum.
Course & course code: Emerging Trends in Computer and Information Technology (22618)
Name of the candidates: Sanjay Vaidya, Prachi Shinde, Sirisree Achanta, Alden Farias
1 Brief Introduction 1
2 Aim of Microproject 1
4 Brief Description 4
5 Implementation of Result 8
Micro-Project Proposal
2. More convenient and quicker than Touch ID. Face ID uses machine learning so that it can
learn from changes to your face over time.
3. The hard-to-break layer of security keeps your Phone safe and, like Touch ID, you can bypass
Face ID by using a passcode.
4. Face ID it can provide better security compared to using passwords and passcodes in some
situations.
2. Now, search information and related media for the topic selected.
3. Make a PPT Presentation on the topic selected using Microsoft PowerPoint 2007 or above.
4. Make a report on the topic selected using Microsoft Word 2007 or above.
1
4.0 Action Plan:
Planned
Planned Name of Responsible
Sr. No. Details of activity Finish
Start date Team Members
date
2
5.0 Resources Required
3 Software MS PowerPoint 1 ✓
3
Annexure – II
Micro-Project Report
1.0 Rationale
Face ID is a facial recognition and authentication technology developed by Apple. It was announced
on September 12, 2017 in conjunction with iPhone X, which will be the first device equipped with
the technology.
Face ID is based on a facial recognition sensor that consists of two parts: a dot projector module
that projects more than 30,000 infrared dots onto the user's face, and an infrared camera module
that reads the pattern. The pattern is encrypted and sent to a local "Secure Enclave" in the
device's CPU to confirm a match with the registered face. The stored facial data is a mathematical
representation of key details of the face, and it is inaccessible to Apple or other parties. To avoid
involuntary authentication, the system requires the user to open their eyes and look at the device to
attempt a match, although this can be disabled through an accessibility setting. Face ID is
temporarily disabled and the user's passcode is required after 5 unsuccessful scans, 48 hours of
inactivity, restarting the device, or if two of the device's both side buttons are held briefly.
2. More convenient and quicker than Touch ID, Face ID uses machine learning, so that it can
learn from changes to your face over time.
3. The hard-to-break layer of security keeps your Phone safe and, like Touch ID, you can
bypass Face ID by using a passcode.
4. Face ID it can provide better security compared to using passwords and passcodes in some
situations.
4
4.0 Literature Review
We, humans, recognize others by looking at their faces, not by fingerprint or iris scan. As a result,
facial recognition technology is less invasive and more natural to integrate into our daily lives and
processes.
Recent advances in Artificial Intelligence have allowed tech companies to begin offering new face
recognition online services. Companies such as Microsoft, Amazon, and new players like Kairos, Beta
face and Bio-ID are leading the effort. As a result, many new startups can now bring to market
applications with face recognition.
5
What is True Depth camera system:
Each time you glance at your phone, the True Depth camera system will detect your face with flood
illuminator, even in the dark.
An infrared camera will then take an image, and a dot projector will project out over 30,000
invisible infrared dots. This system uses the infrared image and the infrared dots, and pushes them
through neural network to create mathematical model of your face.
Advantages:
1. Improved Public Security.
2. Fast and Non-Invasive identity verification.
3. Benefits of Facial Recognition in banking.
4. Benefits of Facial Recognition in Retail.
5. Better worker attendance system.
6. Face Recognition furthers enables computer vision.
Disadvantages:
1. Individual privacy concerns (In case of twins).
2. Data privacy concern with facial recognition.
6
Examples of facial recognition technology :
1. Apple : Apple facial recognition to help users quick unlock their phones, log in to apps, and make
purchases.
2. Coca-Cola : Coca-Cola has used facial recognition in several ways across the world. Example
include rewarding customers for recycling at some of its vending machines in China, delivering
personalized ads on its vending machines in Australia, and for event marketing in Israel.
3. British Airways : British Airways enables facial recognition for passengers boarding flights
from the US. Travelers faces can be scanned by a camera to have their identity verified to board
their plane without showing their passport or boarding pass. The airline has been using the
technology on UK domestic flights from Heathrow and is working towards biometric boarding
on international flights from the airport.
4. Facebook : Facebook began using facial recognition in the US in 2010 when it automatically
tagged people in photos using its tag suggestions tool. The tool scans a user's face and offers
suggestions about who that person is. Since 2019, Facebook has made the feature opt-in as part
of a drive to become more privacy focused. Facebook provides information on how you can opt-
in or out of face recognition here.
5. Google : Goggle incorporates the technology into Google Photos and uses it to sort pictures and
automatically tag them based on the people recognized.
6. Snapchat : Snapchat is one of the pioneers of facial recognition software: it allows brands and
organizations to create filters which mold to the user’s face hence the ubiquitous puppy dog faces
and flower crown filters seen on social media.
3 Software MS PowerPoint 1 ✓
7
7.0 Implementation of Result
8
References:
● https://geeksmodo.com/touch-id-vs-face-id-differences-similarities-pros-cons-iphone-ipad/
● https://en.wikipedia.org/wiki/Face_ID
● https://justaskthales.com/en/how-does-face-id-work/
● https://www.computerhope.com/jargon/f/face-id.htm
● https://techbusinessguide.com/disadvantages-facial-recognition
● https://techbusinessguide.com/benefits-facial-recognition-everyone-should-know/
9
8.0 Skill Developed / learning out of this Micro-Project
The following skills were developed while performing and developing this micro-project-
• Teamwork: Learned to work in a team and boost individual confidence.
• Good research skills: Because of this micro project we are able to search in a good way.
• Time Management: Timely completion of micro project as scheduled.
• Problem-solving: Develop good problem-solving habits.
• Technical writing: Preparing a report of the proposed plan and final report.
• Problem Solving
The right skill set empowers managers to identify, face, and overcome various problems that
might arise in the workplace. This first requires outstanding attention to detail. Top managers can
spot emerging problems before they're apparent to everyone in the company and identify the root
of the trouble.
• Analytical skills
Important in management. You should know what data is most relevant to your industry, how to
gather it, and what the resulting numbers mean.
• Communication
One of the most important responsibilities that managers have is communicating effectively,
both with the employees who work under them and with other managers throughout the company.
They're part of an intricate web and must act as a strong connection point that bridges the gaps
between lower-level employees and top brass or between sales, marketing, and production
departments.
• Technical Skills
Technical skills are more important for low-level managers than for those at the top of the
chain. If you're angling for your first managerial spot, it's crucial that you demonstrate a keen
understanding of the business as a whole. Many companies promote their managers from within
for this very purpose.
• Innovation
Innovation is a keyword for nearly every company. Your competitors are always striving to
develop the best new products and services ahead of you. Businesses that innovate well stay at the
top of the pack, netting new customers with their fresh offerings and keeping existing clients happy
with a continuous selection of upgrades. Hiring managers have a keen eye for new hires who will
bring different perspectives and new ideas to the company.
10
Annexure – III
Completion of the
Completed Completed 50 Completed 60 to Completed more
3 Target as per
less than to 60% 80% than 80 %
project proposal
50%
Sufficient and
Data neither appropriate Sufficient and Enough data
Analysis of Data organized nor enough data appropriate enough collected and
4 and representation presented well generated but not data generated sufficient and
organized which is organized presenting data.
and not presented and but not used.
well.
Well assembled
Just assembled Well assembled and
Quality of Incomplete with proper
and some code is functioning parts.
5 Prototype/Model Programming functioning parts.
not functioning But no creativity in
code Creativity in
well. design and use of
graphics function design and use of
graphics function
Nearly sufficient
Very short,
and correct details Detailed, correct and Very detailed,
Details about
about methods, clear description of correct, clear
Report methods, and
6 and conclusion. but methods and description of
Preparation conclusions
clarity is Conclusions. methods, and
omitted, some
not there in Sufficient Graphic conclusions.
details are
presentation. Description.
wrong
Major Includes major
information is information but not Includes major Well organized,
7 Presentation of the not included, well organized and information and includes major
micro project information is not presented well well organized but information, well
not well not presented well presented
organized
Replied to
Could not
considerable Replied properly to Replied most of the
reply to
8 Viva number of considerable questions properly
considerable
questions but number of
number of
not very properly question.
question.
11
Annexure – IV
Name of Students: Sanjay Vaidya, Prachi Shinde, Sirisree Achanta, Alden Farias
Enrollment No: 1800040277-1800040280
Name of Program: Computer Engineering Semester: Sixth
Course Title: Emerging Trends in Computer and Information Technology
Course Code: 22618
(A) Process and Product Assessment (Convert Above Total marks out of 6 Marks)
1 Relevance to the course
2 Information Collection
5 Quality of Prototype/Model
6 Report Preparation
(B) Individual Presentation / Viva (Convert above total marks out of 4 marks)
7 Presentation
8 Defense
12
Total
Roll Process and Product Assessment (6 Individual Presentation / Viva (4
Marks
No. Marks) Marks)
10
37
38
39
40
Dated Signature:
13