Professional Documents
Culture Documents
On Research Paper
On Research Paper
On Research Paper
FACE RECOGNITION
Submitted to : Submitted by :
Prof. Nitin Kumar Hisham K-11716501
Lovely Professional University, Roll No: B67
Punjab
Section : EM010
INTRODUCTION
• Most bank customers tend to use Automated Teller Machines (ATMs) and
Internet portals to conduct their banking transactions.
• Unlike every other device, though, ATMs suffer from multiple user-caused
problems as well.
• Card and/or cash forgetting (CCF) is a common concern between these
problems.
• The key goal of my work is to develop an optimized ATM camera
computer vision system for facial detection and recognition so as to
prevent needless losses incurred by CCF, ATM robberies and fraud
activities by wrong individuals.
ATM SECURITY USING FACE RECOGNITION
• A facial recognition system is a computer application for automatically
identifying or verifying a person from a digital image or a video frame from a
video source.
• For verification in the ATM system, the proposed paper uses facial
recognition techniques.
• The first step is authentication, which is where the machine compares the
actual person to who the person claims they are, and offers a yes or no
answer.
• The next step is defining which is where the program compares the given
person to the other users in the database and provides a ranking list of
matches
• This Biometric Methodology sets out an analysis framework with PCA
algorithms for each type of biometric device.
SHORT TERM FACE RECOGNITION
FOR ATM USERS
• The limited time frame of ATM usage and extreme motion artifacts make this
problem very different from an ordinary face authentication or face
recognition problem.
• Under demanding conditions of real ATM use I test the proposed method.
• The experimental results on multiple databases indicate that our proposed
system is promising to reduce card / cash forgetting problems and enhance
user experience with ATM
FACE DESCRIPTION WITH LOCAL BINARY PATTERNS
• The face image is divided into several regions from which the distributions of
the LBP ( local binary patterns ) feature are extracted and concatenated into
an enhanced vector to be used as a face descriptor.
• Four parameters of LBP are:
1. Radius
2. Neighbors
3. Grid X
4. Grid Y
FACE DESCRIPTION WITH LOCAL BINARY PATTERNS
1. Algorithm training:
• we will use a file containing the facial photographs of the individuals we want
to remember.
• You will need to set an ID for each image, and the algorithm can use this
information to identify an input image and send you an result.
• Pictures of the same person must have the same identification.
2.Applying the LBP operation:
• The LBPH's first analytical step is to construct an intermediate image that
best represents the original one, emphasizing the facial features.
• To do so, the algorithm uses a concept of a sliding window, based on the
parameters radius and neighbors.
FACE DESCRIPTION WITH LOCAL BINARY PATTERNS
• The image below shows this procedure:
• Wrong person wearing a mask and getting some item that wasn't
cashed and blocked.
ARCHITECTURE DIAGRAM
• The architecture of the inputs is the relation
between the consumer and the information system.
• It requires the creation of data preparation
requirements and procedures and those steps are
required to place transaction data in a functional
way for analysis
• The following issues were considered by Input
Design:
• What data should be sent as input?
• How will data be coded or arranged?
• Dialog to direct the feedback of the administrative
staff.
• Methods to prepare validations of inputs and steps
to follow when error occurs.
OUTPUT DESIGN
• Efficient and clever performance architecture strengthens the
interaction with the device and enables consumer decision-
making.
• Its unexpectedly find the incorrect person blocking the card and
raising the alarm.
• Virtual keyboard
• Alarm sensor
VIRTUAL KEYBOARD
• Virtual keyboards can be categorized by the following aspects:
• Physical keyboards with distinct keys that include electronically
changable displays that are integrated into the keypads.
• Digital keyboards with keyboard templates or sensing areas for
touch screen.
• Human hand and finger movements are observed optically.
• Online virtual keyboards for various languages that don't need to
alter OS settings
CONCLUSION
• To avoid atm robberies and provide safety for atm, it
will be even harder than design to secure such a
complex system.