Saturday, March 30, 2019

Facial Recognition Technology for Identification

Facial Recognition Technology for Identification plagiarizeFacial apprehension is a crucial factor of e genuinelyday designation processes man beings recognize and evaluate each embodimenter(a) by kernel of the formulation. Whenever driving licences, indistinguishability and membership bank notes ar checked or wherever entrance fee is arrestled by bail staff, the several(prenominal)ity is verified by looking into more or lessbodys pillow outcome. Thus, un want early(a) biometric features, e.g. the digitprint or gladiola fruition, s way outh cranial nerve realisation is a transp bent procedure well- cognize to human beings. However, especi eithery in the context of the international fight against t actus reusism it has become self-evident that the traditional course of locateing individuals is insufficient. There be certain limits to the natural experience process carried out by human beings The acknowledgement performance is non only impaired by difficul ties with the credit of people from other cultural origin or deceptions due(p) to a different hair-do or beards, further besides by subjective impression establishd on a someones outward.The gestatement of successful in the flesh(predicate) ap focalisement in access control and in other cases leads to utilize the results of biostatistics. biometry Face recognition is a passive, non-invasive administration for verifying the identicalness of a person, Offers the benefits of its singular facial engineering science in the form of customized over both(prenominal) solutions for the argonas of access control, border control, ID-Man suppuratement, search for criminals and television dodging surveillanceFace recognition has come to be an active explore area with numerous applications programmes in new-fangled days. In this thesis, a innovation of approaches for smell recognition are reviewed frontmost. These approaches are classified according to raw material t asks i-e Face Detect, seem Normalization, and Face recognition. Then, an implementation of the take care recognition method, the Eigen flavor recognition approach is benefactioned in detail as well as other face recognitions methods i-e Local Feature Analysis, Neural Net plant life and Automatic face bear on are discussed in general.IntroductionEver since the birth of first mankind, human beings befool continu in ally been desire for personal possessions. From the very basics of food for thought and clothes, to cars, ho practises, and the more(prenominal) recent substantial property of data and randomness, it is becoming more and more all master(prenominal)(predicate) that such valuable as desexualises be sheltered by mover of trade protection control.Throughout history, the cases of technologies apply on the access control organizations are countless(prenominal). From the traditional constitutions such as security guards checking personal IDs to the very fundament als of keypads and locks and password or entry code, the focus now has moved to the more advance technologies, particularly in expert aways multifaceted society. Organisations are continuously quest for a more secure, suitable and economical way of property protection.The chore associated with traditional mechanisms is that the possessions could be lost, stolen, forgotten, or misplaced. Furthermore, once in control of the identifying possession, each other unauthorised person could abuse the privileges of the authorised substance ab drug user. so in that respect is a need of a nonher approach to properly differentiate the a absorb (right) person from an impostor by positive naming of the person seeking access. Biometrics is one rising development in the field of access control organisation that provides true designation. Although the word biostatistics sound very unfermented and high tech, it is in fact the oldest form of naming cognize to man. Since the dawn of man, a persons face and vocalization was used to identify him/her. in the lead the digital age, a hand written signature was the only method used by a person to assert a droll form of realisation that was difficult to copy. Popular biometric ashess in use today include fingermark recognition, signal flag recognition, voice recognition, and facial recognition arrangings. These outlines are in practice in different organizations like banks, airports, social operate offices, blood banks and other highly sensitive organizations. Biometric system offers the most sinless au and sotication solution and convenience. Biometrics systems pl chthonian be integrated into whatever application that requires security, access control, and identification or stoppage of people. With biometric security, we discharge serve up with the key, the password, the block code the access-enabler is human beings not something he/she know, or something in his/her possession.Chapter 02This part of the dissertation provides the general overview of biometry. Definitions such as Automatic, Physiological and behavioral characteristics are withal discussed as well as different pillowcases of biometric systems i.e. look intoed and one-to- some. General Biometrics Base systems sense modalityl, how it works and Multimodal Biometrics systems are overly discussed in detail.In the last section of this chapter, a comprehensive overview of the right approach in selection of different technologies for an origination in terms of business objective, user acceptance, FFR, FAR, organisational environments, cost and a comparison of all biometry are also presented.Chapter 03 polar types of biometric technologies are described in this chapter i.e. finger prints, iris and retina, voice, biometric signature and how these technologies work and the main features of these technologies with the help of diagrams.Chapter 04This chapter is one of the most important chapters which explain the general b ack ground of face recognition technology and how face recognition works. It gives a brief discussion of how confirmation and identification is achieved with the help of face recognition system.Actual techniques involved during face halt and identification i.e. faces detection, face normalisation and face recognition are also discussed in detail. Steps involved during the face detection i.e. unwashed detection phase and refined search phase are discussed as well as how Normalisation is achieved through different steps i.e. ignitor normalisation, scaling normalisation, rotation normalisation and background subtraction.Face recognition and methods of face recognition i.e. Eigenfaces, feature analysis, neural network and automatic face process are discussed in this presentation.Chapter 05In this chapter of my dissertation, a proposed systeml of face recognition system for attendance of university students is discussed. The specification of the system is also compiled after the ca pacious study of face recognition products of different Vendors.Chapter 06This last chapter of my dissertation contains the conclusion, approaching work and issues involved with face recognition system.A review of the biostatistics technologyBiometrics An overviewIn todays networked and digital world the role of system security has a vital importance. In originations a large flesh of professional people are involved in one form of electronic transaction or other(prenominal). Securing a companys digital assets and identities is a indispensableness for financial success. Ignoring IT security increases the risk of losses for any company pitiful through this electronic world.Logging on to a system by entering user ID and password is very simple but its simmpleness makes serious security problems. There are, however, people who use easy snapshot passwords or leave written passwords near to their computer. In this situation at that place is no way to confirm that the person is lo gged on the system using his/her ID and password or some one else, nothing can buoy nix someone else from accessing sensitive material. Its like a passport system that doesnt require a photograph. In assenting, time consuming tasks behind the management of user ID and passwords divert already insufficient resources from other important responsibilities.Establishing an accurate indistinguishability is the main focus of the learning systems security in recent years and great cases are make in this field. Two types of identification systems are in use now today.In one type identification system flawed identity checking results in un infallible duplication, fraud and guest disruption, resulting costs and risks.While in other type of identification system an accurate identification procedure and effectiveness may be undermined by unpopularity resulting falsification and evasion.Chapter2Three conventional forms of identification are in use. extraction ID or smart cards.The use of pas swords or Personal Identification Numbers, induce name, place of birth, home address and so forthThe third form of identification is to identify something strange about a person, such as reproduces, voice recognition, hand geometry, face structure, iris and retina. This third form of identification is known as Biometrics.Biometrics is a branch of science in which we study, what makes us biologicly crotchety. It is also referred to the science and application of statistical analysis of biological characteristics (Physiological/ Behavioural). In security terms, Biometrics refers to technologies that analyse human characteristics for security social functions. Therefore Biometrics technologies are concerned with the physical parts of the human or personal trait of human being.There are different definitions of security install biostatistics that consume been circulating for a numbers of years. gibe to Ashbourn, an expert in Biometrics, Biometrics is a measurable physiologic an d / or behavioral trait that can be captured and subsequently contrastd with another warrant at the time of stoppage). 1The Biometrics Consortium states Biometrics is automated methods of recognizing a person infrastructured on a physiological or behavioural characteristic. 2The international Biometrics Group defines biometrics as the automated use of physiological or behavioural characteristics to determine or verify identity 3Physiological characteristics are fingerprint, Hand geometry, iris pattern ,retinal, ear govern and facial scans etcBehavioural characteristics are voice pattern, key strokes, signature etc.As mentioned, biometric technologies are anxious with the physical parts of the human or personal mannerism of human beings. The word automatics basically path that biometrics technology must(prenominal) recognise to identify /verify human characteristics promptly and automatically, in real time.Unique physiological characteristics or behavioural mannerisms are ex amined in biometrics verification for an individuals identity. Physiological characteristics are essentially immutable such as hand geometry, iris pattern , palm prints, face structure and vane shape etc .while behavioural characteristic such as ones signature, voice or keystroke dynamics are changeable and these behavioural characteristics can change over time. They are both controllable and less controllable actions.The initial sample of the biometrics guidebook, which is stored in the data base during the adjustment, must be updated each time it is used. Although behaviour characteristics based biometrics is less costly and less intimidating to users, physiological characteristics submit a dip to offer greater accuracy and security. In any case, both techniques give up an extensively higher take aim of identification and verification as compare to smart cards or passwords technologies.A password or personal identification number (PIN) is not unique for an individual ,it c an be stolen ,forgotten or lost, while a biometric characteristic is unique to each individual it can be used to prevent fraud or theft. It cannot be lost, stolen or forgotten.There already legion(predicate) places such as research laboratories, defence (military) installations, VIP offices, day care centres and cash points where access is watch over by biometrics base credential system.The following biometric identifiers currently available or under development are fingerprints, body aroma, ear shape, face recognition, keystroke dynamics, palm print, retinal scan, iris pattern, signature, DNA, vein check and voice pattern.Biometrics-based SystemsA biometric based system is a system that in some way uses physical characteristics or personal traits of a human being. These systems are not only, mainly used for security, but also use for encryption.EncryptionThe processes of translating a message (plaintext), with the help of software, into a programmed message/encoded text (Cipher text), called Encryption. This is usually pure(a) using a secret key and a cryptographic code. 4 typecast of Biometrics-based SystemsThere are two types of Biometrics-based systems.One-to-one systems (Verification system)One-to-many systems (Identification System)One-to-one system (verification)This type of biometric system works on the base of one to one checkering and earmark principles where the system asks and attempts to answer the question Am I who I claim to be? At first a biometric sample of a person is provided to the system and then the system matches this sample to the previously stored usher during the enrolment mode for that person. The system then decides whether that is the person who claims the identity. After a successful matching of the fresh sample with the stored template, the system authenticates the person. These types of systems are also referred to as verification systems. The verification system is a fast chemical reaction system because it minimises the use of resources and time by providing biometrics sample/ information to the system which specifies the stored template in the data base for that person. 5One-to-many system (identification)This type of biometrics system works on the base of one to many recognition principles. The system attempts to answer the question, Who am I? The basic purpose of this system to identify a persons identity by performing matches against all biometrics templates stored in a data base or a data library. A person does not claim his/her identity to the system instead the person just gives the system some biometric data. The system then performs to match this data to all templates previously stored in the database and decides whether a match can be made. It is not inevitable that the system responds with the persons name, it could be the persons ID or other unique identity. These types of systems are referred to as identification systems 6. Identification systems have a slow response as compared t o verification systems. This is because they require a lot more powerful resources due to the fact that more comparisons are unavoidable by identification systems.The biometrics identification system also prevents a person from registering twice on the system and ensures that a person is not already present in a data base. This type of system can be used in a large racing shell public benefits organisation, such as being used at banks where a person would try opening a second account on another name. This system can also be used with in-migration where a person could try to enter the country on fabricated documents.General Biometrics Base Authentication System ModelA general biometrics base credentials system model consists of terzetto major components, hardware, software and interface. Hardware is used to capture the biometrics information and software is used to maintain and manage it while an interface with application system that impart use the result to confirm an indivi duals identity. The system operates in two different modesEnrolment modeAuthentication modeEnrolment modeIn this mode a users biometrics data is provided to a system, which stores this users biometric sample in a database or data library as a template. Hardware such as a biometrics reviewers/ scanners, cameras are used to capture biometrics sample. This stored template is then labelled with a user identity e.g. name, identification number etc.The way biometrics operateSome biometric base authentication systems may need a number of biometrics samples in order to build a visibleness of the biometric characteristics. These exclusive characteristics are then extracted and changed in to mathematical code by the system. Which is then stored in to the biometric system as a biometric template for the person who enrolled? The template is store in the memory storage of the system, or in computer database, smart card or barcode. A sceptre is set in to the biometrics base authentication syst em according to the level of security 7, (a high doorsill is set for high level of security)To secure the template to the person, a trigger or other mean of securing such as personal identification number, or a smart card that store the template which read by a card reader during the authentication mode, are use in biometrics. In some biometrics system when ever a person interacts with the system a new biometrics sample is provide to the system which is compared to the template. If this new sample and stored template is match (the add of new match if exceed from the set threshold then access is tending(p) to that person).As both physical and behavioural characteristics are inconsistent with time, this change may be due to the age of the person, general health condition, working and environmental conditions and time pressures etc. the biometric base authentication system must allow for these delicate changes, in this case before a match is recorded a threshold *1 is set. This can take the form of an accuracy score *2. The comparison amidst the template and new sample must exceed this set threshold. If it not exceeds the system will not record the match and will not identify the person.This use of a threshold gives biometric technologies a signifi hawk returns over passwords, PINs and ID badges. The use of a threshold affords a tremendous compass point of flexibility and if the comparison between the new biometric sample and the template exceeds the tell threshold, identity will be confirmed.Threshold-a predefine number, much controlled by system administer, which establish the degree of correlation necessary for a comparison to be deemed a match.Score A number indicating the degree of similarity or correlation of a biometrics match sire, extraction, comparison and match/non match are the four stagecoachs use by all biometric authentication systems.Capture A physical or behavioural sample is captured by the system during enrolment.Extraction unique d ata is extracted from the sample and a template is created. compare the template is then compared with a new sample.Multimodal Biometric SystemIn some environments a signal biometrics identifier base system such as finger scan, face scan or iris scan etc much not able to chance the desired performance requirement of the organization. Different biometrics base identification system such as face recognition, finger print verification and vice verification, is integrated and worked as a single biometrics base identification system. Multimodal biometrics base identification system is use to over come the limitation of the single identifier biometrics base identification system.Initial experimental results reveal that the identity constituted by such an integrated system is more reliable than the identity established by a signal biometrics identifier base system. 8Selecting the make up ApproachIn Different Environment Different biometrics base authentication systems are used. To ch oose the right approach to biometrics authentication it is necessary to understand the requirement of the organisation, the application of the biometrics system, and characteristics of the biometrics devices itself. sideline factors are also important to choose a biometrics base authentication system, which most devices cant store raw fingerprints and that fingerprints cant be reconstructed based on the data stored within these systems. Intrusiveness is another factor affecting user acceptance of some devices, particularly iris and retinal scanning systems. 9Business objective of the organisationThe most important aspect to consider when selecting a biometrics base authentication system is the organisation business objectives. The choice biometrics system must meet or exceed organisational business objectives as well as last organisation in the coming years. Business objective is the bottom line where organisation starts and end.User acceptancesSome biometrics, such as fingerprints , may be apparent as an assault of personal privacy. The system must not associate with other govt agencies biometrics (finger print) recognition system that most devices cant store raw fingerprints and that fingerprints cant be reconstructed based on the data stored within these systems. General intrusiveness can be another factor affecting user acceptance of some devices, particularly iris and retinal scanning systems. Following are the errors of biometrics base authentication system.False acceptance rate (FAR)False acceptance rate (FAR) is a system error. It is the rate at which an interloper can be recognise as a valid user. In one -to-one match during user verification, false acceptance is based on fake attempts, not on the total number of attempts by valid users.If FAR is 1%, it means one out of 100 users trying to break into the system will be successful 10. FARs become more critical when you attempt to identify users based on biometrics, instead of simply trying to verify a person with a one-to-one or one-to-few operationFalse bend rate (FRR)False pooh-pooh rate (FRR) is another type of error of biometrics system. It is the rate at which a valid user is jilted from the system. Consider a finger print recognition system unfortunately, the conditions under which the original sample was collected can never be on the button duplicated when the user submits subsequence biometrics information to be compared. False reject rate may occur due to following variations.Rotation and exposition because of different positioning of the finger on the finger print device. down(prenominal) pressure on the surface of the stimulant device which changes the scale of input device.Non-permanent or semi-permanent distortions like skin disease, scars, sweat, etcTo over come FRR it is essential that all biometrics base authentication systems have a threshold observe in order to allow for minor differences.With out threshold treasure FRR occurs and valid users will be b elievably rejected by system. If the threshold value is too high FAR occur 9. It is there for necessary to find a proper threshold value.Organisational environmentsAs stated it is important to consider the organisational environment when selecting biometrics base authentication system. Users with wet, dirty or dry hand have experienced problems with finger and palm recognition system. People using gloves generally cant use these systems. Face recognition system cant be easily be used in medical environments where hood and masks are used by users.CostThe tell cost of the system (hardware and software) is the initial considerations. Due to the improvement of features and functionality the over all cost of biometrics system reduces. It not only reduces fraud and eliminating problems associated with stolen or forgotten passwords but also reduces the help desk role.SummaryThe subject of this chapter is biometrics, which is be as a method of verifying an individuals identity based on me asurement of the individuals physical feature(s) or repeatable action(s) where those features and/or actions are both unique to that individual and measurable.A biometrics system which consists of enrolment mode and authentication mode, unique physiological characteristics or behavioural mannerisms are examined in biometrics verification for an individuals identity. All biometric systems essentially operate in a similar way in a four-stage process that is automated and computerized which are Capture, Extraction, Comparison and Match/non-match.Biometrics system one-to-one is based on one to one matching and authentication principles and is mainly used for verification purposes, while biometrics system one to many works on the principles of one-to-many recognition and is used for identification.Multimodal biometrics base identification system is used to over come the limitation of the signal identifier biometrics base identification system in which different biometrics base identifica tion system such as face recognition, finger print verification and vice verification, is integrated and worked as a single biometrics base identification system.Methodologies of Biometrics AuthenticationAn overviewAs stated, different biometric systems are use in different organisations according to their requirements. The most common biometrics system in use today includes fingerprint recognition, iris recognition, and voice recognition and face recognition systems. There are also other biometric systems available like retina recognition, vein pattern recognition, signature and DNA matching systems. These systems are not as widely used yet for various reasons.These biometrics systems can be integrated into any application that requires security, access control and identification or verification of people. With biometric security we can dispense with the key, the password and the PIN code the access-enabler is a person, not something person know or something in his /her possession. Biometrics systems secured resources are based on who a person is. Biometrics systems also minimise the risk that is associated with less advanced technologies while at the same time offering a higher level of security and convenience. fingerprint Recognition SystemFingerprints are one of the human physiological characteristics that do not change throughout someones life. Even identical fit have different fingerprint patterns. The chance of identical twins to have the same fingerprint is less than one in a billion. Fingerprint recognition is generally considered the most practical system for its reliability, non-intrusive interfaces, and cost-effectiveness. In recent years, fingerprints have rallied significant support as the biometric technology that will probably be most widely used in the future. In addition to general security and access control applications, fingerprint verifiers are installed at different organisations such as, defence/military organisations health care, ban king and finance, application go providers, immigration, law enforcement etc.The fingerprints strength is its acceptance, convenience and reliability. It takes little time and effort for somebody using a fingerprint identification device to have his or her fingerprint scanned. Studies have also found that using fingerprints as an identification source is the least intrusive of all biometric techniques. 15Verification of fingerprints is also fast and reliable. Users experience fewer errors in matching when they use fingerprints versus many other biometric methods. In addition, a fingerprint identification device can require very little space on a background signal or in a machine. Several companies have produced capture units small than a deck of cards.One of the biggest fears of fingerprint technology is the theft of fingerprints. Skeptics point out that latent or residual prints left-hand(a) on the folderol of a fingerprint scanner may be copied. However, a goodly fingerprint identification device only detects live fingers and will not acknowledge fingerprint copies.12Main Feature of Finger print verification systemAnalysis of minutia points i.e. finger image cover (verification) endings, bifurcations or branches made by ridges.One of the most commercially successful biometric technologies.Important for applications where it is necessary to verify the identity of those who gain access.How fingerprint recognition system worksIn biometrics systems fingerprint recognition system is the fas see verification /identification (One-to-One / One-to-Many) system as shown in epitome 3, 4, 5. Like other biometrics recognition systems it performs fingerprint recognition with the help of special(a)ized hardware. This specialised hardware is supported by the conventional computer hardware and special software. All biometrics systems operate in two modes, enrolment mode and authentication mode (as discussed in the previous chapter). A sample of the fingerprint of a live person is provided to the system which is then converted into mathematical code (Template) and stored for the enrolee into the database.In the first step of the authentication process, a fingerprint impression is provided to the system. The system takes a digital image (input image figure 311 below) using different techniques including scanner, optical, and ultrasound or semiconductor chip technologies. The digital image of the fingerprint includes several unique features in terms of ridge bifurcations and ridge endings, collectively referred to as minutiae. 22In the next step the system uses an automatic feature extraction algorithmic program to locate these features in the fingerprint image, as shown in Figure 312.Each of these features is commonly represented by its location (x, y, and z) and the ridge direction at that location however the feature extraction stage may miss some minutiae and may generate spurious minutiae due to sensor noise and other variability in the ima ging process. The cracking of the human skin also affects the feature extraction process. 33In the final stage, a final decision of match and non match is made on the bases of similarity between the two sets of features after compensating for the rotation, conversion and dimension. This similarity is often expressed as a score. A decision threshold is first selected. If the score is below the threshold, the fingerprints are determined not to match if the score is above the threshold, a correct match is declared an authentication is granted to the person. fleur-de-lis and Retina Recognition SystemBiometrics which analyse the intricate and unique characteristics of the eye can be divided into two different fields, gladiolus and Retina. Iris and retinal scans both deal with the human eye. They are make in an extremely different way as compared to other biometrics technology.Iris Recogniton SystemIris recognition biometrics base authentication systems have unique characteristics and features of the human iris used to verify the identity of an individual. The iris is the area of the eye where the pigmented or colour circle, usually chocolate-brown or blue, rings the dark pupil of the eye. It consists of over 400 unique distinguishing characteristics that can be quantified and used for an individual identity. However, only about 260 of those characteristics are captured in a live iris identification process 25. Iris are composed before birth and, except in the event of an injury to the eyeball, remain unchanged throughout an individuals lifetime. Eyeglasses and contact lenses present no problems to the quality of the image and the iris recognition /scan systems test for a live eye by checking for the normal continuous hesitation in the pupil size. As Iris patterns are extremely building complex and unique they carry an astonishing amount of information. The fact that an individuals right and left eye are different and that patterns are easy to capture, it estab lishes iris recognition

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.