FACE RECOGNITION FOR SECURE LIFE INTRODUCTION From the very beginning of human life

FACE RECOGNITION FOR SECURE LIFE

INTRODUCTION
From the very beginning of human life, people are continuously looking for private care and security. Right through history, many technologies are used for accessing systems. From the long-established methods for instance security guards checking personal IDs to the very recent way for identification such as entering the pin, the password is becoming a trend every day. The problem related to conventional technique that the belongings can be lost or stolen or misguided. Moreover, if any unauthorized person or group get the pin, password or id, it can be a great problem for the owner as they might rob the valuable pieces of stuff and information. Hence, it is essential to distinguish the exact user from unapproved group or person with an appropriate identification and authentication procedure to gain access to the system. Face recognition technology can solve these sort of privacy issues as since the dawn of man, human beings are being identified mostly by recognizing face and it detects a geometrical measurement of our faces which are totally unique.
Facial Biometric
Face recognition or facial recognition has some supremacy to nominate it instead of other biometrics. It extracts more than a few benefits as it is one of the earliest techniques that human race is using to identify each other. Moreover, it is well-welcomed and perceived effortlessly by people. Indeed, pictures of the face are regularly utilized as a human-friendly reinforcement to computerized ?ngerprint verification procedures. As a result of its commonness as an organized and acknowledged sponsor of identity since photography emerged, a massive figure in enact is based on the portrait, for instance police records, driver’s license etc are done by using the computer. It cannot be ignored that since the dawn of civilization when people want to recognize someone, they give priority to face. In contrast, verify someone instantly by fingerprint can be hard and time-consuming as well as there are billions of people living around the world. It is not easy to scan fingerprints with good quality for authentication, though it extracts the features which can be isolated without any hesitation (Senior,1999)
Application areas of Face recognition.
There are various fields where this technology is being applied, from multimedia related databases, modern libraries to establish legislation, inspecting certain areas such as bank/ATM card, houses etc. General options to approach towards facial recognition seem to make the most of its advantages. For instance, this technology basically uses a photographic sample to recognize someone. Besides, it is also used for monitoring any person stealthily for investigation intentions. In addition to this, it detects physiological or behavioural sample and renders the expressions and geometrical measurement. Other areas where this technology is used:
• Mug Shot matching: It is used to investigate massive databases. It works with photographs in a controlled environment. However, it has lacking with regard to get entry in database.
• ID Validation: Generally, it dismisses fake IDs and quite easy to match, it demands the administration of faces.
• Computerized supervision: Detection of violator and inspect activities of suspect or criminal such as monitoring by CC TV. But, the quality of photo is¬ not good enough.
• Translation of facial appearances: The main challenge is to scan motion with computer, However, it requires towering computational attempt (Stork,1994)
Additionally, facial recognition technology can be used for verification and identification in fields such as military barracks, border intersection. Also, it may be used in personal devices for instance, mobile phones, Laptops, Computers, networks, bank, ATM etc (Lades,1999)
Reasons of choosing face
As mentioned earlier, other techniques of verification such as Pin, password, smart cards, tokens, keys and so on, these have some serious privacy issues. Moreover, PINs and password can be forgotten, and they are quite hard to recall sometime. Furthermore, as they are numbers, they can be assumed. Notwithstanding, biological features cannot be guessed, forgotten and misused.
There are several biometric methods for example fingerprint scan, iris scan, retina scan, surveying face, hand scan etc and behavioural characteristic such as manner of walking, signature scan, voice scan etc. Among these techniques, facial recognition technology has more benefits instead of other. Most of the mechanisms requires the involvement of the user or owner whereas face scan is free from this sort of things. For instance, to gain access into a system by scanning fingerprints the user needs to tap the fingers which eats time. Likewise, to get entry into a safe with the help of iris scan one need to stance in a set spot. Nevertheless, facial scan does not need such engagement and motion as pictures are taken from a certain gap. Moreover, if the hand tissue is damaged then hand scan as well as fingerprint verification then it will not suitable for use. Not only this but also, getting access through retina scan and iris scan requires instruments which are costly. In terms of voice, the system can be confused because of the background noises which can be disappointed as the sound waves shows fickleness in such situations. Signature scanning has privacy issues as it can be copied or changed. However, images of faces can be captured without such challenges with low-priced gears (Rabia and Hamid,2009).
The process
Before acquiring access, following four stages take place:
1. Capture: A physical or behavioural sample is captured by the system while enrolling images.,
2. Extraction: There are many facial features in our face such as landmarks, moles etc. which are unique. These exceptional particulars are pulled out from the sample and a diagram is introduced.
3. Comparison: The diagram which is produced at the second stage is contrasted with a fresh specimen.
4. Match or Not Match: The system takes the decision if the properties which are unglued from the sample has matched or not matched. If it is a match the system opens the gate to get access (Jain, Ross and Prabhakar,2004).
Future of facial recognition Technology

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now
x

Hi!
I'm Sarah!

Would you like to get a custom essay? How about receiving a customized one?

Check it out