Monday, June 3, 2019

Facial Recognition Technology for Identification

seventh cranial nerve Recognition Technology for IdentificationAbstractFacial actualisation is a crucial situationor of e actu each(prenominal)yday identification processes homosexual beings recognize and evaluate each other by means of the face. Whenever driving licences, item-by-itemity and membership card game argon checked or wherever access is escortled by security staff, the identity is verified by looking into nighbodys face. Thus, unlike other biometric features, e.g. the leafprint or fleur-de-lis science, facial cognition is a transp bent procedure well-known to human beings. However, especi all toldy in the context of the international oppose against terrorism it has be numerate obvious that the traditional modality of identifying individuals is insufficient. in that respect be certain limits to the natural recognition process carried out by human beings The recognition performance is not still impaired by difficulties with the recognition of people from o ther ethnic origin or deceptions due to a distinguishable hair-do or beards, but excessively by subjective impression found on a persons outward.The requirement of successful personal identification in access control and in other cases leads to using the results of biostatistics. Biometrics casing recognition is a passive, non-invasive method for verifying the identity of a person, Offers the benefits of its whimsical(p) facial technology in the form of customized overall solutions for the areas of access control, border control, ID-Man get alongment, search for criminals and video surveillanceFace recognition has come to be an active research area with numerous applications in recent years. In this thesis, a variety of approaches for face recognition are reviewed first-class honours degree. These approaches are classified according to basic tasks i-e Face Detect, face Normalization, and Face recognition. Then, an implementation of the face recognition method, the Eigenfac e recognition approach is presented in detail as well as other face recognitions methods i-e Local Feature Analysis, anxious Netwhole kit and boodle and Automatic face processing are discussed in general.IntroductionEver since the birth of first mankind, human beings have continually been seeking for personal possessions. From the very basics of food and clothes, to cars, ho riding habits, and the more recent substantial property of entropy and information, it is becoming increasingly important that such valu able-bodied as formats be sheltered by means of security control.Throughout history, the pillowcases of technologies utilise on the access control remainss are countless. From the traditional frames such as security guards checking personal IDs to the very rudiments of keypads and locks and pass sound out or entry encrypt, the focus now has moved to the more advance technologies, particularly in todays multifaceted society. Organisations are continuously seeking for a more secure, suitable and economical way of property protection.The problem associated with traditional mechanisms is that the possessions could be lost, stolen, forgotten, or misplaced. Furthermore, once in control of the identifying possession, any other unlicenced person could abuse the privileges of the authorised user. Therefore there is a need of some other approach to properly differentiate the correct (right) person from an impostor by positive identification of the person seeking access. Biometrics is hotshot rising development in the field of access control governing body that provides true identification. Although the word biometrics sound very rising and high tech, it is in fact the oldest form of identification known to man. Since the dawn of man, a persons face and enunciate was employ to identify him/her. Before the digital age, a hand written signature was the only method employ by a person to assert a unique form of identification that was difficult to copy. Popular biometric arrangings in use today include reproduce recognition, iris recognition, voice recognition, and facial recognition strategys. These brasss are in practice in different organizations like banks, airports, social ser immoralitys offices, blood banks and other highly sensitive organizations. Biometric frame tours the near accurate documentation solution and convenience. Biometrics administrations brush aside be integrated into any application that requires security, access control, and identification or check-out procedure of people. With biometric security, we can dispense with the key, the password, the PIN code the access-enabler is human beings not something he/she know, or something in his/her possession.Chapter 02This part of the dissertation provides the general overview of biometrics. Definitions such as Automatic, Physiological and behavioral characteristics are also discussed as well as different types of biometric systems i.e. one-to-one and one-to- numerous another(prenominal). world(a) Biometrics Base systems model, how it works and Multimodal Biometrics systems are also discussed in detail.In the last separate of this chapter, a comprehensive overview of the right approach in selection of different technologies for an origination in call of business objective, user toleration, FFR, FAR, organisational environments, cost and a par of all biometrics are also presented.Chapter 03Different types of biometric technologies are described in this chapter i.e. finger prints, iris and retina, voice, biometric signature and how these technologies work and the main features of these technologies with the serve well of diagrams.Chapter 04This chapter is one of the intimately important chapters which explain the general back ground of face recognition technology and how face recognition works. It gives a brief discussion of how stay and identification is achieved with the help of face recognition system.Actual techniques involved during face verification and identification i.e. faces detection, face normalisation and face recognition are also discussed in detail. Steps involved during the face detection i.e. coarse detection phase and refined search phase are discussed as well as how Normalisation is achieved through different steps i.e. lighting normalisation, scaling normalisation, rotation normalisation and background subtraction.Face recognition and methods of face recognition i.e. Eigenfaces, feature analysis, neuronal network and automatic face processing are discussed in this presentation.Chapter 05In this chapter of my dissertation, a proposed model of face recognition system for attendance of university students is discussed. The specification of the system is also compiled after the extensive study of face recognition products of different Vendors.Chapter 06This final chapter of my dissertation contains the conclusion, future work and issues involved with face recognition system.A review of the biometrics technologyBiometrics An overviewIn todays networked and digital world the role of system security has a vital importance. In originations a pear-shaped number of professional people are involved in one form of electronic transaction or another. Securing a companys digital assets and identities is a emergency for financial success. Ignoring IT security increases the risk of losses for any company moving through this electronic world.Logging on to a system by introduction user ID and password is very simple but its simplicity makes serious security problems. There are, withal, people who use easy guess passwords or commit written passwords near to their computer. In this situation there is no way to confirm that the person is logged on the system using his/her ID and password or some one else, nothing can prevent someone else from accessing sensitive material. Its like a passport system that doesnt require a photograph. In addition, time eat tasks behind the ma nagement of user ID and passwords divert already insufficient resources from other important responsibilities.Establishing an accurate identity is the main focus of the information systems security in recent years and great efforts are make in this field. Two types of identification systems are in use now today.In one type identification system flawed identity checking results in unnecessary duplication, fraud and client disruption, resulting costs and risks.While in other type of identification system an accurate identification procedure and effectiveness may be undermined by unpopularity resulting falsification and evasion.Chapter2Three conventional forms of identification are in use.Origination ID or smart cards.The use of passwords or Personal Identification Numbers, mother name, place of birth, home address etc.The third form of identification is to identify something unique about a person, such as reproduces, voice recognition, hand geometry, face structure, iris and retina. This third form of identification is known as Biometrics.Biometrics is a branch of science in which we study, what makes us biologically unique. It is also referred to the science and application of statistical analysis of biological characteristics (Physiological/ Behavioural). In security terms, Biometrics refers to technologies that discerp human characteristics for security designs. Therefore Biometrics technologies are concerned with the physical parts of the human or personal trait of human being.There are different definitions of security imbruted biometrics that have been circulating for a numbers of years.According to Ashbourn, an expert in Biometrics, Biometrics is a measurable physiologic and / or behavioural trait that can be captured and subsequently compared with another instance at the time of verification). 1The Biometrics Consortium states Biometrics is automated methods of recognizing a person topicd on a physiological or behavioural characteristic. 2The inte rnational Biometrics Group defines biometrics as the automated use of physiological or behavioural characteristics to determine or verify identity 3Physiological characteristics are fingerprint, Hand geometry, iris form , retinene, ear shape and facial scans etcBehavioural characteristics are voice pattern, key strokes, signature etc.As mentioned, biometric technologies are anxious with the physical parts of the human or personal mannerism of human beings. The word automatics basically means that biometrics technology must recognise to identify /verify human characteristics rapidly and automatically, in real time.Unique physiological characteristics or behavioural mannerisms are examined in biometrics verification for an individuals identity. Physiological characteristics are essentially unchangeable such as hand geometry, iris pattern , palm prints, face structure and vane shape etc .while behavioural characteristic such as ones signature, voice or keystroke dynamics are changea ble and these behavioural characteristics can change over time. They are both controllable and less controllable actions.The initial sample of the biometrics guidebook, which is stored in the selective information base during the Enrolment, must be updated each time it is used. Although behaviour characteristics based biometrics is less costly and less intimidating to users, physiological characteristics have a tendency to offer greater accuracy and security. In any case, both techniques grant an extensively higher take aim of identification and verification as compare to smart cards or passwords technologies.A password or personal identification number (PIN) is not unique for an individual ,it can be stolen ,forgotten or lost, while a biometric characteristic is unique to each individual it can be used to prevent fraud or theft. It cannot be lost, stolen or forgotten.There already many places such as research laboratories, refutal (military) installations, VIP offices, day care centres and cash points where access is guarded by biometrics base au and thentication system.The followers biometric identifiers currently obtainable or under development are fingerprints, body aroma, ear shape, face recognition, keystroke dynamics, palm print, retinal scan, iris pattern, signature, DNA, vein check and voice pattern.Biometrics-based SystemsA biometric based system is a system that in some way uses physical characteristics or personal traits of a human being. These systems are not only, mainly used for security, but also use for encryption.EncryptionThe processes of translating a message (plaintext), with the help of bundle, into a programmed message/encoded text (Cipher text), called Encryption. This is usually accomplished using a secret key and a cryptographic code. 4Type of Biometrics-based SystemsThere are two types of Biometrics-based systems.One-to-one systems (Verification system)One-to-many systems (Identification System)One-to-one system (verification)Th is type of biometric system works on the base of one to one catching and authentication principles where the system asks and attempts to answer the question Am I who I claim to be? At first a biometric sample of a person is provided to the system and then the system matches this sample to the previously stored template during the document mode for that person. The system then decides whether that is the person who claims the identity. After a successful matching of the fresh sample with the stored template, the system authenticates the person. These types of systems are also referred to as verification systems. The verification system is a fast response system because it minimises the use of resources and time by providing biometrics sample/ information to the system which specifies the stored template in the data base for that person. 5One-to-many system (identification)This type of biometrics system works on the base of one to many recognition principles. The system attempts to a nswer the question, Who am I? The basic purpose of this system to identify a persons identity by performing matches against all biometrics templates stored in a data base or a data library. A person does not claim his/her identity to the system instead the person just gives the system some biometric data. The system then performs to match this data to all templates previously stored in the database and decides whether a match can be made. It is not necessary that the system responds with the persons name, it could be the persons ID or other unique identity. These types of systems are referred to as identification systems 6. Identification systems have a slow response as compared to verification systems. This is because they require much more powerful resources due to the fact that more comparisons are required by identification systems.The biometrics identification system also prevents a person from registering twice on the system and ensures that a person is not already present in a data base. This type of system can be used in a king-sized scale public benefits organisation, such as being used at banks where a person would try opening a second account on another name. This system can also be used with immigration where a person could try to enter the country on false documents.General Biometrics Base Authentication System ModelA general biometrics base authentication system model consists of three major components, hardware, software and interface. Hardware is used to capture the biometrics information and software is used to maintain and manage it while an interface with application system that will use the result to confirm an individuals identity. The system operates in two different modesEnrolment modeAuthentication modeEnrolment modeIn this mode a users biometrics data is provided to a system, which stores this users biometric sample in a database or data library as a template. Hardware such as a biometrics readers/ scanners, cameras are used to captur e biometrics sample. This stored template is then labelled with a user identity e.g. name, identification number etc.The way biometrics operateSome biometric base authentication systems may need a number of biometrics samples in order to build a profile of the biometric characteristics. These exclusive characteristics are then extracted and changed in to numerical code by the system. Which is then stored in to the biometric system as a biometric template for the person who enrolled? The template is store in the memory storage of the system, or in computer database, smart card or barcode. A verge is set in to the biometrics base authentication system according to the level of security 7, (a high threshold is set for high level of security)To secure the template to the person, a turn on or other mean of securing such as personal identification number, or a smart card that store the template which read by a card reader during the authentication mode, are use in biometrics. In some bi ometrics system when ever a person interacts with the system a impudent biometrics sample is provide to the system which is compared to the template. If this new sample and stored template is match (the score of new match if exceed from the set threshold then access is granted to that person).As both physical and behavioural characteristics are inconsistent with time, this change may be due to the age of the person, general health condition, working and environmental conditions and time pushs etc. the biometric base authentication system must allow for these delicate changes, in this case sooner a match is recorded a threshold *1 is set. This can take the form of an accuracy score *2. The comparison between the template and new sample must exceed this set threshold. If it not exceeds the system will not record the match and will not identify the person.This use of a threshold gives biometric technologies a significant advantage over passwords, PINs and ID badges. The use of a thr eshold affords a tremendous degree of flexibility and if the comparison between the new biometric sample and the template exceeds the stated threshold, identity will be confirmed.Threshold-a predefine number, often controlled by system administer, which establish the degree of correlation necessary for a comparison to be deemed a match.Score A number indicating the degree of similarity or correlation of a biometrics matchCapture, extraction, comparison and match/non match are the four stages use by all biometric authentication systems.Capture A physical or behavioural sample is captured by the system during enrolment.Extraction unique data is extracted from the sample and a template is created.Comparison the template is then compared with a new sample.Multimodal Biometric SystemIn some environments a signal biometrics identifier base system such as finger scan, face scan or iris scan etc often not able to meet the desired performance requirement of the organization. Different bi ometrics base identification system such as face recognition, finger print verification and vice verification, is integrated and worked as a single biometrics base identification system. Multimodal biometrics base identification system is use to over come the limitation of the single identifier biometrics base identification system.Initial experimental results reveal that the identity established by such an integrated system is more reliable than the identity established by a signal biometrics identifier base system. 8Selecting the Right ApproachIn Different Environment Different biometrics base authentication systems are used. To choose the right approach to biometrics authentication it is necessary to understand the requirement of the organisation, the application of the biometrics system, and characteristics of the biometrics crooks itself. followers factors are also important to choose a biometrics base authentication system, which most devices cant store raw fingerprints and t hat fingerprints cant be theorize based on the data stored within these systems. Intrusiveness is another factor affecting user acceptance of some devices, particularly iris and retinal scan systems. 9 billet objective of the organisationThe most important aspect to consider when selecting a biometrics base authentication system is the organisation business objectives. The resource biometrics system must meet or exceed organisational business objectives as well as sustain organisation in the coming years. Business objective is the bottom line where organisation starts and end.User acceptancesSome biometrics, such as fingerprints, may be apparent as an assault of personal privacy. The system must not associate with other govt agencies biometrics (finger print) recognition system that most devices cant store raw fingerprints and that fingerprints cant be reconstructed based on the data stored within these systems. General intrusiveness can be another factor affecting user acceptance of some devices, particularly iris and retinal scanning systems. Following are the errors of biometrics base authentication system.False acceptance rate (FAR)False acceptance rate (FAR) is a system error. It is the rate at which an interloper can be recognized as a valid user. In one -to-one match during user verification, false acceptance is based on fake attempts, not on the total number of attempts by valid users.If FAR is 1%, it means one out of century users trying to break into the system will be successful 10. FARs become more critical when you attempt to identify users based on biometrics, instead of alone trying to verify a person with a one-to-one or one-to-few operationFalse discard rate (FRR)False reject rate (FRR) is another type of error of biometrics system. It is the rate at which a valid user is rejected from the system. Consider a finger print recognition system unfortunately, the conditions under which the original sample was collected can never be exactly dupl icated when the user submits subsequence biometrics information to be compared. False reject rate may occur due to following variations.Rotation and Translation because of different positioning of the finger on the finger print device.Downward pressure on the surface of the input device which changes the scale of input device.Non-permanent or semi-permanent distortions like skin disease, scars, sweat, etcTo over come FRR it is essential that all biometrics base authentication systems have a threshold value in order to allow for minor differences.With out threshold value FRR occurs and valid users will be probably rejected by system. If the threshold value is too high FAR occur 9. It is there for necessary to find a proper threshold value.Organisational environmentsAs stated it is important to consider the organisational environment when selecting biometrics base authentication system. Users with wet, dirty or dry hand have experienced problems with finger and palm recognition system . People using gloves generally cant use these systems. Face recognition system cant be easily be used in medical environments where hood and masks are used by users.CostThe direct cost of the system (hardware and software) is the initial considerations. Due to the improvement of features and functionality the over all cost of biometrics system reduces. It not only reduces fraud and eliminating problems associated with stolen or forgotten passwords but also reduces the help desk role.SummaryThe subject of this chapter is biometrics, which is defined as a method of verifying an individuals identity based on measurement of the individuals physical feature(s) or repeatable action(s) where those features and/or actions are both unique to that individual and measurable.A biometrics system which consists of enrolment mode and authentication mode, unique physiological characteristics or behavioural mannerisms are examined in biometrics verification for an individuals identity. either biom etric systems essentially operate in a similar way in a four-stage process that is automated and computerized which are Capture, Extraction, Comparison and Match/non-match.Biometrics system one-to-one is based on one to one matching and authentication principles and is mainly used for verification purposes, while biometrics system one to many works on the principles of one-to-many recognition and is used for identification.Multimodal biometrics base identification system is used to over come the limitation of the signal identifier biometrics base identification system in which different biometrics base identification system such as face recognition, finger print verification and vice verification, is integrated and worked as a single biometrics base identification system.Methodologies of Biometrics AuthenticationAn overviewAs stated, different biometric systems are use in different organisations according to their requirements. The most common biometrics system in use today includes fingerprint recognition, iris recognition, and voice recognition and face recognition systems. There are also other biometric systems available like retina recognition, vein pattern recognition, signature and DNA matching systems. These systems are not as widely used yet for various reasons.These biometrics systems can be integrated into any application that requires security, access control and identification or verification of people. With biometric security we can dispense with the key, the password and the PIN code the access-enabler is a person, not something person know or something in his /her possession. Biometrics systems secured resources are based on who a person is. Biometrics systems also minimise the risk that is associated with less advanced technologies while at the same time offering a higher level of security and convenience.Fingerprint Recognition SystemFingerprints are one of the human physiological characteristics that do not change throughout someones life. Ev en identical twin have different fingerprint patterns. The chance of identical twins to have the same fingerprint is less than one in a billion. Fingerprint recognition is generally considered the most practical system for its reliability, non-intrusive interfaces, and cost-effectiveness. In recent years, fingerprints have rallied significant support as the biometric technology that will probably be most widely used in the future. In addition to general security and access control applications, fingerprint verifiers are installed at different organisations such as, defence/military organisations health care, banking and finance, application services providers, immigration, law enforcement etc.The fingerprints strength is its acceptance, convenience and reliability. It takes little time and effort for somebody using a fingerprint identification device to have his or her fingerprint scanned. Studies have also found that using fingerprints as an identification source is the least intru sive of all biometric techniques. 15Verification of fingerprints is also fast and reliable. Users experience fewer errors in matching when they use fingerprints versus many other biometric methods. In addition, a fingerprint identification device can require very little space on a desktop or in a machine. Several companies have produced capture units small than a deck of cards.One of the biggest fears of fingerprint technology is the theft of fingerprints. Skeptics point out that latent or residual prints left on the glass of a fingerprint scanner may be copied. However, a good fingerprint identification device only detects live fingers and will not acknowledge fingerprint copies.12Main Feature of Finger print verification systemAnalysis of minutia points i.e. finger image ridge (verification) endings, bifurcations or branches made by ridges.One of the most commercially successful biometric technologies.Important for applications where it is necessary to verify the identity of thos e who gain access.How fingerprint recognition system worksIn biometrics systems fingerprint recognition system is the fas exam verification /identification (One-to-One / One-to-Many) system as shown in figure 3, 4, 5. Like other biometrics recognition systems it performs fingerprint recognition with the help of specialised hardware. This specialised hardware is supported by the conventional computer hardware and special software. All biometrics systems operate in two modes, enrolment mode and authentication mode (as discussed in the previous chapter). A sample of the fingerprint of a live person is provided to the system which is then converted into mathematical code (Template) and stored for the enrolee into the database.In the first step of the authentication process, a fingerprint impression is provided to the system. The system takes a digital image (input image figure 311 below) using different techniques including scanner, optical, and ultrasound or semiconductor chip technolo gies. The digital image of the fingerprint includes several unique features in terms of ridge bifurcations and ridge endings, collectively referred to as minutiae. 22In the next step the system uses an automatic feature extraction algorithm to locate these features in the fingerprint image, as shown in Figure 312.Each of these features is commonly represented by its location (x, y, and z) and the ridge direction at that location however the feature extraction stage may miss some minutiae and may generate spurious minutiae due to sensor noise and other variability in the imaging process. The elasticity of the human skin also affects the feature extraction process. 33In the final stage, a final decision of match and non match is made on the bases of similarity between the two sets of features after compensating for the rotation, conversion and dimension. This similarity is often expressed as a score. A decision threshold is first selected. If the score is below the threshold, the fing erprints are determined not to match if the score is above the threshold, a correct match is declared an authentication is granted to the person. sword lily and Retina Recognition SystemBiometrics which analyse the intricate and unique characteristics of the eye can be divided into two different fields, gladiolus and Retina. Iris and retinal scans both deal with the human eye. They are done in an extremely different way as compared to other biometrics technology.Iris Recogniton SystemIris recognition biometrics base authentication systems have unique characteristics and features of the human iris used to verify the identity of an individual. The iris is the area of the eye where the pigmented or colour circle, usually brown or blue, rings the dark pupil of the eye. It consists of over 400 unique distinguishing characteristics that can be quantified and used for an individual identity. However, only about 260 of those characteristics are captured in a live iris identification proces s 25. Iris are composed before birth and, except in the event of an injury to the eyeball, remain unchanged throughout an individuals lifetime. Eyeglasses and contact lenses present no problems to the quality of the image and the iris recognition /scan systems test for a live eye by checking for the normal continuous fluctuation in the pupil size. As Iris patterns are extremely complex and unique they carry an astonishing amount of information. The fact that an individuals right and left eye are different and that patterns are easy to capture, it establishes iris recognition

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.