This Electronics Engineering Seminar Topic deals with the following:
The information age is quickly revolutionizing the way transactions are completed. Everyday actions are increasingly being handled electronically, instead of with pencil and paper or face to face. This growth in electronic transactions has resulted in a greater demand for fast and accurate user identification and authentication. Access codes for buildings, banks accounts and computer systems often use PIN’s for identification and security clearences.
Using the proper PIN gains access, but the user of the PIN is not verified. When credit and ATM cards are lost or stolen, an unauthorized user can often come up with the correct personal codes. Despite warning, many people continue to choose easily guessed PIN’s and passwords: birthdays, phone numbers and social security numbers. Recent cases of identity theft have hightened the nee for methods to prove that someone is truly who he/she claims to be.
Face recognition technology may solve this problem since a face is undeniably connected to its owner expect in the case of identical twins. Its nontransferable. The system can then compare scans to records stored in a central or local database or even on a smart card.
What are biometrics?
A biometric is a unique, measurable characteristic of a human being that can be used to automatically recognize an individual or verify an individual’s identity. Biometrics can measure both physiological and behavioral characteristics. Physiological biometrics (based on measurements and data derived from direct measurement of a part of the human body) include:
- Facial Recognition
Behavioral biometrics (based on measurements and data derived from an action) include:
A “biometric system” refers to the integrated hardware and software used to conduct biometric identification or verification.
Why we choose face recognition over other biometric?
There are a number reasons to choose face recognition. This includes the following
1. It requires no physical inetraction on behalf of the user.
2. It is accurate and allows for high enrolment and verification rates.
3. It does not require an expert to interpret the comparison result.
4. It can use your existing hardware infrastructure, existing camaras and image capture devices will work with no problems.
5. It is the only biometric that allow you to perform passive identification in a one to many environment (eg: identifying a terrorist in a busy Airport terminal.