Computer ScienceSeminar

Seminar Topic on Face Recognition Technology

Seminar Topics For Computer Science & Engineering/Master of Computer Applications/B.tech/BCA/PGDCA/Bsc Computer Science Students

[AdSense-A]

Face Recognition Technology

Contents

  1. INTRODUCTION
  2. FACE RECOGNITION
  3. CAPTURING OF IMAGE BY STANDARD VIDEO CAMERAS
  4. COMPONENTS OF FACE RECOGNITION SYSTEMS
  5. PERFORMANCE
  6. IMPLEMENTATION OF FACE RECOGNITION TECHNOLOGY
  7. HOW FACE RECOGNITION SYSTEMS WORK -An example
  8. THE SOFTWARE
  9. ADVANTAGES AND DISADVANTAGES
  10. APPLICATIONS
  11. CONCLUSION
  12. REFERENCES

 

INTRODUCTION

The information age is quickly revolutionizing the way transactions are completed. Everyday actions are increasingly being handled electronically, instead of with pencil and paper or face to face. This growth in electronic transactions has resulted in a greater demand for fast and accurate user identification and authentication. Access codes for buildings, banks accounts and computer systems often use PIN’s for identification and security clearences.

 

Using the proper PIN gains access, but the user of the PIN is not verified. When credit and ATM cards are lost or stolen, an unauthorized user can often come up with the correct personal codes. Despite warning, many people continue to choose easily guessed PIN’s  and passwords: birthdays, phone numbers and social security numbers. Recent cases of identity theft have hightened the nee for methods to prove that someone is truly who he/she claims to be.

 

Face recognition technology may solve this problem since a face is undeniably connected to its owner expect in the case of identical twins. Its nontransferable. The system can then compare scans to records stored in a central or local database or even on a smart card.

Download Complete Seminar Report

[AdSense-B]

Download Complete Seminar Report Here

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button