FACE RECOGNITION HOW BIOMETRICS WILL BE UTILIZED TO COUNTER TERRORISM FACE RECOGNITION HOW...

26
FACE RECOGNITION FACE RECOGNITION HOW BIOMETRICS WILL BE UTILIZED HOW BIOMETRICS WILL BE UTILIZED TO COUNTER TERRORISM TO COUNTER TERRORISM Presented By: Presented By: Carlos Buskey Carlos Buskey THE LAST MINUTE ADDTION
  • date post

    22-Dec-2015
  • Category

    Documents

  • view

    216
  • download

    0

Transcript of FACE RECOGNITION HOW BIOMETRICS WILL BE UTILIZED TO COUNTER TERRORISM FACE RECOGNITION HOW...

FACE RECOGNITIONFACE RECOGNITIONHOW BIOMETRICS WILL BE UTILIZED HOW BIOMETRICS WILL BE UTILIZED

TO COUNTER TERRORISMTO COUNTER TERRORISM

FACE RECOGNITIONFACE RECOGNITIONHOW BIOMETRICS WILL BE UTILIZED HOW BIOMETRICS WILL BE UTILIZED

TO COUNTER TERRORISMTO COUNTER TERRORISM

Presented By:Presented By:Carlos BuskeyCarlos BuskeyPresented By:Presented By:Carlos BuskeyCarlos Buskey

THE LAST MINUTE ADDTIONTHE LAST MINUTE ADDTION

BIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEY

THIS PRESENTATION WILL COVER…THIS PRESENTATION WILL COVER…THIS PRESENTATION WILL COVER…THIS PRESENTATION WILL COVER…

• INTRODUCTION TO BIOMETRICSINTRODUCTION TO BIOMETRICS• HISTORY OF BIOMETRICSHISTORY OF BIOMETRICS• TYPES OF BIOMETRIC TECHNOLOGYTYPES OF BIOMETRIC TECHNOLOGY• INTRO TO FACE RECOGNITIONINTRO TO FACE RECOGNITION• FACE RECOGNITION USAGE IN FACE RECOGNITION USAGE IN

AIRPORTS TO COUNTER TERRORISMAIRPORTS TO COUNTER TERRORISM• FUTURE OF FACE RECOGNITIONFUTURE OF FACE RECOGNITION

INTRODUCTION TO INTRODUCTION TO BIOMETRICSBIOMETRICS

INTRODUCTION TO INTRODUCTION TO BIOMETRICSBIOMETRICS

BIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEY

QUESTIONQUESTIONQUESTIONQUESTION

Biometrics stands for:Biometrics stands for:

(A)(A)The measurement of nuclear The measurement of nuclear weaponsweapons

(B)(B)Life-measurementsLife-measurements

(C)(C)The study of whether house hold The study of whether house hold plants will someday become a treeplants will someday become a tree

(D)(D)Measuring size of DNA strandsMeasuring size of DNA strands

BIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEY

INTRODUCTION TO BIOMETRICSINTRODUCTION TO BIOMETRICSINTRODUCTION TO BIOMETRICSINTRODUCTION TO BIOMETRICS

• Biometrics (“Bio-“ stands for life Biometrics (“Bio-“ stands for life and“metric” is to measure) and“metric” is to measure)

BIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEY

INTRODUCTION TO BIOMETRICSINTRODUCTION TO BIOMETRICSINTRODUCTION TO BIOMETRICSINTRODUCTION TO BIOMETRICS

““Biometric is using a computer to Biometric is using a computer to recognized physical and behavior recognized physical and behavior characteristics of a human. These characteristics of a human. These trait are captured by a computer trait are captured by a computer and used to make one-to-one and used to make one-to-one authentication and one-to-many authentication and one-to-many comparison based on unique comparison based on unique features[Visonics, 2001]features[Visonics, 2001]””

BRIEF HISTORY OF BRIEF HISTORY OF BIOMETRICSBIOMETRICS

BRIEF HISTORY OF BRIEF HISTORY OF BIOMETRICSBIOMETRICS

AND I MEAN BRIEF!!!!AND I MEAN BRIEF!!!!

BIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEY

QUESTIONQUESTIONQUESTIONQUESTION

Biometrics was first used:Biometrics was first used:

(A)(A)During the first DPS SessionDuring the first DPS Session

(B)(B)In the first James Bond MovieIn the first James Bond Movie

(C)(C)Prehistoric timesPrehistoric times

(D)(D)During the Nixon AdministrationDuring the Nixon Administration

BIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEY

HISTORY OF BIOMETRICSHISTORY OF BIOMETRICSHISTORY OF BIOMETRICSHISTORY OF BIOMETRICS

• Biometrics was used during Biometrics was used during prehistoric times.prehistoric times.

• Chinese used fingerprinting in the Chinese used fingerprinting in the 1414thth Century for identification. Century for identification.

• In the 17In the 17thth century fingerprinting century fingerprinting was used to seal official was used to seal official documents.documents.

TYPES OF BIOMETRICSTYPES OF BIOMETRICSTYPES OF BIOMETRICSTYPES OF BIOMETRICS

BIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEY

TYPES OF BIOMETRICS TYPES OF BIOMETRICS TYPES OF BIOMETRICS TYPES OF BIOMETRICS

• Finger printsFinger prints• Retina ScansRetina Scans• Iris ScansIris Scans• Voice recognitionVoice recognition• Face recognition.Face recognition.

BIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEY

TYPES OF BIOMETRICS TYPES OF BIOMETRICS TYPES OF BIOMETRICS TYPES OF BIOMETRICS

Other forms of emerging Biometrics: Other forms of emerging Biometrics: • thermal scansthermal scans• DNA (actually actively used in forensics)DNA (actually actively used in forensics)• SignaturesSignatures• hand geometryhand geometry• ear structureear structure• heart rhythmheart rhythm

INTRODUCTION TO FACE INTRODUCTION TO FACE RECOGNITIONRECOGNITION

INTRODUCTION TO FACE INTRODUCTION TO FACE RECOGNITIONRECOGNITION

BIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEY

QUESTIONQUESTIONQUESTIONQUESTION

What is face recognition?:What is face recognition?:(A)(A)Discovering whether Michael Discovering whether Michael

Jackson has made a new changeJackson has made a new change(B)(B)Remembering a person at your Remembering a person at your

class reunionclass reunion(C)(C)The ability to identify which The ability to identify which

President is on the 10 dollar bill.President is on the 10 dollar bill.(D)(D)The capturing of a facial image The capturing of a facial image

BIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEY

INTRO TO FACE RECOGNITIONINTRO TO FACE RECOGNITIONINTRO TO FACE RECOGNITIONINTRO TO FACE RECOGNITION

• Face recognition is the capturing of a Face recognition is the capturing of a facial image, which is then transformed facial image, which is then transformed into a unique face printinto a unique face print

• The image is transformed using a The image is transformed using a technique called “elastic graph technique called “elastic graph matching”.matching”.

• Algebraic algorithms are used to make a Algebraic algorithms are used to make a perfect match.perfect match.

• Images are sent to a back-end database Images are sent to a back-end database for comparison and possible matches.for comparison and possible matches.

FACE RECOGNITION IN FACE RECOGNITION IN AIRPORTSAIRPORTS

ANTI- TERROISM TECHNOLOGYANTI- TERROISM TECHNOLOGY

FACE RECOGNITION IN FACE RECOGNITION IN AIRPORTSAIRPORTS

ANTI- TERROISM TECHNOLOGYANTI- TERROISM TECHNOLOGY

BIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEY

FACE RECOGNITION USAGE IN AIRPORTS FACE RECOGNITION USAGE IN AIRPORTS TO COUNTER TERRORISMTO COUNTER TERRORISM

FACE RECOGNITION USAGE IN AIRPORTS FACE RECOGNITION USAGE IN AIRPORTS TO COUNTER TERRORISMTO COUNTER TERRORISM

Image is sent to computer

for manipulation.

Hi I am

Dr. La

rry B

liss

BIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEY

FACE RECOGNITION USAGE IN AIRPORTS FACE RECOGNITION USAGE IN AIRPORTS TO COUNTER TERRORISMTO COUNTER TERRORISM

FACE RECOGNITION USAGE IN AIRPORTS FACE RECOGNITION USAGE IN AIRPORTS TO COUNTER TERRORISMTO COUNTER TERRORISM

BIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEY

FACE RECOGNITION USAGE IN AIRPORTS FACE RECOGNITION USAGE IN AIRPORTS TO COUNTER TERRORISMTO COUNTER TERRORISM

FACE RECOGNITION USAGE IN AIRPORTS FACE RECOGNITION USAGE IN AIRPORTS TO COUNTER TERRORISMTO COUNTER TERRORISM

BIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEY

FACE RECOGNITION USAGE IN AIRPORTS FACE RECOGNITION USAGE IN AIRPORTS TO COUNTER TERRORISMTO COUNTER TERRORISM

FACE RECOGNITION USAGE IN AIRPORTS FACE RECOGNITION USAGE IN AIRPORTS TO COUNTER TERRORISMTO COUNTER TERRORISM

Examples of jetting and Gabor waveletsExamples of jetting and Gabor wavelets

Ruhr-Universitat Bochum Research Ins. 2001

BIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEY

Image is passed to database for possible match

FACE RECOGNITION USAGE IN AIRPORTS FACE RECOGNITION USAGE IN AIRPORTS TO COUNTER TERRORISMTO COUNTER TERRORISM

FACE RECOGNITION USAGE IN AIRPORTS FACE RECOGNITION USAGE IN AIRPORTS TO COUNTER TERRORISMTO COUNTER TERRORISM

BIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEY

WARNING!WARNING!!!!!!!HOLD FOR QUESTIONING

FACE RECOGNITION USAGE IN AIRPORTS FACE RECOGNITION USAGE IN AIRPORTS TO COUNTER TERRORISMTO COUNTER TERRORISM

FACE RECOGNITION USAGE IN AIRPORTS FACE RECOGNITION USAGE IN AIRPORTS TO COUNTER TERRORISMTO COUNTER TERRORISM

FUTURE OF FACE FUTURE OF FACE RECOGNITIONRECOGNITION

FUTURE OF FACE FUTURE OF FACE RECOGNITIONRECOGNITION

The Future is NOW!!The Future is NOW!!

BIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEY

FUTURE OF FACE RECOGNITION FUTURE OF FACE RECOGNITION FUTURE OF FACE RECOGNITION FUTURE OF FACE RECOGNITION

• Neural Nets to improve accuracy and Neural Nets to improve accuracy and predictions.predictions.

• Wearable computing will make face Wearable computing will make face recognition ubiquitous .recognition ubiquitous .

• Hybrids-face recognition/thermal scansHybrids-face recognition/thermal scans• Hybrids-face recognition/voice Hybrids-face recognition/voice

recognitionrecognition• Digitized imagesDigitized images

BIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEYBIOMETRIC 2001. BUSKEY

FUTURE OF FACE RECOGNITION FUTURE OF FACE RECOGNITION FUTURE OF FACE RECOGNITION FUTURE OF FACE RECOGNITION

• May replace monetary exchange - credit May replace monetary exchange - credit cards and moneycards and money

• Utilized for security access to buildings Utilized for security access to buildings and computersand computers

• Utilized to augment normal access to Utilized to augment normal access to automobiles and homesautomobiles and homes

• Face recognition will work with ATM’s to Face recognition will work with ATM’s to authenticate bank users by matching authenticate bank users by matching face prints with bank cardsface prints with bank cards

THANK YOUTHANK YOUTHANK YOUTHANK YOUA NEGOTIATED A NEGOTIATED

OPTIONS OPTIONS PRODUCTION PRODUCTION

A NEGOTIATED A NEGOTIATED OPTIONS OPTIONS

PRODUCTION PRODUCTION