Abstract

Face recognition has recently been a popular study topic as a result of the growing demand for security. Security systems, identity verification, access control, surveillance systems, and social networks are just a few of the applications that can be expanded from facial recognition. However, as passwords and fingerprint scanners are supplanted by improved computer technology and more precise algorithms, facial recognition is becoming increasingly popular. Facial recognition technology is the simplest and most coherent of all the techniques. Face recognition does not necessitate an individual’s active participation. Face recognition systems are theoretically capable of minimizing risk and eventually avoiding future attacks in places where identity identification is necessary, such as airports and border crossings. If there are criminals on the loose, the same justification can be made as with surveillance devices. Surveillance cameras with face recognition capabilities will aid in the identification of these individuals. Alternatively, these surveillance systems can be used to track down the whereabouts of missing persons, although this is contingent on the use of powerful facial recognition algorithms and a fully built facial database. Face detection, facial feature extraction (image normalization), face identification, and results are the major operations to be conducted for face recognition.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call