1 / 9

Keep Secure Data With Biometric System

Biometric technology is a unique, measurement characteristic of human body like face and voice recognition. It is providing strong security for your personal information.

Download Presentation

Keep Secure Data With Biometric System

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. FACIAL RECOGNITION

  2. Outline 1. Introduction 2. Biometric 3. History 4. Facial Recognition 5. Implementation 6. About Us

  3. Introduction 1. Now a days all action are increasingly being handled electronically. 2. Electronic transactions results in great demand for fast and get the accurate user authentication and identification.

  4. Biometrics • Biometric technology is a unique, measurable technique of human being that can be used to automatically recognize human identity. • Biometrics technique can measure both behavioral and physical characteristics.

  5. Types of Biometrics 1. Voice Recognition 2. Facial Recognition 3. Finger -Scan 4. Signature- Scan 5. Retina -Scan

  6. Biometrics Technology 1. Physical Biometric :- This technique is based on measurement and direct measurement of a part of the body. 2. Behavioral Biometrics :- This technique is based on measurement and direct measure of a human action.

  7. Facial Recognition A facial recognition is a computer application and it is capable of identifying or verifying a person from digital image. It’s Comparing selected facial features from the image and a facial database.

  8. Implementation Face recognition technology following four stages with implementation. 1. Image acquisition 2. Image Processing 3. Characteristics Location 4. Template matching

  9. About US Website : - www.ibssmail.com Email :-  sales@ibsssecurity.com Contact :- 702-938-0497 Address :- 8275 S.Eastern Avenue, Suite 200 Las Vegas, NV

More Related