
A Conceptual Study on User Identification and Verification Process using Face Recognition Technique
Author(s) -
K. Krishnaprasad,
P. S. Aithal
Publication year - 2017
Publication title -
international journal of applied engineering and management letters
Language(s) - English
Resource type - Journals
ISSN - 2581-7000
DOI - 10.47992/ijaeml.2581.7000.0002
Subject(s) - computer science , facial recognition system , biometrics , identification (biology) , local binary patterns , three dimensional face recognition , authentication (law) , process (computing) , face (sociological concept) , artificial intelligence , identity (music) , 3d single object recognition , feature (linguistics) , feature extraction , field (mathematics) , pattern recognition (psychology) , face recognition grand challenge , face detection , cognitive neuroscience of visual object recognition , computer security , image (mathematics) , histogram , social science , philosophy , mathematics , linguistics , sociology , acoustics , biology , operating system , botany , physics , pure mathematics
The rapid growth of information and communication technology resulted in abundant data and information growth in every field with the necessity for high data security. Face recognition is one of the types of unique biometrics measure related to human characteristics, which can be used for identification or authentication purpose as individual’s claimed identity. Face recognition system acquired great scope for the past few years in image processing for the security purposes including identification and verification process, due to its applications in various domains like crime detection, banking, and defense. Based on face data acquisition, face recognition techniques can be broadly classified into three types as intensity images using local binary pattern, video sequences using training videos and 3D information using 3D feature extraction. This paper discusses different face recognition algorithms and analyses it uses its advantages and disadvantages. This paper also compares and discusses how these techniques can be used for various identification and verification system in various fields and attempts to disclose state of the art of face recognition technology