Thursday, October 25, 2012

Face Recognition


Face, the foremost distinguishing feature of human body, making you the ‘unique you’, not only gives you an individual identity, but can also save you from security breaches and fraud transactions, can take care of your personal data, and prevent your PC, wireless network from plausible security threats!! Unlike the world of facebook, where you can wear different face every day, here it is the uniqueness of your face that makes all the difference.

What is Face Recognition, Facial RecognitionThe fast track technology has brought the world at your finger tips, be it anything, it is not more than a click away. The easier life is getting day by day, the more complex it is becoming to escape from the traps intended to crack and get access to your private data. The growth of e-commerce wholly depends on the integrity of transaction. The reason why a big percentage of people are still hesitant to employ e-commerce is the increasing cases of fraudulent fund transfer, loss of privacy and misuse of identity. End-to-end trust is must for its success. The ubiquitous methods of user id and password combinations, access cards are no longer free from security threats.
 
Such scenario demands an infallible solution, the one that cannot be hacked, shared or stolen and that solution is present with us, as an innate gift of nature, the human biological characteristics.
 
Biometrics is the study of measurable biological characteristics. It consists of several authentication techniques based on unique physical characteristics such as face, fingerprints, iris, hand geometry, retina, veins, and voice. Face recognition is a computer based security system capable of automatically verifying or identifying a person. It is one of the various techniques under Biometrics. Biometrics identifies or verifies a person based on individual’s physical characteristics by matching the real time patterns against the enrolled ones.

The quest of human minds to excel and explore the breathtaking possibilities that technology can meet, encouraged scientists in mid 1960s to teach computers to distinguish between faces. In its initial stage, the technique was semi automated. It required an administrator to calculate the distance and ratios of various features of face (eyes, nose, ears and mouth) from a reference point and compare it with the images in database. Later in 1970s, Goldstein, Harmon and Lesk tried to automate the process by using various specific subjective markers such as lip thickness, hair colour. Early approaches were cumbersome, as they required manual computations. However, it was in 1988, when Kirby and Sirovich used a standard linear algebra technique, ‘Principle Component analysis’ that reduced the computation to less than a hundred values to code a normalized face image and in 1991, scientists finally succeeded in developing real time automated face recognition system.

Facing the FACE: How it works?  
When you face a security check based on face recognition, a computer takes your picture and after a few moments, it declares you either verified or a suspect. Let us look into the inside story, which is a sequence of complex computations.
The process of recognition starts with Face detection, followed by normalization and extraction which leads to the final recognition.
 
Face Detection:
Detecting a face, an effortless task for humans, requires vigilant efforts on part of a computer.   It has to decide whether aFace Detectionpixel in an image is part of a face or not. It needs to detect faces in an image which may have a non uniform background, variations in lightning conditions and facial expressions, thus making the task a complex one. The task is comparatively easy in images with a uniform background, frontal photographs and identical poses, as in any typical mug shot or a passport photograph.
Traditionally, methods that focus on facial landmarks (such as eyes), that detect face-like colours in circular regions, or that use standard feature templates, were used to detect faces.
 
Normalization:
The detected facial images can be cropped to obtain normalized images called canonical images. In a canonical face image, the size and position of the face are normalized approximately to the predefined values and the background region is minimized. Also, the image must be standardized in terms of size, pose, illumination, etc., relative to the images in the gallery or reference database. For this purpose, it is necessary to locate the facial landmarks accurately and failing to do so can make the whole recognition task unsuccessful. Recognition can only succeed if the probe image and the gallery images are the same in terms of pose orientation, rotation, scale, size, etc and normalization is meant to achieve this goal.
 
Extraction & Recognition:
A normalized image can be processed further for feature extraction and recognition. Here, the images are converted to a mathematical representation, called biometric template or biometric reference, to store them into the database. These image database, then serves for verification and identification of probe images. This transformation of image data to mathematical representation is achieved through algorithms. Many Facial recognition algorithms have been developed to get simplified mathematical form, to carry out the task of recognition. The way the algorithms transform or translate the image data which is in form of gray scale pixels to the mathematical representation of features, differentiate them from one another. To retain maximum information in the transformation process and thus create a distinct biometric template is crucial for successful recognition. Failing to which, may cause problems like generation of biometric doubles i.e. the biometric templates from different individuals become insufficiently distinctive.

RoHS

RoHS is the acronym for Restriction of Hazardous Substances and is also known as “Lead free” (though incorrectly). RoHS directive is a European Union Directive 2002/95/EC and is applicable in all EU countries. The prime purpose of this directive is to restrict the use of hazardous substances in electric and electronic equipments with an objective of promoting environment friendly mechanism of recovery and disposal of wastes from electrical and electronic equipments. This directive restricts the use of six hazardous substances found in electrical and electronic products. Under RoHS, all electrical and electronic products destined for sale in the EU market after July 1, 2006 must pass RoHS compliance, i.e., they must be free of six hazardous substances identified by the directive. RoHS directive does not apply to spare parts for the repair or reuse of EEE put on the market before 1st Jul 2006.

Need For RoHS

5.jpg

Advancement in the electronics and associated segments since the invention of the first transistor in 1947 has been phenomenal. Today, we are surrounded by electronic gadgets which have become more or less the necessities of today’s lifestyle. Computers, TVs, embedded systems, etc. can be seen everywhere. In this phenomenal growth, one thing which has been neglected is the management of the wastes generated due to electrical and electronic equipments; the waste containing substances hazardous to human life.
E-waste is the term used for the electronic/electrical products which have completed their useful life. Management of these e-wastes has been a cause of concern around the world. The e-wastes contain lot of constituents harmful to human health. Lead used for soldering in printed circuit boards, glass panels and gaskets in computer monitors can cause damage to central and peripheral nervous systems, blood system and kidney. Chip resistors and semiconductor devices contain Cadmium which accumulates in kidney and liver and has toxic irreversible effects on human health. Relays and switches contain mercury which can contain chronic damage to the brain, respiratory and skin disorders. Cabling and computer housing contain plastics including PVC, the burning of which releases dioxin that can cause immune system damage and interfere with regulatory hormones. Plastic housing of electronic equipments and circuit boards contain Brominated flame retardants which disrupts endocrine system functions. Hexavalent chromium used for plating cause Asthmatic bronchitis and DNA damage. Improper disposal of these wastes can allow these hazardous substances to seep into air, soil and ground water causing acute problems to human life.
With an objective to counter the ill-effects of the e-wastes, several countries pressed upon the need to address the problems and challenges posed by hazardous electronic wastes. European Union issued a directive, known as RoHS – Restriction of Hazardous Substances to restrict the use of the substances in the electrical and electronic equipments. Following EU RoHS, other countries have also issued directives to handle management of the e-wastes.