ABSTRACT

The use of biometrics in the field of security applications has been increasing rapidly due to their uniqueness, reliability, universality, wide acceptability, confidentiality, and highly precise performance. With the latest advancements in technology, various techniques and devices have been developed to read, understand, visualize, and record different physical and non-physical biometric features of the human body. The results obtained from such devices are processed and analysed through different complex mathematical functions and well-developed algorithms, which helps the researchers and concerned organizations to decode the valuable information from them with more precision and accuracy using deep learning and to boost the efficiency and response time by using powerful processing units. Some of the most acceptable and usable biometrics include fingerprint recognition, facial recognition, DNA matching, iris recognition, voice matching, etc. All the biometrics involve the use of different techniques and processes so as to be able to read, process, understand, store, visualize, and decode. This chapter primarily focuses on the latest algorithms and techniques developed in order to capture and analyse the facial biometrics of the human body. The use of facial biometrics has been widely used and preferred due to its high reliability, security, lower complexity, and more efficient performance. Facial biometrics, in the field of computer vision, involves two different concepts, facial detection and facial recognition,which are also briefly elaborated in the chapter. Face detection techniques involve the use of different machine learning and deep learning concepts in order to detect the human faces present in an image, whereas facial recognition systems involve more complex algorithms by adding an extra layer of identifying and labelling the human faces present in the image with the help of their facial landmarks and characteristics. The chapter also includes brief but clear, precise, and descriptive information as well as features of some of the well-known facial detection techniques along with the comparative analysis of their respective results and supporting graphics and visualizations. Also, the chapter focuses on the monitoring, security, and surveillance applications of facial detection systems along with the other relevant fields.