Face Recognition Report PDF
Face Recognition Report PDF
Face Recognition Report PDF
Synopsis Report On
Submitted By
2013 - 2014
at
Affiliated to
University of Mumbai
CERTIFICATE
This is to certify that
Sayali Ghadge
Sana Khan
Sonam Vadsaria
Date:
ABSTRACT
Face (facial) recognition is the identification of humans by the unique characteristics of their
Faces.Face recognition technology is the least intrusive and fastest bio-metric technology.
It works with the most obvious individual identifier the human face. With increasing se-
curity needs and with advancement in technology extracting information has become much
simpler. This project aims on building an application based on face recognition using dif-
ferent algorithms and comparing the results. The basic purpose being to identify the face
and retrieving information stored in database. It involves two main steps. First to identify
the distinguishing factors in image n storing them and Second step to compare it with the
existing images and returning the data related to that image. The various algorithms used
for face detection are PCA Algorithm and Gray Scale Algorithm.
3 Literature Survey 9
3.1 Face Recognition Based on Independent Component Analysis: . . . . . . . . 9
3.2 Eigen-spaces: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.3 Elastic bunch Graph Matching . . . . . . . . . . . . . . . . . . . . . . . . . . 10
3.4 Linear Discriminant Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . 10
6 Summary 14
7 References 15
8 Apeendix A 16
List of Figures
1 Biometric Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2 Structure of Face Recognition System . . . . . . . . . . . . . . . . . . . . . . 11
1 INTRODUCTION
Chapter 1
1 Introduction
1.1 Biometrics
Biometrics is used in the process of authentication of a person by verifying or identifying
that a user requesting a network resource is who he, she, or it claims to be, and vice versa.
It uses the property that a human trait associated with a person itself like structure of data
with the incoming data we can verify the identity of a particular person [1]. There are many
types of biometric system like detection and recognition, iris recognition etc., these traits
are used for human identication in surveillance system, criminal identification , face details
etc. By comparing the existing fingerprint recognition.
In Fig 1.1 An important aspect is that such technology should be able to deal with various
changes in face images, like rotation, changes in expression. Surprisingly, the mathematical
variations between the images of the same face due to illumination and viewing direction
are almost always larger than image variations due to changes in face identity. This presents
a great challenge to face recognition. At the core,two issues are central to successful face
recognition algorithms: First, the choice of features used to represent a face. Since images
are subject to changes in viewpoint, illumination, and expression, an effective representation
should be able to deal with these possible changes.
Secondly, the classification of a new face image using the chosen representation. Face
Recognition can be of two types:
Feature Based (Geometric)
Template Based (Photometric)
In geometric or feature-based methods, facial features such as eyes, nose, mouth, and chin are
detected. Properties and relations such as areas, distances, and angles between the features
are used as descriptors of faces. Although this class of methods is economical and efficient
in achieving data reduction and is insensitive to variations in illumination and viewpoint, it
relies heavily on the extraction and measurement of facial features. Unfortunately, feature
extraction and measurement techniques and algorithms developed to date have not been
reliable enough to cater to this need. In contrast, template matching and neural methods
generally operate directly on an image-based representation of faces, i.e., pixel intensity
array. Because the detection and measurement of geometric facial features are not required,
this type of method has been more practical and easier to implement when compared to
geometric feature-based methods.
Chapter 2
The problem of face recognition can be stated as follows : Face Recognition human facial
features like the mouth, nose and eyes in a full frontal face image. We will be adapting a
multi-step process in order to achieve the goal. To detect the face region we will be using a
skin-color segmentation method. Morphological techniques will be adapted to fill the holes
that would be created after the segmentation process. From the skeletonization process,
a skeleton of the face will be obtained from which face contour points could be extracted.
Facial features can be located in the interior of the face contour. We will use several different
facial-images to test our method.
2.1 Objectives
1. Trying to find a face within a large database of faces. In this approach the system
returns a possible list of faces from the database. The most useful applications contain
crowd surveillance, video content indexing, personal identification (example: drivers
license), mug shots matching, etc.
2. Real time face recognition: Here, face recognition is used to identify a person on the
spot and grant access to a building or a compound, thus avoiding security hassles. In
this case the face is compared against a multiple training samples of a person.
Chapter 3
3 Literature Survey
Several algorithms and techniques for face recognition have been developed in the past
by researchers.These are discussed briefly in this section.
A number of current face recognition algorithms use face representations found by unsuper-
vised statistical methods. Typically these methods find a set of basis images and represent
faces as a linear combination of those images. Principal component analysis (PCA) is a
popular example of such methods. The basis images found by PCA depend only on pairwise
relationships between pixels in the image database. In a task such as face recognition, in
which important information may be contained in the high-order relationships among pixels,
it seems reasonable to expect that better basis images may be found by methods sensitive
to these high-order statistics. Independent component analysis (ICA), a generalization of
PCA, is one such method. We used a version of ICA derived from the principle of optimal
information transfer through sigmoidal neurons. ICA was performed on face images in the
FERET database under two different architectures, one which treated the images as random
variables and the pixels as outcomes, and a second which treated the pixels as random vari-
ables and the images as outcomes. The first architecture found spatially local basis images
for the faces. The second architecture produced a factorial face code. Both ICA representa-
tions were superior to representations based on PCA for recognizing faces across days and
changes in expression. A classifier that combined the two ICA representations gave the best
performance.[1]
3.2 Eigen-spaces:
the research groups rather than a comparison between methods is performed. This study
considers theoretical aspects as well as simulations performed using the Yale Face Database,
a database with few classes and several images per class, and FERET, a database with many
classes and few images per class.[2]
Elastic Bunch Graph Matching is one of the well known methods proposed for face recog-
nition. In this work, we propose several extensions to Elastic Bunch Graph Matching and
its recent variant Landmark Model Matching. We used data from the FERET database for
experimentations and to compare the proposed methods. We apply Particle Swarm Opti-
mization to improve the face graph matching procedure in Elastic Bunch Graph Matching
method and demonstrate its usefulness. Landmark Model Matching depends solely on Gabor
wavelets for feature extraction to locate the landmarks (facial feature points). We show that
improvements can be made by combining gray-level profiles with Gabor wavelet features
for feature extraction. Furthermore, we achieve improved recognition rates by hybridizing
Gabor wavelet with eigenface features found by Principal Component Analysis, which would
provide information contained in the overall appearance of a face. We use Particle Swarm
Optimization to fine tune the hybridization weights.[3]
Results of both fully automatic and partially automatic versions of all methods are pre-
sented. The best-performing method improves the recognition rate up to 22.6speeds up the
processing time by 8 times over the Elastic Bunch Graph Matching for the fully automatic
case.
Both PCA and ICA do not use face class informa-tion. Linear Discriminant Analysis (LDA)
finds an ecient way to represent the face vector space by exploiting the class information. It
dierentiates individual faces but recognizes faces of the same individual ].
LDA searches for vectors in the underlying space that best discriminate among classes. For
all the samples of all classes, two measures are defined.
Chapter 4
The previous sections illustrate different techniques and methods of face detection and recog-
nition. Each category of method performs well in certain criteria and also has drawbacks
as well. Systems with robustness and certain level of accuracy are still far away. Keeping
in view case study the following architecture is proposed for the detection and recognition
system.
As discussed earlier that the robust system catering the needs of real world situation is a
challenging task. The images will be scanned by scanner and stored into database. Again the
image will be scanned and stored into the database. Now two images of the same candidate
will be stored into the database. The first step is to select desired images from the database
then for comparisons them the next step is to detect faces from each image. The next step
is to recognize that images as of the same candidate or not.
Chapter 5
Face Recognition using PCA and Grayscale algorithms. In our project we are going to
compare these two methods of face detection and find their difference using constant tests
and analysis.
5.2 Scheduling
The following table shows the expected flow of work for the accomplishment of the required
result.
Chapter 6
6 Summary
Face recognition systems are useful in law enforcement and justice solutions by staying
one step ahead of the world’s ever-advancing criminals. This includes acclaimed CABS-
computerized arrest and booking system and the childbase protection which is a software
solution for global law enforcement agencies to help protect and recover missing and sex-
ually exploited children, particularly as it relates to child pornography. It is also useful
in Homeland defense which includes everything from preventing terrorists from boarding
aircraft, to protecting critical infrastructure from attack or tampering (e.g. dams, bridges,
water reservoirs, energy plants, etc.), to the identification of known terrorists. It is also
applicable in airport and other transportation terminal security. Face recognition software,
can enhance the effectiveness of immigration and customs personnel. The financial services
industry revolves around the concept of security. Face recognition software, can improve
the security of the financial services industry, saving the institution time and money both
through a reduction of fraud case and the administration expenses of dealing with forgotten
passwords. Furthermore, biometric-based access control units can safeguard vaults, teller
areas, and safety deposit boxes to protect against theft. The use of biometrics can also
ensure that confidential information remains confidential while deterring identity theft, par-
ticularly as it relates to ATM terminals and card-not-present e-commerce transactions. It
allows capturing, archiving, and retrieving identifying characteristics as tattoos, marks, or
scars. It can also analyze scenes from either streaming or archived video, ”looking” for
out-of-the-ordinary occurrences, the presence of certain vehicles, specific faces, etc. This is
beneficial and can save significant time and money to those individuals who spend hours,
days, or weeks monitoring video streams (i.e. examining a bank’s security in a criminal
investigation).
7 References
8 Apeendix A
eReport Details
This report is shared on Academia Research Network for any future reference. The link to
the online content is provided below.