Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Technical Document

Download as pdf or txt
Download as pdf or txt
You are on page 1of 23

FACIAL RECOGNITION TECHNOLOGY

Technical Seminar Report Submitted to Sri Indu college of Engineering & Technology In

Partial fulfilment of the requirement of the award of degree of

BACHELOR OF TECHNOLOGY

In

COMPUTER SCIENCE ENGINEERING

Submitted
By
POLAMPALLI AASHRITHA
Ht.No.20D41A0501

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING

SRI INDU COLLEGE OF ENGINEERING AND TECHNOLOGY


(An Autonomous Institute under UGC, accredited by NBA, affiliated to JNTUH)

Sheriguda, Ibrahimpatnam - 501510

(2023-2024)
SRI INDU COLLEGE OF ENGINEERING AND TECHNOLOGY
(An Autonomous Institution under UGC, accredited by NBA, Affiliated to JNTUH)

DEPARTMENT OF COMPUTER SCIENCE& ENGINEERING

CERTIFICATE
Certified that the Technical Seminar work entitled Facial Recognition Technology is
a bonafide work carried out by Ms.P.Aashritha [20D41A0501] in partial fulfillment
for the award of Bachelor of Technology in Computer Science and Engineering of
SICET, Hyderabad for the academic year 2023-2024. The Technical Seminar Report
has been approved as it satisfies academic requirements in respect of the work
prescribed for IV Year, I-Semester of B. Tech course.

Staff Member in-charge HOD


Prof.CH.G.V.N.PRASAD
(DEPT. OF CSE)

CSE - DEAN

Dr.K.S. Sadasiva Rao


ACKNOWLEDGEMENT
With the pleasure I want to take this opportunity to express our heartfelt gratitude to all the people who
helped in making this project a success. We thank the almighty for giving us the courage &
perseverance in completing the project.

I am highly indebted to, Prof.CH.G.V.N.PRASAD, Head of the Department of Computer Science


& Engineering, Project Guide, for providing valuable guidance at every stage of this project.

I am grateful to my supervisor for his constant motivation and guidance given by him during the
execution of this report.

I would like to thank the Teaching & Non-Teaching staff of Department of Computer Science &
Engineering for sharing their knowledge with us.

Last but not the least we express our sincere thanks to everyone who helped directly or indirectly for
the completion of this report.
CONTENT

S.no Title Pageno

1. Abstract

1. Introduction 1-2

1.1 What are biometrics ?


1.2 Why we choose face recognition

2. Face recognition 3

3. Components of face recognition system 5

4. Implementation of face recognition 6-8


4.1 Data acquisition
4.2 Input processing
4.3 Face image classification and decision making

5. How face recognition system work 9

6. The Software 11-12


6.1 Detection
6.2 Alignment
6.3 Normalization
6.4 Representation
6.5 Matching

7. System Analysis 13

8. Advantages and Disadvantages 14

9. Applications 15

10. Conclusion 16

11. References 17
ABSTRACT
Facial recognition is a way of identifying or confirming an individual’s identity using theirface.Facial
recognition systems can be used to identify people in photos, videos, or in real-timeFacial recgnition is a category
of biometric security. Other forms of biometric software include voice recognition, fingerprint recognition, and
eye retina or iris recognition. The technology is mostly used for security and law enforcement, though there is
increasing interest in other areas of use.Face recognition is a form of artificial intelligence (AI) that mimics a
human capability to recognize human faces. Just like when a human recognizes a face, facial recognition
software captures facial features and creates a pattern of facial features which it uses to identify or group a face.
Facial recognition is a way of identifying or confirming an individual’s identity using their face. Facial
recognition systems can be used to identify people in photos, videos, or in real-time.Facial recognition can
identify human faces in images or videos, determine if the face in two images belongs to the same person, or
search for a face among a large collection of existing images. Biometric security systems use facial recognition
to uniquely identify individuals during user onboarding or logins as well as strengthen user authentication
activity.

There are two types of comparision for face recognition :

1) Verification

2) Identification

▪ Verification : This is where the system compares the given individual with who that individual says they
are and gives a yes or no decision.

▪ Identification : This is where the system compares the given individual to all other individual in the
databases and gives a ranked list of matches
1. INTRODUCTION

The information age is quickly revolutionizing the way transactions are completed. Everyday
actions are increasingly being handled electronically, instead of with pencil and paper or face to face. This
growth in electronic transactions has resulted in a greater demand for fast and accurate user identification
and authentication. Access codes for buildings, banks accounts and computer systems often use PIN's for
identification and security clearences.

Using the proper PIN gains access, but the user of the PIN is not verified. When credit and
ATM cards are lost or stolen, an unauthorized user can often come up with the correct personal codes.
Despite warning, many people continue to choose easily guessed PIN’s and passwords: birthdays, phone
numbers and social security numbers. Recent cases of identity theft have highten the need for methods to
prove that someone is truly who he/she claims to be.

Face recognition technology may solve this problem since a face is undeniably connected to its
owner expect in the case of identical twins. Its nontransferable. The system can then compare scans to
records stored in a central or local database or even on a smart card.

1.1 What are biometrics?

A biometric is a unique, measurable characteristic of a human being that can be used to automatically
recognize an individual or verify an individual’s identity. Biometrics can measure both physiological and
behavioral characteristics. Physiological biometrics (based on measurements and data derived from direct
measurement of a part of the human body) include:

a. Finger-scan
b. Facial Recognition
c. Iris-scan
d. Retina-scan
e. Hand-scan
Behavioral biometrics (based on measurements and data derived from an action) include:

a. Voice-scan
b. Signature-scan
c. Keystroke-scan
A “biometric system” refers to the integrated hardware and software used to conduct biometric
identification or verification.

1.2 Why we choose face recognition over other biometric?

There are number reasons to choose face recognition. This includes the following

a. It is accurate and allows for high enrolment and verification rates.


b. It does not require an expert to interpret the comparison result.
c. It can use your existing hardware infrastructure, existing camaras and image capture
Devices will work with no problems
d. It is the only biometric that allow you to perform passive identification in a one to many environments
2. FACE RECOGNITION

THE FACE:

The face is an important part of who you are and how people identify you. Except in the case
of identical twins, the face is arguably a person's most unique physical characteristics. While humans have
the innate ability to recognize and distinguish different faces for millions of years, computers are just now
catching up.

For face recognition there are two types of comparisons .the first is verification. This is where the system
compares the given individual with who that individual says they are and gives a yes or no decision. The
second is identification. This is where the system compares the given individual to all the

Other individuals in the database and gives a ranked list of matches. All identification or authentication
technologies operate using the following four stages:

a. Capture: A physical or behavioural sample is captured by the system during


Enrollment and also in identification or verification process
b. Extraction: unique data is extracted from the sample and a template is created.
c. Comparison: the template is then compared with a new sample.
d. Match/non match: the system decides if the features extracted from the new Samples are a match or a non
match

Face recognition technology analyze the unique shape, pattern and positioning of the facial features. Face
recognition is very complex technology and is largely software based. This Biometric Methodology
establishes the analysis framework with tailored algorithms for each type of biometric device. Face
recognition starts with a picture, attempting to find a person in the image. This can be accomplished using
several methods including movement, skin tones, or blurred human shapes.

The face recognition system locates the head and finally the eyes of the
individual. A matrix is then developed based on the characteristics of the
Individual’s face. The method of defining the matrix varies according to the algorithm (the
mathematical process used by the computer to perform the comparison). This matrix is then compared to
matrices that are in a database and a similarity score is generated for each comparison.

Artificial intelligence is used to simulate human interpretation of faces. In order to increase the
accuracy and adaptability, some kind of machine learning has to be implemented.

There are essentially two methods of capture. One is video imaging and the other is thermal imaging. Video
imaging is more common as standard video cameras can be used. The precise position and the angle of the
head and the surrounding lighting conditions may affect the system performance. The complete facial image
is usually captured and a number of points on the face can then be mapped, position of the eyes, mouth and
the nostrils as a example. More advanced technologies make 3-D map of the face which multiplies the
possible measurements that can be made. Thermal imaging has better accuracy as it uses facial temperature
variations caused by vein structure as the distinguishing traits. As the heat pattern is emitted from the face
itself without source of external radiation these systems can capture images despite the lighting condition,
even in the dark. The drawback is high cost. They are more expensive than standard video cameras.

Capture Extraction Comparison Match/No


nMat
ch

Accept/
Project

Figure 1
3. COMPONENTS OF FACE RECOGNITION SYSTEMS

a. An automated mechanism that scans and captures a digital or an analog image of a living personal
characteristics.(enrollment module)
b. Another entity which handles compression, processing, storage and compression of the captured data
with stored data (database)
c. The third interfaces with the application system ( identification module)

Enrollment

Preprocessing Analyzed
and data
segmentation Analysis

User Interface
System

Database
Face

Verification Module

Prepossessing Face reg &


and scoring
segmentation Analysis

Accept / reject

Figure 2
User interface captures the analog or digital image of the person's face. In the enrollment module the
obtained sample is preprocessed and analyzed. This analyzed data is stored in the database for the purpose
of future comparison.

The database compresses the obtained sample and stores it. It should have retrival property also
that is it compares all the stored sample with the newly obtained sample and retrives the matched sample
for the purpose of verification by the user and determine whether the match declared is right or wrong.

The verification module also consists of a preprocessing system. Verification means the system
checks as to who the person says he or she is and gives a yes or no decision. In this module the newly
obtained sample is preprocessed and compared with the sample stored in the database. The decision is taken
depending on the match obtained from the database. Correspondingly the sample is accepted or rejected.

Instead of verification module we can make use of identification module. In this the sample is
compared with all the other samples stored in the database. For each comparison made a match score is
given. The decision to accept or reject the sample depends on this match score falling above or below a
predetermined threshold.
4. IMPLEMENTATION OF FACE RECOGNITION TECHNOLOGY
The implementation of face recognition technology includes the following four stages:

• Data acquisition
• Input processing
• Face image classification and decision making

4.1 Data acquisition:


The input can be recorded video of the speaker or a still image. A sample of 1 sec duration consists
of a 25 frame video sequence. More than one camera can be used to produce a 3D representation of the face
and to protect against the usage of photographs to gain unauthorized access.

4.2 Input processing:


A pre-processing module locates the eye position and takes care of the surrounding lighting
condition and colour variance. First the presence of faces or face in a scene must be detected. Once the face
is detected, it must be localized and

Normalization process may be required to bring the dimensions of the live facial sample in
alignment with the one on the template.

Some facial recognition approaches use the whole face while others concentrate on facial components
and/ or regions (such as lips, eyes etc). The appearance of the face can change considerably during speech
and due to facial expressions. In particular the mouth is subjected to fundamental changes but is also very
important source for discriminating faces. So an approach to person’s recognition is developed based on
patio- temporal modeling of features extracted from talking face. Models are trained specific to a person’s
speech articulate and the way that the person speaks. Person identification is performed by tracking mouth
movements of the talking face and by estimating the likelyhood of each model of having generated the
observed sequence of features.
The model with the highest likelyhood is chosen as the recognized person.
Block diagram:

Talking Face

Lip Tracker

Normalization

Thresholding

Alignmen
t

Score & Decision Accept/ Reject

Figure 3

4.3 Face image classification and decision making:


Synergetic computer are used to classify optical and audio features, respectively. A synergetic computer
is a set of algorithm that simulate synergetic phenomena. In training phase the BIOID creates a prototype
called faceprint for each person. A newly recorded pattern is preprocessed and compared with each
faceprint stored in the database. As comparisons are made, the system assigns a value to the comparison
using a scale of one to ten. If a score is above a predetermined threshold, a match is declared.

From the image of the face, a particular trait is extracted. It may measure various nodal points of
the face like the distance between the eyes ,width of nose etc. it is fed to a synergetic computer which
consists of algorithm to capture, process, compare the sample with the one stored in the database. We can
also track the lip movement which is also fed to the synergetic computer. Observing the likelyhood each of
the samples with the one stored in the database we can accept or reject the sample.

FAC SYNERGETIC
E
EXTRACTION COMPUTER

DECISION

FACE IMAGE STRATEGY

SYNERGETIC
LIP
MOVEMENT COMPUTER

Figure 4
5. HOW FACE RECOGNITION SYSTEMS WORK

Visconics , company based in a New Jersey is one of the many developers of facial recognition
technology. The twist to its particular software, Face it is that it can pick someone's face from the rest of
the scene and compare it to a database full of stored images. In order for this software to work, it has to
know what a basic face looks like.

If you look at the mirror, you can see that your face has certain distinguishable landmarks.
These are the peaks and valleys that make up the different facial features. Visionics defines these landmarks
as nodal points. There are about 80 nodal points on a human face.
Here are few nodal points that are measured by the software.

• distance between the eyes


• width of the nose
• depth of the eye socket
• cheekbones
• jaw line
These nodal points are measured to create a numerical code, a string of numbers that
represents a face in the database. This code is called faceprint. Only 14 to 22 nodal points are needed for
faceit software to complete the recognition process.

Figure 5
6. THE SOFTWARE

Facial recognition software falls into a larger group of technologies known as biometrics. Facial
recognition methods may vary, but they generally involve a series of steps that serve to capture, analyze and
compare your face to a database of stored images. Here is the basic process that is used by the Faceit system
to capture and compare images:

6.1 Detection

When the system is attached to a video surveillance system, the recognition software searches the field of
view of a video camera for faces. If there is a face in the view, it is detected within a fraction of a second. A
multi-scale algorithm is used to search for faces in low resolution. (An algorithm is a program that provides
a set of instructions to accomplish a specific task). The system switches to a high-resolution search only
after a head-like shape is detected.

6.2 Alignment

Once a face is detected, the system determines the head's position, size and pose.
A face needs to be turned at least 35 degrees toward the camera for the system to register it.

6.3 Normalization
The image of the head is scaled and rotated so that it can be registered and mapped into an appropriate
size and pose. Normalization is performed regardless of the head's location and distance from the camera.
Light does not impact the normalization process.

6.4 Representation

The system translates the facial data into a unique code. This coding process allows for easier comparison
of the newly acquired facial data to stored facial data.
6.5 Matching

The newly acquired facial data is compared to the stored data and (ideally) linked to at least one stored
facial representation. The heart of the FaceIt facial recognition system is the Local Feature Analysis (LFA)
algorithm. This is the mathematical technique the system uses to encode faces. The system maps the face
and creates a faceprint, a unique numerical code for that face. Once the system has stored a faceprint, it can
compare it to the thousands or millions of faceprints stored in a database. Each faceprint is stored as an 84-
byte file. Using facial recognition software, police can zoom in with cameras and take a snapshot of a face.

The system can match multiple faceprints at a rate of 60 million per minute from memory or 15
million per minute from hard disk. As comparisons are made, the system assigns a value to the comparison
using a scale of one to 10. If a score is above a predetermined threshold, a match is declared. The operator
then views the two photos that have been declared a match to be certain that the computer is accurate.
7. SYSTEM ANALYSIS

Existing System:

▪ Face recognition is a form of artificial intelligence (AI) that mimics a human capability to recognize
human faces.

▪ Just like when a human recognizes a face, facial recognition software captures facial features and
creates a pattern of facial features which it uses to identify or group a face.

Disadvantages of existing system :

▪ Privacy Concerns: Widespread use of facial recognition in public spaces raises concerns about
constant surveillance and the potential for misuse.

▪ Security Risks: Storing facial data poses a risk of unauthorized access and potential breaches.

Proposed System :

A proposed facial recognition system could aim to address the disadvantages of existing systems and
leverage advancements in technology

Advantages of proposed system :

▪ Improved Accuracy: Advanced Algorithms: Utilize state-of-the-art deep learning techniques, neural
networks, and improved feature extraction methods to enhance accuracy.

▪ Privacy Measures : Privacy by Design: Integrate privacy features into the system design, such as
on-device processing to minimize the need for data transfer and storage.

▪ Security Enhancements: Integrate facial recognition as part of a multi-factor authentication system


to enhance overall security.
8. APPLICATIONS

The natural use of face recognition technology is the replacement of PIN, physical tokens or
both needed in automatic authorization or identification schemes. Additional uses are automation of human
identification or role authentication in such cases where assistance of another human needed in verifying the
ID cards and its beholder.

There are numerous applications for face recognition technology:

8.1 Government Use

a. Law Enforcement: Minimizing victim trauma by narrowing mugshot searches, verifying Identify for court
records, and comparing school surveillance camera images to know child molesters.
b. Security/Counterterrorism. Access control, comparing surveillance images to Know terrorist.
c. Immigration: Rapid progression through Customs.

8.2 Commercial Use

a. Day Care: Verify identity of individuals picking up the children.


b. Residential Security: Alert homeowners of approaching personnel
c. Voter verification: Where eligible politicians are required to verify their identity during a voting process
this is intended to stop ‘proxy’ voting where the vote may not go as expected.
d. Banking using ATM: The software is able to quickly verify a customer’s face.
Physical access control of buildings areas, doors, cars or net access
9. ADVANTAGES AND DISADVANTAGES

9.1 Advantages:

a. Face recognition is easy to use and in many cases it can be performed without a Person even knowing.
b. Face recognition is also one of the most inexpensive biometric in the market an Its price should continue to go
down.

c. There are many benefits to face recognition systems such as its convinence and Social acceptability.all you
need is your picturetaken for it to work.

9.2 Disadvantages:

a. Face recognition systems can’t tell the difference between identical twins.
b. Violation of privacy rights
10. CONCLUSION

Face recognition technologies have been associated generally with very costly top secure
applications. Today the core technologies have evolved and the cost of equipments is going down
dramatically due to the intergration and the increasing processing power. Certain applications of face
recognition technology are now cost effective, reliable and highly accurate. As a result there are no Facial
recognition technology represents a powerful tool with diverse applications across various industries. Its
ability to accurately identify and verify individuals based on facial features has led to advancements in
security, user authentication, healthcare, retail.
11.REFERENCES

[1] Al-Kawaz, H., Clarke, N., Furnell, S., Li, F., & Alruban, A. (2018, June). Advanced facial recognition for
digital forensics. In Proceedings of the 17th European Conference on InformationWarfare and Security. ECCWS

[2] Amato, G., Carrara, F., Falchi, F., Gennaro, C., & Vairo, C. (2018, October). Facial-based intrusion detection
system with deep learning in embedded devices. In Proceedings of the 2018 International Conference on
Sensors, Signal and Image Processing (pp. 64-68). https://dl.acm.org/doi/pdf/10.1145/3290589.3290598

[3] (IoT) Applications. Advanced Engineering Materials, 21(7),


1900043.https://repository.kaust.edu.sa/bitstream/handle/10754/652447/Main%20Article.pdf?sequenc
e=1&isAllowed=y

[4] Grubb, B. 2018. "Facial Recognition's Ominous Rise: Are We Going Too Far Too Fast?"
Sydney Morning Herald, January 3. https://www.smh.com.au/technology/facial-recognitions-ominous-rise-arwe-
going-too-far-too-fast-20180103-py.

[5]Hartzog and Selinger. 2018. "Facial Recognition is the Perfect Tool for Oppression."
Medium, August 3,
https://medium.com/s/story/facial-recognition-is-the-perfect-tool-for-oppression-
bc2a07888.

You might also like