SlideShare a Scribd company logo
1 of 4
GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com 
Face Recognition and Facial Expression Identification using 
PCA 
Abstract: 
The Face being the primary focus of attention in social interaction 
plays a major role in conveying identity and emotion. A facial recognition system 
is a computer application for automatically identifying or verifying a person from a 
digital image. The main aim of this paper is to analyze the method of Principal 
Component Analysis (PCA) and its performance when applied to face Recognition. 
This Algorithm creates a subspace (face space) where faces is represented using a 
reduced number of features called feature vectors. Experimental results that follow 
show that PCA based methods provide better face recognition with reasonably low 
error rates. Principal Component Analysis (PCA) is a classic feature extraction and 
data representation technique widely used in the areas of pattern recognition and 
computer vision. The purpose of PCA is to reduce the large dimensionality data 
space into the smaller dimensionality feature space. This approach is based on the 
concept of eigenfaces, it can locate and track a subject’s face, and then recognize 
the person by comparing the characteristics of the face to those known of
individuals. This algorithm treats face recognition problem considering that fact 
that faces are upright and its characteristic features are used for calculation. Facial 
expression plays an important role in communication between people. Generally 
for the purpose of identifying the expression, features such as the contours of the 
mouth, eyes and eyebrows obtained from eigenfaces are used. From the paper, we 
conclude that PCA is a good technique for face recognition as it is able to identify 
faces fairly well with varying illuminations, facial expression. 
Existing System: 
 In this project, a local sparse representation is existing for face components 
to describe the local structure and characteristics of the face image for face 
verification. 
 The existing pruning algorithm is a technique used in digital image processing 
based on mathematical morphologies. 
 Eigen faces for recognition focused on detecting individual facial features 
only. 
 Neural network is used to create the face database and recognize the face.A 
separate network is built for each person. The input face is projected onto 
the Eigen face space first and gets a new descriptor. 
Disadvantages: 
 Implementation cost too high 
 Limited input 
 Recognizing time too high
Proposed System: 
 In Proposed System we used Principal Component Analysis (PCA) with 
eigenface 
 PCA is first applied to the data set to reduce its dimensionality. Find bases 
which have high variance in data. 
 The main idea of PCA is to find the vectors which best account for the 
distribution of face images within the entire image space. 
 In proposed system face recognition method is fast, reliable and also works 
well in constrained environment. 
 Using haarcascades we can detect the shape of the eyes, nose, cheekbones, 
and jaw. 
Advantages: 
 PCA based method provide better face recognition with reasonably low error 
rates 
 Low-to-high dimensional eigenspace for alignment 
 improve the image reconstruction and recognition performance 
Hardware Requirements:- 
 
SYSTEM : Pentium IV 2.4 GHz 
 
HARD DISK : 40 GB 
 
RAM : 256 MB 
Software Requirements:-
 
Operating System : Windows 7 
 
IDE : Microsoft Visual Studio 2010 
 
Coding Language : C#.NET.

More Related Content

More from IEEEFINALYEARSTUDENTPROJECT

More from IEEEFINALYEARSTUDENTPROJECT (20)

2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...
2014 IEEE JAVA SOFTWARE ENGINEERING PROJECT Automatic summarization of bug re...
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Privacy enhanced web service composi...
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Decentralized enactment of bpel proc...
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm fo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm fo...2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm fo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT A novel time obfuscated algorithm fo...
 
2014 IEEE JAVA DATA MINING PROJECT Web image re ranking using query-specific ...
2014 IEEE JAVA DATA MINING PROJECT Web image re ranking using query-specific ...2014 IEEE JAVA DATA MINING PROJECT Web image re ranking using query-specific ...
2014 IEEE JAVA DATA MINING PROJECT Web image re ranking using query-specific ...
 
2014 IEEE JAVA DATA MINING PROJECT Secure outsourced attribute based signatures
2014 IEEE JAVA DATA MINING PROJECT Secure outsourced attribute based signatures2014 IEEE JAVA DATA MINING PROJECT Secure outsourced attribute based signatures
2014 IEEE JAVA DATA MINING PROJECT Secure outsourced attribute based signatures
 
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
2014 IEEE JAVA DATA MINING PROJECT Privacy preserving and content-protecting ...
 
2014 IEEE JAVA DATA MINING PROJECT Mining weakly labeled web facial images fo...
2014 IEEE JAVA DATA MINING PROJECT Mining weakly labeled web facial images fo...2014 IEEE JAVA DATA MINING PROJECT Mining weakly labeled web facial images fo...
2014 IEEE JAVA DATA MINING PROJECT Mining weakly labeled web facial images fo...
 
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...
2014 IEEE JAVA DATA MINING PROJECT Discovering emerging topics in social stre...
 
2014 IEEE JAVA DATA MINING PROJECT Data mining with big data
2014 IEEE JAVA DATA MINING PROJECT Data mining with big data2014 IEEE JAVA DATA MINING PROJECT Data mining with big data
2014 IEEE JAVA DATA MINING PROJECT Data mining with big data
 
2014 IEEE JAVA DATA MINING PROJECT A probabilistic approach to string transfo...
2014 IEEE JAVA DATA MINING PROJECT A probabilistic approach to string transfo...2014 IEEE JAVA DATA MINING PROJECT A probabilistic approach to string transfo...
2014 IEEE JAVA DATA MINING PROJECT A probabilistic approach to string transfo...
 
2014 IEEE JAVA NETWORKING COMPUTING PROJECT Cost effective resource allocatio...
2014 IEEE JAVA NETWORKING COMPUTING PROJECT Cost effective resource allocatio...2014 IEEE JAVA NETWORKING COMPUTING PROJECT Cost effective resource allocatio...
2014 IEEE JAVA NETWORKING COMPUTING PROJECT Cost effective resource allocatio...
 
2014 IEEE JAVA NETWORKING COMPUTING PROJECT Compact dfa scalable pattern matc...
2014 IEEE JAVA NETWORKING COMPUTING PROJECT Compact dfa scalable pattern matc...2014 IEEE JAVA NETWORKING COMPUTING PROJECT Compact dfa scalable pattern matc...
2014 IEEE JAVA NETWORKING COMPUTING PROJECT Compact dfa scalable pattern matc...
 
2014 IEEE JAVA NETWORKING COMPUTING PROJECT Boundary cutting for packet class...
2014 IEEE JAVA NETWORKING COMPUTING PROJECT Boundary cutting for packet class...2014 IEEE JAVA NETWORKING COMPUTING PROJECT Boundary cutting for packet class...
2014 IEEE JAVA NETWORKING COMPUTING PROJECT Boundary cutting for packet class...
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Tag sense leveraging smartphones for ...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Tag sense leveraging smartphones for ...2014 IEEE JAVA MOBILE COMPUTING PROJECT Tag sense leveraging smartphones for ...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Tag sense leveraging smartphones for ...
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Preserving location privacy in geo so...
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Energy optimum throughput and carrier...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Energy optimum throughput and carrier...2014 IEEE JAVA MOBILE COMPUTING PROJECT Energy optimum throughput and carrier...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Energy optimum throughput and carrier...
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Efficient and privacy aware data aggr...
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Oruta privacy preserving public auditi...
 

Recently uploaded

Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stage
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 

2014 IEEE JAVA IMAGE PROCESSING PROJECT Face recognition and facial expression identification using pca

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com Face Recognition and Facial Expression Identification using PCA Abstract: The Face being the primary focus of attention in social interaction plays a major role in conveying identity and emotion. A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image. The main aim of this paper is to analyze the method of Principal Component Analysis (PCA) and its performance when applied to face Recognition. This Algorithm creates a subspace (face space) where faces is represented using a reduced number of features called feature vectors. Experimental results that follow show that PCA based methods provide better face recognition with reasonably low error rates. Principal Component Analysis (PCA) is a classic feature extraction and data representation technique widely used in the areas of pattern recognition and computer vision. The purpose of PCA is to reduce the large dimensionality data space into the smaller dimensionality feature space. This approach is based on the concept of eigenfaces, it can locate and track a subject’s face, and then recognize the person by comparing the characteristics of the face to those known of
  • 2. individuals. This algorithm treats face recognition problem considering that fact that faces are upright and its characteristic features are used for calculation. Facial expression plays an important role in communication between people. Generally for the purpose of identifying the expression, features such as the contours of the mouth, eyes and eyebrows obtained from eigenfaces are used. From the paper, we conclude that PCA is a good technique for face recognition as it is able to identify faces fairly well with varying illuminations, facial expression. Existing System:  In this project, a local sparse representation is existing for face components to describe the local structure and characteristics of the face image for face verification.  The existing pruning algorithm is a technique used in digital image processing based on mathematical morphologies.  Eigen faces for recognition focused on detecting individual facial features only.  Neural network is used to create the face database and recognize the face.A separate network is built for each person. The input face is projected onto the Eigen face space first and gets a new descriptor. Disadvantages:  Implementation cost too high  Limited input  Recognizing time too high
  • 3. Proposed System:  In Proposed System we used Principal Component Analysis (PCA) with eigenface  PCA is first applied to the data set to reduce its dimensionality. Find bases which have high variance in data.  The main idea of PCA is to find the vectors which best account for the distribution of face images within the entire image space.  In proposed system face recognition method is fast, reliable and also works well in constrained environment.  Using haarcascades we can detect the shape of the eyes, nose, cheekbones, and jaw. Advantages:  PCA based method provide better face recognition with reasonably low error rates  Low-to-high dimensional eigenspace for alignment  improve the image reconstruction and recognition performance Hardware Requirements:-  SYSTEM : Pentium IV 2.4 GHz  HARD DISK : 40 GB  RAM : 256 MB Software Requirements:-
  • 4.  Operating System : Windows 7  IDE : Microsoft Visual Studio 2010  Coding Language : C#.NET.