SlideShare a Scribd company logo
1 of 35
Design Seminar
                                  on
          HUMAN FACE IDENTIFICATION
            Submitted for partial fulfillment of the degree of
                        Bachelor of Engineering
                                   BY
     1.Vishal Dhote                                    2.Bhupesh Lahare
     3.Akash Bonde                                     4.Shrinath Wadyalkar
                            5.Nidhi Meshram
                              7th Semester
                    Department of Information Technology




Er.C.D.Bawankar              Er. Ashvini Kheole            Prof. S. V. Sonekar
  Project Guide               Project Incharge              HOD(CSE/IT)

                  Department of Information Technology,
            J D College of Engineering & Management, Nagpur.
          Rashtrasant Tukdoji Maharaj Nagpur University, Nagpur.
                            Session: 2012-2013
Contents:
 Aim
 Objective
 Literature Survey
         -Problem Definition
   Research Methodology
   Software Requirements
   Hardware Requirements
   Limitations
   Result
   Conclusion
   Bibliography
Aim:
 Face recognize that works under varying poses.
 Importance of faces




 Central role in human interactions
 Communicate a wealth of social information:
   Age, gender, personal identity (physical structure)

   Mood and emotional state (facial expression)
Objective
 Develope a computational model.
 Why face recognition?
        To apply it to wide area of problems.
            1)Criminal Identification
            2)Security
            3)Image and Film Processing
Literature Survey:
1. Avinash Kaushal1, J P S Raina, A., “Face Detection using
   Eigenface method ,Gabor Wavelet Transform”, IJCST Vol. 1,
   Iss ue 1, September 2010 I S S N : 0 9 7 6 - 8 4 9 1
   Eigenface method, template matching, graph matching,
   method. The eigenface approach applies the Karhonen-Loeve
   transform for feature extraction. It greatly reduces the facial
   feature dimension and yet maintains reasonable discriminating
   power.
2. Steve Lawrence , Lee Giles “Face Recognition: A
   Convolutional Eigenface method “ IEEE Transactions on
   special issue on Pattern Recognition. vol.3, no110, 2009
   Eigenface method, though some variants of the algorithm work
   on feature extraction as well, mainly provides sophisticated
   modeling scheme for estimating likelihood densities in the
   pattern recognition phase.
Problem Definition :

 To retrieve the similar images(based on a heuristic)
  from the given database of face images.
 It used to take much time to find any criminals
 Not very much accurate.
 Danger of losing the files in some case.
Research Methodology:
 Eigen face method is based on an information theory
  approach that decomposes face images into a small set
  of characteristic feature images called eigenfaces.
• Recognition is performed by projecting a new image
  into the subspace[3].
Process Flow Diagram:
                                         Start

                                         Login

                                    Authentication




                                       Valid User
                                                                       Invalid User

                                      Main Screen




   Add Image   Clip Image     Update Details         Construct Image   Search Process

  Enter          Make Clips    Open Record           Specify Feature
                                                                       Search Image &
  Details                       & Update
                                                                         Get Details

   Add to      Add Clips to      Add to                  Search
                                                                            Result
  Database     Database         database                 Image


                                               End
Context Flow Diagram:
               EYE WITNESS




                   FACE
   OPERATOR   IDENTIFICATION   CRIMINAL
                  SYSTEM         FACE
Login Process:

             PROCESS
   LOGIN                    SCREEN




                 ERROR IN
                  INPUT




             LEVEL-0
Main Screen Process:


               MAIN
   OPERATOR   SCREEN      ADD IMAGE


                           SEARCH
                            IMAGE


                          CLIP IMAGE


                          CONSTRUCT
                            IMAGE



                LEVEL-1
Add Image Process:


                        DATABASE



                ADD
   OPERATOR   PROCESS         DATA IS
                              ADDED




               ERROR




              LEVEL-2
Construct Image:
              DATABASE        HAIR


                            FOREHEAD



INSTRUCTION                   EYES
                                       FACE


                              NOSE



                              LIPS




                         LEVEL-3
Clipping Process:

  DATABASE              DATABASE
               EYES


               NOSE

    FACE                FACE

               HAIR


             FOREHEAD




             LEVEL-4
Clipping Process:
Update Process:


                        DATABASE




              UPDATE                DATA
   OPERATOR
              PROCESS              UPDATED




               LEVEL-5
Screenshot
    Face Identification Main Screen: LOGIN
Screenshot
    Face Identification Main Screen: File
Screenshot
    Face Identification Main Screen: File
Screenshot
    Face Identification Main Screen: File
Screenshot
    Face Identification Main Screen: File
Screenshot
    Face Identification Main Screen: File
Screenshot
    Face Identification Main Screen: EDIT
Screenshot
    Face Identification Main Screen: EDIT
Screenshot
Face Identification Main Screen: IDENTIFICATION
Screenshot
Face Identification Main Screen: IDENTIFICATION
Screenshot
Face Identification Main Screen: IDENTIFICATION
Screenshot
    Face Identification Main Screen: HELP
Software Requirements:
 Language         : VB.Net
 Operating System : Windows
 Database          : SQL Server 2005
Hardware Requirements:
 Processor : Processor with 400 Mhz.
 Hard disk : 1 GB hard disk.
 RAM      : 256MB
 Mouse    : MS mouse or compatible.
 Keyboard : standard 101 or 102 Keys.
Limitations:
 Face Recognition Is Not Perfect And Struggles To
 Perform Under Certain Conditions.
 1. Poor Lighting
 2.Other Objects Partially Covering The Subject’s
    Face.
 3.Low Resolution Images.
 4.It is not platform independent
Result:
 Thus we have reduced the problem of matching faces
  with previous applications.

 This application will find the approximate match of
  human face at various angles.
Conclusion:
 A face recognition system must be able to recognize a
    face in many different imaging situations.

 It will find faces efficiently without exhaustively
  searching the image.

 Face recognition systems are going to have
  widespread application in smart environments.

.
Bibliography:
[1] Avinash Kaushal1, J P S Raina, A., “Face Detection using Neural
Network & Gabor Wavelet Transform”, IJCST Vol. 1, Iss ue 1,
September 2010 I S S N : 0 9 7 6 - 8 4 9 1
[2]Steve Lawrence , Lee Giles “Face Recognition: A Convolutional
Neural Network Approach “ IEEE Transactions on Neural Networks,
Special Issue on Neural Networks and Pattern Recognition. vol.3,
no110, 2009
[3] Parvinder S. Sandhu, Iqbaldeep Kaur, “Face Recognition Using
Eigen face Coefficients and Principal Component Analysis”,
International Journal of Electrical and Electronics Engineering 3:8
2009 ISSN 0978-9481
[4] Stan Z. Li and Juwei Lu., “Face Recognition Using the Nearest
Feature Line Method” , IEEE TRANSACTIONS ON NEURAL
NETWORKS, VOL. 10, NO. 2, MARCH 1999 pp-439-443
[5] S. T. Gandhe, K. T. Talele, and A.G.Keskar “Face Recognition
Using Contour Matching” IAENG International Journal of Computer
Science, 35:2, IJCS_35_2_06
Thank You

More Related Content

What's hot

Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhavVaibhav P
 
Detection and recognition of face using neural network
Detection and recognition of face using neural networkDetection and recognition of face using neural network
Detection and recognition of face using neural networkSmriti Tikoo
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYJASHU JASWANTH
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShravan Halankar
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition SystemZara Tariq
 
Emotion recognition using image processing in deep learning
Emotion recognition using image     processing in deep learningEmotion recognition using image     processing in deep learning
Emotion recognition using image processing in deep learningvishnuv43
 
Image pre processing - local processing
Image pre processing - local processingImage pre processing - local processing
Image pre processing - local processingAshish Kumar
 
Face detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedFace detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedSantu Chall
 
AGE AND GENDER DETECTION.pptx
AGE AND GENDER DETECTION.pptxAGE AND GENDER DETECTION.pptx
AGE AND GENDER DETECTION.pptxssuserb4a9ba
 
Application of edge detection
Application of edge detectionApplication of edge detection
Application of edge detectionNaresh Biloniya
 
Face recognition using neural network
Face recognition using neural networkFace recognition using neural network
Face recognition using neural networkIndira Nayak
 
Matlab Image Restoration Techniques
Matlab Image Restoration TechniquesMatlab Image Restoration Techniques
Matlab Image Restoration TechniquesDataminingTools Inc
 
Facial expression recognition projc 2 (3) (1)
Facial expression recognition projc 2 (3) (1)Facial expression recognition projc 2 (3) (1)
Facial expression recognition projc 2 (3) (1)AbhiAchalla
 
Project Face Detection
Project Face Detection Project Face Detection
Project Face Detection Abu Saleh Musa
 
Seminar Report on image compression
Seminar Report on image compressionSeminar Report on image compression
Seminar Report on image compressionPradip Kumar
 
Facial recognition powerpoint
Facial recognition powerpointFacial recognition powerpoint
Facial recognition powerpoint12206695
 

What's hot (20)

Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
Detection and recognition of face using neural network
Detection and recognition of face using neural networkDetection and recognition of face using neural network
Detection and recognition of face using neural network
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
 
Face Detection
Face DetectionFace Detection
Face Detection
 
Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
 
Emotion recognition using image processing in deep learning
Emotion recognition using image     processing in deep learningEmotion recognition using image     processing in deep learning
Emotion recognition using image processing in deep learning
 
Image pre processing - local processing
Image pre processing - local processingImage pre processing - local processing
Image pre processing - local processing
 
Face detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedFace detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 edited
 
AGE AND GENDER DETECTION.pptx
AGE AND GENDER DETECTION.pptxAGE AND GENDER DETECTION.pptx
AGE AND GENDER DETECTION.pptx
 
Application of edge detection
Application of edge detectionApplication of edge detection
Application of edge detection
 
Face recognition using neural network
Face recognition using neural networkFace recognition using neural network
Face recognition using neural network
 
Matlab Image Restoration Techniques
Matlab Image Restoration TechniquesMatlab Image Restoration Techniques
Matlab Image Restoration Techniques
 
Facial expression recognition projc 2 (3) (1)
Facial expression recognition projc 2 (3) (1)Facial expression recognition projc 2 (3) (1)
Facial expression recognition projc 2 (3) (1)
 
Project Face Detection
Project Face Detection Project Face Detection
Project Face Detection
 
Seminar Report on image compression
Seminar Report on image compressionSeminar Report on image compression
Seminar Report on image compression
 
Face detection
Face detectionFace detection
Face detection
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Facial recognition powerpoint
Facial recognition powerpointFacial recognition powerpoint
Facial recognition powerpoint
 

Viewers also liked

Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 
Face detection and recognition
Face detection and recognitionFace detection and recognition
Face detection and recognitionDerek Budde
 
Data Flow Diagram (DFD)
Data Flow Diagram (DFD)Data Flow Diagram (DFD)
Data Flow Diagram (DFD)sadique_ghitm
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyAgrani Rastogi
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition systemDivya Sushma
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
Human Face Identification
Human Face IdentificationHuman Face Identification
Human Face Identificationbhupesh lahare
 
Review of Literature for Oyster Mushroom
Review of Literature for Oyster MushroomReview of Literature for Oyster Mushroom
Review of Literature for Oyster MushroomChandran Rn
 
Face recognition
Face recognitionFace recognition
Face recognitionNaman Ahuja
 
Face detection system
Face detection systemFace detection system
Face detection systemAkshay Surve
 
Face recognition
Face recognitionFace recognition
Face recognitionbharath55
 
Brain Finger Printing
Brain Finger PrintingBrain Finger Printing
Brain Finger PrintingGarima Singh
 
Face Detection Using MATLAB (SUD)
Face Detection Using MATLAB (SUD)Face Detection Using MATLAB (SUD)
Face Detection Using MATLAB (SUD)Sudhanshu Saxena
 
Face Detection
Face DetectionFace Detection
Face DetectionAmr Sheta
 
Real-time Face Recognition & Detection Systems 1
Real-time Face Recognition & Detection Systems 1Real-time Face Recognition & Detection Systems 1
Real-time Face Recognition & Detection Systems 1Suvadip Shome
 
Wallace tree multiplier
Wallace tree multiplierWallace tree multiplier
Wallace tree multiplierSudhir Kumar
 
Active Suspension System
Active Suspension SystemActive Suspension System
Active Suspension SystemBehzad Samadi
 
A Report on Bidirectional Visitor Counter using IR sensors and Arduino Uno R3
A Report on Bidirectional Visitor Counter using IR sensors and Arduino Uno R3A Report on Bidirectional Visitor Counter using IR sensors and Arduino Uno R3
A Report on Bidirectional Visitor Counter using IR sensors and Arduino Uno R3Abhishekvb
 

Viewers also liked (20)

Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Face detection and recognition
Face detection and recognitionFace detection and recognition
Face detection and recognition
 
Data Flow Diagram (DFD)
Data Flow Diagram (DFD)Data Flow Diagram (DFD)
Data Flow Diagram (DFD)
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
face recognition
face recognitionface recognition
face recognition
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Human Face Identification
Human Face IdentificationHuman Face Identification
Human Face Identification
 
Review of Literature for Oyster Mushroom
Review of Literature for Oyster MushroomReview of Literature for Oyster Mushroom
Review of Literature for Oyster Mushroom
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face detection system
Face detection systemFace detection system
Face detection system
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Brain Finger Printing
Brain Finger PrintingBrain Finger Printing
Brain Finger Printing
 
Face Detection Using MATLAB (SUD)
Face Detection Using MATLAB (SUD)Face Detection Using MATLAB (SUD)
Face Detection Using MATLAB (SUD)
 
Face Detection
Face DetectionFace Detection
Face Detection
 
Real-time Face Recognition & Detection Systems 1
Real-time Face Recognition & Detection Systems 1Real-time Face Recognition & Detection Systems 1
Real-time Face Recognition & Detection Systems 1
 
Wallace tree multiplier
Wallace tree multiplierWallace tree multiplier
Wallace tree multiplier
 
Active Suspension System
Active Suspension SystemActive Suspension System
Active Suspension System
 
A Report on Bidirectional Visitor Counter using IR sensors and Arduino Uno R3
A Report on Bidirectional Visitor Counter using IR sensors and Arduino Uno R3A Report on Bidirectional Visitor Counter using IR sensors and Arduino Uno R3
A Report on Bidirectional Visitor Counter using IR sensors and Arduino Uno R3
 
Sniffer ppt
Sniffer pptSniffer ppt
Sniffer ppt
 

Similar to HUMAN FACE IDENTIFICATION

Cloud computing for agent based urban transportation system vinayss
Cloud computing for agent based urban transportation system vinayssCloud computing for agent based urban transportation system vinayss
Cloud computing for agent based urban transportation system vinayssVinay Sirivara
 
Attendance System using Facial Recognition
Attendance System using Facial RecognitionAttendance System using Facial Recognition
Attendance System using Facial RecognitionIRJET Journal
 
Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsScalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsIEEEFINALYEARPROJECTS
 
JAVA 2013 IEEE IMAGEPROCESSING PROJECT Scalable face image retrieval using at...
JAVA 2013 IEEE IMAGEPROCESSING PROJECT Scalable face image retrieval using at...JAVA 2013 IEEE IMAGEPROCESSING PROJECT Scalable face image retrieval using at...
JAVA 2013 IEEE IMAGEPROCESSING PROJECT Scalable face image retrieval using at...IEEEGLOBALSOFTTECHNOLOGIES
 
Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsScalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsIEEEFINALYEARPROJECTS
 
Report face recognition : ArganRecogn
Report face recognition :  ArganRecognReport face recognition :  ArganRecogn
Report face recognition : ArganRecognIlyas CHAOUA
 
A Neural Network Approach to Deep-Fake Video Detection
A Neural Network Approach to Deep-Fake Video DetectionA Neural Network Approach to Deep-Fake Video Detection
A Neural Network Approach to Deep-Fake Video DetectionIRJET Journal
 
FACE RECOGNITION ATTENDANCE SYSTEM (1) (1).pptx
FACE RECOGNITION ATTENDANCE SYSTEM (1) (1).pptxFACE RECOGNITION ATTENDANCE SYSTEM (1) (1).pptx
FACE RECOGNITION ATTENDANCE SYSTEM (1) (1).pptxkhushiGond2
 
Face Recognition Home Security System
Face Recognition Home Security SystemFace Recognition Home Security System
Face Recognition Home Security SystemSuman Mia
 
DEEPFAKE DETECTION TECHNIQUES: A REVIEW
DEEPFAKE DETECTION TECHNIQUES: A REVIEWDEEPFAKE DETECTION TECHNIQUES: A REVIEW
DEEPFAKE DETECTION TECHNIQUES: A REVIEWvivatechijri
 
computer vision and face recognition
 computer vision and face recognition computer vision and face recognition
computer vision and face recognitionhananhelal
 
Face recognition for augmented reality and media management.Viewdle.2011.
Face recognition for augmented reality and media management.Viewdle.2011.Face recognition for augmented reality and media management.Viewdle.2011.
Face recognition for augmented reality and media management.Viewdle.2011.Alexa Dovgopolaya
 
YU JIANGANG
YU JIANGANGYU JIANGANG
YU JIANGANGbutest
 
Marking Human Labeled Training Facial Images Searching and Utilizing Annotati...
Marking Human Labeled Training Facial Images Searching and Utilizing Annotati...Marking Human Labeled Training Facial Images Searching and Utilizing Annotati...
Marking Human Labeled Training Facial Images Searching and Utilizing Annotati...IRJET Journal
 
Deepfake detection
Deepfake detection Deepfake detection
Deepfake detection Weverify
 
Deepfake Detection: The Importance of Training Data Preprocessing and Practic...
Deepfake Detection: The Importance of Training Data Preprocessing and Practic...Deepfake Detection: The Importance of Training Data Preprocessing and Practic...
Deepfake Detection: The Importance of Training Data Preprocessing and Practic...Symeon Papadopoulos
 
Deepfake detection
Deepfake detectionDeepfake detection
Deepfake detectionWeverify
 
Proposal -co_win_india_valardigital-converted
Proposal  -co_win_india_valardigital-convertedProposal  -co_win_india_valardigital-converted
Proposal -co_win_india_valardigital-convertedUpendraSharma53
 

Similar to HUMAN FACE IDENTIFICATION (20)

Cloud computing for agent based urban transportation system vinayss
Cloud computing for agent based urban transportation system vinayssCloud computing for agent based urban transportation system vinayss
Cloud computing for agent based urban transportation system vinayss
 
iConference
iConferenceiConference
iConference
 
Attendance System using Facial Recognition
Attendance System using Facial RecognitionAttendance System using Facial Recognition
Attendance System using Facial Recognition
 
Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsScalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewords
 
JAVA 2013 IEEE IMAGEPROCESSING PROJECT Scalable face image retrieval using at...
JAVA 2013 IEEE IMAGEPROCESSING PROJECT Scalable face image retrieval using at...JAVA 2013 IEEE IMAGEPROCESSING PROJECT Scalable face image retrieval using at...
JAVA 2013 IEEE IMAGEPROCESSING PROJECT Scalable face image retrieval using at...
 
Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsScalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewords
 
Report face recognition : ArganRecogn
Report face recognition :  ArganRecognReport face recognition :  ArganRecogn
Report face recognition : ArganRecogn
 
A Neural Network Approach to Deep-Fake Video Detection
A Neural Network Approach to Deep-Fake Video DetectionA Neural Network Approach to Deep-Fake Video Detection
A Neural Network Approach to Deep-Fake Video Detection
 
FACE RECOGNITION ATTENDANCE SYSTEM (1) (1).pptx
FACE RECOGNITION ATTENDANCE SYSTEM (1) (1).pptxFACE RECOGNITION ATTENDANCE SYSTEM (1) (1).pptx
FACE RECOGNITION ATTENDANCE SYSTEM (1) (1).pptx
 
Face Recognition Home Security System
Face Recognition Home Security SystemFace Recognition Home Security System
Face Recognition Home Security System
 
DEEPFAKE DETECTION TECHNIQUES: A REVIEW
DEEPFAKE DETECTION TECHNIQUES: A REVIEWDEEPFAKE DETECTION TECHNIQUES: A REVIEW
DEEPFAKE DETECTION TECHNIQUES: A REVIEW
 
computer vision and face recognition
 computer vision and face recognition computer vision and face recognition
computer vision and face recognition
 
Face recognition for augmented reality and media management.Viewdle.2011.
Face recognition for augmented reality and media management.Viewdle.2011.Face recognition for augmented reality and media management.Viewdle.2011.
Face recognition for augmented reality and media management.Viewdle.2011.
 
YU JIANGANG
YU JIANGANGYU JIANGANG
YU JIANGANG
 
Marking Human Labeled Training Facial Images Searching and Utilizing Annotati...
Marking Human Labeled Training Facial Images Searching and Utilizing Annotati...Marking Human Labeled Training Facial Images Searching and Utilizing Annotati...
Marking Human Labeled Training Facial Images Searching and Utilizing Annotati...
 
Deepfake detection
Deepfake detection Deepfake detection
Deepfake detection
 
Deepfake Detection: The Importance of Training Data Preprocessing and Practic...
Deepfake Detection: The Importance of Training Data Preprocessing and Practic...Deepfake Detection: The Importance of Training Data Preprocessing and Practic...
Deepfake Detection: The Importance of Training Data Preprocessing and Practic...
 
Deepfake detection
Deepfake detectionDeepfake detection
Deepfake detection
 
A guide to Face Detection in Python.pdf
A guide to Face Detection in Python.pdfA guide to Face Detection in Python.pdf
A guide to Face Detection in Python.pdf
 
Proposal -co_win_india_valardigital-converted
Proposal  -co_win_india_valardigital-convertedProposal  -co_win_india_valardigital-converted
Proposal -co_win_india_valardigital-converted
 

Recently uploaded

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 

Recently uploaded (20)

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

HUMAN FACE IDENTIFICATION

  • 1. Design Seminar on HUMAN FACE IDENTIFICATION Submitted for partial fulfillment of the degree of Bachelor of Engineering BY 1.Vishal Dhote 2.Bhupesh Lahare 3.Akash Bonde 4.Shrinath Wadyalkar 5.Nidhi Meshram 7th Semester Department of Information Technology Er.C.D.Bawankar Er. Ashvini Kheole Prof. S. V. Sonekar Project Guide Project Incharge HOD(CSE/IT) Department of Information Technology, J D College of Engineering & Management, Nagpur. Rashtrasant Tukdoji Maharaj Nagpur University, Nagpur. Session: 2012-2013
  • 2. Contents:  Aim  Objective  Literature Survey -Problem Definition  Research Methodology  Software Requirements  Hardware Requirements  Limitations  Result  Conclusion  Bibliography
  • 3. Aim:  Face recognize that works under varying poses.  Importance of faces  Central role in human interactions  Communicate a wealth of social information:  Age, gender, personal identity (physical structure)  Mood and emotional state (facial expression)
  • 4. Objective  Develope a computational model.  Why face recognition? To apply it to wide area of problems. 1)Criminal Identification 2)Security 3)Image and Film Processing
  • 5. Literature Survey: 1. Avinash Kaushal1, J P S Raina, A., “Face Detection using Eigenface method ,Gabor Wavelet Transform”, IJCST Vol. 1, Iss ue 1, September 2010 I S S N : 0 9 7 6 - 8 4 9 1 Eigenface method, template matching, graph matching, method. The eigenface approach applies the Karhonen-Loeve transform for feature extraction. It greatly reduces the facial feature dimension and yet maintains reasonable discriminating power. 2. Steve Lawrence , Lee Giles “Face Recognition: A Convolutional Eigenface method “ IEEE Transactions on special issue on Pattern Recognition. vol.3, no110, 2009 Eigenface method, though some variants of the algorithm work on feature extraction as well, mainly provides sophisticated modeling scheme for estimating likelihood densities in the pattern recognition phase.
  • 6. Problem Definition :  To retrieve the similar images(based on a heuristic) from the given database of face images.  It used to take much time to find any criminals  Not very much accurate.  Danger of losing the files in some case.
  • 7. Research Methodology:  Eigen face method is based on an information theory approach that decomposes face images into a small set of characteristic feature images called eigenfaces. • Recognition is performed by projecting a new image into the subspace[3].
  • 8. Process Flow Diagram: Start Login Authentication Valid User Invalid User Main Screen Add Image Clip Image Update Details Construct Image Search Process Enter Make Clips Open Record Specify Feature Search Image & Details & Update Get Details Add to Add Clips to Add to Search Result Database Database database Image End
  • 9. Context Flow Diagram: EYE WITNESS FACE OPERATOR IDENTIFICATION CRIMINAL SYSTEM FACE
  • 10. Login Process: PROCESS LOGIN SCREEN ERROR IN INPUT LEVEL-0
  • 11. Main Screen Process: MAIN OPERATOR SCREEN ADD IMAGE SEARCH IMAGE CLIP IMAGE CONSTRUCT IMAGE LEVEL-1
  • 12. Add Image Process: DATABASE ADD OPERATOR PROCESS DATA IS ADDED ERROR LEVEL-2
  • 13. Construct Image: DATABASE HAIR FOREHEAD INSTRUCTION EYES FACE NOSE LIPS LEVEL-3
  • 14. Clipping Process: DATABASE DATABASE EYES NOSE FACE FACE HAIR FOREHEAD LEVEL-4
  • 16. Update Process: DATABASE UPDATE DATA OPERATOR PROCESS UPDATED LEVEL-5
  • 17. Screenshot Face Identification Main Screen: LOGIN
  • 18. Screenshot Face Identification Main Screen: File
  • 19. Screenshot Face Identification Main Screen: File
  • 20. Screenshot Face Identification Main Screen: File
  • 21. Screenshot Face Identification Main Screen: File
  • 22. Screenshot Face Identification Main Screen: File
  • 23. Screenshot Face Identification Main Screen: EDIT
  • 24. Screenshot Face Identification Main Screen: EDIT
  • 25. Screenshot Face Identification Main Screen: IDENTIFICATION
  • 26. Screenshot Face Identification Main Screen: IDENTIFICATION
  • 27. Screenshot Face Identification Main Screen: IDENTIFICATION
  • 28. Screenshot Face Identification Main Screen: HELP
  • 29. Software Requirements:  Language : VB.Net  Operating System : Windows  Database : SQL Server 2005
  • 30. Hardware Requirements:  Processor : Processor with 400 Mhz.  Hard disk : 1 GB hard disk.  RAM : 256MB  Mouse : MS mouse or compatible.  Keyboard : standard 101 or 102 Keys.
  • 31. Limitations:  Face Recognition Is Not Perfect And Struggles To Perform Under Certain Conditions. 1. Poor Lighting 2.Other Objects Partially Covering The Subject’s Face. 3.Low Resolution Images. 4.It is not platform independent
  • 32. Result:  Thus we have reduced the problem of matching faces with previous applications.  This application will find the approximate match of human face at various angles.
  • 33. Conclusion:  A face recognition system must be able to recognize a face in many different imaging situations.  It will find faces efficiently without exhaustively searching the image.  Face recognition systems are going to have widespread application in smart environments. .
  • 34. Bibliography: [1] Avinash Kaushal1, J P S Raina, A., “Face Detection using Neural Network & Gabor Wavelet Transform”, IJCST Vol. 1, Iss ue 1, September 2010 I S S N : 0 9 7 6 - 8 4 9 1 [2]Steve Lawrence , Lee Giles “Face Recognition: A Convolutional Neural Network Approach “ IEEE Transactions on Neural Networks, Special Issue on Neural Networks and Pattern Recognition. vol.3, no110, 2009 [3] Parvinder S. Sandhu, Iqbaldeep Kaur, “Face Recognition Using Eigen face Coefficients and Principal Component Analysis”, International Journal of Electrical and Electronics Engineering 3:8 2009 ISSN 0978-9481 [4] Stan Z. Li and Juwei Lu., “Face Recognition Using the Nearest Feature Line Method” , IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 10, NO. 2, MARCH 1999 pp-439-443 [5] S. T. Gandhe, K. T. Talele, and A.G.Keskar “Face Recognition Using Contour Matching” IAENG International Journal of Computer Science, 35:2, IJCS_35_2_06