Face Recognition by Sumudu Ranasinghe
Upcoming SlideShare
Loading in...5
×
 

Face Recognition by Sumudu Ranasinghe

on

  • 2,398 views

Sumudu Ranasinghe,

Sumudu Ranasinghe,
Uva wellassa University,
www.sumudur.info

Statistics

Views

Total Views
2,398
Views on SlideShare
2,398
Embed Views
0

Actions

Likes
2
Downloads
328
Comments
2

0 Embeds 0

No embeds

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Face Recognition by Sumudu Ranasinghe Face Recognition by Sumudu Ranasinghe Presentation Transcript

  • Research Paper Analysis
    Ranasinghe A.A.S.P
    UWU/IIT/08/033
    Independent Study and Seminar IIT362-1
    Industrial Information Technology
    Uva Wellassa University Of Sri Lanka
  • Presentation Outcomes
    What is face Recognition?
    How facial recognition works ?
    Face detection and recognition.
    Different approaches of face Recognition.
    Feature extraction methods
    Holistic methods
    Hybrid methods
    Problems
    • Applications Available in Market
  • ABSTRACT
    Images play an important role in todays information because A single image represents a thousand words.
    Google's image search, where we can easily search for images using keywords.
    Getting the computer to understand the semantics inside of images isn't easy. The reason for this is simply because the computer isn't able to understand the context.
    But
  • Keywords
    Face Detection
    Face Recognition
  • Introduction
    Face recognition has become a popular area of research in computer vision and one of the most successful applications of image analysis and understanding.
    A set of two task:
    Face Identification: Given a face image that belongs to a person in a database, tell whose image it is.
    Face Verification: Given a face image that might not belong to the database, verify whether it is from the person it is claimed to be in the database.
  • How facial recognition works ?
  • Face Detection + Recognition
    Detection accuracy affects the recognition stage
    Key issues:
    Correct location of key facial features
    (e.g. the eye corners)
    False detection
    Missed detection
  • DIFFERENT APPROACHE
    Describe the different methods of face recognition.
    Feature extraction methods
    Holistic methods
    Hybrid methods
  • Feature extraction methods
    Feature extraction is the task where we locate facial features,
    Eg: the eyes, the nose, and the chins etc.
    This task may be performed after the face detection task Or recognition time.
    big challenge for feature extraction methods is feature “restoration“.
    Facial features are invisible according to the large variation.
  • Feature extraction methods
    This method is widely used to create individual vectors for each person in a system, the vectors are matched when an input image is being recognized.
  • Kanade's approach
  • Holistic methods
    Holistic methods uses the whole face region as the input to a recognition system.
    focuses a holistic method using eigenfacesto recognize still faces.
  • Face Recognition Using Eigenfaces
    The first stage is to insert a set of images into a database, these images are called the training set, this is because they will be used when we compare images and when we create the eigenfaces.
    The second stage is to create the eigenfaces. Eigenfacescan now be extracted from the image data by using a mathematical tool called Principal Component Analysis (PCA).
    When the eigenfaceshave been created, each image will be represented as a vector of weights.
    The system is now ready to accept incoming queries.
  • Face Recognition Using Eigenfaces
    The weight of the incoming unknown image is found and then compared to the weights of those already in the system. If the input image's weight is over a given threshold it is considered to be unknown. The identification of the input image is done by finding the image in the database whose weights are the closest to the weights of the input image. The image in the database with the closest weight will be returned as a hit to the user of the system.
  • Hybrid methods
    Hybrid face recognition systems uses a combination of both holistic and feature extraction methods.
    Hybrid method of face recognition by using 3D morphable model. The model makes it possible to change the pose and the illumination on the face.
  • 3D morphablemodel
    Took face recognition to a new level. By being able to use a morphable3D model to create synthetic images has proven to give good results. It is a very applicable approach that solves many of the problems.
    system achieved a recognition rate of 90%.
  • Problems of Face Recognition
    when comparing a database image with an input image. The main concern is of course that all images of the same face are heterogeneous.
    When image databases are created they contain good scenario images.
    concerning deferent facial expressions as well. The system must be able to know that two images of the same person with deferent facial expressions actually is the same person.
    makeup, posing positions, illumination conditions, and comparing images of the same person with and without glasses.
  • Applications Available in Market
    • Face Recognition based Time Attendance System
    • Fastest and safest method of tracking employee time and attendance.
    • Easy to install and use.
    • Cost saving and convenient way of time tracking.
    • Provide easy and efficient way of recording attendance.
    • Easily manage employee time and attendance profiles.
    • Get rid of buddy punching.
    • Also manage employee payroll record.
    • On-demand time attendance record for reference.
    • Easily customizable as per your requirement.
  • Applications Available in Market
    • Access Control System
    • Convenient and secure method of controlling door entry
    • Authentication by Facial Biometrics to gain entry
    • Higher security than conventional systems
    • No keys or cards to carry
    • No need to issue keys or cards for every user
    • Accurate recording of arrivals and departures
    • Real time monitoring of door access
    • Intelligent access control by group or time schedule
  • Applications Available in Market
    • Facial Recognition PC Security
    Logon provides a simple but effective option. The integration of Logon and PC camera provides access only when a live-fed face image of authorized user is detected, thus effectively preventing unauthorized access. Logon is a non-invasive technology that does not require physical contact.
  • Applications Available in Market
    • Face Biometric Login Through Web
    • Embeddable in any web page
    • Global Face Authentication capability
    • Free version available
    • View of authenticated clients
    • Messaging to Clients possible
    • Remote Backup/Restore
    • Google's Picasa
    • Facial Recognition Software in Online Gaming and Crime Prevention
  • CONCLUSION
    • Introduction of face Recognition
    • How facial recognition works.
    • Face detection and recognition.
    • Different approaches of face Recognition.
    • Feature extraction methods
    • Holistic methods
    • Hybrid methods
    • Problems
  • REFERENCES
    W. Bledsoe. Man-machine facial recognition
    J. Huang, B. Heisele, and V. Blanz. Component based face recognition with 3d morphable models. http://citeseer.ist.psu.edu/viewdoc/summary?doi=10.1.1.2.8373
    T. Kanade. Computer Recognition of Human Faces
    M. D. Kelly. Visual identification of people by computer.
    www.inttelix.com - Application of face recognition
  • Thank you