SlideShare a Scribd company logo
1 of 26
 Face recognition can be defined as the process of
establishing a person’s identity
based on their facial characteristics.
 face can be captured at a longer standoff distance using
non-contact sensors.
 Training a machine to recognize face images exhibiting
such unconstrained intrauser variations is a difficult
task
The underlying mechanism of face perception in
humans has been studied for two purposes:
(a) to design machine recognition systems that can mimic
the human ability to recognize faces
(b) to understand the neurological or psychological
mechanism of brain functions for medical treatment.
Studies using advanced brain imaging techniques such
as functional magnetic resonance imaging (fMRI) are
expected to reveal the precise face processing mechanism
in the human brain.
the facial characteristics can be organized into the
following three levels:
Level 1 details consist of gross facial
characteristics that are easily observable.
Examples include the general geometry of the face
and global skin color.
These features can be extracted even from low
resolution face images < 30 interpupilary distance
(IPD)
Level 2 details consist of localized face
information such as the structure of the face
components (e.g., eyes), the relationship between facial
components and the precise shape of the face.
they require a higher resolution face image (30 to
75 IPD)
Level 3 details consist of unstructured,
micro level features on the face, which includes
scars, freckles, skin discoloration, and moles.
Problem : Level 3 details may be critical is the
discrimination of identical twins
A typical face recognition system is
composed of three modules:
(a) image acquisition,
(b) face detection
(c) face matching
 Automated face recognition requires the face
data to be in a machine readable format.
 Conventional 2D photographs, 3D range or
depth images, and videos are the
three major types of image formats used in
face recognition systems.
 In general, the frontal view of a face contains
more details than a profile view
 Recognition systems based on 2D face images
are also greatly affected by variations in
illumination and spatial resolution.
 To overcome these challenges, new sensors
such as high resolution cameras, active pan-
tilt-zoom (PTZ) cameras, and infrared cameras
are being used.
 A NIR camera can operate even under low
illumination conditions because it uses a
separate NIR illuminator.
 A PTZ camera can dynamically zoom in or zoom
out to obtain close-up images of objects of
interest.
 Multi-camera configurations that capture face
images at multiple pose angles have been used
to address the pose variation problem.
 The inherent pose, expression, and lighting
variation problems in 2D face images
stem from the 2D rendering of a 3D face
object.
 There are two types of 3D face capture
systems:
laser scanning
stereographic reconstruction.
 laser scanners provide more accurate 3D face
models.
 stereographic cameras provide near real-time
capture capability with slight loss in accuracy.
 The image captured by a 3D sensor typically
covers about 120◦ of the human head and this
image is referred to as a 2.5D scan.
 3D face models are usually represented as a
polygonal mesh structure (e.g., triangular or
rectangular) for computational efficiency.
 Thedrawbacks of 3D face acquisition include
longer image acquisition time, the large
data size of the 3D model (which requires
higher computational resources during
matching), and the relatively high price of 3D
imaging sensors.
 A video camera can continuously capture face
images, thereby enabling the selection of a
good quality face image (e.g., one with frontal
pose and neutral expression) for recognition.
 Face recognition in video has attracted interest
due to the widespread deployment of
surveillance cameras.
 Two distinctive pieces of information are
provided by a video stream:
(a)multiple frames of the same subject
(b) temporal information (Dynamic Facial Motion)
pertaining to an individual’s face.
 Face detection methods are typically based on
extracting local texture features from the given
image and applying a binary (two-class)
classifier to distinguish between a face and
non-face.

 The Viola-Jones face detector scans through
the input image with detection windows of
different sizes and decides whether each
window contains a face or not.
 The feature values are obtained by computing
the difference between the sum of the pixel
intensities in the light and dark rectangular
regions.
 2D rectangular filters are similar to the one-
dimensional Haar wavelets used in the signal
processing domain, they are also known as
Haar like filters.
 No single Haar-like filter can perform the face
detection task with high accuracy.
 For instance, more than 180,000 different
Haar-like featurescan be derived from a
detection window of size 24× 24 pixels.
 The computational burden involved in the
computation of these features can be
significantly reduced by pre-computing the
integral image from the original image.
 An integral image S
associated with the given image I can be
computed as follows:

 where I(x,y) is the intensity value of pixel (x,y) in
the original image and S(x,y) is the value of the
corresponding pixel in the integral image.
 Though the integral image allows efficient
computation of the feature values, it does not
reduce the computational complexity to a level
that is sufficient for realtime face detection.
 A variant of the Adaboost algorithm proposed in the
pattern recognition literature can be used to select the
discriminative features as well as to train the classifier
function.
 The feature selection and classifier training algorithm
works as follows. Let f j(w) be the feature value
obtained by applying a filter f j to the detection window
w, j = 1,2,··· ,L, where L is the total number of filters.
The detection window w isparameterized by its
location and size. Each feature value can be used to
constructa weak classifier that predicts whether the
window w is a face image.
 Weak classifier can be defined as
where p j is the sign (+ or -) determining the
direction of the inequality, θ j is the threshold,
and j = 1,2,··· ,L.
 For example, an eye detector can be
constructed by simply replacing the training set
with examples of eye images and non-eye
images.
 the Viola-Jones face detector is not perfect and
can produce both false positive and false
negative errors. A false positive error refers to
the detection of a face where none exists, while
a false negative error indicates that a face
present in the image was not detected.
Face recognition

More Related Content

What's hot

Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition SystemZara Tariq
 
Face recognition system
Face recognition systemFace recognition system
Face recognition systemYogesh Lamture
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1leenak770
 
Face Recognition Techniques
Face Recognition TechniquesFace Recognition Techniques
Face Recognition TechniquesDaksh Verma
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhavVaibhav P
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition systemDivya Sushma
 
Face Recognition
Face Recognition Face Recognition
Face Recognition nialler27
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologySYED HOZAIFA ALI
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYJASHU JASWANTH
 
Face recognization
Face recognizationFace recognization
Face recognizationleenak770
 
Face recognition
Face recognition Face recognition
Face recognition Chandan A V
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyranjit banshpal
 
Computer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and PythonComputer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and PythonAkash Satamkar
 
Face detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedFace detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedSantu Chall
 
Detection and recognition of face using neural network
Detection and recognition of face using neural networkDetection and recognition of face using neural network
Detection and recognition of face using neural networkSmriti Tikoo
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShashidhar Reddy
 

What's hot (20)

Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1
 
Face Recognition Techniques
Face Recognition TechniquesFace Recognition Techniques
Face Recognition Techniques
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
 
Face Recognition
Face Recognition Face Recognition
Face Recognition
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face recognition
Face recognitionFace recognition
Face recognition
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
Face recognization
Face recognizationFace recognization
Face recognization
 
Face recognition
Face recognition Face recognition
Face recognition
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face recognisation system
Face recognisation systemFace recognisation system
Face recognisation system
 
Computer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and PythonComputer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and Python
 
Face recognition
Face recognition Face recognition
Face recognition
 
Face detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedFace detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 edited
 
Detection and recognition of face using neural network
Detection and recognition of face using neural networkDetection and recognition of face using neural network
Detection and recognition of face using neural network
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 

Similar to Face recognition

A novel approach for performance parameter estimation of face recognition bas...
A novel approach for performance parameter estimation of face recognition bas...A novel approach for performance parameter estimation of face recognition bas...
A novel approach for performance parameter estimation of face recognition bas...IJMER
 
Vision based non-invasive tool for facial swelling assessment
Vision based non-invasive tool for facial swelling assessment Vision based non-invasive tool for facial swelling assessment
Vision based non-invasive tool for facial swelling assessment University of Moratuwa
 
F044045052
F044045052F044045052
F044045052inventy
 
Model Based Emotion Detection using Point Clouds
Model Based Emotion Detection using Point CloudsModel Based Emotion Detection using Point Clouds
Model Based Emotion Detection using Point CloudsLakshmi Sarvani Videla
 
An overview of face liveness detection
An overview of face liveness detectionAn overview of face liveness detection
An overview of face liveness detectionijitjournal
 
Realtime human face tracking and recognition system on uncontrolled environment
Realtime human face tracking and recognition system on  uncontrolled environmentRealtime human face tracking and recognition system on  uncontrolled environment
Realtime human face tracking and recognition system on uncontrolled environmentIJECEIAES
 
Face Recognition System under Varying Lighting Conditions
Face Recognition System under Varying Lighting ConditionsFace Recognition System under Varying Lighting Conditions
Face Recognition System under Varying Lighting ConditionsIOSR Journals
 
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...MangaiK4
 
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...MangaiK4
 
Face Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image ProcessingFace Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image Processingpaperpublications3
 
Fake Multi Biometric Detection using Image Quality Assessment
Fake Multi Biometric Detection using Image Quality AssessmentFake Multi Biometric Detection using Image Quality Assessment
Fake Multi Biometric Detection using Image Quality Assessmentijsrd.com
 
Face Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image ProcessingFace Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image Processingpaperpublications3
 
Research and Development of DSP-Based Face Recognition System for Robotic Reh...
Research and Development of DSP-Based Face Recognition System for Robotic Reh...Research and Development of DSP-Based Face Recognition System for Robotic Reh...
Research and Development of DSP-Based Face Recognition System for Robotic Reh...IJCSES Journal
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognitionMazin Alwaaly
 
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptxReview A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptxAravindHari22
 
IRJET- Face Spoof Detection using Machine Learning with Colour Features
IRJET-  	  Face Spoof Detection using Machine Learning with Colour FeaturesIRJET-  	  Face Spoof Detection using Machine Learning with Colour Features
IRJET- Face Spoof Detection using Machine Learning with Colour FeaturesIRJET Journal
 
Image Segmentation Based Survey on the Lung Cancer MRI Images
Image Segmentation Based Survey on the Lung Cancer MRI ImagesImage Segmentation Based Survey on the Lung Cancer MRI Images
Image Segmentation Based Survey on the Lung Cancer MRI ImagesIIRindia
 

Similar to Face recognition (20)

Ck36515520
Ck36515520Ck36515520
Ck36515520
 
A novel approach for performance parameter estimation of face recognition bas...
A novel approach for performance parameter estimation of face recognition bas...A novel approach for performance parameter estimation of face recognition bas...
A novel approach for performance parameter estimation of face recognition bas...
 
Vision based non-invasive tool for facial swelling assessment
Vision based non-invasive tool for facial swelling assessment Vision based non-invasive tool for facial swelling assessment
Vision based non-invasive tool for facial swelling assessment
 
F044045052
F044045052F044045052
F044045052
 
Model Based Emotion Detection using Point Clouds
Model Based Emotion Detection using Point CloudsModel Based Emotion Detection using Point Clouds
Model Based Emotion Detection using Point Clouds
 
An overview of face liveness detection
An overview of face liveness detectionAn overview of face liveness detection
An overview of face liveness detection
 
Realtime human face tracking and recognition system on uncontrolled environment
Realtime human face tracking and recognition system on  uncontrolled environmentRealtime human face tracking and recognition system on  uncontrolled environment
Realtime human face tracking and recognition system on uncontrolled environment
 
Face Recognition System under Varying Lighting Conditions
Face Recognition System under Varying Lighting ConditionsFace Recognition System under Varying Lighting Conditions
Face Recognition System under Varying Lighting Conditions
 
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
 
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
 
N010226872
N010226872N010226872
N010226872
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Face Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image ProcessingFace Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image Processing
 
Fake Multi Biometric Detection using Image Quality Assessment
Fake Multi Biometric Detection using Image Quality AssessmentFake Multi Biometric Detection using Image Quality Assessment
Fake Multi Biometric Detection using Image Quality Assessment
 
Face Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image ProcessingFace Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image Processing
 
Research and Development of DSP-Based Face Recognition System for Robotic Reh...
Research and Development of DSP-Based Face Recognition System for Robotic Reh...Research and Development of DSP-Based Face Recognition System for Robotic Reh...
Research and Development of DSP-Based Face Recognition System for Robotic Reh...
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
 
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptxReview A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
 
IRJET- Face Spoof Detection using Machine Learning with Colour Features
IRJET-  	  Face Spoof Detection using Machine Learning with Colour FeaturesIRJET-  	  Face Spoof Detection using Machine Learning with Colour Features
IRJET- Face Spoof Detection using Machine Learning with Colour Features
 
Image Segmentation Based Survey on the Lung Cancer MRI Images
Image Segmentation Based Survey on the Lung Cancer MRI ImagesImage Segmentation Based Survey on the Lung Cancer MRI Images
Image Segmentation Based Survey on the Lung Cancer MRI Images
 

More from Balamurugan M

Sorting algorithms in Data Structure
Sorting algorithms in Data StructureSorting algorithms in Data Structure
Sorting algorithms in Data StructureBalamurugan M
 
Minimum Spanning Tree
Minimum Spanning TreeMinimum Spanning Tree
Minimum Spanning TreeBalamurugan M
 
Attributes of output primitives unit ii
Attributes of output primitives unit iiAttributes of output primitives unit ii
Attributes of output primitives unit iiBalamurugan M
 

More from Balamurugan M (7)

Sorting algorithms in Data Structure
Sorting algorithms in Data StructureSorting algorithms in Data Structure
Sorting algorithms in Data Structure
 
Minimum Spanning Tree
Minimum Spanning TreeMinimum Spanning Tree
Minimum Spanning Tree
 
Unit 4 notes
Unit 4 notesUnit 4 notes
Unit 4 notes
 
Unit 3 notes
Unit 3 notesUnit 3 notes
Unit 3 notes
 
Unit 2 notes
Unit 2 notesUnit 2 notes
Unit 2 notes
 
Unit 1 notes
Unit 1 notesUnit 1 notes
Unit 1 notes
 
Attributes of output primitives unit ii
Attributes of output primitives unit iiAttributes of output primitives unit ii
Attributes of output primitives unit ii
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 

Face recognition

  • 1.
  • 2.  Face recognition can be defined as the process of establishing a person’s identity based on their facial characteristics.  face can be captured at a longer standoff distance using non-contact sensors.  Training a machine to recognize face images exhibiting such unconstrained intrauser variations is a difficult task
  • 3. The underlying mechanism of face perception in humans has been studied for two purposes: (a) to design machine recognition systems that can mimic the human ability to recognize faces (b) to understand the neurological or psychological mechanism of brain functions for medical treatment. Studies using advanced brain imaging techniques such as functional magnetic resonance imaging (fMRI) are expected to reveal the precise face processing mechanism in the human brain.
  • 4. the facial characteristics can be organized into the following three levels: Level 1 details consist of gross facial characteristics that are easily observable. Examples include the general geometry of the face and global skin color. These features can be extracted even from low resolution face images < 30 interpupilary distance (IPD)
  • 5. Level 2 details consist of localized face information such as the structure of the face components (e.g., eyes), the relationship between facial components and the precise shape of the face. they require a higher resolution face image (30 to 75 IPD)
  • 6. Level 3 details consist of unstructured, micro level features on the face, which includes scars, freckles, skin discoloration, and moles. Problem : Level 3 details may be critical is the discrimination of identical twins
  • 7. A typical face recognition system is composed of three modules: (a) image acquisition, (b) face detection (c) face matching
  • 8.
  • 9.  Automated face recognition requires the face data to be in a machine readable format.  Conventional 2D photographs, 3D range or depth images, and videos are the three major types of image formats used in face recognition systems.
  • 10.  In general, the frontal view of a face contains more details than a profile view  Recognition systems based on 2D face images are also greatly affected by variations in illumination and spatial resolution.  To overcome these challenges, new sensors such as high resolution cameras, active pan- tilt-zoom (PTZ) cameras, and infrared cameras are being used.
  • 11.
  • 12.  A NIR camera can operate even under low illumination conditions because it uses a separate NIR illuminator.  A PTZ camera can dynamically zoom in or zoom out to obtain close-up images of objects of interest.  Multi-camera configurations that capture face images at multiple pose angles have been used to address the pose variation problem.
  • 13.  The inherent pose, expression, and lighting variation problems in 2D face images stem from the 2D rendering of a 3D face object.  There are two types of 3D face capture systems: laser scanning stereographic reconstruction.
  • 14.  laser scanners provide more accurate 3D face models.  stereographic cameras provide near real-time capture capability with slight loss in accuracy.  The image captured by a 3D sensor typically covers about 120◦ of the human head and this image is referred to as a 2.5D scan.
  • 15.  3D face models are usually represented as a polygonal mesh structure (e.g., triangular or rectangular) for computational efficiency.  Thedrawbacks of 3D face acquisition include longer image acquisition time, the large data size of the 3D model (which requires higher computational resources during matching), and the relatively high price of 3D imaging sensors.
  • 16.  A video camera can continuously capture face images, thereby enabling the selection of a good quality face image (e.g., one with frontal pose and neutral expression) for recognition.  Face recognition in video has attracted interest due to the widespread deployment of surveillance cameras.
  • 17.  Two distinctive pieces of information are provided by a video stream: (a)multiple frames of the same subject (b) temporal information (Dynamic Facial Motion) pertaining to an individual’s face.
  • 18.  Face detection methods are typically based on extracting local texture features from the given image and applying a binary (two-class) classifier to distinguish between a face and non-face. 
  • 19.  The Viola-Jones face detector scans through the input image with detection windows of different sizes and decides whether each window contains a face or not.  The feature values are obtained by computing the difference between the sum of the pixel intensities in the light and dark rectangular regions.
  • 20.  2D rectangular filters are similar to the one- dimensional Haar wavelets used in the signal processing domain, they are also known as Haar like filters.  No single Haar-like filter can perform the face detection task with high accuracy.  For instance, more than 180,000 different Haar-like featurescan be derived from a detection window of size 24× 24 pixels.
  • 21.  The computational burden involved in the computation of these features can be significantly reduced by pre-computing the integral image from the original image.  An integral image S associated with the given image I can be computed as follows: 
  • 22.  where I(x,y) is the intensity value of pixel (x,y) in the original image and S(x,y) is the value of the corresponding pixel in the integral image.  Though the integral image allows efficient computation of the feature values, it does not reduce the computational complexity to a level that is sufficient for realtime face detection.
  • 23.  A variant of the Adaboost algorithm proposed in the pattern recognition literature can be used to select the discriminative features as well as to train the classifier function.  The feature selection and classifier training algorithm works as follows. Let f j(w) be the feature value obtained by applying a filter f j to the detection window w, j = 1,2,··· ,L, where L is the total number of filters. The detection window w isparameterized by its location and size. Each feature value can be used to constructa weak classifier that predicts whether the window w is a face image.
  • 24.  Weak classifier can be defined as where p j is the sign (+ or -) determining the direction of the inequality, θ j is the threshold, and j = 1,2,··· ,L.
  • 25.  For example, an eye detector can be constructed by simply replacing the training set with examples of eye images and non-eye images.  the Viola-Jones face detector is not perfect and can produce both false positive and false negative errors. A false positive error refers to the detection of a face where none exists, while a false negative error indicates that a face present in the image was not detected.