SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 4 Issue 4, June 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD31330 | Volume – 4 | Issue – 4 | May-June 2020 Page 976
Image Based Facial Recognition
Tovbaev Sirojiddin1, Karshiboev Nizomiddin2
1Vice Rector, 2Teacher,
1,2jizzakh Polytechnic Institute, Jizzakh, Uzbekistan
ABSTRACT
The foundations for biometrics or identification systems were laid long ago.
Today these developments have contributed to the identification of people,
access to private sites and all places that need securityand orderwiththehelp
of computerized computers that perform biometric facial recognition,
exclusively based on images of human faces for their function. With the
extraction of facial midst characteristics of each person provides information
used for the detection of the face.
This communication also addresses the different processes, stages and
methods of feature extraction operated by facial recognition systems.
Including the positive and negative aspectsoftheimplementationofthese,the
advantages and disadvantages, people's criteria in this respect.
KEYWORDS: Algorithms, automation, biometric tasks, methods, computers,
biometrics system, recognition techniques
How to cite this paper: Tovbaev
Sirojiddin | Karshiboev Nizomiddin
"Image Based Facial Recognition"
Published in
International Journal
of Trend in Scientific
Research and
Development
(ijtsrd), ISSN: 2456-
6470, Volume-4 |
Issue-4, June 2020,
pp.976-980, URL:
www.ijtsrd.com/papers/ijtsrd31330.pdf
Copyright © 2020 by author(s) and
International Journal ofTrendinScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
CommonsAttribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by
/4.0)
INTRODUCTION
Facial recognition has developed rapidly. Since Alphonse Bertillonin1883laidthefoundationsofthefacial recognitionsystem,
since they used as a basis a number of anthropometric measurements such as: the distance from the eyes,thesymmetryorthe
different facial features of an individual. This system is a trend in the forensic field and has also reached the point of having an
opinion in a court of law since it can accuse or prove innocence when dealing with people with criminal records (Guerrero,
2012).
Figure 1 Facial Recognition Source: (www.liberaldictionary.com)
Facial recognition is a much more powerful version of the technology that uses your cell phone or computer to identify your
friends in your photos. Using it to recognize people and validate their identities can speed up access control to corporate and
government buildings. Some systems have the ability to identify known or suspected criminalsandcompaniescananalyzethe
faces of their customers to adapt marketing strategies. But there are also serious privacy issues, asthistechnologycanbeused
to track individuals throughout their communities and even around the world. (Chrome, 2017)
IJTSRD31330
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD31330 | Volume – 4 | Issue – 4 | May-June 2020 Page 977
It can be said that facial recognition is a very important tool in the environment as it allows to identify through certain
characteristics of an individual, although sometimes it is beneficial to facial recognition, it should not be forgotten that the
misuse of facial recognition greatly affects the development of the individual.
Facial recognition has an approximate market of US$ 3 billion, which is estimated to grow to US$ 6 billion in 2021. In addition,
surveillance is one of the fundamental factors for growth, meaning that governments are the main income generators. So you
can see that the FBI has a database with images of more than half of the U.S. population, so that just entering certain
characteristics of the inhabitant will automatically have the image of the person, there is alsothefearofseveral people,sothey
can use the information to commit criminal acts. (Chrome, 2017)
HOW FACIAL RECOGNITION WORKS
The advances start from the study of biometrics, and this added to the technology, results in the taking of measurements and
the analysis of biological data such as DNA, handprint, iris and voice (biometric tasks). This is how facial recognition systems
are born, which make their identification decisions with the help of the personal characteristics (photographs and videos) of
each person, and translate them into a digital image that can be recognized or verified in an automated way by a computer.
"Biometrics is designed so that you you don't have to do anything. The device simply recognizes you."
Figure 2 Facial Recognition Source: (ALPHABET, 2017)
On the other hand, the recognition process uses algorithms (analyzeshundredsoffacesandusesa facial mappingthatcaptures
100 facial expressions) for image processing, all images are 50 x 50 pixels wide and high, and a directionalityof2500pixels,so
its computational cost increases.
Taking into account the techniques for the extraction of characteristics, some of the existing components were analysed:
PCA (Principal Component Analysis)
LDA (Linear Discriminant Analysis)
LPP (Locality Preserving Projections)
DCT (Discrete Cosine Transform)
In PCA, it is a dimensional reduction algorithm that allows finding the vectors that best represent the distribution and
classification of a group of images. The aim of this consists of representing an image in terms of an optimal coordinate system
by reducing the number of anal components that the image will have.
Meanwhile, LDA performs when the measurements made on independent variables for each observation are continuous
amounts. The objective is to project a data set in a smaller space with class separability to avoid over-equipment and also to
reduce computational costs. When dealing with categorical independent variables, the equivalent technique is discriminant
correspondence analysis.
In the LPI, you mount graphs that include neighborhood information as the data set. The representationofgraphsisgenerated
by the algorithm can be seen as a discrete linear approximation to a naturally occurring collector geometry.
In the DCT it provides a finite sequence transformation of data as the sum of cosine functions oscillating at different
frequencies.
In the DCT, the characteristics of the image are obtained and then used to classify them, as is done with PCA, so the basis of the
DCT is independent of the images.
Stages of Facial Recognition
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD31330 | Volume – 4 | Issue – 4 | May-June 2020 Page 978
By including the facial recognition systems, five stages are rescued:
1. Face detection.
2. Conditioning.
3. Normalization.
4. Extradition of characteristics.
5. Recognition. (Carrero & et al., 2010)
The detection, locates the facial region (if it exists) and the segmentation of it from the rest of the scene. The conditioning
locates the components and the scale at which we find the face, by means of geometric transformations.Followingtheprocess,
normalization consists of normalizing the images in the pre-processingstagesothattheeffectsareattenuatedofthechangesin
illumination, i.e. to equalize in size, intensity of a given range among others and thus to scale and cut out with a rectangle or
ellipse.
The determination of characteristics provides the necessaryinformationtodifferentiatethedifferentfacesof peopleaccording
to their geometrical variations. Finally the recognition gives the facial pattern extracted from the characteristics and is
compared with the database. If there is a 90% similarity, it gives the identity of the face, or if not, it indicates that it is an
unknown face. (Carrero & et al., 2010)
Figure 3 Process of Facial Recognition Source: (Carrero & et al., 2010)
There are also other strategies to detect faces, such as the
position of the eyes, in other cases the symmetry or the
different facial features of each person. Or classifiers based
on neural networks.
In other cases, when the standardization process is reached,
eye, nose or other parts information is used with biometric
information or only a scale is made of the image. The
recognition systems that perform these operations
mentioned above are known as location systems.
It's not always easy to determinewhichregionshavethe face
you start by taking out the characteristics, so you use any of
the recognition techniques mentioned above. Usually a
certain operation produces characteristicvectorsofreduced
dimensions which must be checked against the previously
recompiled database of persons. Ifthepersonisidentifiedby
any recognition method, such as a code or access cards or
other systems are known as an authentication or identity
verification system.
In this process the vector of test characteristics is compared
with the database, if it presents an equal measure the
individual is identified but if not it is another person,
Mahalanobis, cosine of the angle between vectors, Fuzzy
systems, correlation coefficient among others. From all the
distances, the small ones are chosen and compared with the
initially selected data in order to determine if the person is
in the database or is an intruder. What is remarkable is that
several authors put into practice various techniquestocarry
out the extraction of characteristics and reduce the
dimension ability of the problem.
In this way, a facial recognition system based on images is
obtained. The first experiments with this technology date
back to the 1960s, although, at that time, research to begin
with its development was kept secret but unfortunately
lacked reliability, for some reasons such as: the lack of
unified criteria, or the possibility of failure, when taking the
measures manually would not be so viable.
These advances are applied in many places. Amongthemost
important are:
Quantity verification e.g. at ATMs, building access, etc.
Surveillance, security and monitoring of people.
Improvement of the human-machine interaction for
example: computer that recognizes who is using it.
Identification of offenders in police files.
The goals of facial recognition are:
Face Verification or Authentication: Compare one image of
the face with another image of the face we want to know the
identity of. The system will confirm or reject the identity of
the face.
Facial identification or recognition: compares the image of
an unknown face with all images of known faces in the
database to determine its identity.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD31330 | Volume – 4 | Issue – 4 | May-June 2020 Page 979
Table 1 Advantages and Disadvantages of Face
Recognition
Advantages Disadvantages
Useful in the
forensic field
They interrupt privacy
Access control in
private places
Lighting (interior /
exterior)
No physical contact
required, etc.
Occlusion from
sunglasses, etc.
Facial recognition is one of the not so new systems, being
biometrics a fundamental part of it. People react to this
paradigm since its effectiveness is less than 85%. They also
argue that fingerprint detection systems are more effective
and compromise less the privacy of people circulatingin any
public space. The debate is long and it will be up to
governments to decide which carries more weight: people's
privacy or their security.
Since then, facial recognition systemsarefound everywhere,
such as in public places, shopping malls, in otheroccasionsit
appears in social networkswhenphotosareuploadedatthat
moment leaving biometric data of the face.
METHODOLOGY
The methodology of this article was developed through
research in books, websites, blogs and other research
sources. Documents in this area have been read, analyzed
and summarized.
From the beginning, the study of biometrics was
fundamental to the creation of facial recognition systems.
Subsequently, the steps listed below have been carried out,
while continuously reviewing and even analyzing the
research. The steps followed have been:
Definition of the title of the research
Description of the all the topics that have relation with
the title.
Classification of, analysis and interpretation of
documents.
Description of each literary content
Going through the stages of pre-processing, visualization,
segmentation, feature extraction, and facial recognition
using the different techniques that have been indicated and
described above in a way that is clear and understandable to
the reader.
RESULTS
In the study of facial recognition through images it was
determined that this is very important , so a survey was
made to 50 people in the city of Jizzakh, which were
randomly selected to know the benefits of facial recognition,
which contribute to research.
Do you consider it important in facial recognition?
Table 2 Importance of Facial Recognition
ALTERNATIVES ANSWERS PERCENTAGE
YES 45 80%
NOT 5 20%
TOTAL 50 100%
Of the 100% of the people surveyed, 90% responded that
facial recognition helps to solve criminal cases in the
country, while 10% of the respondents answered no, so that
it can be interpreted that facial recognition is of great
importance at present since it allows to recognize a person
simply by giving some characteristics of some individual.
Do you think facial recognition is important today?
10% of the people mentioned that there is data protection
for facial recognition, and 90% of the people mentionedthat
there is no subject, so the study will contribute a great deal
to society to make the subject known.
DISCUSSION
In this document, different techniques for the extraction of
facial characteristics corresponding to movements and
deformations were shown. It is difficult to compare facial
expression recognition systems because of the way the
results are presented and the different databases used. A
disadvantage of most of the methods shown is that they
were tested on frontal view images taken under controlled
conditions which represents difficulty when performing a
real human-machine interface application
CONCLUSIONS
With the study it was possible to determine that there is no
specific technique of facial recognition that meets all the
expectations of the case, and it was possible to know that it
helps in the fight against crime, since in the investigation it
can be seen that 90% of the respondents affirm the
mentioned, so that the fight against terrorism, in the blink of
an eye facial recognition changes people's idea of privacy.
In addition, it was established that facial recognition is a
computerized system that automatically identifies a person
based on whether a digital image, or a video source is
contained in a stored database. Thus you can see that the
advantage is that it allows people to respond to the faces
they see rather than having to break them down into parts
Current recognition rates for research papers using a single
feature extraction technique are around 90%. Industry
implementations using the Ministry of internal affairs of
Uzbekistan database for testing have an approximate
performance of 99.99% with a false acceptance rate of only
0.001%. These values should be taken into account when
any future implementation is desired.
It was also found that themostcommonlyusedtechniquesin
the research are PCA and any of its variations CPCA or KPCA
and artificial neural networks RN. Within the latter
technique, researchers mainly use SVM vector support
machines, RBF radial base functions and in some cases MLP
multilayer perception. It was also found that DSPs areone of
the preferred hardware for real time implementations and
that there is a diversity of works based on the C6000
architecture from Texas Instruments. No real time
implementations of applications based on 3D models of the
head were found, this may be an area of research for future
work.
No matter which side you're on, one thing is clear: facial
recognition technology is here to stay. While it brings many
benefits, there are obvious issues.
REFERENCES
[1] Carrero, A. (2018). Biometrics and Federal Databases:
Could You Be In It?, 51 J. Marshall L. Rev. 589
(2018). The John Marshall Law Review, 51(3), 4.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD31330 | Volume – 4 | Issue – 4 | May-June 2020 Page 980
[2] Gates, K. A. (2011). Our biometric future: Facial
recognition technology and the culture of
surveillance (Vol. 2). NYU Press.
[3] Milligan, C. S. (1999). Facial recognition technology,
video surveillance, and privacy. S. Cal. Interdisc. LJ, 9,
295.
[4] Monroe, D. A. (2009). U.S. Patent No. 7,634,662.
Washington, DC: U.S. Patent and Trademark Office.
[5] Тавбоев, С. А., & Искандарова, З. А. (2019).
ОБРАБОТКА ИЗОБРАЖЕНИЙ С ИСПОЛЬЗОВАНИЕМ
ТЕОРИИНЕЧЕТКИХМНОЖЕСТВ. Фундаментальные
и прикладные исследования в современном мире,
(27), 42-45.
[6] Тавбоев, С. А., & Тавбоев, И. И. (2019). МЕТОДЫ
ЦИФРОВОЙ ОБРАБОТКИ ИЗОБРАЖЕНИЙ С
ИСПОЛЬЗОВАНИЕМ АППАРАТА НЕЧЕТКИХ
МНОЖЕСТВ. In Научный форум: Инновационная
наука (pp. 65-68).
[7] Тавбоев, С. А., Савурбаев, А., & Салиев, Э. А. (2016).
Формирование методов и задач компьютерного
зрения с использованием аппарата нечетких
множеств. Молодой ученый, (7-2), 23-26.
[8] Тавбоев, С. А., Савурбоев, А., Туракулов, О. Х., &
Исроилов, И. Н. (2016). АРХИТЕКТУРА СИСТЕМЫ
ЦИФРОВОЙ ОБРАБОТКИ ИЗОБРАЖЕНИЙ
СРЕДСТВАМИ ТЕОРИИ НЕЧЕТКИХ
МНОЖЕСТВ. Ученый XXI века, (2-5).

More Related Content

What's hot

IRJET- Library Management System with Facial Biometric Authentication
IRJET- Library Management System with Facial Biometric AuthenticationIRJET- Library Management System with Facial Biometric Authentication
IRJET- Library Management System with Facial Biometric AuthenticationIRJET Journal
 
Si fengzhou wifs12_distortion
Si fengzhou wifs12_distortionSi fengzhou wifs12_distortion
Si fengzhou wifs12_distortionSamir le King
 
IRJET - A Deep Novel Study on Different CNN Algorithms for Face Skin Disease ...
IRJET - A Deep Novel Study on Different CNN Algorithms for Face Skin Disease ...IRJET - A Deep Novel Study on Different CNN Algorithms for Face Skin Disease ...
IRJET - A Deep Novel Study on Different CNN Algorithms for Face Skin Disease ...IRJET Journal
 
Face Recognition and Increased Reality System for Mobile Devices
Face Recognition and Increased Reality System for Mobile DevicesFace Recognition and Increased Reality System for Mobile Devices
Face Recognition and Increased Reality System for Mobile Devicesijtsrd
 
AHP validated literature review of forgery type dependent passive image forge...
AHP validated literature review of forgery type dependent passive image forge...AHP validated literature review of forgery type dependent passive image forge...
AHP validated literature review of forgery type dependent passive image forge...IJECEIAES
 
M phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projectsM phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projectsVijay Karan
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterNIDHI SHARMA
 
IRJET-A Survey on Face Recognition based Security System and its Applications
IRJET-A Survey on Face Recognition based Security System and its ApplicationsIRJET-A Survey on Face Recognition based Security System and its Applications
IRJET-A Survey on Face Recognition based Security System and its ApplicationsIRJET Journal
 
IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...
IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...
IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...IRJET Journal
 
Dermatological diagnosis by mobile application
Dermatological diagnosis by mobile applicationDermatological diagnosis by mobile application
Dermatological diagnosis by mobile applicationjournalBEEI
 
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...cscpconf
 
Paper id 25201468
Paper id 25201468Paper id 25201468
Paper id 25201468IJRAT
 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET Journal
 
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONESAN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONESAM Publications
 
Medical vision: Web and mobile medical image retrieval system based on google...
Medical vision: Web and mobile medical image retrieval system based on google...Medical vision: Web and mobile medical image retrieval system based on google...
Medical vision: Web and mobile medical image retrieval system based on google...IJECEIAES
 
(2009) A Definitional Framework for the Human-Biometric Sensor Interaction Model
(2009) A Definitional Framework for the Human-Biometric Sensor Interaction Model(2009) A Definitional Framework for the Human-Biometric Sensor Interaction Model
(2009) A Definitional Framework for the Human-Biometric Sensor Interaction ModelInternational Center for Biometric Research
 
IRJET- Persons Identification Tool for Visually Impaired - Digital Eye
IRJET-  	  Persons Identification Tool for Visually Impaired - Digital EyeIRJET-  	  Persons Identification Tool for Visually Impaired - Digital Eye
IRJET- Persons Identification Tool for Visually Impaired - Digital EyeIRJET Journal
 

What's hot (19)

IRJET- Library Management System with Facial Biometric Authentication
IRJET- Library Management System with Facial Biometric AuthenticationIRJET- Library Management System with Facial Biometric Authentication
IRJET- Library Management System with Facial Biometric Authentication
 
Si fengzhou wifs12_distortion
Si fengzhou wifs12_distortionSi fengzhou wifs12_distortion
Si fengzhou wifs12_distortion
 
IRJET - A Deep Novel Study on Different CNN Algorithms for Face Skin Disease ...
IRJET - A Deep Novel Study on Different CNN Algorithms for Face Skin Disease ...IRJET - A Deep Novel Study on Different CNN Algorithms for Face Skin Disease ...
IRJET - A Deep Novel Study on Different CNN Algorithms for Face Skin Disease ...
 
Face Recognition and Increased Reality System for Mobile Devices
Face Recognition and Increased Reality System for Mobile DevicesFace Recognition and Increased Reality System for Mobile Devices
Face Recognition and Increased Reality System for Mobile Devices
 
AHP validated literature review of forgery type dependent passive image forge...
AHP validated literature review of forgery type dependent passive image forge...AHP validated literature review of forgery type dependent passive image forge...
AHP validated literature review of forgery type dependent passive image forge...
 
M phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projectsM phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projects
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median Filter
 
IRJET-A Survey on Face Recognition based Security System and its Applications
IRJET-A Survey on Face Recognition based Security System and its ApplicationsIRJET-A Survey on Face Recognition based Security System and its Applications
IRJET-A Survey on Face Recognition based Security System and its Applications
 
Bw36444448
Bw36444448Bw36444448
Bw36444448
 
IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...
IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...
IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...
 
Dermatological diagnosis by mobile application
Dermatological diagnosis by mobile applicationDermatological diagnosis by mobile application
Dermatological diagnosis by mobile application
 
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
 
Paper id 25201468
Paper id 25201468Paper id 25201468
Paper id 25201468
 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNN
 
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONESAN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
 
Medical vision: Web and mobile medical image retrieval system based on google...
Medical vision: Web and mobile medical image retrieval system based on google...Medical vision: Web and mobile medical image retrieval system based on google...
Medical vision: Web and mobile medical image retrieval system based on google...
 
(2009) A Definitional Framework for the Human-Biometric Sensor Interaction Model
(2009) A Definitional Framework for the Human-Biometric Sensor Interaction Model(2009) A Definitional Framework for the Human-Biometric Sensor Interaction Model
(2009) A Definitional Framework for the Human-Biometric Sensor Interaction Model
 
An optimal face recoginition tool
An optimal face recoginition toolAn optimal face recoginition tool
An optimal face recoginition tool
 
IRJET- Persons Identification Tool for Visually Impaired - Digital Eye
IRJET-  	  Persons Identification Tool for Visually Impaired - Digital EyeIRJET-  	  Persons Identification Tool for Visually Impaired - Digital Eye
IRJET- Persons Identification Tool for Visually Impaired - Digital Eye
 

Similar to Image Based Facial Recognition

Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...
Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...
Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...ijtsrd
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...ijceronline
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Person identification based on facial biometrics in different lighting condit...
Person identification based on facial biometrics in different lighting condit...Person identification based on facial biometrics in different lighting condit...
Person identification based on facial biometrics in different lighting condit...IJECEIAES
 
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...ijbuiiir1
 
Paper id 25201441
Paper id 25201441Paper id 25201441
Paper id 25201441IJRAT
 
Face Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image ProcessingFace Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image Processingpaperpublications3
 
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKHUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKijiert bestjournal
 
Profile Identification through Face Recognition
Profile Identification through Face RecognitionProfile Identification through Face Recognition
Profile Identification through Face Recognitionijtsrd
 
Face recognition system
Face recognition systemFace recognition system
Face recognition systemYogesh Lamture
 
Face Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image ProcessingFace Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image Processingpaperpublications3
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face IdentificationIRJET Journal
 
Face Recognition Research Report
Face Recognition Research ReportFace Recognition Research Report
Face Recognition Research ReportSandeep Garg
 
IRJET- A Review on Various Techniques for Face Detection
IRJET- A Review on Various Techniques for Face DetectionIRJET- A Review on Various Techniques for Face Detection
IRJET- A Review on Various Techniques for Face DetectionIRJET Journal
 
IRJET - Emotionalizer : Face Emotion Detection System
IRJET - Emotionalizer : Face Emotion Detection SystemIRJET - Emotionalizer : Face Emotion Detection System
IRJET - Emotionalizer : Face Emotion Detection SystemIRJET Journal
 
IRJET- Emotionalizer : Face Emotion Detection System
IRJET- Emotionalizer : Face Emotion Detection SystemIRJET- Emotionalizer : Face Emotion Detection System
IRJET- Emotionalizer : Face Emotion Detection SystemIRJET Journal
 
Adversarial Multi Scale Features Learning for Person Re Identification
Adversarial Multi Scale Features Learning for Person Re IdentificationAdversarial Multi Scale Features Learning for Person Re Identification
Adversarial Multi Scale Features Learning for Person Re Identificationijtsrd
 
76 s201920
76 s20192076 s201920
76 s201920IJRAT
 

Similar to Image Based Facial Recognition (20)

Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...
Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...
Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
G041041047
G041041047G041041047
G041041047
 
Person identification based on facial biometrics in different lighting condit...
Person identification based on facial biometrics in different lighting condit...Person identification based on facial biometrics in different lighting condit...
Person identification based on facial biometrics in different lighting condit...
 
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
 
Paper id 25201441
Paper id 25201441Paper id 25201441
Paper id 25201441
 
Face Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image ProcessingFace Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image Processing
 
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKHUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
 
Profile Identification through Face Recognition
Profile Identification through Face RecognitionProfile Identification through Face Recognition
Profile Identification through Face Recognition
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
 
Face Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image ProcessingFace Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image Processing
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face Identification
 
Face Recognition Research Report
Face Recognition Research ReportFace Recognition Research Report
Face Recognition Research Report
 
Facerecognition
FacerecognitionFacerecognition
Facerecognition
 
IRJET- A Review on Various Techniques for Face Detection
IRJET- A Review on Various Techniques for Face DetectionIRJET- A Review on Various Techniques for Face Detection
IRJET- A Review on Various Techniques for Face Detection
 
IRJET - Emotionalizer : Face Emotion Detection System
IRJET - Emotionalizer : Face Emotion Detection SystemIRJET - Emotionalizer : Face Emotion Detection System
IRJET - Emotionalizer : Face Emotion Detection System
 
IRJET- Emotionalizer : Face Emotion Detection System
IRJET- Emotionalizer : Face Emotion Detection SystemIRJET- Emotionalizer : Face Emotion Detection System
IRJET- Emotionalizer : Face Emotion Detection System
 
Adversarial Multi Scale Features Learning for Person Re Identification
Adversarial Multi Scale Features Learning for Person Re IdentificationAdversarial Multi Scale Features Learning for Person Re Identification
Adversarial Multi Scale Features Learning for Person Re Identification
 
76 s201920
76 s20192076 s201920
76 s201920
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Recently uploaded (20)

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

Image Based Facial Recognition

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 4 Issue 4, June 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD31330 | Volume – 4 | Issue – 4 | May-June 2020 Page 976 Image Based Facial Recognition Tovbaev Sirojiddin1, Karshiboev Nizomiddin2 1Vice Rector, 2Teacher, 1,2jizzakh Polytechnic Institute, Jizzakh, Uzbekistan ABSTRACT The foundations for biometrics or identification systems were laid long ago. Today these developments have contributed to the identification of people, access to private sites and all places that need securityand orderwiththehelp of computerized computers that perform biometric facial recognition, exclusively based on images of human faces for their function. With the extraction of facial midst characteristics of each person provides information used for the detection of the face. This communication also addresses the different processes, stages and methods of feature extraction operated by facial recognition systems. Including the positive and negative aspectsoftheimplementationofthese,the advantages and disadvantages, people's criteria in this respect. KEYWORDS: Algorithms, automation, biometric tasks, methods, computers, biometrics system, recognition techniques How to cite this paper: Tovbaev Sirojiddin | Karshiboev Nizomiddin "Image Based Facial Recognition" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-4 | Issue-4, June 2020, pp.976-980, URL: www.ijtsrd.com/papers/ijtsrd31330.pdf Copyright © 2020 by author(s) and International Journal ofTrendinScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative CommonsAttribution License (CC BY 4.0) (http://creativecommons.org/licenses/by /4.0) INTRODUCTION Facial recognition has developed rapidly. Since Alphonse Bertillonin1883laidthefoundationsofthefacial recognitionsystem, since they used as a basis a number of anthropometric measurements such as: the distance from the eyes,thesymmetryorthe different facial features of an individual. This system is a trend in the forensic field and has also reached the point of having an opinion in a court of law since it can accuse or prove innocence when dealing with people with criminal records (Guerrero, 2012). Figure 1 Facial Recognition Source: (www.liberaldictionary.com) Facial recognition is a much more powerful version of the technology that uses your cell phone or computer to identify your friends in your photos. Using it to recognize people and validate their identities can speed up access control to corporate and government buildings. Some systems have the ability to identify known or suspected criminalsandcompaniescananalyzethe faces of their customers to adapt marketing strategies. But there are also serious privacy issues, asthistechnologycanbeused to track individuals throughout their communities and even around the world. (Chrome, 2017) IJTSRD31330
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD31330 | Volume – 4 | Issue – 4 | May-June 2020 Page 977 It can be said that facial recognition is a very important tool in the environment as it allows to identify through certain characteristics of an individual, although sometimes it is beneficial to facial recognition, it should not be forgotten that the misuse of facial recognition greatly affects the development of the individual. Facial recognition has an approximate market of US$ 3 billion, which is estimated to grow to US$ 6 billion in 2021. In addition, surveillance is one of the fundamental factors for growth, meaning that governments are the main income generators. So you can see that the FBI has a database with images of more than half of the U.S. population, so that just entering certain characteristics of the inhabitant will automatically have the image of the person, there is alsothefearofseveral people,sothey can use the information to commit criminal acts. (Chrome, 2017) HOW FACIAL RECOGNITION WORKS The advances start from the study of biometrics, and this added to the technology, results in the taking of measurements and the analysis of biological data such as DNA, handprint, iris and voice (biometric tasks). This is how facial recognition systems are born, which make their identification decisions with the help of the personal characteristics (photographs and videos) of each person, and translate them into a digital image that can be recognized or verified in an automated way by a computer. "Biometrics is designed so that you you don't have to do anything. The device simply recognizes you." Figure 2 Facial Recognition Source: (ALPHABET, 2017) On the other hand, the recognition process uses algorithms (analyzeshundredsoffacesandusesa facial mappingthatcaptures 100 facial expressions) for image processing, all images are 50 x 50 pixels wide and high, and a directionalityof2500pixels,so its computational cost increases. Taking into account the techniques for the extraction of characteristics, some of the existing components were analysed: PCA (Principal Component Analysis) LDA (Linear Discriminant Analysis) LPP (Locality Preserving Projections) DCT (Discrete Cosine Transform) In PCA, it is a dimensional reduction algorithm that allows finding the vectors that best represent the distribution and classification of a group of images. The aim of this consists of representing an image in terms of an optimal coordinate system by reducing the number of anal components that the image will have. Meanwhile, LDA performs when the measurements made on independent variables for each observation are continuous amounts. The objective is to project a data set in a smaller space with class separability to avoid over-equipment and also to reduce computational costs. When dealing with categorical independent variables, the equivalent technique is discriminant correspondence analysis. In the LPI, you mount graphs that include neighborhood information as the data set. The representationofgraphsisgenerated by the algorithm can be seen as a discrete linear approximation to a naturally occurring collector geometry. In the DCT it provides a finite sequence transformation of data as the sum of cosine functions oscillating at different frequencies. In the DCT, the characteristics of the image are obtained and then used to classify them, as is done with PCA, so the basis of the DCT is independent of the images. Stages of Facial Recognition
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD31330 | Volume – 4 | Issue – 4 | May-June 2020 Page 978 By including the facial recognition systems, five stages are rescued: 1. Face detection. 2. Conditioning. 3. Normalization. 4. Extradition of characteristics. 5. Recognition. (Carrero & et al., 2010) The detection, locates the facial region (if it exists) and the segmentation of it from the rest of the scene. The conditioning locates the components and the scale at which we find the face, by means of geometric transformations.Followingtheprocess, normalization consists of normalizing the images in the pre-processingstagesothattheeffectsareattenuatedofthechangesin illumination, i.e. to equalize in size, intensity of a given range among others and thus to scale and cut out with a rectangle or ellipse. The determination of characteristics provides the necessaryinformationtodifferentiatethedifferentfacesof peopleaccording to their geometrical variations. Finally the recognition gives the facial pattern extracted from the characteristics and is compared with the database. If there is a 90% similarity, it gives the identity of the face, or if not, it indicates that it is an unknown face. (Carrero & et al., 2010) Figure 3 Process of Facial Recognition Source: (Carrero & et al., 2010) There are also other strategies to detect faces, such as the position of the eyes, in other cases the symmetry or the different facial features of each person. Or classifiers based on neural networks. In other cases, when the standardization process is reached, eye, nose or other parts information is used with biometric information or only a scale is made of the image. The recognition systems that perform these operations mentioned above are known as location systems. It's not always easy to determinewhichregionshavethe face you start by taking out the characteristics, so you use any of the recognition techniques mentioned above. Usually a certain operation produces characteristicvectorsofreduced dimensions which must be checked against the previously recompiled database of persons. Ifthepersonisidentifiedby any recognition method, such as a code or access cards or other systems are known as an authentication or identity verification system. In this process the vector of test characteristics is compared with the database, if it presents an equal measure the individual is identified but if not it is another person, Mahalanobis, cosine of the angle between vectors, Fuzzy systems, correlation coefficient among others. From all the distances, the small ones are chosen and compared with the initially selected data in order to determine if the person is in the database or is an intruder. What is remarkable is that several authors put into practice various techniquestocarry out the extraction of characteristics and reduce the dimension ability of the problem. In this way, a facial recognition system based on images is obtained. The first experiments with this technology date back to the 1960s, although, at that time, research to begin with its development was kept secret but unfortunately lacked reliability, for some reasons such as: the lack of unified criteria, or the possibility of failure, when taking the measures manually would not be so viable. These advances are applied in many places. Amongthemost important are: Quantity verification e.g. at ATMs, building access, etc. Surveillance, security and monitoring of people. Improvement of the human-machine interaction for example: computer that recognizes who is using it. Identification of offenders in police files. The goals of facial recognition are: Face Verification or Authentication: Compare one image of the face with another image of the face we want to know the identity of. The system will confirm or reject the identity of the face. Facial identification or recognition: compares the image of an unknown face with all images of known faces in the database to determine its identity.
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD31330 | Volume – 4 | Issue – 4 | May-June 2020 Page 979 Table 1 Advantages and Disadvantages of Face Recognition Advantages Disadvantages Useful in the forensic field They interrupt privacy Access control in private places Lighting (interior / exterior) No physical contact required, etc. Occlusion from sunglasses, etc. Facial recognition is one of the not so new systems, being biometrics a fundamental part of it. People react to this paradigm since its effectiveness is less than 85%. They also argue that fingerprint detection systems are more effective and compromise less the privacy of people circulatingin any public space. The debate is long and it will be up to governments to decide which carries more weight: people's privacy or their security. Since then, facial recognition systemsarefound everywhere, such as in public places, shopping malls, in otheroccasionsit appears in social networkswhenphotosareuploadedatthat moment leaving biometric data of the face. METHODOLOGY The methodology of this article was developed through research in books, websites, blogs and other research sources. Documents in this area have been read, analyzed and summarized. From the beginning, the study of biometrics was fundamental to the creation of facial recognition systems. Subsequently, the steps listed below have been carried out, while continuously reviewing and even analyzing the research. The steps followed have been: Definition of the title of the research Description of the all the topics that have relation with the title. Classification of, analysis and interpretation of documents. Description of each literary content Going through the stages of pre-processing, visualization, segmentation, feature extraction, and facial recognition using the different techniques that have been indicated and described above in a way that is clear and understandable to the reader. RESULTS In the study of facial recognition through images it was determined that this is very important , so a survey was made to 50 people in the city of Jizzakh, which were randomly selected to know the benefits of facial recognition, which contribute to research. Do you consider it important in facial recognition? Table 2 Importance of Facial Recognition ALTERNATIVES ANSWERS PERCENTAGE YES 45 80% NOT 5 20% TOTAL 50 100% Of the 100% of the people surveyed, 90% responded that facial recognition helps to solve criminal cases in the country, while 10% of the respondents answered no, so that it can be interpreted that facial recognition is of great importance at present since it allows to recognize a person simply by giving some characteristics of some individual. Do you think facial recognition is important today? 10% of the people mentioned that there is data protection for facial recognition, and 90% of the people mentionedthat there is no subject, so the study will contribute a great deal to society to make the subject known. DISCUSSION In this document, different techniques for the extraction of facial characteristics corresponding to movements and deformations were shown. It is difficult to compare facial expression recognition systems because of the way the results are presented and the different databases used. A disadvantage of most of the methods shown is that they were tested on frontal view images taken under controlled conditions which represents difficulty when performing a real human-machine interface application CONCLUSIONS With the study it was possible to determine that there is no specific technique of facial recognition that meets all the expectations of the case, and it was possible to know that it helps in the fight against crime, since in the investigation it can be seen that 90% of the respondents affirm the mentioned, so that the fight against terrorism, in the blink of an eye facial recognition changes people's idea of privacy. In addition, it was established that facial recognition is a computerized system that automatically identifies a person based on whether a digital image, or a video source is contained in a stored database. Thus you can see that the advantage is that it allows people to respond to the faces they see rather than having to break them down into parts Current recognition rates for research papers using a single feature extraction technique are around 90%. Industry implementations using the Ministry of internal affairs of Uzbekistan database for testing have an approximate performance of 99.99% with a false acceptance rate of only 0.001%. These values should be taken into account when any future implementation is desired. It was also found that themostcommonlyusedtechniquesin the research are PCA and any of its variations CPCA or KPCA and artificial neural networks RN. Within the latter technique, researchers mainly use SVM vector support machines, RBF radial base functions and in some cases MLP multilayer perception. It was also found that DSPs areone of the preferred hardware for real time implementations and that there is a diversity of works based on the C6000 architecture from Texas Instruments. No real time implementations of applications based on 3D models of the head were found, this may be an area of research for future work. No matter which side you're on, one thing is clear: facial recognition technology is here to stay. While it brings many benefits, there are obvious issues. REFERENCES [1] Carrero, A. (2018). Biometrics and Federal Databases: Could You Be In It?, 51 J. Marshall L. Rev. 589 (2018). The John Marshall Law Review, 51(3), 4.
  • 5. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD31330 | Volume – 4 | Issue – 4 | May-June 2020 Page 980 [2] Gates, K. A. (2011). Our biometric future: Facial recognition technology and the culture of surveillance (Vol. 2). NYU Press. [3] Milligan, C. S. (1999). Facial recognition technology, video surveillance, and privacy. S. Cal. Interdisc. LJ, 9, 295. [4] Monroe, D. A. (2009). U.S. Patent No. 7,634,662. Washington, DC: U.S. Patent and Trademark Office. [5] Тавбоев, С. А., & Искандарова, З. А. (2019). ОБРАБОТКА ИЗОБРАЖЕНИЙ С ИСПОЛЬЗОВАНИЕМ ТЕОРИИНЕЧЕТКИХМНОЖЕСТВ. Фундаментальные и прикладные исследования в современном мире, (27), 42-45. [6] Тавбоев, С. А., & Тавбоев, И. И. (2019). МЕТОДЫ ЦИФРОВОЙ ОБРАБОТКИ ИЗОБРАЖЕНИЙ С ИСПОЛЬЗОВАНИЕМ АППАРАТА НЕЧЕТКИХ МНОЖЕСТВ. In Научный форум: Инновационная наука (pp. 65-68). [7] Тавбоев, С. А., Савурбаев, А., & Салиев, Э. А. (2016). Формирование методов и задач компьютерного зрения с использованием аппарата нечетких множеств. Молодой ученый, (7-2), 23-26. [8] Тавбоев, С. А., Савурбоев, А., Туракулов, О. Х., & Исроилов, И. Н. (2016). АРХИТЕКТУРА СИСТЕМЫ ЦИФРОВОЙ ОБРАБОТКИ ИЗОБРАЖЕНИЙ СРЕДСТВАМИ ТЕОРИИ НЕЧЕТКИХ МНОЖЕСТВ. Ученый XXI века, (2-5).