SlideShare a Scribd company logo
1 of 8
Download to read offline
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 5 Issue 1, November-December 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD35848 | Volume – 5 | Issue – 1 | November-December 2020 Page 284
Utilizing Viola Jones with Haar Cascade Along with
Neural Networks for Face Detection and Recognition
Karan Arora1, Sarthak Arora2
1Department of Computer Science, Chitkara University, Rajpura, Punjab, India
2Department of IT, Maharaja Agrasen Institute of Technology, IPU, New Delhi, India
ABSTRACT
Viola–Jones object detection frameworkintroduced in 2001 by Dr. Paul
Viola and Dr. Michael Jones is an object detection framework which can be
trained for detecting a variety of object classes .It is primarily used for the
problem of face detection. In most video recording or surveillance systems it
became impossible for human beings to retrieve large image datasets and
analyze them for potential results. Now-a-days accurate facial recognitionhas
a great impact in our ecosystem be it face unlock or face recognition in
cameras for auto adjust. Implemented in two stages our proposed
methodology will first utilize one of the widely accepted methods to detect
faces i.e. viola Jones which utilizes Haar Classifiers and in the second stage we
will recognise the face using Principal Component Analysis (PCA) and Feed
Forward Neural Network. Bio ID-Face-Databaseisusedasa trainingdatabase.
Test is conducted on webcam video and image snapshots.
Keywords: haar-features, Viola Jones, Image Analysis, face detection, feature
extraction, face edge detection
How to cite this paper: Karan Arora |
Sarthak Arora "Utilizing Viola Jones with
Haar Cascade Along with Neural
Networks for Face Detection and
Recognition"
Published in
International Journal
of Trend in Scientific
Research and
Development(ijtsrd),
ISSN: 2456-6470,
Volume-5 | Issue-1,
December 2020, pp.284-291, URL:
www.ijtsrd.com/papers/ijtsrd35848.pdf
Copyright © 2020 by author(s) and
International Journal ofTrendinScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
CommonsAttribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by/4.0)
1. INTRODUCTION
Face detection due to its wide applicationincomputervision
and also in image processing techniques plays a vital role in
human to computer interaction.Therecentadvancementsin
Video processing, Image Compressing High Rate Frame
Rendering facilitated diversified domains to utilize face
detection and recognition techniques. It also made possible
for us to avail the latest technology in daily operations like
blazing face unlock. The process of correctly recognising a
human face is a tough task as it exhibits multiple varying
attributes like expressions, age, change in hairstyle etc.
Though technology has grown but still it challenges many
aspects in image processing such as blurry face detection
and human-animal confusion. The challenge occurs because
of multiple layers to filter the images or editing the image
generally makes the face incomprehensible.
Now-a-days Face recognition is used invariousdomains and
has multiple applications such as security systems, credit
card verification, identifying criminals in airports, railway
stations etc. Though various methods are researched on to
detect and recognize a human face, developing a subtle
model for a big database is still a challenging task.Thatisthe
reason face recognition is taken as a high level computer
vision challenge to achieve accurate results multiple
methods can be developed.
Few methods known for face recognition are group based
tree neural networks, artificial neural networks (ANN) and
principal component analysis (PCA).
The proposed methodology is executed in two phases - As
the face can be characterized by special facial features, The
first step will be to extract those features. Then they are
quantized making it easier to recognize a face byreferringto
those features. For detection we will use Viola-Jones
algorithm which works on Haar Cascades and we also used
AdaBoost classifier as a modifier. The next step is to
recognise the face for which we used (PCA) principal
component analysis along with artificial neural networks
(ANN). The aim of the paper is to use the methodology
mentioned to detect and recognise a face from the database
and then on the test set and webcam outputs.
2. RELATED WORK
A strategy that enhances the recognitionrateascomparedto
PCA was introduced by Muhammad Murtaza Khan et al.,[8]
which was outperformed by sub-Holistic PCA in all test
scenarios with 90% recognition rate registered for the ORL
database.
One method for face recognition based on preprocessingthe
face images was introduced by Patrik Kamencay et al.,[4]
that used the Propagation Belief segmentation algorithm.
The positive effect for face recognition was depicted by the
algorithm with a face recognition rate of 84% for the ESSEX
database. The use of linear and non linear techniques for
feature extraction in face recognition was proposed by Hala
M. Ebied et al., [5]. In the paper a high-dimensional feature
space is mapped with nonlinear methods represented via
IJTSRD35848
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD35848 | Volume – 5 | Issue – 1 | November-December 2020 Page 285
extension of Kernel-PCA from PCA, for the classificationstep
K-nearest neighborclassifier withEuclideandistanceisused.
The SIFT-PCA method was proposed by Patrik Kamencay et
al., [6] which implemented an impact of graph based
segmentation algorithm on the recognition rate.SIFTrelated
segmentation algorithms are used for preprocessing of the
face images. The results depict a positive effect for face
recognition for segmentation in combinationwithSIFT-PCA.
A NP-hard problem of searching the best subnet of the
available PCA features for face recognition is solved in the
methodology proposed by Rammohan Mallipeddi et al.,[7].
The proposed method uses the differential equation
algorithm called FS-DE. After maximizing the class
separation in training data a feature set is obtained, further
presenting an ensemble base for face recognition. A study of
modified constructive training algorithms for Multi Layer
Perceptron is proposed by Hayet Boughrara et al.,[8], which
is applied to applications in face recognition. This paper
contributed to depict the methods to simultaneously
increase the output neurons with increasing input patterns.
Perceived Facial Image is applied for feature extraction.
3. PROPOSED METHODOLOGY
We propose a robust methodology that is independent of facial variations like size, texture, feature position, facial expression
etc using Viola-Jones, Principal component analysis and Neural Networks. Please refer to the flowchart stating the same in
figure 1
Figure 1: Flowchart
3.1. Data
Standard Data used is the BIOID face database. The dataset consists of 1521 gray scale images with 384*286 pixel resolution.
The front angle view images in the database consists of a face of 23 different persons. We have the test set with images with a
variety of face size, lighting, background representing real life scenarios as shown in fig 2.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD35848 | Volume – 5 | Issue – 1 | November-December 2020 Page 286
Figure 2: Example set – Bio ID Face Database
PRE-PROCESSING:
We considered an image database that is readily available in either gray scale or color. Contrast stretchingisperformedonthe
current image where white pixels were made whiter and dark pixels are made darker.
FACE DETECTION:
Right after Contrast-Stretching, Viola-Jones algorithm is utilized for detecting face in the image. WechoseViola-Jonesdetector
as a detection algorithm because of its accuracy in detecting faces, and its ability to run in real time. The Viola-Jones detector
works best with frontal images of faces and it can handle 45° face rotation both around the horizontal and vertical axis. There
are three main concepts which allow it to run in real time first is Integral Image, Second is Ada-Boost and third is cascade
structure Integral Image is a cost-effective generation algorithm that works on the sum of pixel intensities in a specified
rectangle in an image. The main use-case is rapid computation of Haar-like features. The calculation done on the sum of a
rectangular area inside the original image is extremely efficient for the initial step, requiring only four additions for any
arbitrary rectangle size. The use of Ada-Boost is that it constructs strong classifiers as a linear combinationofweak classifiers.
voila-Jones uses Haar features, Haar Features used in the Viola Jones algorithm is shown in Fig 3.
Fig 3: Representing features with Haar Features
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD35848 | Volume – 5 | Issue – 1 | November-December 2020 Page 287
Haar features shown above can be of various height and width. The working for the calculation for value is that from the
applied Haar feature to the face, we calculate the sum of white pixels and also the sum of black pixelsthenitissubtractedtoget
a single value. If in the region the value is high, then it takes part of the face and is identified as eyes, nose, cheek etc. We have
approximately 160000+ Haar features calculated all over perimage.Inreal timeapplicationSummingupthe entireimagepixel
and after that subtracting them to get a single value is not much efficient, which can be reduced by using the Ada-boost
classifier. The major function of Ada-boost is reducing the redundant features.Integral imageisusedinsteadofsummingupall
the pixels as shown in figure 4.
FIg 4: Integral Image
To obtain a new pixel value - pixels above and pixels to the left are added then all the values around the patch are added to
obtain the sum of all pixel values. Ada boost will be determining relevant features and irrelevant features. Post identifying
relevant features and irrelevant features, adaboost assigns a weight value to all of them,Whichconstructsa strongclassifieras
a linear combination of many Weak classifiers.
Nearly 2500 features are calculated, the number of computations can be further reduced by cascading. A set of features are
here kept in another set of classifiers and so on in a cascading format. Using this method, one can detect if it is a face or not
faster and can reject it if one classifier fails to provide a necessary output to the next stage. Then the detected face is cropped
and resized to 100x100 that is the standard resolution. The step after that is to identify the detected image using Principal
Component Analysis (PCA) and Artificial Neural Network Algorithm (ANN).
FEATURE EXTRACTION:
To extract human face features, we use PCA. Fig 5 depicts the PCA operational flow.
Fig 5: PCA flow chart
To extract features from a cropped and resized image Principal component analysis (PCA) is used. To transform higher
dimensional data into lower dimensional data, It is used as a tool in exploratory data analysis and in predictive analysis. A
bunch of M x M size facial images in a training are converted using principal component analysis technique into lower
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD35848 | Volume – 5 | Issue – 1 | November-December 2020 Page 288
dimensional face images. Principal Component Analysis (PCA) is used for the purpose of conversion of a set of correlated N
variables into a set of uncorrelated k variables called principal components. The number of principal components (set of
uncorrelated k variables) are less than or equal to the number of original values i.e. K<N. The above definition is modified as
Principal component analysis for the applicationlikefacerecognitionapplication,itisoneofthemathematical proceduresused
to convert a set of correlated N face images into a set of uncorrelated k face images called as Eigen faces.
Before calculating the principal components the dimension of the original images has to be Reduced, to reduce the number of
calculations. Since principal components show more noise and less direction, only first few principal components (say N) are
selected and the remaining components as they contain more noise can be neglected.
The M-image training set is represented by the best Eigen face with largest Eigen-values that accounts for the most variance
with the set of best closely related feature-set and facial images. Each image in the training-set after finding Eigenfaces can be
represented by a linear combination of Eigen Faces and will be represented as vectors. Standard database features are
compared with input image features for Recognition.
Figure 6: Example of an Artificial Neural Network
Count of the neurons in the input layer is equal to the count Eigen faces, the type of the network is Feed forward back
propagation network.
Refer Figure7, For a single cell represented as f(x), its output can be calculated as output = input1 + input2 as shown in Figure
7. The function f(x) is a neutral function because it won’t add or amplify any value to the incoming inputs but it just adds the
value of incoming inputs. One can use a mathematical function such as tanh to represent the above function.
Figure 7: Single neuron cell
Layered feed forward Artificial Neural Networks make use of the back propagation algorithm, where the neurons send their
signals in forward direction and the errors are propagated backwards.Until ANN learnsthetrainingdata,theback propagation
reduces this error. Through the back propagation technique the neural networks learn and determine the connectionweights
between the inputs, outputs and hidden cells. To make the error minimal random weights are initially assigned to these
networks which are to be adjusted.
Error in network = Desired output – Calculated output
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD35848 | Volume – 5 | Issue – 1 | November-December 2020 Page 289
The back propagation technique is used to minimize the error, using a formula whichconsistsofweights,inputs,outputs,error
and learning rate (α).
Figure 8: Updating New Weights in Back propagation.
Training of the Neural Networks:
For each individual in the database considered one ANN is used, twenty three networks are created since there are twenty
three persons in the database. Face descriptors are used as input for the purpose of trainingANN.Thefacedescriptorsrelating
to the same individual are used as positive examples for that individual network soutputwill be1andasfor negativeexamples
like others so that output will be 0. Our trained network will be utilized for the purpose of recognition.
Neural Networks Simulation:
The facial descriptions of the test image calculated on Eigen-faces are used as input in all networks and are simulated. The
results produced were comparable and the output being much higher than the previously describedlevel ensures thatthetest
image belongs to a well-recognized person with a maximum output.
FACE TAGGING:
In the Face Tagging stage the result from the simulation is used by the recognition system to tag an appropriate name to the
image of the person. The data is in binary form and hence this block is also responsible for evaluating the expression into a
certain value and matching it to a person’s name in the name list. However, if the interpreted value is not one of the values
listed in the roster, then the name returned will be automatically predefined as “Unknown”.
In the Face Marking phase the results from the simulation are used in the awareness program to mark the correct word in the
person's image. Data is in binary form so this block also has a responsibility to test the expression into a certain number and
compare it with the person’s name in the word list. However, if the translated value is not one of the listed values, then the
name to be returned will be automatically defined as "Unknown".
RESULTS AND ANALYSIS
Consider an image we have taken as test image as shown in Figure 9, it is preprocessed for identification
Figure 9: Test Image
Image 9 is the Test image taken and depicted for analysis for the paper, after applying theViola-Jonesalgorithmtotheimagein
Figure 9, Identified face image shown in Figure 10 is obtained (bounding box on identified face). Then it is resized to 100x100
pixels, that is the Haar features are calculated and all the related features are extracted.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD35848 | Volume – 5 | Issue – 1 | November-December 2020 Page 290
Figure 10: Face recognised by Viola-Jones algorithm in Red boundary
As shown by the bounding box in figure 11 main features of the face are identified by Viola-Jones algorithm and is used for
deciding the nodes corresponding to the identified part of the face.
Figure 11: Facial features identified by Viola-Jones algorithm (Boundary box)
The features extracted by Viola-Jones algorithm are represented as nodes, these nodes are joined to form a shape making it
sure that all nodes are well connected and the connected lines are named with reference numbers as shown in Figure 12.
Figure 12: Facial Feature Calculation
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD35848 | Volume – 5 | Issue – 1 | November-December 2020 Page 291
Figure 12 shows that in order to identify the person how the specifications of features are calculated. Each detail is tabulated
after the features are calculated from various angles. The person in the image is identified correctly based on this calculation.
The tabulated results of the various features taken-into-account are shown in Table 1.
Table 1: Calculation of various features Different angles VS Face features of Images
INDEX Feature 1 Feature 2 Feature 3 Feature 4 Feature 5 Feature 6 Feature 7
1 884 356 523 522 655 568 580
2 862 383 523 524 654 572 590
3 1923 370 530 512 650 638 646
4 1926 354 512 599 633 618 613
5 1120 419 696 612 720 639 654
6 1943 385 555 543 712 585 588
7 1912 362 560 546 666 700 612
8 1958 342 514 517 656 619 617
9 1192 326 449 466 632 630 632
10 1982 333 518 527 658 612 626
11 1943 320 472 489 626 579 692
12 1997 364 517 512 660 576 584
13 1934 245 492 420 542 613 619
14 1932 392 439 443 613 622 638
15 1868 360 512 599 632 552 548
Table 2: Results
Techniques / Authors Accuracy
Neural Networks 92%
Principal Component Analysis 72%
Kamencay [2] a) Segmented
b)Non Segmented
90%
84%
Fernandez [3] (Artificial Neural Nets and Viola-Jones) 88.64%
Mohammad Da'san[4] (Viola-Jones , Neural-Networks) 90.31%
Proposed Method 94%
We compared the accuracy of our proposal with existing models as shown in Table 2. The accuracy of the proposed method
turned out to be 94%, thus the proposed method is more accurate in recognisinga personinanimagewhencomparedtoother
methods.
CONCLUSION
The paper presents an efficient approach i.e. fusion of
preprocessing PCA then Viola-Jones and utilizing neural
networks for face detection and recognition. The accuracyis
compared with other existing models that performthesame
operations, where It is observed that the performance ofthe
model is superior. Facial Detection playsanimportantrolein
a plethora of applications, where-in most cases there is a
desire to utilize the high rate of accuracy in recognition of
people hence the proposed method can be considered after
taking account of the results with other existing methods
REFERENCES
[1] Maria De Marsico, Michele Nappi, Daniel Riccio and
Harry Wechsler, “ Robust Face Recognition for
Uncontrolled Pose and Illumination Changes” IEEE
Transaction on Systems, Man and Cybernetics,
vol.43,No.1,Jan 2013.
[2] Kamencay, P, Jelsovka, D.; Zachariasova, M., "The
impact of segmentation on face recognition using the
principal component analysis (PCA)," IEEE
International Conference in Signal Processing
Algorithms, Architectures, Arrangements, and
Applications, pp.1-4, Sept. 2011.
[3] Ma. Christina D. Fernandez, Kristina Joyce E. Gob,
Aubrey Rose M. Leonidas, Ron Jason J. Ravara, Argel
A. Bandala and Elmer P. Dadios “Simultaneous Face
Detection and Recognition using Viola-Jones
Algorithm and Artificial Neural Networks for Identity
Verification”, pp 672-676, 2014 IEEE Region 10
Symposium, 2014.
[4] Mohammad Da'san, AminAlqudahandOlivierDebeir,
“ Face Detection using Viola and Jones Method and
Neural Networks” IEEE International Conference on
Information and Communication Technology
Research, pp 40-43,2015.
[5] Anil K. Jain, “Face Recognition: Some Challenges in
Forensics”, IEEE International Conference On
Automatic Face and Gesture Recognition, pp 726-
733,2011.
[6] Ming Zhang and John Fulcher “Face Perspective
Understanding Using Artificial Neural Network Group
Based Tree”, IEEE International ConferenceOnImage
Processing, Vol.3, pp 475-478, 1996.
[7] Hazem M. EI-Bakry and Mohy A. Abo Elsoud “Human
Face Recognition Using Neural Networks” 16th
national radio science conference, Ain Shams
University, Feb. 23-25, 1999.
[8] Muhammad Khan,JocelynChanussot,LaurentCondat,
Annick Montanvert.Indusion:FusionofMultispectral
and Panchromatic Images Using Induction Scaling
Technique. IEEE Geoscience and Remote Sensing
Letters, IEEE - Institute of Electrical and Electronics
Engineers, 2008, 5 (1), pp.98- 102.
ff10.1109/LGRS.2007.909934ff. ffhal-00348845f

More Related Content

What's hot

Feature based head pose estimation for controlling movement of
Feature based head pose estimation for controlling movement ofFeature based head pose estimation for controlling movement of
Feature based head pose estimation for controlling movement of
IAEME Publication
 
Adversarial Multi Scale Features Learning for Person Re Identification
Adversarial Multi Scale Features Learning for Person Re IdentificationAdversarial Multi Scale Features Learning for Person Re Identification
Adversarial Multi Scale Features Learning for Person Re Identification
ijtsrd
 

What's hot (20)

IRJET- Persons Identification Tool for Visually Impaired - Digital Eye
IRJET-  	  Persons Identification Tool for Visually Impaired - Digital EyeIRJET-  	  Persons Identification Tool for Visually Impaired - Digital Eye
IRJET- Persons Identification Tool for Visually Impaired - Digital Eye
 
IRJET - Design and Development of Android Application for Face Detection and ...
IRJET - Design and Development of Android Application for Face Detection and ...IRJET - Design and Development of Android Application for Face Detection and ...
IRJET - Design and Development of Android Application for Face Detection and ...
 
IRJET- Facial Expression Recognition
IRJET- Facial Expression RecognitionIRJET- Facial Expression Recognition
IRJET- Facial Expression Recognition
 
IRJET- Library Management System with Facial Biometric Authentication
IRJET- Library Management System with Facial Biometric AuthenticationIRJET- Library Management System with Facial Biometric Authentication
IRJET- Library Management System with Facial Biometric Authentication
 
IRJET - Real Time Facial Analysis using Tensorflowand OpenCV
IRJET -  	  Real Time Facial Analysis using Tensorflowand OpenCVIRJET -  	  Real Time Facial Analysis using Tensorflowand OpenCV
IRJET - Real Time Facial Analysis using Tensorflowand OpenCV
 
Face Recognition and Increased Reality System for Mobile Devices
Face Recognition and Increased Reality System for Mobile DevicesFace Recognition and Increased Reality System for Mobile Devices
Face Recognition and Increased Reality System for Mobile Devices
 
IRDO: Iris Recognition by fusion of DTCWT and OLBP
IRDO: Iris Recognition by fusion of DTCWT and OLBPIRDO: Iris Recognition by fusion of DTCWT and OLBP
IRDO: Iris Recognition by fusion of DTCWT and OLBP
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methods
 
A Review on Feature Extraction Techniques and General Approach for Face Recog...
A Review on Feature Extraction Techniques and General Approach for Face Recog...A Review on Feature Extraction Techniques and General Approach for Face Recog...
A Review on Feature Extraction Techniques and General Approach for Face Recog...
 
Feature based head pose estimation for controlling movement of
Feature based head pose estimation for controlling movement ofFeature based head pose estimation for controlling movement of
Feature based head pose estimation for controlling movement of
 
IRJET - A Survey on Human Facial Expression Recognition Techniques
IRJET - A Survey on Human Facial Expression Recognition TechniquesIRJET - A Survey on Human Facial Expression Recognition Techniques
IRJET - A Survey on Human Facial Expression Recognition Techniques
 
Adversarial Multi Scale Features Learning for Person Re Identification
Adversarial Multi Scale Features Learning for Person Re IdentificationAdversarial Multi Scale Features Learning for Person Re Identification
Adversarial Multi Scale Features Learning for Person Re Identification
 
ADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCA
ADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCAADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCA
ADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCA
 
IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...
IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...
IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...
 
Progression in Large Age-Gap Face Verification
Progression in Large Age-Gap Face VerificationProgression in Large Age-Gap Face Verification
Progression in Large Age-Gap Face Verification
 
IRJET- Face Detection and Tracking Algorithm using Open CV with Raspberry Pi
IRJET- Face Detection and Tracking Algorithm using Open CV with Raspberry PiIRJET- Face Detection and Tracking Algorithm using Open CV with Raspberry Pi
IRJET- Face Detection and Tracking Algorithm using Open CV with Raspberry Pi
 
IRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe ModelIRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe Model
 
IRJET- Skin Disease Detection using Neural Network
IRJET- Skin Disease Detection using Neural NetworkIRJET- Skin Disease Detection using Neural Network
IRJET- Skin Disease Detection using Neural Network
 
IRJET- Design of an Automated Attendance System using Face Recognition Algorithm
IRJET- Design of an Automated Attendance System using Face Recognition AlgorithmIRJET- Design of an Automated Attendance System using Face Recognition Algorithm
IRJET- Design of an Automated Attendance System using Face Recognition Algorithm
 
A Parallel Architecture for Multiple-Face Detection Technique Using AdaBoost ...
A Parallel Architecture for Multiple-Face Detection Technique Using AdaBoost ...A Parallel Architecture for Multiple-Face Detection Technique Using AdaBoost ...
A Parallel Architecture for Multiple-Face Detection Technique Using AdaBoost ...
 

Similar to Utilizing Viola Jones with Haar Cascade Along with Neural Networks for Face Detection and Recognition

KPCA and Eigen Face Based Dimension Reduction Face Recognition Method
KPCA and Eigen Face Based Dimension Reduction Face Recognition MethodKPCA and Eigen Face Based Dimension Reduction Face Recognition Method
KPCA and Eigen Face Based Dimension Reduction Face Recognition Method
ijtsrd
 
Face Recognition for Human Identification using BRISK Feature and Normal Dist...
Face Recognition for Human Identification using BRISK Feature and Normal Dist...Face Recognition for Human Identification using BRISK Feature and Normal Dist...
Face Recognition for Human Identification using BRISK Feature and Normal Dist...
ijtsrd
 
Smart Door Access using Facial Recognition
Smart Door Access using Facial RecognitionSmart Door Access using Facial Recognition
Smart Door Access using Facial Recognition
ijtsrd
 
AI Therapist – Emotion Detection using Facial Detection and Recognition and S...
AI Therapist – Emotion Detection using Facial Detection and Recognition and S...AI Therapist – Emotion Detection using Facial Detection and Recognition and S...
AI Therapist – Emotion Detection using Facial Detection and Recognition and S...
ijtsrd
 
Smriti's research paper
Smriti's research paperSmriti's research paper
Smriti's research paper
Smriti Tikoo
 
Photograph Database management report
Photograph Database management reportPhotograph Database management report
Photograph Database management report
Amrit Ranjan
 

Similar to Utilizing Viola Jones with Haar Cascade Along with Neural Networks for Face Detection and Recognition (20)

KPCA and Eigen Face Based Dimension Reduction Face Recognition Method
KPCA and Eigen Face Based Dimension Reduction Face Recognition MethodKPCA and Eigen Face Based Dimension Reduction Face Recognition Method
KPCA and Eigen Face Based Dimension Reduction Face Recognition Method
 
Profile Identification through Face Recognition
Profile Identification through Face RecognitionProfile Identification through Face Recognition
Profile Identification through Face Recognition
 
Face Recognition for Human Identification using BRISK Feature and Normal Dist...
Face Recognition for Human Identification using BRISK Feature and Normal Dist...Face Recognition for Human Identification using BRISK Feature and Normal Dist...
Face Recognition for Human Identification using BRISK Feature and Normal Dist...
 
Face Recognition Smart Attendance System- A Survey
Face Recognition Smart Attendance System- A SurveyFace Recognition Smart Attendance System- A Survey
Face Recognition Smart Attendance System- A Survey
 
Smart Doorbell System Based on Face Recognition
Smart Doorbell System Based on Face RecognitionSmart Doorbell System Based on Face Recognition
Smart Doorbell System Based on Face Recognition
 
Smart Door Access using Facial Recognition
Smart Door Access using Facial RecognitionSmart Door Access using Facial Recognition
Smart Door Access using Facial Recognition
 
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITIONA VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
 
Facial Emotion Recognition: A Survey
Facial Emotion Recognition: A SurveyFacial Emotion Recognition: A Survey
Facial Emotion Recognition: A Survey
 
AI Therapist – Emotion Detection using Facial Detection and Recognition and S...
AI Therapist – Emotion Detection using Facial Detection and Recognition and S...AI Therapist – Emotion Detection using Facial Detection and Recognition and S...
AI Therapist – Emotion Detection using Facial Detection and Recognition and S...
 
IRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face Recognition
 
IRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face Recognition
 
Review on Arduino-Based Face Mask Detection System
Review on Arduino-Based Face Mask Detection SystemReview on Arduino-Based Face Mask Detection System
Review on Arduino-Based Face Mask Detection System
 
IRJET - Face Recognition based Attendance System: Review
IRJET -  	  Face Recognition based Attendance System: ReviewIRJET -  	  Face Recognition based Attendance System: Review
IRJET - Face Recognition based Attendance System: Review
 
IRJET - Emotionalizer : Face Emotion Detection System
IRJET - Emotionalizer : Face Emotion Detection SystemIRJET - Emotionalizer : Face Emotion Detection System
IRJET - Emotionalizer : Face Emotion Detection System
 
IRJET- Emotionalizer : Face Emotion Detection System
IRJET- Emotionalizer : Face Emotion Detection SystemIRJET- Emotionalizer : Face Emotion Detection System
IRJET- Emotionalizer : Face Emotion Detection System
 
IRJET - A Review on Face Recognition using Deep Learning Algorithm
IRJET -  	  A Review on Face Recognition using Deep Learning AlgorithmIRJET -  	  A Review on Face Recognition using Deep Learning Algorithm
IRJET - A Review on Face Recognition using Deep Learning Algorithm
 
Smriti's research paper
Smriti's research paperSmriti's research paper
Smriti's research paper
 
Photograph Database management report
Photograph Database management reportPhotograph Database management report
Photograph Database management report
 
IRJET- Digiyathra
IRJET-  	  DigiyathraIRJET-  	  Digiyathra
IRJET- Digiyathra
 
Attendance System using Facial Recognition
Attendance System using Facial RecognitionAttendance System using Facial Recognition
Attendance System using Facial Recognition
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
ijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
ijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
ijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
ijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
ijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Recently uploaded (20)

FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 

Utilizing Viola Jones with Haar Cascade Along with Neural Networks for Face Detection and Recognition

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 5 Issue 1, November-December 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD35848 | Volume – 5 | Issue – 1 | November-December 2020 Page 284 Utilizing Viola Jones with Haar Cascade Along with Neural Networks for Face Detection and Recognition Karan Arora1, Sarthak Arora2 1Department of Computer Science, Chitkara University, Rajpura, Punjab, India 2Department of IT, Maharaja Agrasen Institute of Technology, IPU, New Delhi, India ABSTRACT Viola–Jones object detection frameworkintroduced in 2001 by Dr. Paul Viola and Dr. Michael Jones is an object detection framework which can be trained for detecting a variety of object classes .It is primarily used for the problem of face detection. In most video recording or surveillance systems it became impossible for human beings to retrieve large image datasets and analyze them for potential results. Now-a-days accurate facial recognitionhas a great impact in our ecosystem be it face unlock or face recognition in cameras for auto adjust. Implemented in two stages our proposed methodology will first utilize one of the widely accepted methods to detect faces i.e. viola Jones which utilizes Haar Classifiers and in the second stage we will recognise the face using Principal Component Analysis (PCA) and Feed Forward Neural Network. Bio ID-Face-Databaseisusedasa trainingdatabase. Test is conducted on webcam video and image snapshots. Keywords: haar-features, Viola Jones, Image Analysis, face detection, feature extraction, face edge detection How to cite this paper: Karan Arora | Sarthak Arora "Utilizing Viola Jones with Haar Cascade Along with Neural Networks for Face Detection and Recognition" Published in International Journal of Trend in Scientific Research and Development(ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1, December 2020, pp.284-291, URL: www.ijtsrd.com/papers/ijtsrd35848.pdf Copyright © 2020 by author(s) and International Journal ofTrendinScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative CommonsAttribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0) 1. INTRODUCTION Face detection due to its wide applicationincomputervision and also in image processing techniques plays a vital role in human to computer interaction.Therecentadvancementsin Video processing, Image Compressing High Rate Frame Rendering facilitated diversified domains to utilize face detection and recognition techniques. It also made possible for us to avail the latest technology in daily operations like blazing face unlock. The process of correctly recognising a human face is a tough task as it exhibits multiple varying attributes like expressions, age, change in hairstyle etc. Though technology has grown but still it challenges many aspects in image processing such as blurry face detection and human-animal confusion. The challenge occurs because of multiple layers to filter the images or editing the image generally makes the face incomprehensible. Now-a-days Face recognition is used invariousdomains and has multiple applications such as security systems, credit card verification, identifying criminals in airports, railway stations etc. Though various methods are researched on to detect and recognize a human face, developing a subtle model for a big database is still a challenging task.Thatisthe reason face recognition is taken as a high level computer vision challenge to achieve accurate results multiple methods can be developed. Few methods known for face recognition are group based tree neural networks, artificial neural networks (ANN) and principal component analysis (PCA). The proposed methodology is executed in two phases - As the face can be characterized by special facial features, The first step will be to extract those features. Then they are quantized making it easier to recognize a face byreferringto those features. For detection we will use Viola-Jones algorithm which works on Haar Cascades and we also used AdaBoost classifier as a modifier. The next step is to recognise the face for which we used (PCA) principal component analysis along with artificial neural networks (ANN). The aim of the paper is to use the methodology mentioned to detect and recognise a face from the database and then on the test set and webcam outputs. 2. RELATED WORK A strategy that enhances the recognitionrateascomparedto PCA was introduced by Muhammad Murtaza Khan et al.,[8] which was outperformed by sub-Holistic PCA in all test scenarios with 90% recognition rate registered for the ORL database. One method for face recognition based on preprocessingthe face images was introduced by Patrik Kamencay et al.,[4] that used the Propagation Belief segmentation algorithm. The positive effect for face recognition was depicted by the algorithm with a face recognition rate of 84% for the ESSEX database. The use of linear and non linear techniques for feature extraction in face recognition was proposed by Hala M. Ebied et al., [5]. In the paper a high-dimensional feature space is mapped with nonlinear methods represented via IJTSRD35848
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD35848 | Volume – 5 | Issue – 1 | November-December 2020 Page 285 extension of Kernel-PCA from PCA, for the classificationstep K-nearest neighborclassifier withEuclideandistanceisused. The SIFT-PCA method was proposed by Patrik Kamencay et al., [6] which implemented an impact of graph based segmentation algorithm on the recognition rate.SIFTrelated segmentation algorithms are used for preprocessing of the face images. The results depict a positive effect for face recognition for segmentation in combinationwithSIFT-PCA. A NP-hard problem of searching the best subnet of the available PCA features for face recognition is solved in the methodology proposed by Rammohan Mallipeddi et al.,[7]. The proposed method uses the differential equation algorithm called FS-DE. After maximizing the class separation in training data a feature set is obtained, further presenting an ensemble base for face recognition. A study of modified constructive training algorithms for Multi Layer Perceptron is proposed by Hayet Boughrara et al.,[8], which is applied to applications in face recognition. This paper contributed to depict the methods to simultaneously increase the output neurons with increasing input patterns. Perceived Facial Image is applied for feature extraction. 3. PROPOSED METHODOLOGY We propose a robust methodology that is independent of facial variations like size, texture, feature position, facial expression etc using Viola-Jones, Principal component analysis and Neural Networks. Please refer to the flowchart stating the same in figure 1 Figure 1: Flowchart 3.1. Data Standard Data used is the BIOID face database. The dataset consists of 1521 gray scale images with 384*286 pixel resolution. The front angle view images in the database consists of a face of 23 different persons. We have the test set with images with a variety of face size, lighting, background representing real life scenarios as shown in fig 2.
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD35848 | Volume – 5 | Issue – 1 | November-December 2020 Page 286 Figure 2: Example set – Bio ID Face Database PRE-PROCESSING: We considered an image database that is readily available in either gray scale or color. Contrast stretchingisperformedonthe current image where white pixels were made whiter and dark pixels are made darker. FACE DETECTION: Right after Contrast-Stretching, Viola-Jones algorithm is utilized for detecting face in the image. WechoseViola-Jonesdetector as a detection algorithm because of its accuracy in detecting faces, and its ability to run in real time. The Viola-Jones detector works best with frontal images of faces and it can handle 45° face rotation both around the horizontal and vertical axis. There are three main concepts which allow it to run in real time first is Integral Image, Second is Ada-Boost and third is cascade structure Integral Image is a cost-effective generation algorithm that works on the sum of pixel intensities in a specified rectangle in an image. The main use-case is rapid computation of Haar-like features. The calculation done on the sum of a rectangular area inside the original image is extremely efficient for the initial step, requiring only four additions for any arbitrary rectangle size. The use of Ada-Boost is that it constructs strong classifiers as a linear combinationofweak classifiers. voila-Jones uses Haar features, Haar Features used in the Viola Jones algorithm is shown in Fig 3. Fig 3: Representing features with Haar Features
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD35848 | Volume – 5 | Issue – 1 | November-December 2020 Page 287 Haar features shown above can be of various height and width. The working for the calculation for value is that from the applied Haar feature to the face, we calculate the sum of white pixels and also the sum of black pixelsthenitissubtractedtoget a single value. If in the region the value is high, then it takes part of the face and is identified as eyes, nose, cheek etc. We have approximately 160000+ Haar features calculated all over perimage.Inreal timeapplicationSummingupthe entireimagepixel and after that subtracting them to get a single value is not much efficient, which can be reduced by using the Ada-boost classifier. The major function of Ada-boost is reducing the redundant features.Integral imageisusedinsteadofsummingupall the pixels as shown in figure 4. FIg 4: Integral Image To obtain a new pixel value - pixels above and pixels to the left are added then all the values around the patch are added to obtain the sum of all pixel values. Ada boost will be determining relevant features and irrelevant features. Post identifying relevant features and irrelevant features, adaboost assigns a weight value to all of them,Whichconstructsa strongclassifieras a linear combination of many Weak classifiers. Nearly 2500 features are calculated, the number of computations can be further reduced by cascading. A set of features are here kept in another set of classifiers and so on in a cascading format. Using this method, one can detect if it is a face or not faster and can reject it if one classifier fails to provide a necessary output to the next stage. Then the detected face is cropped and resized to 100x100 that is the standard resolution. The step after that is to identify the detected image using Principal Component Analysis (PCA) and Artificial Neural Network Algorithm (ANN). FEATURE EXTRACTION: To extract human face features, we use PCA. Fig 5 depicts the PCA operational flow. Fig 5: PCA flow chart To extract features from a cropped and resized image Principal component analysis (PCA) is used. To transform higher dimensional data into lower dimensional data, It is used as a tool in exploratory data analysis and in predictive analysis. A bunch of M x M size facial images in a training are converted using principal component analysis technique into lower
  • 5. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD35848 | Volume – 5 | Issue – 1 | November-December 2020 Page 288 dimensional face images. Principal Component Analysis (PCA) is used for the purpose of conversion of a set of correlated N variables into a set of uncorrelated k variables called principal components. The number of principal components (set of uncorrelated k variables) are less than or equal to the number of original values i.e. K<N. The above definition is modified as Principal component analysis for the applicationlikefacerecognitionapplication,itisoneofthemathematical proceduresused to convert a set of correlated N face images into a set of uncorrelated k face images called as Eigen faces. Before calculating the principal components the dimension of the original images has to be Reduced, to reduce the number of calculations. Since principal components show more noise and less direction, only first few principal components (say N) are selected and the remaining components as they contain more noise can be neglected. The M-image training set is represented by the best Eigen face with largest Eigen-values that accounts for the most variance with the set of best closely related feature-set and facial images. Each image in the training-set after finding Eigenfaces can be represented by a linear combination of Eigen Faces and will be represented as vectors. Standard database features are compared with input image features for Recognition. Figure 6: Example of an Artificial Neural Network Count of the neurons in the input layer is equal to the count Eigen faces, the type of the network is Feed forward back propagation network. Refer Figure7, For a single cell represented as f(x), its output can be calculated as output = input1 + input2 as shown in Figure 7. The function f(x) is a neutral function because it won’t add or amplify any value to the incoming inputs but it just adds the value of incoming inputs. One can use a mathematical function such as tanh to represent the above function. Figure 7: Single neuron cell Layered feed forward Artificial Neural Networks make use of the back propagation algorithm, where the neurons send their signals in forward direction and the errors are propagated backwards.Until ANN learnsthetrainingdata,theback propagation reduces this error. Through the back propagation technique the neural networks learn and determine the connectionweights between the inputs, outputs and hidden cells. To make the error minimal random weights are initially assigned to these networks which are to be adjusted. Error in network = Desired output – Calculated output
  • 6. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD35848 | Volume – 5 | Issue – 1 | November-December 2020 Page 289 The back propagation technique is used to minimize the error, using a formula whichconsistsofweights,inputs,outputs,error and learning rate (α). Figure 8: Updating New Weights in Back propagation. Training of the Neural Networks: For each individual in the database considered one ANN is used, twenty three networks are created since there are twenty three persons in the database. Face descriptors are used as input for the purpose of trainingANN.Thefacedescriptorsrelating to the same individual are used as positive examples for that individual network soutputwill be1andasfor negativeexamples like others so that output will be 0. Our trained network will be utilized for the purpose of recognition. Neural Networks Simulation: The facial descriptions of the test image calculated on Eigen-faces are used as input in all networks and are simulated. The results produced were comparable and the output being much higher than the previously describedlevel ensures thatthetest image belongs to a well-recognized person with a maximum output. FACE TAGGING: In the Face Tagging stage the result from the simulation is used by the recognition system to tag an appropriate name to the image of the person. The data is in binary form and hence this block is also responsible for evaluating the expression into a certain value and matching it to a person’s name in the name list. However, if the interpreted value is not one of the values listed in the roster, then the name returned will be automatically predefined as “Unknown”. In the Face Marking phase the results from the simulation are used in the awareness program to mark the correct word in the person's image. Data is in binary form so this block also has a responsibility to test the expression into a certain number and compare it with the person’s name in the word list. However, if the translated value is not one of the listed values, then the name to be returned will be automatically defined as "Unknown". RESULTS AND ANALYSIS Consider an image we have taken as test image as shown in Figure 9, it is preprocessed for identification Figure 9: Test Image Image 9 is the Test image taken and depicted for analysis for the paper, after applying theViola-Jonesalgorithmtotheimagein Figure 9, Identified face image shown in Figure 10 is obtained (bounding box on identified face). Then it is resized to 100x100 pixels, that is the Haar features are calculated and all the related features are extracted.
  • 7. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD35848 | Volume – 5 | Issue – 1 | November-December 2020 Page 290 Figure 10: Face recognised by Viola-Jones algorithm in Red boundary As shown by the bounding box in figure 11 main features of the face are identified by Viola-Jones algorithm and is used for deciding the nodes corresponding to the identified part of the face. Figure 11: Facial features identified by Viola-Jones algorithm (Boundary box) The features extracted by Viola-Jones algorithm are represented as nodes, these nodes are joined to form a shape making it sure that all nodes are well connected and the connected lines are named with reference numbers as shown in Figure 12. Figure 12: Facial Feature Calculation
  • 8. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD35848 | Volume – 5 | Issue – 1 | November-December 2020 Page 291 Figure 12 shows that in order to identify the person how the specifications of features are calculated. Each detail is tabulated after the features are calculated from various angles. The person in the image is identified correctly based on this calculation. The tabulated results of the various features taken-into-account are shown in Table 1. Table 1: Calculation of various features Different angles VS Face features of Images INDEX Feature 1 Feature 2 Feature 3 Feature 4 Feature 5 Feature 6 Feature 7 1 884 356 523 522 655 568 580 2 862 383 523 524 654 572 590 3 1923 370 530 512 650 638 646 4 1926 354 512 599 633 618 613 5 1120 419 696 612 720 639 654 6 1943 385 555 543 712 585 588 7 1912 362 560 546 666 700 612 8 1958 342 514 517 656 619 617 9 1192 326 449 466 632 630 632 10 1982 333 518 527 658 612 626 11 1943 320 472 489 626 579 692 12 1997 364 517 512 660 576 584 13 1934 245 492 420 542 613 619 14 1932 392 439 443 613 622 638 15 1868 360 512 599 632 552 548 Table 2: Results Techniques / Authors Accuracy Neural Networks 92% Principal Component Analysis 72% Kamencay [2] a) Segmented b)Non Segmented 90% 84% Fernandez [3] (Artificial Neural Nets and Viola-Jones) 88.64% Mohammad Da'san[4] (Viola-Jones , Neural-Networks) 90.31% Proposed Method 94% We compared the accuracy of our proposal with existing models as shown in Table 2. The accuracy of the proposed method turned out to be 94%, thus the proposed method is more accurate in recognisinga personinanimagewhencomparedtoother methods. CONCLUSION The paper presents an efficient approach i.e. fusion of preprocessing PCA then Viola-Jones and utilizing neural networks for face detection and recognition. The accuracyis compared with other existing models that performthesame operations, where It is observed that the performance ofthe model is superior. Facial Detection playsanimportantrolein a plethora of applications, where-in most cases there is a desire to utilize the high rate of accuracy in recognition of people hence the proposed method can be considered after taking account of the results with other existing methods REFERENCES [1] Maria De Marsico, Michele Nappi, Daniel Riccio and Harry Wechsler, “ Robust Face Recognition for Uncontrolled Pose and Illumination Changes” IEEE Transaction on Systems, Man and Cybernetics, vol.43,No.1,Jan 2013. [2] Kamencay, P, Jelsovka, D.; Zachariasova, M., "The impact of segmentation on face recognition using the principal component analysis (PCA)," IEEE International Conference in Signal Processing Algorithms, Architectures, Arrangements, and Applications, pp.1-4, Sept. 2011. [3] Ma. Christina D. Fernandez, Kristina Joyce E. Gob, Aubrey Rose M. Leonidas, Ron Jason J. Ravara, Argel A. Bandala and Elmer P. Dadios “Simultaneous Face Detection and Recognition using Viola-Jones Algorithm and Artificial Neural Networks for Identity Verification”, pp 672-676, 2014 IEEE Region 10 Symposium, 2014. [4] Mohammad Da'san, AminAlqudahandOlivierDebeir, “ Face Detection using Viola and Jones Method and Neural Networks” IEEE International Conference on Information and Communication Technology Research, pp 40-43,2015. [5] Anil K. Jain, “Face Recognition: Some Challenges in Forensics”, IEEE International Conference On Automatic Face and Gesture Recognition, pp 726- 733,2011. [6] Ming Zhang and John Fulcher “Face Perspective Understanding Using Artificial Neural Network Group Based Tree”, IEEE International ConferenceOnImage Processing, Vol.3, pp 475-478, 1996. [7] Hazem M. EI-Bakry and Mohy A. Abo Elsoud “Human Face Recognition Using Neural Networks” 16th national radio science conference, Ain Shams University, Feb. 23-25, 1999. [8] Muhammad Khan,JocelynChanussot,LaurentCondat, Annick Montanvert.Indusion:FusionofMultispectral and Panchromatic Images Using Induction Scaling Technique. IEEE Geoscience and Remote Sensing Letters, IEEE - Institute of Electrical and Electronics Engineers, 2008, 5 (1), pp.98- 102. ff10.1109/LGRS.2007.909934ff. ffhal-00348845f