SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1472
Built-in Face Recognition for Smart Phone Devices
Aesha Shah, Kavin Shah, Vidhi Shah, Chintan Shah
1 Aesha Shah, Dept. Of Information Technology , Vidyalankar Institute Of Technology ,Maharashtra, India
2 Kavin Shah, Dept. Of Information Technology, Vidyalankar Institute Of Technology, Maharashtra, India
3 Vidhi Shah, Dept. Of Information Technology , Vidyalankar Institute Of Technology, Maharashtra ,India
4 Chintan Shah, Assistant Professor, Dept. Of Information Technology , Vidyalankar Institute Of Technology,
Maharashtra, India
--------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - This paper presents the deployment of face
recognition on mobile phones. Mobile phones are becoming
the convergent platform for communication and personal
sensing such as clicking pictures. Due to this, the invent of
digital camera is reduced to much greater extent.
We envision Auto Face Tagger, a mobile phone based
collaborative system that senses the people and context in a
picture. This paper describes about a prototype of Auto Face
Tagger on Android Phones.
Key Words: Face recognition, Face detection, Viola Jones,
Auto Face Tagger, Image tagging, Android phone.
1. INTRODUCTION
Face recognition is used in identifying a person from
an image. This expertise has received much attention
because of the extensive versatile nature of interest
involved in it. It can be used as a biometric system for
authenticationoftheuser,distinguishsomeoneandtag
him to identify on social networking sites, recognize
people and remember their preferences and
peculiarities, etc. Adapting such kind of systems to
mobile devices would probably benefit because of the
flexibility of mobile devices. Creating a standalone
mobile application that does face recognition on
captured images is an interesting opportunity to
explore.
The incorporation of face recognition algorithms into
mobile devices has been an exigent task due to the
constraintsonprocessingpower,inadequatestorageof
the mobile device, limited network bandwidth and
connection flux, privacy and security concerns. Hence
client-server architecture needs to be developed . The
client side performs facial detection based on color
segmentation, pattern matching, etc on the captured
image and extracts the instructive features. These
features are then sent to the server which does the
computationally intensive task of assessment with the
database image set that would help in the face
recognition and then sends the data back to the client.
The client then displays the essential information to
the user.
The general structure followed by any facerecognition
technique is shown below.
Figure -1: Steps followed during face recognition
1.1 Proposed System
1.2 Face Recognition
PCA is a statistical procedure andits assimilationintoa
face recognition algorithm requires plentiful design
verdict. One of the uncomplicated andmost usefulPCA
approaches used in face recognition systems is the so-
called eigenface approach. This approach reconstructs
faces into a small set of critical characteristics,
Input Image
Face Detection
Pre-processing
Face Recognition
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1473
eigenfaces, whicharethecorecomponentsoftheinitial
set of learning images (training set).
Recognition is done by extruding a new image in the
eigenface subspace, after which thepersonisclassified
by comparing its position in eigenface space with the
position of recognized individuals . The benefit of this
approach over other face recognition systems is in its
straightforwardness, speed and inconsiderateness to
miniature or steady changes on the face. Thesetbackis
restricted to files that can beusedtorecognizetheface.
Namely, the images must be vertical frontal views of
human faces. The whole recognition process involves
two steps:
A. Initialization process
B. Recognition process
Figure -2: Flow diagram of PCA algorithm
2. Face Detection
A humancan identify faces in an image, but a computer
needspreciseinformationandconstraints.Tomakethe
task more manageable, Viola–Jones requires full view
frontal upright faces. Thus in order detect the face, the
entire face must point towards the camera and should
not be tilted to any of the side.
The uniqueness of Viola–Jones algorithm which makes
it a superior detection algorithm are:
Vigorous- very high detection rate (true-positive rate)
& very low false-positive rate always.
Instantaneous – For practical applications at least 2
frames per second must be handled.
Face detection only (not recognition) - The goal is to
distinguish faces from non-faces (detection is the first
step in the recognition process).
The algorithm has four stages:
1. Haar Feature Selection
2. Creating an Integral Image
3. Adaboost Training
4. Cascading Classifiers
1. Haar Features – All human faces share some
analogous properties. These consistency may be
coordinated using Haar Features.
A few properties familiar to human faces:
•The eye region is darker than the upper-cheeks.
•The nose bridge region is brighter than the eyes.
Composition of properties forming identical facial
features:
•Location and size: eyes, mouth, nose bridge
•Value: oriented gradients of pixel intensities
The four features corresponding to this algorithm are
then sought in the image of a face.
Rectangle features:
•Value = Σ (pixels in black area) - Σ (pixels in white
area)
•Three types: two-, three-, four-rectangles, Viola &
Jones used two-rectangle features
•For example: the variation in brightness between the
white &black rectangles over a specific area
•Each trait is related to a special location in the sub-
window
2. An image illustration called the integral image
assesses rectangular features in constant time, which
gives them a significant pace gain over more
complicated unusual features. Because each feature's
rectangular area is always contiguous to at least one
other rectangle, it follows that any two-rectangle
feature can be gauged in six array references, any
three-rectangle feature ineight,andanyfour-rectangle
feature in nine.
The integral image at position (x,y), is the addition of
the pixels above and to the left of (x,y),comprehensive.
•In cascading, each stage consists of a strong classifier.
So all the features are organized into several stages
where each stage has definite number of features.
The job of each stage is to verify whether a given sub-
window is definitely not a face or maybeaface.Agiven
sub-window is instantly discarded as not a face if it
fails in any of the stages.
3. CONCLUSIONS
We can see that the project is divided into three
main parts- Android, Face recognition and Automatic
tagging. The overall goal of this project is to
investigate the extent to which predicting tags as sets
increases annotation accuracy over automatic
tagging methods that treat the tags independently.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1474
In our app, Auto Face Tagger, the aim is to assign a
list of keywords indicating core functionalities, main
contents, key features or concepts of a mobile app.
Mobile app tags can be potentially useful to improve
app search, browsing, categorization, and
advertising, etc.
The face recognition concept has a wide scope in the
future of technology. It can be majorly used in
security as well as in advertising sector.
This app makes it possible to improve quality of
searching in numerous ways. For example, searching
a picture by a person’s name or the place name.
Tagging a picture at the time it is taken only once,
and then from next time when the picture of same
person or thing is taken, tagging will be done
automatically. It helps in saving time and gives an
easier access for searching pictures.
REFERENCES
[1] Proyecto Fin de Carrera, 2010,"Face Recognition
Algorithms".
[2] Mattias Junered, 2010,"Face Recognition in
Mobile Devices".
[3] P. Viola and M.J. Jones, "Robust Real-Time Face
Detection", International Journal of Computer Vision
57,137-154,2004.
[4] M.Bartlett, Stewart, J.Movellan, R.Sejnowski,
J,Terrence, "Face Recognition by Independent
Component Analysis",IEEE Trans. Neural Networks
13(6), 1450-1464,2002.
[5] Gustavo Carneiro, Antoni B. Chan, Pedro J.
Moreno, and Nuno Vasconcelos,"Supervised learning
of semantic classes for image annotation and
retrieval," IEEE Transactions on Pattern analysis and
Machine Intelligence, vol.29,pp.2007,2007.
[6] Face Recognition Using Principal Component
Analysis Method Liton Chandra Paul1 , Abdulla Al
Sumam2 Electronics and Telecommunication
Engineering1,2 Rajshahi University of Engineering
and Technology
[7] E. Fazl Ersi, J. S. Zelek, "Local Feature Matching for
Face Recognition", In Proc.of the 3rd Canadian Conf.
on Comp. and Rob. Vis.(CRV'06),2006.

More Related Content

What's hot

Dissertation final report
Dissertation final reportDissertation final report
Dissertation final report
Smriti Tikoo
 
Image–based face-detection-and-recognition-using-matlab
Image–based face-detection-and-recognition-using-matlabImage–based face-detection-and-recognition-using-matlab
Image–based face-detection-and-recognition-using-matlab
Ijcem Journal
 
face recognition system
face recognition systemface recognition system
face recognition system
Anil Kumar
 

What's hot (19)

D1061825
D1061825D1061825
D1061825
 
Face recognition a survey
Face recognition a surveyFace recognition a survey
Face recognition a survey
 
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSINGAN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
 
Dissertation final report
Dissertation final reportDissertation final report
Dissertation final report
 
Facial Expression Identification System
Facial Expression Identification SystemFacial Expression Identification System
Facial Expression Identification System
 
FACE DETECTION AND FEATURE EXTRACTION FOR FACIAL EMOTION DETECTION
FACE DETECTION AND FEATURE EXTRACTION FOR FACIAL EMOTION DETECTIONFACE DETECTION AND FEATURE EXTRACTION FOR FACIAL EMOTION DETECTION
FACE DETECTION AND FEATURE EXTRACTION FOR FACIAL EMOTION DETECTION
 
Local Descriptor based Face Recognition System
Local Descriptor based Face Recognition SystemLocal Descriptor based Face Recognition System
Local Descriptor based Face Recognition System
 
Review of face detection systems based artificial neural networks algorithms
Review of face detection systems based artificial neural networks algorithmsReview of face detection systems based artificial neural networks algorithms
Review of face detection systems based artificial neural networks algorithms
 
Progression in Large Age-Gap Face Verification
Progression in Large Age-Gap Face VerificationProgression in Large Age-Gap Face Verification
Progression in Large Age-Gap Face Verification
 
A Fast Recognition Method for Pose and Illumination Variant Faces on Video Se...
A Fast Recognition Method for Pose and Illumination Variant Faces on Video Se...A Fast Recognition Method for Pose and Illumination Variant Faces on Video Se...
A Fast Recognition Method for Pose and Illumination Variant Faces on Video Se...
 
Comparative Analysis of Face Recognition Methodologies and Techniques
Comparative Analysis of Face Recognition Methodologies and TechniquesComparative Analysis of Face Recognition Methodologies and Techniques
Comparative Analysis of Face Recognition Methodologies and Techniques
 
Face Recognition Techniques - An evaluation Study
Face Recognition Techniques - An evaluation StudyFace Recognition Techniques - An evaluation Study
Face Recognition Techniques - An evaluation Study
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Image–based face-detection-and-recognition-using-matlab
Image–based face-detection-and-recognition-using-matlabImage–based face-detection-and-recognition-using-matlab
Image–based face-detection-and-recognition-using-matlab
 
IRJET- Automated Criminal Identification System using Face Detection and Reco...
IRJET- Automated Criminal Identification System using Face Detection and Reco...IRJET- Automated Criminal Identification System using Face Detection and Reco...
IRJET- Automated Criminal Identification System using Face Detection and Reco...
 
Review of facial expression recognition system and
Review of facial expression recognition system andReview of facial expression recognition system and
Review of facial expression recognition system and
 
Review of facial expression recognition system and used datasets
Review of facial expression recognition system and used datasetsReview of facial expression recognition system and used datasets
Review of facial expression recognition system and used datasets
 
face recognition system
face recognition systemface recognition system
face recognition system
 
Face Recognition System under Varying Lighting Conditions
Face Recognition System under Varying Lighting ConditionsFace Recognition System under Varying Lighting Conditions
Face Recognition System under Varying Lighting Conditions
 

Similar to Built-in Face Recognition for Smart Phone Devices

Similar to Built-in Face Recognition for Smart Phone Devices (20)

Smart Doorbell System Based on Face Recognition
Smart Doorbell System Based on Face RecognitionSmart Doorbell System Based on Face Recognition
Smart Doorbell System Based on Face Recognition
 
IRJET- Face Detection and Tracking Algorithm using Open CV with Raspberry Pi
IRJET- Face Detection and Tracking Algorithm using Open CV with Raspberry PiIRJET- Face Detection and Tracking Algorithm using Open CV with Raspberry Pi
IRJET- Face Detection and Tracking Algorithm using Open CV with Raspberry Pi
 
IRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face Recognition
 
IRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face Recognition
 
IRJET- Autonamy of Attendence using Face Recognition
IRJET- Autonamy of Attendence using Face RecognitionIRJET- Autonamy of Attendence using Face Recognition
IRJET- Autonamy of Attendence using Face Recognition
 
Security by user through application to lock/unlock machine by face detection
Security by user through application to lock/unlock machine by face detectionSecurity by user through application to lock/unlock machine by face detection
Security by user through application to lock/unlock machine by face detection
 
IRJET- Smart Classroom Attendance System: Survey
IRJET- Smart Classroom Attendance System: SurveyIRJET- Smart Classroom Attendance System: Survey
IRJET- Smart Classroom Attendance System: Survey
 
IRJET - Face Detection and Recognition System
IRJET -  	  Face Detection and Recognition SystemIRJET -  	  Face Detection and Recognition System
IRJET - Face Detection and Recognition System
 
IRJET- VISITX: Face Recognition Visitor Management System
IRJET-  	  VISITX: Face Recognition Visitor Management SystemIRJET-  	  VISITX: Face Recognition Visitor Management System
IRJET- VISITX: Face Recognition Visitor Management System
 
IRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using AndroidIRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using Android
 
IRJET- Face Counter using Matlab
IRJET-  	  Face Counter using MatlabIRJET-  	  Face Counter using Matlab
IRJET- Face Counter using Matlab
 
Emotion Detection Using Facial Expression Recognition to Assist the Visually ...
Emotion Detection Using Facial Expression Recognition to Assist the Visually ...Emotion Detection Using Facial Expression Recognition to Assist the Visually ...
Emotion Detection Using Facial Expression Recognition to Assist the Visually ...
 
IRJET- Face Recognition using Deep Learning
IRJET-  	  Face Recognition using Deep LearningIRJET-  	  Face Recognition using Deep Learning
IRJET- Face Recognition using Deep Learning
 
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITIONA VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face Recognition
 
IRJET- Class Attendance using Face Detection and Recognition with OPENCV
IRJET- Class Attendance using Face Detection and Recognition with OPENCVIRJET- Class Attendance using Face Detection and Recognition with OPENCV
IRJET- Class Attendance using Face Detection and Recognition with OPENCV
 
IRJET- Credit Card Authentication using Facial Recognition
IRJET-  	  Credit Card Authentication using Facial RecognitionIRJET-  	  Credit Card Authentication using Facial Recognition
IRJET- Credit Card Authentication using Facial Recognition
 
IRJET- Vehicle Seat Vacancy Identification using Image Processing Technique
IRJET- Vehicle Seat Vacancy Identification using Image Processing TechniqueIRJET- Vehicle Seat Vacancy Identification using Image Processing Technique
IRJET- Vehicle Seat Vacancy Identification using Image Processing Technique
 
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
 
IRJET - Facial Recognition based Attendance Management System
IRJET - Facial Recognition based Attendance Management SystemIRJET - Facial Recognition based Attendance Management System
IRJET - Facial Recognition based Attendance Management System
 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systems
meharikiros2
 

Recently uploaded (20)

Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systems
 
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 

Built-in Face Recognition for Smart Phone Devices

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1472 Built-in Face Recognition for Smart Phone Devices Aesha Shah, Kavin Shah, Vidhi Shah, Chintan Shah 1 Aesha Shah, Dept. Of Information Technology , Vidyalankar Institute Of Technology ,Maharashtra, India 2 Kavin Shah, Dept. Of Information Technology, Vidyalankar Institute Of Technology, Maharashtra, India 3 Vidhi Shah, Dept. Of Information Technology , Vidyalankar Institute Of Technology, Maharashtra ,India 4 Chintan Shah, Assistant Professor, Dept. Of Information Technology , Vidyalankar Institute Of Technology, Maharashtra, India --------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - This paper presents the deployment of face recognition on mobile phones. Mobile phones are becoming the convergent platform for communication and personal sensing such as clicking pictures. Due to this, the invent of digital camera is reduced to much greater extent. We envision Auto Face Tagger, a mobile phone based collaborative system that senses the people and context in a picture. This paper describes about a prototype of Auto Face Tagger on Android Phones. Key Words: Face recognition, Face detection, Viola Jones, Auto Face Tagger, Image tagging, Android phone. 1. INTRODUCTION Face recognition is used in identifying a person from an image. This expertise has received much attention because of the extensive versatile nature of interest involved in it. It can be used as a biometric system for authenticationoftheuser,distinguishsomeoneandtag him to identify on social networking sites, recognize people and remember their preferences and peculiarities, etc. Adapting such kind of systems to mobile devices would probably benefit because of the flexibility of mobile devices. Creating a standalone mobile application that does face recognition on captured images is an interesting opportunity to explore. The incorporation of face recognition algorithms into mobile devices has been an exigent task due to the constraintsonprocessingpower,inadequatestorageof the mobile device, limited network bandwidth and connection flux, privacy and security concerns. Hence client-server architecture needs to be developed . The client side performs facial detection based on color segmentation, pattern matching, etc on the captured image and extracts the instructive features. These features are then sent to the server which does the computationally intensive task of assessment with the database image set that would help in the face recognition and then sends the data back to the client. The client then displays the essential information to the user. The general structure followed by any facerecognition technique is shown below. Figure -1: Steps followed during face recognition 1.1 Proposed System 1.2 Face Recognition PCA is a statistical procedure andits assimilationintoa face recognition algorithm requires plentiful design verdict. One of the uncomplicated andmost usefulPCA approaches used in face recognition systems is the so- called eigenface approach. This approach reconstructs faces into a small set of critical characteristics, Input Image Face Detection Pre-processing Face Recognition
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1473 eigenfaces, whicharethecorecomponentsoftheinitial set of learning images (training set). Recognition is done by extruding a new image in the eigenface subspace, after which thepersonisclassified by comparing its position in eigenface space with the position of recognized individuals . The benefit of this approach over other face recognition systems is in its straightforwardness, speed and inconsiderateness to miniature or steady changes on the face. Thesetbackis restricted to files that can beusedtorecognizetheface. Namely, the images must be vertical frontal views of human faces. The whole recognition process involves two steps: A. Initialization process B. Recognition process Figure -2: Flow diagram of PCA algorithm 2. Face Detection A humancan identify faces in an image, but a computer needspreciseinformationandconstraints.Tomakethe task more manageable, Viola–Jones requires full view frontal upright faces. Thus in order detect the face, the entire face must point towards the camera and should not be tilted to any of the side. The uniqueness of Viola–Jones algorithm which makes it a superior detection algorithm are: Vigorous- very high detection rate (true-positive rate) & very low false-positive rate always. Instantaneous – For practical applications at least 2 frames per second must be handled. Face detection only (not recognition) - The goal is to distinguish faces from non-faces (detection is the first step in the recognition process). The algorithm has four stages: 1. Haar Feature Selection 2. Creating an Integral Image 3. Adaboost Training 4. Cascading Classifiers 1. Haar Features – All human faces share some analogous properties. These consistency may be coordinated using Haar Features. A few properties familiar to human faces: •The eye region is darker than the upper-cheeks. •The nose bridge region is brighter than the eyes. Composition of properties forming identical facial features: •Location and size: eyes, mouth, nose bridge •Value: oriented gradients of pixel intensities The four features corresponding to this algorithm are then sought in the image of a face. Rectangle features: •Value = Σ (pixels in black area) - Σ (pixels in white area) •Three types: two-, three-, four-rectangles, Viola & Jones used two-rectangle features •For example: the variation in brightness between the white &black rectangles over a specific area •Each trait is related to a special location in the sub- window 2. An image illustration called the integral image assesses rectangular features in constant time, which gives them a significant pace gain over more complicated unusual features. Because each feature's rectangular area is always contiguous to at least one other rectangle, it follows that any two-rectangle feature can be gauged in six array references, any three-rectangle feature ineight,andanyfour-rectangle feature in nine. The integral image at position (x,y), is the addition of the pixels above and to the left of (x,y),comprehensive. •In cascading, each stage consists of a strong classifier. So all the features are organized into several stages where each stage has definite number of features. The job of each stage is to verify whether a given sub- window is definitely not a face or maybeaface.Agiven sub-window is instantly discarded as not a face if it fails in any of the stages. 3. CONCLUSIONS We can see that the project is divided into three main parts- Android, Face recognition and Automatic tagging. The overall goal of this project is to investigate the extent to which predicting tags as sets increases annotation accuracy over automatic tagging methods that treat the tags independently.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1474 In our app, Auto Face Tagger, the aim is to assign a list of keywords indicating core functionalities, main contents, key features or concepts of a mobile app. Mobile app tags can be potentially useful to improve app search, browsing, categorization, and advertising, etc. The face recognition concept has a wide scope in the future of technology. It can be majorly used in security as well as in advertising sector. This app makes it possible to improve quality of searching in numerous ways. For example, searching a picture by a person’s name or the place name. Tagging a picture at the time it is taken only once, and then from next time when the picture of same person or thing is taken, tagging will be done automatically. It helps in saving time and gives an easier access for searching pictures. REFERENCES [1] Proyecto Fin de Carrera, 2010,"Face Recognition Algorithms". [2] Mattias Junered, 2010,"Face Recognition in Mobile Devices". [3] P. Viola and M.J. Jones, "Robust Real-Time Face Detection", International Journal of Computer Vision 57,137-154,2004. [4] M.Bartlett, Stewart, J.Movellan, R.Sejnowski, J,Terrence, "Face Recognition by Independent Component Analysis",IEEE Trans. Neural Networks 13(6), 1450-1464,2002. [5] Gustavo Carneiro, Antoni B. Chan, Pedro J. Moreno, and Nuno Vasconcelos,"Supervised learning of semantic classes for image annotation and retrieval," IEEE Transactions on Pattern analysis and Machine Intelligence, vol.29,pp.2007,2007. [6] Face Recognition Using Principal Component Analysis Method Liton Chandra Paul1 , Abdulla Al Sumam2 Electronics and Telecommunication Engineering1,2 Rajshahi University of Engineering and Technology [7] E. Fazl Ersi, J. S. Zelek, "Local Feature Matching for Face Recognition", In Proc.of the 3rd Canadian Conf. on Comp. and Rob. Vis.(CRV'06),2006.