SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 849
Progression in large Age-gap face verification
Neha Rahman1, Ankit Chaora2
1M.tech Scholar, Digital Electronics, 2Assistant Professor
1,2 Dept. of Electronics and Telecommunication Engineering, Rungta College of Engineering and Technology
Bhilai, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Human face verification is an important topic in
computer vision, imaging and multimedia as it defines the
uniqueness and conveys ones identity. Recognition of face or
identity is required to access the rendered services by the licit
person only. Applications include access to computer system,
ATMs, laptops, mobile phones etc. Verificationaccuracymight
get failed if it encounters any of the factors listed as variation
in face pose, facial expression, illumination and aging. This
survey paper presents panoramic view of progression in face
recognition right from the conventional methods to the most
advanced technologies(i.e. Deepneuralnetwork). Applications
in different field such as security, machine recognition of faces
in non law enforcements (like passports, photo IDs, driving
licenses) has been mentioned. Italsoshowcasestheframework
(parameters, techniques, database, machine learning
techniques etc)
Key Words: Face recognition, Illumination, Data set, Auto-
encoder, deep neural network
1. INTRODUCTION
The human face plays an important role in our social
interaction, conveying people’s identity. Using the human
face as a key to security, machine recognition of faces is
emerging as an active research area spanning several
disciplines such as image processing, pattern recognition,
computer vision and neural networks. Biometric face
recognition technology has received significant attention
both from neuroscientists and from computer vision
scientists in the past several years due to its potential for a
wide variety of applications in both law enforcement and
non-law enforcement such as passports, credit cards, photo
IDs, driving licenses and mug-shots to real time matching of
surveillance video images.
As compared with other biometrics systems using
fingerprint, palm print and iris, face recognition has distinct
advantages because of its non-contact process. Face images
can be captured from a distancewithouttouchingthe person
being identified and the identification does not require
interacting with the person. In addition, face recognition
serves the crime deterrent purposebecausefaceimagesthat
have been recorded and archived can later help identify a
person. Research interest in face recognition has grown
significantly in recent years as a result of the following facts:
1. The increase in emphasis on civilian or commercial
research projects.
2. The increasing need for surveillance related
applications due to drug trafficking and terrorist
activities etc.
3. The re-emergenceofneural network classifierswith
emphasis on real time computation and adaptation.
4. The availability of real time hardware.
Facial biometric is used to verify the identity of individuals
attempting access for various border management and
access control applications.Facial matchingalgorithmsmake
use of digital photographs of the face stored in a database or
on an ID card. These digital images are captured upon
registration into the system and then compared to the live
photo of the individual upon an access attempt in a process
called “matching”. Face recognitionisaneasytask forhuman
experiment; the three day old baby is able to distinguish
among known faces. Facial recognition utilizes distinctive
features of the face including the upper outlines, the eye
sockets, the areas surrounding the cheekbones, the sides of
the mouth, the location of the nose and eyes to perform
verification and identification. Each method that involves
with the face recognition has the similar chain of steps as
collection of images (dataset), image pre-processing that
followed by alignment of images, face detector then feature
extraction that includes dimensional reduction and finally
imparting training in deep neural network for classification
and identification.
2. LARGE AGE-GAP FACE IDENTIFICATION SYSTEM
Age invariant recognition system primarily comprises of
the following stages image source that provides the
individuals picture to be recognized, face detection, face
normalization, image pre-processing, feature extraction and
then feature matching for image identification. Figure 1
illustrates the stages involved in any age invariant face
recognition system.
A. Image source
It can be the digital camera or smart phones that can provide
the image. CCTV cameras are also deployed for capturing
images and videos and later can be used to provide the
source for image.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 850
B. Face detection
This phase of system finds the face region of the image. The
most popular face detector is Viola-jones and Face-vecs. It
tries to locate the facial landmarks using face alignment
algorithm. It uses the eye locations to align the photo so that
eyes are horizontallyaligned for detectingtheface.Detection
error could influence normalization result.
C. Face normalization
It prepares the image for feature extraction phase of the
system. It reduces the intra-class differences but not affect
the extra-class variations. It enhances the visual effectsofthe
image and hence subsequently improves recognition
performance. It assesses the betterment of following
recognition stages. The main objective behind the face
normalization is to reduce the useless and redundant
information that it carries.
D. Feature extraction
Feature extraction is the most crucial stage for face
recognition as it stands out to be the base for extracting the
relevant information from the picture or image. There are
multiple of feature extraction method available viz. local
binary pattern (LBP), Histogram of orientedgradients(HOG)
etc.
Fig -1: Block diagram of age invariant face recognition
system
3. LITERATURE SURVEY
In 1991, the M. Turk et al [1]proposed thesimplestapproach
of templatematching.Itwasa2Dapproachandunsupervised
learning. Here the face images are projected onto a feature
space that encodes the variation among known face images
but the drawback that lies with these Eigen-faces is that the
training images must be centered and of the same size but it
is considered to be the easiest to implement. The ideabehind
Eigen-faces is to map data into a lower dimensionality space.
Its performance limits with the change of illumination.
Person is being recognized by comparing characteristics of
the face image with the Eigen-faces of the training set of face
images. Its idea is to find principal component of the
distributions of face.
After few years in 1997 Peter N. Belhumeur et al [2]
developed the face recognition procedure that works with
large variation in lighting direction and facial expression.
Pattern classification approach has been used where each
pixel of an image considered as a coordinate in a high
dimensional space. A derivative of Fisher’s Linear
Discriminant (FLD) a classspecificlinearprojectionisused.It
compared various methods of pattern classification i.e
correlation, Eigen faces and Fisher’s Linear Discriminant
(FLD). FLD proved to be the best classification technique
among all as it stood against the sensitivity under lighting
conditions and also needed less storage.
In 2010 Unsang Park [3] proposed the conversion of 2D face
aging dataset to 3D aging model. It worked on building the
3D aging model provided the availability of 2D face aging
dataset. It considered the separate modeling of shape and
texture followed by final matching done by face VACS face
matcher.
With advancement in time somenewconceptscoineduplike
hidden factor [4] proposedanddeveloped byDihongGonget
al. in 2013 stated that the face can be decomposed into
identity factor that remains unaffected with age and an age
factor affected by the aging process. Local face descriptor
Histograms of Oriented Gradients (HOG) is applied followed
by the dimensional reduction techniques i.e. PCAandLDAto
get smaller sliced vector forfurtheranalysis.Thetwodataset
used here are MORPH and FGNET. Identification rate of
91.14% is obtained with MORPH and 69.0% with FGNET
databases. This linear model clearly defines the boundary
between the identity factor and age factor. It has the Noise
factor that leads to the deviationfromthemodel parameters.
Guosheng Hu et al [5] in this work they conduct a rigorous
experiment on LFW data set. They conducted experiments
on three different CNN architectures CNN-S (small), CNN-M
(medium) and CNN-L (large). They used the metric learning
method i.e. Joint Bayesian model that makes the two classes
more separable with the activation function being usedhere
is rectification linear unit (ReLU). CNN and metric learning
highly increases the success rate of the face recognition
system.
Dihong gong et al [6] in 2015 described the encoded
maximum entropy of images microstructures into discrete
codes followed by the identity factor analysis for estimation
of identity of two similar faces. MEFD is used as the feature
descriptor followed by the dimensional reductiontechnique
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 851
PCA and LDA and then identity factor analysishasbeendone
for classification. The datasets used were MORPH and
FGNET. Easy implementation and clubbing with any feature
descriptors for further improved recognition is the merit.
This cannot be directly applied on the dataset that don’t
belong to face aging.
Another application of deep neural network that worked
with the CAFÉ dataset has been successfully presented by
Luoqi Liu [8] et al included the DAFV framework that
perfectly described the aging pattern followed by the aging
face verification.
One of the recent fine works has been presented by Simone
Bianco [12] in 2016 that successfully coupled two DCNN ina
Siamese architecture with a contrastive loss function and it
outperformed the existing methods.
4. FACE RECOGNITION APPROACHES
There are different face recognition methods. Here the
relative survey of performances of three techniques –
feature, soft computing and appearance is stated below and
is shown in figure 2.
A. Feature based face recognition approach
It utilizes a previous face data to pick a feature quantity to
completely recognize people. Local features are eyes, chin,
nose, head and mouth outline which can be decided from
images of face. Topological graphs in fig 1.3 are utilized to
show associations among features that achieve structure
which is utilized to differentiate associated faces from a
database. Feature based approaches handles problem of
diverse radiance situation, scaling, facial expressions, noisy
images, face occlusions and aging effects. Some of the
prominent advantages shown by this method are
 From face images it accurately captures relevant
features.
 Insensitivity to face orientation, variable lighting and
size situations.
Fig -2: Different types of face recognition approaches
B. Soft computing based face recognition approach
This technique has appeared as a significant technique for
examination in computer vision investigation. This
technique enhances the processing speedoffacerecognition
system. Neural network is trained on the same pictures and
databases again and again which in turn makes the system
more efficient and reliable. Non linear functions or the
problems can be solved where the mathematical models are
not available. It can process easily with big size features.
Somehow this technique is costly and need a great
correlation degree among test and training pictures. Soft
computing FR technique can be categorize again in three
domain as illustrated
 Artificial neural network (ANN) based methods: it is an
effective tool to resolve non-linearity executed with the
aid of specific constraints. It gives the best decision
making schemes which can be trained to perform
complicated applications like pattern recognition (PR),
classification optimization and identification. It has the
capability to study from any undetected information. It
is also free from any fault in its any node.
It holds few limitations also it takes large computation
time to train data.
 Fuzzy based technique: fuzzy logic is utilized for
modeling human intelligence and awareness. It is used
in rigorous face recognition framework. It is
unresponsive to fluctuating lighting and facial
expressions. It delivers good output only for minor
variation in facial expressions and illumination.
 Genetic algorithm (GA) basedtechnique:GAisproficient
in decreasing calculation time for a massive heap space.
GA is a technique that works on finding fittest and
optimized solutions from a given population. It works
well with huge dataset.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 852
C. Appearance based face recognition approach
Appearance based FR methods have obtained good
interest from a large variety of examination fields which
includes biometrics, pattern recognition and computer
vision. There are basically two types involved in appearance
based FR and they are as holistic method and hybrid
technique. It handles the problem of pose variations, facial
expressions numerous lighting situations and small
resolution. It holds advantages like dimensionality decrease
and improved recognition output. It is sensitive to face
orientation, noise and size. Examples of appearance based
FR methods are Eigen faces, DFT etc.
 Holistic method: it makes use of complete face area as
raw input to a recognition device. One of the greatest
broadly utilized face area representations is Eigen
image. Machine recognition framework is ought to
utilize only face. Eigen faces and Fisher faces had
appeared to be operative in tests with bigger databases.
Key benefit of holistic method is that they don’t destroy
any of records within picture and concentrates only on
limited areas only. On the contrary, it needs high
computational cost.
 Hybrid method: this method utilizes holistic and
local features both. Idea of Eigen faces are extended to
Eigen structures for instance Eigen mouth, Eigen eyes
etc.
5. CHALLENGES INVOLVED
Face recognition technique is highly affected by the
challenges it faces in its path. Technologies are somewhat
resistant to moderate changes in hairstyle, as they do not
utilize areas of the face located near the hairline. When used
to identify the person’s image it may return or generate the
wrong results. Here are some of the factors that lead to the
undesired results.
 TEMPORAL INVARIANCE
It is one of the challenges which are to be achieved and the
aim is to get the representation and matching method that
remains unchanged due to facial aging. The performance of
facial recognition technology is very closely tied to the
quality of the facial image. Low-quality images are much
more likely to result in enrolment and matching errors than
high-quality images.
 FACIAL AGING
Headings, or heads, are organizational devices that Facial
aging is a growth process where the 3D shapes of the face
and its texture changes which surely degrade the matching
performance of the system.
 OCCLUSION
Occlusion in image is broadly defined as the hidden
information or the part of the image that cannot be clearly
stated or shown. Example a car passing under the bridge.
 ILLUMINATION
This reflects the brightness and contrast of image and is a
major factor that sometimes hinders in the recognition of
the image.
REFERENCES
[1] M. Turk and A.Pentland, “Eigenfaces for Recognition”,
Journal of Cognitive Neuroscience, vol.3,no.1,pp.71-86,
1991, hard copy
[2] Eigenfaces vs. Fisherfaces: Recognition Using Class
Specific Linear Projection article in IEEE Transactions
on pattern analysis and Machine Intelligence. July 1997
[3] U.Park, Y.Tong, and A.K. Jain,”Age-invariant face
recognition,” pattern analysis and Machine intelligence
IEEE Transactions on, vol 32. No.5.pp 947-954.2010.
[4] D. Gong, Z. Li, D.Lin, J. Liu, X. Tang, “Hidden Factor
Analysis for Age Invariant Face Recognition”.ICCV2013
[5] Guosheng Hu, Yongxin yang, Josef Kittler, “When face
recognition meets with Deep learning: an evaluation of
convolutional neural networks for face recognition”.
April 2015
[6] Dihong gong, Zhifeng Li and Dacheng Tao, “A maximum
entropy feature descriptor for age invariant face
recognition”, in 2015.
[7] FG-NET Aging Database, http://www.fgnet.rsunit.com/.
[8] L.Liu, C.Xiong, H. Zhang, Z. Niu, M. Wang and S. Yan, “
Deep aging face verification with large gaps,”
Multimedia, IEEE transactions on , vol.18, no.1, pp. 64-
75, 2016.
[9] Y. Taigman,M. Yang, M. Ranzato, and L. Wolf, “Deep face
closing the gap to human-level performance in face
verification,”in proceedings of the IEEE Conference on
computer vision and pattern recognition, 2014,pp.
1701-1708
[10] Timo Ahonen, Abdenour Hadid, and Matti “Face
descriptions with local binary patterns: Application to
face recognition,” IEEE Trans. Pattern Anal. Mach. Intell
vol. 28, no. 12, pp. 2037-2041, 2006.
[11] Jiaji huang, Qiang Qiu, Robert Calderbank and G. sapiro,
“Geometry aware deep transform”, ICCV 2015
[12] Simone Bianco, “ Large age-gap face verification by
feature injection in deep networks,” in 2016

More Related Content

What's hot

IRJET- Facial Expression Recognition
IRJET- Facial Expression RecognitionIRJET- Facial Expression Recognition
IRJET- Facial Expression RecognitionIRJET Journal
 
Face Annotation using Co-Relation based Matching for Improving Image Mining ...
Face Annotation using Co-Relation based Matching  for Improving Image Mining ...Face Annotation using Co-Relation based Matching  for Improving Image Mining ...
Face Annotation using Co-Relation based Matching for Improving Image Mining ...IRJET Journal
 
IRJET- Customized Campus Surveillance System
IRJET- Customized Campus Surveillance SystemIRJET- Customized Campus Surveillance System
IRJET- Customized Campus Surveillance SystemIRJET Journal
 
Face Recognition Techniques - An evaluation Study
Face Recognition Techniques - An evaluation StudyFace Recognition Techniques - An evaluation Study
Face Recognition Techniques - An evaluation StudyEswar Publications
 
IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...
IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...
IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...IRJET Journal
 
A Hybrid Approach to Face Detection And Feature Extraction
A Hybrid Approach to Face Detection And Feature ExtractionA Hybrid Approach to Face Detection And Feature Extraction
A Hybrid Approach to Face Detection And Feature Extractioniosrjce
 
IRJET- Library Management System with Facial Biometric Authentication
IRJET- Library Management System with Facial Biometric AuthenticationIRJET- Library Management System with Facial Biometric Authentication
IRJET- Library Management System with Facial Biometric AuthenticationIRJET Journal
 
Explaining Aluminous Ascientification Of Significance Examples Of Personal St...
Explaining Aluminous Ascientification Of Significance Examples Of Personal St...Explaining Aluminous Ascientification Of Significance Examples Of Personal St...
Explaining Aluminous Ascientification Of Significance Examples Of Personal St...SubmissionResearchpa
 
IRJET- A Review on Various Approaches of Face Recognition
IRJET- A Review on Various Approaches of Face RecognitionIRJET- A Review on Various Approaches of Face Recognition
IRJET- A Review on Various Approaches of Face RecognitionIRJET Journal
 
Smriti's research paper
Smriti's research paperSmriti's research paper
Smriti's research paperSmriti Tikoo
 
IRJET-A Survey on Face Recognition based Security System and its Applications
IRJET-A Survey on Face Recognition based Security System and its ApplicationsIRJET-A Survey on Face Recognition based Security System and its Applications
IRJET-A Survey on Face Recognition based Security System and its ApplicationsIRJET Journal
 
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...cscpconf
 
IRJET-Facial Expression Recognition using Efficient LBP and CNN
IRJET-Facial Expression Recognition using Efficient LBP and CNNIRJET-Facial Expression Recognition using Efficient LBP and CNN
IRJET-Facial Expression Recognition using Efficient LBP and CNNIRJET Journal
 
A03203001004
A03203001004A03203001004
A03203001004theijes
 
Review of face detection systems based artificial neural networks algorithms
Review of face detection systems based artificial neural networks algorithmsReview of face detection systems based artificial neural networks algorithms
Review of face detection systems based artificial neural networks algorithmsijma
 
Face Recognition System under Varying Lighting Conditions
Face Recognition System under Varying Lighting ConditionsFace Recognition System under Varying Lighting Conditions
Face Recognition System under Varying Lighting ConditionsIOSR Journals
 
Local Descriptor based Face Recognition System
Local Descriptor based Face Recognition SystemLocal Descriptor based Face Recognition System
Local Descriptor based Face Recognition SystemIRJET Journal
 

What's hot (19)

IRJET- Facial Expression Recognition
IRJET- Facial Expression RecognitionIRJET- Facial Expression Recognition
IRJET- Facial Expression Recognition
 
Face Annotation using Co-Relation based Matching for Improving Image Mining ...
Face Annotation using Co-Relation based Matching  for Improving Image Mining ...Face Annotation using Co-Relation based Matching  for Improving Image Mining ...
Face Annotation using Co-Relation based Matching for Improving Image Mining ...
 
IRJET- Customized Campus Surveillance System
IRJET- Customized Campus Surveillance SystemIRJET- Customized Campus Surveillance System
IRJET- Customized Campus Surveillance System
 
Face Recognition Techniques - An evaluation Study
Face Recognition Techniques - An evaluation StudyFace Recognition Techniques - An evaluation Study
Face Recognition Techniques - An evaluation Study
 
IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...
IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...
IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...
 
A Hybrid Approach to Face Detection And Feature Extraction
A Hybrid Approach to Face Detection And Feature ExtractionA Hybrid Approach to Face Detection And Feature Extraction
A Hybrid Approach to Face Detection And Feature Extraction
 
IRJET- Library Management System with Facial Biometric Authentication
IRJET- Library Management System with Facial Biometric AuthenticationIRJET- Library Management System with Facial Biometric Authentication
IRJET- Library Management System with Facial Biometric Authentication
 
Explaining Aluminous Ascientification Of Significance Examples Of Personal St...
Explaining Aluminous Ascientification Of Significance Examples Of Personal St...Explaining Aluminous Ascientification Of Significance Examples Of Personal St...
Explaining Aluminous Ascientification Of Significance Examples Of Personal St...
 
IRJET- A Review on Various Approaches of Face Recognition
IRJET- A Review on Various Approaches of Face RecognitionIRJET- A Review on Various Approaches of Face Recognition
IRJET- A Review on Various Approaches of Face Recognition
 
Smriti's research paper
Smriti's research paperSmriti's research paper
Smriti's research paper
 
IRJET-A Survey on Face Recognition based Security System and its Applications
IRJET-A Survey on Face Recognition based Security System and its ApplicationsIRJET-A Survey on Face Recognition based Security System and its Applications
IRJET-A Survey on Face Recognition based Security System and its Applications
 
N010226872
N010226872N010226872
N010226872
 
IRJET- Digiyathra
IRJET-  	  DigiyathraIRJET-  	  Digiyathra
IRJET- Digiyathra
 
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
 
IRJET-Facial Expression Recognition using Efficient LBP and CNN
IRJET-Facial Expression Recognition using Efficient LBP and CNNIRJET-Facial Expression Recognition using Efficient LBP and CNN
IRJET-Facial Expression Recognition using Efficient LBP and CNN
 
A03203001004
A03203001004A03203001004
A03203001004
 
Review of face detection systems based artificial neural networks algorithms
Review of face detection systems based artificial neural networks algorithmsReview of face detection systems based artificial neural networks algorithms
Review of face detection systems based artificial neural networks algorithms
 
Face Recognition System under Varying Lighting Conditions
Face Recognition System under Varying Lighting ConditionsFace Recognition System under Varying Lighting Conditions
Face Recognition System under Varying Lighting Conditions
 
Local Descriptor based Face Recognition System
Local Descriptor based Face Recognition SystemLocal Descriptor based Face Recognition System
Local Descriptor based Face Recognition System
 

Similar to Progression in Large Age-Gap Face Verification

Age and Gender Classification using Convolutional Neural Network
Age and Gender Classification using Convolutional Neural NetworkAge and Gender Classification using Convolutional Neural Network
Age and Gender Classification using Convolutional Neural NetworkIRJET Journal
 
IRJET - Real Time Facial Analysis using Tensorflowand OpenCV
IRJET -  	  Real Time Facial Analysis using Tensorflowand OpenCVIRJET -  	  Real Time Facial Analysis using Tensorflowand OpenCV
IRJET - Real Time Facial Analysis using Tensorflowand OpenCVIRJET Journal
 
Facial Emotion Recognition: A Survey
Facial Emotion Recognition: A SurveyFacial Emotion Recognition: A Survey
Facial Emotion Recognition: A SurveyIRJET Journal
 
Face Liveness Detection for Biometric Antispoofing Applications using Color T...
Face Liveness Detection for Biometric Antispoofing Applications using Color T...Face Liveness Detection for Biometric Antispoofing Applications using Color T...
Face Liveness Detection for Biometric Antispoofing Applications using Color T...rahulmonikasharma
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face RecognitionIRJET Journal
 
IRJET- Library Management System with Facial Biometric Authentication
IRJET- Library Management System with Facial Biometric AuthenticationIRJET- Library Management System with Facial Biometric Authentication
IRJET- Library Management System with Facial Biometric AuthenticationIRJET Journal
 
IRJET- Face Recognition using Deep Learning
IRJET-  	  Face Recognition using Deep LearningIRJET-  	  Face Recognition using Deep Learning
IRJET- Face Recognition using Deep LearningIRJET Journal
 
Age and Gender Prediction and Human count
Age and Gender Prediction and Human countAge and Gender Prediction and Human count
Age and Gender Prediction and Human countIRJET Journal
 
Person identification based on facial biometrics in different lighting condit...
Person identification based on facial biometrics in different lighting condit...Person identification based on facial biometrics in different lighting condit...
Person identification based on facial biometrics in different lighting condit...IJECEIAES
 
IRJET- Application of MCNN in Object Detection
IRJET-  	  Application of MCNN in Object DetectionIRJET-  	  Application of MCNN in Object Detection
IRJET- Application of MCNN in Object DetectionIRJET Journal
 
AI-based Mechanism to Authorise Beneficiaries at Covid Vaccination Camps usin...
AI-based Mechanism to Authorise Beneficiaries at Covid Vaccination Camps usin...AI-based Mechanism to Authorise Beneficiaries at Covid Vaccination Camps usin...
AI-based Mechanism to Authorise Beneficiaries at Covid Vaccination Camps usin...IRJET Journal
 
IRJET- Multiple Feature Fusion for Facial Expression Recognition in Video: Su...
IRJET- Multiple Feature Fusion for Facial Expression Recognition in Video: Su...IRJET- Multiple Feature Fusion for Facial Expression Recognition in Video: Su...
IRJET- Multiple Feature Fusion for Facial Expression Recognition in Video: Su...IRJET Journal
 
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONESAN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONESAM Publications
 
FACEMASK AND PHYSICAL DISTANCING DETECTION USING TRANSFER LEARNING TECHNIQUE
FACEMASK AND PHYSICAL DISTANCING DETECTION USING TRANSFER LEARNING TECHNIQUEFACEMASK AND PHYSICAL DISTANCING DETECTION USING TRANSFER LEARNING TECHNIQUE
FACEMASK AND PHYSICAL DISTANCING DETECTION USING TRANSFER LEARNING TECHNIQUEIRJET Journal
 
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITIONA VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITIONIRJET Journal
 
IRJET - Emotionalizer : Face Emotion Detection System
IRJET - Emotionalizer : Face Emotion Detection SystemIRJET - Emotionalizer : Face Emotion Detection System
IRJET - Emotionalizer : Face Emotion Detection SystemIRJET Journal
 
IRJET- Emotionalizer : Face Emotion Detection System
IRJET- Emotionalizer : Face Emotion Detection SystemIRJET- Emotionalizer : Face Emotion Detection System
IRJET- Emotionalizer : Face Emotion Detection SystemIRJET Journal
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face IdentificationIRJET Journal
 
MTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITION
MTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITIONMTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITION
MTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITIONIRJET Journal
 

Similar to Progression in Large Age-Gap Face Verification (20)

Age and Gender Classification using Convolutional Neural Network
Age and Gender Classification using Convolutional Neural NetworkAge and Gender Classification using Convolutional Neural Network
Age and Gender Classification using Convolutional Neural Network
 
IRJET - Real Time Facial Analysis using Tensorflowand OpenCV
IRJET -  	  Real Time Facial Analysis using Tensorflowand OpenCVIRJET -  	  Real Time Facial Analysis using Tensorflowand OpenCV
IRJET - Real Time Facial Analysis using Tensorflowand OpenCV
 
Facial Emotion Recognition: A Survey
Facial Emotion Recognition: A SurveyFacial Emotion Recognition: A Survey
Facial Emotion Recognition: A Survey
 
Face Liveness Detection for Biometric Antispoofing Applications using Color T...
Face Liveness Detection for Biometric Antispoofing Applications using Color T...Face Liveness Detection for Biometric Antispoofing Applications using Color T...
Face Liveness Detection for Biometric Antispoofing Applications using Color T...
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face Recognition
 
IRJET- Library Management System with Facial Biometric Authentication
IRJET- Library Management System with Facial Biometric AuthenticationIRJET- Library Management System with Facial Biometric Authentication
IRJET- Library Management System with Facial Biometric Authentication
 
184
184184
184
 
IRJET- Face Recognition using Deep Learning
IRJET-  	  Face Recognition using Deep LearningIRJET-  	  Face Recognition using Deep Learning
IRJET- Face Recognition using Deep Learning
 
Age and Gender Prediction and Human count
Age and Gender Prediction and Human countAge and Gender Prediction and Human count
Age and Gender Prediction and Human count
 
Person identification based on facial biometrics in different lighting condit...
Person identification based on facial biometrics in different lighting condit...Person identification based on facial biometrics in different lighting condit...
Person identification based on facial biometrics in different lighting condit...
 
IRJET- Application of MCNN in Object Detection
IRJET-  	  Application of MCNN in Object DetectionIRJET-  	  Application of MCNN in Object Detection
IRJET- Application of MCNN in Object Detection
 
AI-based Mechanism to Authorise Beneficiaries at Covid Vaccination Camps usin...
AI-based Mechanism to Authorise Beneficiaries at Covid Vaccination Camps usin...AI-based Mechanism to Authorise Beneficiaries at Covid Vaccination Camps usin...
AI-based Mechanism to Authorise Beneficiaries at Covid Vaccination Camps usin...
 
IRJET- Multiple Feature Fusion for Facial Expression Recognition in Video: Su...
IRJET- Multiple Feature Fusion for Facial Expression Recognition in Video: Su...IRJET- Multiple Feature Fusion for Facial Expression Recognition in Video: Su...
IRJET- Multiple Feature Fusion for Facial Expression Recognition in Video: Su...
 
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONESAN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
 
FACEMASK AND PHYSICAL DISTANCING DETECTION USING TRANSFER LEARNING TECHNIQUE
FACEMASK AND PHYSICAL DISTANCING DETECTION USING TRANSFER LEARNING TECHNIQUEFACEMASK AND PHYSICAL DISTANCING DETECTION USING TRANSFER LEARNING TECHNIQUE
FACEMASK AND PHYSICAL DISTANCING DETECTION USING TRANSFER LEARNING TECHNIQUE
 
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITIONA VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
 
IRJET - Emotionalizer : Face Emotion Detection System
IRJET - Emotionalizer : Face Emotion Detection SystemIRJET - Emotionalizer : Face Emotion Detection System
IRJET - Emotionalizer : Face Emotion Detection System
 
IRJET- Emotionalizer : Face Emotion Detection System
IRJET- Emotionalizer : Face Emotion Detection SystemIRJET- Emotionalizer : Face Emotion Detection System
IRJET- Emotionalizer : Face Emotion Detection System
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face Identification
 
MTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITION
MTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITIONMTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITION
MTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITION
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 

Recently uploaded (20)

Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 

Progression in Large Age-Gap Face Verification

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 849 Progression in large Age-gap face verification Neha Rahman1, Ankit Chaora2 1M.tech Scholar, Digital Electronics, 2Assistant Professor 1,2 Dept. of Electronics and Telecommunication Engineering, Rungta College of Engineering and Technology Bhilai, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Human face verification is an important topic in computer vision, imaging and multimedia as it defines the uniqueness and conveys ones identity. Recognition of face or identity is required to access the rendered services by the licit person only. Applications include access to computer system, ATMs, laptops, mobile phones etc. Verificationaccuracymight get failed if it encounters any of the factors listed as variation in face pose, facial expression, illumination and aging. This survey paper presents panoramic view of progression in face recognition right from the conventional methods to the most advanced technologies(i.e. Deepneuralnetwork). Applications in different field such as security, machine recognition of faces in non law enforcements (like passports, photo IDs, driving licenses) has been mentioned. Italsoshowcasestheframework (parameters, techniques, database, machine learning techniques etc) Key Words: Face recognition, Illumination, Data set, Auto- encoder, deep neural network 1. INTRODUCTION The human face plays an important role in our social interaction, conveying people’s identity. Using the human face as a key to security, machine recognition of faces is emerging as an active research area spanning several disciplines such as image processing, pattern recognition, computer vision and neural networks. Biometric face recognition technology has received significant attention both from neuroscientists and from computer vision scientists in the past several years due to its potential for a wide variety of applications in both law enforcement and non-law enforcement such as passports, credit cards, photo IDs, driving licenses and mug-shots to real time matching of surveillance video images. As compared with other biometrics systems using fingerprint, palm print and iris, face recognition has distinct advantages because of its non-contact process. Face images can be captured from a distancewithouttouchingthe person being identified and the identification does not require interacting with the person. In addition, face recognition serves the crime deterrent purposebecausefaceimagesthat have been recorded and archived can later help identify a person. Research interest in face recognition has grown significantly in recent years as a result of the following facts: 1. The increase in emphasis on civilian or commercial research projects. 2. The increasing need for surveillance related applications due to drug trafficking and terrorist activities etc. 3. The re-emergenceofneural network classifierswith emphasis on real time computation and adaptation. 4. The availability of real time hardware. Facial biometric is used to verify the identity of individuals attempting access for various border management and access control applications.Facial matchingalgorithmsmake use of digital photographs of the face stored in a database or on an ID card. These digital images are captured upon registration into the system and then compared to the live photo of the individual upon an access attempt in a process called “matching”. Face recognitionisaneasytask forhuman experiment; the three day old baby is able to distinguish among known faces. Facial recognition utilizes distinctive features of the face including the upper outlines, the eye sockets, the areas surrounding the cheekbones, the sides of the mouth, the location of the nose and eyes to perform verification and identification. Each method that involves with the face recognition has the similar chain of steps as collection of images (dataset), image pre-processing that followed by alignment of images, face detector then feature extraction that includes dimensional reduction and finally imparting training in deep neural network for classification and identification. 2. LARGE AGE-GAP FACE IDENTIFICATION SYSTEM Age invariant recognition system primarily comprises of the following stages image source that provides the individuals picture to be recognized, face detection, face normalization, image pre-processing, feature extraction and then feature matching for image identification. Figure 1 illustrates the stages involved in any age invariant face recognition system. A. Image source It can be the digital camera or smart phones that can provide the image. CCTV cameras are also deployed for capturing images and videos and later can be used to provide the source for image.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 850 B. Face detection This phase of system finds the face region of the image. The most popular face detector is Viola-jones and Face-vecs. It tries to locate the facial landmarks using face alignment algorithm. It uses the eye locations to align the photo so that eyes are horizontallyaligned for detectingtheface.Detection error could influence normalization result. C. Face normalization It prepares the image for feature extraction phase of the system. It reduces the intra-class differences but not affect the extra-class variations. It enhances the visual effectsofthe image and hence subsequently improves recognition performance. It assesses the betterment of following recognition stages. The main objective behind the face normalization is to reduce the useless and redundant information that it carries. D. Feature extraction Feature extraction is the most crucial stage for face recognition as it stands out to be the base for extracting the relevant information from the picture or image. There are multiple of feature extraction method available viz. local binary pattern (LBP), Histogram of orientedgradients(HOG) etc. Fig -1: Block diagram of age invariant face recognition system 3. LITERATURE SURVEY In 1991, the M. Turk et al [1]proposed thesimplestapproach of templatematching.Itwasa2Dapproachandunsupervised learning. Here the face images are projected onto a feature space that encodes the variation among known face images but the drawback that lies with these Eigen-faces is that the training images must be centered and of the same size but it is considered to be the easiest to implement. The ideabehind Eigen-faces is to map data into a lower dimensionality space. Its performance limits with the change of illumination. Person is being recognized by comparing characteristics of the face image with the Eigen-faces of the training set of face images. Its idea is to find principal component of the distributions of face. After few years in 1997 Peter N. Belhumeur et al [2] developed the face recognition procedure that works with large variation in lighting direction and facial expression. Pattern classification approach has been used where each pixel of an image considered as a coordinate in a high dimensional space. A derivative of Fisher’s Linear Discriminant (FLD) a classspecificlinearprojectionisused.It compared various methods of pattern classification i.e correlation, Eigen faces and Fisher’s Linear Discriminant (FLD). FLD proved to be the best classification technique among all as it stood against the sensitivity under lighting conditions and also needed less storage. In 2010 Unsang Park [3] proposed the conversion of 2D face aging dataset to 3D aging model. It worked on building the 3D aging model provided the availability of 2D face aging dataset. It considered the separate modeling of shape and texture followed by final matching done by face VACS face matcher. With advancement in time somenewconceptscoineduplike hidden factor [4] proposedanddeveloped byDihongGonget al. in 2013 stated that the face can be decomposed into identity factor that remains unaffected with age and an age factor affected by the aging process. Local face descriptor Histograms of Oriented Gradients (HOG) is applied followed by the dimensional reduction techniques i.e. PCAandLDAto get smaller sliced vector forfurtheranalysis.Thetwodataset used here are MORPH and FGNET. Identification rate of 91.14% is obtained with MORPH and 69.0% with FGNET databases. This linear model clearly defines the boundary between the identity factor and age factor. It has the Noise factor that leads to the deviationfromthemodel parameters. Guosheng Hu et al [5] in this work they conduct a rigorous experiment on LFW data set. They conducted experiments on three different CNN architectures CNN-S (small), CNN-M (medium) and CNN-L (large). They used the metric learning method i.e. Joint Bayesian model that makes the two classes more separable with the activation function being usedhere is rectification linear unit (ReLU). CNN and metric learning highly increases the success rate of the face recognition system. Dihong gong et al [6] in 2015 described the encoded maximum entropy of images microstructures into discrete codes followed by the identity factor analysis for estimation of identity of two similar faces. MEFD is used as the feature descriptor followed by the dimensional reductiontechnique
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 851 PCA and LDA and then identity factor analysishasbeendone for classification. The datasets used were MORPH and FGNET. Easy implementation and clubbing with any feature descriptors for further improved recognition is the merit. This cannot be directly applied on the dataset that don’t belong to face aging. Another application of deep neural network that worked with the CAFÉ dataset has been successfully presented by Luoqi Liu [8] et al included the DAFV framework that perfectly described the aging pattern followed by the aging face verification. One of the recent fine works has been presented by Simone Bianco [12] in 2016 that successfully coupled two DCNN ina Siamese architecture with a contrastive loss function and it outperformed the existing methods. 4. FACE RECOGNITION APPROACHES There are different face recognition methods. Here the relative survey of performances of three techniques – feature, soft computing and appearance is stated below and is shown in figure 2. A. Feature based face recognition approach It utilizes a previous face data to pick a feature quantity to completely recognize people. Local features are eyes, chin, nose, head and mouth outline which can be decided from images of face. Topological graphs in fig 1.3 are utilized to show associations among features that achieve structure which is utilized to differentiate associated faces from a database. Feature based approaches handles problem of diverse radiance situation, scaling, facial expressions, noisy images, face occlusions and aging effects. Some of the prominent advantages shown by this method are  From face images it accurately captures relevant features.  Insensitivity to face orientation, variable lighting and size situations. Fig -2: Different types of face recognition approaches B. Soft computing based face recognition approach This technique has appeared as a significant technique for examination in computer vision investigation. This technique enhances the processing speedoffacerecognition system. Neural network is trained on the same pictures and databases again and again which in turn makes the system more efficient and reliable. Non linear functions or the problems can be solved where the mathematical models are not available. It can process easily with big size features. Somehow this technique is costly and need a great correlation degree among test and training pictures. Soft computing FR technique can be categorize again in three domain as illustrated  Artificial neural network (ANN) based methods: it is an effective tool to resolve non-linearity executed with the aid of specific constraints. It gives the best decision making schemes which can be trained to perform complicated applications like pattern recognition (PR), classification optimization and identification. It has the capability to study from any undetected information. It is also free from any fault in its any node. It holds few limitations also it takes large computation time to train data.  Fuzzy based technique: fuzzy logic is utilized for modeling human intelligence and awareness. It is used in rigorous face recognition framework. It is unresponsive to fluctuating lighting and facial expressions. It delivers good output only for minor variation in facial expressions and illumination.  Genetic algorithm (GA) basedtechnique:GAisproficient in decreasing calculation time for a massive heap space. GA is a technique that works on finding fittest and optimized solutions from a given population. It works well with huge dataset.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 852 C. Appearance based face recognition approach Appearance based FR methods have obtained good interest from a large variety of examination fields which includes biometrics, pattern recognition and computer vision. There are basically two types involved in appearance based FR and they are as holistic method and hybrid technique. It handles the problem of pose variations, facial expressions numerous lighting situations and small resolution. It holds advantages like dimensionality decrease and improved recognition output. It is sensitive to face orientation, noise and size. Examples of appearance based FR methods are Eigen faces, DFT etc.  Holistic method: it makes use of complete face area as raw input to a recognition device. One of the greatest broadly utilized face area representations is Eigen image. Machine recognition framework is ought to utilize only face. Eigen faces and Fisher faces had appeared to be operative in tests with bigger databases. Key benefit of holistic method is that they don’t destroy any of records within picture and concentrates only on limited areas only. On the contrary, it needs high computational cost.  Hybrid method: this method utilizes holistic and local features both. Idea of Eigen faces are extended to Eigen structures for instance Eigen mouth, Eigen eyes etc. 5. CHALLENGES INVOLVED Face recognition technique is highly affected by the challenges it faces in its path. Technologies are somewhat resistant to moderate changes in hairstyle, as they do not utilize areas of the face located near the hairline. When used to identify the person’s image it may return or generate the wrong results. Here are some of the factors that lead to the undesired results.  TEMPORAL INVARIANCE It is one of the challenges which are to be achieved and the aim is to get the representation and matching method that remains unchanged due to facial aging. The performance of facial recognition technology is very closely tied to the quality of the facial image. Low-quality images are much more likely to result in enrolment and matching errors than high-quality images.  FACIAL AGING Headings, or heads, are organizational devices that Facial aging is a growth process where the 3D shapes of the face and its texture changes which surely degrade the matching performance of the system.  OCCLUSION Occlusion in image is broadly defined as the hidden information or the part of the image that cannot be clearly stated or shown. Example a car passing under the bridge.  ILLUMINATION This reflects the brightness and contrast of image and is a major factor that sometimes hinders in the recognition of the image. REFERENCES [1] M. Turk and A.Pentland, “Eigenfaces for Recognition”, Journal of Cognitive Neuroscience, vol.3,no.1,pp.71-86, 1991, hard copy [2] Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection article in IEEE Transactions on pattern analysis and Machine Intelligence. July 1997 [3] U.Park, Y.Tong, and A.K. Jain,”Age-invariant face recognition,” pattern analysis and Machine intelligence IEEE Transactions on, vol 32. No.5.pp 947-954.2010. [4] D. Gong, Z. Li, D.Lin, J. Liu, X. Tang, “Hidden Factor Analysis for Age Invariant Face Recognition”.ICCV2013 [5] Guosheng Hu, Yongxin yang, Josef Kittler, “When face recognition meets with Deep learning: an evaluation of convolutional neural networks for face recognition”. April 2015 [6] Dihong gong, Zhifeng Li and Dacheng Tao, “A maximum entropy feature descriptor for age invariant face recognition”, in 2015. [7] FG-NET Aging Database, http://www.fgnet.rsunit.com/. [8] L.Liu, C.Xiong, H. Zhang, Z. Niu, M. Wang and S. Yan, “ Deep aging face verification with large gaps,” Multimedia, IEEE transactions on , vol.18, no.1, pp. 64- 75, 2016. [9] Y. Taigman,M. Yang, M. Ranzato, and L. Wolf, “Deep face closing the gap to human-level performance in face verification,”in proceedings of the IEEE Conference on computer vision and pattern recognition, 2014,pp. 1701-1708 [10] Timo Ahonen, Abdenour Hadid, and Matti “Face descriptions with local binary patterns: Application to face recognition,” IEEE Trans. Pattern Anal. Mach. Intell vol. 28, no. 12, pp. 2037-2041, 2006. [11] Jiaji huang, Qiang Qiu, Robert Calderbank and G. sapiro, “Geometry aware deep transform”, ICCV 2015 [12] Simone Bianco, “ Large age-gap face verification by feature injection in deep networks,” in 2016