SlideShare a Scribd company logo
1 of 22
Modern Face Recognition with
Deep Learning
Presented by Rauf Asadov
140105010
Facebook automatically tags people in your
photos that you have tagged before.
Will Farrell (famous actor)Chad Smith (famous rock musician)
Pipeline (steps) for Face Recognition
1. First, look at a picture and find all the faces in it
2. Second, focus on each face and be able to understand
that even if a face is turned in a weird direction or in
bad lighting, it is still the same person.
3. Third, be able to pick out unique features of the face
that you can use to tell it apart from other people—
like how big the eyes are, how long the face is, etc.
4. Finally, compare the unique features of that face to all
the people you already know to determine the
person’s name.
Step 1: Finding all the Faces
Step 1: Finding all the Faces
• Face detection went mainstream in the early
2000's when Paul Viola and Michael Jones
invented a way to detect faces that was fast
enough to run on cheap cameras.
• However, much more reliable solutions exist
now. We’re going to use a method invented in
2005 called Histogram of Oriented
Gradients — or just HOG for short.
Looking at just this one pixel and the pixels touching it,
the image is getting darker towards the upper right.
If you repeat that process for every single pixel in the
image, you end up with every pixel being replaced by
an arrow. These arrows are called gradients and they
show the flow from light to dark across the entire
image:
Problem with gradients
• saving the gradient for every single pixel gives
us way too much detail
Solution
1. break up the image into small squares of 16x16 pixels
each
2. In each square, count up how many gradients point in
each major direction
3. Then replace that square in the image with the arrow
directions that were the strongest
The end result is we turn the original image into a very
simple representation that captures the basic structure
of a face in a simple way:
The original image is turned into a HOG representation that captures the
major features of the image regardless of image brightness.
Using this technique, we can now
easily find faces in any image:
Step 2: Posing and Projecting Faces
Humans can easily recognize that both images are of Will Ferrell, but computers
would see these pictures as two completely different people.
face landmark estimation Algorithm
• The approach invented in 2014 by Vahid Kazemi and
Josephine Sullivan.
Here’s the result of locating the 68
face landmarks on our test image:
Step 3: Encoding Faces
Train “Deep Convolutional Neural
Network” to generate 128 measurements
for each face.
Step 4: Finding the person’s name from the encoding
• The easiest step in the whole process
• Use any basic machine learning classification
algorithm
• All we need to do is train a classifier that can
take in the measurements from a new test
image and tells which known person is the
closest match. Running this classifier takes
milliseconds. The result of the classifier is the
name of the person!
Summary
• Encode a picture using the HOG algorithm to create a
simplified version of the image. Using this simplified image,
find the part of the image that most looks like a generic HOG
encoding of a face.
• Figure out the pose of the face by finding the main landmarks
in the face. Once we find those landmarks, use them to warp
the image so that the eyes and mouth are centered.
• Pass the centered face image through a neural network that
knows how to measure features of the face. Save those 128
measurements.
• Looking at all the faces we’ve measured in the past, see which
person has the closest measurements to our face’s
measurements. That’s our match!

More Related Content

What's hot

Face mask detection
Face mask detection Face mask detection
Face mask detection Sonesh yadav
 
Face Detection
Face DetectionFace Detection
Face DetectionAmr Sheta
 
Detection and recognition of face using neural network
Detection and recognition of face using neural networkDetection and recognition of face using neural network
Detection and recognition of face using neural networkSmriti Tikoo
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdarraihansikdar
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYJASHU JASWANTH
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShashidhar Reddy
 
Image Classification using deep learning
Image Classification using deep learning Image Classification using deep learning
Image Classification using deep learning Asma-AH
 
Face detection presentation slide
Face detection  presentation slideFace detection  presentation slide
Face detection presentation slideSanjoy Dutta
 
Human age and gender Detection
Human age and gender DetectionHuman age and gender Detection
Human age and gender DetectionAbhiAchalla
 
Presentation on FACE MASK DETECTION
Presentation on FACE MASK DETECTIONPresentation on FACE MASK DETECTION
Presentation on FACE MASK DETECTIONShantaJha2
 
Image classification with Deep Neural Networks
Image classification with Deep Neural NetworksImage classification with Deep Neural Networks
Image classification with Deep Neural NetworksYogendra Tamang
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition SystemZara Tariq
 

What's hot (20)

Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Face mask detection
Face mask detection Face mask detection
Face mask detection
 
Face Detection
Face DetectionFace Detection
Face Detection
 
Face recognition
Face recognition Face recognition
Face recognition
 
Detection and recognition of face using neural network
Detection and recognition of face using neural networkDetection and recognition of face using neural network
Detection and recognition of face using neural network
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face Detection
Face DetectionFace Detection
Face Detection
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Image Classification using deep learning
Image Classification using deep learning Image Classification using deep learning
Image Classification using deep learning
 
Face detection presentation slide
Face detection  presentation slideFace detection  presentation slide
Face detection presentation slide
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Face detection
Face detectionFace detection
Face detection
 
Human age and gender Detection
Human age and gender DetectionHuman age and gender Detection
Human age and gender Detection
 
Presentation on FACE MASK DETECTION
Presentation on FACE MASK DETECTIONPresentation on FACE MASK DETECTION
Presentation on FACE MASK DETECTION
 
Image classification with Deep Neural Networks
Image classification with Deep Neural NetworksImage classification with Deep Neural Networks
Image classification with Deep Neural Networks
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
 

Similar to Modern face recognition with deep learning

PBL presentation p2.pptx
PBL presentation p2.pptxPBL presentation p2.pptx
PBL presentation p2.pptxTony383416
 
Facial_Recognition_PPT.pptx
Facial_Recognition_PPT.pptxFacial_Recognition_PPT.pptx
Facial_Recognition_PPT.pptxArijeetMohanty5
 
Mobile vision Android
Mobile vision Android Mobile vision Android
Mobile vision Android Manikanta G
 
photo detection in personal photo collection
photo detection in personal photo collectionphoto detection in personal photo collection
photo detection in personal photo collectionsonalijagtap15
 
Criminal Detection System
Criminal Detection SystemCriminal Detection System
Criminal Detection SystemIntrader Amit
 
Final Year Project - Enhancing Virtual Learning through Emotional Agents (Doc...
Final Year Project - Enhancing Virtual Learning through Emotional Agents (Doc...Final Year Project - Enhancing Virtual Learning through Emotional Agents (Doc...
Final Year Project - Enhancing Virtual Learning through Emotional Agents (Doc...Sana Nasar
 
Face detection using template matching
Face detection using template matchingFace detection using template matching
Face detection using template matchingBrijesh Borad
 
Face Detection Using Modified Viola Jones Algorithm
Face Detection Using Modified Viola Jones AlgorithmFace Detection Using Modified Viola Jones Algorithm
Face Detection Using Modified Viola Jones Algorithmpaperpublications3
 
Face Recognition Dissertation
Face Recognition Dissertation Face Recognition Dissertation
Face Recognition Dissertation Sandeep Garg
 
Automatic 3D facial expression recognition
Automatic 3D facial expression recognitionAutomatic 3D facial expression recognition
Automatic 3D facial expression recognitionrafaelgmonteiro
 
Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Herman Kurnadi
 
Paper id 24201475
Paper id 24201475Paper id 24201475
Paper id 24201475IJRAT
 
human face detection using matlab
human face detection using matlabhuman face detection using matlab
human face detection using matlabshamima sultana
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognitionMazin Alwaaly
 
The making of our posterr
The making of our posterrThe making of our posterr
The making of our posterrOlivia5432
 

Similar to Modern face recognition with deep learning (20)

PBL presentation p2.pptx
PBL presentation p2.pptxPBL presentation p2.pptx
PBL presentation p2.pptx
 
Facial_Recognition_PPT.pptx
Facial_Recognition_PPT.pptxFacial_Recognition_PPT.pptx
Facial_Recognition_PPT.pptx
 
Mobile vision Android
Mobile vision Android Mobile vision Android
Mobile vision Android
 
photo detection in personal photo collection
photo detection in personal photo collectionphoto detection in personal photo collection
photo detection in personal photo collection
 
Final year ppt
Final year pptFinal year ppt
Final year ppt
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Criminal Detection System
Criminal Detection SystemCriminal Detection System
Criminal Detection System
 
Image processing
Image processingImage processing
Image processing
 
Final Year Project - Enhancing Virtual Learning through Emotional Agents (Doc...
Final Year Project - Enhancing Virtual Learning through Emotional Agents (Doc...Final Year Project - Enhancing Virtual Learning through Emotional Agents (Doc...
Final Year Project - Enhancing Virtual Learning through Emotional Agents (Doc...
 
Face detection using template matching
Face detection using template matchingFace detection using template matching
Face detection using template matching
 
DEEPFACE.pptx
DEEPFACE.pptxDEEPFACE.pptx
DEEPFACE.pptx
 
Face Detection Using Modified Viola Jones Algorithm
Face Detection Using Modified Viola Jones AlgorithmFace Detection Using Modified Viola Jones Algorithm
Face Detection Using Modified Viola Jones Algorithm
 
Face Recognition Dissertation
Face Recognition Dissertation Face Recognition Dissertation
Face Recognition Dissertation
 
Automatic 3D facial expression recognition
Automatic 3D facial expression recognitionAutomatic 3D facial expression recognition
Automatic 3D facial expression recognition
 
App inventor || Face Mesh Filter Camera and detection system in AI technolog...
App inventor || Face Mesh Filter Camera and detection  system in AI technolog...App inventor || Face Mesh Filter Camera and detection  system in AI technolog...
App inventor || Face Mesh Filter Camera and detection system in AI technolog...
 
Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)
 
Paper id 24201475
Paper id 24201475Paper id 24201475
Paper id 24201475
 
human face detection using matlab
human face detection using matlabhuman face detection using matlab
human face detection using matlab
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
 
The making of our posterr
The making of our posterrThe making of our posterr
The making of our posterr
 

More from marada0033

Modern face recognition with deep learning Script
Modern face recognition with deep learning ScriptModern face recognition with deep learning Script
Modern face recognition with deep learning Scriptmarada0033
 
Intelligent Agents
Intelligent AgentsIntelligent Agents
Intelligent Agentsmarada0033
 
Neural network
Neural networkNeural network
Neural networkmarada0033
 
Introduction to Computer Engineering. Motherboard.
Introduction to Computer Engineering. Motherboard.Introduction to Computer Engineering. Motherboard.
Introduction to Computer Engineering. Motherboard.marada0033
 
Protected addressing mode and Paging
Protected addressing mode and PagingProtected addressing mode and Paging
Protected addressing mode and Pagingmarada0033
 
Dos & Ddos Attack. Man in The Middle Attack
Dos & Ddos Attack. Man in The Middle AttackDos & Ddos Attack. Man in The Middle Attack
Dos & Ddos Attack. Man in The Middle Attackmarada0033
 
Audio spotlight
Audio spotlightAudio spotlight
Audio spotlightmarada0033
 
Babəkin Başçılığı Altında Azadlıq Hərəkatı
Babəkin Başçılığı Altında Azadlıq HərəkatıBabəkin Başçılığı Altında Azadlıq Hərəkatı
Babəkin Başçılığı Altında Azadlıq Hərəkatımarada0033
 
Wireless Power Transmission
Wireless Power TransmissionWireless Power Transmission
Wireless Power Transmissionmarada0033
 

More from marada0033 (10)

Modern face recognition with deep learning Script
Modern face recognition with deep learning ScriptModern face recognition with deep learning Script
Modern face recognition with deep learning Script
 
Intelligent Agents
Intelligent AgentsIntelligent Agents
Intelligent Agents
 
Neural network
Neural networkNeural network
Neural network
 
Introduction to Computer Engineering. Motherboard.
Introduction to Computer Engineering. Motherboard.Introduction to Computer Engineering. Motherboard.
Introduction to Computer Engineering. Motherboard.
 
Protected addressing mode and Paging
Protected addressing mode and PagingProtected addressing mode and Paging
Protected addressing mode and Paging
 
Dos & Ddos Attack. Man in The Middle Attack
Dos & Ddos Attack. Man in The Middle AttackDos & Ddos Attack. Man in The Middle Attack
Dos & Ddos Attack. Man in The Middle Attack
 
Audio spotlight
Audio spotlightAudio spotlight
Audio spotlight
 
Java J2ME
Java J2MEJava J2ME
Java J2ME
 
Babəkin Başçılığı Altında Azadlıq Hərəkatı
Babəkin Başçılığı Altında Azadlıq HərəkatıBabəkin Başçılığı Altında Azadlıq Hərəkatı
Babəkin Başçılığı Altında Azadlıq Hərəkatı
 
Wireless Power Transmission
Wireless Power TransmissionWireless Power Transmission
Wireless Power Transmission
 

Recently uploaded

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 

Recently uploaded (20)

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 

Modern face recognition with deep learning

  • 1. Modern Face Recognition with Deep Learning Presented by Rauf Asadov 140105010
  • 2. Facebook automatically tags people in your photos that you have tagged before.
  • 3. Will Farrell (famous actor)Chad Smith (famous rock musician)
  • 4. Pipeline (steps) for Face Recognition 1. First, look at a picture and find all the faces in it 2. Second, focus on each face and be able to understand that even if a face is turned in a weird direction or in bad lighting, it is still the same person. 3. Third, be able to pick out unique features of the face that you can use to tell it apart from other people— like how big the eyes are, how long the face is, etc. 4. Finally, compare the unique features of that face to all the people you already know to determine the person’s name.
  • 5. Step 1: Finding all the Faces
  • 6. Step 1: Finding all the Faces • Face detection went mainstream in the early 2000's when Paul Viola and Michael Jones invented a way to detect faces that was fast enough to run on cheap cameras. • However, much more reliable solutions exist now. We’re going to use a method invented in 2005 called Histogram of Oriented Gradients — or just HOG for short.
  • 7.
  • 8. Looking at just this one pixel and the pixels touching it, the image is getting darker towards the upper right.
  • 9. If you repeat that process for every single pixel in the image, you end up with every pixel being replaced by an arrow. These arrows are called gradients and they show the flow from light to dark across the entire image:
  • 10. Problem with gradients • saving the gradient for every single pixel gives us way too much detail Solution 1. break up the image into small squares of 16x16 pixels each 2. In each square, count up how many gradients point in each major direction 3. Then replace that square in the image with the arrow directions that were the strongest
  • 11. The end result is we turn the original image into a very simple representation that captures the basic structure of a face in a simple way: The original image is turned into a HOG representation that captures the major features of the image regardless of image brightness.
  • 12.
  • 13. Using this technique, we can now easily find faces in any image:
  • 14. Step 2: Posing and Projecting Faces Humans can easily recognize that both images are of Will Ferrell, but computers would see these pictures as two completely different people.
  • 15. face landmark estimation Algorithm • The approach invented in 2014 by Vahid Kazemi and Josephine Sullivan.
  • 16. Here’s the result of locating the 68 face landmarks on our test image:
  • 17.
  • 19. Train “Deep Convolutional Neural Network” to generate 128 measurements for each face.
  • 20.
  • 21. Step 4: Finding the person’s name from the encoding • The easiest step in the whole process • Use any basic machine learning classification algorithm • All we need to do is train a classifier that can take in the measurements from a new test image and tells which known person is the closest match. Running this classifier takes milliseconds. The result of the classifier is the name of the person!
  • 22. Summary • Encode a picture using the HOG algorithm to create a simplified version of the image. Using this simplified image, find the part of the image that most looks like a generic HOG encoding of a face. • Figure out the pose of the face by finding the main landmarks in the face. Once we find those landmarks, use them to warp the image so that the eyes and mouth are centered. • Pass the centered face image through a neural network that knows how to measure features of the face. Save those 128 measurements. • Looking at all the faces we’ve measured in the past, see which person has the closest measurements to our face’s measurements. That’s our match!