SlideShare a Scribd company logo
BODY-MOVEMENT-BASED HUMAN
IDENTIFICATION
PRESENTED BY :
SHAHBAZ IRFAN SP16-BSCS-054
ZEESHAN HAIDER SP16-BSCS-086
SAJID ISLAM SP16-BSCS-052
INTRODUCTION:
• Human identification is an important and challenging research
• Human identification is based on biometric identifiers
• Physiological and behavioral characteristics are used.
• Physiological characteristics represent the shape of human
body e.g face, fingerprint, iris.
• Behavioral characteristics e.g gait, voice, motion, and
movements.
• These biometric signatures can be measured at distances.
• A fingerprint is measured by touching a sensor
• Face and gait are measured at a distance by using a camera
sensor.
• Human identification needs to be completed at a
distance without having the attention of subjects.
• Face and gait recognitions are commonly used.
• Gait based human identification methods can identify humans
even if the individual’s face not clearly visible.
PROBLEM:
• A person can be identify by his face.
• What if person’s face is not visible or covered.
• This application will be able to recognize the person if the
face is covered or not captured by a camera.
SCOPE:
• Body movement based human detection detects
the person from image or video even if the face of a
person is visible or not.
• It detects the movements of person and recognize
the person that, who is this?
SOLUTION:
• We use thermal camera for taking images from a specific
angle and then preprocess it by removing noise from it
and then extract features from it and then ready to match
patterns and recognizing.
TOOLS:
• We will use thermal camera for taking videos or images
• We will use python with its different libraries i.e open cv
• We will use raspberry pi for integration
TECHNIQUE:
• As the 1st step, by obtaining the difference image
between background and input images, the rough area of
human body can be extracted.
• Then, the accurate area of human body can be obtained
by noise filtering based on median filter, morphological
operation, and component labeling (considering the size
and the ratio of height to width of the area) as the
preprocessing of the 2nd step.
METHODOLOGY:
• The flow chart summarizes our human detection algorithm. The man
walking in the corridor is detected from the thermal image after
background subtraction and preprocessing such as morphological
operation, noise filtering and labeling operation are performed.
• The thermal camera enables our system to detect a human region from
an image that is captured in various environments including severe
shadow, illumination variations, and darkness. .
• Additionally, in the case where a human is walking close to the camera,
the human is not fully visible to the camera.
REFERENCES:
• https://en.wikipedia.org/wiki/Motion_(surveil
lance_software)
• https://sci-
hub.tw/https://www.researchgate.net/public
ation/323043558_Body-Movement-
Based_Human_Identification_Using_Convolut
ional_Neural_Network
THANK YOU!

More Related Content

Similar to Body-Movement-Based Human Identification

E045052731
E045052731E045052731
E045052731
IJERA Editor
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendace
sbk50000
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
Sonam1891
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
Praween Lakra
 
Face Recognition_FINALpptx-4-22.pdf
Face Recognition_FINALpptx-4-22.pdfFace Recognition_FINALpptx-4-22.pdf
Face Recognition_FINALpptx-4-22.pdf
SOMESHJADHWANI
 
Gait Recognition using MDA, LDA, BPNN and SVM
Gait Recognition using MDA, LDA, BPNN and SVMGait Recognition using MDA, LDA, BPNN and SVM
Gait Recognition using MDA, LDA, BPNN and SVM
IJEEE
 
Eye Tracking Interpretation System
Eye Tracking Interpretation SystemEye Tracking Interpretation System
Eye Tracking Interpretation System
kurkute1994
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition systemNilu Desai
 
Camera Distance
Camera DistanceCamera Distance
Camera Distance
Chuka Okoye
 
Semantic human activity detection in videos
Semantic human activity detection in videosSemantic human activity detection in videos
Semantic human activity detection in videosHirantha Pradeep
 
10833762.ppt
10833762.ppt10833762.ppt
10833762.ppt
shohel rana
 
23636372-biometrics-seminar-ppt.pdf
23636372-biometrics-seminar-ppt.pdf23636372-biometrics-seminar-ppt.pdf
23636372-biometrics-seminar-ppt.pdf
VamshiKaram
 
Seminar
SeminarSeminar
Seminar
Nidhi Nayan
 
Project plannning of smart blind stick
Project plannning of smart blind stickProject plannning of smart blind stick
Project plannning of smart blind stick
Samir Ahmed Shimul
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
Saraj Sadanand
 
PERSON DE-IDENTIFICATION IN VIDEOS ppt
PERSON DE-IDENTIFICATION IN VIDEOS  pptPERSON DE-IDENTIFICATION IN VIDEOS  ppt
PERSON DE-IDENTIFICATION IN VIDEOS ppt
sravya raju
 
Collecting big data in cinemas to improve recommendation systems - a model wi...
Collecting big data in cinemas to improve recommendation systems - a model wi...Collecting big data in cinemas to improve recommendation systems - a model wi...
Collecting big data in cinemas to improve recommendation systems - a model wi...
ICDEcCnferenece
 
Final year ppt
Final year pptFinal year ppt
Final year ppt
Shruti Chandra
 
Anits dip
Anits dipAnits dip

Similar to Body-Movement-Based Human Identification (20)

E045052731
E045052731E045052731
E045052731
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendace
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
Face Recognition_FINALpptx-4-22.pdf
Face Recognition_FINALpptx-4-22.pdfFace Recognition_FINALpptx-4-22.pdf
Face Recognition_FINALpptx-4-22.pdf
 
Gait Recognition using MDA, LDA, BPNN and SVM
Gait Recognition using MDA, LDA, BPNN and SVMGait Recognition using MDA, LDA, BPNN and SVM
Gait Recognition using MDA, LDA, BPNN and SVM
 
Eye Tracking Interpretation System
Eye Tracking Interpretation SystemEye Tracking Interpretation System
Eye Tracking Interpretation System
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition system
 
Camera Distance
Camera DistanceCamera Distance
Camera Distance
 
Semantic human activity detection in videos
Semantic human activity detection in videosSemantic human activity detection in videos
Semantic human activity detection in videos
 
10833762.ppt
10833762.ppt10833762.ppt
10833762.ppt
 
23636372-biometrics-seminar-ppt.pdf
23636372-biometrics-seminar-ppt.pdf23636372-biometrics-seminar-ppt.pdf
23636372-biometrics-seminar-ppt.pdf
 
PPT 7.4.2015
PPT 7.4.2015PPT 7.4.2015
PPT 7.4.2015
 
Seminar
SeminarSeminar
Seminar
 
Project plannning of smart blind stick
Project plannning of smart blind stickProject plannning of smart blind stick
Project plannning of smart blind stick
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
PERSON DE-IDENTIFICATION IN VIDEOS ppt
PERSON DE-IDENTIFICATION IN VIDEOS  pptPERSON DE-IDENTIFICATION IN VIDEOS  ppt
PERSON DE-IDENTIFICATION IN VIDEOS ppt
 
Collecting big data in cinemas to improve recommendation systems - a model wi...
Collecting big data in cinemas to improve recommendation systems - a model wi...Collecting big data in cinemas to improve recommendation systems - a model wi...
Collecting big data in cinemas to improve recommendation systems - a model wi...
 
Final year ppt
Final year pptFinal year ppt
Final year ppt
 
Anits dip
Anits dipAnits dip
Anits dip
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 

Body-Movement-Based Human Identification

  • 1. BODY-MOVEMENT-BASED HUMAN IDENTIFICATION PRESENTED BY : SHAHBAZ IRFAN SP16-BSCS-054 ZEESHAN HAIDER SP16-BSCS-086 SAJID ISLAM SP16-BSCS-052
  • 2. INTRODUCTION: • Human identification is an important and challenging research • Human identification is based on biometric identifiers • Physiological and behavioral characteristics are used. • Physiological characteristics represent the shape of human body e.g face, fingerprint, iris. • Behavioral characteristics e.g gait, voice, motion, and movements.
  • 3. • These biometric signatures can be measured at distances. • A fingerprint is measured by touching a sensor • Face and gait are measured at a distance by using a camera sensor. • Human identification needs to be completed at a distance without having the attention of subjects. • Face and gait recognitions are commonly used. • Gait based human identification methods can identify humans even if the individual’s face not clearly visible.
  • 4. PROBLEM: • A person can be identify by his face. • What if person’s face is not visible or covered. • This application will be able to recognize the person if the face is covered or not captured by a camera.
  • 5. SCOPE: • Body movement based human detection detects the person from image or video even if the face of a person is visible or not. • It detects the movements of person and recognize the person that, who is this?
  • 6. SOLUTION: • We use thermal camera for taking images from a specific angle and then preprocess it by removing noise from it and then extract features from it and then ready to match patterns and recognizing.
  • 7. TOOLS: • We will use thermal camera for taking videos or images • We will use python with its different libraries i.e open cv • We will use raspberry pi for integration
  • 8. TECHNIQUE: • As the 1st step, by obtaining the difference image between background and input images, the rough area of human body can be extracted. • Then, the accurate area of human body can be obtained by noise filtering based on median filter, morphological operation, and component labeling (considering the size and the ratio of height to width of the area) as the preprocessing of the 2nd step.
  • 9.
  • 10. METHODOLOGY: • The flow chart summarizes our human detection algorithm. The man walking in the corridor is detected from the thermal image after background subtraction and preprocessing such as morphological operation, noise filtering and labeling operation are performed. • The thermal camera enables our system to detect a human region from an image that is captured in various environments including severe shadow, illumination variations, and darkness. . • Additionally, in the case where a human is walking close to the camera, the human is not fully visible to the camera.
  • 11.
  • 12.