SlideShare a Scribd company logo
• Object detection is a computer technology related
to Computer vision and image processing
• That deals with detecting instances of semantic
objects of a certain class (such as humans,
buildings, or cars) in digital images and videos.
• Well-researched domains of object detection
include face detection and pedestrian detection,
Object detection has applications in many areas of
computer vision ,including image
retrieval and video surveillance.
• What is image processing :
I. Improve its pictorial information for human interpretation
II. Render it more suitable for autonomous machine
perception.
• It is necessary to realize that these two aspects represent
two separate but equally important aspects of image
processing. A procedure which satisfies condition:
I. A procedure which makes an imagelook better may be the
very worst procedure for satisfying condition.
II. Humans like their images to be sharp, clear and detailed;
machines prefer their images to be simple and uncluttered.
Examples (1) may include:
Enhancing the edges of an image to make it appear sharper; an example is shown in figure 1.1.
Note how the second image appears cleaner it is a more pleasant image. Sharpening edges
is a vital component of printing: in order for an image to appear at its best on the printed
page some sharpening is usually performed.
BINARY:
• Each pixel is just black or white. Since there are
only two possible values for each pixel.
• we only need one bit per pixel. Such images can
therefore be very efficient in terms of storage.
• Images for which a binary representation may be
suitable include text (printed or Handwriting)
An example was the image shown in figure below :-
In this image, we have only the two colors:
White 1 for the edges, and black 0for the background
GREYSCALE :
• Each pixel is a shade of grey, normally from (0)
black to(255) white.
• This range means that each pixel can be
represented by eight bits, or exactly one byte.
• Other greyscale ranges are used, but generally they
are a power of 2. Such images arise in medicine (X-
rays).
• images of printed works, and indeed 256 different
grey levels is sufficient for the recognition of most
natural objects.
• 3- TRUE COLOR, OR RGB :
• each pixel has a particular color; that color being
described by the amount of red, green and blue in.
• This means that for every pixel there correspond
three values.
• total number of bits required for each pixel is 24
such image are also called 24 -bit color images.
** Some Cameras depending on human’s mood , such Smile Shutter ® in Sony Cyber-shot
Cameras
• Human moods with Face detection technologies Is
also a computer technology that determines the
locations and sizes of human faces in arbitrary
(digital) images. It detects facial features and
ignores anything else, such as buildings, trees and
bodies.
Next Figure shows how 
• Face recognition system is an application to verify a
person's identity by comparing pictures taken
recently from a digital camera or VCR, and
compare with the images stored in the system
database.
• Face recognition system has been widely used in
recent years for security and access control, like
other security systems that rely on biometrics such
as fingerprint or eye IRIS.
As face detection is the first step of any face
processing system, it finds numerous
applications in face recognition, face tracking,
facial expression recognition, facial feature
extraction, gender classification, clustering,
attentive user interfaces, digital cosmetics,
biometric systems. In addition, most of the
face detection algorithms can be extended to
recognize other objects such as cars, humans,
pedestrians, and signs, etc
Japanese male , Italian ,Old-Man , Japanese female , Non-Japanese male , Black male
• Each face has several distinct properties, is the
different curves on the face. And based on this
technology recognize faces as landmarks. Each face has
approximately 80 knots and months those nodes
which can be measured using software are:
• (1) the distance between the eyes.
• (2) presentation of the nose.
• (3) the depth of the eye.
• (4) the form cheekbones.
• (5) the length of the jaw line.
• These parameters are measured by the program
specialist for face recognition and translated into
numerical codes called face recognition face print and
used to represent the face in the database.
• Recognize these systems to people depending on their
photos, and unlike the old identification systems, these
systems give an alert to the presence of undesirable
persons and not only verify the identity and this
greatly supports where security can be used in the
publication of photographs of criminals in public places
in order to identify them, at airports and seaports to
search for personal, assumed by the Immigration
Department to search for retarded and outlaws, In the
playground to find troublemakers (used in USA), voting
(used by the Mexican Government in 2000 m),
recording observations on the street (in England), the
system BIOS licenses (in the State of Illinois in
America).
• Pre-Crime Face Scanner to Be Used For ‘Security Interrogations’
• “A sophisticated new camera system can detect lies just by watching
our faces as we talk, experts say. The computerized system uses a
simple video camera, a high-resolution thermal imaging sensor and a
suite of algorithms,”
• The new system “successfully discriminates between truth and lies in
about two-thirds of cases,” which equates to little more accuracy than
chance alone, making it even less reliable than the notorious polygraph
test, which has been widely discredited and is habitually inaccurate.
The technology is focused around detecting emotions such as distress,
fear or distrust, all of which a stressed traveler could undergo without
necessarily being a liar. Indeed, such emotions would be expected in an
environment where people are being naked body scanned, groped by
TSA thugs, and subjected to lie detector interrogations.
• Cons faces discrimination technique
• Despite the success of these systems and their
evolution, but they do not reach perfect and there are
some factors that may impede the process of face
recognition and these obstacles:
• (1) solar glasses.
• (2) long hair masks the central part of the face.
• (3) lighting dimming that results in blurred images.
• (4) poor accuracy and clarity of images taken.
• (5) changes in physiological characteristics in the face
of either age or other.
• (6) changes in the working environment reduce
matching accuracy.
Face Detection

More Related Content

What's hot

Face recognition
Face recognitionFace recognition
Face recognition
sandeepsharma1193
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
ranjit banshpal
 
An Introduction to Face Detection
An Introduction to Face DetectionAn Introduction to Face Detection
An Introduction to Face Detection
Livares Technologies Pvt Ltd
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
JASHU JASWANTH
 
Face recognition
Face recognitionFace recognition
Face recognition
Satyendra Rajput
 
Face recognition tech1
Face recognition tech1Face recognition tech1
Face recognition tech1
Ankit Gupta
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
raihansikdar
 
face recognition
face recognitionface recognition
face recognition
vipin varghese
 
Face Detection techniques
Face Detection techniquesFace Detection techniques
Face Detection techniquesAbhineet Bhamra
 
Face detection presentation slide
Face detection  presentation slideFace detection  presentation slide
Face detection presentation slide
Sanjoy Dutta
 
Face detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedFace detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 edited
Santu Chall
 
Face Detection
Face DetectionFace Detection
Face Detection
Amr Sheta
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhavVaibhav P
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
Shravan Halankar
 
Face recognition Face Identification
Face recognition Face IdentificationFace recognition Face Identification
Face recognition Face Identification
Kalyan Acharjya
 
Detection and recognition of face using neural network
Detection and recognition of face using neural networkDetection and recognition of face using neural network
Detection and recognition of face using neural networkSmriti Tikoo
 
Project Face Detection
Project Face Detection Project Face Detection
Project Face Detection Abu Saleh Musa
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
arvind carpenter
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
Shashidhar Reddy
 

What's hot (20)

Face recognition
Face recognitionFace recognition
Face recognition
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
An Introduction to Face Detection
An Introduction to Face DetectionAn Introduction to Face Detection
An Introduction to Face Detection
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face recognition tech1
Face recognition tech1Face recognition tech1
Face recognition tech1
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
face recognition
face recognitionface recognition
face recognition
 
Face Detection techniques
Face Detection techniquesFace Detection techniques
Face Detection techniques
 
Face detection presentation slide
Face detection  presentation slideFace detection  presentation slide
Face detection presentation slide
 
Face detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedFace detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 edited
 
Face Detection
Face DetectionFace Detection
Face Detection
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face recognition Face Identification
Face recognition Face IdentificationFace recognition Face Identification
Face recognition Face Identification
 
Detection and recognition of face using neural network
Detection and recognition of face using neural networkDetection and recognition of face using neural network
Detection and recognition of face using neural network
 
Project Face Detection
Project Face Detection Project Face Detection
Project Face Detection
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
 

Viewers also liked

Face detection ppt by Batyrbek
Face detection ppt by Batyrbek Face detection ppt by Batyrbek
Face detection ppt by Batyrbek Batyrbek Ryskhan
 
Face detection By Abdul Hanan
Face detection By Abdul HananFace detection By Abdul Hanan
Face detection By Abdul Hanan
Abdul Hanan
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
Divya Sushma
 
Avihu Efrat's Viola and Jones face detection slides
Avihu Efrat's Viola and Jones face detection slidesAvihu Efrat's Viola and Jones face detection slides
Avihu Efrat's Viola and Jones face detection slides
wolf
 
FACE RECOGNITION USING NEURAL NETWORK
FACE RECOGNITION USING NEURAL NETWORKFACE RECOGNITION USING NEURAL NETWORK
FACE RECOGNITION USING NEURAL NETWORK
codebangla
 
Face recognition using neural network
Face recognition using neural networkFace recognition using neural network
Face recognition using neural networkIndira Nayak
 
Face recognition using artificial neural network
Face recognition using artificial neural networkFace recognition using artificial neural network
Face recognition using artificial neural networkSumeet Kakani
 
Face Detection Technology
Face Detection TechnologyFace Detection Technology
Face Detection Technology
Ritvika Florence
 
A New Skin Color Based Face Detection Algorithm by Combining Three Color Mode...
A New Skin Color Based Face Detection Algorithm by Combining Three Color Mode...A New Skin Color Based Face Detection Algorithm by Combining Three Color Mode...
A New Skin Color Based Face Detection Algorithm by Combining Three Color Mode...
iosrjce
 
Computer vesion
Computer vesionComputer vesion
Computer vesion
Adil Mehmoood
 
Robust real time object detection
Robust real time object detectionRobust real time object detection
Robust real time object detectionErliyah Jannah
 
Attentional Object Detection - introductory slides.
Attentional Object Detection - introductory slides.Attentional Object Detection - introductory slides.
Attentional Object Detection - introductory slides.Sergey Karayev
 
Pest analysis of indusind bank
Pest analysis of indusind bankPest analysis of indusind bank
Pest analysis of indusind bankViola Jones
 
Image attendance system
Image attendance systemImage attendance system
Image attendance system
Mayank Garg
 
Face detection using template matching
Face detection using template matchingFace detection using template matching
Face detection using template matchingBrijesh Borad
 
Face recognization using artificial nerual network
Face recognization using artificial nerual networkFace recognization using artificial nerual network
Face recognization using artificial nerual network
Dharmesh Tank
 
Face recogntion Using PCA Algorithm
Face recogntion Using PCA Algorithm Face recogntion Using PCA Algorithm
Face recogntion Using PCA Algorithm Ashwini Awatare
 

Viewers also liked (20)

Face detection ppt by Batyrbek
Face detection ppt by Batyrbek Face detection ppt by Batyrbek
Face detection ppt by Batyrbek
 
Face detection By Abdul Hanan
Face detection By Abdul HananFace detection By Abdul Hanan
Face detection By Abdul Hanan
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Face detection
Face detectionFace detection
Face detection
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
 
Avihu Efrat's Viola and Jones face detection slides
Avihu Efrat's Viola and Jones face detection slidesAvihu Efrat's Viola and Jones face detection slides
Avihu Efrat's Viola and Jones face detection slides
 
FACE RECOGNITION USING NEURAL NETWORK
FACE RECOGNITION USING NEURAL NETWORKFACE RECOGNITION USING NEURAL NETWORK
FACE RECOGNITION USING NEURAL NETWORK
 
Face recognition using neural network
Face recognition using neural networkFace recognition using neural network
Face recognition using neural network
 
Face recognition using artificial neural network
Face recognition using artificial neural networkFace recognition using artificial neural network
Face recognition using artificial neural network
 
Face Detection Technology
Face Detection TechnologyFace Detection Technology
Face Detection Technology
 
A New Skin Color Based Face Detection Algorithm by Combining Three Color Mode...
A New Skin Color Based Face Detection Algorithm by Combining Three Color Mode...A New Skin Color Based Face Detection Algorithm by Combining Three Color Mode...
A New Skin Color Based Face Detection Algorithm by Combining Three Color Mode...
 
Computer vesion
Computer vesionComputer vesion
Computer vesion
 
Robust real time object detection
Robust real time object detectionRobust real time object detection
Robust real time object detection
 
Attentional Object Detection - introductory slides.
Attentional Object Detection - introductory slides.Attentional Object Detection - introductory slides.
Attentional Object Detection - introductory slides.
 
Pest analysis of indusind bank
Pest analysis of indusind bankPest analysis of indusind bank
Pest analysis of indusind bank
 
Image attendance system
Image attendance systemImage attendance system
Image attendance system
 
Face detection using template matching
Face detection using template matchingFace detection using template matching
Face detection using template matching
 
Face recognization using artificial nerual network
Face recognization using artificial nerual networkFace recognization using artificial nerual network
Face recognization using artificial nerual network
 
Face recogntion Using PCA Algorithm
Face recogntion Using PCA Algorithm Face recogntion Using PCA Algorithm
Face recogntion Using PCA Algorithm
 

Similar to Face Detection

introdaction.pptx
introdaction.pptxintrodaction.pptx
introdaction.pptx
Dekebatufa
 
Computer vision and robotics
Computer vision and roboticsComputer vision and robotics
Computer vision and robotics
Biniam Asnake
 
Introduction to Computer Vision - Image formation
Introduction to Computer Vision -  Image formationIntroduction to Computer Vision -  Image formation
Introduction to Computer Vision - Image formation
KarpagaPriya10
 
IRJET - Emotion Recognising System-Crowd Behavior Analysis
IRJET -  	  Emotion Recognising System-Crowd Behavior AnalysisIRJET -  	  Emotion Recognising System-Crowd Behavior Analysis
IRJET - Emotion Recognising System-Crowd Behavior Analysis
IRJET Journal
 
Computer Vision Presentation Artificial Intelligence (AI)
Computer Vision Presentation Artificial Intelligence (AI)Computer Vision Presentation Artificial Intelligence (AI)
Computer Vision Presentation Artificial Intelligence (AI)
AshTheMidBenchers
 
Face Recognition Dissertation
Face Recognition Dissertation Face Recognition Dissertation
Face Recognition Dissertation
Sandeep Garg
 
Ch1.pptx
Ch1.pptxCh1.pptx
Ch1.pptx
danielzewde12
 
Markus Paasovaara: Face recognition
Markus Paasovaara: Face recognitionMarkus Paasovaara: Face recognition
Markus Paasovaara: Face recognition
Futurice
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
ShubhamYadav769267
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by Rohit
Rohit Shrivastava
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By Rohit
Rohit Shrivastava
 
Facial Recognition: The Science, The Technology, and Market Applications
Facial Recognition: The Science, The Technology, and Market ApplicationsFacial Recognition: The Science, The Technology, and Market Applications
Facial Recognition: The Science, The Technology, and Market Applications
Investorideas.com
 
ATM Security Us-WPS Office.pptx
ATM Security Us-WPS Office.pptxATM Security Us-WPS Office.pptx
ATM Security Us-WPS Office.pptx
MuhammedNihadP
 
Image recognition
Image recognitionImage recognition
Image recognition
Nikhil Singh
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
Mazin Alwaaly
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
Sagar Verma
 
ICS1020 CV
ICS1020 CVICS1020 CV
ICS1020 CV
Vanessa Camilleri
 
Computer vision
Computer visionComputer vision
Computer vision
AnkitKamal6
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
Avanitrambadiya
 

Similar to Face Detection (20)

introdaction.pptx
introdaction.pptxintrodaction.pptx
introdaction.pptx
 
Computer vision and robotics
Computer vision and roboticsComputer vision and robotics
Computer vision and robotics
 
Introduction to Computer Vision - Image formation
Introduction to Computer Vision -  Image formationIntroduction to Computer Vision -  Image formation
Introduction to Computer Vision - Image formation
 
IRJET - Emotion Recognising System-Crowd Behavior Analysis
IRJET -  	  Emotion Recognising System-Crowd Behavior AnalysisIRJET -  	  Emotion Recognising System-Crowd Behavior Analysis
IRJET - Emotion Recognising System-Crowd Behavior Analysis
 
Computer Vision Presentation Artificial Intelligence (AI)
Computer Vision Presentation Artificial Intelligence (AI)Computer Vision Presentation Artificial Intelligence (AI)
Computer Vision Presentation Artificial Intelligence (AI)
 
Face Recognition Dissertation
Face Recognition Dissertation Face Recognition Dissertation
Face Recognition Dissertation
 
Ch1.pptx
Ch1.pptxCh1.pptx
Ch1.pptx
 
Markus Paasovaara: Face recognition
Markus Paasovaara: Face recognitionMarkus Paasovaara: Face recognition
Markus Paasovaara: Face recognition
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by Rohit
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By Rohit
 
Facial Recognition: The Science, The Technology, and Market Applications
Facial Recognition: The Science, The Technology, and Market ApplicationsFacial Recognition: The Science, The Technology, and Market Applications
Facial Recognition: The Science, The Technology, and Market Applications
 
ATM Security Us-WPS Office.pptx
ATM Security Us-WPS Office.pptxATM Security Us-WPS Office.pptx
ATM Security Us-WPS Office.pptx
 
Image recognition
Image recognitionImage recognition
Image recognition
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
 
ICS1020 CV
ICS1020 CVICS1020 CV
ICS1020 CV
 
Computer vision
Computer visionComputer vision
Computer vision
 
Biometrics
Biometrics Biometrics
Biometrics
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 

Recently uploaded

Why React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdfWhy React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdf
ayushiqss
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
NaapbooksPrivateLimi
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
vrstrong314
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 
Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
MayankTawar1
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
Cyanic lab
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
Georgi Kodinov
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
wottaspaceseo
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
Tier1 app
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
kalichargn70th171
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 

Recently uploaded (20)

Why React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdfWhy React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdf
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 

Face Detection

  • 1.
  • 2. • Object detection is a computer technology related to Computer vision and image processing • That deals with detecting instances of semantic objects of a certain class (such as humans, buildings, or cars) in digital images and videos. • Well-researched domains of object detection include face detection and pedestrian detection, Object detection has applications in many areas of computer vision ,including image retrieval and video surveillance.
  • 3. • What is image processing : I. Improve its pictorial information for human interpretation II. Render it more suitable for autonomous machine perception.
  • 4. • It is necessary to realize that these two aspects represent two separate but equally important aspects of image processing. A procedure which satisfies condition: I. A procedure which makes an imagelook better may be the very worst procedure for satisfying condition. II. Humans like their images to be sharp, clear and detailed; machines prefer their images to be simple and uncluttered. Examples (1) may include:
  • 5. Enhancing the edges of an image to make it appear sharper; an example is shown in figure 1.1. Note how the second image appears cleaner it is a more pleasant image. Sharpening edges is a vital component of printing: in order for an image to appear at its best on the printed page some sharpening is usually performed.
  • 6. BINARY: • Each pixel is just black or white. Since there are only two possible values for each pixel. • we only need one bit per pixel. Such images can therefore be very efficient in terms of storage. • Images for which a binary representation may be suitable include text (printed or Handwriting) An example was the image shown in figure below :-
  • 7. In this image, we have only the two colors: White 1 for the edges, and black 0for the background
  • 8.
  • 9. GREYSCALE : • Each pixel is a shade of grey, normally from (0) black to(255) white. • This range means that each pixel can be represented by eight bits, or exactly one byte. • Other greyscale ranges are used, but generally they are a power of 2. Such images arise in medicine (X- rays). • images of printed works, and indeed 256 different grey levels is sufficient for the recognition of most natural objects.
  • 10.
  • 11. • 3- TRUE COLOR, OR RGB : • each pixel has a particular color; that color being described by the amount of red, green and blue in. • This means that for every pixel there correspond three values. • total number of bits required for each pixel is 24 such image are also called 24 -bit color images.
  • 12.
  • 13. ** Some Cameras depending on human’s mood , such Smile Shutter ® in Sony Cyber-shot Cameras
  • 14. • Human moods with Face detection technologies Is also a computer technology that determines the locations and sizes of human faces in arbitrary (digital) images. It detects facial features and ignores anything else, such as buildings, trees and bodies. Next Figure shows how 
  • 15.
  • 16. • Face recognition system is an application to verify a person's identity by comparing pictures taken recently from a digital camera or VCR, and compare with the images stored in the system database. • Face recognition system has been widely used in recent years for security and access control, like other security systems that rely on biometrics such as fingerprint or eye IRIS.
  • 17. As face detection is the first step of any face processing system, it finds numerous applications in face recognition, face tracking, facial expression recognition, facial feature extraction, gender classification, clustering, attentive user interfaces, digital cosmetics, biometric systems. In addition, most of the face detection algorithms can be extended to recognize other objects such as cars, humans, pedestrians, and signs, etc
  • 18.
  • 19. Japanese male , Italian ,Old-Man , Japanese female , Non-Japanese male , Black male
  • 20.
  • 21. • Each face has several distinct properties, is the different curves on the face. And based on this technology recognize faces as landmarks. Each face has approximately 80 knots and months those nodes which can be measured using software are: • (1) the distance between the eyes. • (2) presentation of the nose. • (3) the depth of the eye. • (4) the form cheekbones. • (5) the length of the jaw line. • These parameters are measured by the program specialist for face recognition and translated into numerical codes called face recognition face print and used to represent the face in the database.
  • 22.
  • 23. • Recognize these systems to people depending on their photos, and unlike the old identification systems, these systems give an alert to the presence of undesirable persons and not only verify the identity and this greatly supports where security can be used in the publication of photographs of criminals in public places in order to identify them, at airports and seaports to search for personal, assumed by the Immigration Department to search for retarded and outlaws, In the playground to find troublemakers (used in USA), voting (used by the Mexican Government in 2000 m), recording observations on the street (in England), the system BIOS licenses (in the State of Illinois in America).
  • 24.
  • 25. • Pre-Crime Face Scanner to Be Used For ‘Security Interrogations’ • “A sophisticated new camera system can detect lies just by watching our faces as we talk, experts say. The computerized system uses a simple video camera, a high-resolution thermal imaging sensor and a suite of algorithms,” • The new system “successfully discriminates between truth and lies in about two-thirds of cases,” which equates to little more accuracy than chance alone, making it even less reliable than the notorious polygraph test, which has been widely discredited and is habitually inaccurate. The technology is focused around detecting emotions such as distress, fear or distrust, all of which a stressed traveler could undergo without necessarily being a liar. Indeed, such emotions would be expected in an environment where people are being naked body scanned, groped by TSA thugs, and subjected to lie detector interrogations.
  • 26.
  • 27. • Cons faces discrimination technique • Despite the success of these systems and their evolution, but they do not reach perfect and there are some factors that may impede the process of face recognition and these obstacles: • (1) solar glasses. • (2) long hair masks the central part of the face. • (3) lighting dimming that results in blurred images. • (4) poor accuracy and clarity of images taken. • (5) changes in physiological characteristics in the face of either age or other. • (6) changes in the working environment reduce matching accuracy.

Editor's Notes

  1. حالات
  2. Histogram تحسين معلوماته التصويرية لتفسير الإنسان جعله أكثر ملاءمة للتصور آلة الحكم الذاتي
  3. من الضروري أن ندرك أن هذين الجانبين يمثل جانبين منفصلة ولكن بنفس القدر من الأهمية لمعالجة الصور. إجراء الذييلبي شرط: إجراء الذي يجعل imagelook قد يكون من الأفضل إجراء أسوأ جدا لحالة مرضية. البشر مثل الصور الخاصة بهم لتكون حادة، واضحة ومفصلة، الآلات تفضل الصور الخاصة بهم لتكون بسيطة ومرتب. ومن الأمثلة على (1) ما يلي:
  4. نظام التعرف على الوجه هو عبارة عن تطبيق للتحقق من هوية الشخص عن طريق مقارنة صوره اتخذت مؤخرا من كاميرا رقمية أو جهاز فيديو، ومقارنتها بصور تم تخزينها في نظام قاعدة بيانات. نظام التعرف على الوجه قد استخدمت على نطاق واسع في الآونة الأخيرة لأغراض الأمن والتحكم في الوصول ، مثلها مثل غيرها من النظم الأمنية القائمة التي تعتمد على المقاييس الحيوية الأخرى مثل بصمات الأصابع أو قزحية العين Give mobile example.
  5. كل وجه له خصائص متميزة عديدة، تتمثل في المنحنيات المختلفة على الوجه. وتعتمد تقنية تمييز الوجوه على هذه المعالم كعقد . فكل وجه لديه حوالي 80 عقده ومن أشهر هذه العقد التي يمكن قياسها باستخدام البرامج هي : (1) المسافة بين العينين. (2) عرض الأنف. (3) عمق العين. (4) شكل عظام الخد . (5) طول خط الفك . هذه المعالم تقاس بواسطة البرنامج المتخصص للتعرف على بصمة الوجه وتترجم إلى شفرات رقمية تسمى بصمة الوجه face print وتستخدم لتمثيل الوجه في قاعدة البيانات.
  6. سلبيات تقنية التمييز بالوجوه بالرغم من نجاح هذه الانظمة وتطورها , الا انها لا تصل إلى درجة الكمال وذلك لوجود بعض العوامل التي قد تعيق عملية التعرف على الوجه ومن هذه المعيقات ما يلي: (1) ارتداء النظارات شمسية. (2) الشعر الطويل يحجب الجزء المركزي للوجه. (3) الإضاءة الخافتة التي ينتج عنها صور غير واضحة. (4) ضعف الدقة والوضوح للصور التي تؤخذ عن بعد. (5) التغيرات في الخصائص الفسيولوجية في الوجه اما لكبر السن أو غيره . (6) التغيرات التي تطرأ في بيئة العمل تقلل من دقة المطابقة.