SlideShare a Scribd company logo
Submitted to:
Mr. Amit Doegar
Assistant Professor
NITTTR Chandigarh
Face Detection & Recognition
Submitted by:
Pankaj Thakur
ME CSE (Modular)
Roll No. 171408
Contents
 Motivation
 Applications
 Introduction
 Live Demo
 References
 Query
2
Motivation
3
Face is our primary focus of interaction with society, face
communicates identity, emotion, race and age. It is also
quite useful for judging gender, size and perhaps some
of the characteristics of the person.
4
Applications [8], [12], [13], [14]
Area Applications
Information Security Access Security (OS, Database)
Data Privacy (e.g. medical records)
User authentications (trading, on-line banking)
Access Management Secure Access Authentications (restricted facilities)
Permission based system
Access log or Audit Trails
Biometrics Personal identification (national IDs, passport, voter
registration, driver licenses)
Automated identity verification (boarder control)
Law Enforcement Video Surveillance,
Suspect identification
Suspect tracking ( investigation )
Simulated aging
Forensic Reconstruction of faces from remains,
Tracing missing children.
Personal Security Home video surveillance system
Expression interpretation (driver monitoring system)
Entertainment Home video game systems
Photo camera applications
5
Introduction
Face
Detection & Recognition
by
Humans
• Human brain is trained for
face detection and recognition.
Face detection and recognition
is an easy task for humans [1].
•Experimentally it has been
found that even one to three
day old babies are able to
distinguish between known
faces [2].
So how hard could it be for a computer ?
6
Face Detection
• Identifies human faces in digital images.
• Identifies the pixels which represent the face in a given image.
• Also referred to as the pre-processing phase.
7
Face Recognition
• Identifying a face match.
Vijay Sharma
8
Face Recognition
“Face Recognition is the task
of identifying an already
detected face as a KNOWN
or UNKNOWN face, and in
more advanced cases,
TELLING EXACTLY
WHO’S IT IS ! “ [8]
Face recognition problem statement:
Given still or video images of a scene, identify or verify one or more persons in the scene
using a stored database of faces.
9
Features [9]
1. Distance between the eyes
2. Width of the nose
3. Depth of the eye socket
4. Cheekbones
5. Jaw line
6. Chin
Face
Detection
Features
Extraction
Face
Recognition
How it works?
Figure: [8]
10
Face Detection using Haar Cascades [3], [10]
• Devised by Paul Viola and Michael Jones in 2001.
• Robust and very quick.
• 15 times quicker than any technique at the time of release.
• Could be operated in real-time.
• (95% accuracy at around 17 fps.)
• Feature extraction and feature evaluation.
(Rectangular features are used)
• With a new image representation their calculation is very fast.
• Classifier training and feature selection using a method called
AdaBoost. (A long and exhaustive training process)
• A degenerate decision tree of classifiers is formed.
Features [3], [10]
11
Edge Feature
Line Feature
Four basic types:
• They are easy to calculate.
• The white areas are subtracted from the black ones.
12
Features Extraction [3], [10]
13
Challenges in Haar Cascades [10]
• Variations in pose Head positions, frontal view, profile
view and head tilt, facial expressions.
• Illumination Changes Light direction and intensity changes,
cluttered background, low quality
images.
• Camera Parameters Resolution, color balance etc.
• Occlusion Glasses, facial hair and makeup.
14
Advantages & Disadvantages [11]
Advantages:
• High detection accuracy.
• Low false positive rate.
Disadvantages:
• Computationally complex and slow.
• Longer training time.
• Less accurate on black faces.
• Limitation in difficult lightening conditions.
• Less robust to occlusion/obstacle.
15
OpenCV
Open Source Computer Vision [1]
Features:
• a library of programming functions mainly aimed at
real-time computer vision.
• Originally developed by Intel.
• The library is cross-platform free for use under the
open- source BSD license.
• OpenCV supports the deep learning frameworks
TensorFlow, Torch/PyTorch and Caffe.
• Applications are object, face and gesture recognition,
lip reading, Human- Computer Interaction (HCI),
Motion Tracking, Motion understanding, and Mobile
Robotics.
16
Raspberry Pi 3 Model B+
Features:[4]
•Broadcom BCM2837B0, Cortex-A53
(ARMv8) 64-bit SoC @ 1.4GHz
•1GB LPDDR2 SDRAM
• 2.4GHz and 5GHz IEEE 802.11.b/g/n/ac
wireless LAN, Bluetooth 4.2, BLE
• Gigabit Ethernet over USB 2.0
(maximum throughput 300 Mbps)
• Extended 40-pin GPIO header
• Full-size HDMI
• 4 USB 2.0 ports
• CSI camera port for connecting a
Raspberry Pi camera
• DSI display port for connecting a
Raspberry Pi touchscreen display
• 4-pole stereo output and composite
video port
• Micro SD port for loading your operating
system and storing data
• 5V/2.5A DC power input
• Power-over-Ethernet (PoE) support
(requires separate PoE HAT)
17
Live Demo
on
Face Detection & Recognition
using
Python + OpenCV [5], [6], [7]
(Laptop/Desktop/Raspberry Pi Model 3 B+)
18
Face Detection & Recognition has been
successfully implemented using the
technique of Haar Cascade both on
laptop/desktop and on Raspberry Pi Model 3
B+ and has been found to be a robust
technique that can be applied in various
applications
Conclusion
19
References[1] https://docs.opencv.org/2.4/modules/contrib/doc/facerec/facerec_tutorial.html#tu06
[Accessed: 22-June-2019]
[2] Chiara Turati, Viola Macchi Cassia, F. S., and Leo, I. Newborns face recognition:
Role of inner and outer facial features. Child Development 77, 2 (2006), 297– 311.
[3] https://docs.opencv.org/3.3.0/d7/d8b/tutorial_py_face_detection.html
[Accessed: 22-June-2019]
[4] https://www.raspberrypi.org/products/raspberry-pi-3-model-b-plus/
[Accessed: 22-June-2019]
[5] https://www.hackster.io/sriram17ei/facial-recognition-opencv-python-9bc724
[Accessed: 22-June-2019]
[6] https://github.com/sriram251/-face_recognition
[Accessed: 22-June-2019]
[7] https://github.com/opencv/opencv
[Accessed: 22-June-2019]
[8] https://www.slideshare.net/vaishalibansalbhati/face-recognition-
vaishali?qid=3a4a0ba2-493d-470c-8156-ad157f2bec94&v=&b=&from_search=8
[Accessed: 22-June-2019]
[9] https://www.slideshare.net/awesomearjun10/face-detection-attendance-system-by-
arjun-sharma?qid=b252b129-b4e7-458a-ab74-7d8ab1e0dc3f&v=&b=&from_search=1
[Accessed: 22-June-2019]
[10] https://www.slideshare.net/AbhiroopGhatak/automated-face-detection-
system?qid=8803eb10-e5a6-4e27-afc0-9eab148ec171&v=&b=&from_search=1
[Accessed: 22-June-2019]
20
1
Query ?
21
Thanks

More Related Content

What's hot

Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
Zara Tariq
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 
Face Detection
Face DetectionFace Detection
Face Detection
Reber Novanta
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
ShubhamLamichane
 
Face detection presentation slide
Face detection  presentation slideFace detection  presentation slide
Face detection presentation slide
Sanjoy Dutta
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
Shashidhar Reddy
 
Face recognition with pi
Face recognition with piFace recognition with pi
Face recognition with pi
hetvi naik
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/Technology
RahulSingh3034
 
face recognition
face recognitionface recognition
face recognition
vipin varghese
 
Project Face Detection
Project Face Detection Project Face Detection
Project Face Detection Abu Saleh Musa
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
raihansikdar
 
Facial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptxFacial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptx
kakimetu
 
Attendance Using Facial Recognition
Attendance Using Facial RecognitionAttendance Using Facial Recognition
Attendance Using Facial Recognition
Vikramaditya Tarai
 
Face recognition
Face recognitionFace recognition
Face recognition
sandeepsharma1193
 
An Introduction to Face Detection
An Introduction to Face DetectionAn Introduction to Face Detection
An Introduction to Face Detection
Livares Technologies Pvt Ltd
 
Face detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedFace detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 edited
Santu Chall
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
ranjit banshpal
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
Divya Sushma
 

What's hot (20)

Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Face Detection
Face DetectionFace Detection
Face Detection
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face detection presentation slide
Face detection  presentation slideFace detection  presentation slide
Face detection presentation slide
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face recognition with pi
Face recognition with piFace recognition with pi
Face recognition with pi
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/Technology
 
face recognition
face recognitionface recognition
face recognition
 
Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
 
Project Face Detection
Project Face Detection Project Face Detection
Project Face Detection
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
Facial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptxFacial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptx
 
Attendance Using Facial Recognition
Attendance Using Facial RecognitionAttendance Using Facial Recognition
Attendance Using Facial Recognition
 
Face recognition
Face recognitionFace recognition
Face recognition
 
An Introduction to Face Detection
An Introduction to Face DetectionAn Introduction to Face Detection
An Introduction to Face Detection
 
Face detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedFace detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 edited
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
 

Similar to Face detection and recognition

Face Recognition System for Door Unlocking
Face Recognition System for Door UnlockingFace Recognition System for Door Unlocking
Face Recognition System for Door Unlocking
Hassan Tariq
 
第一組-智能看板反饋蒐集系統 Interactive Digital Signage
第一組-智能看板反饋蒐集系統 Interactive Digital Signage第一組-智能看板反饋蒐集系統 Interactive Digital Signage
第一組-智能看板反饋蒐集系統 Interactive Digital Signage
IttrainingIttraining
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition System
StudentRocks
 
OpenPOWER/POWER9 AI webinar
OpenPOWER/POWER9 AI webinar OpenPOWER/POWER9 AI webinar
OpenPOWER/POWER9 AI webinar
Ganesan Narayanasamy
 
Traffic Violation Detector using Object Detection
Traffic Violation Detector using Object DetectionTraffic Violation Detector using Object Detection
Traffic Violation Detector using Object Detection
shri ram murti smarak college of engineering,technology & research
 
Machine Vision On Embedded Platform
Machine Vision On Embedded Platform Machine Vision On Embedded Platform
Machine Vision On Embedded Platform
Omkar Rane
 
Machine vision Application
Machine vision ApplicationMachine vision Application
Machine vision Application
Abhishek Sainkar
 
01 foundations
01 foundations01 foundations
01 foundations
ankit_ppt
 
Develop Store Apps with Kinect for Windows v2
Develop Store Apps with Kinect for Windows v2Develop Store Apps with Kinect for Windows v2
Develop Store Apps with Kinect for Windows v2
Clemente Giorio
 
Develop store apps with kinect for windows v2
Develop store apps with kinect for windows v2Develop store apps with kinect for windows v2
Develop store apps with kinect for windows v2
Matteo Valoriani
 
Biometry Presentation in Riga, Werner Blessing
Biometry Presentation in Riga, Werner BlessingBiometry Presentation in Riga, Werner Blessing
Biometry Presentation in Riga, Werner BlessingMobileMonday Estonia
 
Detecting and Improving Distorted Fingerprints using rectification techniques.
Detecting and Improving Distorted Fingerprints using rectification techniques.Detecting and Improving Distorted Fingerprints using rectification techniques.
Detecting and Improving Distorted Fingerprints using rectification techniques.
sandipan paul
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
IJSRD
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
IJSRD
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition application
awadhesh kumar
 
陸永祥/全球網路攝影機帶來的機會與挑戰
陸永祥/全球網路攝影機帶來的機會與挑戰陸永祥/全球網路攝影機帶來的機會與挑戰
陸永祥/全球網路攝影機帶來的機會與挑戰
台灣資料科學年會
 
Machine Learning for Malware Classification and Clustering
Machine Learning for Malware Classification and ClusteringMachine Learning for Malware Classification and Clustering
Machine Learning for Malware Classification and Clustering
Ashwini Almad
 
Machine Learning for Malware Classification and Clustering
Machine Learning for Malware Classification and ClusteringMachine Learning for Malware Classification and Clustering
Machine Learning for Malware Classification and Clustering
EndgameInc
 

Similar to Face detection and recognition (20)

Face Recognition System for Door Unlocking
Face Recognition System for Door UnlockingFace Recognition System for Door Unlocking
Face Recognition System for Door Unlocking
 
第一組-智能看板反饋蒐集系統 Interactive Digital Signage
第一組-智能看板反饋蒐集系統 Interactive Digital Signage第一組-智能看板反饋蒐集系統 Interactive Digital Signage
第一組-智能看板反饋蒐集系統 Interactive Digital Signage
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition System
 
OpenPOWER/POWER9 AI webinar
OpenPOWER/POWER9 AI webinar OpenPOWER/POWER9 AI webinar
OpenPOWER/POWER9 AI webinar
 
Guru_poster
Guru_posterGuru_poster
Guru_poster
 
Traffic Violation Detector using Object Detection
Traffic Violation Detector using Object DetectionTraffic Violation Detector using Object Detection
Traffic Violation Detector using Object Detection
 
Machine Vision On Embedded Platform
Machine Vision On Embedded Platform Machine Vision On Embedded Platform
Machine Vision On Embedded Platform
 
Machine vision Application
Machine vision ApplicationMachine vision Application
Machine vision Application
 
01 foundations
01 foundations01 foundations
01 foundations
 
Develop Store Apps with Kinect for Windows v2
Develop Store Apps with Kinect for Windows v2Develop Store Apps with Kinect for Windows v2
Develop Store Apps with Kinect for Windows v2
 
Develop store apps with kinect for windows v2
Develop store apps with kinect for windows v2Develop store apps with kinect for windows v2
Develop store apps with kinect for windows v2
 
predefense presentation
predefense presentationpredefense presentation
predefense presentation
 
Biometry Presentation in Riga, Werner Blessing
Biometry Presentation in Riga, Werner BlessingBiometry Presentation in Riga, Werner Blessing
Biometry Presentation in Riga, Werner Blessing
 
Detecting and Improving Distorted Fingerprints using rectification techniques.
Detecting and Improving Distorted Fingerprints using rectification techniques.Detecting and Improving Distorted Fingerprints using rectification techniques.
Detecting and Improving Distorted Fingerprints using rectification techniques.
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition application
 
陸永祥/全球網路攝影機帶來的機會與挑戰
陸永祥/全球網路攝影機帶來的機會與挑戰陸永祥/全球網路攝影機帶來的機會與挑戰
陸永祥/全球網路攝影機帶來的機會與挑戰
 
Machine Learning for Malware Classification and Clustering
Machine Learning for Malware Classification and ClusteringMachine Learning for Malware Classification and Clustering
Machine Learning for Malware Classification and Clustering
 
Machine Learning for Malware Classification and Clustering
Machine Learning for Malware Classification and ClusteringMachine Learning for Malware Classification and Clustering
Machine Learning for Malware Classification and Clustering
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 

Face detection and recognition

  • 1. Submitted to: Mr. Amit Doegar Assistant Professor NITTTR Chandigarh Face Detection & Recognition Submitted by: Pankaj Thakur ME CSE (Modular) Roll No. 171408
  • 2. Contents  Motivation  Applications  Introduction  Live Demo  References  Query 2
  • 3. Motivation 3 Face is our primary focus of interaction with society, face communicates identity, emotion, race and age. It is also quite useful for judging gender, size and perhaps some of the characteristics of the person.
  • 4. 4 Applications [8], [12], [13], [14] Area Applications Information Security Access Security (OS, Database) Data Privacy (e.g. medical records) User authentications (trading, on-line banking) Access Management Secure Access Authentications (restricted facilities) Permission based system Access log or Audit Trails Biometrics Personal identification (national IDs, passport, voter registration, driver licenses) Automated identity verification (boarder control) Law Enforcement Video Surveillance, Suspect identification Suspect tracking ( investigation ) Simulated aging Forensic Reconstruction of faces from remains, Tracing missing children. Personal Security Home video surveillance system Expression interpretation (driver monitoring system) Entertainment Home video game systems Photo camera applications
  • 5. 5 Introduction Face Detection & Recognition by Humans • Human brain is trained for face detection and recognition. Face detection and recognition is an easy task for humans [1]. •Experimentally it has been found that even one to three day old babies are able to distinguish between known faces [2]. So how hard could it be for a computer ?
  • 6. 6 Face Detection • Identifies human faces in digital images. • Identifies the pixels which represent the face in a given image. • Also referred to as the pre-processing phase.
  • 7. 7 Face Recognition • Identifying a face match. Vijay Sharma
  • 8. 8 Face Recognition “Face Recognition is the task of identifying an already detected face as a KNOWN or UNKNOWN face, and in more advanced cases, TELLING EXACTLY WHO’S IT IS ! “ [8] Face recognition problem statement: Given still or video images of a scene, identify or verify one or more persons in the scene using a stored database of faces.
  • 9. 9 Features [9] 1. Distance between the eyes 2. Width of the nose 3. Depth of the eye socket 4. Cheekbones 5. Jaw line 6. Chin Face Detection Features Extraction Face Recognition How it works? Figure: [8]
  • 10. 10 Face Detection using Haar Cascades [3], [10] • Devised by Paul Viola and Michael Jones in 2001. • Robust and very quick. • 15 times quicker than any technique at the time of release. • Could be operated in real-time. • (95% accuracy at around 17 fps.) • Feature extraction and feature evaluation. (Rectangular features are used) • With a new image representation their calculation is very fast. • Classifier training and feature selection using a method called AdaBoost. (A long and exhaustive training process) • A degenerate decision tree of classifiers is formed.
  • 11. Features [3], [10] 11 Edge Feature Line Feature Four basic types: • They are easy to calculate. • The white areas are subtracted from the black ones.
  • 13. 13 Challenges in Haar Cascades [10] • Variations in pose Head positions, frontal view, profile view and head tilt, facial expressions. • Illumination Changes Light direction and intensity changes, cluttered background, low quality images. • Camera Parameters Resolution, color balance etc. • Occlusion Glasses, facial hair and makeup.
  • 14. 14 Advantages & Disadvantages [11] Advantages: • High detection accuracy. • Low false positive rate. Disadvantages: • Computationally complex and slow. • Longer training time. • Less accurate on black faces. • Limitation in difficult lightening conditions. • Less robust to occlusion/obstacle.
  • 15. 15 OpenCV Open Source Computer Vision [1] Features: • a library of programming functions mainly aimed at real-time computer vision. • Originally developed by Intel. • The library is cross-platform free for use under the open- source BSD license. • OpenCV supports the deep learning frameworks TensorFlow, Torch/PyTorch and Caffe. • Applications are object, face and gesture recognition, lip reading, Human- Computer Interaction (HCI), Motion Tracking, Motion understanding, and Mobile Robotics.
  • 16. 16 Raspberry Pi 3 Model B+ Features:[4] •Broadcom BCM2837B0, Cortex-A53 (ARMv8) 64-bit SoC @ 1.4GHz •1GB LPDDR2 SDRAM • 2.4GHz and 5GHz IEEE 802.11.b/g/n/ac wireless LAN, Bluetooth 4.2, BLE • Gigabit Ethernet over USB 2.0 (maximum throughput 300 Mbps) • Extended 40-pin GPIO header • Full-size HDMI • 4 USB 2.0 ports • CSI camera port for connecting a Raspberry Pi camera • DSI display port for connecting a Raspberry Pi touchscreen display • 4-pole stereo output and composite video port • Micro SD port for loading your operating system and storing data • 5V/2.5A DC power input • Power-over-Ethernet (PoE) support (requires separate PoE HAT)
  • 17. 17 Live Demo on Face Detection & Recognition using Python + OpenCV [5], [6], [7] (Laptop/Desktop/Raspberry Pi Model 3 B+)
  • 18. 18 Face Detection & Recognition has been successfully implemented using the technique of Haar Cascade both on laptop/desktop and on Raspberry Pi Model 3 B+ and has been found to be a robust technique that can be applied in various applications Conclusion
  • 19. 19 References[1] https://docs.opencv.org/2.4/modules/contrib/doc/facerec/facerec_tutorial.html#tu06 [Accessed: 22-June-2019] [2] Chiara Turati, Viola Macchi Cassia, F. S., and Leo, I. Newborns face recognition: Role of inner and outer facial features. Child Development 77, 2 (2006), 297– 311. [3] https://docs.opencv.org/3.3.0/d7/d8b/tutorial_py_face_detection.html [Accessed: 22-June-2019] [4] https://www.raspberrypi.org/products/raspberry-pi-3-model-b-plus/ [Accessed: 22-June-2019] [5] https://www.hackster.io/sriram17ei/facial-recognition-opencv-python-9bc724 [Accessed: 22-June-2019] [6] https://github.com/sriram251/-face_recognition [Accessed: 22-June-2019] [7] https://github.com/opencv/opencv [Accessed: 22-June-2019] [8] https://www.slideshare.net/vaishalibansalbhati/face-recognition- vaishali?qid=3a4a0ba2-493d-470c-8156-ad157f2bec94&v=&b=&from_search=8 [Accessed: 22-June-2019] [9] https://www.slideshare.net/awesomearjun10/face-detection-attendance-system-by- arjun-sharma?qid=b252b129-b4e7-458a-ab74-7d8ab1e0dc3f&v=&b=&from_search=1 [Accessed: 22-June-2019] [10] https://www.slideshare.net/AbhiroopGhatak/automated-face-detection- system?qid=8803eb10-e5a6-4e27-afc0-9eab148ec171&v=&b=&from_search=1 [Accessed: 22-June-2019]