SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 455
Face Recognition System and its Applications
Shantanu Shahi1, Balveer Singh2
1Research Scholar, Faculty of Science & Engineering, PK University, Shivpuri, India
2Professor, Department of Computer Science & Engineering, PK University, Shivpuri, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Face Detection has one of the hottest topics of
research and has many security and business applications in
the field of image processing and pattern analysis. Availability
of feasible technology as in addition to the growing demand
for reliable security systems in the world today has been an
encouraging many scientist to develop new methods for
capturing of facial knowledge. A large number of scientists do
different work for face detection from different fields such as
image processing, neural networks, computer vision,
psychology, computers graphics and pattern analysis and has
also been increasingly accepted by the public for use in
identification, security and law enforcement.
The face recognition system has been described in three parts.
The first describes the differences such as total aggregation,
subtraction process and hybrid process. The second describes
the application with examples, and finally the third discuss
about future research in the field of face recognition.
Key Words: Computer Vision, Holistic Matching Methods,
Feature-based Methods, Hybrid Methods
1. INTRODUCTION
Several face recognition algorithms and systems have
emerged submittedandmadesignificantprogressinlasttwo
decades. The performance of the face analysis system has
developed a new height in the case of recent developments.
However, a much work has been left to fulfill the need of
further improvement in the face recognition system. Some
environmental challenges changes in lighting, bodyposition,
facial expressions, etc. Performance of facial analysis the
system is directly related to theamountofchangeseenin the
portrait. If we can eliminate these effects, it provides better
face recognition results which lead a more reliable system
[1].
The main criteria which can be producing a better result are
listed below.
1.1 Illumination
The images of human face captured in different lightening
condition like image taken in sun light, image taking in a
room and image taking in night with different type of
lighting will produce different images of same person. This
may or may not weaken some of the facial featurescausetoo
bright or too dark objects in images. These imagesproducea
different attributes of face parameters and decrease the
performance of face recognitions system. (Fig. 1.)
Fig -1: Same image with different illumination
1.2 Head Position
In most cases face recognition systems are trained from the
images in which whole face is visible but, in many cases,
when we want to recognize the face of an unknown identity,
it is not necessary that his/her face is fully captured in
capturing device. Therefore, it is necessary that the image of
a person will be taken in front of where the personislooking
the camera.
1.3 Facial expression
As mentioned earlier, most face recognition algorithms are
standard and neutral portrait. Facial accessories such as
glasses, facial hair (beard and stubble), and emotional
expressions such as laughter, smile, grin, change some it can
affect facial symptoms and classification. Best for automatic
to overcome this problem, a face recognition system is
desired, for example by modifying it feature selection.
1.4 Occlusion
In general, people can know others even if they wear
sunglasses and scarf. This is a challenge for automatedfacial
recognition systems. Designed to replace the human brain.
Another object, partial closureofperson'sface,sunglasses or
scarf is a common problem with many facials analyzes
application. These barriers cover some of the facial features
and thus affect some of the facial features. The performance
of the portrait may deteriorate.Manywaystosolvethisissue
by splitting the closed parts of the image apart and ignoring
them corresponding activity.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 456
1.5 Inter-Class Similarities
It is not impossible to distinguish identical twins, but
sometimes it's a tough job for parents. Therefore, similarity
between classes is not just a challenge although it is a
biometric authentication technology; italsofacesthehuman
brain. That's the problem to distinguish between two
different subjects with very similar characteristics. Among
many cases multi-biometric techniques such as combining
face and fingerprint recognition increase performance.
2. FACE RECOGNITION METHODS
In the 1970s, facial recognition was seen as a two-
dimensional cognitive problem[2].Usedtoidentifydistances
from key points of facial recognition, such as measuring
differences in facial expressions. But the familiar face
recognition should be automatic. Face recognition is a
difficult but elaborate issue that appeals to researchers from
diverse backgrounds: psychiatry, cognitive impairment,
neural networks, computing view, and computer graphics.
In general, face recognition consists of two (2) stages,
registration and identification / verification, as shown in Fig.
1. There are several modules,which areimagedetection,face
recognition, training, knowledge and identification.
Fig -2: Block Diagram for the Face Recognition System
The list of face recognition methods are follows:-
1. Holistic Methods
2. Feature-based Methods
3. Hybrid Methods
2.1 Holistic Methods
In thisapproach, total face area is calculatedastheinputdata
for the face capture system. One of the best examples of
holistic approaches is eigenfaces [8] (the most widely used
facial recognition),keynoteanalysis,segregationanalysis[7],
and independent assessment, etc.
Fig -3: Face recognition method
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 457
2.2 Feature-based Methods
In this method features which are necessary for face
recognition are extracted. A major challenge of the delete
feature is the "back" feature, which is when the system tries
to recover features that are not visible due to major changes,
such as the head pose when we match the front image with
profile picture. [5].
2.3 Hybrid Methods
Hybrid face recognition technology combines holistic and
featureextraction methods. Usually 3D graphics are usedfor
mixing. The image of the face is captured in 3D, allowing the
system to record the curves of the eye, such as the image of
the chin or forehead. Even the face in contours can be used
because the system uses depth and measuring axes, which
provide enough information to create the whole face. 3D
technology generally does this: capture, locate, measure,
represent and compete. Capture - Capture faces by copying
photos or capturing them in real time. Position - Determine
the position, size and angle of the head. Measurements -
Measure each curve of the face to model, carefully observing
the outside of the eye, the inside of the eye, and the angle of
the nose. Representation- converting models into numbers-
digital representation and face-to-face comparison -
comparing data received with faces in existing data.
If you want to compare 3D images with existing 3D images,
there is no need to make any changes. Most, however,images
are rendered in 2D, which requires some modification to the
3D image.
3. FACE RECOGNITION APPLICATIONS
Face recognition system may be very useful in human-
computer interaction, virtual reality, data recovery,
multimedia, computer entertainment, information security,
and more. Other. Work Procedures, Medical Records,
Internet Banking, Biometrics, such asPersonal Information -
Passports, Driver's License, Automatic Self-Assessment -
Border Control, Policy Private, e.g. Video Surveillance,
Investigations, Personal Security - Driver Surveillance, and
Home Video Surveillance.
3.1 Face Identification
Facial recognition teachespeoplethroughfacial expressions.
Face recognition creates an authorized account rather than
just checking if an ID card (ID) or key is valid, or if the user
knows a unique identifier (Pins) or password. The following
is an example.
Eliminate the national electoral balance because there is
more than one election. Face recognition is directly
compared to the face of voters without the use of a different
ID number. When two faces are similar in question, then it is
necessary to differentiate between the persons.
3.2 Access Control
Facial recognitions systems are very useful in access control
applications like using computer access. The size of the
crowd to identify is small. The shape of the face is also taken
in a natural way, e.g. Front and interior lighting.
3.3 Security
Today, more than ever today, safety is a major concern at
airports, as well as in airport office workers and passengers.
Airport defense systems using face recognition technology
have been used in many airports.
Anyone who is accredited by the system will be further
investigated by the public safety authorities. To prevent
others from exchanging information or exchanging
information with others when an authorized person leaves
the computer terminal for a short period of time, the user
will be constantly monitored whether the person in front of
the computer screen or at the user is the same person
authorized who is logged in.
3.4 Image database investigations
Search for photo databases of licensed drivers,beneficiaries,
missing children, immigrants and booking authorities.
3.5 Proof of identity
Elections, financial services, e-commerce, newborn
identification, national ID card, passport, working ID card.
3.6 Surveillance
Like the security application in public places, monitoring
user satisfaction with face recognition is less or less. White
lighting, face guidance, and other classifications all make
using face recognition for weather monitoring a daunting
task. Below are some examples of facial observations.
To upgrade the city’s surveillance system in London
Newham City, 300 cameras were connected to a closed-
circuit television (CCTV) control room. The city council says
the device has helped reduce crime by 34 percent since its
inception. There are similar ordinances in Birmingham, UK.
In 1999, Visionics received a contract from the National
Institute of Justice to develop CCTV smart devices.
4. CONCLUSIONS
In this research paper, we present the concepts of facial
recognition and their applications. This research paper can
give the reader a better understandingoftheprocessandthe
use of face recognition system. Different type of face
recognitions algorithms and techniquesarediscussedinthis
paper.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 458
In the future, two dimensional and three dimensional face
recognition and major applications such as student ID card,
electronic commerce, driving license, aadhar card and voter
ID card is a viable option. Hard work in face recognition and
this topic needs further research.
REFERENCES
[1] R. Jafri, H. R. Arabnia, “A Survey of Face Recognition
Techniques”, Journal ofInformationProcessingSystems,
Vol.5, No.2, June 2009.
[2] C. A. Hansen, “Face Recognition”, Institute for Computer
Science University of Tromso, Norway.
[3] M. D. Kelly. Visual identification of people by computer.
PhD thesis, Stanford University,Stanford,CA,USA,1971.
[4] T. Kanade. Computer Recognition of Human Faces, 47,
1977.
[5] W. Zhao, R. Chellappa, P. J. Phillips & A. Rosenfeld, “Face
recognitions literature survey”, ACM Computing
Surveys, Vol. 35, No. 4, December 2003, pp. 399–458.
[6] C. Gonzalez, R. E. Woods, S. liddins, "Digital Image
processing Using MATLAB".
[7] S. Suhas, A. Kurhe, Dr.P. Khanale, “Face Recognition
Using Principal Component Analysis and Linear
Discriminant Analysis on Holistic Approach in Facial
Images Database”, IOSR Journal of Engineering e-ISSN:
2250-3021, p-ISSN: 2278-8719, Vol. 2, Issue 12 (Dec.
2012), ||V4|| PP 15-23
[8] M. A. Turk and A. P. Pentland, "Face Recognition Using
Eigenfaces", 1991.
[9] S. Asadi, Dr. D. V. Subba R. V. Saikrishna, "A Comparative
study of Face Recognition with PCA and Cross-
Correlation Technique", IJCA(0975-8887), Volume 10-
No.8, November 2010.
[10] E. A. Abusham, A. T. B. Jin, W. E. Kiong, "FaceRecognition
Based on Nonlinear Feature Approach", American
Journal of Applied Sciences, 2008.
[11] A. Nigam, P. Gupta, "A New Distance Measure for Face
Recognition System", 2009 Fifth International
Conference on Image and Graphics
[12] Fei Wang, Mengqing Jiang, Chen Qian, Shuo Yang, Cheng
Li, Honggang Zhang, Xiaogang Wang, and Xiaoou Tang.
Residual attention network for image classification. In
Proceedings of the IEEE conference on computer vision
and pattern recognition, pages 3156–3164, 2017.
[13] Kai Wang, Xiaojiang Peng, Jianfei Yang, Debin Meng,and
Yu Qiao. Region attention networks for pose and
occlusion robust facial expression recognition. IEEE
TransactionsonImageProcessing,29:4057–4069,2020.
[14] Kai Wang, Shuo Wang, Zhipeng Zhou, Xiaobo Wang,
Xiaojiang Peng, Baigui Sun, Hao Li, and Yang You. An
efficient training approach for very large scale face
recognition. arXiv preprint arXiv:2105.10375, 2021.
[15] Xiaobo Wang, Tianyu Fu, Shengcai Liao, Shuo Wang,
Zhen Lei, and Tao Mei. Exclusivity-consistency
regularized knowledge distillation for face recognition.
In European
[16] Conference on Computer Vision, pages 325–342.
Springer International Publishing, 2020.
[17] Xiaobo Wang, Shuo Wang, ChengChi,ShifengZhang,and
Tao Mei. Loss function search for face recognition. In
International Conference on Machine Learning, pages
10029–10038. PMLR, 2020.
[18] Xiaobo Wang, Shuo Wang, Shifeng Zhang, Tianyu Fu,
Hailin Shi, and Tao Mei. Support vector guided softmax
loss for face recognition. arXiv preprint
arXiv:1812.11317, 2018.

More Related Content

Similar to Face Recognition System and its Applications

International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
IRJET - Facial Recognition based Attendance System with LBPH
IRJET -  	  Facial Recognition based Attendance System with LBPHIRJET -  	  Facial Recognition based Attendance System with LBPH
IRJET - Facial Recognition based Attendance System with LBPHIRJET Journal
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVIRJET Journal
 
IRJET- Women Security Alert using Face Recognition
IRJET- Women Security Alert using Face RecognitionIRJET- Women Security Alert using Face Recognition
IRJET- Women Security Alert using Face RecognitionIRJET Journal
 
IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...
IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...
IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...IRJET Journal
 
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSINGAN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSINGijiert bestjournal
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
IRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using AndroidIRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using AndroidIRJET Journal
 
IRJET- Pose Varying Face Recognition: Review
IRJET- Pose Varying Face Recognition: ReviewIRJET- Pose Varying Face Recognition: Review
IRJET- Pose Varying Face Recognition: ReviewIRJET Journal
 
IRJET- Pose Varying Face Recognition: Review
IRJET- Pose Varying Face Recognition: ReviewIRJET- Pose Varying Face Recognition: Review
IRJET- Pose Varying Face Recognition: ReviewIRJET Journal
 
Face Recognition System under Varying Lighting Conditions
Face Recognition System under Varying Lighting ConditionsFace Recognition System under Varying Lighting Conditions
Face Recognition System under Varying Lighting ConditionsIOSR Journals
 
IRJET-A Survey on Face Recognition based Security System and its Applications
IRJET-A Survey on Face Recognition based Security System and its ApplicationsIRJET-A Survey on Face Recognition based Security System and its Applications
IRJET-A Survey on Face Recognition based Security System and its ApplicationsIRJET Journal
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face IdentificationIRJET Journal
 
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKHUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKijiert bestjournal
 
IRJET- Design, Test the Performance Evaluation of Automobile Security Tec...
IRJET-  	  Design, Test the Performance Evaluation of Automobile Security Tec...IRJET-  	  Design, Test the Performance Evaluation of Automobile Security Tec...
IRJET- Design, Test the Performance Evaluation of Automobile Security Tec...IRJET Journal
 
IRJET - Emotionalizer : Face Emotion Detection System
IRJET - Emotionalizer : Face Emotion Detection SystemIRJET - Emotionalizer : Face Emotion Detection System
IRJET - Emotionalizer : Face Emotion Detection SystemIRJET Journal
 
IRJET- Emotionalizer : Face Emotion Detection System
IRJET- Emotionalizer : Face Emotion Detection SystemIRJET- Emotionalizer : Face Emotion Detection System
IRJET- Emotionalizer : Face Emotion Detection SystemIRJET Journal
 

Similar to Face Recognition System and its Applications (20)

[IJET-V1I1P4]Author :Juhi Raut, Snehal Patil, Shraddha Gawade, Prof. Mamta Me...
[IJET-V1I1P4]Author :Juhi Raut, Snehal Patil, Shraddha Gawade, Prof. Mamta Me...[IJET-V1I1P4]Author :Juhi Raut, Snehal Patil, Shraddha Gawade, Prof. Mamta Me...
[IJET-V1I1P4]Author :Juhi Raut, Snehal Patil, Shraddha Gawade, Prof. Mamta Me...
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Ch 1
Ch 1Ch 1
Ch 1
 
184
184184
184
 
IRJET - Facial Recognition based Attendance System with LBPH
IRJET -  	  Facial Recognition based Attendance System with LBPHIRJET -  	  Facial Recognition based Attendance System with LBPH
IRJET - Facial Recognition based Attendance System with LBPH
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCV
 
IRJET- Women Security Alert using Face Recognition
IRJET- Women Security Alert using Face RecognitionIRJET- Women Security Alert using Face Recognition
IRJET- Women Security Alert using Face Recognition
 
IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...
IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...
IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...
 
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSINGAN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
IRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using AndroidIRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using Android
 
IRJET- Pose Varying Face Recognition: Review
IRJET- Pose Varying Face Recognition: ReviewIRJET- Pose Varying Face Recognition: Review
IRJET- Pose Varying Face Recognition: Review
 
IRJET- Pose Varying Face Recognition: Review
IRJET- Pose Varying Face Recognition: ReviewIRJET- Pose Varying Face Recognition: Review
IRJET- Pose Varying Face Recognition: Review
 
Face Recognition System under Varying Lighting Conditions
Face Recognition System under Varying Lighting ConditionsFace Recognition System under Varying Lighting Conditions
Face Recognition System under Varying Lighting Conditions
 
IRJET-A Survey on Face Recognition based Security System and its Applications
IRJET-A Survey on Face Recognition based Security System and its ApplicationsIRJET-A Survey on Face Recognition based Security System and its Applications
IRJET-A Survey on Face Recognition based Security System and its Applications
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face Identification
 
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKHUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
 
IRJET- Design, Test the Performance Evaluation of Automobile Security Tec...
IRJET-  	  Design, Test the Performance Evaluation of Automobile Security Tec...IRJET-  	  Design, Test the Performance Evaluation of Automobile Security Tec...
IRJET- Design, Test the Performance Evaluation of Automobile Security Tec...
 
IRJET - Emotionalizer : Face Emotion Detection System
IRJET - Emotionalizer : Face Emotion Detection SystemIRJET - Emotionalizer : Face Emotion Detection System
IRJET - Emotionalizer : Face Emotion Detection System
 
IRJET- Emotionalizer : Face Emotion Detection System
IRJET- Emotionalizer : Face Emotion Detection SystemIRJET- Emotionalizer : Face Emotion Detection System
IRJET- Emotionalizer : Face Emotion Detection System
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 

Recently uploaded (20)

Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 

Face Recognition System and its Applications

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 455 Face Recognition System and its Applications Shantanu Shahi1, Balveer Singh2 1Research Scholar, Faculty of Science & Engineering, PK University, Shivpuri, India 2Professor, Department of Computer Science & Engineering, PK University, Shivpuri, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Face Detection has one of the hottest topics of research and has many security and business applications in the field of image processing and pattern analysis. Availability of feasible technology as in addition to the growing demand for reliable security systems in the world today has been an encouraging many scientist to develop new methods for capturing of facial knowledge. A large number of scientists do different work for face detection from different fields such as image processing, neural networks, computer vision, psychology, computers graphics and pattern analysis and has also been increasingly accepted by the public for use in identification, security and law enforcement. The face recognition system has been described in three parts. The first describes the differences such as total aggregation, subtraction process and hybrid process. The second describes the application with examples, and finally the third discuss about future research in the field of face recognition. Key Words: Computer Vision, Holistic Matching Methods, Feature-based Methods, Hybrid Methods 1. INTRODUCTION Several face recognition algorithms and systems have emerged submittedandmadesignificantprogressinlasttwo decades. The performance of the face analysis system has developed a new height in the case of recent developments. However, a much work has been left to fulfill the need of further improvement in the face recognition system. Some environmental challenges changes in lighting, bodyposition, facial expressions, etc. Performance of facial analysis the system is directly related to theamountofchangeseenin the portrait. If we can eliminate these effects, it provides better face recognition results which lead a more reliable system [1]. The main criteria which can be producing a better result are listed below. 1.1 Illumination The images of human face captured in different lightening condition like image taken in sun light, image taking in a room and image taking in night with different type of lighting will produce different images of same person. This may or may not weaken some of the facial featurescausetoo bright or too dark objects in images. These imagesproducea different attributes of face parameters and decrease the performance of face recognitions system. (Fig. 1.) Fig -1: Same image with different illumination 1.2 Head Position In most cases face recognition systems are trained from the images in which whole face is visible but, in many cases, when we want to recognize the face of an unknown identity, it is not necessary that his/her face is fully captured in capturing device. Therefore, it is necessary that the image of a person will be taken in front of where the personislooking the camera. 1.3 Facial expression As mentioned earlier, most face recognition algorithms are standard and neutral portrait. Facial accessories such as glasses, facial hair (beard and stubble), and emotional expressions such as laughter, smile, grin, change some it can affect facial symptoms and classification. Best for automatic to overcome this problem, a face recognition system is desired, for example by modifying it feature selection. 1.4 Occlusion In general, people can know others even if they wear sunglasses and scarf. This is a challenge for automatedfacial recognition systems. Designed to replace the human brain. Another object, partial closureofperson'sface,sunglasses or scarf is a common problem with many facials analyzes application. These barriers cover some of the facial features and thus affect some of the facial features. The performance of the portrait may deteriorate.Manywaystosolvethisissue by splitting the closed parts of the image apart and ignoring them corresponding activity.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 456 1.5 Inter-Class Similarities It is not impossible to distinguish identical twins, but sometimes it's a tough job for parents. Therefore, similarity between classes is not just a challenge although it is a biometric authentication technology; italsofacesthehuman brain. That's the problem to distinguish between two different subjects with very similar characteristics. Among many cases multi-biometric techniques such as combining face and fingerprint recognition increase performance. 2. FACE RECOGNITION METHODS In the 1970s, facial recognition was seen as a two- dimensional cognitive problem[2].Usedtoidentifydistances from key points of facial recognition, such as measuring differences in facial expressions. But the familiar face recognition should be automatic. Face recognition is a difficult but elaborate issue that appeals to researchers from diverse backgrounds: psychiatry, cognitive impairment, neural networks, computing view, and computer graphics. In general, face recognition consists of two (2) stages, registration and identification / verification, as shown in Fig. 1. There are several modules,which areimagedetection,face recognition, training, knowledge and identification. Fig -2: Block Diagram for the Face Recognition System The list of face recognition methods are follows:- 1. Holistic Methods 2. Feature-based Methods 3. Hybrid Methods 2.1 Holistic Methods In thisapproach, total face area is calculatedastheinputdata for the face capture system. One of the best examples of holistic approaches is eigenfaces [8] (the most widely used facial recognition),keynoteanalysis,segregationanalysis[7], and independent assessment, etc. Fig -3: Face recognition method
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 457 2.2 Feature-based Methods In this method features which are necessary for face recognition are extracted. A major challenge of the delete feature is the "back" feature, which is when the system tries to recover features that are not visible due to major changes, such as the head pose when we match the front image with profile picture. [5]. 2.3 Hybrid Methods Hybrid face recognition technology combines holistic and featureextraction methods. Usually 3D graphics are usedfor mixing. The image of the face is captured in 3D, allowing the system to record the curves of the eye, such as the image of the chin or forehead. Even the face in contours can be used because the system uses depth and measuring axes, which provide enough information to create the whole face. 3D technology generally does this: capture, locate, measure, represent and compete. Capture - Capture faces by copying photos or capturing them in real time. Position - Determine the position, size and angle of the head. Measurements - Measure each curve of the face to model, carefully observing the outside of the eye, the inside of the eye, and the angle of the nose. Representation- converting models into numbers- digital representation and face-to-face comparison - comparing data received with faces in existing data. If you want to compare 3D images with existing 3D images, there is no need to make any changes. Most, however,images are rendered in 2D, which requires some modification to the 3D image. 3. FACE RECOGNITION APPLICATIONS Face recognition system may be very useful in human- computer interaction, virtual reality, data recovery, multimedia, computer entertainment, information security, and more. Other. Work Procedures, Medical Records, Internet Banking, Biometrics, such asPersonal Information - Passports, Driver's License, Automatic Self-Assessment - Border Control, Policy Private, e.g. Video Surveillance, Investigations, Personal Security - Driver Surveillance, and Home Video Surveillance. 3.1 Face Identification Facial recognition teachespeoplethroughfacial expressions. Face recognition creates an authorized account rather than just checking if an ID card (ID) or key is valid, or if the user knows a unique identifier (Pins) or password. The following is an example. Eliminate the national electoral balance because there is more than one election. Face recognition is directly compared to the face of voters without the use of a different ID number. When two faces are similar in question, then it is necessary to differentiate between the persons. 3.2 Access Control Facial recognitions systems are very useful in access control applications like using computer access. The size of the crowd to identify is small. The shape of the face is also taken in a natural way, e.g. Front and interior lighting. 3.3 Security Today, more than ever today, safety is a major concern at airports, as well as in airport office workers and passengers. Airport defense systems using face recognition technology have been used in many airports. Anyone who is accredited by the system will be further investigated by the public safety authorities. To prevent others from exchanging information or exchanging information with others when an authorized person leaves the computer terminal for a short period of time, the user will be constantly monitored whether the person in front of the computer screen or at the user is the same person authorized who is logged in. 3.4 Image database investigations Search for photo databases of licensed drivers,beneficiaries, missing children, immigrants and booking authorities. 3.5 Proof of identity Elections, financial services, e-commerce, newborn identification, national ID card, passport, working ID card. 3.6 Surveillance Like the security application in public places, monitoring user satisfaction with face recognition is less or less. White lighting, face guidance, and other classifications all make using face recognition for weather monitoring a daunting task. Below are some examples of facial observations. To upgrade the city’s surveillance system in London Newham City, 300 cameras were connected to a closed- circuit television (CCTV) control room. The city council says the device has helped reduce crime by 34 percent since its inception. There are similar ordinances in Birmingham, UK. In 1999, Visionics received a contract from the National Institute of Justice to develop CCTV smart devices. 4. CONCLUSIONS In this research paper, we present the concepts of facial recognition and their applications. This research paper can give the reader a better understandingoftheprocessandthe use of face recognition system. Different type of face recognitions algorithms and techniquesarediscussedinthis paper.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 458 In the future, two dimensional and three dimensional face recognition and major applications such as student ID card, electronic commerce, driving license, aadhar card and voter ID card is a viable option. Hard work in face recognition and this topic needs further research. REFERENCES [1] R. Jafri, H. R. Arabnia, “A Survey of Face Recognition Techniques”, Journal ofInformationProcessingSystems, Vol.5, No.2, June 2009. [2] C. A. Hansen, “Face Recognition”, Institute for Computer Science University of Tromso, Norway. [3] M. D. Kelly. Visual identification of people by computer. PhD thesis, Stanford University,Stanford,CA,USA,1971. [4] T. Kanade. Computer Recognition of Human Faces, 47, 1977. [5] W. Zhao, R. Chellappa, P. J. Phillips & A. Rosenfeld, “Face recognitions literature survey”, ACM Computing Surveys, Vol. 35, No. 4, December 2003, pp. 399–458. [6] C. Gonzalez, R. E. Woods, S. liddins, "Digital Image processing Using MATLAB". [7] S. Suhas, A. Kurhe, Dr.P. Khanale, “Face Recognition Using Principal Component Analysis and Linear Discriminant Analysis on Holistic Approach in Facial Images Database”, IOSR Journal of Engineering e-ISSN: 2250-3021, p-ISSN: 2278-8719, Vol. 2, Issue 12 (Dec. 2012), ||V4|| PP 15-23 [8] M. A. Turk and A. P. Pentland, "Face Recognition Using Eigenfaces", 1991. [9] S. Asadi, Dr. D. V. Subba R. V. Saikrishna, "A Comparative study of Face Recognition with PCA and Cross- Correlation Technique", IJCA(0975-8887), Volume 10- No.8, November 2010. [10] E. A. Abusham, A. T. B. Jin, W. E. Kiong, "FaceRecognition Based on Nonlinear Feature Approach", American Journal of Applied Sciences, 2008. [11] A. Nigam, P. Gupta, "A New Distance Measure for Face Recognition System", 2009 Fifth International Conference on Image and Graphics [12] Fei Wang, Mengqing Jiang, Chen Qian, Shuo Yang, Cheng Li, Honggang Zhang, Xiaogang Wang, and Xiaoou Tang. Residual attention network for image classification. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 3156–3164, 2017. [13] Kai Wang, Xiaojiang Peng, Jianfei Yang, Debin Meng,and Yu Qiao. Region attention networks for pose and occlusion robust facial expression recognition. IEEE TransactionsonImageProcessing,29:4057–4069,2020. [14] Kai Wang, Shuo Wang, Zhipeng Zhou, Xiaobo Wang, Xiaojiang Peng, Baigui Sun, Hao Li, and Yang You. An efficient training approach for very large scale face recognition. arXiv preprint arXiv:2105.10375, 2021. [15] Xiaobo Wang, Tianyu Fu, Shengcai Liao, Shuo Wang, Zhen Lei, and Tao Mei. Exclusivity-consistency regularized knowledge distillation for face recognition. In European [16] Conference on Computer Vision, pages 325–342. Springer International Publishing, 2020. [17] Xiaobo Wang, Shuo Wang, ChengChi,ShifengZhang,and Tao Mei. Loss function search for face recognition. In International Conference on Machine Learning, pages 10029–10038. PMLR, 2020. [18] Xiaobo Wang, Shuo Wang, Shifeng Zhang, Tianyu Fu, Hailin Shi, and Tao Mei. Support vector guided softmax loss for face recognition. arXiv preprint arXiv:1812.11317, 2018.