SlideShare a Scribd company logo
1
Face Recognition
Technology
Presented By:
Ranjit R, Banshpal
1
1
2
INDEX
 Biometrics
 Face recognition
 Different approaches
 ML Algorithm
 Proposed System
 Software used in face recognition Technology
 Advantage
 Application
 Conclusion
 References
3
 “A biometric is a physiological or behavioral characteristic
of a human being that can distinguish one person from
another and that theoretically can be used for identification
or verification of identity.”
WHAT IS BIOMETRICS ?
Biometric applications available today are
categorized into 2 sectors
 Psychological: Iris, Fingerprints, Hand, Retinal and Face
recognition
 Behavioral: Voice, Typing pattern, Signature
Face Recognition
Face recognition systems (FRSs) are an important field in computer
vision, because it represent a non-invasive BI technique.
1. A face detection algorithm is used for extracting faces from
video frames (training videos) and generating a face database.
2. Filtering and preprocessing are applied to face images obtained
in the previous step.
3. A collection of machine learning algorithms are trained using as
input data the faces obtained in the previous step.
4. Finally, the classifiers are used for classify faces obtained from
video frames
Facial recognition is a form of computer vision that uses faces to
attempt to identify a person or verify a person’s claimed identity.
For face recognition there are two types of comparisons,
cont…
1) IDENTFICATION
- figure out “Who is X?”
- accomplished by system performing a “one-to-many ”
search
2) VERIFICATION
- answer the question “Is this X?”
- accomplished by the system performing a “one-to-one”
search
cont…
DIFFERENT APPROACHES
Describe the different methods of face recognition.
 Feature extraction methods
The input image to identify and extract (and measure) distinctive
facial features such as the eyes, mouth, nose, etc.
Compute the geometric relationships among those facial points,
thus reducing the input facial image to a vector of geometric
features
 Holistic methods
Holistic approaches attempt to identify faces using global
representations, i.e., descriptions based on the entire image rather
than on local features of the face
MLAlgorithms
 During the past decades, several ML algorithms have been
proposed for classification tasks.
 Most of them are from the theoretical view under some
assumption about data distribution, characteristics of the classification
task, signal to-noise-ratio, etc.
 In reality, these assumptions are often hard to be verified.
Therefore, a practical solution for selecting an appropriate model for a
given classification task is to experimentally compare these
algorithms.
 Five widely used machine classifiers
 K-Nearest Neighbor (KNN)
 Locally-Weighted Learning (LWL)
 Naive Bayes classifier (NB)
 Decision Table Classifier (DT)
 Single Decision Tree (SDT).
Single Decision Tree (SDT) :
 Decision tree induction is the learning of decision trees from class-
labeled training tuple.
 A decision tree is a flowchart-like tree structure.
 Each internal node (non leaf node) denotes a test on an attribute.
 Each branch represents an outcome of the test.
 Each leaf node (or terminal node) holds a class label.
 The topmost node in a tree is the root node.
A path is traced from the root to a leaf node.
Single Decision Tree (SDT) :
 Most algorithms for decision tree induction follow a top-down
approach.
 Starts with a training set of tuples and their associated class labels.
 The training set is recursively partitioned into smaller subsets as the
tree is being built.
 To split D into smaller partitions according to the outcomes of the
splitting criterion.
 The specific algorithm for generating the decision tree is called
C4.5 algorithm.
Consider the two different videos of 10-second duration were used.
A total of 10x30x2 = 600 frames where processed. In the input
video, there was 6 different individuals, representing a total of 3, 600
samples (600 for each individual). Three versions of the dataset were
generated: one for a 100 x 100 pixels face resolution, one for a 50 x 50
pixels face resolution, and finally one for a 25 x 25 pixels face
resolution
cont…
Proposed System
 Face Detection
 Face detector implemented on OpenCV.
 Faces were detected using the function cvHaarDetectObjects.
 The Semi-Aided Labeling Module (SALM) reads the input
video, and for each frame where at least one face was detected by
the face detection module.
 Filtering and Preprocessing (FPM)
This module performs the following transformations:
 RGB to Gray scale Transformation: For reducing the amount of
data to be processed, a 24-bit per pixel RGB format is transformed
into a 8-bit per pixel gray-scale format.
 Scaling: The face images are scaled to a fixed number of rows
and columns. The output resolution for each face can be set by
user according to the required accuracy.
cont…
Tabular Dataset Building Module (TDBM)
 This module obtains the image pixels, and generates a tabular
dataset.
 where rows are the total number of subjects, and the columns are
the image pixels.
 The final column represents the class attribute.
 Training
For performing the training of the classification algorithms, the
following steps are required:
 Permute and split dataset. This operation is performed by the
Random Permutation and Splitting Module (RPSM). Basically, a
random permutation of the samples contained in the tabular dataset
is performed, and the resulting dataset is divided into two datasets:
the training dataset and the test dataset.
cont…
 Train classification algorithms. Each classification algorithm takes
as input the training data set generated by the RPSM, and performs
the model building for each classifier. Later, the model for each
classifier is stored in disk for use it later in the classification step.
 Classification
 In this module, with the help of the previous trained
classifiers, takes as input the faces from the test set, applies filter
and pre-preprocessing operators, and evaluates the test face in each
model generated by the trained classifiers.
After doing this comparison, face image is classified with the label
or name predicted by each classified.
The output of each classified is processed by the Performance
Evaluation Module (PEM), which generates a table with a
comparison among several classifiers.
cont…
SOFTWARE USED IN FACE
RECOGNITION TECHNOLOGY
 Facial recognition software falls into a larger group of
technologies known as biometrics.
 Here is the basic process that is used by the Face system to
capture and compare images
 Detection
When the system is attached to a video surveillance system, the
recognition software searches the field of view of a video camera
for faces.
If there is a face in the view, it is detected within a fraction of a
second. A multi-scale algorithm is used to search for faces in low
resolution.
 Alignment
Once a face is detected, the system determines the head's position,
size and pose. A face needs to be turned at least 35 degrees toward
the camera for the system to register it.
 Normalization
Normalization is performed regardless of the head's location and
distance from the camera. Light does not impact the normalization
process.
 Representation
The system translates the facial data into a unique code. This
coding process allows for easier comparison of the newly acquired
facial data to stored facial data.
 Matching
The newly acquired facial data is compared to the stored data and
linked to at least one stored facial representation. This is the
mathematical technique the system uses to encode faces. The system
can match multiple face prints at a rate of 60 million per minute from
memory or 15 million per minute from hard disk. The comparison
using a scale of one to 10. If a score is above a predetermined
threshold, a match is declared.
ADVANTAGES
 Convenient, social acceptability
 Easy to use
 Inexpensive technique of identification
APPLICATIONS
1. Replacement of PIN
2. Border control
3. Voter verification
4. Computer security
5. Government Use,
a. Security/Counterterrorism.
b. Immigration
8. Commercial Use,
a. Residential Security
b. Banking using ATM
This technique evaluate the suitability of both computer vision
and ML techniques for solving the problem of face detection and
recognition. Face recognition technologies have been associated
generally with very costly top secure applications. Today the core
technologies have evolved and the cost of equipment’s is going
down dramatically due to the integration and the increasing
processing power.
CONCLUSION
References
1. E. Garc´ ıa Amaro, M.A. Nu ˜ no-Maganda and M. Morales-Sandoval, “Evaluation of Machine
Learning Techniques for Face Detection and Recognition”, IEEE 2012.
2. Claudia Iancu, Peter Corcoran and Gabriel Costache,” A Review of Face Recognition
Techniques for In-Camera Applications”, IEEE 2007.
3. Brian C. Becker, Enrique G.Ortiz, “Evaluation of Face Recognition Techniques for Application
to Facebook ” 2008 IEEE
4. D. Bhattacharyya, R. Ranjan, F. Alisherov, and M. Choi, “Biometric authentication: A review,”
International Journal of u- and e- Service, Science and Technology, vol. 3, no. 2, pp. 23–
27, 2009.
5. C. M. Bishop, Pattern Recognition and Machine Learning (Information Science and Statistics).
Secaucus, NJ, USA: Springer-Verlag New York, Inc., 2006
6. G. Bradski and A. Kaehler, Learning OpenCV. O’Reilly Media Inc., 2008.
Thank you…

More Related Content

What's hot

Face detection and recognition
Face detection and recognitionFace detection and recognition
Face detection and recognition
Pankaj Thakur
 
Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection System
Abhiroop Ghatak
 
FACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTFACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPT
Saghir Hussain
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
ShubhamLamichane
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhavVaibhav P
 
Face recognition Face Identification
Face recognition Face IdentificationFace recognition Face Identification
Face recognition Face Identification
Kalyan Acharjya
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
Shashidhar Reddy
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/Technology
RahulSingh3034
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition application
awadhesh kumar
 
Face recognition using artificial neural network
Face recognition using artificial neural networkFace recognition using artificial neural network
Face recognition using artificial neural networkSumeet Kakani
 
Face Detection
Face DetectionFace Detection
Face Detection
Reber Novanta
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
arvind carpenter
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
Shravan Halankar
 
Face recognition
Face recognitionFace recognition
Face recognition
Satyendra Rajput
 
Attendance Management System using Face Recognition
Attendance Management System using Face RecognitionAttendance Management System using Face Recognition
Attendance Management System using Face Recognition
NanditaDutta4
 
human face detection using matlab
human face detection using matlabhuman face detection using matlab
human face detection using matlab
shamima sultana
 
Facial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptxFacial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptx
kakimetu
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemKarmesh Maheshwari
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
Divya Sushma
 
Face detection ppt
Face detection pptFace detection ppt
Face detection ppt
Pooja R
 

What's hot (20)

Face detection and recognition
Face detection and recognitionFace detection and recognition
Face detection and recognition
 
Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection System
 
FACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTFACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPT
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
Face recognition Face Identification
Face recognition Face IdentificationFace recognition Face Identification
Face recognition Face Identification
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/Technology
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition application
 
Face recognition using artificial neural network
Face recognition using artificial neural networkFace recognition using artificial neural network
Face recognition using artificial neural network
 
Face Detection
Face DetectionFace Detection
Face Detection
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Attendance Management System using Face Recognition
Attendance Management System using Face RecognitionAttendance Management System using Face Recognition
Attendance Management System using Face Recognition
 
human face detection using matlab
human face detection using matlabhuman face detection using matlab
human face detection using matlab
 
Facial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptxFacial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptx
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance System
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
 
Face detection ppt
Face detection pptFace detection ppt
Face detection ppt
 

Viewers also liked

Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyAgrani Rastogi
 
Face Recognition
Face RecognitionFace Recognition
Face Recognitionlaknatha
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyDivya Tirunagari
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 
Face Recognition Device F710
Face Recognition Device F710Face Recognition Device F710
Face Recognition Device F710
BioEnable
 
Face recognition software system by Junyu Tech.(China)
Face recognition software system by Junyu Tech.(China)Face recognition software system by Junyu Tech.(China)
Face recognition software system by Junyu Tech.(China)
Wuxi Junyu Technology Co.,Ltd. (China)
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
SARATHGOVINDKK
 
Eigenface For Face Recognition
Eigenface For Face RecognitionEigenface For Face Recognition
Eigenface For Face Recognition
Minh Tran
 
Facial recognition powerpoint
Facial recognition powerpointFacial recognition powerpoint
Facial recognition powerpoint12206695
 
Face recogntion
Face recogntionFace recogntion
Face recogntion
KAMLESH KUMAR
 
Face recognition tech1
Face recognition tech1Face recognition tech1
Face recognition tech1
Ankit Gupta
 
Face Recognition using OpenCV
Face Recognition using OpenCVFace Recognition using OpenCV
Face Recognition using OpenCV
Vasile Chelban
 
Face Recognition by Sumudu Ranasinghe
Face Recognition by Sumudu RanasingheFace Recognition by Sumudu Ranasinghe
Face Recognition by Sumudu Ranasinghe
biitsumudu
 
Face recognition using neural network
Face recognition using neural networkFace recognition using neural network
Face recognition using neural networkIndira Nayak
 
face recognition system using LBP
face recognition system using LBPface recognition system using LBP
face recognition system using LBP
Marwan H. Noman
 
Speech recognition
Speech recognitionSpeech recognition
Speech recognition
fluffyemily
 
Audio Based Speech Recognition Using KNN Classification Method.Report
Audio Based Speech Recognition Using KNN Classification Method.ReportAudio Based Speech Recognition Using KNN Classification Method.Report
Audio Based Speech Recognition Using KNN Classification Method.ReportSantosh Kumar
 

Viewers also liked (20)

Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Face Recognition Device F710
Face Recognition Device F710Face Recognition Device F710
Face Recognition Device F710
 
Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
 
Face recognition software system by Junyu Tech.(China)
Face recognition software system by Junyu Tech.(China)Face recognition software system by Junyu Tech.(China)
Face recognition software system by Junyu Tech.(China)
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Eigenface For Face Recognition
Eigenface For Face RecognitionEigenface For Face Recognition
Eigenface For Face Recognition
 
Facial recognition powerpoint
Facial recognition powerpointFacial recognition powerpoint
Facial recognition powerpoint
 
Face recognition vaishali
Face recognition vaishaliFace recognition vaishali
Face recognition vaishali
 
Face recogntion
Face recogntionFace recogntion
Face recogntion
 
Face recognition tech1
Face recognition tech1Face recognition tech1
Face recognition tech1
 
Face Recognition using OpenCV
Face Recognition using OpenCVFace Recognition using OpenCV
Face Recognition using OpenCV
 
Face Recognition by Sumudu Ranasinghe
Face Recognition by Sumudu RanasingheFace Recognition by Sumudu Ranasinghe
Face Recognition by Sumudu Ranasinghe
 
Face recognition using neural network
Face recognition using neural networkFace recognition using neural network
Face recognition using neural network
 
face recognition system using LBP
face recognition system using LBPface recognition system using LBP
face recognition system using LBP
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 
Speech recognition
Speech recognitionSpeech recognition
Speech recognition
 
Audio Based Speech Recognition Using KNN Classification Method.Report
Audio Based Speech Recognition Using KNN Classification Method.ReportAudio Based Speech Recognition Using KNN Classification Method.Report
Audio Based Speech Recognition Using KNN Classification Method.Report
 

Similar to Face recognition technology

IRJET- Face Detection and Recognition using OpenCV
IRJET- Face Detection and Recognition using OpenCVIRJET- Face Detection and Recognition using OpenCV
IRJET- Face Detection and Recognition using OpenCV
IRJET Journal
 
Infarec
InfarecInfarec
Infarec
sparwaiz
 
184
184184
IRJET - A Review on Face Recognition using Deep Learning Algorithm
IRJET -  	  A Review on Face Recognition using Deep Learning AlgorithmIRJET -  	  A Review on Face Recognition using Deep Learning Algorithm
IRJET - A Review on Face Recognition using Deep Learning Algorithm
IRJET Journal
 
Deep hypersphere embedding for real-time face recognition
Deep hypersphere embedding for real-time face recognitionDeep hypersphere embedding for real-time face recognition
Deep hypersphere embedding for real-time face recognition
TELKOMNIKA JOURNAL
 
A novel approach for performance parameter estimation of face recognition bas...
A novel approach for performance parameter estimation of face recognition bas...A novel approach for performance parameter estimation of face recognition bas...
A novel approach for performance parameter estimation of face recognition bas...
IJMER
 
Biometric
BiometricBiometric
Biometric
NUPUR TIWARY
 
Biometric
BiometricBiometric
Biometric
NUPUR TIWARY
 
Automatic Attendance Management System Using Face Recognition
Automatic Attendance Management System Using Face RecognitionAutomatic Attendance Management System Using Face Recognition
Automatic Attendance Management System Using Face Recognition
Kathryn Patel
 
Local Descriptor based Face Recognition System
Local Descriptor based Face Recognition SystemLocal Descriptor based Face Recognition System
Local Descriptor based Face Recognition System
IRJET Journal
 
Face recogntion using PCA algorithm
Face recogntion using PCA algorithmFace recogntion using PCA algorithm
Face recogntion using PCA algorithmAshwini Awatare
 
IRJET- Analysis of Face Recognition using Docface+ Selfie Matching
IRJET-  	  Analysis of Face Recognition using Docface+ Selfie MatchingIRJET-  	  Analysis of Face Recognition using Docface+ Selfie Matching
IRJET- Analysis of Face Recognition using Docface+ Selfie Matching
IRJET Journal
 
A DEEP LEARNING APPROACH FOR SEMANTIC SEGMENTATION IN BRAIN TUMOR IMAGES
A DEEP LEARNING APPROACH FOR SEMANTIC SEGMENTATION IN BRAIN TUMOR IMAGESA DEEP LEARNING APPROACH FOR SEMANTIC SEGMENTATION IN BRAIN TUMOR IMAGES
A DEEP LEARNING APPROACH FOR SEMANTIC SEGMENTATION IN BRAIN TUMOR IMAGES
PNandaSai
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
Saraj Sadanand
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
inventy
 
Attendance System using Facial Recognition
Attendance System using Facial RecognitionAttendance System using Facial Recognition
Attendance System using Facial Recognition
IRJET Journal
 
Human Face Detection And Identification Of Facial Expressions Using MATLAB
Human Face Detection And Identification Of Facial Expressions Using MATLABHuman Face Detection And Identification Of Facial Expressions Using MATLAB
Human Face Detection And Identification Of Facial Expressions Using MATLAB
NIET Journal of Engineering & Technology (NIETJET)
 
Synops emotion recognize
Synops emotion recognizeSynops emotion recognize
Synops emotion recognizeAvdhesh Gupta
 
Smart Doorbell System Based on Face Recognition
Smart Doorbell System Based on Face RecognitionSmart Doorbell System Based on Face Recognition
Smart Doorbell System Based on Face Recognition
IRJET Journal
 

Similar to Face recognition technology (20)

IRJET- Face Detection and Recognition using OpenCV
IRJET- Face Detection and Recognition using OpenCVIRJET- Face Detection and Recognition using OpenCV
IRJET- Face Detection and Recognition using OpenCV
 
Infarec
InfarecInfarec
Infarec
 
184
184184
184
 
IRJET - A Review on Face Recognition using Deep Learning Algorithm
IRJET -  	  A Review on Face Recognition using Deep Learning AlgorithmIRJET -  	  A Review on Face Recognition using Deep Learning Algorithm
IRJET - A Review on Face Recognition using Deep Learning Algorithm
 
Final_ppt1
Final_ppt1Final_ppt1
Final_ppt1
 
Deep hypersphere embedding for real-time face recognition
Deep hypersphere embedding for real-time face recognitionDeep hypersphere embedding for real-time face recognition
Deep hypersphere embedding for real-time face recognition
 
A novel approach for performance parameter estimation of face recognition bas...
A novel approach for performance parameter estimation of face recognition bas...A novel approach for performance parameter estimation of face recognition bas...
A novel approach for performance parameter estimation of face recognition bas...
 
Biometric
BiometricBiometric
Biometric
 
Biometric
BiometricBiometric
Biometric
 
Automatic Attendance Management System Using Face Recognition
Automatic Attendance Management System Using Face RecognitionAutomatic Attendance Management System Using Face Recognition
Automatic Attendance Management System Using Face Recognition
 
Local Descriptor based Face Recognition System
Local Descriptor based Face Recognition SystemLocal Descriptor based Face Recognition System
Local Descriptor based Face Recognition System
 
Face recogntion using PCA algorithm
Face recogntion using PCA algorithmFace recogntion using PCA algorithm
Face recogntion using PCA algorithm
 
IRJET- Analysis of Face Recognition using Docface+ Selfie Matching
IRJET-  	  Analysis of Face Recognition using Docface+ Selfie MatchingIRJET-  	  Analysis of Face Recognition using Docface+ Selfie Matching
IRJET- Analysis of Face Recognition using Docface+ Selfie Matching
 
A DEEP LEARNING APPROACH FOR SEMANTIC SEGMENTATION IN BRAIN TUMOR IMAGES
A DEEP LEARNING APPROACH FOR SEMANTIC SEGMENTATION IN BRAIN TUMOR IMAGESA DEEP LEARNING APPROACH FOR SEMANTIC SEGMENTATION IN BRAIN TUMOR IMAGES
A DEEP LEARNING APPROACH FOR SEMANTIC SEGMENTATION IN BRAIN TUMOR IMAGES
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Attendance System using Facial Recognition
Attendance System using Facial RecognitionAttendance System using Facial Recognition
Attendance System using Facial Recognition
 
Human Face Detection And Identification Of Facial Expressions Using MATLAB
Human Face Detection And Identification Of Facial Expressions Using MATLABHuman Face Detection And Identification Of Facial Expressions Using MATLAB
Human Face Detection And Identification Of Facial Expressions Using MATLAB
 
Synops emotion recognize
Synops emotion recognizeSynops emotion recognize
Synops emotion recognize
 
Smart Doorbell System Based on Face Recognition
Smart Doorbell System Based on Face RecognitionSmart Doorbell System Based on Face Recognition
Smart Doorbell System Based on Face Recognition
 

More from ranjit banshpal

Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
ranjit banshpal
 
SECURE IMAGE RETRIEVAL BASED ON HYBRID FEATURES AND HASHES
SECURE IMAGE RETRIEVAL BASED ON HYBRID FEATURES AND HASHESSECURE IMAGE RETRIEVAL BASED ON HYBRID FEATURES AND HASHES
SECURE IMAGE RETRIEVAL BASED ON HYBRID FEATURES AND HASHES
ranjit banshpal
 
Secure Image Retrieval based on Hybrid Features and Hashes
Secure Image Retrieval based on Hybrid Features and HashesSecure Image Retrieval based on Hybrid Features and Hashes
Secure Image Retrieval based on Hybrid Features and Hashes
ranjit banshpal
 
LCT in day2 day life
LCT in day2 day lifeLCT in day2 day life
LCT in day2 day life
ranjit banshpal
 
“Web crawler”
“Web crawler”“Web crawler”
“Web crawler”
ranjit banshpal
 
Data mining technique for classification and feature evaluation using stream ...
Data mining technique for classification and feature evaluation using stream ...Data mining technique for classification and feature evaluation using stream ...
Data mining technique for classification and feature evaluation using stream ...
ranjit banshpal
 
Parallelization using open mp
Parallelization using open mpParallelization using open mp
Parallelization using open mp
ranjit banshpal
 
using big-data methods analyse the Cross platform aviation
 using big-data methods analyse the Cross platform aviation using big-data methods analyse the Cross platform aviation
using big-data methods analyse the Cross platform aviation
ranjit banshpal
 
E mail image spam filtering techniques
E mail image spam filtering techniquesE mail image spam filtering techniques
E mail image spam filtering techniques
ranjit banshpal
 
Ranjitbanshpal
RanjitbanshpalRanjitbanshpal
Ranjitbanshpal
ranjit banshpal
 
Ranjitbanshpal1
Ranjitbanshpal1Ranjitbanshpal1
Ranjitbanshpal1
ranjit banshpal
 

More from ranjit banshpal (15)

Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
 
SECURE IMAGE RETRIEVAL BASED ON HYBRID FEATURES AND HASHES
SECURE IMAGE RETRIEVAL BASED ON HYBRID FEATURES AND HASHESSECURE IMAGE RETRIEVAL BASED ON HYBRID FEATURES AND HASHES
SECURE IMAGE RETRIEVAL BASED ON HYBRID FEATURES AND HASHES
 
Secure Image Retrieval based on Hybrid Features and Hashes
Secure Image Retrieval based on Hybrid Features and HashesSecure Image Retrieval based on Hybrid Features and Hashes
Secure Image Retrieval based on Hybrid Features and Hashes
 
LCT in day2 day life
LCT in day2 day lifeLCT in day2 day life
LCT in day2 day life
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
“Web crawler”
“Web crawler”“Web crawler”
“Web crawler”
 
Data mining technique for classification and feature evaluation using stream ...
Data mining technique for classification and feature evaluation using stream ...Data mining technique for classification and feature evaluation using stream ...
Data mining technique for classification and feature evaluation using stream ...
 
Parallelization using open mp
Parallelization using open mpParallelization using open mp
Parallelization using open mp
 
using big-data methods analyse the Cross platform aviation
 using big-data methods analyse the Cross platform aviation using big-data methods analyse the Cross platform aviation
using big-data methods analyse the Cross platform aviation
 
E mail image spam filtering techniques
E mail image spam filtering techniquesE mail image spam filtering techniques
E mail image spam filtering techniques
 
Hybrid encryption
Hybrid encryption Hybrid encryption
Hybrid encryption
 
Autocorrelators1
Autocorrelators1Autocorrelators1
Autocorrelators1
 
Static Networks
Static NetworksStatic Networks
Static Networks
 
Ranjitbanshpal
RanjitbanshpalRanjitbanshpal
Ranjitbanshpal
 
Ranjitbanshpal1
Ranjitbanshpal1Ranjitbanshpal1
Ranjitbanshpal1
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

Face recognition technology

  • 2. 2 INDEX  Biometrics  Face recognition  Different approaches  ML Algorithm  Proposed System  Software used in face recognition Technology  Advantage  Application  Conclusion  References
  • 3. 3  “A biometric is a physiological or behavioral characteristic of a human being that can distinguish one person from another and that theoretically can be used for identification or verification of identity.” WHAT IS BIOMETRICS ? Biometric applications available today are categorized into 2 sectors  Psychological: Iris, Fingerprints, Hand, Retinal and Face recognition  Behavioral: Voice, Typing pattern, Signature
  • 4. Face Recognition Face recognition systems (FRSs) are an important field in computer vision, because it represent a non-invasive BI technique. 1. A face detection algorithm is used for extracting faces from video frames (training videos) and generating a face database. 2. Filtering and preprocessing are applied to face images obtained in the previous step. 3. A collection of machine learning algorithms are trained using as input data the faces obtained in the previous step. 4. Finally, the classifiers are used for classify faces obtained from video frames
  • 5. Facial recognition is a form of computer vision that uses faces to attempt to identify a person or verify a person’s claimed identity. For face recognition there are two types of comparisons, cont… 1) IDENTFICATION - figure out “Who is X?” - accomplished by system performing a “one-to-many ” search
  • 6. 2) VERIFICATION - answer the question “Is this X?” - accomplished by the system performing a “one-to-one” search cont…
  • 7. DIFFERENT APPROACHES Describe the different methods of face recognition.  Feature extraction methods The input image to identify and extract (and measure) distinctive facial features such as the eyes, mouth, nose, etc. Compute the geometric relationships among those facial points, thus reducing the input facial image to a vector of geometric features  Holistic methods Holistic approaches attempt to identify faces using global representations, i.e., descriptions based on the entire image rather than on local features of the face
  • 8. MLAlgorithms  During the past decades, several ML algorithms have been proposed for classification tasks.  Most of them are from the theoretical view under some assumption about data distribution, characteristics of the classification task, signal to-noise-ratio, etc.  In reality, these assumptions are often hard to be verified. Therefore, a practical solution for selecting an appropriate model for a given classification task is to experimentally compare these algorithms.  Five widely used machine classifiers  K-Nearest Neighbor (KNN)  Locally-Weighted Learning (LWL)  Naive Bayes classifier (NB)  Decision Table Classifier (DT)  Single Decision Tree (SDT).
  • 9. Single Decision Tree (SDT) :  Decision tree induction is the learning of decision trees from class- labeled training tuple.  A decision tree is a flowchart-like tree structure.  Each internal node (non leaf node) denotes a test on an attribute.  Each branch represents an outcome of the test.  Each leaf node (or terminal node) holds a class label.  The topmost node in a tree is the root node. A path is traced from the root to a leaf node.
  • 10. Single Decision Tree (SDT) :  Most algorithms for decision tree induction follow a top-down approach.  Starts with a training set of tuples and their associated class labels.  The training set is recursively partitioned into smaller subsets as the tree is being built.  To split D into smaller partitions according to the outcomes of the splitting criterion.  The specific algorithm for generating the decision tree is called C4.5 algorithm.
  • 11. Consider the two different videos of 10-second duration were used. A total of 10x30x2 = 600 frames where processed. In the input video, there was 6 different individuals, representing a total of 3, 600 samples (600 for each individual). Three versions of the dataset were generated: one for a 100 x 100 pixels face resolution, one for a 50 x 50 pixels face resolution, and finally one for a 25 x 25 pixels face resolution cont…
  • 13.  Face Detection  Face detector implemented on OpenCV.  Faces were detected using the function cvHaarDetectObjects.  The Semi-Aided Labeling Module (SALM) reads the input video, and for each frame where at least one face was detected by the face detection module.  Filtering and Preprocessing (FPM) This module performs the following transformations:  RGB to Gray scale Transformation: For reducing the amount of data to be processed, a 24-bit per pixel RGB format is transformed into a 8-bit per pixel gray-scale format.  Scaling: The face images are scaled to a fixed number of rows and columns. The output resolution for each face can be set by user according to the required accuracy. cont…
  • 14. Tabular Dataset Building Module (TDBM)  This module obtains the image pixels, and generates a tabular dataset.  where rows are the total number of subjects, and the columns are the image pixels.  The final column represents the class attribute.  Training For performing the training of the classification algorithms, the following steps are required:  Permute and split dataset. This operation is performed by the Random Permutation and Splitting Module (RPSM). Basically, a random permutation of the samples contained in the tabular dataset is performed, and the resulting dataset is divided into two datasets: the training dataset and the test dataset. cont…
  • 15.  Train classification algorithms. Each classification algorithm takes as input the training data set generated by the RPSM, and performs the model building for each classifier. Later, the model for each classifier is stored in disk for use it later in the classification step.  Classification  In this module, with the help of the previous trained classifiers, takes as input the faces from the test set, applies filter and pre-preprocessing operators, and evaluates the test face in each model generated by the trained classifiers. After doing this comparison, face image is classified with the label or name predicted by each classified. The output of each classified is processed by the Performance Evaluation Module (PEM), which generates a table with a comparison among several classifiers. cont…
  • 16. SOFTWARE USED IN FACE RECOGNITION TECHNOLOGY  Facial recognition software falls into a larger group of technologies known as biometrics.  Here is the basic process that is used by the Face system to capture and compare images  Detection When the system is attached to a video surveillance system, the recognition software searches the field of view of a video camera for faces.
  • 17. If there is a face in the view, it is detected within a fraction of a second. A multi-scale algorithm is used to search for faces in low resolution.  Alignment Once a face is detected, the system determines the head's position, size and pose. A face needs to be turned at least 35 degrees toward the camera for the system to register it.  Normalization Normalization is performed regardless of the head's location and distance from the camera. Light does not impact the normalization process.  Representation The system translates the facial data into a unique code. This coding process allows for easier comparison of the newly acquired facial data to stored facial data.
  • 18.  Matching The newly acquired facial data is compared to the stored data and linked to at least one stored facial representation. This is the mathematical technique the system uses to encode faces. The system can match multiple face prints at a rate of 60 million per minute from memory or 15 million per minute from hard disk. The comparison using a scale of one to 10. If a score is above a predetermined threshold, a match is declared.
  • 19. ADVANTAGES  Convenient, social acceptability  Easy to use  Inexpensive technique of identification
  • 20. APPLICATIONS 1. Replacement of PIN 2. Border control 3. Voter verification 4. Computer security 5. Government Use, a. Security/Counterterrorism. b. Immigration 8. Commercial Use, a. Residential Security b. Banking using ATM
  • 21. This technique evaluate the suitability of both computer vision and ML techniques for solving the problem of face detection and recognition. Face recognition technologies have been associated generally with very costly top secure applications. Today the core technologies have evolved and the cost of equipment’s is going down dramatically due to the integration and the increasing processing power. CONCLUSION
  • 22. References 1. E. Garc´ ıa Amaro, M.A. Nu ˜ no-Maganda and M. Morales-Sandoval, “Evaluation of Machine Learning Techniques for Face Detection and Recognition”, IEEE 2012. 2. Claudia Iancu, Peter Corcoran and Gabriel Costache,” A Review of Face Recognition Techniques for In-Camera Applications”, IEEE 2007. 3. Brian C. Becker, Enrique G.Ortiz, “Evaluation of Face Recognition Techniques for Application to Facebook ” 2008 IEEE 4. D. Bhattacharyya, R. Ranjan, F. Alisherov, and M. Choi, “Biometric authentication: A review,” International Journal of u- and e- Service, Science and Technology, vol. 3, no. 2, pp. 23– 27, 2009. 5. C. M. Bishop, Pattern Recognition and Machine Learning (Information Science and Statistics). Secaucus, NJ, USA: Springer-Verlag New York, Inc., 2006 6. G. Bradski and A. Kaehler, Learning OpenCV. O’Reilly Media Inc., 2008.