SlideShare a Scribd company logo
A SEMINAR
ON
FACE RECOGNITION USING NEURAL NETWORK
Presented by-
Soumyajit Sarkar(Roll No-16900315100)
Tithi Dan(Roll No-16900315119)
Mentor :- Prof. SubhamPramanik
Department of Electronics & Communication Engineering
 Introduction
 History
 Face recognition
 Neural network
 TECHNOLOGICAL IDEAS
 ADVANTAGES
 DISADVANTAGES
 APPLICATIONS
 CONCLUSIONS
 REFERENCES
2
06/04/2018
 In the present scenario , there is great
need to maintain information security
or protection for physical property.
 When credit and ATM cards are lost or
stolen, an unauthorized user can often
come up with the correct personal
codes.
3
06/04/2018
 Face Recognition is the fastest verification technology as it works
with the most obvious individual i.e. The human face .
 Information and property can be secured through verification of
“true” individual identity.
 It consists of unique shape analysis, pattern and positioning of facial
features.
4
06/04/2018
 In 1960s, the first semi-automated system for facial recognition to locate
the features(such as eyes, ears, nose and mouth) on the photographs.
 In 1970s, Goldstein and Harmon used 21 specific subjective markers
such as hair colour and lip thickness to automate the recognition.
 In 1988, Kirby and Sirovich used standard linear algebra technique, to
the face recognition.
5
06/04/2018
 Face recognition involves comparing an image with a database of stored faces in order to
identify the individual in that input image.
6
 Face recognition involves comparing an image with a database of stored faces in order to
identify the individual in that input image.
06/04/2018
 Face recognition technology is the least intrusive. It works with the most obvious individual identifier-the
human face.
 It requires no physical interaction on behalf of the user.
 It can use your existing hardware infrastructure , existing cameras and image capture devices will work with
no problems.
7
06/04/2018
 It is a system of programs and data structures that approximates the operation of the
human brain.
8
06/04/2018
 Adaptive learning: An ability to learn how to do task.
 Self-Organization: Neural Network can create its own organisation.
 Remarkable ability to derive meaning from complicated or imprecise
data.
9
06/04/2018
 Here recognition is performed by both Principal Component Analysis (PCA) and
Back propagation Neural Networks(BPNN). All these processes are implemented for
Face Recognition, based on the basic block diagram as shown in fig 1.
BASIC BLOCK DIAGRAM(fig-1)
Pre-processed
input image
Back
Propagation
Neural
Network
(BPNN)
Principal
Component
Analysis
(PCA)
Classified
Output Image
10
06/04/2018
 It normalize and enhance the face image to improve the
recognition performance.
11
06/04/2018
 PCA is a common statistical technique for finding the patterns in high
dimensional data’s Feature extraction, also called Dimensionality Reduction.
12
06/04/2018
 Step 1: Partition face images into sub-patterns .
13
06/04/2018
 Step 2: Compute the expected contribution of each sub-pattern
 Generate the Mean and Median faces for each person, and use these
“virtual faces” as the probe set in training
 Use the raw face-image sub-patterns as the gallery set in for training,
and compute the PCA’s projection matrix on these gallery set
 For each sample in the probe set, compute its similarity to the samples
in corresponding gallery set
14
06/04/2018
 If a sample from a sub-pattern’s probe set is correctly classified, the
contribution of this sub-pattern is added by 1.
15
06/04/2018
When an unknown face image comes in -
 partition it into sub-patterns.
 classify the unknown sample’s identity
in each sub-pattern .
 Incorporate the expected contribution
and the classification result of all sub-patterns to generate the final
classification result.
16
06/04/2018
 It trains the network to achieve a balance between the ability to respond
correctly to the input patterns that are used for training & the ability to
provide good response to the input that are similar.
 It requires a dataset of
the desired output for
many input, making up
the training set.
17
06/04/2018
 These are necessarily Multilayer
Perceptrons (MLPs).
 MLPs:
1. Set of input layers
2. One or more hidden layers
3. Set of output layers
18
06/04/2018
 In a nutshell, face recognition is done in this way-
19
06/04/2018
 Fastest security mechanism.
 No physical interaction .
 more user friendly.
 no extra learning process.
 Simple, Fast & Easy to use.
 Social acceptability.
20
06/04/2018
 Identical twins attack
 Requires straight on, natural expression
 Affected by environment
21
06/04/2018
 criminals identification in public location
such as airport, Banks.
 Building security
 Credit card verification
 Mobile phone unlocking
22
06/04/2018
 We have to improve accuracy combining face recognition and other
biometric recognition .
 It will find efficiently without exhaustively searching the image.
 Face recognition systems are going to have widespread application in
smart environments.
23
06/04/2018
1. Steve Lawrence, C. Lee Giles , “Face Recognition: A Convolutional Neural Network Approach”, IEEE
transaction, St. Lucia, Australia.
2. David a brown, Ian craw, Julian lewthwaite, “Interactive Face retrieval using self organizing maps-A
SOM based approach to skin detection with application in real time systems”, IEEE 2008 conference,
Berlin, Germany.
3. Shahrin Azuan Nazeer, Nazaruddin Omar' and Marzuki Khalid, “Face Recognition System using
Artificial Neural Networks Approach”, IEEE - ICSCN 2007, MIT Campus, Anna University, Chennai,
India. Feb. 22-24, 2007. pp.420-425.
4. M. Prakash and M. Narasimha Murty, “Recognition Methods and Their NeuralNetwork Models”, IEEE
TRANSACTIONS ON NEURAL NETWORKS, VOL. 8, NO. 1, JANUARY 2005.
24
06/04/2018
25
06/04/2018

More Related Content

What's hot

Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
raihansikdar
 
Face recognisation system
Face recognisation systemFace recognisation system
Face recognisation system
Saumya Ranjan Behura
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
ShubhamLamichane
 
FACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTFACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPT
Saghir Hussain
 
Criminal Detection System
Criminal Detection SystemCriminal Detection System
Criminal Detection System
Intrader Amit
 
Introduction to image processing and pattern recognition
Introduction to image processing and pattern recognitionIntroduction to image processing and pattern recognition
Introduction to image processing and pattern recognition
Saibee Alam
 
Face recognition Face Identification
Face recognition Face IdentificationFace recognition Face Identification
Face recognition Face Identification
Kalyan Acharjya
 
Face recognization using artificial nerual network
Face recognization using artificial nerual networkFace recognization using artificial nerual network
Face recognization using artificial nerual network
Dharmesh Tank
 
Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection System
Abhiroop Ghatak
 
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIERHANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
vineet raj
 
Face Recognition
Face Recognition Face Recognition
Face Recognition nialler27
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/Technology
RahulSingh3034
 
face recognition system using LBP
face recognition system using LBPface recognition system using LBP
face recognition system using LBP
Marwan H. Noman
 
ECG BIOMETRICS
ECG BIOMETRICSECG BIOMETRICS
ECG BIOMETRICS
Alpana Ingale
 
Pattern recognition
Pattern recognitionPattern recognition
Pattern recognition
Swarnava Sen
 
Genetic programming
Genetic programmingGenetic programming
Genetic programming
Omar Ghazi
 
Face recognition using PCA
Face recognition using PCAFace recognition using PCA
Face recognition using PCA
Nawin Kumar Sharma
 
Minor on Face Recognition System using Raspberry Pi
Minor on Face Recognition System using Raspberry PiMinor on Face Recognition System using Raspberry Pi
Minor on Face Recognition System using Raspberry Pi
Nitish Bokolia
 
Face recognition
Face recognition Face recognition
Face recognition
Chandan A V
 

What's hot (20)

Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
Face recognisation system
Face recognisation systemFace recognisation system
Face recognisation system
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
FACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTFACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPT
 
Criminal Detection System
Criminal Detection SystemCriminal Detection System
Criminal Detection System
 
Introduction to image processing and pattern recognition
Introduction to image processing and pattern recognitionIntroduction to image processing and pattern recognition
Introduction to image processing and pattern recognition
 
Face recognition Face Identification
Face recognition Face IdentificationFace recognition Face Identification
Face recognition Face Identification
 
Face recognization using artificial nerual network
Face recognization using artificial nerual networkFace recognization using artificial nerual network
Face recognization using artificial nerual network
 
Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection System
 
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIERHANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
 
Face Recognition
Face Recognition Face Recognition
Face Recognition
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/Technology
 
face recognition system using LBP
face recognition system using LBPface recognition system using LBP
face recognition system using LBP
 
ECG BIOMETRICS
ECG BIOMETRICSECG BIOMETRICS
ECG BIOMETRICS
 
Pattern recognition
Pattern recognitionPattern recognition
Pattern recognition
 
Genetic programming
Genetic programmingGenetic programming
Genetic programming
 
Face recognition using PCA
Face recognition using PCAFace recognition using PCA
Face recognition using PCA
 
Minor on Face Recognition System using Raspberry Pi
Minor on Face Recognition System using Raspberry PiMinor on Face Recognition System using Raspberry Pi
Minor on Face Recognition System using Raspberry Pi
 
Face recognition
Face recognition Face recognition
Face recognition
 
Image recognition
Image recognitionImage recognition
Image recognition
 

Similar to FACE RECOGNITION USING NEURAL NETWORK

IRJET-A Survey on Face Recognition based Security System and its Applications
IRJET-A Survey on Face Recognition based Security System and its ApplicationsIRJET-A Survey on Face Recognition based Security System and its Applications
IRJET-A Survey on Face Recognition based Security System and its Applications
IRJET Journal
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face Recognition
IRJET Journal
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITION
Lisa Cain
 
IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...
IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...
IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...
IRJET Journal
 
Person identification based on facial biometrics in different lighting condit...
Person identification based on facial biometrics in different lighting condit...Person identification based on facial biometrics in different lighting condit...
Person identification based on facial biometrics in different lighting condit...
IJECEIAES
 
Improved Approach for Eigenface Recognition
Improved Approach for Eigenface RecognitionImproved Approach for Eigenface Recognition
Improved Approach for Eigenface Recognition
BRNSSPublicationHubI
 
IRJET - Real Time Facial Analysis using Tensorflowand OpenCV
IRJET -  	  Real Time Facial Analysis using Tensorflowand OpenCVIRJET -  	  Real Time Facial Analysis using Tensorflowand OpenCV
IRJET - Real Time Facial Analysis using Tensorflowand OpenCV
IRJET Journal
 
Introduction to ml
Introduction to mlIntroduction to ml
Introduction to ml
Girija Muscut
 
Facial image classification and searching –a survey
Facial image classification and searching –a surveyFacial image classification and searching –a survey
Facial image classification and searching –a survey
Zac Darcy
 
Facial Image Classification And Searching - A Survey
Facial Image Classification And Searching - A SurveyFacial Image Classification And Searching - A Survey
Facial Image Classification And Searching - A Survey
Zac Darcy
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
ijtsrd
 
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET Journal
 
IRJET- Credit Card Authentication using Facial Recognition
IRJET-  	  Credit Card Authentication using Facial RecognitionIRJET-  	  Credit Card Authentication using Facial Recognition
IRJET- Credit Card Authentication using Facial Recognition
IRJET Journal
 
Kh3418561861
Kh3418561861Kh3418561861
Kh3418561861
IJERA Editor
 
MTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITION
MTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITIONMTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITION
MTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITION
IRJET Journal
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCV
IRJET Journal
 
IRJET- Age Analysis using Face Recognition with Hybrid Algorithm
IRJET-  	  Age Analysis using Face Recognition with Hybrid AlgorithmIRJET-  	  Age Analysis using Face Recognition with Hybrid Algorithm
IRJET- Age Analysis using Face Recognition with Hybrid Algorithm
IRJET Journal
 
Facial Expression Identification System
Facial Expression Identification SystemFacial Expression Identification System
Facial Expression Identification System
IRJET Journal
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methods
IRJET Journal
 
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONESAN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AM Publications
 

Similar to FACE RECOGNITION USING NEURAL NETWORK (20)

IRJET-A Survey on Face Recognition based Security System and its Applications
IRJET-A Survey on Face Recognition based Security System and its ApplicationsIRJET-A Survey on Face Recognition based Security System and its Applications
IRJET-A Survey on Face Recognition based Security System and its Applications
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face Recognition
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITION
 
IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...
IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...
IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...
 
Person identification based on facial biometrics in different lighting condit...
Person identification based on facial biometrics in different lighting condit...Person identification based on facial biometrics in different lighting condit...
Person identification based on facial biometrics in different lighting condit...
 
Improved Approach for Eigenface Recognition
Improved Approach for Eigenface RecognitionImproved Approach for Eigenface Recognition
Improved Approach for Eigenface Recognition
 
IRJET - Real Time Facial Analysis using Tensorflowand OpenCV
IRJET -  	  Real Time Facial Analysis using Tensorflowand OpenCVIRJET -  	  Real Time Facial Analysis using Tensorflowand OpenCV
IRJET - Real Time Facial Analysis using Tensorflowand OpenCV
 
Introduction to ml
Introduction to mlIntroduction to ml
Introduction to ml
 
Facial image classification and searching –a survey
Facial image classification and searching –a surveyFacial image classification and searching –a survey
Facial image classification and searching –a survey
 
Facial Image Classification And Searching - A Survey
Facial Image Classification And Searching - A SurveyFacial Image Classification And Searching - A Survey
Facial Image Classification And Searching - A Survey
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
 
IRJET- Credit Card Authentication using Facial Recognition
IRJET-  	  Credit Card Authentication using Facial RecognitionIRJET-  	  Credit Card Authentication using Facial Recognition
IRJET- Credit Card Authentication using Facial Recognition
 
Kh3418561861
Kh3418561861Kh3418561861
Kh3418561861
 
MTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITION
MTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITIONMTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITION
MTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITION
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCV
 
IRJET- Age Analysis using Face Recognition with Hybrid Algorithm
IRJET-  	  Age Analysis using Face Recognition with Hybrid AlgorithmIRJET-  	  Age Analysis using Face Recognition with Hybrid Algorithm
IRJET- Age Analysis using Face Recognition with Hybrid Algorithm
 
Facial Expression Identification System
Facial Expression Identification SystemFacial Expression Identification System
Facial Expression Identification System
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methods
 
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONESAN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
 

Recently uploaded

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 

Recently uploaded (20)

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 

FACE RECOGNITION USING NEURAL NETWORK

  • 1. A SEMINAR ON FACE RECOGNITION USING NEURAL NETWORK Presented by- Soumyajit Sarkar(Roll No-16900315100) Tithi Dan(Roll No-16900315119) Mentor :- Prof. SubhamPramanik Department of Electronics & Communication Engineering
  • 2.  Introduction  History  Face recognition  Neural network  TECHNOLOGICAL IDEAS  ADVANTAGES  DISADVANTAGES  APPLICATIONS  CONCLUSIONS  REFERENCES 2 06/04/2018
  • 3.  In the present scenario , there is great need to maintain information security or protection for physical property.  When credit and ATM cards are lost or stolen, an unauthorized user can often come up with the correct personal codes. 3 06/04/2018
  • 4.  Face Recognition is the fastest verification technology as it works with the most obvious individual i.e. The human face .  Information and property can be secured through verification of “true” individual identity.  It consists of unique shape analysis, pattern and positioning of facial features. 4 06/04/2018
  • 5.  In 1960s, the first semi-automated system for facial recognition to locate the features(such as eyes, ears, nose and mouth) on the photographs.  In 1970s, Goldstein and Harmon used 21 specific subjective markers such as hair colour and lip thickness to automate the recognition.  In 1988, Kirby and Sirovich used standard linear algebra technique, to the face recognition. 5 06/04/2018
  • 6.  Face recognition involves comparing an image with a database of stored faces in order to identify the individual in that input image. 6  Face recognition involves comparing an image with a database of stored faces in order to identify the individual in that input image. 06/04/2018
  • 7.  Face recognition technology is the least intrusive. It works with the most obvious individual identifier-the human face.  It requires no physical interaction on behalf of the user.  It can use your existing hardware infrastructure , existing cameras and image capture devices will work with no problems. 7 06/04/2018
  • 8.  It is a system of programs and data structures that approximates the operation of the human brain. 8 06/04/2018
  • 9.  Adaptive learning: An ability to learn how to do task.  Self-Organization: Neural Network can create its own organisation.  Remarkable ability to derive meaning from complicated or imprecise data. 9 06/04/2018
  • 10.  Here recognition is performed by both Principal Component Analysis (PCA) and Back propagation Neural Networks(BPNN). All these processes are implemented for Face Recognition, based on the basic block diagram as shown in fig 1. BASIC BLOCK DIAGRAM(fig-1) Pre-processed input image Back Propagation Neural Network (BPNN) Principal Component Analysis (PCA) Classified Output Image 10 06/04/2018
  • 11.  It normalize and enhance the face image to improve the recognition performance. 11 06/04/2018
  • 12.  PCA is a common statistical technique for finding the patterns in high dimensional data’s Feature extraction, also called Dimensionality Reduction. 12 06/04/2018
  • 13.  Step 1: Partition face images into sub-patterns . 13 06/04/2018
  • 14.  Step 2: Compute the expected contribution of each sub-pattern  Generate the Mean and Median faces for each person, and use these “virtual faces” as the probe set in training  Use the raw face-image sub-patterns as the gallery set in for training, and compute the PCA’s projection matrix on these gallery set  For each sample in the probe set, compute its similarity to the samples in corresponding gallery set 14 06/04/2018
  • 15.  If a sample from a sub-pattern’s probe set is correctly classified, the contribution of this sub-pattern is added by 1. 15 06/04/2018
  • 16. When an unknown face image comes in -  partition it into sub-patterns.  classify the unknown sample’s identity in each sub-pattern .  Incorporate the expected contribution and the classification result of all sub-patterns to generate the final classification result. 16 06/04/2018
  • 17.  It trains the network to achieve a balance between the ability to respond correctly to the input patterns that are used for training & the ability to provide good response to the input that are similar.  It requires a dataset of the desired output for many input, making up the training set. 17 06/04/2018
  • 18.  These are necessarily Multilayer Perceptrons (MLPs).  MLPs: 1. Set of input layers 2. One or more hidden layers 3. Set of output layers 18 06/04/2018
  • 19.  In a nutshell, face recognition is done in this way- 19 06/04/2018
  • 20.  Fastest security mechanism.  No physical interaction .  more user friendly.  no extra learning process.  Simple, Fast & Easy to use.  Social acceptability. 20 06/04/2018
  • 21.  Identical twins attack  Requires straight on, natural expression  Affected by environment 21 06/04/2018
  • 22.  criminals identification in public location such as airport, Banks.  Building security  Credit card verification  Mobile phone unlocking 22 06/04/2018
  • 23.  We have to improve accuracy combining face recognition and other biometric recognition .  It will find efficiently without exhaustively searching the image.  Face recognition systems are going to have widespread application in smart environments. 23 06/04/2018
  • 24. 1. Steve Lawrence, C. Lee Giles , “Face Recognition: A Convolutional Neural Network Approach”, IEEE transaction, St. Lucia, Australia. 2. David a brown, Ian craw, Julian lewthwaite, “Interactive Face retrieval using self organizing maps-A SOM based approach to skin detection with application in real time systems”, IEEE 2008 conference, Berlin, Germany. 3. Shahrin Azuan Nazeer, Nazaruddin Omar' and Marzuki Khalid, “Face Recognition System using Artificial Neural Networks Approach”, IEEE - ICSCN 2007, MIT Campus, Anna University, Chennai, India. Feb. 22-24, 2007. pp.420-425. 4. M. Prakash and M. Narasimha Murty, “Recognition Methods and Their NeuralNetwork Models”, IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 8, NO. 1, JANUARY 2005. 24 06/04/2018