SlideShare a Scribd company logo
Prathamesh Timse et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 6), April 2014, pp.52-57
www.ijera.com 52 | P a g e
Face Recognition Based Door Lock System Using Opencv and C#
with Remote Access and Security Features
Prathamesh Timse**,
Pranav Aggarwal**
, Prakhar Sinha**
,Neel Vora**
,
**Student, Department of Electronics and Telecommunication Engineering, K.J Somaiya College Of
Engineering, Vidyanagar, Vidyavihar(E), Mumbai - 400 077, Maharashtra, India.
ABSTRACT
This paper investigates the accuracy and effectiveness of the face detection and recognition algorithms using
OpenCV and C# computer language. The adaboost algorithm [2] is used for face detection and PCA
algorithm[1] is used for face recognition. This paper also investigates the robustness of the face recognition
system when an unknown person is being detected, wherein the system will send an email to the owner of the
system using SMTP [7]. The door lock can also be accessed remotely from any part of the world by using a
Dropbox [8] account.
Keywords – Recognition, Detection, OpenCV, C#, Adaboost [2], PCA [1], SMTP [7] , Dropbox [8] .
I. INTRODUCTION
Human beings are recognized by their unique facial
characteristics. In the face recognition approach, a
given face is compared with the faces stored in the
database in order to identify the person. The purpose
is to find a face in the database, which has the highest
similarity with the given face. In the field of
biometrics, facial recognition technology is one of
the fastest growing fields.
The recent interest in face recognition can
be attributed to the increase of commercial interest
and the development of feasible technologies to
support the development of face recognition. Major
areas of commercial interest include biometrics, law
enforcement and surveillance, human-computer
interaction, multimedia management (for example,
automatic tagging of a particular individual within a
collection of digital photographs) smart cards,
passport check, Criminal investigations, access
control.
However, face detection is more challenging
because of some unstable characteristics, for
example, glasses and beard will impact the detecting
effectiveness. Moreover, different kinds and angles
of lighting will make detecting face generate uneven
brightness on the face, which will have influence on
the detection process.
To overcome these problems, the system used
adaboost algorithm [2] implemented using Haar
classifiers for face detection and PCA algorithm [1]
for face recognition implemented using face
recognizer function of OpenCV.
Rest of the paper is organized as follows:
Section II describes the proposed face recognition
system. Face detection mechanism is explained in
Section III. Section IV describes the face recognition
mechanism, Section V states the Remote access and
security features of the system, Section VI provides
the results and observations and the last section gives
the conclusion.
II. SETUP OF FACE RECOGNITION SYSTEM
III. FACE DETECTION BY HAAR
CASCADED CLASSIFIER USING
VIOLA JONES METHOD
Viola and Jones devised an algorithm, called
Haar Classifiers, to rapidly detect any object,
including human faces, using Adaboost [2]classifier
cascades that are based on Haar-like features and not
pixels.[4]
Open CV uses Viola Jones method
published in 2001, to detect faces using 4 key
concepts
 Simple rectangular features called haar features
 An integral image for rapid face detection
 The adaboost machine learing method
 A cascaded classifier to combine many
classifiers efficiently[6]
RESEARCH ARTICLE OPEN ACCESS
Prathamesh Timse et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 6), April 2014, pp.52-57
www.ijera.com 53 | P a g e
Extended Haar-like features are chosen to
enhance detecting precision, which is divided into
edge feature, linear feature and center surround
feature. And the above features comprise feature
module, in which there are two kinds of rectangle,
white and black, as in Fig 1[3]
Integral image is a method used to quickly
calculate the characteristic value: the difference
between the sum of white pixels and the sum of black
pixels. In Fig 2, it shows that the characteristic value
composed by II and IV is the variation between the
sum of IV pixels and the sum of II pixels. The former
is the difference between the sum of integral image
value of A and D and the sum of integral image value
of B and C. The later is the sum of integral image
value of B and integral image value of A.
The cascaded classifier used by OpenCV is
Haar cascade classifier which is trained on thousands
of human faces. The training data is stored in an xml
file which is later used by the classifier to detect
faces. This paper uses the Haar cascade classifier
haarcascade_frontalface_alt_tree.xml created by
Rainer Lienhart.
Adaboost [2]is from high dimensional space
and large amounts of data to train a strong classifier.
Strong classifier is composed by multiple weak
classifiers, the bias direction ( j p ), the threshold (θ j)
and characteristic function j f are consist of a weak
classifier. The Binary weak classifier as follows:
The steps of Strong classifier training
algorithm are as follows:
(1) About the samples (x1,y1) ,(x2,y2)…(xn,yn) and
,yi=-1 and yi=1 are corresponding to the counter-
samples and positive-samples
(2)The Initialize the sample weights about yi=-1 and
yi=1 are
m and l is the number about counter-samples and
positive-samples;
(3) Iterate T times: t=1,2,…T :
(4) Training the strong classifier is:
Strong classifier can be achieved arbitrarily
low error rate for training data. When the training
samples are representative comparison, the strong
classifier can be also achieved the ideal true error
rate.[5]
Prathamesh Timse et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 6), April 2014, pp.52-57
www.ijera.com 54 | P a g e
The detection process was completed by us
with an accuracy of 95%. The system could also
detect multiple faces as is evident from the following
figure:
IV. FACE RECOGNITION
Open CV (Open Source Computer Vision) is a
popular computer vision library. The Eigenfaces
method takes a holistic approach to face recognition:
A facial image is a point from a high-dimensional
image space and a lower-dimensional representation
is found, where classification becomes easy. The
lower-dimensional subspace is found with Principal
Component Analysis, which identifies the axes with
maximum variance. A class-specific projection with a
Linear Discriminant Analysis is applied to face
recognition . The basic idea is to minimize the
variance within a class, while maximizing the
variance between the classes at the same time. A
database of 25 persons was created for research
purpose. After acquiring the data the images were
read from a very simple CSV file because it is a
simple platform-independent approach. The problem
with the image representation is its high
dimensionality. Two-dimensional pxq grayscale
images span a m=pq –dimensional vector space, so
an image with 100X100 pixels lies in a 10,000-
dimensional image space already. Only a decision if
there‟s any variance in data can be made, so there‟s a
need to look for the components that account for
most of the information. The Principal Component
Analysis (PCA) [1] turns a set of possibly correlated
variables into a smaller set of uncorrelated variables.
The idea is, that a high-dimensional dataset is often
described by correlated variables and therefore only a
few meaningful dimensions account for most of the
information. The PCA method [1] finds the directions
with the greatest variance in the data, called principal
components.
Algorithm Description
Let X = {x1,x2,…,xn} be a random vector
with observations .
1. Compute the mean
2. Compute the Covariance Matrix S
3. Compute the eigenvalues and
eigenvectors of
4. Order the eigenvectors descending by their
eigenvalue. The principal components
are the eigenvectors corresponding to the
largest eigenvalues.
The principal components of the
observed vector are then given by:
where .
The reconstruction from the PCA basis is
given by:
where .
The Eigenfaces method then performs face
recognition by:
 Projecting all training samples into the PCA
subspace.
 Projecting the query image into the PCA
subspace.
 Finding the nearest neighbor between the
projected training images and the projected
query image.
There emerges a problem. Suppose there are
400 images sized 100X100 pixel. The Principal
Component Analysis solves the covariance
matrix where ..
We would end up with a matrix,
roughly . Solving this problem isn‟t feasible,
so there‟s a need to apply a trick. From the linear
algebra lessons we know that a matrix
with can only have non-zero
eigenvalues. So it‟s possible to take the eigenvalue
decomposition of size instead:
and get the original eigenvectors
of
with a left multiplication of the data matrix:
Prathamesh Timse et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 6), April 2014, pp.52-57
www.ijera.com 55 | P a g e
The resulting eigenvectors are orthogonal, to
get orthonormal eigenvectors they need to be
normalized to unit length.
Face recognition operations
V. REMOTE ACCESS AND SECURITY
FEATURES
This paper also brings out the possibility for
remote access and sending out an email to the user in
case of an intruder trying to access the door.
The remote access is done by using Dropbox
[8] (service) operated by Dropbox, Inc.
The user has a predefined text file which he
can upload to his Dropbox folder[8]. The system
periodically reads the Dropbox folder [8] for that text
file and if it‟s found the system allows the door lock
to be opened.
In case of an intruder trying to access the
door, the unsuccessful attempts made by the intruder
is taken count of and his/her image is stored in a
folder. These images are then sent to the user by
email using SMTP server [7]. The mechanism is
explained below:
The .Net and .Mail libraries are to be added
in C#. This will allow us to access SMTPClient,
MailMessage [7] and NetworkCredentials. A valid
email account (with password) is needed to give the
program a place to send the mail from. To send an
email first a new mailMessage (an email) to send is
to be created. To include an attachment with an e-
mail message, first create the attachment by using
the Attachment class, and then add it to the message
by using the MailMessage attachments property. The
attachment in our case is the image of the
unauthorized user. The information that has to be
specified is the SMTP host server[7] that you use to
send e-mail, credentials for authentication, if required
by the SMTP server and the e-mail address of the
sender. A new SMTP client[7] to send our email is to
be created. We created a new client which has two
parameters (Host, Port). The host is where we'll be
sending the mail from; this should be the same as
your email account. The only reason we use port 25
is because it's the default SMTP port, although
another port may be used. Now we fill in the client
details and send the email. Enabling SSL (Secure
Sockets Layer, encryption) is required by most email
providers to send mail.
VI. RESULTS AND OBSERVATIONS
The parameters for face recognition system
in OpenCV Haar classifier[3] and face recognizer
functions are as follows:
1. Scale increase rate: This parameter in the call to
DetectHaarCascade() specifies how quickly OpenCV
should increase the scale for face detections with
each pass it makes over an image. Setting this higher
makes the detector run faster (by running fewer
passes), but if it's too high, you may jump too quickly
between scales and miss faces. The default in
OpenCV is 1.1, in other words, scale increases by a
factor of 1.1 (10%) each pass.
This parameter may have a value of 1.1 , 1.2
, 1.3 or 1.4. We have set it to 1.2, which means it will
run the moderate number of passes, thus will accurate
as well as fast. The lower the value, the more
"thoroughly" Haar detector will check the image for
the “face", but naturally will take more time.
2. Minimum neighbors threshold:
The next parameter in the call to
DetectHaarCascade() is the „The minimum-neighbors
threshold‟ which sets the cutoff level for discarding
or keeping rectangle groups as “face” or not, based
on how many raw detections are in the group. This
parameter‟s value ranges from 0 to 10.
We have used minimum neighbors = 10 i.e.
we want only an object to be marked as a face if it
has the highest probability and vote of being the
"face”. If we set minimum neighbor to a value n, then
detector will mark an object as "face" in any image IF
there is a group of n rectangles (hits) identifying it as
a "face".
3. Minimum Detection scale:
The third parameter in the call to Detect
Haar Cascade () is the size of the smallest face to
search for. We can change the default for this by
changing its value from the Haar cascade classifier
xml file .We have set it to 25X25,which gives us the
best results.
A good rule of thumb is to use some fraction
of your input image's width or height as the minimum
scale - for example, 1/4 of the image width. If you
specify a minimum scale other than the default, be
sure its aspect ratio (the ratio of width to height) is
the same as the defaults. i.e., aspect ratio should
be 1:1.
Prathamesh Timse et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 6), April 2014, pp.52-57
www.ijera.com 56 | P a g e
4. Threshold:
Threshold is the maximum value of the
Euclidean distance between the database image and
input image.
A database of 25 persons was created
wherein 50 images of each person were stored.
For simulation we tested the face
recognition system for 3 known persons and 1
unknown person.
The observations were carried out in
artificial fluorescent lighting conditions.
We kept the scale increase rate at 1.2,
minimum neighbors threshold at 10 and minimum
detection scale at 25X25.
The subjects were asked to show their face
10 times in the camera
The results obtained were as follows:
Known person 1:
Threshold Correct
recognition
False
recognition
Not
recognize
d
2000 8 0 2
2250 9 0 1
2500 9 0 1
2750 8 0 2
3000 10 0 0
3500 10 0 0
4000 9 1 0
4500 7 3 0
5000 5 5 0
It is observed that for the Known
person1,the threshold value in the range 3000-3500 is
highly accurate giving us a 100% accuracy under the
conditions. Also as the threshold value is increased
the false recognition of the person increases thus
deteriorating the performance.
Known person 2:
Threshed Correct
recognition
False
recognition
Not
recognized
2000 0 0 10
2250 0 0 10
2500 0 0 10
2750 1 0 9
3000 6 1 3
3500 8 1 1
4000 5 4 1
4500 5 5 0
5000 4 6 0
For Known person2, initially there is no
recognition in the threshold value up to 2500. The
optimum performance is obtained at the value 3500
giving us 80% accuracy. Performance weakened for
higher threshold values.
Known person 3:
Threshold Correct
recognition
False
recognition
Not
recognized
2000 0 0 10
2250 0 0 10
2500 2 0 8
2750 4 0 6
3000 7 0 3
3500 10 0 0
4000 5 4 1
4500 3 6 1
5000 2 8 0
Considering the results obtained for Known
person3, the threshold value of 3500 gave an
excellent result providing a 100% accuracy. Again
the range 3000-3500 provided high efficiency. At
further increase in the threshold values the subject
was falsely recognized.
Unknown person:
Threshold Correct
recognition
False
recognition
2000 10 0
2250 10 0
2500 10 0
2750 10 0
3000 10 0
3500 10 0
4000 10 0
4500 7 3
5000 2 8
As per the results, the subject was correctly
recognized as unknown up till a threshold value of
4000 providing an accurate system of recognition.
The image of the unknown person was sent as an
attachment to the Gmail account through SMTP.
However beyond the threshold of 4000 the subject
was recognized as a known person degrading the
performance.
VII. CONCLUSION
The paper suggests that the face detection
process under controlled lighting conditions
(fluorescent light) gives an accuracy of 95% with
scale increase rate at 1.2 ,minimum neighbors
Prathamesh Timse et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 6), April 2014, pp.52-57
www.ijera.com 57 | P a g e
threshold at 10 and minimum detection scale at
25X25.
The recognition process is subject to the
threshold value which is the maximum value of the
Euclidean distances between the database images and
input image. The threshold value was different for
different persons ranging from 3000-3500.In this
range the recognition rate is at 85%.
Also the SMTP and Dropbox service are
used for added security and remote access features.
REFERENCES
[1] M. Turk and A. Pentland, “Eigenfaces for
Recognition”, Journal of Cognitive Neuro
science, March 1991.
[2] P. Viola and Michael J. Jones. "Robust real-
time face detection", International Journal of
Computer Vision, 57(2):137-154, 2004.
[3] “The System of Face Detection Based on
OpenCV” Xianghua Fan, Fuyou Zhang,
Haixia Wang, Xiao Lu Key Laboratory for
Robot & Intelligent Technology of
Shandong Province, Shandong University of
Science and Technology, Qingdao 266590
[4] “Facial feature detection using haar
classifiers*”Phillip Ian Wilson Dr. John
Fernandez Texas A&M University – Corpus
Christi 6300 Ocean Dr. CI334, Corpus
Christi, TX 78412 361-825-3622.
[5] “ Miner Face Detection is Based on
Improved AdaBoost Algorithm “Chao
JIANG ,Gu-yong HAN ,Lei TIAN ,Song
LU, Wei-xing HUANG Air Force Service
College XuZhou JiangSu China.
[6] http://www.cognotics.com/opencv/servo_20
07_series/part_2/sidebar.html
[7] ”Active e-mail system SMTP protocol
monitoring algorithm”, Sureswaran, R.
Nat. Adv. IPv6 Centre (NAv6), Univ. Sains
Malaysia, Minden, Malaysia
Al Bazar, H. ; Abouabdalla, O. ; Manasrah,
A.M. ; El-Taj, H.
[8] ”On the impact of virtualization on
Dropbox-like cloud file storage/
synchronization services”, Haiyang Wang
Sch. of Comput. Sci., Simon Fraser Univ.,
Burnaby, BC, Canada
Shea, R. ; Feng Wang ; Jiangchuan Liu

More Related Content

What's hot

COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSCOMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
ijcsit
 
Statistical Pattern recognition(1)
Statistical Pattern recognition(1)Statistical Pattern recognition(1)
Statistical Pattern recognition(1)Syed Atif Naseem
 
Face recognition using gaussian mixture model & artificial neural network
Face recognition using gaussian mixture model & artificial neural networkFace recognition using gaussian mixture model & artificial neural network
Face recognition using gaussian mixture model & artificial neural network
eSAT Journals
 
Comparison on PCA ICA and LDA in Face Recognition
Comparison on PCA ICA and LDA in Face RecognitionComparison on PCA ICA and LDA in Face Recognition
Comparison on PCA ICA and LDA in Face Recognition
ijdmtaiir
 
Review and comparison of tasks scheduling in cloud computing
Review and comparison of tasks scheduling in cloud computingReview and comparison of tasks scheduling in cloud computing
Review and comparison of tasks scheduling in cloud computing
ijfcstjournal
 
DataEngConf: Feature Extraction: Modern Questions and Challenges at Google
DataEngConf: Feature Extraction: Modern Questions and Challenges at GoogleDataEngConf: Feature Extraction: Modern Questions and Challenges at Google
DataEngConf: Feature Extraction: Modern Questions and Challenges at Google
Hakka Labs
 
Fuzzy Logic based Edge Detection Method for Image Processing
Fuzzy Logic based Edge Detection Method for Image Processing  Fuzzy Logic based Edge Detection Method for Image Processing
Fuzzy Logic based Edge Detection Method for Image Processing
IJECEIAES
 
Fuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression TechniqueFuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression Technique
IJERA Editor
 
Pattern recognition using context dependent memory model (cdmm) in multimodal...
Pattern recognition using context dependent memory model (cdmm) in multimodal...Pattern recognition using context dependent memory model (cdmm) in multimodal...
Pattern recognition using context dependent memory model (cdmm) in multimodal...
ijfcstjournal
 
IRJET- Optical Character Recognition using Neural Networks by Classification ...
IRJET- Optical Character Recognition using Neural Networks by Classification ...IRJET- Optical Character Recognition using Neural Networks by Classification ...
IRJET- Optical Character Recognition using Neural Networks by Classification ...
IRJET Journal
 
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...Faster Training Algorithms in Neural Network Based Approach For Handwritten T...
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...
CSCJournals
 
Implementation of Face Recognition in Cloud Vision Using Eigen Faces
Implementation of Face Recognition in Cloud Vision Using Eigen FacesImplementation of Face Recognition in Cloud Vision Using Eigen Faces
Implementation of Face Recognition in Cloud Vision Using Eigen Faces
IJERA Editor
 
Face Detection and Recognition using Back Propagation Neural Network (BPNN)
Face Detection and Recognition using Back Propagation Neural Network (BPNN)Face Detection and Recognition using Back Propagation Neural Network (BPNN)
Face Detection and Recognition using Back Propagation Neural Network (BPNN)
IRJET Journal
 
Intelligent Handwritten Digit Recognition using Artificial Neural Network
Intelligent Handwritten Digit Recognition using Artificial Neural NetworkIntelligent Handwritten Digit Recognition using Artificial Neural Network
Intelligent Handwritten Digit Recognition using Artificial Neural Network
IJERA Editor
 
Text Extraction from Image Using GAMMA Correction Method.
Text Extraction from Image Using GAMMA Correction Method.Text Extraction from Image Using GAMMA Correction Method.
Text Extraction from Image Using GAMMA Correction Method.
IRJET Journal
 
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...
IJERD Editor
 
SVM Based Identification of Psychological Personality Using Handwritten Text
SVM Based Identification of Psychological Personality Using Handwritten Text SVM Based Identification of Psychological Personality Using Handwritten Text
SVM Based Identification of Psychological Personality Using Handwritten Text
IJERA Editor
 
Facial expression recognition based on wapa and oepa fastica
Facial expression recognition based on wapa and oepa fasticaFacial expression recognition based on wapa and oepa fastica
Facial expression recognition based on wapa and oepa fastica
ijaia
 
MATLAB Code + Description : Very Simple Automatic English Optical Character R...
MATLAB Code + Description : Very Simple Automatic English Optical Character R...MATLAB Code + Description : Very Simple Automatic English Optical Character R...
MATLAB Code + Description : Very Simple Automatic English Optical Character R...
Ahmed Gad
 

What's hot (20)

COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSCOMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
 
Statistical Pattern recognition(1)
Statistical Pattern recognition(1)Statistical Pattern recognition(1)
Statistical Pattern recognition(1)
 
Face recognition using gaussian mixture model & artificial neural network
Face recognition using gaussian mixture model & artificial neural networkFace recognition using gaussian mixture model & artificial neural network
Face recognition using gaussian mixture model & artificial neural network
 
Comparison on PCA ICA and LDA in Face Recognition
Comparison on PCA ICA and LDA in Face RecognitionComparison on PCA ICA and LDA in Face Recognition
Comparison on PCA ICA and LDA in Face Recognition
 
Review and comparison of tasks scheduling in cloud computing
Review and comparison of tasks scheduling in cloud computingReview and comparison of tasks scheduling in cloud computing
Review and comparison of tasks scheduling in cloud computing
 
DataEngConf: Feature Extraction: Modern Questions and Challenges at Google
DataEngConf: Feature Extraction: Modern Questions and Challenges at GoogleDataEngConf: Feature Extraction: Modern Questions and Challenges at Google
DataEngConf: Feature Extraction: Modern Questions and Challenges at Google
 
Fuzzy Logic based Edge Detection Method for Image Processing
Fuzzy Logic based Edge Detection Method for Image Processing  Fuzzy Logic based Edge Detection Method for Image Processing
Fuzzy Logic based Edge Detection Method for Image Processing
 
40120130405012
4012013040501240120130405012
40120130405012
 
Fuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression TechniqueFuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression Technique
 
Pattern recognition using context dependent memory model (cdmm) in multimodal...
Pattern recognition using context dependent memory model (cdmm) in multimodal...Pattern recognition using context dependent memory model (cdmm) in multimodal...
Pattern recognition using context dependent memory model (cdmm) in multimodal...
 
IRJET- Optical Character Recognition using Neural Networks by Classification ...
IRJET- Optical Character Recognition using Neural Networks by Classification ...IRJET- Optical Character Recognition using Neural Networks by Classification ...
IRJET- Optical Character Recognition using Neural Networks by Classification ...
 
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...Faster Training Algorithms in Neural Network Based Approach For Handwritten T...
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...
 
Implementation of Face Recognition in Cloud Vision Using Eigen Faces
Implementation of Face Recognition in Cloud Vision Using Eigen FacesImplementation of Face Recognition in Cloud Vision Using Eigen Faces
Implementation of Face Recognition in Cloud Vision Using Eigen Faces
 
Face Detection and Recognition using Back Propagation Neural Network (BPNN)
Face Detection and Recognition using Back Propagation Neural Network (BPNN)Face Detection and Recognition using Back Propagation Neural Network (BPNN)
Face Detection and Recognition using Back Propagation Neural Network (BPNN)
 
Intelligent Handwritten Digit Recognition using Artificial Neural Network
Intelligent Handwritten Digit Recognition using Artificial Neural NetworkIntelligent Handwritten Digit Recognition using Artificial Neural Network
Intelligent Handwritten Digit Recognition using Artificial Neural Network
 
Text Extraction from Image Using GAMMA Correction Method.
Text Extraction from Image Using GAMMA Correction Method.Text Extraction from Image Using GAMMA Correction Method.
Text Extraction from Image Using GAMMA Correction Method.
 
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...
 
SVM Based Identification of Psychological Personality Using Handwritten Text
SVM Based Identification of Psychological Personality Using Handwritten Text SVM Based Identification of Psychological Personality Using Handwritten Text
SVM Based Identification of Psychological Personality Using Handwritten Text
 
Facial expression recognition based on wapa and oepa fastica
Facial expression recognition based on wapa and oepa fasticaFacial expression recognition based on wapa and oepa fastica
Facial expression recognition based on wapa and oepa fastica
 
MATLAB Code + Description : Very Simple Automatic English Optical Character R...
MATLAB Code + Description : Very Simple Automatic English Optical Character R...MATLAB Code + Description : Very Simple Automatic English Optical Character R...
MATLAB Code + Description : Very Simple Automatic English Optical Character R...
 

Viewers also liked

N44096972
N44096972N44096972
N44096972
IJERA Editor
 
O044049498
O044049498O044049498
O044049498
IJERA Editor
 
M44096368
M44096368M44096368
M44096368
IJERA Editor
 
K044046872
K044046872K044046872
K044046872
IJERA Editor
 
Utilization of Industrial Waste Material in GSB Layer
Utilization of Industrial Waste Material in GSB LayerUtilization of Industrial Waste Material in GSB Layer
Utilization of Industrial Waste Material in GSB Layer
IJERA Editor
 
Al04605265270
Al04605265270Al04605265270
Al04605265270
IJERA Editor
 
Design and Simulation of First Order Sigma-Delta Modulator Using LT spice Tool
Design and Simulation of First Order Sigma-Delta Modulator Using LT spice ToolDesign and Simulation of First Order Sigma-Delta Modulator Using LT spice Tool
Design and Simulation of First Order Sigma-Delta Modulator Using LT spice Tool
IJERA Editor
 
Experimental Study for the Different Methods of Generating Millimeter Waves
Experimental Study for the Different Methods of Generating Millimeter WavesExperimental Study for the Different Methods of Generating Millimeter Waves
Experimental Study for the Different Methods of Generating Millimeter Waves
IJERA Editor
 
Ship Detection from SAR Imagery Using CUDA and Performance Analysis of the Sy...
Ship Detection from SAR Imagery Using CUDA and Performance Analysis of the Sy...Ship Detection from SAR Imagery Using CUDA and Performance Analysis of the Sy...
Ship Detection from SAR Imagery Using CUDA and Performance Analysis of the Sy...
IJERA Editor
 
MHD convection flow of viscous incompressible fluid over a stretched vertical...
MHD convection flow of viscous incompressible fluid over a stretched vertical...MHD convection flow of viscous incompressible fluid over a stretched vertical...
MHD convection flow of viscous incompressible fluid over a stretched vertical...
IJERA Editor
 
F046063538
F046063538F046063538
F046063538
IJERA Editor
 
Synthesis and Structural Characterization of Cu Substituted Ni-Zn Nano-Ferrit...
Synthesis and Structural Characterization of Cu Substituted Ni-Zn Nano-Ferrit...Synthesis and Structural Characterization of Cu Substituted Ni-Zn Nano-Ferrit...
Synthesis and Structural Characterization of Cu Substituted Ni-Zn Nano-Ferrit...
IJERA Editor
 
2008estã¡..
2008estã¡..2008estã¡..
2008estã¡..AN7ONYO
 
Emprenedor cavall-guanyador
Emprenedor cavall-guanyadorEmprenedor cavall-guanyador
webdynpro for abap Cell Color Setting
webdynpro for abap Cell Color Setting webdynpro for abap Cell Color Setting
webdynpro for abap Cell Color Setting jung_se_hun
 
Domus Artium
Domus ArtiumDomus Artium
Domus Artium
Douce Nieto
 
Volcán islandia
Volcán islandiaVolcán islandia
Volcán islandia
Douce Nieto
 
12 ubicación del adjetivo
12 ubicación del adjetivo12 ubicación del adjetivo
12 ubicación del adjetivoViviana Acevedo
 

Viewers also liked (20)

N44096972
N44096972N44096972
N44096972
 
O044049498
O044049498O044049498
O044049498
 
M44096368
M44096368M44096368
M44096368
 
K044046872
K044046872K044046872
K044046872
 
Utilization of Industrial Waste Material in GSB Layer
Utilization of Industrial Waste Material in GSB LayerUtilization of Industrial Waste Material in GSB Layer
Utilization of Industrial Waste Material in GSB Layer
 
Al04605265270
Al04605265270Al04605265270
Al04605265270
 
Design and Simulation of First Order Sigma-Delta Modulator Using LT spice Tool
Design and Simulation of First Order Sigma-Delta Modulator Using LT spice ToolDesign and Simulation of First Order Sigma-Delta Modulator Using LT spice Tool
Design and Simulation of First Order Sigma-Delta Modulator Using LT spice Tool
 
Experimental Study for the Different Methods of Generating Millimeter Waves
Experimental Study for the Different Methods of Generating Millimeter WavesExperimental Study for the Different Methods of Generating Millimeter Waves
Experimental Study for the Different Methods of Generating Millimeter Waves
 
Ship Detection from SAR Imagery Using CUDA and Performance Analysis of the Sy...
Ship Detection from SAR Imagery Using CUDA and Performance Analysis of the Sy...Ship Detection from SAR Imagery Using CUDA and Performance Analysis of the Sy...
Ship Detection from SAR Imagery Using CUDA and Performance Analysis of the Sy...
 
MHD convection flow of viscous incompressible fluid over a stretched vertical...
MHD convection flow of viscous incompressible fluid over a stretched vertical...MHD convection flow of viscous incompressible fluid over a stretched vertical...
MHD convection flow of viscous incompressible fluid over a stretched vertical...
 
F046063538
F046063538F046063538
F046063538
 
Synthesis and Structural Characterization of Cu Substituted Ni-Zn Nano-Ferrit...
Synthesis and Structural Characterization of Cu Substituted Ni-Zn Nano-Ferrit...Synthesis and Structural Characterization of Cu Substituted Ni-Zn Nano-Ferrit...
Synthesis and Structural Characterization of Cu Substituted Ni-Zn Nano-Ferrit...
 
Q04606103106
Q04606103106Q04606103106
Q04606103106
 
2008estã¡..
2008estã¡..2008estã¡..
2008estã¡..
 
Emprenedor cavall-guanyador
Emprenedor cavall-guanyadorEmprenedor cavall-guanyador
Emprenedor cavall-guanyador
 
webdynpro for abap Cell Color Setting
webdynpro for abap Cell Color Setting webdynpro for abap Cell Color Setting
webdynpro for abap Cell Color Setting
 
Domus Artium
Domus ArtiumDomus Artium
Domus Artium
 
Muerteimpresionante
MuerteimpresionanteMuerteimpresionante
Muerteimpresionante
 
Volcán islandia
Volcán islandiaVolcán islandia
Volcán islandia
 
12 ubicación del adjetivo
12 ubicación del adjetivo12 ubicación del adjetivo
12 ubicación del adjetivo
 

Similar to K044065257

Application of gaussian filter with principal component analysis
Application of gaussian filter with principal component analysisApplication of gaussian filter with principal component analysis
Application of gaussian filter with principal component analysisIAEME Publication
 
Application of gaussian filter with principal component analysis
Application of gaussian filter with principal component analysisApplication of gaussian filter with principal component analysis
Application of gaussian filter with principal component analysisIAEME Publication
 
IRJET - Effective Workflow for High-Performance Recognition of Fruits using M...
IRJET - Effective Workflow for High-Performance Recognition of Fruits using M...IRJET - Effective Workflow for High-Performance Recognition of Fruits using M...
IRJET - Effective Workflow for High-Performance Recognition of Fruits using M...
IRJET Journal
 
Performance Comparison of Face Recognition Using DCT Against Face Recognition...
Performance Comparison of Face Recognition Using DCT Against Face Recognition...Performance Comparison of Face Recognition Using DCT Against Face Recognition...
Performance Comparison of Face Recognition Using DCT Against Face Recognition...
CSCJournals
 
A Real Time Advance Automated Attendance System using Face-Net Algorithm
A Real Time Advance Automated Attendance System using Face-Net AlgorithmA Real Time Advance Automated Attendance System using Face-Net Algorithm
A Real Time Advance Automated Attendance System using Face-Net Algorithm
IRJET Journal
 
Y34147151
Y34147151Y34147151
Y34147151
IJERA Editor
 
Improving face recognition by artificial neural network using principal compo...
Improving face recognition by artificial neural network using principal compo...Improving face recognition by artificial neural network using principal compo...
Improving face recognition by artificial neural network using principal compo...
TELKOMNIKA JOURNAL
 
IRJET- Proposed System for Animal Recognition using Image Processing
IRJET-  	  Proposed System for Animal Recognition using Image ProcessingIRJET-  	  Proposed System for Animal Recognition using Image Processing
IRJET- Proposed System for Animal Recognition using Image Processing
IRJET Journal
 
Brain Tumor Classification using Support Vector Machine
Brain Tumor Classification using Support Vector MachineBrain Tumor Classification using Support Vector Machine
Brain Tumor Classification using Support Vector Machine
IRJET Journal
 
Real time voting system using face recognition for different expressions and ...
Real time voting system using face recognition for different expressions and ...Real time voting system using face recognition for different expressions and ...
Real time voting system using face recognition for different expressions and ...
eSAT Publishing House
 
An ann approach for network
An ann approach for networkAn ann approach for network
An ann approach for network
IJNSA Journal
 
Object Tracking By Online Discriminative Feature Selection Algorithm
Object Tracking By Online Discriminative Feature Selection AlgorithmObject Tracking By Online Discriminative Feature Selection Algorithm
Object Tracking By Online Discriminative Feature Selection Algorithm
IRJET Journal
 
Image Recognition Expert System based on deep learning
Image Recognition Expert System based on deep learningImage Recognition Expert System based on deep learning
Image Recognition Expert System based on deep learning
PRATHAMESH REGE
 
Text Recognition using Convolutional Neural Network: A Review
Text Recognition using Convolutional Neural Network: A ReviewText Recognition using Convolutional Neural Network: A Review
Text Recognition using Convolutional Neural Network: A Review
IRJET Journal
 
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...
IJNSA Journal
 
Analysis of machine learning algorithms for character recognition: a case stu...
Analysis of machine learning algorithms for character recognition: a case stu...Analysis of machine learning algorithms for character recognition: a case stu...
Analysis of machine learning algorithms for character recognition: a case stu...
nooriasukmaningtyas
 
A Novel GA-SVM Model For Vehicles And Pedestrial Classification In Videos
A Novel GA-SVM Model For Vehicles And Pedestrial Classification In VideosA Novel GA-SVM Model For Vehicles And Pedestrial Classification In Videos
A Novel GA-SVM Model For Vehicles And Pedestrial Classification In Videos
ijtsrd
 
Real Time Implementation Of Face Recognition System
Real Time Implementation Of Face Recognition SystemReal Time Implementation Of Face Recognition System
Real Time Implementation Of Face Recognition System
IJERA Editor
 
IRJET - Object Detection using Hausdorff Distance
IRJET -  	  Object Detection using Hausdorff DistanceIRJET -  	  Object Detection using Hausdorff Distance
IRJET - Object Detection using Hausdorff Distance
IRJET Journal
 

Similar to K044065257 (20)

Application of gaussian filter with principal component analysis
Application of gaussian filter with principal component analysisApplication of gaussian filter with principal component analysis
Application of gaussian filter with principal component analysis
 
Application of gaussian filter with principal component analysis
Application of gaussian filter with principal component analysisApplication of gaussian filter with principal component analysis
Application of gaussian filter with principal component analysis
 
IRJET - Effective Workflow for High-Performance Recognition of Fruits using M...
IRJET - Effective Workflow for High-Performance Recognition of Fruits using M...IRJET - Effective Workflow for High-Performance Recognition of Fruits using M...
IRJET - Effective Workflow for High-Performance Recognition of Fruits using M...
 
Performance Comparison of Face Recognition Using DCT Against Face Recognition...
Performance Comparison of Face Recognition Using DCT Against Face Recognition...Performance Comparison of Face Recognition Using DCT Against Face Recognition...
Performance Comparison of Face Recognition Using DCT Against Face Recognition...
 
A Real Time Advance Automated Attendance System using Face-Net Algorithm
A Real Time Advance Automated Attendance System using Face-Net AlgorithmA Real Time Advance Automated Attendance System using Face-Net Algorithm
A Real Time Advance Automated Attendance System using Face-Net Algorithm
 
Y34147151
Y34147151Y34147151
Y34147151
 
Improving face recognition by artificial neural network using principal compo...
Improving face recognition by artificial neural network using principal compo...Improving face recognition by artificial neural network using principal compo...
Improving face recognition by artificial neural network using principal compo...
 
IRJET- Proposed System for Animal Recognition using Image Processing
IRJET-  	  Proposed System for Animal Recognition using Image ProcessingIRJET-  	  Proposed System for Animal Recognition using Image Processing
IRJET- Proposed System for Animal Recognition using Image Processing
 
Brain Tumor Classification using Support Vector Machine
Brain Tumor Classification using Support Vector MachineBrain Tumor Classification using Support Vector Machine
Brain Tumor Classification using Support Vector Machine
 
Real time voting system using face recognition for different expressions and ...
Real time voting system using face recognition for different expressions and ...Real time voting system using face recognition for different expressions and ...
Real time voting system using face recognition for different expressions and ...
 
An ann approach for network
An ann approach for networkAn ann approach for network
An ann approach for network
 
Object Tracking By Online Discriminative Feature Selection Algorithm
Object Tracking By Online Discriminative Feature Selection AlgorithmObject Tracking By Online Discriminative Feature Selection Algorithm
Object Tracking By Online Discriminative Feature Selection Algorithm
 
Image Recognition Expert System based on deep learning
Image Recognition Expert System based on deep learningImage Recognition Expert System based on deep learning
Image Recognition Expert System based on deep learning
 
Text Recognition using Convolutional Neural Network: A Review
Text Recognition using Convolutional Neural Network: A ReviewText Recognition using Convolutional Neural Network: A Review
Text Recognition using Convolutional Neural Network: A Review
 
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...
 
Analysis of machine learning algorithms for character recognition: a case stu...
Analysis of machine learning algorithms for character recognition: a case stu...Analysis of machine learning algorithms for character recognition: a case stu...
Analysis of machine learning algorithms for character recognition: a case stu...
 
Ijebea14 276
Ijebea14 276Ijebea14 276
Ijebea14 276
 
A Novel GA-SVM Model For Vehicles And Pedestrial Classification In Videos
A Novel GA-SVM Model For Vehicles And Pedestrial Classification In VideosA Novel GA-SVM Model For Vehicles And Pedestrial Classification In Videos
A Novel GA-SVM Model For Vehicles And Pedestrial Classification In Videos
 
Real Time Implementation Of Face Recognition System
Real Time Implementation Of Face Recognition SystemReal Time Implementation Of Face Recognition System
Real Time Implementation Of Face Recognition System
 
IRJET - Object Detection using Hausdorff Distance
IRJET -  	  Object Detection using Hausdorff DistanceIRJET -  	  Object Detection using Hausdorff Distance
IRJET - Object Detection using Hausdorff Distance
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 

K044065257

  • 1. Prathamesh Timse et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 6), April 2014, pp.52-57 www.ijera.com 52 | P a g e Face Recognition Based Door Lock System Using Opencv and C# with Remote Access and Security Features Prathamesh Timse**, Pranav Aggarwal** , Prakhar Sinha** ,Neel Vora** , **Student, Department of Electronics and Telecommunication Engineering, K.J Somaiya College Of Engineering, Vidyanagar, Vidyavihar(E), Mumbai - 400 077, Maharashtra, India. ABSTRACT This paper investigates the accuracy and effectiveness of the face detection and recognition algorithms using OpenCV and C# computer language. The adaboost algorithm [2] is used for face detection and PCA algorithm[1] is used for face recognition. This paper also investigates the robustness of the face recognition system when an unknown person is being detected, wherein the system will send an email to the owner of the system using SMTP [7]. The door lock can also be accessed remotely from any part of the world by using a Dropbox [8] account. Keywords – Recognition, Detection, OpenCV, C#, Adaboost [2], PCA [1], SMTP [7] , Dropbox [8] . I. INTRODUCTION Human beings are recognized by their unique facial characteristics. In the face recognition approach, a given face is compared with the faces stored in the database in order to identify the person. The purpose is to find a face in the database, which has the highest similarity with the given face. In the field of biometrics, facial recognition technology is one of the fastest growing fields. The recent interest in face recognition can be attributed to the increase of commercial interest and the development of feasible technologies to support the development of face recognition. Major areas of commercial interest include biometrics, law enforcement and surveillance, human-computer interaction, multimedia management (for example, automatic tagging of a particular individual within a collection of digital photographs) smart cards, passport check, Criminal investigations, access control. However, face detection is more challenging because of some unstable characteristics, for example, glasses and beard will impact the detecting effectiveness. Moreover, different kinds and angles of lighting will make detecting face generate uneven brightness on the face, which will have influence on the detection process. To overcome these problems, the system used adaboost algorithm [2] implemented using Haar classifiers for face detection and PCA algorithm [1] for face recognition implemented using face recognizer function of OpenCV. Rest of the paper is organized as follows: Section II describes the proposed face recognition system. Face detection mechanism is explained in Section III. Section IV describes the face recognition mechanism, Section V states the Remote access and security features of the system, Section VI provides the results and observations and the last section gives the conclusion. II. SETUP OF FACE RECOGNITION SYSTEM III. FACE DETECTION BY HAAR CASCADED CLASSIFIER USING VIOLA JONES METHOD Viola and Jones devised an algorithm, called Haar Classifiers, to rapidly detect any object, including human faces, using Adaboost [2]classifier cascades that are based on Haar-like features and not pixels.[4] Open CV uses Viola Jones method published in 2001, to detect faces using 4 key concepts  Simple rectangular features called haar features  An integral image for rapid face detection  The adaboost machine learing method  A cascaded classifier to combine many classifiers efficiently[6] RESEARCH ARTICLE OPEN ACCESS
  • 2. Prathamesh Timse et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 6), April 2014, pp.52-57 www.ijera.com 53 | P a g e Extended Haar-like features are chosen to enhance detecting precision, which is divided into edge feature, linear feature and center surround feature. And the above features comprise feature module, in which there are two kinds of rectangle, white and black, as in Fig 1[3] Integral image is a method used to quickly calculate the characteristic value: the difference between the sum of white pixels and the sum of black pixels. In Fig 2, it shows that the characteristic value composed by II and IV is the variation between the sum of IV pixels and the sum of II pixels. The former is the difference between the sum of integral image value of A and D and the sum of integral image value of B and C. The later is the sum of integral image value of B and integral image value of A. The cascaded classifier used by OpenCV is Haar cascade classifier which is trained on thousands of human faces. The training data is stored in an xml file which is later used by the classifier to detect faces. This paper uses the Haar cascade classifier haarcascade_frontalface_alt_tree.xml created by Rainer Lienhart. Adaboost [2]is from high dimensional space and large amounts of data to train a strong classifier. Strong classifier is composed by multiple weak classifiers, the bias direction ( j p ), the threshold (θ j) and characteristic function j f are consist of a weak classifier. The Binary weak classifier as follows: The steps of Strong classifier training algorithm are as follows: (1) About the samples (x1,y1) ,(x2,y2)…(xn,yn) and ,yi=-1 and yi=1 are corresponding to the counter- samples and positive-samples (2)The Initialize the sample weights about yi=-1 and yi=1 are m and l is the number about counter-samples and positive-samples; (3) Iterate T times: t=1,2,…T : (4) Training the strong classifier is: Strong classifier can be achieved arbitrarily low error rate for training data. When the training samples are representative comparison, the strong classifier can be also achieved the ideal true error rate.[5]
  • 3. Prathamesh Timse et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 6), April 2014, pp.52-57 www.ijera.com 54 | P a g e The detection process was completed by us with an accuracy of 95%. The system could also detect multiple faces as is evident from the following figure: IV. FACE RECOGNITION Open CV (Open Source Computer Vision) is a popular computer vision library. The Eigenfaces method takes a holistic approach to face recognition: A facial image is a point from a high-dimensional image space and a lower-dimensional representation is found, where classification becomes easy. The lower-dimensional subspace is found with Principal Component Analysis, which identifies the axes with maximum variance. A class-specific projection with a Linear Discriminant Analysis is applied to face recognition . The basic idea is to minimize the variance within a class, while maximizing the variance between the classes at the same time. A database of 25 persons was created for research purpose. After acquiring the data the images were read from a very simple CSV file because it is a simple platform-independent approach. The problem with the image representation is its high dimensionality. Two-dimensional pxq grayscale images span a m=pq –dimensional vector space, so an image with 100X100 pixels lies in a 10,000- dimensional image space already. Only a decision if there‟s any variance in data can be made, so there‟s a need to look for the components that account for most of the information. The Principal Component Analysis (PCA) [1] turns a set of possibly correlated variables into a smaller set of uncorrelated variables. The idea is, that a high-dimensional dataset is often described by correlated variables and therefore only a few meaningful dimensions account for most of the information. The PCA method [1] finds the directions with the greatest variance in the data, called principal components. Algorithm Description Let X = {x1,x2,…,xn} be a random vector with observations . 1. Compute the mean 2. Compute the Covariance Matrix S 3. Compute the eigenvalues and eigenvectors of 4. Order the eigenvectors descending by their eigenvalue. The principal components are the eigenvectors corresponding to the largest eigenvalues. The principal components of the observed vector are then given by: where . The reconstruction from the PCA basis is given by: where . The Eigenfaces method then performs face recognition by:  Projecting all training samples into the PCA subspace.  Projecting the query image into the PCA subspace.  Finding the nearest neighbor between the projected training images and the projected query image. There emerges a problem. Suppose there are 400 images sized 100X100 pixel. The Principal Component Analysis solves the covariance matrix where .. We would end up with a matrix, roughly . Solving this problem isn‟t feasible, so there‟s a need to apply a trick. From the linear algebra lessons we know that a matrix with can only have non-zero eigenvalues. So it‟s possible to take the eigenvalue decomposition of size instead: and get the original eigenvectors of with a left multiplication of the data matrix:
  • 4. Prathamesh Timse et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 6), April 2014, pp.52-57 www.ijera.com 55 | P a g e The resulting eigenvectors are orthogonal, to get orthonormal eigenvectors they need to be normalized to unit length. Face recognition operations V. REMOTE ACCESS AND SECURITY FEATURES This paper also brings out the possibility for remote access and sending out an email to the user in case of an intruder trying to access the door. The remote access is done by using Dropbox [8] (service) operated by Dropbox, Inc. The user has a predefined text file which he can upload to his Dropbox folder[8]. The system periodically reads the Dropbox folder [8] for that text file and if it‟s found the system allows the door lock to be opened. In case of an intruder trying to access the door, the unsuccessful attempts made by the intruder is taken count of and his/her image is stored in a folder. These images are then sent to the user by email using SMTP server [7]. The mechanism is explained below: The .Net and .Mail libraries are to be added in C#. This will allow us to access SMTPClient, MailMessage [7] and NetworkCredentials. A valid email account (with password) is needed to give the program a place to send the mail from. To send an email first a new mailMessage (an email) to send is to be created. To include an attachment with an e- mail message, first create the attachment by using the Attachment class, and then add it to the message by using the MailMessage attachments property. The attachment in our case is the image of the unauthorized user. The information that has to be specified is the SMTP host server[7] that you use to send e-mail, credentials for authentication, if required by the SMTP server and the e-mail address of the sender. A new SMTP client[7] to send our email is to be created. We created a new client which has two parameters (Host, Port). The host is where we'll be sending the mail from; this should be the same as your email account. The only reason we use port 25 is because it's the default SMTP port, although another port may be used. Now we fill in the client details and send the email. Enabling SSL (Secure Sockets Layer, encryption) is required by most email providers to send mail. VI. RESULTS AND OBSERVATIONS The parameters for face recognition system in OpenCV Haar classifier[3] and face recognizer functions are as follows: 1. Scale increase rate: This parameter in the call to DetectHaarCascade() specifies how quickly OpenCV should increase the scale for face detections with each pass it makes over an image. Setting this higher makes the detector run faster (by running fewer passes), but if it's too high, you may jump too quickly between scales and miss faces. The default in OpenCV is 1.1, in other words, scale increases by a factor of 1.1 (10%) each pass. This parameter may have a value of 1.1 , 1.2 , 1.3 or 1.4. We have set it to 1.2, which means it will run the moderate number of passes, thus will accurate as well as fast. The lower the value, the more "thoroughly" Haar detector will check the image for the “face", but naturally will take more time. 2. Minimum neighbors threshold: The next parameter in the call to DetectHaarCascade() is the „The minimum-neighbors threshold‟ which sets the cutoff level for discarding or keeping rectangle groups as “face” or not, based on how many raw detections are in the group. This parameter‟s value ranges from 0 to 10. We have used minimum neighbors = 10 i.e. we want only an object to be marked as a face if it has the highest probability and vote of being the "face”. If we set minimum neighbor to a value n, then detector will mark an object as "face" in any image IF there is a group of n rectangles (hits) identifying it as a "face". 3. Minimum Detection scale: The third parameter in the call to Detect Haar Cascade () is the size of the smallest face to search for. We can change the default for this by changing its value from the Haar cascade classifier xml file .We have set it to 25X25,which gives us the best results. A good rule of thumb is to use some fraction of your input image's width or height as the minimum scale - for example, 1/4 of the image width. If you specify a minimum scale other than the default, be sure its aspect ratio (the ratio of width to height) is the same as the defaults. i.e., aspect ratio should be 1:1.
  • 5. Prathamesh Timse et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 6), April 2014, pp.52-57 www.ijera.com 56 | P a g e 4. Threshold: Threshold is the maximum value of the Euclidean distance between the database image and input image. A database of 25 persons was created wherein 50 images of each person were stored. For simulation we tested the face recognition system for 3 known persons and 1 unknown person. The observations were carried out in artificial fluorescent lighting conditions. We kept the scale increase rate at 1.2, minimum neighbors threshold at 10 and minimum detection scale at 25X25. The subjects were asked to show their face 10 times in the camera The results obtained were as follows: Known person 1: Threshold Correct recognition False recognition Not recognize d 2000 8 0 2 2250 9 0 1 2500 9 0 1 2750 8 0 2 3000 10 0 0 3500 10 0 0 4000 9 1 0 4500 7 3 0 5000 5 5 0 It is observed that for the Known person1,the threshold value in the range 3000-3500 is highly accurate giving us a 100% accuracy under the conditions. Also as the threshold value is increased the false recognition of the person increases thus deteriorating the performance. Known person 2: Threshed Correct recognition False recognition Not recognized 2000 0 0 10 2250 0 0 10 2500 0 0 10 2750 1 0 9 3000 6 1 3 3500 8 1 1 4000 5 4 1 4500 5 5 0 5000 4 6 0 For Known person2, initially there is no recognition in the threshold value up to 2500. The optimum performance is obtained at the value 3500 giving us 80% accuracy. Performance weakened for higher threshold values. Known person 3: Threshold Correct recognition False recognition Not recognized 2000 0 0 10 2250 0 0 10 2500 2 0 8 2750 4 0 6 3000 7 0 3 3500 10 0 0 4000 5 4 1 4500 3 6 1 5000 2 8 0 Considering the results obtained for Known person3, the threshold value of 3500 gave an excellent result providing a 100% accuracy. Again the range 3000-3500 provided high efficiency. At further increase in the threshold values the subject was falsely recognized. Unknown person: Threshold Correct recognition False recognition 2000 10 0 2250 10 0 2500 10 0 2750 10 0 3000 10 0 3500 10 0 4000 10 0 4500 7 3 5000 2 8 As per the results, the subject was correctly recognized as unknown up till a threshold value of 4000 providing an accurate system of recognition. The image of the unknown person was sent as an attachment to the Gmail account through SMTP. However beyond the threshold of 4000 the subject was recognized as a known person degrading the performance. VII. CONCLUSION The paper suggests that the face detection process under controlled lighting conditions (fluorescent light) gives an accuracy of 95% with scale increase rate at 1.2 ,minimum neighbors
  • 6. Prathamesh Timse et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 6), April 2014, pp.52-57 www.ijera.com 57 | P a g e threshold at 10 and minimum detection scale at 25X25. The recognition process is subject to the threshold value which is the maximum value of the Euclidean distances between the database images and input image. The threshold value was different for different persons ranging from 3000-3500.In this range the recognition rate is at 85%. Also the SMTP and Dropbox service are used for added security and remote access features. REFERENCES [1] M. Turk and A. Pentland, “Eigenfaces for Recognition”, Journal of Cognitive Neuro science, March 1991. [2] P. Viola and Michael J. Jones. "Robust real- time face detection", International Journal of Computer Vision, 57(2):137-154, 2004. [3] “The System of Face Detection Based on OpenCV” Xianghua Fan, Fuyou Zhang, Haixia Wang, Xiao Lu Key Laboratory for Robot & Intelligent Technology of Shandong Province, Shandong University of Science and Technology, Qingdao 266590 [4] “Facial feature detection using haar classifiers*”Phillip Ian Wilson Dr. John Fernandez Texas A&M University – Corpus Christi 6300 Ocean Dr. CI334, Corpus Christi, TX 78412 361-825-3622. [5] “ Miner Face Detection is Based on Improved AdaBoost Algorithm “Chao JIANG ,Gu-yong HAN ,Lei TIAN ,Song LU, Wei-xing HUANG Air Force Service College XuZhou JiangSu China. [6] http://www.cognotics.com/opencv/servo_20 07_series/part_2/sidebar.html [7] ”Active e-mail system SMTP protocol monitoring algorithm”, Sureswaran, R. Nat. Adv. IPv6 Centre (NAv6), Univ. Sains Malaysia, Minden, Malaysia Al Bazar, H. ; Abouabdalla, O. ; Manasrah, A.M. ; El-Taj, H. [8] ”On the impact of virtualization on Dropbox-like cloud file storage/ synchronization services”, Haiyang Wang Sch. of Comput. Sci., Simon Fraser Univ., Burnaby, BC, Canada Shea, R. ; Feng Wang ; Jiangchuan Liu