SlideShare a Scribd company logo
HOW FACE RECOGNITION WORKS
Four Fundamental Steps
1) Detecting all the faces.
2) Posing and Projecting faces.
3) Encoding the faces
4) Finding person’s name from
encodings.
Step 1: Detecting all the faces.
 Any camera in the last 10 years, probably has face detection in action:
 Face detection is a great feature for cameras. When the camera can automatically pick out
faces, it can make sure that all the faces are in focus before it takes the picture.
 But this concept uses it for a different purpose — finding the areas of the image that has to
be passed to the next step of the procedure.
 To find faces in an image, the image has to be in the black and white format as colour data
is not necessary.
Then the software looks at every single pixel in the image one at a time. For every single pixel, we want to look
at the pixels that directly surrounding it:
The aim is to figure out how dark the current pixel is compared to the pixels directly surrounding
it. Then it draws an arrow showing in which direction the image is getting darker:
If we repeat that process for every single pixel in the image, we end up with every pixel being replaced by an
arrow.
These arrows are called gradients and they show the flow from light to dark across the entire image:
It would be better if we could just see the basic flow of lightness/darkness at a higher level so we could see the
basic pattern of the image.
To do this, the software breaks up the image into small squares of 16x16 pixels each. In each square, it counts
up how many gradients point in each major direction (how many point up, point up-right, point right, etc…). Then
it replaces that square in the image with the arrow directions that were the strongest.
To account for this, we will try to warp each picture so that the eyes and lips are always in the sample place in the
image. To do this, we are going to use an algorithm called face landmark estimation .
The basic idea is we will come up with 68 specific points (called landmarks) that exist on every face — the top of
the chin, the outside edge of each eye, the inner edge of each eyebrow, etc. Then we will train a machine learning
algorithm to be able to find these 68 specific points on any face.
Step 2: Posing and Projecting Faces
When, we isolated the faces in our image. But now we have to deal with the problem that
faces turned different directions look totally different to a computer:
Here’s the result of locating the 68 face landmarks on our test image.
Now that we know were the eyes and mouth are, we’ll simply rotate, scale and shear the image so that the eyes
and mouth are centered as best as possible. We are only going to use basic image transformations like rotation
and scale that preserve parallel lines (called affine transformations)
Step 3: Encoding Faces.
Now we are to the meat of the problem — actually telling faces apart. The solution is to train a Deep
Convolutional Neural Network. But instead of training the network to recognize pictures objects like we
did last time, we are going to train it to generate 128 measurements for each face.
The training process works by looking at 3 face images at a time:
1.Load a training face image of a known person.
2.Load another picture of the same known person.
3.Load a picture of a totally different person.
Then the algorithm looks at the measurements it is currently generating for each of those three images.
It then tweaks the neural network slightly so that it makes sure the measurements it generates for #1
and #2 are slightly closer while making sure the measurements for #2 and #3 are slightly further apart.
After repeating this step millions of times for millions of images of thousands of different people, the
neural network learns to reliably generate 128 measurements for each person. Any ten different pictures
of the same person should give roughly the same measurements.
Machine learning people call the 128 measurements of each face an embedding. The idea of reducing
complicated raw data like a picture into a list of computer-generated numbers comes up a lot in machine
learning.
Encoding our face image
This process of training a convolutional neural network to output face embeddings requires a lot of data and
computer power. Even with an expensive NVidia Telsa video card, it takes about 24 hours of continuous training to
get good accuracy.
But once the network has been trained, it can generate measurements for any face, even ones it has never seen
before! So this step only needs to be done once.
Step 4: Finding the person’s name from the encoding.
This last step is actually the easiest step in the whole process. All we have to do is find the person in our
database of known people who has the closest measurements to our test image that we show in front of the web
cam.
After doing the comparative analysis by processing all the known images, our software finally tells the result of
test image by displaying its name.
We did it by using any basic machine learning classification algorithm. No fancy deep learning tricks are
needed.
And finally it works…
It has successfully run the algorithm and recognized the faces when they
appear in the webcam. The result we see above seems to be a very quick
recognition but is actually a complex process having many steps as discussed
earlier. This is the power of artificial intelligence and machine learning.
Thank you

More Related Content

Similar to PBL presentation p2.pptx

Emotion intelligence
Emotion intelligenceEmotion intelligence
Emotion intelligence
BhawnaSingh351973
 
App inventor || Face Mesh Filter Camera and detection system in AI technolog...
App inventor || Face Mesh Filter Camera and detection  system in AI technolog...App inventor || Face Mesh Filter Camera and detection  system in AI technolog...
App inventor || Face Mesh Filter Camera and detection system in AI technolog...
Jiangxi University of Science and Technology (江西理工大学)
 
human face detection using matlab
human face detection using matlabhuman face detection using matlab
human face detection using matlab
shamima sultana
 
Traffic Automation System
Traffic Automation SystemTraffic Automation System
Traffic Automation System
Prabal Chauhan
 
Applied Computer Vision - a Deep Learning Approach
Applied Computer Vision - a Deep Learning ApproachApplied Computer Vision - a Deep Learning Approach
Applied Computer Vision - a Deep Learning Approach
Jose Berengueres
 
Communism And Its Effect On Society
Communism And Its Effect On SocietyCommunism And Its Effect On Society
Communism And Its Effect On Society
Kristin Oliver
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
Saraj Sadanand
 
Final_Facial_Emotion_Detection_ppt.pdf
Final_Facial_Emotion_Detection_ppt.pdfFinal_Facial_Emotion_Detection_ppt.pdf
Final_Facial_Emotion_Detection_ppt.pdf
ankitasenapati2003
 
Human Face Detection Systemin ANew Algorithm
Human Face Detection Systemin ANew AlgorithmHuman Face Detection Systemin ANew Algorithm
Human Face Detection Systemin ANew Algorithm
IOSRjournaljce
 
IRJET- ATM Security using Machine Learning
IRJET- ATM Security using Machine LearningIRJET- ATM Security using Machine Learning
IRJET- ATM Security using Machine Learning
IRJET Journal
 
Multimedia chapter 5
Multimedia chapter 5Multimedia chapter 5
Multimedia chapter 5
PrathimaBaliga
 
Python Project.pptx
Python Project.pptxPython Project.pptx
Python Project.pptx
TimePass720676
 
presentation-project 2.pptx
presentation-project 2.pptxpresentation-project 2.pptx
presentation-project 2.pptx
Samuel27975
 
Everything You Need to Know About Computer Vision
Everything You Need to Know About Computer VisionEverything You Need to Know About Computer Vision
Everything You Need to Know About Computer Vision
Kavika Roy
 
Image processing
Image processingImage processing
Image processing
Vinod Gurram
 
Image recognition
Image recognitionImage recognition
Image recognition
Nikhil Singh
 
Coding - Pixel Art
Coding - Pixel ArtCoding - Pixel Art
Coding - Pixel Art
isarevi
 
DEEPFACE.pptx
DEEPFACE.pptxDEEPFACE.pptx
DEEPFACE.pptx
CamelMagdadaro
 
Project on fake currency recognition using image processing ppt final (3).pptx
Project on fake currency recognition using image processing ppt final (3).pptxProject on fake currency recognition using image processing ppt final (3).pptx
Project on fake currency recognition using image processing ppt final (3).pptx
426SahithiBaiMiriska
 
Facial Expression Recognition System using Deep Convolutional Neural Networks.
Facial Expression Recognition  System using Deep Convolutional Neural Networks.Facial Expression Recognition  System using Deep Convolutional Neural Networks.
Facial Expression Recognition System using Deep Convolutional Neural Networks.
Sandeep Wakchaure
 

Similar to PBL presentation p2.pptx (20)

Emotion intelligence
Emotion intelligenceEmotion intelligence
Emotion intelligence
 
App inventor || Face Mesh Filter Camera and detection system in AI technolog...
App inventor || Face Mesh Filter Camera and detection  system in AI technolog...App inventor || Face Mesh Filter Camera and detection  system in AI technolog...
App inventor || Face Mesh Filter Camera and detection system in AI technolog...
 
human face detection using matlab
human face detection using matlabhuman face detection using matlab
human face detection using matlab
 
Traffic Automation System
Traffic Automation SystemTraffic Automation System
Traffic Automation System
 
Applied Computer Vision - a Deep Learning Approach
Applied Computer Vision - a Deep Learning ApproachApplied Computer Vision - a Deep Learning Approach
Applied Computer Vision - a Deep Learning Approach
 
Communism And Its Effect On Society
Communism And Its Effect On SocietyCommunism And Its Effect On Society
Communism And Its Effect On Society
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Final_Facial_Emotion_Detection_ppt.pdf
Final_Facial_Emotion_Detection_ppt.pdfFinal_Facial_Emotion_Detection_ppt.pdf
Final_Facial_Emotion_Detection_ppt.pdf
 
Human Face Detection Systemin ANew Algorithm
Human Face Detection Systemin ANew AlgorithmHuman Face Detection Systemin ANew Algorithm
Human Face Detection Systemin ANew Algorithm
 
IRJET- ATM Security using Machine Learning
IRJET- ATM Security using Machine LearningIRJET- ATM Security using Machine Learning
IRJET- ATM Security using Machine Learning
 
Multimedia chapter 5
Multimedia chapter 5Multimedia chapter 5
Multimedia chapter 5
 
Python Project.pptx
Python Project.pptxPython Project.pptx
Python Project.pptx
 
presentation-project 2.pptx
presentation-project 2.pptxpresentation-project 2.pptx
presentation-project 2.pptx
 
Everything You Need to Know About Computer Vision
Everything You Need to Know About Computer VisionEverything You Need to Know About Computer Vision
Everything You Need to Know About Computer Vision
 
Image processing
Image processingImage processing
Image processing
 
Image recognition
Image recognitionImage recognition
Image recognition
 
Coding - Pixel Art
Coding - Pixel ArtCoding - Pixel Art
Coding - Pixel Art
 
DEEPFACE.pptx
DEEPFACE.pptxDEEPFACE.pptx
DEEPFACE.pptx
 
Project on fake currency recognition using image processing ppt final (3).pptx
Project on fake currency recognition using image processing ppt final (3).pptxProject on fake currency recognition using image processing ppt final (3).pptx
Project on fake currency recognition using image processing ppt final (3).pptx
 
Facial Expression Recognition System using Deep Convolutional Neural Networks.
Facial Expression Recognition  System using Deep Convolutional Neural Networks.Facial Expression Recognition  System using Deep Convolutional Neural Networks.
Facial Expression Recognition System using Deep Convolutional Neural Networks.
 

Recently uploaded

IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
Ratnakar Mikkili
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
awadeshbabu
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
drwaing
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
ssuser36d3051
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 

Recently uploaded (20)

IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 

PBL presentation p2.pptx

  • 1. HOW FACE RECOGNITION WORKS Four Fundamental Steps 1) Detecting all the faces. 2) Posing and Projecting faces. 3) Encoding the faces 4) Finding person’s name from encodings.
  • 2. Step 1: Detecting all the faces.  Any camera in the last 10 years, probably has face detection in action:  Face detection is a great feature for cameras. When the camera can automatically pick out faces, it can make sure that all the faces are in focus before it takes the picture.  But this concept uses it for a different purpose — finding the areas of the image that has to be passed to the next step of the procedure.  To find faces in an image, the image has to be in the black and white format as colour data is not necessary.
  • 3. Then the software looks at every single pixel in the image one at a time. For every single pixel, we want to look at the pixels that directly surrounding it: The aim is to figure out how dark the current pixel is compared to the pixels directly surrounding it. Then it draws an arrow showing in which direction the image is getting darker:
  • 4. If we repeat that process for every single pixel in the image, we end up with every pixel being replaced by an arrow. These arrows are called gradients and they show the flow from light to dark across the entire image:
  • 5. It would be better if we could just see the basic flow of lightness/darkness at a higher level so we could see the basic pattern of the image. To do this, the software breaks up the image into small squares of 16x16 pixels each. In each square, it counts up how many gradients point in each major direction (how many point up, point up-right, point right, etc…). Then it replaces that square in the image with the arrow directions that were the strongest.
  • 6. To account for this, we will try to warp each picture so that the eyes and lips are always in the sample place in the image. To do this, we are going to use an algorithm called face landmark estimation . The basic idea is we will come up with 68 specific points (called landmarks) that exist on every face — the top of the chin, the outside edge of each eye, the inner edge of each eyebrow, etc. Then we will train a machine learning algorithm to be able to find these 68 specific points on any face. Step 2: Posing and Projecting Faces When, we isolated the faces in our image. But now we have to deal with the problem that faces turned different directions look totally different to a computer:
  • 7. Here’s the result of locating the 68 face landmarks on our test image. Now that we know were the eyes and mouth are, we’ll simply rotate, scale and shear the image so that the eyes and mouth are centered as best as possible. We are only going to use basic image transformations like rotation and scale that preserve parallel lines (called affine transformations)
  • 8. Step 3: Encoding Faces. Now we are to the meat of the problem — actually telling faces apart. The solution is to train a Deep Convolutional Neural Network. But instead of training the network to recognize pictures objects like we did last time, we are going to train it to generate 128 measurements for each face. The training process works by looking at 3 face images at a time: 1.Load a training face image of a known person. 2.Load another picture of the same known person. 3.Load a picture of a totally different person. Then the algorithm looks at the measurements it is currently generating for each of those three images. It then tweaks the neural network slightly so that it makes sure the measurements it generates for #1 and #2 are slightly closer while making sure the measurements for #2 and #3 are slightly further apart. After repeating this step millions of times for millions of images of thousands of different people, the neural network learns to reliably generate 128 measurements for each person. Any ten different pictures of the same person should give roughly the same measurements. Machine learning people call the 128 measurements of each face an embedding. The idea of reducing complicated raw data like a picture into a list of computer-generated numbers comes up a lot in machine learning.
  • 9.
  • 10. Encoding our face image This process of training a convolutional neural network to output face embeddings requires a lot of data and computer power. Even with an expensive NVidia Telsa video card, it takes about 24 hours of continuous training to get good accuracy. But once the network has been trained, it can generate measurements for any face, even ones it has never seen before! So this step only needs to be done once.
  • 11. Step 4: Finding the person’s name from the encoding. This last step is actually the easiest step in the whole process. All we have to do is find the person in our database of known people who has the closest measurements to our test image that we show in front of the web cam. After doing the comparative analysis by processing all the known images, our software finally tells the result of test image by displaying its name. We did it by using any basic machine learning classification algorithm. No fancy deep learning tricks are needed.
  • 12. And finally it works… It has successfully run the algorithm and recognized the faces when they appear in the webcam. The result we see above seems to be a very quick recognition but is actually a complex process having many steps as discussed earlier. This is the power of artificial intelligence and machine learning.