SlideShare a Scribd company logo
1 of 19
Face Recognition Based on 3D
Shape Estimation
The Problem and its
Challenges
 Quantify faces by parameters specifying their
shape and texture.
 To recognize faces across a wide range of
illumination conditions.
 Face recognition needs to be achieved across
variations in pose.
The Solution
 Model Intrinsic and Extrinsic parameters
separately.
 Estimate 3D Shape of faces to store
information of all poses.
 Computer Graphics Simulation of Illumination
and other Extrinsic parameters.
To Recognize a Face
 Estimate the Intrinsic Parameters
 Estimate the Extrinsic Parameters
 Use a Cost Function to find the nearest
neighbor face in the Database.
Morphable Model of 3D Faces
 A face is represented by 2 vectors:
S0 =(x1, y1 , z1 , ……………..xn , yn , zn )T
T0 =(R1, G1 , B1 , ……………..Rn , Gn , Bn )T
where:
pixel at (xk, yk , zk) have colors (Rk, Gk , Bk).
S0 is known as the shape vector.
T0 is known as the texture vector.
• To make calculations easier, we will use
cylindrical coordinates where (xk, yk , zk) is
equivalent to (hk, fk , r(hk,fk)).
Morphable Model of 3D Faces
..contd.
 A laser scanner of a new face is used to
obtain the shape and texture vectors in
cylindrical coordinates. The two vectors
combined:
I(h,f)=(r(h,f),R(h,f),G(h,f),B(h,f))T
 Any convex combination of shape and
texture vectors gives rise to a new face.
S = SiaiSi , T = SibiTi
Point to Point correspondence
 Since it is impossible to take laser scans of
every person’s face in one identical pose, we
need to correlate every point with the
equivalent point on a reference face.
 Also, you don’t want two faces’ convex
combination giving rise to a face with two
noses!!
 A modified version of the Optic Flow
algorithm is used to establish dense point-to-
point correspondence.
Point to Point correspondence
 For scans
parameterized with
(h,f), the flow field
that maps each
point of the
reference face to the
points of the new
face is used to form
vectors S and T.
Modified Optic Flow Algorithm
 The algorithm compares points having similar
intensities on the reference face and the new
face.
 E=Sh,f||(vhdI(h,f)/dh+vfdI(h,f)/df +DI||2
E is minimized for every point (h,f).
 We need to determine
v(h,f)=(Dh(h,f),Df(h,f))T such that each
point I1(h,f) is mapped to I2(h+Dh,f+Df)
PCA
 We perform Principal Component
Analysis on the set of shape and texture
vectors Si and Ti to reduce the
dimensionality.
 A larger variety of different faces can be
generated if linear combinations of
shape and texture vectors are formed
separately for eyes, nose, mouth etc.
Recognition of faces in images
 To recognize a face in the image we need to
estimate the extrinsic and intrinsic
parameters.
 For initialization the user alternately clicks on
a point in the image and the corresponding
point in the reference face.
 About 6 or 7 points are required like the
corners of the eyes, tip of the nose etc.
Fitting Algorithm
 The Algorithm optimizes
 Shape coefficients: (a1, a2, a3,….)T
 Texture coefficients: (b1, b2, b3,….)T
 22 rendering parameters:
 Pose angles: f,l and q
 Translation tw and focal length of the camera f
 Various illumination parameters like ambient light
intensities, directed light intensities, angles etc.
 The illumination parameters also include
parameters for the Phong model which
accounts for non-lambertian reflections and
takes into account the position of the eye.
Fitting Algo.: Newton’s Method
 The Fitting Algorithm is a stochastic version
of Newton’s Algorithm.
 The face is divided into small triangles. The
gradient calculation is done at the centers of
these triangles.
 At each iteration, 40 triangles are chosen
randomly for the error function and gradient
calculation.
 This not only speeds up the optimization
process but also avoids local minima.
Fitting Algo.: Error Function
 The error function is derived using Bayesian
Parameter Estimation.
 The error function takes into account the
errors due to the differences in color,
coordinates, rendering parameters and prior
probabilities of the parameters.
 For each iteration, the algorithm computes
the gradient of the error function at certain
points and then changes the values of the
parameters.
Face reconstruction
 The process of face
reconstruction is
shown here,
stepwise, from a
single image and a
set of feature points.
Recognition from model
coefficients
 The function which is used to compare
two faces c1 and c2 could be one of:
 Mahalanobis Distances
 Cosine of the angle between the two vectors
 A cost function motivated by Linear Discriminant
analysis.
 Of these, the last one gave the best
results.
Conclusions
 The paper discussed the following three
issues:
 Learning class-specific information about
human faces from a dataset of examples.
 Estimating 3D shape and texture along
with all relevant 3D scene parameters.
 Representing and comparing faces for
recognition tasks.
Discussion
 What they did not discuss in the paper:
 Can Optic Flow algorithm be applied in
such a scenario?
 How do they initialize the system before
applying Newton’s Method?
 Why only 6 or 8 points for initialization,
or 5 segments of the face?
Recognition
 The 3D morphable
face model is used
to encode the faces.
For recognition, the
model coefficients of
a new face are used
to compare with the
coeffs. of the faces
in the database.

More Related Content

Similar to Presentation on Face Recognition Based on 3D Shape Estimation

SYMMETRICAL WEIGHTED SUBSPACE HOLISTIC APPROACH FOR EXPRESSION RECOGNITION
SYMMETRICAL WEIGHTED SUBSPACE HOLISTIC APPROACH FOR EXPRESSION RECOGNITIONSYMMETRICAL WEIGHTED SUBSPACE HOLISTIC APPROACH FOR EXPRESSION RECOGNITION
SYMMETRICAL WEIGHTED SUBSPACE HOLISTIC APPROACH FOR EXPRESSION RECOGNITION
ijcsit
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
M166Calculus” ProjectDue Wednesday, December 9, 2015PROJ.docx
M166Calculus” ProjectDue Wednesday, December 9, 2015PROJ.docxM166Calculus” ProjectDue Wednesday, December 9, 2015PROJ.docx
M166Calculus” ProjectDue Wednesday, December 9, 2015PROJ.docx
infantsuk
 
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUESA STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
cscpconf
 

Similar to Presentation on Face Recognition Based on 3D Shape Estimation (20)

Face Alignment Using Active Shape Model And Support Vector Machine
Face Alignment Using Active Shape Model And Support Vector MachineFace Alignment Using Active Shape Model And Support Vector Machine
Face Alignment Using Active Shape Model And Support Vector Machine
 
SYMMETRICAL WEIGHTED SUBSPACE HOLISTIC APPROACH FOR EXPRESSION RECOGNITION
SYMMETRICAL WEIGHTED SUBSPACE HOLISTIC APPROACH FOR EXPRESSION RECOGNITIONSYMMETRICAL WEIGHTED SUBSPACE HOLISTIC APPROACH FOR EXPRESSION RECOGNITION
SYMMETRICAL WEIGHTED SUBSPACE HOLISTIC APPROACH FOR EXPRESSION RECOGNITION
 
3rd unit.pptx
3rd unit.pptx3rd unit.pptx
3rd unit.pptx
 
3D Reconstruction from Multiple uncalibrated 2D Images of an Object
3D Reconstruction from Multiple uncalibrated 2D Images of an Object3D Reconstruction from Multiple uncalibrated 2D Images of an Object
3D Reconstruction from Multiple uncalibrated 2D Images of an Object
 
Face recognition using selected topographical features
Face recognition using selected topographical features Face recognition using selected topographical features
Face recognition using selected topographical features
 
Face recognition using PCA
Face recognition using PCAFace recognition using PCA
Face recognition using PCA
 
Geometric model & curve
Geometric model & curveGeometric model & curve
Geometric model & curve
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Computer graphics lab manual
Computer graphics lab manualComputer graphics lab manual
Computer graphics lab manual
 
Features image processing and Extaction
Features image processing and ExtactionFeatures image processing and Extaction
Features image processing and Extaction
 
MIXTURES OF TRAINED REGRESSION CURVES MODELS FOR HANDWRITTEN ARABIC CHARACTER...
MIXTURES OF TRAINED REGRESSION CURVES MODELS FOR HANDWRITTEN ARABIC CHARACTER...MIXTURES OF TRAINED REGRESSION CURVES MODELS FOR HANDWRITTEN ARABIC CHARACTER...
MIXTURES OF TRAINED REGRESSION CURVES MODELS FOR HANDWRITTEN ARABIC CHARACTER...
 
Comparison of Distance Transform Based Features
Comparison of Distance Transform Based FeaturesComparison of Distance Transform Based Features
Comparison of Distance Transform Based Features
 
paper
paperpaper
paper
 
M166Calculus” ProjectDue Wednesday, December 9, 2015PROJ.docx
M166Calculus” ProjectDue Wednesday, December 9, 2015PROJ.docxM166Calculus” ProjectDue Wednesday, December 9, 2015PROJ.docx
M166Calculus” ProjectDue Wednesday, December 9, 2015PROJ.docx
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
mini prjt
mini prjtmini prjt
mini prjt
 
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUESA STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
 
Face Recognition using PCA-Principal Component Analysis using MATLAB
Face Recognition using PCA-Principal Component Analysis using MATLABFace Recognition using PCA-Principal Component Analysis using MATLAB
Face Recognition using PCA-Principal Component Analysis using MATLAB
 
Bt9301, computer graphics
Bt9301, computer graphicsBt9301, computer graphics
Bt9301, computer graphics
 

More from RapidAcademy

More from RapidAcademy (12)

Module 02 - Introduction to Food Safety 3.3.18.ppt
Module 02 - Introduction to Food Safety 3.3.18.pptModule 02 - Introduction to Food Safety 3.3.18.ppt
Module 02 - Introduction to Food Safety 3.3.18.ppt
 
why is food hygiene Important? food microbiology
why is food hygiene Important? food  microbiologywhy is food hygiene Important? food  microbiology
why is food hygiene Important? food microbiology
 
nickel in food trace element absorption transport and storage
nickel in food trace element absorption transport and storagenickel in food trace element absorption transport and storage
nickel in food trace element absorption transport and storage
 
Meat skeletal muscles with natturally attached tissues
Meat skeletal muscles with natturally attached tissuesMeat skeletal muscles with natturally attached tissues
Meat skeletal muscles with natturally attached tissues
 
Rice Rice mill hammer mill backing machine
Rice  Rice mill hammer mill backing machineRice  Rice mill hammer mill backing machine
Rice Rice mill hammer mill backing machine
 
solublity solublity constant complex ion effect to solublity
solublity solublity constant complex ion effect to solublitysolublity solublity constant complex ion effect to solublity
solublity solublity constant complex ion effect to solublity
 
processing control CFD computational fluid dynamic.pptx
processing control CFD computational fluid dynamic.pptxprocessing control CFD computational fluid dynamic.pptx
processing control CFD computational fluid dynamic.pptx
 
SCADA.pptx supervisory control and data aquasition
SCADA.pptx supervisory control and data aquasitionSCADA.pptx supervisory control and data aquasition
SCADA.pptx supervisory control and data aquasition
 
contamination and spoilage of cereals.pptx
contamination and spoilage of cereals.pptxcontamination and spoilage of cereals.pptx
contamination and spoilage of cereals.pptx
 
Molicular biology, clinical laboratory science
Molicular biology, clinical laboratory scienceMolicular biology, clinical laboratory science
Molicular biology, clinical laboratory science
 
Idli indian fermented food south indian dish.ppt
Idli indian fermented food south indian dish.pptIdli indian fermented food south indian dish.ppt
Idli indian fermented food south indian dish.ppt
 
Biological Hazard.ppt
Biological Hazard.pptBiological Hazard.ppt
Biological Hazard.ppt
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Presentation on Face Recognition Based on 3D Shape Estimation

  • 1. Face Recognition Based on 3D Shape Estimation
  • 2. The Problem and its Challenges  Quantify faces by parameters specifying their shape and texture.  To recognize faces across a wide range of illumination conditions.  Face recognition needs to be achieved across variations in pose.
  • 3. The Solution  Model Intrinsic and Extrinsic parameters separately.  Estimate 3D Shape of faces to store information of all poses.  Computer Graphics Simulation of Illumination and other Extrinsic parameters.
  • 4. To Recognize a Face  Estimate the Intrinsic Parameters  Estimate the Extrinsic Parameters  Use a Cost Function to find the nearest neighbor face in the Database.
  • 5. Morphable Model of 3D Faces  A face is represented by 2 vectors: S0 =(x1, y1 , z1 , ……………..xn , yn , zn )T T0 =(R1, G1 , B1 , ……………..Rn , Gn , Bn )T where: pixel at (xk, yk , zk) have colors (Rk, Gk , Bk). S0 is known as the shape vector. T0 is known as the texture vector. • To make calculations easier, we will use cylindrical coordinates where (xk, yk , zk) is equivalent to (hk, fk , r(hk,fk)).
  • 6. Morphable Model of 3D Faces ..contd.  A laser scanner of a new face is used to obtain the shape and texture vectors in cylindrical coordinates. The two vectors combined: I(h,f)=(r(h,f),R(h,f),G(h,f),B(h,f))T  Any convex combination of shape and texture vectors gives rise to a new face. S = SiaiSi , T = SibiTi
  • 7. Point to Point correspondence  Since it is impossible to take laser scans of every person’s face in one identical pose, we need to correlate every point with the equivalent point on a reference face.  Also, you don’t want two faces’ convex combination giving rise to a face with two noses!!  A modified version of the Optic Flow algorithm is used to establish dense point-to- point correspondence.
  • 8. Point to Point correspondence  For scans parameterized with (h,f), the flow field that maps each point of the reference face to the points of the new face is used to form vectors S and T.
  • 9. Modified Optic Flow Algorithm  The algorithm compares points having similar intensities on the reference face and the new face.  E=Sh,f||(vhdI(h,f)/dh+vfdI(h,f)/df +DI||2 E is minimized for every point (h,f).  We need to determine v(h,f)=(Dh(h,f),Df(h,f))T such that each point I1(h,f) is mapped to I2(h+Dh,f+Df)
  • 10. PCA  We perform Principal Component Analysis on the set of shape and texture vectors Si and Ti to reduce the dimensionality.  A larger variety of different faces can be generated if linear combinations of shape and texture vectors are formed separately for eyes, nose, mouth etc.
  • 11. Recognition of faces in images  To recognize a face in the image we need to estimate the extrinsic and intrinsic parameters.  For initialization the user alternately clicks on a point in the image and the corresponding point in the reference face.  About 6 or 7 points are required like the corners of the eyes, tip of the nose etc.
  • 12. Fitting Algorithm  The Algorithm optimizes  Shape coefficients: (a1, a2, a3,….)T  Texture coefficients: (b1, b2, b3,….)T  22 rendering parameters:  Pose angles: f,l and q  Translation tw and focal length of the camera f  Various illumination parameters like ambient light intensities, directed light intensities, angles etc.  The illumination parameters also include parameters for the Phong model which accounts for non-lambertian reflections and takes into account the position of the eye.
  • 13. Fitting Algo.: Newton’s Method  The Fitting Algorithm is a stochastic version of Newton’s Algorithm.  The face is divided into small triangles. The gradient calculation is done at the centers of these triangles.  At each iteration, 40 triangles are chosen randomly for the error function and gradient calculation.  This not only speeds up the optimization process but also avoids local minima.
  • 14. Fitting Algo.: Error Function  The error function is derived using Bayesian Parameter Estimation.  The error function takes into account the errors due to the differences in color, coordinates, rendering parameters and prior probabilities of the parameters.  For each iteration, the algorithm computes the gradient of the error function at certain points and then changes the values of the parameters.
  • 15. Face reconstruction  The process of face reconstruction is shown here, stepwise, from a single image and a set of feature points.
  • 16. Recognition from model coefficients  The function which is used to compare two faces c1 and c2 could be one of:  Mahalanobis Distances  Cosine of the angle between the two vectors  A cost function motivated by Linear Discriminant analysis.  Of these, the last one gave the best results.
  • 17. Conclusions  The paper discussed the following three issues:  Learning class-specific information about human faces from a dataset of examples.  Estimating 3D shape and texture along with all relevant 3D scene parameters.  Representing and comparing faces for recognition tasks.
  • 18. Discussion  What they did not discuss in the paper:  Can Optic Flow algorithm be applied in such a scenario?  How do they initialize the system before applying Newton’s Method?  Why only 6 or 8 points for initialization, or 5 segments of the face?
  • 19. Recognition  The 3D morphable face model is used to encode the faces. For recognition, the model coefficients of a new face are used to compare with the coeffs. of the faces in the database.