SlideShare a Scribd company logo
1 of 25
Person Recognition in Personal Photo
Collections
Group no -
1.Varad Deshpande (34) Gr no.11810178
2.Prydyumna daware (28) Gr no
3.Sonali jagtap (49) Gr no. 11810918
4.Firdaus Naseem (37) Gr no.
What is Face Detection?
Given an image,
tell whether there
is any human face,
if there is, where is
it(or where they are).
Face Detection Methods
Face detection methods
Feature-based
Appearance-based
Knowledge based
Template-matching
Methods
1.Knowledge-Based:-
The knowledge-based method depends on the set of rules, and it is based on human
knowledge to detect the faces. Ex- A face must have a nose, eyes, and mouth within
certain distances and positions with each other.
2.Feature-Based:-
The feature-based method is to locate faces by extracting structural features of the
face. It is first trained as a classifier and then used to differentiate between facial and
non-facial regions.
4.Appearance-Based:-
The appearance-based method depends on a set of delegate training face images to
find out face models. The appearance-based approach is better than other ways of
performance. In general appearance-based method rely on techniques from
statistical analysis and machine learning to find the relevant characteristics of face
images.
Methods
3.Template Matching:-
Template Matching method uses pre-defined or parameterized face
templates to locate or detect the faces by the correlation between the
templates and input images. Ex- a human face can be divided into
eyes, face contour, nose, and mouth. Also, a face model can be built
by edges just by using edge detection method. This approach is
simple to implement, but it is inadequate for face detection.
Methodology
 Person recognition in private photo collections is challenging:
people can be shown in all kinds of poses and activities, from
arbitrary viewpoints including back views, and with diverse
clothing
 We explore three other sources: first, body of a person contains
information about their shape and appearance; second, human
attributes such as gender and age help to reduce the search space;
and third, scene context further reduces ambiguities
 Person recognition in photo albums is hard. To handle the diverse
scenarios we need to exploit multiple cues from different body
regions and information sources. For example, the surfer is not
recognised when using only head or head+body cues. However, it is
successfully recognised when the additional attribute cues are
provided.
Recognition tasks ;
•There exist multiple tasks related to person recognition Face and
surveillance reidentification is most commonly done via
“verification” (one reference image, one test image).
•Other related tasks are, for instance, face clustering finding
important people or associating names in text to faces in images .
Recognition cues ;
•The base cue for person recognition is the appearance of
the face itself. Face normalization (“frontalisation”)
improves robustness to pose, view-point and illumination.
Similarly, pose-independent descriptors can be built for
the body
•
•Multiple other cues have been explored, for example:
attributes classification explicit cloth modelling elative
camera positions , social context . space-time priors and
photo-album priors
PIPA dataset
 The recently introduced PIPA dataset (“People In Photo
Albums”) is, to the best of our knowledge, the first dataset
to annotate identities of people with back views.
 The annotators labelled many instances that can be
considered hard even for humans .
 PIPA features 37 107 Flickr personal photo album images
with 63 188 head bounding boxes of 2 356 identities.
 The dataset is partitioned into train, validation, test, and
leftover sets, with rough ratio 45 : 15 : 20 : 20.
Cues for recognition
Recognition considered for f - face , h - head , u - upper body , b - full body , s - scene. person
recognition
system is performant yet
simple. At test time, given a
(ground truth) head bound-
ing box, we estimate (based
on the box size) five differ-
ent regions depicted. Each
region is fed into one or
more convnets to obtain
a set of feature vectors.
The vectors are concate-
nated and fed into a linear
SVM,
Validation set accuracy of different
cues
What is Face
Recognition?
A set of two task:
Face Identification: Given a face image that
belongs to a person in a database, tell whose
image it is.
Face Verification: Given a face image that might
not belong to the database, verify whether it is
from the person it is claimed to be in the
database.
Difference between Face Detection and Recognition
Detection – two-class classification
Face vs. Non-face
Recognition – multi-class classification
One person vs. all the others
Face Detection + Recognition
> Detection accuracy affects the recognition stage
Key issues:
1. Correct location of key facial features(e.g. the eye
corner)
2. False detection.
3. Missed detection.
How the Face Detection Works:-
There are many techniques to detect faces, with the help of these
techniques, we can identify faces with higher accuracy.
1. Firstly the image is imported by providing the location of the
image.
2. Then the picture is transformed from RGB to Grayscale because
it is easy to detect faces in the grayscale.
3. After that, the image manipulation used, in which the resizing,
cropping, blurring and sharpening of the images done if needed.
4. The next step is image segmentation to segments the multiple
objects in a single image so that the classifier can quickly detect
the objects and faces in the picture.
Challenges of Image Recognition:
1.Viewpoint Variation
1.Scale Variation
2.Deformation
3.Inter-class Variation
Role of Convolutional Neural Networks in Image
Recognition:
Convolutional Neural Networks play a crucial role in
solving the problems stated above. Its basic
principles have taken the inspiration from our visual
cortex.
CNN incorporates changes in its mode of
operations. The inputs of CNN are not fed with the
complete numerical values of the image.
Role of Convolutional Neural Networks in Image
Recognition:
> These images are then treated similar to the regular neural
network process. The computer collects patterns with respect to
the image and the results are saved in the matrix format.
> This Matrix is again down sampled (reduced in size) with a
method known as Max-Pooling. It extracts maximum values from
each sub-matrix and results in a matrix of much smaller size.
> These values are representative of the pattern in the image.
This matrix formed is supplied to the neural networks as the input
and the output determines the probability of the classes in an
image.
Limitations of CNN:
1. Through complex architectures, it is possible to predict
objects, face in an image with 95% accuracy surpassing the
human capabilities which is 94%.
2. Even with its outstanding capabilities, there are certain
limitations in its utilization.
3. Datasets up to billion parameters require high computation
load, memory usage, and high processing power. Usage of
which requires proper justification.
Appearance-Based Methods
summery:
Pros:
1. Use powerful machine learning algorithms
2. Has demonstrated good empirical results
3. Fast and fairly robust
4. Extended to detect faces in different pose and orientation
Cons:
1. Usually needs to search over space and scale
2. Need lots of positive and negative examples
3. Limited view-based approach
Thank You
photo detection in personal photo collection
photo detection in personal photo collection

More Related Content

What's hot

Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters
Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters
Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters IJERA Editor
 
Expression invariant face recognition
Expression invariant face recognitionExpression invariant face recognition
Expression invariant face recognitionSumit Agarwal
 
Recognition of Partially Occluded Face Using Gradientface and Local Binary Pa...
Recognition of Partially Occluded Face Using Gradientface and Local Binary Pa...Recognition of Partially Occluded Face Using Gradientface and Local Binary Pa...
Recognition of Partially Occluded Face Using Gradientface and Local Binary Pa...Win Yu
 
Facial Expression Recognition Using Local Binary Pattern and Support Vector M...
Facial Expression Recognition Using Local Binary Pattern and Support Vector M...Facial Expression Recognition Using Local Binary Pattern and Support Vector M...
Facial Expression Recognition Using Local Binary Pattern and Support Vector M...AM Publications
 
Pose Invariant Face Recognition using Neuro-Fuzzy Approach
Pose Invariant Face Recognition using Neuro-Fuzzy ApproachPose Invariant Face Recognition using Neuro-Fuzzy Approach
Pose Invariant Face Recognition using Neuro-Fuzzy Approachiosrjce
 
A Study on Face Recognition Technique based on Eigenface
A Study on Face Recognition Technique based on EigenfaceA Study on Face Recognition Technique based on Eigenface
A Study on Face Recognition Technique based on Eigenfacesadique_ghitm
 
Face Recognition Using Simplified Fuzzy Artmap
Face Recognition Using Simplified Fuzzy ArtmapFace Recognition Using Simplified Fuzzy Artmap
Face Recognition Using Simplified Fuzzy Artmapsipij
 
[Skolkovo Robotics V] Facial Expression Recognition in the Wild
[Skolkovo Robotics V] Facial Expression Recognition in the Wild[Skolkovo Robotics V] Facial Expression Recognition in the Wild
[Skolkovo Robotics V] Facial Expression Recognition in the WildSkolkovo Robotics Center
 
Implementation of features dynamic tracking filter to tracing pupils
Implementation of features dynamic tracking filter to tracing pupilsImplementation of features dynamic tracking filter to tracing pupils
Implementation of features dynamic tracking filter to tracing pupilssipij
 
An Enhanced Independent Component-Based Human Facial Expression Recognition ...
An Enhanced Independent Component-Based Human Facial Expression Recognition  ...An Enhanced Independent Component-Based Human Facial Expression Recognition  ...
An Enhanced Independent Component-Based Human Facial Expression Recognition ...أحلام انصارى
 
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...iosrjce
 
Intellectual Person Identification Using 3DMM, GPSO and Genetic Algorithm
Intellectual Person Identification Using 3DMM, GPSO and Genetic AlgorithmIntellectual Person Identification Using 3DMM, GPSO and Genetic Algorithm
Intellectual Person Identification Using 3DMM, GPSO and Genetic AlgorithmIJCSIS Research Publications
 
Visual Image Quality Assessment Technique using FSIM
Visual Image Quality Assessment Technique using FSIMVisual Image Quality Assessment Technique using FSIM
Visual Image Quality Assessment Technique using FSIMEditor IJCATR
 
A Hybrid Approach to Face Detection And Feature Extraction
A Hybrid Approach to Face Detection And Feature ExtractionA Hybrid Approach to Face Detection And Feature Extraction
A Hybrid Approach to Face Detection And Feature Extractioniosrjce
 

What's hot (19)

human face counting
human face countinghuman face counting
human face counting
 
Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters
Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters
Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters
 
Expression invariant face recognition
Expression invariant face recognitionExpression invariant face recognition
Expression invariant face recognition
 
Recognition of Partially Occluded Face Using Gradientface and Local Binary Pa...
Recognition of Partially Occluded Face Using Gradientface and Local Binary Pa...Recognition of Partially Occluded Face Using Gradientface and Local Binary Pa...
Recognition of Partially Occluded Face Using Gradientface and Local Binary Pa...
 
ICIC-2015
ICIC-2015ICIC-2015
ICIC-2015
 
Facial Expression Recognition Using Local Binary Pattern and Support Vector M...
Facial Expression Recognition Using Local Binary Pattern and Support Vector M...Facial Expression Recognition Using Local Binary Pattern and Support Vector M...
Facial Expression Recognition Using Local Binary Pattern and Support Vector M...
 
Pose Invariant Face Recognition using Neuro-Fuzzy Approach
Pose Invariant Face Recognition using Neuro-Fuzzy ApproachPose Invariant Face Recognition using Neuro-Fuzzy Approach
Pose Invariant Face Recognition using Neuro-Fuzzy Approach
 
Spoof copy
Spoof   copySpoof   copy
Spoof copy
 
A Study on Face Recognition Technique based on Eigenface
A Study on Face Recognition Technique based on EigenfaceA Study on Face Recognition Technique based on Eigenface
A Study on Face Recognition Technique based on Eigenface
 
Face Recognition Using Simplified Fuzzy Artmap
Face Recognition Using Simplified Fuzzy ArtmapFace Recognition Using Simplified Fuzzy Artmap
Face Recognition Using Simplified Fuzzy Artmap
 
[Skolkovo Robotics V] Facial Expression Recognition in the Wild
[Skolkovo Robotics V] Facial Expression Recognition in the Wild[Skolkovo Robotics V] Facial Expression Recognition in the Wild
[Skolkovo Robotics V] Facial Expression Recognition in the Wild
 
Implementation of features dynamic tracking filter to tracing pupils
Implementation of features dynamic tracking filter to tracing pupilsImplementation of features dynamic tracking filter to tracing pupils
Implementation of features dynamic tracking filter to tracing pupils
 
Infarec
InfarecInfarec
Infarec
 
An Enhanced Independent Component-Based Human Facial Expression Recognition ...
An Enhanced Independent Component-Based Human Facial Expression Recognition  ...An Enhanced Independent Component-Based Human Facial Expression Recognition  ...
An Enhanced Independent Component-Based Human Facial Expression Recognition ...
 
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
 
Intellectual Person Identification Using 3DMM, GPSO and Genetic Algorithm
Intellectual Person Identification Using 3DMM, GPSO and Genetic AlgorithmIntellectual Person Identification Using 3DMM, GPSO and Genetic Algorithm
Intellectual Person Identification Using 3DMM, GPSO and Genetic Algorithm
 
A04430105
A04430105A04430105
A04430105
 
Visual Image Quality Assessment Technique using FSIM
Visual Image Quality Assessment Technique using FSIMVisual Image Quality Assessment Technique using FSIM
Visual Image Quality Assessment Technique using FSIM
 
A Hybrid Approach to Face Detection And Feature Extraction
A Hybrid Approach to Face Detection And Feature ExtractionA Hybrid Approach to Face Detection And Feature Extraction
A Hybrid Approach to Face Detection And Feature Extraction
 

Similar to photo detection in personal photo collection

Criminal Detection System
Criminal Detection SystemCriminal Detection System
Criminal Detection SystemIntrader Amit
 
Paper id 24201475
Paper id 24201475Paper id 24201475
Paper id 24201475IJRAT
 
A Robust & Fast Face Detection System
A Robust & Fast Face Detection SystemA Robust & Fast Face Detection System
A Robust & Fast Face Detection SystemIDES Editor
 
Beyond Frontal Faces: Improving Person Recognition Using Multiple Cues
Beyond Frontal Faces: Improving Person Recognition Using Multiple CuesBeyond Frontal Faces: Improving Person Recognition Using Multiple Cues
Beyond Frontal Faces: Improving Person Recognition Using Multiple CuesJoão Gabriel Lima
 
Face Detection Using Modified Viola Jones Algorithm
Face Detection Using Modified Viola Jones AlgorithmFace Detection Using Modified Viola Jones Algorithm
Face Detection Using Modified Viola Jones Algorithmpaperpublications3
 
Final Year Project - Enhancing Virtual Learning through Emotional Agents (Doc...
Final Year Project - Enhancing Virtual Learning through Emotional Agents (Doc...Final Year Project - Enhancing Virtual Learning through Emotional Agents (Doc...
Final Year Project - Enhancing Virtual Learning through Emotional Agents (Doc...Sana Nasar
 
IRJET- A Review on Various Approaches of Face Recognition
IRJET- A Review on Various Approaches of Face RecognitionIRJET- A Review on Various Approaches of Face Recognition
IRJET- A Review on Various Approaches of Face RecognitionIRJET Journal
 
Report Face Detection
Report Face DetectionReport Face Detection
Report Face DetectionJugal Patel
 
Face Recognition_FINALpptx-4-22.pdf
Face Recognition_FINALpptx-4-22.pdfFace Recognition_FINALpptx-4-22.pdf
Face Recognition_FINALpptx-4-22.pdfSOMESHJADHWANI
 
A Hybrid Approach to Recognize Facial Image using Feature Extraction Method
A Hybrid Approach to Recognize Facial Image using Feature Extraction MethodA Hybrid Approach to Recognize Facial Image using Feature Extraction Method
A Hybrid Approach to Recognize Facial Image using Feature Extraction MethodIRJET Journal
 
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSINGAN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSINGijiert bestjournal
 
Facial expression recognition
Facial expression recognitionFacial expression recognition
Facial expression recognitionSachin Mangad
 

Similar to photo detection in personal photo collection (20)

Criminal Detection System
Criminal Detection SystemCriminal Detection System
Criminal Detection System
 
Paper id 24201475
Paper id 24201475Paper id 24201475
Paper id 24201475
 
A Robust & Fast Face Detection System
A Robust & Fast Face Detection SystemA Robust & Fast Face Detection System
A Robust & Fast Face Detection System
 
Fl33971979
Fl33971979Fl33971979
Fl33971979
 
Fl33971979
Fl33971979Fl33971979
Fl33971979
 
Beyond Frontal Faces: Improving Person Recognition Using Multiple Cues
Beyond Frontal Faces: Improving Person Recognition Using Multiple CuesBeyond Frontal Faces: Improving Person Recognition Using Multiple Cues
Beyond Frontal Faces: Improving Person Recognition Using Multiple Cues
 
Cu31632635
Cu31632635Cu31632635
Cu31632635
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Face Detection Using Modified Viola Jones Algorithm
Face Detection Using Modified Viola Jones AlgorithmFace Detection Using Modified Viola Jones Algorithm
Face Detection Using Modified Viola Jones Algorithm
 
Final Year Project - Enhancing Virtual Learning through Emotional Agents (Doc...
Final Year Project - Enhancing Virtual Learning through Emotional Agents (Doc...Final Year Project - Enhancing Virtual Learning through Emotional Agents (Doc...
Final Year Project - Enhancing Virtual Learning through Emotional Agents (Doc...
 
IRJET- A Review on Various Approaches of Face Recognition
IRJET- A Review on Various Approaches of Face RecognitionIRJET- A Review on Various Approaches of Face Recognition
IRJET- A Review on Various Approaches of Face Recognition
 
Report Face Detection
Report Face DetectionReport Face Detection
Report Face Detection
 
Face Recognition_FINALpptx-4-22.pdf
Face Recognition_FINALpptx-4-22.pdfFace Recognition_FINALpptx-4-22.pdf
Face Recognition_FINALpptx-4-22.pdf
 
A Hybrid Approach to Recognize Facial Image using Feature Extraction Method
A Hybrid Approach to Recognize Facial Image using Feature Extraction MethodA Hybrid Approach to Recognize Facial Image using Feature Extraction Method
A Hybrid Approach to Recognize Facial Image using Feature Extraction Method
 
Real time facial expression analysis using pca
Real time facial expression analysis using pcaReal time facial expression analysis using pca
Real time facial expression analysis using pca
 
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSINGAN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
 
Ck36515520
Ck36515520Ck36515520
Ck36515520
 
Image processing
Image processingImage processing
Image processing
 
Facial expression recognition
Facial expression recognitionFacial expression recognition
Facial expression recognition
 
PAPER2
PAPER2PAPER2
PAPER2
 

More from sonalijagtap15

direct coupled transistor logic
direct coupled transistor logicdirect coupled transistor logic
direct coupled transistor logicsonalijagtap15
 
Design issues in non linear control system
Design issues in non linear control systemDesign issues in non linear control system
Design issues in non linear control systemsonalijagtap15
 
Industrial revolution4
Industrial revolution4Industrial revolution4
Industrial revolution4sonalijagtap15
 

More from sonalijagtap15 (7)

Extream ultra violet
Extream ultra violetExtream ultra violet
Extream ultra violet
 
Electromagnetic waves
Electromagnetic wavesElectromagnetic waves
Electromagnetic waves
 
Biot savart law
Biot savart lawBiot savart law
Biot savart law
 
direct coupled transistor logic
direct coupled transistor logicdirect coupled transistor logic
direct coupled transistor logic
 
Design issues in non linear control system
Design issues in non linear control systemDesign issues in non linear control system
Design issues in non linear control system
 
Wireless transmission
Wireless transmissionWireless transmission
Wireless transmission
 
Industrial revolution4
Industrial revolution4Industrial revolution4
Industrial revolution4
 

Recently uploaded

Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesChandrakantDivate1
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxkalpana413121
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptAfnanAhmad53
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxpritamlangde
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...ppkakm
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesRashidFaridChishti
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 

Recently uploaded (20)

Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 

photo detection in personal photo collection

  • 1. Person Recognition in Personal Photo Collections Group no - 1.Varad Deshpande (34) Gr no.11810178 2.Prydyumna daware (28) Gr no 3.Sonali jagtap (49) Gr no. 11810918 4.Firdaus Naseem (37) Gr no.
  • 2. What is Face Detection? Given an image, tell whether there is any human face, if there is, where is it(or where they are).
  • 3. Face Detection Methods Face detection methods Feature-based Appearance-based Knowledge based Template-matching
  • 4. Methods 1.Knowledge-Based:- The knowledge-based method depends on the set of rules, and it is based on human knowledge to detect the faces. Ex- A face must have a nose, eyes, and mouth within certain distances and positions with each other. 2.Feature-Based:- The feature-based method is to locate faces by extracting structural features of the face. It is first trained as a classifier and then used to differentiate between facial and non-facial regions. 4.Appearance-Based:- The appearance-based method depends on a set of delegate training face images to find out face models. The appearance-based approach is better than other ways of performance. In general appearance-based method rely on techniques from statistical analysis and machine learning to find the relevant characteristics of face images.
  • 5. Methods 3.Template Matching:- Template Matching method uses pre-defined or parameterized face templates to locate or detect the faces by the correlation between the templates and input images. Ex- a human face can be divided into eyes, face contour, nose, and mouth. Also, a face model can be built by edges just by using edge detection method. This approach is simple to implement, but it is inadequate for face detection.
  • 6. Methodology  Person recognition in private photo collections is challenging: people can be shown in all kinds of poses and activities, from arbitrary viewpoints including back views, and with diverse clothing  We explore three other sources: first, body of a person contains information about their shape and appearance; second, human attributes such as gender and age help to reduce the search space; and third, scene context further reduces ambiguities  Person recognition in photo albums is hard. To handle the diverse scenarios we need to exploit multiple cues from different body regions and information sources. For example, the surfer is not recognised when using only head or head+body cues. However, it is successfully recognised when the additional attribute cues are provided.
  • 7. Recognition tasks ; •There exist multiple tasks related to person recognition Face and surveillance reidentification is most commonly done via “verification” (one reference image, one test image). •Other related tasks are, for instance, face clustering finding important people or associating names in text to faces in images .
  • 8. Recognition cues ; •The base cue for person recognition is the appearance of the face itself. Face normalization (“frontalisation”) improves robustness to pose, view-point and illumination. Similarly, pose-independent descriptors can be built for the body • •Multiple other cues have been explored, for example: attributes classification explicit cloth modelling elative camera positions , social context . space-time priors and photo-album priors
  • 9. PIPA dataset  The recently introduced PIPA dataset (“People In Photo Albums”) is, to the best of our knowledge, the first dataset to annotate identities of people with back views.  The annotators labelled many instances that can be considered hard even for humans .  PIPA features 37 107 Flickr personal photo album images with 63 188 head bounding boxes of 2 356 identities.  The dataset is partitioned into train, validation, test, and leftover sets, with rough ratio 45 : 15 : 20 : 20.
  • 10. Cues for recognition Recognition considered for f - face , h - head , u - upper body , b - full body , s - scene. person recognition system is performant yet simple. At test time, given a (ground truth) head bound- ing box, we estimate (based on the box size) five differ- ent regions depicted. Each region is fed into one or more convnets to obtain a set of feature vectors. The vectors are concate- nated and fed into a linear SVM,
  • 11. Validation set accuracy of different cues
  • 12.
  • 13.
  • 14. What is Face Recognition? A set of two task: Face Identification: Given a face image that belongs to a person in a database, tell whose image it is. Face Verification: Given a face image that might not belong to the database, verify whether it is from the person it is claimed to be in the database.
  • 15. Difference between Face Detection and Recognition Detection – two-class classification Face vs. Non-face Recognition – multi-class classification One person vs. all the others
  • 16. Face Detection + Recognition > Detection accuracy affects the recognition stage Key issues: 1. Correct location of key facial features(e.g. the eye corner) 2. False detection. 3. Missed detection.
  • 17. How the Face Detection Works:- There are many techniques to detect faces, with the help of these techniques, we can identify faces with higher accuracy. 1. Firstly the image is imported by providing the location of the image. 2. Then the picture is transformed from RGB to Grayscale because it is easy to detect faces in the grayscale. 3. After that, the image manipulation used, in which the resizing, cropping, blurring and sharpening of the images done if needed. 4. The next step is image segmentation to segments the multiple objects in a single image so that the classifier can quickly detect the objects and faces in the picture.
  • 18. Challenges of Image Recognition: 1.Viewpoint Variation 1.Scale Variation 2.Deformation 3.Inter-class Variation
  • 19. Role of Convolutional Neural Networks in Image Recognition: Convolutional Neural Networks play a crucial role in solving the problems stated above. Its basic principles have taken the inspiration from our visual cortex. CNN incorporates changes in its mode of operations. The inputs of CNN are not fed with the complete numerical values of the image.
  • 20. Role of Convolutional Neural Networks in Image Recognition: > These images are then treated similar to the regular neural network process. The computer collects patterns with respect to the image and the results are saved in the matrix format. > This Matrix is again down sampled (reduced in size) with a method known as Max-Pooling. It extracts maximum values from each sub-matrix and results in a matrix of much smaller size. > These values are representative of the pattern in the image. This matrix formed is supplied to the neural networks as the input and the output determines the probability of the classes in an image.
  • 21. Limitations of CNN: 1. Through complex architectures, it is possible to predict objects, face in an image with 95% accuracy surpassing the human capabilities which is 94%. 2. Even with its outstanding capabilities, there are certain limitations in its utilization. 3. Datasets up to billion parameters require high computation load, memory usage, and high processing power. Usage of which requires proper justification.
  • 22. Appearance-Based Methods summery: Pros: 1. Use powerful machine learning algorithms 2. Has demonstrated good empirical results 3. Fast and fairly robust 4. Extended to detect faces in different pose and orientation Cons: 1. Usually needs to search over space and scale 2. Need lots of positive and negative examples 3. Limited view-based approach