SlideShare a Scribd company logo
1 of 39
Fuzzy in Face
Recognition
工資管 106 黃泰嘉
Outline
Before we start…
- Flow Chart in Face Recognition with Fuzzy
Introduction to Fuzzy Theory
Introduction to Face Recognition
LBP Method
SVM
Fuzzy LBP
Before We Start…
Flow Chart in Face Recognition with Fuzzy Theory
訓練影像
背景取樣
及前處理
LBP
Histogram
測試影像
Fuzzy
特徵向量
特徵向量 SVM訓練
SVM模組Result
Introduction to Fuzzy Theory
History
- L.A. Zadeh Profressor, 1965
- 鑽研控制理論和系統理論,但當系統過於複雜時?
Characteristics about Fuzzy
- 模糊性:什麼是中年人?什麼是年輕人
- 主觀性:中年 = {x | 30<=x<=55}
Why we need Fuzzy?
Introduction to Fuzzy Theory
Crisp屬於Fuzzy的一種
- Crisp:p(x) = x是偶數
- Fuzzy:p(x) = x是很大的數
內含定義法
- Fuzzy:矮 = {x | x的個子矮} (Fuzzy的定義不可判明)
- Crisp:偶數 = {x | x為偶數} = {x | x可被2整除}
外延定義法
- 小整數的集合: A = {1, 2} v.s. B = {1, 2, 3, 4}(看不出模糊性)
Difference between Fuzzy and Crisp
Introduction to Fuzzy Theory
Express Fuzzy in Mathematics
So how do we define Fuzzy?
Use Membership Function!
天數 1 2 3 4
Grade 0.5 1.0 0.7 0.4
大約兩星期
Introduction to Fuzzy Theory
Expert System
Auto-driven Mobile
Temperature Control
Social Sciences
Example of Applying Fuzzy
Introduction to Face Recognition
Flow Chart in Face Recognition with Fuzzy Theory
訓練影像
背景取樣
及前處理
LBP
Histogram
測試影像
Fuzzy
特徵向量
特徵向量 SVM訓練
SVM模組Result
Introduction to Face Recognition
“Facial Expression Recognition” contains
- Locating Faces (refers to as face detection)
- Extracting facial features
- Analyzing the motion of facial features
Challenges
- Subtlety, Complexity, and Variability
- Low-Resolution Images
- Consider time and memory costing
Related Topics
Introduction to Face Recognition
Geometric Feature-based Methods :
present the shape and locations of facial components, which are
extracted to form a feature vector that represents the face geometry
Appearance-based Methods
- PCA (Principal Component Analysis)
- LDA (Linear Discriminant Analysis)
- ICA (Independent Component Analysis)
- LBP (Local Binary Pattern)
Types of Feature Extraction
Introduction to Face Recognition
Geometric Feature-based Methods
Introduction to Face Recognition
Geometric Feature-based Methods
Introduction to Face Recognition
Comparison of Geometric and Appearance Method
Geometric Feature-
based Method
Appearance Feature-
based Method
Action Unit
Recogition
V
Data Correctness
Requirements
(Require accurate
and reliable feature)
V
Introduction to LBP Method
Flow Chart in Face Recognition with Fuzzy Theory
訓練影像
背景取樣
及前處理
LBP
Histogram
測試影像
Fuzzy
特徵向量
特徵向量 SVM訓練
SVM模組Result
Introduction to LBP Method
Was originally for “Texture Analysis”
Has tolerance against illumination changes
Computational simplicity
Time and memory insensitive
Can be derived very fast in a single scan through the raw image
and lie in low-dimensional feature space
Why do we choose it?
Introduction to LBP Method
LBP Method can be used across different database and shows
general ability in face recognition
Obviously low-resolution images are most common
So, in this work, LBP features for low-resolution facial expression
recognition are investigated
Experiments on different image resolutions show that LBP
features perform stably and robustly over a useful range of low
resolutions of face images
Advantages of using LBP Method
Introduction to LBP Method
Basic Concept : Image Data Representation
Introduction to LBP Method
Basic Concept : Image Data Representation
Introduction to LBP Method
Basic Concept : Basic Binary Patterns
Introduction to LBP Method
Basic Concept : Extended Local Binary Patterns
Introduction to LBP Method
Basic Concept : Constructing LBP in Image
Introduction to LBP Method
Basic Concept : Constructing LBP in Image
Histograms will be calculated for each block, then a
histograms will be concentrated into a single vector
As a result, the facial recognition is represented by LBP and
the shape of the face is obtained by concentration of
different local histograms
Library in Python : Mahotas
Introduction to LBP Method
Basic Concept : Flow Chart
Receive a
image
Dividing image into
non-overlapped
blocks
Perform histogram
equalization
More images?
Facial Recognition
is represented by
LBP
Block LBP histograms are
concatenated into a single
vector
Yes No
Introduction to LBP Method
Flow Chart in Face Recognition with Fuzzy Theory
訓練影像
背景取樣
及前處理
LBP
Histogram
測試影像
Fuzzy
特徵向量
特徵向量 SVM訓練
SVM模組Result
Introduction to SVM
Characteristics
Supervised
可用於線性及
非線性資料
轉到更高維度
上來找
hyperplane
Introduction to SVM
Characteristics
找一條線來分開,
法向量即為Margin
Margin愈大愈好,
Why?
SVM are examined
to perform facial
expression
recognition using
LBP.
Introduction to Fuzzy LBP
Flow Chart in Face Recognition with Fuzzy Theory
訓練影像
背景取樣
及前處理
LBP
Histogram
測試影像
Fuzzy
特徵向量
特徵向量 SVM訓練
SVM模組Result
Introduction to Fuzzy LBP
Basic Concept
Problem in original LBP
- Information from central pixel shows little influence
Therefore, use MEMBERSHIP FUNCTION
- Compute a membership function for each windows based
on the center pixel of window
Introduction to Fuzzy LBP
Basic Concept
Introduce the intensity values:
p
i
= the peripheral pixels
p
center
= the central pixels
Introduction to Fuzzy LBP
Basic Concept
Membership function:
m
0
() = the degree to which p
i
has smaller gray
than p
center
m
1
() = 1 - m
0
()
Introduction to Fuzzy LBP
Basic Concept
Introduction to Fuzzy LBP
Basic Concept
Introduction to Fuzzy LBP
Basic Concept
Gather each CLBP
and get the FLBP histogram
Each 3x3 neighborhood contributes to more than one
bin of the FLBP histogram
Introduction to Fuzzy LBP
Basic Concept
Introduction to Fuzzy LBP
Basic Concept
Introduction to Fuzzy LBP
Result of implementing FLBP method
- Fuzzy Local Binary Patterns for Ultrasound Texture Characterization, University of Athens
Introduction to Fuzzy LBP
Result of implementing FLBP method
- Fuzzy Local Binary Patterns for Ultrasound Texture Characterization, University of Athens
Brief Review…
Flow Chart in Face Recognition with Fuzzy Theory
訓練影像
背景取樣
及前處理
LBP
Histogram
測試影像
Fuzzy
特徵向量
特徵向量 SVM訓練
SVM模組Result
References
FUZZY LBP AND ENTROPY BASED FACE RECOGNITION
Facial expression recognition based on local binary patterns final
fuzzy LBP for face recognition ppt
face recognition system using LBP
Improving Local Binary Patterns Techniques by Using Edge Information
Fuzzy Local Binary Patterns for Ultrasound Texture Characterization
在不同角度變化下以區域二元特徵為基礎之性別辨識, 范力中, 民國98年

More Related Content

Recently uploaded

Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfAnubhavMangla3
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistandanishmna97
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهMohamed Sweelam
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Paige Cruz
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxMasterG
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 

Recently uploaded (20)

Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 

Featured

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Featured (20)

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 

讀書會 Fuzzy在人臉辨識上的應用

  • 2. Outline Before we start… - Flow Chart in Face Recognition with Fuzzy Introduction to Fuzzy Theory Introduction to Face Recognition LBP Method SVM Fuzzy LBP
  • 3. Before We Start… Flow Chart in Face Recognition with Fuzzy Theory 訓練影像 背景取樣 及前處理 LBP Histogram 測試影像 Fuzzy 特徵向量 特徵向量 SVM訓練 SVM模組Result
  • 4. Introduction to Fuzzy Theory History - L.A. Zadeh Profressor, 1965 - 鑽研控制理論和系統理論,但當系統過於複雜時? Characteristics about Fuzzy - 模糊性:什麼是中年人?什麼是年輕人 - 主觀性:中年 = {x | 30<=x<=55} Why we need Fuzzy?
  • 5. Introduction to Fuzzy Theory Crisp屬於Fuzzy的一種 - Crisp:p(x) = x是偶數 - Fuzzy:p(x) = x是很大的數 內含定義法 - Fuzzy:矮 = {x | x的個子矮} (Fuzzy的定義不可判明) - Crisp:偶數 = {x | x為偶數} = {x | x可被2整除} 外延定義法 - 小整數的集合: A = {1, 2} v.s. B = {1, 2, 3, 4}(看不出模糊性) Difference between Fuzzy and Crisp
  • 6. Introduction to Fuzzy Theory Express Fuzzy in Mathematics So how do we define Fuzzy? Use Membership Function! 天數 1 2 3 4 Grade 0.5 1.0 0.7 0.4 大約兩星期
  • 7. Introduction to Fuzzy Theory Expert System Auto-driven Mobile Temperature Control Social Sciences Example of Applying Fuzzy
  • 8. Introduction to Face Recognition Flow Chart in Face Recognition with Fuzzy Theory 訓練影像 背景取樣 及前處理 LBP Histogram 測試影像 Fuzzy 特徵向量 特徵向量 SVM訓練 SVM模組Result
  • 9. Introduction to Face Recognition “Facial Expression Recognition” contains - Locating Faces (refers to as face detection) - Extracting facial features - Analyzing the motion of facial features Challenges - Subtlety, Complexity, and Variability - Low-Resolution Images - Consider time and memory costing Related Topics
  • 10. Introduction to Face Recognition Geometric Feature-based Methods : present the shape and locations of facial components, which are extracted to form a feature vector that represents the face geometry Appearance-based Methods - PCA (Principal Component Analysis) - LDA (Linear Discriminant Analysis) - ICA (Independent Component Analysis) - LBP (Local Binary Pattern) Types of Feature Extraction
  • 11. Introduction to Face Recognition Geometric Feature-based Methods
  • 12. Introduction to Face Recognition Geometric Feature-based Methods
  • 13. Introduction to Face Recognition Comparison of Geometric and Appearance Method Geometric Feature- based Method Appearance Feature- based Method Action Unit Recogition V Data Correctness Requirements (Require accurate and reliable feature) V
  • 14. Introduction to LBP Method Flow Chart in Face Recognition with Fuzzy Theory 訓練影像 背景取樣 及前處理 LBP Histogram 測試影像 Fuzzy 特徵向量 特徵向量 SVM訓練 SVM模組Result
  • 15. Introduction to LBP Method Was originally for “Texture Analysis” Has tolerance against illumination changes Computational simplicity Time and memory insensitive Can be derived very fast in a single scan through the raw image and lie in low-dimensional feature space Why do we choose it?
  • 16. Introduction to LBP Method LBP Method can be used across different database and shows general ability in face recognition Obviously low-resolution images are most common So, in this work, LBP features for low-resolution facial expression recognition are investigated Experiments on different image resolutions show that LBP features perform stably and robustly over a useful range of low resolutions of face images Advantages of using LBP Method
  • 17. Introduction to LBP Method Basic Concept : Image Data Representation
  • 18. Introduction to LBP Method Basic Concept : Image Data Representation
  • 19. Introduction to LBP Method Basic Concept : Basic Binary Patterns
  • 20. Introduction to LBP Method Basic Concept : Extended Local Binary Patterns
  • 21. Introduction to LBP Method Basic Concept : Constructing LBP in Image
  • 22. Introduction to LBP Method Basic Concept : Constructing LBP in Image Histograms will be calculated for each block, then a histograms will be concentrated into a single vector As a result, the facial recognition is represented by LBP and the shape of the face is obtained by concentration of different local histograms Library in Python : Mahotas
  • 23. Introduction to LBP Method Basic Concept : Flow Chart Receive a image Dividing image into non-overlapped blocks Perform histogram equalization More images? Facial Recognition is represented by LBP Block LBP histograms are concatenated into a single vector Yes No
  • 24. Introduction to LBP Method Flow Chart in Face Recognition with Fuzzy Theory 訓練影像 背景取樣 及前處理 LBP Histogram 測試影像 Fuzzy 特徵向量 特徵向量 SVM訓練 SVM模組Result
  • 27. Introduction to Fuzzy LBP Flow Chart in Face Recognition with Fuzzy Theory 訓練影像 背景取樣 及前處理 LBP Histogram 測試影像 Fuzzy 特徵向量 特徵向量 SVM訓練 SVM模組Result
  • 28. Introduction to Fuzzy LBP Basic Concept Problem in original LBP - Information from central pixel shows little influence Therefore, use MEMBERSHIP FUNCTION - Compute a membership function for each windows based on the center pixel of window
  • 29. Introduction to Fuzzy LBP Basic Concept Introduce the intensity values: p i = the peripheral pixels p center = the central pixels
  • 30. Introduction to Fuzzy LBP Basic Concept Membership function: m 0 () = the degree to which p i has smaller gray than p center m 1 () = 1 - m 0 ()
  • 31. Introduction to Fuzzy LBP Basic Concept
  • 32. Introduction to Fuzzy LBP Basic Concept
  • 33. Introduction to Fuzzy LBP Basic Concept Gather each CLBP and get the FLBP histogram Each 3x3 neighborhood contributes to more than one bin of the FLBP histogram
  • 34. Introduction to Fuzzy LBP Basic Concept
  • 35. Introduction to Fuzzy LBP Basic Concept
  • 36. Introduction to Fuzzy LBP Result of implementing FLBP method - Fuzzy Local Binary Patterns for Ultrasound Texture Characterization, University of Athens
  • 37. Introduction to Fuzzy LBP Result of implementing FLBP method - Fuzzy Local Binary Patterns for Ultrasound Texture Characterization, University of Athens
  • 38. Brief Review… Flow Chart in Face Recognition with Fuzzy Theory 訓練影像 背景取樣 及前處理 LBP Histogram 測試影像 Fuzzy 特徵向量 特徵向量 SVM訓練 SVM模組Result
  • 39. References FUZZY LBP AND ENTROPY BASED FACE RECOGNITION Facial expression recognition based on local binary patterns final fuzzy LBP for face recognition ppt face recognition system using LBP Improving Local Binary Patterns Techniques by Using Edge Information Fuzzy Local Binary Patterns for Ultrasound Texture Characterization 在不同角度變化下以區域二元特徵為基礎之性別辨識, 范力中, 民國98年