Professional Documents
Culture Documents
ACKNOWLEDGEMENT
It is with greatest pleasure and pride that I present this report before you. At
this moment of triumph, it would be unfair to neglect all those who helped me
in the successful completion of this seminar.
First of all, I would like to place myself at the feet of God Almighty for his
everlasting love and for the blessings & courage that he gave me, which made
it possible to me to see through the turbulence and to set me in the right path.
I would also like to thank our Head of the Department, Mrs. Poonam Pathak
for all the help and guidance that she provided to me.
I am grateful to my seminar guide Ms. Sonam Singh for her guidance and
whole hearted support and very valued constructive criticism that has driven to
complete the seminar successfully.
I would take this opportunity to thank my friends who were always a source of
encouragement.
ABHISHEK SRIVASTAVA
BBDNIIT
Page 1
ABSTRACT
Wouldnt you love to replace password based access control to avoid having
to reset forgotten password and worry about the integrity of your system?
Wouldnt you like to rest secure in comfort that your healthcare system does
not merely on your social security number as proof of your identity for granting
access to your medical records?
Because each of these questions is becoming more and more important,
access to a reliable personal identification is becoming increasingly essential
.Conventional method of identification based on possession of ID cards or
exclusive knowledge like a social security number or a password are not all
together reliable. ID cards can be lost forged or misplaced; passwords can be
forgotten or compromised. But a face is undeniably connected to its owner. It
cannot be borrowed stolen or easily forged.
Face recognition technology may solve this problem since a face is undeniably
connected to its owner expect in the case of identical twins. Its
nontransferable. The system can then compare scans to records stored in a
central or local database or even on a smart card.
BBDNIIT
Page 2
TABLE OF CONTENTS
CHAPTER NO.
TITLE
PAGE NO.
1.
Abstract
2.
Acknowledgement
3.
Table of contents
4.
List of figures
5.
Introduction
1.2
6.
Face recognition
7.
11
8.
13
9.
Performances
15
16
6.1
Data acquisition
16
6.2
Input processing
16
6.3
18
10.
11.
BBDNIIT
1.1
Eigenface
19
19
Page 3
TITLE
Neutral network
PAGE NO.
20
12.
22
13.
24
9.1
24
9.2
25
14.
The software
27
10.1
Detection
27
10.2
Alignment
27
10.3
Normalization
27
10.4
Representation
27
10.5
Matching
28
15.
29
11.1
Advantage
29
11.2
Disadvantage
29
16.
Application
30
12.1
Government Use
31
12.2
Commercial Use
31
17.
Conclusion
33
18.
References
34
BBDNIIT
Page 4
Figure Title
Page No.
1.
2.
10
3.
12
4.
12
5.
14
6.
17
7.
18
8.
21
data table
9.
22
10.
23
Systems
11.
24
12.
26
13.
28
or not
14.
30
application
BBDNIIT
Page 5
1. INTRODUCTION
The information age is quickly revolutionizing the way transactions are
completed. Everyday actions are increasingly being handled electronically,
instead of with pencil and paper or face to face. This growth in electronic
transactions has resulted in a greater demand for fast and accurate user
identification and authentication. Access codes for buildings, banks accounts
and computer systems often use PIN's for identification and security
clearances.
Using the proper PIN gains access, but the user of the PIN is not verified.
When credit and ATM cards are lost or stolen, an unauthorized user can often
come up with the correct personal codes. Despite warning, many people
continue to choose easily guessed PINs and passwords: birthdays, phone
numbers and social security numbers. Recent cases of identity theft have high
lighten the need for methods to prove that someone is truly who he/she claims
to be.
Face recognition technology may solve this problem since a face is undeniably
connected to its owner expect in the case of identical twins. Its
nontransferable. The system can then compare scans to records stored in a
central or local database or even on a smart card.
BBDNIIT
Page 6
BBDNIIT
Page 7
The above two figure shows the Comparison of various biometric features on
the following two basis :
(a) based on zephyr analysis
(b) based on MRTD compatibility
The zephyr analysis shows that how much various biometrics are accurate,
cost effective effortless. The other figure shows the comparison of various
biometrics in weighted percentage, here in this we see that the face
recognition method is best suited among all the other biometrics and hence in
many industries it is used for securing passwords and also used in various
security purpose.
BBDNIIT
Page 8
2. FACE RECOGNITION
THE FACE:
The face is an important part of who you are and how people identify you.
Except in the case of identical twins, the face is arguably a person's most
unique physical characteristics. While humans have the innate ability to
recognize and distinguish different faces for millions of years, computers are
just now catching up.
For face recognition there are two types of comparisons the first is verification.
This is where the system compares the given individual with who that
individual says they are and gives a yes or no decision. The second is
identification. This is where the system compares the given individual to all the
other individuals in the database and gives a ranked list of matches.
All identification or authentication technologies operate using the following four
stages:
a. Capture: A physical or behavioral sample is captured by the system during
enrollment and also in identification or verification process
b. Extraction: unique data is extracted from the sample and a template is
created.
c. Comparison: the template is then compared with a new sample.
d. Match/non match: the system decides if the features extracted from the new
samples are a match or a non match.
Face recognition technology analyze the unique shape, pattern and positioning
of the facial features. Face recognition is very complex technology and is
largely software based. This Biometric Methodology establishes the analysis
framework with tailored algorithms for each type of biometric device. Face
recognition starts with a picture, attempting to find a person in the image. This
can be accomplished using several methods including movement, skin tones,
or blurred human shapes.
The face recognition system locates the head and finally the eyes of the
individual. A matrix is then developed based on the characteristics of the
Individuals face. The method of defining the matrix varies according to the
algorithm (the mathematical process used by the computer to perform the
BBDNIIT
Page 9
BBDNIIT
Page 10
BBDNIIT
Page 11
FIGURE 3
FIGURE 4
BBDNIIT
Page 12
4.
The problem of face recognition has been one of the most prominent areas of
machine vision for about a decade. Current system have been advanced to be
fairly accurate in recognition under constrained scenarios, but extrinsic
imaging parameters such as pose, illumination and facial expression still
cause much difficulty in face recognition.
b. Another
storage and
BBDNIIT
Page 13
Page 14
5.
PERFORMANCE
Page 15
Data acquisition
Input processing
BBDNIIT
Page 16
FIGURE 6
BBDNIIT
Page 17
FIGURE 7
BBDNIIT
Page 18
7.1 Eigenface
As mentioned, one of the goals that the feature extraction routine wishes to
achieve is to increase the efficiency. One simple way to achieve this goal is
using alternative orthonormal bases other than the natural bases. One such
basis is the Karhonen-Loeve (KL). KL bases are formed by the eigenvectors of
the covariance matrix of the face vector X. In the high dimensional "face"
space, only the first few eigenvalues have large values. In other words, energy
mainly locates in the subspace constituted by the first few eigen vectors.
Therefore, a great compression can be achieved by letting those eigenvectors
with
large
eigenvalues to represent the face
vector
where u is the eigenvector and M is usually much smaller than original vector
dimension N. Since the eigenvectors associated with the first few eigen values
look like face images, KL bases are also referred to as eigenfaces. The
eigenface representation is well known in statistics literature as the principal
component analysis. It is optimal in the sense of efficiency: for any given M <
N, the KL representation has the minimum mean square error among all
possible approximations of X that uses M orthonormal vectors. However, it
does not mean that the KL representation is optimal in the sense of
discriminating power, which relies more on the separation between different
faces rather than the spread of all faces.
Pentland's Photobook is one implementation of the eigenface algorithm. It
compresses a facial image with 128x128 pixels (16,384 pixels) into a vector
with only 40 eigenfaces (80 bytes). It recognizes 95% of the 200 faces chosen
from a large database with 7562 facial images (3000 different persons)
BBDNIIT
Page 19
BBDNIIT
Page 20
BBDNIIT
Page 21
BBDNIIT
Page 22
cheekbones
jaw line
chin
Figure 10
BBDNIIT
Page 23
comparing its position in the face space in the positions of known individuals.
Figure 11 : Explanation of face recognition by 2D method
BBDNIIT
Page 24
BBDNIIT
Page 25
The device module acquires initial three dimensional facial data by a3D
surface scanner VGA camera and transfers it to the processor. After receiving
the raw data (the distorted pattern on the target object)
The Data Processing Module performs the image filtering (noise reduction)
and then instantly reconstructs the three dimensional face, smoothing and
interpolating the data to avoid holes and optimize the mesh.
The Feature Extraction Module receives the optimized 3D surface for further
feature vector (biometric template) extraction. During biometric template
extraction ,a proprietary two-stage algorithm is used. At the first stage, the
surface semantic analysis is performed, resulting in the location of key
crania-facial landmarks (points) on the facial surface and the fitting of the
surface patches (eye-sockets, super ciliarys arches, forehead zone,
nasolabial zone, chin zone, etc.) is known, information about local surface
BBDNIIT
Page 26
10.1 Detection
When the system is attached to a video surveillance system, the recognition
software searches the field of view of a video camera for faces. If there is a
face in the view, it is detected within a fraction of a second. A multi-scale
algorithm is used to search for faces in low resolution. (An algorithm is a
program that provides a set of instructions to accomplish a specific task). The
system switches to a high-resolution search only after a head-like shape is
detected.
10.2 Alignment
Once a face is detected, the system determines the head's position, size and
pose. A face needs to be turned at least 35 degrees toward the camera for the
system to register it.
10.3 Normalization
The image of the head is scaled and rotated so that it can be registered and
mapped into an appropriate size and pose. Normalization is performed
regardless of the head's location and distance from the camera. Light does not
impact the normalization process.
BBDNIIT
Page 27
10.4 Representation
The system translates the facial data into a unique code. This coding process
allows for easier comparison of the newly acquired facial data to stored facial
data.
10.5 Matching
The newly acquired facial data is compared to the stored data and (ideally)
linked to at least one stored facial representation. The heart of the facial
recognition system is the Local Feature Analysis (LFA) algorithm. This is the
mathematical technique the system uses to encode faces. The system maps
the face and creates a face print, a unique numerical code for that face. Once
the system has stored a face print, it can compare it to the thousands or
millions of face prints stored in a database. Each face print is stored as an 84byte file. Using facial recognition software, police can zoom in with cameras
and take a snapshot of a face.
BBDNIIT
Page 28
11.2Disadvantage:
a. Face recognition systems cant tell the difference between identical
twins.
b. Face recognition is not perfect and struggles to perform under certain
conditions. Ralph Gross, a researcher at the Carnegie Mellon Robotics
Institute, describes one obstacle related to the viewing angle of the
face: "Face recognition has been getting pretty good at full frontal faces
and 20 degrees off, but as soon as you go towards profile, there've
been problems."
BBDNIIT
Page 29
12. APPLICATIONS
The natural use of face recognition technology is the replacement of PIN,
physical tokens or both needed in automatic authorization or identification
schemes. Additional uses are automation of human identification or role
authentication in such cases where assistance of another human needed in
verifying the ID cards and its beholder.
BBDNIIT
Page 30
12.1Government Use
a. Law Enforcement: Minimizing victim trauma by narrowing mug shot
searches, verifying identify for court records, and comparing school
surveillance camera images to know child molesters.
b. Security/Counterterrorism: Access control, comparing surveillance images
to know terrorist.
c. Immigration: Rapid progression through Customs.
d. In protecting weaponries by giving its authority to selected members only.
12.2Commercial Use
a. Day Care: Verify identity of individuals picking up the children.
b. Residential Security: Alert homeowners of approaching personnel
c. Voter verification: Where eligible politicians are required to verify their
identity during a voting process this is intended to stop proxy voting where
the vote may not go as expected.
d. Banking using ATM: The software is able to quickly verify a customers
face.
e. Physical access control of buildings areas, doors, cars or net access.
f. Facial recognition systems are used to unlock software on mobile devices.
An independently developed Android Marketplace app called Visidon
Applock makes use of the phone's built-in camera to take a picture of the
user. Facial recognition is used to ensure only this person can use certain
apps which they choose to secure.
g. Face detection and facial recognition are integrated into the iPhoto
application for Macintosh, to help users organize and caption their
collections.
BBDNIIT
Page 31
b.
c.
BBDNIIT
Page 32
13.CONCLUSION
Face recognition technologies have been associated generally with very costly
top secure applications. Today the core technologies have evolved and the
cost of equipments is going down dramatically due to the integration and the
increasing processing power. Certain applications of face recognition
technology are now cost effective, reliable and highly accurate. As a result
there are no technological or financial barriers for stepping from the pilot
project to widespread deployment.
Face recognition is a both challenging and important recognition technique.
Among all the biometric techniques, face recognition approach possesses one
great advantage, which is its user-friendliness (or non-intrusiveness). In this
presentation I have covered factors that may affect the performance of the
recognizer, and several face recognition algorithms. I hope this presentation
can provide the readers a better understanding about face recognition, and I
am encouraging the readers to increase their interest in this topic. The
readers who are interested in this topic can go to the references for more
detailed study.
BBDNIIT
Page 33
REFERENCES
1. Electronics for You: - Part 1 April 2001
Part 2 May 2001
2. Electronics World: - December 2002
3. IEEE Intelligent Systems - May/June 2003
4. Modern Television Engineering- Galati R.R
5. www.facereg.com
6. www.Imagestechnology.com
7. www.iee.com
BBDNIIT
Page 34