Professional Documents
Culture Documents
SOUMYA AWASTHI
ROLL NO: 1000118051
1
TABLE OF CONTENT
INTRODUCTION HOW IS FACE RECOGNITION PERFORMED WHAT ARE NEURAL NETWORKS MODEL OF NEURON PROJECT OBJECTIVE BLOCK DIAGRAM OF FACE RECOGNITION CURVELET& LDA ALGORITHUM LDA RBF NETWORK CLASSIFIER DESIGN RBFN BASED FACE RECOGNITION ANALYSIS OTHER TECHNIQUE-PCA WHY FACE RECOGNITION APPLICATION LIMITATIONS CONCLUSION
INTRODUCTION
A face recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from a video source. One of the ways to do this is by comparing selected facial features from the image and a facial database. Feature to be compared for face recognition: 1. 2. Inter-ocular distance distance between the lips and the nose 3. distance between the nose tip and the eyes 4. distance between the lips and the line joining the two eyes 5. 6. eccentricity of the face width of the lips
3
Here presents a RBF classifier and LDA based algorithm gives efficient and robust face recognition. In general, there are three important methods for face recognition such asHolistic method, feature-based method and hybrid method.
The holistic method is used in which the input is taken as the whole face region and based on LDA it simplifies a feature set into lower dimension while retaining the characteristics of featureset. 1. Holistic methods. These methods identify a face using the whole face image as input. The main challenge faced by these methods is how to address the extremely small sample problem. 2. Local methods. These methods use the local facial features for recognition. Care should be taken when deciding how to incorporate global configurational information into local face model. 3. Hybrid methods. These methods use both the local and holistic features to recognize a face.
5
These methods have the potential to offer better performance than individual holistic or local methods, since more comprehensive information could be utilized.
The security threats and challenges posed in the current world necessitate the need to have a reliable and robust method to identify and authenticate people. Authentication implies granting people access to a physical area or computer system based on the proof they provide for the identity they claim.
(2)
(3)
Biometrics is being used increasingly now-a-days as a reliable method of providing valid authentication over the traditional methods such as passwords and tokens. Biometric authentication relies on identifying people based on certain specific biological characteristics such as fingerprints, face, iris, retina and a persons signature that change less frequently over a period of time. Biometrics can be used along with other categories of authentication, that is, something the person knows or has. This termed as multi-factor authentication.
Face Recognition Technology (FRT) has a variety of potential applications in information security, law enforcement and surveillance, smart cards, access control, among others [1-3]. For this reason, FRT has received significantly increased attention from both the academic and industrial communities during the past twenty years. Several authors have recently surveyed and evaluated the current FRTs from different aspects. For example, Smal et al. and Valentin et al. surveyed the feature-based and the neuralnetwork- based techniques, respectively, Yang et al. reviewed face detection techniques [6], Pantic and Rothkrantz [7] surveyed the automatic facial expression analysis, Daugman [3] pointed out several critical issues involved in recognition system, while comprehensive survey is Zhao et al [1], where techniques are reviewed.
9
an effective face the most recent and possibly from that of many of the latest
This problem, called the one sample per person problem (or, one sample problem for short), is defined as follows. Given a stored database of faces with only one image per person, the goal is to identify a person from the database later in time in any different and unpredictable poses, lighting, etc from the individual image. Due to its challenge and significance for real-world applications, this problem has rapidly emerged as an active research sub-area of FRT in recent years, and many ad hoc techniques have been developed to attack this problem, such as synthesizing virtual samples, localizing the single training image, probabilistic matching and neural network methods.
10
11
MODEL OF NEURON
12
PROJECT OBJECTIVE
To implement Networks for Recognition. the the concept of Neural purpose of Face
Further Recognition of unclear images by removing the background noise. To improve the accuracy of Face recognition by reducing the number of false rejection and false acceptance errors. Recognition of images captured while in motion. Recognition of faces in videos (motion picture).
13
14
15
16
17
An RBF neural network structure is similar to a traditional three-layer feed forward neural network. The construction of the RBF neural network involves three different layers with feed forward architecture. The input layer of this network is a set of n units, which accept the elements of an n dimensional input feature vector. The input units are fully connected to the hidden layer with r hidden units . Connections between the input and hidden layers have unit weights and, as a result, do not have to be trained. The goal of the hidden layer is to cluster the data and reduce its dimensionality. In this structure hidden layer is named RBF units. The RBF units are also fully connected to the output layer. The output layer supplies the response of neural network to the activation pattern applied to the input layer . The transformation from the input space to the RBF-unit space is nonlinear, whereas the transformation from the RBF unit space to the output space is linear.
18
CLASSIFIER DESIGN
Neural networks have been employed and compared to conventional classifiers for a number of classification problems. The results shows that the accuracy of the neural network approaches equivalent to, or slightly better than, other methods. It is due to the simplicity, generality andgood learning ability of the neural networks[4]. RBFN have found to be very attractive for many engineering problem because: (1) they are universal approximators, (2) they have a very compact topology and (3) their learning speed is very fast because of their locally tuned neurons. Therefore the RBF neural networks serve as an excellent role for pattern applications carried out to make the learning process, this type of classification is faster than the other network models.
19
20
21
22
No of Images
LDA
Curvelets
LDA Curvelets
LDA
Curvelets
38 46 55 67 74
37 44 54 65 70
36 43 50 58 67
87 88 90 91 92
88 90 91 93 95
The acceptance ratio of LDA is 83.5% compared with curvelets acceptance ratio is high that is 84.9%.The proposed method acceptance ratio is 87.1%. The recognition rate of LDA is 92% compared with curvelets is high recognition rate that is 95% represented The proposed method
23
recognition rate is 98.6% it shows the figure it is better than other methods.
24
25
(ii) To transform the image into a different space where classification may prove easier by exploitation of certain features.
PCA is a common statistical technique for finding the patterns in high dimensional datas Feature extraction, also called Dimensionality Reduction, is done by PCA for a three main purposes like i) To reduce dimension of the data to more tractable limits.
ii) To capture salient class-specific features of the data, iii) To eliminate redundancy
26
All these processes are implemented for Face Recognition, based on the basic block diagram as shown in fig
27
Any particular face can be (i) Economically represented along the eigen pictures coordinate space, and
(ii)
28
PCA Algorithm:(i) Acquire an initial set of M face images (the training set) & Calculate the eigen-faces from the training set, keeping only M' eigenfaces that correspond to the highest eigenvalue
(ii) Calculate the corresponding distribution in M'dimensional weight space for each known individual, and calculate a set of weights based on the input image
(iii) Classify the weight pattern as either a known person or as unknown, according to its distance to the closest weight vector of a known person
29
Back Propagation Neural Networks Algorithm:Here learning process in Back propagation requires pairs of input and target vectors. The output vector o is compared with target vectort. In case of difference of o andtvectors, the weights are adjusted to minimize the difference. Initially random weights and thresholds are assigned to the network. These weights are updated every iteration in order to minimize the mean square error between the output vector and the target vector.
30
In BPNN, a training set of 50 images is as shown in fig 5a and the Eigen faces and recognized output image are as shown in fig 5b and 5c.
31
Both of the techniques are being used for facial recognition. Both play an important role in face recognition . So , its not easy to say which one is better of the two.
32
(1) Non-intrusive and hence more convenient. (2) Hygienic as no physical contact is involved. (3) Easy to use as only need to face a camera.
These advantages make facial recognition suitable for a wide range of applications across industry verticals
33
34
LIMITATIONS
Not so robust against extreme variations in expression. Cannot be used for faces with lateral head rotation. Face recognition alone as of now, cannot be successfully used for authentication but can be used for identification and classification. Identical twins cannot be distinguished using face recognition
35
CONCLUSION
Facial recognition is an upcoming area. There are a lot of potential scenarios where it can be used. Considering this, it is not completely reliable to be used as an independent technique for authentication. Facial recognition may be thrown out of gear with plastic surgery, so it might need to be combined with other technologies such as Iris scan to improve reliability. With improvement in tools and technologies, it is only a matter of time before the incidence of false identification of subjects is reduced to an acceptable level to make facial recognition more useful.
36