You are on page 1of 36

Face Recognition Using Neural Networks

SOUMYA AWASTHI
ROLL NO: 1000118051
1

TABLE OF CONTENT
INTRODUCTION HOW IS FACE RECOGNITION PERFORMED WHAT ARE NEURAL NETWORKS MODEL OF NEURON PROJECT OBJECTIVE BLOCK DIAGRAM OF FACE RECOGNITION CURVELET& LDA ALGORITHUM LDA RBF NETWORK CLASSIFIER DESIGN RBFN BASED FACE RECOGNITION ANALYSIS OTHER TECHNIQUE-PCA WHY FACE RECOGNITION APPLICATION LIMITATIONS CONCLUSION

INTRODUCTION
A face recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from a video source. One of the ways to do this is by comparing selected facial features from the image and a facial database. Feature to be compared for face recognition: 1. 2. Inter-ocular distance distance between the lips and the nose 3. distance between the nose tip and the eyes 4. distance between the lips and the line joining the two eyes 5. 6. eccentricity of the face width of the lips
3

How is Face Recognition Performed?

Here presents a RBF classifier and LDA based algorithm gives efficient and robust face recognition. In general, there are three important methods for face recognition such asHolistic method, feature-based method and hybrid method.

The holistic method is used in which the input is taken as the whole face region and based on LDA it simplifies a feature set into lower dimension while retaining the characteristics of featureset. 1. Holistic methods. These methods identify a face using the whole face image as input. The main challenge faced by these methods is how to address the extremely small sample problem. 2. Local methods. These methods use the local facial features for recognition. Care should be taken when deciding how to incorporate global configurational information into local face model. 3. Hybrid methods. These methods use both the local and holistic features to recognize a face.
5

These methods have the potential to offer better performance than individual holistic or local methods, since more comprehensive information could be utilized.

The security threats and challenges posed in the current world necessitate the need to have a reliable and robust method to identify and authenticate people. Authentication implies granting people access to a physical area or computer system based on the proof they provide for the identity they claim.

A person can be authenticated based on :


(1) Something the person knows. For example, passwords and PIN numbers. Something the person is. For example, Identity cards and security tokens. Something the person has. For example, biometrics.

(2)

(3)

Biometrics is being used increasingly now-a-days as a reliable method of providing valid authentication over the traditional methods such as passwords and tokens. Biometric authentication relies on identifying people based on certain specific biological characteristics such as fingerprints, face, iris, retina and a persons signature that change less frequently over a period of time. Biometrics can be used along with other categories of authentication, that is, something the person knows or has. This termed as multi-factor authentication.

Face Recognition Technology (FRT) has a variety of potential applications in information security, law enforcement and surveillance, smart cards, access control, among others [1-3]. For this reason, FRT has received significantly increased attention from both the academic and industrial communities during the past twenty years. Several authors have recently surveyed and evaluated the current FRTs from different aspects. For example, Smal et al. and Valentin et al. surveyed the feature-based and the neuralnetwork- based techniques, respectively, Yang et al. reviewed face detection techniques [6], Pantic and Rothkrantz [7] surveyed the automatic facial expression analysis, Daugman [3] pointed out several critical issues involved in recognition system, while comprehensive survey is Zhao et al [1], where techniques are reviewed.
9

an effective face the most recent and possibly from that of many of the latest

This problem, called the one sample per person problem (or, one sample problem for short), is defined as follows. Given a stored database of faces with only one image per person, the goal is to identify a person from the database later in time in any different and unpredictable poses, lighting, etc from the individual image. Due to its challenge and significance for real-world applications, this problem has rapidly emerged as an active research sub-area of FRT in recent years, and many ad hoc techniques have been developed to attack this problem, such as synthesizing virtual samples, localizing the single training image, probabilistic matching and neural network methods.

10

What are Neural Network?


A neural network usually involves a large number of processors operating in parallel, each with its own small sphere of knowledge and access to data in its local memory. A Neural Network is a system of programs and data structures that approximates the operation of the human brain. Typically, a neural network is initially "trained" or fed large amounts of data and rules about data relationships (for example, "A grandfather is older than a person's father"). A program can then tell the network how to behave in response to an external stimulus or can initiate activity on its own.

11

MODEL OF NEURON

12

PROJECT OBJECTIVE
To implement Networks for Recognition. the the concept of Neural purpose of Face

Further Recognition of unclear images by removing the background noise. To improve the accuracy of Face recognition by reducing the number of false rejection and false acceptance errors. Recognition of images captured while in motion. Recognition of faces in videos (motion picture).

13

BLOCK DIAGRAM OF FACE RECOGNITION SYSTEM

14

Brief Review of Curvelets And LDA Algorithm


Curvelet transform used to extract features from facial images, and then uses RBFN to classify facial images basedon features. In a two dimensional image two adjacent regions can often have differing pixel values. Such a gray scale image will have a lot of edges i.e. discontinuity along a general curve and consequently curvelet transform will capture this edge information.

15

Linear Discriminant Analysis


LDA is a common statistical technique to find out the patterns in high dimensional data [8].Feature extraction, also called dimensionality reduction is done by LDA for three main reasons they are: i) To reduce dimension of the data to more tractable limits. ii) To capture salient class-specific features of the data. iii) To eliminate redundancy.

16

RBF NETWORK STRUCTURE


RBFN contains one input layer and one output layer with a single hidden layer as shown in figure.

17

An RBF neural network structure is similar to a traditional three-layer feed forward neural network. The construction of the RBF neural network involves three different layers with feed forward architecture. The input layer of this network is a set of n units, which accept the elements of an n dimensional input feature vector. The input units are fully connected to the hidden layer with r hidden units . Connections between the input and hidden layers have unit weights and, as a result, do not have to be trained. The goal of the hidden layer is to cluster the data and reduce its dimensionality. In this structure hidden layer is named RBF units. The RBF units are also fully connected to the output layer. The output layer supplies the response of neural network to the activation pattern applied to the input layer . The transformation from the input space to the RBF-unit space is nonlinear, whereas the transformation from the RBF unit space to the output space is linear.

18

CLASSIFIER DESIGN
Neural networks have been employed and compared to conventional classifiers for a number of classification problems. The results shows that the accuracy of the neural network approaches equivalent to, or slightly better than, other methods. It is due to the simplicity, generality andgood learning ability of the neural networks[4]. RBFN have found to be very attractive for many engineering problem because: (1) they are universal approximators, (2) they have a very compact topology and (3) their learning speed is very fast because of their locally tuned neurons. Therefore the RBF neural networks serve as an excellent role for pattern applications carried out to make the learning process, this type of classification is faster than the other network models.

19

RBFN based Face Recognition

20

ANALYSIS OF THE RESULT


In this features are extracted first and dimension reduction is carried out from facial images .RBFN is used to classify the facial images . figure shows that out of 200 images have been used most of them recognized by RBFN and the best average recognition rate is 98.6% .The performance of recognition rate is better than the other techniques.

21

22

No of Images

Acceptance Ratio (%)

Execution Time (Seconds)

Recognition Rate (%)

LDA

Curvelets

LDA + Curvelets with RBFN

LDA Curvelets

LDA + Curvelets with RBFN

LDA

Curvelets

LDA + Curvelets with RBFN

40 60 120 160 200

92.4 90.6 87.9 85.7 83.5

93.1 91.2 88.9 86.9 84.9

96.5 94.3 92.8 90.2 87.1

38 46 55 67 74

37 44 54 65 70

36 43 50 58 67

87 88 90 91 92

88 90 91 93 95

92.1 94.3 95.4 97.7 98.6

The acceptance ratio of LDA is 83.5% compared with curvelets acceptance ratio is high that is 84.9%.The proposed method acceptance ratio is 87.1%. The recognition rate of LDA is 92% compared with curvelets is high recognition rate that is 95% represented The proposed method

23

recognition rate is 98.6% it shows the figure it is better than other methods.

24

Other technique used for face recognition


We have discussed one technique, one more technique is Neural and PCA based algorithm for efficient and robust face recognition This is based on principal component-analysis (PCA) technique, which is used to simplify a dataset into lower dimension while retaining the characteristics of dataset. Pre-processing, Principal component analysis and Back Propagation Neural Algorithm are the major implementations of this paper. Preprocessing is done for two purposes-

(i) To reduce noise and possible convolute effects of interfering system,

25

(ii) To transform the image into a different space where classification may prove easier by exploitation of certain features.

PCA is a common statistical technique for finding the patterns in high dimensional datas Feature extraction, also called Dimensionality Reduction, is done by PCA for a three main purposes like i) To reduce dimension of the data to more tractable limits.

ii) To capture salient class-specific features of the data, iii) To eliminate redundancy

26

All these processes are implemented for Face Recognition, based on the basic block diagram as shown in fig

27

PRINCIPAL COMPONENT ANALYSIS


PCA is a popular technique, to derive a set of features for both face recognition.

Any particular face can be (i) Economically represented along the eigen pictures coordinate space, and

(ii)

Approximately reconstructed using a small collection of Eigen pictures.

To do this, a face image is projected to several face templates called eigenfaces

28

PCA Algorithm:(i) Acquire an initial set of M face images (the training set) & Calculate the eigen-faces from the training set, keeping only M' eigenfaces that correspond to the highest eigenvalue

(ii) Calculate the corresponding distribution in M'dimensional weight space for each known individual, and calculate a set of weights based on the input image

(iii) Classify the weight pattern as either a known person or as unknown, according to its distance to the closest weight vector of a known person

29

Back Propagation Neural Networks Algorithm:Here learning process in Back propagation requires pairs of input and target vectors. The output vector o is compared with target vectort. In case of difference of o andtvectors, the weights are adjusted to minimize the difference. Initially random weights and thresholds are assigned to the network. These weights are updated every iteration in order to minimize the mean square error between the output vector and the target vector.

30

Experimentation and Results


One of the images as shown in fig 4a is taken as the Input image. The mean image and reconstructed output image by PCA, is as shown in fig 4b and 4c.

In BPNN, a training set of 50 images is as shown in fig 5a and the Eigen faces and recognized output image are as shown in fig 5b and 5c.

31

Both of the techniques are being used for facial recognition. Both play an important role in face recognition . So , its not easy to say which one is better of the two.
32

WHY FACIAL RECOGNITION


Facial recognition offers several advantages over other biometric identification and authentication techniques, as facial recognition system have the following advantages :

(1) Non-intrusive and hence more convenient. (2) Hygienic as no physical contact is involved. (3) Easy to use as only need to face a camera.

These advantages make facial recognition suitable for a wide range of applications across industry verticals
33

Applications of Face Recognition


Passport control at terminals in airports. Participant identification in meetings. System access control. Scanning for criminal.

34

LIMITATIONS
Not so robust against extreme variations in expression. Cannot be used for faces with lateral head rotation. Face recognition alone as of now, cannot be successfully used for authentication but can be used for identification and classification. Identical twins cannot be distinguished using face recognition

35

CONCLUSION
Facial recognition is an upcoming area. There are a lot of potential scenarios where it can be used. Considering this, it is not completely reliable to be used as an independent technique for authentication. Facial recognition may be thrown out of gear with plastic surgery, so it might need to be combined with other technologies such as Iris scan to improve reliability. With improvement in tools and technologies, it is only a matter of time before the incidence of false identification of subjects is reduced to an acceptable level to make facial recognition more useful.

36

You might also like