Professional Documents
Culture Documents
A Project Report
On
Face Recognition in Uncontrolled Environment
Submitted in partial fulfillments
For the award of degree of
BACHELOR OF TECHNOLOGY
In
COMPUTER SCIENCE AND ENGINEERING
(2012 2016)
SUBMITTED TO: SUBMITED BY: -
UNDER GUDANCE: -
CSE Department
CSE Department
Kumar[1135310903]
Dhruv Mishra
[1235310016]
Rajat Awasthi
[1235310032]
Sandeep
Certificate
This is to certify that Dhruv Mishra (1235310016) bonafide students of
VII semester,
branch Computer Science and Engineering of this college have successfully
completed the
project entitled An Evaluation Of Face Recognition System, in partial
fulfillment of the
requirements for the award for degr ee of Bachelor of Engineering in
Computer Science &
Engineering of the Uttar Pradesh Technical University, Lucknow during the
academic year
2012 2016. The project report has been approved as it satisfies the academic
requirements
in respect of project work prescribed for the said degree.
Signature of Guide
(Er. Amrit Agrwal)
Signature of HOD
(Er. Amrit Agarwal)
ACKNOWLEDGEMENT
Our first sincere appreciation and gratitude goes to respected Er. Amrit
Agrwal, Project guide for his guidance, constructive comments, valuable
suggestions and inspirations. During the entire development session, we have
received endless help from him. And also thanks to Er. Saurabh Srivastva for
the valuable guidance and for permitting us to carry out this project.
We also take opportunity to express our sincere thanks and full appreciation to
Er Amrit Agarwal (Head of Department Of Computer Science &
Engineering) Apollo institute of technology Kanpur, who extended their
wholehearted cooperation, moral support and rendering ungrudging assistance
whenever and where ever need aroused .We are very Thankful to them.
Finally, we wish to say thanks to all people of the institute for their kind
cooperation.
Er Amrit Agarwal
(Head of Department)
(C.S.E)
INDEX
Abstract:
Human face detection and recognition play important roles in many
applications such as video surveillance and face image database
management. In our project, we have studied worked on both face
recognition and detection techniques and developed algorithms for
them. In face recognition the algorithm used is PCA (principal
component analysis), MPCA(Multi-linear Principal Component
Analysis) and LDA(Linear Discriminant Analysis) in which we
recognize an unknown test image by comparing it with the known
training images stored in the database as well as give information
regarding the person recognized. These techniques works well under
robust conditions like complex background, different face positions.
These algorithms give different rates of accuracy under different
conditions as experimentally observed.
In face detection, we have developed an algorithm that can detect
human faces from an image. We have taken skin colour as a tool for
detection. This technique works well for Indian faces which have a
specific complexion varying under certain range. We have taken real
life examples and simulated the algorithms in MATLAB successfully.
1 INTRODUCTION:
The face is our primary focus of attention in social life playing an
important role in conveying identity and emotions.
We can recognize a number of faces learned throughout our lifespan and
identify faces at a glance even after years of separation. This skill is
quite robust despite of large variations in visual stimulus due to
changing condition, aging and distractions such as beard, glasses or
changes in hairstyle.
Computational models of face recognition are interesting because they
can contribute not only to theoretical knowledge but also to practical
applications. Computers that detect and recognize faces could be
applied to a wide variety of tasks including criminal identification,
security system, image and film processing, identity verification,
tagging purposes and human-computer interaction. Unfortunately,
developing a computational model of face detection and recognition is
quite difficult because faces are complex, multidimensional and
meaningful visual stimuli.
Face detection is used in many places now a days especially the
websites hosting images like picassa, photobucket and facebook. The
automatically tagging feature adds a new dimension to sharing pictures
among the people who are in the picture and also gives the idea to other
people about who the person is in the image. In our project, we have
studied and implemented a pretty simple but very effective face
detection algorithm which takes human skin colour into account.
Our aim, which we believe we have reached, was to develop a method
of face recognition that is fast, robust, reasonably simple and accurate
with a relatively simple and easy to understand algorithms and
techniques. The examples provided in this thesis are real-time and taken
from our own surroundings.
Biometrics:
Biometrics refers to metrics related to human characteristics. Biometrics authentication
(or realistic authentication) is used in computer science as a form of identification
and access control.[1] It is also used to identify individuals in groups that are under
surveillance.
Biometric identifiers are the distinctive, measurable characteristics used to label and
describe individuals. Biometric identifiers are often categorized as physiological versus
behavioral characteristics. Physiological characteristics are related to the shape of the
body. Examples include, but are not limited to fingerprint, palm veins, face
recognition, DNA, palm print, hand geometry, iris recognition, retina and odour/scent.
Behavioral characteristics are related to the pattern of behavior of a person, including
but not limited to typing rhythm, gait, and voice. Some researchers have coined the
term behaviometrics to describe the latter class of biometrics.
More traditional means of access control include token-based identification systems,
such as a driver's license or passport, and knowledge-based identification systems, such
as a password or personal identification number. Since biometric identifiers are unique
to individuals, they are more reliable in verifying identity than token and knowledgebased methods; however, the collection of biometric identifiers raises privacy concerns
about the ultimate use of this information.
Behavioral:
Examples: signature and voice
Common:
Figure 1:
Others:
Fingerprint Recognition
Face Recognition
Speaker Recognition
Iris Recognition
Hand Geometry
Overview
of some biometrics
Signature
verification
Fingerprint
Iris
DNA
Retina recognition
Thermo grams
Gait
Keystroke
Ear recognition
Skin reflection
Lip motion
Body odor
DNA
Images uploaded to Flickr by (1) Fazen, (2) Sarah Cartwright, (3) ynse, (4) Ben Harris-Roxas.
Keystroke pattern
Others:
Vein Pattern
Sweat Pores
Fingernail Bed
Hand Grip
Brain Wave Pattern
Footprint and Foot Dynamics
Fingerprint Recognition:
An extremely useful biometrics technology since fingerprints have long been
recognized as a primary and accurate identification method.
2. Face Recognition:
Features:
Passive biometrics and does not require a persons
cooperation
Highly complex technology and largely software based.
Primary advantage is that the biometric system is able
to operate hands-free and a users identity is
confirmed by simply staring at the screen.
Details:
Source of data: Single image, video sequence, 3D image and
Near Infrared
Models: weak models of the human face that model face shape
in terms of facial texture
Face appearance
Examples: eigenfaces
Face geometry
Examples: feature-based
method
Example:
3.
Voice Recognition:
Voice recognition is not the same as speech recognition, it is speaker recognition
Considered both physiological and behavioral
Popular and low-cost, but less accurate and sometimes lengthy enrollment
4.
Iris recognition:
Analysis of the iris of the eye, which is the colored ring of tissue that surrounds
the pupil of the eye.
Based on visible features, i.e. rings, furrows, freckles and the corona. Features
and their location are used to form the Iriscodes, which is the digital template.
Widely regarded as the most safe, accurate biometrics technology and capable
of performing 1-to-many matches at extraordinarily high speeds, without
sacrificing accuracy.
Example:
Iris recognition is a
highly mature
technology with a
proven track record in a
number of application
areas.
Used very effectively all
over the world.
5.
Hand geometry:
Hand geometry systems are commonly available in two main forms. Full
hand geometry systems take an image of the entire hand for comparison
while Two Finger readers only image two fingers of the hand.
Hand recognition technology is currently one of the most deployed
biometrics disciplines world wide
2 FACE RECOGNITION:
The face recognition algorithms used here are Principal Component
Analysis(PCA), Multilinear Principal Component Analysis (MPCA) and
Linear Discriminant Analysis(LDA).
Every algorithm has its own advantage. While PCA is the most simple
and fast algorithm, MPCA and LDA which have been applied together
as a single algorithm named MPCALDA provide better results under
complex circumstances like face position, luminance variation etc. Each
of them have been discussed one by one below.
i = i
when subjected to PCA, this large set of vectors seeks a set of M orthogonal
vectors Un, which best describes the distribution of data.
The kth vector Uk is chosen such that
The vector Uk and scalar k are the eigenvectors and eigenvalues respectively of the
covariance matrix
Name
Dhruv Mishra
Age
Sex
Roll No
9 eigenfaces were obtained from the 10 test images. Since the database is not large enough, the
threshold eigenvalue was kept low.