Professional Documents
Culture Documents
Face Recoginition System
Face Recoginition System
Submitted to
Vijendra Singh
(Coordinator)
Submitted by
Name: Mansi Ahuja
Er.No:080644
Branch: IT
ACKNOWLEDGEMENT
I am extremely grateful to the Dean, Prof. Dr. P.K Das, for the guidance and encouragement and
for providing me with best facilities and atmosphere for the creative work.
I would like to thank Head of Department (CSE), Prof. A.K Sharma for the valuable guidance,
care and timely support throughout the seminar work. He has always a constant source of
encouragement.
I would like to thank the Seminar Coordinator Mr.Vijendra Singh, for his valuable suggestions
towards the preparation of my seminar.
I would like to thank my friends and family for their encouragement, which helped me to keep
my spirit alive and to complete this work successfully.
ABSTRACT
Table of Contents
Introduction
Face Recognition System
The face as a biometric feature
o Definition of Biometric
o Example of Biometric
Techniques used for face recognition system
o Traditional technique
o 3D technique
o Skin texture analysis
How the system works?
o Detection
o Alignment
o Measurement
o Representation
o Matching
o Verification & Identification
Technologies Used For Face Recognition
o Eigen faces
o Feature analysis
o Neural network
o Automatic face processing
Implementation of Face Recognition Technology
Advantages and Disadvantages
What makes face recognition so difficult?
Applications
Conclusion
References
INTRODUCTION
Human face recognition has drawn considerable attention from the researchers in recent years.
An automatic face recognition system will find many applications in areas such as humancomputer interfaces, model-based video coding and security control systems.
In addition, face recognition has the potential of being a non-intrusive form of biometric
identification.
The difficulties of face recognition lie in the inherent variability arising from face characteristics
(age, gender and race), geometry (distance and viewpoint), image quality (resolution,
illumination, signal to noise ratio), and image content (background, occlusion and disguise).
Because of such complexity, most face recognition systems to date assume a well-controlled
environment and recognize only near frontal faces. However, these constraints need to be
relaxed in practice.
Also, in applications such as video database search, a persons face can appear in arbitrary
backgrounds with unknown size and orientation.
Thus there is a need for robust face recognition systems to handle these uncertainties.
What is biometric?
This definition requires elaboration:Measurable means that the characteristic or trait can be easily presented to a sensor, located
by it, and converted into a quantifiable, digital format. This measurability allows for matching
to occur in a matter of seconds and makes it an automated process.
Robustness of a biometric refers to the extent to which the characteristic or trait is subject
to significant changes over time. A highly robust biometric does not change significantly
over time while a less robust biometric will change. For example, the iris, which changes
very little over a persons lifetime, is more robust than ones voice.
Distinctiveness is a measure of the variations or differences in the biometric pattern among
the general population. The higher the degree of distinctiveness, the more individual is
the identifier. A low degree of distinctiveness indicates a biometric pattern found frequently
in the general population. The iris and the retina have higher degrees of distinctiveness than
hand or finger geometry.
Examples of Biometric
Iris scan
Retinal scan
Face recognition
Speaker/Voice
Fingerprint
Hand/Finger geometry
Signature verification
Iris Scan
Iris scanning measures the iris pattern in the colored part of the eye, although the iris
color has nothing to do with the biometric. Iris patterns are formed randomly. As a result,
the iris patterns in a persons left and right eyes are different, and so are the iris patterns of
identical twins. Iris scanning can be used quickly for both identification and verification
applications because the iris is highly distinctive and robust.
Retinal Scan
Retinal scans measure the blood vessel patterns in the back of the eye. The device involves
a light source shined into the eye of a user who must be standing very still within inches of
the device. Because users perceive the technology to be somewhat intrusive, retinal scanning
has not gained popularity; currently retinal scanning devices are not commercially available.
Facial Recognition
Facial recognition records the spatial geometry of distinguishing features of the face.
Different vendors use different methods of facial recognition, however, all focus on measures
of key features of the face. Because a persons face can be captured by a camera from some
distance away, facial recognition has a clandestine or covert capability (i.e. the subject does not
necessarily know he has been observed). For this reason, facial recognition has been used in
projects to identify card counters or other undesirables in casinos, shoplifters in stores, criminals
and terrorists in urban areas.
We have long used a written signature as a means to acknowledge our identity. Dynamic
signature verification is an automated method of measuring an individuals signature. This
technology examines such dynamics as speed, direction, and pressure of writing; the time that
the stylus is in and out of contact with the paper, the total time taken to make the signature;
and where the stylus is raised from and lowered onto the paper.
Keystroke Dynamics
Keystroke dynamics is an automated method of examining an individuals keystrokes on a
keyboard. This technology examines such dynamics as speed and pressure, the total time taken to
type particular words, and the time elapsed between hitting certain keys. This technologys
algorithms are still being developed to improve robustness and distinctiveness. One potentially
useful application that may emerge is computer access, where this biometric could be
used to verify the computer users identity continuously.
A biometric system refers to the integrated hardware and software used to conduct
biometric
With identification, the biometric system asks and attempts to answer the question,
Who is X? In an identification application, the biometric device reads a sample and
compares that sample against every record or template in the database. This type of
comparison is called a one-to-many search (1:N). Depending on how the system is
designed, it can make a best match, or it can score possible matches, ranking them in
order of likelihood. Identification applications are common when the goal is to identify
criminals, terrorists, or other wolves in sheeps clothing, particularly through surveillance.
Verification occurs when the biometric system asks and attempts to answer the question,
Is this X? after the user claims to be X. In a verification application, the biometric system
requires input from the user, at which time the user claims his identity via a password,
token, or user name (or any combination of the three). This user input points the system to a
template in the database. The system also requires a biometric sample from the user.
It then compares the sample to or against the user-defined template. This is called a
one-to-onesearch (1:1). The system will either find or fail to find a match between the two.
Verification is commonly used for physical or computer access.
1. TRADITIONAL TECHNNIQUE
Some facial recognition algorithms identify faces by extracting landmarks, or features, from an
image of the subject's face. For example, an algorithm may analyze the relative position, size,
and/or shape of the eyes, nose, cheekbones, and jaw. These features are then used to search for
other images with matching features. Other algorithms normalize a gallery of face images and
then compress the face data, only saving the data in the image that is useful for face detection. A
probe image is then compared with the face data.
Face distinguishable landmarks known as NODAL POINTS
Human face has app. 80 nodal points such as: Distance between the eyes
Width of the nose
Depth of the eye sockets
The shape of the cheekbones
The length of the jaw line
These nodal points are measured creating a numeric code, called a FACE PRINT
Traditional Technique
2. 3-D TECHNIQUE
Three-dimensional
face
recognition (3D
face
recognition)
is
modality
of facial
recognition methods in which the three-dimensional geometry of the human face is used. It has
been shown that 3D face recognition methods can achieve significantly higher accuracy than
their 2D counterparts, rivaling fingerprint recognition.
3D face recognition has the potential to achieve better accuracy than its 2D counterpart by
measuring geometry of rigid features on the face. This avoids such pitfalls of 2D face
recognition algorithm as change in lighting, different facial expressions, make-up and head
orientation. Another approach is to use the 3D model to improve accuracy of traditional image
based recognition by transforming the head into a known view. Additionally, most range
scanners acquire both a 3D mesh and the corresponding texture. This allows combining the
output of pure 3D matchers with the more traditional 2D face recognition algorithms, thus
yielding better performance.
The main technological limitation of 3D face recognition methods is the acquisition of 3D
images, which usually requires a range camera. Alternatively, multiple images from different
angles from a common camera may be used to create the 3D model with significant postprocessing. Recently commercial solutions have implemented depth perception by projecting a
grid onto the face and integrating video capture of it into a high resolution 3D model. This allows
for good recognition accuracy with low cost off-the-shelf components.
ADVANTAGES : It is not affected by changes in lighting.
Identify a face from a range of viewing angles.
3-D Technique
Facial recognition software falls into a larger group of technologies known as biometrics. Facial
recognition methods may vary, but they generally involve a series of steps that serve to capture,
analyze and compare your face to a database of stored images. Here is the basic process that is
used by the Face it system to capture and compare images:
The facial recognition is SIX STEP PROCESS:STEP 1. DETECTION
When the system is attached to a video surveillance system, the recognition software searches
the field of view of a video camera for faces. If there is a face in the view, it is detected within a
fraction of a second. A multi-scale algorithm is used to search for faces in low resolution. (An
algorithm is a program that provides a set of instructions to accomplish a specific task). The
system switches to a high-resolution search only after a head-like shape is detected.
STEP 2. ALIGNMNET
Once a face is detected, the system determines the head's position, size and pose. A face needs to
be turned at least 35 degrees toward the camera for the system to register.
The system translates the facial data into a unique code also called as template. This coding
process allows for easier comparison of the newly acquired facial data to stored facial data the
template is much smaller than the image from which it is drawn whereas quality facial images
generally require 150-300 kb, the templates are approx. 1300 bytes or less than
1/100th of
original.
features on a
subject's face.
STEP 5. MATCHING
The newly acquired facial data is compared to the stored data and (ideally) linked to atleast one
stored facial representation. The degree of similarity required for verification also known as
threshold can be adjusted for different personnels, pcs, time of the day and other factors.
COMPARISON
the face print created by the software is compared to all face prints the system has stored
in its database.
MATCH OR NO MATCH
software decides whether or not any comparisons from step 5 are
close enough to declare a possible match
There are various methods by which facial scan technology recognizes people.
All share certain commonalities such as emphasizing those sections of the face, which are less
susceptible to alteration, including the upper outlines of the eye sockets; areas surrounding ones
cheek bones and side of mouth.
Most technologies are resistant to moderate changes in hairstyle, as they do not utilize areas of
the face located near hairline.
All primary technologies are designed to be robust enough to conduct one to many searches i.e.
to locate single face out of a database of thousands of faces.
There are 4 primary methods employed for facial scanning to identify and recognize and
verify subjects.
1. Eigen faces
2. Feature analysis
3. Neural network
4. Automatic face processing.
1. Eigen face
Eigen face roughly translated, as ones own face is a technology which utilizes 2d global
grayscale images representing distinctive characteristics of a facial image.
Variations of Eigen faces are frequently used as the basis of other face recognition methods.
As suggested by graphic, distinctive characteristics of the entire face are highlighted for use in
future authentication.
The vast majority of faces can be reconstructed by combining features of approximately 100125 Eigen faces.
Upon enrollment, the subjects Eigen face is mapped to a series of numbers (coefficients).
For one to one authentication, in which the image is being used to verify a claimed identity
ones live template is compared against the enrolled template to determine coefficient variation.
The degree of variance from template will determine acceptance or rejection.
For one to many identification, the same principle applies but with a much larger comparison
set.
Like all facial recognition technology, Eigen face technology is best utilized in well-lit, frontal
image capture situation.
2. Feature Analysis
Feature analysis is the most widely used facial recognition technology.
It is related to Eigen face but is more capable of accommodating changes in appearance or
facial aspect (smiling vs. frowning).
It uses LFA (local feature analysis), which can be summarized as an irreducible set of building
elements.
LFA utilizes dozens of features from different regions of the face and also incorporates the
relative location of the features.
The extracted (very small) features are building blocks and both types of blocks and their
arrangement are used to identify or verify.
It anticipates that the slight movement of feature located near ones mouth will be accompanied
by relatively similar movement of adjacent features.
E.G. if a person is smiling then the changes that occur in the features adjacent to mouth are also
taken into consideration.
Since feature analysis is not global representation of the face, it can accommodate angle up to
approximately 25 degree in horizontal plane, approximately 15 degree in vertical plane.
Of course a straightforward video image from a distance of 3 feet will be the most accurate.
Feature analysis is robust enough to perform one to one or one to many searches.
It is more rudimentary technology using distances and distance ratios between easily acquired
features such as eyes, end of nose and corners of mouth.
Though overall not as robust as Eigen face, feature analysis or neural network automatic face
processing may be more effective in dimly lit, frontal image capture situations.
Also it uses the combined approach of above three techniques.
Data acquisition:
The input can be recorded video of the speaker or a still image. A sample of 1 sec duration
consists of a 25 frame video sequence. More than one camera can be used to produce a 3D
representation of the face and to protect against the usage of photographs to gain unauthorized
access.
Input processing:
A pre-processing module locates the eye position and takes care of the surrounding lighting
condition and color variance. First the presence of faces or face in a scene must be detected.
Once the face is detected, it must be localized and Normalization process may be required to
bring the dimensions of the live facial sample in alignment with the one on the template. Some
facial recognition approaches use the whole face while others concentrate on facial components
and/ or regions (such as lips, eyes etc). The appearance of the face can change considerably
during speech and due to facial expressions. In particular the mouth is subjected to fundamental
changes but is also very important source for discriminating faces.
DECISION MAKING
A newly recorded pattern is preprocessed and compared with each face print stored in the
database. As comparisons are made, the system assigns a value to the comparison using a scale
of one to ten. If a score is above a predetermined threshold, a match is declared. .
From the image of the face, a particular trait is extracted. It may measure various nodal points of
the face like the distance between the eyes ,width of nose etc. it is fed to a synergetic computer
which consists of algorithm to capture, process, compare the sample with the one stored in the
database. We can also track the lip movement which is also fed to the synergetic computer.
Observing the likelihood each of the samples with the one stored in the database we can accept
or reject the sample.
Advantages:
a. There are many benefits to face recognition systems such as its convenience and
Social acceptability. All you need is your picture taken for it to work.
b. Face recognition is easy to use and in many cases it can be performed without a
Face verification
Face identification
Expression and emotion recognition
Age analysis
Lip reading