You are on page 1of 25

A

Technical Seminar Report


On

FACE RECOGINITION SYSTEM


Submitted towards partial fulfilment of the requirement for the award of
Degree of
Bachelor of Technology
In
Information Technology

Submitted to
Vijendra Singh
(Coordinator)

Submitted by
Name: Mansi Ahuja
Er.No:080644
Branch: IT

Mody Institute of Technology & Science, Lakshmangarh


Faculty of Engineering & Technology
Lakshmangarh-332311
April, 2012

ACKNOWLEDGEMENT

I am extremely grateful to the Dean, Prof. Dr. P.K Das, for the guidance and encouragement and
for providing me with best facilities and atmosphere for the creative work.
I would like to thank Head of Department (CSE), Prof. A.K Sharma for the valuable guidance,
care and timely support throughout the seminar work. He has always a constant source of
encouragement.
I would like to thank the Seminar Coordinator Mr.Vijendra Singh, for his valuable suggestions
towards the preparation of my seminar.
I would like to thank my friends and family for their encouragement, which helped me to keep
my spirit alive and to complete this work successfully.

ABSTRACT

Table of Contents

Introduction
Face Recognition System
The face as a biometric feature
o Definition of Biometric
o Example of Biometric
Techniques used for face recognition system
o Traditional technique
o 3D technique
o Skin texture analysis
How the system works?
o Detection
o Alignment
o Measurement
o Representation
o Matching
o Verification & Identification
Technologies Used For Face Recognition
o Eigen faces
o Feature analysis
o Neural network
o Automatic face processing
Implementation of Face Recognition Technology
Advantages and Disadvantages
What makes face recognition so difficult?
Applications
Conclusion
References

INTRODUCTION

People have amazing ability to recognize and remember thousands of faces.


Face is an important part of who you are and how people identify you.
While humans have had the innate ability to recognize and distinguish faces for millions of
years, computers are just catching up.
Face recognition is a fascinating problem with important commercial applications such as mug
shot matching, crowd surveillance & witness face reconstruction.
In computer vision most of the popular face recognition algorithms have been biologically
motivated.
Using these models researchers can quantify the similarity between faces, images whose
projections are close in face space are likely to be from the same individual.
Compare results of these models with human perception to determine whether distance in face
space corresponds to the human notion of facial similarity.
Biometrics is used for that purpose.

FACE RECOGINITION SYSTEM

Human face recognition has drawn considerable attention from the researchers in recent years.
An automatic face recognition system will find many applications in areas such as humancomputer interfaces, model-based video coding and security control systems.
In addition, face recognition has the potential of being a non-intrusive form of biometric
identification.
The difficulties of face recognition lie in the inherent variability arising from face characteristics
(age, gender and race), geometry (distance and viewpoint), image quality (resolution,
illumination, signal to noise ratio), and image content (background, occlusion and disguise).
Because of such complexity, most face recognition systems to date assume a well-controlled
environment and recognize only near frontal faces. However, these constraints need to be
relaxed in practice.
Also, in applications such as video database search, a persons face can appear in arbitrary
backgrounds with unknown size and orientation.
Thus there is a need for robust face recognition systems to handle these uncertainties.

What is biometric?

A biometric is a unique, measurable characteristic of a human being that can be used to


automatically recognize an individual or verify an individual identity. Biometrics can measure
both physiological and behavioral characteristics.
Definition of Biometrics
Any automatically measurable, robust and distinctive physical characteristic or personal trait
that can be used to identify an individual or verify the claimed identity of an individual

This definition requires elaboration:Measurable means that the characteristic or trait can be easily presented to a sensor, located
by it, and converted into a quantifiable, digital format. This measurability allows for matching
to occur in a matter of seconds and makes it an automated process.
Robustness of a biometric refers to the extent to which the characteristic or trait is subject
to significant changes over time. A highly robust biometric does not change significantly
over time while a less robust biometric will change. For example, the iris, which changes
very little over a persons lifetime, is more robust than ones voice.
Distinctiveness is a measure of the variations or differences in the biometric pattern among
the general population. The higher the degree of distinctiveness, the more individual is
the identifier. A low degree of distinctiveness indicates a biometric pattern found frequently
in the general population. The iris and the retina have higher degrees of distinctiveness than
hand or finger geometry.
Examples of Biometric

Iris scan
Retinal scan
Face recognition
Speaker/Voice
Fingerprint
Hand/Finger geometry

Signature verification
Iris Scan
Iris scanning measures the iris pattern in the colored part of the eye, although the iris
color has nothing to do with the biometric. Iris patterns are formed randomly. As a result,
the iris patterns in a persons left and right eyes are different, and so are the iris patterns of
identical twins. Iris scanning can be used quickly for both identification and verification
applications because the iris is highly distinctive and robust.
Retinal Scan
Retinal scans measure the blood vessel patterns in the back of the eye. The device involves
a light source shined into the eye of a user who must be standing very still within inches of
the device. Because users perceive the technology to be somewhat intrusive, retinal scanning
has not gained popularity; currently retinal scanning devices are not commercially available.
Facial Recognition
Facial recognition records the spatial geometry of distinguishing features of the face.
Different vendors use different methods of facial recognition, however, all focus on measures
of key features of the face. Because a persons face can be captured by a camera from some
distance away, facial recognition has a clandestine or covert capability (i.e. the subject does not
necessarily know he has been observed). For this reason, facial recognition has been used in
projects to identify card counters or other undesirables in casinos, shoplifters in stores, criminals
and terrorists in urban areas.

Speaker / Voice Recognition


Voice or speaker recognition uses vocal characteristics to identify individuals using a passphrase. A telephone or microphone can serve as a sensor, which makes it a relatively cheap and

easily deployable technology. However, voice recognition can be affected by environmental


factors such as background noise. This technology has been the focus of considerable efforts on
the part of the telecommunications industry and the U.S. governments intelligence community,
which continue to work on improving reliability.
Fingerprint
The fingerprint biometric is an automated digital version of the old inkand- paper method used
for more than a century for identification, primarily by law enforcement agencies. The biometric
device involves users placing their finger on a platen for the print to be electronically read. The
minutiae are then extracted by the vendors algorithm, which also makes a fingerprint pattern
analysis. Fingerprint biometrics currently have three main application arenas: large-scale
Automated Finger Imaging Systems (AFIS) generally used for law enforcement purposes, fraud
prevention in entitlement programs, and physical and computer access.
Hand/Finger Geometry
Hand or finger geometry is an automated measurement of many dimensions of the hand and
fingers. Neither of these methods takes actual prints of the palm or fingers. Spatial geometry is
examined as the user puts his hand on the sensors surface and uses guiding poles between the
fingers to properly place the hand and initiate the reading. Finger geometry usually measures two
or three fingers. Hand geometry is a well-developed technology that has been thoroughly fieldtested and is easily accepted by users. Because hand and finger geometry have a low degree of
distinctiveness, the technology is not well-suited for identification applications.

Dynamic Signature Verification

We have long used a written signature as a means to acknowledge our identity. Dynamic
signature verification is an automated method of measuring an individuals signature. This
technology examines such dynamics as speed, direction, and pressure of writing; the time that
the stylus is in and out of contact with the paper, the total time taken to make the signature;
and where the stylus is raised from and lowered onto the paper.
Keystroke Dynamics
Keystroke dynamics is an automated method of examining an individuals keystrokes on a
keyboard. This technology examines such dynamics as speed and pressure, the total time taken to
type particular words, and the time elapsed between hitting certain keys. This technologys
algorithms are still being developed to improve robustness and distinctiveness. One potentially
useful application that may emerge is computer access, where this biometric could be
used to verify the computer users identity continuously.
A biometric system refers to the integrated hardware and software used to conduct

biometric

identification and verification.

With identification, the biometric system asks and attempts to answer the question,
Who is X? In an identification application, the biometric device reads a sample and
compares that sample against every record or template in the database. This type of
comparison is called a one-to-many search (1:N). Depending on how the system is
designed, it can make a best match, or it can score possible matches, ranking them in
order of likelihood. Identification applications are common when the goal is to identify
criminals, terrorists, or other wolves in sheeps clothing, particularly through surveillance.

Verification occurs when the biometric system asks and attempts to answer the question,

Is this X? after the user claims to be X. In a verification application, the biometric system
requires input from the user, at which time the user claims his identity via a password,
token, or user name (or any combination of the three). This user input points the system to a
template in the database. The system also requires a biometric sample from the user.
It then compares the sample to or against the user-defined template. This is called a
one-to-onesearch (1:1). The system will either find or fail to find a match between the two.
Verification is commonly used for physical or computer access.

Why choose face recognition over other biometrics?


1. It is non intrusive and requires no physical interaction on behalf of the user.
2. It is accurate and allows for high enrollment and verification rates.
3. It does not require an expert to interpret the comparisons.
4. It can use your existing hardware infrastructure, existing cameras and image capture devices
will work with no problem.
5. You can use existing images without having to re-enroll every user.(e.g.: passports, id cards,
drivers licenses etc..)
6. It is the only biometric that allows performing passive identification in 1 to many
environments (eg: identifying a terrorist in a busy airport terminal).
7. In some cases one may also want to look at deploying multilayered biometric .Example of
multi layered biometric would be the use of both finger print scans and facial scans in one
unified access control devices.

TECHNIQUES USED FOR FACE RECOGINITION:-

1. TRADITIONAL TECHNNIQUE
Some facial recognition algorithms identify faces by extracting landmarks, or features, from an
image of the subject's face. For example, an algorithm may analyze the relative position, size,
and/or shape of the eyes, nose, cheekbones, and jaw. These features are then used to search for
other images with matching features. Other algorithms normalize a gallery of face images and
then compress the face data, only saving the data in the image that is useful for face detection. A
probe image is then compared with the face data.
Face distinguishable landmarks known as NODAL POINTS
Human face has app. 80 nodal points such as: Distance between the eyes
Width of the nose
Depth of the eye sockets
The shape of the cheekbones
The length of the jaw line
These nodal points are measured creating a numeric code, called a FACE PRINT

Traditional Technique
2. 3-D TECHNIQUE

Three-dimensional

face

recognition (3D

face

recognition)

is

modality

of facial

recognition methods in which the three-dimensional geometry of the human face is used. It has
been shown that 3D face recognition methods can achieve significantly higher accuracy than
their 2D counterparts, rivaling fingerprint recognition.
3D face recognition has the potential to achieve better accuracy than its 2D counterpart by
measuring geometry of rigid features on the face. This avoids such pitfalls of 2D face
recognition algorithm as change in lighting, different facial expressions, make-up and head
orientation. Another approach is to use the 3D model to improve accuracy of traditional image
based recognition by transforming the head into a known view. Additionally, most range
scanners acquire both a 3D mesh and the corresponding texture. This allows combining the
output of pure 3D matchers with the more traditional 2D face recognition algorithms, thus
yielding better performance.
The main technological limitation of 3D face recognition methods is the acquisition of 3D
images, which usually requires a range camera. Alternatively, multiple images from different
angles from a common camera may be used to create the 3D model with significant postprocessing. Recently commercial solutions have implemented depth perception by projecting a
grid onto the face and integrating video capture of it into a high resolution 3D model. This allows
for good recognition accuracy with low cost off-the-shelf components.
ADVANTAGES : It is not affected by changes in lighting.
Identify a face from a range of viewing angles.

3-D Technique

SKIN TEXTURE ANALYSIS


Uses the visual details of the skin.
Turns the unique lines, patterns, and spots apparent in a persons skin into a mathematical
space.
Performance in recognizing faces increase up to 20 to 25 %.

Skin Texture Analysis


HOW FACE RECOGINITION SYSTEM WORKS?

Facial recognition software falls into a larger group of technologies known as biometrics. Facial
recognition methods may vary, but they generally involve a series of steps that serve to capture,
analyze and compare your face to a database of stored images. Here is the basic process that is
used by the Face it system to capture and compare images:
The facial recognition is SIX STEP PROCESS:STEP 1. DETECTION
When the system is attached to a video surveillance system, the recognition software searches
the field of view of a video camera for faces. If there is a face in the view, it is detected within a
fraction of a second. A multi-scale algorithm is used to search for faces in low resolution. (An
algorithm is a program that provides a set of instructions to accomplish a specific task). The
system switches to a high-resolution search only after a head-like shape is detected.

ACQUIRING THE IMAGE OF AN INDIVIDUALS FACE


2 WAYS TO AQUIRE IMAGE:1) Digitally scan an existing photograph (2D image)
2) Acquire a live picture of a subject (3D image)

STEP 2. ALIGNMNET

Once a face is detected, the system determines the head's position, size and pose. A face needs to
be turned at least 35 degrees toward the camera for the system to register.

LOCATE IMAGE OF FACE


Software is used to locate the faces in the image that has been obtained
Once it detects a face, the system determines the head's position, size and pose
STEP 3. MEASUREMENT:-

ANALYSIS OF FACIAL IMAGE


software measures face according to is peaks and valleys (nodal points)
focuses on the inner region of the face known as the golden triangle
nodal points are used to make a face print
STEP 4. REPRESENTATION

The system translates the facial data into a unique code also called as template. This coding
process allows for easier comparison of the newly acquired facial data to stored facial data the
template is much smaller than the image from which it is drawn whereas quality facial images
generally require 150-300 kb, the templates are approx. 1300 bytes or less than

1/100th of

original.

The system translates the template into a unique code


This coding gives each template a set of numbers to represent the

features on a

subject's face.
STEP 5. MATCHING
The newly acquired facial data is compared to the stored data and (ideally) linked to atleast one
stored facial representation. The degree of similarity required for verification also known as
threshold can be adjusted for different personnels, pcs, time of the day and other factors.

COMPARISON
the face print created by the software is compared to all face prints the system has stored
in its database.

STEP 6.VERIFICATION & IDENTIFICATION

MATCH OR NO MATCH
software decides whether or not any comparisons from step 5 are
close enough to declare a possible match

Technologies Used For Face Recognition

There are various methods by which facial scan technology recognizes people.
All share certain commonalities such as emphasizing those sections of the face, which are less
susceptible to alteration, including the upper outlines of the eye sockets; areas surrounding ones
cheek bones and side of mouth.
Most technologies are resistant to moderate changes in hairstyle, as they do not utilize areas of
the face located near hairline.
All primary technologies are designed to be robust enough to conduct one to many searches i.e.
to locate single face out of a database of thousands of faces.
There are 4 primary methods employed for facial scanning to identify and recognize and
verify subjects.
1. Eigen faces
2. Feature analysis
3. Neural network
4. Automatic face processing.

1. Eigen face
Eigen face roughly translated, as ones own face is a technology which utilizes 2d global
grayscale images representing distinctive characteristics of a facial image.
Variations of Eigen faces are frequently used as the basis of other face recognition methods.
As suggested by graphic, distinctive characteristics of the entire face are highlighted for use in
future authentication.
The vast majority of faces can be reconstructed by combining features of approximately 100125 Eigen faces.
Upon enrollment, the subjects Eigen face is mapped to a series of numbers (coefficients).

For one to one authentication, in which the image is being used to verify a claimed identity
ones live template is compared against the enrolled template to determine coefficient variation.
The degree of variance from template will determine acceptance or rejection.
For one to many identification, the same principle applies but with a much larger comparison
set.
Like all facial recognition technology, Eigen face technology is best utilized in well-lit, frontal
image capture situation.

2. Feature Analysis
Feature analysis is the most widely used facial recognition technology.
It is related to Eigen face but is more capable of accommodating changes in appearance or
facial aspect (smiling vs. frowning).
It uses LFA (local feature analysis), which can be summarized as an irreducible set of building
elements.

LFA utilizes dozens of features from different regions of the face and also incorporates the
relative location of the features.
The extracted (very small) features are building blocks and both types of blocks and their
arrangement are used to identify or verify.
It anticipates that the slight movement of feature located near ones mouth will be accompanied
by relatively similar movement of adjacent features.
E.G. if a person is smiling then the changes that occur in the features adjacent to mouth are also
taken into consideration.
Since feature analysis is not global representation of the face, it can accommodate angle up to
approximately 25 degree in horizontal plane, approximately 15 degree in vertical plane.
Of course a straightforward video image from a distance of 3 feet will be the most accurate.
Feature analysis is robust enough to perform one to one or one to many searches.

3. Neural Network Mapping Technology


In this technology features from both the faces i.e. the enrollment and verification face-vote on
whether there is a match.
Neural networks employ an algorithm to determine the similarity of unique global features of
live vs. enrolled or reference faces using as much of facial images as possible.
An incorrect match (false match) prompts the matching algorithm to modify the weight it gives
to certain facial features.
This method theoretically leads to an increased ability to identify faces in difficult conditions.
As with all primary technologies neural network facial recognition can do one to one or one to
many.
4. Automatic Face Processing

It is more rudimentary technology using distances and distance ratios between easily acquired
features such as eyes, end of nose and corners of mouth.
Though overall not as robust as Eigen face, feature analysis or neural network automatic face
processing may be more effective in dimly lit, frontal image capture situations.
Also it uses the combined approach of above three techniques.

IMPLEMENTATION OF FACE RECOGNITION TECHNOLOGY


The implementation of face recognition technology includes the following four stages:
Data acquisition
Input processing
Face image classification and decision making

Data acquisition:

The input can be recorded video of the speaker or a still image. A sample of 1 sec duration
consists of a 25 frame video sequence. More than one camera can be used to produce a 3D
representation of the face and to protect against the usage of photographs to gain unauthorized
access.

Input processing:
A pre-processing module locates the eye position and takes care of the surrounding lighting
condition and color variance. First the presence of faces or face in a scene must be detected.
Once the face is detected, it must be localized and Normalization process may be required to
bring the dimensions of the live facial sample in alignment with the one on the template. Some
facial recognition approaches use the whole face while others concentrate on facial components
and/ or regions (such as lips, eyes etc). The appearance of the face can change considerably
during speech and due to facial expressions. In particular the mouth is subjected to fundamental
changes but is also very important source for discriminating faces.

FACE IMAGE CLASSIFICATION


Models are trained specific to a person speech articulate and the way that the person speaks.
Person identification is performed by tracking mouth movements of the talking face and by
estimating the likelihood of each model of having generated the observed sequence of features.
The model with the highest likelihood is chosen as the recognized person. Synergetic computer
are used to classify optical and audio features, respectively. A synergetic computer is a set of
algorithm that simulates synergetic phenomena. In training phase the BIOID creates a prototype
called face print for each person.

DECISION MAKING
A newly recorded pattern is preprocessed and compared with each face print stored in the
database. As comparisons are made, the system assigns a value to the comparison using a scale
of one to ten. If a score is above a predetermined threshold, a match is declared. .
From the image of the face, a particular trait is extracted. It may measure various nodal points of
the face like the distance between the eyes ,width of nose etc. it is fed to a synergetic computer
which consists of algorithm to capture, process, compare the sample with the one stored in the
database. We can also track the lip movement which is also fed to the synergetic computer.
Observing the likelihood each of the samples with the one stored in the database we can accept
or reject the sample.

ADVANTAGES AND DISADVANTAGES

Advantages:
a. There are many benefits to face recognition systems such as its convenience and
Social acceptability. All you need is your picture taken for it to work.
b. Face recognition is easy to use and in many cases it can be performed without a

Person even knowing.


c. Face recognition is also one of the most inexpensive biometric in the market and
Its price should continue to go down.

Face recognition carries different tasks:

Face verification
Face identification
Expression and emotion recognition
Age analysis
Lip reading

You might also like