You are on page 1of 20

FACETEC

Department of Computer Science & Engineering Page | 1



CONTENTS


Page no.

CERTIFICATE ii
ACKNOWLEDGEMENT.. iii
ABSTRACT iv
LIST OF FIGURES vi
LIST OF ABBREVIATIONS. vii

1 Introduction.. 2
2 Existing System 5
3 The Proposed System... 7
4 Project Design.. 12
4.1 User Requirements... 13
4.2 System Requirements... 15
4.3 Data Flow Diagram.. 17
4.4 Use Case Diagram 18
5 References 19



FACETEC
Department of Computer Science & Engineering Page | 2











INTRODUCTION




















FACETEC
Department of Computer Science & Engineering Page | 3

1. INTRODUCTION


A facial recognition device is one that views an image or video of a person and
compares it to one that is in the database. It does this by comparing structure, shape and
proportions of the face, distance between the eyes, nose, mouth and jaw, upper outlines of the
eye sockets, the sides of the mouth, location of the nose and eyes, and the area circumventing
the check bones.

Upon enrolment in a facial recognition program, several pictures are taken of the
subject at different angles and with different facial expressions. At time of verification and
identification the subject stands in front of the camera for a few seconds, and then the image
is compared to those that have been previously recorded.

As mobile phones are becoming increasingly potent, security of the data stored in
mobile phones becomes very consequential. Most of the current phones have passwords to
address security. However, a face apperception scheme is much more secure and flexible as it
provides distinctive print to gain access and additionally the utilizer need not recollect
passwords. Even though the face apperception systems have already been implemented on
the DROID phones they are not efficient and precise. The goal of this project is to implement
a face apperception application on the DROID phone, which will be efficient and precise and
could be habituated to unlock the phone or sanction a transaction when the registered utilizer
is apperceived.

FACETEC
Department of Computer Science & Engineering Page | 4

There are an abundance of methods used to detect face and recognize it like PCA,
LBP, LDA, EP, Template matching, Morphological processing algorithms etc. This project
is utilizing 2D-PCA algorithm for describing face as it is much more efficient than PCA
algorithm. For face detection we will be utilizing Haar-Cascade algorithm because it is the
most efficient algorithm having an efficiency of 95%. Many algorithms are available for
face recognition like LBP, LDA, EBGM, HMM, EP etc. but the main drawback of all the
above verbalized algorithms are they have a low precision rate so as to surmount this we are
utilizing LDP. This project represents the face recognition approach that employs the local
directional pattern descriptor and two-dimensional principal analysis algorithms to achieve
enhanced recognition accuracy. It utilizes the transformed image obtained from local
directional pattern descriptor as the direct input image of two-dimensional principal analysis
algorithms, unlike that most of previous works employed the local pattern descriptors to
acquire the histogram features.
Apart from all this we are additionally providing a facility for detection of thefts and
an auto alarming system which will be sending a system generated email to the utilizer with
the photo and the GPS coordinates of the person trying to authenticate or utilize the mobile
phone. Our system will also have provisions to preserve password in cases where taking a
photo is not possible.









FACETEC
Department of Computer Science & Engineering Page | 5


















EXISTING SYSTEM



















FACETEC
Department of Computer Science & Engineering Page | 6


2. EXISTING SYSTEM


There are some inhibitions to the existing face recognition systems. If background
color in an image is akin to the skin color, then the color segmentation algorithm cannot
distinguish. In the template-matching algorithm, the results are dependent on the standard
template culled (orientation etc.), illumination conditions etc. Also it doesn't perform well
while detecting faces of people from concrete ethnic inceptions. Eigenface and Fisherface
algorithms are then employed and tested for face apperception. The tests show that a total
correct recognition/rejection rate of 84.3% with Eigenface is achieved.

The subsisting systems are not able to identify and recognize faces in different
lighting conditions and thus is very erroneous, for the system to recognize faces in different
lighting condition the database has to be fed with different pictures making the process
cumbersome. The subsisting systems additionally doesnt have provisions for larceny
detection and automatic database creation.












FACETEC
Department of Computer Science & Engineering Page | 7

















PROPOSED SYSTEM




















FACETEC
Department of Computer Science & Engineering Page | 8

3. PROPOSED SYSTEM


In this project, we propose an illumination-robust face recognition system via
local directional pattern images. Usually, local pattern descriptors including local binary
pattern and local directional pattern have been used in the field of the face recognition and
facial expression recognition, since local pattern descriptors have important properties to be
robust against the illumination changes and computational simplicity. Thus, this project
represents the face recognition approach that employs the local directional pattern
descriptor and two-dimensional principal analysis algorithms to achieve enhanced
recognition accuracy. In particular, we propose a novel methodology that utilizes the
transformed image obtained from local directional pattern descriptor as the direct input
image of two-dimensional principal analysis algorithms, unlike that most of previous works
employed the local pattern descriptors to acquire the histogram features.

Our system will detect the face utilizing Haar Cascade algorithm and then will
extract the face utilizing 2D-PCA (Two dimensional principal component analysis), then
give the image extracted to the LDP for recognition of the face and then if the image
matches with that in the database, then the utilizer is given authentication. The utilizer will
also be given an option to give his password in lieu of the face in cases of erroneous
abnegations. The LDP does not vary according to the light so the database can be made
more minuscule and the result can be obtained much more expeditious. In integration to all
this the system will additionally have a provision for detecting larceny and will vigilant the
utilizer of any such unauthorized access. The larceny detection process will be predicated
on the number of erroneous endeavors which is bounded to 10, if the number of erroneous
FACETEC
Department of Computer Science & Engineering Page | 9

endeavors increases than 10, then an automated message will be sent to the users E-mail
address with the photo of the person endeavoring to authenticate.
Existing system






















Fig. Flowchart of a regular face recognition system


Start
Take a Picture
Detect Face
Stop
Recognize face
FACETEC
Department of Computer Science & Engineering Page | 10

The subsisting system only accommodates the function of apperceiving a face the steps
involved in that process are:
1. The face is detected utilizing any of the face detecting algorithms
2. Then the features from the face are extracted and stored in database
3. Whenever a utilizer endeavors to authenticate the utilizer will take his photo from
which the features will be extracted
4. The features extracted in the last step is checked with the features stored in database
5. If both the features match then the utilizer is sanctioned else step 3 is reiterated
Proposed system













No No


Yes Yes


Take a picture in camera
Detect face and extract it
Extract the Features
Database
Retrieve the Features
Match the features
If both
Match
Atem
pts
>10
Authorize the user
Send an automated
email to the user
FACETEC
Department of Computer Science & Engineering Page | 11

This is the Flowchart for our system the steps involved in sanctioning a person in
FACETEC are:

1. The utilizer takes a photo using the camera present in the Android mobile phones
2. The face is detected from the photo taken by the utilizer
3. The features are extracted from the face that is detected
4. In the meantime the features stored in database is retrieved
5. Both the features are matched if a match is there then the utilizer is authenticated
6. If the match is not there then the no of endeavors is checked if the no of endeavors is
more preponderant than 10 then an automated message is sent to the users registered
Email id
7. And if the no of endeavors is less than 10 then the process is reiterated












FACETEC
Department of Computer Science & Engineering Page | 12












PROJECT DESIGN


















FACETEC
Department of Computer Science & Engineering Page | 13

4.1 USER REQUIREMENTS STUDIES


Android is a mobile operating system (OS) predicated on the Linux kernel and
currently developed by Google. With a utilizer interface predicated on direct manipulation,
Android is designed primarily for touchscreen mobile contrivances such as smartphones and
tablet computers, with specialized utilizer interfaces for televisions (Android TV), cars
(Android Auto), and wrist watches (Android Wear). The OS uses touch inputs that loosely
correspond to authentic-world actions, like swiping, tapping, pinching, and invert pinching
to manipulate on-screen objects, and a virtual keyboard. Despite being primarily designed
for touchscreen input, it withal has been utilized in game consoles, digital cameras, and other
electronics.

As mobile phones are becoming increasingly potent, security of the data stored
in mobile phones becomes very paramount. Most of the current phones have passwords to
address security. However, a face recognition scheme is much more secure and flexible as it
provides distinctive print to gain access and additionally the utilizer need not recollect
passwords. Even though the face recognition systems have already been implemented on the
DROID phones they are not efficient and precise. The goal of this project is to implement a
face recognition application on the DROID phone, which will be efficient and precise and
could be acclimated to unlock the phone or sanction a transaction when the registered utilizer
is apperceived.

We are aiming at engendering an Android application where the utilizer will be asked
to give his image as an input to the application during the establishing of the application. The
utilizer will additionally have to give an Email-Id to which the message will be sent in case
FACETEC
Department of Computer Science & Engineering Page | 14

of a larceny. The utilizer will additionally be asked a password that the utilizer will require in
case of erroneous abnegations.

The user requirements are:

1. The utilizer interface should be very user amicable
2. The utilizer must have the option of feeding his own image manually or taking
the images from the users album automatically
3. The utilizer should additionally be given a password button in the home screen so
that the utilizer can authenticate himself in case of erroneous abnegations
4. The utilizer should withal be able to keep some widgets on the lock screen like
clock, weather etc.
5. The utilizer can integrate multiple persons to the database
6. The utilizer should additionally be given the option of editing his password and
the database














FACETEC
Department of Computer Science & Engineering Page | 15

4.2 SYSTEM REQUIREMENT STUDIES




Hardware Requirements:

Processor : 600MHz or above
RAM : 256 MB or above
Hard Disk : 10-15 MB
An Android mobile phone with a minimum hard disk space of 20 MB

Software Requirements:

OS - Android 2.3 or above
OpenCV for android
Languages - Python 2.7, Android


OpenCV

OpenCV is released under a BSD license and hence its free for both academic and
commercial use. It has C++, C, Python and Java interfaces and supports Windows, Linux,
Mac OS, iOS and Android. OpenCV was designed for computational efficiency and with a
strong focus on real-time applications. Written in optimized C/C++, the library can take
advantage of multi-core processing. Enabled with OpenCL, it can take advantage of the
hardware acceleration of the underlying heterogeneous compute platform. Adopted all
around the world, OpenCV has more than 47 thousand people of user community and
estimated number of downloads exceeding 7 million. Usage ranges from interactive art, to
mines inspection, stitching maps on the web or through advanced robotics.
FACETEC
Department of Computer Science & Engineering Page | 16

Android
Android is a mobile operating system (OS) based on the Linux kernel and currently
developed by Google. With a user interface based on direct manipulation, Android is designed
primarily for touchscreen mobile devices such as smartphones and tablet computers, with
specialized user interfaces for televisions (Android TV), cars (Android Auto), and wrist watches
(Android Wear). The OS uses touch inputs that loosely correspond to real-world actions, like
swiping, tapping, pinching, and reverse pinching to manipulate on-screen objects, and a virtual
keyboard. Despite being primarily designed for touchscreen input, it also has been used in game
consoles, digital cameras, and other electronics. Android is the most popular mobile OS. As of
2013, Android devices sell more than Windows, iOS, and Mac OS devices combined, with sales
in 2012, 2013 and 2014

close to the installed base of all PCs. As of July 2013 the Google
Playstore has had over 1 million Android apps published, and over 50 billion apps downloaded. A
developer survey conducted in AprilMay 2013 found that 71% of mobile developers develop for
Android.

At Google I/O 2014, the company revealed that there were over 1 billion active monthly
Android users (that have been active for 30 days), up from 538 million in June 2013
Python 2.7
Python is an easy to learn, powerful programming language. It has efficient high-level
data structures and a simple but effective approach to object-oriented programming. Pythons
elegant syntax and dynamic typing, together with its interpreted nature, make it an ideal
language for scripting and rapid application development in many areas on most platforms.
The Python interpreter is easily extended with new functions and data types implemented in
C or C++ (or other languages callable from C). Python is also suitable as an extension
language for customizable applications.




FACETEC
Department of Computer Science & Engineering Page | 17

Face is
detected
Face is
masked
Features are
extracted
4.3 DATA FLOW DIAGRAM


Data flow Diagram for FACETEC





Fig 1. Dataflow diagram for the FACETEC system (level 0)


Data flow Diagram for Initial Configurations






Fig 2. Dataflow Diagram for initial configurations (level 1)


Data Flow diagram for authentication process
No


Yes

No
Yes


Fig 4. Dataflow diagram for authentication process (level 1)
Authorize/
Unauthorize
FACETEC
Image is
captured
User
Store to DB
User
User
Face
Detected
Thef
Detected
Database
Features
extracted
Features
matched
Features
retrieved
Atempts
>10
Authentcate
user
FACETEC
Department of Computer Science & Engineering Page | 18

4.4 USE CASE DIAGRAM


Use Cases










Admin User


Fig 5. Use case diagram for FACETEC

The use case diagram consists of two actors namely the admin and the user. The
admin is the person who owns the phones and is the person who has all the authentication to
add/edit passwords and add/remove user that can authorize themselves and is the person
who does all the configuration required for the app to work. The user is the actor who is
trying to authorize himself he can also be the admin or any other person trying to use the
phone, the user only has provisions to try to authenticate himself.




Inital confguratons
Adding or Setng up of
Users

Add/Edit password
Try to authentcate

FACETEC
Department of Computer Science & Engineering Page | 19











REFERENCES











FACETEC
Department of Computer Science & Engineering Page | 20


REFERENCES


1. Face Recognition via Local Directional Pattern by Dong-Ju Kim*, Sang-Heon Lee
and Myoung-Kyu Sohn published in International Journal of Security and Its
Applications Vol. 7, No. 2, March, 2013.

2. Face recognition on Android by Aditya Surjan published in International Journal of
Computer Science Vol.11, No.3, June, 2012.

3. Human Face segmentation and identification, Saad Ahmed sirhoy, computer vision
laboratory, Centre for automation research, University of Maryland.

4. A Survey of Face Recognition Techniques by Rabia Jafri and Hamid R. Arabnia
Journal of Information Processing Systems, Vol.5, No.2, June 2009 4.

5. Face Recognition system - http://en.wikipedia.org/wiki/Facial_recognition_system.

6. Kirsch Operator - http://en.wikipedia.org/wiki/Kirsch_operator.