You are on page 1of 18

VISVESVARAYA TECHNOLOGICAL UNIVERSITY

BELGAUM ​- ​590014

TECHNICAL SEMINAR REPORT (15ECS86)


ON

“Face Recognition Technology”


Submitted in partial fulfillment of the requirements for the award of the degree

BACHELOR OF ENGINEERING
IN
ELECTRONICS AND COMMUNICATION

Submitted by

ASTHA SINGH (1MV15EC022)

Under the guidance of


Mrs. SEEMA S
Assistant Professor,

DEPARTMENT OF ELECTRONICS AND COMMUNICATION


SIR M. VISVESVARAYA INSTITUTE OF TECHNOLOGY
Krishnadevarayanagar, Hunasamaranahalli, Bangalore -562157

2018-2019
SIR M.VISVESVARAYA INSTITUTE OF TECHNOLOGY
Department of Electronics and Communication

CERTIFICATE
This is to certify that the project entitled ​“Face Recognition Technology” is a bonafide work
carried out by ​ASTHA SINGH (1MV15EC022) ​of ​Sir M. Visvesvaraya Institute of
Technology​, Bangalore, in partial fulfillment for the award of degree of Bachelor of
Engineering in ​Electronics and Communication of the ​Visvesvaraya Technological
University​, Belgaum during the academic year 2018-2019. It is certified that all
corrections/suggestions indicated for Internal Assessment have been incorporated in the
report. The project report has been approved as it satisfies the academic requirements in
respect of Technical Seminar (15ECS86) prescribed for Bachelor of Engineering degree.

(Mrs. Seema S) (Dr. R Sundaraguru)


Internal Guide
Department Dept. of ECE Head of the Department
Sir MVIT, Bangalore Sir MVIT, Bangalore

Department of ECE, Sir MVIT 2


ACKNOWLEDGEMENT

A project is incomplete if it fails to thank all those instrumental in the successful completion
of the project.

I express my deep sense of gratitude to our principal ​Dr. V.R Manjunath who provided me
with an opportunity to fulfill my desired goal.

I whole-heartedly express my sincere thanks to our beloved ​Head of the Department, Dr. R
Sundaraguru. ​I am thankful to my internal guide ​Mrs. Seema S​, ​Assistant Professor,
Department of Electronics and Communication for her continuous guidance and valuable
inputs throughout the duration of our project.

I also extend our gratitude to our parents, staff of ECE and my friends for their moral support
and their encouragement, which motivated me to complete my research work successfully.

ASTHA SINGH (1MV15EC022)

Department of ECE, Sir MVIT 3


DECLARATION

We hereby declare that the entire work embodied in this discussion has been carried out by us
and no part of it has been submitted previously for any degree or diploma of any institution.

Place: ​Bengaluru
Date:

Name of the students and their signature:

Astha Singh
(1MV15EC022)

Department of ECE, Sir MVIT 4


TABLE OF CONTENT
CHAPTER 1………………………………………………….....1
INTRODUCTION………………………………………...1
CHAPTER 2…………………………………………………….2
FACIAL RECOGNITION………………………………..2
CHAPTER 3…………………………………………………….3
LITERATURE SURVEY………………………………....3
CHAPTER 4…………………………………………………….5
METHODOLOGY……………………………………..…5
CHAPTER 5…………………………………………………….8
LIMITATIONS OF FACIAL RECOGNITION..................8
CHAPTER 6……………………………………………...….....10
APPLICATIONS......................................................…......10
CHAPTER 7……………………………………………………12
BIBLIOGRAPHY……………………………..…………12

Department of ECE, Sir MVIT 5


Table of Figures
Figure 2. 1 Nodal Points of a face 2

Figure 4. 1 Block Diagram of proposed system 7


Figure 4. 2 Image samples 8
Figure 4. 3 Recognition of face in real-time using LBPH 8

Figure 4.4. Performance analysis of face recognition algorithm with respect to time……….. 9

Department of ECE, Sir MVIT 6


CHAPTER 1

INTRODUCTION

The information age is quickly revolutionizing the way transactions are completed. Everyday
actions are increasingly being handled electronically, instead of with pencil and paper or face to
face. This growth in electronic transactions has resulted in a greater demand for fast and accurate
user identification and authentication.

Access codes for buildings, banks accounts and computer systems often use PIN's for
identification and security clearances. Using the proper PIN gains access, but the user of the PIN
is not verified. When credit and ATM cards are lost or stolen, an unauthorized user can often
come up with the correct personal codes.

Despite warning, many people continue to choose easily guessed PINs and passwords: birthdays,
phone numbers and social security numbers. Recent cases of identity theft have heighten the need
for methods to prove that someone is truly who he/she claims to be

Face recognition technology may solve this problem since a face is undeniably connected to its
owner expect in the case of identical twins, It’s nontransferable. The system can then compare
scans to records stored in a central or local database or even on a smart card.

Facial recognition is a category of biometric software that maps an individual's facial features
mathematically and stores the data as a faceprint. The software uses deep learning algorithms to
compare a live capture or digital image to the stored faceprint in order to verify an individual's.

High-quality cameras in mobile devices have made facial recognition a viable option for
authentication as well as identification. Apple’s iPhone X, for example, includes Face ID
technology that lets users unlock their phones with a faceprint mapped by the phone's camera.
The phone's software, which is designed with ​3-D modelling​ to resist being spoofed by photos or
masks, captures and compares over 30,000 variables. As of this writing, Face ID can be used to
authenticate purchases with Apple Pay and in the iTunes Store, App Store and iBooks Store.
Apple encrypts and stores faceprint data in the cloud, but authentication takes place directly on
the device.

Department of ECE, Sir MVIT 7


CHAPTER 2

FACIAL RECOGNITION

What is Face Recognition?


Face recognition technology is the least intrusive and fastest biometric technology. It works with
the most obvious individual identifier – the human face.
Instead of requiring people to place their hand on a reader (a process not acceptable in some
cultures as well as being a source of illness transfer) or precisely position their eye in front of a
scanner, face recognition systems unobtrusively take pictures of people's faces as they enter a
defined area. There is no intrusion or delay, and in most cases the subjects are entirely unaware of
the process. They do not feel "under surveillance" or that their privacy has been invaded.

How Facial Recognition Systems Work?


Humans have always had the innate ability to recognize and distinguish between faces, yet
computers only recently have shown the same ability. In the mid-1960s, scientists began work on
using the computer to recognize human faces. Since then, facial recognition software has come a
long way.
Facial recognition software is based on the ability to first recognize faces, which is a
technological feat in itself. If you look at the mirror, you can see that your face has certain
distinguishable landmarks. These are the peaks and valleys that make up the different facial
features.
VISIONICS defines these landmarks as nodal points. There are about 68 nodal points on a human
face. Here are few nodal points that are measured by the software: 1) Distance between the eyes
2) Width of the nose 3) Depth of the eye socket 4) Cheekbones 5) Jaw line 6) Chin

Figure 2.1: Nodal points of a face

The system maps the face and creates a faceprint, a unique numerical code for that face. Once the
system has stored a faceprint, it can compare it to the thousands or millions of faceprints stored in
a database.
Software used for this : OpenCv built-in Haar Cascades and LBPH.

Department of ECE, Sir MVIT 8


CHAPTER 3
LITERATURE SURVEY

[1] Teddy Mantaro et al., (2018)


​ Face recognition can be considered one of the most successful biometric identification
methods among several types of biometric identification including fingerprints, DNA,
palm print, hand geometry, iris recognition, retina and odour/scent. Face recognition
provides biometric identification that utilizes the uniqueness of faces for security
purposes. The problem with face recognition using biometric identification is its lengthy
process and the accuracy of the results. This paper proposes solutions for a faster face
recognition process with accurate results. The proposed face recognition process was
done using a hybrid process of Haar Cascades and Eigenface methods, which can detect
multiple faces (55 faces) in a single detection process. This improved face recognition
approach was able to recognize multiple faces with 91.67% accuracy level.

[2] ZHANG Qui-na et al., (2019)


The face recognition algorithm based on principal component analysis (PCA) is not robust
to the change of skin colour and pose. In order to solve this problem, a dynamic face
recognition algorithm based on block sample feature matching is proposed. According to
the principal component feature decomposition algorithm, each block feature quantity is
projected onto the base coordinates of the test face sample set. The average mutual
information entropy of each module and the corner detection and texture matching of the
face are carried out. The simulation results show that the algorithm has good feature
matching and high recognition accuracy.

[3] Lin Zhi-heng*, Li Yong-zhe et al.,​ ​(2019)


​Classroom attendance, as an indispensable part of teaching activities, plays a very
important role in classroom teaching. Classroom attendance can effectively supervise
students to attend classes on time and ensure the quality of classroom teaching. However,
the current classroom attendance is mainly achieved by the way of teacher's name calling,
which will cause a lot of waste of classroom time. This paper presents a classroom
attendance system based on video face recognition technology. The system uses a camera
installed in the classroom to obtain classroom video information. For the collected video
information, it is first divided into a frame of static pictures, and from the pictures, several
pictures with clear face and better light are selected for face recognition, and finally the
recognition results are aggregated and merged. In order to solve the influence of the
location of the camera on the recognition results, the system can be combined with the
platform control system to control the rotation and focusing of the camera through the
platform, and further improve the recognition accuracy​.

Department of ECE, Sir MVIT 9


[4] Refik Samet et al., (2017)

Classroom attendance check is a contributing factor to student participation and the final
success in the courses. Taking attendance by calling out names or passing around an
attendance sheet are both time-consuming, and especially the latter is open to easy fraud. As
an alternative, RFID, wireless, fingerprint, and iris and face recognition-based
methods have been tested and developed for this purpose. Although these
methods have some pros, high system installation costs are the main disadvantage. The
present paper aims to propose a face recognition-based mobile automatic classroom
attendance management system needing no extra equipment. To this end, a filtering
system based on Euclidean distances calculated by three face recognition techniques,
namely Eigenfaces, Fisherfaces and Local Binary Pattern, has been developed for face
recognition. The proposed system includes three different mobile applications for
teachers, students, and parents to be installed on their smart phones to manage and
perform the real-time attendance-taking process.

[5] Jang Woon Baek, Byung-Gil Han et al., (2018)


In this paper, we proposes a novel drowsiness detection algorithm using a camera near the
dashboard. The proposed algorithm detects the driver’s face in the image and
estimates the landmarks in the face region. In order to detect the face, the proposed
algorithm uses an AdaBoost classifier based on the Modified Census Transform
features. And the proposed algorithm uses regressing Local Binary Features for face
landmark detection. Eye states (closed, open) is determined by the value of Eye
Aspect Ratio which is easily calculated by the landmarks in eye region. The proposed
algorithm provides real time performance that can be run on the embedded device.
We obtained the dataset using video records from the infrared camera which is used
the real-field. The proposed algorithm tested in the target board. The result shows that
the proposed algorithm outperformed in the speed and accuracy​.

[6] Wisaroot Tipprasert et al., (2019)


A challenge of research in area of the driver drowsiness detection is to detect the drowsiness
in low light condition. In this paper, we proposed a method to detect driver’s eyes
closure and yawning for drowsiness analysis by infraredcamera. This method consists
of four steps, namely, face detection, eye detection, mouth detection, and eyes closure
and yawning detection. 3,760 images were used to test the performance of the
proposed method. The accuracy rate of eyes closure detection, and yawning detection
were 98%, and 92.5%, respectively. The experimental resulted show that the proposed
method performed effectively. The advantage of this work it that this method can
detect eye closure and yawning in low light condition.

Department of ECE, Sir MVIT 10


CHAPTER 4
METHODOLOGY

Facial recognition is two-part procedure one being face detection and the other face
recognition. Haarcascade algorithm is used for face detection. Local Binary Pattern
Histogram (LBPH), Fisher faces and Principal Component Analysis (PCA) algorithm is used
for facial recognition The algorithm chosen are accurate and speed factor can be increased by
using hardware for image analysis i.e. Raspberry Pi and HD Camera.

For the algorithm implementation OpenCv library has been used. OpenCv library file has
built-in packages that provide assistance in facial recognition. OpenCv library file require
small amount of processor’s speed when incorporated with Raspberry PI.

Figure 4.1: Block Diagram of proposed system

The proposed system uses Raspberry PI and Python language for hardware implementation.
The output from the web cam is directly read in by the Raspberry pi which detect and
recognize the image and the result is generated which will be shown on the computer.
The procedure starts with adding multiple persons to the database then the video feed pops up
and checks if there is any face present in the image and whether or not the face in the image
matches with any of the image-set present in the folder. If a match is found the name of
person is displayed. The program is designed to access all the algorithms in the OpenCv and
use them as efficiently as possible to increase the speed and efficiency and the image sets are
saved in folder instead of database. This increases the speed factor in recognition.

Department of ECE, Sir MVIT 11


Figure 4.2: Image samples
System GUI was designed to learn, detect and recognized the user in real-time using webcam
data as input and also displays the time taken by each of function. Fig. 2 shows the GUI of
the system. When the user press activates camera button on GUI the camera.
The proposed system learns the user face by taking 13 images from video as sample with
different dimensions. It compares all three algorithms in terms of speed and accuracy. It uses
multicore system to find accuracy of different algorithms running on them. The system takes
13 samples per person for the detection and recognition purpose.

Figure 4.3: Recognition of face in real-time using LBPH

Department of ECE, Sir MVIT 12


This research compared all three algorithms in terms of speed and accuracy, after extensive
research and test scenarios it was concluded that LBPH algorithm is the benchmark for facial
recognition system in terms of accuracy and achieving accuracy rates as high as 90%. Fisher
face algorithm is the fastest among others with respect to time but with least accuracy. The
test case provided were performed on different machines across different platforms and the
calculations are the benchmark calculations for OpenCv models of facial recognition.
This research shows that usage of Raspberry Pi eliminates the dependencies of the underlying
hardware platform. Processing speed plays a vital role in face recognition system and also
affect the accuracy of the results. It has been observed time consumption for face detection
and recognition using different platform will not have major difference due to the usage of
Raspberry PI. Hence, Raspberry can be as a key element for development of various
biometric security systems.
These graph demonstrate the superiority of LBPH algorithm among others and show that
even on an average system this algorithm yields the bet possible result because of the usage
of Raspberry PI.

Department of ECE, Sir MVIT 13


CHAPTER 5

LIMITATIONS OF FACIAL RECOGNITION


TECHNOLOGY

Several factors limit the effectiveness of facial-recognition technology:

1. Image quality
Image quality affects how well facial-recognition algorithms work. The image quality of scanning
video is quite low compared with that of a digital camera. Even high-definition video is, at best,
1080p (progressive scan); usually, it is 720p. These values are equivalent to about 2MP and
0.9MP, respectively, while an inexpensive digital camera attains 15MP. The difference is quite
noticeable.

2. Image size
When a face-detection algorithm finds a face in an image or in a still from a video capture, the
relative size of that face compared with the enrolled image size affects how well the face will be
recognized. An already small image size, coupled with a target distant from the camera, means
that the detected face is only 100 to 200 pixels on a side. Further, having to scan an image for
varying face sizes is a processor-intensive activity. Most algorithms allow specification of a
face-size range to help eliminate false positives on detection and speed up image processing.

3. Face angle
The relative angle of the target’s face influences the recognition score profoundly. When a face is
enrolled in the recognition software, usually multiple angles are used (profile, frontal and
45-degree are common). Anything less than a frontal view affects the algorithm’s capability to
generate a template for the face. The more direct the image (both enrolled and probe image) and
the higher its resolution, the higher the score of any resulting matches.

4. Processing and storage


Even though high-definition video is quite low in resolution when compared with digital camera
images, it still occupies significant amounts of disk space. Processing every frame of video is an
enormous undertaking, so usually only a fraction (10 percent to 25 percent) is actually run
through a recognition system. To minimize total processing time, agencies can use clusters of
computers. However, adding computers involves considerable data transfer over a network,
which can be bound by input-output restrictions, further limiting processing speed.
Ironically, humans are vastly superior to technology when it comes to facial recognition. But
humans can only look for a few individuals at a time when watching a source video. A computer
can compare many individuals against a database of thousands.
As technology improves, higher-definition cameras will become available. Computer networks
will be able to move more data, and processors will work faster. Facial-recognition algorithms
will be better able to pick out faces from an image and recognize them in a database of enrolled
individuals. The simple mechanisms that defeat today’s algorithms, such as obscuring parts of the
face with sunglasses and masks or changing one’s hairstyle, will be easily overcome.

Department of ECE, Sir MVIT 14


An immediate way to overcome many of these limitations is to change how images are captured.
Using checkpoints, for example, requires subjects to line up and funnel through a single point.
Cameras can then focus on each person closely, yielding far more useful frontal,
higher-resolution probe images. However, wide-scale implementation increases the number of
cameras required.
Evolving biometrics applications are promising. They include not only facial recognition but also
gestures, expressions, gait and vascular patterns, as well as iris, retina, palm print, ear print, voice
recognition and scent signatures. A combination of modalities is superior because it improves a
system’s capacity to produce results with a higher degree of confidence. Associated efforts focus
on improving capabilities to collect information from a distance where the target is passive and
often unknowing.
Clearly, privacy concerns surround this technology and its use. Finding a balance between
national security and individuals’ privacy rights will be the subject of increasing discussion,
especially as technology progresses.

Advantages and Disadvantages


Facial recognition technology is a fairly new way of identify people who could be dangerous or
need to be located. It works by picking faces out of a crowd, obtaining the measurements
necessary and comparing it to the images already in it's database.

Advantages:
-C​ an prevent card counters, etc. from entering casinos
​ an identify terrorists, criminals, etc.
-C
-Can find missing children
-Prevents voter fraud
-Targets shoppers

​ isadvantages:
D
-Isn't always accurate
-Hindered by glasses, masks, long hair etc.
-Must ask users to have a neutral face when pictures are being taken
-Considered an invasion of privacy to be watched

Department of ECE, Sir MVIT 15


CHAPTER 6
APPLICATIONS

1. Law enforcement and justice solutions:


• Today's law enforcement agencies are looking for innovative technologies to help them stay one
step ahead of the world's ever-advancing criminals.
• As such, FRS is committed to developing technologies that can make the jobs of the law
enforcement officer easier. This includes acclaimed CABS-computerized arrest and booking
system and the childbase protection, a software solution for global law enforcement agencies to
help protect and recover missing and sexually exploited children, particularly as it relates to child
pornography.

CABS:
• Store all offence-related detain one easy-to-use system -- data is entered once and only once.
• Integrate with any database -- including other detachments and other applications (RMS, CAD,
Jail Management systems, and "most-wanted" databases) .
• Link victims to offenders -- to aid in criminal analysis and investigations
• Capture and store digital images of the offender -- encode all mug shots, marks, tattoos, and
scars
• Perform rapid and accurate searches -- on all data and image fields for crime statistics and
reporting
• Produce digital lineups -- using any stored image in minutes
• Identify previous offenders -- pre-integrated with advanced biometric face recognition software.

Childbase protection:
• ChildBase is an application that helps protect and recover missing and sexually-exploited
children, particularly those children victimized through child abuse images.

2. Identification solutions:
With regards to primary identification documents, (Passports, Driver's licenses, and ID Cards),
the use of face recognition for identification programs has several advantages over other
biometric technologies.
• Leverage your existing identification infrastructure. This includes, using existing photo
databases and the existing enrollment technology (e.g. cameras and capture stations); and
• Increase the public's cooperation by using a process (taking a picture of one's face) that is
already accepted and expected;
• Integrate with terrorist watch lists, including regional, national, and international "most-wanted"
databases.

3. Homeland defence:
• Since the terrorist events of September 11, 2001, the world has paid much more attention to the
idea of Homeland Defense, and both governments and private industries alike are committed to
the cause of national defense.

Department of ECE, Sir MVIT 16


• This includes everything from preventing terrorists from boarding aircraft, to protecting critical
infrastructure from attack or tampering (e.g. dams, bridges, water resevoirs, energy plants, etc.),
to the identification of known terrorists.

4. Airport security:
• Airport and other transportation terminal security is not a new thing. People have long had to
pass through metal detectors before they boarded a plane, been subject to questioning by security
personnel, and restricted from entering "secure" areas. What has changed, is the vigilance in
which these security efforts are being applied.
• The use of biometric identification, can enhance security efforts already underway at most
airports and other major transportation hubs (seaports, train stations, etc.).
• This includes the identification of known terrorists before they get onto an airplane or into a
secure location.

5. Immigration:
• Most countries do not want to be perceived as being a "weak link" when it comes to accepting
immigrants and refugees, particularly if that individual uses the new country as a staging ground
for multi-national criminal and terrorist activities. Consequently, governments around the world
are examining their immigration policies and procedures.
• Biometric technology, particularly face recognition software, can enhance the effectiveness of
immigration and customs personnel. After all, to the human eye it is often difficult to determine a
person's identity by looking at a photo, especially if the person has aged, is of a different ethnic
background, has altered their hair style, shaved their beard, etc. FRS does not have this difficulty.

6. Access control:
• The use of biometric technology, particularly face recognition software (either independently or
as one part of a multi-layered biometric solution), can enhance your security efforts considerably.
• Biometric identification ensures that a person is who they claim to be, eliminating any worry of
someone using illicitly obtained keys or access cards.

7. Financial services:
• The financial services industry revolves around the concept of security. Yet for the most part,
security within the industry is limited to a simple personal identification number (PIN) or
password.
• Biometrics, particularly face recognition software, can improve the security of the financial
services industry, saving the institution time and money both through a reduction of fraud cases
and the administration expenses of dealing with forgotten passwords.
• Furthermore, biometric-based access control units can safeguard vaults, teller areas, and safety
deposit boxes to protect against theft.
• The use of biometrics can also ensure that confidential information remains confidential while
deterring identity theft, particularly as it relates to ATM terminals and card-not-present
e-commerce transactions.

8. Scene analysis and surveillance solutions:


• This includes the ability to extract, categorize, and search non-facial imagery. For example,
within the law enforcement application it allows you to capture, archive, and retrieve such
identifying characteristics as tattoos, marks, or scars.
• It can also analyse scenes from either streaming or archived video, "looking" for
out-of-the-ordinary occurrences, the presence of certain vehicles, specific faces, etc.

Department of ECE, Sir MVIT 17


CHAPTER 7

BIBLIOGRAPHY

[1] Teddy Mantaro, Sunedhi ‘Multi-Faces Recognition Process Using Haar Cascades and
Eigenface Methods’ - IEEE 2018

[2] Zhang Qui-na ‘Improvement of face recognition technology based on Intelligent


Image’- IEEE 2019

[3] Lin Zhi-heng*, Li Yong-zhe ‘Design and Implementation of Classroom Attendance


System Based on Video Face Recognition’ - IEEE 2019

[4] ‘Face Recognition-Based Mobile Automatic Classroom Attendance Management


System’- IEEE 2017

[5] Jang Woon Baek, Byung-Gil Han, Kwang-Ju Kim, Yun-Su Chung, Soo-In Lee
‘ Real-time Drowsiness Detection Algorithm for Driver State Monitoring System’-
IEEE 2018

[6] A Method of Driver’s Eyes Closure and Yawning Detection for Drowsiness Analysis
by Infrared Camera - IEEE 2019

Department of ECE, Sir MVIT 18

You might also like