Department of Electronics and Communication Engineering
Madan Mohan Malaviya University of Technology,
Gorakhpur (U.P) 273010
India
April 6, 2019
SEMINAR
PRESENTATION ON
Face Recognition
Technology
By
Amit Kumar Mishra
Roll No. 2016041055
1
Contents
● INTRODUCTION
● WHAT ARE BIOMETRICS?
● WHY WE CHOOSE FACE RECOGNITION OVER OTHER BIOMETRIC ?
● FACE RECOGNITION
● COMPONENTS OF FACE RECOGNITION SYSTEMS
● IMPLEMENTATION OF FACE RECOGNITION TECHNOLOGY
● DATA ACQUISITION
● INPUT PROCESSING
● FACE IMAGE CLASSIFICATION AND DECISION MAKING
● ALGORITHMS USED IN FACE DETECTION AND RECOGNITION
● ADVANTAGES AND DISADVANTAGES
● APPLICATIONS
● CONCLUSION
● REFERENCES
1. Introduction
• The information age is quickly revolutionizing the way transactions are completed. Everyday actions are increasingly
being handled electronically, instead of with pencil and paper or face to face. This growth in electronic transactions has
resulted in a greater demand for fast and accurate user identification and authentication. Access codes for buildings,
banks accounts and computer systems often use PIN's for identification and security clearances.
• Using the proper PIN gains access, but the user of the PIN is not verified.
When credit and ATM cards are lost or stolen, an unauthorized user can
often come up with the correct personal codes. Despite warning, many
people continue to choose easily guessed PIN‟s and passwords:
birthdays, phone numbers and social security numbers. Recent cases
of identity theft have increased the need for methods to prove that
someone is truly who he/she claims to be.
• Face recognition technology may solve this problem since a face is
undeniably connected to its owner expect in the case of identical twins.
Its nontransferable. The system can then compare scans to records
stored in a central or local database or even on a smart card.
1.1. What are biometrics ?
A biometric is a unique, measurable characteristic of a human being that can be used to automatically recognize an
individual or verify an individual‟ s identity. Biometrics can measure both physiological and behavioral characteristics.
Physiological biometrics (based on measurements and data derived from direct measurement of a part of the human
body) include:
a. Finger-scan
b. Facial Recognition
c. Iris-scan
d. Retina-scan
e. Hand-scan
1.2. Why we choose face recognition
over other biometric ?
There are number reasons to choose face recognition. This includes the following :
a. It requires no physical interaction on behalf of the user.
b. It is accurate and allows for high enrolment and verification rates.
c. It does not require an expert to interpret the comparison result.
d. It can use your existing hardware infrastructure, existing cameras and
image capture Devices will work with no problems
e. It is the only biometric that allow you to perform passive identification in
a one to. Many environments (e.g.: identifying a terrorist in a busy
Airport terminal
2. Face Recognition
The Face – unique part.
For face recognition there are two types of comparisons
1. Verification. This is where the system compares the given individual
with who that individual says they are and gives a yes or no decision.
2. Identification. This is where the system compares the given
individual to all the Other individuals in the database and gives
a ranked list of matches.
6
2.1 All identification or authentication technologies
operate using the following four stages:
a. Capture: A physical or behavioral sample is captured by the system during Enrollment and also in identification
or verification process
b. Extraction: Unique data is extracted from the sample
and a template is created.
a. Comparison: The template is then compared with a
new sample.
a. Match/non match: The system decides if the features
extracted from the new Samples are a match or a non match
7
2.2 COMPONENTS OF FACE RECOGNITION SYSTEMS
Enrollment module : An automated mechanism that scans and captures a digital or an analog image of a living
personal characteristics
Database : Another entity which handles compression,
processing, storage and compression of the
captured data with stored data
Identification module : The third interfaces with the
application system
8
3. IMPLEMENTATION OF FACE RECOGNITION TECHNOLOGY
The implementation of face recognition technology includes the following three stages:
• Data acquisition
• Input processing
• Face image classification and decision making
9
3.1 Data acquisition
Capture: A picture of your face is captured from a photo or video. Your face might
appear alone or in a crowd. Your image may show you looking straight ahead or
nearly in profile
Extraction: Facial recognition software reads the geometry of your face. Key factors
include the distance between your eyes and the distance from forehead to chin. The
software identifies facial landmarks — one system identifies 68 of them — that are
key to distinguishing your face.
10
3.2 Input processing
Comparison: Your facial signature — a mathematical formula — is compared to a
database of known faces. And consider this: at least 117 million Americans have
images of their faces in one or more police databases. According to a May 2018 report,
the FBI has had access to 412 million facial images for searches.
11
3.3 Face image classification and decision making
Matching: The final stage of face detection technology is to make a decision
whether the face’s features of a new sample are matching with the one from a
facial database or not. It usually takes just seconds.
12
4. ALGORITHMS USED IN FACE DETECTION AND RECOGNITION
OpenCV (Open Source Computer Vision) is a popular computer vision library started by Intel in 1999. The cross
platform library sets its focus on real-time image processing and includes patent-free implementations of
the latest computer vision algorithms. OpenCV 2.4 now comes with the very new FaceRecognizer class for
face recognition, so you can start experimenting with face recognition right away.
The currently available algorithms are:
1. Eigenfaces
2. Fisher faces
3. Local Binary patterns histograms
4. Haar cascades
Face Detection using Haar Cascades
Haar Cascade is a machine learning object detection algorithm used to identify objects in an image or video and
based on the concept of features proposed by Paul Viola and Michael Jones in their paper "Rapid Object
Detection using a Boosted Cascade of Simple Features" in 2001.
It is a machine learning based approach where a cascade function is trained from a lot of positive and negative
images. It is then used to detect objects in other images.
13
4. ALGORITHMS USED IN FACE DETECTION AND RECOGNITION
The algorithm has four stages:
1.Haar Feature Selection 2.Creating Integral Images 3.Adaboost Training 4.Cascading Classifiers
It is well known for being able to detect faces and body parts in an image, but can be trained to identify almost
any object.
Lets take face detection as an example. Initially, the algorithm needs a lot of positive images of faces and
negative images without faces to train the classifier. Then we need to extract features from it.
First step is to collect the Haar Features. A Haar feature considers adjacent rectangular regions at a specific
location in a detection window, sums up the pixel intensities in each region and calculates the difference
between these sums.
14
4. ALGORITHMS USED IN FACE DETECTION AND RECOGNITION
● An image kernel is a small matrix used to apply effects like the ones you might find in Photoshop or Gimp,
such as blurring, sharpening, outlining or embossing. They're also used in machine learning for 'feature
extraction', a technique for determining the most important portions of an image. In this context the
process is referred to more generally as "convolution”.
● To see how they work, let's start by inspecting a black and white image. The matrix on the left contains
numbers, between 0 and 255, which each correspond to the brightness of one pixel in a picture of a face.
The large, granulated picture has been blown up to make it easier to see; the last image is the "real" size.
15
5. ADVANTAGES AND DISADVANTAGES
5.1 Advantages: 4.1 Disadvantages:
a. There are many benefits to face a. Face recognition systems can’t tell
recognition systems such as its the difference between identical twins.
convenience and Social acceptability all
Other disadvantages are
you need is your picture taken for it to
work. ● Processing & Storing
b. Face recognition is easy to use and in ● Image Size & Quality
many cases it can be performed without a ● Surveillance Angle
Person even knowing.
c. Face recognition is also one of the most
inexpensive biometric in the market and Its
price should continue to go down.
Other advantages are
● Improved Security
● High Accuracy
● Fully Automated
16
6. Applications
The natural use of face recognition technology is the replacement of PIN.
6.1 Government Use:
• Law Enforcement: Minimizing victim trauma verifying Identify for court records, and comparing school surveillance camera
images to know child molesters.
• Security/Counterterrorism: Access control, comparing surveillance images to Know terrorist.
• Immigration: Rapid progression through Customs.
• Voter verification: Where eligible politicians are required to verify their identity during a voting process this is intendedto
stop “proxy‟ voting where the vote may not go as expected.
6.2 Commercial Use:
• Residential Security: Alert homeowners of approaching personnel.
• Banking using ATM: The software is able to quickly verify a customer’s face.
• Physical access control of buildings areas, doors, cars or net access.
Other applications are :
● Prevent Retail Crime ● Track School Attendance
● Unlock Phones ● Facilitate Secure Transactions
● Smarter Advertising ● Make Air Travel More Convenient
● Find Missing Persons ● Find Lost Pets
● Identify People on Social Media Platforms ● Recognize Drivers
● Diagnose Diseases ● Control Access to Sensitive Areas
17
7.CONCLUSION
Earlier Face recognition technologies have been associated
generally with very costly top secure applications. Today
the core technologies have evolved and the cost of
equipments is going down dramatically due to the
integration and the increasing processing power. Certain
applications of face recognition technology are now cost
effective, reliable and highly accurate. As a result there are
no technological or financial barriers for stepping from the
pilot project to widespread deployment.
18
8. REFERENCES
Special thanks to all the people who made and released these awesome resources for free:
● Adelson, E. H., and Bergen, J. R. (1986) The Extraction of Spatio-Temporal Energy in Human and Machine Vision,
Proceedings of Workshop on Motion: Representation and Analysis (pp. 151 -155) Charleston, SC; May 7-9
● Bichsel, M. (1991). Strategies of Robust Objects Recognition for Automatic Identification of Human Faces. PhD thesis, ,
Eidgenossischen Technischen Hochschule, Zurich.
● Brunelli, R. and Poggio, T. (1993), Face Recognition: Features versus Templates. IEEE Transactions on Pattern Analysis
and Machine Intelligence, 15(10):1042-1052
● Haxby, J.V., Ungerleider, L.G., Horwitz, B., Maisog, J.M., Rapoport, S.I., and Grady, C.L. (1996). Face encoding and
recognition in the human brain. Proc. Nat. Acad. Sci. 93: 922 - 927.
● Heisele, B. and Poggio, T. (1999) Face Detection. Artificial Intelligence Laboratory. MIT.
● Face Recognition by Independent Component Analysis Marian Stewart Bartlett, Member, IEEE, Javier R. Movellan,
Member, IEEE, and Terrence J. Sejnowski, Fellow, IEEE
19
THANK YOU
For Your Time and Support
Any questions?
Presentation By:
Amit Kumar Mishra
2016041055
ECE 3 rd Year
20