Face Recognition Nadirsha Report
Face Recognition Nadirsha Report
Face Recognition Nadirsha Report
Seminar Report2010-13
GPTC KMGM
2
Seminar Report2010-13
ELECTRONICS ENGINEERING
CERTIFICATE
Certified that, this Seminar report (FACE RECOGNITION SYSTEM) was prepared by NADIRSHA K NASAR, Reg. NO: 10041066 of final year Electronics Engineering in partial fulfillment of the requirement for award of DIPLOMA IN ELECTRONICS ENGINEERING under the state board of Technical Education of Kerala during the academic year 2012-2013 under my guidance. HEAD OF SECTION
Smt. ALIYAMMA.M.J
GUIDED BY
Smt. SHOBHANA.T.V
INTERNAL EXAMINER
EXTERNAL EXAMINAR
Seminar Report2010-13
ACKNOWLEDGEMENT
First for all I express my thanks to GOD ALMIGHTY and my friends who have helped me for giving me the courage to complete this work successfully. First and foremost I wish to express my profound thanks to our principal Smt. BINDU P.S for having provided us with sufficient facilities at our college. I would like to express my profound gratitude to our Head of Department Smt. ALIYAMMA.M.J for her encouragement, support and blessing given always to me. I wish to record my sincere thanks to Smt. SHOBHANA.T.V for her valuable guidance on assistance on my seminar topic. I am obliged a lot to faculty members to department of Electronics Engineering for their help and guidelines. I sincerely acknowledge them for all love and affection. Finally I extend my sincere love and regard to my innumerable friends who help me at every turn through their valuable support and suggestions.
NADIRSHA.K.NASAR
GPTC KMGM
2
Seminar Report2010-13
ABSTRACT
Wouldnt you love to replace password based access control to avoid having to reset forgotten password and worry about the integrity of your system? Wouldnt you like to rest secure in comfort that your healthcare system does not merely on your social security number as proof of your identity for granting access to your medical records? Because each of these questions is becoming more and more important, access to a reliable personal identification is becoming increasingly essential .Conventional method of identification based on possession of ID cards or exclusive knowledge like a social security number or a password are not all together reliable. ID cards can be lost forged or misplaced; passwords can be forgotten or compromised. But a face is undeniably connected to its owner. It cannot be borrowed stolen or easily forged This is the one application of MATLAB.
GPTC KMGM
2
Seminar Report2010-13
CONTENTS 1. INTRODUCTION 2. FACE RECOGNITION 3. COMPONENTS OF FACE RECOGNITION SYSTEMS 4. IMPLEMENTATION OF FACE RECOGNITION TECHNOLOGY 5. HOW FACE RECOGNITION SYSTEMS WORK -An example 6. THE SOFTWARE 7. ADVANTAGES AND DISADVANTAGES 8. FACE RECOGNITION FROM 2D to 3D 9. ADVANTAGES & DISADVANTAGES OF 3D FACE RECOGNITON SYSTEM 10. APPLICATIONS 11. FUTURE OF FACE RECOGNITION TECHNOLEGY 12. CONCLUSION 13. REFERENCES
GPTC KMGM
2
Seminar Report2010-13
INTRODUCTION
The information age is quickly revolutionizing the way transactions are completed. Everyday actions are increasingly being handled electronically, instead of with pencil and paper or face to face. This growth in electronic transactions has resulted in a greater demand for fast and accurate user identification and authentication. Access codes for buildings, banks accounts and computer systems often use PIN's for identification and security clearences. Using the proper PIN gains access, but the user of the PIN is not verified. When credit and ATM cards are lost or stolen, an unauthorized user can often come up with the correct personal codes. Despite warning, many people continue to choose easily guessed PIN's and passwords: birthdays, phone numbers and social security numbers. Recent cases of identity theft have hightened the nee for methods to prove that someone is truly who he/she claims to be. Face recognition technology may solve this problem since a face is undeniably connected to its owner expect in the case of identical twins. Its nontransferable. The system can then compare scans to records stored in a central or local database or even on a smart card.
GPTC KMGM
2
Seminar Report2010-13
Whats biometrics?
A biometric is a unique, measurable characteristic of a human being that can be used to automatically recognize an individual or verify an individuals identity. Biometrics can measure both physiological and behavioral characteristics. Physiological biometrics (based on measurements and data derived from direct measurement of a part of the human body) include:
Behavioral biometrics (based on measurements and data derived from an action) include:
A biometric system refers to the integrated hardware and software used to conduct biometric identification or verification.
GPTC KMGM
2
Seminar Report2010-13
FACE RECOGNITION
THE FACE:
The face is an important part of who you are and how people identify you. Except in the case of identical twins, the face is arguably a person's most unique physical characteristics. While humans have the innate ability to recognize and distinguish different faces for millions of years, computers are just now catching up.
GPTC KMGM
2
Seminar Report2010-13
For face recognition there are two types of comparisons .the first is verification. This is where the system compares the given individual with who that individual says they are and gives a yes or no decision. The second is identification. This is where the system compares the given individual to all the other individuals in the database and gives a ranked list of matches. All identification or authentication technologies operate using the following four stages:
Capture: a physical or behavioral sample is captured by the Extraction: unique data is extracted from the sample and a Comparison: the template is then compared with a new sample. Match/non match: the system decides if the features extracted
system during enrollment and also in identification or verification process. template is created.
from the new sample are a match or a non match. Face recognition technology analyze the unique shape, pattern and positioning of the facial features. Face recognition is very complex technology and is largely software based. This Biometric Methodology establishes the analysis framework with tailored algorithms for each type of biometric device. Face recognition starts with a picture, attempting to find a person in the image. This can be accomplished using several methods including movement, skin tones, or blurred human shapes. The face recognition system locates the head and finally the eyes of the individual. A matrix is then developed based on the characteristics of the individuals face. The method of defining the matrix varies according to the algorithm (the mathematical process used by the computer to perform the comparison). This matrix is then compared to
GPTC KMGM
2
Seminar Report2010-13
matrices that are in a database and a similarity score is generated for each comparison. Artificial intelligence is used to simulate human
interpretation of faces. In order to increase the accuracy and adaptability, some kind of machine learning has to be implemented. There are essentially two methods of capture. One is video imaging and the other is thermal imaging. Video imaging is more common as standard video cameras can be used. The precise position and the angle of the head and the surrounding lighting conditions may affect the system performance. The complete facial image is usually captured and a number of points on the face can then be mapped, position of the eyes, mouth and the nostrils as a example. More advanced technologies make 3-D map of the face which multiplies the possible measurements that can be made. Thermal imaging has better accuracy as it uses facial temperature variations caused by vein structure as the distinguishing traits. As the heat pattern is emitted from the face itself without source of external radiation these systems can capture images despite the lighting condition, even in the dark. The drawback is high cost. They are more expensive than standard video cameras.
Capture
Extraction
(Figure 1)
Comparison
Match/Non Match
Seminar Report2010-13
An automated mechanism that scans and captures a digital or an Another entity which handles compression, processing, storage The third interfaces with the application system ( identification
analog image of a living personal characteristics.(enrollment module) and compression of the captured data with stored data (database) module)
Enrollement Module Preprocessing and segmentation User Interface Face Verification Module Preprocessing and segmentation Analysis Face reg & scoring Analysis Analyzed data
System Database
Accept/Reject
(Figure 2)
User interface captures the analog or digital image of the person's face. In the enrollment module the obtained sample is preprocessed and analyzed. This analyzed data is stored in the database for the purpose of future comparison.
GPTC KMGM
2
Seminar Report2010-13
The database compresses the obtained sample and stores it. It should have retrieval property also that is it compares all the stored sample with the newly obtained sample and retrieves the matched sample for the purpose of verification by the user and determine whether the match declared is right or wrong. The verification module also consists of a preprocessing system. Verification means the system checks as to who the person says he or she is and gives a yes or no decision. In this module the newly obtained sample is preprocessed and compared with the sample stored in the database. The decision is taken depending on the match obtained from the database. Correspondingly the sample is accepted or rejected. Instead of verification module we can make use of identification module. In this the sample is compared with all the other samples stored in the database. For each comparison made a match score is given. The decision to accept or reject the sample depends on this match score falling above or below a predetermined threshold.
GPTC KMGM
2
Seminar Report2010-13
Data acquisition:
The input can be recorded video of the speaker or a still image. A sample of 1 sec duration consists of a 25 frame video sequence. More than one camera can be used to produce a 3D representation of the face and to protect against the usage of photographs to gain unauthorized access.
Input processing:
A pre-processing module locates the eye position and takes care of the surrounding lighting condition and colour variance. First the presence of faces or face in a scene must be detected. Once the face is detected, it must be localized and normalization process may be required to bring the dimensions of the live facial sample in alignment with the one on the template.
GPTC KMGM
2
Seminar Report2010-13
Some facial recognition approaches use the whole face while others concentrate on facial components and/ or regions(such as lips, eyes etc). the appearance of the face can change considerably during speech and due to facial expressions. In particular the mouth is subjected to fundamental changes but is also very important source for discriminating faces. So an approach to persons recognition is developed based on spatio-temporal modeling of features extracted from talking face. Models are trained specific to a persons speech articulate and the way that the person speaks. Person identification is performed by tracking mouth movements of the talking face and by estimating the likely hood of each model of having generated the observed sequence of features. The model with the highest likely hood is chosen as the recognized person.
Block diagram:
Talking Face Lip Tracker
Seminar Report2010-13
FACE IMAGE
DECISION STRATEG Y
LIP MOVEMENT
Synergetic computer are used to classify optical and audio features, respectively. A synergetic computer is a set of algorithm that simulates synergetic phenomena. In training phase the BIOID creates a prototype called faceprint for each person. A newly recorded pattern is preprocessed and compared with each faceprint stored in the database. As comparisons are made, the system assigns a value to the comparison using a scale of one to ten. If a score is above a predetermined threshold, a match is declared. From the image of the face, a particular trait is extracted. It may measure various nodal points of the face like the distance between the eyes ,width of nose etc. it is fed to a synergetic computer which consists of algorithm to capture, process, compare the sample with the one stored in the database. We can also track the lip movements which are also fed to the synergetic computer. Observing the likely hood each of
GPTC KMGM
2
Seminar Report2010-13
the samples with the one stored in the database we can accept or reject the sample.
(Figure 5)
GPTC KMGM
2
Seminar Report2010-13
If you look at the mirror, you can see that your face has certain distinguishable landmarks. These are the peaks and valleys that make up the different facial features. Visionics defines these landmarks as nodal points. There are about 80 nodal points on a human face. Here are few nodal points that are measured by the software.
distance between the eyes width of the nose depth of the eye socket cheekbones jaw line chin
GPTC KMGM
2
These nodal points are measured to create a numerical code, a string of numbers that represents a face in the database. This code is called faceprint. Only 14 to 22 nodal points are needed for faceit software to complete the recognition process.
THE SOFTWARE
Facial recognition software falls into a larger group of technologies known as biometrics. Facial recognition methods may vary, but they generally involve a series of steps that serve to capture, analyze and compare your face to a database of stored images. Here is the basic process that is used by the Face it system to capture and compare images:
Detection
When the system is attached to a video surveillance system, the recognition software searches the field of view of a video camera for faces. If there is a face in the view, it is detected within a fraction of a second. A multi-scale algorithm is used to search for faces in low resolution. (An algorithm is a program that provides a set of instructions to accomplish a specific task). The system switches to a high-resolution search only after a head-like shape is detected.
GPTC KMGM
2
Seminar Report2010-13
Alignment
Once a face is detected, the system determines the head's position, size and pose. A face needs to be turned at least 35 degrees toward the camera for the system to register it.
Normalization
The image of the head is scaled and rotated so that it can be registered and mapped into an appropriate size and pose. Normalization is performed regardless of the head's location and distance from the camera. Light does not impact the normalization process.
Representation
The system translates the facial data into a unique code. This coding process allows for easier comparison of the newly acquired facial data to stored facial data.
Matching
The newly acquired facial data is compared to the stored data and (ideally) linked to at least one stored facial representation. The heart of the Face it facial recognition system is the Local Feature Analysis (LFA) algorithm. This is the mathematical technique the system uses to encode faces. The system maps the face and creates a faceprint, a unique numerical code for that face. Once the system has stored a faceprint, it can compare it to the thousands or millions of face prints stored in a
GPTC KMGM
2
Seminar Report2010-13
Using facial
(Figure 7) The system can match multiple faceprints at a rate of 60 million per minute from memory or 15 million per minute from hard disk. As comparisons are made, the system assigns a value to the comparison using a scale of one to 10. If a score is above a predetermined threshold, a match is declared. The operator then views the two photos that have been declared a match to be certain that the computer is accurate.
GPTC KMGM
2
Seminar Report2010-13
A recognition system has to be invariant both to external changes, like environmental light, and the person's position and distance from the camera, and internal deformations, like facial expression, aging, and makeup. Feature-based methods explore a set of geometric features, such as the distance between the eyes or the size of the eyes, and use these measures to represent the given face. These features are computed using simple correlation filters with expected templates. These methods are somewhat invariant to changes in illumination and can partially compensate for changes in camera location. However, they are sensitive to aging and facial expressions. It is also not clear which features are important for classification
GPTC KMGM
2
Seminar Report2010-13
DISADVANTAGES System fails for undistinguished features and large emotional changes. Tolerate variations in the face.
GPTC KMGM
2
Seminar Report2010-13
Face is not so unique as fingerprints and eye iris, so its recognition reliability is slightly lower. However, it is still suitable for many applications, taking into account its convenience for user. It can also be used together with fingerprint identification or another biometrical method for developing more security critical applications. Face recognition cannot be used for surveillance applications as it works only for frontal face images. The major limitation of the feature based approach is that, the images in which one or more features are not distinguishable; this approach also does not work for large changes in orientation and emotion. The human face is not a unique rigid object. There are billions of different faces and each of them can assume a variety of deformations. Inter-personal variations can be due to race, identity, or genetics while intra-personal variations can be due to deformations, expression, aging, facial hair, cosmetics and facial paraphernalia.
GPTC KMGM
2
Seminar Report2010-13
3D capturing is a new technology. So the hardware part of the 2D system is changed for 3D recognition. So the expense will be increased. All other remaining parts of the 2D system will be used in new 3D system. The principle is also same as 2D system.
GPTC KMGM
2
Seminar Report2010-13
Variations in illumination only affect the texture of the face, yet the The physical dimensions of the face are known and are inherently Better at capturing the surface geometry of the face. Help to find difference in identical twins increases accuracy by 20-25% Insensitive to changes in expression , blinking ,frowning , smiling Ability to compensate for mustache or beard growth & appearance
of eye glasses
DISADVANTAGES
Oily parts of the face with high reflectance may introduce artifacts
under certain lighting on the surface. 3D sensor technology is currently not as mature as 2D sensors, the current computational cost of processing 3D data is higher than for 2D data.
GPTC KMGM
2
Seminar Report2010-13
APPLICATIONS
The natural use of face recognition technology is the replacement of PIN, physical tokens or both needed in automatic authorization or identification schemes. Additional uses are automation of human identification or role authentication in such cases where assistance of another human needed in verifying the ID cards and its beholder. There are numerous applications for face recognition technology:
GPTC KMGM
2
Seminar Report2010-13
Government Use
1.
searches, verifying identify for court records, and comparing school surveillance camera images to known child molesters.
1.
Security/Counterterrorism. Access control, comparing surveillance Immigration: Rapid progression through Customs.
Commercial Use
1. 2. 3.
Day Care: Verify identity of individuals picking up the children. Residential Security: Alert homeowners of approaching personnel. Voter verification: Where eligible politicians are required to verify
their identity during a voting process. This is intended to stop 'proxy' voting where the vote may not go as expected.
4.
Banking using ATM: The software is able to quickly verify a Physical access control of buildings areas, doors, cars or net access.
customers face.
5.
6. Authentication screening
REAL WORLD
1.Passport Authentication
2.Criminal screening.
Seminar Report2010-13
The software is able to quickly verify a customer's face. After a customer consents, the ATM or check-cashing kiosk captures a digital image of him. The Face It software then generates a face print of the photograph to protect customers against identity theft and fraudulent transactions. By using the facial recognition software, there's no need for a picture ID, bankcard or personal identification number (PIN) to verify a customer's identity. This way business can prevent fraud from occurring. Wearable Recognition system
Wearable computing
GPTC KMGM
2
Seminar Report2010-13
CONCLUSION
Face recognition technologies have been associated generally with very costly top secure applications. Today the core technologies have evolved and the cost of equipments is going down dramatically due to the integration and the increasing processing power. Certain applications of face recognition technology are now cost effective, reliable and highly accurate. As a result there are no technological or financial barriers for stepping from the pilot project to widespread deployment.
GPTC KMGM
2
Seminar Report2010-13
REFERENCES
1.
www.seminarsonly.com ELECTRONIC WORLD - DECEMBER 2002 MODERN TELEVISION ENGINEERING- Gulati R.R IEEE INTELLIGENT SYSTEMS - MAY/JUNE 2003 WWW.FACEREG.COM WWW. IMAGESTECHNOLOGY.COM
2. 3. 4. 5. 6.
GPTC KMGM
2
Seminar Report2010-13
GPTC KMGM
2
Seminar Report2010-13
GPTC KMGM
2