Top Banner

of 35

dvd009-masterthesisreport

Apr 04, 2018

Download

Documents

Lê Anh Tuấn
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 7/29/2019 dvd009-masterthesisreport

    1/35

    Master Thesis Intelligent Software SystemsThesis no: MCS-2006:08

    August 2006

    Department of Systems and Software EngineeringBlekinge Institute of Technology

    Face Detection by Image Discriminating

    Muhammad Tariq Mahmood

  • 7/29/2019 dvd009-masterthesisreport

    2/35

    This thesis is submitted to the School of Engineering at Blekinge Institute of Technology in partial fulfillment of the requirements for the degree of Master of Science in IntelligentSoftware Systems. The thesis is equivalent to 20 weeks of full time studies.

    AuthorMuhammad Tariq Mahmood E-mail: [email protected]

    Advisors:

    School of EngineeringBlekinge Institute of TechnologyBox 520SE 372 25 Ronneby

    Internet : www.bth.se/tek Phone : +46 457 385000Fax : +46 457 27125

    1. Prof. Rune Gustavsson E-mail: [email protected]

    2. Niklas Lavesson E-mail: [email protected]

  • 7/29/2019 dvd009-masterthesisreport

    3/35

    3

    Acknowledgment

    I want to express my gratitude to supervisors. Prof. RuneGustavsson is a personality with knowledge and experienceand has impressed me for the whole my stay at BTH.Discussions with him have always broadened my visions andhave been source of learning. Without his constant guidance,support and encouragement this thesis would not have beencompleted.

    I would also like to thank Niklas Lavesson for his support andhelp during this work. Discussions with him have always beena source of information as well as thought provoking. He alsohelped me to manage this document.

  • 7/29/2019 dvd009-masterthesisreport

    4/35

    4

    Abstract

    Human face recognition systems have gained a considerableattention during last few years. There are very manyapplications with respect to security, sensitivity and secrecy.Face detection is the most important and first step of recognition system. Human face is non rigid and has verymany variations regarding image conditions, size, resolution,

    poses and rotation . Its accurate and robust detection has been achallenge for the researcher. A number of methods and techniquesare proposed but due to a huge number of variations no onetechnique is much successful for all kinds of faces and images. Some

    methods are exhibiting good results in certain conditions and othersare good with different kinds of images. Image discriminatingtechniques are widely used for pattern and image analysis. Commondiscriminating methods are discussed.

    Key Words: face detection, Principle Component Analysis,Linear Discriminating Analysis,

  • 7/29/2019 dvd009-masterthesisreport

    5/35

    5

    T ABLE O F C ONTENTS

    TABLE OF CONTENTS .................................................................................................... 5

    1 INTRODUCTION....................................................................................................... 6

    1.1 OVERVIEW ................................................................................................................ 61.2 MOTIVATION ............................................................................................................. 61.3 A IMS AND OBJECTIVES ............................................................................................. 71.4 E XPECTED OUTCOME ............................................................................................... 7

    2 BACKGROUND.......................................................................................................... 8

    2.1 FACE DETECTION ...................................................................................................... 82.2 C HALLENGES ............................................................................................................ 82.3 F ACE DETECTION METHODS .................................................................................... 92.3.1 Knowledge Based Methods...................................................................................... 92.3.2 Template based methods.......................................................................................... 92.3.3 Feature based methods .......................................................................................... 102.3.4 Appearance based methods.................................................................................... 112.4 C ONCLUSION .......................................................................................................... 13

    3 CASE STUDY............................................................................................................ 15

    3.1 I MAGE DATABASE .................................................................................................. 153.2 I MAGE DISCRIMINATION TECHNIQUES .................................................................... 163.2.1 Principal Component Analysis............................................................................... 17 3.2.2 Linear Discriminating Analysis ............................................................................. 203.3 P ROPOSED SYSTEM ................................................................................................. 21

    4 KERNEL METHODS............................................................................................... 23

    4.1 O VERVIEW ............................................................................................................. 234.2 K ERNEL FUNCTIONS ............................................................................................... 244.3 S UPPORT VECTOR MACHINES .................................................................................. 244.3.1 Polynomial ............................................................................................................. 24

    4.3.2 Radial Based .......................................................................................................... 254.3.3 Sigmoid .................................................................................................................. 254.4 K ERNEL PRINCIPAL COMPONENT A NALYSIS (KPCA) ............................................ 254.5 K ERNEL FISHER DISCRIMINANT A NALYSIS ....................................................... 264.6 C OMPARISON OF PCA AND LDA............................................................................ 26

    5 CONCLUSION.......................................................................................................... 28

    5.1 D ISCUSSION ............................................................................................................ 285.2 F UTURE WORK ....................................................................................................... 29

    6 REFERENCES.......................................................................................................... 31

    7 FIGURES &TABLES............................................................................................... 35

  • 7/29/2019 dvd009-masterthesisreport

    6/35

    6

    1 INTRODUCTION

    This chapter presents overview of the thesis. Few paragraphs are written for the purposeand motivation of undergoing work. The objective and overview of the thesis is presented and planning to accomplish the task also is discussed here.

    1.1 OVERVIEW

    Face detection has gained significant importance during the last few years. It has verymany applications in the field computer vision. The law enforcement agencies, securityorganizations, personal identification systems and monitoring applications can use thistechnology. Human face detection has traditionally been a challenging task due to a number of factors like face size, image size, type and other conditions involved. The still pictures

    containing faces may have different poses and angles. Also pictures and images differ withrespect to resolution, camera lighting, and contrast. Images have different properties anddigital structure in case of gray scale and colored. The task even become more difficultwhen faces are occluded by other objects like mustaches, beards, glasses and masks etc.There are still lot of efforts to be carried out before achieving optimal accuracy, robustnessand computational efficiency in detecting faces.

    A number of approaches are adopted for face detection and these can be categorized indifferent ways. There is knowledge, invariant and templates based methods developed. Theface is so non-rigid and also when some have poses and gestures then most of above said

    methods cannot work well and failed to provide good enough accuracy. For last few yearsa significant work and achievements were gained by an appearance based approach. Thisapproach involves machine learning techniques and algorithms. Again there a number of machine learning algorithms like back propagation Neural Networks, Nave Bayes, SupportVector Machine and ensemble technique like Adaboost etc. Support vector Machines basedface detection methods have gained a considerable attention during last few years. Someexperiments are done for classification of face and non-face classes based on kernelmethods.

    1.2 MOTIVATION

    The Federal Board of Intermediate and Secondary Education Islamabad Pakistan [30] is anorganization which is responsible for conducting and processing Secondary SchoolCertificate and Higher Secondary School Certificate examinations within its jurisdiction.The examination system is highly sensitive with respect to security and secrecy. There are ahuge number of candidates taking exams each year. Each candidate has to submit theapplication form for each exam. More over candidates may re-submit application form for subsequent examination. There is a tendency of impersonation in the examination centers.

  • 7/29/2019 dvd009-masterthesisreport

    7/35

    7

    As the volume of the candidates increase every year, there is a higher probability of impersonation. Some times, management has to face very many problems whileinvestigating such cases. Also the board is seeking assistance from systems around that canautomate the process of detecting and recognizing faces from images already captured fromthe admission form and stored into their database. For the needed system face detection isfirst and important step.

    My long association with this organization motivated me to take this project as a casestudy. A study of the literature and earlier experiment done using the image database of thisorganization will lead to the development of a comprehensive system for detection andrecognition face of candidates.

    1.3 A IMS AND O BJECTIVES

    In first step, a survey of different face detection methods proposed by researcher will bedone. It will help for deep understanding of the face detection methods their merits,demerits and problem faced. .After study of different methods a suitable system is to be proposed keeping in view therequirements and conditions of the organizationEvaluating few techniques for image discriminating. A detailed study of Principlecomponent Analysis and Fishers Discriminating Analysis is done.

    1.4 E XPECTED O UTCOME

    The study will reveal the important aspects of different methods with respect to accuracy,speed and suitability for specific condition of input from FBISE. The best suitable methodwill be recommended for face detection and recognition system for FBISE. Also study will

    provide guidelines for improving accuracy and speed of face detection systems. This studywill help for generalizing the concept for detecting other objects from still images.

  • 7/29/2019 dvd009-masterthesisreport

    8/35

    8

    2 BACKGROUND

    This chapter describes the work done in the area of face detection and recognition. Anumber of researchers have proposed different methods and approaches. A survey is done

    for deep understanding of different techniques and then classified according to the basicidea to solve the problem. A discussion session will conclude and summarize theadvantages and limitations of different methods.

    2.1 FACE DETECTION

    Face detection is first step to human recognition and identification system. Images are usuallyused to representation of objects. Digital image is a stored graph in the computer memoryand consists of pixels. No of pixels in unit area is known as resolution and each pixel has

    its own characteristics. Detection of human face has been challenging task. Face has somany variations and characteristics.

    2.2 C HALLENGES

    Face localization, detection and then identification or verification has been a challengingtask due to a number of factors. Face is so non-rigid and has so many variations that no onetechnique can cope with all these variations. That is why in spite a large number of algorithms and technique a robust system is still far from real implementation. Some of factors are illustrated here.

    POSE: Faces in images may have different poses. The position of the face may vary whilecapturing image by camera or other device. Due to this variation face detection becomedifficult as nose and eyes make different angles. Image orientation directly affects theangles of the faces. In addition to face detection techniques for pose estimation are neededwhen human are moving and there is a large variation in poses.

    ILLUMINATION: It is another big challenge to detect accurately faces. Illumination problemmake a larger difference with the same face as compare to difference within different faceswhile comparing faces [5, pp 378]. The illusion problem is basically due to the lighting.The background and bad light affect the values taken by eigenvectors.

    OCCULUSION: Faces in images some times are occluded with other objects. Beard,moustaches, optical lenses and other types of object make it challenge to find accurate face

    behind them.

    FACIAL EXPRESSIONS : Facial expressions of a person while imaging is make a widedifference for face detection process. Same person may have different expression atdifferent times.

  • 7/29/2019 dvd009-masterthesisreport

    9/35

    9

    IMAGE CONDITIONS: Image conditions also play an important role during face detection process. The camera lighting, background, distance between camera and person, intensityand resolution of the image are important factors. Characteristics of Image capturingdevices affect the conditions of images and faces as well.

    FACE SIZE: Size of faces also make difficult to automate a system for face detection and

    recognition

    2.3 F ACE DETECTION M ETHODS

    There a large number of techniques and algorithms are suggested by researchers for face detection.Methods can be categorized in different ways. So many methods are combination of two or morealgorithms and techniques. The following categorization is taken from the Yangs book [1, pp 10]for images containing single face.

    2.3.1 K NOWLEDGE BASED M ETHODS

    These methods are based upon simple rules. Features of the face are described into simplerules. Rules normally are relationships between the features of the face. For example theremay be a rule intensity in central region of the face is uniform and the also eyes on the faceare symmetric. The search algorithms guided by the rules are applied to find the target face[1]. The technique also called top down.

    Yang and Huang [] introduced a knowledge based method in 1994. It detects faces in threestages or levels. At first stage high level rules are applied. In second stage the histogram

    and equalization methods are used for edge detection and finally eyes and mouth featuresare found. Knowledge based method introduced by Kotropoulos and Pitas [21].

    The human knowledge is difficult to translate into rules in general. With respect to face it ismore difficult as if some one wants to describe a face according to her/his knowledge.Thought the theoretically it seems simple to develop rule based face detection but in

    practice these methods are not very useful. If try to define detailed rules then there may bea large number of faces stratifying the rules. Few rules are unable to describe the faceexactly. Generalisation of these methods for moving images and faces with poses alsodecrease the accuracy and performance.

    2.3.2 T EMPLATE BASED METHODS

    A larges number of templates of faces are coded into the system. The input face is matched withalready stored. Faces are located by correlation. Also models are required to map the problem. Theapproach is simple to implement but not successful for face detection and cannot deal withvariations in scales, poses and shape.

  • 7/29/2019 dvd009-masterthesisreport

    10/35

    10

    A number of methods proposed to overcome the variations in poses and illumination. P.Sinha [39]used a set of image invariants to describe face pattern. The brightness of different parts of the facelike eyes and nose changes while illumination conditions. The said methods calculated the pair wiseratios of brightness and projected directions. A face is localised by satisfying all conditions for dark and bright regions. Following is the enhance figure having 23 defined relation for a face template.

    Figure 2.3.2.1 P sinha defined face template for face localization [39].

    It is hard to define all templates for the faces. These methods are not successful in poses andillumination problems.

    2.3.3 F EATURE BASED METHODS

    It is also known as bottom up approach. The main focus is to find the invariant features of the face in first step. The results are collected by integrating them. A number of differentmethods are proposed a number of researchers based on facial feature, texture, skin colour and combination of different features [1, pp 14]. Edge detection, segmentation andhistogram commonly used for extracting facial features, textures, skin colour and other features from the images.

    Leung [33] in 1995 proposed face detection by matching labelled graph. Gaussian filtersand distribution distance are used. The initial step is to localise the facial features locations.Five facial features like two eyes, two nostrils and nose lip junction are considered to benecessary to form a face.

    Feature based are not successful when faces have different poses and illumination problems. Occluded faces with other objects are also difficult to detect.

  • 7/29/2019 dvd009-masterthesisreport

    11/35

    11

    2.3.4 A PPEARANCE BASED METHODS

    These kinds of methods have gained a considerable attention during the last few years dueto considerable accuracy and efficiency. In contrasts with template based methodstemplates are learned by computer system. Machine learning techniques are widely usedfor learning face and none face classes. There is no need of model for representation of image separately. All appearance based methods have common properties like

    classification of face and non face classes, pre-processing, learning and post processing of the images. Here a brief history of different appearance based techniques is illustrated.

    Figure 2.3.4.1 Face and non-face classes are separated by using density function for patterns inimage data [ 23].

    Sung and Poggio [23] proposed classification of face and non face classes based upondistribution distance in 1997. Positive and negative examples of face and non-faces patternsare trained. The methods can be divided into two parts. Firstly the distribution-based modelis proposed for separation of face and none face patterns and the secondly a multilayer

    preceptron classifier..

  • 7/29/2019 dvd009-masterthesisreport

    12/35

    12

    Figure 2.3.4.2 The distance measures used by Sung and Poggio [23]

    Neural networks based systems are also proposed for face detection. Some of them produced better results as the architecture of neural network can be trained for complexclass conditional density function for face pattern. The computational efforts are requiredwhile tuning a number of parameters like number of nodes, number of hidden layers,learning rate and time etc.

    Figure 2.3.4.3. System Diagram of Rowleys Methods [1, pp78].

    Rowley [24][25] proposed method based upon multilayer neural network. Face and non-face classes are learn by the network. Different stages involved into the method are shownin figure 2.3.4.3.

    Peichung and Liu [7] suggested a method for face detection using support vector machineand discriminating feature analysis. By applying discriminating feature analysis a vector is

  • 7/29/2019 dvd009-masterthesisreport

    13/35

    13

    found by combining 1-D Haar wavelet representation and amplitude projections. Face classmodelling use the support vector machine for classification of face and non-face classes.

    2.4 C ONCLUSION

    This chapter discussed a number of approaches for the face detection. The following figure

    2.4.1 summarizes them. The pros and corns of each type of methods are discussed. Thedifferent methods are producing good results in certain condition. The variation in face andimage properties effect the results numerously .

    Figure 2.4.1. Face detection methods summary

    Here different experimental results are analysed for conclusion. The experiments wereconducted using different image databases witch are famous among the computer vision

    research community. Some of them are explained here.

    MIT Database: It contains faces of 16 people and each person has 27 faces in differentimages. Images are taken under various conditions and faces contain illumination andorientation problems [1, pp 44].

    UMIST Database: images in this database have with faces different poses and havefrontal views. Database contains 564 images.

    Methods

    Appearance BasedKnowledge Based Invariant basedTemplate Based

    Neural Networks

    Hidden Markov Model

    AdaBoost

    Decision Tree (C4.5)

    K-Nearest neighbour

    Support Vector Machine

    Pre Processing Post Processing

    PCA, FDA

  • 7/29/2019 dvd009-masterthesisreport

    14/35

    14

    University of Bern: There are 300 images in the database. Photographs of 30 people aretaken and each person has 10 images. The images are frontal and are taken in differentconditions.

    Here a comparison of different methods is given. The accuracy is calculated face detected by a methods divided by total faces. The figures are collected from different research papers collected by [1, pp 49].

    SNo. Method FacesTested

    FalseDetection

    Accuracy%

    1. Distribution based 136 13 81.9

    2. Neural Network 483 862 92.5

    3. Nave byes Classifier 483 88 93.0

    4. Kullback relative information 483 12758 98

    5. Support Vector Machine 136 20 74

    6. Mixture of factor Analyzers 483136

    823

    92.389.4

    7. Fisher Linear Discriminating 483136

    743

    93.691.5

    8. Snow w/ multi-scale features 483136

    843

    94.293.6

    9. Inductive learning 483 N/A 90

    Table 2.4.1 comparison of different face detection techniques

    From above results it can be concluded that the fare evaluation of different methods is verydifficult. The different methods used to test different images with different types of variations. The tests normally take too much time as learning algorithms required moretime according to the data provided. So normally this aspect is ignored during theseexperiments. While in real world applications it has importance and can not be ignored.Also the no of images and faces are taken very limited. The systems involving huge imagedatabases require more efficient and robust algorithms.

  • 7/29/2019 dvd009-masterthesisreport

    15/35

    15

    3 CASE STUDY

    This chapter contains work done for the FBISE organization. On the basis of previouschapter study a suitable method is proposed. The architecture of the system will bediscussed. This chapter will explain the design and prototypes of the face recognitionsystem for FBISE. Before learning and training of the images it is necessary to do somework with image. As image is high dimensionally data so there is need to transform in asuitable lower dimension. Also as support vector machine algorithm, based upon kernel

    functions, is used in proposed system. This chapter also contains information about representation of image in kernel function so that data can be processed by Support Vector

    Machine. There are number of algorithm like Principal Component Analysis, Discriminating Feature Analysis, Fisher Analysis and many more. The proposed systemalso has involvement of Support Vector Machines algorithm. This chapter providecomprehensive information about the algorithm. How this algorithm will classify the faceand none face class from image data .

    3.1 I MAGE DATABASE

    The Federal board of Intermediate and Secondary Education scans the photographs fromthe application forms for each examination. The flat bed scanners are used to captureimages. The face size, angle and pose of each image may slightly vary due to different

    photographers and scanner operators. The photograph may be coloured or black and white

    before scanning but images are saved as gray scale .bmp image. The resolution is kept between 100dpi to 150 dpi. It is very low resolution. The purpose behind is to savememory. As each year 300,000 images are captured and processed. The following figureillustrates the image type. The coloured path leads the specific images stored in thedatabase and will be used for experiments.

  • 7/29/2019 dvd009-masterthesisreport

    16/35

    16

    Figure 3.1.1 Image type classification

    3.2 I MAGE DISCRIMINATION TECHNIQUES

    Image discriminating is primary area while dealing with face detection or other biometricsystems like Iris, ear, figure print analysis etc. These techniques pay an important rolewhile analysis of the image data and feature extraction [4, pp22]. The primary object of

    usage of these techniques in image analysis is to gain reduction in data dimensions. Thereare a number of techniques are available but current study is focused widely used twotechniques Principle Component Analysis and Discriminant Feature Analysis. Thefollowing figure 3.2.1 illustrates the discriminative methods. Appearance based methods use machine learning techniques. There are a number of statistical approaches to classify the data before training. Statistical pattern recognitionsapproaches can be divided into two categories generative and discriminative [1, pp98].Generative methods are based upon estimating higher order of probability distribution over

    Images

    StillVideos

    Color B&W Gray scale Color B&W Gray scale

    Single faceMulti face

    UpwardDownwar UpwardDownward

    Resolution

    Lighting

    Size

    Poses

    Occulted

  • 7/29/2019 dvd009-masterthesisreport

    17/35

    17

    examples and for gaining this purpose maximum likelihood(ML) or maximum a posterior (MAP) are used. Hidden Markov Model (HHM), Markov Random Field (MRF) and NaveBayes algorithms are examples of generative methods.

    Figure 3.2.1 image discrimination methods

    Discriminative methods based upon to find a decision surface between face and none face patterns. And these methods needed face (positive) and non-face (negative) examples tofind decision surface [1, pp 98]. There are advantages and disadvantages of using eachapproach. The discriminative approach will be discussed further and will be used for development of the system FBISE.

    3.2.1 P RINCIPAL C OMPONENT ANALYSIS

    Principal Component Analysis (PCA) is a statistical technique used to transformdimensions of the space from a higher one to a lower. It helps to find patterns in data. Ituses standard deviation, mean value, variance, covariance and matrix algebra conceptsfrom statistics and mathematics. As image is a high dimension data. Work with images ishigh source demanding and complex. Principal Component Analysis is very useful andwidely used. All the image data is represented in the form of long vectors. PrincipalComponent Analysis has two methods covariance and correlation. Before going to explainPCA algorithm it is worth to explain some terms and definitions used by PCA and other image discriminating technologies.

    Appearance basedmethods

    Statistical methods

    Principle Component Analysis

    Hidden Markov Model

    Naive Bayes Classifier

    Fishiers Linear Discriminant

    Support Vector Machine

    Discriminative methodsGenerative methods

    Hidden Markov Model

  • 7/29/2019 dvd009-masterthesisreport

    18/35

    18

    Before going to exploring Principle Component Analysis algorithm it is worth to gothrough some mathematics and statistical terminologies. Let we have a data set S= {s1, s2,s3, sn} then mean denoted by SM will be.

    SM = si/n i= 1,2,3,..n 3.2.1.1

    Standard deviation SD will be as

    SD = ( (Si SM)^2/n-1)^1/2 i=1,2,3,n 3.2.1.2Variance is very similar to the standard deviation and the formula for the data set S can becalculated as

    Var(S) = (Si SM)^2/n-1 i=1,2,3,.n 3.2.1.3

    Covariance an other term is used in statistics. Standard Deviation and Variance deal with onedimensional data where as the Covariance is similar measures between 2 dimensional data. Letconsider S and L two data sets then the covariance will be as.

    Cov(S)= (Si SM)(L-LM)/n-1 i=1,2,3,.n

    If covariance is calculated for one dimensional data then it will be equal to the variance.

    Engine Vector : The matrix M can be written as

    Mx = x 3.3.1.1(M- I)x =0 3.3.1.2

    Where I is identity matrix and 0 is zero vectors. The solution of the equation results enginevectors. No of engine vectors depends upon the dimension of the matrix.

    Engine Values : The corresponding values of from 1 to d are known as engine values.

  • 7/29/2019 dvd009-masterthesisreport

    19/35

    19

    Figure 3.2.1.1 Principle Component Analysis Algorithm

    Principal Component analysis is limited to the linear transformation. In many cases non-linear transformation produces better and faster results. Kernel Principal ComponentAnalysis provides non-linear transformation of dimensions. The Support Vector Machineuses the image data transformed by KPCA for classification. It has all capabilities of PCAwith some extensions.

    start

    Data Set

    MeanSubtraction

    CovarianceMatrix

    Eigenvectors &enginvalues

    Feature Vector Component

    New data set

    The feature vector is calculated

    The mean values x1 and y1 of x and y coordinates are subtracted fromx and y respectively. The new dataset produced will have zero meanvalue.

    The Covariance matrix is calculated. Dataset is given here

    Eigenvectors and corresponding engine values are calculated

    The new data set is ready for further processing. The algorithm isrepeated until the desired results are obtained.

    The first step to choose dataset for processing. In case of image thedataset is two dimensional matrix of LxM order. L represents rows of the pixels and M denotes for columns. Each and every pixel may berepresented by (x,y) coordinates.

  • 7/29/2019 dvd009-masterthesisreport

    20/35

    20

    3.2.2 L INEAR DISCRIMINATING ANALYSIS

    Linear Discriminating Analysis finds the linear combination of feature which separates thetwo or more classes accurately. The algorithm can be used classification as well as for reduction of dimensions of the data.

    One of the examples of Linear Discriminating Analysis is Fishers Linear Discriminant. Itfinds the optimal projection for class separation from dataset instead of separating and

    projecting variance. There are two terms normally discussed while Fishers Linear Discriminating i.e. between-class scatter and within-class scatter. The algorithm finds such

    projection that maximizes the ration between the above said two variations. i.e. max(between-class scatter/within-class scatter). The output of the algorithm with respect to facedetection is known as fisher faces.

    Consider the between-class scatter matrix according to [1, pp 112] is.

    Sb = Ni(i -)(i-)^T i=1,2,3..c 3.2.2.1

    And within-class scatter matrix is

    Sw = (Xk-i)(Xk-i)^T Xk Xi, i=1,2,3..c 3.2.2.2

    = Swi 1= 1,2,3, c 3.2.2.3

    Where Ni is number of sample in class Xi and i is the mean of class Xi. Swi is the covariance of

    class Xi.

    The optimal projection W is the matrix that is maximizing the ratio of the determinant of the between-class scatter matrix to the within-class scatter matrix and it is written as.

    W = arg max |W^T SB W| / | W^T Sw W| 3.2.2.4= [w1, w2, w3, wm] 3.2.2.4

    After computing maximum ratio between two classes scatter mentioned above a trainingset is project in c-1 dimensional feature space i.e. X = W X and then Gaussian

    distribution can be used to model each class-conditional density function. The decision ruleweather a face is present in an image window or not is decided based upon followinglikelihood

    Xl = arg max P(X|Xi) I = 1,2 3, c 3.2.2.5

  • 7/29/2019 dvd009-masterthesisreport

    21/35

    21

    3.3 P ROPOSED SYSTEM

    The previous chapters illustrate different techniques and methods of face detection andrecognition. Each category of method performs well in certain criteria and also hasdrawbacks as well. The experiments are carried out using a small number of images (200 to500). Systems with robustness and certain level of accuracy are still far away. Keeping inview case study the following architecture is proposed for the detection and recognition

    system.

    Figure 3.3.1 Face Recognition System Architecture

    As discussed in previous chapter that the robust system catering the needs of real worldsituation like mentioned in case study is a challenging task. The images are scanned byflatbed scanner and stored into database. The candidate may interact with organization later regarding subsequent examination(s). Again the image is scanned and stored into thedatabase. Now two images of the same candidate are stored into the database. The first stepis to select desired images from the database then for comparisons them the next step is todetect faces from each image. The next step is to recognise that images as of the samecandidate or not. Following is the abstract architecture of face detection module.

    Face Detection

    Face recognition

    ImageDatabase

    ImageScanned

    Image Selected

    Recognized /Not recognized

  • 7/29/2019 dvd009-masterthesisreport

    22/35

    22

    Figure 3.3.2 Face Detection method

    The above proposed face detection method is inspired by method suggested by Peichung Shih andChengjun Liu [7]. It is combination of Support Vector Machine and Discriminating FeatureAnalysis. The method has shown 98.2 detection rates and is comparatively takes less time for computation. Classification of face and non-face is taken place at two stages. Firstly theDiscriminating feature Vector is calculated by representation of image data by 1-D Haar Waveletrepresentation and its amplitude projections. It defines distribution base measure for face, non-faceand undecided classes. These undecided classes are again processed for Support Vector Machine.Thus entire image is classified into face and non-face classes.

    Imagediscriminating

    Techniques

    FaceClass

    Non-faceClass

    SVM

  • 7/29/2019 dvd009-masterthesisreport

    23/35

    23

    4 K ERNEL M ETHODS

    Previous chapter discussed the use of image discriminating techniques for face

    detection for undergoing case study. This chapter demonstrates the kernel versionof the Principle Component Analysis and Fishers Discriminating Analysis. This isthe advanced form of the both discussed techniques and can be mapped intomodular framework of kernel methods .

    4.1 O VERVIEW

    Patterns analysis is study of the problem of detecting and characterising relations indata. The study is needed in different contexts and problems. In machine learningtechniques the patterns are analysed based upon classification rules, regressionfunctions and structured clusters in data. While analysing patterns in data by usingalgorithms the efficiency, robustness and stability are main concerns Kernelmethods [23] are also used for the analysis and detection patterns in data in amodular way .

    Figure 4.1.1 Kernel methods modular approach

    The first step the data is processed to form a kernel matrix using kernel function.There may be used any kind of kernel functions depending upon the nature and typeof the data. Data may be image, text or heterogeneous. The second step is to usekernel algorithm for analysis of data. The information is taken from the kernelmatrix.

    The above said approach separates the kernel function and kernel algorithm. It provides a way to use any kernel function with any kernel algorithm according tothe problem and data.

    KernelFunction Algorithm

  • 7/29/2019 dvd009-masterthesisreport

    24/35

    24

    4.2 K ERNEL FUNCTIONS

    Kernel functions are used to make a kernel matrix in above said modular approachof kernel methods. That means kernels functions can be used to for implementationof nonlinear function mapping of linear functions. This property makes supportvector machines able for classification non-linearly as well. Commonly kernelfunctions are polynomials; Radial based function (RBF) and sigmoid kernels. Anumber of operations can be done upon Kernel function. Some of them are listedhere.

    1. K(x,z) = k1(x,z)+k2(x,z)2. K(x,z)= aK1(x,z)

    3. K(x,z)= K1(x,z) K2(x,z)4. K(x,z)=f(x)f(z)5. K(x,z) =k3((x),(z))

    Where k, k1, k2, k3 are kernels over X x X and X R. [35, pp 75]. By applyingsimple operations complex kernels can be constructed. Operations upon kernel aredone for transforming data, centering data, and subspace projection, whitening andsculpting the feature space.

    4.3 S UPPORT VECTOR MACHINES

    Support vector machine is an algorithm used to classify and learn data by separatingclasses by maximum marginal hyper plan. The idea first introduced by Vladimir Vapnik based upon computational and natural learning theory. The support vector machines can also be used for non-linear data classification by using kernelsfunctions. The main purpose is to find a plane between different kind of dataclustered and which can clearly separate them. It is important while using supportvector machine algorithm that which kernel function is used. There three types of kernel functions used polynomials, sigmoid and radial based kernels. A smalldescription of each is given below.

    4.3.1 P OLYNOMIAL

    Polynomial kernel functions are constructed by raising power of dot product of twovectors representing cluster of two types of data. Let A and B are two vectors then a

    polynomial function may be P(A,B) = (A.B)^n. this function will computedimensions for any values of A and B vectors depending upon the power of dot

  • 7/29/2019 dvd009-masterthesisreport

    25/35

    25

    product of these two vectors. For normalised training data sets polynomials are moresuitable.

    4.3.2 R ADIAL BASED

    Radial based kernel maps data in higher space non-linearly so it can handle caseswhere attributes of different data sets have non-linear relations between them.Radial bases functions have been popular choice for support vector machines due toless numerical computation. The radial bases function for A and B vectors may bewritten as RBF (A, B) = e^||A-B||^2 /2 .

    4.3.3 SIGMOID

    Sigmoid kernels functions are tangents of the product of vectors. For vectors A andB the sigmoid function will be Sig(A,B) + tanh(A.B + coefficient)

    4.4 K ERNEL P RINCIPAL C OMPONENT ANALYSIS (KPCA)

    The kernel Principle Component Analysis is extension and application of PCA inkernel defined feature space. The Principle Component Analysis has not facility tohandle dual representation. It provides non-liner function for features analysis.Projections onto feature space eigenvectors is computed through the dualrepresentation. It is computed from the engine values and engine vectors fromKernel matrix. So here two extra things are to do as compare to PrincipleComponent Analysis. The computation of kernel matrix and solve the following

    equation and the

    M = K 4.2.1

    Here KPCA algorithm [35, pp 151] is illustrated.

  • 7/29/2019 dvd009-masterthesisreport

    26/35

    26

    Input data set S={x1, x2, x3,.xm}

    Process Kij = k(xi,xj) I,j=1,2,3,,m

    K=K-1/mjjK-1/mKjj-1/m^2jKjj = eig[K]

    j = 1/^1/2 Vj j=1,2,3,.K

    xi = jk(xi,x)

    Output transformed data set

    Figure 4.4.1 KPCA algorithm

    4.5 K ERNEL F ISHER DISCRIMINANT A NALYSIS

    As said in earlier sections the kernel approach has gained considerable attention during thelast few years. It helped to overcome the computational problems while dealing with highdimensional data. KPCA is advanced version of Fisher Discriminating Analysis. Herealgorithm is described. For a given non- linear mapping the input data space R can bemapped in space H [4, pp 237]. Mathematically can be written as

    : R H

    x (x)

    Where H is Hilbert space and it has much higher space may be of infinite dimensions. Themotivation behind Kernel Fisher Discriminating Analysis is to perform Linear DiscriminantAnalysis or Principle Component Analysis in feature space H. Without Kernel tricks it isvery difficult [4, pp 237]. So consider {x1, c2, x3,, xm } R then covariance operator over feature space H can be calculated.

    Sv = 1/m ( (xj) -mo)( (xj) -mo)^t j=1,2,3,.m 4.5.1Where

    Mo = 1/m ( (xj) is covariance matrix in H feature space. Covariance operatorsmay be bounded, compact, positive and self-joined [4, pp 237].

    4.6 C OMPARISON OF PCA AND LDA

    As stated earlier sections that principle Component Analysis and Linear Discriminating Analysis are two techniques used to reduce high dimensionally of image data so that the processing can be don fast and robust. The Linear

  • 7/29/2019 dvd009-masterthesisreport

    27/35

    27

    Discriminating Analysis is considered more efficient than Principle ComponentAnalysis [36]. The Principle Component Analysis focused upon to find componentfrom the data regardless of classification whereas the Linear DiscriminatingAnalysis is more focused upon find linear separation between classes in data.

    Theoretically Linear Discriminating Analysis seems more suitable than PrincipleComponent Analysis. Experimentally PCA is more accurate and commonly has

    been being implemented in face detection and recognition systems. According to[38] an evaluation and comparison of Principle Component Analysis and Linear Discriminant Analysis is done by using more than 640 FERET images containingfaces and concluded that LDA performs worst than PCA uniformly.

    While implementing PCA and LDA there are a number of other factors liketraining setup, computation efforts affect the results. Kernel versions of the PCAand Fishers Discriminating Analysis have reduced the computational efforts

    considerably. So it is very difficult at present state that which one is more efficientand accurate method.

  • 7/29/2019 dvd009-masterthesisreport

    28/35

    28

    5 CONCLUSION

    This chapter concludes the work done and study during this thesis. The summery of

    all chapters is discussed under heading discussion. The future work contains someintentions to enhancement of the work done and also application of this study mayhelpful in certain areas is discussed.

    5.1 D ISCUSSION

    Face detection using image discriminating methods have shown reasonableadvancement in the area of computer vision and biometric image analysis. Thecombination with machine learning techniques has resulted more accurate andefficient. Some of the discriminating techniques are discussed for face detection. During current study we revealed the area of face detection. A comprehensivesurvey is carried out to understand the problems and opportunities in context of computer vision and machine learning. The area demands a lot of research toachieve a higher level of accuracy and to gain computational efficiency. Differentapproaches and techniques are discussed. The pros and corn helped to understandthe problem and leads to proper method selection according to the nature of imagedatabase. The case study provides a suitable image database for experimentingdifferent techniques and methods discussed in chapter 2.

    In chapter 3 a face detection and recognition system is suggested for the case study based upon the study carried out in previous chapters. As concluded that the method proposed by [7] has provided good results so far. Support vector machine anddiscrimination feature analysis

    The Kernel methods provide a modular way of analysis of patterns in data.Especially when data is of high dimensions like image the computational efforts areconsiderably reduced by use of kernels. The chapter 4 discussed the application of

    discriminating techniques through kernel functions.

  • 7/29/2019 dvd009-masterthesisreport

    29/35

    29

    5.2 F UTURE W ORK

    The goal, robust face detection and recognition, is still far. The case study discussedduring the current work is interesting for further research and development activities.Due to a variations and a huge number of images is perfect platform for experimenting algorithms.

    During case study there are many related problems and areas where the current studymay help to analysis and development of systems. One of the problems is involved toread hand written roll numbers. The image discriminating techniques may be usefulfor this project. But still a considerable work to go to overcome variations whiledetecting faces in the images.

    Image discriminating techniques studied during the thesis work can be implementedto other biometric systems. For example systems involved detection and recognition

    of iris, ear, palm, signature, and finger prints etc need comprehensive image analysis.These techniques are very helpful while analysing patterns and classification.

    The face detection methods based upon image discriminating techniques and machinelearning can be extending to detect other objects. For example in parking systemvehicles can be detected and monitored accordingly.

    As discussed in chapter two the face detection has been a challenging task due tonumber of factors like poses and illumination. Most of the exiting methods andalgorithms are unable to cater for these variations. A considerable attention is

    required to develop efficient methods that can work with and overcome to such problems. The research in this area is very actively going on and the current studywill help for laying solid foundation for it. Kernel methods and support vector machines algorithms have been shown better results to overcome above said

    problems. Recently more and more researchers are performing experiments by usingimage discriminating techniques and support vector machines and hoping for better results.

    The under discussion case study the images have almost all variations discussed inchapter two. To develop a automated recognition system all aspects are to be

    considered. A comprehensive system is suggested in chapter three. The accuracy andefficiency of the system still a big question mark. Further research and developmentin the area of face detection and recognition will help to improve the systemefficiency and accuracy. Also the system involves a large image database. It wouldalso an interesting to deal with a huge data.

    One of the problems faced is that there is no comprehensive platform for students andyoung researchers for performing experiments. All have to rely on MATLAB or one

  • 7/29/2019 dvd009-masterthesisreport

    30/35

    30

    has to develop code from ABC in some language like C, C++ or JAVA. The complexmathematics and statistical equations demand hung amount of time and efforts. Thereare few C++ libraries provided by some research groups free of cost for further research in the area of image processing but still they are insufficient for building up a

    platform for experiments in the area of face detection and recognition. So it issuggested that research groups in this area of face detection and recognition should be

    promoted to provide their work online so that new incumbents in this field may getencouragement and can perform experiments to conclude results without waiting timein drudgery work of coding.

  • 7/29/2019 dvd009-masterthesisreport

    31/35

    31

    6 REFERENCES

    [1] Yang, Ming-Hsuan, Face detection and gesture recognition for human-computer

    interaction, Boston, Mass. ; London : Kluwer Academic 2001.

    [2] Jolliffe, Ian T, Principal Component Analysis, Springer-Verlag New York,Incorporated Date: 2002.

    [3] Chen, Yixin. Machine Learning and Statistical Approaches to Image RetrievalSecaucus, NJ, USA: Kluwer Academic Publishers, 2004.

    [4] Zhang, David. Biometric Image Discrimination Technologies. Hershey, PA, USA:Idea Group Publishing, 2006.

    [5] Javidi, Bahram. Image Recognition and Classification : Algorithms, Systems, andApplications. New York, NY, USA: Marcel Dekker Incorporated, 2002

    [6] Hoiem, D.; Efros, A.A.; Hebert, M.; Geometric context from a single imageComputer Vision, 2005. ICCV 2005. Tenth IEEE International Conference onVolume 1, 17-21 Oct. 2005 Page(s):654 - 661 Vol. 1

    [7] Shih, P.; Liu, C Face detection using discriminating feature analysis and SupportVector Machine Pattern Recognition Year: 2006 Volume: 39 Issue : 2 Pages: 260-276.

    [8] Peichung Shih and Chengjun Liu Face Detection Using Distribution-basedDistance and Support Vector Machine Proceedings of the Sixth InternationalConference on Computational Intelligence and Multimedia Applications(ICCIMA05)0-7695-2358-7/05.

    [9] Hyun-Chul Choi, Se-Young Oh Face Detection in Static Images using BayesianDiscriminating Feature and Particle Attractive Genetic Algorithm IntelligentRobots and Systems, 2005. (IROS 2005). 2005 IEEE/RSJ InternationalConferenceon 2-6 Aug. 2005 Page(s):1072 1077

    [10] Gottumukkal, R.; Asari, V.K. Real Time Face Detection from Color Video StreamBased on PCA Method Applied Imagery Pattern Recognition Workshop, 2003.Proceedings. 32nd 15-17 Oct. 2003 Page(s):146 150.

  • 7/29/2019 dvd009-masterthesisreport

    32/35

    32

    [11] Hongliang Jin; Qingshan Liu; Xiaoou Tang; Hanqing Lu; Learning LocalDescriptors for Face Detection Multimedia and Expo, 2005. ICME 2005. IEEEInternational Conference on 06-06 July 2005 Page(s):928 931

    [12] Mita, T, Kaneko, T.; Hori, O Joint Haar-like features for face detection Mita.;Computer Vision, 2005. ICCV 2005. Tenth IEEE International Conference onVolume 2, 17-21 Oct. 2005 Page(s):1619 - 1626 Vol. 2.

    [13] R-QiongXu ,Bi-Cheng Li ,Bo Wang Face Detection And Recognition Using Neural Network And Hidden Markov Models.0-7803-7702-8/03/

    [14] Emad Barsoum, Tamer Mostafa, AbdelMonem A. WahdanA New ImageComparing Technique for Content-Based Image Retrieval 0-7803-8575-6/04.

    [15] KES 2001 (Conference) Amsterdam : IOS Press; ; Tokyo : Ohmsha, cop. 2001

    Knowledge-based intelligent information engineering systems & alliedtechnologies : KES' 2001. Part 2

    [16] Model-based coding : extraction, coding, and evaluation of face model parameters Linkping : Univ., 2002

    [17] Mike James Pattern recognition John Wiley 1988.

    [18] Biometrics: personal identification in networked society Boston ; London:Kluwer, 1999

    [19] Lindsay I Smith A tutorial on Principal Components Analysis February 26,2002

    [20] London, Justin. Modeling Derivatives in C++. Hoboken, NJ, USA: John Wiley,2005.

    [21] Kotropoulos, C. Pitas, I, Rule-based face detection in frontal viewsAcoustics, Speech, and Signal Processing, 1997. ICASSP-97., 1997 IEEE

    International Conference on Volume 4, 21-24 April 1997 Page(s):2537 - 2540

    vol.4

    [22] Xiaofeng Lu; Nanning Zheng; Songfeng Zheng,Linear sparse feature based facedetection in gray images Image Processing, 2003. ICIP 2003. Proceedings. 2003International Conference on Volume 3, 14-17 Sept. 2003 Page(s):III - 889-92 vol.2

  • 7/29/2019 dvd009-masterthesisreport

    33/35

    33

    [23] Sung,K.-K, Poggio T, Example based learning for view based human facedetection Pattern Analysis and Machine Intelligence, IEEE transactions on,volume 0,Issue 1 Jan 1998, Pages( 39 51).

    [24] Rowley, HA:, Baluja, S:, Kanade, T:, Neural Network-Based face DetectionComputer Vision and Pattern Recognition, 1996 Proceedings CVPR96, 1996 IEEEComputer Society Conference on, 18-20 June 1996, pages 203-208

    [25] Rowley, HA:, Baluja, S:, Kanade, T:, Rotation invariant Neural Network-Basedface DetectionComputer Vision and Pattern Recognition, 1998. Proceedings. 1998IEEE Computer Society Conference on 23-25 June 1998 Page(s):963 - 963

    [26] Feraud, R.; Bernier, O.; Viallet, J.E.; Collobert, M.; A fast and accurate facedetector for indexation of face images Automatic Face and Gesture Recognition,2000. Proceedings. Fourth IEEE International Conference on28-30 March 2000

    Page(s):77 - 82

    [27] Viola, P.; Jones, M.; Robust real-time face detectionComputer Vision, 2001.ICCV 2001. Proceedings. Eighth IEEE International Conference onVolume 2, 7-14 July 2001 Page(s):747 - 747

    [28] Cootes, T.F.; Edwards, G.J.; Taylor, C.J.; Active appearance modelsPattern Analysis and Machine Intelligence, IEEE Transactions on Volume 23,

    Issue 6, June 2001 Page(s):681 - 685

    [29] Cherkassky, V., The Nature Of Statistical Learning Theory Neural Networks, IEEE Transactions on, Volume 8, Issue 6, Nov. 1997Page(s):1564 - 1564

    [30] www.fbise.edu.pk dated 12-06-2006

    [31] Waring, C.A.; Xiuwen Liu, Face detection using spectral histograms and SVMsSystems, Man and Cybernetics, Part B, IEEE Transactions on Volume 35, Issue 3,June 2005 Page(s):467 476

    [32] Yang, M.-H.; Ahuja, N.; Kriegman, D., Face recognition using kernel eigenfaces Image Processing, 2000. Proceedings. 2000 International Conference on Volume1, 10-13 Sept. 2000 Page(s):37 - 40 vol.1

    [33] Leung, T.K.; Burl, M.C.; Perona, P., Finding faces in cluttered scenes usingrandom labeled graph matching,Computer Vision, 1995. Proceedings., FifthInternational Conference on 20-23 June 1995 Page(s):637 644

  • 7/29/2019 dvd009-masterthesisreport

    34/35

    34

    [34] Kin Choong Yow; Cipolla, R., A probabilistic framework for perceptual groupingof features for human face detection , Automatic Face and Gesture Recognition,1996., Proceedings of the Second International Conference on14-16 Oct. 1996Page(s):16 21

    [35] John Shawe-Taylor, Nello Cristianini, Kernel Methods for Pattern AnalysisCambridge University Press 2004. ISBN 0 521 81397 2.

    [36] A.M. Martinez, A.C. Kak, PCA versus LDA, IEEE Trans. on Pattern Analysis andMachine Intelligence, Vol. 23, No. 2, 2001, pp. 228-233.

    [37] B Scholkopf, A Smola, KR Muller Kernel Principal Component AnalysisAdvances in Kernel Methods-Support Vector Learning, 1999 - cs.columbia.edu

    [38] J.R. Beveridge, K. She, B. Draper, and G.H. Givens, A Nonparametric Statistical

    Comparison of Principal Component and Linear Discriminant Subspaces for FaceRecognition, Proc. of the IEEE Conference on Computer Vision and PatternRecognition, December 2001, Kaui, HI, USA, pp. 535-542.

    [39] P. Sinha. Object Recognition via Image Invariants: A Case Study. InvestigativeOphthalmology and Visual Science, 35, pp. 1.735-1.740, 1994.

  • 7/29/2019 dvd009-masterthesisreport

    35/35

    7 F IGURES & TABLES

    Figure 2.3.2.1 P sinha defined face template for face localization [39] 10.Figure 2.3.4.1 Face and non-face classes are separated by using

    Density function for patterns in image data [23] 11

    Figure 2.3.4.1 The distance measures used by Sung and Poggio [23] 12

    Figure 2.3.4.3. System Diagram of Rowleys Methods [178] 12

    Figure 2.4.1. Face detection methods summary 13

    Table 2.4.1 comparison of different face detection techniques 14

    Figure 3.1.1 Image type classification 16

    Figure 3.2.1 image discrimination methods 17

    Figure 3.2.1.1 Principle Component Analysis Algorithm 19

    Figure 3.3.1 Face Recognition System Architecture 20

    Figure 3.3.2 Face Detection method 21

    Figure 4.1.1 Kernel methods modular approach 23

    Figure 4.4.1 KPCA algorithm 26