Top Banner
FACE RECOGNITION TECHNOLOGY SHRAVAN HALANKAR GOA UNIVERSITY ELECTRONICS DEPT.
42
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Face Recognition Technology

FACE

RECOGNITION

TECHNOLOGYSHRAVAN HALANKAR

GOA UNIVERSITY

ELECTRONICS DEPT.

Page 2: Face Recognition Technology

O U T L I N E

1. Introduction

2. Biometrics

3. Why Face Recognition?

4. Implementation

5. How it works?

6. Strengths & Weaknesses

7. Major Challenges in FRT

8. Applications

9. Future of FRT………

Page 3: Face Recognition Technology

I N T R O D U C T I O N

Everyday actions are increasingly being handledelectronically, instead of ink and paper or face to face.

This growth in electronic transactions results in greatdemand for fast and accurate user identification andauthentication.

Access codes for buildings, banks accounts and computersystems often use PIN's for identification and securityclearances.

Using the proper PIN gains access, but the user of the PINis not verified. When credit and ATM cards are lost orstolen, an unauthorized user can often come up with thecorrect personal codes.

BIOMETRICS technology may solve this problem .

Page 4: Face Recognition Technology

BIOMETRICS?A biometric is a unique, measurable characteristic of a human

being that can be used to automatically recognize an individual

or verify an individual’s identity.

Biometrics system is an automated system of identifying a person based on person’s physical or behavioral characteristics.

Page 5: Face Recognition Technology

TYPES OF BIOMETRICSFingerprints RetinaHand Geometry

Signature IrisFACE RECOGNITION

Page 6: Face Recognition Technology

• Face recognition technology is the least intrusive and fastest biometric technology. It works with the most obvious individual identifier – the human face.

• It requires no physical interaction on behalf of the user.

• It can use your existing hardware infrastructure, existing cameras and image capture Devices will work with no problems

Page 7: Face Recognition Technology

• It is only Biometric that allow you to perform passive identification in many environments. (e.g: Identifying terrorist in a busy Airport terminal.)

• It does not require an expert to interpret the comparison result.

ACCURATE!!

Page 8: Face Recognition Technology

THE HUMAN FACE

• The face is an important part of who you are and how people identify you.

• In face recognition there are two types of comparisons :

This is where the system compares the given individual with who that individual says they are, and gives a yes or no decision.

This is where the system compares the given individual to all the Other individuals in the database and gives a ranked list of matches.

Verification Identification

Page 9: Face Recognition Technology

ALL IDENTIFICATION OR AUTHENTICATION TECHNOLOGIES OPERATE USING THE FOLLOWING FOUR STAGES:

1)Capture

A physical or behavioral sample is captured by the system during Enrollment and also in identification or verification process

2)ExtractionUnique data is extracted from the sample and a template is created.

3)Comparison

The template is then compared with a new sample stored in the data base

4)Match /non match

The system decides if the features extracted from the new Samples are a match or a non match

IMPLEMENTATION

Input face image(Capture)

Face feature extraction

Feature Matching

Decision maker

Output result

Facedatabase

Page 10: Face Recognition Technology

COMPONENTS OF FACE RECOGNITION SYSTEM

Enrollment Module

An automated mechanism that scans and captures a digital or an analog image of a living personal characteristics.

Another entity which handles compression, processing, storage and compression of the captured data with stored data .

Database

Also consists of a preprocessing system. In this module the newly obtained sample is preprocessed and compared with the sample stored in the database. The decision is taken depending on the match obtained from the database.

Verification Module

Page 11: Face Recognition Technology
Page 12: Face Recognition Technology

Every face has at least 80 distinguishable parts called nodal points. Some of them are:

Page 13: Face Recognition Technology

Every face has at least 80 distinguishable parts called nodal points. Some of them are:

1. Distance between the eyes

Page 14: Face Recognition Technology

Every face has at least 80 distinguishable parts called nodal points. Some of them are:

1. Distance between the eyes

2. Width of the nose

Page 15: Face Recognition Technology

Every face has at least 80 distinguishable parts called nodal points. Some of them are:

1. Distance between the eyes2. Width of the nose

3. Depth of eye sockets

Page 16: Face Recognition Technology

Every face has at least 80 distinguishable parts called nodal points. Some of them are:

1. Distance between the eyes2. Width of the nose3. Depth of eye sockets

4. Structure of cheek bones

Page 17: Face Recognition Technology

Every face has at least 80 distinguishable parts called nodal points. Some of them are:

1. Distance between the eyes2. Width of the nose3. Depth of eye sockets4. Structure of the cheek bones

5. Length of jaw line

Page 18: Face Recognition Technology

A general face recognition software conducts a comparison of these parameters to the images in its database.Depending upon the matches found, it determines the result.This technique is known as feature based matching and it is the most basic method of facial recognition.

Page 19: Face Recognition Technology

A 3D facial recognition model provides greater accuracythan the feature extraction model.

It can also be used in a dark surroundings and has a ability to recognize the subject at different view angles.

Using 3D software, the system Goes through a number of stepsto verify the identity of an individual.

Page 20: Face Recognition Technology

Acquiring an image can be done through a digital scanning device.

Once it detects the face, the system determines heads position, size and pose.

Page 21: Face Recognition Technology

The system then measures the curves of the face on a sub-millimeter scale and creates a template.

The system translates this template into a unique code.

Page 22: Face Recognition Technology

The image thus acquired will be compared to the images in the data base and if 3D images are not available to the database, then algorithms used to get a straight face are applied to the 3D image to be matched.

Finally in verification, the image is matched to only one image in the database and the result is displayed as shown alongside.

Page 23: Face Recognition Technology

The most commonly used unique feature for facial recognition is iris of the eye. No two human beings, even twins have exactly similar iris.

Page 24: Face Recognition Technology

1. Eigen face or PCA (Principal Component Analysis)

Other method;

1. EBGM -Elastic Bunch Graph Method.-2D Image

2. 3D Face Recognition Method 3D Image

FACE FEATURE EXTRACTION METHODS

Page 25: Face Recognition Technology

EIGEN FACE OR PCA (PRINCIPAL COMPONENT ANALYSIS)

• PCA, commonly referred to as the use of eigenfaces, this technique pioneered by Kirby and Sirivich in 1988.

• The PCA approach typically requires the full frontal face to be presented each time otherwise the image results in poor performance.

• The primary advantage of this technique is that it can

reduce the data needed to identify the individual to

1/1000th of the data presented

Page 26: Face Recognition Technology

PCA-PRINCIPAL COMPONENT ANALYSIS(EIGEN FACE METHOD)

• 1.Create training set of faces and calculate the eigenfaces ( Creating the Data Base)

• 2. Project the new image onto the eigen faces.

• 3. Check closeness to one of the known faces.

• 4. Add unknown faces to the training set and re-calculate

Page 27: Face Recognition Technology

• Face Image as I(x,y) be 2 dimensional N by N array of

(8 bit) intensity values.

• Image may also be considered as a vector of dimension N2.

( 256x256 image = Vector of Dimension 65,536 )

y Image T1=I1(1,1),I1(1,2)…I1(1,N),I1(2,1)…….., I1(N,N)

x

CREATING TRAINING SET OF IMAGES

Page 28: Face Recognition Technology

• Training set of face images T1,T2,T3,……TM.-

• 1. Average Face of Image =Ψ = 1 ( ∑M Ti ) ; M –no. of images

M i=1

Ψ average face

Page 29: Face Recognition Technology

• 2. Each Training face defer from average by vector Φ

Φi Eigen face

Each Image Average Image

Ti Ψ

Φi =Ti - Ψ

Page 30: Face Recognition Technology

FACE IMAGES USING AS EIGEN FACES TRAINING IMAGES

-IMAGE MUST BE IN SAME SIZE-

Facedatabase

Page 31: Face Recognition Technology

Elastic Bunch Graph Matching(EBGM)

• EBGM relies on the concept that real face images have many non-linear characteristics that are not addressed by the linear analysis methods .

• Such as variations in illumination(outdoor lighting vs. indoor fluorescents), pose (standing straight vs. leaning over) and expression (smile vs. frown).

• A Gabor wavelet transform creates a dynamic link architecture that projects the face onto an elastic grid.

• The Gabor jet is a node on the elastic grid, notated by circles on the image below, which describes the image behavior around a given pixel.

Page 32: Face Recognition Technology

Elastic Bunch Graph Matching(EBGM)

• Recognition is based on the similarity of the Gabor filter response at each Gabor node.

• The difficulty with this method is the requirement of accurate landmark localization.

Page 33: Face Recognition Technology

STRENGTHS AND WEEKNESSES OF FRT

STRENGTHS

It has the ability to leverageexisting image acquisitionequipment.

It can search against staticimages such as driver’slicense photographs.

It is the only biometric ableto operate without usercooperation.

WEEKNESSES

Changes in acquisition environmentreduce matching accuracy.

Changes in physiologicalcharacteristics reduce matchingaccuracy.

It has the potential for privacyabuse due to no cooperativeenrolment and identificationcapabilities.

Page 34: Face Recognition Technology

PERFORMANCE OF FRT

False acceptance rates(FAR)

• The probability that a system will incorrectly identify an individual or will fail to reject an imposter.

• FAR= NFA/NIIA

• Where FAR= false acceptance rate

NFA= number of false acceptance

NIIA= number of imposter identification attempts

False rejection rates(FRR)

• The probability that a system will fail to identify an enrollee.

• FRR= NFR/NEIA

• Where FRR= false rejection rates

NFR= number of false rejection rates

NEIA= number of enrollee identification attempt

Page 35: Face Recognition Technology

The only way to overcome this challenge is better equipment, i.e. basically , use of high tech cameras.It is very much essential for the system to catch the image accurately.

Page 36: Face Recognition Technology
Page 37: Face Recognition Technology

The only way to overcome this challenge is better ALGORITHMS for facial recognitions. If the systems are programmed for every possible permutation and combination of the image, an accurate match can be achieved.

Page 38: Face Recognition Technology

APPLICATIONS

Page 39: Face Recognition Technology

It is being estimated that facial recognition technology will be the backbone of all major security, home and networking service.

With the growth of social networking over the web, unbelievably accurate facial recognition algorithms and advanced equipment, a person’s face, no mater ageing or disguises or damage, can be recognized and data about that person can be produced.

Twins Recognition.

Page 40: Face Recognition Technology

QUESTIONS ?

Page 41: Face Recognition Technology

1.www.biometrics.gov2.www.wikipedia.com3.www.howstuffworks.com4.www.face-rec.org5.www.facedetection.com6.Recognizing Face Images with

Disguise Variations Richa Singh, Mayank Vatsa and Afzel NooreLane Department of Computer Science & Electrical Engineering, West Virginia

University,USA

Page 42: Face Recognition Technology