Face Recognition Technology
-
Upload
shravan-halankar -
Category
Technology
-
view
387 -
download
0
Transcript of Face Recognition Technology
O U T L I N E
1. Introduction
2. Biometrics
3. Why Face Recognition?
4. Implementation
5. How it works?
6. Strengths & Weaknesses
7. Major Challenges in FRT
8. Applications
9. Future of FRT………
I N T R O D U C T I O N
Everyday actions are increasingly being handledelectronically, instead of ink and paper or face to face.
This growth in electronic transactions results in greatdemand for fast and accurate user identification andauthentication.
Access codes for buildings, banks accounts and computersystems often use PIN's for identification and securityclearances.
Using the proper PIN gains access, but the user of the PINis not verified. When credit and ATM cards are lost orstolen, an unauthorized user can often come up with thecorrect personal codes.
BIOMETRICS technology may solve this problem .
BIOMETRICS?A biometric is a unique, measurable characteristic of a human
being that can be used to automatically recognize an individual
or verify an individual’s identity.
Biometrics system is an automated system of identifying a person based on person’s physical or behavioral characteristics.
• Face recognition technology is the least intrusive and fastest biometric technology. It works with the most obvious individual identifier – the human face.
• It requires no physical interaction on behalf of the user.
• It can use your existing hardware infrastructure, existing cameras and image capture Devices will work with no problems
• It is only Biometric that allow you to perform passive identification in many environments. (e.g: Identifying terrorist in a busy Airport terminal.)
• It does not require an expert to interpret the comparison result.
ACCURATE!!
THE HUMAN FACE
• The face is an important part of who you are and how people identify you.
• In face recognition there are two types of comparisons :
This is where the system compares the given individual with who that individual says they are, and gives a yes or no decision.
This is where the system compares the given individual to all the Other individuals in the database and gives a ranked list of matches.
Verification Identification
ALL IDENTIFICATION OR AUTHENTICATION TECHNOLOGIES OPERATE USING THE FOLLOWING FOUR STAGES:
1)Capture
A physical or behavioral sample is captured by the system during Enrollment and also in identification or verification process
2)ExtractionUnique data is extracted from the sample and a template is created.
3)Comparison
The template is then compared with a new sample stored in the data base
4)Match /non match
The system decides if the features extracted from the new Samples are a match or a non match
IMPLEMENTATION
Input face image(Capture)
Face feature extraction
Feature Matching
Decision maker
Output result
Facedatabase
COMPONENTS OF FACE RECOGNITION SYSTEM
Enrollment Module
An automated mechanism that scans and captures a digital or an analog image of a living personal characteristics.
Another entity which handles compression, processing, storage and compression of the captured data with stored data .
Database
Also consists of a preprocessing system. In this module the newly obtained sample is preprocessed and compared with the sample stored in the database. The decision is taken depending on the match obtained from the database.
Verification Module
Every face has at least 80 distinguishable parts called nodal points. Some of them are:
1. Distance between the eyes
Every face has at least 80 distinguishable parts called nodal points. Some of them are:
1. Distance between the eyes
2. Width of the nose
Every face has at least 80 distinguishable parts called nodal points. Some of them are:
1. Distance between the eyes2. Width of the nose
3. Depth of eye sockets
Every face has at least 80 distinguishable parts called nodal points. Some of them are:
1. Distance between the eyes2. Width of the nose3. Depth of eye sockets
4. Structure of cheek bones
Every face has at least 80 distinguishable parts called nodal points. Some of them are:
1. Distance between the eyes2. Width of the nose3. Depth of eye sockets4. Structure of the cheek bones
5. Length of jaw line
A general face recognition software conducts a comparison of these parameters to the images in its database.Depending upon the matches found, it determines the result.This technique is known as feature based matching and it is the most basic method of facial recognition.
A 3D facial recognition model provides greater accuracythan the feature extraction model.
It can also be used in a dark surroundings and has a ability to recognize the subject at different view angles.
Using 3D software, the system Goes through a number of stepsto verify the identity of an individual.
Acquiring an image can be done through a digital scanning device.
Once it detects the face, the system determines heads position, size and pose.
The system then measures the curves of the face on a sub-millimeter scale and creates a template.
The system translates this template into a unique code.
The image thus acquired will be compared to the images in the data base and if 3D images are not available to the database, then algorithms used to get a straight face are applied to the 3D image to be matched.
Finally in verification, the image is matched to only one image in the database and the result is displayed as shown alongside.
The most commonly used unique feature for facial recognition is iris of the eye. No two human beings, even twins have exactly similar iris.
1. Eigen face or PCA (Principal Component Analysis)
Other method;
1. EBGM -Elastic Bunch Graph Method.-2D Image
2. 3D Face Recognition Method 3D Image
FACE FEATURE EXTRACTION METHODS
EIGEN FACE OR PCA (PRINCIPAL COMPONENT ANALYSIS)
• PCA, commonly referred to as the use of eigenfaces, this technique pioneered by Kirby and Sirivich in 1988.
• The PCA approach typically requires the full frontal face to be presented each time otherwise the image results in poor performance.
• The primary advantage of this technique is that it can
reduce the data needed to identify the individual to
1/1000th of the data presented
PCA-PRINCIPAL COMPONENT ANALYSIS(EIGEN FACE METHOD)
• 1.Create training set of faces and calculate the eigenfaces ( Creating the Data Base)
• 2. Project the new image onto the eigen faces.
• 3. Check closeness to one of the known faces.
• 4. Add unknown faces to the training set and re-calculate
• Face Image as I(x,y) be 2 dimensional N by N array of
(8 bit) intensity values.
• Image may also be considered as a vector of dimension N2.
( 256x256 image = Vector of Dimension 65,536 )
y Image T1=I1(1,1),I1(1,2)…I1(1,N),I1(2,1)…….., I1(N,N)
x
CREATING TRAINING SET OF IMAGES
• Training set of face images T1,T2,T3,……TM.-
• 1. Average Face of Image =Ψ = 1 ( ∑M Ti ) ; M –no. of images
M i=1
Ψ average face
• 2. Each Training face defer from average by vector Φ
Φi Eigen face
Each Image Average Image
Ti Ψ
Φi =Ti - Ψ
Elastic Bunch Graph Matching(EBGM)
• EBGM relies on the concept that real face images have many non-linear characteristics that are not addressed by the linear analysis methods .
• Such as variations in illumination(outdoor lighting vs. indoor fluorescents), pose (standing straight vs. leaning over) and expression (smile vs. frown).
• A Gabor wavelet transform creates a dynamic link architecture that projects the face onto an elastic grid.
• The Gabor jet is a node on the elastic grid, notated by circles on the image below, which describes the image behavior around a given pixel.
Elastic Bunch Graph Matching(EBGM)
• Recognition is based on the similarity of the Gabor filter response at each Gabor node.
• The difficulty with this method is the requirement of accurate landmark localization.
STRENGTHS AND WEEKNESSES OF FRT
STRENGTHS
It has the ability to leverageexisting image acquisitionequipment.
It can search against staticimages such as driver’slicense photographs.
It is the only biometric ableto operate without usercooperation.
WEEKNESSES
Changes in acquisition environmentreduce matching accuracy.
Changes in physiologicalcharacteristics reduce matchingaccuracy.
It has the potential for privacyabuse due to no cooperativeenrolment and identificationcapabilities.
PERFORMANCE OF FRT
False acceptance rates(FAR)
• The probability that a system will incorrectly identify an individual or will fail to reject an imposter.
• FAR= NFA/NIIA
• Where FAR= false acceptance rate
NFA= number of false acceptance
NIIA= number of imposter identification attempts
False rejection rates(FRR)
• The probability that a system will fail to identify an enrollee.
• FRR= NFR/NEIA
• Where FRR= false rejection rates
NFR= number of false rejection rates
NEIA= number of enrollee identification attempt
The only way to overcome this challenge is better equipment, i.e. basically , use of high tech cameras.It is very much essential for the system to catch the image accurately.
The only way to overcome this challenge is better ALGORITHMS for facial recognitions. If the systems are programmed for every possible permutation and combination of the image, an accurate match can be achieved.
It is being estimated that facial recognition technology will be the backbone of all major security, home and networking service.
With the growth of social networking over the web, unbelievably accurate facial recognition algorithms and advanced equipment, a person’s face, no mater ageing or disguises or damage, can be recognized and data about that person can be produced.
Twins Recognition.
1.www.biometrics.gov2.www.wikipedia.com3.www.howstuffworks.com4.www.face-rec.org5.www.facedetection.com6.Recognizing Face Images with
Disguise Variations Richa Singh, Mayank Vatsa and Afzel NooreLane Department of Computer Science & Electrical Engineering, West Virginia
University,USA