SlideShare une entreprise Scribd logo
1  sur  16
A
Presentation
On

“ INTELLIGENT FACE RECOGNITION
TECHNIQUES ”

Presented by:

CHIRAG JAIN
INTELLIGENT FACE RECOGNITION TECHNIQUES

O
U
T
L
I
N
E



INTRODUCTION



SURVEY OF THE FACE RECOGNITION



STRENGTHS OF EFFICIENT FACE
RECOGNITION METHODS



ALGORITHM FOR FACE RECOGNITION
Introduction
Face recognition is a form of biometric identification. A biometrics
is, “Automated methods of recognizing an individual based on
their unique physical or behavioral characteristics.” The process
of facial recognition involves automated methods to determine
identity, using facial features as essential elements of distinction.
Solution To The Problem Of Machine Recognition Of Faces

Face Recognition

Segmentation
of faces from
cluttered
scenes

Feature
extraction from
the face
regions

Recognition or
verification
SURVEY OF THE FACE RECOGNITION
o
o
o

SEGMENTATION / DETECTION
FEATURE EXTRACTION METHODS
RECOGNITION FROM INTENSITY IMAGES
SURVEY OF THE FACE RECOGNITION
o
o

o

SEGMENTATION / DETECTION
FEATURE EXTRACTION METHODS
RECOGNITION FROM INTENSITY IMAGES

The first step in any automatic face recognition systems is the
detection (segmentation) of faces in Images.
Up to the mid-1990s, most work on Segmentation was focused on
single-face segmentation from a simple or complex background.
These approaches included using a whole face template, a deformable
feature-based template, skin color, and a neural network.
SURVEY OF THE FACE RECOGNITION
o

SEGMENTATION / DETECTION

o

FEATURE EXTRACTION METHODS

RECOGNITION FROM INTENSITY IMAGES
Three types of feature extraction methods can be distinguished:
(1) generic methods based on edges, lines, and curves;
(2) feature-template-based methods that are used to detect facial features such as eyes;
(3) structural matching methods that take into consideration geometrical constraints on
the features.
o

These methods have difficulty when the appearances of the features change
significantly, for example, closed eyes, eyes with glasses, open mouth.
SURVEY OF THE FACE RECOGNITION
o

SEGMENTATION / DETECTION
FEATURE EXTRACTION METHODS

o

RECOGNITION FROM INTENSITY IMAGES

o

These methods are classified into three main categories:
1.holistic matching methods, 2. feature-based matching methods and 3. hybrid methods.

Holistic matching methods use the whole face region as the raw input to a recognition

system.Using PCA, many face recognition techniques have been developed: eigen faces, featureline based methods, Fisher faces, Bayesian methods and SVM methods.
In Feature-based matching methods, local features such as the eyes, nose, and mouth are
first extracted and their locations and local statistics (geometric and/or appearance) are fed into a
structural classifier.
Hybrid methods are based on using both local features and the whole face region to recognize a
face, as the human perception system uses.
STRENGTHS OF EFFICIENT FACE RECOGNITION METHODS

The PCA method is a low dimensional procedure for the characterization of human
faces based on Principal Component Analysis also known as Karhunen-Loeve (Kor eigen space, seeks the direction in the input space along which most of the
image variations lies. This approach reduces the dimension size of an image
greatly. As % recognition using PCA is low.

We propose a system in which we first find out Discrete Wavelet Transform of a given
image and then cascaded with PCA.
Advantages of wavelet transformations are to preserve the structure of data,
computation complexity, vanishing moments, compact support, and decorrelared
coefficients.
The Contour Matching method has advantages in storage space requirements.
VARIOUS ALGORITHM FOR FACE RECOGNITION

PCA METHOD
DWT+PCA APPROACH
CALCULATION OF DWT OF A GIVEN IMAGE
CONTOUR MATCHING METHOD
PCA METHOD

Figure 1: High-level functioning principle of the Eigen
face-based facial recognition algorithm
DWT+PCA APPROACH
We use term Wavelet PCA to refer to computing principle components for a
masked or modified set of wavelet coefficient to find Wavelet PCA eigen
spectra in spectral domain and then projecting the original image onto the
wavelet PCA eigen spectra basis.
In this way, features at a particular scale are indirectly emphasized by the
computed projection basis enhancing the reduced dimensionality images without
filtering artifacts.
CALCULATION OF DWT OF A GIVEN IMAGE
The Square Two-Dimensional DWT is calculated using a
series of one dimensional DWTs which is as follows:
Step 1: Replace each image row with its 1D DWT
Step 2: Replace each image column with its 1D DWT
Step 3: Repeat steps (1) and (2) on the lowest sub-band to create
the next scale
Step 4: Repeat step (3) until the desired number of scales has
been created.
CONTOUR MATCHING METHOD
The proposed face recognition system is a three step
process i.e.
1) Preprocessing and normalization.
2) Contour Generation.
3) Matching Algorithm.
References






Rama Chellappa, Charles L. Wilson and Saad Sirohey,
“Human and machine recognition of faces: A survey,”
Proceedings of the IEEE vol.83,no.5.pp.705-740
May1995.
Mehmoud Ismail, Reda A. El-Khoribi “HMT of the Ranklet
Transform for Face Recognition and Verification,”
ICGST’s Graphics Vision and Image Processing Journal,
vol.6,issue3,dec06,pp7-13.
L.Sirovich and M. Kirby, “Low dimensional procedure for
the characterization of human faces,” Journal of optical
society of America, vol.4, March1987,pp519- 524.
Queries if any??

Thanks
CHIRAG JAIN

Contenu connexe

Tendances

Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognitionMazin Alwaaly
 
A comparative review of various approaches for feature extraction in Face rec...
A comparative review of various approaches for feature extraction in Face rec...A comparative review of various approaches for feature extraction in Face rec...
A comparative review of various approaches for feature extraction in Face rec...Vishnupriya T H
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyranjit banshpal
 
Face Liveness Detection for Biometric Antispoofing Applications using Color T...
Face Liveness Detection for Biometric Antispoofing Applications using Color T...Face Liveness Detection for Biometric Antispoofing Applications using Color T...
Face Liveness Detection for Biometric Antispoofing Applications using Color T...rahulmonikasharma
 
FACE RECOGNITION ACROSS NON-UNIFORM MOTION BLUR
FACE RECOGNITION ACROSS  NON-UNIFORM MOTION BLUR FACE RECOGNITION ACROSS  NON-UNIFORM MOTION BLUR
FACE RECOGNITION ACROSS NON-UNIFORM MOTION BLUR Koduru KrisHna
 
Facial recognition locker for android
Facial recognition locker for androidFacial recognition locker for android
Facial recognition locker for androidkonark jain
 
Face Recognition Proposal Presentation
Face Recognition Proposal PresentationFace Recognition Proposal Presentation
Face Recognition Proposal PresentationMd. Atiqur Rahman
 
Face detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedFace detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedSantu Chall
 
Facel expression recognition
Facel expression recognitionFacel expression recognition
Facel expression recognitionMintoo Jakhmola
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologySYED HOZAIFA ALI
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhavVaibhav P
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
Face recognization using artificial nerual network
Face recognization using artificial nerual networkFace recognization using artificial nerual network
Face recognization using artificial nerual networkDharmesh Tank
 
Face identification
Face  identificationFace  identification
Face identification27vipin92
 

Tendances (20)

Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
 
A comparative review of various approaches for feature extraction in Face rec...
A comparative review of various approaches for feature extraction in Face rec...A comparative review of various approaches for feature extraction in Face rec...
A comparative review of various approaches for feature extraction in Face rec...
 
Face recognition
Face recognition Face recognition
Face recognition
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face Liveness Detection for Biometric Antispoofing Applications using Color T...
Face Liveness Detection for Biometric Antispoofing Applications using Color T...Face Liveness Detection for Biometric Antispoofing Applications using Color T...
Face Liveness Detection for Biometric Antispoofing Applications using Color T...
 
FACE RECOGNITION ACROSS NON-UNIFORM MOTION BLUR
FACE RECOGNITION ACROSS  NON-UNIFORM MOTION BLUR FACE RECOGNITION ACROSS  NON-UNIFORM MOTION BLUR
FACE RECOGNITION ACROSS NON-UNIFORM MOTION BLUR
 
Facial recognition locker for android
Facial recognition locker for androidFacial recognition locker for android
Facial recognition locker for android
 
face recognition
face recognitionface recognition
face recognition
 
Face Recognition Proposal Presentation
Face Recognition Proposal PresentationFace Recognition Proposal Presentation
Face Recognition Proposal Presentation
 
Face detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedFace detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 edited
 
Facel expression recognition
Facel expression recognitionFacel expression recognition
Facel expression recognition
 
face recognition
face recognitionface recognition
face recognition
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Face recognization using artificial nerual network
Face recognization using artificial nerual networkFace recognization using artificial nerual network
Face recognization using artificial nerual network
 
Face identification
Face  identificationFace  identification
Face identification
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 

En vedette

Gpgpu presentation final
Gpgpu presentation finalGpgpu presentation final
Gpgpu presentation finalUC Davis
 
Gpgpu presentation 2
Gpgpu presentation 2Gpgpu presentation 2
Gpgpu presentation 2UC Davis
 
Face recognition
Face recognitionFace recognition
Face recognitionNaman Ahuja
 
Face recognition using laplacian faces
Face recognition using laplacian facesFace recognition using laplacian faces
Face recognition using laplacian facesPulkiŧ Sharma
 
Firewall Penetration Testing
Firewall Penetration TestingFirewall Penetration Testing
Firewall Penetration TestingChirag Jain
 
Indian coffee house ppt
Indian coffee house pptIndian coffee house ppt
Indian coffee house pptShweta Sharma
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyDivya Tirunagari
 
PCA Based Face Recognition System
PCA Based Face Recognition SystemPCA Based Face Recognition System
PCA Based Face Recognition SystemMd. Atiqur Rahman
 
Color based image processing , tracking and automation using matlab
Color based image processing , tracking and automation using matlabColor based image processing , tracking and automation using matlab
Color based image processing , tracking and automation using matlabKamal Pradhan
 

En vedette (20)

Gpgpu presentation final
Gpgpu presentation finalGpgpu presentation final
Gpgpu presentation final
 
Gpgpu presentation 2
Gpgpu presentation 2Gpgpu presentation 2
Gpgpu presentation 2
 
Hacker's jargons
Hacker's jargonsHacker's jargons
Hacker's jargons
 
DNS hijacking - null Singapore
DNS hijacking - null SingaporeDNS hijacking - null Singapore
DNS hijacking - null Singapore
 
Humla workshop on Android Security Testing - null Singapore
Humla workshop on Android Security Testing - null SingaporeHumla workshop on Android Security Testing - null Singapore
Humla workshop on Android Security Testing - null Singapore
 
Firewalking
FirewalkingFirewalking
Firewalking
 
Three things that rowhammer taught me by Halvar Flake
Three things that rowhammer taught me by Halvar FlakeThree things that rowhammer taught me by Halvar Flake
Three things that rowhammer taught me by Halvar Flake
 
Attacking VPN's
Attacking VPN'sAttacking VPN's
Attacking VPN's
 
iOS Application Pentesting
iOS Application PentestingiOS Application Pentesting
iOS Application Pentesting
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Null Singapore - Can We secure the IoT - Chadi Hantouche
Null Singapore - Can We secure the IoT - Chadi HantoucheNull Singapore - Can We secure the IoT - Chadi Hantouche
Null Singapore - Can We secure the IoT - Chadi Hantouche
 
Face recognition using laplacian faces
Face recognition using laplacian facesFace recognition using laplacian faces
Face recognition using laplacian faces
 
Identifying XSS Vulnerabilities
Identifying XSS VulnerabilitiesIdentifying XSS Vulnerabilities
Identifying XSS Vulnerabilities
 
News Bytes - December 2015
News Bytes - December 2015News Bytes - December 2015
News Bytes - December 2015
 
Newbytes NullHyd
Newbytes NullHydNewbytes NullHyd
Newbytes NullHyd
 
Firewall Penetration Testing
Firewall Penetration TestingFirewall Penetration Testing
Firewall Penetration Testing
 
Indian coffee house ppt
Indian coffee house pptIndian coffee house ppt
Indian coffee house ppt
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
PCA Based Face Recognition System
PCA Based Face Recognition SystemPCA Based Face Recognition System
PCA Based Face Recognition System
 
Color based image processing , tracking and automation using matlab
Color based image processing , tracking and automation using matlabColor based image processing , tracking and automation using matlab
Color based image processing , tracking and automation using matlab
 

Similaire à INTELLIGENT FACE RECOGNITION TECHNIQUES

Face recogntion using PCA algorithm
Face recogntion using PCA algorithmFace recogntion using PCA algorithm
Face recogntion using PCA algorithmAshwini Awatare
 
Facial expression recongnition Techniques, Database and Classifiers
Facial expression recongnition Techniques, Database and Classifiers Facial expression recongnition Techniques, Database and Classifiers
Facial expression recongnition Techniques, Database and Classifiers Rupinder Saini
 
IRJET- A Survey on Facial Expression Recognition Robust to Partial Occlusion
IRJET- A Survey on Facial Expression Recognition Robust to Partial OcclusionIRJET- A Survey on Facial Expression Recognition Robust to Partial Occlusion
IRJET- A Survey on Facial Expression Recognition Robust to Partial OcclusionIRJET Journal
 
A study of techniques for facial detection and expression classification
A study of techniques for facial detection and expression classificationA study of techniques for facial detection and expression classification
A study of techniques for facial detection and expression classificationIJCSES Journal
 
Happiness Expression Recognition at Different Age Conditions
Happiness Expression Recognition at Different Age ConditionsHappiness Expression Recognition at Different Age Conditions
Happiness Expression Recognition at Different Age ConditionsEditor IJMTER
 
A novel approach for performance parameter estimation of face recognition bas...
A novel approach for performance parameter estimation of face recognition bas...A novel approach for performance parameter estimation of face recognition bas...
A novel approach for performance parameter estimation of face recognition bas...IJMER
 
Facial_recognition_Siva vadapalli1.pptx.ppt
Facial_recognition_Siva vadapalli1.pptx.pptFacial_recognition_Siva vadapalli1.pptx.ppt
Facial_recognition_Siva vadapalli1.pptx.pptvijaynaidu51
 
Criminal Detection System
Criminal Detection SystemCriminal Detection System
Criminal Detection SystemIntrader Amit
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Face recognition system
Face recognition systemFace recognition system
Face recognition systemYogesh Lamture
 
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptxReview A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptxAravindHari22
 
IRJET-Facial Expression Recognition using Efficient LBP and CNN
IRJET-Facial Expression Recognition using Efficient LBP and CNNIRJET-Facial Expression Recognition using Efficient LBP and CNN
IRJET-Facial Expression Recognition using Efficient LBP and CNNIRJET Journal
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Attendance System using Facial Recognition
Attendance System using Facial RecognitionAttendance System using Facial Recognition
Attendance System using Facial RecognitionIRJET Journal
 
Local Descriptor based Face Recognition System
Local Descriptor based Face Recognition SystemLocal Descriptor based Face Recognition System
Local Descriptor based Face Recognition SystemIRJET Journal
 
Research and Development of DSP-Based Face Recognition System for Robotic Reh...
Research and Development of DSP-Based Face Recognition System for Robotic Reh...Research and Development of DSP-Based Face Recognition System for Robotic Reh...
Research and Development of DSP-Based Face Recognition System for Robotic Reh...IJCSES Journal
 
FACE DETECTION USING PRINCIPAL COMPONENT ANALYSIS
FACE DETECTION USING PRINCIPAL COMPONENT ANALYSISFACE DETECTION USING PRINCIPAL COMPONENT ANALYSIS
FACE DETECTION USING PRINCIPAL COMPONENT ANALYSISIAEME Publication
 

Similaire à INTELLIGENT FACE RECOGNITION TECHNIQUES (20)

Face recogntion using PCA algorithm
Face recogntion using PCA algorithmFace recogntion using PCA algorithm
Face recogntion using PCA algorithm
 
Facial expression recongnition Techniques, Database and Classifiers
Facial expression recongnition Techniques, Database and Classifiers Facial expression recongnition Techniques, Database and Classifiers
Facial expression recongnition Techniques, Database and Classifiers
 
IRJET- A Survey on Facial Expression Recognition Robust to Partial Occlusion
IRJET- A Survey on Facial Expression Recognition Robust to Partial OcclusionIRJET- A Survey on Facial Expression Recognition Robust to Partial Occlusion
IRJET- A Survey on Facial Expression Recognition Robust to Partial Occlusion
 
A study of techniques for facial detection and expression classification
A study of techniques for facial detection and expression classificationA study of techniques for facial detection and expression classification
A study of techniques for facial detection and expression classification
 
Happiness Expression Recognition at Different Age Conditions
Happiness Expression Recognition at Different Age ConditionsHappiness Expression Recognition at Different Age Conditions
Happiness Expression Recognition at Different Age Conditions
 
A novel approach for performance parameter estimation of face recognition bas...
A novel approach for performance parameter estimation of face recognition bas...A novel approach for performance parameter estimation of face recognition bas...
A novel approach for performance parameter estimation of face recognition bas...
 
Facial_recognition_Siva vadapalli1.pptx.ppt
Facial_recognition_Siva vadapalli1.pptx.pptFacial_recognition_Siva vadapalli1.pptx.ppt
Facial_recognition_Siva vadapalli1.pptx.ppt
 
Criminal Detection System
Criminal Detection SystemCriminal Detection System
Criminal Detection System
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Hl2413221328
Hl2413221328Hl2413221328
Hl2413221328
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
 
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptxReview A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
 
Ck36515520
Ck36515520Ck36515520
Ck36515520
 
IRJET-Facial Expression Recognition using Efficient LBP and CNN
IRJET-Facial Expression Recognition using Efficient LBP and CNNIRJET-Facial Expression Recognition using Efficient LBP and CNN
IRJET-Facial Expression Recognition using Efficient LBP and CNN
 
D1061825
D1061825D1061825
D1061825
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Attendance System using Facial Recognition
Attendance System using Facial RecognitionAttendance System using Facial Recognition
Attendance System using Facial Recognition
 
Local Descriptor based Face Recognition System
Local Descriptor based Face Recognition SystemLocal Descriptor based Face Recognition System
Local Descriptor based Face Recognition System
 
Research and Development of DSP-Based Face Recognition System for Robotic Reh...
Research and Development of DSP-Based Face Recognition System for Robotic Reh...Research and Development of DSP-Based Face Recognition System for Robotic Reh...
Research and Development of DSP-Based Face Recognition System for Robotic Reh...
 
FACE DETECTION USING PRINCIPAL COMPONENT ANALYSIS
FACE DETECTION USING PRINCIPAL COMPONENT ANALYSISFACE DETECTION USING PRINCIPAL COMPONENT ANALYSIS
FACE DETECTION USING PRINCIPAL COMPONENT ANALYSIS
 

Dernier

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Dernier (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

INTELLIGENT FACE RECOGNITION TECHNIQUES

  • 1. A Presentation On “ INTELLIGENT FACE RECOGNITION TECHNIQUES ” Presented by: CHIRAG JAIN
  • 2. INTELLIGENT FACE RECOGNITION TECHNIQUES O U T L I N E  INTRODUCTION  SURVEY OF THE FACE RECOGNITION  STRENGTHS OF EFFICIENT FACE RECOGNITION METHODS  ALGORITHM FOR FACE RECOGNITION
  • 3. Introduction Face recognition is a form of biometric identification. A biometrics is, “Automated methods of recognizing an individual based on their unique physical or behavioral characteristics.” The process of facial recognition involves automated methods to determine identity, using facial features as essential elements of distinction.
  • 4. Solution To The Problem Of Machine Recognition Of Faces Face Recognition Segmentation of faces from cluttered scenes Feature extraction from the face regions Recognition or verification
  • 5. SURVEY OF THE FACE RECOGNITION o o o SEGMENTATION / DETECTION FEATURE EXTRACTION METHODS RECOGNITION FROM INTENSITY IMAGES
  • 6. SURVEY OF THE FACE RECOGNITION o o o SEGMENTATION / DETECTION FEATURE EXTRACTION METHODS RECOGNITION FROM INTENSITY IMAGES The first step in any automatic face recognition systems is the detection (segmentation) of faces in Images. Up to the mid-1990s, most work on Segmentation was focused on single-face segmentation from a simple or complex background. These approaches included using a whole face template, a deformable feature-based template, skin color, and a neural network.
  • 7. SURVEY OF THE FACE RECOGNITION o SEGMENTATION / DETECTION o FEATURE EXTRACTION METHODS RECOGNITION FROM INTENSITY IMAGES Three types of feature extraction methods can be distinguished: (1) generic methods based on edges, lines, and curves; (2) feature-template-based methods that are used to detect facial features such as eyes; (3) structural matching methods that take into consideration geometrical constraints on the features. o These methods have difficulty when the appearances of the features change significantly, for example, closed eyes, eyes with glasses, open mouth.
  • 8. SURVEY OF THE FACE RECOGNITION o SEGMENTATION / DETECTION FEATURE EXTRACTION METHODS o RECOGNITION FROM INTENSITY IMAGES o These methods are classified into three main categories: 1.holistic matching methods, 2. feature-based matching methods and 3. hybrid methods. Holistic matching methods use the whole face region as the raw input to a recognition system.Using PCA, many face recognition techniques have been developed: eigen faces, featureline based methods, Fisher faces, Bayesian methods and SVM methods. In Feature-based matching methods, local features such as the eyes, nose, and mouth are first extracted and their locations and local statistics (geometric and/or appearance) are fed into a structural classifier. Hybrid methods are based on using both local features and the whole face region to recognize a face, as the human perception system uses.
  • 9. STRENGTHS OF EFFICIENT FACE RECOGNITION METHODS The PCA method is a low dimensional procedure for the characterization of human faces based on Principal Component Analysis also known as Karhunen-Loeve (Kor eigen space, seeks the direction in the input space along which most of the image variations lies. This approach reduces the dimension size of an image greatly. As % recognition using PCA is low. We propose a system in which we first find out Discrete Wavelet Transform of a given image and then cascaded with PCA. Advantages of wavelet transformations are to preserve the structure of data, computation complexity, vanishing moments, compact support, and decorrelared coefficients. The Contour Matching method has advantages in storage space requirements.
  • 10. VARIOUS ALGORITHM FOR FACE RECOGNITION PCA METHOD DWT+PCA APPROACH CALCULATION OF DWT OF A GIVEN IMAGE CONTOUR MATCHING METHOD
  • 11. PCA METHOD Figure 1: High-level functioning principle of the Eigen face-based facial recognition algorithm
  • 12. DWT+PCA APPROACH We use term Wavelet PCA to refer to computing principle components for a masked or modified set of wavelet coefficient to find Wavelet PCA eigen spectra in spectral domain and then projecting the original image onto the wavelet PCA eigen spectra basis. In this way, features at a particular scale are indirectly emphasized by the computed projection basis enhancing the reduced dimensionality images without filtering artifacts.
  • 13. CALCULATION OF DWT OF A GIVEN IMAGE The Square Two-Dimensional DWT is calculated using a series of one dimensional DWTs which is as follows: Step 1: Replace each image row with its 1D DWT Step 2: Replace each image column with its 1D DWT Step 3: Repeat steps (1) and (2) on the lowest sub-band to create the next scale Step 4: Repeat step (3) until the desired number of scales has been created.
  • 14. CONTOUR MATCHING METHOD The proposed face recognition system is a three step process i.e. 1) Preprocessing and normalization. 2) Contour Generation. 3) Matching Algorithm.
  • 15. References    Rama Chellappa, Charles L. Wilson and Saad Sirohey, “Human and machine recognition of faces: A survey,” Proceedings of the IEEE vol.83,no.5.pp.705-740 May1995. Mehmoud Ismail, Reda A. El-Khoribi “HMT of the Ranklet Transform for Face Recognition and Verification,” ICGST’s Graphics Vision and Image Processing Journal, vol.6,issue3,dec06,pp7-13. L.Sirovich and M. Kirby, “Low dimensional procedure for the characterization of human faces,” Journal of optical society of America, vol.4, March1987,pp519- 524.