SlideShare une entreprise Scribd logo
1  sur  16
A
Presentation
On

“ INTELLIGENT FACE RECOGNITION
TECHNIQUES ”

Presented by:

CHIRAG JAIN
INTELLIGENT FACE RECOGNITION TECHNIQUES

O
U
T
L
I
N
E



INTRODUCTION



SURVEY OF THE FACE RECOGNITION



STRENGTHS OF EFFICIENT FACE
RECOGNITION METHODS



ALGORITHM FOR FACE RECOGNITION
Introduction
Face recognition is a form of biometric identification. A biometrics
is, “Automated methods of recognizing an individual based on
their unique physical or behavioral characteristics.” The process
of facial recognition involves automated methods to determine
identity, using facial features as essential elements of distinction.
Solution To The Problem Of Machine Recognition Of Faces

Face Recognition

Segmentation
of faces from
cluttered
scenes

Feature
extraction from
the face
regions

Recognition or
verification
SURVEY OF THE FACE RECOGNITION
o
o
o

SEGMENTATION / DETECTION
FEATURE EXTRACTION METHODS
RECOGNITION FROM INTENSITY IMAGES
SURVEY OF THE FACE RECOGNITION
o
o

o

SEGMENTATION / DETECTION
FEATURE EXTRACTION METHODS
RECOGNITION FROM INTENSITY IMAGES

The first step in any automatic face recognition systems is the
detection (segmentation) of faces in Images.
Up to the mid-1990s, most work on Segmentation was focused on
single-face segmentation from a simple or complex background.
These approaches included using a whole face template, a deformable
feature-based template, skin color, and a neural network.
SURVEY OF THE FACE RECOGNITION
o

SEGMENTATION / DETECTION

o

FEATURE EXTRACTION METHODS

RECOGNITION FROM INTENSITY IMAGES
Three types of feature extraction methods can be distinguished:
(1) generic methods based on edges, lines, and curves;
(2) feature-template-based methods that are used to detect facial features such as eyes;
(3) structural matching methods that take into consideration geometrical constraints on
the features.
o

These methods have difficulty when the appearances of the features change
significantly, for example, closed eyes, eyes with glasses, open mouth.
SURVEY OF THE FACE RECOGNITION
o

SEGMENTATION / DETECTION
FEATURE EXTRACTION METHODS

o

RECOGNITION FROM INTENSITY IMAGES

o

These methods are classified into three main categories:
1.holistic matching methods, 2. feature-based matching methods and 3. hybrid methods.

Holistic matching methods use the whole face region as the raw input to a recognition

system.Using PCA, many face recognition techniques have been developed: eigen faces, featureline based methods, Fisher faces, Bayesian methods and SVM methods.
In Feature-based matching methods, local features such as the eyes, nose, and mouth are
first extracted and their locations and local statistics (geometric and/or appearance) are fed into a
structural classifier.
Hybrid methods are based on using both local features and the whole face region to recognize a
face, as the human perception system uses.
STRENGTHS OF EFFICIENT FACE RECOGNITION METHODS

The PCA method is a low dimensional procedure for the characterization of human
faces based on Principal Component Analysis also known as Karhunen-Loeve (Kor eigen space, seeks the direction in the input space along which most of the
image variations lies. This approach reduces the dimension size of an image
greatly. As % recognition using PCA is low.

We propose a system in which we first find out Discrete Wavelet Transform of a given
image and then cascaded with PCA.
Advantages of wavelet transformations are to preserve the structure of data,
computation complexity, vanishing moments, compact support, and decorrelared
coefficients.
The Contour Matching method has advantages in storage space requirements.
VARIOUS ALGORITHM FOR FACE RECOGNITION

PCA METHOD
DWT+PCA APPROACH
CALCULATION OF DWT OF A GIVEN IMAGE
CONTOUR MATCHING METHOD
PCA METHOD

Figure 1: High-level functioning principle of the Eigen
face-based facial recognition algorithm
DWT+PCA APPROACH
We use term Wavelet PCA to refer to computing principle components for a
masked or modified set of wavelet coefficient to find Wavelet PCA eigen
spectra in spectral domain and then projecting the original image onto the
wavelet PCA eigen spectra basis.
In this way, features at a particular scale are indirectly emphasized by the
computed projection basis enhancing the reduced dimensionality images without
filtering artifacts.
CALCULATION OF DWT OF A GIVEN IMAGE
The Square Two-Dimensional DWT is calculated using a
series of one dimensional DWTs which is as follows:
Step 1: Replace each image row with its 1D DWT
Step 2: Replace each image column with its 1D DWT
Step 3: Repeat steps (1) and (2) on the lowest sub-band to create
the next scale
Step 4: Repeat step (3) until the desired number of scales has
been created.
CONTOUR MATCHING METHOD
The proposed face recognition system is a three step
process i.e.
1) Preprocessing and normalization.
2) Contour Generation.
3) Matching Algorithm.
References






Rama Chellappa, Charles L. Wilson and Saad Sirohey,
“Human and machine recognition of faces: A survey,”
Proceedings of the IEEE vol.83,no.5.pp.705-740
May1995.
Mehmoud Ismail, Reda A. El-Khoribi “HMT of the Ranklet
Transform for Face Recognition and Verification,”
ICGST’s Graphics Vision and Image Processing Journal,
vol.6,issue3,dec06,pp7-13.
L.Sirovich and M. Kirby, “Low dimensional procedure for
the characterization of human faces,” Journal of optical
society of America, vol.4, March1987,pp519- 524.
Queries if any??

Thanks
CHIRAG JAIN

Contenu connexe

Tendances

Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
Vaibhav P
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
Siddharth Modi
 

Tendances (20)

Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
 
A comparative review of various approaches for feature extraction in Face rec...
A comparative review of various approaches for feature extraction in Face rec...A comparative review of various approaches for feature extraction in Face rec...
A comparative review of various approaches for feature extraction in Face rec...
 
Face recognition
Face recognition Face recognition
Face recognition
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face Liveness Detection for Biometric Antispoofing Applications using Color T...
Face Liveness Detection for Biometric Antispoofing Applications using Color T...Face Liveness Detection for Biometric Antispoofing Applications using Color T...
Face Liveness Detection for Biometric Antispoofing Applications using Color T...
 
FACE RECOGNITION ACROSS NON-UNIFORM MOTION BLUR
FACE RECOGNITION ACROSS  NON-UNIFORM MOTION BLUR FACE RECOGNITION ACROSS  NON-UNIFORM MOTION BLUR
FACE RECOGNITION ACROSS NON-UNIFORM MOTION BLUR
 
Facial recognition locker for android
Facial recognition locker for androidFacial recognition locker for android
Facial recognition locker for android
 
face recognition
face recognitionface recognition
face recognition
 
Face Recognition Proposal Presentation
Face Recognition Proposal PresentationFace Recognition Proposal Presentation
Face Recognition Proposal Presentation
 
Face detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedFace detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 edited
 
Facel expression recognition
Facel expression recognitionFacel expression recognition
Facel expression recognition
 
face recognition
face recognitionface recognition
face recognition
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Face recognization using artificial nerual network
Face recognization using artificial nerual networkFace recognization using artificial nerual network
Face recognization using artificial nerual network
 
Face identification
Face  identificationFace  identification
Face identification
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 

En vedette

Face recognition
Face recognitionFace recognition
Face recognition
Naman Ahuja
 
Face recognition using laplacian faces
Face recognition using laplacian facesFace recognition using laplacian faces
Face recognition using laplacian faces
Pulkiŧ Sharma
 
Indian coffee house ppt
Indian coffee house pptIndian coffee house ppt
Indian coffee house ppt
Shweta Sharma
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
Divya Tirunagari
 

En vedette (20)

Gpgpu presentation final
Gpgpu presentation finalGpgpu presentation final
Gpgpu presentation final
 
Gpgpu presentation 2
Gpgpu presentation 2Gpgpu presentation 2
Gpgpu presentation 2
 
Hacker's jargons
Hacker's jargonsHacker's jargons
Hacker's jargons
 
DNS hijacking - null Singapore
DNS hijacking - null SingaporeDNS hijacking - null Singapore
DNS hijacking - null Singapore
 
Humla workshop on Android Security Testing - null Singapore
Humla workshop on Android Security Testing - null SingaporeHumla workshop on Android Security Testing - null Singapore
Humla workshop on Android Security Testing - null Singapore
 
Firewalking
FirewalkingFirewalking
Firewalking
 
Three things that rowhammer taught me by Halvar Flake
Three things that rowhammer taught me by Halvar FlakeThree things that rowhammer taught me by Halvar Flake
Three things that rowhammer taught me by Halvar Flake
 
Attacking VPN's
Attacking VPN'sAttacking VPN's
Attacking VPN's
 
iOS Application Pentesting
iOS Application PentestingiOS Application Pentesting
iOS Application Pentesting
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Null Singapore - Can We secure the IoT - Chadi Hantouche
Null Singapore - Can We secure the IoT - Chadi HantoucheNull Singapore - Can We secure the IoT - Chadi Hantouche
Null Singapore - Can We secure the IoT - Chadi Hantouche
 
Face recognition using laplacian faces
Face recognition using laplacian facesFace recognition using laplacian faces
Face recognition using laplacian faces
 
Identifying XSS Vulnerabilities
Identifying XSS VulnerabilitiesIdentifying XSS Vulnerabilities
Identifying XSS Vulnerabilities
 
News Bytes - December 2015
News Bytes - December 2015News Bytes - December 2015
News Bytes - December 2015
 
Newbytes NullHyd
Newbytes NullHydNewbytes NullHyd
Newbytes NullHyd
 
Firewall Penetration Testing
Firewall Penetration TestingFirewall Penetration Testing
Firewall Penetration Testing
 
Indian coffee house ppt
Indian coffee house pptIndian coffee house ppt
Indian coffee house ppt
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
PCA Based Face Recognition System
PCA Based Face Recognition SystemPCA Based Face Recognition System
PCA Based Face Recognition System
 
Color based image processing , tracking and automation using matlab
Color based image processing , tracking and automation using matlabColor based image processing , tracking and automation using matlab
Color based image processing , tracking and automation using matlab
 

Similaire à INTELLIGENT FACE RECOGNITION TECHNIQUES

Face recogntion using PCA algorithm
Face recogntion using PCA algorithmFace recogntion using PCA algorithm
Face recogntion using PCA algorithm
Ashwini Awatare
 
Facial expression recongnition Techniques, Database and Classifiers
Facial expression recongnition Techniques, Database and Classifiers Facial expression recongnition Techniques, Database and Classifiers
Facial expression recongnition Techniques, Database and Classifiers
Rupinder Saini
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 

Similaire à INTELLIGENT FACE RECOGNITION TECHNIQUES (20)

Face recogntion using PCA algorithm
Face recogntion using PCA algorithmFace recogntion using PCA algorithm
Face recogntion using PCA algorithm
 
Facial expression recongnition Techniques, Database and Classifiers
Facial expression recongnition Techniques, Database and Classifiers Facial expression recongnition Techniques, Database and Classifiers
Facial expression recongnition Techniques, Database and Classifiers
 
IRJET- A Survey on Facial Expression Recognition Robust to Partial Occlusion
IRJET- A Survey on Facial Expression Recognition Robust to Partial OcclusionIRJET- A Survey on Facial Expression Recognition Robust to Partial Occlusion
IRJET- A Survey on Facial Expression Recognition Robust to Partial Occlusion
 
A study of techniques for facial detection and expression classification
A study of techniques for facial detection and expression classificationA study of techniques for facial detection and expression classification
A study of techniques for facial detection and expression classification
 
Happiness Expression Recognition at Different Age Conditions
Happiness Expression Recognition at Different Age ConditionsHappiness Expression Recognition at Different Age Conditions
Happiness Expression Recognition at Different Age Conditions
 
A novel approach for performance parameter estimation of face recognition bas...
A novel approach for performance parameter estimation of face recognition bas...A novel approach for performance parameter estimation of face recognition bas...
A novel approach for performance parameter estimation of face recognition bas...
 
Facial_recognition_Siva vadapalli1.pptx.ppt
Facial_recognition_Siva vadapalli1.pptx.pptFacial_recognition_Siva vadapalli1.pptx.ppt
Facial_recognition_Siva vadapalli1.pptx.ppt
 
Criminal Detection System
Criminal Detection SystemCriminal Detection System
Criminal Detection System
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Hl2413221328
Hl2413221328Hl2413221328
Hl2413221328
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
 
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptxReview A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
 
Ck36515520
Ck36515520Ck36515520
Ck36515520
 
IRJET-Facial Expression Recognition using Efficient LBP and CNN
IRJET-Facial Expression Recognition using Efficient LBP and CNNIRJET-Facial Expression Recognition using Efficient LBP and CNN
IRJET-Facial Expression Recognition using Efficient LBP and CNN
 
D1061825
D1061825D1061825
D1061825
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Attendance System using Facial Recognition
Attendance System using Facial RecognitionAttendance System using Facial Recognition
Attendance System using Facial Recognition
 
Local Descriptor based Face Recognition System
Local Descriptor based Face Recognition SystemLocal Descriptor based Face Recognition System
Local Descriptor based Face Recognition System
 
Research and Development of DSP-Based Face Recognition System for Robotic Reh...
Research and Development of DSP-Based Face Recognition System for Robotic Reh...Research and Development of DSP-Based Face Recognition System for Robotic Reh...
Research and Development of DSP-Based Face Recognition System for Robotic Reh...
 
FACE DETECTION USING PRINCIPAL COMPONENT ANALYSIS
FACE DETECTION USING PRINCIPAL COMPONENT ANALYSISFACE DETECTION USING PRINCIPAL COMPONENT ANALYSIS
FACE DETECTION USING PRINCIPAL COMPONENT ANALYSIS
 

Dernier

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 

INTELLIGENT FACE RECOGNITION TECHNIQUES

  • 1. A Presentation On “ INTELLIGENT FACE RECOGNITION TECHNIQUES ” Presented by: CHIRAG JAIN
  • 2. INTELLIGENT FACE RECOGNITION TECHNIQUES O U T L I N E  INTRODUCTION  SURVEY OF THE FACE RECOGNITION  STRENGTHS OF EFFICIENT FACE RECOGNITION METHODS  ALGORITHM FOR FACE RECOGNITION
  • 3. Introduction Face recognition is a form of biometric identification. A biometrics is, “Automated methods of recognizing an individual based on their unique physical or behavioral characteristics.” The process of facial recognition involves automated methods to determine identity, using facial features as essential elements of distinction.
  • 4. Solution To The Problem Of Machine Recognition Of Faces Face Recognition Segmentation of faces from cluttered scenes Feature extraction from the face regions Recognition or verification
  • 5. SURVEY OF THE FACE RECOGNITION o o o SEGMENTATION / DETECTION FEATURE EXTRACTION METHODS RECOGNITION FROM INTENSITY IMAGES
  • 6. SURVEY OF THE FACE RECOGNITION o o o SEGMENTATION / DETECTION FEATURE EXTRACTION METHODS RECOGNITION FROM INTENSITY IMAGES The first step in any automatic face recognition systems is the detection (segmentation) of faces in Images. Up to the mid-1990s, most work on Segmentation was focused on single-face segmentation from a simple or complex background. These approaches included using a whole face template, a deformable feature-based template, skin color, and a neural network.
  • 7. SURVEY OF THE FACE RECOGNITION o SEGMENTATION / DETECTION o FEATURE EXTRACTION METHODS RECOGNITION FROM INTENSITY IMAGES Three types of feature extraction methods can be distinguished: (1) generic methods based on edges, lines, and curves; (2) feature-template-based methods that are used to detect facial features such as eyes; (3) structural matching methods that take into consideration geometrical constraints on the features. o These methods have difficulty when the appearances of the features change significantly, for example, closed eyes, eyes with glasses, open mouth.
  • 8. SURVEY OF THE FACE RECOGNITION o SEGMENTATION / DETECTION FEATURE EXTRACTION METHODS o RECOGNITION FROM INTENSITY IMAGES o These methods are classified into three main categories: 1.holistic matching methods, 2. feature-based matching methods and 3. hybrid methods. Holistic matching methods use the whole face region as the raw input to a recognition system.Using PCA, many face recognition techniques have been developed: eigen faces, featureline based methods, Fisher faces, Bayesian methods and SVM methods. In Feature-based matching methods, local features such as the eyes, nose, and mouth are first extracted and their locations and local statistics (geometric and/or appearance) are fed into a structural classifier. Hybrid methods are based on using both local features and the whole face region to recognize a face, as the human perception system uses.
  • 9. STRENGTHS OF EFFICIENT FACE RECOGNITION METHODS The PCA method is a low dimensional procedure for the characterization of human faces based on Principal Component Analysis also known as Karhunen-Loeve (Kor eigen space, seeks the direction in the input space along which most of the image variations lies. This approach reduces the dimension size of an image greatly. As % recognition using PCA is low. We propose a system in which we first find out Discrete Wavelet Transform of a given image and then cascaded with PCA. Advantages of wavelet transformations are to preserve the structure of data, computation complexity, vanishing moments, compact support, and decorrelared coefficients. The Contour Matching method has advantages in storage space requirements.
  • 10. VARIOUS ALGORITHM FOR FACE RECOGNITION PCA METHOD DWT+PCA APPROACH CALCULATION OF DWT OF A GIVEN IMAGE CONTOUR MATCHING METHOD
  • 11. PCA METHOD Figure 1: High-level functioning principle of the Eigen face-based facial recognition algorithm
  • 12. DWT+PCA APPROACH We use term Wavelet PCA to refer to computing principle components for a masked or modified set of wavelet coefficient to find Wavelet PCA eigen spectra in spectral domain and then projecting the original image onto the wavelet PCA eigen spectra basis. In this way, features at a particular scale are indirectly emphasized by the computed projection basis enhancing the reduced dimensionality images without filtering artifacts.
  • 13. CALCULATION OF DWT OF A GIVEN IMAGE The Square Two-Dimensional DWT is calculated using a series of one dimensional DWTs which is as follows: Step 1: Replace each image row with its 1D DWT Step 2: Replace each image column with its 1D DWT Step 3: Repeat steps (1) and (2) on the lowest sub-band to create the next scale Step 4: Repeat step (3) until the desired number of scales has been created.
  • 14. CONTOUR MATCHING METHOD The proposed face recognition system is a three step process i.e. 1) Preprocessing and normalization. 2) Contour Generation. 3) Matching Algorithm.
  • 15. References    Rama Chellappa, Charles L. Wilson and Saad Sirohey, “Human and machine recognition of faces: A survey,” Proceedings of the IEEE vol.83,no.5.pp.705-740 May1995. Mehmoud Ismail, Reda A. El-Khoribi “HMT of the Ranklet Transform for Face Recognition and Verification,” ICGST’s Graphics Vision and Image Processing Journal, vol.6,issue3,dec06,pp7-13. L.Sirovich and M. Kirby, “Low dimensional procedure for the characterization of human faces,” Journal of optical society of America, vol.4, March1987,pp519- 524.