SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 670
Face Recognition using Deep Learning
Ayesha Jamadar, Anjali Deware, Gauri Kshirsagar, Neha Khairnar
--------------------------------------------------------------***---------------------------------------------------------------
Abstract - One of the most successful application of images analysis and understanding, face recognition has
recently received significant attention, especially during the past few years. Facial recognition technology (FRT)
has emerged as an attractive solution to address many contemporary needs for identification and the verification
of identity claims. It brings together the promise of other biometric systems, which attempt to tie identity to
individually distinctive features of the body, and the more familiar functionality of visual surveillance systems. It
develops a social political analysis that bridges the technical and social scientific literatures on FRT and addresses
the unique challenges and concerns that attend its development, evaluation, and specific operational uses,
contents, and goals. It highlights the potential and limitations of the technology, noting those tasks for which it
seems ready for deployment, those areas where performance obstacles may be overcome by future technological
developments or sound operating procedures, and still other issues which appear intractable. Its concern with
efficiency tends to ethical considerations. Face recognition technology may solve this problem since a face is
undeniably connected to its owner expect in the case of identical twins. It is nontransferable. The system can then
compare scans to records stored in a central or local database or even on a smart card.
1. INTRODUCTION
Face is most commonly used biometric to recognize people. Face recognition has received substantial ttention
from researchers due to human activities found in various applications of security like airport, criminal
detection, face tracking, forensic etc. Compared to other biometric traits like palm print, Iris, _finger print etc.,
face biometrics can be non-intrusive. They can be taken even without users knowledge and further can be
used for security based applications like criminal detection, face tracking, airport security, and forensic
surveillance systems. Face recognition involves capturing face image from a video or from a surveillance
camera. They are compared with the stored database. Face biometrics involves training known images,
classify them with known classes and then they are stored in the database. When a test image is given to the
system it is classified and compared with stored database. Face biometrics is a challenging field of research
with various limitations imposed for a machine face recognition like variations in head pose, change in
illumination, facial expression, aging, occlusion due to accessories etc.,. Various approaches were suggested by
researchers in overcoming the limitations stated.
1.1 Haar Cascade Classifier
The process of face recognition is categorized into 2 steps: Face Detection and Face Recognition. The main aim
of it is to make the machine aware of what a face looks like. Face detection is primarily governed by few rules
like positon of nose, space between eyes and others. Information regarding the face, i.e. position and size of
the face from an image or video stream, is collected and noted
A. Face Detection
The detection of face is a process carried out using Haar cascade classifiers due to its speed. Haar
Classifier is a supervised classifier and can be trained to detect faces in an image. It may be seen as a
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 671
funnel where each region of any given image is processed using a set of classifiers termed as Haar-
features. They behave as a funnel called the Haar Cascade. Classifiers at the top of the cascade are very
fast and their false negative rate is very low. They discard regions of an image that does not contains any
face. The features become more complex further down the cascade and images are rejected immediately
if the features do not resemble a face. The integral of a grayscale image is calculated by the e right of the
corresponding pixel. Thus, calculation of average intensity of any rectangular portion of an image may be
calculated with the help of only 4 pixels at a time.
1.2 LBPH
Human beings perform face recognition automatically every day and practically with no effort.
Although it sounds like a very simple task for us, it has proven to be a complex task for a computer, as it has
many variables that can impair the accuracy of the methods, for example: illumination variation, low
resolution, occlusion, amongst other.
In computer science, face recognition is basically the task of recognizing a person based on its facial image.
It has become very popular in the last two decades, mainly because of the new methods developed and the
high quality of the current videos/cameras.
In this section, it is shown a step-by-step explanation of the LBPH algorithm:
1. First of all, we need to define the parameters (radius, neighbors, grid x and grid y) using the Parameters
structure from the lbph package. Then we need to call the Init function passing the structure with the
parameters. If we not set the parameters, it will use the default parameters as explained in
the Parameters section.
2. Secondly, we need to train the algorithm. To do that we just need to call the Train function passing a
slice of images and a slice of labels by parameter. All images must have the same size. The labels are
used as IDs for the images, so if you have more than one image of the same texture/subject, the labels
should be the same.
3. The Train function will first check if all images have the same size. If at least one image has not the same
size, the Train function will return an error and the algorithm will not be trained.
4. Then, the Train function will apply the basic LBP operation by changing each pixel based on its
neighbors using a default radius defined by the user. The basic LBP operation can be seen in the
following image
1.3 Result
Fig.1 Result using Machine Learning.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 672
Fig. 2 Another one using Machine Learning
Fig. 3 Result using Deep Learning.
3. CONCLUSION
Firstly, the face detection is carried out using Haar-classifier which produces an accuracy of around 80.2
percent. Using Eigenfaces algorithm, an accuracy of 83.8 percent and 85.1 percent from still images. While
LBPH face recognition algorithm produces has an accuracy of 89.6 percent for still images. Thus, it can be
concluded that LBPH algorithm for face recognition produces better recognition accuracy than Eigenfaces
algorithm. And to achieve more accuracy, CNN is the one which is used. CNN gives around 99 percentage
accuracy. Today, one of the ends that used facial recognition the most is security. Facial recognition is very
effective tool that can help law enforcers recognize criminals and software companies are leveraging the
technology to help users to access their technology. This technology can be further developed to be used in
other avenues such as ATMs, accessing confidential _les, or other sensitive materials. This can make other
security measures such as password and keys obsolete. Another way that innovators are looking to implement
facial recognition is within subways and other transportation outlets. They are looking to leverage this
technology to use faces as credit cards to pay for your transportation fees.
REFERENCES
[1] Z.Wang and F.Gao, "An Embedded Parallel Face Detection System Based on Multicore Processor", IEEE 2nd
Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), 2017, pp. 2684-
2688, ISBN: 978-1-4673-8979-2.
[2] R. Chellappa, C.L. Wilson and C. Sirohey, "Humain and machine recognition of faces: A survey" Proc.
IEEE, vol. 83, no. 5, pp. 705-740, may 1995.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 673
[3] T. Fromherz, P. Stucki, M. Bichsel, "A survey of face recognition" MML Technical Report, No 97.01, Dept.
of Computer Science, University of Zurich, Zurich, 1997.
[4] Zhang Y, Zhou Z H. Cost-sensitive face recognition [J]. "Pattern Analysis and Machine Intelligence", IEEE
Transactions on, 2010, 32(10): 1758-1769
[5] P.J.Phillips, H.Moon." The FERET Evaluation Methodology for FaceRecognition Al-gorithms ". IEEE
Transactions on PAMI, 22(10), 2000, 1090-1104.
[6] Z Zhang Y, Zhou Z H. "Cost-sensitive face recognition" . Pattern Analysis and Machine Intelligence", IEEE
Transactions on, 2010, 32(10): 1758-1769.
[7] R. Brunelli and T.Poggio, "Face recognition: features versus templates", IEEE Transac-tion on Pattern
Analysis and Machine Intelligenge , vol. 15, no. 10, 1993, pp. 1042-1052, ISSN: 0162-8828.

More Related Content

What's hot

IRJET- Emotionalizer : Face Emotion Detection System
IRJET- Emotionalizer : Face Emotion Detection SystemIRJET- Emotionalizer : Face Emotion Detection System
IRJET- Emotionalizer : Face Emotion Detection SystemIRJET Journal
 
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET Journal
 
Seminar Report face recognition_technology
Seminar Report face recognition_technologySeminar Report face recognition_technology
Seminar Report face recognition_technologyVivek Soni
 
Dissertation final report
Dissertation final reportDissertation final report
Dissertation final reportSmriti Tikoo
 
Mobile to server face recognition. Skripsi 1.
Mobile to server face recognition. Skripsi 1.Mobile to server face recognition. Skripsi 1.
Mobile to server face recognition. Skripsi 1.Adryan Rezza
 
Classroom Attendance using Face Detection and Raspberry-Pi
Classroom Attendance using Face Detection and Raspberry-PiClassroom Attendance using Face Detection and Raspberry-Pi
Classroom Attendance using Face Detection and Raspberry-PiIRJET Journal
 
IRJET - Facial Recognition based Attendance Management System
IRJET - Facial Recognition based Attendance Management SystemIRJET - Facial Recognition based Attendance Management System
IRJET - Facial Recognition based Attendance Management SystemIRJET Journal
 
Face recognition system
Face recognition systemFace recognition system
Face recognition systemYogesh Lamture
 
A comparative review of various approaches for feature extraction in Face rec...
A comparative review of various approaches for feature extraction in Face rec...A comparative review of various approaches for feature extraction in Face rec...
A comparative review of various approaches for feature extraction in Face rec...Vishnupriya T H
 
IRJET- Persons Identification Tool for Visually Impaired - Digital Eye
IRJET-  	  Persons Identification Tool for Visually Impaired - Digital EyeIRJET-  	  Persons Identification Tool for Visually Impaired - Digital Eye
IRJET- Persons Identification Tool for Visually Impaired - Digital EyeIRJET Journal
 
Identifying unconscious patients using face and fingerprint recognition
Identifying unconscious patients using face and fingerprint recognitionIdentifying unconscious patients using face and fingerprint recognition
Identifying unconscious patients using face and fingerprint recognitionAsrarulhaq Maktedar
 
Face Recognition report
Face Recognition reportFace Recognition report
Face Recognition reportlavanya693
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyShubhamLamichane
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShravan Halankar
 

What's hot (18)

IRJET- Emotionalizer : Face Emotion Detection System
IRJET- Emotionalizer : Face Emotion Detection SystemIRJET- Emotionalizer : Face Emotion Detection System
IRJET- Emotionalizer : Face Emotion Detection System
 
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric Learning
 
Seminar Report face recognition_technology
Seminar Report face recognition_technologySeminar Report face recognition_technology
Seminar Report face recognition_technology
 
Dissertation final report
Dissertation final reportDissertation final report
Dissertation final report
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Mobile to server face recognition. Skripsi 1.
Mobile to server face recognition. Skripsi 1.Mobile to server face recognition. Skripsi 1.
Mobile to server face recognition. Skripsi 1.
 
40120140505010 2-3
40120140505010 2-340120140505010 2-3
40120140505010 2-3
 
40120140505010
4012014050501040120140505010
40120140505010
 
Classroom Attendance using Face Detection and Raspberry-Pi
Classroom Attendance using Face Detection and Raspberry-PiClassroom Attendance using Face Detection and Raspberry-Pi
Classroom Attendance using Face Detection and Raspberry-Pi
 
IRJET - Facial Recognition based Attendance Management System
IRJET - Facial Recognition based Attendance Management SystemIRJET - Facial Recognition based Attendance Management System
IRJET - Facial Recognition based Attendance Management System
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
 
A comparative review of various approaches for feature extraction in Face rec...
A comparative review of various approaches for feature extraction in Face rec...A comparative review of various approaches for feature extraction in Face rec...
A comparative review of various approaches for feature extraction in Face rec...
 
IRJET- Persons Identification Tool for Visually Impaired - Digital Eye
IRJET-  	  Persons Identification Tool for Visually Impaired - Digital EyeIRJET-  	  Persons Identification Tool for Visually Impaired - Digital Eye
IRJET- Persons Identification Tool for Visually Impaired - Digital Eye
 
Identifying unconscious patients using face and fingerprint recognition
Identifying unconscious patients using face and fingerprint recognitionIdentifying unconscious patients using face and fingerprint recognition
Identifying unconscious patients using face and fingerprint recognition
 
Face Recognition report
Face Recognition reportFace Recognition report
Face Recognition report
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
face recognition
face recognitionface recognition
face recognition
 

Similar to IRJET- Face Recognition using Deep Learning

IRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET Journal
 
IRJET- Library Management System with Facial Biometric Authentication
IRJET- Library Management System with Facial Biometric AuthenticationIRJET- Library Management System with Facial Biometric Authentication
IRJET- Library Management System with Facial Biometric AuthenticationIRJET Journal
 
IRJET- Face Detection and Tracking Algorithm using Open CV with Raspberry Pi
IRJET- Face Detection and Tracking Algorithm using Open CV with Raspberry PiIRJET- Face Detection and Tracking Algorithm using Open CV with Raspberry Pi
IRJET- Face Detection and Tracking Algorithm using Open CV with Raspberry PiIRJET Journal
 
IRJET- Vision based Security System and Automation using Internet of Things
IRJET- Vision based Security System and Automation using Internet of ThingsIRJET- Vision based Security System and Automation using Internet of Things
IRJET- Vision based Security System and Automation using Internet of ThingsIRJET Journal
 
IRJET- Implementation of Attendance System using Face Recognition
IRJET- Implementation of Attendance System using Face RecognitionIRJET- Implementation of Attendance System using Face Recognition
IRJET- Implementation of Attendance System using Face RecognitionIRJET Journal
 
IRJET - Facial Recognition based Attendance System with LBPH
IRJET -  	  Facial Recognition based Attendance System with LBPHIRJET -  	  Facial Recognition based Attendance System with LBPH
IRJET - Facial Recognition based Attendance System with LBPHIRJET Journal
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face RecognitionIRJET Journal
 
IRJET- Student Attendance System by Face Detection
IRJET- Student Attendance System by Face DetectionIRJET- Student Attendance System by Face Detection
IRJET- Student Attendance System by Face DetectionIRJET Journal
 
Effective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID TagsEffective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID TagsIRJET Journal
 
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITIONA VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITIONIRJET Journal
 
IRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric AttendanceIRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric AttendanceIRJET Journal
 
IRJET- Facial Emotion Detection using Convolutional Neural Network
IRJET- Facial Emotion Detection using Convolutional Neural NetworkIRJET- Facial Emotion Detection using Convolutional Neural Network
IRJET- Facial Emotion Detection using Convolutional Neural NetworkIRJET Journal
 
Face Recognition Based Payment Processing System
Face Recognition Based Payment Processing SystemFace Recognition Based Payment Processing System
Face Recognition Based Payment Processing SystemIRJET Journal
 
Progression in Large Age-Gap Face Verification
Progression in Large Age-Gap Face VerificationProgression in Large Age-Gap Face Verification
Progression in Large Age-Gap Face VerificationIRJET Journal
 
ATTENDANCE BY FACE RECOGNITION USING AI
ATTENDANCE BY FACE RECOGNITION USING AIATTENDANCE BY FACE RECOGNITION USING AI
ATTENDANCE BY FACE RECOGNITION USING AIIRJET Journal
 
IRJET- Driver’s Sleep Detection
IRJET-  	  Driver’s Sleep DetectionIRJET-  	  Driver’s Sleep Detection
IRJET- Driver’s Sleep DetectionIRJET Journal
 
IRJET- A Study on Automated Attendance System using Facial Recognition
IRJET- A Study on Automated Attendance System using Facial RecognitionIRJET- A Study on Automated Attendance System using Facial Recognition
IRJET- A Study on Automated Attendance System using Facial RecognitionIRJET Journal
 
IRJET- Credit Card Authentication using Facial Recognition
IRJET-  	  Credit Card Authentication using Facial RecognitionIRJET-  	  Credit Card Authentication using Facial Recognition
IRJET- Credit Card Authentication using Facial RecognitionIRJET Journal
 
Smart Doorbell System Based on Face Recognition
Smart Doorbell System Based on Face RecognitionSmart Doorbell System Based on Face Recognition
Smart Doorbell System Based on Face RecognitionIRJET Journal
 

Similar to IRJET- Face Recognition using Deep Learning (20)

IRJET- Digiyathra
IRJET-  	  DigiyathraIRJET-  	  Digiyathra
IRJET- Digiyathra
 
IRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face Recognition
 
IRJET- Library Management System with Facial Biometric Authentication
IRJET- Library Management System with Facial Biometric AuthenticationIRJET- Library Management System with Facial Biometric Authentication
IRJET- Library Management System with Facial Biometric Authentication
 
IRJET- Face Detection and Tracking Algorithm using Open CV with Raspberry Pi
IRJET- Face Detection and Tracking Algorithm using Open CV with Raspberry PiIRJET- Face Detection and Tracking Algorithm using Open CV with Raspberry Pi
IRJET- Face Detection and Tracking Algorithm using Open CV with Raspberry Pi
 
IRJET- Vision based Security System and Automation using Internet of Things
IRJET- Vision based Security System and Automation using Internet of ThingsIRJET- Vision based Security System and Automation using Internet of Things
IRJET- Vision based Security System and Automation using Internet of Things
 
IRJET- Implementation of Attendance System using Face Recognition
IRJET- Implementation of Attendance System using Face RecognitionIRJET- Implementation of Attendance System using Face Recognition
IRJET- Implementation of Attendance System using Face Recognition
 
IRJET - Facial Recognition based Attendance System with LBPH
IRJET -  	  Facial Recognition based Attendance System with LBPHIRJET -  	  Facial Recognition based Attendance System with LBPH
IRJET - Facial Recognition based Attendance System with LBPH
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face Recognition
 
IRJET- Student Attendance System by Face Detection
IRJET- Student Attendance System by Face DetectionIRJET- Student Attendance System by Face Detection
IRJET- Student Attendance System by Face Detection
 
Effective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID TagsEffective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID Tags
 
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITIONA VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
 
IRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric AttendanceIRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric Attendance
 
IRJET- Facial Emotion Detection using Convolutional Neural Network
IRJET- Facial Emotion Detection using Convolutional Neural NetworkIRJET- Facial Emotion Detection using Convolutional Neural Network
IRJET- Facial Emotion Detection using Convolutional Neural Network
 
Face Recognition Based Payment Processing System
Face Recognition Based Payment Processing SystemFace Recognition Based Payment Processing System
Face Recognition Based Payment Processing System
 
Progression in Large Age-Gap Face Verification
Progression in Large Age-Gap Face VerificationProgression in Large Age-Gap Face Verification
Progression in Large Age-Gap Face Verification
 
ATTENDANCE BY FACE RECOGNITION USING AI
ATTENDANCE BY FACE RECOGNITION USING AIATTENDANCE BY FACE RECOGNITION USING AI
ATTENDANCE BY FACE RECOGNITION USING AI
 
IRJET- Driver’s Sleep Detection
IRJET-  	  Driver’s Sleep DetectionIRJET-  	  Driver’s Sleep Detection
IRJET- Driver’s Sleep Detection
 
IRJET- A Study on Automated Attendance System using Facial Recognition
IRJET- A Study on Automated Attendance System using Facial RecognitionIRJET- A Study on Automated Attendance System using Facial Recognition
IRJET- A Study on Automated Attendance System using Facial Recognition
 
IRJET- Credit Card Authentication using Facial Recognition
IRJET-  	  Credit Card Authentication using Facial RecognitionIRJET-  	  Credit Card Authentication using Facial Recognition
IRJET- Credit Card Authentication using Facial Recognition
 
Smart Doorbell System Based on Face Recognition
Smart Doorbell System Based on Face RecognitionSmart Doorbell System Based on Face Recognition
Smart Doorbell System Based on Face Recognition
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfManish Kumar
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...Erbil Polytechnic University
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptJohnWilliam111370
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdfsahilsajad201
 
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxCurve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxRomil Mishra
 
KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosVictor Morales
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organizationchnrketan
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Erbil Polytechnic University
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsResearcher Researcher
 
70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical trainingGladiatorsKasper
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labsamber724300
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfDrew Moseley
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxStephen Sitton
 
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxTriangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxRomil Mishra
 
A brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProA brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProRay Yuan Liu
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfalene1
 

Recently uploaded (20)

THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdf
 
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxCurve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
 
KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitos
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organization
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending Actuators
 
70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labs
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdf
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptx
 
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxTriangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
 
A brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProA brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision Pro
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
 

IRJET- Face Recognition using Deep Learning

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 670 Face Recognition using Deep Learning Ayesha Jamadar, Anjali Deware, Gauri Kshirsagar, Neha Khairnar --------------------------------------------------------------***--------------------------------------------------------------- Abstract - One of the most successful application of images analysis and understanding, face recognition has recently received significant attention, especially during the past few years. Facial recognition technology (FRT) has emerged as an attractive solution to address many contemporary needs for identification and the verification of identity claims. It brings together the promise of other biometric systems, which attempt to tie identity to individually distinctive features of the body, and the more familiar functionality of visual surveillance systems. It develops a social political analysis that bridges the technical and social scientific literatures on FRT and addresses the unique challenges and concerns that attend its development, evaluation, and specific operational uses, contents, and goals. It highlights the potential and limitations of the technology, noting those tasks for which it seems ready for deployment, those areas where performance obstacles may be overcome by future technological developments or sound operating procedures, and still other issues which appear intractable. Its concern with efficiency tends to ethical considerations. Face recognition technology may solve this problem since a face is undeniably connected to its owner expect in the case of identical twins. It is nontransferable. The system can then compare scans to records stored in a central or local database or even on a smart card. 1. INTRODUCTION Face is most commonly used biometric to recognize people. Face recognition has received substantial ttention from researchers due to human activities found in various applications of security like airport, criminal detection, face tracking, forensic etc. Compared to other biometric traits like palm print, Iris, _finger print etc., face biometrics can be non-intrusive. They can be taken even without users knowledge and further can be used for security based applications like criminal detection, face tracking, airport security, and forensic surveillance systems. Face recognition involves capturing face image from a video or from a surveillance camera. They are compared with the stored database. Face biometrics involves training known images, classify them with known classes and then they are stored in the database. When a test image is given to the system it is classified and compared with stored database. Face biometrics is a challenging field of research with various limitations imposed for a machine face recognition like variations in head pose, change in illumination, facial expression, aging, occlusion due to accessories etc.,. Various approaches were suggested by researchers in overcoming the limitations stated. 1.1 Haar Cascade Classifier The process of face recognition is categorized into 2 steps: Face Detection and Face Recognition. The main aim of it is to make the machine aware of what a face looks like. Face detection is primarily governed by few rules like positon of nose, space between eyes and others. Information regarding the face, i.e. position and size of the face from an image or video stream, is collected and noted A. Face Detection The detection of face is a process carried out using Haar cascade classifiers due to its speed. Haar Classifier is a supervised classifier and can be trained to detect faces in an image. It may be seen as a
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 671 funnel where each region of any given image is processed using a set of classifiers termed as Haar- features. They behave as a funnel called the Haar Cascade. Classifiers at the top of the cascade are very fast and their false negative rate is very low. They discard regions of an image that does not contains any face. The features become more complex further down the cascade and images are rejected immediately if the features do not resemble a face. The integral of a grayscale image is calculated by the e right of the corresponding pixel. Thus, calculation of average intensity of any rectangular portion of an image may be calculated with the help of only 4 pixels at a time. 1.2 LBPH Human beings perform face recognition automatically every day and practically with no effort. Although it sounds like a very simple task for us, it has proven to be a complex task for a computer, as it has many variables that can impair the accuracy of the methods, for example: illumination variation, low resolution, occlusion, amongst other. In computer science, face recognition is basically the task of recognizing a person based on its facial image. It has become very popular in the last two decades, mainly because of the new methods developed and the high quality of the current videos/cameras. In this section, it is shown a step-by-step explanation of the LBPH algorithm: 1. First of all, we need to define the parameters (radius, neighbors, grid x and grid y) using the Parameters structure from the lbph package. Then we need to call the Init function passing the structure with the parameters. If we not set the parameters, it will use the default parameters as explained in the Parameters section. 2. Secondly, we need to train the algorithm. To do that we just need to call the Train function passing a slice of images and a slice of labels by parameter. All images must have the same size. The labels are used as IDs for the images, so if you have more than one image of the same texture/subject, the labels should be the same. 3. The Train function will first check if all images have the same size. If at least one image has not the same size, the Train function will return an error and the algorithm will not be trained. 4. Then, the Train function will apply the basic LBP operation by changing each pixel based on its neighbors using a default radius defined by the user. The basic LBP operation can be seen in the following image 1.3 Result Fig.1 Result using Machine Learning.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 672 Fig. 2 Another one using Machine Learning Fig. 3 Result using Deep Learning. 3. CONCLUSION Firstly, the face detection is carried out using Haar-classifier which produces an accuracy of around 80.2 percent. Using Eigenfaces algorithm, an accuracy of 83.8 percent and 85.1 percent from still images. While LBPH face recognition algorithm produces has an accuracy of 89.6 percent for still images. Thus, it can be concluded that LBPH algorithm for face recognition produces better recognition accuracy than Eigenfaces algorithm. And to achieve more accuracy, CNN is the one which is used. CNN gives around 99 percentage accuracy. Today, one of the ends that used facial recognition the most is security. Facial recognition is very effective tool that can help law enforcers recognize criminals and software companies are leveraging the technology to help users to access their technology. This technology can be further developed to be used in other avenues such as ATMs, accessing confidential _les, or other sensitive materials. This can make other security measures such as password and keys obsolete. Another way that innovators are looking to implement facial recognition is within subways and other transportation outlets. They are looking to leverage this technology to use faces as credit cards to pay for your transportation fees. REFERENCES [1] Z.Wang and F.Gao, "An Embedded Parallel Face Detection System Based on Multicore Processor", IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), 2017, pp. 2684- 2688, ISBN: 978-1-4673-8979-2. [2] R. Chellappa, C.L. Wilson and C. Sirohey, "Humain and machine recognition of faces: A survey" Proc. IEEE, vol. 83, no. 5, pp. 705-740, may 1995.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 673 [3] T. Fromherz, P. Stucki, M. Bichsel, "A survey of face recognition" MML Technical Report, No 97.01, Dept. of Computer Science, University of Zurich, Zurich, 1997. [4] Zhang Y, Zhou Z H. Cost-sensitive face recognition [J]. "Pattern Analysis and Machine Intelligence", IEEE Transactions on, 2010, 32(10): 1758-1769 [5] P.J.Phillips, H.Moon." The FERET Evaluation Methodology for FaceRecognition Al-gorithms ". IEEE Transactions on PAMI, 22(10), 2000, 1090-1104. [6] Z Zhang Y, Zhou Z H. "Cost-sensitive face recognition" . Pattern Analysis and Machine Intelligence", IEEE Transactions on, 2010, 32(10): 1758-1769. [7] R. Brunelli and T.Poggio, "Face recognition: features versus templates", IEEE Transac-tion on Pattern Analysis and Machine Intelligenge , vol. 15, no. 10, 1993, pp. 1042-1052, ISSN: 0162-8828.