face pdf

Upload: diwakar0000000

Post on 03-Apr-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/28/2019 face pdf

    1/36

    1

    FaceRecognitionUsingNeural

    NetworksSOUMYA AWASTHI

    ROLL NO: 1000118051

  • 7/28/2019 face pdf

    2/36

    2

    TABLE OF CONTENT

    INTRODUCTION

    HOW IS FACE RECOGNITION PERFORMED

    WHAT ARE NEURAL NETWORKS

    MODEL OF NEURON

    PROJECT OBJECTIVE

    BLOCK DIAGRAM OF FACE RECOGNITION

    CURVELET& LDA ALGORITHUM

    LDA

    RBF NETWORK

    CLASSIFIER DESIGN

    RBFN BASED FACE RECOGNITION

    ANALYSIS

    OTHER TECHNIQUE-PCA

    WHY FACE RECOGNITION

    APPLICATION

    LIMITATIONS

    CONCLUSION

  • 7/28/2019 face pdf

    3/36

    3

    INTRODUCTION

    A face recognition system is a computer

    application for automatically identifying or

    verifying a person from a digital image or a

    video frame from a video source. One of the

    ways to do this is by comparing selected facialfeatures from the image and a facial

    database.

    Feature to be compared for face recognition:

    1. Inter-ocular distance

    2. distance between the lips and the

    nose

    3. distance between the nose tip and

    the eyes4. distance between the lips and the

    line joining the two eyes

    5. eccentricity of the face

    6. width of the lips

  • 7/28/2019 face pdf

    4/36

    4

    How is Face Recognition

    Performed?

  • 7/28/2019 face pdf

    5/36

    5

    Here presents a RBF classifier and LDA based

    algorithm gives efficient and robust face

    recognition. In general, there are three importantmethods for face recognition such as-

    Holistic method, feature-based method and

    hybrid method.

    The holistic method is used in which the input

    is taken as the whole face region and based on

    LDA it simplifies a feature set into lower

    dimension while retaining the characteristics of

    featureset.1. Holistic methods. These methods identify a

    face using the whole face image as input. The

    main challenge faced by these methods is how to

    address the extremely small sample problem.

    2. Local methods. These methods use the local

    facial features for recognition. Care should be

    taken when deciding how to incorporate global

    configurational information into local face model.

    3. Hybrid methods. These methods use both the

    local and holistic features to recognize a face.

  • 7/28/2019 face pdf

    6/36

    6

    These methods have the potential to offer

    better performance than individual holistic orlocal methods, since more comprehensive

    information could be utilized.

    The security threats and challenges posed in

    the current world necessitate the need to have a

    reliable and robust method to identify and

    authenticate people. Authentication implies

    granting people access to a physical area orcomputer system based on the proof they

    provide for the identity they claim.

  • 7/28/2019 face pdf

    7/36

    7

    A person can be authenticatedbased on :

    (1) Something the person knows.

    For example,

    passwords and PIN numbers.

    (2) Something the person is.

    For example,

    Identity cards and security tokens.

    (3) Something the person has.

    For example,

    biometrics.

  • 7/28/2019 face pdf

    8/36

    8

    Biometrics is being used increasingly now-a-days

    as a reliable method of providing valid

    authentication over the traditional methods such

    as passwords and tokens. Biometric

    authentication relies on identifying people based

    on certain specific biological characteristics such

    as fingerprints, face, iris, retina and a persons

    signature that change less frequently over a

    period of time. Biometrics can be used along with

    other categories of authentication, that is,

    something the person knows or has. This termed

    as multi-factor authentication.

  • 7/28/2019 face pdf

    9/36

    9

    Face Recognition Technology (FRT) has a

    variety of potential applications in information

    security, law enforcement and surveillance, smart

    cards, access control, among others [1-3]. For

    this reason, FRT has received significantly

    increased attention from both the academic and

    industrial communities during the past twenty

    years. Several authors have recently surveyed

    and evaluated the current FRTs from different

    aspects. For example, Smal et al. and Valentin

    et al. surveyed the feature-based and the

    neuralnetwork- based techniques, respectively,

    Yang et al. reviewed face detection techniques

    [6], Pantic and Rothkrantz [7] surveyed the

    automatic facial expression analysis, Daugman

    [3] pointed out several critical

    issues involved in an effective face

    recognition system, while the most recent and

    comprehensive survey is possibly from that of

    Zhao et al [1], where many of the latest

    techniques are reviewed.

  • 7/28/2019 face pdf

    10/36

    10

    This problem, called the one sample per person

    problem (or, one sample problem for short), is

    defined as follows. Given a stored database offaces with only one image per person, the goal is

    to identify a person from the database later in

    time in any different and unpredictable poses,

    lighting, etc from the individual image. Due to its

    challenge and significance for real-worldapplications, this problem has rapidly emerged

    as an active research sub-area of FRT in recent

    years, and many ad hoc techniques have been

    developed to attack this problem, such as

    synthesizing virtual samples, localizing the singletraining image, probabilistic matching and neural

    network methods.

  • 7/28/2019 face pdf

    11/36

    11

    What are Neural Network?

    A neural network usually involves a large

    number of processors operating in parallel,

    each with its own small sphere of knowledge

    and access to data in its local memory.

    A Neural Network is a system of programs

    and data structures that approximates the

    operation of the human brain. Typically, a neural network is initially "trained"

    or fed large amounts of data and rules about

    data relationships (for example, "A

    grandfather is older than a person's father").

    A program can then tell the network how tobehave in response to an external stimulus or

    can initiate activity on its own.

  • 7/28/2019 face pdf

    12/36

    12

    MODEL OF NEURON

  • 7/28/2019 face pdf

    13/36

    13

    PROJECT OBJECTIVE

    To implement the concept of Neural

    Networks for the purpose of Face

    Recognition.

    Further Recognition of unclear images by

    removing the background noise.

    To improve the accuracy of Face recognition

    by reducing the number of false rejection andfalse acceptance errors.

    Recognition of images captured while in

    motion.

    Recognition of faces in videos (motion

    picture).

  • 7/28/2019 face pdf

    14/36

    14

    BLOCK DIAGRAM OF FACE

    RECOGNITION SYSTEM

  • 7/28/2019 face pdf

    15/36

    15

    Brief Review of Curvelets AndLDA Algorithm

    Curvelet transform used to extract features from

    facial images, and then uses RBFN to classify

    facial images basedon features. In a two

    dimensional image two adjacent regions can

    often have differing pixel values. Such a gray

    scale image will have a lot of edges i.e.

    discontinuity along a general curve and

    consequently curvelet transform will capture this

    edge information.

  • 7/28/2019 face pdf

    16/36

    16

    Linear Discriminant Analysis

    LDA is a common statistical technique to find out

    the patterns in high dimensional data [8].Feature

    extraction, also called dimensionality reduction isdone by LDA for three main reasons they are:

    i) To reduce dimension of the data to more

    tractable limits.

    ii) To capture salient class-specific features of thedata.

    iii) To eliminate redundancy.

  • 7/28/2019 face pdf

    17/36

    17

    RBF NETWORKSTRUCTURE

    RBFN contains one input layer and one output

    layer with a single hidden layer as shown infigure.

  • 7/28/2019 face pdf

    18/36

    18

    An RBF neural network structure is similar to a

    traditional three-layer feed forward neuralnetwork. The construction of the RBF neural

    network involves three different layers with feed

    forward architecture. The input layer of this

    network is a set of n units, which accept the

    elements of an n dimensional input feature

    vector. The input units are fully connected to the

    hidden layer with r hidden units . Connections

    between the input and hidden layers have unit

    weights and, as a result, do not have to be

    trained. The goal of the hidden layer is to cluster

    the data and reduce its dimensionality. In this

    structure hidden layer is named RBF units. The

    RBF units are also fully connected to the output

    layer. The output layer supplies the response of

    neural network to the activation pattern applied to

    the input layer . The transformation from the input

    space to the RBF-unit space is nonlinear,

    whereas the transformation from the RBF unit

    space to the output space is linear.

  • 7/28/2019 face pdf

    19/36

    19

    CLASSIFIER DESIGN

    Neural networks have been employed andcompared to conventional classifiers for a

    number of classification problems. The results

    shows that the accuracy of the neural network

    approaches equivalent to, or slightly better than,

    other methods. It is due to the simplicity,generality andgood learning ability of the neural

    networks[4].

    RBFN have found to be very attractive for many

    engineering problem because:

    (1) they are universal approximators,

    (2) they have a very compact topology and

    (3) their learning speed is very fast because of

    their locally tuned neurons.

    Therefore the RBF neural networks serve as an

    excellent role for pattern applications carried out

    to make the learning process, this type of

    classification is faster than the other network

    models.

  • 7/28/2019 face pdf

    20/36

    20

    RBFN based FaceRecognition

  • 7/28/2019 face pdf

    21/36

    21

    ANALYSIS OF THE RESULT

    In this features are extracted first and dimension

    reduction is carried out from facial images .RBFN

    is used to classify the facial images . figure

    shows that out of 200 images have been used

    most of them recognized by RBFN and the best

    average recognition rate is 98.6% .The

    performance of recognition rate is better than the

    other techniques.

  • 7/28/2019 face pdf

    22/36

    22

  • 7/28/2019 face pdf

    23/36

    23

    No of

    Images

    Acceptance Ratio (%) Execution Time (Seconds) Recognition Rate (%)

    LDA Curvelets LDA +

    Curvelets

    with RBFN

    LDA Curvelets LDA +

    Curvelets

    with RBFN

    LDA Cur-

    velets

    LDA +

    Curvelets

    with

    RBFN

    40 92.4 93.1 96.5 38 37 36 87 88 92.1

    60 90.6 91.2 94.3 46 44 43 88 90 94.3

    120 87.9 88.9 92.8 55 54 50 90 91 95.4

    160 85.7 86.9 90.2 67 65 58 91 93 97.7

    200 83.5 84.9 87.1 74 70 67 92 95 98.6

    The acceptance ratio of LDA is 83.5% compared

    with curvelets acceptance ratio is high that is84.9%.The proposed method acceptance ratio is

    87.1%. The recognition rate of LDA is 92%

    compared with curvelets is high recognition rate

    that is 95% represented The proposed method

  • 7/28/2019 face pdf

    24/36

    24

    recognition rate is 98.6% it shows the figure it is

    better than other methods.

  • 7/28/2019 face pdf

    25/36

    25

    Other technique used forface recognition

    We have discussed one technique, one more

    technique is Neural and PCA based algorithmfor efficient and robust face recognition This is

    based on principal component-analysis (PCA)

    technique, which is used to simplify a dataset into

    lower dimension while retaining the

    characteristics of dataset.

    Pre-processing, Principal component analysis

    and Back Propagation Neural Algorithm are the

    major implementations of this paper. Pre-

    processing is done for two purposes-

    (i) To reduce noise and possible convolute

    effects of interfering system,

  • 7/28/2019 face pdf

    26/36

    26

    (ii) To transform the image into a different space

    where classification may prove easier by

    exploitation of certain features.

    PCA is a common statistical technique for finding

    the patterns in high dimensional datasFeature extraction, also called Dimensionality

    Reduction, is done by PCA for a three main

    purposes like

    i) To reduce dimension of the data to more

    tractable limits.

    ii) To capture salient class-specific features of

    the data,

    iii) To eliminate redundancy

  • 7/28/2019 face pdf

    27/36

    27

    All these processes are implemented for Face

    Recognition, based on the basic block diagram

    as shown in fig

  • 7/28/2019 face pdf

    28/36

    28

    PRINCIPAL COMPONENT

    ANALYSIS

    PCA is a popular technique, to derive a set of

    features for both face recognition.

    Any particular face can be

    (i) Economically represented along the eigen

    pictures coordinate space, and

    (ii) Approximately reconstructed using a

    small collection of Eigen pictures.

    To do this, a face image is projected to severalface templates called eigenfaces

  • 7/28/2019 face pdf

    29/36

    29

    PCA Algorithm:-(i) Acquire an initial set of M face images (the

    training set) & Calculate the eigen-faces from the

    training set, keeping only M' eigenfaces that

    correspond to the highest eigenvalue

    (ii) Calculate the corresponding distribution in M'-

    dimensional weight space for each known

    individual, and calculate a set of weights basedon the input image

    (iii) Classify the weight pattern as either a known

    person or as unknown, according to its distance

    to the closest weight vector of a known person

  • 7/28/2019 face pdf

    30/36

    30

    Back Propagation Neural Networks

    Algorithm:-

    Here learning process in Back propagation

    requires pairs of input and target vectors. The

    output vector o is compared with target vectort.

    In case of difference of o andtvectors, the

    weights are adjusted to minimize the difference.

    Initially random weights and thresholds are

    assigned to the network. These weights are

    updated every iteration in order to minimize the

    mean square error between the output vectorand the target vector.

  • 7/28/2019 face pdf

    31/36

    31

    Experimentation and Results

    One of the images as shown in fig 4a is taken as

    the Input image. The mean image and

    reconstructed output image by PCA, is as shown

    in fig 4b and 4c.

    In BPNN, a training set of 50 images is as shown

    in fig 5a and the Eigen faces and recognized

    output image are as shown in fig 5b and 5c.

  • 7/28/2019 face pdf

    32/36

    32

    Both of the techniques are being used for facial

    recognition. Both play an important role in face

    recognition . So , its not easy to say which one is

    better of the two.

  • 7/28/2019 face pdf

    33/36

    33

    WHY FACIALRECOGNITION

    Facial recognition offers several advantagesover other biometric identification and

    authentication techniques, as facial recognition

    system have the following advantages :

    (1) Non-intrusive and hence more

    convenient.

    (2) Hygienic as no physical contact is

    involved.

    (3) Easy to use as only need to face a

    camera.

    These advantages make facial recognition

    suitable for a wide range of applications across

    industry verticals

  • 7/28/2019 face pdf

    34/36

    34

    Applications of FaceRecognition

    Passport control at terminals in airports.

    Participant identification in meetings.

    System access control.

    Scanning for criminal.

  • 7/28/2019 face pdf

    35/36

    35

    LIMITATIONS

    Not so robust against extreme variations in

    expression.

    Cannot be used for faces with lateral head

    rotation.

    Face recognition alone as of now, cannot be

    successfully used for authentication but can beused for identification and classification.

    Identical twins cannot be distinguished using

    face recognition

  • 7/28/2019 face pdf

    36/36

    CONCLUSION

    Facial recognition is an upcoming area. There

    are a lot of potential scenarios where it can be

    used. Considering this, it is not completely

    reliable to be used as an independent techniquefor authentication. Facial recognition may be

    thrown out of gear with plastic surgery, so it

    might need to be combined with other

    technologies such as Iris scan to improve

    reliability. With improvement in tools and

    technologies, it is only a matter of time before the

    incidence of false identification of subjects is

    reduced to an acceptable level to make facial

    recognition more useful.