By: Suvigya Tripathi (09BEC094) Ankit V. Gupta (09BEC106) Guided By: Prof. Bhupendra Fataniya Dept. of Electronics and Communication Engineering, Nirma.

Slides:



Advertisements
Similar presentations
Review of AI from Chapter 3. Journal May 13  What advantages and disadvantages do you see with using Expert Systems in real world applications like business,
Advertisements

By: Mani Baghaei Fard.  During recent years number of moving vehicles in roads and highways has been considerably increased.
Face Recognition. Introduction Why we are interested in face recognition? Why we are interested in face recognition? Passport control at terminals in.
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
NC DMV License and Theft Bureau
Face Alignment with Part-Based Modeling
Simple Face Detection system Ali Arab Sharif university of tech. Fall 2012.
An Introduction to Face Detection and Recognition
By: W. Zhao, R. Chellappa, P.J. Phillips, and A. Rosenfeld Presented By: Diego Velasquez.
Facial feature localization Presented by: Harvest Jang Spring 2002.
Adviser:Ming-Yuan Shieh Student:shun-te chuang SN:M
 INTRODUCTION  STEPS OF GESTURE RECOGNITION  TRACKING TECHNOLOGIES  SPEECH WITH GESTURE  APPLICATIONS.
A Colour Face Image Database for Benchmarking of Automatic Face Detection Algorithms Prag Sharma, Richard B. Reilly UCD DSP Research Group This work is.
ICIP 2000, Vancouver, Canada IVML, ECE, NTUA Face Detection: Is it only for Face Recognition?  A few years earlier  Face Detection Face Recognition 
Recognition of Traffic Lights in Live Video Streams on Mobile Devices
A Study of Approaches for Object Recognition
FACE RECOGNITION BY: TEAM 1 BILL BAKER NADINE BROWN RICK HENNINGS SHOBHANA MISRA SAURABH PETHE.
Face Recognition By: Thanh Do Warren Ju. Face Recognition By: Thanh Do Warren Ju.
Hand Movement Recognition By: Tokman Niv Levenbroun Guy Instructor: Todtfeld Ari.
Triangle-based approach to the detection of human face March 2001 PATTERN RECOGNITION Speaker Jing. AIP Lab.
Face Recognition: An Introduction
A Vision-Based System that Detects the Act of Smoking a Cigarette Xiaoran Zheng, University of Nevada-Reno, Dept. of Computer Science Dr. Mubarak Shah,
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
Facial Recognition Facial recognition software - based on the ability to recognize a face and then measure the various features of the face. Each human.
Facial Recognition. 1. takes a picture of a person 2. runs that image through the database 3. finds a match and identifies the person Humans have always.
Facial Recognition CSE 391 Kris Lord.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Biometrics: Ear Recognition
Facial Feature Detection
Karthiknathan Srinivasan Sanchit Aggarwal
FACE RECOGNITION AUTHOR: Łukasz Przywarty
Introduction Detecting Faces in a Single Image –Knowledge-Based Methods –Feature-Based Methods –Template Matching –Appearance-Based Methods Face Image.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
Face Recognition System By Arthur. Introduction  A facial recognition system is a computer application for automatically identifying or verifying a person.
CSCE 5013 Computer Vision Fall 2011 Prof. John Gauch
By Doğaç Başaran & Erdem Yörük
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Computer Science Department Pacific University Artificial Intelligence -- Computer Vision.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Access Control Via Face Recognition. Group Members  Thilanka Priyankara  Vimalaharan Paskarasundaram  Manosha Silva  Dinusha Perera.
A Seminar Report On Face Recognition Technology A Seminar Report On Face Recognition Technology 123seminarsonly.com.
Face Recognition: An Introduction
1 Artificial Intelligence: Vision Stages of analysis Low level vision Surfaces and distance Object Matching.
1 Iris Recognition Ying Sun AICIP Group Meeting November 3, 2006.
Facial Recognition
Jack Pinches INFO410 & INFO350 S INFORMATION SCIENCE Computer Vision I.
3D Face Recognition Using Range Images
Facial Recognition Systems By Derek Ciocca. 1.Parts of the system 2.Improving Accuracy 3.Current and future uses.
SUMMERY 1. VOLUMETRIC FEATURES FOR EVENT DETECTION IN VIDEO correlate spatio-temporal shapes to video clips that have been automatically segmented we.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Guest Lecture + Some Topics in Biometrics September 12,
Physical Security Secure the room Secure the machine – 6 ways.
Facial Recognition By Lisa Tomko.
Face Recognition Technology By Catherine jenni christy.M.sc.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from.
ZAGAZIG UNIVERSITY-BENHA BRANCH SHOUBRA FACULTY OF ENGINEERING ELECTRICAL ENGINGEERING DEPT. COMPUTER SYSTEM DIVISION GRAUDATION PROJECT 2003.
Face Detection & Recognition
Face Detection 蔡宇軒.
RAJAT GOEL E.C.-09. The information age is quickly revolutionizing the way transactions are completed. Using the proper PIN gains access, but the user.
Submitted by: Siddharth Jain (08EJCIT075) Shirin Saluja (08EJCIT071) Shweta Sharma (08EJCIT074) VIII Semester, I.T Department Submitted to: Mr. Abhay Kumar.
Over the recent years, computer vision has started to play a significant role in the Human Computer Interaction (HCI). With efficient object tracking.
FACE RECOGNITION. A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a.
Presented By Bhargav (08BQ1A0435).  Images play an important role in todays information because A single image represents a thousand words.  Google's.
A Seminar Report On Face Recognition Technology
FACE RECOGNITION TECHNOLOGY
Face Recognition 1.
FACE RECOGNITION TECHNOLOGY
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
An Infant Facial Expression Recognition System Based on Moment Feature Extraction C. Y. Fang, H. W. Lin, S. W. Chen Department of Computer Science and.
Presentation transcript:

By: Suvigya Tripathi (09BEC094) Ankit V. Gupta (09BEC106) Guided By: Prof. Bhupendra Fataniya Dept. of Electronics and Communication Engineering, Nirma University at Ahmedabad. REVIEW-1

 What is face detection.  The History.  Challenges.  2D-Image Scan.  Biometrics : Skin Texture Analysis.  Applications.

 Steps:  Face Detection: differentiate a human face from the background of the image or a real time video.  Feature Detection: record its features.  Face Recognition: Compare it to a data base.

 Technique employed to distinguish a Human face from the rest of the background of the image.

 During 1964 and 1965, Bledsoe, along with Helen Chan and Charles Bisson, worked on using the computer to recognize human faces.  He was proud of this work, but because the funding was provided by an unnamed intelligence agency that did not allow much publicity, little of the work was published.

 The first step for any automatic face recognition system system.  First step in many Human Computer Interaction systems.  Expression Recognition  Cognitive State/Emotional State Recognition  First step in many surveillance and security systems.  Video coding  Automatic Target Recognition(ATR)

 In – Plane Rotation  Out – Plane Rotation  Lighting  Aging Effects  Facial Expressions  Face Covered by long Hairs or Hand.

 Different Approaches: ◦ Knowledge Based Approach ◦ Feature Invariant Method ◦ Template Matching Method

 It uses human-coded rules to model facial features, such as two symmetric eyes, a nose in the middle and a mouth underneath the nose.

 Pros: ◦ Easy to come up with simple rules ◦ Based on the coded rules, facial features in an input image are extracted first, and face candidates are identified ◦ Work well for face localization in uncluttered background  Cons: ◦ Difficult to translate human knowledge into rules precisely: detailed rules fail to detect faces and general rules may find many false positives ◦ Difficult to extend this approach to detect faces in different poses: implausible to enumerate all the possible cases

 Feature invariant methods try to find facial features which are invariant to pose, lighting condition or rotation.  Skin colors, edges and shapes fall into this category.

 Every face has numerous, distinguishable landmarks, the different peaks and valleys that make up the face o Distance between the eyes o Width of the nose o Depth of the eye sockets o The shape of the cheekbones o The length of the jaw line

 Pros: ◦ Features are invariant to pose and change in orientation.  Cons: ◦ Difficult to locate facial features due to several corruption (illumination, noise, occlusion) ◦ Difficult to detect features in complex background

 Template matching methods calculate the correlation between a test image and a pre-selected facial templates.

 Pros: ◦ Simple  Cons: ◦ Templates needs to be initialized near the face images ◦ Difficult to enumerate templates for different poses (similar to knowledge-based methods)

 Using skin color to find face segments is a vulnerable technique.  Non-animate objects with the same color as skin can be picked up since the technique uses color segmentation.  Then the face can be picked up using any of the approaches.

 Lack of restriction to orientation or size of faces.  A good algorithm can handle complex backgrounds.  It is relatively insensitive to changes in expression, including blinking, frowning or smiling  Has the ability to compensate for mustache or beard growth and the appearance of eyeglasses.

 Security measure at ATM’s  Digital Cameras  Public Surveillance (CCTV’s) at Airports, Hospitals, etc.  Televisions and computers can save energy by reducing the brightness.

 A set of two task:  Face Identification: Given a face image that belongs to a person in a database, tell whose image it is.  Face Verification: Given a face image that might not belong to the database, verify whether it is from the person it is claimed to be in the database.

 Wikipedia.org  How Stuff Works   Kimmel, Ron. "Three-dimensional face recognition". Retrieved "Three-dimensional face recognition"  Ziyou Xiong, Univ. of Illinois at Urbana-Champaign