ROBUST FACE NAME GRAPH MATCHING FOR MOVIE CHARACTER IDENTIFICATION

Slides:



Advertisements
Similar presentations
CLOSENESS: A NEW PRIVACY MEASURE FOR DATA PUBLISHING
Advertisements

Abstract There is significant need to improve existing techniques for clustering multivariate network traffic flow record and quickly infer underlying.
ABSTRACT Due to the Internets sheer size, complexity, and various routing policies, it is difficult if not impossible to locate the causes of large volumes.
WEB USAGE MINING FRAMEWORK FOR MINING EVOLVING USER PROFILES IN DYNAMIC WEBSITE DONE BY: AYESHA NUSRATH 07L51A0517 FIRDOUSE AFREEN 07L51A0522.
Abstract Shortest distance query is a fundamental operation in large-scale networks. Many existing methods in the literature take a landmark embedding.
Video Surveillance Capturing, Management and Analysis of Security Videos. -Abhinav Goel -Varun Varshney.
 An easy way to automate all functionalities of the employees of Company.  Provides full functional reports to management of Company.  Committed to.
Optimizing Cloud Resources for Delivering IPTV Services Through Virtualization.
WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream.
Ihr Logo Data Explorer - A data profiling tool. Your Logo Agenda  Introduction  Existing System  Limitations of Existing System  Proposed Solution.
Detecting Network Violation Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming.
Layered Approach using Conditional Random Fields For Intrusion Detection.
NICE :Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems.
Security Evaluation of Pattern Classifiers under Attack.
DATA DYNAMICS AND PUBLIC VERIFIABILITY CHECKING WITHOUT THIRD PARTY AUDITOR GUIDED BY PROJECT MEMBERS: Ms. V.JAYANTHI M.E Assistant Professor V.KARTHIKEYAN.
Test Of Distributed Data Quality Monitoring Of CMS Tracker Dataset H->ZZ->2e2mu with PileUp - 10,000 events ( ~ 50,000 hits for events) The monitoring.
Global File Reader. Agenda Introduction Current Scenario Proposed Solution Block Diagram Technical Implementation Hardware & Software Requirements Benefits.
A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data.
Process by which a system verifies the identity of a user wishes to access it. Authentication is essential for effective security.
Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks.
Enterprise Resource Planning(ERP)
Protecting Sensitive Labels in Social Network Data Anonymization.
ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA( ) 04/07/2013.
EZee iCafe System. Contents Introduction Current Scenario Proposed Solution Architecture / Block Diagram Hardware / Software Requirements Features Benefits.
Content Sharing over Smartphone-Based Delay- Tolerant Networks.
A System for Denial-of- Service Attack Detection Based on Multivariate Correlation Analysis.
A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia.
Video Data Hiding using Forbidden Zone and Selective Embedding Submitted Under Team Members.
Character Identification in Feature-Length Films Using Global Face-Name Matching IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 11, NO. 7, NOVEMBER 2009 Yi-Fan.
Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm.
Preventing Private Information Inference Attacks on Social Networks.
Presenting By CH . MADHURI(12QU1D5806) Under the supervision of
Implementation of a Relational Database as an Aid to Automatic Target Recognition Christopher C. Frost Computer Science Mentor: Steven Vanstone.
VIGNAN'S NIRULA INSTITUTE OF TECHNOLOGY & SCIENCE FOR WOMEN TOOLS LINKS PRESENTED BY 1.P.NAVEENA09NN1A A.SOUJANYA09NN1A R.PRASANNA09NN1A1251.
Video Surveillance Under The Guidance of Smt. D.Neelima M.Tech., Asst. Professor Submitted by G. Subrahmanyam Roll No: 10021F0013 M.C.A.
Irfan Ullah Department of Information and Communication Engineering Myongji university, Yongin, South Korea Copyright © solarlits.com.
Energy-Efficient Protocol for Cooperative Networks.
Whole Test Suite Generation. Abstract Not all bugs lead to program crashes, and not always is there a formal specification to check the correctness of.
ONLINE INTRUSION ALERT AGGREGATION WITH GENERATIVE DATA STREAM MODELING.
BLOOD BANK MANAGEMENT SYSTEM I.MOHAMMED IRFAHN ( ) A.ARUN CHARLES ( ) S.JAYA PRAKASH ( ) S.KARTHIK( ) M. ARAVINDA DE SILVA.
APARTMENT MAINTENANCE SYSTEM M.Tech( Ph.D) HOD of C.S.E & I.T Dept.
A WEB USAGE MINING FRAMEWORK FOR MINING EVOLVING USER PROFILES IN DYNAMIC WEB SITES.
Library Management System. Aim : To develop a project titled “LIBRARY MANAGEMENT” and is developed to maintain the operation done in a library. To develop.
UNIVERSITY MANAGEMENT SYSTEM
Group Member: 1. Nguyen Tuan Minh Nguyen Huy Hoang Tran Van Huynh Le Dinh Son Supervisor: Phan Truong Lam.
FINGERPRINT BASED BIOMETRICS IDENTIFICATION SYSTEM Heena Jain A.MahaLakshmi K.Kalyani.
Cooperative Caching in Wireless P2P Networks: Design, Implementation And Evaluation.
Speed Cash System. Purpose of the Project  online Banking Transaction Information.  keeping in view of the distributed client server computing technology,
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
Spatial Approximate String Search. Abstract This work deals with the approximate string search in large spatial databases. Specifically, we investigate.
BY S.S.SUDHEER VARMA (13NT1D5816)
Information Retrieval in Practice
Management Information & Evaluation System
Security Using Armstrong Numbers and Authentication using Colors
Under the Guidance of V.Rajashekhar M.Tech Assistant Professor
Intelligent Face Recognition
Authentication Schemes for Session Passwords using Color and Images
Towards Scalable Traffic Management in Cloud Data Centers
Under Guidance- Internal Guide- Ms. Shruti T.V
INFORMATION RETRIEVAL AND KNOWLEDGE MANAGEMENT SYSTEM
W3 Status Analyzer.
ABSTRACT   Recent work has shown that sink mobility along a constrained path can improve the energy efficiency in wireless sensor networks. Due to the.
STEGANOGRAPHY.
PRESENTED BY Yang Jiao Timo Ahonen, Matti Pietikainen
Submitted by: Ala Berawi Sujod Makhlof Samah Hanani Supervisor:
Department Of Computer Science Engineering
ONLINE ANDROID VOTING SYSTEM
Recognizing and Learning Object categories
Problem Statement To transform the traditional system to automated system(ERP). No centralized control. Low data privacy. Huge amount of human resources.
Presentation transcript:

ROBUST FACE NAME GRAPH MATCHING FOR MOVIE CHARACTER IDENTIFICATION

AGENDA Abstract Existing system Proposed system System architecture List of modules Module description Screen shot Conclusion Future Enhancement

ABSTRACT Automatic face identification of characters in movies become a challenging problem due to the huge variation of each characters. In this paper, we present two schemes of global face name matching based frame work for robust character identification. A noise insensitive character relationship representation is incorporated. We introduce an edit operation based graph matching algorithm.

EXISTING SYSTEM DISADVANTAGES During face tracking and face clustering process, the noises has been generated. The performance are limited at the time of noise generation. DISADVANTAGES The time taken for detecting the face is too long. The detected face cannot be more accurate.

PROPOSED SYSTEM TECHNOLOGY USED By using clustering mechanism, the face of the movie character is detected more accurately. TECHNOLOGY USED Two schemes considered in robust face name graph matching algorithm First, External script resources are utilized in both schemes belong to the global matching based category.

Second, The original graph is employed for face name graph representation. ADVANTAGES In the proposed system, the face detection is performed in a minute process. The faces are identified easily in low resolution, complex background also.

SYSTEM ARCHITECTURE

HARDWARE REQUIREMENTS System : Pentium IV 2.4 GHz. Hard Disk : 40 GB. Monitor : 15 VGA Colour. Mouse : Logitech. Ram : 512 Mb.

SOFTWARE REQUIREMENTS Operating System : Windows XP Front End : Visual Studio 2008 Back End : Ms-Sql Server

LIST OF MODULES Login and authentication module Detection module Training module Recognition module

Login & Authentication Module The Robust Face-Name Graph Matching for Movie Character Identification designing and how we going to do face detection and recognition in the project. The images will explain about the facial fetching details. After that admin going to login with the details which needed for the login page.

Detection Module In this module, the face of the movie character is detected. We are using the emgucv library for detection and it is installed for adding references. When you will complete the references you will get the emgu controls in the toolbox.

Training Module In this module, I’m going to train the faces which are detected in the earlier module. The user can train the system by adding the names of the user. The name of the training data set is stored in image format with the graph name.

Recognition Module This module going to recognize the face of the movie characters which is we previously stored on the face database. We just found that the give the real name of it. This is going to be done here. Here we are using the With the help of these eigenObjectRecognizer we are going to recognize the face.

DATA FLOW DIAGRAM

SCREEN SHOTS DESIGN PAGE

DESIGN PAGE

LOGIN PAGE

IMAGE INSERTION

TRAINING DATASET

TRAINING AND RECOGNITION

DETECTION MODULE

CONCLUSION The proposed two schemes are useful to improve results for clustering and identification of the face tracks extracted from uncontrolled movie videos. From the sensitivity analysis, also shown that to some degree, such schemes have better robustness to the noises in constructing affinity graphs than the traditional methods. A third conclusion is a principle for developing robust character identification method intensity alike noises must be emphasized more than the coverage alike noises.

FUTURE ENHANCEMENT In the future, we will extend our work to investigate the optimal functions for different movie genres. Another goal of future work is to exploit more character relationships, e.g., the sequential statistics for the speakers, to build affinity graphs and improve the robustness.

REFERENCE PAPER J. Sang, C. Liang, C. Xu, and J. Cheng, “Robust movie character identification and the sensitivity analysis,” in ICME, 2011, pp. 1–6. H. Bunke, “On a relation between graph edit distance and maximum common sub graph,” Pattern Recognition Letters, vol. 18, pp. 689–694

REFERENCE PAPER - Contd M. Everingham and A. Zisserman, “Identifying individuals in video by combining ”generative” and discriminative head models,” in ICCV,2005, pp. 1103–1110.

QUERIES