Fig. 2 – Test results Personal Memory Assistant Facial Recognition System The facial identification system is divided into the following two components:

Slides:



Advertisements
Similar presentations
Patient information extraction in digitized X-ray imagery Hsien-Huang P. Wu Department of Electrical Engineering, National Yunlin University of Science.
Advertisements

Face Recognition. Introduction Why we are interested in face recognition? Why we are interested in face recognition? Passport control at terminals in.
Face Recognition Face Recognition Using Eigenfaces K.RAMNATH BITS - PILANI.
Face Recognition By Sunny Tang.
Face Recognition Method of OpenCV
Fingerprint Minutiae Matching Algorithm using Distance Histogram of Neighborhood Presented By: Neeraj Sharma M.S. student, Dongseo University, Pusan South.
Automatic Feature Extraction for Multi-view 3D Face Recognition
Face Recognition and Biometric Systems
PHP-based Image Recognition and Retrieval of Late 18th Century Artwork Ben Goodwin Handouts are available for students writing summaries for class assignments.
Face Recognition & Biometric Systems, 2005/2006 Face recognition process.
Computer Vision Spring ,-685 Instructor: S. Narasimhan Wean 5403 T-R 3:00pm – 4:20pm Lecture #20.
Real-time Embedded Face Recognition for Smart Home Fei Zuo, Student Member, IEEE, Peter H. N. de With, Senior Member, IEEE.
Personal Memory Assistant Abstract Facial recognition and speaker verification systems have been widely used in the security field. In this area the systems.
UPM, Faculty of Computer Science & IT, A robust automated attendance system using face recognition techniques PhD proposal; May 2009 Gawed Nagi.
CONTENT BASED FACE RECOGNITION Ankur Jain 01D05007 Pranshu Sharma Prashant Baronia 01D05005 Swapnil Zarekar 01D05001 Under the guidance of Prof.
Face Recognition with Harr Transforms and SVMs EE645 Final Project May 11, 2005 J Stautzenberger.
Traffic Sign Recognition Jacob Carlson Sean St. Onge Advisor: Dr. Thomas L. Stewart.
FACE RECOGNITION BY: TEAM 1 BILL BAKER NADINE BROWN RICK HENNINGS SHOBHANA MISRA SAURABH PETHE.
EECE 279: Real-Time Systems Design Vanderbilt University Ames Brown & Jason Cherry MATCH! Real-Time Facial Recognition.
PCA Channel Student: Fangming JI u Supervisor: Professor Tom Geoden.
Smart Traveller with Visual Translator for OCR and Face Recognition LYU0203 FYP.
Biometrics & Security Tutorial 6. 1 (a) Understand why use face (P7: 3-4) and face recognition system (P7: 5-10)
Three-Dimensional Face Recognition Using Surface Space Combinations Thomas Heseltine, Nick Pears, Jim Austin Advanced Computer Architecture Group Department.
Traffic Sign Recognition Jacob Carlson Sean St. Onge Advisor: Dr. Thomas L. Stewart.
Oral Defense by Sunny Tang 15 Aug 2003
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
Facial Recognition. 1. takes a picture of a person 2. runs that image through the database 3. finds a match and identifies the person Humans have always.
Preprocessing Images for Facial Recognition Adam Schreiner ECE533.
Facial Recognition CSE 391 Kris Lord.
ECE 533 Final Project SIMPLE FACE RECOGNITION IMPLEMENTATION FOR COMPUTER AUTHENTICATION Josh Easton- Tin-Yau Lo.
Vision-Based Biometric Authentication System by Padraic o hIarnain Final Year Project Presentation.
Face Recognition Using Neural Networks Presented By: Hadis Mohseni Leila Taghavi Atefeh Mirsafian.
Face Recognition Using EigenFaces Presentation by: Zia Ahmed Shaikh (P/IT/2K15/07) Authors: Matthew A. Turk and Alex P. Pentland Vision and Modeling Group,
Training Database Step 1 : In general approach of PCA, each image is divided into nxn blocks or pixels. Then all pixel values are taken into a single one.
KYLE PATTERSON Automatic Age Estimation and Interactive Museum Exhibits Advisors: Prof. Cass and Prof. Lawson.
Edit the text with your own short phrases. The animation is already done for you; just copy and paste the slide into your existing presentation. Face Detection,
1 Recognition by Appearance Appearance-based recognition is a competing paradigm to features and alignment. No features are extracted! Images are represented.
Image Classification 영상분류
Classifying Images with Visual/Textual Cues By Steven Kappes and Yan Cao.
Math 5 Professor Barnett Timothy G. McManus Anthony P. Pastoors.
Terrorists Team members: Ágnes Bartha György Kovács Imre Hajagos Wojciech Zyla.
A Seminar Report On Face Recognition Technology A Seminar Report On Face Recognition Technology 123seminarsonly.com.
Singer similarity / identification Francois Thibault MUMT 614B McGill University.
1 Iris Recognition Ying Sun AICIP Group Meeting November 3, 2006.
Design of PCA and SVM based face recognition system for intelligent robots Department of Electrical Engineering, Southern Taiwan University, Tainan County,
A NOVEL METHOD FOR COLOR FACE RECOGNITION USING KNN CLASSIFIER
Supervisor: Nakhmani Arie Semester: Winter 2007 Target Recognition Harmatz Isca.
GENDER AND AGE RECOGNITION FOR VIDEO ANALYTICS SOLUTION PRESENTED BY: SUBHASH REDDY JOLAPURAM.
Video Camera Security and Surveillance System ICAMES 2008 Team Members : Semih Altınsoy Denis Kürov Team Advisor: Assist. Prof. M. Elif Karslıgil May,
Irfan Ullah Department of Information and Communication Engineering Myongji university, Yongin, South Korea Copyright © solarlits.com.
2D-LDA: A statistical linear discriminant analysis for image matrix
Robodog Frontal Facial Recognition AUTHORS GROUP 5: Jing Hu EE ’05 Jessica Pannequin EE ‘05 Chanatip Kitwiwattanachai EE’ 05 DEMO TIMES: Thursday, April.
Facial Recognition By Lisa Tomko.
Submitted by: Siddharth Jain (08EJCIT075) Shirin Saluja (08EJCIT071) Shweta Sharma (08EJCIT074) VIII Semester, I.T Department Submitted to: Mr. Abhay Kumar.
Presented By Bhargav (08BQ1A0435).  Images play an important role in todays information because A single image represents a thousand words.  Google's.
EE368 Final Project Spring 2003
Deeply learned face representations are sparse, selective, and robust
PRINCIPAL COMPONENT ANALYSIS (PCA)
A Seminar Report On Face Recognition Technology
Multimodal Biometric Security
PRESENTED BY Yang Jiao Timo Ahonen, Matti Pietikainen
FACE RECOGNITION TECHNOLOGY
Submitted by: Ala Berawi Sujod Makhlof Samah Hanani Supervisor:
Can Computer Algorithms Guess Your Age and Gender?
ABSTRACT FACE RECOGNITION RESULTS
Recognition: Face Recognition
Outline Peter N. Belhumeur, Joao P. Hespanha, and David J. Kriegman, “Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection,”
Face Recognition and Detection Using Eigenfaces
Interactive Visual System
AUDIO SURVEILLANCE SYSTEMS: SUSPICIOUS SOUND RECOGNITION
Presentation transcript:

Fig. 2 – Test results Personal Memory Assistant Facial Recognition System The facial identification system is divided into the following two components: Detection This isolates the face using a trained cascade of boosted classifiers based on spatial contrasts. Once isolated, the face is aligned, normalized for lighting and masked to obscure the background. Fig. 1. is an image of this process. Recognition Covariance matrices are calculated from the difference between the captured face and the mean of a set of one subject’s stored faces. The eigenface algorithm uses Principal Component Analysis (PCA) and Linear Discriminant Analysis (LDA) to compare the collected faces with those already stored for each subject. Speaker Identification System The speech wave goes through the following three major processing steps: Preprocessing This is normalization of the sample to an amplitude range of {-1,1} Feature Extraction Spectral values are saved from a Fast Fourier Transform of the signal. The cluster of these values for all samples of an ID is called the voiceprint. Pattern Matching A Nearest Neighbor Algorithm with Euclidean distances is used to compare each new sample to all existing voiceprints. The PMA system then decides if this sample should be saved as the voiceprint of a new subject, or added to an existing subject’s voiceprint. Camera Speaker Identification Facial Recognition Audio Database Image Database Profile Database Compare Entry Form Display Update True False Mic Delete Search Overall Flow Chart Fig. 1 – Face Detection Abstract Facial recognition and speaker verification systems have been widely used in the security field. In this area the systems have to be very accurate to prevent unauthorized users from accessing classified information. The extensive list of possible uses of these systems in the commercial world has not been taken advantage of yet. It is often difficult to remember the name of a person who is encountered out of context or infrequently. This situation can prove to be very embarrassing for the forgetful person. It can also be insulting to the person who is not remembered. The Personal Memory Assistant uses facial recognition and speaker verification to help avoid this situation. A user discretely collects images and voice samples of the person to be identified. The facial recognition component analyzes the image to identify the three closest facial matches in the system. The speaker identification component does the same to identify the top two voice matches. The guesses are compared using an algorithm that was developed through testing. If the guesses match, a picture of the person and personal profile is displayed to the user. If no match is made, the user has the option to add the subject to the database. In addition to the identification process, the system also gives the option of searching for and updating entries in the database. Group 7 Authors Scott Kyle CTE ’08 Erika Sanchez EE ’08 Meredith Skolnick CTE ’08 Advisor Dr. Kenneth Laker University of Pennsylvania Dept. of Electrical and Systems Engineering System Performance 83.0% Correct Identification 4.3% Incorrect Identification 12.7% “No Match” when in system System Testing Overall Testing -A subject pool was gathered with demographics like the US population -Each subject was added to the database, and then tested 3 times -All identification results were stored to be analyzed later. WAV number testing -The same testing sample was used to test the Speaker Identification accuracy with an incrementing number of samples in the database. -The results are shown in Fig. 2. Weights range from Vertical lines indicate thresholds for manipulating speaker or voice weights. Comparison formula