Face Recognition eScience Project of MIT Comp 6702 (18 units)

Slides:



Advertisements
Similar presentations
TCP Vegas LAWRENCE S. BRAKMO SEAN W. O’MALLEY LARRY L. PETERSON PRESENTED TCP VEGAS IN 1994 PRESENTED BY CHUNG TRAN.
Advertisements

Proposed concepts illustrated well on sets of face images extracted from video: Face texture and surface are smooth, constraining them to a manifold Recognition.
Face Recognition Method of OpenCV
LYU0002 Wireless Cyber Campus Supervisor: Prof. Michael R. Lyu Student:Jang Kim Fung Tang Ho Man.
HYBRID-BOOST LEARNING FOR MULTI-POSE FACE DETECTION AND FACIAL EXPRESSION RECOGNITION Hsiuao-Ying ChenChung-Lin Huang Chih-Ming Fu Pattern Recognition,
Improving ATM Security via Facial Recognition CPSC510 James Maxlow November 25 th, 2002.
1 Abstract This paper presents a novel modification to the classical Competitive Learning (CL) by adding a dynamic branching mechanism to neural networks.
Face Recognition Data Search Tool COMP6703 PRESENTATION Presented by Yan Gao u Supervisor: Professor Tom Gedeon.
UPM, Faculty of Computer Science & IT, A robust automated attendance system using face recognition techniques PhD proposal; May 2009 Gawed Nagi.
CONTENT BASED FACE RECOGNITION Ankur Jain 01D05007 Pranshu Sharma Prashant Baronia 01D05005 Swapnil Zarekar 01D05001 Under the guidance of Prof.
Eigenfaces As we discussed last time, we can reduce the computation by dimension reduction using PCA –Suppose we have a set of N images and there are c.
Chapter 1 Introduction. Chapter Overview Overview of Operating Systems Secure Operating Systems Basic Concepts in Information Security Design of a Secure.
Face Recognition and Biometric Filters By Fred_the_token Identity Confirmed: Osama bin Laden.
An Efficient and Scalable Pattern Matching Scheme for Network Security Applications Department of Computer Science and Information Engineering National.
4EyesFace-Realtime face detection, tracking, alignment and recognition Changbo Hu, Rogerio Feris and Matthew Turk.
FACE RECOGNITION BY: TEAM 1 BILL BAKER NADINE BROWN RICK HENNINGS SHOBHANA MISRA SAURABH PETHE.
PCA Channel Student: Fangming JI u Supervisor: Professor Tom Geoden.
Smart Traveller with Visual Translator for OCR and Face Recognition LYU0203 FYP.
Biometrics & Security Tutorial 6. 1 (a) Understand why use face (P7: 3-4) and face recognition system (P7: 5-10)
Face Processing System Presented by: Harvest Jang Group meeting Fall 2002.
A PCA-based feature extraction method for face recognition — Adaptively weighted sub-pattern PCA (Aw-SpPCA) Group members: Keren Tan Weiming Chen Rong.
Oral Defense by Sunny Tang 15 Aug 2003
Facial Recognition Software Application ECE 533 Final Project ECE 533 Final Project Steffes, RobertID: Steffes, RobertID: Schultz,
TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems.
Facial Recognition CSE 391 Kris Lord.
Machine Learning Usman Roshan Dept. of Computer Science NJIT.
OOSE 01/17 Institute of Computer Science and Information Engineering, National Cheng Kung University Member:Q 薛弘志 P 蔡文豪 F 周詩御.
Computer vision.
Multimedia Specification Design and Production 2013 / Semester 2 / week 8 Lecturer: Dr. Nikos Gazepidis
Braille Converter For Exam Introduction Purpose of the system Need to create system to reduce paper works Need to reduce time consumption Text.
A Two-level Pose Estimation Framework Using Majority Voting of Gabor Wavelets and Bunch Graph Analysis J. Wu, J. M. Pedersen, D. Putthividhya, D. Norgaard,
Windows Server 2003 with Active Directory and Group Policies Wendy Hurst Eastern Kentucky University Department of Technology CEN/CET.
Designer and Developer Workflow
A P2P-Based Architecture for Secure Software Delivery Using Volunteer Assistance Purvi Shah, Jehan-François Pâris, Jeffrey Morgan and John Schettino IEEE.
Final Class Diagram for C++ Implementation Clickermatic Software Clicker.
Intelligent Control and Automation, WCICA 2008.
BIOMETRICS THE MAN MACHINE INTERFACE
Design of PCA and SVM based face recognition system for intelligent robots Department of Electrical Engineering, Southern Taiwan University, Tainan County,
A NOVEL METHOD FOR COLOR FACE RECOGNITION USING KNN CLASSIFIER
3D Face Recognition Using Range Images
Facial Recognition Justin Kwong Megan Thompson Raymundo Vazquez-lugo.
 Introduction  Identity Data Set and Face Representation  Associate-Predict model  Switching Mechanism  Experimental Results.
Face Image-Based Gender Recognition Using Complex-Valued Neural Network Instructor :Dr. Dong-Chul Kim Indrani Gorripati.
GENDER AND AGE RECOGNITION FOR VIDEO ANALYTICS SOLUTION PRESENTED BY: SUBHASH REDDY JOLAPURAM.
Progress presentation
Introduction Performance of metric learning is heavily dependent on features extracted Sensitive to Performance of Filters used Need to be robust to changes.
Application of Facial Recognition in Biometric Security Kyle Ferris.
Speaker:Chiang Hong-Ren An Investigation and Implementation of Botnet Detection Schemes.
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology 1 Recognizing Partially Occluded, Expression Variant Faces.
Readings in ECE Prof. D. Lyon, (203) ECE The last required course!
Facial Recognition By Lisa Tomko.
Principal Components Analysis ( PCA)
Face Recognition Technology By Catherine jenni christy.M.sc.
Tom Face Recognition Software in a border control environment: Non-zero-effort-attacks' effect on False Acceptance Rate.
Image Analysis Essay Rubric Module Two. Analyzing Two Images Choose two images from the same group listed below: Two documentary/news photos Two paintings.
Under Guidance of Mr. A. S. Jalal Associate Professor Dept. of Computer Engineering and Applications GLA University, Mathura Presented by Dev Drume Agrawal.
Hybrid Features based Gender Classification
Adobe Visual Design 1.00 Setting project requirements using Photoshop (3%) 6.00 Setting project requirements using Illustrator (1%)
Outline Multilinear Analysis
Efficient CRT-Based RSA Cryptosystems
Application of Facial Recognition in Biometric Security
Biometric technology.
Informational Text Structures
Electronic Door Unlock with Face Recognition
Anarghya Mitra and Zelun Luo
÷ 5 = 29 How many 5s are there in 1? Great!
÷ 2 = 24 How many 2s are there in 4?
Compare LDA and PCA.
Application of Facial Recognition in Biometric Security
EDUC 591 Final Presentation.
Presentation transcript:

Face Recognition eScience Project of MIT Comp 6702 (18 units)

Introduction Client: Professor Tom Gedeon Project Purpose: 1) Propose some new idea or do some enforcement on current Face Recognition Technology (FRT). 2) Do comparisons among our ideas and other existing method and analysis the comparison result

Introduction of FRT Introduction of FRT What is it about? The idea of FRT is to use technology to achieve the goal of the natural mechanisms of the human visual system. Why do we need it? Non-intrusive nature Extremely useful for the situation such as security, tracing the criminals and so on

Problems There are still a lot of restrictions on how the facial images are obtained. The result may be affected greatly from the variances in angles, expressions, illuminations and so on.

Our ideas Trigram in FRT Find the patterns from the face image. Use small parts of the images as if they were words in a text file The process of identify a face is to find the images with similar pattern PCA Channel PCA method Limitation of PCA methods PCA Channels

General Plan Implement various FRTs, such as PCA, LDA and including the two we proposed. Implement Neuro Network Do comparisons among the Algorithms Analysis the results and deliver the analysis report or paper Finalize the software left from last semester Integrate all the FRTs into one system

Timetable