Vision-Based Biometric Authentication System by Padraic o hIarnain Final Year Project Presentation.

Slides:



Advertisements
Similar presentations
Face Recognition and Biometric Systems Eigenfaces (2)
Advertisements

Detecting Faces in Images: A Survey
Rapid Object Detection using a Boosted Cascade of Simple Features Paul Viola, Michael Jones Conference on Computer Vision and Pattern Recognition 2001.
Rapid Object Detection using a Boosted Cascade of Simple Features Paul Viola, Michael Jones Conference on Computer Vision and Pattern Recognition 2001.
Face Detection & Synthesis using 3D Models & OpenCV Learning Bit by Bit Don Miller ITP, Spring 2010.
Face Recognition Method of OpenCV
Face detection Many slides adapted from P. Viola.
The Viola/Jones Face Detector Prepared with figures taken from “Robust real-time object detection” CRL 2001/01, February 2001.
HCI Final Project Robust Real Time Face Detection Paul Viola, Michael Jones, Robust Real-Time Face Detetion, International Journal of Computer Vision,
Graz University of Technology, AUSTRIA Institute for Computer Graphics and Vision Fast Visual Object Identification and Categorization Michael Grabner,
Neural Network-based Face Recognition, using ARENA Algorithm. Gregory Tambasis Supervisor: Dr T. Windeatt.
Supervised by Prof. LYU, Rung Tsong Michael Department of Computer Science & Engineering The Chinese University of Hong Kong Prepared by: Chan Pik Wah,
Robust Real-time Object Detection by Paul Viola and Michael Jones ICCV 2001 Workshop on Statistical and Computation Theories of Vision Presentation by.
CONTENT BASED FACE RECOGNITION Ankur Jain 01D05007 Pranshu Sharma Prashant Baronia 01D05005 Swapnil Zarekar 01D05001 Under the guidance of Prof.
Face detection and recognition Many slides adapted from K. Grauman and D. Lowe.
LYU0203 Smart Traveller with Visual Translator for OCR and Face Recognition Supervised by Prof. LYU, Rung Tsong Michael Prepared by: Wong Chi Hang Tsang.
Fig. 2 – Test results Personal Memory Assistant Facial Recognition System The facial identification system is divided into the following two components:
CS 223B Assignment 1 Help Session Dan Maynes-Aminzade.
FACE RECOGNITION BY: TEAM 1 BILL BAKER NADINE BROWN RICK HENNINGS SHOBHANA MISRA SAURABH PETHE.
Robust Real-Time Object Detection Paul Viola & Michael Jones.
Viola and Jones Object Detector Ruxandra Paun EE/CS/CNS Presentation
PCA Channel Student: Fangming JI u Supervisor: Professor Tom Geoden.
Smart Traveller with Visual Translator for OCR and Face Recognition LYU0203 FYP.
Biometrics & Security Tutorial 6. 1 (a) Understand why use face (P7: 3-4) and face recognition system (P7: 5-10)
Foundations of Computer Vision Rapid object / face detection using a Boosted Cascade of Simple features Presented by Christos Stoilas Rapid object / face.
Face Detection CSE 576. Face detection State-of-the-art face detection demo (Courtesy Boris Babenko)Boris Babenko.
FACE DETECTION AND RECOGNITION By: Paranjith Singh Lohiya Ravi Babu Lavu.
Facial Recognition CSE 391 Kris Lord.
ECE 533 Final Project SIMPLE FACE RECOGNITION IMPLEMENTATION FOR COMPUTER AUTHENTICATION Josh Easton- Tin-Yau Lo.
Eigenfaces for Recognition Student: Yikun Jiang Professor: Brendan Morris.
Facial Feature Detection
Face Detection using the Viola-Jones Method
A Tutorial on Object Detection Using OpenCV
Introduction to Computer Vision Olac Fuentes Computer Science Department University of Texas at El Paso El Paso, TX, U.S.A.
Face Recognition System By Arthur. Introduction  A facial recognition system is a computer application for automatically identifying or verifying a person.
Curtis Kelsey University of Missouri A FINGERPRINTING SYSTEM MOBILE MODEL FOR VIDEO COPY PROTECTION.
Window-based models for generic object detection Mei-Chen Yeh 04/24/2012.
Sign Classification Boosted Cascade of Classifiers using University of Southern California Thang Dinh Eunyoung Kim
Lecture 29: Face Detection Revisited CS4670 / 5670: Computer Vision Noah Snavely.
Face detection Slides adapted Grauman & Liebe’s tutorial
DIEGO AGUIRRE COMPUTER VISION INTRODUCTION 1. QUESTION What is Computer Vision? 2.
Face Recognition: An Introduction
REAL TIME FACE DETECTION
Automated Solar Cavity Detection
The Viola/Jones Face Detector A “paradigmatic” method for real-time object detection Training is slow, but detection is very fast Key ideas Integral images.
Learning to Detect Faces A Large-Scale Application of Machine Learning (This material is not in the text: for further information see the paper by P.
Delivering Business Value through IT Face feature detection using Java and OpenCV 1.
Lecture 15: Eigenfaces CS6670: Computer Vision Noah Snavely.
FACE DETECTION : AMIT BHAMARE. WHAT IS FACE DETECTION ? Face detection is computer based technology which detect the face in digital image. Trivial task.
Final Year Project Vision based biometric authentication system By Padraic ó hIarnain.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Notes on HW 1 grading I gave full credit as long as you gave a description, confusion matrix, and working code Many people’s descriptions were quite short.
Irfan Ullah Department of Information and Communication Engineering Myongji university, Yongin, South Korea Copyright © solarlits.com.
IBM - CVUT Student Research Projects IBM Presence detection Milan Stezka
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Hand Detection with a Cascade of Boosted Classifiers Using Haar-like Features Qing Chen Discover Lab, SITE, University of Ottawa May 2, 2006.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Evaluation of Gender Classification Methods with Automatically Detected and Aligned Faces Speaker: Po-Kai Shen Advisor: Tsai-Rong Chang Date: 2010/6/14.
Face Detection 蔡宇軒.
1 Munther Abualkibash University of Bridgeport, CT.
Submitted by: Siddharth Jain (08EJCIT075) Shirin Saluja (08EJCIT071) Shweta Sharma (08EJCIT074) VIII Semester, I.T Department Submitted to: Mr. Abhay Kumar.
PRINCIPAL COMPONENT ANALYSIS (PCA)
Real Time Face Monitoring Ajesh Sen Thapa(04) Biraj Subedi(13) Diwas Poudel(16) Pravin Sangraula(32) Yogesh Gautam(48)
Submitted by: Ala Berawi Sujod Makhlof Samah Hanani Supervisor:
In summary C1={skin} C2={~skin} Given x=[R,G,B], is it skin or ~skin?
Facial Recognition in Biometrics
Electronic Door Unlock with Face Recognition
CS Lab Usage Logan Balow.
A Tutorial on Object Detection Using OpenCV
Lecture 29: Face Detection Revisited
Presentation transcript:

Vision-Based Biometric Authentication System by Padraic o hIarnain Final Year Project Presentation

Vision-Based Biometric Authentication System Face Detection Face Recognition Authentication Input from Camera

Why make a Vision-Based Biometric Authentication System? Advantages over PIN/password method: Advantages over PIN/password method: More secure More secure No passwords to remember No passwords to remember Less tedious Less tedious Practical Practical Advances in image processing techniques Advances in image processing techniques Low cost of digital imaging hardware Low cost of digital imaging hardware

Vision-Based Biometric Authentication Development Face Detection with Camera Authentication System Face Detection Authentication System Face Recognition Face Recognition Authentication System Add New User Utility Integration of Entire System

Face Detection Determines the location of a face in an image Determines the location of a face in an image Involves capturing images in real-time from a camera and then determining whether or not the image contains facial features Involves capturing images in real-time from a camera and then determining whether or not the image contains facial features Statistical approach originally developed by Paul Viola and Michael Jones Statistical approach originally developed by Paul Viola and Michael Jones

Face Detection and the Viola-Jones Algorithm Uses simple Haar-like features and a cascade of boosted tree classifiers. Uses simple Haar-like features and a cascade of boosted tree classifiers. Haar-like features are calculated for the images and then passed through a cascade of boosted classifiers in order to determine if they are facial features. Haar-like features are calculated for the images and then passed through a cascade of boosted classifiers in order to determine if they are facial features.

Face Detection and the Viola-Jones Algorithm Calculate the Haar-like features. Using a SAT (Summed Area Table) to speed up the process. Calculate the Haar-like features. Using a SAT (Summed Area Table) to speed up the process. Computed feature value is passed through a simple classifier. This classifier responds with a +1 for a pass or a -1 for a fail. Computed feature value is passed through a simple classifier. This classifier responds with a +1 for a pass or a -1 for a fail. Chain a bunch of weak classifiers together into a more complex classifier known as a boosted classifier. Chain a bunch of weak classifiers together into a more complex classifier known as a boosted classifier. Create a cascade of boosted classifiers. Create a cascade of boosted classifiers. The image contains a face if it passes all classifiers. The image contains a face if it passes all classifiers.

Face Detection Program The Face Detection program is implemented using the OpenCV library. The Face Detection program is implemented using the OpenCV library. Program that processes images from a camera in real- time and then detects if any face objects are present in that image. Program that processes images from a camera in real- time and then detects if any face objects are present in that image. Pass the classifier location Pass the classifier location Pass the input type Pass the input type Convert input image from colour to a greyscale image and then resize it to a smaller image. Convert input image from colour to a greyscale image and then resize it to a smaller image. Check the image for face objects. Use “cvHaarDetectObjects”. Check the image for face objects. Use “cvHaarDetectObjects”.

Face Detection Program Camera Implementation Camera Implementation Testing Testing Tested with different face images. Tested with different face images. Tested with non-face images. Tested with non-face images. Tested with different objects in front of camera; faces and non-faces. Tested with different objects in front of camera; faces and non-faces. Improvements Improvements Changed camera settings. Changed camera settings.

Face Detection Results The end result of face detection. The program worked every time. The end result of face detection. The program worked every time.

Authentication Authentication System Authentication System The process of authenticating a user. The process of authenticating a user. Integrating this process with a Biometric system. Integrating this process with a Biometric system. Authentication System Development Authentication System Development Create a basic authentication system based on file IO. Create a basic authentication system based on file IO. Implement this system with face detection and face recognition. Implement this system with face detection and face recognition.

Authentication and PAM PAM (Pluggable Authentication Module) PAM (Pluggable Authentication Module) Assimilates multiple low-level authentication systems into high-level applications. Assimilates multiple low-level authentication systems into high-level applications. PAM development PAM development Edit PAM configuration for the login and screensaver applications. Edit PAM configuration for the login and screensaver applications. Create authentication modules for the login and screensaver applications. Create authentication modules for the login and screensaver applications.

Authentication and PAM Login Authentication Module Login Authentication Module The module reads a name from a file and attempts to log that user on. The module reads a name from a file and attempts to log that user on. Authentication fails if there is no name or the name is not a user name. Authentication fails if there is no name or the name is not a user name. Screensaver Authentication Module Screensaver Authentication Module The module reads a name from a file and if that name is the same as the current user then it authenticates the application. The module reads a name from a file and if that name is the same as the current user then it authenticates the application.

Face Detection Authentication System Integrating Face Detection Program with the Authentication System Integrating Face Detection Program with the Authentication System Face Detection program changed so it writes a default user name to a file every time a face is detected. Face Detection program changed so it writes a default user name to a file every time a face is detected. Integrating Face Detection Program with the Start-up protocol Integrating Face Detection Program with the Start-up protocol Included Face Detection program in a run-level 5 script. Included Face Detection program in a run-level 5 script.

Face Detection Authentication System Results Testing Testing Ran the system for a few hours. Ran the system for a few hours. Result Result When a face is detected the PAM modules read in the default user name and use it in authentication. Authentication works with the Face Detection Program. When a face is detected the PAM modules read in the default user name and use it in authentication. Authentication works with the Face Detection Program.

Face Recognition Examination of facial features in an image, recognising those features and matching them to one of the many faces in the database Examination of facial features in an image, recognising those features and matching them to one of the many faces in the database PCA (Principal Component Analysis) method of face recognition is used on the input image from the camera. PCA (Principal Component Analysis) method of face recognition is used on the input image from the camera.

Face Recognition and PCA What is PCA? What is PCA? The process of extracting the most relevant information contained in a face and then building a computational model that best describes it. The process of extracting the most relevant information contained in a face and then building a computational model that best describes it. Why use PCA? Why use PCA? Process speed Process speed Time limitations Time limitations Accuracy Accuracy

Theory of PCA Eigenvectors or Eigenfaces are obtained by training a set of face images. Eigenvectors or Eigenfaces are obtained by training a set of face images. These Eigenvectors represent a basis of an Eigenspace in which every face is projected on. These Eigenvectors represent a basis of an Eigenspace in which every face is projected on. Recognition is performed by comparing the location of a face in the Eigenspace with the location of known users. Recognition is performed by comparing the location of a face in the Eigenspace with the location of known users.

PCA Implementation Implementation using OpenCV Implementation using OpenCV Create an Eigenspace using a set of training faces. Create an Eigenspace using a set of training faces. Calculate the location of each face in the Eigenspace. Calculate the location of each face in the Eigenspace. Calculate the location of the input image in the Eigenspace. Calculate the location of the input image in the Eigenspace. Calculate the distance between the input image and every other face in the training set. Calculate the distance between the input image and every other face in the training set. If the distance is under a certain threshold than print that user’s name to an output file. If the distance is under a certain threshold than print that user’s name to an output file.

New User Utility Prompts for a user name Prompts for a user name Creates a user profile under that name Creates a user profile under that name Capture image from camera of the new user Capture image from camera of the new user Save the new user image into the database of user faces Save the new user image into the database of user faces Store new user name in a text file for integration with face recognition Store new user name in a text file for integration with face recognition

Vision-Based Biometric Authentication System Reads user names from a file. Reads user names from a file. Loads corresponding face images. Loads corresponding face images. Prepare all images for face analysis. Prepare all images for face analysis. Calculates Eigenvectors using these face images. Calculates Eigenvectors using these face images. Compares input image with the faces in the user database. Compares input image with the faces in the user database. If an input face is very similar to a user face then that user is authenticated. If an input face is very similar to a user face then that user is authenticated.

Conclusion What I’ve learned What I’ve learned Improved knowledge of Linux, C programming and writing scripts. Improved knowledge of Linux, C programming and writing scripts. Improved knowledge of image processing techniques; especially in the field of biometrics. Improved knowledge of image processing techniques; especially in the field of biometrics. What I’ve completed What I’ve completed A fully functional vision-based biometric authentication system. A fully functional vision-based biometric authentication system.

Questions

Thank you, Goodbye!