Application of Facial Recognition in Biometric Security Kyle Ferris.

Slides:



Advertisements
Similar presentations
Patient information extraction in digitized X-ray imagery Hsien-Huang P. Wu Department of Electrical Engineering, National Yunlin University of Science.
Advertisements

RFID Access Control System March, 2003 Softrónica.
Road-Sign Detection and Recognition Based on Support Vector Machines Saturnino, Sergio et al. Yunjia Man ECG 782 Dr. Brendan.
Automated Shot Boundary Detection in VIRS DJ Park Computer Science Department The University of Iowa.
By : Adham Suwan Mohammed Zaza Ahmed Mafarjeh. Achieving Security through Kinect using Skeleton Analysis (ASKSA)
Face Recognition Method of OpenCV
Simple Face Detection system Ali Arab Sharif university of tech. Fall 2012.
Real-Time Human Pose Recognition in Parts from Single Depth Images Presented by: Mohammad A. Gowayyed.
Facial feature localization Presented by: Harvest Jang Spring 2002.
Large-Scale, Real-World Face Recognition in Movie Trailers Week 2-3 Alan Wright (Facial Recog. pictures taken from Enrique Gortez)
Bohr Robot Group OpenCV ECE479 John Chhokar J.C. Arada Richard Dixon.
Virtual Dart: An Augmented Reality Game on Mobile Device Supervisor: Professor Michael R. Lyu Prepared by: Lai Chung Sum Siu Ho Tung.
Video Object Tracking and Replacement for Post TV Production LYU0303 Final Year Project Spring 2004.
CONTENT BASED FACE RECOGNITION Ankur Jain 01D05007 Pranshu Sharma Prashant Baronia 01D05005 Swapnil Zarekar 01D05001 Under the guidance of Prof.
Face Recognition Based on 3D Shape Estimation
Fig. 2 – Test results Personal Memory Assistant Facial Recognition System The facial identification system is divided into the following two components:
Face Recognition eScience Project of MIT Comp 6702 (18 units)
Smart Traveller with Visual Translator for OCR and Face Recognition LYU0203 FYP.
October 14, 2010Neural Networks Lecture 12: Backpropagation Examples 1 Example I: Predicting the Weather We decide (or experimentally determine) to use.
Biometrics & Security Tutorial 6. 1 (a) Understand why use face (P7: 3-4) and face recognition system (P7: 5-10)
Behavior Analysis Midterm Report Lipov Irina Ravid Dan Kotek Tommer.
TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems.
ECE 533 Final Project SIMPLE FACE RECOGNITION IMPLEMENTATION FOR COMPUTER AUTHENTICATION Josh Easton- Tin-Yau Lo.
Vision-Based Biometric Authentication System by Padraic o hIarnain Final Year Project Presentation.
Eigenfaces for Recognition Student: Yikun Jiang Professor: Brendan Morris.
Biometrics: Ear Recognition
Augmented Reality and 3D modelling Done by Stafford Joemat Supervised by Mr James Connan and Mr Mehrdad Ghaziasgar.
Knowledge Systems Lab JN 8/24/2015 A Method for Temporal Hand Gesture Recognition Joshua R. New Knowledge Systems Laboratory Jacksonville State University.
Digital Images Chapter 8 Exploring the Digital Domain.
Training Database Step 1 : In general approach of PCA, each image is divided into nxn blocks or pixels. Then all pixel values are taken into a single one.
Image Synthesis Rabie A. Ramadan, PhD 3. 2 Our Problem.
The University of Akron Dept of Business Technology Computer Information Systems DBMS Functions 2440: 180 Database Concepts Instructor: Enoch E. Damson.
M ULTIFRAME P OINT C ORRESPONDENCE By Naseem Mahajna & Muhammad Zoabi.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
Automatic Image Anonymizer Alex Brettingen James Esposito.
A Seminar Report On Face Recognition Technology A Seminar Report On Face Recognition Technology 123seminarsonly.com.
Face Recognition: An Introduction
(Team 1)Jackie Abbazio, Sasha Perez, Denise Silva and Robert Tesoriero (Team 2) Faune Hughes, Daniel Lichter, Richard Oswald and Michael Whitfield Clients:
Figure ground segregation in video via averaging and color distribution Introduction to Computational and Biological Vision 2013 Dror Zenati.
Gesture Recognition in a Class Room Environment Michael Wallick CS766.
Rick Bassett Automated Coin Grader Dissertation Status Update Last Updated: December 9, 2015.
A NOVEL METHOD FOR COLOR FACE RECOGNITION USING KNN CLASSIFIER
Face Image-Based Gender Recognition Using Complex-Valued Neural Network Instructor :Dr. Dong-Chul Kim Indrani Gorripati.
By: David Gelbendorf, Hila Ben-Moshe Supervisor : Alon Zvirin
Augmented Reality and 3D modelling Done by Stafford Joemat Supervised by Mr James Connan.
Learning Photographic Global Tonal Adjustment with a Database of Input / Output Image Pairs.
BIOMETRICS.
SUREILLANCE IN THE DEPARTMENT THROUGH IMAGE PROCESSING F.Y.P. PRESENTATION BY AHMAD IJAZ & UFUK INCE SUPERVISOR: ASSOC. PROF. ERHAN INCE.
Essential components of the implementation are:  Formation of the network and weight initialization routine  Pixel analysis of images for symbol detection.
Content-Aware Image Resizing Jack Breese Computer Systems Quarter 1, Pd. 7.
Facial Recognition By Lisa Tomko.
Face Recognition Technology By Catherine jenni christy.M.sc.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Evaluation of Gender Classification Methods with Automatically Detected and Aligned Faces Speaker: Po-Kai Shen Advisor: Tsai-Rong Chang Date: 2010/6/14.
Augmented Reality and 3D modelling Done by Stafford Joemat Supervised by Mr James Connan and Mehrdad Ghaziasgar.
A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from.
Submitted by: Siddharth Jain (08EJCIT075) Shirin Saluja (08EJCIT071) Shweta Sharma (08EJCIT074) VIII Semester, I.T Department Submitted to: Mr. Abhay Kumar.
CONTENTS:  Introduction.  Face recognition task.  Image preprocessing.  Template Extraction and Normalization.  Template Correlation with image database.
FACE RECOGNITION. A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a.
Coin Recognition Using MATLAB - Emad Zaben - Bakir Hasanein - Mohammed Omar.
Table of contents INTRODUCTION Background Problem Statement Scope of The Research Objective Method DESIGN SYSTEM TESTING AND EVALUATION CONCLUSION.
Excuber ' Product introduction.
A Seminar Report On Face Recognition Technology
Shane Bric and Kevin Paprocki
Application of Facial Recognition in Biometric Security
Electronic Door Unlock with Face Recognition
Research Institute for Future Media Computing
A Novel Smoke Detection Method Using Support Vector Machine
Application of Facial Recognition in Biometric Security
Presentation transcript:

Application of Facial Recognition in Biometric Security Kyle Ferris

Introduction The purpose of this project is to be able to create a "key" for any person who wishes to use the program. An image of the client's face will be taken and used as the base biometric key. The program should be able to recognize the client and authorize him or her, while denying access to those not recognized.

Input Method A webcam will take a short video of the user The frames of this video will be converted to image files To acquire test images, plain photos are taken and used as input

PCA There are many different approaches to this type of problem. One of the most effective is Principal Component Analysis (PCA). PCA involves identifying the principal features of a face (aka, eyes, mouth, jaw structure) and comparing these features for different images

Algorithms Conversion  Converts a.ppm format file, which is a color image, into a specially formatted.pgm format. Pixel Subtraction:  Creates a third image which shows the obvious differences between two very similar images, with no analysis

Algorithms (continued) Mean Pixel Area Comparison (MPAC):  Averages the pixel intensity in a specified area and compares that value to the average value in the same area on a second image. Interference Evaluation:  Evaluates how much interference or errant objects are in the image and tells you how reliable the results are.

Algorithms (continued) Principal Components Labeling – Evaluates an image and determines groups of pixels which are stored as components – Uses aspects of edge detection and floodfill

Example Output The “average difference between images” is the example of the Mean Pixel Area Comparison function You can see the interference level here as well, and an evaluation from the program

Incorporating Principal Component Analysis By default, the program runs by comparing 3x3 blocks of pixels. For more ideal results, instead of evaluating the similarity of 3x3 blocks, identify the primary components of interest in the images, then compare across those. This is known as Principal Component Analysis.

Connected Components Labeling Also known as CCL, this is a method to identify which pixels in an image are connected. Algorithm returns groups of pixels in the form of arrays of their location. When the MPAC method is run on these groups, it gives better results than when run on just square blocks. That process is Principal Component Analysis.

Results/Expectations Will be able to be implemented into any security system with fairly basic equipment. Able to accurately recognize the user 90% of the time No false positives- very important to avoid giving authorization to those unauthorized