0% found this document useful (0 votes)
81 views8 pages

Final - Research - Paper (Face Recognition)

This document summarizes a study on face recognition techniques. It discusses several state-of-the-art techniques like Eigenfaces, artificial neural networks, support vector machines, principal component analysis, and Gabor wavelets. It also describes several face recognition databases that are commonly used for evaluating techniques, including AT&T, AR, FERET, LFW, and YTF. The document aims to provide a comprehensive literature review on face recognition and its applications.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
81 views8 pages

Final - Research - Paper (Face Recognition)

This document summarizes a study on face recognition techniques. It discusses several state-of-the-art techniques like Eigenfaces, artificial neural networks, support vector machines, principal component analysis, and Gabor wavelets. It also describes several face recognition databases that are commonly used for evaluating techniques, including AT&T, AR, FERET, LFW, and YTF. The document aims to provide a comprehensive literature review on face recognition and its applications.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

STUDY OF FACE RECOGNITION TECHNIQUE

Group no:
Group Members:Jaya Singh, Dhruv Malhotra,Ansh Goyal,Suraj Chauhan
Submitted to Guide:Indu Ma’am

Computer Science Engineering,

HMR institute of technology and management

Delhi, India

Abstract -With the rapid growth in multimedia contents, among such content face recognition has got much
attention especially in past few years. Face as an object consists of distinct features for detection; therefore, it
remains most challenging research area for scholars in the field of computer vision and image processing. In this
survey paper, we have tried to address most endeavoring face features such as pose invariance, aging,
illuminations and partial occlusion. They are considered to be indispensable factors in face recognition system
when realized over facial images. This paper also studies state of the art face detection techniques, approaches,
viz. Eigen face, Artificial Neural Networks (ANN), Support Vector Machines (SVM), Principal Component Analysis
(PCA), Independent Component Analysis (ICA), Gabor Wavelets, Elastic Bunch Graph Matching, 3D morphable
Model and Hidden Markov Models. In addition to the aforementioned works, we have mentioned different
testing face databases which include AT & T (ORL), AR, FERET, LFW, YTF, and Yale, respectively for results
analysis. However, aim of this research is to provide comprehensive literature review w over face recognition
along with its applications. And after in depth discussion, some of the major findings are given in conclusion

Keywords— Face recognition; illuminations; partial occlusion; pose invariance

I. INTRODUCTION

The 21st century is a modern and scientific era in which a lot of progress has been achieved
as to expedite humans for accomplishing their tasks. In support of above statement,
nowadays use of computer technology has been an integral part of life. Computers are being
used in pyramids of applications, which range from simple to complex problem solving
methods. Among such contributions face recognition technology has emerged as useful tool
to recognize features of faces through their inherent traits. And it has been one of the most
researched areas in the field of pattern recognition and computer vision. However, due to its
wide use in multitude of applications such as in biometrics, information security, law
enforcement access control, surveillance system and smart cards. But it possesses many
challenges for researcher that needs to be addressed. Face an object depends on facial
expressions, which constitute meaningful features. For instance, pose invariance,
illuminations and aging which are potential areas that require further investigation over
previous work. The result of previous researches reveals that facial expressions are changing
with respect to aging; therefore, they could not be permanently modeled in face
recognition. The face recognition problem can be categorized into two main phases: 1) face
verification and 2) face identification. For example, in real time system, face verification
identifies the same person in the scene, and face identification who is this person in that
scene. In the first phase it locates a face in an image. Similarly, in the second stage, it
extracts features from an image for discrimination. After that they are matched with face
database images in order to recognize correct face image.
Biometric recognition system can be built through various techniques. However, most
commonly used are fingertips and iris methods. These require individual’s participation or
involvement to access the system. Moreover, latest systems provide participant access
without its intervention. Among such methods face recognition is one of the most viable
technique in which an individual can easily be captured and monitored through the system.
Face recognition databases vary with controllable photos to uncontrollable videos, where
LFT is used for controllable photos and YTM is used for videos. Face recognition system
comprises of three main modules: 1) pre-processing, 2) feature selection, and 3)
Classification.

II.FACE RECOGNITION DATABASE


This database of faces was previously called The ORL Database of Faces and it has a
set of face images taken at the AT & T lab. This database was used for face
recognition project which was carried out with the support of Speech, Vision and
Robotics Group of the Cambridge University, Department of Engineering. It includes
10 different images each having 40 diverse subjects. However, for some subjects,
the images were acquired under various conditions, i.e. variable light, facial
expressions: smiling/sad, open/closed eyes and facial details (glasses/without
glasses). These images were obtained with a dark consistent background having
position in upright, frontal. Details of the databases used in face recognition are
described as under.

A. AR Database
AR database was created by Computer Vision Center (CVC), University of Alabama
at Birmingham. It comprises of over 4000 color images of 126 people’s faces. And
they are divided into 70, 56 man women, respectively. Images feature frontal view
faces with different facial expressions ,illumination conditions and occlusions (sun
glasses, hair styles and scarves). The images of a single person were collected on two
different days with a difference of 14 days. This database is available online and can
be accessed without any cost for research and academic purposes.

B. FERET Database
The FERET database is being used in facial recognition for system evaluation. The
Face Recognition Technology (FERET) program is executed by joint collaboration
between the Defense Advanced Research Projects Agency (DARPA) and the National
Institute of Standards and Technology (NIST). DARPA released a high-resolution, 24-
bit color version of these images in 2003. And it was tested over 2,413 still face
images, representing 856 individuals. However, the main motive behind
development of FERET database was to facilitate algorithm development and
evaluation. Thus initially, it requires a common database of facial images in order to
develop and test for the purpose evaluation. After that, complications in image
mentioned by the images should enhance.

C. LFW Database
Labeled Faces in the Wild (LFW) is a database of face photographs which was mainly
developed for the comprehension of unconstrained face recognition problem. The
data set has over 13,000 images of faces obtained via web. And each face is labeled
with the name of the person whose picture was captured. However, roughly 1680 of
the pictured people contained two or more distinct photos in the data set. However,
the main constraint on these face images is that they were detected by the Viola
Jones face detector. They are organized into four sets of LFW images, in which one is
an original and other three are different types of aligned images

D. YouTube Face Database (YTF)


YTF database consists of face videos which were developed for unconstrained face
recognition. In this database shortest and longest clips are 48 frames and 6,070
frames respectively. And the average length of a video clip is 181.3 frames. And all
the videos were taken from YouTube. An average of 2.15 videos is available for
different subjects.

III.METHODS AND TECHNIQUES OF FACE RECOGNITION

A. Eigen Faces
The word eigenfaces coined by German ―Eigen wert‖ The ―Eigen‖ literally mean
characteristic and ―wert‖ mean value. Eigenface is well establish algorithms that was used
to recognize a feature in a face image. It is based on Principle Component Analysis (PCA)
[14]. In this method the fundamental concept is to recognize the face by taking its unique
information about the face in question. Then encode it to compare with the decode result of
previously taken image as shown in Fig. 2. In eigenface method, decoding is performed with
the calculation of eigenvector and then it is represented as a matrix. However, Eigenface
based face recognition systems is only suitable for images having the frontal faces but some
researches identify a face with different poses have also been made.

B. Artificial Neural Networks (ANN)


ANN provides an effective feature recognition technique, and it has been widely
used after emergence of Artificial Intelligence. This consists of network, where
neurons are arranged in the form of layers. Accuracy of face recognition has been
boosted with the aid of better deep network architectures and supervisory methods.
And recently few remarkable face representation learning techniques are evolved
[9]. Using these techniques, deep learning has got much closer to human
performance. For evaluation LFW face verification dataset has been used on tightly
cropped face images [9]. However, the learned face representation could also add
significant intrapersonal variations. One of the most viable feature of Neural
Networks is it lessens the complexity. It learns from the training samples and then
works fine on the images with changes in lighting conditions and increases accuracy
[1]. The main drawback of the neural network is a more time is needed for its
training. Initially Training is precursor step to get the desired results from the system
as user point of view. After feature extraction, classifiers for face recognition such as
the Radial Basis Function and Feed Forward Neural Network (FFNN) are the
implemented. Moreover, study reveals that ANNs achieves improvement over face
recognition .

D. Gabor Wavelet
Dennis Gabor in 1946 introduced a tool for signal processing in noise removal and
named as Gabor filter. Gabor wavelets technique is being widely used for face
tracking and position estimation in face recognition. While an image representation
using the Gabor wavelet transform provides both the spatial relations and spatial
frequency structure. It has a characteristic that allow it to delineate the properties
of spatial localization, spatial frequency selectivity, and orientation [8], [7]. Gabor
Wavelets works well over extraction of edge and shape information and it
represents the faces in a compact way which is more similar to the feature based
methods .
IV.APPLICATIONS

A. Access Control
Access control allows the authorized group of users to access the personal account by log on through their
email account using computer accessing bank account through ATM machine. But using face recognition
system face pictures are taken under natural conditions such as frontal face images. Such kind of systems
yields optimal accuracy without any intervention from the user. These automatic face recognition systems
are also used to view and control a user activity on PC or ATM machine; for example, when users leave the
PC without proper closing their files and folders for a predetermined time. Then system halts until user again
log on and is recognized. In this case, only legitimate persons are allowed to access account.

B. Security
Security is a most important precursor at all places. Computer security is being carried out with use of face
recognition application. In this regard, image database is being used for investigation purposes [1]; for
instance, searching image for authentication of licensed drivers to search missing peoples, immigrants in law
enforcement agencies, General identity verification [1], Electoral registration, banking, electronic commerce,
identifying newborns, national IDs, passports, employee IDs.

C. Surveillance
The word surveillance has been derived from a French phrase which means "watching over". Here (sur
means "from above‖ and veiller means "to watch"). Surveillance is used to monitor the individual’s behavior,
activities, or beside other related information for ensuring the people safety. This can be achieved by means
of electronic equipment i.e. closed-circuit television (CCTV) cameras) or interception of electronically
transmitted information. Surveillance system offer no. of benefits to different organizations. For example, it
is being used by governments for intelligence gathering, control the crime, monitoring the process, person,
crowd or object, or the inquiry of crime. However, on the other side, surveillance is often considered as a
violation of privacy, and in such cases it is often criticized by civil societies, groups and activists. Liberal
democracies have laws which bounds local governments and law agencies to use surveillance, usually
restricting them in those circumstances where public safety is compromised. Legitimate organizations have
often been imposed such domestic restrictions. However, international surveillance is similar among all
types of countries. Moreover researchers are trying to achieve more improved and contented results
through the use of latest algorithms in face recognition.

V.CONCLUSION
Study of face recognition has remained a striving area for researchers for many years. In this
paper, a comprehensive study was performed over different face recognition methods. After
detailed analysis it revealed that PCA is best suited technique when dimension of features is
higher for original face images, whereas eigen faces image features method work well for
frontal face recognition. Among face recognition methods, the most popular are Neural
Networks, Support Vector Machine, Sparse Representation based Classification (SRC), Linear
Regression Classification (LRC), Regularized Robust Coding (RRC) and Nearest Feature Line
((NFL). These methods provide better results when the image dimension is under 150 or
more. Furthermore, it is suggested that PCA, SVM, NN and Eigen methods still need to be
researched so that more satisfactory results could be achieved for face recognition.
Moreover, in this paper we also mentioned state of the art face recognition image database
and face technology benefits in various applications. However, main findings of this research
are highlighted as under:

 The development trends and achievements in the realm of face recognition shows
that a lot of researchers have been carried out in last four decades.

 Currently, face recognition system has been implemented for many real-time
applications, but still it suffers from several challenges that need to be addressed in
order to design a well-established face recognition system.

 Developed face recognition techniques could be analyzed over varying facial


expression i.e. under varying lighting conditions and pose. And evaluation could be
performed using benchmark and latest face databases.

 Similarly to the face image recognition, the video image recognition is more
complicated that needs to be researched. Further, it is suggested that for recognition
of video images, YouTube Faces could be analyzed for evaluation. Furthermore,
recognition of emotional human behavior has emerged recently as a promising
research area for scholars that should be exploited in future. Finally, it is concluded
that still there remains a gap in terms of study in face recognition system that requires
to be filled in order to improve its accuracy and efficiency.

VI.REFERENCES

• [1] Muhammad Sharif et al.: ―Face Recognition: A Survey‖, Journal of


Engineering Science and Technology Review 10 (2) (2017) 166- 177
• [2] Lacey et al.: ―A Longitudinal Study of AutomaticFace Recognition‖, IEEE
ICB, 2015 pp: 1- 8
• [3] Ms. Snehal Houshiram Gorde1, et al.‖ A Review on Face Recognition
Algorithms‖ Volume III, Issue I Issn No.:2350-1146, I.F-2.71
• [4] Azeem, Aisha, et al. "A survey: face recognitiontechniques under partial
occlusion." Int. Arab J. Inf. Technol. 11.1 (2014): 1-10.
• [5] Tarrés, Francesc, Antonio Rama, and L. Torres. "Anovel method for face
recognition under partial occlusion or facial expression variations." Proc. 47th
Int’l Symp. ELMAR. 2005.
• [6] Sharif M., Mohsin S., Hanan R., Javed M. and Raza M., "3D Face
Recognition using Horizontal and verticalMarked Strips", Sindh University
Research Journal (SURJ), 43(01-A), (2011)
• [7] Jia, Hongjun, and Aleix M. Martinez. "Face recognitionwith occlusions in
the training and testing sets." AutomaticFace & Gesture Recognition, 2008.
FG'08. 8th IEEEInternational Conference on. IEEE, 2008.
• [8] Zhou, Zihan, et al. "Face recognition with contiguousocclusion using
markov random fields." Computer Vision, 2009 IEEE 12th International
Conference on. IEEE, 2009.
• [9] Huang, Fu Jie, et al. "Pose invariant face recognition." Automatic Face and
Gesture Recognition, 2000. Proceedings. Fourth IEEE International Conference
on. IEEE, 2000.
• [10] Chai, Xiujuan, Shiguang Shan, and Wen Gao. "Pose normalization for
robust face recognition based on statistical affine transformation."
Information,Communications and Signal Processing, 2003 and FourthPacific
Rim Conferenceon Multimedia. Proceedings of the2003 Joint Conference of the
Fourth InternationalConference on. Vol. 3. IEEE, 2003.

You might also like