Techniques and Applications of Face Reco
Techniques and Applications of Face Reco
ABSTRACT
Face recognition is one of the most used technologies for security and privacy in electronic gadgets, automotive
industry and other domains as well. It is also the most reliable form of biometric authentications. In the present
paper the basic process of Face Recognition technology, biological aspects behind the smooth functioning of
face recognition, conditions affecting the process (consisting of twins face, hairstyle change and time-to-time
face change due to ageing) have been explained. Effort has also been made to enumerate the uses of face
recognition in different technological approaches and the huge market value for this emerging biometric
solution.
Keywords :Face Recognition, Authentication, Security, Privacy.
3. Illuminations- The lightening conditions on the of 0-225 which is further processed and a specific
given person’s face at or around the background number is given for that part.
of the face affect the face recognizing process.
4. RST(rotation, scale and translation) - The rotation
and the scale of the face changes the recognizing
process.
In this heading one of the oldest and most popular 4. Extracting the histogram – Now grid X and grid Y
face recognition algorithms has been discussed which parameters are used to separate the image into
is LBPH- (Local Binary Pattern Histogram). multiple grids as seen in the given image.
1. Major Parameters-
a. Radius- It is used to build the circular local binary
5. Performing the face recognition – Now the input
pattern and the shows radius around the central
image can be given and the given steps are
pixel, mostly it is 1.
performed:
b. Neighbors- It is the numbers of sample point that
✓ Here, the given two histograms are compared.
constructs the circular local binary pattern.
✓ In the next step the distance between the two
Mostly it is the set of 8.
histogram is calculated like Euclidean distance or
c. Grid X-It is the number of cells in the horizontal
absolute value etc. The Euclidian distance can be
direction. More the cells, the finer will be the
calculated with the help of the given formula.
grid, the higher the dimension of the resulting
feature vector will have. It is usually the set of 8.
d. Grid Y- It is the number of cells in the vertical
direction. It is similar to grid X and usually the set
of 8.
2. Training the Algorithm-Initially need to train the ✓ By using this formula, distance will be calculated
algorithm is there. In such process one needs to and it can be used to detect the given histogram.
set the facial images of a given person. One also
requires recognizing, and also giving one the APPLICATIONS OF FACE RECOGNITION
identifying numbers. Now one can go to the next
step after giving the data of the facial images. ✓ Car Security System – It is a very simple process
3. Applying the LBP operation – In this the in which the driver or the user enrolls his/her
intermediate images are created that describe the face into the car system. Therefore, whenever the
original image efficiently. user enters the vehicle again, it recognizes his face
and also learns the user face time to time like
Based on the given image it creates 3x3 pixels for
giving him the permission to start the car.
different facial expression giving it the intensity
International Journal of Scientific Research in Science and Technology ( www.ijsrst.com) | Volume 7 | Issue 1
29
Dr. Bharti Kukrejaet alInt J Sci Res Sci Technol.January-February-2020;7(1) : 28-31
✓ Security in Smart phones – It consists the same electronic gadgets and in entry - exit systems because
process as that of the security process in car, but now a day many people can interfere with the
due to various security reasons the technology fingerprint and can easily break the security having
behind the face recognition in the smart phone finger print as an authentication process. It can also
has evolved in which dot projector consisting of be used as identifying criminal at public places with
thousands of invisible dots is marked on the user higher efficiency. This work also proposed the
face which creates the 3D face. This 3D face is likelihood of correctly identifying the person of
captured with the help of flood illuminator and interest through the various applications.
the infrared camera to check the user identity.
✓ Entering and Exiting Security – In firms, high- Facial recognition is a powerful technology but it has
tech laboratories and military buildings, face to be used thoughtfully. On one hand, it brings
recognition process is used similar to the smart numerous advantages to the companies and end-users,
phones security but for higher level of security helps them enhance their security and track down the
the user iris is scanned thoroughly for this trespassers.
authentication process which is more important
at this type of places. On the other hand, it may be misused for personal
✓ Face recognition for potential customers– The benefit and lead to some serious consequences. All can
customer face is recognized and stored in system be done is to hope for the industry giants to make this
so whenever the same customer visits the store technology more user-friendly, transparent, and
again the system gets to know the preferences and secure so anyone can conveniently benefit from it.
previous order by of the customer.
✓ Criminal Identification–Criminals can be caught
by recognizing their identity with the help of IV. REFERENCES
high-resolution 3D camera present at the public
places, near the street and other places as well. [1]. Aayushi Bansal "A study of factors Affecting
Then, the criminal face result in the system is face recognition." ISSN NO : 2249-7455
matched with each and every person coming in [2]. Ojala, Timo, Matti Pietikainen, and
the range of the camera. TopiMaenpaa. "Multiresolution gray-scale and
rotation invariant texture classification with
III.CONCLUSION local binary patterns." IEEE Transactions on
pattern analysis and machine intelligence 24.7
In this paper the main concept of face recognition, (2002): 971-987.
factors affecting this process, technical process behind [3]. Ahonen, Timo, Abdenour Hadid, and Matti
the working of face recognition and the various Pietikainen. "Face description with local binary
applications of face recognition in the field of patterns: Application to face recognition." IEEE
electronic gadgets, security purposes and nabbing transactions on pattern analysis and machine
criminal have been enumerated. intelligence 28.12 (2006): 2037-2041.
[4]. Ahonen, Timo, Abdenour Hadid, and Matti
In near future, face recognition with iris scanner and Pietikäinen. "Face recognition with local binary
artificial intelligence for face learning is going to play patterns." Computer vision-eccv 2004 (2004):
a vital role for major biometric security purposes in 469-481.
International Journal of Scientific Research in Science and Technology ( www.ijsrst.com) | Volume 7 | Issue 1
30
Dr. Bharti Kukrejaet alInt J Sci Res Sci Technol.January-February-2020;7(1) : 28-31
[5]. LBPH Open CV : https: // docs . opencv . org / scholars of the college and aspire to become the
2.4/modules/contrib/doc/facerec/facerec_tutoria futuristic technocrats in the times to come. They have
l.html#local-binary-patterns-histograms written various research papers for numerous journals
[6]. Local Binary Patterns : http : // www . and have been the part of various conferences of the
scholarpedia .org / article / Local _ Binary _ city.
Patterns
[7]. Kelvin salton do prado "Face Recognition: Cite this article as :
Understanding LBPH Algorithm"
https://towardsdatascience.com/face- Dr. Bharti Kukreja, Ritul Kumar Sharma, Shubham
recognition-how-lbph-works-90ec258c3 Sinha, "Techniques and Applications of Face
Recognition : An Overview", International Journal of
Authors’ Profile Scientific Research in Science and Technology
(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-
Dr. Bharti Kukreja is presently working as an 6011, Volume 7 Issue 1, pp. 28-31, January-February
Associate Professor at B. S. Anangpuria Educational 2020. Available at doi :
Institutes, Faridabad Haryana, India. She is doctorate. https://doi.org/10.32628/IJSRST20711
She has done Post Graduation in Human Resource Journal URL : http://ijsrst.com/IJSRST20711
Management and Masters in Communication Skills.
Dr. Bharti Kukreja has extensive experience of
working in the corporate sector and teaching at
graduate as well as postgraduate level. She is playing
an instrumental role helping the scholars in
publishing the research papers. She has also presented
numerous research papers at the international as well
as national conferences and also published papers in
the journals of the international repute. She keeps on
delivering expert lectures on various current topics.
Dr. Kukreja is the certified Language Lab trainer
acknowledged by Words Worth Language Lab, an
initiative of the ACTUniv Group. Dr. Kukreja has also
authored a book on “Effective Technical
Communication” which is being used as a course
book in various universities.
International Journal of Scientific Research in Science and Technology ( www.ijsrst.com) | Volume 7 | Issue 1
31