Chapter 1 and 2
Chapter 1 and 2
RECOGNITION SYSTEM
PRELIMARY PAGES
Cover page
Title page
Approval page
Dedication
Acknowledgment
Table of content
Abstract
CHAPTER ONE
1.0 Introduction
2.0 Introduction
3.1 Introduction
4.1 Introduction
CHAPTER FIVE
5.1 Summary
5.2 Conclusion
5.3 Recommendation
Bibliography
Source code
CHAPTER ONE
1.0 INTRODUCTION
image or videos. Face recognition is classified into three stages i.e) Face detection,
image analysis. Face detection is an application for detecting object, analyzing the
face, understanding the localization of the face and face recognition. It is used in
many application for new communication interface, security etc. Face Detection is
employed for detecting faces from image or from videos. The main goal of face
detection is to detect human faces from different images or videos. The face
detection algorithm converts the input images from a camera to binary pattern and
therefore the face location candidates using the AdaBoost Algorithm. The
proposed system explains regarding the face detection based system on AdaBoost
Algorithm . AdaBoost Algorithm selects the best set of Haar features and
implement in cascade to decrease the detection time .The proposed System for face
FPGA.
Face Detection System is to detect the face from image or videos. To detect the
face from video or image is gigantic. In face recognition system the face detection
is the primary stage. Figure 1 shows the various stages of face recognition system
ie face detection, feature extraction and recognition. Now Face Detection is in vital
Face recognition is a pattern recognition technique and one of the most important
major problem that specifies the performance of automatic face recognition system
alone, the time factor is also considered a major factor in real time environments.
Recent architecture of the computer system can be employed to solve the time
Detection and Recognition System (FDRS). In doing so, this research work
provides the architectural design, detailed design, and four variant implementations
of the FDRS.
Face recognition has gained substantial attention over in past decades due to
its increasing demand in security applications like video surveillance and biometric
surveillance. Modern facilities like hospitals, airports, banks and many more
another organizations are being equipped with security systems including face
recognition capability. Despite of current success, there is still an ongoing
research in this field to make facial recognition system faster and accurate. The
accuracy of any face recognition system strongly depends on the face detection
system. The stronger the face detection system the better the recognition system
would be. A face detection system can successfully detect human face from a
given image containing face/faces and from live video involving human presence.
The main methods used in these days for face detection are feature based and
image based. Feature based method separates human features like skin color and
facial features whereas image based method used some face patterns and processed
training images to distinguish between face and non faces. Feature based method
has been chosen because it is faster than image based method and its’
through image processing. Locating the faces from images is not a trivial task;
because images not just contain human faces but also non-face objects in clutter
scenes. Moreover, there are other issues in face recognition like lighting
conditions, face orientations and skin colors. Due to these reasons, the accuracy of
Face recognition is one of the most important biometrics methods. Despite the fact
that there are more reliable biometric recognition techniques such as fingerprint
and iris recognition, these techniques are intrusive and their success depends
highly on user cooperation. Therefore, face recognition seems to be the most
efficiently for mass scanning, which is quite difficult, in case of other biometrics.
the transmission of germs and impurities from other users. However, face
recognition is completely non-intrusive and does not carry any such health
dangers.
world, countries are considering these advantages and are shifting to new
been discussed. Since biometrics form the technology basis for large scale and very
Also, some other issues with face detection and recognition system is on individual
with identical face like identical twins and others, in situation like this it is possible
for the system to make mistake or error in processing the person image so as to
which first detects the faces present in either single image frames; and then
identifies the particular person by comparing the detected face with image database
In addition to the main objective of this research work, the researcher also went far
more to add other features to the new system which are as fellow.
1. One of the objectives of this system is to design a system that will help the
work will help the users in maintaining data. This system will reduce the rate of
fraudulent activities as it can as well keep track of registered users and grant them
Also the knowledge that would be obtained from this research will assist the
management to grow, also this research work will also be of help to the upcoming
researcher in this field of study both with the academic students on their study.
The scope of this study covers only on face detection and recognition,
accessing previous records and making matched for the data, updating of records
for the development of this project work to this extent. It was not an easy one, so
that are involved in this work is high in the sense that we all know that information
is money.
ii. TIME: A lot of time was involved in writing and developing this work,
iii. Irregularities in power supply also dealt harshly with the researcher.
study.
dataset.
Flow Chart: A graphical picture of the logical steps and sequence involved in a
procedure or a program.
Normalization: A process of replacing a given file with its logical equivalent the
procedure.
package.
operation.
System Design: Detailed concentration on the technical and other specification that
explained in chapter 1 and the whole idea of this research work presentation in
chapter one, like objective of the study, statement of the research area of coverage
limitation and definition of terms all this makes up the chapter one.
Chapter 2; this section deals with the review of study, review of concept theories
upon which this work is built on, the potential issues in the any face recognition
system in the form of difference in the lighting conditions in which the same
picture appears differently and the variations in skin color and pose.
Chapter 3 talks about the software tools used in the project mainly related to visual
basic programming language. The methodology at which this research work will
be implemented.
In chapter 4 the system is implemented and presented with its analysis. Functions
of the system and the operation of the system is also, in depth explained for reader
understating and comprehension. The system requirement is also detailed and the
Chapter 5 summaries the whole work done and make possible recommendation
and suggest other points to be included into the work for future propose
REFERENCE
Pattern Analysis and Machine Intelligence, vol. 19, no. 7, 1997, pp. 711-720.
43108-5
Deterrence Techniques IV, vol. 4677 of Proceedings of SPIE, pp. 275–289, San
LITERATURE REVIEW
2.0 INTRODUCTION
Biometric technologies are automated methods and means for identification based
This chapter focuses on the ongoing confronts in the field of the recognition and
some basic concepts of image applications, empirical study, review of related study
system architectural framework, challenges and the imaging concepts all will
Face detection is the elementary step in the face recognition system and acts
face detection; each has its own weaknesses and strengths. The majority of these
algorithms suffer from the same difficulty; they are computationally expensive.
pixels for face detection is time consuming and hard to implement because of the
enormous diversity of shape and pigmentation in the human face. Viola and Jones
proposed an algorithm, called Haar-cascade Detector or called Viola-Jones, to
quickly detect any object, including human faces, using AdaBoost classifier
cascades that are based on Haar-like features and not pixels. Viola-Jones algorithm
is widely used in various studies involving face processing because of its real-time
capability, high accuracy, and availability as open-source software under the Open
recognize any kind of a solid object, including human faces and facial features
such as eyes, and mouths. OpenCV has implemented Viola-Jones and provides a
INFORMATION MANAGEMENT
Data can be defined as individual facts or raw about something that can be
stimuli that have meaning in some contest for its receiver. When data is entered
Graham (2001) said, with the move from local application to a web based ones,
also the data we created and access will need to undergo some profound changes.
product catalogs, inventories and item/customer records. They say that every
business would be a failure without a secure and reliable data management system.
They further say that information systems are the hearts of most businesses
worldwide, According to them. it is not easy to have a secure system, hut a system
developer must ensure that this is achieved. They advise system developers to have
clear subject areas, requirements and plans before they start designing the systems.
Braker and Hellerstein (1998), say that database has experienced a rapid increase
in growth since the development of a rational data base. The progress in database
areas that have often become the exclusive domain of research specialists.
technology areas.
Siau (2003) asserts that many databases that we find on the web today arc derived
from other databases. New databases arc often created because there is a need for
customized data and often, the databases are created with new data added in the
information or annotation about the data is useful in many aspects. Siau (2003)
forward annotation of data being transformed. but that is also capable of attaching
With French (1992), it’s also a single collection of structured data stored with a
of data. This is common to all user systems, but is independent of the programs
that use data. The independence database and programs using it means that one can
be changed without changing the other. The user of database may find it
According to Thierry (2006), the term database design can be used to describe
many different parts of design of an overall system Principally, and most correctly,
it can be thought as the logical design of the database of database structure used to
store data in are rational model these are the tables and views However the
database design could be sued to apply overall process of designing, and not just
base data structures, hut also forms and queries are used apart overall database
Over the years, face recognition has gained rapid success with the development of
new approaches and techniques. Due to this success, the rate of successful face
recognition has been increased to well above 90%. Despite of all this success, all
visibility. These challenges are lighting conditions variations, skin variations and
face angle variations. The challenges are explained in descriptive manner below.
The lighting conditions in which the pictures are taken are not always
similar because the variations in time and place. The example of lighting
variations could be the pictures taken inside the room and the pictures taken
outside. Due to these variations, a same person with similar facial expressions may
appear differently in different pictures. As a result, if the person has single image
store in the database of face recognition, matching could be difficult with the face
skin color due to the difference in the races of the people. Due to this variation,
sometimes the true skin pixels are filtered out along with the noise present in an
filtered out during noise filtering process. So, it is a tough task is to choose the
filter which will cover the entire skin tones of different people and kick out false
skin noise.
The angle of the human face from camera can be different in different situations.
A frontal face detection algorithm can’t work on non-frontal faces present in the
image because the geometry of facial features in frontal view is always different
than the geometry of facial features in non-frontal view. This is why orientation
Image processing is a method of processing the image values, more precisely, the
pixels in case of digital images. The purpose of image processing is to modify the
input image such that the output image may change parametrically such as in
colors and representation. Image processing is the basic part of the face
recognition involving digital images. The processing can change the image
representation from one color space to another color space. It can also assign
different color values to targeted pixels for the purpose of keeping areas of interest
components. Typical examples of color spaces are RGB, YCbCr and HSI color
spaces. In each of these color spaces the color of a pixel at any point in an image
is the combination of three color components. These color components vary from
0 to maximum value and this maximum value depends on the bits per pixel. The
different values in the range give different colors from black (0) to white (255)
RGB color space is the combination of red, green and blue color components. For
the 24 bits per pixel, the range of R, G and B varies from 0 to 255. If R, G and B
are all 0 then the resulted color will be black. If R, G and B are all 255 then the
output color will be white. The concept of the RGB color space is specified in
figure 2.b.3. Here the x-axis represents blue color range, y-axis represents green
color range and Z-axis represents red color range. As explained above, we can see
that black color is represented at the origin and white color is represented at the
other corner where red, green and blue are 255 each. Similarly we can have other
Guo proposed a two stage hybrid face detection system composed of the
probability based face mask pre-filtering and pixel based. Froba and Ernst[7]
methods use facial features, such as two eyes, a nose and a mouth. Sung proposed
the feature invariant methods based on facial features such as invariant to pose,
lighting condition. The matching methods of the template are calculated by the
pre-labeled training set. The Eigenface method is the most fundamental method for
FPGA boards for the Transmogrifier-2 configurable hardware system. Sadri et al.
proposed neural network primarily based face detection on the Virtex-II Pro
FPGA. This face detection uses skin color filtering and edge detection to cut back
the processing time. Wei et al. [19] proposed, face detection using FPGA for
scaling input pictures and mounted-point expressions. The image size is simply too
small (120×120 pixels) solely some parts of classifier cascade are literally
implemented.
Wayman has studied the technical testing of biometric devices and divided it
into five subsystems: data collection, signal processing, transmission, data storage,
decision. This makes the potential attack points more clear. introduces three more
extend. The level of supervision may vary for systems but it is not difficult to
imagine the related vulnerabilities. Vulnerabilities in this area may devalue even
the best planned system. A biometric system may or may not be related to an IT
environment may introduce some new vulnerabilities not existing in the previous
scheme. A token is required in some biometric systems which make final decisions
may introduce a potential attack point to the biometric system. A smart card
system. There are several other schemes for vulnerability classification [8].
is suggested.
level.
environment.
Power: Power cuts.
parameters is an example.
level.
biometric data can be used for another type of attack (e.g. replay attack).
systems.
Using the given list of them, vulnerabilities for specific systems can be identified.
A biometric system may not have all of the vulnerabilities or attack points. The list
is general enough and can be applied to any system easily. For a specific system, it
is essential to consider the properties of the system in order to identify the
vulnerabilities.
This section describes the architectural design of FDRS, involve: the Mono
The face recognition is the hardest algorithm because it has many steps before it
start the real recognition. A face must be detected to increase the possibility of
recognition and speed up the process by choosing one location in the image. To
detect a face, two steps must be done before the recognition. The first step is to
resize the image to standard size (determine by the administrator), apply some
filter to increase the quality, and convert the image into a compatible form. Next,
go to detection face, such that the image required to recognize is uploaded in the
memory with an Extensible Markup Language (XML) file to detect a face, and
recognition algorithm.
Any operating system (OS) has multiple ways to deal with a process for different
structures. Some process has a single thread and other has multithreads architecture
card.
Matching module: This module compares the presented biometric sample with the
Decision module: This module accepts or rejects the user depending on the
Ratha et.al. identify eight attack points in this scheme. Let us shortly describe
1. Presenting a fake biometric sample to the sensor: A fake biometric sample such
2. Replay of stored digital biometric signals: A stored signal is replayed into the
system ignoring the sensor. For instance, replay of an old copy of a fingerprint
4. Spoofing the biometric feature: Features extracted from input signal are replaced
distant. The attacker tries to fake one or more biometric templates in the database.
service.
7. Attacking the channel between the template database and matching module:
8.Attacking the final decision process: If the final decision can be inserted or
blocked by the hacker then the authentication system function will be overridden.
integrated to the biometric system which possibly makes the biometric system
1. Operating systems;
1. management of operations;
3. system configuration.
In the parallel face recognition process, two tasks can be done simultaneously. The
process of uploading training face images in the memory and the process of getting
face features from the training face images. The multithreading capability can be
Figure 3. CPU Parallel Face Recognition
Mono, CPU Parallel, Hybrid Mono and Hybrid Parallel. Fisherface algorithm is
for the detection phase. In addition, these implementations are based on industrial
standard tools involve Open Computer Vision (OpenCV) version 2.4.8,
experiment consists of applying 400 images for 40 persons' faces (10 images per
person), defining, training, and recognizing these images on these four variants, the
experiment is taken place on the same environment (laptop computer Intel core i7
processor 2.2 GHz, Nvidia GPU GeForce GT 630M, 7GB RAM). The speed up
factor is measured with respect to the CPU Mono implementation (the slowest than
all other three variants). The practical results demonstrated that, the Hybrid Parallel
Recognition is the fastest algorithm variant among the all, because it gives an
overall speed up around (82) times. The CPU Parallel gives an overall speed up
around (71). Finally, the Hybrid Mono gives a little improvement about (1.04).
UK, 2000.
Literature Survey", ACM Computing Surveys, vol. 35, no. 4, 2003, pp. 399-458.
Pattern Analysis and Machine Intelligence, vol. 19, no. 7, 1997, pp. 711-720.
algorithm", Pattern Recognition Letters, Elsevier, vol. 28, no. 10, 2007, pp. 1151-
1155.
[CrossRef]
H. Anton, C. Rorres, Elementary Linear Algebra, ninth edition, Oxford University
ISBN:981-243-106-3.
Jain A. K., Uludag U., Attacks on biometric systems: a case study in fingerprints,
Jain A. K., Ross A., Uludag U., Biometric template security: challenges and
Roberts C., Biometric attack vectors and defenses, Computers and Security, vol.
Dimitriadis C., Polemi D., Application of multi-criteria analysis for the creation of
Journal of Computing Sciences in Colleges, Vol. 21, No. 4, pp. 127-133, April
2006.
Runarsson K." A Face Recognition Plug-in for the PhotoCube Browser”, M.Sc.
Xie, S. J.; Yang J.; Park, D. S. ; Yoon, S. and Shin, J. “State of the art in
biometrics” in Iris Biometric Cryptosystems, Yang, J. and Nanni, L., Eds.,
InTech, , Croatia, pp. 179-202, July 2011