SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
International Journal of Science and Engineering Applications
Volume 3 Issue 4, 2014, ISSN-2319-7560 (Online)
www.ijsea.com 94
Sliding Window for Radial Basis Function Neural
Network Face Detection
K.A.A Aziz
Faculty of Engineering
Technology
Universiti Teknikal Malaysia
Melaka
Melaka, Malaysia
N. Mohamood
Faculty of Engineering
Technology
Universiti Teknikal Malaysia
Melaka
Melaka, Malaysia
M.N.Z. Hashim
Faculty of Electronics and
Computer Engineering
Universiti Teknikal Malaysia
Melaka
Melaka, Malaysia
Abstract: This paper present a Radial Basis Function Neural Network (RBFNN) face detection using sliding windows. The system
will detect faces in a large image where sliding window will run inside the image and identified whether there is a face inside the
current window. Face detection is the first step in face recognition system. The purpose is to localize and extract the face region from
the background that will be fed into the face recognition system for identification. General preprocessing approach was used for
normalizing the image and a Radial Basis Function (RBF) Neural Network was used to distinguish between face and non-face images.
RBFNN offer several advantages compared to other neural network architecture such as they can be trained using fast two stages
training algorithm and the network possesses the property of best approximation. The output of the network can be optimized by
setting suitable values of the center and spread of the RBF. In this paper, a uniform fixed spread value will be used. The performance
of the system will be based on the rate of detection and also false negative rate.
Keywords: Face detection, Radial Basis Function Neural Network, Sliding Window.
1. INTRODUCTION
Biometrics deals with the identification of individuals based
on their biological or behavioral characteristics [1]. By using
that trait to obtain a biometric enrollment, we can say that
with a degree of certainty that someone is the same person in
future biometric authentications based on their previous
enrollment authentications [2]. A number of biometrics have
been proposed, researched and evaluated for identification
applications. Face is one of the most acceptable biometrics
because it is one of the most common methods of
identification which humans use in their interactions [1]. Face
detection is the first step in face recognition system. Face
detection can be regarded as a more general case of face
localization. In face localization, the task is to find the
locations and sizes of a known number of faces. One of the
methods for face detection is Neural Networks which lies
under the category of image based approach. In this paper, we
focus on optimizing the RBF Neural Network for face
detection. RBFNN is used to distinguish face and non-face
images. The output of the network can be optimized by
setting suitable values of the center and the spread of the RBF.
The system will detect many faces in a large image where
sliding window will run inside the image and identified
whether there is a face inside the current window.
2. RADIAL BASIS FUNCTION NEURAL
NETWORK
RBFNN offers several advantages compared to the Multilayer
Perceptrons. Two of these advantages are:
1. They can be trained using fast 2 stages training algorithm
without the need for time consuming non-linear
optimization techniques.
2. ANN RBF possesses the property of „best
approximation‟ [9]. This means that if in the set A of
approximating functions (for instance the set F(x, w)
spanned by parameters w), then the RBFNN has the
minimum distance from any given function of a larger
set, .
RBFNN had been successfully used in face detection such as
in Mikami, et. al., 2003[3]. Figure 1 illustrates the architecture
of the RBFNN used in this work.
Figure 1: RBF Neural Network
The network consists of three layers: an input layer, a hidden
layer and an output layer. Here, R denotes the number of
inputs while Q the number of outputs. For Q = 1, the output of
the RBFNN in Figure 1 is calculated according to
 

1
1 21 ||)(||),(
S
k kk cxwwx 
(1)
where
1Rx
x  is an input vector,
(.) is a basis function,
||.|| denotes the Euclidean norm, w1k are the weights in the
output layer, S1 is the number of neurons ( and centers) in the
International Journal of Science and Engineering Applications
Volume 3 Issue 4, 2014, ISSN-2319-7560 (Online)
www.ijsea.com 95
hidden layer and
1Rx
kc  are the RBF centers in the input
vector space. Equation (1) can also be written as
wxwx T
)(),(   (2)
where
||)](||||)(||[)( 111 SS
T
cxcxx    (3)
and
][ 111211 S
T
wwww  (4)
The output of the neuron in a hidden layer is a nonlinear
function of the distance given by:
2
2
)( 

x
ex

 (5)
where β is the spread parameter of the RBF. For training, the
least squares formula was used to find the second layer
weights while the centers are set using the available data
samples.
3. NETWORK TRAINING
The image that to be fed into the network whether for training
or testing will be normalized using a preprocessing step,
adapted from [4].
In this project, image is first converted into double class in
matrix form. The matrix is the converted into column matrix 1
x n. This input will be fed into the RBF network for the next
process.
The network is trained using 2429 face data and 4548 non-
face data from the CBCL (Center For Biological and
Computation Learning) train datasets [5].
K-means clustering is one of the techniques that was used to
find a set of centers where the technique is more accurately
reflects the distribution of the data points [6]. It is used in
research such as in [3] and [7]. In k-means clustering, the
number of desired centers, K, must be decided in advance.
The simplest procedure for selecting the basis function centers
ck is to set the center equal to the input vectors or a random
subset of the input vectors from the training set but this is not
an optimal procedure since it leads to the use of unnecessarily
large number of basis function [6]. Broomhead et al. [8]
suggested strategies for selecting RBF centers randomly from
the training data. The centers of RBF can either be distributed
uniformly within the region of input space for which there is
data.
For the training, supervised learning is used where training
patterns are provided to the RBFNN together with a teaching
signal or target. As for the input of face will be given the
value of 1 while the input of non-face will be given the value
of -1.
4. SLIDING WINDOWS
Sliding window can be described as a matrix of pixels (i x j)
that moves through the entire pixels of an image. In this
project, both the value of x and y are 19. The matrix is smaller
compared to the matrix of the image. Therefore, the matrix
can be compared to many parts in the matrix of the image.
The sliding window has a same size with the distribution-
based model matrix. It is matched to the distribution-based
model for looking the difference feature vectors. In this
project, a window by the size of 19 x 19 will be used. The
program will first calculate the size of the large image. Then
the window will moves through the entire pixels of an image.
For the image with the size of (x x y) the sliding window can
be given by:
for i=1:1:x-19
for j=1:1:y-19
CurrentImage=Image(j:18+j,i:18+i,1);
end
end
Most of the image-based approaches apply a window
scanning technique for detecting faces. The window scanning
algorithm is in essence just an exhaustive search of the input
image for possible face locations at all scales, but there are
variations in the implementation of this algorithm for almost
all the image-based systems. Typically, the size of the
scanning window, the sub sampling rate, the step size, and the
number of iterations vary depending on the method proposed
and the need for a computationally efficient system. [9]
5. TESTING
The system will detect many faces in a large image. The
image for testing is taken from [10]. Sliding window will run
inside the image and identified whether there is a face inside
the current window. If a face is detected, the system will put a
rectangular mark on the face. In [10] they are using new
reduced set method for Support Vector Machines (SVMs).
6. RESULTS
For detecting many faces in an image, setting the system with
center 2 as shown in Figure 2 gives the worst result as there
are too many false accept. It is hard to see whether the system
detect all faces as there are too many overlapped rectangular.
Increasing the value of center improved the result as the false
negative becomes less as in Figure 3. For the use of center 5
and spread 10, the system cannot detect two faces and yet
have two false accept.
Figure 2: Using RBF with the value of Centre 2 and Spread 4
International Journal of Science and Engineering Applications
Volume 3 Issue 4, 2014, ISSN-2319-7560 (Online)
www.ijsea.com 96
Figure 3: Using RBF with the value of Centre 5 and Spread 4
Figure 4: Using RBF with the value of Centre 5 and Spread 10
Starting with center 25 and above, the results are much better
as the system can detect all faces in the picture without any
false accept as we refer to Figure 5. But still the spread value
is crucial where we can still get false accept as shown in
Figure 6 and Figure 7 for center 25 and 200.
Figure 5: Using RBF with the value of Centre 25 and Spread 5
Figure 6: Using RBF with the value of Centre 25 and Spread 4
Figure 7: Using RBF with the value of Centre 200 and Spread
5
For Center 200, spread value of 5 will ensure that the system
detect all faces in the image without false accept as shown in
Figure 7. As for spread 4, the system can detect all faces but
with 2 false accept.
7. CONCLUSION
In section 5, setting the center higher than 25 will ensure that
all faces in the image will be detected. But still the value of
spread is crucial. This can be seen in Figure 6 where there is
one false accept. For 25 centers, spread equal to 4 is the best
setting. But for center 200, using spread equal to 5 will ensure
that the system detects all faces in the image.
International Journal of Science and Engineering Applications
Volume 3 Issue 4, 2014, ISSN-2319-7560 (Online)
www.ijsea.com 97
8. ACKNOWLEDGMENTS
The authors would like to express their gratitude to the
Universiti Teknikal Malaysia Melaka for providing the
facilities and financial assistance to conduct this research.
9. REFERENCES
[1] A. Jain, R. Bolle, and S. Pankanti, “Biometrics: Personal
Identifucation in Networked Society”, Springer
Science+Business Media, Inc 2006.
[2] P. Reid, “Biometrics for Network Security”, Pearson
Education, Inc 2004.
[3] T. Mikami, M. Wada, “Example-based Face Detection
Using Independent Component Analysis and RBF
Network”, SICE Annual Conference in Fukui, August 4-
6, 2003.
[4] H. A. Rowley, S. Baluja, and T. Kanade. “Neural
Network-Based Face Detection”, IEEE Trans. Pattern
Analysis and Machine Intelligence, vol. 20, no. 1, pp. 23-
38. 1998.
[5] CBCL Face Database #1 MIT Center For Biological and
Computation Learning
http://www.ai.mit.edu/projects/cbcl
[6] S. S. Abdullah, M. M. Idris, “A Short Course In
Artificial Neural Networks” 2008.
[7] M. J. Er, S. Wu, J. Lu, and H. L. Toh, Face Recognition
With Radial Basis Function (RBF) Neural Networks,
IEEE Transaction On Neural Networks, Vol. 13, No. 3,
May 2002.
[8] D. S. Broomhead and D. Lowe, Multivariable functional
interpolation and adaptive networks, Complex Systems,
vol. 2, pp 321-355.
[9] E. Hjelmas, and B. K. Low, “Face Detection: A Survey”
Academic Press, 2001.
[10] W. Kienzle, G. Bakir, M. Franz and B. Scholkopf: Face
Detection - Efficient and Rank Deficient. In: Advances
in Neural Information Processing Systems 17, pg. 673-
680, 2005.
[11] K.A.A. Aziz, S.S. Abdullah, R.A. Ramlee and A.N.
Jahari. “Face Detection Using Radial Basis Function
Neural Networks With Variance Spread Value”, The
International Conference of Soft Computing and Pattern
Recognition (SoCPaR 2009) Malacca, Malaysia,
December 4-7, 2009.
[12] K.A.A. Aziz, R.A. Hamzah, S.D.I Damni, A.N.M. Johari
and S.S. Abdullah. “Face Recognition Using Fixed
Spread Radial Basis Function Neural Network For
Security System,”, Journal of Telecommunication,
Electronic And Computer Engineering, 2011.
[13] K.A.A. Aziz, R.A. Ramlee, S.I Samsudin and A.N.M.
Johari. “The Effect Of Overlapping Spread Value For
Radial Basis Function Neural Network In Face
Detection”, Journal of Telecommunication, Electronic
And Computer Engineering, 2010.
[14] R.A Hamzah, S.F.A. Ghani, A. Din and K.A.A. Aziz.
“Visualization of image distortion on camera calibration
for stereo vision application”, Control System,
Computing and Engineering (ICCSCE), 2012.
[15] R.A. Ramlee, K. Azha and R.S.S. Singh. “Detecting
Cholesterol Presence with Iris Recognition Algorithm”,
Universiti Teknikal Malaysia Melaka (UTeM), Malaysia.
[16] R.A. Hamzah, S.F. Abd Ghani, A.F. Kadmin and K.A.A.
Aziz. “A practical method for camera calibration in
stereo vision mobile robot navigation”, Research and
Development (SCOReD), 2012.
[17] R.A. Hamzah, K.A.A. Aziz, A.S.M. Shokri. “A pixel to
pixel correspondence and region of interest in stereo
vision application”, Computers & Informatics (ISCI),
2012.
[18] K.A.A. Aziz, S.S. Abdullah and A.N.M. Johari. “Face
Detection Using Radial Basis Functions Neural
Networks With Fixed Spread”, International Journal of
Computer Sciences and Engineering Systems, 2011.

Más contenido relacionado

Más de Editor IJCATR

Policies for Green Computing and E-Waste in Nigeria
 Policies for Green Computing and E-Waste in Nigeria Policies for Green Computing and E-Waste in Nigeria
Policies for Green Computing and E-Waste in NigeriaEditor IJCATR
 
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Editor IJCATR
 
Optimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsOptimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsEditor IJCATR
 
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Editor IJCATR
 
Web Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteWeb Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteEditor IJCATR
 
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 Evaluating Semantic Similarity between Biomedical Concepts/Classes through S... Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...Editor IJCATR
 
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 Semantic Similarity Measures between Terms in the Biomedical Domain within f... Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Semantic Similarity Measures between Terms in the Biomedical Domain within f...Editor IJCATR
 
A Strategy for Improving the Performance of Small Files in Openstack Swift
 A Strategy for Improving the Performance of Small Files in Openstack Swift  A Strategy for Improving the Performance of Small Files in Openstack Swift
A Strategy for Improving the Performance of Small Files in Openstack Swift Editor IJCATR
 
Integrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationIntegrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationEditor IJCATR
 
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 Assessment of the Efficiency of Customer Order Management System: A Case Stu... Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Assessment of the Efficiency of Customer Order Management System: A Case Stu...Editor IJCATR
 
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Editor IJCATR
 
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
 
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Editor IJCATR
 
Hangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineHangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineEditor IJCATR
 
Application of 3D Printing in Education
Application of 3D Printing in EducationApplication of 3D Printing in Education
Application of 3D Printing in EducationEditor IJCATR
 
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Editor IJCATR
 
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Editor IJCATR
 
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsDecay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsEditor IJCATR
 
Prediction of Heart Disease in Diabetic patients using Naive Bayes Classifica...
Prediction of Heart Disease in Diabetic patients using Naive Bayes Classifica...Prediction of Heart Disease in Diabetic patients using Naive Bayes Classifica...
Prediction of Heart Disease in Diabetic patients using Naive Bayes Classifica...Editor IJCATR
 
Hydrocarbon Concentration Levels in Groundwater in Jesse and Environ, Ethiope...
Hydrocarbon Concentration Levels in Groundwater in Jesse and Environ, Ethiope...Hydrocarbon Concentration Levels in Groundwater in Jesse and Environ, Ethiope...
Hydrocarbon Concentration Levels in Groundwater in Jesse and Environ, Ethiope...Editor IJCATR
 

Más de Editor IJCATR (20)

Policies for Green Computing and E-Waste in Nigeria
 Policies for Green Computing and E-Waste in Nigeria Policies for Green Computing and E-Waste in Nigeria
Policies for Green Computing and E-Waste in Nigeria
 
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
 
Optimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsOptimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation Conditions
 
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
 
Web Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteWeb Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source Site
 
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 Evaluating Semantic Similarity between Biomedical Concepts/Classes through S... Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 Semantic Similarity Measures between Terms in the Biomedical Domain within f... Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 
A Strategy for Improving the Performance of Small Files in Openstack Swift
 A Strategy for Improving the Performance of Small Files in Openstack Swift  A Strategy for Improving the Performance of Small Files in Openstack Swift
A Strategy for Improving the Performance of Small Files in Openstack Swift
 
Integrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationIntegrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and Registration
 
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 Assessment of the Efficiency of Customer Order Management System: A Case Stu... Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
 
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
 
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
 
Hangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineHangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector Machine
 
Application of 3D Printing in Education
Application of 3D Printing in EducationApplication of 3D Printing in Education
Application of 3D Printing in Education
 
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
 
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
 
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsDecay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
 
Prediction of Heart Disease in Diabetic patients using Naive Bayes Classifica...
Prediction of Heart Disease in Diabetic patients using Naive Bayes Classifica...Prediction of Heart Disease in Diabetic patients using Naive Bayes Classifica...
Prediction of Heart Disease in Diabetic patients using Naive Bayes Classifica...
 
Hydrocarbon Concentration Levels in Groundwater in Jesse and Environ, Ethiope...
Hydrocarbon Concentration Levels in Groundwater in Jesse and Environ, Ethiope...Hydrocarbon Concentration Levels in Groundwater in Jesse and Environ, Ethiope...
Hydrocarbon Concentration Levels in Groundwater in Jesse and Environ, Ethiope...
 

Último

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 

Último (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 

Sliding Window for Radial Basis Function Neural Network Face Detection

  • 1. International Journal of Science and Engineering Applications Volume 3 Issue 4, 2014, ISSN-2319-7560 (Online) www.ijsea.com 94 Sliding Window for Radial Basis Function Neural Network Face Detection K.A.A Aziz Faculty of Engineering Technology Universiti Teknikal Malaysia Melaka Melaka, Malaysia N. Mohamood Faculty of Engineering Technology Universiti Teknikal Malaysia Melaka Melaka, Malaysia M.N.Z. Hashim Faculty of Electronics and Computer Engineering Universiti Teknikal Malaysia Melaka Melaka, Malaysia Abstract: This paper present a Radial Basis Function Neural Network (RBFNN) face detection using sliding windows. The system will detect faces in a large image where sliding window will run inside the image and identified whether there is a face inside the current window. Face detection is the first step in face recognition system. The purpose is to localize and extract the face region from the background that will be fed into the face recognition system for identification. General preprocessing approach was used for normalizing the image and a Radial Basis Function (RBF) Neural Network was used to distinguish between face and non-face images. RBFNN offer several advantages compared to other neural network architecture such as they can be trained using fast two stages training algorithm and the network possesses the property of best approximation. The output of the network can be optimized by setting suitable values of the center and spread of the RBF. In this paper, a uniform fixed spread value will be used. The performance of the system will be based on the rate of detection and also false negative rate. Keywords: Face detection, Radial Basis Function Neural Network, Sliding Window. 1. INTRODUCTION Biometrics deals with the identification of individuals based on their biological or behavioral characteristics [1]. By using that trait to obtain a biometric enrollment, we can say that with a degree of certainty that someone is the same person in future biometric authentications based on their previous enrollment authentications [2]. A number of biometrics have been proposed, researched and evaluated for identification applications. Face is one of the most acceptable biometrics because it is one of the most common methods of identification which humans use in their interactions [1]. Face detection is the first step in face recognition system. Face detection can be regarded as a more general case of face localization. In face localization, the task is to find the locations and sizes of a known number of faces. One of the methods for face detection is Neural Networks which lies under the category of image based approach. In this paper, we focus on optimizing the RBF Neural Network for face detection. RBFNN is used to distinguish face and non-face images. The output of the network can be optimized by setting suitable values of the center and the spread of the RBF. The system will detect many faces in a large image where sliding window will run inside the image and identified whether there is a face inside the current window. 2. RADIAL BASIS FUNCTION NEURAL NETWORK RBFNN offers several advantages compared to the Multilayer Perceptrons. Two of these advantages are: 1. They can be trained using fast 2 stages training algorithm without the need for time consuming non-linear optimization techniques. 2. ANN RBF possesses the property of „best approximation‟ [9]. This means that if in the set A of approximating functions (for instance the set F(x, w) spanned by parameters w), then the RBFNN has the minimum distance from any given function of a larger set, . RBFNN had been successfully used in face detection such as in Mikami, et. al., 2003[3]. Figure 1 illustrates the architecture of the RBFNN used in this work. Figure 1: RBF Neural Network The network consists of three layers: an input layer, a hidden layer and an output layer. Here, R denotes the number of inputs while Q the number of outputs. For Q = 1, the output of the RBFNN in Figure 1 is calculated according to    1 1 21 ||)(||),( S k kk cxwwx  (1) where 1Rx x  is an input vector, (.) is a basis function, ||.|| denotes the Euclidean norm, w1k are the weights in the output layer, S1 is the number of neurons ( and centers) in the
  • 2. International Journal of Science and Engineering Applications Volume 3 Issue 4, 2014, ISSN-2319-7560 (Online) www.ijsea.com 95 hidden layer and 1Rx kc  are the RBF centers in the input vector space. Equation (1) can also be written as wxwx T )(),(   (2) where ||)](||||)(||[)( 111 SS T cxcxx    (3) and ][ 111211 S T wwww  (4) The output of the neuron in a hidden layer is a nonlinear function of the distance given by: 2 2 )(   x ex   (5) where β is the spread parameter of the RBF. For training, the least squares formula was used to find the second layer weights while the centers are set using the available data samples. 3. NETWORK TRAINING The image that to be fed into the network whether for training or testing will be normalized using a preprocessing step, adapted from [4]. In this project, image is first converted into double class in matrix form. The matrix is the converted into column matrix 1 x n. This input will be fed into the RBF network for the next process. The network is trained using 2429 face data and 4548 non- face data from the CBCL (Center For Biological and Computation Learning) train datasets [5]. K-means clustering is one of the techniques that was used to find a set of centers where the technique is more accurately reflects the distribution of the data points [6]. It is used in research such as in [3] and [7]. In k-means clustering, the number of desired centers, K, must be decided in advance. The simplest procedure for selecting the basis function centers ck is to set the center equal to the input vectors or a random subset of the input vectors from the training set but this is not an optimal procedure since it leads to the use of unnecessarily large number of basis function [6]. Broomhead et al. [8] suggested strategies for selecting RBF centers randomly from the training data. The centers of RBF can either be distributed uniformly within the region of input space for which there is data. For the training, supervised learning is used where training patterns are provided to the RBFNN together with a teaching signal or target. As for the input of face will be given the value of 1 while the input of non-face will be given the value of -1. 4. SLIDING WINDOWS Sliding window can be described as a matrix of pixels (i x j) that moves through the entire pixels of an image. In this project, both the value of x and y are 19. The matrix is smaller compared to the matrix of the image. Therefore, the matrix can be compared to many parts in the matrix of the image. The sliding window has a same size with the distribution- based model matrix. It is matched to the distribution-based model for looking the difference feature vectors. In this project, a window by the size of 19 x 19 will be used. The program will first calculate the size of the large image. Then the window will moves through the entire pixels of an image. For the image with the size of (x x y) the sliding window can be given by: for i=1:1:x-19 for j=1:1:y-19 CurrentImage=Image(j:18+j,i:18+i,1); end end Most of the image-based approaches apply a window scanning technique for detecting faces. The window scanning algorithm is in essence just an exhaustive search of the input image for possible face locations at all scales, but there are variations in the implementation of this algorithm for almost all the image-based systems. Typically, the size of the scanning window, the sub sampling rate, the step size, and the number of iterations vary depending on the method proposed and the need for a computationally efficient system. [9] 5. TESTING The system will detect many faces in a large image. The image for testing is taken from [10]. Sliding window will run inside the image and identified whether there is a face inside the current window. If a face is detected, the system will put a rectangular mark on the face. In [10] they are using new reduced set method for Support Vector Machines (SVMs). 6. RESULTS For detecting many faces in an image, setting the system with center 2 as shown in Figure 2 gives the worst result as there are too many false accept. It is hard to see whether the system detect all faces as there are too many overlapped rectangular. Increasing the value of center improved the result as the false negative becomes less as in Figure 3. For the use of center 5 and spread 10, the system cannot detect two faces and yet have two false accept. Figure 2: Using RBF with the value of Centre 2 and Spread 4
  • 3. International Journal of Science and Engineering Applications Volume 3 Issue 4, 2014, ISSN-2319-7560 (Online) www.ijsea.com 96 Figure 3: Using RBF with the value of Centre 5 and Spread 4 Figure 4: Using RBF with the value of Centre 5 and Spread 10 Starting with center 25 and above, the results are much better as the system can detect all faces in the picture without any false accept as we refer to Figure 5. But still the spread value is crucial where we can still get false accept as shown in Figure 6 and Figure 7 for center 25 and 200. Figure 5: Using RBF with the value of Centre 25 and Spread 5 Figure 6: Using RBF with the value of Centre 25 and Spread 4 Figure 7: Using RBF with the value of Centre 200 and Spread 5 For Center 200, spread value of 5 will ensure that the system detect all faces in the image without false accept as shown in Figure 7. As for spread 4, the system can detect all faces but with 2 false accept. 7. CONCLUSION In section 5, setting the center higher than 25 will ensure that all faces in the image will be detected. But still the value of spread is crucial. This can be seen in Figure 6 where there is one false accept. For 25 centers, spread equal to 4 is the best setting. But for center 200, using spread equal to 5 will ensure that the system detects all faces in the image.
  • 4. International Journal of Science and Engineering Applications Volume 3 Issue 4, 2014, ISSN-2319-7560 (Online) www.ijsea.com 97 8. ACKNOWLEDGMENTS The authors would like to express their gratitude to the Universiti Teknikal Malaysia Melaka for providing the facilities and financial assistance to conduct this research. 9. REFERENCES [1] A. Jain, R. Bolle, and S. Pankanti, “Biometrics: Personal Identifucation in Networked Society”, Springer Science+Business Media, Inc 2006. [2] P. Reid, “Biometrics for Network Security”, Pearson Education, Inc 2004. [3] T. Mikami, M. Wada, “Example-based Face Detection Using Independent Component Analysis and RBF Network”, SICE Annual Conference in Fukui, August 4- 6, 2003. [4] H. A. Rowley, S. Baluja, and T. Kanade. “Neural Network-Based Face Detection”, IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 20, no. 1, pp. 23- 38. 1998. [5] CBCL Face Database #1 MIT Center For Biological and Computation Learning http://www.ai.mit.edu/projects/cbcl [6] S. S. Abdullah, M. M. Idris, “A Short Course In Artificial Neural Networks” 2008. [7] M. J. Er, S. Wu, J. Lu, and H. L. Toh, Face Recognition With Radial Basis Function (RBF) Neural Networks, IEEE Transaction On Neural Networks, Vol. 13, No. 3, May 2002. [8] D. S. Broomhead and D. Lowe, Multivariable functional interpolation and adaptive networks, Complex Systems, vol. 2, pp 321-355. [9] E. Hjelmas, and B. K. Low, “Face Detection: A Survey” Academic Press, 2001. [10] W. Kienzle, G. Bakir, M. Franz and B. Scholkopf: Face Detection - Efficient and Rank Deficient. In: Advances in Neural Information Processing Systems 17, pg. 673- 680, 2005. [11] K.A.A. Aziz, S.S. Abdullah, R.A. Ramlee and A.N. Jahari. “Face Detection Using Radial Basis Function Neural Networks With Variance Spread Value”, The International Conference of Soft Computing and Pattern Recognition (SoCPaR 2009) Malacca, Malaysia, December 4-7, 2009. [12] K.A.A. Aziz, R.A. Hamzah, S.D.I Damni, A.N.M. Johari and S.S. Abdullah. “Face Recognition Using Fixed Spread Radial Basis Function Neural Network For Security System,”, Journal of Telecommunication, Electronic And Computer Engineering, 2011. [13] K.A.A. Aziz, R.A. Ramlee, S.I Samsudin and A.N.M. Johari. “The Effect Of Overlapping Spread Value For Radial Basis Function Neural Network In Face Detection”, Journal of Telecommunication, Electronic And Computer Engineering, 2010. [14] R.A Hamzah, S.F.A. Ghani, A. Din and K.A.A. Aziz. “Visualization of image distortion on camera calibration for stereo vision application”, Control System, Computing and Engineering (ICCSCE), 2012. [15] R.A. Ramlee, K. Azha and R.S.S. Singh. “Detecting Cholesterol Presence with Iris Recognition Algorithm”, Universiti Teknikal Malaysia Melaka (UTeM), Malaysia. [16] R.A. Hamzah, S.F. Abd Ghani, A.F. Kadmin and K.A.A. Aziz. “A practical method for camera calibration in stereo vision mobile robot navigation”, Research and Development (SCOReD), 2012. [17] R.A. Hamzah, K.A.A. Aziz, A.S.M. Shokri. “A pixel to pixel correspondence and region of interest in stereo vision application”, Computers & Informatics (ISCI), 2012. [18] K.A.A. Aziz, S.S. Abdullah and A.N.M. Johari. “Face Detection Using Radial Basis Functions Neural Networks With Fixed Spread”, International Journal of Computer Sciences and Engineering Systems, 2011.