SlideShare una empresa de Scribd logo
1 de 22
FACE RECOGNITION:
APPEARANCE BASED
APPROACHES
Pondicherry University
By:
SADIQUE
NAYEEM
2
IntroductionIntroduction
•Growing interest in biometric authentication
•National ID cards, Airport security (MRPs), Surveillance.
•Fingerprint, iris, hand geometry, gait, voice, vein and face.
•Face recognition offers several advantages over other biometrics:
•Covert operation.
•Human readable media.
•Public acceptance.
•Data required is easily obtained and readily available.
•Approaches include:
•Feature analysis, Graph matching, Appearance-Based.
Types of Face Recognition
Technique3
•Based on appearance based approach
•Direct Correlation methodmethod
•Eigenfaces methodEigenfaces method
•Fisherfaces methodFisherfaces method
4
Direct Correlation
•Involves the direct comparison of pixel intensity values taken from facial
images.
•A facial image of 65 by 82 pixels contains 5330 intensity values, describing a
point in image space.
•Similar face images are close in image space, whereas different faces are far
apart.
•The similarity of any two face images can be measured by the Euclidean
distance between the two faces in image space.
•An acceptance / rejection decision can then be made by applying a threshold
to this distance measure.
.
5
EigenfacesEigenfaces
•PCA (Principal Component Analysis) is applied to a training set
of 60 facial images and the top 59 eigenvectors with the highest
eigenvalues taken to represent face space.
•Any face image can then be projected into face space as a vector
of 59 coefficients, indicating the ‘contribution’ of each
corresponding eigenface.
•Face images are compared by calculating the Euclidean distance
between eigenvector coefficients.
Each eigenvector can be displayed as an image and due to the likeness to
faces, Turk and Pentland refer to these vectors as eigenfaces.
6
FisherfacesFisherfaces
•Similar to the Eigenface approach, yet able to account for variations
between multiple images of the same person.
•Utilises a larger training set containing multiple images of each person.
•The ratio of between-class and within-class scatter matrices is calculated.
•The eigenvectors of this matrix are then taken to formulate the projection
matrix.
•The low dimensional sub-space created maximises between-class
scatter, while minimising within-class scatter.
7
LimitationsLimitations
•Variations in lighting conditions.
•Different lighting conditions for enrolment and query.
•Bright light causing image saturation.
•Differences in pose – Head orientation.
•2D feature distances appear to distort.
•Image quality.
•CCTV, Web-cams etc. are often not good enough.
•Expression (change in feature location and shape).
•Partial occlusion (Hats, scarves, glasses etc.).
System effectiveness is highly dependant on image capture conditions.
Meaning face recognition systems are usually not as accurate as other
biometrics, producing error rates that are too high for many of the applications
in mind.
8
Possible SolutionPossible Solution
There are many image representations and filtering techniques that reduce the effect
of lighting conditions and improve image quality
•Colour normalisation
•Histogram equalisation.
•Edge detection.
•Noise reduction.
•Such methods are known to improve face recognition systems.
•However, it is not known how these improvements vary between different
approaches.
•Is there a universal filter that improves all face recognition methods?
 Baseline Results I
9
 Baseline Results II
10
 Image Pre-processing
 The  image  pre-processing  techniques that
fall under four categories:
 Color normalization
 Statistical  methods 
 Convolution  filters 
 Combinations  of  these methods.    
11
Color Normalization Techniques
12
Statistical Methods 
13
Convolution Filters 
14
Method Combinations
15
16
Test Database
960 bitmap images of 120 individuals (60 male, 60
female) extracted from the AR Face Database
provided by Martinez and Benavente [10]. All images
are translated, rotated and scaled, such that the
centres of the eyes are aligned.
The database is separated into two disjoint sets:
•The training set, (240 images: 4 images of 60
different people, captured under a variety of
lighting conditions with various facial expressions).
•The test set, (720 images: 12 images of 60
people, captured under a variety of conditions,
captured under a variety of lighting conditions with
various facial expressions).
17
Test ProcedureTest Procedure Comparing every image with every other
image provides 258,840 verification
operations to calculate false rejection rates
and false acceptance rates.
18
OutputOutput
FAR
The percentage of incorrect
acceptances - distance measures
below the threshold, when images of
different people are being compared.
FRR
The percentage of incorrect
rejections - distance measures above
the threshold when images of the
same person are being compared.
By varying the threshold we obtain error rate pairs describing a curve.
The EER is used to compare pre-processing techniques.
However, it should not be used as a guideline to the system performance
in a real world situation.
19
OptimumSystemsOptimumSystems
Fisherface - 17.8% EER
slbc processing
Direct Correlation - 18.0% EER
Intensity Normalisation
Eigenface 20.4% - EER
Intensity Normalisation
20
Equal ErrorRatesEqual ErrorRates
21
ConclusionConclusion
•All three of the systems tested are improved significantly by
application of image pre-processing techniques.
•In general the fisherface method produces the lowest error rates.
•Each system is affected differently by different pre-processing
techniques. Some techniques may improve one system while having
a detrimental effect on another.
•The most effective system uses “slbc” pre-processing technique,
when applied to the fisherface method of face recognition.
•However, this is only marginally better than the direct correlation
method.
Thank You !!!
22

Más contenido relacionado

La actualidad más candente

Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhavVaibhav P
 
A study of techniques for facial detection and expression classification
A study of techniques for facial detection and expression classificationA study of techniques for facial detection and expression classification
A study of techniques for facial detection and expression classificationIJCSES Journal
 
Face Recognition Proposal Presentation
Face Recognition Proposal PresentationFace Recognition Proposal Presentation
Face Recognition Proposal PresentationMd. Atiqur Rahman
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition SystemZara Tariq
 
Identifying unconscious patients using face and fingerprint recognition
Identifying unconscious patients using face and fingerprint recognitionIdentifying unconscious patients using face and fingerprint recognition
Identifying unconscious patients using face and fingerprint recognitionAsrarulhaq Maktedar
 
Face recognition and modeling โดย ผศ.ดร.ธนาสัย สุคนธ์พันธุ์
Face recognition and modeling โดย ผศ.ดร.ธนาสัย สุคนธ์พันธุ์Face recognition and modeling โดย ผศ.ดร.ธนาสัย สุคนธ์พันธุ์
Face recognition and modeling โดย ผศ.ดร.ธนาสัย สุคนธ์พันธุ์BAINIDA
 
Face Recognition by Sumudu Ranasinghe
Face Recognition by Sumudu RanasingheFace Recognition by Sumudu Ranasinghe
Face Recognition by Sumudu Ranasinghebiitsumudu
 
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKHUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKijiert bestjournal
 
Face Recognition
Face Recognition Face Recognition
Face Recognition nialler27
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition applicationawadhesh kumar
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyranjit banshpal
 
Dissertation final report
Dissertation final reportDissertation final report
Dissertation final reportSmriti Tikoo
 
Criminal Detection System
Criminal Detection SystemCriminal Detection System
Criminal Detection SystemIntrader Amit
 
Face Liveness Detection for Biometric Antispoofing Applications using Color T...
Face Liveness Detection for Biometric Antispoofing Applications using Color T...Face Liveness Detection for Biometric Antispoofing Applications using Color T...
Face Liveness Detection for Biometric Antispoofing Applications using Color T...rahulmonikasharma
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologySARATHGOVINDKK
 
FACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTFACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTSaghir Hussain
 

La actualidad más candente (20)

Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
A study of techniques for facial detection and expression classification
A study of techniques for facial detection and expression classificationA study of techniques for facial detection and expression classification
A study of techniques for facial detection and expression classification
 
Face Recognition Proposal Presentation
Face Recognition Proposal PresentationFace Recognition Proposal Presentation
Face Recognition Proposal Presentation
 
Week6 face detection
Week6 face detectionWeek6 face detection
Week6 face detection
 
Face recognition with age
Face recognition with ageFace recognition with age
Face recognition with age
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Identifying unconscious patients using face and fingerprint recognition
Identifying unconscious patients using face and fingerprint recognitionIdentifying unconscious patients using face and fingerprint recognition
Identifying unconscious patients using face and fingerprint recognition
 
Face recognition and modeling โดย ผศ.ดร.ธนาสัย สุคนธ์พันธุ์
Face recognition and modeling โดย ผศ.ดร.ธนาสัย สุคนธ์พันธุ์Face recognition and modeling โดย ผศ.ดร.ธนาสัย สุคนธ์พันธุ์
Face recognition and modeling โดย ผศ.ดร.ธนาสัย สุคนธ์พันธุ์
 
Face Recognition by Sumudu Ranasinghe
Face Recognition by Sumudu RanasingheFace Recognition by Sumudu Ranasinghe
Face Recognition by Sumudu Ranasinghe
 
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKHUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
 
Face Recognition
Face Recognition Face Recognition
Face Recognition
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition application
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Dissertation final report
Dissertation final reportDissertation final report
Dissertation final report
 
Criminal Detection System
Criminal Detection SystemCriminal Detection System
Criminal Detection System
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Face Liveness Detection for Biometric Antispoofing Applications using Color T...
Face Liveness Detection for Biometric Antispoofing Applications using Color T...Face Liveness Detection for Biometric Antispoofing Applications using Color T...
Face Liveness Detection for Biometric Antispoofing Applications using Color T...
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
FACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTFACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPT
 

Similar a Face recognition: A Comparison of Appearance Based Approaches

Face Recognition Techniques
Face Recognition TechniquesFace Recognition Techniques
Face Recognition TechniquesDaksh Verma
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShravan Halankar
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptxReview A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptxAravindHari22
 
Detection and recognition of face using neural network
Detection and recognition of face using neural networkDetection and recognition of face using neural network
Detection and recognition of face using neural networkSmriti Tikoo
 
IRJET- A Review on Various Approaches of Face Recognition
IRJET- A Review on Various Approaches of Face RecognitionIRJET- A Review on Various Approaches of Face Recognition
IRJET- A Review on Various Approaches of Face RecognitionIRJET Journal
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition TechnologyRutikBhoyar
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendacesbk50000
 
Local Descriptor based Face Recognition System
Local Descriptor based Face Recognition SystemLocal Descriptor based Face Recognition System
Local Descriptor based Face Recognition SystemIRJET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Foreigners Authentication Based on Multi-Biometric System for Iraq
Foreigners Authentication Based on  Multi-Biometric System for IraqForeigners Authentication Based on  Multi-Biometric System for Iraq
Foreigners Authentication Based on Multi-Biometric System for IraqA. Shamel
 
IRJET- Survey on Face Detection Methods
IRJET- Survey on Face Detection MethodsIRJET- Survey on Face Detection Methods
IRJET- Survey on Face Detection MethodsIRJET Journal
 
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...ijbuiiir1
 
Face Recognition System under Varying Lighting Conditions
Face Recognition System under Varying Lighting ConditionsFace Recognition System under Varying Lighting Conditions
Face Recognition System under Varying Lighting ConditionsIOSR Journals
 
Effectual Face Recognition System for Uncontrolled Illumination
Effectual Face Recognition System for Uncontrolled IlluminationEffectual Face Recognition System for Uncontrolled Illumination
Effectual Face Recognition System for Uncontrolled IlluminationIIRindia
 
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET TransformRotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET TransformIRJET Journal
 

Similar a Face recognition: A Comparison of Appearance Based Approaches (20)

Facial_recognition_systtem.pptx
Facial_recognition_systtem.pptxFacial_recognition_systtem.pptx
Facial_recognition_systtem.pptx
 
Face Recognition Techniques
Face Recognition TechniquesFace Recognition Techniques
Face Recognition Techniques
 
Face recognition
Face recognition Face recognition
Face recognition
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Final year ppt
Final year pptFinal year ppt
Final year ppt
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptxReview A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
 
Detection and recognition of face using neural network
Detection and recognition of face using neural networkDetection and recognition of face using neural network
Detection and recognition of face using neural network
 
IRJET- A Review on Various Approaches of Face Recognition
IRJET- A Review on Various Approaches of Face RecognitionIRJET- A Review on Various Approaches of Face Recognition
IRJET- A Review on Various Approaches of Face Recognition
 
Iris Recognition Technology
Iris Recognition TechnologyIris Recognition Technology
Iris Recognition Technology
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendace
 
Local Descriptor based Face Recognition System
Local Descriptor based Face Recognition SystemLocal Descriptor based Face Recognition System
Local Descriptor based Face Recognition System
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Foreigners Authentication Based on Multi-Biometric System for Iraq
Foreigners Authentication Based on  Multi-Biometric System for IraqForeigners Authentication Based on  Multi-Biometric System for Iraq
Foreigners Authentication Based on Multi-Biometric System for Iraq
 
IRJET- Survey on Face Detection Methods
IRJET- Survey on Face Detection MethodsIRJET- Survey on Face Detection Methods
IRJET- Survey on Face Detection Methods
 
Pattern recognition
Pattern recognitionPattern recognition
Pattern recognition
 
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
 
Face Recognition System under Varying Lighting Conditions
Face Recognition System under Varying Lighting ConditionsFace Recognition System under Varying Lighting Conditions
Face Recognition System under Varying Lighting Conditions
 
Effectual Face Recognition System for Uncontrolled Illumination
Effectual Face Recognition System for Uncontrolled IlluminationEffectual Face Recognition System for Uncontrolled Illumination
Effectual Face Recognition System for Uncontrolled Illumination
 
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET TransformRotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
 

Más de sadique_ghitm

Organizational Behaviour
Organizational BehaviourOrganizational Behaviour
Organizational Behavioursadique_ghitm
 
Digital India Initiative
Digital India Initiative Digital India Initiative
Digital India Initiative sadique_ghitm
 
Pumping lemma for regular language
Pumping lemma for regular languagePumping lemma for regular language
Pumping lemma for regular languagesadique_ghitm
 
Entity Relationship Diagrams
Entity Relationship DiagramsEntity Relationship Diagrams
Entity Relationship Diagramssadique_ghitm
 
Data Flow Diagram (DFD)
Data Flow Diagram (DFD)Data Flow Diagram (DFD)
Data Flow Diagram (DFD)sadique_ghitm
 
A Study on Face Recognition Technique based on Eigenface
A Study on Face Recognition Technique based on EigenfaceA Study on Face Recognition Technique based on Eigenface
A Study on Face Recognition Technique based on Eigenfacesadique_ghitm
 
Detecting HTTP Botnet using Artificial Immune System (AIS)
Detecting HTTP Botnet using Artificial Immune System (AIS)Detecting HTTP Botnet using Artificial Immune System (AIS)
Detecting HTTP Botnet using Artificial Immune System (AIS)sadique_ghitm
 
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...sadique_ghitm
 
Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...
Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...
Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...sadique_ghitm
 
A study on face recognition technique based on eigenface
A study on face recognition technique based on eigenfaceA study on face recognition technique based on eigenface
A study on face recognition technique based on eigenfacesadique_ghitm
 
Design and analysis of a mobile file sharing system for opportunistic networks
Design and analysis of a mobile file sharing system for opportunistic networksDesign and analysis of a mobile file sharing system for opportunistic networks
Design and analysis of a mobile file sharing system for opportunistic networkssadique_ghitm
 
A hybrid genetic algorithm and chaotic function model for image encryption
A hybrid genetic algorithm and chaotic function model for image encryptionA hybrid genetic algorithm and chaotic function model for image encryption
A hybrid genetic algorithm and chaotic function model for image encryptionsadique_ghitm
 
A controlled experiment in assessing and estimating software maintenance tasks
A controlled experiment in assessing and estimating software maintenance tasks A controlled experiment in assessing and estimating software maintenance tasks
A controlled experiment in assessing and estimating software maintenance tasks sadique_ghitm
 

Más de sadique_ghitm (17)

Attitude
AttitudeAttitude
Attitude
 
Personality
PersonalityPersonality
Personality
 
Organizational Behaviour
Organizational BehaviourOrganizational Behaviour
Organizational Behaviour
 
Digital India Initiative
Digital India Initiative Digital India Initiative
Digital India Initiative
 
Pumping lemma for regular language
Pumping lemma for regular languagePumping lemma for regular language
Pumping lemma for regular language
 
Entity Relationship Diagrams
Entity Relationship DiagramsEntity Relationship Diagrams
Entity Relationship Diagrams
 
Data Flow Diagram (DFD)
Data Flow Diagram (DFD)Data Flow Diagram (DFD)
Data Flow Diagram (DFD)
 
A Study on Face Recognition Technique based on Eigenface
A Study on Face Recognition Technique based on EigenfaceA Study on Face Recognition Technique based on Eigenface
A Study on Face Recognition Technique based on Eigenface
 
Detecting HTTP Botnet using Artificial Immune System (AIS)
Detecting HTTP Botnet using Artificial Immune System (AIS)Detecting HTTP Botnet using Artificial Immune System (AIS)
Detecting HTTP Botnet using Artificial Immune System (AIS)
 
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...
Handling of Incident, Challenges, Risks, Vulnerability and Implementing Detec...
 
Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...
Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...
Study and Analysis of Novel Face Recognition Techniques using PCA, LDA and Ge...
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
A study on face recognition technique based on eigenface
A study on face recognition technique based on eigenfaceA study on face recognition technique based on eigenface
A study on face recognition technique based on eigenface
 
Design and analysis of a mobile file sharing system for opportunistic networks
Design and analysis of a mobile file sharing system for opportunistic networksDesign and analysis of a mobile file sharing system for opportunistic networks
Design and analysis of a mobile file sharing system for opportunistic networks
 
A hybrid genetic algorithm and chaotic function model for image encryption
A hybrid genetic algorithm and chaotic function model for image encryptionA hybrid genetic algorithm and chaotic function model for image encryption
A hybrid genetic algorithm and chaotic function model for image encryption
 
A controlled experiment in assessing and estimating software maintenance tasks
A controlled experiment in assessing and estimating software maintenance tasks A controlled experiment in assessing and estimating software maintenance tasks
A controlled experiment in assessing and estimating software maintenance tasks
 
Holographic Memory
Holographic MemoryHolographic Memory
Holographic Memory
 

Último

On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxdhanalakshmis0310
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 

Último (20)

On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 

Face recognition: A Comparison of Appearance Based Approaches

  • 2. 2 IntroductionIntroduction •Growing interest in biometric authentication •National ID cards, Airport security (MRPs), Surveillance. •Fingerprint, iris, hand geometry, gait, voice, vein and face. •Face recognition offers several advantages over other biometrics: •Covert operation. •Human readable media. •Public acceptance. •Data required is easily obtained and readily available. •Approaches include: •Feature analysis, Graph matching, Appearance-Based.
  • 3. Types of Face Recognition Technique3 •Based on appearance based approach •Direct Correlation methodmethod •Eigenfaces methodEigenfaces method •Fisherfaces methodFisherfaces method
  • 4. 4 Direct Correlation •Involves the direct comparison of pixel intensity values taken from facial images. •A facial image of 65 by 82 pixels contains 5330 intensity values, describing a point in image space. •Similar face images are close in image space, whereas different faces are far apart. •The similarity of any two face images can be measured by the Euclidean distance between the two faces in image space. •An acceptance / rejection decision can then be made by applying a threshold to this distance measure. .
  • 5. 5 EigenfacesEigenfaces •PCA (Principal Component Analysis) is applied to a training set of 60 facial images and the top 59 eigenvectors with the highest eigenvalues taken to represent face space. •Any face image can then be projected into face space as a vector of 59 coefficients, indicating the ‘contribution’ of each corresponding eigenface. •Face images are compared by calculating the Euclidean distance between eigenvector coefficients. Each eigenvector can be displayed as an image and due to the likeness to faces, Turk and Pentland refer to these vectors as eigenfaces.
  • 6. 6 FisherfacesFisherfaces •Similar to the Eigenface approach, yet able to account for variations between multiple images of the same person. •Utilises a larger training set containing multiple images of each person. •The ratio of between-class and within-class scatter matrices is calculated. •The eigenvectors of this matrix are then taken to formulate the projection matrix. •The low dimensional sub-space created maximises between-class scatter, while minimising within-class scatter.
  • 7. 7 LimitationsLimitations •Variations in lighting conditions. •Different lighting conditions for enrolment and query. •Bright light causing image saturation. •Differences in pose – Head orientation. •2D feature distances appear to distort. •Image quality. •CCTV, Web-cams etc. are often not good enough. •Expression (change in feature location and shape). •Partial occlusion (Hats, scarves, glasses etc.). System effectiveness is highly dependant on image capture conditions. Meaning face recognition systems are usually not as accurate as other biometrics, producing error rates that are too high for many of the applications in mind.
  • 8. 8 Possible SolutionPossible Solution There are many image representations and filtering techniques that reduce the effect of lighting conditions and improve image quality •Colour normalisation •Histogram equalisation. •Edge detection. •Noise reduction. •Such methods are known to improve face recognition systems. •However, it is not known how these improvements vary between different approaches. •Is there a universal filter that improves all face recognition methods?
  • 11.  Image Pre-processing  The  image  pre-processing  techniques that fall under four categories:  Color normalization  Statistical  methods   Convolution  filters   Combinations  of  these methods.     11
  • 16. 16 Test Database 960 bitmap images of 120 individuals (60 male, 60 female) extracted from the AR Face Database provided by Martinez and Benavente [10]. All images are translated, rotated and scaled, such that the centres of the eyes are aligned. The database is separated into two disjoint sets: •The training set, (240 images: 4 images of 60 different people, captured under a variety of lighting conditions with various facial expressions). •The test set, (720 images: 12 images of 60 people, captured under a variety of conditions, captured under a variety of lighting conditions with various facial expressions).
  • 17. 17 Test ProcedureTest Procedure Comparing every image with every other image provides 258,840 verification operations to calculate false rejection rates and false acceptance rates.
  • 18. 18 OutputOutput FAR The percentage of incorrect acceptances - distance measures below the threshold, when images of different people are being compared. FRR The percentage of incorrect rejections - distance measures above the threshold when images of the same person are being compared. By varying the threshold we obtain error rate pairs describing a curve. The EER is used to compare pre-processing techniques. However, it should not be used as a guideline to the system performance in a real world situation.
  • 19. 19 OptimumSystemsOptimumSystems Fisherface - 17.8% EER slbc processing Direct Correlation - 18.0% EER Intensity Normalisation Eigenface 20.4% - EER Intensity Normalisation
  • 21. 21 ConclusionConclusion •All three of the systems tested are improved significantly by application of image pre-processing techniques. •In general the fisherface method produces the lowest error rates. •Each system is affected differently by different pre-processing techniques. Some techniques may improve one system while having a detrimental effect on another. •The most effective system uses “slbc” pre-processing technique, when applied to the fisherface method of face recognition. •However, this is only marginally better than the direct correlation method.