SlideShare una empresa de Scribd logo
1 de 8
Descargar para leer sin conexión
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 791
Development of Real Time Face Recognition System Using OpenCV
D. Mary Prasanna 1, Ch. Ganapathy Reddy 2
1 PG Student, Dept of ECE (DECS), G.Narayanamma Institute of Technology & Science for women,
Hyderabad, TS, India
2 Professor, Dept of ECE , G.Narayanamma Institute of Technology & Science for women,
Hyderabad, TS, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - A real-time, GUI based automatic Face detection
and recognition system is developed in this project. It can be
used as access control system by registering the staff or
students of an organization with their faces, and later it will
recognize the people by capturing their images with faces,
when they are entering or leaving the premises. The system is
implemented on a desktop with a Graphical User Interface,
Initially it detects the faces in the images that are grabbed
from a web camera. All the tools and operating, used to
develop this system like Ubuntu, openFace, Python…, areopen
source tools.
This real time GUI based face recognition system is
developed using Open source tool Open face. Open Face is the
face recognition tool developed by CarnegieMellonUniversity,
using OpenCV. Open Face, consists in a broader Prospective,
three phases: Detection, Feature extraction, and Recognition.
The dimensionality of face image is reduced by the Histogram
of Oriented Gradients (HOG)andthisalgorithmis developed to
detect frontal views of faces. After detecting the face part of
image, extract the 128 face features for the given image by
using a Deep Neural Network algorithm and therecognitionis
done by the Support Vector machine (SVM) classifier. HOG is
one of the most popular representation methods for a face
image. It not only reduces the dimensionalityoftheimage, but
also extracting the facial features of the given images, and
retains some of the variations in the image data. So
dimensionality of face image reduced by HOG using deep
learning algorithm and recognition is done by SVM approach.
Key Words: Face Recognition, HOG, DNN, SVM, Open Face,
OpenCV, GUI
1. INTRODUCTION
Face Recognition is used to recognize a person by using
some features of that particular person’s face, by matching
with stored models of each individual face in a group of
people. Face recognition is the natural way of identification
and authenticating a person. Face Recognition plays an
important role in human’s day-to-day communication and
daily lives. Security and authentication of a person is crucial
in any industry or establishment. So,intoday’senvironment,
there is a great deal of interest in automatic face recognition
using computers or devices for verification of identities
round the clock and sometimes remotely. Face recognition
has become one of the most challenging and interesting
problems in the pattern recognition and image processing.
1.1 Motivation
Face biometrics are useful for a person’s authentication,
which is asimple and non-intrusivemethod.Facerecognition
have substantial potential in two areas: a) it can help the
users to caught criminals and terrorists. b) It can be used in
controlling access to areaswheresecurityrisksareespecially
high c) It can also be used for automatic access control. High
security is requiredforaccumulationofdataandinformation.
Government can use it for Law enforcement, Voter
Verification, Security, Immigration, Legislature, prisons,
Benefit Payments and to find out Missing Children and
robbers. It can also be used in the Commercial applications
like Banking, Gaming Industry, ResidentialSecurity,Internet,
E-commerce, and Health Care.
Therefore it expected to have lot of demand for real time
face recognition systems for access control and not only for
investigation of unlawful activities, it will be also useful to
stop the of unlawful or terrorist activities.However,ifitisnot
a real system, we can detect the activity after the incident is
occurred but we cannot stop/prevent it before it happens. If
the Face recognition systems to be used to stop any unlawful
or terrorism activity or use it for access control, an user
friendly real time face recognition system is required.
1.2 Problem Statement
The Aim of the Project is to develop a real time GUI based
face recognition system that would use a camera to view the
outside world and then detect and recognize the individual
faces in the scene by using Open Face. Open Face is the face
recognition tool developed using OpenCV, an open source
library of modules for Computer Vision and Machine
Learning written in C++.
2. LITERATURE SURVEY
This Research work is concentrates on face recognition
problem as a part of biometric attendance system.
Face recognition has been an active research area over
last 30 years. This Research spansseveral disciplines suchas
image processing, pattern recognition, computer vision,and
neural networks. Face recognitionhasapplicationsmainlyin
the fields of biometrics, access control,lawenforcement,and
security and surveillance systems.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 792
The problem of face recognition can be stated as follows:
Given still images or video ofa scene, identifying oneormore
persons in the scene by using a stored database of faces. The
problem is mainly a classification problem. Training the face
recognition system with images from the known individuals
and classifying the newly coming test images into one of the
classes is the main aspect of the face recognition systems.
This Problem seems to be easilysolvedbyhumanswhere
limited memory can be the main problem; whereas the
problems for a machine face recognition system are:
 Facial Expression Change
 Illumination Change
 Aging
 Pose change
 Scaling factor
 Presence and absence of spectacles, beard,
mustache etc.
 Occlusion due to scarf, mask or obstacles in front.
The problem of automatic face recognition (AFR) is a
composite task that involves detection of faces from a
cluttered background, facial feature extraction, and face
identification. A complete face recognition system has to
solve all sub problems, where each one isaseparateresearch
problem. This research work concentrates on the problemof
facial feature extraction and face identification.
Most of the current face recognition algorithms can be
categorized into two classes, image template based and
geometry feature-based. The template based methods
compute the correlation between a face and one or more
model templates to estimate the face identity. Whereas
feature based methods extract local facial features and use
their geometric and appearance properties.
The face is our primary focus of attention in social
intercourse, playing a major role in conveying identity and
emotion. We can recognize thousands of faces learned
throughout our lifetime and identify familiar faces at a
glance after years of separation. Computational models of
face recognition, in particular, are interesting because they
can contribute not only to theoretical insights but also to
practical applications.
Computers that recognize faces could be applied to a
wide variety of problems, including criminal identification,
security systems, image and film processing, and human
computer interaction. Unfortunately, developing a
computational model of face recognition is quite difficult,
because faces are complex, multidimensional, and
meaningful visual stimuli. Eigen face is a face recognition
approach that can locate and track a subject'shead,andthen
recognize the person by comparing characteristics of the
face to those of known individuals.
3. DEMOS IN OPENFACE
Open Face is core provides a feature extraction method to
obtain a low-dimensional representation of any face.
Demos/classifier.py shows a demo of how these
representations can be used to create a face classifier.
In Open Face, to measure the systemperformancewe are
having four real time demos. They are
 Real time web demo
 Comparison demo
 Training a classifier
 Real time Sphere Visualization
3.1 Real Time web demo
Real time web demo shows the full face recognition
pipeline .In Practice, object trackinglikedlib’sshouldbeused
once the face recognizer has predicted a face.
In the edge case when a single person is trained, the
classifier has no knowledge of other people and labels
anybody with the name of the trained person.
The web demo does not predict unknown users and the
saved faces are only available for the browser session. If
you're interested in predicting unknown people, one idea is
to use a probabilistic classifier to predict confidence scores
and then call the prediction unknown if the confidence is too
low.
The drawback of this real time web demo is:
i. The data base is stored in Google Server.
ii. Once the browser is closed the completedatawillbe
erased.
Fig 1: Real time web demo
3.2 Comparison demo
Here in comparisondemo, wearecomparingtheimages
of two persons with two images of each. To compare the
images of two persons we are calculating the Euclidian
Distance (L2 Distance). If the Squared L2 distance between
representations is less than one then it will be identified as
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 793
same person, Otherwise it will recognized as different
Person.
Fig 2: Comparing of two images
The following distance between images of Prasanna and
Trishutha were generated with ./demos/compare
images/examples/{Prasanna*, Trishutha*} in openface.
Table 1: Comparison demo of two images
3.3 Training a classifier
Open face is core provides a feature extractionmethodto
obtain a low-dimensional representations of any face.
Demos/classifier.py shows a demo of how these
representations can be use to createa faceclassifier.Thereis
a distinction between training the DNN model for feature
representation and training a model for classifying people
with the DNN model.
Fig 3: Classification and similarity detection
To Train a classifier we follow the steps given below:
1. Encodea pictureusingtheHOGalgorithmtocreatea
simplified version of the image. Usingthissimplified
image, find the face part of theimagethatmostlooks
like a generic HOG encoding of a face.
2. Figure out the pose of the face by finding the main
landmarks in the face. Once we find those
landmarks, use them to warp the image so that the
eyes and mouth are centered.
3. Pass the centered face image through a neural
network that knows how to measure features of the
face. Then forevery input image it will generate128
measurements.
4. After generating 128 measurements for the given
input image, SVM classifier is used to recognize new
face.
Create a classification model:
1. Create raw image directory
Create a directory for your raw images so that images
from different people are in different subdirectories. The
names of the labels or images donotmatter,and eachperson
can have a different amount of images. The imagesshouldbe
formatted as jpg or png.
2. Preprocess the raw images
Here for the given input image , it will detecttheface part
of the given image and apply the affine transform for the
given image. Then extract the features of givenimage,finally
it will aligned (crop) the face part of that particular image.
3. Generate Representations
In this we are generating the 128 facial features of each
and every input image. And it will creates the labels and
representations of all images.
4. Classification Model
After generating the face features,thesystem will classify
how many people present in the data base. Suppose in my
system I am trained 20 persons each of 20 images, then the
system will recognized as 20 classifiers are present in the
classification model.
After Generating classifier.pkl, The Test images are
compared with the database. If the given image is in the
training , then it will recognize the particular person name
with confidence. Otherwise it will recognizeasunabletofind
a face image.
mage 1 Image 2 Distance
Prasanna1 Prasanna2 0.474
Prasanna1 Trishutha1 1.045
Prasanna1 Trishutha2 1.370
Prasanna2 Trishutha1 1.352
Prasanna2 Trishutha2 1.470
Trishutha1 Trishutha2 0.152
Input
Image
Transform Crop
Image
DNN
128D
features
Clustering
Similarity Detection
Classification
Detect
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 794
3.4 Real Time Sphere Visualization
This Real time display is using the Open Face facial
recognition system. It is analysing the stream of information
coming into the computer from thecamera,lookingforfaces.
When a face is found, a rectangle is placed around it on the
screen. When more than one person is identified, it
differentiates between them with separate colours. The
system also represents the face as points on a sphere, as
shown in the figure. Similar faces (like identical twins) will
be represent nearer to one another on the sphere than the
faces that are more visually different. Here the computer
uses 128 dimensions to represent the faces instead of the
just three physical dimensions represented by the sphere.
Table 1: Accuracy Table for 15 Training-images each of 4
Test-Images
Fig 4: Real time sphere visualization in CMU Open face.
The above fig shows Real time sphere visualization in
cmu open face. In this it will detect and recognize the face
part of the particular person who ever present in frontofthe
web camera. And whenever the person want to move the
positions (like rotation, bending etc.) then the sphere
positions will also move based on the Person movements.
If two or more persons present in front of the camera,
then it will identify the number of persons. After identifying
number of persons; it will detectandrecognizethefaceparts
of the given image. Then for each & every person it will
detect the face part and appear bounding boxes with
different colors. If the Persons want to move the positions
then the sphere positions will also move based on the
persons movements.
4. PROPOSED SYSTEM
How to build the Open Face is explained in the previous
Case. The potential for building Face Recognition systems
using Open Face is shown by the examples given at CMU
website only. Now how to build a face recognition system,
suitable for our institution or foranyotherapplication,using
open Face will be explained in this chapter with the example
of building a face recognition system built for our unit
(NERTU, OU).
Once open face is installed and readytorun,thefollowing
steps are required to build a face recognition system.
1. Building database by registering the faces of the people to
recognized.
2. Detection of Faces from the images of registered people
and extraction of facial features from the detected faces.
3. Recognition face in the test image with SVM classifier.
Once the open face is installed the required modules or
software’s will be readily available to complete these three
tasks.
To check whether the system is working properly or not,
initially a face recognition system for NERTU having 15
people (staff and students)is builtandthesame procedureis
explained below. Then after that we have built a real time
system with GUI.
Twenty images having the face of each person, for 15
people are collected using CHEESE software, which is an
open source tool developed by Daniel G. Siegel
So, this database contains 300 face images. It consists of
each person with 20 different poses like smiling, looking
serious, head bend, eyes moving and closing eyes with very
small variations in the database. Totally300imagesareused
for training and 60 images are used for testing. Here I will
show the result of 15 persons with 20 images.
Here I am not taking any real time pictures. So, the
accuracies will be different. To improve the accuracy,
increase the number of training images of eachperson.Then
after improving data base I will get betterresultswhichIwill
trained manually in my system. Now I Build a real time GUI
based Face Recognition System.
S.No Training-
Images (20)
Test-
Images
Accuracy
(%)
1 Achala 4 100
2 Buvana 4 75
3 Divya 4 75
4 Harika 4 50
5 Majid 4 100
6 Mallesh 4 25
7 Mounika 4 75
8 PLN 4 100
9 Prasanna 4 75
10 Prathap 4 25
11 Ranadheer 4 50
12 Rekha 4 100
13 Renuka 4 75
14 Santhi 4 75
15 Trishutha 4 50
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 795
REMARKS:
The accuracy of some of the people in the above table is less
due the following reasons.
 Some people are having so much of Pose Variations,
which is not present in the training-image folder.
 For Poor Illumination & Brightness conditions
 Because of Expressions, the accuraciesmayvaryfor
each and every individual.
4.1 Need for an automated System
Today there is a rising need for systems that assist in
security and surveillance. The authentication of individuals
can no longer be done efficiently by manual methods. For
example, consider a concert of a famousmusicianthatincurs
huge response with, let us say, 10,000 people attending the
show. Imagine guards standing at the front doors, manually
letting people in, after checking their tickets. They should
check the authenticity of the ticket and also verify if it is the
same person. This would surely demand a huge manpower.
Also, it is extremely tedious to authenticate a crowd as large
as 10,000 people leading to delay in schedule and, not to
mention, high probability of occurrence of errors resulting
from common mistakes by humans. We,thus,need machine-
controlled systems that perform the given task efficiently in
a short duration of time with minimal human intervention.
Face recognition based authenticationisveryneartonatural
way of authentication by people. So in this chapter, a real
time GUI based face recognition system built by me is
explained below. There are several ways in which this
automation of monitoring systems can be achieved.
4.2 Graphical User Interface
The graphical user interface (GUI), is a type of user
interface that allows users to interact with electronic
devices throughgraphical icons andvisual indicatorssuchas
secondary notation, instead of text-based user interfaces,
typed command labels or text navigation. GUIs were
introduced in reaction to the perceived steep learning
curve of command-line interfaces (CLIs), which require
commands to be typed on a computer keyboard.
The actions in a GUI areusuallyperformedthrough direct
manipulation of the graphical elements. Beyond computers,
GUIs are used in many hand held mobile devices such
as MP3 players, portable media players, gaming
devices, smart phones and smaller household, office
and industrial controls. The term GUI tendsnotto beapplied
to other lower-display resolution types of interfaces, such
as video games (where heads-up display (HUD) is
preferred), or not including flat screens, like volumetric
displays because the term is restricted to the scope of two-
dimensional display screens able to describe generic
information, in the tradition of the computer
science research at the Xerox Palo Alto Research Center
(PARC).
Designing the visual composition and temporal behavior
of a GUI is an important part of software application
programminginthearea of human–computerinteraction. Its
goal is to enhance the efficiency and ease of use for the
underlying logical design of a stored program, a design
discipline named usability. Methods of user-centered
design are used to ensure that the visual language
introduced in the design is well-tailored to the tasks.
Here GUI is developed using Gui. Here I built a real time
system is developed using Qt Designer. In this GUI based
Real time Face Recognition system we are mainly focusing
on two phases
 Training Phase
 Test Phase
Fig 5: Real time Face Recognition System display
Figure 5 shows the Real time face recognition system
display. In Training Phase it is divided in to two parts:
1.Capture
2.Train
CAPTURE:
For building the training database in real time,tocapture
the images of a person, first we are enter the person name,
then the system will capture the images of that Particular
Person standing in front of camers. ForCapturingimagesthe
following code is used:
def capture_Image(self):
i=1
camera=cv2.VideoCapture(0)
while(i<=10):
if not os.path.exists('openface/training-images'):
print 'hello'
os.mkdir('openface/training-images')
name=self.lineEdit.text()
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 796
if not os.path.exists('openface/training-images/' + name):
os.mkdir('openface/training-images/' + name)
ret, image=self.camera.read()
imagename='openface/training-images/' + name + '/' +
str(i) + '.jpg'
print imagename
How to capture the images in a real time based GUI
System is given below.
Fig 6: Enter the name of the person as Prasanna
Fig 7: Press the button Capture to Capture the images into
a folder Prasanna
Fig 8: Enter the name of the person as Harika
Fig 9: Press the button Capture to Capture the images into
a folder Harika
TRAINING PHASE:
After Capturing training images of all thepeople,wehave
to train the system to obtain face models for all people. The
training procedure is already explained in the previous
section.CMU Openface having some models for detecting
faces in the images. The shape of the faces is almost similar,
throughout the world. So, using those training models, our
system is trained which is for detecting faces.
For building the models for recognition of faces, the
features should be extracted before obtainingthe modelsfor
every person. The following script will extract the features
and build the models for every person with the face aligned
images or faces detected. Here for each and every aligned-
image, 128 features are generated.
Shell script for Training (Train_script.sh) :
#!/usr/bin/sh
./util/align-dlib.py openface/training-images/ align
outerEyesAndNose ./aligned-images/ --size 96
./batch-represent/main.lua-outDir./generated-embeddings/
-data ./aligned-images/
./demos/classifier.py train ./generated-embeddings/
Fig 10: Training the database for Face Recognition system
for NERTU
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 797
Figure 10 shows the trainingthedatabaseFaceRecognition
system for NERTU. After completing the training,
As a separate face model is available for every person of
the institute it can used for recognizing those people, who
are coming in front of camera.
TEST PHASE:
Here in case of testing, whenever we click on test button
it will take the test image by using webcam. Then for the
following code will run for recognition of people coming in
front of camera:
def test_cap_Image(self):
i=1
camera=cv2.VideoCapture(0)
while(i<2):
if not os.path.exists('./test-images'):
print 'hello'
os.mkdir('./test-images')
name=self.lineEdit.text()
if not os.path.exists('./test-images/'):
os.mkdir('./test-images/' + name)
ret, image=self.camera.read()
imagename='./test-images/' + str(i) + '.jpg'
print imagename
## cv2.imshow('test',image)
cv2.imwrite(str(imagename),image)
After click on the test button, the system will recognize
the person name with confidence. Otherwise displayed as
Unknown Person.
Fig 11: Recognizing Test image as Prasanna
Fig 12: Recognizing Test image as Harika
In case of testing two or more persons are present in the
system at a time, then the system will recognize the person
name as who ever present in the right side.
Fig 13: Recognizing the test-image when two persons are
present in front of the camera
For continuous loop of testing images we are using start
recognition and stop recognition. Finally, to exit from face
recognition application, simply click on exit button in the
face recognition system.
Fig 14: Press the exit button to exit from face recognition
application
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 798
5. CONCLUSION
Face recognition technologies have been associated
generally with very costly top secure applications.Today the
core technologies have evolvedandthecostofequipmentsis
going down dramatically due to the integration and the
increasing processing power. Certain applications of face
recognition technology are now cost effective, reliable and
highly accurate.
The project deals with the implementation of a Face
Recognition System Using GUI. Various algorithms for
detection and recognition of a face in a given image have
been discussed as a part of the Literature . The algorithm
that has been used for Face Detection in this project makes
use of the detecting the face part by Using HOG algorithm,
here in this each and every pixel is compared with
neighboring pixels and then it will detect the image with 68
landmarks by using face land mark algorithm; After
detecting the face part of the given input image, we are
extracting the 128 features/ embeddings by using Deep
Neural network concept. Then for recognition we are using
SVM Classifier to identify the person. Here in this project we
are developing a real time GUI based Face recognition
system and further it will be useful fordevelopinga real time
face based Biometric attendance system.
REFERENCES
[1] FaceNet: A Unified Embedding for Face Recognition and
Clustering. Florian Schrof, Dmitry Kalenichenko, James
Philbin. s.l. : IEEE Xplore, 2015. pp. 815-823.
[2] Face recognition: challenges, achievements and future
directions. Aly, M. Hassaballah and S. 4, s.l. : IET, DOI:
10.1049/iet-cvi.2014.0084, JULY 30, 2015, Vol. 9, pp.
614-626. ISSN: 1751-9632.
[3] Facial Recognition using OpenCV. Shervin Emami,
Valentin Petru. 1, Australia : JMEDS, 2012, Journal of
Mobile, Embedded and Distributed Systems, Vol. 4, pp.
38-43. ISSN 2067 – 4074.
[4] Face Detection and Tracking using OpenCV. S.V.
Viraktamath, Mukund Katti, Aditya Khatawkar, Pavan
Kulkarni. 3, s.l. : SIJ, July-August 2013, The Standard
International Journals (The SIJ) , Vol. 1, pp. 45-50. ISSN:
2321 – 2403 .
[5] Implementation of Face Recognition Algorithm for
Biometric Time based AttendanceSystem. AdrianRhesa
Septian Siswanto, Anto Satriyo Nugroho, Maulahikmah
Galinium. Bandung, Indonesia : IEEE, DOI:
10.1109/ICTSS.2014.7013165,2014.2014International
Conference on ICT For Smart Society (ICISS). pp. 149-
154. ISBN: 978-1-4799-6321-8.
[6] Security of biometric authentication systems. V.Matyas,
Z.Riha. Krackow : IEEE, DOI:
10.1109/CISIM.2010.5643698,2010.2010International
Conference on Computer Information Systems and
Industrial Management Applications (CISIM).pp.19-28.
ISBN: 978-1-4244-7817-0.
[7] Jain, Anil, Ross, Arun A., Nandakumar, Karthik.
Introduction to Biometrics. Newyork : Springer, 2011.
ISBN 978-0-387-77326-1.
[8] Histograms of oriented gradients for human detection.
Triggs, N. Dalal and B. USA : IEEE, DOI:
10.1109/CVPR.2005.177,2005.IEEEComputerSociety
Conference on Computer Vision and Pattern
Recognition (CVPR'05). pp. 886-893. ISSN:1063-6919.
[9] Prathamesh Timse, Pranav Aggarwal, Prakhar Sinha,
Neel Vora. Face Recognition Based Door Lock System
Using Opencv and C#. April 2014, Vol. 4, 4, pp. 52-57.
[10] Face Detection in Real Time Based on HOG. N. J. Wang,
S. C. Chang and P. J. Chou. Taipei, Taiwan : IEEE, DOI:
10.1109/ISPACS.2012.6473506, 2012. International
Symposium on Intelligent Signal Processing and
Communications Systems. pp. 333-337. ISBN: 978-1-4673-
5081-5.
BIOGRAPHIES
D Mary Prasanna
Post-Graduate Student, Dept. of
ECE, G. Narayanamma Institute of
Technology & Science, Shaikpet,
Hyderabad, India-500008.
Ch Ganapathy Reddy
Professor, Dept. of ECE, G.
Narayanamma Institute of
Technology & Science, Shaikpet,
Hyderabad, India-500008.

Más contenido relacionado

La actualidad más candente

IRJET- Credit Card Authentication using Facial Recognition
IRJET-  	  Credit Card Authentication using Facial RecognitionIRJET-  	  Credit Card Authentication using Facial Recognition
IRJET- Credit Card Authentication using Facial RecognitionIRJET Journal
 
IRJET - Chatbot with Gesture based User Input
IRJET -  	  Chatbot with Gesture based User InputIRJET -  	  Chatbot with Gesture based User Input
IRJET - Chatbot with Gesture based User InputIRJET Journal
 
Automatic Attendance Using Face Recognition
Automatic Attendance Using Face RecognitionAutomatic Attendance Using Face Recognition
Automatic Attendance Using Face Recognitionrahulmonikasharma
 
Paper id 25201496
Paper id 25201496Paper id 25201496
Paper id 25201496IJRAT
 
Face Recognition Based Attendance System using Machine Learning
Face Recognition Based Attendance System using Machine LearningFace Recognition Based Attendance System using Machine Learning
Face Recognition Based Attendance System using Machine LearningYogeshIJTSRD
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methodsIRJET Journal
 
IRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using AndroidIRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using AndroidIRJET Journal
 
Face Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image ProcessingFace Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image Processingpaperpublications3
 
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSINGAN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSINGijiert bestjournal
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognitionMazin Alwaaly
 
ADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCA
ADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCAADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCA
ADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCAIAEME Publication
 
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D Faces
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D FacesDepth-Image-based Facial Analysis between Age Groups and Recognition of 3D Faces
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D FacesIDES Editor
 
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET Journal
 
IRJET- Intelligent Automated Attendance System based on Facial Recognition
IRJET-  	  Intelligent Automated Attendance System based on Facial RecognitionIRJET-  	  Intelligent Automated Attendance System based on Facial Recognition
IRJET- Intelligent Automated Attendance System based on Facial RecognitionIRJET Journal
 
Face Recognition Based Attendance System with Auto Alert to Guardian using Ca...
Face Recognition Based Attendance System with Auto Alert to Guardian using Ca...Face Recognition Based Attendance System with Auto Alert to Guardian using Ca...
Face Recognition Based Attendance System with Auto Alert to Guardian using Ca...ijtsrd
 
Dissertation final report
Dissertation final reportDissertation final report
Dissertation final reportSmriti Tikoo
 
IRJET- Customized Campus Surveillance System
IRJET- Customized Campus Surveillance SystemIRJET- Customized Campus Surveillance System
IRJET- Customized Campus Surveillance SystemIRJET Journal
 
Attendance Using Facial Recognition
Attendance Using Facial RecognitionAttendance Using Facial Recognition
Attendance Using Facial RecognitionVikramaditya Tarai
 
Face Recognition Based Automated Student Attendance System
Face Recognition Based Automated Student Attendance SystemFace Recognition Based Automated Student Attendance System
Face Recognition Based Automated Student Attendance Systemijtsrd
 

La actualidad más candente (20)

IRJET- Credit Card Authentication using Facial Recognition
IRJET-  	  Credit Card Authentication using Facial RecognitionIRJET-  	  Credit Card Authentication using Facial Recognition
IRJET- Credit Card Authentication using Facial Recognition
 
IRJET - Chatbot with Gesture based User Input
IRJET -  	  Chatbot with Gesture based User InputIRJET -  	  Chatbot with Gesture based User Input
IRJET - Chatbot with Gesture based User Input
 
Automatic Attendance Using Face Recognition
Automatic Attendance Using Face RecognitionAutomatic Attendance Using Face Recognition
Automatic Attendance Using Face Recognition
 
Paper id 25201496
Paper id 25201496Paper id 25201496
Paper id 25201496
 
Face Recognition Based Attendance System using Machine Learning
Face Recognition Based Attendance System using Machine LearningFace Recognition Based Attendance System using Machine Learning
Face Recognition Based Attendance System using Machine Learning
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methods
 
Mini Project- Face Recognition
Mini Project- Face RecognitionMini Project- Face Recognition
Mini Project- Face Recognition
 
IRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using AndroidIRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using Android
 
Face Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image ProcessingFace Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image Processing
 
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSINGAN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
 
ADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCA
ADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCAADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCA
ADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCA
 
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D Faces
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D FacesDepth-Image-based Facial Analysis between Age Groups and Recognition of 3D Faces
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D Faces
 
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric Learning
 
IRJET- Intelligent Automated Attendance System based on Facial Recognition
IRJET-  	  Intelligent Automated Attendance System based on Facial RecognitionIRJET-  	  Intelligent Automated Attendance System based on Facial Recognition
IRJET- Intelligent Automated Attendance System based on Facial Recognition
 
Face Recognition Based Attendance System with Auto Alert to Guardian using Ca...
Face Recognition Based Attendance System with Auto Alert to Guardian using Ca...Face Recognition Based Attendance System with Auto Alert to Guardian using Ca...
Face Recognition Based Attendance System with Auto Alert to Guardian using Ca...
 
Dissertation final report
Dissertation final reportDissertation final report
Dissertation final report
 
IRJET- Customized Campus Surveillance System
IRJET- Customized Campus Surveillance SystemIRJET- Customized Campus Surveillance System
IRJET- Customized Campus Surveillance System
 
Attendance Using Facial Recognition
Attendance Using Facial RecognitionAttendance Using Facial Recognition
Attendance Using Facial Recognition
 
Face Recognition Based Automated Student Attendance System
Face Recognition Based Automated Student Attendance SystemFace Recognition Based Automated Student Attendance System
Face Recognition Based Automated Student Attendance System
 

Similar a Development of Real Time Face Recognition System using OpenCV

Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face RecognitionIRJET Journal
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face IdentificationIRJET Journal
 
FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...
FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...
FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...IRJET Journal
 
ATTENDANCE BY FACE RECOGNITION USING AI
ATTENDANCE BY FACE RECOGNITION USING AIATTENDANCE BY FACE RECOGNITION USING AI
ATTENDANCE BY FACE RECOGNITION USING AIIRJET Journal
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONLisa Cain
 
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKHUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKijiert bestjournal
 
Face Mask Detection System Using Artificial Intelligence
Face Mask Detection System Using Artificial IntelligenceFace Mask Detection System Using Artificial Intelligence
Face Mask Detection System Using Artificial IntelligenceIRJET Journal
 
Face Recognition Home Security System
Face Recognition Home Security SystemFace Recognition Home Security System
Face Recognition Home Security SystemSuman Mia
 
Face Mask Detection and Face Recognition Using Machine Learning
Face Mask Detection and Face Recognition Using Machine LearningFace Mask Detection and Face Recognition Using Machine Learning
Face Mask Detection and Face Recognition Using Machine LearningIRJET Journal
 
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...ijbuiiir1
 
Facial Recognition and Detection Technical Review
Facial Recognition and Detection Technical ReviewFacial Recognition and Detection Technical Review
Facial Recognition and Detection Technical ReviewTkeyah Anderson
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhavVaibhav P
 
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionA Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionCSCJournals
 
Face and liveness detection with criminal identification using machine learni...
Face and liveness detection with criminal identification using machine learni...Face and liveness detection with criminal identification using machine learni...
Face and liveness detection with criminal identification using machine learni...IAESIJAI
 
Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...
Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...
Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...ijtsrd
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...ijceronline
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition SystemStudentRocks
 
IRJET-A Survey on Face Recognition based Security System and its Applications
IRJET-A Survey on Face Recognition based Security System and its ApplicationsIRJET-A Survey on Face Recognition based Security System and its Applications
IRJET-A Survey on Face Recognition based Security System and its ApplicationsIRJET Journal
 

Similar a Development of Real Time Face Recognition System using OpenCV (20)

Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face Recognition
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face Identification
 
FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...
FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...
FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...
 
ATTENDANCE BY FACE RECOGNITION USING AI
ATTENDANCE BY FACE RECOGNITION USING AIATTENDANCE BY FACE RECOGNITION USING AI
ATTENDANCE BY FACE RECOGNITION USING AI
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITION
 
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKHUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
 
Face Mask Detection System Using Artificial Intelligence
Face Mask Detection System Using Artificial IntelligenceFace Mask Detection System Using Artificial Intelligence
Face Mask Detection System Using Artificial Intelligence
 
Face Recognition Home Security System
Face Recognition Home Security SystemFace Recognition Home Security System
Face Recognition Home Security System
 
Facerecognition
FacerecognitionFacerecognition
Facerecognition
 
Face Mask Detection and Face Recognition Using Machine Learning
Face Mask Detection and Face Recognition Using Machine LearningFace Mask Detection and Face Recognition Using Machine Learning
Face Mask Detection and Face Recognition Using Machine Learning
 
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
 
Facial Recognition and Detection Technical Review
Facial Recognition and Detection Technical ReviewFacial Recognition and Detection Technical Review
Facial Recognition and Detection Technical Review
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
 
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionA Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
 
Face and liveness detection with criminal identification using machine learni...
Face and liveness detection with criminal identification using machine learni...Face and liveness detection with criminal identification using machine learni...
Face and liveness detection with criminal identification using machine learni...
 
Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...
Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...
Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition System
 
IRJET-A Survey on Face Recognition based Security System and its Applications
IRJET-A Survey on Face Recognition based Security System and its ApplicationsIRJET-A Survey on Face Recognition based Security System and its Applications
IRJET-A Survey on Face Recognition based Security System and its Applications
 

Más de IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Más de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Último

Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 

Último (20)

Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 

Development of Real Time Face Recognition System using OpenCV

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 791 Development of Real Time Face Recognition System Using OpenCV D. Mary Prasanna 1, Ch. Ganapathy Reddy 2 1 PG Student, Dept of ECE (DECS), G.Narayanamma Institute of Technology & Science for women, Hyderabad, TS, India 2 Professor, Dept of ECE , G.Narayanamma Institute of Technology & Science for women, Hyderabad, TS, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - A real-time, GUI based automatic Face detection and recognition system is developed in this project. It can be used as access control system by registering the staff or students of an organization with their faces, and later it will recognize the people by capturing their images with faces, when they are entering or leaving the premises. The system is implemented on a desktop with a Graphical User Interface, Initially it detects the faces in the images that are grabbed from a web camera. All the tools and operating, used to develop this system like Ubuntu, openFace, Python…, areopen source tools. This real time GUI based face recognition system is developed using Open source tool Open face. Open Face is the face recognition tool developed by CarnegieMellonUniversity, using OpenCV. Open Face, consists in a broader Prospective, three phases: Detection, Feature extraction, and Recognition. The dimensionality of face image is reduced by the Histogram of Oriented Gradients (HOG)andthisalgorithmis developed to detect frontal views of faces. After detecting the face part of image, extract the 128 face features for the given image by using a Deep Neural Network algorithm and therecognitionis done by the Support Vector machine (SVM) classifier. HOG is one of the most popular representation methods for a face image. It not only reduces the dimensionalityoftheimage, but also extracting the facial features of the given images, and retains some of the variations in the image data. So dimensionality of face image reduced by HOG using deep learning algorithm and recognition is done by SVM approach. Key Words: Face Recognition, HOG, DNN, SVM, Open Face, OpenCV, GUI 1. INTRODUCTION Face Recognition is used to recognize a person by using some features of that particular person’s face, by matching with stored models of each individual face in a group of people. Face recognition is the natural way of identification and authenticating a person. Face Recognition plays an important role in human’s day-to-day communication and daily lives. Security and authentication of a person is crucial in any industry or establishment. So,intoday’senvironment, there is a great deal of interest in automatic face recognition using computers or devices for verification of identities round the clock and sometimes remotely. Face recognition has become one of the most challenging and interesting problems in the pattern recognition and image processing. 1.1 Motivation Face biometrics are useful for a person’s authentication, which is asimple and non-intrusivemethod.Facerecognition have substantial potential in two areas: a) it can help the users to caught criminals and terrorists. b) It can be used in controlling access to areaswheresecurityrisksareespecially high c) It can also be used for automatic access control. High security is requiredforaccumulationofdataandinformation. Government can use it for Law enforcement, Voter Verification, Security, Immigration, Legislature, prisons, Benefit Payments and to find out Missing Children and robbers. It can also be used in the Commercial applications like Banking, Gaming Industry, ResidentialSecurity,Internet, E-commerce, and Health Care. Therefore it expected to have lot of demand for real time face recognition systems for access control and not only for investigation of unlawful activities, it will be also useful to stop the of unlawful or terrorist activities.However,ifitisnot a real system, we can detect the activity after the incident is occurred but we cannot stop/prevent it before it happens. If the Face recognition systems to be used to stop any unlawful or terrorism activity or use it for access control, an user friendly real time face recognition system is required. 1.2 Problem Statement The Aim of the Project is to develop a real time GUI based face recognition system that would use a camera to view the outside world and then detect and recognize the individual faces in the scene by using Open Face. Open Face is the face recognition tool developed using OpenCV, an open source library of modules for Computer Vision and Machine Learning written in C++. 2. LITERATURE SURVEY This Research work is concentrates on face recognition problem as a part of biometric attendance system. Face recognition has been an active research area over last 30 years. This Research spansseveral disciplines suchas image processing, pattern recognition, computer vision,and neural networks. Face recognitionhasapplicationsmainlyin the fields of biometrics, access control,lawenforcement,and security and surveillance systems.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 792 The problem of face recognition can be stated as follows: Given still images or video ofa scene, identifying oneormore persons in the scene by using a stored database of faces. The problem is mainly a classification problem. Training the face recognition system with images from the known individuals and classifying the newly coming test images into one of the classes is the main aspect of the face recognition systems. This Problem seems to be easilysolvedbyhumanswhere limited memory can be the main problem; whereas the problems for a machine face recognition system are:  Facial Expression Change  Illumination Change  Aging  Pose change  Scaling factor  Presence and absence of spectacles, beard, mustache etc.  Occlusion due to scarf, mask or obstacles in front. The problem of automatic face recognition (AFR) is a composite task that involves detection of faces from a cluttered background, facial feature extraction, and face identification. A complete face recognition system has to solve all sub problems, where each one isaseparateresearch problem. This research work concentrates on the problemof facial feature extraction and face identification. Most of the current face recognition algorithms can be categorized into two classes, image template based and geometry feature-based. The template based methods compute the correlation between a face and one or more model templates to estimate the face identity. Whereas feature based methods extract local facial features and use their geometric and appearance properties. The face is our primary focus of attention in social intercourse, playing a major role in conveying identity and emotion. We can recognize thousands of faces learned throughout our lifetime and identify familiar faces at a glance after years of separation. Computational models of face recognition, in particular, are interesting because they can contribute not only to theoretical insights but also to practical applications. Computers that recognize faces could be applied to a wide variety of problems, including criminal identification, security systems, image and film processing, and human computer interaction. Unfortunately, developing a computational model of face recognition is quite difficult, because faces are complex, multidimensional, and meaningful visual stimuli. Eigen face is a face recognition approach that can locate and track a subject'shead,andthen recognize the person by comparing characteristics of the face to those of known individuals. 3. DEMOS IN OPENFACE Open Face is core provides a feature extraction method to obtain a low-dimensional representation of any face. Demos/classifier.py shows a demo of how these representations can be used to create a face classifier. In Open Face, to measure the systemperformancewe are having four real time demos. They are  Real time web demo  Comparison demo  Training a classifier  Real time Sphere Visualization 3.1 Real Time web demo Real time web demo shows the full face recognition pipeline .In Practice, object trackinglikedlib’sshouldbeused once the face recognizer has predicted a face. In the edge case when a single person is trained, the classifier has no knowledge of other people and labels anybody with the name of the trained person. The web demo does not predict unknown users and the saved faces are only available for the browser session. If you're interested in predicting unknown people, one idea is to use a probabilistic classifier to predict confidence scores and then call the prediction unknown if the confidence is too low. The drawback of this real time web demo is: i. The data base is stored in Google Server. ii. Once the browser is closed the completedatawillbe erased. Fig 1: Real time web demo 3.2 Comparison demo Here in comparisondemo, wearecomparingtheimages of two persons with two images of each. To compare the images of two persons we are calculating the Euclidian Distance (L2 Distance). If the Squared L2 distance between representations is less than one then it will be identified as
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 793 same person, Otherwise it will recognized as different Person. Fig 2: Comparing of two images The following distance between images of Prasanna and Trishutha were generated with ./demos/compare images/examples/{Prasanna*, Trishutha*} in openface. Table 1: Comparison demo of two images 3.3 Training a classifier Open face is core provides a feature extractionmethodto obtain a low-dimensional representations of any face. Demos/classifier.py shows a demo of how these representations can be use to createa faceclassifier.Thereis a distinction between training the DNN model for feature representation and training a model for classifying people with the DNN model. Fig 3: Classification and similarity detection To Train a classifier we follow the steps given below: 1. Encodea pictureusingtheHOGalgorithmtocreatea simplified version of the image. Usingthissimplified image, find the face part of theimagethatmostlooks like a generic HOG encoding of a face. 2. Figure out the pose of the face by finding the main landmarks in the face. Once we find those landmarks, use them to warp the image so that the eyes and mouth are centered. 3. Pass the centered face image through a neural network that knows how to measure features of the face. Then forevery input image it will generate128 measurements. 4. After generating 128 measurements for the given input image, SVM classifier is used to recognize new face. Create a classification model: 1. Create raw image directory Create a directory for your raw images so that images from different people are in different subdirectories. The names of the labels or images donotmatter,and eachperson can have a different amount of images. The imagesshouldbe formatted as jpg or png. 2. Preprocess the raw images Here for the given input image , it will detecttheface part of the given image and apply the affine transform for the given image. Then extract the features of givenimage,finally it will aligned (crop) the face part of that particular image. 3. Generate Representations In this we are generating the 128 facial features of each and every input image. And it will creates the labels and representations of all images. 4. Classification Model After generating the face features,thesystem will classify how many people present in the data base. Suppose in my system I am trained 20 persons each of 20 images, then the system will recognized as 20 classifiers are present in the classification model. After Generating classifier.pkl, The Test images are compared with the database. If the given image is in the training , then it will recognize the particular person name with confidence. Otherwise it will recognizeasunabletofind a face image. mage 1 Image 2 Distance Prasanna1 Prasanna2 0.474 Prasanna1 Trishutha1 1.045 Prasanna1 Trishutha2 1.370 Prasanna2 Trishutha1 1.352 Prasanna2 Trishutha2 1.470 Trishutha1 Trishutha2 0.152 Input Image Transform Crop Image DNN 128D features Clustering Similarity Detection Classification Detect
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 794 3.4 Real Time Sphere Visualization This Real time display is using the Open Face facial recognition system. It is analysing the stream of information coming into the computer from thecamera,lookingforfaces. When a face is found, a rectangle is placed around it on the screen. When more than one person is identified, it differentiates between them with separate colours. The system also represents the face as points on a sphere, as shown in the figure. Similar faces (like identical twins) will be represent nearer to one another on the sphere than the faces that are more visually different. Here the computer uses 128 dimensions to represent the faces instead of the just three physical dimensions represented by the sphere. Table 1: Accuracy Table for 15 Training-images each of 4 Test-Images Fig 4: Real time sphere visualization in CMU Open face. The above fig shows Real time sphere visualization in cmu open face. In this it will detect and recognize the face part of the particular person who ever present in frontofthe web camera. And whenever the person want to move the positions (like rotation, bending etc.) then the sphere positions will also move based on the Person movements. If two or more persons present in front of the camera, then it will identify the number of persons. After identifying number of persons; it will detectandrecognizethefaceparts of the given image. Then for each & every person it will detect the face part and appear bounding boxes with different colors. If the Persons want to move the positions then the sphere positions will also move based on the persons movements. 4. PROPOSED SYSTEM How to build the Open Face is explained in the previous Case. The potential for building Face Recognition systems using Open Face is shown by the examples given at CMU website only. Now how to build a face recognition system, suitable for our institution or foranyotherapplication,using open Face will be explained in this chapter with the example of building a face recognition system built for our unit (NERTU, OU). Once open face is installed and readytorun,thefollowing steps are required to build a face recognition system. 1. Building database by registering the faces of the people to recognized. 2. Detection of Faces from the images of registered people and extraction of facial features from the detected faces. 3. Recognition face in the test image with SVM classifier. Once the open face is installed the required modules or software’s will be readily available to complete these three tasks. To check whether the system is working properly or not, initially a face recognition system for NERTU having 15 people (staff and students)is builtandthesame procedureis explained below. Then after that we have built a real time system with GUI. Twenty images having the face of each person, for 15 people are collected using CHEESE software, which is an open source tool developed by Daniel G. Siegel So, this database contains 300 face images. It consists of each person with 20 different poses like smiling, looking serious, head bend, eyes moving and closing eyes with very small variations in the database. Totally300imagesareused for training and 60 images are used for testing. Here I will show the result of 15 persons with 20 images. Here I am not taking any real time pictures. So, the accuracies will be different. To improve the accuracy, increase the number of training images of eachperson.Then after improving data base I will get betterresultswhichIwill trained manually in my system. Now I Build a real time GUI based Face Recognition System. S.No Training- Images (20) Test- Images Accuracy (%) 1 Achala 4 100 2 Buvana 4 75 3 Divya 4 75 4 Harika 4 50 5 Majid 4 100 6 Mallesh 4 25 7 Mounika 4 75 8 PLN 4 100 9 Prasanna 4 75 10 Prathap 4 25 11 Ranadheer 4 50 12 Rekha 4 100 13 Renuka 4 75 14 Santhi 4 75 15 Trishutha 4 50
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 795 REMARKS: The accuracy of some of the people in the above table is less due the following reasons.  Some people are having so much of Pose Variations, which is not present in the training-image folder.  For Poor Illumination & Brightness conditions  Because of Expressions, the accuraciesmayvaryfor each and every individual. 4.1 Need for an automated System Today there is a rising need for systems that assist in security and surveillance. The authentication of individuals can no longer be done efficiently by manual methods. For example, consider a concert of a famousmusicianthatincurs huge response with, let us say, 10,000 people attending the show. Imagine guards standing at the front doors, manually letting people in, after checking their tickets. They should check the authenticity of the ticket and also verify if it is the same person. This would surely demand a huge manpower. Also, it is extremely tedious to authenticate a crowd as large as 10,000 people leading to delay in schedule and, not to mention, high probability of occurrence of errors resulting from common mistakes by humans. We,thus,need machine- controlled systems that perform the given task efficiently in a short duration of time with minimal human intervention. Face recognition based authenticationisveryneartonatural way of authentication by people. So in this chapter, a real time GUI based face recognition system built by me is explained below. There are several ways in which this automation of monitoring systems can be achieved. 4.2 Graphical User Interface The graphical user interface (GUI), is a type of user interface that allows users to interact with electronic devices throughgraphical icons andvisual indicatorssuchas secondary notation, instead of text-based user interfaces, typed command labels or text navigation. GUIs were introduced in reaction to the perceived steep learning curve of command-line interfaces (CLIs), which require commands to be typed on a computer keyboard. The actions in a GUI areusuallyperformedthrough direct manipulation of the graphical elements. Beyond computers, GUIs are used in many hand held mobile devices such as MP3 players, portable media players, gaming devices, smart phones and smaller household, office and industrial controls. The term GUI tendsnotto beapplied to other lower-display resolution types of interfaces, such as video games (where heads-up display (HUD) is preferred), or not including flat screens, like volumetric displays because the term is restricted to the scope of two- dimensional display screens able to describe generic information, in the tradition of the computer science research at the Xerox Palo Alto Research Center (PARC). Designing the visual composition and temporal behavior of a GUI is an important part of software application programminginthearea of human–computerinteraction. Its goal is to enhance the efficiency and ease of use for the underlying logical design of a stored program, a design discipline named usability. Methods of user-centered design are used to ensure that the visual language introduced in the design is well-tailored to the tasks. Here GUI is developed using Gui. Here I built a real time system is developed using Qt Designer. In this GUI based Real time Face Recognition system we are mainly focusing on two phases  Training Phase  Test Phase Fig 5: Real time Face Recognition System display Figure 5 shows the Real time face recognition system display. In Training Phase it is divided in to two parts: 1.Capture 2.Train CAPTURE: For building the training database in real time,tocapture the images of a person, first we are enter the person name, then the system will capture the images of that Particular Person standing in front of camers. ForCapturingimagesthe following code is used: def capture_Image(self): i=1 camera=cv2.VideoCapture(0) while(i<=10): if not os.path.exists('openface/training-images'): print 'hello' os.mkdir('openface/training-images') name=self.lineEdit.text()
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 796 if not os.path.exists('openface/training-images/' + name): os.mkdir('openface/training-images/' + name) ret, image=self.camera.read() imagename='openface/training-images/' + name + '/' + str(i) + '.jpg' print imagename How to capture the images in a real time based GUI System is given below. Fig 6: Enter the name of the person as Prasanna Fig 7: Press the button Capture to Capture the images into a folder Prasanna Fig 8: Enter the name of the person as Harika Fig 9: Press the button Capture to Capture the images into a folder Harika TRAINING PHASE: After Capturing training images of all thepeople,wehave to train the system to obtain face models for all people. The training procedure is already explained in the previous section.CMU Openface having some models for detecting faces in the images. The shape of the faces is almost similar, throughout the world. So, using those training models, our system is trained which is for detecting faces. For building the models for recognition of faces, the features should be extracted before obtainingthe modelsfor every person. The following script will extract the features and build the models for every person with the face aligned images or faces detected. Here for each and every aligned- image, 128 features are generated. Shell script for Training (Train_script.sh) : #!/usr/bin/sh ./util/align-dlib.py openface/training-images/ align outerEyesAndNose ./aligned-images/ --size 96 ./batch-represent/main.lua-outDir./generated-embeddings/ -data ./aligned-images/ ./demos/classifier.py train ./generated-embeddings/ Fig 10: Training the database for Face Recognition system for NERTU
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 797 Figure 10 shows the trainingthedatabaseFaceRecognition system for NERTU. After completing the training, As a separate face model is available for every person of the institute it can used for recognizing those people, who are coming in front of camera. TEST PHASE: Here in case of testing, whenever we click on test button it will take the test image by using webcam. Then for the following code will run for recognition of people coming in front of camera: def test_cap_Image(self): i=1 camera=cv2.VideoCapture(0) while(i<2): if not os.path.exists('./test-images'): print 'hello' os.mkdir('./test-images') name=self.lineEdit.text() if not os.path.exists('./test-images/'): os.mkdir('./test-images/' + name) ret, image=self.camera.read() imagename='./test-images/' + str(i) + '.jpg' print imagename ## cv2.imshow('test',image) cv2.imwrite(str(imagename),image) After click on the test button, the system will recognize the person name with confidence. Otherwise displayed as Unknown Person. Fig 11: Recognizing Test image as Prasanna Fig 12: Recognizing Test image as Harika In case of testing two or more persons are present in the system at a time, then the system will recognize the person name as who ever present in the right side. Fig 13: Recognizing the test-image when two persons are present in front of the camera For continuous loop of testing images we are using start recognition and stop recognition. Finally, to exit from face recognition application, simply click on exit button in the face recognition system. Fig 14: Press the exit button to exit from face recognition application
  • 8. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 798 5. CONCLUSION Face recognition technologies have been associated generally with very costly top secure applications.Today the core technologies have evolvedandthecostofequipmentsis going down dramatically due to the integration and the increasing processing power. Certain applications of face recognition technology are now cost effective, reliable and highly accurate. The project deals with the implementation of a Face Recognition System Using GUI. Various algorithms for detection and recognition of a face in a given image have been discussed as a part of the Literature . The algorithm that has been used for Face Detection in this project makes use of the detecting the face part by Using HOG algorithm, here in this each and every pixel is compared with neighboring pixels and then it will detect the image with 68 landmarks by using face land mark algorithm; After detecting the face part of the given input image, we are extracting the 128 features/ embeddings by using Deep Neural network concept. Then for recognition we are using SVM Classifier to identify the person. Here in this project we are developing a real time GUI based Face recognition system and further it will be useful fordevelopinga real time face based Biometric attendance system. REFERENCES [1] FaceNet: A Unified Embedding for Face Recognition and Clustering. Florian Schrof, Dmitry Kalenichenko, James Philbin. s.l. : IEEE Xplore, 2015. pp. 815-823. [2] Face recognition: challenges, achievements and future directions. Aly, M. Hassaballah and S. 4, s.l. : IET, DOI: 10.1049/iet-cvi.2014.0084, JULY 30, 2015, Vol. 9, pp. 614-626. ISSN: 1751-9632. [3] Facial Recognition using OpenCV. Shervin Emami, Valentin Petru. 1, Australia : JMEDS, 2012, Journal of Mobile, Embedded and Distributed Systems, Vol. 4, pp. 38-43. ISSN 2067 – 4074. [4] Face Detection and Tracking using OpenCV. S.V. Viraktamath, Mukund Katti, Aditya Khatawkar, Pavan Kulkarni. 3, s.l. : SIJ, July-August 2013, The Standard International Journals (The SIJ) , Vol. 1, pp. 45-50. ISSN: 2321 – 2403 . [5] Implementation of Face Recognition Algorithm for Biometric Time based AttendanceSystem. AdrianRhesa Septian Siswanto, Anto Satriyo Nugroho, Maulahikmah Galinium. Bandung, Indonesia : IEEE, DOI: 10.1109/ICTSS.2014.7013165,2014.2014International Conference on ICT For Smart Society (ICISS). pp. 149- 154. ISBN: 978-1-4799-6321-8. [6] Security of biometric authentication systems. V.Matyas, Z.Riha. Krackow : IEEE, DOI: 10.1109/CISIM.2010.5643698,2010.2010International Conference on Computer Information Systems and Industrial Management Applications (CISIM).pp.19-28. ISBN: 978-1-4244-7817-0. [7] Jain, Anil, Ross, Arun A., Nandakumar, Karthik. Introduction to Biometrics. Newyork : Springer, 2011. ISBN 978-0-387-77326-1. [8] Histograms of oriented gradients for human detection. Triggs, N. Dalal and B. USA : IEEE, DOI: 10.1109/CVPR.2005.177,2005.IEEEComputerSociety Conference on Computer Vision and Pattern Recognition (CVPR'05). pp. 886-893. ISSN:1063-6919. [9] Prathamesh Timse, Pranav Aggarwal, Prakhar Sinha, Neel Vora. Face Recognition Based Door Lock System Using Opencv and C#. April 2014, Vol. 4, 4, pp. 52-57. [10] Face Detection in Real Time Based on HOG. N. J. Wang, S. C. Chang and P. J. Chou. Taipei, Taiwan : IEEE, DOI: 10.1109/ISPACS.2012.6473506, 2012. International Symposium on Intelligent Signal Processing and Communications Systems. pp. 333-337. ISBN: 978-1-4673- 5081-5. BIOGRAPHIES D Mary Prasanna Post-Graduate Student, Dept. of ECE, G. Narayanamma Institute of Technology & Science, Shaikpet, Hyderabad, India-500008. Ch Ganapathy Reddy Professor, Dept. of ECE, G. Narayanamma Institute of Technology & Science, Shaikpet, Hyderabad, India-500008.