SlideShare una empresa de Scribd logo
1 de 8
Descargar para leer sin conexión
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4379
Human Face Detection and Identification using Deep Metric Learning
Snehal S. Sapkal1, Alka P. Mengane2 , Tejashri A. Kalbhor3, Nitashree S. Ohol4
1Students of Computer Engineering. PDEA’s College of Engineering, Pune, India
2Students of Computer Engineering. PDEA’s College of Engineering, Pune, India
3Students of Computer Engineering. PDEA’s College of Engineering, Pune, India
4Students of Computer Engineering. PDEA’s College of Engineering, Pune, India
--------------------------------------------------------------------------***-------------------------------------------------------------------------
Abstract— Human Face Detection and Identification
using Deep Metric Learning. In Our proposed project we are
using a new technique of Face detection with Human object
detection the technique is call as deep metric learning.
Keywords— deep metric, deep learning, machine
learning, face detection, recognition, identification, NN, ML
I. INTRODUCTION
In Our proposed project we are using a new technique
of Face detection with Human object detection the
technique is call as deep metric learning.
We use real-time images or stream videos from CCTV or
any other video capturing device or user can put pre
recorded or captured video for analysis.
Our system is boosted with widely used classification
methods to detect and identify faces even from a blur
images or scrappy videos.
II. WIDE DEPENDENCIES WE USED
A. Open Computer version (OpenCV):
Efficiently working computer vision repository which is
highly efficient and smooths real-time image processing.
OpenCV (Open Source Computer Vision Library) is an
open source computer vision and machine learning
software library.
OpenCV was built to provide a common infrastructure
for computer vision applications and to accelerate the use
of machine perception in the commercial products. Being a
BSD-licensed product, OpenCV makes it easy for businesses
to utilize and modify the code.
B. Dlib:
dlib is a intelligent implementation of the machine
learning vectors and deep learning areas to train machine
in various scenario like complicated facial recognition.
Artificial Intelligence Behavior Tree Library DiLIB is a
behavior tree library with tools to implement it over user
interface aimed for C++ programmers.
C. scikit-learn and scikit-image:
To create deep learning network to understand inputted
data and processes it with compiled version of our code
with real time evaluation and high accuracy
Simple and efficient tools for data mining and data
analysis, Accessible to everybody, and reusable in various
contexts, Built on NumPy, SciPy, and matplotlib, Open
source, commercially usable - BSD license
D. Keras:
High-level neural networks API. Makes coding, training,
and deploying neural networks
Keras is an open-source neural-network library written
in Python. It is capable of running on top of TensorFlow,
Microsoft Cognitive Toolkit, Theano, or PlaidML. Designed
to enable fast experimentation with deep neural networks,
it focuses on being user-friendly, modular, and extensible.
E. Mxnet:
A scalable deep learning framework. Which is Extremely
fast and efficient Capable of scaling across multiple GPUs
and multiple machines.
Apache MXNet is an open-source deep learning software
framework, used to train, and deploy deep neural networks.
III. OVERVIEW
In Our proposed project we are using a new technique
of Face detection with Human object detection the
technique is call as deep metric learning.
As we understand in deep learning we typically train a
network to:
• Accept a single input image
• And output a classification/label for that image
But deep metric learning is different. We are not trying
to output a single label or image or coordinates box of
objects in an image, we are directly outputting a real-valued
vector.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4380
To perform this type of real time data vector and facial
recognition in provided image or video we used some
external factors to contribute in our detection. These
factors are the external dependencies which we are using to
build a complete vector graph and plotting facial vectors in
order to valued it with inputted video or image to identify
the suspect or our target from source image or video..
A. Motivation
In today’s automation era, every information is being
processed by the machine with artificial intelligence and
used in many sophisticated applications. Even though many
agencies have developed the state-of-the-art security
systems, recent terrorist attacks exposed serious
weaknesses of sophisticated security systems. Hence
various agencies are more serious and motivated to
improve security data systems based on body or behavioral
characteristics, often called biometrics
[1]. Biometric-based technologies include the
identification based on physiological characteristics: face,
fingerprints, finger geometry, hand geometry, hand veins,
palm, iris, retina, ear, voice and behavioral traits such as
gait, signature and keystroke dynamics
[2]. Almost all the biometric technologies require some
voluntary action by the user, i.e. the user needs to place his
hand on a hand-rest for finger printing or hand geometry
detection and has to
stand in a fixed position in front of a camera for iris or
retina identification. However, face recognition can be done
passively without any definite action or participation on the
2 part of the user, since face images can be acquired from a
distance by a camera, and hence the face recognition
system is more appropriate for security and surveillance
purposes. Further, data acquisition in general is fraught
with problems for other biometric techniques that rely on
hands and fingers. These can be rendered useless if the
epidermis tissues are damaged in some way (i.e., bruised or
cracked). Expensive equipments are required for the iris
and retina identification, and these methods are more
sensitive to any body motion. Voice recognition is
susceptible to background noises in public places and
auditory fluctuations on a phone line or tape recording.
Signatures can be modified or forged. However, facial
images can be easily obtained with a couple of inexpensive
fixed cameras. They cannot be modified or forged, and they
are not affected by background sound noise. Face
recognition algorithms with appropriate preprocessing of
the images may compensate for noise, slight variations in
orientation, scale and illumination. Although there are
advantages of face recognition over other biometric
techniques, existing face recognition technology is not able
to satisfy the needs. Several challenges are there in
developing face recognition systems, which are:
Illumination Variations: The direction of illumination
in the image, greatly affects the face recognition
performance. The variations between the same face images
due to illumination are always greater than variations in
the image due to change in face identity.
Frontal vs. Profile: In a surveillance system, people are
not always facing the cameras. The faces are viewed by
some angle. The angle with which the photo of the
individual was taken with respect to the camera affects the
face recognition performance drastically.
Expression Variations: Expression variations in face
images affect the performance of face recognition. A smiling
face, a laughing face, a crying face, a sad face, a fac with
closed eyes, even a small distinction in the facial expression
can influence facial recognition system greatly.
Aging: Face images of the same individual of 1 year and
15 years are difficult to recognize since face appearance
changes rapidly. Images taken by varying a time from 5
minutes to 5 years change the system accuracy seriously.
Occlusions: It is very difficult to recognize the faces
when they are partially occluded. Face images in real-world
applications may occlude due to use of things, such as
sunglasses, scarf, hands on the face portion, the objects
which persons carry, and external sources that occlude the
camera view partially.
The ultimate goal of researchers in this area is to
develop the sophisticated face recognition to emulate the
human vision system. Many researchers have proposed and
developed the machine-based face recognition algorithms.
Research has been conducted vigorously in the face
recognition area for the past four decades, and enormous
progress has been made. Still, there is scope for
improvement. Encouraging results have been obtained, and
current face recognition systems have achieved a specific
degree of maturity when operating under various
constrained conditions. However, they are far from
achieving the ideal of being able to perform adequately in
all the various situations that are commonly encountered
by applications, utilizing available techniques in practical
life.
B. Problem Definition and Objectives
Biometric identification is the technique of
automatically verifying or identifying a person by a
personal trait or physical characteristic. The term
“automatically” means the biometric system must identify
or verify a human characteristic or trait promptly with little
or no intervention of the user. Biometric technology was
developed for its use in high-level security systems and law
enforcement markets. The key element of biometric
technology is its ability to identify a human being and
impose security. The aim of this thesis is to develop an
automatic face recognition system, which will improve
recognition rates for normal images and for images with
illumination and expression variations.
In Our proposed project we are using a new technique
of Face detection with Human object detection the
technique is call as deep metric learning.
As we understand in deep learning we typically train a
network to:
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4381
• Accept a single input image
• And output a classification/label for that image
C. Methodologies of Problem solving
We use real-time images or stream videos from CCTV or
any other video capturing device or user can put pre
recorded or captured video for analysis.
Our system is boosted with widely used classification
methods to detect and identify faces even from a blur
images or scrappy videos.
In order to make it functional on a regular
computational CPU we made some functional changes in
the dlib facial recognition network, now we can output the
feature vector with 128-d i.e., a list of 128 real-valued
numbers that our code will used to quantify the face. While
we training network, we use triplets:
Figure 1: Block diagram of unique deep learning “triplet
training.”
In this demonstration we used three unique faces of
popular Cinema Actor. The same functional triplet training
consists of the dataset of unique images to train from. With
the tradition we used SVM to generate 128-d vector for all
images in dataset.
 In this we asked SVM to calibrate 128-d for above 3
images where the images of Ayushman are more
than 2, hence defined algorithm sense’s it as 2
similar faces in dataset.
 Although Shaharukh’s image is a random pick from
our data set and as not the same as Ayushman
 Our optimized network quantifies the faces and
constructs the 128-d embeddings or quantification
for each of the images in process.
IV. DATASETS WE USED TO DO FACE RECOGNITION
In this demonstration we used three unique faces of
popular Cinema Actor. The same functional triplet training
consists of the dataset of unique images to train from. With
the tradition we used SVM to generate 128-d vector for all
images in dataset.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4382
Figure2: Popular faces inspired dataset used in
demonstration
 Shahrukh Khan (16 images)
 Ayushman Khurrana (16 images)
 Ileana d'cruz (18 images)
 Yami Gautam (17 images)
The dataset we used and images we inputted into that are
very random and having variety in color, shape, size and
even in quality of pixels. This kind of variation is kept to
ensure the quality and accuracy in face detection in various
condition.
A. Face Recognition Techniques- Appearance Based
Approaches
The Eigen face Method Firstly Kirby and Sirvoich
demonstrated Eigenfaces method for recognition. Pentland
and Turk made improvements on this research by
employing Eigenfaces method based on Principle
Component Analysis for the same reason
PCA is a Karhumen-Loeve transformation. PCA is a realized
linear dimensionality reduction method used to determine
a set of mutually orthogonal basis functions and as shown
in fig 1.For papers with less than six authors:
maximum variance in g dimensional space and g is too
big according to h. Subtracting the normalized training
images from the calculated mean images thus mean
centered images are calculated. If w is mean centered
training image matrix Wi(i=1,2,........,L) and l is the number
of training images, matrix d is calculated from as in
equation 1
D = WWT
To reduce the size of covariance matrix D, we can use D
= WTW instead. Eigenvectors ei and eigen values _i are
obtained from covariance matrix.
Zi = ETwi(i = 1, 2, ....,L)
In the equation 2, Zi represents the new feature vector
of lower dimensional space. Negative aspect of this method,
it tries to max inter and intra class scattering. Inter class
scattering is good for classification where intra scattering is
not. If there is variance illumination, increases intra class
scattering very high, even classes seems stained.
The Fisher face Method Belhumeur introduced the
Fisher Face method in 1997, a derivative of Fishers Linear
Discriminant (FLD) which has linear discriminant analysis
(LDA) to gain the vast discriminant structures. Both PCA
and LDA which are used to produce a subspace projection
matrix is similar to eigen face and Fisher face methods. LDA
describe a pair of projection vectors which form the
maximum between-class scatter and minimum in the class
scatter matrix concurrently
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4383
Following is the curve for the training error rate with
varying value of K:
you can see, the error rate at K=1 is always zero for the
training sample. This is because the closest point to any
training data point is itself.Hence the prediction is always
accurate with K=1. If validation error curve would have
been similar, our choice of K would have been 1.
Following is the validation error curve with varying value
of K:
This makes the story more clear. At K=1, we were
overfitting the boundaries. Hence, error rate initially
decreases and reaches a minima. After the minima point, it
then increase with increasing K. To get the optimal value of
K, you can segregate the training and validation from the
initial dataset. Now plot the validation error curve to get
the optimal value of K. This value of K should be used for all
predictions.
Breaking it Down – Pseudo Code of KNN
We can implement a KNN model by following the below
steps:
1. Load the data
2. Initialise the value of k
3. For getting the predicted class, iterate from 1 to
total number of training data points
1. Calculate the distance between test data
and each row of training data. Here we
will use Euclidean distance as our
distance metric since it’s the most popular
method. The other metrics that can be
used are Chebyshev, cosine, etc.
2. Sort the calculated distances in ascending
order based on distance values
3. Get top k rows from the sorted array
4. Get the most frequent class of these rows
5. Return the predicted class
Fisher face or Linear Discriminant Analysis (LDA) aims to
increase inter class differences and are not used to
increase data representation
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4384
IV. EXPERIMENTAL RESULT
Tree Structure of the proposed system
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
$ tree --filelimit 10 --dirsfirst
.
├── dataset
│ ├── Shahrukh Khan (16 images)
│ ├── Ayushman Khurrana (16 images)
│ ├── ileana d'cruz (18 images)
│ ├── Yami Gautam (17 images)
│ ├── sample_1 [36 entries]
│ └── sample_2 [35 entries]
├── examples
│ ├── example_01.png
│ ├── example_02.png
│ └── example_03.png
├── output
│ └── lunch_scene_output.avi
├── videos
│ └── lunch_scene.mp4
├── search_bing_api.py
├── encode_faces.py
├── recognize_faces_image.py
├── recognize_faces_video.py
├── recognize_faces_video_file.py
└── encodings.pickle
10 directories, 11 files
In this project we enlist four top folders layers where
we traverse all data and get orientation of the entire project
 dataset/ : This is the top most folder serve as a
main training set for the flow and detection
mechanism, Contains face images of subjects
which we wanted to match
 examples/ : These are the images of unknown
object to test by our trained network to assure
detection and accuracy for the same these images
are that are not in the dataset.
 output/ : our system is a Input based centralized
system where we generate our output in a specific
location this directory serve as a Output Path for
our investigated contain like images or videos
which are rendered by project.
 videos/ : As imported the Deep Learning in our
project as a part of that Our project can detect
images form video and the same will be rendered
and stored as an Input video in this folder
We have our worker files which will do all hard
work for us
encode_faces.py: Encodings (128-d vectors) for faces
recognize_faces_image.py: Recognize faces
recognize_faces_video.py: Recognize faces in a live video
stream
recognize_faces_video_file.py: Recognize faces in a video
file from save video file
encodings.pickle : Facial recognitions encodings to form
vector from dataset
Figure 3: The hard work of Facial recognition using the
module
As the critical process we must do some
background work in order to streamline our activities and
loads up images and videos for face detection and
recognition.
As it is a input based activity first we need to enlist our
source images or videos before we can recognize faces
from images and videos which will be as a mode of
operandi.
In order to established a connection between or dataset
and network we must quantify the faces in training set.
Right at this movement we are not training our module or
network but we are making sure it has been done already
to create 128-d embeddings
V. CONCLUSION
As the critical process we must do some background work
in order to streamline our activities and loads up images
and videos for face detection and recognition.
As it is a input based activity first we need to enlist our
source images or videos before we can recognize faces
from images and videos which will be as a mode of
operandi.
In order to established a connection between or dataset
and network we must quantify the faces in training set.
Right at this movement we are not training our module or
network but we are making sure it has been done already
to create 128-d embeddings.
As our system is now detecting images successfully and we
have created our 128-d face embeddings for each image in
our dataset, Now We attempt to match each face in the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4385
input image ( encoding ) to our known encodings dataset
(held in data["encodings"] )
This function returns a list of events which are having True
/ False values, one by one for each image in our dataset
On other hand our pre-processors are Internally are
computing the Euclidean distance between the candidate
embedding and all faces in our dataset using the
compare_faces function
Figure 4: System has successfully recognized
Ayushman Khurrana’s face
Embedding an all faces in our dataset using the
compare_faces function
 The purpose of this comparison is to detect the
distance which is below our tolerance ratio which
is auto set by CPU or GPU clock rate returning the
True value which indicates the faces matched.
 And if the distance is above the tolerance
threshold it will return False values which means
we have not match.
 Along side of this we also able to show name of the
face as it given in dataset The name variable will
eventually hold the name string of the person
 This name variable is decided on the votes system
will receive from pre processors while computing
all datasets for operation the number of
True values associated with each name which will
eventually tally up and select the person’s name
which is having the most corresponding votes.
VI. REFERENCE
[1] Ahmet zdil Metin Mete zbilen A Survey on Comparison
of Face Recognition Algorithms IEEE 2015
[2] G. Ramkumar, M. Manikandan - Face Recognition
Survey International Journal of Advances in Science and
Technology (IJAST) 2014 ISSN 2348-5426
[3] Sharkas, M. Abou Elenien, Eigenfaces vs. Fisherfaces vs.
ICA for Face Recognition; A Comparative Study, 9th
International Conference on Signal Processing, 2008, ICSP
2008., 2008, pp. 914919
[4] K. Kim, Intelligent Immigration Control System by
Using Passport Recognition and Face Verification, in
International Symposium on Neural Networks Chongqing,
China, 2005, pp.147-156.
[5] J. N. K. Liu, M. Wang, and B. Feng, iBotGuard: an
Internetbased intelligent robot security system using
invariant face recognition against intruder, IEEE
Transactions on Systems Man And Cybernetics Part C-
Applications And Reviews, Vol.35, pp.97-105, 2005.
[6] H. Moon, Biometrics Person Authentication Using
Projection- Based Face Recognition System in Verification
Scenario, in International Conference on Bioinformatics
and its Applications. Hong Kong, China, 2004, pp.207-213.
[7] D. McCullagh, Call It Super Bowl Face Scan 1, in Wired
Magazine, 2001.
[8] CNN, Education School face scanner to search for sex
offenders. Phoenix, Arizona: The Associated Press, 2003.
[9] P. J. Phillips, H. Moon, P. J. Rauss, and S. A. Rizvi, The
FERET Evaluation Methodology for Face Recognition
Algorithms, IEEE Transactions on Pattern Analysis and
Machine Intelligence, Vol.22, pp.1090-1104, 2000.
10] T. Choudhry, B. Clarkson, T. Jebara, and A. Pentland,
Multimodal person recognition using unconstrained audio
and video, in Proceedings, International Conference on
Audio and Video- Based Person Authentication, 1999,
pp.176-181.
[11] S. L. Wijaya, M. Savvides, and B. V. K. V. Kumar,
Illumination-tolerant face verification of low-bit-rate
JPEG2000 wavelet images with advanced correlation filters
for handheld devices, Applied Optics, Vol.44, pp.655-665,
2005.
[12] E. Acosta, L. Torres, A. Albiol, and E. J. Delp, An
automatic face detection and recognition system for video
indexing applications, in Proceedings of the IEEE
International Conference on Acoustics, Speech and Signal
Processing, Vol.4. Orlando, Florida, 2002, pp.3644-3647.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4386
[13] J.-H. Lee and W.-Y. Kim, Video Summarization and
Retrieval System Using Face Recognition and MPEG-7
Descriptors, in Image and Video Retrieval, Vol.3115.
[14] Lecture Notes in Computer Science : Springer Berlin /
Heidelberg,2004, pp.179-188.
[15] C. G. Tredoux, Y. Rosenthal, L. d. Costa, and D. Nunez,
Face reconstruction using a configural, eigenface-based
composite system, in 3rd Biennial Meeting of the Society
for Applied Research in Memory and Cognition (SARMAC).
Boulder, Colorado, USA, 1999.
[16] K. Balci and V. Atalay, PCA for Gender Estimation:
Which Eigenvectors Contribute? In Proceedings of
Sixteenth International Conference on Pattern Recognition,
Vol.3. Quebec City, Canada, 2002, pp. 363-366.
[17] B. Moghaddam and M. H. Yang, Learning Gender with
Support Faces, IEEE Transactions on Pattern Analysis and
Machine Intelligence, Vol.24, pp.707-711, 2002.
[18] R. Brunelli and T. Poggio, HyperBF Networks for
Gender Classification, Proceedings of DARPA Image
Understanding Workshop, pp.311-314, 1992.
[19] A. Colmenarez, B. J. Frey, and T. S. Huang, A
probabilistic framework for embedded face and facial
expression recognition, in Proceedings of the IEEE
Conference on Computer Vision and Pattern Recognition,
Vol.1. Ft. Collins, CO, USA, 1999, pp. 1592-1597.
[20] Y. Shinohara and N. Otsu, Facial Expression
Recognition Using Fisher Weight Maps, in Sixth IEEE
International Conference on Automatic Face and Gesture
Recognition, Vol.100, 2004, pp.499-504.
[21] F. Bourel, C. C. Chibelushi, and A. A. Low, Robust Facial
Feature Tracking, in British Machine Vision Conference.
Bristol, 2000, pp.232-241.
[22] K. Morik, P. Brockhausen, and T. Joachims, Combining
statistical learning with a knowledge based approach – A
case study in intensive care monitoring, in 16th
International Conference on Machine Learning (ICML-99).
San Francisco, CA, USA: Morgan Kaufmann, 1999, pp.268-
277.
[23] S. Singh and N. Papanikolopoulos, Vision-based
detection of driver fatigue, Department of Computer
Science, University of Minnesota, Technical report 1997.
[24] D. N. Metaxas, S. Venkataraman, and C. Vogler, Image-
Based Stress Recognition Using a Model-Based Dynamic
Face Tracking System, International Conference on
Computational Science , pp.813-821, 2004.
[25] M. M. Rahman, R. Hartley, and S. Ishikawa, A Passive
And Multimodal Biometric System for Personal
Identification, in International Conference on Visualization,
Imaging and Image Processing Spain, 2005, pp.89-92.
[26] R. Brunelli and D. Falavigna, Person identification
using multiple cues, IEEE Transactions on Pattern Analysis
and Machine Intelligence, Vol.17, pp.955-966, 1995.
[27] M. Viswanathan, H. S. M. Beigi, A. Tritschler, and F.
Maali, Information access using speech, speaker and face
recognition.

Más contenido relacionado

La actualidad más candente

Face recognition application
Face recognition applicationFace recognition application
Face recognition applicationawadhesh kumar
 
Identifying unconscious patients using face and fingerprint recognition
Identifying unconscious patients using face and fingerprint recognitionIdentifying unconscious patients using face and fingerprint recognition
Identifying unconscious patients using face and fingerprint recognitionAsrarulhaq Maktedar
 
Face recognition smart cane using haar-like features and eigenfaces
Face recognition smart cane using haar-like features and eigenfacesFace recognition smart cane using haar-like features and eigenfaces
Face recognition smart cane using haar-like features and eigenfacesTELKOMNIKA JOURNAL
 
Smart Face Recognition System Analysis
Smart Face Recognition System AnalysisSmart Face Recognition System Analysis
Smart Face Recognition System AnalysisVishal Aditya
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyPushkar Dutt
 
Mobile to server face recognition. Skripsi 1.
Mobile to server face recognition. Skripsi 1.Mobile to server face recognition. Skripsi 1.
Mobile to server face recognition. Skripsi 1.Adryan Rezza
 
Face recognition
Face recognition Face recognition
Face recognition Chandan A V
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdarraihansikdar
 
Face Recognition and Door Opening Assistant for Visually Impaired
Face Recognition and Door Opening Assistant for Visually ImpairedFace Recognition and Door Opening Assistant for Visually Impaired
Face Recognition and Door Opening Assistant for Visually ImpairedUllas Puntambekar
 
IRJET - Design and Development of Android Application for Face Detection and ...
IRJET - Design and Development of Android Application for Face Detection and ...IRJET - Design and Development of Android Application for Face Detection and ...
IRJET - Design and Development of Android Application for Face Detection and ...IRJET Journal
 
IRJET- Automated Criminal Identification System using Face Detection and Reco...
IRJET- Automated Criminal Identification System using Face Detection and Reco...IRJET- Automated Criminal Identification System using Face Detection and Reco...
IRJET- Automated Criminal Identification System using Face Detection and Reco...IRJET Journal
 
Classroom Attendance using Face Detection and Raspberry-Pi
Classroom Attendance using Face Detection and Raspberry-PiClassroom Attendance using Face Detection and Raspberry-Pi
Classroom Attendance using Face Detection and Raspberry-PiIRJET Journal
 
LDA presentation
LDA presentationLDA presentation
LDA presentationMohit Gupta
 
Face recognition system
Face recognition systemFace recognition system
Face recognition systemYogesh Lamture
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologySYED HOZAIFA ALI
 
Face Recognition Basic Terminologies
Face Recognition Basic TerminologiesFace Recognition Basic Terminologies
Face Recognition Basic TerminologiesSanjay Saha
 
IRJET- Gesture Drawing Android Application for Visually-Impaired People
IRJET- Gesture Drawing Android Application for Visually-Impaired PeopleIRJET- Gesture Drawing Android Application for Visually-Impaired People
IRJET- Gesture Drawing Android Application for Visually-Impaired PeopleIRJET Journal
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methodsIRJET Journal
 

La actualidad más candente (20)

Face recognition application
Face recognition applicationFace recognition application
Face recognition application
 
Identifying unconscious patients using face and fingerprint recognition
Identifying unconscious patients using face and fingerprint recognitionIdentifying unconscious patients using face and fingerprint recognition
Identifying unconscious patients using face and fingerprint recognition
 
Face recognition smart cane using haar-like features and eigenfaces
Face recognition smart cane using haar-like features and eigenfacesFace recognition smart cane using haar-like features and eigenfaces
Face recognition smart cane using haar-like features and eigenfaces
 
Smart Face Recognition System Analysis
Smart Face Recognition System AnalysisSmart Face Recognition System Analysis
Smart Face Recognition System Analysis
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Mobile to server face recognition. Skripsi 1.
Mobile to server face recognition. Skripsi 1.Mobile to server face recognition. Skripsi 1.
Mobile to server face recognition. Skripsi 1.
 
Face recognition
Face recognition Face recognition
Face recognition
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
Face Recognition and Door Opening Assistant for Visually Impaired
Face Recognition and Door Opening Assistant for Visually ImpairedFace Recognition and Door Opening Assistant for Visually Impaired
Face Recognition and Door Opening Assistant for Visually Impaired
 
IRJET - Design and Development of Android Application for Face Detection and ...
IRJET - Design and Development of Android Application for Face Detection and ...IRJET - Design and Development of Android Application for Face Detection and ...
IRJET - Design and Development of Android Application for Face Detection and ...
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
IRJET- Automated Criminal Identification System using Face Detection and Reco...
IRJET- Automated Criminal Identification System using Face Detection and Reco...IRJET- Automated Criminal Identification System using Face Detection and Reco...
IRJET- Automated Criminal Identification System using Face Detection and Reco...
 
Classroom Attendance using Face Detection and Raspberry-Pi
Classroom Attendance using Face Detection and Raspberry-PiClassroom Attendance using Face Detection and Raspberry-Pi
Classroom Attendance using Face Detection and Raspberry-Pi
 
LDA presentation
LDA presentationLDA presentation
LDA presentation
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
 
Apple Face ID
Apple Face IDApple Face ID
Apple Face ID
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face Recognition Basic Terminologies
Face Recognition Basic TerminologiesFace Recognition Basic Terminologies
Face Recognition Basic Terminologies
 
IRJET- Gesture Drawing Android Application for Visually-Impaired People
IRJET- Gesture Drawing Android Application for Visually-Impaired PeopleIRJET- Gesture Drawing Android Application for Visually-Impaired People
IRJET- Gesture Drawing Android Application for Visually-Impaired People
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methods
 

Similar a IRJET-Human Face Detection and Identification using Deep Metric Learning

ATTENDANCE BY FACE RECOGNITION USING AI
ATTENDANCE BY FACE RECOGNITION USING AIATTENDANCE BY FACE RECOGNITION USING AI
ATTENDANCE BY FACE RECOGNITION USING AIIRJET Journal
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face RecognitionIRJET Journal
 
IRJET- IoT based Door Access Control using Face Recognition
IRJET- IoT based Door Access Control using Face RecognitionIRJET- IoT based Door Access Control using Face Recognition
IRJET- IoT based Door Access Control using Face RecognitionIRJET Journal
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition SystemStudentRocks
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face IdentificationIRJET Journal
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONLisa Cain
 
IRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using AndroidIRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using AndroidIRJET Journal
 
Prevention of Spoofing Attacks in Face Recognition System Using Liveness De...
Prevention of Spoofing Attacks in Face Recognition System Using   Liveness De...Prevention of Spoofing Attacks in Face Recognition System Using   Liveness De...
Prevention of Spoofing Attacks in Face Recognition System Using Liveness De...IRJET Journal
 
IRJET- Persons Identification Tool for Visually Impaired - Digital Eye
IRJET-  	  Persons Identification Tool for Visually Impaired - Digital EyeIRJET-  	  Persons Identification Tool for Visually Impaired - Digital Eye
IRJET- Persons Identification Tool for Visually Impaired - Digital EyeIRJET Journal
 
Face Mask Detection and Face Recognition Using Machine Learning
Face Mask Detection and Face Recognition Using Machine LearningFace Mask Detection and Face Recognition Using Machine Learning
Face Mask Detection and Face Recognition Using Machine LearningIRJET Journal
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVIRJET Journal
 
FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...
FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...
FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...IRJET Journal
 
IRJET- Vision based Security System and Automation using Internet of Things
IRJET- Vision based Security System and Automation using Internet of ThingsIRJET- Vision based Security System and Automation using Internet of Things
IRJET- Vision based Security System and Automation using Internet of ThingsIRJET Journal
 
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITIONA VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITIONIRJET Journal
 
Face Mask Detection System Using Artificial Intelligence
Face Mask Detection System Using Artificial IntelligenceFace Mask Detection System Using Artificial Intelligence
Face Mask Detection System Using Artificial IntelligenceIRJET Journal
 
Mouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep LearningMouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep LearningIRJET Journal
 
Mouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep LearningMouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep LearningIRJET Journal
 
Face Recognition System using OpenCV
Face Recognition System using OpenCVFace Recognition System using OpenCV
Face Recognition System using OpenCVIRJET Journal
 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABMaria Perkins
 
IRJET- Development of a Face Recognition System with Deep Learning and Py...
IRJET-  	  Development of a Face Recognition System with Deep Learning and Py...IRJET-  	  Development of a Face Recognition System with Deep Learning and Py...
IRJET- Development of a Face Recognition System with Deep Learning and Py...IRJET Journal
 

Similar a IRJET-Human Face Detection and Identification using Deep Metric Learning (20)

ATTENDANCE BY FACE RECOGNITION USING AI
ATTENDANCE BY FACE RECOGNITION USING AIATTENDANCE BY FACE RECOGNITION USING AI
ATTENDANCE BY FACE RECOGNITION USING AI
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face Recognition
 
IRJET- IoT based Door Access Control using Face Recognition
IRJET- IoT based Door Access Control using Face RecognitionIRJET- IoT based Door Access Control using Face Recognition
IRJET- IoT based Door Access Control using Face Recognition
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition System
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face Identification
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITION
 
IRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using AndroidIRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using Android
 
Prevention of Spoofing Attacks in Face Recognition System Using Liveness De...
Prevention of Spoofing Attacks in Face Recognition System Using   Liveness De...Prevention of Spoofing Attacks in Face Recognition System Using   Liveness De...
Prevention of Spoofing Attacks in Face Recognition System Using Liveness De...
 
IRJET- Persons Identification Tool for Visually Impaired - Digital Eye
IRJET-  	  Persons Identification Tool for Visually Impaired - Digital EyeIRJET-  	  Persons Identification Tool for Visually Impaired - Digital Eye
IRJET- Persons Identification Tool for Visually Impaired - Digital Eye
 
Face Mask Detection and Face Recognition Using Machine Learning
Face Mask Detection and Face Recognition Using Machine LearningFace Mask Detection and Face Recognition Using Machine Learning
Face Mask Detection and Face Recognition Using Machine Learning
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCV
 
FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...
FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...
FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...
 
IRJET- Vision based Security System and Automation using Internet of Things
IRJET- Vision based Security System and Automation using Internet of ThingsIRJET- Vision based Security System and Automation using Internet of Things
IRJET- Vision based Security System and Automation using Internet of Things
 
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITIONA VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
 
Face Mask Detection System Using Artificial Intelligence
Face Mask Detection System Using Artificial IntelligenceFace Mask Detection System Using Artificial Intelligence
Face Mask Detection System Using Artificial Intelligence
 
Mouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep LearningMouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep Learning
 
Mouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep LearningMouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep Learning
 
Face Recognition System using OpenCV
Face Recognition System using OpenCVFace Recognition System using OpenCV
Face Recognition System using OpenCV
 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
 
IRJET- Development of a Face Recognition System with Deep Learning and Py...
IRJET-  	  Development of a Face Recognition System with Deep Learning and Py...IRJET-  	  Development of a Face Recognition System with Deep Learning and Py...
IRJET- Development of a Face Recognition System with Deep Learning and Py...
 

Más de IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Más de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Último

welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the weldingMuhammadUzairLiaqat
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxVelmuruganTECE
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadaditya806802
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating SystemRashmi Bhat
 
The SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teamsThe SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teamsDILIPKUMARMONDAL6
 
Industrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESIndustrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESNarmatha D
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 

Último (20)

welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the welding
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasad
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating System
 
The SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teamsThe SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teams
 
Industrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESIndustrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIES
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 

IRJET-Human Face Detection and Identification using Deep Metric Learning

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4379 Human Face Detection and Identification using Deep Metric Learning Snehal S. Sapkal1, Alka P. Mengane2 , Tejashri A. Kalbhor3, Nitashree S. Ohol4 1Students of Computer Engineering. PDEA’s College of Engineering, Pune, India 2Students of Computer Engineering. PDEA’s College of Engineering, Pune, India 3Students of Computer Engineering. PDEA’s College of Engineering, Pune, India 4Students of Computer Engineering. PDEA’s College of Engineering, Pune, India --------------------------------------------------------------------------***------------------------------------------------------------------------- Abstract— Human Face Detection and Identification using Deep Metric Learning. In Our proposed project we are using a new technique of Face detection with Human object detection the technique is call as deep metric learning. Keywords— deep metric, deep learning, machine learning, face detection, recognition, identification, NN, ML I. INTRODUCTION In Our proposed project we are using a new technique of Face detection with Human object detection the technique is call as deep metric learning. We use real-time images or stream videos from CCTV or any other video capturing device or user can put pre recorded or captured video for analysis. Our system is boosted with widely used classification methods to detect and identify faces even from a blur images or scrappy videos. II. WIDE DEPENDENCIES WE USED A. Open Computer version (OpenCV): Efficiently working computer vision repository which is highly efficient and smooths real-time image processing. OpenCV (Open Source Computer Vision Library) is an open source computer vision and machine learning software library. OpenCV was built to provide a common infrastructure for computer vision applications and to accelerate the use of machine perception in the commercial products. Being a BSD-licensed product, OpenCV makes it easy for businesses to utilize and modify the code. B. Dlib: dlib is a intelligent implementation of the machine learning vectors and deep learning areas to train machine in various scenario like complicated facial recognition. Artificial Intelligence Behavior Tree Library DiLIB is a behavior tree library with tools to implement it over user interface aimed for C++ programmers. C. scikit-learn and scikit-image: To create deep learning network to understand inputted data and processes it with compiled version of our code with real time evaluation and high accuracy Simple and efficient tools for data mining and data analysis, Accessible to everybody, and reusable in various contexts, Built on NumPy, SciPy, and matplotlib, Open source, commercially usable - BSD license D. Keras: High-level neural networks API. Makes coding, training, and deploying neural networks Keras is an open-source neural-network library written in Python. It is capable of running on top of TensorFlow, Microsoft Cognitive Toolkit, Theano, or PlaidML. Designed to enable fast experimentation with deep neural networks, it focuses on being user-friendly, modular, and extensible. E. Mxnet: A scalable deep learning framework. Which is Extremely fast and efficient Capable of scaling across multiple GPUs and multiple machines. Apache MXNet is an open-source deep learning software framework, used to train, and deploy deep neural networks. III. OVERVIEW In Our proposed project we are using a new technique of Face detection with Human object detection the technique is call as deep metric learning. As we understand in deep learning we typically train a network to: • Accept a single input image • And output a classification/label for that image But deep metric learning is different. We are not trying to output a single label or image or coordinates box of objects in an image, we are directly outputting a real-valued vector.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4380 To perform this type of real time data vector and facial recognition in provided image or video we used some external factors to contribute in our detection. These factors are the external dependencies which we are using to build a complete vector graph and plotting facial vectors in order to valued it with inputted video or image to identify the suspect or our target from source image or video.. A. Motivation In today’s automation era, every information is being processed by the machine with artificial intelligence and used in many sophisticated applications. Even though many agencies have developed the state-of-the-art security systems, recent terrorist attacks exposed serious weaknesses of sophisticated security systems. Hence various agencies are more serious and motivated to improve security data systems based on body or behavioral characteristics, often called biometrics [1]. Biometric-based technologies include the identification based on physiological characteristics: face, fingerprints, finger geometry, hand geometry, hand veins, palm, iris, retina, ear, voice and behavioral traits such as gait, signature and keystroke dynamics [2]. Almost all the biometric technologies require some voluntary action by the user, i.e. the user needs to place his hand on a hand-rest for finger printing or hand geometry detection and has to stand in a fixed position in front of a camera for iris or retina identification. However, face recognition can be done passively without any definite action or participation on the 2 part of the user, since face images can be acquired from a distance by a camera, and hence the face recognition system is more appropriate for security and surveillance purposes. Further, data acquisition in general is fraught with problems for other biometric techniques that rely on hands and fingers. These can be rendered useless if the epidermis tissues are damaged in some way (i.e., bruised or cracked). Expensive equipments are required for the iris and retina identification, and these methods are more sensitive to any body motion. Voice recognition is susceptible to background noises in public places and auditory fluctuations on a phone line or tape recording. Signatures can be modified or forged. However, facial images can be easily obtained with a couple of inexpensive fixed cameras. They cannot be modified or forged, and they are not affected by background sound noise. Face recognition algorithms with appropriate preprocessing of the images may compensate for noise, slight variations in orientation, scale and illumination. Although there are advantages of face recognition over other biometric techniques, existing face recognition technology is not able to satisfy the needs. Several challenges are there in developing face recognition systems, which are: Illumination Variations: The direction of illumination in the image, greatly affects the face recognition performance. The variations between the same face images due to illumination are always greater than variations in the image due to change in face identity. Frontal vs. Profile: In a surveillance system, people are not always facing the cameras. The faces are viewed by some angle. The angle with which the photo of the individual was taken with respect to the camera affects the face recognition performance drastically. Expression Variations: Expression variations in face images affect the performance of face recognition. A smiling face, a laughing face, a crying face, a sad face, a fac with closed eyes, even a small distinction in the facial expression can influence facial recognition system greatly. Aging: Face images of the same individual of 1 year and 15 years are difficult to recognize since face appearance changes rapidly. Images taken by varying a time from 5 minutes to 5 years change the system accuracy seriously. Occlusions: It is very difficult to recognize the faces when they are partially occluded. Face images in real-world applications may occlude due to use of things, such as sunglasses, scarf, hands on the face portion, the objects which persons carry, and external sources that occlude the camera view partially. The ultimate goal of researchers in this area is to develop the sophisticated face recognition to emulate the human vision system. Many researchers have proposed and developed the machine-based face recognition algorithms. Research has been conducted vigorously in the face recognition area for the past four decades, and enormous progress has been made. Still, there is scope for improvement. Encouraging results have been obtained, and current face recognition systems have achieved a specific degree of maturity when operating under various constrained conditions. However, they are far from achieving the ideal of being able to perform adequately in all the various situations that are commonly encountered by applications, utilizing available techniques in practical life. B. Problem Definition and Objectives Biometric identification is the technique of automatically verifying or identifying a person by a personal trait or physical characteristic. The term “automatically” means the biometric system must identify or verify a human characteristic or trait promptly with little or no intervention of the user. Biometric technology was developed for its use in high-level security systems and law enforcement markets. The key element of biometric technology is its ability to identify a human being and impose security. The aim of this thesis is to develop an automatic face recognition system, which will improve recognition rates for normal images and for images with illumination and expression variations. In Our proposed project we are using a new technique of Face detection with Human object detection the technique is call as deep metric learning. As we understand in deep learning we typically train a network to:
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4381 • Accept a single input image • And output a classification/label for that image C. Methodologies of Problem solving We use real-time images or stream videos from CCTV or any other video capturing device or user can put pre recorded or captured video for analysis. Our system is boosted with widely used classification methods to detect and identify faces even from a blur images or scrappy videos. In order to make it functional on a regular computational CPU we made some functional changes in the dlib facial recognition network, now we can output the feature vector with 128-d i.e., a list of 128 real-valued numbers that our code will used to quantify the face. While we training network, we use triplets: Figure 1: Block diagram of unique deep learning “triplet training.” In this demonstration we used three unique faces of popular Cinema Actor. The same functional triplet training consists of the dataset of unique images to train from. With the tradition we used SVM to generate 128-d vector for all images in dataset.  In this we asked SVM to calibrate 128-d for above 3 images where the images of Ayushman are more than 2, hence defined algorithm sense’s it as 2 similar faces in dataset.  Although Shaharukh’s image is a random pick from our data set and as not the same as Ayushman  Our optimized network quantifies the faces and constructs the 128-d embeddings or quantification for each of the images in process. IV. DATASETS WE USED TO DO FACE RECOGNITION In this demonstration we used three unique faces of popular Cinema Actor. The same functional triplet training consists of the dataset of unique images to train from. With the tradition we used SVM to generate 128-d vector for all images in dataset.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4382 Figure2: Popular faces inspired dataset used in demonstration  Shahrukh Khan (16 images)  Ayushman Khurrana (16 images)  Ileana d'cruz (18 images)  Yami Gautam (17 images) The dataset we used and images we inputted into that are very random and having variety in color, shape, size and even in quality of pixels. This kind of variation is kept to ensure the quality and accuracy in face detection in various condition. A. Face Recognition Techniques- Appearance Based Approaches The Eigen face Method Firstly Kirby and Sirvoich demonstrated Eigenfaces method for recognition. Pentland and Turk made improvements on this research by employing Eigenfaces method based on Principle Component Analysis for the same reason PCA is a Karhumen-Loeve transformation. PCA is a realized linear dimensionality reduction method used to determine a set of mutually orthogonal basis functions and as shown in fig 1.For papers with less than six authors: maximum variance in g dimensional space and g is too big according to h. Subtracting the normalized training images from the calculated mean images thus mean centered images are calculated. If w is mean centered training image matrix Wi(i=1,2,........,L) and l is the number of training images, matrix d is calculated from as in equation 1 D = WWT To reduce the size of covariance matrix D, we can use D = WTW instead. Eigenvectors ei and eigen values _i are obtained from covariance matrix. Zi = ETwi(i = 1, 2, ....,L) In the equation 2, Zi represents the new feature vector of lower dimensional space. Negative aspect of this method, it tries to max inter and intra class scattering. Inter class scattering is good for classification where intra scattering is not. If there is variance illumination, increases intra class scattering very high, even classes seems stained. The Fisher face Method Belhumeur introduced the Fisher Face method in 1997, a derivative of Fishers Linear Discriminant (FLD) which has linear discriminant analysis (LDA) to gain the vast discriminant structures. Both PCA and LDA which are used to produce a subspace projection matrix is similar to eigen face and Fisher face methods. LDA describe a pair of projection vectors which form the maximum between-class scatter and minimum in the class scatter matrix concurrently
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4383 Following is the curve for the training error rate with varying value of K: you can see, the error rate at K=1 is always zero for the training sample. This is because the closest point to any training data point is itself.Hence the prediction is always accurate with K=1. If validation error curve would have been similar, our choice of K would have been 1. Following is the validation error curve with varying value of K: This makes the story more clear. At K=1, we were overfitting the boundaries. Hence, error rate initially decreases and reaches a minima. After the minima point, it then increase with increasing K. To get the optimal value of K, you can segregate the training and validation from the initial dataset. Now plot the validation error curve to get the optimal value of K. This value of K should be used for all predictions. Breaking it Down – Pseudo Code of KNN We can implement a KNN model by following the below steps: 1. Load the data 2. Initialise the value of k 3. For getting the predicted class, iterate from 1 to total number of training data points 1. Calculate the distance between test data and each row of training data. Here we will use Euclidean distance as our distance metric since it’s the most popular method. The other metrics that can be used are Chebyshev, cosine, etc. 2. Sort the calculated distances in ascending order based on distance values 3. Get top k rows from the sorted array 4. Get the most frequent class of these rows 5. Return the predicted class Fisher face or Linear Discriminant Analysis (LDA) aims to increase inter class differences and are not used to increase data representation
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4384 IV. EXPERIMENTAL RESULT Tree Structure of the proposed system 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 $ tree --filelimit 10 --dirsfirst . ├── dataset │ ├── Shahrukh Khan (16 images) │ ├── Ayushman Khurrana (16 images) │ ├── ileana d'cruz (18 images) │ ├── Yami Gautam (17 images) │ ├── sample_1 [36 entries] │ └── sample_2 [35 entries] ├── examples │ ├── example_01.png │ ├── example_02.png │ └── example_03.png ├── output │ └── lunch_scene_output.avi ├── videos │ └── lunch_scene.mp4 ├── search_bing_api.py ├── encode_faces.py ├── recognize_faces_image.py ├── recognize_faces_video.py ├── recognize_faces_video_file.py └── encodings.pickle 10 directories, 11 files In this project we enlist four top folders layers where we traverse all data and get orientation of the entire project  dataset/ : This is the top most folder serve as a main training set for the flow and detection mechanism, Contains face images of subjects which we wanted to match  examples/ : These are the images of unknown object to test by our trained network to assure detection and accuracy for the same these images are that are not in the dataset.  output/ : our system is a Input based centralized system where we generate our output in a specific location this directory serve as a Output Path for our investigated contain like images or videos which are rendered by project.  videos/ : As imported the Deep Learning in our project as a part of that Our project can detect images form video and the same will be rendered and stored as an Input video in this folder We have our worker files which will do all hard work for us encode_faces.py: Encodings (128-d vectors) for faces recognize_faces_image.py: Recognize faces recognize_faces_video.py: Recognize faces in a live video stream recognize_faces_video_file.py: Recognize faces in a video file from save video file encodings.pickle : Facial recognitions encodings to form vector from dataset Figure 3: The hard work of Facial recognition using the module As the critical process we must do some background work in order to streamline our activities and loads up images and videos for face detection and recognition. As it is a input based activity first we need to enlist our source images or videos before we can recognize faces from images and videos which will be as a mode of operandi. In order to established a connection between or dataset and network we must quantify the faces in training set. Right at this movement we are not training our module or network but we are making sure it has been done already to create 128-d embeddings V. CONCLUSION As the critical process we must do some background work in order to streamline our activities and loads up images and videos for face detection and recognition. As it is a input based activity first we need to enlist our source images or videos before we can recognize faces from images and videos which will be as a mode of operandi. In order to established a connection between or dataset and network we must quantify the faces in training set. Right at this movement we are not training our module or network but we are making sure it has been done already to create 128-d embeddings. As our system is now detecting images successfully and we have created our 128-d face embeddings for each image in our dataset, Now We attempt to match each face in the
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4385 input image ( encoding ) to our known encodings dataset (held in data["encodings"] ) This function returns a list of events which are having True / False values, one by one for each image in our dataset On other hand our pre-processors are Internally are computing the Euclidean distance between the candidate embedding and all faces in our dataset using the compare_faces function Figure 4: System has successfully recognized Ayushman Khurrana’s face Embedding an all faces in our dataset using the compare_faces function  The purpose of this comparison is to detect the distance which is below our tolerance ratio which is auto set by CPU or GPU clock rate returning the True value which indicates the faces matched.  And if the distance is above the tolerance threshold it will return False values which means we have not match.  Along side of this we also able to show name of the face as it given in dataset The name variable will eventually hold the name string of the person  This name variable is decided on the votes system will receive from pre processors while computing all datasets for operation the number of True values associated with each name which will eventually tally up and select the person’s name which is having the most corresponding votes. VI. REFERENCE [1] Ahmet zdil Metin Mete zbilen A Survey on Comparison of Face Recognition Algorithms IEEE 2015 [2] G. Ramkumar, M. Manikandan - Face Recognition Survey International Journal of Advances in Science and Technology (IJAST) 2014 ISSN 2348-5426 [3] Sharkas, M. Abou Elenien, Eigenfaces vs. Fisherfaces vs. ICA for Face Recognition; A Comparative Study, 9th International Conference on Signal Processing, 2008, ICSP 2008., 2008, pp. 914919 [4] K. Kim, Intelligent Immigration Control System by Using Passport Recognition and Face Verification, in International Symposium on Neural Networks Chongqing, China, 2005, pp.147-156. [5] J. N. K. Liu, M. Wang, and B. Feng, iBotGuard: an Internetbased intelligent robot security system using invariant face recognition against intruder, IEEE Transactions on Systems Man And Cybernetics Part C- Applications And Reviews, Vol.35, pp.97-105, 2005. [6] H. Moon, Biometrics Person Authentication Using Projection- Based Face Recognition System in Verification Scenario, in International Conference on Bioinformatics and its Applications. Hong Kong, China, 2004, pp.207-213. [7] D. McCullagh, Call It Super Bowl Face Scan 1, in Wired Magazine, 2001. [8] CNN, Education School face scanner to search for sex offenders. Phoenix, Arizona: The Associated Press, 2003. [9] P. J. Phillips, H. Moon, P. J. Rauss, and S. A. Rizvi, The FERET Evaluation Methodology for Face Recognition Algorithms, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol.22, pp.1090-1104, 2000. 10] T. Choudhry, B. Clarkson, T. Jebara, and A. Pentland, Multimodal person recognition using unconstrained audio and video, in Proceedings, International Conference on Audio and Video- Based Person Authentication, 1999, pp.176-181. [11] S. L. Wijaya, M. Savvides, and B. V. K. V. Kumar, Illumination-tolerant face verification of low-bit-rate JPEG2000 wavelet images with advanced correlation filters for handheld devices, Applied Optics, Vol.44, pp.655-665, 2005. [12] E. Acosta, L. Torres, A. Albiol, and E. J. Delp, An automatic face detection and recognition system for video indexing applications, in Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, Vol.4. Orlando, Florida, 2002, pp.3644-3647.
  • 8. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4386 [13] J.-H. Lee and W.-Y. Kim, Video Summarization and Retrieval System Using Face Recognition and MPEG-7 Descriptors, in Image and Video Retrieval, Vol.3115. [14] Lecture Notes in Computer Science : Springer Berlin / Heidelberg,2004, pp.179-188. [15] C. G. Tredoux, Y. Rosenthal, L. d. Costa, and D. Nunez, Face reconstruction using a configural, eigenface-based composite system, in 3rd Biennial Meeting of the Society for Applied Research in Memory and Cognition (SARMAC). Boulder, Colorado, USA, 1999. [16] K. Balci and V. Atalay, PCA for Gender Estimation: Which Eigenvectors Contribute? In Proceedings of Sixteenth International Conference on Pattern Recognition, Vol.3. Quebec City, Canada, 2002, pp. 363-366. [17] B. Moghaddam and M. H. Yang, Learning Gender with Support Faces, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol.24, pp.707-711, 2002. [18] R. Brunelli and T. Poggio, HyperBF Networks for Gender Classification, Proceedings of DARPA Image Understanding Workshop, pp.311-314, 1992. [19] A. Colmenarez, B. J. Frey, and T. S. Huang, A probabilistic framework for embedded face and facial expression recognition, in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Vol.1. Ft. Collins, CO, USA, 1999, pp. 1592-1597. [20] Y. Shinohara and N. Otsu, Facial Expression Recognition Using Fisher Weight Maps, in Sixth IEEE International Conference on Automatic Face and Gesture Recognition, Vol.100, 2004, pp.499-504. [21] F. Bourel, C. C. Chibelushi, and A. A. Low, Robust Facial Feature Tracking, in British Machine Vision Conference. Bristol, 2000, pp.232-241. [22] K. Morik, P. Brockhausen, and T. Joachims, Combining statistical learning with a knowledge based approach – A case study in intensive care monitoring, in 16th International Conference on Machine Learning (ICML-99). San Francisco, CA, USA: Morgan Kaufmann, 1999, pp.268- 277. [23] S. Singh and N. Papanikolopoulos, Vision-based detection of driver fatigue, Department of Computer Science, University of Minnesota, Technical report 1997. [24] D. N. Metaxas, S. Venkataraman, and C. Vogler, Image- Based Stress Recognition Using a Model-Based Dynamic Face Tracking System, International Conference on Computational Science , pp.813-821, 2004. [25] M. M. Rahman, R. Hartley, and S. Ishikawa, A Passive And Multimodal Biometric System for Personal Identification, in International Conference on Visualization, Imaging and Image Processing Spain, 2005, pp.89-92. [26] R. Brunelli and D. Falavigna, Person identification using multiple cues, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol.17, pp.955-966, 1995. [27] M. Viswanathan, H. S. M. Beigi, A. Tritschler, and F. Maali, Information access using speech, speaker and face recognition.