Monday, May 20, 2019

Facial Recognition Biometrics Essay

Traditional personal identification and authentication methods always tolerate the danger of being stolen, duplicated or forgotten. Hence, biometrics was introduced as an identification and authentication technology, where physical features would be utilise for recognizing a person. This technology uses many features for unique identification like fingerprints, facial gesture, irises and voice. Fingerprints are by far the close to popular techniques used for i8dentification, because of their traditional use in forensics.However, face cite is considered to be the more direct, favorable and convenient method for identification as compared to fingerprint identification. This has made face recognition system as the second most widely used biometric technology after fingerprinting with a projected taxation of $429 million in 2007, according to Raicu & Strandburg (2005). This growth in the use of this technology is attributed to the sharp rise in the number of digital cameras and cam corders and inconsequence charge cameras.The purpose of this paper is to analyze this technology, explain its basic principle, visualize into the limitations of the technology and the research constitute being done in this field. Face Recognition Face recognition consists of two abuses face perception and location features extraction and face recognition. Figure below shows a flowchart of the face recognition system Fig -1 Flow chart of a basic face recognition system (Zhang, 2000) Face Detection and Location This step checks if the given stunt woman or image sequence includes faces.It yes, then it locates the position of the faces and segments each face from the background Features extraction and face recognition This step checks the various features that distinguish different individuals. It figures whether the people in the image are the given person or if he / she are in the database. Needless to say, the face recognition system depends upon the stimulation of the system . The importance of the input and picture background is explained by Zhang (2000) by giving the following example. The picture taken during log in on a system and passing custom are controlled.That is to say the background is uniform for the images or image sequences. The pose, orientation etc is too known and well controlled. This makes the process of face recognition is accurate and faster. However, in case of an input environment which is universal for all situations, there might be number of faces and also a complex background. The location of the face and its size is not known, the illumination on the different faces in a picture is different and their expressions might be different too.In such cases, the face detection and location is difficult. Face recognition can be made difficult due to different expressions, orientations and age, make the process of feature extraction and face recognition all the more difficult (Zhang, 2000) One distinguished parameter in the evaluatio n of a face- touch on system is the performance evaluation. The basic measurement parameters are the alike(p) as that for pattern recognition system FA i. e. false acceptance or false positive and FR i. e. false rejection or false negative.As in case of a pattern recognition system, an high-minded face-recognition system should have very low scores of FA and FR, but a practical system unremarkably makes trade-offs amongst these two factors. History of Face Processing Systems Development According to Zhao & Chellappa (2006), the earliest work on face recognition can be traced to the early 1950s in psychology and 1960s in engineering literature. However, the research on automatic machine recognition of faces started in 1970s after the work of Kanade and Kelly.For over 30 years extensive research has been conducted on various aspects of face recognition by humans and machines. During early and mid 1970s typical pattern-classification techniques using measured attribute of features for instance the distances between important points in faces or profiles were used. In 1980s, the work in this field remained largely dormant. The interest in this field was renewed in 1990s due to an increase in commercial opportunities, availability of real-time hardware and emergence of surveillance related actions.During this time the research was focused on how to make the face-recognition systems richly automatic by tackling various underlying problems like localization of a face in a given image or a video clip and extraction of features such as eyes, mouth etc (Zhao & Chellappa, 2006) Applications of Face processing The coatings of face processing vary, leading to different features extraction and face recognition. For instance, one application is the face verification, which means that the person is who he claims to be. This is used in places like banks for identity confirmation.Another application is to check if the person exists in the database and if yes than which one. This is known as face recognition and used in surveillance systems in offices. A variation of this is when we wish to have a list of candidates with a specific devise of specified features. This is used in the police department (Zhang, 2000) The table below gives some applications of face processing including detection and tracking, recognition of identity and expressions, and also personalized realistic rendering (Zhao & Chellappa, 2006).

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.