seminar on face recognigion system
Post on 07-Apr-2018
219 Views
Preview:
TRANSCRIPT
-
8/6/2019 Seminar on Face Recognigion System
1/39
Computer Science Department FACE RECOGNITION
Face Recognition Technology
A SEMINAR REPORT
Submitted By
XXXXXX XXXXXX
In partial fulfillment for the award of the degree
of
BACHELOR OF TECHNOLOGYIN
COMPUTER SCIENCE & ENGINEERING
AT
College logo
Yagyavalkya Institute of
Technology
JAIPUR
SESSION 2009-2010
-
8/6/2019 Seminar on Face Recognigion System
2/39
Computer Science Department FACE RECOGNITION
Preface
Engineering is associated with skill, creativity and judgment,
which is not a theory subject but an art which can be obtained
with systematic study, observation and practice. To bridge the
gap of theoretical and practical study and to provide a solution for
the same practical knowledge is indispensable. In the college
circulation we usually get the theoretical knowledge of industries,
as how it works. But how can we prove our theoretical knowledge
to increase the productivity or efficiency of the industry?
To overcome the same problem, we, the students ofXXXXXXXXXXXX Institute of Technologyare supposed to goa practical training of 30 days at the end of sixth semester as the
time is predefined to be familiar with industrial environment.
This report briefly describes a study-cum-report on Face
Recognition Technology and other related features.
Without such practical works, only theoretical Engineering is of
little value. Surely, it will be highly beneficial for us.
XXXXX XXXXX
FINAL
B. [COMPUTER SCIENCE]
-
8/6/2019 Seminar on Face Recognigion System
3/39
Computer Science Department FACE RECOGNITION
Acknowledgment
I sincerely acknowledge Mr. XXXXXX XXXXX Head, Computer
engineering Department, YIT, Jaipur who helped us a lot so that
project was completed within specified period. We are extremely
grateful to him for his kind consent, co-operation and
encouragement. We are greatly motivated by his character of
looking everything from completely differently angle and his
never ending enthusiasm work. I also learned a lot from whileattending his sessions.
We acknowledge Mr. XXXXXX XXXXX (Seminar Coordinator),
who has helped and guided us throughout in the completion of
this project as well as the challenges that lie behind us. He is
always there to meet and talk about my ideas, to proofread and
mark up my project. We are really fortunate to work under this
guidance .He was instrumental in making us understand how to
implement the project and also provided continuous supervision
of the project.
This project has been benefited from the many useful comments
provided to me by the numerous of my colleagous. In addition
many other of my friends have checked it and have offered many
suggestions and comments. Besides there are some books and
some online helps. Although I cannot mention all these people
here, I thank each and everyone who supported me on this.
-
8/6/2019 Seminar on Face Recognigion System
4/39
Computer Science Department FACE RECOGNITION
CERTIFICATE
Date:
This is to certify that the seminar titled Face Recognition
Technology submitted by XXXXX XXXX in partial
fulfillment for the award of degree of Bachelor of
Technology of Rajasthan Technical University, Kota has
been carried out under my supervision during the
academic year 2009-2010.This work has not been
submitted partially or wholly to any other University or
Institute for the award of this or any other degree or
diploma.
Signature
Signature
Mr. XXXX XXXXX
-
8/6/2019 Seminar on Face Recognigion System
5/39
Computer Science Department FACE RECOGNITION
Mr. XXXXX XXXXX
HOD CSSeminar Guide
Contents
Page no.
1.
Abstract
6
2.
Introduction.. 7
3. FRT
operation
8
4. FRT task..
.
.10
5. Step of facial
recognition..13
-
8/6/2019 Seminar on Face Recognigion System
6/39
Computer Science Department FACE RECOGNITION
6. Moral consideration of FRT..
.15
7.
Difficulties
18
8.
Conclusion
21
9.References
22
-
8/6/2019 Seminar on Face Recognigion System
7/39
Computer Science Department FACE RECOGNITION
ABSTRACT
A face recognition technology is used to automatically identify a person through adigital image. It is mainly used in security systems. The face recognition will
directly capture information about the shapes of faces. The main advantage of
facial recognition is it identifies each individuals skin tone of a human faces
surface, like the curves of the eye hole, nose, and chin, etc. this technology may
also be used in very dark condition. It can view the face in different angles to
identify.
It is mainly used in airports were it ill recognize the face and we can avoid some
unwanted terrorist. When compared with other biometrics systems usingfingerprint and iris, face recognition has different advantages because it is without
touching the person. Trough Face images we can capture the person identification
from a distance without touching or interacting with them. And also face
recognition is used for crime restriction purpose because face images that have
been recorded and archived, so that it ill help us to identify a person later.
This report develops a socio-political analysis that bridges the technical and social-
scientific literatures on FRT and addresses the unique challenges and concerns that
attend its development, evaluation, and specific operational uses, contexts, and
goals. It highlights the potential and limitations of the technology, noting thosetasks for which it seems ready for deployment, those areas where performance
obstacles may be overcome by future technological developments or sound
operating procedures, and still other issues which appear intractable. Its concern
with efficacy extends to ethical considerations
-
8/6/2019 Seminar on Face Recognigion System
8/39
Computer Science Department FACE RECOGNITION
Introduction to FRT (how does it work?)
Facial recognition research and FRT is a subfield in a larger field of pattern
recognition research and technology. Pattern recognition technology uses
statistical techniques to detect and extract patterns from data in order to
match it with patterns stored in a database. The data upon which the
recognition system works (such as a photo of a face) is no more than a set of
discernable pixel-level patterns for the system, that is, the pattern
recognition system does not perceive meaningful faces as a human would
understand them.
Nevertheless, it is very important for these systems to be able to locate ordetect a face in a field of vision so that it is only the image pattern of the
face (and not the background noise) that is processed and analyzed. This
problem, as well as other issues, will be discussed as the report proceeds.
In these discussions we will attempt to develop the readers understanding
of the technology without going into too much technical detail. This
obviously means that our attempts to simplify some of the technical detailmight also come at the cost of some rigor. Thus, readers need to be careful to
bear this in mind when they draw conclusions about the technology.
Nevertheless, we do believe that our discussion will empower the
policymaker to ask the right questions and make sense of the
pronouncements that come from academic and commercial sources.
-
8/6/2019 Seminar on Face Recognigion System
9/39
Computer Science Department FACE RECOGNITION
FRT in operation
Overview
Figure 1 below depicts the typical way that a FRT can be used for
identification purposes. The first step in the facial recognition process is the
capturing of a face image, also known as the probe image. This would
normally be done using a still or video camera.
In principle, the capturing of the face image can be done with or without the
knowledge (or cooperation) of the subject. This is indeed one of the most
attractive features of FRT. As such, it could, in principle, be incorporated
into existing good quality passive CCTV systems. However, as we willshow below, locating a face in a stream of video data is not a trivial matter.
The effectiveness of the whole system is highly dependent on the quality7and characteristics of the captured face image. The process begins with face
detection and extraction from the larger image, which generally contains a
background and often more complex patterns and even other faces.
The system will, to the extent possible, normalize (or standardize) the
probe image so that it is in the same format (size, rotation, etc.) as the
images in the database. The normalized face image is then passed to therecognition software. This normally involves a number of steps such as
extracting the features to create a biometric template or mathematical
representation to be compared to those in the reference database (often
referred to as thegallery).
In an identification application, if there is a match, an alarm solicits an
operators attention to verify the match and initiate the appropriate actions.
The match may either be true, calling for whatever action is deemed
appropriate for the context, or it may be false (a false positive), meaningthe recognition algorithm made a mistake. The process we describe here is a
typical identification task.
-
8/6/2019 Seminar on Face Recognigion System
10/39
Computer Science Department FACE RECOGNITION
Figure 1: Overview of FRS
FRT can be used for a variety of tasks. Let us consider these in more detail.
-
8/6/2019 Seminar on Face Recognigion System
11/39
Computer Science Department FACE RECOGNITION
FRT tasks
FRT can typically be used for three different tasks, or combinations of tasks:
verification, identification, and watch list. Each of these represents distinctivechallenges to the implementation and use of FRT as well as other biometric
technologies.Home Safety and Security Systems
Because Z-Wave can transceive commands based on real time conditions, and is
able to control devices in intelligent groupings, it allows novel extensions of
traditional home security concepts. As an example, the opening of a Z-Wave
enabled door lock can de-activate a security system and turn on lights when
children arrive home from school, and send a notification to a parent's PC or cell
phone via the Internet. Opening a Z-Wave enabled garage door can trigger exterior
and interior home lights, while a Z-Wave motion detector can trigger an outdoor
security light and a webcam, which would allow the end user to monitor the home
while away.
Home Entertainment
Z-Wave's ability to command multiple devices as a unified event makes it well
suited for home audio and video applications. For example, a simple "Play DVD"
command on the remote control could turn on the needed components, set them to
the correct inputs and even lower motorized shades and dim the room lights. Z-
Wave's RF technology is also well suited as an evolution of conventional infrared
(IR) based remote controls for home electronics, as it is not constrained by IR's line
of sight and distance limitations. In January of 2008, Zensys announced a single-
chip solution that pairs Z-Wave with IR control, positioning the technology as an all
encompassing solution for home remote controls.
1.3 Setting up a Z-Wave network
-
8/6/2019 Seminar on Face Recognigion System
12/39
Computer Science Department FACE RECOGNITION
Z-Wave mesh networks can begin with a single controllable device and a controller.
Additional devices can be added at any time, as can multiple controllers, including
traditional hand-held controllers, key-fob controllers, wall-switch controllers and PC
applications designed for management and control of a Z-Wave network.
A device must be "included" to the Z-Wave network before it can be controlled via
Z-Wave. This process (also known as "pairing" and "adding") is usually achieved by
pressing a sequence of buttons on the controller and the device being added to the
network. This sequence only needs to be performed once, after which the device is
always recognized by the controller. Devices can be removed from the Z-Wave
network by a similar process of button strokes.
This inclusion process is repeated for each device in the system. Because the
controller is learning the signal strength between the devices during the inclusion
process, the devices themselves should be in their intended final location before
they are added to the system.
However, once a device has been introduced into a network, it can become
troublesome to remove the unit without actually having the functional unit present.
A number of Z-Wave users have complained that a Z-Wave controller can be
functionally destroyed by the bulb that it controls blowing and any controlling units
then report errors every time a command that would affect that unit is sent, i.e.,
group commands / scene commands / all-on / all-off, etc. The only way to restore
the service to a non-error reporting state is to factory reset all controllers and then
relearn all Z-Wave devices.
1.4 Z-Wave Alliance
The Z-Wave Alliance is a consortium of over 160 independent manufacturers who
have agreed to build wireless home control products based on the Z-Wave
standard. Principal members include Cooper Wiring Devices, Danfoss, Fakro,
Ingersoll-Rand, Intel, Intermatic, Leviton, Universal Electronics, Wayne-Dalton, Z-
Wave and Zensys.
-
8/6/2019 Seminar on Face Recognigion System
13/39
Computer Science Department FACE RECOGNITION
Products and applications from the Z-Wave Alliance fall into all major market
sectors for residential and light commercial control applications. These include
lighting, HVAC and security control, as well as home theaters, automated window
treatments, pool and spa controls, garage and access controls and more.
1.5 Radio specifications
Bandwidth: 9,600 bit/s or 40 kbit/s, fully interoperable
Modulation: GFSK
Range: Approximately 100 feet (or 30 meters) assuming "open air" conditions, with
reduced range indoors depending on building materials, etc.
Frequency band: The Z-Wave Radio uses the 900 MHz ISM band: 908.42MHz (United
States); 868.42MHz (Europe); 919.82MHz (Hong Kong); 921.42MHz (Australia/New
Zealand).
1.6 Radio specifics
In Europe, the 868 MHz band has a 1% duty cycle limitation, meaning that a Z-Wave unit canonly transmit 1% of the time. This limitation is not present in the U.S. 908 MHz band, but U.S.
legislation imposes a 1 mW transmission power limit, as opposed to 25 mW in Europe. Z-Wave
units can be in power-save mode and only be active 0.1% of the time, thus reducing powerconsumption dramatically.
1.7 Topology and routing
Z-Wave uses a Source-routed mesh network topology and has one or more master controllers
that control routing and security. Devices can communicate to another by using intermediatenodes to actively route around household obstacles or radio dead spots that might occur. A
message from node A to node C can be successfully delivered even if the two nodes are not
within range, providing that a third node B can communicate with nodes A and C. If the
-
8/6/2019 Seminar on Face Recognigion System
14/39
Computer Science Department FACE RECOGNITION
preferred route is unavailable, the message originator will attempt other routes until a path is
found to the "C" node. Therefore a Z-Wave network can span much further than the radio range
of a single unit, however with several of these hops a delay may be introduced between thecontrol command and the desired result. In order for Z-Wave units to be able to route unsolicited
messages, they cannot be in sleep mode. Therefore, most battery-operated devices are not
designed as repeater units. A Z-Wave network can consist of up to 232 devices with the option ofbridging networks if more devices are required.
2. What is
Z-Wave?
Home networking.
Home communication.
Home automation.
Security.
2.1 Wireless sensor network
A wireless sensor network (WSN) consists of spatially distributed autonomous sensors to
cooperatively monitor physical or environmental conditions, such as temperature, sound,
vibration, pressure, motion or pollutants. The development of wireless sensor networks wasmotivated by military applications such as battlefield surveillance. They are now used in many
industrial and civilian application areas, including industrial process monitoring and control,
machine health monitoring, environment and habitat monitoring, healthcare applications, homeautomation, and traffic control.
In addition to one or more sensors, each node in a sensor network is typically equipped with a
radio transceiver or other wireless communications device, a small microcontroller, and an
energy source, usually a battery. A sensor node might vary in size from that of a shoebox downto the size of a grain of dust, although functioning "motes" of genuine microscopic dimensions
have yet to be created. The cost of sensor nodes is similarly variable, ranging from hundreds of
dollars to a few pennies, depending on the size of the sensor network and the complexityrequired of individual sensor nodes. Size and cost constraints on sensor nodes result in
corresponding constraints on resources such as energy, memory, computational speed and
bandwidth.
A sensor network normally constitutes a wireless ad-hoc network, meaning that each sensorsupports a multi-hop routing algorithm (several nodes may forward data packets to the base
station).
-
8/6/2019 Seminar on Face Recognigion System
15/39
Computer Science Department FACE RECOGNITION
2.2 HOME AUTOMATION
Home automation (also called domotics) designates an emerging practice of increased
automation of household appliances and features in residential dwellings, particularly throughelectronic means that allow for things impracticable, overly expensive or simply
not possible in recent past decades. The term may be used in contrast to the more mainstream
"building automation", which refers to industrial uses of similar technology, particularly the
automatic or semi-automatic control of lighting, doors and windows, Heating, Ventilation andAir Conditioning, and security and surveillance systems.
The techniques employed in home automation include those in building automation as well as
the control of home entertainment systems, houseplant watering, pet feeding, changing the
ambiance "scenes" for different events (such as dinners or parties), and the use of domesticrobots.
Typically, it is easier to more fully outfit a house during construction due to the accessibility ofthe walls, outlets, and storage rooms, and the ability to make design changes specifically to
accommodate certain technologies. Wireless systems are commonly installed when outfitting apre-existing house, as they obviate the need to make major structural changes. These
communicate via radio or infrared signals with a central controller.
Overview and Benefits
As the amount of controllable fittings and domestic appliances in the home rises, the ability ofthese devices to interconnect and communicate with each other digitally becomes a useful and
desirable feature. The consolidation of control or monitoring signals from appliances, fittings or
basic services is an aim of Home automation.
In simple installations this may be as straightforward as turning on the lights when a personenters the room. In advanced installations, rooms can sense not only the presence of a person
inside but know who that person is and perhaps set appropriate lighting, temperature, music
levels or television channels, taking into account the day of the week, the time of day, and otherfactors.
Other automated tasks may include setting the air conditioning to an energy saving setting when
the house is unoccupied, and restoring the normal setting when an occupant is about to return.
More sophisticated systems can maintain an inventory of products, recording their usage through
an RFID tag, and prepare a shopping list or even automatically order replacements.
Home automation can also provide a remote interface to home appliances or the automation
system itself, via telephone line, wireless transmission or the internet, to provide control and
monitoring via a Smart Phone or Web browser
An example of a remote monitoring implementation of home automation could be when a smoke
detector detects a fire or smoke condition, then all lights in the house will blink to alert any
-
8/6/2019 Seminar on Face Recognigion System
16/39
Computer Science Department FACE RECOGNITION
occupants of the house to the possible fire. If the house is equipped with a home theatre, a home
automation system can shut down all audio and video components to display the alert or make an
audible announcement. The system could also call the home owner on their mobile phone to alertthem, or call the fire brigade or alarm monitoring company to bring it to their attention.
Standards and bridges
There have been many attempts to standardize the forms of hardware, electronic and
communication interfaces needed to construct a home automation system. Specific domesticwiring and communication standards include:
BACnet
INSTEON
X10
KNX (standard)
LonWorks
C-Bus
SCS BUS with OpenWebNet
Universal powerline bus (UPB)
ZigBee and,
Z-Wave
Some standards use additional communication and control wiring, some embed signals in theexisting power circuit of the house, some use radio frequency (RF) signals, and some use a
combination of several methods. Control wiring is hardest to retrofit into an existing house.
Some appliances include USB that is used to control it and connect it to a domotics network.
Bridges translate information from one standard to another (eg. from
The New Standard in Wireless Remote Control
Z-Wave powers Z~Series. And to do so it takes the principals of modern, wireless technology
and applies it to home automation and control. To do so it uses all the principals that are
important to modern home automation: reliability, affordability, and the ability to install withoutlaying down cables or knocking holes in walls.
-
8/6/2019 Seminar on Face Recognigion System
17/39
Computer Science Department FACE RECOGNITION
Z-Wave makes any home a smart home quickly, easily and affordably!
Z-Wave is a next-generation wireless ecosystem that lets all your homeelectronics talk to each other, and to you, via remote control. It uses simple,reliable, low-power radio waves that easily travel through walls, floors and
cabinets. Z-Wave control can be added
Verification (Am I the identity I claim to be?)
Verification or authentication is the simplest task for a FRT. An individual
with a pre-existing relationship with an institution (and therefore already
enrolled in the reference database or gallery) presents his or her biometric
characteristics (face or probe image) to the system, claiming to be in the
reference database or gallery (i.e. claiming to be a legitimate identity).
The system must then attempt to match the probe image with the particular,claimed template in the reference database. This is a one-to-one matchingtask since the system does not need to check every record in the database but
only that which corresponds to the claimed identity (using some form of
identifier such as an employee number to access the record in the reference
database).
There are two possible outcomes: (1) the person is not recognized or (2) the
person is recognized. If the person is not recognized (i.e., the identity is not
verified) it might be because the person is an imposter (i.e., is making an
illegitimate identity claim) or because the system made a mistake (thismistake is referred to as afalse reject). The system may also make a mistake
in accepting a claim when it is in fact false (this is referred to as a false
accept).
The relationship between these different outcomes in the verification task is
indicated in Figure 2
-
8/6/2019 Seminar on Face Recognigion System
18/39
Computer Science Department FACE RECOGNITION
Figure 2: Possible outcomes in the verification task
Identification (Who am I or What is my identity?)
Identification is a more complex task than verification. In this case, the FRT
is provided a probe image to attempt to match it with a biometric reference
in the gallery (or not). This represents a one-to-manyproblem.
In addition, we need to further differentiate between closed-set identification
problems and open-set identification problems. In a closed-setidentification
problem we want to identify a person that we know is in the referencedatabase or gallery (in other words for any possible identification we want to
make we know beforehand that the person to be identified is in the
database).
Open-setidentification is more complex in that we do not know in advancewhether the person to be identified is or is not in the reference database. The
outcome of these two identification problems will be interpreted differently.
If there is no match in the closed-set identification then we know the system
has made a mistake (i.e., identification has failed (a false negative)).
-
8/6/2019 Seminar on Face Recognigion System
19/39
Computer Science Department FACE RECOGNITION
However in the open-set problem we do not know whether the system made
a mistake or whether the identity is simply not in the reference database in
the first instance. Real-world identification applications tend to be open-set
identification problems rather than closed-set identification problems.
Figure 3: Possible outcomes in the identification task
-
8/6/2019 Seminar on Face Recognigion System
20/39
Computer Science Department FACE RECOGNITION
Five Steps to Facial Recognition
1.Capture image
2. Find face in image
3. Extract features
4. Compare templates
5. Declare matches
As a biometric, facial recognition is a form of computer vision that usesfaces to attempt to identify a person or verify a persons claimed identity.
Regardless of specific method used, facial recognition is accomplished in a
five step process.
1. First, an image of the face is acquired. This acquisition can be accomplished by
digitally scanning an existing photograph or by using an electro-optical camera to
acquire a live picture of a subject. As video is a rapid sequence of individual still
images, it can also be used as a source of facial images.
2. Second, software is employed to detect the location of any face in the acquired
image. This task is difficult, and often generalized patterns of what a face looks
like (two eyes and a mouth set in an oval shape) are employed to pick out the
faces.
3. Once the facial detection software has targeted a face, it can be analyzed. As
noted in slide three, facial recognition analyzes the spatial geometry of
distinguishing features of the face. Different vendors use different methods to
extract the identifying features of a face.
-
8/6/2019 Seminar on Face Recognigion System
21/39
Computer Science Department FACE RECOGNITION
Thus, specific details on the methods are proprietary. The most popular method is
called Principle Components Analysis (PCA), which is commonly referred to as
the eigen face method. PCA has also been combined with neural networks and
local feature analysis in efforts to enhance its performance.
Template generation is the result of the feature extraction process. A template is a
reduced set of data that represents the unique features of an enrollees face. It is
important to note that because the systems use spatial geometry of distinguishing
facial features, they do not use hairstyle, facial hair, or other similar factors.
4. The fourth step is to compare the template generated in step three with those ina database of known faces. In an identification application, this process yields
scores that indicate how closely the generated template matches each of those in
the database. In a verification application, the generated template is only compared
with one template in the database that of the claimed identity.
5. The final step is determining whether any scores produced in step four are high
enough to declare a match. The rules governing the declaration of a match areoften configurable by the end user, so that he or she can determine how the facial
recognition system should behave based on security and operational
considerations.
-
8/6/2019 Seminar on Face Recognigion System
22/39
Computer Science Department FACE RECOGNITION
-
8/6/2019 Seminar on Face Recognigion System
23/39
Computer Science Department FACE RECOGNITION
Moral considerations of FRT
This report has considered technical merits of FRT and FRS, particularly as they
function in real-world settings in relation to specific goals. Although certain
barriers to performance might be overcome by technical breakthroughs or
mitigated by policies and guidelines, there remains a class of issues deserving
attention not centered on functional efficiency but on moral and political concerns.
These concerns may be grouped under general headings of privacy, fairness,
freedom and autonomy, and security. While some of these are characteristically
connected to facial recognition and other biometric and surveillance systems,
generally, others are exacerbated, or mitigated, by details of the context,installation, and deployment policies. Therefore, the brief discussion that follows
not only draws these general connections, it suggests questions that need
addressing in order to anticipate and minimize impacts that are morally and
politically problematic.
Privacy is one of the most prominent concerns raised by critics of FRS. This is
not surprising because, at root, FRS disrupts the flow of information by connectingfacial images with identity, in turn connecting this with whatever other information
is held in a systems database. Although this need not in itself be morally
problematic, it is important to ascertain, for any given installation, whether these
new connections constitute morally unacceptable disruptions of entrenched flows
(often regarded as violations of privacy) or whether they can be justified by the
needs of the surrounding context. We recommend that an investigation into
potential threats to privacy be guided by the following questions:
Are subjects aware that their images have been obtained for and included
in the gallery database? Have they consented? In what form?
Have policies on access to the gallery been thoughtfully determined and
explicitly stated?
-
8/6/2019 Seminar on Face Recognigion System
24/39
Computer Science Department FACE RECOGNITION
Are people aware that their images are being captured for identification
purposes? Have and how have they consented?
Have policies on access to all information captured and generated by the
system been thoughtfully determined and explicitly stated?
Does the deployment of an FRS in a particular context violate reasonable
expectations of subjects?
Have policies on the use of information captured via the FRS been
thoughtfully determined and explicitly stated?
Freedom and Autonomy
In asking how facial recognition technology affects freedom and autonomy, the
concern is constraints it may impose on peoples capacity to act and make
decisions (agency), as well as to determine their actions and decisions according
to their own values and beliefs.
-
8/6/2019 Seminar on Face Recognigion System
25/39
Computer Science Department FACE RECOGNITION
Human Difficulties with Facial Recognition Surveillance
Inherent Operator Limitations
Humans are not good at recognizing faces of people they do not know .
Operator Overload
Vast amounts of information
Limited attention span
Limited accuracy
Operator Reliability Dedication
Honesty
People are generally very good at recognizing faces that they know. However,
people experience difficulties when they perform facial recognition in a
surveillance or watch post scenario. Several factors account for these difficulties:
most notably, humans have a hard time recognizing unfamiliar faces.Combined with relatively short attention spans, it is difficult for humans to pick
out unfamiliar faces.
-
8/6/2019 Seminar on Face Recognigion System
26/39
Computer Science Department FACE RECOGNITION
Technical Difficulties with Facial Recognition Surveillance
Finding Faces Uncontrolled background
Subjects non-cooperation
Subject not looking at camera
Subject wearing hat, sunglasses, etc.
Moving target
Identifying Faces
Uncontrolled environmental conditions
Lighting (shadows, glare) Camera angle
Image resolution
Machines also experience difficulties when they perform facial recognition in a
surveillance or watch post scenario.A leading biometrics expert, has explained that
performing facial recognition processes with relatively high fidelity and at long
distances remains technically challenging for automated systems.
At the most basic level, detecting whether a face is present in a given electronic
photograph is a difficult technical problem. A expert has noted that subjects should
ideally be photographed under tightly controlled conditions. For example, each
subject should look directly into the camera and fill the area of the photo for an
automated system to reliably identify the individual or even detect his face in the
photograph.
The Facial Recognition Vendor Test 2000 study makes clear that the technology
is not yet perfected. This comprehensive study of current facial recognition
technologies, sponsored by the Department of Defense (DoD) , the DefenseAdvanced Research Projects Agency (DARPA), showed that environmental factors
such as differences in camera angle, direction of lighting, facial expression, and
other parameters can have significant effects on the ability of the systems to
recognize individuals
-
8/6/2019 Seminar on Face Recognigion System
27/39
Computer Science Department FACE RECOGNITION
How to Reduce Difficulties
Finding and Identifying Faces
Maximize control of subjects pose
Maximize control of environment
Backup Checks
Biometric system only shows probable matches
Human operator should verify potential matches
By controlling a persons facial expression, as well as his distance from thecamera, the camera angle, and the scenes lighting, a posed image minimizes the
number of variables in a photograph. This control allows the facial recognition
software to operate under near ideal conditions greatly enhancing its accuracy.
Similarly, using a human operator to verify the systems results enhances
performance because the operator can detect machine-generated false alarms.
Open questions and speculations (what about the future?)
6. How they are different
There are several of the important ways in which the Wi-Fi and 3G approachesto offering broadband wireless access services aresubstantively different.
6.1. Current business models/deployment are different
3G represents an extension of the mobile service-provider model. This is the technology of choice forupgrading existing mobile telephone services toexpand capacity and add enhanced services.
-
8/6/2019 Seminar on Face Recognigion System
28/39
Computer Science Department FACE RECOGNITION
In contrast, Wi-Fi comes out of the datacommunications industry (LANs) which is abyproduct of the computer industry.
The basic business model is the telecommunicationsservices model in which service providers own andmanage the infrastructure (including the spectrum)and sell service on that infrastructure.
In contrast the basic business model is one ofequipment makers who sell boxes to consumers. The
services provided by the equipment are free to theequipment owners.
With respect to deployment, 3G will requiresubstantial investment in new infrastructure toupgrade existing 2G networks, however, whendeployed by an existing mobile provider, much of
the 2G infrastructure (e.g., towers and backhaulnetwork) will remain useable. For WiFi, it is hopedthat deployment can piggyback on the large existingbase of WLAN equipment already in the field. In bothcases, end-users will need to buy (or be subsidized)to purchase suitable interface devices (e.g., PC cardsfor 3G or WiFi access).
In contrast to 3G, Wi-Fi wireless access can emergein a decentralized, bottomup fashion (although it isalso possible for this to be centrally coordinated anddriven by a wireline or mobile service provider).While the
-
8/6/2019 Seminar on Face Recognigion System
29/39
Computer Science Department FACE RECOGNITION
prevailing business model for 3G services andinfrastructure is vertically integrated, this need notbe the case for WiFi. This opens up the possibility ofa more heterogeneous and complex industry value
chain.
6.2 Spectrum policy and management
One of the key distinctions between 3G and WiFi thatwe have only touched upon lightly thus far is that 3Gand other mobile technologies use licensedspectrum, while WiFi uses unlicensed shared
spectrum. This has important implications for(1) cost of service;(2) quality of service (QoS) and congestionmanagement; and(3) industry structure.
First, the upfront cost of acquiring a spectrum licenserepresents a substantial share of the capital costs of
deploying 3G services. This cost is not faced by Wi-Fiwhich uses the shared 2.4GHz unlicensed, sharedspectrum. The cost of a spectrum license representsa substantial entry barrier that makes it less likelythat 3G services (or other services requiring licensedspectrum) could emerge in a decentralized fashion.
Of course, with increased flexibility in spectrum
licensing rules and with the emergence of secondarymarkets that are being facilitated by these rules, it ispossible that the upfront costs of obtaining aspectrum license could be shared to allowdecentralized infrastructure deployment to proceed.
-
8/6/2019 Seminar on Face Recognigion System
30/39
Computer Science Department FACE RECOGNITION
Under the traditional licensing approach, thelicensing of the spectrum, the construction of thenetwork infrastructure, and themanagement/operation of the service were all
undertaken by a single firm. Moreover, rigidlicensing rules (motivated in part by interferenceconcerns, but also in part, by interest group politics)limited the ability of spectrum license holders toflexibly innovate with respect to the technologiesused, the services offered, or their mode ofoperation. In the face of rapid technical progress,changing supply and demand dynamics, this lack of
flexibility increased the costs and reduced theefficiency of spectrum utilization.
Second, while licensed spectrum is expensive, it doeshave the advantage of facilitating QoS management.With licensed spectrum, the licensee is protectedfrom interference from other service providers. This
means that the licensee can enforce centralizedallocation of scarce frequencies to adopt thecongestion management strategy that is mostappropriate.
In contrast, the unlicensed spectrum used by Wi-Fiimposes strict power limits on users (i.e.,responsibility not to interfere with other users) and
forces users to accept interference from others. Thismakes it easier for a 3G provider to market a servicewith a predictable level of service and to supportdelay-sensitive services such as real-time telephony.
-
8/6/2019 Seminar on Face Recognigion System
31/39
Computer Science Department FACE RECOGNITION
In contrast, while a Wi-Fi network can address theproblem of congestion associated with users on thesame Wi-Fi network, it cannot control potentialinterference from other Wi-Fi service providers or
other RF sources that are sharing the unlicensedspectrum (both of which will appear as elevatedbackground noise). This represents a seriouschallenge to supporting delay-sensitive services andto scaling service in the face of increasingcompetition from multiple and overlapping serviceprovider.
Third, the different spectrum regimes have directimplications for industry structure. For example, theFreeNet movement is not easily conceivable in the3G world of licensed spectrum. Alternatively, itseems that the current licensing regime favorsincumbency and, because it raises entry barriers,may make wireless-facilities-based competition lessfeasible.
6.3 Status of technology development different
The two technologies differ with respect to their stage ofdevelopment in a number of ways. These are discussed inthe following subsections.
6.3.1. Deployment status
In most OECD countries, cell phone penetration of 2Gservices is quite high, and consumers have a choiceamong multiple facilities-based providers in mostmarkets. Additionally, most of the 2G mobile serviceproviders have announced plans to offer 3G
-
8/6/2019 Seminar on Face Recognigion System
32/39
Computer Science Department FACE RECOGNITION
broadband data services. Nevertheless, 3G servicesare emerging only slowly. There are a number ofreasons for this, including the high costs of obtaining3G licenses, the lack of 3G handsets, increased
deployment cost expectations, and diminishedprospects for short-term revenue.
In contrast, we have a large installed base of Wi-Finetworking equipment that is growing rapidly as WiFivendors have geared up to push wireless homenetworks using the technology. The large installedbase of Wi-Fi provides substantial learning, scale,
and scope economies to both the vendor communityand end-users. The commoditization of Wi-Fiequipment has substantially lowered prices andsimplified the installation and management of WiFinetworks, making it feasible for non-technical homeusers to self-install these networks.
However, although there a large installed base of Wi-Fi
equipment, there has been only limited progress indeveloping the business models and necessary technicaland business infrastructure to support distributed serviceprovisioning. In addition, many of the pioneers in offeringwireless access services such as Mobilstar and Metricomwent bankrupt in 2001 as a consequence of the generaldownturn in the telecom sector and the drying up ofcapital for infrastructure investment.
6.3.2. Embedded support for services
Another important difference between 3G and WiFi istheir embedded support for voice services. 3G wasexpressly designed as an upgrade technology for
-
8/6/2019 Seminar on Face Recognigion System
33/39
Computer Science Department FACE RECOGNITION
wireless voice telephony networks, so voice servicesare an intrinsic part of 3G. In contrast, WiFi providesa lower layer data communications service that canbe used as the substrate on which to layer services
such as voice telephony. For example, with IPrunning over WiFi it is possible to support voice-over-IP telephony. However, there is still great marketuncertainty as to how voice services would beimplemented and quality assured over WLANnetworks.
Another potential advantage of 3G over Wi-Fi is that
3G offers better support for secure/privatecommunications than does Wi-Fi. However, thisdistinction may be more apparent than real.
First, we have only limited operational experiencewith how secure 3G communications are. Hackersare very ingenious and once 3G systems areoperating, we will find holes that we were not
previously aware of.Second, the security lapses of Wi-Fi have attracted
quite a bit of attention and substantial resources arebeing devoted to closing this gap. Although wirelesscommunications may pose higher risks to privacy(e.g., follow-me anywhere tracking capabilities) andsecurity (i.e., passive monitoring of RF transmissionsis easier) than do wireline networks, we do not
believe that this is likely to be a long-termdifferentiating factor between 3G and Wi-Fitechnologies.
6.3.3. Standardization
-
8/6/2019 Seminar on Face Recognigion System
34/39
Computer Science Department FACE RECOGNITION
It is also possible to compare the two technologieswith respect to the extent to which they arestandardized. Broadly, it appears that the formalstandards picture for 3G is perhaps more clear than
for WLAN. For 3G, there is a relatively small family ofinternationally sanctioned standards, collectivelyreferred to as IMT-2000.36 However, there is stilluncertainty as to which of these (or even if multipleones) will be selected by service providers.
In contrast, Wi-Fi is one of the family of continuouslyevolving 802.11x wireless Ethernet standards, which
is itself one of many WLAN technologies that areunder development. Although it appears that Wi-Fi isemerging as the market winner, there is still asubstantial base of HomeRF and other open standardand proprietary technologies that are installed andcontinue to be sold to support WLANs. Thus, it mayappear that the standards picture for WLANs is lessclear than for 3G, but the market pressure to select
the 802.11x family of technologies appears muchless ambiguousat least today.
Because ubiquitous WLAN access coverage would beconstructed from the aggregation of manyindependent WLANs, there is perhaps a greaterpotential for the adoption of heterogeneous WLANtechnologies than might be the case with 3G. With
3G, although competing service providers may adoptheterogeneous and incompatible versions of 3G,there is little risk that there will be incompatibilitieswithin a carriers own 3G network. Of course in thecontext of a mesh of WLANs, reliance on IP as thebasic transport layer may reduce compatibility issues
-
8/6/2019 Seminar on Face Recognigion System
35/39
Computer Science Department FACE RECOGNITION
at the data networking level, although these could besignificant at the air interface (i.e., RF level). Unlesscoordinated, this could be a significant impedimentto realizing scale economies and network externality
benefits in a bottomup, decentralized deployment ofWi-Fi local access infrastructure.
6.3.4. Service/business model
3G is more developed than Wi-Fi as a business andservice model. It represents an extension of theexisting service-provider industry to new services,
and as such, does not represent a radical departurefrom underlying industry structure. The key marketuncertainties and portions of the valuation thatremain undeveloped are the upstream equipmentand application/content supplier markets andultimate consumer demand.
In contrast, Wi-Fi is more developed with respect to
the upstream supplier markets, at least with respectto WLAN equipment which has becomecommoditized. Moreover, consumer demandcertainly business demand and increasinglyresidential broadband home user demandfor WLANequipment is also well established. However,commercialization of Wi-Fi services as a accessservice is still in its early stages with the emergence
of Boingo and others.
Of course, both 3G and WiFi access face greatsupplier and demand uncertainty with respect towhat the next killer applications will be and how
-
8/6/2019 Seminar on Face Recognigion System
36/39
Computer Science Department FACE RECOGNITION
these services may be used once a rich set ofinteractive, multimedia services become available.
There are also some form factor issues that may
impact the way these services will be used. Initially,it seems likely that the first 3G end-user devices willbe extensions of the cell phone while the first Wi-Fiend-user devices are PCs. Of course, there are also3G PC cards to allow the PC to be used as aninterface device for 3G services, and with theevolution of Internet appliances (post- PC devices),we should expect to see new types of devices
connecting to both types of networks.
There are good reasons to believe that it will still be some time before FRT will be
able to identify a face in the crowd (in uncontrolled environments) with any
reasonable level of accuracy and consistency.
It might be that this is ultimately an unattainable goal, especially for larger
populations. Not because the technology is not good enough but because there is
not enough information (or variation) in faces to discriminate over large
populationsi.e. with large populations it will create many biometric doubles that
then need to be sorted out using another biometric.
This is why many researchers are arguing for multi-modal biometric systems.
Thus, in the future we would expect an increased emphasis on the merging of
various biometric technologies. For example, one can imagine the merging of face
recognition with gait recognition (or even voice recognition) to do identification ata distance.
It seems self-evident that these multi-modal systems are even more complex to
develop and embed in operational context than single mode systems. It is our view
that the increasing reliance on biometric and pattern recognition technologies do
represent a significant shift in the way investigation and security is conducted.
-
8/6/2019 Seminar on Face Recognigion System
37/39
Computer Science Department FACE RECOGNITION
There is an ongoing need to evaluate and scrutinize biometric identification
systems given the powerful nature of these technologiesdue to the assumption
that falsification is either impossible or extremely difficult to do.
End of report
CONCLUSION
There is the risk with FRT that individuals are treated as guilty until proven
innocent. In an identification scenario, we recommend that all matches be treated,
-
8/6/2019 Seminar on Face Recognigion System
38/39
Computer Science Department FACE RECOGNITION
in the first instance, as potential false positives until verified by other independent
sources (such as attributed and biographical identifiers). This underscores the fact
that the FRS must form part of an overall identity management program within a
security and intelligence infrastructure. Identity management and security cannot
be delegated to FRT. It can only act in support of specific targeted security and
intelligence activities. Further, how one deals with matches and alarms must be
suitable for the context. For example, one might have a very different set of
practices in an airport, casino, or a prison. This means that one needs to consider
carefully the timeframe, physical space, and control over the subject as they flow
through the system.
REFERENCES http://www.amazon.com/exec/obidos/tg/detai...il/-/04713091
41
http://www.amazon.com/exec/obidos/tg/detail/-/0471309141http://www.amazon.com/exec/obidos/tg/detail/-/0471309141http://www.amazon.com/exec/obidos/tg/detail/-/0471309141http://www.amazon.com/exec/obidos/tg/detail/-/0471309141 -
8/6/2019 Seminar on Face Recognigion System
39/39
top related