尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
Contents
 Face Recognition
 Steps in face recognition system
 Artificial Neural Networks as Recognizer
 Radial Basis Function Network
 Back Propagation Network
 Applications of Face Recognition System
Face Recognition
 Automatically identifying and verifying a person from an image.
 Face feature values are used for this purpose.
 Face feature values are extracted from an image and are used for
training the database using some learning method.
 Once training is complete, new images can be recognized using the
information learnt during the training process.
Steps in face recognition system:
 Face detection and tracking:
Face detection segments the face areas from the background. In case of
video, detected faces may need to be tracked using a face tracking
component.
 Face alignment:
Facial components such as eyes, nose and mouth and facial outline are
more accurately located. Based on location points , the input image is
normalized with respect to geometrical and photometrical properties.
 Feature extraction
It is performed to provide effective information that is useful for
distinguishing between faces of different persons and stable with
respect to geometrical and photometrical variations.
 Face matching
The extracted feature of input face is matched against those of
enrolled faces in database. It outputs the identity of face when a match
is found , else indicates an unknown face
Structure of Face Recognition
System
Artificial Neural Network as
Recognizer
 After extracting features from the given face image, a recognizer is
needed to recognize the face image from the stored database.
Artificial neural network can be applied for such problems.
 Two important recognition methods are:
 Radial Basis Function Network (RBF)
 Back Propagation Function Network (BPN)
Radial Basis Function Network
 The RBF network has a feed forward architecture with an input layer, a
hidden layer and an output layer.
 The input layer is simply used to take raw data and does no processing.
 The hidden layer performs a non linear mapping (using Gaussian
function)from the input space into a higher dimensional space in
which the patterns become separable.
 The output layer performs a simple weighted sum with linear output.
Radial Basis Function Network
Back Propagation Network
 The errors propagate backwards from the output nodes to the
inner nodes.
Steps involved in back propagation network:
 Feedforward training of input patterns:
Each input node receives a signal which is broadcast to all other
hidden units. Each hidden unit computes its activation which is
broadcast to all output units.
 Back propagation of errors:
Each output node compares its activation with the desired output.
Based on the differences, the error is propagated back to all
previous inputs
 Adjustment of weights:
Weights of all links computed simultaneously based on the errors
that were propagated back.
Accuracy of RBF and BPN on the basis of training
size ratio
In case of small database BPN is more accurate but when we have large
set of images in the database that time RBF is more accurate than BPN
Applications of Face Recognition
 Preventing ID Fraud: Issuing agencies can prevent applicants from
obtaining a fraud ID by looking at photo database within seconds.
 Criminal Investigation: Face recognition technology can assist law
enforcement agencies to identify suspects.
 Physical Access Control: Authenticating authorized persons with
face recognition supports security measures in airports, stadiums,
office spaces and other buildings.
References
 A. Shekhon, P. Agarwal ; Face Recognition using Artificial Neural Network;
International Journal of Computer Science and Information Technologies,
Vol.7(2),2016.
 M. Nandini, P. Bhargavi, G. Raja Shekhar; Face Recognition using Neural
Networks, Volume3, Issue3, March 2013.
 H. A. Rowley, S Baluja , T.Kanade ; Neural Network-Based Face Detection,
Computer Vision and Pattern Recognition,1996.
 T. H. Le, Applying Artificial Neural Networks for Face Recognition, Hindawi
Publishing Corporation, Volume 2011.
 P. Latha, Dr. L. Ganeshan , Dr. S. Annadurai ; Face Recognition using Neural
Networks, Signal Processing: An International Journal, Volume 3 , Issue 5.
Face recognisation system

More Related Content

What's hot

Face Recognition
Face RecognitionFace Recognition
Face Recognition
arvind carpenter
 
face recognition
face recognitionface recognition
face recognition
vipin varghese
 
Face detection presentation slide
Face detection  presentation slideFace detection  presentation slide
Face detection presentation slide
Sanjoy Dutta
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
Zara Tariq
 
Face recognition attendance system
Face recognition attendance systemFace recognition attendance system
Face recognition attendance system
Naomi Kulkarni
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
raihansikdar
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
Nikyaa7
 
Detection and recognition of face using neural network
Detection and recognition of face using neural networkDetection and recognition of face using neural network
Detection and recognition of face using neural network
Smriti Tikoo
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
Vaibhav P
 
Face detection and recognition
Face detection and recognitionFace detection and recognition
Face detection and recognition
Pankaj Thakur
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
ranjit banshpal
 
Attendance Management System using Face Recognition
Attendance Management System using Face RecognitionAttendance Management System using Face Recognition
Attendance Management System using Face Recognition
NanditaDutta4
 
Final year ppt
Final year pptFinal year ppt
Final year ppt
Shruti Chandra
 
Face Recognition Methods based on Convolutional Neural Networks
Face Recognition Methods based on Convolutional Neural NetworksFace Recognition Methods based on Convolutional Neural Networks
Face Recognition Methods based on Convolutional Neural Networks
Elaheh Rashedi
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/Technology
RahulSingh3034
 
Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
IBNC India - India's Biggest Networking Championship
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
Shashidhar Reddy
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance System
Karmesh Maheshwari
 
Facial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptxFacial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptx
kakimetu
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
Shravan Halankar
 

What's hot (20)

Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
face recognition
face recognitionface recognition
face recognition
 
Face detection presentation slide
Face detection  presentation slideFace detection  presentation slide
Face detection presentation slide
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
 
Face recognition attendance system
Face recognition attendance systemFace recognition attendance system
Face recognition attendance system
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
 
Detection and recognition of face using neural network
Detection and recognition of face using neural networkDetection and recognition of face using neural network
Detection and recognition of face using neural network
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
Face detection and recognition
Face detection and recognitionFace detection and recognition
Face detection and recognition
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Attendance Management System using Face Recognition
Attendance Management System using Face RecognitionAttendance Management System using Face Recognition
Attendance Management System using Face Recognition
 
Final year ppt
Final year pptFinal year ppt
Final year ppt
 
Face Recognition Methods based on Convolutional Neural Networks
Face Recognition Methods based on Convolutional Neural NetworksFace Recognition Methods based on Convolutional Neural Networks
Face Recognition Methods based on Convolutional Neural Networks
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/Technology
 
Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance System
 
Facial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptxFacial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptx
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 

Similar to Face recognisation system

IRJET - A Review on Face Recognition using Deep Learning Algorithm
IRJET -  	  A Review on Face Recognition using Deep Learning AlgorithmIRJET -  	  A Review on Face Recognition using Deep Learning Algorithm
IRJET - A Review on Face Recognition using Deep Learning Algorithm
IRJET Journal
 
IRJET- Digiyathra
IRJET-  	  DigiyathraIRJET-  	  Digiyathra
IRJET- Digiyathra
IRJET Journal
 
Face Recognition Techniques
Face Recognition TechniquesFace Recognition Techniques
Face Recognition Techniques
Daksh Verma
 
184
184184
Local Descriptor based Face Recognition System
Local Descriptor based Face Recognition SystemLocal Descriptor based Face Recognition System
Local Descriptor based Face Recognition System
IRJET Journal
 
N010226872
N010226872N010226872
N010226872
IOSR Journals
 
Synops emotion recognize
Synops emotion recognizeSynops emotion recognize
Synops emotion recognize
Avdhesh Gupta
 
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptxReview A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
AravindHari22
 
Face Recognition using PCA and MSNN
Face Recognition using PCA and MSNNFace Recognition using PCA and MSNN
Face Recognition using PCA and MSNN
RABI GAYAN
 
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSINGAN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
ijiert bestjournal
 
Ijarcce 27
Ijarcce 27Ijarcce 27
Ijarcce 27
Smriti Tikoo
 
Foreigners Authentication Based on Multi-Biometric System for Iraq
Foreigners Authentication Based on  Multi-Biometric System for IraqForeigners Authentication Based on  Multi-Biometric System for Iraq
Foreigners Authentication Based on Multi-Biometric System for Iraq
A. Shamel
 
Attendance System using Facial Recognition
Attendance System using Facial RecognitionAttendance System using Facial Recognition
Attendance System using Facial Recognition
IRJET Journal
 
Real time multi face detection using deep learning
Real time multi face detection using deep learningReal time multi face detection using deep learning
Real time multi face detection using deep learning
Reallykul Kuul
 
40120140505010 2-3
40120140505010 2-340120140505010 2-3
40120140505010 2-3
IAEME Publication
 
40120140505010
4012014050501040120140505010
40120140505010
IAEME Publication
 
Fake Multi Biometric Detection using Image Quality Assessment
Fake Multi Biometric Detection using Image Quality AssessmentFake Multi Biometric Detection using Image Quality Assessment
Fake Multi Biometric Detection using Image Quality Assessment
ijsrd.com
 
I017525560
I017525560I017525560
I017525560
IOSR Journals
 
Face Recognition Based Intelligent Door Control System
Face Recognition Based Intelligent Door Control SystemFace Recognition Based Intelligent Door Control System
Face Recognition Based Intelligent Door Control System
ijtsrd
 
Person identification based on facial biometrics in different lighting condit...
Person identification based on facial biometrics in different lighting condit...Person identification based on facial biometrics in different lighting condit...
Person identification based on facial biometrics in different lighting condit...
IJECEIAES
 

Similar to Face recognisation system (20)

IRJET - A Review on Face Recognition using Deep Learning Algorithm
IRJET -  	  A Review on Face Recognition using Deep Learning AlgorithmIRJET -  	  A Review on Face Recognition using Deep Learning Algorithm
IRJET - A Review on Face Recognition using Deep Learning Algorithm
 
IRJET- Digiyathra
IRJET-  	  DigiyathraIRJET-  	  Digiyathra
IRJET- Digiyathra
 
Face Recognition Techniques
Face Recognition TechniquesFace Recognition Techniques
Face Recognition Techniques
 
184
184184
184
 
Local Descriptor based Face Recognition System
Local Descriptor based Face Recognition SystemLocal Descriptor based Face Recognition System
Local Descriptor based Face Recognition System
 
N010226872
N010226872N010226872
N010226872
 
Synops emotion recognize
Synops emotion recognizeSynops emotion recognize
Synops emotion recognize
 
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptxReview A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
 
Face Recognition using PCA and MSNN
Face Recognition using PCA and MSNNFace Recognition using PCA and MSNN
Face Recognition using PCA and MSNN
 
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSINGAN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
 
Ijarcce 27
Ijarcce 27Ijarcce 27
Ijarcce 27
 
Foreigners Authentication Based on Multi-Biometric System for Iraq
Foreigners Authentication Based on  Multi-Biometric System for IraqForeigners Authentication Based on  Multi-Biometric System for Iraq
Foreigners Authentication Based on Multi-Biometric System for Iraq
 
Attendance System using Facial Recognition
Attendance System using Facial RecognitionAttendance System using Facial Recognition
Attendance System using Facial Recognition
 
Real time multi face detection using deep learning
Real time multi face detection using deep learningReal time multi face detection using deep learning
Real time multi face detection using deep learning
 
40120140505010 2-3
40120140505010 2-340120140505010 2-3
40120140505010 2-3
 
40120140505010
4012014050501040120140505010
40120140505010
 
Fake Multi Biometric Detection using Image Quality Assessment
Fake Multi Biometric Detection using Image Quality AssessmentFake Multi Biometric Detection using Image Quality Assessment
Fake Multi Biometric Detection using Image Quality Assessment
 
I017525560
I017525560I017525560
I017525560
 
Face Recognition Based Intelligent Door Control System
Face Recognition Based Intelligent Door Control SystemFace Recognition Based Intelligent Door Control System
Face Recognition Based Intelligent Door Control System
 
Person identification based on facial biometrics in different lighting condit...
Person identification based on facial biometrics in different lighting condit...Person identification based on facial biometrics in different lighting condit...
Person identification based on facial biometrics in different lighting condit...
 

More from Saumya Ranjan Behura

Gsm
GsmGsm
Quadcopters
QuadcoptersQuadcopters
Nano technology
Nano technologyNano technology
Nano technology
Saumya Ranjan Behura
 
Miling machine
Miling machineMiling machine
Miling machine
Saumya Ranjan Behura
 
Manglev train
Manglev trainManglev train
Manglev train
Saumya Ranjan Behura
 
E nose
E noseE nose
Clockless chips
Clockless chipsClockless chips
Clockless chips
Saumya Ranjan Behura
 
Cell phone jammers
Cell phone jammersCell phone jammers
Cell phone jammers
Saumya Ranjan Behura
 
Blu ray disk
Blu ray diskBlu ray disk
Blu ray disk
Saumya Ranjan Behura
 
Bit torrent
Bit torrentBit torrent
Bio chemical senors
Bio chemical senorsBio chemical senors
Bio chemical senors
Saumya Ranjan Behura
 
Analog to digital converters, adc
Analog to digital converters, adcAnalog to digital converters, adc
Analog to digital converters, adc
Saumya Ranjan Behura
 
Seminar on nanorobotics
Seminar on nanoroboticsSeminar on nanorobotics
Seminar on nanorobotics
Saumya Ranjan Behura
 
Security system wireless technology
Security system wireless technologySecurity system wireless technology
Security system wireless technology
Saumya Ranjan Behura
 
Oscilloscopes basics
Oscilloscopes basicsOscilloscopes basics
Oscilloscopes basics
Saumya Ranjan Behura
 
Oscilloscope tutorial
Oscilloscope tutorialOscilloscope tutorial
Oscilloscope tutorial
Saumya Ranjan Behura
 
Optical sensors and their applications
Optical sensors and their applicationsOptical sensors and their applications
Optical sensors and their applications
Saumya Ranjan Behura
 
Night vision
Night visionNight vision
Night vision
Saumya Ranjan Behura
 
Sensors and transducer
Sensors and transducerSensors and transducer
Sensors and transducer
Saumya Ranjan Behura
 
Sensors
SensorsSensors

More from Saumya Ranjan Behura (20)

Gsm
GsmGsm
Gsm
 
Quadcopters
QuadcoptersQuadcopters
Quadcopters
 
Nano technology
Nano technologyNano technology
Nano technology
 
Miling machine
Miling machineMiling machine
Miling machine
 
Manglev train
Manglev trainManglev train
Manglev train
 
E nose
E noseE nose
E nose
 
Clockless chips
Clockless chipsClockless chips
Clockless chips
 
Cell phone jammers
Cell phone jammersCell phone jammers
Cell phone jammers
 
Blu ray disk
Blu ray diskBlu ray disk
Blu ray disk
 
Bit torrent
Bit torrentBit torrent
Bit torrent
 
Bio chemical senors
Bio chemical senorsBio chemical senors
Bio chemical senors
 
Analog to digital converters, adc
Analog to digital converters, adcAnalog to digital converters, adc
Analog to digital converters, adc
 
Seminar on nanorobotics
Seminar on nanoroboticsSeminar on nanorobotics
Seminar on nanorobotics
 
Security system wireless technology
Security system wireless technologySecurity system wireless technology
Security system wireless technology
 
Oscilloscopes basics
Oscilloscopes basicsOscilloscopes basics
Oscilloscopes basics
 
Oscilloscope tutorial
Oscilloscope tutorialOscilloscope tutorial
Oscilloscope tutorial
 
Optical sensors and their applications
Optical sensors and their applicationsOptical sensors and their applications
Optical sensors and their applications
 
Night vision
Night visionNight vision
Night vision
 
Sensors and transducer
Sensors and transducerSensors and transducer
Sensors and transducer
 
Sensors
SensorsSensors
Sensors
 

Recently uploaded

LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google CloudRadically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
ScyllaDB
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
AlexanderRichford
 
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDBScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB
 
Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2
DianaGray10
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 
Introduction to ThousandEyes AMER Webinar
Introduction  to ThousandEyes AMER WebinarIntroduction  to ThousandEyes AMER Webinar
Introduction to ThousandEyes AMER Webinar
ThousandEyes
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
manji sharman06
 
Building a Semantic Layer of your Data Platform
Building a Semantic Layer of your Data PlatformBuilding a Semantic Layer of your Data Platform
Building a Semantic Layer of your Data Platform
Enterprise Knowledge
 
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to SuccessMongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
ScyllaDB
 
Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0
Neeraj Kumar Singh
 
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDCScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB
 
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State StoreElasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
ScyllaDB
 
An All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS MarketAn All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS Market
ScyllaDB
 
Real-Time Persisted Events at Supercell
Real-Time Persisted Events at  SupercellReal-Time Persisted Events at  Supercell
Real-Time Persisted Events at Supercell
ScyllaDB
 
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
anilsa9823
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
leebarnesutopia
 
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My IdentityCNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
Cynthia Thomas
 

Recently uploaded (20)

LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google CloudRadically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
 
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDBScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
 
Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 
Introduction to ThousandEyes AMER Webinar
Introduction  to ThousandEyes AMER WebinarIntroduction  to ThousandEyes AMER Webinar
Introduction to ThousandEyes AMER Webinar
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
 
Building a Semantic Layer of your Data Platform
Building a Semantic Layer of your Data PlatformBuilding a Semantic Layer of your Data Platform
Building a Semantic Layer of your Data Platform
 
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to SuccessMongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
 
Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0
 
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDCScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDC
 
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State StoreElasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
 
An All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS MarketAn All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS Market
 
Real-Time Persisted Events at Supercell
Real-Time Persisted Events at  SupercellReal-Time Persisted Events at  Supercell
Real-Time Persisted Events at Supercell
 
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
 
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My IdentityCNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
 

Face recognisation system

  • 1.
  • 2. Contents  Face Recognition  Steps in face recognition system  Artificial Neural Networks as Recognizer  Radial Basis Function Network  Back Propagation Network  Applications of Face Recognition System
  • 3. Face Recognition  Automatically identifying and verifying a person from an image.  Face feature values are used for this purpose.  Face feature values are extracted from an image and are used for training the database using some learning method.  Once training is complete, new images can be recognized using the information learnt during the training process.
  • 4. Steps in face recognition system:  Face detection and tracking: Face detection segments the face areas from the background. In case of video, detected faces may need to be tracked using a face tracking component.  Face alignment: Facial components such as eyes, nose and mouth and facial outline are more accurately located. Based on location points , the input image is normalized with respect to geometrical and photometrical properties.  Feature extraction It is performed to provide effective information that is useful for distinguishing between faces of different persons and stable with respect to geometrical and photometrical variations.  Face matching The extracted feature of input face is matched against those of enrolled faces in database. It outputs the identity of face when a match is found , else indicates an unknown face
  • 5. Structure of Face Recognition System
  • 6. Artificial Neural Network as Recognizer  After extracting features from the given face image, a recognizer is needed to recognize the face image from the stored database. Artificial neural network can be applied for such problems.  Two important recognition methods are:  Radial Basis Function Network (RBF)  Back Propagation Function Network (BPN)
  • 7. Radial Basis Function Network  The RBF network has a feed forward architecture with an input layer, a hidden layer and an output layer.  The input layer is simply used to take raw data and does no processing.  The hidden layer performs a non linear mapping (using Gaussian function)from the input space into a higher dimensional space in which the patterns become separable.  The output layer performs a simple weighted sum with linear output.
  • 9. Back Propagation Network  The errors propagate backwards from the output nodes to the inner nodes.
  • 10. Steps involved in back propagation network:  Feedforward training of input patterns: Each input node receives a signal which is broadcast to all other hidden units. Each hidden unit computes its activation which is broadcast to all output units.  Back propagation of errors: Each output node compares its activation with the desired output. Based on the differences, the error is propagated back to all previous inputs  Adjustment of weights: Weights of all links computed simultaneously based on the errors that were propagated back.
  • 11. Accuracy of RBF and BPN on the basis of training size ratio In case of small database BPN is more accurate but when we have large set of images in the database that time RBF is more accurate than BPN
  • 12. Applications of Face Recognition  Preventing ID Fraud: Issuing agencies can prevent applicants from obtaining a fraud ID by looking at photo database within seconds.  Criminal Investigation: Face recognition technology can assist law enforcement agencies to identify suspects.  Physical Access Control: Authenticating authorized persons with face recognition supports security measures in airports, stadiums, office spaces and other buildings.
  • 13. References  A. Shekhon, P. Agarwal ; Face Recognition using Artificial Neural Network; International Journal of Computer Science and Information Technologies, Vol.7(2),2016.  M. Nandini, P. Bhargavi, G. Raja Shekhar; Face Recognition using Neural Networks, Volume3, Issue3, March 2013.  H. A. Rowley, S Baluja , T.Kanade ; Neural Network-Based Face Detection, Computer Vision and Pattern Recognition,1996.  T. H. Le, Applying Artificial Neural Networks for Face Recognition, Hindawi Publishing Corporation, Volume 2011.  P. Latha, Dr. L. Ganeshan , Dr. S. Annadurai ; Face Recognition using Neural Networks, Signal Processing: An International Journal, Volume 3 , Issue 5.
  翻译: