Personal Memory Assistant Abstract Facial recognition and speaker verification systems have been widely used in the security field. In this area the systems.

Slides:



Advertisements
Similar presentations
Face Recognition. Introduction Why we are interested in face recognition? Why we are interested in face recognition? Passport control at terminals in.
Advertisements

Face Recognition Face Recognition Using Eigenfaces K.RAMNATH BITS - PILANI.
Face Recognition By Sunny Tang.
Face Recognition Method of OpenCV
Face Recognition and Biometric Systems
As applied to face recognition.  Detection vs. Recognition.
GMM-Based Multimodal Biometric Verification Yannis Stylianou Yannis Pantazis Felipe Calderero Pedro Larroy François Severin Sascha Schimke Rolando Bonal.
Computer Vision Spring ,-685 Instructor: S. Narasimhan Wean 5403 T-R 3:00pm – 4:20pm Lecture #20.
Content-Based Classification, Search & Retrieval of Audio Erling Wold, Thom Blum, Douglas Keislar, James Wheaton Presented By: Adelle C. Knight.
ICIP 2000, Vancouver, Canada IVML, ECE, NTUA Face Detection: Is it only for Face Recognition?  A few years earlier  Face Detection Face Recognition 
UPM, Faculty of Computer Science & IT, A robust automated attendance system using face recognition techniques PhD proposal; May 2009 Gawed Nagi.
CONTENT BASED FACE RECOGNITION Ankur Jain 01D05007 Pranshu Sharma Prashant Baronia 01D05005 Swapnil Zarekar 01D05001 Under the guidance of Prof.
Fig. 2 – Test results Personal Memory Assistant Facial Recognition System The facial identification system is divided into the following two components:
FACE RECOGNITION, EXPERIMENTS WITH RANDOM PROJECTION
FACE RECOGNITION BY: TEAM 1 BILL BAKER NADINE BROWN RICK HENNINGS SHOBHANA MISRA SAURABH PETHE.
EECE 279: Real-Time Systems Design Vanderbilt University Ames Brown & Jason Cherry MATCH! Real-Time Facial Recognition.
PCA Channel Student: Fangming JI u Supervisor: Professor Tom Geoden.
Smart Traveller with Visual Translator for OCR and Face Recognition LYU0203 FYP.
Oral Defense by Sunny Tang 15 Aug 2003
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
Facial Recognition. 1. takes a picture of a person 2. runs that image through the database 3. finds a match and identifies the person Humans have always.
Facial Recognition CSE 391 Kris Lord.
ECE 533 Final Project SIMPLE FACE RECOGNITION IMPLEMENTATION FOR COMPUTER AUTHENTICATION Josh Easton- Tin-Yau Lo.
Vision-Based Biometric Authentication System by Padraic o hIarnain Final Year Project Presentation.
Face Recognition Using Neural Networks Presented By: Hadis Mohseni Leila Taghavi Atefeh Mirsafian.
Face Recognition Using EigenFaces Presentation by: Zia Ahmed Shaikh (P/IT/2K15/07) Authors: Matthew A. Turk and Alex P. Pentland Vision and Modeling Group,
Training Database Step 1 : In general approach of PCA, each image is divided into nxn blocks or pixels. Then all pixel values are taken into a single one.
Dimensionality Reduction: Principal Components Analysis Optional Reading: Smith, A Tutorial on Principal Components Analysis (linked to class webpage)
Lecture #32 WWW Search. Review: Data Organization Kinds of things to organize –Menu items –Text –Images –Sound –Videos –Records (I.e. a person ’ s name,
KYLE PATTERSON Automatic Age Estimation and Interactive Museum Exhibits Advisors: Prof. Cass and Prof. Lawson.
Edit the text with your own short phrases. The animation is already done for you; just copy and paste the slide into your existing presentation. Face Detection,
1 Recognition by Appearance Appearance-based recognition is a competing paradigm to features and alignment. No features are extracted! Images are represented.
Department of Computer Science and Engineering, CUHK 1 Final Year Project 2003/2004 LYU0302 PVCAIS – Personal VideoConference Archives Indexing System.
Image Classification 영상분류
Dan Rosenbaum Nir Muchtar Yoav Yosipovich Faculty member : Prof. Daniel LehmannIndustry Representative : Music Genome.
Terrorists Team members: Ágnes Bartha György Kovács Imre Hajagos Wojciech Zyla.
A Seminar Report On Face Recognition Technology A Seminar Report On Face Recognition Technology 123seminarsonly.com.
Face Recognition: An Introduction
What have we learned?. What is a database? An organized collection of related data.
Biometrics Authentication Technology
CSE 185 Introduction to Computer Vision Face Recognition.
Singer similarity / identification Francois Thibault MUMT 614B McGill University.
A NOVEL METHOD FOR COLOR FACE RECOGNITION USING KNN CLASSIFIER
Database Objective Demonstrate basic database concepts and functions.
Supervisor: Nakhmani Arie Semester: Winter 2007 Target Recognition Harmatz Isca.
Application of Facial Recognition in Biometric Security Kyle Ferris.
Face Recognition Technology By Catherine jenni christy.M.sc.
Submitted by: Siddharth Jain (08EJCIT075) Shirin Saluja (08EJCIT071) Shweta Sharma (08EJCIT074) VIII Semester, I.T Department Submitted to: Mr. Abhay Kumar.
Presented By Bhargav (08BQ1A0435).  Images play an important role in todays information because A single image represents a thousand words.  Google's.
CSSE463: Image Recognition Day 27
CSSE463: Image Recognition Day 26
Deeply learned face representations are sparse, selective, and robust
PRINCIPAL COMPONENT ANALYSIS (PCA)
A Seminar Report On Face Recognition Technology
FACE RECOGNITION TECHNOLOGY
Submitted by: Ala Berawi Sujod Makhlof Samah Hanani Supervisor:
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Face Recognition and Feature Subspaces
Recognition: Face Recognition
Final Year Project Presentation --- Magic Paint Face
Facial Recognition in Biometrics
Application of Facial Recognition in Biometric Security
Interactive Visual System
CSSE463: Image Recognition Day 25
AUDIO SURVEILLANCE SYSTEMS: SUSPICIOUS SOUND RECOGNITION
Database Fundamentals
CS4670: Intro to Computer Vision
Midterm Exam Closed book, notes, computer Similar to test 1 in format:
Midterm Exam Closed book, notes, computer Similar to test 1 in format:
Application of Facial Recognition in Biometric Security
Presentation transcript:

Personal Memory Assistant Abstract Facial recognition and speaker verification systems have been widely used in the security field. In this area the systems have to be very accurate to prevent unauthorized users from accessing classified information. The extensive list of possible uses of these technologies in the commercial world has not been taken advantage of yet. It is often difficult to remember the name of a person who is encountered out of context or infrequently. This situation can prove to be very embarrassing for the forgetful person. It can also be insulting to the person who is not remembered. The Personal Memory Assistant uses facial recognition and speaker identification to help avoid this situation. A user discretely collects images and voice samples of the person to be identified. The facial recognition component analyzes the image to identify the three closest facial matches in the system. The speaker identification component does the same to identify the top two voice matches. The top ranked IDs are compared using an algorithm that was developed through testing. If the IDs match, a picture of the person and personal profile is displayed to the user. If no match is made, the user has the option to add the subject to the database. In addition to the identification process, the system also gives the option of searching for and updating entries in the database. Group 7 Authors Scott Kyle CTE ’08 Erika Sanchez EE ’08 Meredith Skolnick CTE ’08 Advisor Dr. Kenneth Laker University of Pennsylvania Dept. of Electrical and Systems Engineering Facial Recognition System The facial identification system is divided into two components: detection and recognition. Detection isolates the desired face out of an image using the Intel Open Computer Vision library object detection algorithm. This algorithm uses a trained cascade of boosted classifiers based on Haar-like features (spatial contrasts) to determine if a certain region of the image is a face. The cache serves as the link between the detection and recognition components. It stores sequential detected faces with fault tolerance for false and missed detections in frames. The recognition component aligns the faces and masks the background before employing an eigenface algorithm, which is a combination of Principal Component Analysis (PCA) and Linear Discriminant Analysis (LDA). The eigenfaces are the principal sets of eigenvectors derived from covariance matrices that are calculated from the difference between the captured face and the mean of an aligned set of stored faces for each person. Speaker Identification System The speech wave goes through the following three major processing steps: preprocessing, feature extraction and pattern matching. The preprocessing step is performed to normalize the amplitude of the entire voice sample so that the signal amplitudes vary between -1 and 1. In the Feature Extraction process, the signal is analyzed and spectral amplitudes are saved. A Fast Fourier Transform is performed on the signal, and the spectrum values are saved as the speaker’s unique feature set. When appropriate features have been extracted from the speech signal, they are compared to the features of all the saved signals. The method for pattern matching that is used by this system is the Nearest Neighbor Algorithm using Euclidean distances. Signals processed by the system are either saved in the population database and used as voiceprints to be compared to future input or added to an existing voiceprint. As more samples of the subject’s voice are saved, the system is able to improve the voiceprint and more accurately identify this subject. Camera Speaker Identification Facial Recognition Audio Database Image Database Profile Database Compare Entry Form Display Update True False Mic Delete Search Overall Flow Chart Testing Process More than 100 people of different races, genders, and ages were used to test the functionality of the system. A subject pool with demographics representative of the U.S. population was used in order to ensure uniform performance. Each subject was entered into the database and then face and voice samples were collected for three trials. All of the similarity measurements were stored and an algorithm analyzed the results. The comparison formula was developed from these results to be used for the recognition process. api API(FaceDetect*, Speaker*) ~API() newEntry() sampleVoice() sampleFace() clear() reset() name(int) test() speakerApp main(String[]) begin() IDFound(String) totTrain() reset() delete(String) FaceDetect FaceDetect(int, int, int) ~FaceDetect() sample() erase(int) save(int) clear() reset() identify() trialResults(int, int) speaker Speaker() ~Speaker() identify() save(int) erase(int) clear() reset() Cache userlist : UserList* Cache(int) ~Cache() add(IplImage*, CvPoint, int) save(int) identify() average() trialResults(int, int) tick() clear() UserList ids : vector paths : vector UserList(char*) ~UserList() empty() erase(int) add(int, string) reset() recognize train() identify(IplImage*) SpeakersIdentDb SpeakersIdentDb(String) getIDByFilename(String) getNumberPerID() connect() query() close() record format : AudioFormat line : TargetDataLine sc : Scanner fileName : String samplesFolder : String record() stopRecord() getName() Software Flow Chart Database Database(char*) ~Database() insert(vector ) select(int) select(string) select(string, string) update(int, vector ) erase(int) reset()