ECE 533 Final Project SIMPLE FACE RECOGNITION IMPLEMENTATION FOR COMPUTER AUTHENTICATION Josh Easton- Tin-Yau Lo.

Slides:



Advertisements
Similar presentations
Background Implementation of Gesture Recognition in the NIST Immersive Visualization Environment Luis D. Catacora Under the guidance of Judith Terrill.
Advertisements

CS0004: Introduction to Programming Visual Studio 2010 and Controls.
Face Recognition Face Recognition Using Eigenfaces K.RAMNATH BITS - PILANI.
Face Recognition Method of OpenCV
Facial feature localization Presented by: Harvest Jang Spring 2002.
As applied to face recognition.  Detection vs. Recognition.
Computer Vision Spring ,-685 Instructor: S. Narasimhan Wean 5403 T-R 3:00pm – 4:20pm Lecture #20.
Virtual Dart: An Augmented Reality Game on Mobile Device Supervisor: Professor Michael R. Lyu Prepared by: Lai Chung Sum Siu Ho Tung.
HMM-BASED PATTERN DETECTION. Outline  Markov Process  Hidden Markov Models Elements Basic Problems Evaluation Optimization Training Implementation 2-D.
LYU0603 A Generic Real-Time Facial Expression Modelling System Supervisor: Prof. Michael R. Lyu Group Member: Cheung Ka Shun ( ) Wong Chi Kin ( )
Personal Memory Assistant Abstract Facial recognition and speaker verification systems have been widely used in the security field. In this area the systems.
CONTENT BASED FACE RECOGNITION Ankur Jain 01D05007 Pranshu Sharma Prashant Baronia 01D05005 Swapnil Zarekar 01D05001 Under the guidance of Prof.
Fig. 2 – Test results Personal Memory Assistant Facial Recognition System The facial identification system is divided into the following two components:
FACE RECOGNITION, EXPERIMENTS WITH RANDOM PROJECTION
FACE RECOGNITION BY: TEAM 1 BILL BAKER NADINE BROWN RICK HENNINGS SHOBHANA MISRA SAURABH PETHE.
PCA Channel Student: Fangming JI u Supervisor: Professor Tom Geoden.
Dynamic Scalable Distributed Face Recognition System Security Framework by Konrad Rzeszutek B.S. University of New Orleans, 1999.
Smart Traveller with Visual Translator for OCR and Face Recognition LYU0203 FYP.
TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems.
Facial Recognition. 1. takes a picture of a person 2. runs that image through the database 3. finds a match and identifies the person Humans have always.
HOW TO USE BY ALEX ROSS ALEX ROSS. HOW TO CREATE ACCOUNT FOR DUMMIES is a great way to communicate with others. We can interact with.
Preprocessing Images for Facial Recognition Adam Schreiner ECE533.
Photo2GPS With support from: NSF DUE Prepared by: in partnership with: John McGee Jennifer McKee Geospatial Technician Education Through Virginia’s.
Facial Recognition CSE 391 Kris Lord.
Sachin Chopra Trevor Garson Madhuri Rapaka Introduction Tool to Tag all your Photographs within minutes 2 – Pass Processing Face Detection – Run the.
Vision-Based Biometric Authentication System by Padraic o hIarnain Final Year Project Presentation.
Face Recognition Using Neural Networks Presented By: Hadis Mohseni Leila Taghavi Atefeh Mirsafian.
Face Recognition Using EigenFaces Presentation by: Zia Ahmed Shaikh (P/IT/2K15/07) Authors: Matthew A. Turk and Alex P. Pentland Vision and Modeling Group,
Eigenfaces for Recognition Student: Yikun Jiang Professor: Brendan Morris.
Transition Year Teaching Programme 2012 Post-production.
Advanced Activities: Photo2GPS & Google Earth Virginia Geospatial Extension Program.
COMPUTER BASICS: PART I Mrs. Sealy | Thompson Middle School.
11.10 Human Computer Interface www. ICT-Teacher.com.
Face Detection And Recognition For Distributed Systems Meng Lin and Ermin Hodžić 1.
WS16-1 ADM , Workshop 16, August 2005 Copyright  2005 MSC.Software Corporation WORKSHOP 16 WRAP-UP.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Access Control Via Face Recognition. Group Members  Thilanka Priyankara  Vimalaharan Paskarasundaram  Manosha Silva  Dinusha Perera.
A Seminar Report On Face Recognition Technology A Seminar Report On Face Recognition Technology 123seminarsonly.com.
E.g.: MS-DOS interface. DIR C: /W /A:D will list all the directories in the root directory of drive C in wide list format. Disadvantage is that commands.
CSE 185 Introduction to Computer Vision Face Recognition.
Go to your Blog URL: Then click on “Log in” Your students do not need to remember their password, they can select.
Printing: This poster is 48” wide by 36” high. It’s designed to be printed on a large-format printer. Customizing the Content: The placeholders in this.
3D Face Recognition Using Range Images
PROPOSAL : The Use of Voice Command in Operating Personal Computer By : COLLEGE OF ART & SCIENCE UNIVERSITI UTARA MALAYSIA STIW5023 ADVANCED PROGRAMMING.
Computer Basics SystemsViruses Alternative Input Speech.
Double –Click on the Netscape Icon on your desktop The following are a series of steps to help you get started with Netscape Composer.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
Final Year Project Vision based biometric authentication system By Padraic ó hIarnain.
Operating Systems. An operating system (os) is a software program that enables the computer hardware to communicate and operate with the computer software.
Application of Facial Recognition in Biometric Security Kyle Ferris.
IBM - CVUT Student Research Projects IBM Presence detection Milan Stezka
Obama and Biden, McCain and Palin Face Recognition Using Eigenfaces Justin Li.
Backstage View  After you click the File tab, you can see the Microsoft Office Backstage view  The Office Backstage view is where you manage your files.
Parts of a Computer Created by Carmen Garzes. An electronic device that manipulates information or data. It can store, retrieve or process data. There.
Face Recognition Technology By Catherine jenni christy.M.sc.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Transfer Files from iPhone to Mac From:
Submitted by: Siddharth Jain (08EJCIT075) Shirin Saluja (08EJCIT071) Shweta Sharma (08EJCIT074) VIII Semester, I.T Department Submitted to: Mr. Abhay Kumar.
Presented By Bhargav (08BQ1A0435).  Images play an important role in todays information because A single image represents a thousand words.  Google's.
11.10 Human Computer Interface
PRINCIPAL COMPONENT ANALYSIS (PCA)
Submitted by: Ala Berawi Sujod Makhlof Samah Hanani Supervisor:
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Microsoft Access 2003 Illustrated Complete
Facial Recognition in Biometrics
Eigenfaces for recognition (Turk & Pentland)
Instructions for Windows users:
Instructions for Windows users:
Instructions for Windows users:
CS4670: Intro to Computer Vision
Presentation transcript:

ECE 533 Final Project SIMPLE FACE RECOGNITION IMPLEMENTATION FOR COMPUTER AUTHENTICATION Josh Easton- Tin-Yau Lo

Goal  Demonstrate the feasibility of computer authentication using facial recognition algorithms

What is facial recognition?  Every person’s face has a set of unique characteristics  Some examples are:  Distance between eyes  Location and size of nose  Distance from forehead to chin  Humans are able to easily recognize a face

What is computer-based facial recognition?  Programming a computer to use an algorithm to detect if two faces match

Facial recognition algorithms  Various computer algorithms exist that can be used to recognize faces  Eigenface analysis (AKA Principal Component Analysis)  Hidden Markov Models

Eigenfaces  Computer is trained with several pictures of the same face  Eyes are used as reference point between pictures  Various Eigenvectors are calculated to create a signature of the face

Eigenfaces

Hidden Markov Model Algorithms  Similar to Eigenfaces  Set of characteristics are stored from a set of images of the same face  The set of images are used to compare if face in another picture matches

Embedded HMM for Face Recognition Model- - Face ROI partition

Face recognition using Hidden Markov Models One person – one HMM Stage 1 – Train every HMM Stage 2 – Recognition P i - probability Choose max(P i ) … 1 n i

Our implementation of computer authentication  Uses Eigenfaces algorithm  Written in Java  “FaceRecognitionCap” - a Quicktime Java program to capture image from a Firewire DV camera or the Apple iSight  A command line program is to simulate authentication with a capture picture and display the closest match.

Running the Programs  The distribution came with the directory “FaceRecognitionCap” and “FaceRecognition”.

FaceRecognitionCap  Quicktime Java program, that requires Quicktime 6.1 and a compatible camera that support Quicktime on Windows with a simple recompilation.  It runs out of the box on Mac OS X by double- clicking the “FaceRecognitionCap” Icon. Push “Power” to initialize the Firewire bus, and click “Take Snapshot” to produce a 320x240 greyscale image suitable for “FaceRecognition”. The resultant capture file is “test.jpg”

FaceRecognition   FaceRecognition is the actual face recognition engine. Type the following at the “FaceRecognition” directory : java FaceRecognition trainedimages testing.jpg   A sample running such as the following will be produced : kenneth% java FaceRecognition trainedimages testing.jpg Constructing face-spaces from trainedimages... Comparing testing.jpg... Most closly reseambling: 15.jpg with distance. kenneth%

Why use facial recognition for authentication?  Average computer user has several passwords they must remember  If the user can use their face to authenticate instead, then then will no longer have to remember a password  Saves time currently spent resetting a lost password

Conclusion  Facial recognition software is a new, advanced replacement for text passwords  We can look forward to seeing more facial authentication systems in the future