Face Recognition. 2. Facial Recognition Approaches

Similar documents
International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014

Face Recognition: Some Challenges in Forensics. Anil K. Jain, Brendan Klare, and Unsang Park

AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION

Using Real Time Computer Vision Algorithms in Automatic Attendance Management Systems

May For other information please contact:

SYMMETRIC EIGENFACES MILI I. SHAH

Binocular Vision and The Perception of Depth

AUTOMATED ATTENDANCE CAPTURE AND TRACKING SYSTEM

Information visualization examples

Object Recognition and Template Matching

A technical overview of the Fuel3D system.

SECURE WEB MARKETING USING EAR BIOMETRICS

Interactive person re-identification in TV series

ALLEGION: SCHLAGE HANDPUNCH GUIDEBOOK

LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE.

Space Perception and Binocular Vision

Biometrics: Advantages for Employee Attendance Verification. InfoTronics, Inc. Farmington Hills, MI

Text Legibility and Readability of Large Format Signs in Building and Sites Mary Jane Carroll, M.A. IDeA Center, SUNY Buffalo

Model Policy on Eyewitness Identification

FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM

Using Neural Networks to Create an Adaptive Character Recognition System

Illumination, Expression and Occlusion Invariant Pose-Adaptive Face Recognition System for Real- Time Applications

High-speed Photography with a Still Digital Camera

6 Space Perception and Binocular Vision

Efficient Attendance Management: A Face Recognition Approach

BIM Extension into Later Stages of Project Life Cycle

Colorado School of Mines Computer Vision Professor William Hoff

Security & Privacy in Biometric Systems Two Hindering Requirements?

Defense Technical Information Center Compilation Part Notice

Additional details >>> HERE <<<

Facial Comparison and FBI Identification Training

1 WHAT IS IPSFRP? 2 WHO CAN USE IPSFRP? 3 HOW DO I USE IPSFRP?

Video Conferencing Display System Sizing and Location

Visual Registry Design and Development

VECTORAL IMAGING THE NEW DIRECTION IN AUTOMATED OPTICAL INSPECTION

Assignment 1 Biometric authentication

Red-Eye Blink, Bendy Shuffle, and the Yuck Factor: A User Experience of Biometric Airport Systems Defining usable biometric systems Usability

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

ANALYZING A CONDUCTORS GESTURES WITH THE WIIMOTE

Greenwich Visual Arts Objectives Photography High School

MORPHO CRIMINAL JUSTICE SUITE

Adaptive Face Recognition System from Myanmar NRC Card

Operating Vehicle Control Devices

Advances in Face Recognition Research Second End-User Group Meeting - Feb 21, 2008 Dr. Stefan Gehlen, L-1 Identity Solutions AG, Bochum, Germany

COMPARISON OF VARIOUS BIOMETRIC METHODS

Multimodal Biometric Recognition Security System

IN THE COURT OF APPEALS FIRST APPELLATE DISTRICT OF OHIO HAMILTON COUNTY, OHIO

2nd End-User Group Meeting on 3D Face Recognition

Direct and Reflected: Understanding the Truth with Y-S 3

Template for Automatic Number Plate Recognition (ANPR) Infrastructure Development Privacy Impact Assessment

This method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger.

opinion piece Developing Effective Videoconferencing within Court rooms Consult Design Implement Transform

EXPERIENCED PROFESSIONAL CERTIFICATE IN Forensic Science

When you open the newspaper, what types of stories are you most interested in reading? If you answered crime stories, you are not alone.

The Implementation of Face Security for Authentication Implemented on Mobile Phone

D E F I N E V E L O D O. Telemedicine Room Design PROGRAM GUIDE. CTEConline.org

Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems

Dŵr y Felin Comprehensive School. Perimeter, Area and Volume Methodology Booklet

PERSPECTIVE. How Top-Down is Visual Perception?

Neural Network based Vehicle Classification for Intelligent Traffic Control

A Cognitive Approach to Vision for a Mobile Robot

Bernice E. Rogowitz and Holly E. Rushmeier IBM TJ Watson Research Center, P.O. Box 704, Yorktown Heights, NY USA

Template-based Eye and Mouth Detection for 3D Video Conferencing

Understanding The Face Image Format Standards

A guide to access control for offices

A Genetic Algorithm-Evolved 3D Point Cloud Descriptor

Learn about OCR: Optical Character Recognition Track, Trace & Control Solutions

Face Model Fitting on Low Resolution Images

Automated Regional Justice Information System (ARJIS) Acceptable Use Policy for Facial Recognition

INSTRUCTION MANYUAL A Security Camera Software authorized by The Society for the e-jikei Network Dairi EYE Simple version 1.0

Automotive Applications of 3D Laser Scanning Introduction

CS231M Project Report - Automated Real-Time Face Tracking and Blending

Basic Shapes. Most paintings can be broken down into basic shapes. See how this famous painting by Cézanne can be broken down into basic shapes.

I. Facial Recognition Technology Employed by Organizations for the Purpose of Identification

The Board of County Commissioners, Walton County, Florida, held a Public Hearing

The Leading Provider of Identity Solutions and Services in the U.S.

Classifying Manipulation Primitives from Visual Data

Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com

Face Locating and Tracking for Human{Computer Interaction. Carnegie Mellon University. Pittsburgh, PA 15213

Introduction to Computer Graphics

A Behavioral Biometric Approach Based on Standardized Resolution in Mouse Dynamics

The Lighting Effects Filter

Identity Verification Program Guide

FPGA Implementation of Human Behavior Analysis Using Facial Image

Android-Based Mobile Payment System Using 3 Factor Authentication

Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals

MULTIMODAL BIOMETRICS IN IDENTITY MANAGEMENT

SURVEILLANCE ENHANCED FACE RECOGNITION

Application-Specific Biometric Templates

The SIA Standards Roadmap describes the strategies for achieving the mission and enhancing stakeholder participation.

Biometrics: Trading Privacy for Security

Policing requirements for Closed Circuit Television

Force and Motion: Ramp It Up

White paper. Axis Video Analytics. Enhancing video surveillance efficiency

INEL- 4dl"0033oZ m~1f-46. \/l3--fi

INTRODUCTION TO COACHING TEACHING SKILLS TEACHING/LEARNING. September 2007 Page 1

MACHINE VISION FOR SMARTPHONES. Essential machine vision camera requirements to fulfill the needs of our society

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

Frequently Asked Questions About VisionGauge OnLine

Transcription:

Face Recognition Jonathan Bruno Department of Computing Sciences Villanova University, Villanova, PA 19085 CSC 3990 Computing Research Topics jonathan.bruno@villanova.edu Abstract Biometrics is the automated identification of a person based on physical traits. One biometric which has received considerable attention in recent years is face recognition. Face recognition is considered to be one of the most challenging biometrics because it depends on variations in image quality, orientation, and the subject s appearance. This paper discusses current implementations using 2D or 3D based recognition. 2D recognition achieves generally impressive results. However, accuracy decreases drastically when the images being compared have significant variations. Currently, there is much research being done in the area of 3D recognition which hopes to improve upon the inherent limitations of 2D recognition. 1. Introduction Face recognition is an attractive biometric for use in security applications. Face recognition is non-intrusive, it can be performed without the subject s knowing. This has become particularly important in modern times because demand for enhanced security is in public interest. 2. Facial Recognition Approaches 2.1 Eigenface-based Recognition 2D face recognition using eigenfaces is one of the oldest types of face recognition. Turk and Pentland published the groundbreaking Face Recognition Using Eigenfaces in 1991 [1]. The method works by analyzing face images and computing eigenfaces, which are faces composed of eigenvectors. Results obtained by comparing eigenfaces are used to identify the presence of a face and its identity. There is a five step process involved in the system developed by Turk and Pentland. First, the system needs to be initialized by feeding it a training set of face images. These are used to define the face space which is a set of images that are face-like. Next, when a face is encountered, the system calculates an eigenface for it. By comparing it with known faces and using some statistical analysis, it can be determined whether the image presented is a face at all. Then, if an image is determined to be a face, the system will determine whether it knows the identity of the face or not. The optional final step concerns frequently encountered, unknown faces,.which the system can learn to recognize. The eigenface technique is simple, efficient, and yields generally good results in controlled circumstances [1]. The system was even tested to track faces on film. However, there are some limitations of eigenfaces. There is limited robustness to changes in lighting, angle, and distance [6]. Also, it has been shown that 2D recognition 8

systems do not capture the actual size of the face, which is a fundamental problem [4]. These limits affect the technique s application with security cameras because frontal shots and consistent lighting cannot be relied upon. 2.2 3D Face Recognition 3D face recognition is expected to be robust to the types of issues that plague 2D systems [4]. 3D systems generate 3D models of faces and compare them. These systems are more accurate because they capture the actual shape of faces. Skin texture analysis can be used in conjunction with face recognition to improve accuracy by 20 to 25 percent [3]. The acquisition of 3D data is one of the main problems for 3D systems. 2.3 How Humans Perform Face Recognition It is important for researchers to know the results of studies on human face recognition [8]. This information may help them develop ground breaking new methods. After all, rivaling and surpassing the ability of humans is the key goal of computer face recognition research. The key results of a 2006 paper Face Recognition by Humans: Nineteen Results All Computer Vision Researchers Should Know About [8] are as follows: 1. Humans can recognize familiar faces in very low-resolution images. 2. The ability to tolerate degradations increases with familiarity. 3. High-frequency information by itself is insufficient for good face recognition performance. 4. Facial features are processed holistically. 5. Of the different facial features, eyebrows are among the most important for recognition. 6. The important configural relationships appear to be independent across the width and height dimensions. 7. Face-shape appears to be encoded in a slightly caricatured manner. 8. Prolonged face viewing can lead to high level aftereffects, which suggest prototype-based encoding. See Figure 1 for an example 9

Figure 1. Staring at the faces in the green circles will cause one to misidentify the central face with the faces circled in red [8]. 9. Pigmentation cues are at least as important as shape cues. 10. Color cues play a significant role, especially when shape cues are degraded. 11. Contrast polarity inversion dramatically impairs recognition performance, possibly due to compromised ability to use pigmentation cues. See Figure 2. Figure 2. Photograph during the recording of We Are the World. Several famous artists are in the picture including Ray Charles, Lionel Ritchie, Stevie Wonder, Michael Jackson, and Billy Joel though they are very difficult to identify [8]. 12. Illumination changes influence generalization. 13. View-generalization appears to be mediated by temporal association. 14. Motion of faces appears to facilitate subsequent recognition. 15. The visual system starts with a rudimentary preference for face-like patterns. 16. The visual system progresses from a piecemeal to a holistic strategy over the first several years of life. 17. The human visual system appears to devote specialized neural resources for face perception. 18. Latency of responses to faces in inferotemporal (IT) cortex is about 120 ms, suggesting a largely feed forward computation. 19. Facial identity and expression might be processed by separate systems. 3. Uses of Face Recognition 3.1 Use of Face Recognition Facial recognition is attractive for law enforcement. It can be used in conjunction with existing surveillance camera infrastructure to hunt for known criminals. Face recognition is covert and non intrusive, opposed to other biometrics such as fingerprints, retina scans, and iris scans [6]. This is especially important in conjunction with the law because faces are considered public. Comprehensive photo databases from mug shots or driver s licenses already exist. Because of difficulties face recognition has with respect to lighting, angle, and other factors, it is advantageous to attempt to get as high quality images with regard to these factors. Facetraps use strategically placed cameras in order to obtain relatively controlled photographs [6]. Examples are placing cameras facing doorways, at airport 10

check-ins, or near objects people are likely to stare at (see Figure 3). This type of traps would aid face recognition software by helping to capture a straight frontal image which allow for higher accuracy of the system. Despite their potential benefit, there appears to be very little research done on facetraps. Figure 3. Figure depicts increasingly controlled environments from left to right [6]. Some have questioned the legality of face scanning and have argued that such systems which are used to hunt to criminals in public places are an invasion of privacy. From a legal perspective, in the United States, one does not have a right to privacy for things shown in public [6]. For example; these excerpts from Supreme Court decisions help to establish that face recognition is constitutional. What a person knowingly exposes to the public... is not a subject of Fourth Amendment protection, United States v. Miller, 425 U.S. 435 (1976). No person can have a reasonable expectation that others will not know the sound of his voice, any more than he can reasonably expect that his face will be a mystery to the world, United States v. Dionisio, 410 U.S. 1 (1973). Face recognition must be improved further before it becomes a useful tool for law enforcement. It remains to be seen what the right balance is, socially speaking, between maximizing public safety and respecting individual rights. 3.2 Other Uses of Face Recognition Implementations of face recognition systems include surveillance cameras in Tampa, Florida and Newham, Great Britain [2]. Trials of the systems yielded poor results. The Newham system did not result in a single arrest being made in three years. Logan Airport, in Boston, performed two trials of face recognition systems. The system achieved only 61.7% accuracy [5]. Australian customs recently rolled out its SmartGate system to automate checking faces with passport photos. Google is testing face recognition using a hidden feature in its image searching website [7]. Google purchased computer vision company Neven Vision in 2006 and plans to implement its technology into its Picasa photo software. 4. Future Work Face images which appear in databases are taken in controlled environments. Current face recognition technology has difficulty comparing faces which vary in angles 11

or lighting. Recent deployments of face recognition systems have yielded poor results because faces captured in the images vary widely from the database images. One way remedy to this situation is to use facetraps. Facetraps are cameras which are strategically placed to capture high quality images of faces. The goal is to obtain images which are as close as possible to those taken in the controlled environment. Figure 4. Hidden cameras which look like everyday items will be useful to ensure subjects are unaware of the cameras (electrical box and wall clock with hidden cameras are pictured). Our proposal will determine the effectiveness of different facetrap setups. Several facetrap scenarios will be tested in a busy, public area. Some set ups which will be tried are placing cameras facing doorways, near clocks, behind check-out counters, and behind one way mirrors. It is imperative that hidden cameras be used so that subjects do not realize they are being watched. The cameras will collect data for two months. Image quality will be judged on angle, lighting, and distance. Facetraps which consistently yield good results will be noted as good candidates for actual implementation. Further work may involve new ideas for facetrap placement or tweaks to previously tested methods. References [1] Matthew A. Turk, Alex P. Pentland, "Face Recognition Using Eigenfaces," Proc. IEEE Conference on Computer Vision and Pattern Recognition: 586 591. 1991. [2] Michael Kraus, "Face the facts: facial recognition technology's troubled past--and troubling future," The Free Library, 2002. [3] Mark Williams, "Better Face-Recognition Software," Technology Review, May 30, 2007. 12

[4] Trina D. Russ, Mark W. Koch, Charles Q. Little, "3D Facial Recognition: A Quantitative Analysis," 38th Annual 2004 International Carnahan Conference on Security Technology, 2004. [5] Ryan Johnson, Kevin Bonsor, "How Facial Recognition Systems Work," How Stuff Works, 2007. [6] John D. Woodward, Jr., Christopher Horn, Julius Gatune, Aryn Thomas, Biometrics, A Look at Facial Recognition, RAND, 2003. [7] New: Google Image Search Categories, Google Blogoscoped, May 28, 2007. [8] Pawan Sinha, Benjamin Balas, Yuri Ostrovsky, and Richard Russell, "Face Recognition by Humans: Nineteen Results All Computer Vision Researchers Should Know About," Proceedings of the IEEE, Volume: 94, Issue: 11, 2006. 13