A secure face tracking system



Similar documents
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION

Voice Driven Animation System

Multimodal Biometric Recognition Security System

The Implementation of Face Security for Authentication Implemented on Mobile Phone

International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014

Index Terms: Face Recognition, Face Detection, Monitoring, Attendance System, and System Access Control.

LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE.

Adaptive Face Recognition System from Myanmar NRC Card

Object Recognition and Template Matching

Mouse Control using a Web Camera based on Colour Detection

Using Real Time Computer Vision Algorithms in Automatic Attendance Management Systems

FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM

Development of an Ignition Interlock Device to Prevent Illegal Driving of a Drunk Driver

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

ARM 9 BASED REAL TIME CONTROL AND VEHICLE THEFT IDENTITY SYSTEM

Open Access A Facial Expression Recognition Algorithm Based on Local Binary Pattern and Empirical Mode Decomposition

DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD

Illumination, Expression and Occlusion Invariant Pose-Adaptive Face Recognition System for Real- Time Applications

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies

How To Train A Face Recognition In Python And Opencv

Analecta Vol. 8, No. 2 ISSN

2. IMPLEMENTATION. International Journal of Computer Applications ( ) Volume 70 No.18, May 2013

Face Recognition in Low-resolution Images by Using Local Zernike Moments

Real Time Vehicle Theft Identity and Control System Based on ARM 9

FPGA Implementation of Human Behavior Analysis Using Facial Image

Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wireless Hardware Control

Virtual Mouse Using a Webcam

Efficient Attendance Management: A Face Recognition Approach

REAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING

Biometric Authentication using Online Signatures

Android-Based Mobile Payment System Using 3 Factor Authentication

HANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT

CONATION: English Command Input/Output System for Computers

Morphological segmentation of histology cell images

Journal of Industrial Engineering Research. Adaptive sequence of Key Pose Detection for Human Action Recognition

False alarm in outdoor environments

INTELLECT TM Software Package

Navigation Aid And Label Reading With Voice Communication For Visually Impaired People

How To Fix Out Of Focus And Blur Images With A Dynamic Template Matching Algorithm

Develop Software that Speaks and Listens

An Arabic Text-To-Speech System Based on Artificial Neural Networks

A Framework for Secure Cloud- Empowered Mobile Biometrics

An Application of Data Leakage Prevention System based on Biometrics Signals Recognition Technology

ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan

Class-specific Sparse Coding for Learning of Object Representations

Classroom Monitoring System by Wired Webcams and Attendance Management System

CS231M Project Report - Automated Real-Time Face Tracking and Blending

BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES

Advance Human Computer Interaction Using Air Signature

A Content based Spam Filtering Using Optical Back Propagation Technique

Determining optimal window size for texture feature extraction methods

Online Proctoring Services

ESE498. Intruder Detection System

Face Recognition For Remote Database Backup System

Tracking Groups of Pedestrians in Video Sequences

Establishing the Uniqueness of the Human Voice for Security Applications

A System for Capturing High Resolution Images

Low-resolution Image Processing based on FPGA

A Simple Feature Extraction Technique of a Pattern By Hopfield Network

The Scientific Data Mining Process

KEITH LEHNERT AND ERIC FRIEDRICH

Data Mining: A Preprocessing Engine

Locating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras

An Energy-Based Vehicle Tracking System using Principal Component Analysis and Unsupervised ART Network

Neural Network based Vehicle Classification for Intelligent Traffic Control

White paper. Axis Video Analytics. Enhancing video surveillance efficiency

Component Ordering in Independent Component Analysis Based on Data Power

Document Image Retrieval using Signatures as Queries

A Study on SURF Algorithm and Real-Time Tracking Objects Using Optical Flow

Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology

Tracking and Recognition in Sports Videos

Face detection is a process of localizing and extracting the face region from the

Computer Vision Based Employee Activities Analysis

Data, Measurements, Features

Synthetic Aperture Radar: Principles and Applications of AI in Automatic Target Recognition

Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

A Comparison of Photometric Normalisation Algorithms for Face Verification

Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments

Image Compression through DCT and Huffman Coding Technique

Demo: Real-time Tracking of Round Object

Multi-modal Human-Computer Interaction. Attila Fazekas.

Vehicle Tracking System Robust to Changes in Environmental Conditions

Automated Attendance Management System using Face Recognition

Development of Integrated Management System based on Mobile and Cloud service for preventing various dangerous situations

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India

Design Grammars for High-performance Speech Recognition

The Development of a Pressure-based Typing Biometrics User Authentication System

Short Manual Intellect v SP2 module Unipos Contents:

Overview. 1. Introduction. 2. Parts of the Project. 3. Conclusion. Motivation. Methods used in the project Results and comparison

Transcription:

International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 10 (2014), pp. 959-964 International Research Publications House http://www. irphouse.com A secure face tracking system Ankita Gupta, Preeti Gandhi and Udit Jagga IT, GGSIPU, Paschim Vihar East, Delhi, INDIA Abstract In this paper, a new application of face recognition system using Eigen vector, Fisher based on PCA and LBPH (Local binary pattern histogram) based on LBP is proposed. Combination of Fisher and LBPH improves the capabilities of Eigen Vector approach. Fisher provides more accuracy and LBPH gives more uniform image that is more resilient to changes in lighting. The application focuses on three modules: (i)face Recognition: This phase includes face detection and recognizing part. Using different approach and algorithms, the face is detected on camera and matched with the already stored images in the database. The compatibility goes further with multiple camera image processing. (ii) Authentication: This part of the study includes an authentication and check on the user before logging him into the system by using speech to text and text to speech feature. (iii) Location Tracking: This is the most important module of the study where the location of a person is tracked by recognizing the face of the person in various CCTV cameras installed at various locations in the premises. The last seen feature can also be added to impart better functionality of the system. Having all these three modules together in an application would help in developing a system which would be of great help to the society. Keywords-Threshold; open cv; speech recognition; navigator 1. Introduction With the ubiquity of new information technology and media, more effective and friendly methods for human computer interaction (HCI) are being developed which do not rely on traditional devices such as keyboards, mice, and displays. The rapidly

960 Ankita Gupta et al expanding research in face processing is based on the premise that information about a user s identity, state, and intent can be extracted from images, and that computers can then react accordingly, e.g., by observing a person s facial expression. A first step of any face processing system is detecting the locations in images where faces are present. However, face detection from a single image is a challenging task because of variability in scale, location, orientation (up-right, rotated), and pose (frontal, profile). In this paper we analyze and evaluate a range of face recognition systems, each utilizing a different image processing technique, in an attempt to identify and isolate the advantages offered by each system. In section 1 we begin with a brief explanation of the different face recognition methods. This is followed by Speech to Text module for authenticity in section 2. The proposed paper provides the additional application of tracking the location of a person in section 3. 2. The Eigen Face and Fisher Face Methods PCA is one of the oldest and best known techniques in multivariate analysis. Over the past few years, several face recognition systems have been proposed based on PCA. Given a set of m centered (zero mean, unit variance) samples x k. x k. =[x k 1 x k n] t belongs to R n.pca aims to find the projection directions that maximize the variance of a subspace. During preprocessing, they register a gallery of m trained images to each other and unroll each image into a vector of n pixel values. Next, the mean image for the gallery is subtracted from each and the resulting centered images are placed in a gallery matrix. Element [i,j] of M is the i th pixel from the j th image. A covariance matrix Ω=MM T characterizes the distribution of the images in R n. 2.1 Eigen Face Eigenface is a practical approach for face recognition. Due to the simplicity of its algorithm, we could implement an Eigenface recognition system easily. Besides, it is efficient in processing time and storage. PCA reduces the dimension size of an image greatly in a short period of time. The accuracy of Eigenface is also satisfactory (over 90 %) with frontal faces. However, as there has a high correlation between the training data and the recognition data. Preprocessing of image is required in order to achieve satisfactory result. The drawback is that it is very sensitive for lightening conditions, lightening conditions and aging effects. 2.2 Fisher Face Fisherface is similar to Eigenface but with improvement in better classification of different class images. With Fisher Linear Discriminating approach, we could classify the training set to deal with different people and different facial expression. We could have better accuracy in facial expression than Eigen face approach. Besides, Fisherface removes the first three principal components which is responsible for light intensity changes, it is more invariant to light intensity. Fisherface is more complex than Eigenface in finding the projection of face space.

A secure face tracking system 961 2.3 Local Binary Pattern Histogram The LBP operator labels the pixels of an image by thresholding a 3*3 neighborhood of each pixel with the center value and considering the results as a binary number. Formally, given a pixel at( x c ; y c ), the resulting LBP can be expressed in the decimal form as LBP( x c ; y c )= Σ s(i n -i c )2 n (1) for n=0 to n=7 Where n runs over the 8 neighbors of the central pixel, i c and i n are the gray-level values of the central pixel and the surrounding pixel, and s9x0=1 if x>=0 and 0 otherwise. 3. Speech to Text and Text to Speech If a person finds it difficult or is not capable of handling the mouse ports and the keyboard and if the keyboard or mouse is faulty, there have to be other ways to handle the operating system. Speech may act as one of them. There is a growing demand for systems capable of handling Operating System using only the voice commands given by a person. And this paper represents a way how to control the OS by using voice command. 3.1 Module Basics: SAPI (Speech Application Programming Interface) It is an interface between our application platform and Microsoft Speech Engine. The speech recognition engine that is utilized by this voice controlled system is the Microsoft's speech recognition engine and the associated development kit 5.1 (Microsoft Speech SDK 5.1). The recognition rate of Microsoft's speech recognition engine is not high in continuous speech mode but extremely high under the command control mode. We use (SAPI) to implement voice function. SAPI provides a high level interface between applications and speech engine. Controlling and management of various speech engines need real-time operation technology. However, SAPI realizes and hides the underlying technical detail. There are two basic types of SAPI engines: text-to-speech (TTS) systems and speech recognizers. The TTS systems can synthesize text strings and files into spoken audio using synthetic voices, whereas Speech recognizers can convert human spoken audio into readable text strings and files. Speech engine communicates with SAPI by the device driver interface (DDI) layer and SAPI communicates with applications by API. So by the use of these application interfaces, voice recognition and speech synthesis software can be developed.

962 Ankita Gupta et al Figure 1: Working of speech to text module As shown in Fig. 1, the user provides voice commands through microphone. The given command is then converted into electrical pulse by the microphone. The sound card converts electrical pulse into digital signal. The Speech Recognition Engine then converts digital signals into phonemes and finally we get text command. The respective operation is thus performed. This procedure repeats for every voice command. 4. Navigator This project implements a small scale surveillance system with video analytics. Surveillance CCTV with required video analytics along with comprehensive Command and Control Centre is planned to be built to provide demonstration for public safety. The Scope of the work is limited to demonstrate a basic video analytics like facial recognition. Care is taken in such a way that this project will outline the overall solution considering advance video analytics for better vision and better solution. 4.1 Our Proposed Architecture Figure 2: Here we are using only webcams in order to recognize faces. 4.2 Methodology This system is based on using webcams in order to recognize faces. After the person is recognized further authentication is done by using speech to text module. Firstly the person has to speak out his/her ID (A unique code ID is allocated to authorized user), this ID is matched in the database and the text to speech module is used. A set of questions are being stored in the grammar and what is your password? question is asked to the user. After the ID and Password authentication, an authorized user message is being displayed. The study further continues for navigation, which is used to track the location of a person by recognizing the face in various CCTV cameras installed at various locations

A secure face tracking system 963 in the premises. Here, we are building a client server environment, where simultaneous CCTV images being stored at the server and sent to the client. The location may be analyzed and added to confirm and to make a trajectory of the person according to his/her movement within the premises. To add better functionality to the system, a last seen feature is added which in case of no match found, the client can ask for last one-minute recording of the multiple CCTV cameras. The study would then result for any head and chief of the institute to track students and unknown people in the premises continuously to have a much safer environment around. 5. Conclusion We have highlighted the importance of using image processing as a pre-processing step to well-known methods of face recognition and discussed the possibilities of combining face space dimensions of multiple systems in an attempt to utilize the advantages offered by numerous image processing techniques. This paper made a clear and simple overview of working of speech to text system (STT) in step by step process. There are many speech to text systems (STT) available in the market and also much improvisation is going on in the research area to make the speech more effective, natural with stress and emotions. This proposed system is getting ready to be implemented in many large scale sectors for their enhanced security. It can also be implemented in areas of maximum threat. This system is used in restricted areas where only the authenticated persons are allowed. The concept of the proposal is the intrusion detection by facial recognition. Since this project is very expensive and difficult to implement in a small scale by students we have showed the simulation results using C#. References [1] T. Heseltine, N. Pears, J. Austin, Face Recognition: A Comparison of Appearance-based Approaches, Proc. Of the 7th Int. Conf. on Digital Image Computing: Techniques and Applications, Vol. 1, pp. 59-69, 2003. [2] International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-1, March 2012. [3] International Conference on Intelligent Computational Systems (ICICS'2012) Jan. 7-8, 2012 Dubai. [4] Mahalakshmi. R,Manjula. M, Saranya. S, Vaishnavi. P, Shalini. J., Arasa Kumar. R, Intrusion Detection by Facial Recognition using CCTV Cameras with Video Management System. [5] Nishant Allawadi, Parteek Kumar, A Speech-to-Text System.

964 Ankita Gupta et al