You are on page 1of 5

CRESCENT UNIVERSITY ABEOKUTA

PROJECT PROPOSAL
ON
Design and implementation of face
recognition
system
using neural
network
BY
Ogunbayeje dare taiwo
{S214202022}

OCTOBER, 2016

1.0 INTRODUCTION

Face recognition system is an application for identifying someone from image or


videos. Face recognition is classified into three stages ie.Face detection, Feature
Extraction ,Face Recognition. Face detection method is a difficult task in image
analysis. Face detection is an application for detecting object, analyzing the face,
understanding the localization of the face and face recognition. It is used in many
application for new communication interface, security etc.
Face Detection is employed for detecting faces from image or from videos. The main
goal of face detection is to detect human faces from different images or videos.The
face detection algorithm converts the input images from a camera to binary pattern
and therefore the face location candidates using the PCA (principal component
Analysis) Algorithm. The proposed system explains regarding the face detection
based system on PCA Algorithm . PCA Algorithm selects the best set of features and
implement in cascade to decrease the detection time .The proposed System for face
detection is intended by using Neural network and Trained Dataset. Face Detection
System is to detect the face from image or videos. To detect the face from video or
image is gigantic. In face recognition system the face detection is the primary
stage.
Now Face Detection is in vital progress in the real world Face recognition is a pattern
recognition technique and one of the most important biometrics; it is used in a
broad spectrum of applications. The accuracy is not a major problem that specifies
the performance of automatic face recognition system alone, the time factor is also
considered a major factor in real time environments. Recent architecture of the
computer system can be employed to solve the time problem, this architecture
represented by multi-core CPUs and many-core GPUs that provide the possibility to
perform various tasks by parallel processing. However, harnessing the current
advancements in computer architecture is not without difficulties. Motivated by
such challenge, this research proposes a Face Detection and Recognition System
(FDRS).

1.1 BACKGROUND OF THE RESEARCH


Face recognition has gained substantial attention over in past decades due to its
increasing demand in security applications like video surveillance and biometric
surveillance. Modern facilities like hospitals, airports, banks and many more another
organizations are being equipped with security systems including face recognition
capability. Despite of current success, there is still an ongoing research in this field
to make facial recognition system faster and accurate. The accuracy of any face
recognition system strongly depends on the face detection system. The stronger the
face detection system the better the recognition system would be. A face detection
system can successfully detect human face from a given image containing
face/faces and from live video involving human presence. The main methods used
in these days for face detection are feature based and image based. Feature based
method separates human features like skin color and facial features whereas image
based method used some face patterns and processed training images to
distinguish between face and non faces. Feature based method has been chosen
because it is faster than image based method and its implementation is far more
simplified. Face detection from an image is achieved through image processing.

Locating the faces from images is not a trivial task; because images not just contain
human faces but also non-face objects in clutter scenes.
Moreover, there are other issues in face recognition like lighting conditions, face
orientations and skin colors. Due to these reasons, the accuracy of any face
recognition system cannot be 100%. Face recognition is one of the most important
biometrics methods. Despite the fact that there are more reliable biometric
recognition techniques such as fingerprint and iris recognition, these techniques are
intrusive and their success depends highly on user cooperation. Therefore, face
recognition seems to be the most universal, non-intrusive, and accessible system. It
is easy to use, can be used efficiently for mass scanning, which is quite difficult, in
case of other biometrics . Also it is natural and socially accepted. Moreover,
technologies that require multiple individuals to use the same equipment to capture
their biological characteristics probably expose the user to the transmission of
germs and impurities from other users.
However, face recognition is completely non-intrusive and does not carry any such
health dangers. Biometrics is a rapidly developing branch of information technology.
Biometric technologies are automated methods and means for identification based
on biological and behavioral characteristics of an individual. There are several
advantages of biometric technologies compared to traditional identification
methods. To take adequate measures against increasing security risks in modern
world, countries are considering these advantages and are shifting to new
generation identification systems based on biometric technologies.

1.2

STATEMENT OF RESEARCH PROBLEM

Biometric systems are becoming an important element (gateway) for information


security systems. Therefore biometric systems themselves have to satisfy high
security requirements. Unfortunately producers of biometric technologies do not
always consider security precautions. In publications regarding biometric
technologies, drawbacks and weaknesses of these technologies have been
discussed. Since biometrics form the technology basis for large scale and very
sensitive identification systems (e.g. passports, identification cards), the problem of
adequate evaluation of the security of biometric technologies is a current issue.
Also, some other issues with face detection and recognition system is on individual
with identical face like identical twins and others, in situation like this it is possible
for the system to make mistake or error in processing the person image so as to
grant access to the rightful user.

1.3 OBJECTIVES OF THE STUDY


The objective of this project is to implement a face recognition system which first
detects the faces present in either single image frames; and then identifies the
particular person by comparing the detected face with image database or in the
both image frames. In addition to the main objective of this research work, the
researcher also went far more to add other features to the new system which are :
1. One of the objectives of this system is to design a system that will help the
organization maintain a strong security in the work environment.

2. Highlight areas of vulnerability in the new system


3. Develop a ridged and secure database for the organization to enable them
secure their sensitive data and records.

1.4 SIGNIFICANCE OF THE STUDY


This study is primarily aimed at increasing efficiency in security, this research work
will help the users in maintaining data. This system will reduce the rate of
fraudulent activities as it can as well keep track of registered users and grant them
access upon face recognition completion. Also the knowledge that would be
obtained from this research will assist the management to grow, also this research
work will also be of help to the upcoming researcher in this field of study both with
the academic students on their study.

1.5 SCOPE OF THE STUDY


The scope of this study covers only on face detection and recognition using neural
network, accessing previous records and making matched for the data, updating of
records and making delete.

1.6 LIMITATION OF THE STUDY


Many limitations encountered, were in the process of gathering information for the
development of this project work to this extent. It was not an easy one, so many
constraints were encountered during the collection of data. The limitation focuses of
the following constraints;
i.
FINANCIAL CONTRAINTS: the cost of sourcing for information and data that
are involved in this work is high in the sense that we all know that information is
money.
ii.

TIME: A lot of time was involved in writing and developing this work,

iii.

Irregularities in power supply also dealt harshly with the researcher.

1.7

DEFINITION OF TERMS

Analysis: Breaking a problem into successively manageable parts for individual


study.
Attribute: A data item that characterize an object Data flow: Movement of data in a
system from a point of origin to specific destination indicated by a line and arrow
Data Security: Protection of data from loss, disclosure, modification or destruction.
Design: Process of developing the technical and operational specification of a
candidate system for implements.

Flow Chart: A graphical picture of the logical steps and sequence involved in a
procedure or a program.
Form: A physical carrier of data of information Implementation: In system
development-phase that focuses on user training, site preparation and file
conversion for installing a candidate system.
Neural Network: Neural networks, with their remarkable ability to derive meaning
from complicated or imprecise data, can be used to extract patterns and detect
trends that are too complex to be noticed by either humans or other computer
techniques.
Operation System: In database machine based software that facilitates the
availability of information or reports through the DBMS.
Password: Identity authenticators a key that allow access to a program system a
procedure. Record: A collection of aggregates or related items of a data treated as a
unit.
Source Code: A procedure or format that allow enhancements on a software
package.
System: A regular or orderly arrangements of components or parts in a connected
and interrelated series or whole a group of components necessary to some
operation.
System Design: Detailed concentration on the technical and other specification that
will make the new system operational.

You might also like