You are on page 1of 6

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

Web Site: www.ijettcs.org Email: editor@ijettcs.org


Volume 5, Issue 6, November - December 2016

ISSN 2278-6856

A Study on Design and Implementation of Facial


Recognition Application System
1.

Prof. Pritika V. Mamankar,2 Prof. Sonika A. Chorey,3 Prof. Saleha I. Saudagar,


4
Prof. Gayatri A. Jagnade
1.

Information Technology Department Prof. Ram Meghe Institute of Technology


and Research Badnera, India

Information Technology Department Prof. Ram Meghe Institute of Technology


and Research Badnera, India

Information Technology Department Prof. Ram Meghe Institute of Technology


and Research Badnera, India

4.

Information Technology Department Prof. Ram Meghe Institute of Technology


and Research Badnera, India

Abstrac
Face recognition systems gain flexibility and price potency
whereas being integrated into a wireless network. We tend to
describe a study on the implementation of biometric
authentication application
system victimization wireless devices.
The biometric
authentication system transmits the images photographed by
wireless
terminals
or
good
phones
and
recognizes/authenticates the faces.
This technique is applied to many areas like inertia
management,
access
management
and
attending
management. The previous biometric authentication systems
area unit largely supported the wire system however our
system uses mobile terminals or good phones.

Keywords:-facial recognition, mobile terminal, smart


phone, detection.

1.INTRODUCTION
Face detection is a computer technology that identify the
locations and sizes of human faces in arbitrary (digital)
images. It detects facial features and ignores anything
else, such as buildings, trees and bodies [1].
Some biometric
authentication algorithms
determine countenance by
extracting
landmarks,
or options, from a picture of the subject's face. As an
example, AN algorithmic rule might analyze the relative
position, size, and/or form of the eyes, nose, cheekbones,
and jaw. These options area unit then want to hunt
for different pictures withmatching options. Different algo
rithms normalize a gallery of face pictures then compress
the face knowledge, solely saving the information within
the image that's helpful for face detection. A pursuit image
is then compared with the face knowledge. One
amongst the
earliest fortunate systems is
predicated on example matching techniques applied to a

Volume 5, Issue 6, November December 2016

collection of salient countenance, providing a form of


compressed face illustration. [2]
Recognition algorithms is divided into 2 main approaches,
geometric, that appearance at identifying options,
or measurement, that could
be
a applied
mathematics approach that distills a picture into values
and compares the values with templates to eliminate
variances. common recognition
algorithms embrace Principal element Analysis victimizati
on eigenfaces, Linear Discriminate Analysis, Elastic
Bunch Graph Matching victimization the Fisherface rule,
the
Hidden Andrei
Markov model,
the
Multilinear mathematical
space Learning victimization tensor illustration, and
therefore the neural motivated dynamic link matching.
Face recognition involves face verification and face
identification. Face verification is matching, that has been
enforced in itinerant and private pc login systems, by
OMRON, Oki electrical, and FaceCode, etc. Face
identification is one-to-many matching, wherever an
enormous information has to be compared, and so more
difficult. It's visualized within the future that face
identification is additionally administered with a mobile
terminal interface, that captures face pictures and accesses
face recognition processor or information through wireless
network. as an example, once a law officer captures a
suspects facial image, she/he will access the face
recognition system remotely through a hand-held unit and
establish the suspect on the spot it will be additional
fascinating if Associate in Nursing un-manned closedcircuit television works severally and sends out alerts
whenever someone suspicious is in vision. The challenges
in realizing this vision include: A wireless face
recognition system needs significant energy, computation,
and information measure for image acquisition,
processing, and transmission. Face recognition techniques
Page 79

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)


Web Site: www.ijettcs.org Email: editor@ijettcs.org
Volume 5, Issue 6, November - December 2016
have to be compelled to be strong and correct, and it ought
to scale with the dimensions of user cluster. [3, 4]
Face
detection
plays
a
vital
role
in
applications like human laptop interface, face recognition
video police work and face image management. With the
pervasive presence of affordable, top quality cameras on
mobile devices, we have a tendency to are witnessing the
start of associate explosive
growth
of
embedded laptop vision
applications, like
mobile increased reality, mobile image search and time
period image content analysis. [5]
There are some relevant work on wireless face
recognition: Zaeri, Mokhtarian and Cherri discuss face
recognition for wireless police work systems. [6] Rajani
and Yan propose a prioritized transmission theme for a
wireless system particularly designed for face
recognition.[7] Ikdong, Jaechang, mythical being and
Wayne implement a wireless face recognition system
supported ZigBee transmission protocol and Eigenface
technique with low power consumption. [8] Though not
planning for a face recognition system, Henry M. Robert
and Elmore John Leonard propose a simulation
framework and performance criteria for a distributed
detector process over a poster hoc wireless network, [9]
wherever a model of 3 abstract layers during a wireless
detector network is planned. supported this model, this
paper proposes a distributed wireless network example to
hold out face identification task by optimally allocating
the resources at intervals the network. The face
recognition technique employed in this paper is subspacebased standard process with score and call level fusion,
wherever the options area unit chosen by applied math
step-wise simulation, and therefore the fusion results area
unit shown to be superior to exploitation either the full
face or modules alone. [10]
The motivation of this analysis is that there area
unit several advantages from constructing a wireless face
recognition
system.
A
wireless
network is
extremely appropriate for constructing a versatile face
recognition system, as a result of a wireless setup
incurs marginal modification to existing infrastructures,
and a wireless network provides scalable and flexible
versatile observation region. If a wireless face recognition
system has been originated, once the protection level
changes and also the network must be touched, the
wireless network may be touched and reused simply. Face
recognition enhances the practicality and security of the
wireless network, while a face recognition system is
integrated with existing systems. Face recognition
provides identity and expression info for event analysis
to represent a
wise
surroundings,
and
face
recognition will replace or concert with different security
measures to
boost the
protection.

Volume 5, Issue 6, November December 2016

ISSN 2278-6856

The rest of the paper is organized as follows. Chapter a


pair of reviews the face recognition systems. Chapter three
discusses the method of automatic face recognition.
Chapter four provides implementation details, and
Chapter five concludes this paper.

II. Related Works


Without imagining the wireless network, the diagram of
the core face recognition system is shown in Figure two.
In enrollment, the photographs of the registered
users square measure processed into templates of
caricatures by the precise algorithms of the face
recognition system, and these templates square
measure keep. The templates may be thought to
be the reworked user pictures encoded
by
the
corresponding process techniques.
The process
techniques and
also
the templates square
measure adjusted at the same time. In verification or
identification, the face recognition system receives a
replacement image, defines and stores the new image
by identical formula, and compares to the templates. The
choice method could incorporate every kind of classifiers.
If the classifier may be a learning formula and its
structure has to be trained like the neural network
or Bayesian network, the enrollment could also be split
into 2 elements, one for constructing the templates, and
one for learning the classifier structure. [1]

Figure. 1 General Diagram of the Face Recognition


System
Face recognition techniques are often roughly classified
into the subsequent classes. Interested readers square
measure inspired to urge a lot of references from reading
these provided references.
Template Based:
A
typical
templatebased methodology is PCA (Principle part Analysis) based
eigenface methodology, that uses holistic info of the face.
The
eigenfaces are extracted
from
the coaching pictures [11].
The
face pictures of
the folks on
the
watch
list are projected onto the eigenface area, and therefore
the coordinates are keep as templates to check with
testing pictures.
There are alternative transforms supported LDA (Linear
Discriminant
Copyright

2014
SERSC
Analysis) or ICA (Independent part Analysis), and
Page 80

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)


Web Site: www.ijettcs.org Email: editor@ijettcs.org
Volume 5, Issue 6, November - December 2016
therefore

the templates are related

to the

transforms.

Feature Based: options are descriptions or quantitative


measurements of native face expression like eyes, nose
and mouth for direct comparisons.
The native options needn't to be
organs, however they're meaningful objects
occupying
partial image. The native options divided from the facial
image don't need to be used altogether; the options are
often any designated for higher performance.
The options are often generalized as responses to Dennis
Gabor filters etc.
Rule Based: A learning formula, like support vector
machine
(SVM), call tree,
neural
network
or theorem network,
is
trained
on
the obtainable dataset, that constitutes a
particular or
implicit set of rules. the principles are evaluated on the
testing
image to
succeed
in a judgment.
Model Based:
the foremost fashionable models embrace elastic-bunchgraph (EBG) model and hidden Markov model. In EBG
analysis, the bunch graph is made from a tiny low set of
sample
image
graphs.
Recognition relies on an
easy comparison
of
image
graphs.
In
hidden Markov model analysis, the strips tessellating the
facial image are assumed to be connected by the
hidden Markov model. In each models, the model
parameters are fitted
to
the coaching pictures, and
every subject incorporates
a distinctive
model. The
popularity relies on the fitting of the models. Usually in
3D face modeling and analysis, the model fitting is
additionally essential.
Module Based: Facial modules are equally outlined or
detected as native options, however modules are analyzed
as self-contained elements.
The options, scores or selections from modules are
often conjointly combined along
to
succeed
in a consolidated result.
The fusion at each score level and call level is shown to
enhance the popularity performance.

III. PROCESS OF FACIAL RECOGNITION


Facial recognition is that the automatic process of
digital pictures that contain the faces of people for the
aim of identification, authentication/verification or
categorisation1 of these people.
The method of automatic face recognition itself is
comprised of variety of separate sub-processes. [2]

Volume 5, Issue 6, November December 2016

ISSN 2278-6856

a) Image acquisition: the method of capturing the face


of a personal and changing to a digital kind (the digital
image). In an internet and mobile service the
image could are non
heritable in
a
very totally
different system, e.g., taking a photograph with
a camera that is then transferred to an internet service.
b) Face detection: the method of police work for the
presence of a face at intervals a digital image and
marking the
realm.
c) Normalization: the method to sleek variations across
detected facial regions, e.g., changing to a typical size,
rotating
or orientating color
distributions.
d) Feature extraction: The process of uninflected and
outputting repeatable and distinctive readings from the
digital image of a personal. Feature extraction may
be holistic2, feature-based or a mixture of the 2 strategies.
The set of key options could also be hold on for later
comparison in
a
very reference template.
e) Enrolment: If this can be the primary time a
personal has encountered the face recognition system the
image and/or reference template could also be hold on as a
record for later comparison.
f) Comparison: the method of mensuration the similarity
between a
collection of options (the
sample)
with
one antecedently listed within
the system. The
most functions of
comparison are identification
and
authentication/verification. a 3rd purpose of comparison is
categorization that is that the method of extracting options
from a picture of a personal so as to classify that
individual in one or many broad classes (e.g., age, gender,
color of garments, etc.).

IV. Implementation Details


Our identity verification application
system will enroll face photos into
the laptop server
and acknowledge faces with mobile terminals or
smartphones as shown in Figure1.
1. Implementation of Facial Recognition Application
At first we tend to implement mobile embedded wireless
terminal for automatic face recognition. we tend to style
the outside of the embedded wireless terminal, build the
hardware board and implement a image with user
interface, communication modules and Camera facilities.
The enforced embedded wireless terminal is connected to
the server as in Figure one and that we take a look at it
with the roll call system through automatic face
recognition.
Our
wireless automatic
face
recognition system is straightforward to put in, lightweighted and little sized. In our analysis we tend
to style the
system to
supply hardware
with an
Page 81

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)


Web Site: www.ijettcs.org Email: editor@ijettcs.org
Volume 5, Issue 6, November - December 2016
affordable price and it's
doable to
construct
the
minimum price automatic
face
recognition system.
Next
step
is
recognition
of
faces
and
authentication victimisation mobile
terminals
or
smartphones. Mobile terminals or smartphones are
often connected to server by a wireless AP
and footage taken by smartphones are often sent to server
through
wireless
network.
Smartphone
users will transfer the automatic
face
recognition application with none price and may apply
it to several areas simply. the applying sends photos taken
by smartphone to server and acknowledges location of
user. If it's not the registered location, the server denies
the authentication. that the users ought to send the
image on the registered spots.

ISSN 2278-6856

Authentication Module
This
module acknowledges face
with
transmitted footage mistreatment the automatic
recognition engine.

the
face

Registration Module This module register the face of


users and automatic face recognition patterns.
Storage Module This module saves the user data and
standing into the info.

2. Implementation of Facial Recognition Kiosk and


mobile terminal
We style and implement a cubicle to run the biometric
authentication application system. The cubicle is that
them in a part of biometric authentication system and
has many functions as follows:
bit screen graphical
user
interface
Registration/authentication of face footage on the server
Registration/authentication of face footage on the mobile
terminal
and
smartphone
Management operate to take care of the facial application
system
The mobile terminal enforced has the characteristics as
follows:
Registration of face footage taken by the mobile terminal
on the server
Low value implementation
of
mobile
terminal
Easy use
with solely stripped essential
modules
Light-weight little size terminal
3. Basic modules of facial recognition server
Our automatic
face
recognition application
system will enroll face footage into
the laptop server
and acknowledge with mobile terminals and smartphones
as shown in Figure three. Main modules of smartphones
and wireless terminals are Camera Module and
Communication Module.

Figure.2 System Architecture


4. Sequential Diagram of Facial Recognition System
Face registration are often done by computer, mobile
terminal or smartphone. we tend to describe the ordered
diagram
of
face
registration
in
Figure four.
User will register face footage mistreatment server, mobile
terminal or smartphone. The ordered diagram of face
authentication
is
given
in
Figure five.
User will certify mistreatment server, mobile terminal or
smartphone.

Camera Module This module takes image of face and


saves
the
files
with
JPG
format.
Communication Module This module communicates
with the laptop server to send footage and obtain the
popularity result.
Main modules of the Server are Communication Module,
Authentication Module, Registration Module and Storage
Module.
Figure. 3 Sequential Diagram of Registration

Volume 5, Issue 6, November December 2016

Page 82

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)


Web Site: www.ijettcs.org Email: editor@ijettcs.org
Volume 5, Issue 6, November - December 2016

ISSN 2278-6856

Figure 7 shows a student attending book that is connected


to
the biometric
authentication system.
Faces of
scholars taken by smartphones or mobile terminals square
measure sent
to
sever
and undergo the
authentication method.

Figure 4. Sequential Diagram of Authentication


5. Sample Screen Shot of the System
Figure 5 and 6 show examples of face
authentication
using server and mobile terminal respectively.

Figure. 7 Student Attendance Supporting Application


System

V. Conclusions

Figure. 5 Face Authentication using Server

A face recognition system gains flexibility and


price potency whereas being integrated into a wireless
network. Meanwhile, face recognition enhances
the practicality and security of the wireless network. We
have
a
tendency
to develop
a face
recognition system that uses mobile terminals and
smartphones. This
technique sends the
images from
mobile devices to the computer server and finds the
corresponding face comparison the registered knowledge.
Since we have a tendency to style the system for the
sunshine weight
and
minimize
the
implementation price, we are able to cut back the
development price over100 percent. Our system are
often applied to
many areas like laziness management,
access management and attending management.

References

Figure. 6 Face Authentication using Mobile Terminal

Volume 5, Issue 6, November December 2016

[1] http://en.wikipedia.org/wiki/Face_recognition, (2013).


[2] R. Brunelli and T. Poggio, Fundamentals Computer Vision for Human-Computer Interaction,
IEEE Trans. on PAMI, vol. 15, no. 10, (2003).
[3] Y. Yan and L. A. Osadciw, Distributed wireless face
recognition system, Proceedings of 2008 Multimedia
Content Access: Algorithms and Systems II, (2008)
January 27; San Jose, USA.
[4] M. I. Razzak, B. A. Elmogy, M. K. Khan and K.
Alghathbar, Efficient distributed face recognition in
wireless sensor network, International Journal of
Innovative Computing, Information and Control, vol.
8, no. 4, (2012).
[5] M. N. Gawed, O. K. R. Rahmita and F. Khalid,
Region-Based Facial Expression Recognition in Still
Images, Journal of information processing systems,
vol. 9, no. 1, (2013).

Page 83

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)


Web Site: www.ijettcs.org Email: editor@ijettcs.org
Volume 5, Issue 6, November - December 2016

ISSN 2278-6856

[6] N. Zaeri, F. Mokhtarian and A. Cherri, Efficient face


recognition for wireless surveillance systems,
Proceedings of Computer Graphics and Imaging
2007, (2007) February 1, Innsbruck, Austria.
[7] Y. Yan, R. Muraleedharan and L. A. Osadciw, Ant
system based flexible and cost effective routing for
wireless
face
recognition,
Proceedings of
CCNC2008, (2008) January 10, Las Vegas, USA.
[8] I. Kim, J. Shim, J. Schlessman and W. Wolf, Remote
wireless face recognition employing zigbee,
Proceedings of Workshop on Distributed Smart
Cameras 2006, (2006) October 1, Boulder, USA.
[9] R. E. V. Dyck and L. E. Miller, Distributed sensor
processing over an ad hoc wireless network:
simulation framework and performance criteria,
Proceedings of Military Communications Conference
2001, (2001) October 28, San Jose, USA.
[10] Y. Yan and L. A. Osadciw, Fusion for Component
based Face Recognition, Proceedings of CISS 07,
(2007) March 2, Baltimore, USA.
[11] M. Turk and A. Pentland, Eigenfaces for
recognition, Journal of Cognitive, vol. 3, no. 1,
(1991).

Volume 5, Issue 6, November December 2016

Page 84

You might also like