HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 139
Index Terms :- Face Recognition , Image Resolution , Neural Network, Fuzzy Logic.
—————————— ——————————
1 INTRODUCTION
very intensive security system with the current Biometrics makes automated use of the unique personal
perceived world security situation, governments as well features to establish the identity of a person. It is a tool for
as business require reliable methods. The system positive identification of a human subject as biometric
described here incorporates neural network back error signatures cannot be stolen, forgotten, lost or communicated
to another, as is possible in the case of authentication,
propagation and fuzzy logic approach and is an
Employing cards, keys or passwords, so common in day-today
extension to previous works to achieved better system. use. In the present scenario of increased security concern, the
It is believed that by incorporating both techniques, a necessity and relevance of making use of biometrics to
more natural decision‐making process can be achieved. establish personal identity and to detect impostors are
The system also exploits face features. assuming significance.
From observation the upper and lower parts of the
During the image processing session, image
human face possess significant characteristics human acquisition, feature extraction and data normalization are
recognition process. It is found that given upper and performed. Image processing is required in both the neural
lower faces we can differentiate faces more easily with network training mode and the on-line recognition mode.
the upper‐face portion compared to the lower face However, image acquisition is performed only in neural
portion. By assigning higher priority to upper face network training mode. As opposed to the manual feature
extraction process in neural network training mode, feature
feature during the recognition process. It is possible to extraction in online recognition mode is automated by a head
design a face recognition system that exploits the above and eye detector.
situation.
6) B
Browse right 20
0 O with smile, 2.2 H
Head Detector
7) B
Browse up 20 O,
O
8) B
Browse up 20 O with smile,
The head deetector is capaable of verifyiing a valid
9) B
Browse down 202 O,
10)) Browse down 20 O with smile, and head image, determ mination of th he top head loccation and
11)) Free pose. the faace side. It is used to facilitate the eyee detection
processs; the area ffor eye detecttion process iis reduced
signifi ficantly by im
mposing a weell defined areea for eye
search h which is dettermined by h head locator ass shown in
figuree.
3. N
Neural Netw
work
2.3 Eye
E Detector A multii‐layer percep
ption feed fo
orward is
traiined based on the bacck error pro opagation
alggorithm. In ad ddition, an aadaptive learn
ning rate,
The eye detector
d is a multi‐layer
m perception neurral
mo omentum, battch is also ap pplied to imp
prove the
Network that
t has been n trained withh eye pattern as
neu ural network learning timee. Two types of neural
well as noon‐eye pattern n. A window fframe of 32 x 3 32
nettwork are u used in this feature‐bassed face
pixels is sccanned throug gh the eye sea arch area, whicch
reccognition systeem namely, faace neural netw work and
is determiined by the heead locator, to
o search for th
he
eyee neural netwo ork.
locations of
o the eyes. The eye detecto or is capable of
recognizinng both the left eye and the rright eye.
In order to determinee process tha at exploits th he 3.1 Face Neurall Network
geometric constraint im mposed by facce structure on o
feature pooint such as eye and mouth llocation. Face neeural network
k consists of 4448 input
nod
des, 12 hiddeen nodes and I output nodde, and it
JOURNAL OF COMPUTING, VOLLUME 3, ISSUE 5, M
MAY 2011, ISSN 21
151‐9617
HTTPS://SITES.GOOGLE.COM/SSITE/JOURNALOFCCOMPUTING/
WWW.JOURN NALOFCOMPUTING.ORG 142
can be useed to train eitther the uppeer face or low
wer info ormation and also the locattions of the up pper‐ and
face imagees. low wer‐face neuraal network file, which resides in a
i. Authorized fac
A ce images dattabase in the teerminal or com mputer.
ii. Non‐face imag
N es
iii. Unauthorized f
U face images he tests were conducted in
Basically, th n a dual
sysstem mode bo oth in the off‐‐line mode an
nd on‐line
3.2‐ Eye N Neural Networrk mo ode. The off‐‐line mode teests providess a good
fee dback that can n be used to iimprove system design
Eye neural networrk contains 25 56 node at inpu ut furrther, whereass the on‐line ttests reveal th he overall
layer, 1 no ode at hidden
n layer and I node at outpu ut perrformance
layer. Thee training im mages is div vided into tw wo Of the security sy ystem.
groups namely, eye ima ages and non‐eeye images. Ey ye
neural nettwork is
Trained to o produce ann output of either
e I for ey
ye Offf-line Tests
images or 0 for non‐eye images. A tra ained eye neurral
network iss used in the eeye detector to o determine th he Imaages of six users are traained to obttain their
possible Location of eyee for a given im mage. resp pective face neural netwwork. The ey ye neural
nettwork is traained with eeye images that are
4. Fuzzy System exttracted & on n the User’s images. Bothh trained
imaages and unttrained imagees are used to
o test the
T
The fuzzy sysstem acts as th he final decisio on traiined eye neurral network an nd face neurall network
making stage
s by utilizing the reccognition lev vel in tthe off‐line moode.
informatio on provided by
b the upper‐fface and loweer‐
fixe neural networks.
Three inp put fuzzy setss have been defmed
d for th
he
fuzzy systtem namely, un nmatched,
in‐ determ ministic and matched. Co orrespondinglly,
three outp put fuzzy setss have also beeen defined i.e.
unauthoriz zed, unknown n and authoriz zed.
In the reco
ognition proceess, the fuzzyy system Fuzzes
the recogn nition levels frrom both the upper‐face an nd
lower‐facee neural network by ussing the inpu ut
membersh hip functions. The fuzzy ru ules are set in
n a
manner That
T emphasiss is given to the upper‐face
images du uring the deciision making process. This is
based on the observa ation that the upper faciial
expression n changes min nimally, but the
t lower faciial
expression n changes sign nificantly.
5. System
m Tests and Results
# sign indicattes a user who wears sp
pectacle
Tests werre performed on the intelligent security
system to determine its reliability and d performancee.
The facee recognition n system is
incorporatted into a in ntelligent sma artcard security
system. Sm martcard is used
u as a key to the security
system an nd the fixe reco ognition systeem is applied as
a second leevel of protecttion to identiffy a card owneer.
The sma artcard conttains the user u person
nal
JOURNAL OF COMPUTING, VOLLUME 3, ISSUE 5, M
MAY 2011, ISSN 21
151‐9617
HTTPS://SITES.GOOGLE.COM/SSITE/JOURNALOFCCOMPUTING/
WWW.JOURN NALOFCOMPUTING.ORG 143
Facce Neural Nettwork Test Reesults
It is found thatt there are seeveral failuress on face
reccognition fou und to be aactually due to poor
reccognition on th he lower face iimages.
On n‐line Tests
Tw wo major testss are conducteed to evaluatee the face
reccognition systeem performan nce namely, au uthorized
carrd owner testss and unauthorized card ow wner tests.
it iss also a measu ure of system flexibility to rrecognize
a
# sign ind
dicates a use
er who wears
s spectacle useer with a diffeerent facial exp pression. As w we except
, th
he system reccorded 94% ssuccess for au uthorized
and d 92.8% succcess for thee unauthorizeed cases.
Faiilures were du ue to subjects w wearing spectaacles.
This chart indicates the o
overall off‐line
e system test
results for both
d and untrained images.
the trained
Online teest
Eye Neura
al Network Teest Results
Th is chart indicates the overall on-lin
ne tests
Prreliminary tessts on the eye neural networrk sult for both
res h the authoriized and
show thatt the eye neurral network iss not capable of un authorized person.
detecting the eye location for tho ose who wear
spectacles. Most of the ffailure to locatte the eye is du ue
to improp per head orien ntation that ressults in the ey
ye.
It is
Also found d that reflectio
on & on specttacles can resuult
in failure tto detect the eeye. Thus, it is very importan nt
to ensure p proper lightinng to reduce thhis effect.
JOURNAL OF COMPUTING, VOLLUME 3, ISSUE 5, M
MAY 2011, ISSN 21
151‐9617
HTTPS://SITES.GOOGLE.COM/SSITE/JOURNALOFCCOMPUTING/
WWW.JOURN NALOFCOMPUTING.ORG 144
6. C Conclusion
Thee face recogn nition system m which emp ploys the
upp per‐face and lo ower‐face feattures in the recognition
pro ocess has been n proven to bbe very successsful. The
sysstem is examin ned by an im
mages data basse of face
imaages with v varying posee as well aas facial
exp pression. This strategy is alsso useful for ssearching
imaages data basee when the pu urpose of the search is
nott only finding g the given peerson, but also
o ranking
thee similar peeople from the data baase. The
inteegration of ffuzzy logic aapproach intto neural
nettwork techniq que has creatted an enhan nced face
maage recognition n process.
Bessides, there arre some limitaation of the system that
hass to be consid dered such aas the face recognition
sysstem would n not work for images that with eye
clossed and imag ges of a bald P Person. face recognition
is b becoming very importantt in many reeal world
app plication inclu uding security,, robotics, ban nking etc.
Impleementation off the face recognition
sysstem in the seccurity system in this researcch reveals
thaat there is a w wide area of aapplication forr the face
reccognition systeem to be app plied especiallyy in high
Unsolved Problems:- seccurity situation ns such as auttomatic teller machine,
seccurity room etcc.
i. Preliminary tes
P sts on the eye neural networrk
shhows that thee eye neural network is not
n
caapable of dettecting the eyye location for RE
EFERENCES
S
th
hose who wea ar spectacles.
ii. eyye detector faiiled in a numb ber of [1] R Linggard, D J MMyers, C Nightinggale, “Neural
occasions. Netwworks For Vision, Speech And Natu ural
iii. Most of the fail
M lure to locate tthe eye is due Langguage”
to
o improper heead orientation n.
[2] David Brubaker, C Cedric Sheerer, ‘‘ Fuzzy ‐ Logic
iv. Itt is also found that reflectionn from Systtem Solves Controol Problem ”,
sppectacles can rresult in
a. failuree to detect the eye. Andrew W. Ellis, Brenda M. Flude, Familiar
[3] A
Facee Recognition : A Comparative Studdy of A
Connnectionist Model and Human Perfoormance”,
My Ideas:-
Abu Bakar Hassan
[4] A n, “Human Face R Recopnition
Too be implemennt it in Securitty System.. Svsttem using Artificiial Neural Networrks”,
Too implement iit into Internett Security
Syystem.
Too implement it into Payment Gatewa ay
Option of Bank
O ks.