Department of Computer Science & Engineering Page | 1
CONTENTS
Page no.
CERTIFICATE ii ACKNOWLEDGEMENT.. iii ABSTRACT iv LIST OF FIGURES vi LIST OF ABBREVIATIONS. vii
1 Introduction.. 2 2 Existing System 5 3 The Proposed System... 7 4 Project Design.. 12 4.1 User Requirements... 13 4.2 System Requirements... 15 4.3 Data Flow Diagram.. 17 4.4 Use Case Diagram 18 5 References 19
FACETEC Department of Computer Science & Engineering Page | 2
INTRODUCTION
FACETEC Department of Computer Science & Engineering Page | 3
1. INTRODUCTION
A facial recognition device is one that views an image or video of a person and compares it to one that is in the database. It does this by comparing structure, shape and proportions of the face, distance between the eyes, nose, mouth and jaw, upper outlines of the eye sockets, the sides of the mouth, location of the nose and eyes, and the area circumventing the check bones.
Upon enrolment in a facial recognition program, several pictures are taken of the subject at different angles and with different facial expressions. At time of verification and identification the subject stands in front of the camera for a few seconds, and then the image is compared to those that have been previously recorded.
As mobile phones are becoming increasingly potent, security of the data stored in mobile phones becomes very consequential. Most of the current phones have passwords to address security. However, a face apperception scheme is much more secure and flexible as it provides distinctive print to gain access and additionally the utilizer need not recollect passwords. Even though the face apperception systems have already been implemented on the DROID phones they are not efficient and precise. The goal of this project is to implement a face apperception application on the DROID phone, which will be efficient and precise and could be habituated to unlock the phone or sanction a transaction when the registered utilizer is apperceived.
FACETEC Department of Computer Science & Engineering Page | 4
There are an abundance of methods used to detect face and recognize it like PCA, LBP, LDA, EP, Template matching, Morphological processing algorithms etc. This project is utilizing 2D-PCA algorithm for describing face as it is much more efficient than PCA algorithm. For face detection we will be utilizing Haar-Cascade algorithm because it is the most efficient algorithm having an efficiency of 95%. Many algorithms are available for face recognition like LBP, LDA, EBGM, HMM, EP etc. but the main drawback of all the above verbalized algorithms are they have a low precision rate so as to surmount this we are utilizing LDP. This project represents the face recognition approach that employs the local directional pattern descriptor and two-dimensional principal analysis algorithms to achieve enhanced recognition accuracy. It utilizes the transformed image obtained from local directional pattern descriptor as the direct input image of two-dimensional principal analysis algorithms, unlike that most of previous works employed the local pattern descriptors to acquire the histogram features. Apart from all this we are additionally providing a facility for detection of thefts and an auto alarming system which will be sending a system generated email to the utilizer with the photo and the GPS coordinates of the person trying to authenticate or utilize the mobile phone. Our system will also have provisions to preserve password in cases where taking a photo is not possible.
FACETEC Department of Computer Science & Engineering Page | 5
EXISTING SYSTEM
FACETEC Department of Computer Science & Engineering Page | 6
2. EXISTING SYSTEM
There are some inhibitions to the existing face recognition systems. If background color in an image is akin to the skin color, then the color segmentation algorithm cannot distinguish. In the template-matching algorithm, the results are dependent on the standard template culled (orientation etc.), illumination conditions etc. Also it doesn't perform well while detecting faces of people from concrete ethnic inceptions. Eigenface and Fisherface algorithms are then employed and tested for face apperception. The tests show that a total correct recognition/rejection rate of 84.3% with Eigenface is achieved.
The subsisting systems are not able to identify and recognize faces in different lighting conditions and thus is very erroneous, for the system to recognize faces in different lighting condition the database has to be fed with different pictures making the process cumbersome. The subsisting systems additionally doesnt have provisions for larceny detection and automatic database creation.
FACETEC Department of Computer Science & Engineering Page | 7
PROPOSED SYSTEM
FACETEC Department of Computer Science & Engineering Page | 8
3. PROPOSED SYSTEM
In this project, we propose an illumination-robust face recognition system via local directional pattern images. Usually, local pattern descriptors including local binary pattern and local directional pattern have been used in the field of the face recognition and facial expression recognition, since local pattern descriptors have important properties to be robust against the illumination changes and computational simplicity. Thus, this project represents the face recognition approach that employs the local directional pattern descriptor and two-dimensional principal analysis algorithms to achieve enhanced recognition accuracy. In particular, we propose a novel methodology that utilizes the transformed image obtained from local directional pattern descriptor as the direct input image of two-dimensional principal analysis algorithms, unlike that most of previous works employed the local pattern descriptors to acquire the histogram features.
Our system will detect the face utilizing Haar Cascade algorithm and then will extract the face utilizing 2D-PCA (Two dimensional principal component analysis), then give the image extracted to the LDP for recognition of the face and then if the image matches with that in the database, then the utilizer is given authentication. The utilizer will also be given an option to give his password in lieu of the face in cases of erroneous abnegations. The LDP does not vary according to the light so the database can be made more minuscule and the result can be obtained much more expeditious. In integration to all this the system will additionally have a provision for detecting larceny and will vigilant the utilizer of any such unauthorized access. The larceny detection process will be predicated on the number of erroneous endeavors which is bounded to 10, if the number of erroneous FACETEC Department of Computer Science & Engineering Page | 9
endeavors increases than 10, then an automated message will be sent to the users E-mail address with the photo of the person endeavoring to authenticate. Existing system
Fig. Flowchart of a regular face recognition system
Start Take a Picture Detect Face Stop Recognize face FACETEC Department of Computer Science & Engineering Page | 10
The subsisting system only accommodates the function of apperceiving a face the steps involved in that process are: 1. The face is detected utilizing any of the face detecting algorithms 2. Then the features from the face are extracted and stored in database 3. Whenever a utilizer endeavors to authenticate the utilizer will take his photo from which the features will be extracted 4. The features extracted in the last step is checked with the features stored in database 5. If both the features match then the utilizer is sanctioned else step 3 is reiterated Proposed system
No No
Yes Yes
Take a picture in camera Detect face and extract it Extract the Features Database Retrieve the Features Match the features If both Match Atem pts >10 Authorize the user Send an automated email to the user FACETEC Department of Computer Science & Engineering Page | 11
This is the Flowchart for our system the steps involved in sanctioning a person in FACETEC are:
1. The utilizer takes a photo using the camera present in the Android mobile phones 2. The face is detected from the photo taken by the utilizer 3. The features are extracted from the face that is detected 4. In the meantime the features stored in database is retrieved 5. Both the features are matched if a match is there then the utilizer is authenticated 6. If the match is not there then the no of endeavors is checked if the no of endeavors is more preponderant than 10 then an automated message is sent to the users registered Email id 7. And if the no of endeavors is less than 10 then the process is reiterated
FACETEC Department of Computer Science & Engineering Page | 12
PROJECT DESIGN
FACETEC Department of Computer Science & Engineering Page | 13
4.1 USER REQUIREMENTS STUDIES
Android is a mobile operating system (OS) predicated on the Linux kernel and currently developed by Google. With a utilizer interface predicated on direct manipulation, Android is designed primarily for touchscreen mobile contrivances such as smartphones and tablet computers, with specialized utilizer interfaces for televisions (Android TV), cars (Android Auto), and wrist watches (Android Wear). The OS uses touch inputs that loosely correspond to authentic-world actions, like swiping, tapping, pinching, and invert pinching to manipulate on-screen objects, and a virtual keyboard. Despite being primarily designed for touchscreen input, it withal has been utilized in game consoles, digital cameras, and other electronics.
As mobile phones are becoming increasingly potent, security of the data stored in mobile phones becomes very paramount. Most of the current phones have passwords to address security. However, a face recognition scheme is much more secure and flexible as it provides distinctive print to gain access and additionally the utilizer need not recollect passwords. Even though the face recognition systems have already been implemented on the DROID phones they are not efficient and precise. The goal of this project is to implement a face recognition application on the DROID phone, which will be efficient and precise and could be acclimated to unlock the phone or sanction a transaction when the registered utilizer is apperceived.
We are aiming at engendering an Android application where the utilizer will be asked to give his image as an input to the application during the establishing of the application. The utilizer will additionally have to give an Email-Id to which the message will be sent in case FACETEC Department of Computer Science & Engineering Page | 14
of a larceny. The utilizer will additionally be asked a password that the utilizer will require in case of erroneous abnegations.
The user requirements are:
1. The utilizer interface should be very user amicable 2. The utilizer must have the option of feeding his own image manually or taking the images from the users album automatically 3. The utilizer should additionally be given a password button in the home screen so that the utilizer can authenticate himself in case of erroneous abnegations 4. The utilizer should withal be able to keep some widgets on the lock screen like clock, weather etc. 5. The utilizer can integrate multiple persons to the database 6. The utilizer should additionally be given the option of editing his password and the database
FACETEC Department of Computer Science & Engineering Page | 15
4.2 SYSTEM REQUIREMENT STUDIES
Hardware Requirements:
Processor : 600MHz or above RAM : 256 MB or above Hard Disk : 10-15 MB An Android mobile phone with a minimum hard disk space of 20 MB
Software Requirements:
OS - Android 2.3 or above OpenCV for android Languages - Python 2.7, Android
OpenCV
OpenCV is released under a BSD license and hence its free for both academic and commercial use. It has C++, C, Python and Java interfaces and supports Windows, Linux, Mac OS, iOS and Android. OpenCV was designed for computational efficiency and with a strong focus on real-time applications. Written in optimized C/C++, the library can take advantage of multi-core processing. Enabled with OpenCL, it can take advantage of the hardware acceleration of the underlying heterogeneous compute platform. Adopted all around the world, OpenCV has more than 47 thousand people of user community and estimated number of downloads exceeding 7 million. Usage ranges from interactive art, to mines inspection, stitching maps on the web or through advanced robotics. FACETEC Department of Computer Science & Engineering Page | 16
Android Android is a mobile operating system (OS) based on the Linux kernel and currently developed by Google. With a user interface based on direct manipulation, Android is designed primarily for touchscreen mobile devices such as smartphones and tablet computers, with specialized user interfaces for televisions (Android TV), cars (Android Auto), and wrist watches (Android Wear). The OS uses touch inputs that loosely correspond to real-world actions, like swiping, tapping, pinching, and reverse pinching to manipulate on-screen objects, and a virtual keyboard. Despite being primarily designed for touchscreen input, it also has been used in game consoles, digital cameras, and other electronics. Android is the most popular mobile OS. As of 2013, Android devices sell more than Windows, iOS, and Mac OS devices combined, with sales in 2012, 2013 and 2014
close to the installed base of all PCs. As of July 2013 the Google Playstore has had over 1 million Android apps published, and over 50 billion apps downloaded. A developer survey conducted in AprilMay 2013 found that 71% of mobile developers develop for Android.
At Google I/O 2014, the company revealed that there were over 1 billion active monthly Android users (that have been active for 30 days), up from 538 million in June 2013 Python 2.7 Python is an easy to learn, powerful programming language. It has efficient high-level data structures and a simple but effective approach to object-oriented programming. Pythons elegant syntax and dynamic typing, together with its interpreted nature, make it an ideal language for scripting and rapid application development in many areas on most platforms. The Python interpreter is easily extended with new functions and data types implemented in C or C++ (or other languages callable from C). Python is also suitable as an extension language for customizable applications.
FACETEC Department of Computer Science & Engineering Page | 17
Face is detected Face is masked Features are extracted 4.3 DATA FLOW DIAGRAM
Data flow Diagram for FACETEC
Fig 1. Dataflow diagram for the FACETEC system (level 0)
Data flow Diagram for Initial Configurations
Fig 2. Dataflow Diagram for initial configurations (level 1)
Data Flow diagram for authentication process No
Yes
No Yes
Fig 4. Dataflow diagram for authentication process (level 1) Authorize/ Unauthorize FACETEC Image is captured User Store to DB User User Face Detected Thef Detected Database Features extracted Features matched Features retrieved Atempts >10 Authentcate user FACETEC Department of Computer Science & Engineering Page | 18
4.4 USE CASE DIAGRAM
Use Cases
Admin User
Fig 5. Use case diagram for FACETEC
The use case diagram consists of two actors namely the admin and the user. The admin is the person who owns the phones and is the person who has all the authentication to add/edit passwords and add/remove user that can authorize themselves and is the person who does all the configuration required for the app to work. The user is the actor who is trying to authorize himself he can also be the admin or any other person trying to use the phone, the user only has provisions to try to authenticate himself.
Inital confguratons Adding or Setng up of Users
Add/Edit password Try to authentcate
FACETEC Department of Computer Science & Engineering Page | 19
REFERENCES
FACETEC Department of Computer Science & Engineering Page | 20
REFERENCES
1. Face Recognition via Local Directional Pattern by Dong-Ju Kim*, Sang-Heon Lee and Myoung-Kyu Sohn published in International Journal of Security and Its Applications Vol. 7, No. 2, March, 2013.
2. Face recognition on Android by Aditya Surjan published in International Journal of Computer Science Vol.11, No.3, June, 2012.
3. Human Face segmentation and identification, Saad Ahmed sirhoy, computer vision laboratory, Centre for automation research, University of Maryland.
4. A Survey of Face Recognition Techniques by Rabia Jafri and Hamid R. Arabnia Journal of Information Processing Systems, Vol.5, No.2, June 2009 4.
5. Face Recognition system - http://en.wikipedia.org/wiki/Facial_recognition_system.