Académique Documents
Professionnel Documents
Culture Documents
INTRODUCTION
The topic of face recognition for video and complex real-world environments has
garnered tremendous attention from governments for crime fighting as well as airport
terrorism deterrence. However, there has been little attention towards consumer use of
face recognition products. The aim of this project is to come up with a simple
implementation for computer authentication to replace the popular pass-phrase based
authentication on personal computers. The popularity of high-resolution cameras on
market made the possibility of face recognition based computer authentication possible.
Humans can recognize face even when the matching image is distorted, such as a
person wearing glasses, and humans can perform the task fairly easy. Understanding how
humans decipher and do matching is an important research topic for medical and neural
scientists.
APPROACH
WORK PERFORMED
The first step in our project consisted of researching the various facial-recognition
algorithms, and determining which would be the most fit for our application. There are
many open source libraries and applications available, each with a different level of ease-
of-use and completeness. Intel OpenCV and CSU Face Recognition engine are very
featured-rich but they are overly bloated. We decide to use Eigenface engine by Konrad
Darnok. As the engine itself was written in Java, we used Java to implement the video
grabbing and the rest of the front-end. The result is a program that can be used in
conjunction with a video camera. The capture program is shown at figure #1.
QuickTimeª and a
TIFF (LZW) decompressor
are needed to see this picture.
figure #1
case, the Apple iSight to capture a 320x240 image from sequence grabber (using
Quicktime Java) and convert it into grayscale (with java.awt framework) and finally save
it into JPEG format using Sun’s JIMI image library.
Then the “FaceRecognition” Java program is to run the resultant test image
against a trained library. The result is printed out in a text window. In a real system, this
would be passed to a program that wanted to authenticate a user, such as a screen saver or
login screen.
QuickTimeª and a
TIFF (LZW) decompressor
are needed to see this picture.
figure #2
RESULTS
DISCUSSION
Using facial recognition for a simple task such as computer authentication is very
ideal. Computer users often have several passwords to remember, and using such
software can eliminate the need to remember them.
Facial recognition software is currently used mostly for surveillance. However,
computer authentication could potentially be a better use of such software. One reason
why is because for normal consumer use, the occasional false negative can be dealt with.
However, when doing surveillance, false negatives and false positives are a huge
problem.
All computer facial recognition algorithms in use today have trouble dealing with
obstructions on a person’s face, such as sunglasses. These obstructions can cause false
negatives. For a home or small office user, a false negative is ok, since the solution is to
simply remove the obstruction from the person’s face and to retry.
Also all computer facial-recognition systems which take images from camera can
be easily fooled. A simple method is to put a picture of the person in front of the video
camera, and then requesting authentication. This will trick the program into thinking the
real user is there and grant access. This method should therefore not be used for systems
that require high security. Instead it is only sufficient to protect unimportant data, such as
for someone’s personal email.
However, when using facial recognition on a large scale, such as for surveillance,
false negatives are very bad. Since simply wearing sunglasses can defeat the software,
then the criminal/bad guys can walk around undetected by wearing sunglasses. There is
not an easy solution for this problem. For the home user, you can simply ask them to
remove the obstruction and retry. However, on a large scale, you cannot make sunglasses
illegal, and so the problem cannot be worked around.
One more issue to keep in mind is the difficulty a facial recognition device will
have scaling up to a large database of faces. Large events such as the Olympics are places
where facial recognition software is touted as being a great tool. However it is also large
public events like this where the software would encounter major scalability problems. A
large database of people becomes too much of a strain when dealing with large crowded
events like this, as there are too many faces to check.
Hopefully more work will be done in the coming years to bring facial recognition
to the everyday person. This is an area where the software will stand out, and can make
everyone’s life a little bit easier.
TASK PERFORMED BY MEMBERS
REFERENCE
Tracking and Recognizing Rigid and Non-Rigid Facial Motions using Local Parametric
Model of Image Motion". In Proceedings of International Conference on Computer
Vision, 1995.
Ara V Nefian, Lu Hong Liang, Xiao Xing Liu, Xiaobo Pi and Kevin Murphy, Dynamic
Bayesian networks for audio-visual speech recognition, to appear in EURASIP, Journal
of Applied Signal Processing, special issue on Joint Audio Visual Speech Processing.
RUNNING THE PROGRAMS
FaceRecognition is the actual face recognition engine. Type the following at the
“FaceRecognition” directory :