SlideShare ist ein Scribd-Unternehmen logo
1 von 7
IJARCCE
ISSN (Online) 2278-1021
ISSN (Print) 2319 5940
International Journal of Advanced Research in Computer and Communication Engineering
Vol. 5, Issue 6, June 2016
Copyright to IJARCCE DOI 10.17148/IJARCCE.2016.5627 130
Detection, Segmentation and Recognition of Face
and its Features using Neural Network
Smriti Tikoo1
, Nitin Malik2
Research Scholar, Department of EECE, The NorthCap University, Gurgaon, India1
Associate Professor, Department of EECE, The Northcap University, Gurgaon, India2
Abstract: Face detection and recognition has been prevalent with research scholars and diverse approaches have been
incorporated till date to serve purpose. The rampant advent of biometric analysis systems, which may be full body
scanners, or iris detection and recognition systems and the finger print recognition systems, and surveillance systems
deployed for safety and security purposes have contributed to inclination towards same. Advances has been made with
frontal view, lateral view of the face or using facial expressions such as anger, happiness and gloominess, still images
and video image to be used for detection and recognition. This led to newer methods for face detection and recognition
to be introduced in achieving accurate results and economically feasible and extremely secure. Techniques such as
Principal Component analysis (PCA), Independent component analysis (ICA), Linear Discriminant Analysis (LDA),
have been the predominant ones to be used. But with improvements needed in the previous approaches Neural Net-
works based recognition was like boon to the industry. It not only enhanced the recognition but also the efficiency of
the process. Choosing Backpropagation as the learning method was clearly out of its efficiency to recognize non linear
faces with an acceptance ratio of more than 90% and execution time of only few seconds.
Keywords: Face detection, Biometric analysis, Recognition, Backpropagation, Neural Networks.
INTRODUCTION
Automatic recognition dates back to the years of 1960’s
when pioneers such as Woody Bledsoe, Helen Chan
Wolf, and Charles Bisson introduced their works to the
world. In 1964 & 1965, Bledsoe, along with Helen Chan
and Charles Bisson had worked on the computer to rec-
ognize human faces. But it didn’t allow much recognition
to his work due to not much support from agencies. After
him the work was carried forward by Peter Hart at
the Stanford Research Institute. The results given by com-
puter were terrific when feeded with a gallery of images
for recognition.
In around 1997, another approach by Christoph von der
Malsburg and students of lot of reputed universities got
together to design a system which was even better than the
previous one. The system designed was robust and could
identify people from photographs which didn’t offer a
clear view of the facial images .After that technologies
like Polar and FaceIt were introduced which were doing
the work in lesser time and gave accurate results by offer-
ing features like a 3D view of the picture and comparing it
to a database from worldwide. Till the year 2006 a lot of
new algorithm replaced the previous ones and were prov-
ing to be better in terms of offering various new tech-
niques to get better results and their performance was
commendable.
Automatic Recognition has seen a lot of improvement
since 1993, the error rate has dropped down & enhance-
ment methods to improve the resolution have hit the mar-
ket. Ever since then biometric authentication is all over
the place, these days ranging from home security systems,
surveillance cameras, to fingerprint and iris authentication
systems, user verification and etc.
These systems have contributed in catching terrorists and
other type of intruders via cyber or in person. Recognition
of faces has been under a research since 1960’s but it’s
just over a decade that acceptable results have been ob-
tained. Approaches deployed do not count the intricate
details which differ from person to person in context of
recognition results. The continuous changes in expression
of face depending upon the situation being experienced by
person disclose important information regarding the struc-
tural characteristics and the texture, thereby helping in
recognition process.
Of the many methods adopted towards recognition of face
they can be broadly classified as a) holistic approach
which relies of taking the whole face as an input in pixels
and b) feature extraction which concentrates on capturing
the features in a face but certain methods are deployed for
removing the redundancy information and dimension
problems involved.
Three basic approaches in this direction are namely PCA,
LDA, ICA others which were added to the list include the
neural network, fuzzy and skin and texture based ap-
proaches also including the ASM model. The problem is
approached first by detecting the face and its features and
then moving on to recognition. A lot approaches are avail-
able for detection of faces like Viola Jones algorithm,
LBP, Adaboost algorithm, neural network based detection
or usage of Snow classifier method .
IJARCCE
ISSN (Online) 2278-1021
ISSN (Print) 2319 5940
International Journal of Advanced Research in Computer and Communication Engineering
Vol. 5, Issue 6, June 2016
Copyright to IJARCCE DOI 10.17148/IJARCCE.2016.5627 131
Figure 1: Face detection process
Figure 2: A generalized face recognition procedure
PROBLEM DESCRIPTION:
The onset of biometric authentication dates back to 1960’s
but has seen a boost in the recent years due to constant
threat to security from intruders via cyber or via crevices
of the inhabited areas of country. It has found usage in
security systems installed in homes, retina scans, hand
scans, facial scans for verifications at airports or organiza-
tions or malls which are frequently visited areas by people
of different races and culture. These systems tend to offer
a sense of reliability, accountability and security from the
threat at doorstep. It manages to safe guard people’s inter-
ests and keeps the threats at bay as much as possible. This
has brought the human computer interaction to a higher
level, where computer are trying to imitate the functions
performed by brain with the help of sensory organs. These
tasks are performed with ease by our brains due to net-
working of neuron structure built in our brain in way a
mechanism evolved to cope up with responding appro-
priately via motor and coordination skills. Such systems
are mastered using various available approaches which
make use of image processing and open source computer
vision in such a way that have boosted the business for
detection and recognition systems. In this paper we pro-
pose a similar approach to detect and recognize a facial
image and its features using a BPNN with help of Matlab.
In the Matlab we have worked under the neural network,
using its tools to train and process the image for obtaining
the performance and regression plots.
BACKPROPAGATION: Also called as "backward
propagation of errors", is a popular method of train-
ing MLP artificial neural networks in conjunction with
an optimization method. Gradient of loss function is calcu-
lated with respect to the associated weights. Optimization
method is fed with the gradient which alters the weights
used to reduce the loss function. This algorithm works on
the supervised learning rule i.e. requires a known, desired
output for each input value in order to calculate the loss
function gradient. It makes use of sigmoid function as its
activation usually. The algorithm can be split two phases:
Phase 1: Propagation:
Forward propagation: Input is fed through the network
to generate propagation's output activations.
Backward propagation: A feedback network is formed
by feeding the output as input in order to generate a differ-
ence between actual and the target outputs.
Phase 2: Weight update:
Gradient of weight is a product of difference of outputs
and input activation.
Subtract a ratio (percentage) of the gradient from the
weight.
Ratio or the learning rate affects the speed and the quality
of learning. Greater the ratio the neurons are trained quick-
ly but accuracy is assured with a lower ratio. If weight
updation increases in positive side the error shall increase.
Repeat the steps to attain satisfactory results.
NEURAL NETWORK: Defines a family of algorithms
via a multiple layers of interconnected inspired from the
neuron structure in the brain. Here each circular node
represents an artificial neuron and an arrow represents the
connection from the output of one neuron to the input of
another. These networks are designed for approximating
functions for huge amount of inputs generally unknown.
The nodes in neural network exchange data between one
another. The connections between the nodes have numer-
ic’s weights associated which are altered to attain an out-
put matching the target output in ace of supervised learn-
ing or making neural nets adaptive to inputs and capable
of learning.
IJARCCE
ISSN (Online) 2278-1021
ISSN (Print) 2319 5940
International Journal of Advanced Research in Computer and Communication Engineering
Vol. 5, Issue 6, June 2016
Copyright to IJARCCE DOI 10.17148/IJARCCE.2016.5627 132
On the basis of the following criteria a network can be
classified as neural: if it has set of adaptive weights and is
capable of approximating nonlinear functions of their in-
puts. The adaptive weights can be thought of as connec
tion strengths between neurons which are activated during
training and predictions
FACE DETECTION ALGORITHM: Proposed by Paul
Viola and Michael Jones, it proves to be a one of its kind
by providing competitive results for real time situations .It
not only aces the process of detecting frontal faces but can
also be modeled for detecting variety of other object
classes. It’s robust nature and its adaptability for practical
situation makes its popular among its users. It follows a
four stage procedure for the entire face detection which is :
first is Haar feature selection, then comes the integral im-
age creation followed by adaboost training and cascading
of amplifiers.
Haar Feature selection matches the commonalities found
in human faces. The integral image calculates the rectan-
gular features in fixed time which benefits it over other
sophisticated features. Integral image at (x, y) coordinates
gives the pixel sum of the coordinates above and on to the
left of the (x,y).Ada boost training algorithm boost the
performance of cascading amplifiers by training them ap-
propriately so as to form a strong classifier. The strong
classifiers are arranged in a cascade in order of complexi-
ty, where each successive classifier is trained only on
those selected samples which pass through the preceding
classifiers. If at any stage in the cascade a classifier rejects
the sub-window under inspection, no further processing is
performed and continue on searching the next sub-
window. The cascade therefore has the form of a degene-
rate tree. In the case of faces, the first classifier in the cas-
cade – called the attentional operator – uses only two fea-
tures to achieve a false negative rate of approximately 0%
and a false positive rate of 40%.
The effect of this single classifier is to reduce by roughly
half the number of times the entire cascade is evaluated. In
cascading, each stage consists of a strong classifier. So all
the features are grouped into several stages where each
stage has certain number of features. The job of each stage
is to determine whether a given sub-window is definitely
not a face or may be a face. A given sub-window is imme-
diately discarded as not a face if it fails in any of the stage.
VISION CASCADE OBJECT DETECTOR: Detect
objects using the Viola-Jones algorithm The cascade ob-
ject detector uses the Viola-Jones algorithm to detect
people's faces, noses, eyes, mouth, or upper body. One can
also use the Training Image Labeler to train a custom clas-
sifier to use with this System object.
COMPUTER VISION TOOLS: provides algorithms,
functions, and apps for designing and simulating computer
vision and video processing systems. You can perform
feature detection, extraction, and matching; object detec
tion and tracking; motion estimation; and video
processing. For 3-D computer vision, the system toolbox
supports camera calibration, stereo vision, 3-D reconstruc-
tion, and 3-D point cloud processing. With machine learn-
ing based frameworks, you can train object detection, ob-
ject recognition, and image retrieval systems. Algorithms
are available as MATLAB functions, System objects, and
Simulink blocks. For rapid prototyping and embedded
system design, the system toolbox supports fixed-point
arithmetic and C-code generation.
PROPOSED METHODOLOGY
1. Detection of face and its major features.
2. Capturing Images to be recognized in rgb, gray and
binary format.
3. Compute histogram for the same.
4. Carry out the segmentation process of the images in
rgb format .
5. Compute the histogram for them .
6. Compute histogram data into neural network fitting
tool
7. Obtain the performance and regression plots for the
same
RESULTS AND DISCUSSION
After detecting faces and its features we move on the task
of recognition using the Neural Network training for rec-
ognition to be completed. Here I am using different faces
to show the procedure of face recognition one can contin-
ue with the same. So first we read the image convert to
grayscale or binary as we will be making use of their
equivalent histogram for feeding the data in the neural
network. After opening the nft tool we choose the data to
be trained for recognition procedure. That data is usually
imported from an excel book.
After importing the data neural network tool starts the
training, It carries out training in 3 states that is training
validation and testing. Where in the training stage the net-
work is adjusted as per the error generated during it. Dur-
ing the validation network generalization is monitored and
is used to halt the training.
In testing the final solution is tested to confirm the predic-
tive power of the network. Usually a lot of training ses-
sions are conducted to enhance the performance of net-
work and lower the mean squared error value which is the
average squared difference between output and target. We
have used feed forward networks under the supervised
learning architecture of neural network tool box to com-
pute our data , in which one way connections operate and
no feedback mechanism is included. In testing the final
solution was obtained by carrying out the training session
for 5-10 times in order to achieve better outcomes .Mean
squared error was the parameter chosen to asses the net-
work’s execution so far. Lower values for mean squared
were obtained for the same. Thus with results one can
conclude to have recognized the given image .The accura-
cy of this network is 85% approx.
IJARCCE
ISSN (Online) 2278-1021
ISSN (Print) 2319 5940
International Journal of Advanced Research in Computer and Communication Engineering
Vol. 5, Issue 6, June 2016
Copyright to IJARCCE DOI 10.17148/IJARCCE.2016.5627 133
Figure 1: Detection of face and its features followed by the segmentation process.
Figure2:The three format of sample image rgb, gray and binary
Figure3: Computation of histogram equivalent for the gray scale of the sample image.
Figure4: Computation of binary histogram equivalent
Face Detection Mouth Detection Nose Detection
0
100
200
300
400
500
600
700
800
0 50 100 150 200 250
0
1
2
3
4
5
6
x 10
4
0 1
IJARCCE
ISSN (Online) 2278-1021
ISSN (Print) 2319 5940
International Journal of Advanced Research in Computer and Communication Engineering
Vol. 5, Issue 6, June 2016
Copyright to IJARCCE DOI 10.17148/IJARCCE.2016.5627 134
Figure5: Performance plot for grayscale image
Figure 6: Regression plot for grayscale image
Figure 7: Performance plot for binary image
0 1 2 3 4 5 6
10
-25
10
-20
10
-15
10
-10
10
-5
10
0
10
5
Best Validation Performance is 1.8856e-27 at epoch 6
MeanSquaredError(mse)
6 Epochs
Train
Validation
Test
Best
-100 0 100 200 300 400
-100
0
100
200
300
400
Target
Output~=1*Target+2.7e-14
Training: R=1
Data
Fit
Y = T
-100 0 100 200 300 400
-100
0
100
200
300
400
Target
Output~=0*Target+7.5e-15 Validation: R=0
Data
Fit
Y = T
0 200 400 600
-100
0
100
200
300
400
500
600
Target
Output~=0.41*Target+9.5
Test: R=0.46543
Data
Fit
Y = T
0 200 400 600
-100
0
100
200
300
400
500
600
Target
Output~=0.48*Target+11
All: R=0.70111
Data
Fit
Y = T
0 1 2 3 4 5 6 7
10
-20
10
-15
10
-10
10
-5
10
0
10
5
10
10
Best Training Performance is 0 at epoch 7
MeanSquaredError(mse)
7 Epochs
Train
Best
IJARCCE
ISSN (Online) 2278-1021
ISSN (Print) 2319 5940
International Journal of Advanced Research in Computer and Communication Engineering
Vol. 5, Issue 6, June 2016
Copyright to IJARCCE DOI 10.17148/IJARCCE.2016.5627 135
Figure 8: Regression plot for binary image
CONCLUSION
In this work it has been shown that if a facial image of a
person is given then the network can able to recognize the
face of the person. The whole work is completed through
the following steps: Facial image of a person has been
collected by taking three different samples of the person
for the experiment. Each image is divided into two equal
parts to show the process of segmentation. Feed Forward
Back Propagation neural network have been used to train,
test and validate the net-work for each part of the image
using MATLAB. The histogram equivalent of binary and
gray images have been computed as the data to check for
the recognition process using performance plot, regression
plot as means of parameters to check the performance.
Training of each sample is performed up to 3-4 times to
minimize the error and changing the number of neurons in
the hidden layer accordingly to obtain a better result. Fa-
cial image without dividing into parts have also been ap-
plied in the network.
REFERENCES
[1] H.A. Rowley, S. Baluja, and T. Kanade, “Neural network - based
face detection,” IEEE Trans. Pattern Analysis and Machine Intelli-
gence, vol. 20, no. 1, pp. 23–38, Jan. 1998.
[2] H.A.Rowley, S. Baluja, and T. Kanade, “Rotation invariant neural
net-workbased face detection,” Proc. IEEE Int’l Conf. Computer
Vision and Pattern Recognition, pp. 38–44, 1998.
[3] K.K Sung and T. Poggio, “Example-based learning for view-based
human face detection,” IEEE Trans. Pattern Analysis and Machine
Intelli-gence, vol. 20, no. 1, pp. 39–51, Jan. 1998.
[4] H. Schneiderman and T. Kanade, “A statistical method for 3D
object detection applied to faces and cars,” Proc. IEEE Int’l Conf.
Computer Vision and Pattern Recognition, pp. 746–751, June 2000.
[5] K.C. Yow and R. Cipolla, “Feature-based human face detection,”
Image and Vision Computing, vol. 25, no. 9, pp. 713–735, Sept.
1997.
[6] D. Maio and D. Maltoni, “Real-time face location on gray-scale static
images,” Pattern Recognition, vol. 33, no. 9, pp. 1525–1539, Sept.
2000.
[7] M.S. Lew and N. Huijsmans, “Information theory and face detec-
tion,” Proc.IEEE Int’l Conf. Pattern Recognition, pp. 601- 605,
Aug. 1996.
[8] S.C. Dass and A.K. Jain, “Markov face models,” Proc. IEEE Int’l
Conf.Computer Vision, pp. 680–687, July 2001.
[9] A.J. Colmenarez and T.S. Huang, “Face detection with information
based maximum discrimination,” Proc. IEEE Int’l Conf. Computer
Vision and Pattern Recognition, pp. 782–787, June 1997.
[10] D. DeCarlo and D. Metaxas, “Optical flow constraints on deforma-
ble models with applications to face tracking,” International Journal
Computer Vision, vol. 38, no. 2, pp. 99–127, July 2000.
[11] V. Bakic and G. Stockman, “Menu selection by facial aspect,” Proc.
Vision Interface, Canada, pp. 203–209, May 1999.
[12] A. Colmenarez, B. Frey, and T. Huang, “Detection and tracking of
faces and facial features,” Proc. IEEE Int’l Conf. Image Processing,
pp. 657–661, Oct. 1999.
[13] R. F´eraud, O.J. Bernier, J.-E. Viallet, and M. Collobert, “A fast and
accurate face detection based on neural network,” IEEE Trans. Pat-
tern Analysis and Machine Intelligence, vol. 23.
[14] W.Zhao, R.Chellappa, P.J..Phillips and A. Rosennfeld, “Face Reco-
ni-tion: A literature Survey”. ACM Comput.Surv., 35(4): 399-458,
2003.
[15] M.A.Turk and A.P. Pentaland, “Face Recognition Using Eigenfac-
es”, IEEE conf. on Computer Vision and Pattern Recognition, pp.
586-591, 1991.
[16] Ling-Zhi Liao, Si-Wei Luo, and Mei Tian “”Whitenedfaces” Re-
cogni-tion With PCA and ICA” IEEE Signal Processing Letters,
Vol. 14, No. 12, pp1008-1011, Dec. 2007.
[17] G. Jarillo, W.Pedrycz , M. Reformat “Aggregation of classifiers
based on image transformations in biometric face recognition” Ma-
chine Vision and Applications (2008) Vol . 19,pp. 125-140, Sprin-
ger-Verlag 2007.
[18] Tej Pal Singh, “Face Recognition by using Feed Forward Back
Propagation Neural Network”, International Journal of Innovative
Research in Technology & Science, vol.1, no.1.
[19] N.Revathy, T.Guhan, “Face recognition system using back propa-
gation artificial neural networks”, International Journal of Ad-
vanced Engineering Technology, vol.3, no. 1, 2012.
1 2 3 4 5 6 7 8 9 10 11
x 10
5
1
2
3
4
5
6
7
8
9
10
11
x 10
5
Target
Output~=1*Target+-4.7e-11
Training: R=1
Data
Fit
Y = T
IJARCCE
ISSN (Online) 2278-1021
ISSN (Print) 2319 5940
International Journal of Advanced Research in Computer and Communication Engineering
Vol. 5, Issue 6, June 2016
Copyright to IJARCCE DOI 10.17148/IJARCCE.2016.5627 136
[20] Kwan-Ho Lin, Kin-Man Lam, and Wan-Chi Siu. “A New Approach
using ModiGied Hausdorff Distances with EigenFace for Human
Face Recognition” IEEE Seventh international Conference on Con-
trol, Automation, Robotics and Vision , Singapore, 2-5 Dec
2002,pp 980-984.
[21] Zdravko Liposcak, , Sven Loncaric, “Face Recognition From Pro-
files Using Morphological Operations”, IEEE Conference on Rec-
ognition, Analysis, and Tracking of Faces and Gestures in Real-
Time Systems, 1999.
[22] Simone Ceolin , William A.P Smith, Edwin Hancock, “Facial
Shape Spaces from Surface Normals and Geodesic Distance”, Digi-
tal Image Computing Techniques and Applications, 9th
Biennial
Conference of Australian Pattern Recognition Society IEEE 3-5
Dec.,2007 ,Glenelg, pp-416-423.
[23] Ki-Chung Chung , Seok Cheol Kee ,and Sang Ryong Kim, “Face
Recognition using Principal Component Analysis of Gabor Filter
Responses” ,Recognition, Analysis, and Tracking of Faces and Ges-
tures in Real-Time Systems, 1999,Proceedings. International Work-
shop IEEE 26-27 September,1999, Corfu,pp-53-57.
[24] Ms. Varsha Gupta, Mr. Dipesh Sharma, “A Study of Various Face
Detection Methods”, International Journal of Advanced Research in
Computer and Communication Engineering), vol.3, no. 5, May
2014.
[25] Irene Kotsia, Iaonnis Pitas, “Facial expression recognition in image
sequences using geometric deformation features and support vector
machines”, IEEE transaction paper on image processing, vol. 16,
no.1, pp-172-187, January 2007.
[26] R.Rojas,”The back propagation algorithm”,Springer-Verlag, Neural
networks, pp 149-182 1996.
[27] Hosseien Lari-Najaffi , Mohammad Naseerudin and Tariq Sa-
mad,”Effects of initial weights on back propagation and its varia-
tions”, Systems, Man and Cybernetics ,Conference Proceedings,
IEEE International Conference, 14-17 Nov ,1989,Cambridge, pp-
218-219.
[28] M.H Ahmad Fadzil. , H.Abu Bakar., “Human face recognition
using neural networks”, Image processing, 1994, Proceedings ICIP-
94, IEEE International Conference ,13-16 November, 1994, Austin
,pp-936-939.
[29] N.K Sinha , M.M Gupta and D.H Rao, “Dynamic Neural Networks
-an overview”, Industrial Technology 2000,Proceedings of IEEE
International Conference,19-22 Jan,2000, pp-491-496.[30] Prachi
Agarwal, Naveen Prakash, “An Efficient Back Propagation Neu-
ralNetwork Based Face Recognition System Using Haar Wavelet
Transform and PCA” International Journal of Computer Science
and Mobile Computing, vol.2, no.5,pg.386 – 395,May 2013.
[31]Dibber, 4 Jan 2005, “Backpropagation”, https://en.wikipedia.org/
wiki/Backpropagation, 20 September 2015.
[32] “Artificial Neural Networks”, https://en.wikipedia.org/ wiki/ Artifi-
cial_neural_network, accessed online 2 October 2001,
[33] Michael Nielsen ,Jan 2016,“Neural networks and deep learning”,
http://neuralnetworksanddeeplearning.com/chap2.html.[34] Tyrell
turing, 7 April 2005, “Feed forward neural network”,
https://en.wikipedia.org/wiki/Feedforward_neural_network.

Weitere ähnliche Inhalte

Was ist angesagt?

A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...aciijournal
 
Vehicle Monitoring System based On IOT, Using 4G/LTE
Vehicle Monitoring System based On IOT, Using 4G/LTEVehicle Monitoring System based On IOT, Using 4G/LTE
Vehicle Monitoring System based On IOT, Using 4G/LTEDr. Amarjeet Singh
 
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEYFEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEYijcsit
 
IRJET- Spot Me - A Smart Attendance System based on Face Recognition
IRJET- Spot Me - A Smart Attendance System based on Face RecognitionIRJET- Spot Me - A Smart Attendance System based on Face Recognition
IRJET- Spot Me - A Smart Attendance System based on Face RecognitionIRJET Journal
 
Gender Classification using SVM With Flask
Gender Classification using SVM With FlaskGender Classification using SVM With Flask
Gender Classification using SVM With FlaskAI Publications
 
Development of durian leaf disease detection on Android device
Development of durian leaf disease detection on Android device Development of durian leaf disease detection on Android device
Development of durian leaf disease detection on Android device IJECEIAES
 
A Robust & Fast Face Detection System
A Robust & Fast Face Detection SystemA Robust & Fast Face Detection System
A Robust & Fast Face Detection SystemIDES Editor
 
TOP 5 Most View Article From Academia in 2019
TOP 5 Most View Article From Academia in 2019TOP 5 Most View Article From Academia in 2019
TOP 5 Most View Article From Academia in 2019sipij
 
Face mask detection
Face mask detection Face mask detection
Face mask detection Sonesh yadav
 
IRJET- Chest Abnormality Detection from X-Ray using Deep Learning
IRJET- Chest Abnormality Detection from X-Ray using Deep LearningIRJET- Chest Abnormality Detection from X-Ray using Deep Learning
IRJET- Chest Abnormality Detection from X-Ray using Deep LearningIRJET Journal
 
Face Recognition Methods based on Convolutional Neural Networks
Face Recognition Methods based on Convolutional Neural NetworksFace Recognition Methods based on Convolutional Neural Networks
Face Recognition Methods based on Convolutional Neural NetworksElaheh Rashedi
 
IRJET- Anomaly Detection System in CCTV Derived Videos
IRJET- Anomaly Detection System in CCTV Derived VideosIRJET- Anomaly Detection System in CCTV Derived Videos
IRJET- Anomaly Detection System in CCTV Derived VideosIRJET Journal
 
Real Time Implementation Of Face Recognition System
Real Time Implementation Of Face Recognition SystemReal Time Implementation Of Face Recognition System
Real Time Implementation Of Face Recognition SystemIJERA Editor
 
Framework for Contextual Outlier Identification using Multivariate Analysis a...
Framework for Contextual Outlier Identification using Multivariate Analysis a...Framework for Contextual Outlier Identification using Multivariate Analysis a...
Framework for Contextual Outlier Identification using Multivariate Analysis a...IJECEIAES
 
IRJET- Chest Abnormality Detection from X-Ray using Deep Learning
IRJET- Chest Abnormality Detection from X-Ray using Deep LearningIRJET- Chest Abnormality Detection from X-Ray using Deep Learning
IRJET- Chest Abnormality Detection from X-Ray using Deep LearningIRJET Journal
 
Criminal Identification using Arm7
Criminal Identification using Arm7Criminal Identification using Arm7
Criminal Identification using Arm7IRJET Journal
 
Paper id 24201475
Paper id 24201475Paper id 24201475
Paper id 24201475IJRAT
 

Was ist angesagt? (20)

A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
 
Vehicle Monitoring System based On IOT, Using 4G/LTE
Vehicle Monitoring System based On IOT, Using 4G/LTEVehicle Monitoring System based On IOT, Using 4G/LTE
Vehicle Monitoring System based On IOT, Using 4G/LTE
 
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEYFEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEY
 
IRJET- Spot Me - A Smart Attendance System based on Face Recognition
IRJET- Spot Me - A Smart Attendance System based on Face RecognitionIRJET- Spot Me - A Smart Attendance System based on Face Recognition
IRJET- Spot Me - A Smart Attendance System based on Face Recognition
 
Gender Classification using SVM With Flask
Gender Classification using SVM With FlaskGender Classification using SVM With Flask
Gender Classification using SVM With Flask
 
Development of durian leaf disease detection on Android device
Development of durian leaf disease detection on Android device Development of durian leaf disease detection on Android device
Development of durian leaf disease detection on Android device
 
A Robust & Fast Face Detection System
A Robust & Fast Face Detection SystemA Robust & Fast Face Detection System
A Robust & Fast Face Detection System
 
TOP 5 Most View Article From Academia in 2019
TOP 5 Most View Article From Academia in 2019TOP 5 Most View Article From Academia in 2019
TOP 5 Most View Article From Academia in 2019
 
Face mask detection
Face mask detection Face mask detection
Face mask detection
 
IRJET- Chest Abnormality Detection from X-Ray using Deep Learning
IRJET- Chest Abnormality Detection from X-Ray using Deep LearningIRJET- Chest Abnormality Detection from X-Ray using Deep Learning
IRJET- Chest Abnormality Detection from X-Ray using Deep Learning
 
Face Recognition Methods based on Convolutional Neural Networks
Face Recognition Methods based on Convolutional Neural NetworksFace Recognition Methods based on Convolutional Neural Networks
Face Recognition Methods based on Convolutional Neural Networks
 
IRJET- Anomaly Detection System in CCTV Derived Videos
IRJET- Anomaly Detection System in CCTV Derived VideosIRJET- Anomaly Detection System in CCTV Derived Videos
IRJET- Anomaly Detection System in CCTV Derived Videos
 
Ieee pub
Ieee pubIeee pub
Ieee pub
 
Kv3518641870
Kv3518641870Kv3518641870
Kv3518641870
 
Real Time Implementation Of Face Recognition System
Real Time Implementation Of Face Recognition SystemReal Time Implementation Of Face Recognition System
Real Time Implementation Of Face Recognition System
 
Framework for Contextual Outlier Identification using Multivariate Analysis a...
Framework for Contextual Outlier Identification using Multivariate Analysis a...Framework for Contextual Outlier Identification using Multivariate Analysis a...
Framework for Contextual Outlier Identification using Multivariate Analysis a...
 
IRJET- Chest Abnormality Detection from X-Ray using Deep Learning
IRJET- Chest Abnormality Detection from X-Ray using Deep LearningIRJET- Chest Abnormality Detection from X-Ray using Deep Learning
IRJET- Chest Abnormality Detection from X-Ray using Deep Learning
 
Criminal Identification using Arm7
Criminal Identification using Arm7Criminal Identification using Arm7
Criminal Identification using Arm7
 
Paper id 24201475
Paper id 24201475Paper id 24201475
Paper id 24201475
 
(2007) Performance Analysis for Multi Sensor Fingerprint Recognition System
(2007) Performance Analysis for Multi Sensor Fingerprint Recognition System(2007) Performance Analysis for Multi Sensor Fingerprint Recognition System
(2007) Performance Analysis for Multi Sensor Fingerprint Recognition System
 

Andere mochten auch (14)

L_3011_62.+1908
L_3011_62.+1908L_3011_62.+1908
L_3011_62.+1908
 
Cpsp forecasting 1
Cpsp forecasting 1Cpsp forecasting 1
Cpsp forecasting 1
 
5 normas
5 normas5 normas
5 normas
 
Eventos
EventosEventos
Eventos
 
DB
DBDB
DB
 
Map tecnologia-educativa
Map tecnologia-educativaMap tecnologia-educativa
Map tecnologia-educativa
 
juan david y emily
juan david y emilyjuan david y emily
juan david y emily
 
Affordable malaysia singapore study tours
Affordable malaysia singapore study toursAffordable malaysia singapore study tours
Affordable malaysia singapore study tours
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
Portadores de texto e atividades
Portadores de texto e atividadesPortadores de texto e atividades
Portadores de texto e atividades
 
Ermeni Sorunu ve Gerçekler
Ermeni Sorunu ve GerçeklerErmeni Sorunu ve Gerçekler
Ermeni Sorunu ve Gerçekler
 
Road to Cannabis Law Reform
Road to Cannabis Law ReformRoad to Cannabis Law Reform
Road to Cannabis Law Reform
 
E017443136
E017443136E017443136
E017443136
 
Power System Revolution
Power System RevolutionPower System Revolution
Power System Revolution
 

Ähnlich wie Ijarcce 27

Dissertation final report
Dissertation final reportDissertation final report
Dissertation final reportSmriti Tikoo
 
Age and Gender Classification using Convolutional Neural Network
Age and Gender Classification using Convolutional Neural NetworkAge and Gender Classification using Convolutional Neural Network
Age and Gender Classification using Convolutional Neural NetworkIRJET Journal
 
Smriti's research paper
Smriti's research paperSmriti's research paper
Smriti's research paperSmriti Tikoo
 
Person identification based on facial biometrics in different lighting condit...
Person identification based on facial biometrics in different lighting condit...Person identification based on facial biometrics in different lighting condit...
Person identification based on facial biometrics in different lighting condit...IJECEIAES
 
Social distance and face mask detector system exploiting transfer learning
Social distance and face mask detector system exploiting  transfer learningSocial distance and face mask detector system exploiting  transfer learning
Social distance and face mask detector system exploiting transfer learningIJECEIAES
 
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...ijbuiiir1
 
Face and liveness detection with criminal identification using machine learni...
Face and liveness detection with criminal identification using machine learni...Face and liveness detection with criminal identification using machine learni...
Face and liveness detection with criminal identification using machine learni...IAESIJAI
 
Crime Detection using Machine Learning
Crime Detection using Machine LearningCrime Detection using Machine Learning
Crime Detection using Machine LearningIRJET Journal
 
76 s201920
76 s20192076 s201920
76 s201920IJRAT
 
Face Mask Detection And Attendance System
Face Mask Detection And Attendance SystemFace Mask Detection And Attendance System
Face Mask Detection And Attendance SystemDarsh Jain
 
Prediction of Age by utilising Image Dataset utilising Machine Learning
Prediction of Age by utilising Image Dataset utilising Machine LearningPrediction of Age by utilising Image Dataset utilising Machine Learning
Prediction of Age by utilising Image Dataset utilising Machine LearningIRJET Journal
 
Covid Mask Detection and Social Distancing Using Raspberry pi
Covid Mask Detection and Social Distancing Using Raspberry piCovid Mask Detection and Social Distancing Using Raspberry pi
Covid Mask Detection and Social Distancing Using Raspberry piIRJET Journal
 
Review on Arduino-Based Face Mask Detection System
Review on Arduino-Based Face Mask Detection SystemReview on Arduino-Based Face Mask Detection System
Review on Arduino-Based Face Mask Detection SystemIRJET Journal
 
Face recognition system
Face recognition systemFace recognition system
Face recognition systemYogesh Lamture
 
SMSECURITY: SECURITY SYSTEM AND SMS NOTIFICATION CUM FACE RECOGNITION
SMSECURITY: SECURITY SYSTEM AND SMS NOTIFICATION CUM FACE RECOGNITIONSMSECURITY: SECURITY SYSTEM AND SMS NOTIFICATION CUM FACE RECOGNITION
SMSECURITY: SECURITY SYSTEM AND SMS NOTIFICATION CUM FACE RECOGNITIONijcsit
 
Age and Gender Prediction and Human count
Age and Gender Prediction and Human countAge and Gender Prediction and Human count
Age and Gender Prediction and Human countIRJET Journal
 
Designing of Application for Detection of Face Mask and Social Distancing Dur...
Designing of Application for Detection of Face Mask and Social Distancing Dur...Designing of Application for Detection of Face Mask and Social Distancing Dur...
Designing of Application for Detection of Face Mask and Social Distancing Dur...IRJET Journal
 
NEW CORONA VIRUS DISEASE 2022: SOCIAL DISTANCING IS AN EFFECTIVE MEASURE (COV...
NEW CORONA VIRUS DISEASE 2022: SOCIAL DISTANCING IS AN EFFECTIVE MEASURE (COV...NEW CORONA VIRUS DISEASE 2022: SOCIAL DISTANCING IS AN EFFECTIVE MEASURE (COV...
NEW CORONA VIRUS DISEASE 2022: SOCIAL DISTANCING IS AN EFFECTIVE MEASURE (COV...IRJET Journal
 

Ähnlich wie Ijarcce 27 (20)

Dissertation final report
Dissertation final reportDissertation final report
Dissertation final report
 
Age and Gender Classification using Convolutional Neural Network
Age and Gender Classification using Convolutional Neural NetworkAge and Gender Classification using Convolutional Neural Network
Age and Gender Classification using Convolutional Neural Network
 
Smriti's research paper
Smriti's research paperSmriti's research paper
Smriti's research paper
 
Person identification based on facial biometrics in different lighting condit...
Person identification based on facial biometrics in different lighting condit...Person identification based on facial biometrics in different lighting condit...
Person identification based on facial biometrics in different lighting condit...
 
Social distance and face mask detector system exploiting transfer learning
Social distance and face mask detector system exploiting  transfer learningSocial distance and face mask detector system exploiting  transfer learning
Social distance and face mask detector system exploiting transfer learning
 
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
 
Face and liveness detection with criminal identification using machine learni...
Face and liveness detection with criminal identification using machine learni...Face and liveness detection with criminal identification using machine learni...
Face and liveness detection with criminal identification using machine learni...
 
Paper of Final Year Project.pdf
Paper of Final Year Project.pdfPaper of Final Year Project.pdf
Paper of Final Year Project.pdf
 
Crime Detection using Machine Learning
Crime Detection using Machine LearningCrime Detection using Machine Learning
Crime Detection using Machine Learning
 
76 s201920
76 s20192076 s201920
76 s201920
 
Face Mask Detection And Attendance System
Face Mask Detection And Attendance SystemFace Mask Detection And Attendance System
Face Mask Detection And Attendance System
 
Prediction of Age by utilising Image Dataset utilising Machine Learning
Prediction of Age by utilising Image Dataset utilising Machine LearningPrediction of Age by utilising Image Dataset utilising Machine Learning
Prediction of Age by utilising Image Dataset utilising Machine Learning
 
Covid Mask Detection and Social Distancing Using Raspberry pi
Covid Mask Detection and Social Distancing Using Raspberry piCovid Mask Detection and Social Distancing Using Raspberry pi
Covid Mask Detection and Social Distancing Using Raspberry pi
 
Review on Arduino-Based Face Mask Detection System
Review on Arduino-Based Face Mask Detection SystemReview on Arduino-Based Face Mask Detection System
Review on Arduino-Based Face Mask Detection System
 
184
184184
184
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
 
SMSECURITY: SECURITY SYSTEM AND SMS NOTIFICATION CUM FACE RECOGNITION
SMSECURITY: SECURITY SYSTEM AND SMS NOTIFICATION CUM FACE RECOGNITIONSMSECURITY: SECURITY SYSTEM AND SMS NOTIFICATION CUM FACE RECOGNITION
SMSECURITY: SECURITY SYSTEM AND SMS NOTIFICATION CUM FACE RECOGNITION
 
Age and Gender Prediction and Human count
Age and Gender Prediction and Human countAge and Gender Prediction and Human count
Age and Gender Prediction and Human count
 
Designing of Application for Detection of Face Mask and Social Distancing Dur...
Designing of Application for Detection of Face Mask and Social Distancing Dur...Designing of Application for Detection of Face Mask and Social Distancing Dur...
Designing of Application for Detection of Face Mask and Social Distancing Dur...
 
NEW CORONA VIRUS DISEASE 2022: SOCIAL DISTANCING IS AN EFFECTIVE MEASURE (COV...
NEW CORONA VIRUS DISEASE 2022: SOCIAL DISTANCING IS AN EFFECTIVE MEASURE (COV...NEW CORONA VIRUS DISEASE 2022: SOCIAL DISTANCING IS AN EFFECTIVE MEASURE (COV...
NEW CORONA VIRUS DISEASE 2022: SOCIAL DISTANCING IS AN EFFECTIVE MEASURE (COV...
 

Mehr von Smriti Tikoo

A detailed study on fraud analysis of international trade on ecpommerce platf...
A detailed study on fraud analysis of international trade on ecpommerce platf...A detailed study on fraud analysis of international trade on ecpommerce platf...
A detailed study on fraud analysis of international trade on ecpommerce platf...Smriti Tikoo
 
Minor projct(Broadband )
Minor projct(Broadband )Minor projct(Broadband )
Minor projct(Broadband )Smriti Tikoo
 
Detection and recognition of face using neural network
Detection and recognition of face using neural networkDetection and recognition of face using neural network
Detection and recognition of face using neural networkSmriti Tikoo
 
Video conferencing services
Video conferencing servicesVideo conferencing services
Video conferencing servicesSmriti Tikoo
 
Features of tms_320_2nd_generation_dsp
Features of tms_320_2nd_generation_dspFeatures of tms_320_2nd_generation_dsp
Features of tms_320_2nd_generation_dspSmriti Tikoo
 
Does one a reason to celebrate
Does one a reason to celebrateDoes one a reason to celebrate
Does one a reason to celebrateSmriti Tikoo
 
Does one a reason to celebrate
Does one a reason to celebrateDoes one a reason to celebrate
Does one a reason to celebrateSmriti Tikoo
 
Embracing the singlehood
Embracing the singlehoodEmbracing the singlehood
Embracing the singlehoodSmriti Tikoo
 
Affect of the american sitcoms on the youth of today
Affect of the american sitcoms on the youth of todayAffect of the american sitcoms on the youth of today
Affect of the american sitcoms on the youth of todaySmriti Tikoo
 
Broadband Powerline Communication
Broadband Powerline CommunicationBroadband Powerline Communication
Broadband Powerline CommunicationSmriti Tikoo
 

Mehr von Smriti Tikoo (16)

A detailed study on fraud analysis of international trade on ecpommerce platf...
A detailed study on fraud analysis of international trade on ecpommerce platf...A detailed study on fraud analysis of international trade on ecpommerce platf...
A detailed study on fraud analysis of international trade on ecpommerce platf...
 
Fraud analysis
Fraud analysisFraud analysis
Fraud analysis
 
Minor projct(Broadband )
Minor projct(Broadband )Minor projct(Broadband )
Minor projct(Broadband )
 
Detection and recognition of face using neural network
Detection and recognition of face using neural networkDetection and recognition of face using neural network
Detection and recognition of face using neural network
 
Smriti
SmritiSmriti
Smriti
 
Video conferencing services
Video conferencing servicesVideo conferencing services
Video conferencing services
 
Bgp protocol
Bgp protocolBgp protocol
Bgp protocol
 
Features of tms_320_2nd_generation_dsp
Features of tms_320_2nd_generation_dspFeatures of tms_320_2nd_generation_dsp
Features of tms_320_2nd_generation_dsp
 
Internship report
Internship reportInternship report
Internship report
 
Does one a reason to celebrate
Does one a reason to celebrateDoes one a reason to celebrate
Does one a reason to celebrate
 
Does one a reason to celebrate
Does one a reason to celebrateDoes one a reason to celebrate
Does one a reason to celebrate
 
Embracing the singlehood
Embracing the singlehoodEmbracing the singlehood
Embracing the singlehood
 
Affect of the american sitcoms on the youth of today
Affect of the american sitcoms on the youth of todayAffect of the american sitcoms on the youth of today
Affect of the american sitcoms on the youth of today
 
face detection
face detectionface detection
face detection
 
GSM WHITE SPACES
GSM WHITE SPACESGSM WHITE SPACES
GSM WHITE SPACES
 
Broadband Powerline Communication
Broadband Powerline CommunicationBroadband Powerline Communication
Broadband Powerline Communication
 

Kürzlich hochgeladen

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

Ijarcce 27

  • 1. IJARCCE ISSN (Online) 2278-1021 ISSN (Print) 2319 5940 International Journal of Advanced Research in Computer and Communication Engineering Vol. 5, Issue 6, June 2016 Copyright to IJARCCE DOI 10.17148/IJARCCE.2016.5627 130 Detection, Segmentation and Recognition of Face and its Features using Neural Network Smriti Tikoo1 , Nitin Malik2 Research Scholar, Department of EECE, The NorthCap University, Gurgaon, India1 Associate Professor, Department of EECE, The Northcap University, Gurgaon, India2 Abstract: Face detection and recognition has been prevalent with research scholars and diverse approaches have been incorporated till date to serve purpose. The rampant advent of biometric analysis systems, which may be full body scanners, or iris detection and recognition systems and the finger print recognition systems, and surveillance systems deployed for safety and security purposes have contributed to inclination towards same. Advances has been made with frontal view, lateral view of the face or using facial expressions such as anger, happiness and gloominess, still images and video image to be used for detection and recognition. This led to newer methods for face detection and recognition to be introduced in achieving accurate results and economically feasible and extremely secure. Techniques such as Principal Component analysis (PCA), Independent component analysis (ICA), Linear Discriminant Analysis (LDA), have been the predominant ones to be used. But with improvements needed in the previous approaches Neural Net- works based recognition was like boon to the industry. It not only enhanced the recognition but also the efficiency of the process. Choosing Backpropagation as the learning method was clearly out of its efficiency to recognize non linear faces with an acceptance ratio of more than 90% and execution time of only few seconds. Keywords: Face detection, Biometric analysis, Recognition, Backpropagation, Neural Networks. INTRODUCTION Automatic recognition dates back to the years of 1960’s when pioneers such as Woody Bledsoe, Helen Chan Wolf, and Charles Bisson introduced their works to the world. In 1964 & 1965, Bledsoe, along with Helen Chan and Charles Bisson had worked on the computer to rec- ognize human faces. But it didn’t allow much recognition to his work due to not much support from agencies. After him the work was carried forward by Peter Hart at the Stanford Research Institute. The results given by com- puter were terrific when feeded with a gallery of images for recognition. In around 1997, another approach by Christoph von der Malsburg and students of lot of reputed universities got together to design a system which was even better than the previous one. The system designed was robust and could identify people from photographs which didn’t offer a clear view of the facial images .After that technologies like Polar and FaceIt were introduced which were doing the work in lesser time and gave accurate results by offer- ing features like a 3D view of the picture and comparing it to a database from worldwide. Till the year 2006 a lot of new algorithm replaced the previous ones and were prov- ing to be better in terms of offering various new tech- niques to get better results and their performance was commendable. Automatic Recognition has seen a lot of improvement since 1993, the error rate has dropped down & enhance- ment methods to improve the resolution have hit the mar- ket. Ever since then biometric authentication is all over the place, these days ranging from home security systems, surveillance cameras, to fingerprint and iris authentication systems, user verification and etc. These systems have contributed in catching terrorists and other type of intruders via cyber or in person. Recognition of faces has been under a research since 1960’s but it’s just over a decade that acceptable results have been ob- tained. Approaches deployed do not count the intricate details which differ from person to person in context of recognition results. The continuous changes in expression of face depending upon the situation being experienced by person disclose important information regarding the struc- tural characteristics and the texture, thereby helping in recognition process. Of the many methods adopted towards recognition of face they can be broadly classified as a) holistic approach which relies of taking the whole face as an input in pixels and b) feature extraction which concentrates on capturing the features in a face but certain methods are deployed for removing the redundancy information and dimension problems involved. Three basic approaches in this direction are namely PCA, LDA, ICA others which were added to the list include the neural network, fuzzy and skin and texture based ap- proaches also including the ASM model. The problem is approached first by detecting the face and its features and then moving on to recognition. A lot approaches are avail- able for detection of faces like Viola Jones algorithm, LBP, Adaboost algorithm, neural network based detection or usage of Snow classifier method .
  • 2. IJARCCE ISSN (Online) 2278-1021 ISSN (Print) 2319 5940 International Journal of Advanced Research in Computer and Communication Engineering Vol. 5, Issue 6, June 2016 Copyright to IJARCCE DOI 10.17148/IJARCCE.2016.5627 131 Figure 1: Face detection process Figure 2: A generalized face recognition procedure PROBLEM DESCRIPTION: The onset of biometric authentication dates back to 1960’s but has seen a boost in the recent years due to constant threat to security from intruders via cyber or via crevices of the inhabited areas of country. It has found usage in security systems installed in homes, retina scans, hand scans, facial scans for verifications at airports or organiza- tions or malls which are frequently visited areas by people of different races and culture. These systems tend to offer a sense of reliability, accountability and security from the threat at doorstep. It manages to safe guard people’s inter- ests and keeps the threats at bay as much as possible. This has brought the human computer interaction to a higher level, where computer are trying to imitate the functions performed by brain with the help of sensory organs. These tasks are performed with ease by our brains due to net- working of neuron structure built in our brain in way a mechanism evolved to cope up with responding appro- priately via motor and coordination skills. Such systems are mastered using various available approaches which make use of image processing and open source computer vision in such a way that have boosted the business for detection and recognition systems. In this paper we pro- pose a similar approach to detect and recognize a facial image and its features using a BPNN with help of Matlab. In the Matlab we have worked under the neural network, using its tools to train and process the image for obtaining the performance and regression plots. BACKPROPAGATION: Also called as "backward propagation of errors", is a popular method of train- ing MLP artificial neural networks in conjunction with an optimization method. Gradient of loss function is calcu- lated with respect to the associated weights. Optimization method is fed with the gradient which alters the weights used to reduce the loss function. This algorithm works on the supervised learning rule i.e. requires a known, desired output for each input value in order to calculate the loss function gradient. It makes use of sigmoid function as its activation usually. The algorithm can be split two phases: Phase 1: Propagation: Forward propagation: Input is fed through the network to generate propagation's output activations. Backward propagation: A feedback network is formed by feeding the output as input in order to generate a differ- ence between actual and the target outputs. Phase 2: Weight update: Gradient of weight is a product of difference of outputs and input activation. Subtract a ratio (percentage) of the gradient from the weight. Ratio or the learning rate affects the speed and the quality of learning. Greater the ratio the neurons are trained quick- ly but accuracy is assured with a lower ratio. If weight updation increases in positive side the error shall increase. Repeat the steps to attain satisfactory results. NEURAL NETWORK: Defines a family of algorithms via a multiple layers of interconnected inspired from the neuron structure in the brain. Here each circular node represents an artificial neuron and an arrow represents the connection from the output of one neuron to the input of another. These networks are designed for approximating functions for huge amount of inputs generally unknown. The nodes in neural network exchange data between one another. The connections between the nodes have numer- ic’s weights associated which are altered to attain an out- put matching the target output in ace of supervised learn- ing or making neural nets adaptive to inputs and capable of learning.
  • 3. IJARCCE ISSN (Online) 2278-1021 ISSN (Print) 2319 5940 International Journal of Advanced Research in Computer and Communication Engineering Vol. 5, Issue 6, June 2016 Copyright to IJARCCE DOI 10.17148/IJARCCE.2016.5627 132 On the basis of the following criteria a network can be classified as neural: if it has set of adaptive weights and is capable of approximating nonlinear functions of their in- puts. The adaptive weights can be thought of as connec tion strengths between neurons which are activated during training and predictions FACE DETECTION ALGORITHM: Proposed by Paul Viola and Michael Jones, it proves to be a one of its kind by providing competitive results for real time situations .It not only aces the process of detecting frontal faces but can also be modeled for detecting variety of other object classes. It’s robust nature and its adaptability for practical situation makes its popular among its users. It follows a four stage procedure for the entire face detection which is : first is Haar feature selection, then comes the integral im- age creation followed by adaboost training and cascading of amplifiers. Haar Feature selection matches the commonalities found in human faces. The integral image calculates the rectan- gular features in fixed time which benefits it over other sophisticated features. Integral image at (x, y) coordinates gives the pixel sum of the coordinates above and on to the left of the (x,y).Ada boost training algorithm boost the performance of cascading amplifiers by training them ap- propriately so as to form a strong classifier. The strong classifiers are arranged in a cascade in order of complexi- ty, where each successive classifier is trained only on those selected samples which pass through the preceding classifiers. If at any stage in the cascade a classifier rejects the sub-window under inspection, no further processing is performed and continue on searching the next sub- window. The cascade therefore has the form of a degene- rate tree. In the case of faces, the first classifier in the cas- cade – called the attentional operator – uses only two fea- tures to achieve a false negative rate of approximately 0% and a false positive rate of 40%. The effect of this single classifier is to reduce by roughly half the number of times the entire cascade is evaluated. In cascading, each stage consists of a strong classifier. So all the features are grouped into several stages where each stage has certain number of features. The job of each stage is to determine whether a given sub-window is definitely not a face or may be a face. A given sub-window is imme- diately discarded as not a face if it fails in any of the stage. VISION CASCADE OBJECT DETECTOR: Detect objects using the Viola-Jones algorithm The cascade ob- ject detector uses the Viola-Jones algorithm to detect people's faces, noses, eyes, mouth, or upper body. One can also use the Training Image Labeler to train a custom clas- sifier to use with this System object. COMPUTER VISION TOOLS: provides algorithms, functions, and apps for designing and simulating computer vision and video processing systems. You can perform feature detection, extraction, and matching; object detec tion and tracking; motion estimation; and video processing. For 3-D computer vision, the system toolbox supports camera calibration, stereo vision, 3-D reconstruc- tion, and 3-D point cloud processing. With machine learn- ing based frameworks, you can train object detection, ob- ject recognition, and image retrieval systems. Algorithms are available as MATLAB functions, System objects, and Simulink blocks. For rapid prototyping and embedded system design, the system toolbox supports fixed-point arithmetic and C-code generation. PROPOSED METHODOLOGY 1. Detection of face and its major features. 2. Capturing Images to be recognized in rgb, gray and binary format. 3. Compute histogram for the same. 4. Carry out the segmentation process of the images in rgb format . 5. Compute the histogram for them . 6. Compute histogram data into neural network fitting tool 7. Obtain the performance and regression plots for the same RESULTS AND DISCUSSION After detecting faces and its features we move on the task of recognition using the Neural Network training for rec- ognition to be completed. Here I am using different faces to show the procedure of face recognition one can contin- ue with the same. So first we read the image convert to grayscale or binary as we will be making use of their equivalent histogram for feeding the data in the neural network. After opening the nft tool we choose the data to be trained for recognition procedure. That data is usually imported from an excel book. After importing the data neural network tool starts the training, It carries out training in 3 states that is training validation and testing. Where in the training stage the net- work is adjusted as per the error generated during it. Dur- ing the validation network generalization is monitored and is used to halt the training. In testing the final solution is tested to confirm the predic- tive power of the network. Usually a lot of training ses- sions are conducted to enhance the performance of net- work and lower the mean squared error value which is the average squared difference between output and target. We have used feed forward networks under the supervised learning architecture of neural network tool box to com- pute our data , in which one way connections operate and no feedback mechanism is included. In testing the final solution was obtained by carrying out the training session for 5-10 times in order to achieve better outcomes .Mean squared error was the parameter chosen to asses the net- work’s execution so far. Lower values for mean squared were obtained for the same. Thus with results one can conclude to have recognized the given image .The accura- cy of this network is 85% approx.
  • 4. IJARCCE ISSN (Online) 2278-1021 ISSN (Print) 2319 5940 International Journal of Advanced Research in Computer and Communication Engineering Vol. 5, Issue 6, June 2016 Copyright to IJARCCE DOI 10.17148/IJARCCE.2016.5627 133 Figure 1: Detection of face and its features followed by the segmentation process. Figure2:The three format of sample image rgb, gray and binary Figure3: Computation of histogram equivalent for the gray scale of the sample image. Figure4: Computation of binary histogram equivalent Face Detection Mouth Detection Nose Detection 0 100 200 300 400 500 600 700 800 0 50 100 150 200 250 0 1 2 3 4 5 6 x 10 4 0 1
  • 5. IJARCCE ISSN (Online) 2278-1021 ISSN (Print) 2319 5940 International Journal of Advanced Research in Computer and Communication Engineering Vol. 5, Issue 6, June 2016 Copyright to IJARCCE DOI 10.17148/IJARCCE.2016.5627 134 Figure5: Performance plot for grayscale image Figure 6: Regression plot for grayscale image Figure 7: Performance plot for binary image 0 1 2 3 4 5 6 10 -25 10 -20 10 -15 10 -10 10 -5 10 0 10 5 Best Validation Performance is 1.8856e-27 at epoch 6 MeanSquaredError(mse) 6 Epochs Train Validation Test Best -100 0 100 200 300 400 -100 0 100 200 300 400 Target Output~=1*Target+2.7e-14 Training: R=1 Data Fit Y = T -100 0 100 200 300 400 -100 0 100 200 300 400 Target Output~=0*Target+7.5e-15 Validation: R=0 Data Fit Y = T 0 200 400 600 -100 0 100 200 300 400 500 600 Target Output~=0.41*Target+9.5 Test: R=0.46543 Data Fit Y = T 0 200 400 600 -100 0 100 200 300 400 500 600 Target Output~=0.48*Target+11 All: R=0.70111 Data Fit Y = T 0 1 2 3 4 5 6 7 10 -20 10 -15 10 -10 10 -5 10 0 10 5 10 10 Best Training Performance is 0 at epoch 7 MeanSquaredError(mse) 7 Epochs Train Best
  • 6. IJARCCE ISSN (Online) 2278-1021 ISSN (Print) 2319 5940 International Journal of Advanced Research in Computer and Communication Engineering Vol. 5, Issue 6, June 2016 Copyright to IJARCCE DOI 10.17148/IJARCCE.2016.5627 135 Figure 8: Regression plot for binary image CONCLUSION In this work it has been shown that if a facial image of a person is given then the network can able to recognize the face of the person. The whole work is completed through the following steps: Facial image of a person has been collected by taking three different samples of the person for the experiment. Each image is divided into two equal parts to show the process of segmentation. Feed Forward Back Propagation neural network have been used to train, test and validate the net-work for each part of the image using MATLAB. The histogram equivalent of binary and gray images have been computed as the data to check for the recognition process using performance plot, regression plot as means of parameters to check the performance. Training of each sample is performed up to 3-4 times to minimize the error and changing the number of neurons in the hidden layer accordingly to obtain a better result. Fa- cial image without dividing into parts have also been ap- plied in the network. REFERENCES [1] H.A. Rowley, S. Baluja, and T. Kanade, “Neural network - based face detection,” IEEE Trans. Pattern Analysis and Machine Intelli- gence, vol. 20, no. 1, pp. 23–38, Jan. 1998. [2] H.A.Rowley, S. Baluja, and T. Kanade, “Rotation invariant neural net-workbased face detection,” Proc. IEEE Int’l Conf. Computer Vision and Pattern Recognition, pp. 38–44, 1998. [3] K.K Sung and T. Poggio, “Example-based learning for view-based human face detection,” IEEE Trans. Pattern Analysis and Machine Intelli-gence, vol. 20, no. 1, pp. 39–51, Jan. 1998. [4] H. Schneiderman and T. Kanade, “A statistical method for 3D object detection applied to faces and cars,” Proc. IEEE Int’l Conf. Computer Vision and Pattern Recognition, pp. 746–751, June 2000. [5] K.C. Yow and R. Cipolla, “Feature-based human face detection,” Image and Vision Computing, vol. 25, no. 9, pp. 713–735, Sept. 1997. [6] D. Maio and D. Maltoni, “Real-time face location on gray-scale static images,” Pattern Recognition, vol. 33, no. 9, pp. 1525–1539, Sept. 2000. [7] M.S. Lew and N. Huijsmans, “Information theory and face detec- tion,” Proc.IEEE Int’l Conf. Pattern Recognition, pp. 601- 605, Aug. 1996. [8] S.C. Dass and A.K. Jain, “Markov face models,” Proc. IEEE Int’l Conf.Computer Vision, pp. 680–687, July 2001. [9] A.J. Colmenarez and T.S. Huang, “Face detection with information based maximum discrimination,” Proc. IEEE Int’l Conf. Computer Vision and Pattern Recognition, pp. 782–787, June 1997. [10] D. DeCarlo and D. Metaxas, “Optical flow constraints on deforma- ble models with applications to face tracking,” International Journal Computer Vision, vol. 38, no. 2, pp. 99–127, July 2000. [11] V. Bakic and G. Stockman, “Menu selection by facial aspect,” Proc. Vision Interface, Canada, pp. 203–209, May 1999. [12] A. Colmenarez, B. Frey, and T. Huang, “Detection and tracking of faces and facial features,” Proc. IEEE Int’l Conf. Image Processing, pp. 657–661, Oct. 1999. [13] R. F´eraud, O.J. Bernier, J.-E. Viallet, and M. Collobert, “A fast and accurate face detection based on neural network,” IEEE Trans. Pat- tern Analysis and Machine Intelligence, vol. 23. [14] W.Zhao, R.Chellappa, P.J..Phillips and A. Rosennfeld, “Face Reco- ni-tion: A literature Survey”. ACM Comput.Surv., 35(4): 399-458, 2003. [15] M.A.Turk and A.P. Pentaland, “Face Recognition Using Eigenfac- es”, IEEE conf. on Computer Vision and Pattern Recognition, pp. 586-591, 1991. [16] Ling-Zhi Liao, Si-Wei Luo, and Mei Tian “”Whitenedfaces” Re- cogni-tion With PCA and ICA” IEEE Signal Processing Letters, Vol. 14, No. 12, pp1008-1011, Dec. 2007. [17] G. Jarillo, W.Pedrycz , M. Reformat “Aggregation of classifiers based on image transformations in biometric face recognition” Ma- chine Vision and Applications (2008) Vol . 19,pp. 125-140, Sprin- ger-Verlag 2007. [18] Tej Pal Singh, “Face Recognition by using Feed Forward Back Propagation Neural Network”, International Journal of Innovative Research in Technology & Science, vol.1, no.1. [19] N.Revathy, T.Guhan, “Face recognition system using back propa- gation artificial neural networks”, International Journal of Ad- vanced Engineering Technology, vol.3, no. 1, 2012. 1 2 3 4 5 6 7 8 9 10 11 x 10 5 1 2 3 4 5 6 7 8 9 10 11 x 10 5 Target Output~=1*Target+-4.7e-11 Training: R=1 Data Fit Y = T
  • 7. IJARCCE ISSN (Online) 2278-1021 ISSN (Print) 2319 5940 International Journal of Advanced Research in Computer and Communication Engineering Vol. 5, Issue 6, June 2016 Copyright to IJARCCE DOI 10.17148/IJARCCE.2016.5627 136 [20] Kwan-Ho Lin, Kin-Man Lam, and Wan-Chi Siu. “A New Approach using ModiGied Hausdorff Distances with EigenFace for Human Face Recognition” IEEE Seventh international Conference on Con- trol, Automation, Robotics and Vision , Singapore, 2-5 Dec 2002,pp 980-984. [21] Zdravko Liposcak, , Sven Loncaric, “Face Recognition From Pro- files Using Morphological Operations”, IEEE Conference on Rec- ognition, Analysis, and Tracking of Faces and Gestures in Real- Time Systems, 1999. [22] Simone Ceolin , William A.P Smith, Edwin Hancock, “Facial Shape Spaces from Surface Normals and Geodesic Distance”, Digi- tal Image Computing Techniques and Applications, 9th Biennial Conference of Australian Pattern Recognition Society IEEE 3-5 Dec.,2007 ,Glenelg, pp-416-423. [23] Ki-Chung Chung , Seok Cheol Kee ,and Sang Ryong Kim, “Face Recognition using Principal Component Analysis of Gabor Filter Responses” ,Recognition, Analysis, and Tracking of Faces and Ges- tures in Real-Time Systems, 1999,Proceedings. International Work- shop IEEE 26-27 September,1999, Corfu,pp-53-57. [24] Ms. Varsha Gupta, Mr. Dipesh Sharma, “A Study of Various Face Detection Methods”, International Journal of Advanced Research in Computer and Communication Engineering), vol.3, no. 5, May 2014. [25] Irene Kotsia, Iaonnis Pitas, “Facial expression recognition in image sequences using geometric deformation features and support vector machines”, IEEE transaction paper on image processing, vol. 16, no.1, pp-172-187, January 2007. [26] R.Rojas,”The back propagation algorithm”,Springer-Verlag, Neural networks, pp 149-182 1996. [27] Hosseien Lari-Najaffi , Mohammad Naseerudin and Tariq Sa- mad,”Effects of initial weights on back propagation and its varia- tions”, Systems, Man and Cybernetics ,Conference Proceedings, IEEE International Conference, 14-17 Nov ,1989,Cambridge, pp- 218-219. [28] M.H Ahmad Fadzil. , H.Abu Bakar., “Human face recognition using neural networks”, Image processing, 1994, Proceedings ICIP- 94, IEEE International Conference ,13-16 November, 1994, Austin ,pp-936-939. [29] N.K Sinha , M.M Gupta and D.H Rao, “Dynamic Neural Networks -an overview”, Industrial Technology 2000,Proceedings of IEEE International Conference,19-22 Jan,2000, pp-491-496.[30] Prachi Agarwal, Naveen Prakash, “An Efficient Back Propagation Neu- ralNetwork Based Face Recognition System Using Haar Wavelet Transform and PCA” International Journal of Computer Science and Mobile Computing, vol.2, no.5,pg.386 – 395,May 2013. [31]Dibber, 4 Jan 2005, “Backpropagation”, https://en.wikipedia.org/ wiki/Backpropagation, 20 September 2015. [32] “Artificial Neural Networks”, https://en.wikipedia.org/ wiki/ Artifi- cial_neural_network, accessed online 2 October 2001, [33] Michael Nielsen ,Jan 2016,“Neural networks and deep learning”, http://neuralnetworksanddeeplearning.com/chap2.html.[34] Tyrell turing, 7 April 2005, “Feed forward neural network”, https://en.wikipedia.org/wiki/Feedforward_neural_network.