CHAPTER 6 PERFORMANCE ANALYSIS OF SOFT COMPUTING BASED FACE RECOGNITION

Similar documents
CHAPTER 3 PRINCIPAL COMPONENT ANALYSIS AND FISHER LINEAR DISCRIMINANT ANALYSIS

IMPROVED FACE RECOGNITION USING ICP TECHNIQUES INCAMERA SURVEILLANCE SYSTEMS. Kirthiga, M.E-Communication system, PREC, Thanjavur

Digital Vision Face recognition

A FACE RECOGNITION SYSTEM BASED ON PRINCIPAL COMPONENT ANALYSIS USING BACK PROPAGATION NEURAL NETWORKS

Face Recognition & Detection Using Image Processing

Dr. Enrique Cabello Pardos July

Study of Face-Recognition Parameters and its finding using DSP Software

FACE RECOGNITION USING FUZZY NEURAL NETWORK

Dr. K. Nagabhushan Raju Professor, Dept. of Instrumentation Sri Krishnadevaraya University, Anantapuramu, Andhra Pradesh, India

Haresh D. Chande #, Zankhana H. Shah *

CHAPTER 2 LITERATURE REVIEW

Face recognition for enhanced security.

Applications Video Surveillance (On-line or off-line)

An Integrated Face Recognition Algorithm Based on Wavelet Subspace

A Survey on Feature Extraction Techniques for Palmprint Identification

Forensic Sketches matching

Face Recognition for Mobile Devices

CHAPTER 6 HYBRID AI BASED IMAGE CLASSIFICATION TECHNIQUES

Recognition of Non-symmetric Faces Using Principal Component Analysis

Machine Learning 13. week

Semi-Supervised PCA-based Face Recognition Using Self-Training

Face Recognition using Eigenfaces SMAI Course Project

Image Processing and Image Representations for Face Recognition

Face recognition based on improved BP neural network

6. Multimodal Biometrics

COSC160: Detection and Classification. Jeremy Bolton, PhD Assistant Teaching Professor

Range Imaging Through Triangulation. Range Imaging Through Triangulation. Range Imaging Through Triangulation. Range Imaging Through Triangulation

A Survey on Face-Sketch Matching Techniques

Spatial Frequency Domain Methods for Face and Iris Recognition

Non-Cooperative Biometrics. Patricia Wolfhope Program Manager Resilient Systems Division Science and Technology Directorate

Webpage: Volume 3, Issue VII, July 2015 ISSN

Fuzzy Segmentation. Chapter Introduction. 4.2 Unsupervised Clustering.

A Study on Different Challenges in Facial Recognition Methods

EE 589 INTRODUCTION TO ARTIFICIAL NETWORK REPORT OF THE TERM PROJECT REAL TIME ODOR RECOGNATION SYSTEM FATMA ÖZYURT SANCAR

Facial Expression Recognition Using Non-negative Matrix Factorization

A Matlab based Face Recognition GUI system Using Principal Component Analysis and Artificial Neural Network

Three-Dimensional Face Recognition: A Fishersurface Approach

Color Local Texture Features Based Face Recognition

FACE RECOGNITION USING INDEPENDENT COMPONENT

Face Recognition using Laplacianfaces

NeoFace Watch real-time face recognition How does it work? May 2018 Global Face Recognition Centre of Excellence NEC Europe

Component-based Face Recognition with 3D Morphable Models

CS6220: DATA MINING TECHNIQUES

A Study on the Neural Network Model for Finger Print Recognition

Linear Discriminant Analysis for 3D Face Recognition System

Illumination invariant face detection

Mobile Face Recognization

Su et al. Shape Descriptors - III

Image enhancement for face recognition using color segmentation and Edge detection algorithm

Abstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric;

CHAPTER 5 GLOBAL AND LOCAL FEATURES FOR FACE RECOGNITION

Face Recognition System Using PCA

Training Algorithms for Robust Face Recognition using a Template-matching Approach

Combining Gabor Features: Summing vs.voting in Human Face Recognition *

FACE RECOGNITION BASED ON GENDER USING A MODIFIED METHOD OF 2D-LINEAR DISCRIMINANT ANALYSIS

Image-Based Face Recognition using Global Features

HW2 due on Thursday. Face Recognition: Dimensionality Reduction. Biometrics CSE 190 Lecture 11. Perceptron Revisited: Linear Separators

Human Identification at a Distance Using Body Shape Information

Face detection and recognition. Detection Recognition Sally

Facial Expression Detection Using Implemented (PCA) Algorithm

FACE RECOGNITION USING SUPPORT VECTOR MACHINES

Breaking it Down: The World as Legos Benjamin Savage, Eric Chu

Finger Vein Biometric Approach for Personal Identification Using IRT Feature and Gabor Filter Implementation

An Efficient Back Propagation Neural Network Based Face Recognition System Using Haar Wavelet Transform and PCA

ROTATION INVARIANT SPARSE CODING AND PCA

An Introduction to Content Based Image Retrieval

CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS

Gender Classification

FACE DETECTION USING CURVELET TRANSFORM AND PCA

Cursive Handwriting Recognition System Using Feature Extraction and Artificial Neural Network

Face and Facial Expression Detection Using Viola-Jones and PCA Algorithm

Outline 7/2/201011/6/

A Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation

Face Detection Using Convolutional Neural Networks and Gabor Filters

CHAPTER 5 PALMPRINT RECOGNITION WITH ENHANCEMENT

Face recognition algorithms: performance evaluation

CMU Lecture 18: Deep learning and Vision: Convolutional neural networks. Teacher: Gianni A. Di Caro

5 Machine Learning Abstractions and Numerical Optimization

LOCAL APPEARANCE BASED FACE RECOGNITION USING DISCRETE COSINE TRANSFORM

Eigenfaces and Fisherfaces A comparison of face detection techniques. Abstract. Pradyumna Desale SCPD, NVIDIA

Expression Detection in Video. Abstract Expression detection is useful as a non-invasive method of lie detection and

PROBLEM FORMULATION AND RESEARCH METHODOLOGY

NIST. Support Vector Machines. Applied to Face Recognition U56 QC 100 NO A OS S. P. Jonathon Phillips. Gaithersburg, MD 20899

Mobile Human Detection Systems based on Sliding Windows Approach-A Review

AN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE

Human Detection and Tracking for Video Surveillance: A Cognitive Science Approach

Graph Matching Iris Image Blocks with Local Binary Pattern

Robust Face Recognition via Sparse Representation Authors: John Wright, Allen Y. Yang, Arvind Ganesh, S. Shankar Sastry, and Yi Ma

PCA and KPCA algorithms for Face Recognition A Survey

Neural Networks. CE-725: Statistical Pattern Recognition Sharif University of Technology Spring Soleymani

Disguised Face Identification (DFI) with Facial KeyPoints using Spatial Fusion Convolutional Network. Nathan Sun CIS601

Face Detection and Recognition in an Image Sequence using Eigenedginess

Criminal Identification System Using Face Detection and Recognition

Texture Image Segmentation using FCM

Face Recognition using Tensor Analysis. Prahlad R. Enuganti

4.12 Generalization. In back-propagation learning, as many training examples as possible are typically used.

Face Recognition using Principle Component Analysis, Eigenface and Neural Network

PALM PRINT RECOGNITION AND AUTHENTICATION USING DIGITAL IMAGE PROCESSSING TECHNIQUE

SUMMARY: DISTINCTIVE IMAGE FEATURES FROM SCALE- INVARIANT KEYPOINTS

A Hierarchical Face Identification System Based on Facial Components

Transcription:

137 CHAPTER 6 PERFORMANCE ANALYSIS OF SOFT COMPUTING BASED FACE RECOGNITION In the previous chapters, a brief description about the theory and experimental results of PCA, FLDA, Gabor, Neural, Db wavelets and Fuzzy C-means clustering based algorithms for human Face recognition are presented. In this chapter, some description about performance metrics (Shepherd et al 1991) of Face Recognition like Recognition rate, Execution time, False Acceptance Ratio (FAR) and False Rejection Ratio (FRR) for all the above algorithms are discussed. 6.1 PERFORMANCE ANALYSIS In this section six algorithms for face recognition under different aspects of light, pose and facial expressions are compared based on some performance metrics like recognition rate, execution time and FAR and FRR (Sherrah 2004). In Chapters 3, 4 and 5, various algorithms of Face recognition using Eigenfaces method, and the Fisher face method, Gabor wavelets, Back propagation Neural Network, Cascaded Neural network, Fuzzy Integral and Fuzzy C- means Clustering are discussed. The experimentation is applied on three important data bases like ORL, YALE and FERET. Finally, it is concluded that the Fuzzy C means clustering with BPNN method has lower error rate than any of the other methods. Apart from this, the successful implementation of these algorithms involves huge training set with multiple images in different pose and

138 expression for each person. Also, the performance of these algorithms varies under different training set and different test set. The performance metrics like Recognition rate, Accuracy, FAR, FRR and Execution time are calculated as per the formulas given in equations (3.15) to (3.17). 6.1.1 Recognition Rate Recognition Rates (RR) are compared for all the algorithms in Chapters 2, 3, 4 and it is concluded that the algorithm that combines FLDA, FCM and BPNN achieves the best. False Acceptance Rate (FAR) is that each of the test images of a single subject is compared with all images of all other subjects but not its own images. False rejection rate (FRR) is that each of the test images of a single subject is compared with each of the training image of that subject. No image is compared with itself (i.e. training and testing images should be different) and each pair is compared only once. Results are compared using the RR, FAR, FRR and Accuracy. The two standard biometric measures, FAR and FRR indicate the identifying power. The lower the equal value, the better identifying power the system possesses. 6.1.2 Execution Time For all the above algorithms, execution time (i.e.) total time taken to recognize the given image in seconds is compared and it ranges from 20-90 seconds for 50 to 400 images. Among the algorithms, the combination of FLDA, FCM Gabor and BPNN is found to be having less execution time. In MATLAB total execution time is measured by the program using Tic and Tac commands. 6.1.3 Accuracy For all the above algorithms, overall accuracy is calculated and it is found to be around 90 % for sixty images. The best accuracy is obtained from

139 the FLDA, FCM and BPNN. The comparison of the performance parameters with all above said algorithm are experimentally verified with all databases. Tabulation and Graphical analysis of ORL data base for recognition rate, execution time and accuracy are presented in Tables 6.1, 6.2, 6.3 and Figures 6.1, 6.2, 6.3 respectively. Table 6.1 Comparison of recognition rate for all algorithms Recognition rate (%) No. of images PCA FLDA BPNN CNN DB+FLDA FCM+BPNN 50 89 92 94 95 93 98 100 86 88 90 92 89 95 200 83 86 88 89 88 94 300 80 83 86 88 85 92 400 75 79 82 84 81 89 Figure 6.1 Graphical analysis of all algorithms for recognition rate

140 Table 6.2 Comparison of execution time for all algorithm No. of Images Execution time (sec) PCA FLDA BPNN CNN DB +FLDA FCM+BPNN 50 42.46 37.46 30.09 25.36 35.69 22.3 100 48.1 43.02 39.51 33.04 44.05 28.45 200 55.32 50.1 45.26 39.41 53.02 33.52 300 66.46 61.05 51.02 45.21 64.16 40.16 400 78.04 72.54 60.26 53.34 76.54 49.22 Figure 6.2 Graphical analysis of execution time for all algorithms

141 False acceptance ratio (FAR) is an instance where the system traces incorrect identity and false rejections ratio (FRR) is an instance where the system rejects a valid identity. Accuracy is calculated using FAR & FRR as follows. Accuracy = [1-(FAR+FRR) /2] * 100 % ---- (6.1) Table 6.3 Overall accuracy of all algorithms Sl. No No of Images Accuracy (%) Authorized trials Unauthorized trials ORL Yale FERET Real time images 1 10 10 95 90 90 85 2 20 20 92.5 87.5 87.5 82.5 3 30 30 90.0 85 85 81.66 4 40 40 88.75 85 83.75 80 5 50 50 88 84 82 79 Figure 6.3 Graphical analysis of accuracy for all algorithms

142 6.2 OVERALL COMPARISON Various types of algorithms applied in face recognition technology have their own significance, problems and complications. In this section main features, advantages and disadvantages of PCA, FLDA, GW, BPNN, FI and FCM based algorithms are discussed. Among all these FLDA, FCM, BPNN are found to have enhanced recognition. Principal Component Analysis (PCA) is a standard tool in modern data analysis and it is a simple, non-parametric method for extracting relevant information from the confusing data sets. Main advantages of PCA are its ability to recognize fast and its easy implementation. Eigenfaces algorithm has some shortcomings due to the use of image pixel gray values. In PCA, the size and location of each face image must remain the same. Different illumination, head pose and Facial Expressions lead to reduced recognition rate. The PCA approach typically requires the full frontal face to be presented each time; otherwise the image results in poor performance. Although the face recognition results were acceptable, the system using only eigenfaces might not be applicable as a real system. It needs to be more robust and to have other Discriminant features. PCA is Translation variant, Scale variant, Background variant, lighting variant. PCA derives the most expressive and inspired features, and provides a good discrimination. Finally, it is focused that speed and efficiency is high in PCA and it is suitable for Linear, but not suitable for Dissimilar, different lighting and poses. Fisher face method provides better ability to recognize a face and provides better discrimination between faces. FLDA works well for different illumination and different facial expressions. This statistically motivated method maximizes the ratio of the determinant of between-class scatter matrix

143 and within-class scatter matrix and in this sense attempts to involve information about classes of the patterns under consideration providing lower error rate. The solution for recognition of facial image in FLDA, involves segmentation of faces from the cluttered scenes or background, extraction of feature vector from the face region, identification and matching. The images used in this work can have variations in head orientations, scaling and lighting. This approach requires a high degree of correlation between the pixel intensities of the sample and the test images. FLDA approach has limitations over the variations in light, size and in the head orientation. Nevertheless, this method showed very good classifications of faces. A good recognition system should have the ability to adapt over time. A difficulty in using the FLDA method for face recognition is the high-dimensional nature of the image vector. In this FLDA technique, variations in illumination and expressions are reduced substantially. Speed and efficiency is high but it is not efficient for small databases and linear problems. Gabor wavelet provides the optimized resolution in both time and frequency domains for time frequency analysis. As it saves neighborhood relationship between pixels, it performs better than other traditional approaches in terms of efficiency and accuracy. It is invariant to homogenous illumination changes, rotational and scale. Gabor filters have fast recognition and low computational cost, Due to its biological similarity to human vision system, Gabor wavelets have been widely used in object recognition applications like fingerprint recognition, character recognition, etc. Gabor wavelet representations are among the most successful mathematical tools and are

144 mainly applied in signal analysis, image processing and many other information-related areas. Despite the success of Gabor wavelet based face recognition systems, both the feature extraction process and the huge dimension of Gabor features extracted demand large computation and memory costs, which makes them impractical for real applications. Another limitation in the case of Gabor wavelets is that the time for Gabor feature extraction is very long and its dimension is prohibitively large. Neural classification is suitable for both linear and nonlinear problems. It has the advantages of high accuracy, high recognition rate and easy to implement. BPNN is a gradient descent based algorithm and it is difficult to train and training time is more, but the execution time is less.also some inherent difficulties like slow convergence and difficulty in escaping from a local minimum are encountered. In BPNN, large number of neurons in the hidden layer can give high generalization error due to over fitting and high variance. Cascade-Correlation is much useful for incremental learning, in which new information is added to an already-trained net. There is no need to guess the size, depth and connectivity pattern of the network in advance. A reasonably small net is built automatically. It may be possible to build networks with a mixture of nonlinear unit-types. Cascade-Correlation learns fast. In backpropogation, the hidden units engage in a complex way before they settle into distinct useful roles; in Cascade-Correlation, each unit sees a fixed problem and can move decisively to solve that problem. Cascade-Correlation can build deep nets without the dramatic slowdown seen in back-propagation networks with more than one or two hidden layers

145 In CNN, there is no need to propagate error signals backwards through the network connections as in BPNN. As cascade-correlation network builds hidden units into the neural network as it goes, the neural network designer is relieved of the task of having to guess at the best configuration of hidden units for a particular problem. Cascade-correlation can converge quickly. As the Training time is very fast, it makes cascade correlation networks suitable for large training sets. As with all types of models, there are some disadvantages to cascade correlation networks. They have an extreme potential for over fitting the training data; this results in excellent accuracy on the training data but poor accuracy on new, unseen data. Cascade correlation networks usually are less accurate than probabilistic and general regression neural networks on small to medium size problems (i.e., fewer than a couple of thousand training rows). Cascade correlation is less likely to get trapped in local minima than multilayer perceptron networks. Thus this DB wavelets, FLDA and FI method, in comparison with other methods, has the advantages of low computational cost and requires less time for classification for small number of database images. Further, the variation in illumination, pose or facial expression does not affect the recognition process. The fuzzy integral data fusion technique also has its limitation. The number of fuzzy measures increases exponentially with the number of parameters. One of the distinguishing features of fuzzy measure and fuzzy integral technique is that it is able to represent certain interactions between criteria. Finally, it has been experimentally demonstrated that the aggregation of classifiers resulting from fisher face operating on four sub image sets generated by wavelet decomposition leads to better classification

146 results. In this method, images under different illumination and expressions can be recognized. FCM has the advantages of low computational cost and requires less time for classification. Further, the variation in illumination, pose or facial expressions does not affect the recognition process. The fuzzy integral data fusion technique also has its limitation. The number of fuzzy measures increases exponentially with the number of parameters. The Fuzzy C-means (FCM) algorithm has successfully been applied to a wide variety of clustering problems. However, these algorithms work better for unlabeled data, for this project an algorithm which can utilize the labels of the data is needed for a better performance. Fuzzy Clustering algorithms partition methods that can be used to assign objects of dataset to their clusters. These algorithms optimize a subjective function that evaluates a given Fuzzy assignment of object to clusters. The problem of Fuzzy clustering is to find a fuzzy pseudo partition and the associated cluster centers, by which the structure of the data is represented as best as possible. To solve the fuzzy clustering problem, a performance index is formulated. Similar images are grouped by FCM; the group of images can be recognized within few minutes with better recognition. 6.3 APPLICATIONS OF FACE RECOGNITION Today, face recognition technology is being used to combat passport fraud, support law enforcement, identify missing children, and minimize benefit/identity fraud. The computer-based face recognition industry has made much useful advancement in the past decade. The proposed system of face recognition may be applied in identification systems,

147 document control and access control. The face similarity meter was found to perform satisfactorily in adverse conditions of exposure, illumination and contrast variations and face pose. Biometric technologies have found application in four broad application categories: surveillance, screening, enrollment identification and identity verification. General security tasks, such as access control to buildings, can be accomplished by a face recognition system. Banking operations and credit card transactions could also be verified by matching the image encoded in the magnetic strip of the card with the person using the card at any time. As one of the most successful applications of image analysis and understanding, face recognition has recently received significant attention, especially during the past several years. At least two reasons account for this trend: the first is the wide range of commercial and law enforcement applications, and the second is the availability of feasible technologies after 30 years of research. Even though current machine recognition systems have reached a certain level of maturity, their success is limited by the conditions imposed by many real applications. For example, recognition of face images acquired in an outdoor environment with changes in illumination and/or pose remains a largely unsolved problem. In other words, current systems are still far away from the capability of the human perception system. Face recognition can be used for both verification and identification (open-set and closed-set). Face recognition has received substantial attention from researches in biometrics, pattern recognition field and computer vision communities. The recognition of faces is very important because of its potential commercial applications, such as in the area of video surveillance, access control systems, retrieval of an identity from a data base for criminal investigations and user authentication.

148 The application of face recognition technique can be categorized into two main parts: law enforcement application and commercial application. major contribution. The following is a list of areas where face recognition can make a Law enforcement: Historically, the major user of biometrics, police agencies have used face recognition as a means of identifying criminals for well over a hundred years. Police gain the most benefit because a criminal's biometric information such as fingerprints, face recognition, DNA, etc, may already be held in a database. This enables forensic information collected at a crime scene and a witness description in the case of facial image, to be matched against it. Law enforcement agencies have achieved significant success with facial recognition, matching the mugshot (or even composite drawing) of a suspect against a database of offenders. This is particularly useful where the individual has refused to give his name, or has given a false name. Airport security: As in many cases, the only information available on suspected terrorists was a mug shot or surveillance photo and facial recognition was thrust to center stage as the biometric which could help identify them before they board the plane. While much work has been done in this area, the practical and logistical issues which have to be overcome have meant that so far implementation has not been as fast as originally anticipated. Child recovery: The proliferation of the Worldwide Web in the second half of the 90's had led to an explosion in the exchange of pedophilic imagery. Imaging and biometric technologies have achieved notable successes in tracking down pedophiles and identifying missing and abused children.

149 Access control: The use of fingerprints to verify an individual is well-established in biometrics. While a photo on a pass card helps prevent the use of the card by someone other than the individual to whom it was issued, it is far from infallible. The issue here is identity fraud, where the agency needs to know primarily three things: Before issuing a document, has a similar document already been issued to this individual under a different name? On subsequent presentation of the document, say at a Point of Entry, is the individual presenting it the same individual to whom it was issued? If not the same individual, who are they? Various biometrics can be used for these purposes. In 2003 the International Civil Aviation Organization (ICAO), stated a preference for fingerprints and facial recognition to be used on travel documents. Driver s Licenses: While driver s license is in many ways a similar application to ID cards, it is still the case in most countries that ID cards are not used and therefore the driver s license database is by far the largest database available of adult citizens. Drivers licenses are an ideal application for facial recognition because the individuals cooperate in having their photo taken, while the environment has been set up with optimal lighting, camera resolution, distance from the subject and neutral background. While this offers a potentially invaluable tool in identifying individuals whose details are in the database, because of privacy concerns it cannot be used for this purpose in certain jurisdictions. Smartcards: Smartcards are not a different application, but a particularly secure means of providing an individual with an identity card.

150 They are especially appropriate for biometrics because sufficient memory can be made available to hold the individual's facial image and a number of encode arrays. While these will always be held in a central database as well, having them on the card itself enables it to be used in locations where there may be no network access. Naturally, it is expected that the same techniques could be applied to identifying facial expressions where the set of training images is divided into classes based on the facial expression. Face recognition technology has numerous commercial and law enforcement applications. These applications range from static matching of controlled format photographs such as passports, credit cards, photo ID s, driver s licenses and mug shots to real time matching of surveillance video images. Understanding the human mechanisms employed to recognize a face constitutes a challenge for psychologists and neural scientists. In addition to the cognitive aspects, understanding face recognition is important, since the same underlying mechanisms could be used to build a system for the automatic identification of faces by machine. Machine recognition of faces is gradually becoming very important due to its wide range of commercial and law enforcement applications, which include forensic identification, access control, border surveillance and human computer interactions. Static matching of photographs (Mug-shot), Biometric security, Passport control at terminals in airports, Participant identification in meetings, Scanning for criminal persons, Video surveillance, Law enforcement (mug shot identification), Verification for personal identification (driver s licenses, passports, etc.), Electoral verification, Surveillance of crowd behavior are the various significant application of face recognition technology.

151 6.4 LIMITATIONS OF FACE RECOGNITION Face recognition is not so robust against extreme variations in expressions, pose and background. Also this cannot be used efficiently for faces with lateral head rotation. The computing power in general makes face recognition suitable for offline applications as online applications require high computing power. Face recognition alone as of now, cannot be successfully used for authentication but can be used for identification and classification. Identical twins cannot be distinguished using face recognition.