REAL-TIME WIRELESS FACE RECOGNITION SYSTEM (RT-WiFARES) UMMI NAZIRAH BINTI JAMIL KHAIR

Similar documents
FINGERPRINT DATABASE NUR AMIRA BINTI ARIFFIN THESIS SUBMITTED IN FULFILMENT OF THE DEGREE OF COMPUTER SCIENCE (COMPUTER SYSTEM AND NETWORKING)

DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS MOJTABA GHANAATPISHEH SANAEI

MAC PROTOCOL FOR WIRELESS COGNITIVE NETWORK FARAH NAJWA BINTI MOKHTAR

HARDWARE/SOFTWARE SYSTEM-ON-CHIP CO-VERIFICATION PLATFORM BASED ON LOGIC-BASED ENVIRONMENT FOR APPLICATION PROGRAMMING INTERFACING TEO HONG YAP

AUTOMATIC APPLICATION PROGRAMMING INTERFACE FOR MULTI HOP WIRELESS FIDELITY WIRELESS SENSOR NETWORK

Signature :.~... Name of supervisor :.. ~NA.lf... l.?.~mk.. :... 4./qD F. Universiti Teknikal Malaysia Melaka

This item is protected by original copyright

IRIS RECOGNITION SYSTEM USING HISTOGRAM ANALYSIS NORHUDA BINTI OTHMAN

LOCALIZING NON-IDEAL IRISES VIA CHAN-VESE MODEL AND VARIATIONAL LEVEL SET OF ACTIVE CONTOURS WITHTOUT RE- INITIALIZATION QADIR KAMAL MOHAMMED ALI

AN IMPROVED PACKET FORWARDING APPROACH FOR SOURCE LOCATION PRIVACY IN WIRELESS SENSORS NETWORK MOHAMMAD ALI NASSIRI ABRISHAMCHI

PERFOMANCE ANALYSIS OF SEAMLESS VERTICAL HANDOVER IN 4G NETWOKS MOHAMED ABDINUR SAHAL

AUTOMATIC RAILWAY GATE CONTROLLERUSING ZIGBEE NURLIYANA HAZIRAH BINTI MOHD SAFEE (B )

ENHANCING TIME-STAMPING TECHNIQUE BY IMPLEMENTING MEDIA ACCESS CONTROL ADDRESS PACU PUTRA SUARLI

SMART AQUARJUM (A UTOMATIC FEEDING MACHINE) SY AFINAZ ZURJATI BINTI BAHARUDDIN

RECOGNITION OF PARTIALLY OCCLUDED OBJECTS IN 2D IMAGES ALMUASHI MOHAMMED ALI UNIVERSITI TEKNOLOGI MALAYSIA

INTEGRATION OF CUBIC MOTION AND VEHICLE DYNAMIC FOR YAW TRAJECTORY MOHD FIRDAUS BIN MAT GHANI

ISOGEOMETRIC ANALYSIS OF PLANE STRESS STRUCTURE CHUM ZHI XIAN

BORANG PENGESAHAN STATUS TESIS

TOWER BASE STATION SAFETY SYSTEM USING GSM TECHNOLOGY NIZAR ZACARIYYA BIN SHAPHERI


THE COMPARISON OF IMAGE MANIFOLD METHOD AND VOLUME ESTIMATION METHOD IN CONSTRUCTING 3D BRAIN TUMOR IMAGE

LOGICAL OPERATORS AND ITS APPLICATION IN DETERMINING VULNERABLE WEBSITES CAUSED BY SQL INJECTION AMONG UTM FACULTY WEBSITES NURUL FARIHA BINTI MOKHTER

SECURE-SPIN WITH HASHING TO SUPPORT MOBILITY AND SECURITY IN WIRELESS SENSOR NETWORK MOHAMMAD HOSSEIN AMRI UNIVERSITI TEKNOLOGI MALAYSIA

INSTRUCTION: This section consists of FOUR (4) structured questions. Answer ALL questions.

Signature : IHSAN BIN AHMAD ZUBIR. Date : 30 November 2007

AUTOMATIC DETECTION TEMPERATURE TRANSMITTER FOR CALIBRATION PROCESS USING THERMOCOUPLE MUHAMAD FARID BIN A.WAHAB

HARDWARE AND SOFTWARE CO-SIMULATION PLATFORM FOR CONVOLUTION OR CORRELATION BASED IMAGE PROCESSING ALGORITHMS SAYED OMID AYAT

BLOCK-BASED NEURAL NETWORK MAPPING ON GRAPHICS PROCESSOR UNIT ONG CHIN TONG UNIVERSITI TEKNOLOGI MALAYSIA

PORTABLE ELECTRONICS QUEUE CONTROL SYSTEM WONG CHUN YUAN UNIVERSITY MALAYSIA PAHANG

MAGNETIC FLUX LEAKAGE SYSTEM FOR WIRE ROPE INSPECTION USING BLUETOOTH COMMUNICATION MUHAMMAD MAHFUZ BIN SALEHHON UNIVERSITI TEKNOLOGI MALAYSIA

THREE BIT SUBTRACTION CIRCUIT VIA FIELD PROGRAMMABLE GATE ARRAY (FPGA) NOORAISYAH BINTI ARASID B

IMPLEMENTATION OF UNMANNED AERIAL VEHICLE MOVING OBJECT DETECTION ALGORITHM ON INTEL ATOM EMBEDDED SYSTEM

INSTRUCTION: This section consists of TEN (10) structured questions. Answer ALL questions.

DROWSINESS DETECTION FOR CAR ASSISTED DRIVER SYSTEM USING IMAGE PROCESSING ANALYSIS INTERFACING WITH HARDWARE HUONG NICE QUAN

HOME APPLIANCE CONTROL SYSTEM TAN WEI SYE


INFORM DEPARTURE AND ARRIVING OF BUSSES USING BLUETOOTH MOHD SUHKRI BIN YASRI

HIGH SPEED SIX OPERANDS 16-BITS CARRY SAVE ADDER AWATIF BINTI HASHIM

LINE FOLLOWER FOR SURVEILLANCE CAMERA MONITORING SYSTEM YEW YUAN SOON

IRIS RECOGNITION USING ARTIFICIAL NEURAL NETWORK FATIN ZURIAH BINTI MOHAMMAD ZUHARY

STUDY OF FLOATING BODIES IN WAVE BY USING SMOOTHED PARTICLE HYDRODYNAMICS (SPH) HA CHEUN YUEN UNIVERSITI TEKNOLOGI MALAYSIA

HERMAN. A thesis submitted in fulfilment of the requirements for the award of the degree of Doctor of Philosophy (Computer Science)

HARDWARE-ACCELERATED LOCALIZATION FOR AUTOMATED LICENSE PLATE RECOGNITION SYSTEM CHIN TECK LOONG UNIVERSITI TEKNOLOGI MALAYSIA

IMPROVED IMAGE COMPRESSION SCHEME USING HYBRID OF DISCRETE FOURIER, WAVELETS AND COSINE TRANSFORMATION MOH DALI MOUSTAFA ALSAYYH

OPTIMIZE PERCEPTUALITY OF DIGITAL IMAGE FROM ENCRYPTION BASED ON QUADTREE HUSSEIN A. HUSSEIN

MICRO-SEQUENCER BASED CONTROL UNIT DESIGN FOR A CENTRAL PROCESSING UNIT TAN CHANG HAI

ENHANCEMENT OF UML-BASED WEB ENGINEERING FOR METAMODELS: HOMEPAGE DEVELOPMENT CASESTUDY KARZAN WAKIL SAID

MULTICHANNEL ORTHOGONAL FREQUENCY DIVISION MULTIPLEXING -ROF FOR WIRELESS ACCESS NETWORK MOHD JIMMY BIN ISMAIL

BORANG PENGESAHAN STATUS TESIS

SEMANTICS ORIENTED APPROACH FOR IMAGE RETRIEVAL IN LOW COMPLEX SCENES WANG HUI HUI

Pengguna akan diberikan Username dan Password oleh Administrator untuk login sebagai admin/conference Manager bagi conference yang akan diadakan.

Semasa buku ini ditulis XAMPP mengandungi empat versi:

A LEVY FLIGHT PARTICLE SWARM OPTIMIZER FOR MACHINING PERFORMANCES OPTIMIZATION ANIS FARHAN BINTI KAMARUZAMAN UNIVERSITI TEKNOLOGI MALAYSIA

SUPERVISED MACHINE LEARNING APPROACH FOR DETECTION OF MALICIOUS EXECUTABLES YAHYE ABUKAR AHMED

AUTOMATIC PET FEEDER WITH CLIENT/SERVER APPLICATION KHAIRUL ANWAR B MOHD YAKOP UNIVERSITI MALAYSIA PAHANG

PERFORMANCE EVALUATION OF LEACH PROTOCOL FOR WIRELESS SENSOR NETWORKS USING NS2 MUHAMAD FAIZ BIN RAMDZAN

Pengenalan Sistem Maklumat Dalam Pendidikan

DYNAMIC TIMETABLE GENERATOR USING PARTICLE SWARM OPTIMIZATION (PSO) METHOD TEH YUNG CHUEN UNIVERSITY MALAYSIA PAHANG

DEVELOPMENT OF SCADA FOR SERVO CONTROLLED PICK AND PLACE SYSTEM JUHAIDAH BINTI JOHARI

DEVELOPMENT OF VENDING MACHINE WITH PREPAID PAYMENT METHOD AMAR SAFUAN BIN ALYUSI

A NEW STEGANOGRAPHY TECHNIQUE USING MAGIC SQUARE MATRIX AND AFFINE CIPHER WALEED S. HASAN AL-HASAN UNIVERSITI TEKNOLOGI MALAYSIA

THE APPLICATION OF DIFFERETIAL BOX-COUNTING METHOD FOR IRIS RECOGNITION AHMAD AZFAR BIN MAHMAMI

VIRTUAL PRIVATE NETWORK: ARCHITECTURE AND IMPLEMENTATIONS

DEVELOPMENT OF SPAKE S MAINTENANCE MODULE FOR MINISTRY OF DEFENCE MALAYSIA SYED ARDI BIN SYED YAHYA KAMAL UNIVERSITI TEKNOLOGI MALAYSIA

PERFORMANCE ANALYSIS OF VIDEO TRANSMISSION OVER IEEE ARCHITECTURE NOOR HURUL-AIN BINTI MOHAMAD

SLANTING EDGE METHOD FOR MODULATION TRANSFER FUNCTION COMPUTATION OF X-RAY SYSTEM FARHANK SABER BRAIM UNIVERSITI TEKNOLOGI MALAYSIA

IMPLEMENTATION AND PERFORMANCE ANALYSIS OF IDENTITY- BASED AUTHENTICATION IN WIRELESS SENSOR NETWORKS MIR ALI REZAZADEH BAEE

Design and Implementation of I2C BUS Protocol on Xilinx FPGA. Meenal Pradeep Kumar

TUITION CENTRE MANAGEMENT SYSTEM (TCMS) ZARIFAH BINTI MOHD PAHMI UNIVERSITI TEKNIKAL MALAYSIA MELAKA

COLOUR IMAGE WATERMARKING USING DISCRETE COSINE TRANSFORM AND TWO-LEVEL SINGULAR VALUE DECOMPOSITION BOKAN OMAR ALI

PANDUAN PENGGUNA (SUPPLIER) MAINTAIN CERTIFICATES/SUPPLIER DETAILS SUPPLIER RELATIONSHIP MANAGEMENT SUPPLY CHAIN MANAGEMENT SYSTEM (SCMS)

FUZZY LOGIC CONTROL OF AN AUTONOMOUS MOBILE ROBOT WAN NOR SYAHIRA BINTI WAN ALI

PANDUAN PENGGUNA (SUPPLIER) MAINTAIN CERTIFICATES/SUPPLIER DETAILS SUPPLIER RELATIONSHIP MANAGEMENT SUPPLY CHAIN MANAGEMENT SYSTEM (SCMS)

A TRUST MODEL FOR BUSINESS TO CUSTOMER CLOUD E-COMMERCE HOSSEIN POURTAHERI

PROTOTYPE OF POWER LINE INTERFACE SOCKET USING EMBEDDED CONTROLLER FOR DATA ACQUISITION AND CONTROL. LAI CHING HUAT

UPGRADE FMS200: SHAFT SUPPLY MODULE THOUGH HUMAN MACHINE INTERFACE LEE HO CHUNG

CAMERA CALIBRATION FOR UNMANNED AERIAL VEHICLE MAPPING AHMAD RAZALI BIN YUSOFF

PROBLEMS ASSOCIATED WITH EVALUATION OF EXTENSION OF TIME (EOT) CLAIM IN GOVERNMENT PROJECTS

DESIGN AND IMPLEMENTATION OF A MUSIC BOX USING FPGA TAN KIAN YIAK

DYNAMIC TIMESLOT ALLOCATION TECHNIQUE FOR WIRELESS SENSOR NETWORK OON ERIXNO

ADAPTIVE ONLINE FAULT DETECTION ON NETWORK-ON-CHIP BASED ON PACKET LOGGING MECHANISM LOO LING KIM UNIVERSITI TEKNOLOGI MALAYSIA

ZIGBEE-BASED SMART HOME SYSTEM NURUL ILMI BINTI OMAR

DESIGN ANALYSIS OF EXTERIOR CAR BODY PART BASTIAN WIBAR BIN MOMANG

ANOMALY DETECTION IN WIRELESS SENSOR NETWORK (WSN) LAU WAI FAN

INSTRUCTION: This section consists of FOUR (4) structured questions. Answer ALL questions.

INSTRUCTION: This section consists of TWO (2) structured questions. Answer ALL questions.

NUR FARAH DIYANA BINTI SABARUDIN

ONTOLOGY-BASED SEMANTIC HETEROGENEOUS DATA INTEGRATION FRAMEWORK FOR LEARNING ENVIRONMENT

PANDUAN PENGGUNA (PENSYARAH)

MUHAMMAD FIRDAUS BIN MD YUSOF

SYSTEMATIC SECURE DESIGN GUIDELINE TO IMPROVE INTEGRITY AND AVAILABILITY OF SYSTEM SECURITY ASHVINI DEVI A/P KRISHNAN

CHAPTER 4 FACE RECOGNITION DESIGN AND ANALYSIS

COORDINATION PROTECTION SYSTEM IN INDUSTRIAL PLANTS AHMAD TARMIZI BIN MD NOR

MODELLING AND REASONING OF LARGE SCALE FUZZY PETRI NET USING INFERENCE PATH AND BIDIRECTIONAL METHODS ZHOU KAIQING

SIMULATION OF IDENTIFYING SHORTEST PATH WALKWAY IN LIBRARY BY USING ANT COLONY OPTIMIZATION CHAN CHUI TENG

AMBA AXI BUS TO NETWORK-ON-CHIP BRIDGE NG KENG YOKE UNIVERSITI TEKNOLOGI MALAYSIA

PRIVACY FRIENDLY DETECTION TECHNIQUE OF SYBIL ATTACK IN VEHICULAR AD HOC NETWORK (VANET) SEYED MOHAMMAD CHERAGHI

PREDICTION OF SURFACE ROUGHNESS IN TURNING OPERATION OF LOW CARBON STEEL AISI 1018 FAKHRUR RAZI BIN BAHRIN UNIVERSITI MALAYSIA PAHANG

RGB COLOR IMAGE WATERMARKING USING DISCRETE WAVELET TRANSFORM DWT TECHNIQUE AND 4-BITS PLAN BY HISTOGRAM STRETCHING KARRAR ABDUL AMEER KADHIM

UNIVERSITI TEKNIKAL MALAYSIA MELAKA FAKULTI KEJURUTERAAN ELEKTRIK FINAL YEAR PROJECT REPORT

Transcription:

REAL-TIME WIRELESS FACE RECOGNITION SYSTEM (RT-WiFARES) UMMI NAZIRAH BINTI JAMIL KHAIR This Report Is Submitted In Partial Fulfillment Of The Requirements For The Bachelor Degree In Electronic Engineering (Wireless Communication) Faculty Of Computer Engineering And Electronic Engineering. Universiti Teknikal Malaysia Melaka Jun 2013

ii

iii DECLARATION I hereby admit that this report is my own work except that every such summaries and excerpts only have me explain the source. Signature Name Date

iv SUPERVISOR DECLARATION "I acknowledge that I have read this work in my / our this work is sufficient in scope and quality for the award of a Bachelor of Electronic Engineering (Wireless Communication). Signature Name Date

For mom, dad and family v

vi ACKNOWLEDGEMENT Alhamdulillah, thanks, to the Almighty Allah Most Gracious, Most Merciful for the blessing and grace, I have been able to implement this undergraduate project. I would like to take this opportunity to express appreciation to all those who have helped me along the implement of this PSM project especially my supervisor, Mr. Engr. Khairul Muzzammil Bin Saipullah on giving me a lot of advices, ideas and support me on designing this software. I express my gratitude and hope God will give back to good guys.

vii ABSTRACT This project is aimed to design a real time wireless face recognition system that is using two kinds of libraries in the C++ environment that are GStreamer and OpenCV libraries. This system is going to detect a human face on a live recording video session that are using IP camera. It then will match the captured image with the database. This process happens in real-time concept which is the output response to the input is synchronous and no time delay is expected. A sample image will be used as reference in the database. It will have the detail of the reference image for example their names. Thus when an image is captured by the video recording, it then will match the captured image with the sample image that is already stored in the database. The objective of this project is to enhanced current CCTV limitation such as reduce the human intervention in the monitoring process and produce a wireless connection between the IP camera, the router and the controller (PC). Other than automatically detect a human face, this project will also enable an update to the database by creating a GUI interface. This interface will allow the inserting of new image into database if required.

viii ABSTRAK Projek ini bertujuan untuk mencipta satu sistem masa nyata pengecaman wajah tanpa wayar yang berasaskan dua jenis fungsi di dalam sistem C++ iaitu GStreamer dan OpenCV. Sistem pengecaman wajah ini akan mengesan wajah manusia melalui rakaman video yang menggunakan kamera IP. Ianya kemudian akan memadankan wajah yang ditangkap dengan sistem pangkalan data. Proses ini berlaku dalam konsep masa nyata iaitu tindak balas sistem adalah berkadar terus dengan input yang dikesan dan melibatkan penggunaan masa yang pantas. Proses pengecaman wajah dilakukan dan dikawal oleh satu pangkalan data. Pangkalan data ini mengandungi sampel imej termasuklah pengenalan mengenai imej tersebut seperti nama dan sebagainya. Apabila satu imej telah dikesan oleh system, imej tersebut akan melalui proses pengecaman wajah oleh pangkalan data. Objektif bagi projek ini adalah untuk memperbaiki kekurangan yang terdapat pada system CCTV masa kini seperti mengurangkan penglibatan manusia di dalam proses pemantauan dan juga menggunakan sambungan tanpa wayar di antara alatan yang digunakan iaitu kamera IP, router dan komputer pengawalan. Selain daripada boleh mengesan wajah dengan pantas, projek ini juga akan membolehkan proses mengemaskini data dilakukan dengan mewujudkan satu paparan antaramuka pengguna. Paparan ini akan membenarkan imej baru dimasukkan ke dalam pangkalan data sekiranya diperlukan.

ix CONTENTS CHAPTERS CIRCUMSTANCES PAGE PROJECT TITLE DECLARATION SUPERVISOR DECLARATION DEDICATION ACKNOWLEDGEMENT ABSTRACT ABSTRAK CONTENTS LIST OF FIGURES LIST OF TABLES LIST OF ABBEREVIATIONS LIST OF APPENDIX i iii iv v vi vii viii ix xii xiv xv xvi I INTRODUCTION 1.1 Introduction 1 1.2 Project objective 4 1.3 Problem statement 4 1.4 Project scope 5 1.5 Project importance 1.6 Impact of commercialization and research 6 6 advancement 1.7 Progression flowchart for PSM I 1.8 Progression flowchart for PSM II 7 8

x 1.9 Thesis outline 9 II LITERATURE REVIEW 2.1 Introduction 10 2.2 WLAN connection 11 2.2.1 IP Camera 2.2.1.1 FOSCAM IP Camera 12 13 2.2.2 Wireless Router 16 2.3 C++ Visual Programming 17 2.3.1 GStreamer Library 17 2.3.2 OpenCV 2.3.3 Win32 Console Applications 2.3.4 MFC 18 21 22 2.4 Image Processing 23 2.5 Face Detection and Recognition 24 2.5.1 Importance of Face Detection 25 2.5.2 Face Recognition 26 2.5.3 SURF 27 2.6 Movement Detection 28 III METHODOLOGY 3.1 Project Methodology 29 3.2 Project Architecture 30 3.2.1 Project Flowchart 30 3.2.2 Gantt Chart 35 3.3 Coding Developments 37 3.4 GUI Creating For Database Updating 39 3.5 Software Testing 41

xi IV RESULT AND DISCUSSION 4.1 Expected Result 41 4.1.1 Video live recording 41 4.1.2 WLAN Connection 47 4.2 Discussion 48 V CONCLUSION AND SUGGESTION 5.1 Conclusion 5.2 Suggestion 50 51 REFERENCES APPENDICES A: SOURCE CODES 52 53

xii LISTS OF FIGURES No Title Page 1 WLAN devices 12 2 IP camera and analog camera 13 3 FOSCAM FI8910W used in this project 14 4 Wireless router 16 5 GStreamer pipeline 18 6 OpenCV structure 20 7 The interface of Win32 Console App 21 8 The interface of MFC 23 9 Image enhancement in term of contrast 24 10 Example of face detection 25 11 Example of face recognition 26 12 Example of SURF Keypoint on A Palm 27 13 Screen shots of object recognition using SURF 28 14 Project architecture 30 15 System flowchart 31 16 The function of image conversion from RGB to gray 33 17 Function of Haar Cascade 33 18 FLANN extractor 34 19 The recorder used 35 20 Gantt chart 36 21 SURF extractor 37 22 Example FLANN coding 37 23 Flowchart of the face detection and recognition 38 process 24 Image processing towards the frame 24

xiii 25 The captured image and its respective name 40 26 The database interface 40 27 The interface of the GUI 41 28 Adding first the person in the database 44 29 The person is successfully being detected 45 30 Adding an image into a database 46 31 Two image recognized 46 32 One subject recognized as unknown 47 33 WLAN connections between devices 47 34 Window appears when fail to capture the image 48 35 Two subjects appointed with the same name 49

xiv LIST OF TABLES No Title Page 1 The specification of the IP camera 16 2 The comparison between Matlab, AForge and OpenCV 20

xv LIST OF ABBREVATIONS MRTD CCTV IP GUI WLAN OFDM ISP ICMP AVI MPEG-1/2 MJPEG MP3 DIY IR WEP WPA FTP ADPCM LAN WAN MFC HCI SIFT ASF FLANN - Machine Readable Travel Documents - Closed Circuit Television - Internet Protocol - Graphical User Interface - Wireless Local Area Network - Orthogonal Frequency Division Multiplexing - Internet Service Provider - Internet Control Message Protocol - Audio Video Interleave - Moving Picture Experts Group - Motion Joint Photographic Experts Group - MPEG-1 Audio Layer-3 - Do It Yourself - Infra Red - Wired Equivalent Privacy - Wi-Fi Protected Access - File Transfer Protocol - Adaptive Differential Pulse-Code Modulation - Local Area Network - Wide Area Network - Microsoft Foundation Class - Human Computer Interaction - Scale-Invariant Feature Transform - Advanced System Format - Fast Approximate Nearest Neighbor Search Library

xvi LIST OF APPENDIX No Title Page 1 Recognition source codes 54 2 Database source codes 60

CHAPTER I INTRODUCTION This chapter will give an overview of the project such as project introduction, project objective, project scope, project methodology and summary of this project. This chapter will explain briefly about the work from the beginning until the project is implemented. 1.1 Introduction Face recognition is one of the most important abilities that we use in our daily lives. There are several reasons for the growing interest in automated face recognition, including rising concerns for public security, the need for identity verification for physical and logical access, and the need for face analysis and modeling techniques in multimedia data management and digital entertainment. Research in automatic face recognition started in the 1960s. Recent years have seen significant progress in this area and a number of face recognition and modeling systems have been developed and deployed. However, accurate and robust face recognition still offers a number of challenges to computer vision and pattern recognition researchers, especially under unconstrained environments. [1]

2 For face recognition in video, it has received significant attention during the past several years. The wide availability of powerful and low-cost desktop and embedded computing systems has created an enormous interest in automatic processing of digital images in a variety of applications including biometric authentication, surveillance, human-computer interaction and multimedia management. Research and development in automatic face recognition follow naturally. Video is a rich source of information in that it can lead to potentially better representations by offering more views of the face. Further, the role of facial motion for face perception has been well documented. Psychophysical studies have found evidence that when both structural and dynamic information is available, humans tend to rely more on dynamics under non-optimal viewing conditions (such as low spatial resolution, harsh illumination conditions and many more). Dynamics also aids in the recognition of familiar faces. If one were to ignore temporal dependencies, a video sequence can be considered as a collection of still images so still-image-based recognition algorithms can always be applied. [2] Face recognition has several advantages over other biometric modalities such as fingerprint and iris. Besides being natural and nonintrusive, the most important advantage of face is that it can be captured at a distance and in a covert manner. Among the six biometric attributes considered by Hietmeyer that are faced, finger, hand, voice, eye and signature, facial features scored the highest compatibility with a Machine Readable Travel Documents (MRTD) system based on a number of evaluation factors such as enrollment, renewal, machine requirements and public perception. Face recognition technology is now significantly advanced since the time when the Eigenface method was proposed. In the constrained situations, for example where lighting, pose, standoff, facial wear, and facial expression can be controlled, automated face recognition can surpass human recognition performance, especially when the database (gallery) contains a large number of faces. However, automatic face recognition still faces many challenges when face images are acquired under unconstrained environments.

3 Face recognition as one of the major biometric technologies has become increasingly important owing to rapid advances in image capture devices, the availability of huge amounts of face images on the Web and increased demands for higher security. It is a computer application for automatically identifying or verifying a person from a digital image or a video frame from a video source. Comparing selected facial features from the image and a facial database is some of the methods in face recognition. One of the reasons face recognition has attracted so much research attention and sustained development over the past 30 years is its great potential in numerous government and commercial applications. In 1995, Chellappa et al. listed a small number of applications of face recognition technology and described their advantages and disadvantages. However, they did not analyze any system deployed in real applications. Even the more recent review, where the set of potential applications has been grouped into five categories, did not conduct such an analysis. In 1997, at least 25 face recognition systems from 13 companies were available. Since then, the numbers of face recognition systems and commercial enterprises have greatly increased owing to the emergence of many new application areas, further improvement of the face recognition technologies, and increased affordability of the systems. Real-time face recognition nowadays is a necessary feature in advanced surveillance systems. It is a program that guarantees a response within strict time constraints. Real-time response times are understood to be in the order of milliseconds and sometimes microseconds. Thus, in this project the response time between the captured image and the data based result is expected to be in real-time. Real Time Wireless Face Recognition System (RT-WiFARES) is based on WLAN camera for security purpose. The system will detect human faces and then it will match the face with the database and displays the name of the person on the video in real time. It also records the data for security purpose and can also use as an attendance system. This project will be built on GStreamer library for real time video streaming and OpenCV library for face detection and recognition system.

4 1.2 Project Objectives The objective is an expectation to be achieved by a researcher. The objective of this project is to enhance the limitations in the current CCTV system. The objectives are: 1. To produce a system that require no need of human monitoring. It will be using the database system to monitor the video recording. 2. To build a system that is able to record the video session with the monitoring of database system. If a stranger is detected, the system will detect it with unknown instead of giving out the name. If necessary, the stranger can be added to the database due to the easily updated by the database. 3. To build a wireless system connection. The users can view the video output from any local or remote location and the camera can be placed anywhere within the network. 4. To implement the using of IP camera that offers great definition megapixel and higher definition images. 1.3 Problem Statement The problem statement is a brief but concise description of the problem and tells the resistance encountered by a researcher. The problem statement is the statement made after identifying the problems and solutions to the problems are being studied. This project addresses limitations in the current CCTV system as follows: 1. Need human to monitor the video. If the system is un-monitored, it will be useless. Intruders can freely move. 2. Current system just recording it without a proper monitor system. If intruders are detected, the entire recording system must be viewed precisely. 3. The current system uses a wired connection. This means the monitoring range is limited.

5 4. The video quality and recording quality of the analog system of the CCTV is lesser than the digital camera. 1.4 Project Scope The scope of the study is the area covered during the study undertaken. The project is evolving around several scopes. The scopes are: 1. WLAN connection. The connection between the IP camera, router and PC (database) are in wireless. It gives the users the mobility to move around within a local coverage area and still be connected to the network. 2. C++ Visual Programming. Developing C++ coding for face recognition in uncontrolled scenery with complex backgrounds (outdoor environments, airports, train/bus stations). The images collected over a period of time with different lighting conditions will be detected without a glitch in real time. 3. Image processing. Image enhancement that refers to accentuation, or sharpening, of image features such as boundaries, or contrast to make the images more useful for display and analysis. This process does not increase the inherent information content in data. It includes gray level & contrast manipulation, noise reduction and so on. 4. Face detection. It determines the shapes and sizes of human faces images. It detects facial features and ignores anything else, such as buildings, trees and bodies. Face detection segments the face area from the background. In the case of video, the detected faces may need to be tracked across multiple frames using a face tracking component. While face detection provides a coarse estimate of the location and scale of the face, face landmarking localizes facial. This may be accomplished by a landmarking module or face alignment module.

6 5. Movement detection. The process of confirming a change in the position of the subject relative to its surroundings or the change in the surroundings relative to an object. If the object is moving, it will be will detect and recognize as human. Otherwise, the system will ignore it as background images. 1.5 Project Importance The project importance is the advantages of the project to the community. The importance are: 1. Quick in fighting crimes. 2. Reduce the human intervention in monitoring. 3. Reduce cost in hiring workers. 4. Can be used as a new concept in attendance system. 1.6 Impact of commercialization and research advancement It can be commercialized as long as it brings more safety to the community and since it require less work, just the use of two hardware that is the IP camera and router to be implemented.

7 1.7 Progression Flowchart for PSM I Start Draft and proposal submitting Develop WLAN connection between IP camera and router Setting configurations No WLAN successful? Yes Develop coding for face detection Coding testing No Yes Thesis submitting for PSM I End

8 1.8 Progression Flowchart for PSM II Start Develop coding for face recognition No Coding testing Yes Developing the database Designing GUI for database Project testing Communicate well? No Yes Project finalization Thesis submitting End