Professional Documents
Culture Documents
Prepared for:
Dr. Henry G. Magat
Prepared by:
Garcia, Jessa Marie
Jordan, Ronel
Reyes, Eloisa
Villamater, Chelsea
Date of Submission:
December 13, 2013
Project Proposal
Page 1
TABLE OF CONTENTS
Title Page.......................................................................................................1
Transmittal Letter...........................................................................................3
Introduction
Purpose...............................................................................................4
Background..........................................................................................5
Scope...................................................................................................6
Discussion
Approach..............................................................................................8
Result...................................................................................................
Statement of Work...............................................................................
Resources
Personnel.............................................................................................
Facilities/Equipment.............................................................................
Costs
Fiscal...................................................................................................
Time....................................................................................................
Conclusion
Summary............................................................................................
Contact...............................................................................................
References
Project Proposal
Page 2
Page 3
Eloisa Reyes
Chelsea Villamater
1. Introduction
1.1 Purpose
The question, Can a machine recognize faces at least as well as human?, it
is a challenge that may have an impact in improving security system in well-defined
important places.
A human being can distinguish a persons face by his own unique and distinct
features varying for every individual. These facial features information are stored in
the human brain and will serve as base for the human to remember and recognize
the person if he/she will be seen again. Through the years of mans ingenuity certain
developments have been made and innovations are being introduced. One of these
is Face Verification System. The study aims to simulate this human process by
implementing a computer based system that will store facial features data of a face
image in a database and compare it with a recently captured image of the same
person.
FEU East Asia College Accounting and Registrar Office handles important
documents and perform sensitive transactions like accepting payments of tuition
fees, processing of transcript records, etc. Thus, more defined security measures are
needed. With this system assurance in every personnel will produce productivity in
Project Proposal
Page 4
terms of work ethics. It is where Facial Featured Detection and Verification must be
applied.
1.2 Background
Automated face recognition is an interesting computer vision problem with
many commercial and law enforcement applications. Researchers on this are date
back to early machine vision research in 1970s. However, face recognition is still an
area of active research since a completely successful approach or model has not
been proposed to solve the face recognition problem.
Automatic human face recognition, a technique which can locate and identify
human faces automatically in an image and determine who is who from a
database, is gaining more and more attention in the area of computer vision and
pattern recognition over the last two decades. There are several important steps
involved in this problem: detection, representation and identification. Based on
different representations, various approaches can be grouped into feature-based and
image-based. Feature-based approaches, especially those relying on geometrical
featured, represent the face as a multidimensional feature vector and determine the
identification by the Euclidean distance between different feature vectors. Imagebased approaches rely on the entire image, instead of some features. In its simplest
form, the face is represented as a 2D array of intensity values.
Project Proposal
Page 5
more reliable results than the feature-based approach (Balasuriya & Kodikara, May
2000)
1.3 Scope
The scope of the study was to design and implement a facial features
verification system that will serve as an additional security measure for the FEUEast Asia Registrar and Accounting Offices. Since technology is developing rapidly,
certain risks and threats to typical security systems are also improving. Threats like
technologically advance gadgets and techniques are used by modern criminals to
breach security. In order for security system to catch-up with these evolving threats,
additional security measures should be implemented in order to improve and tighten
the security system to counter these anti-security modern ways.
On the other hand, since the study is only an additional security measure, it is
subjected to many limitations. First to mention is that the system in only focused on
processing expressionless face images. Parameters that best describe an
expressionless face are as follows:
Project Proposal
Page 6
Project Proposal
Page 7
2. Discussion
2.1 Approach
START
Number
Database
Compare to the
Number Database
If an Input Employee Number = Number
Database
Template Matching
T
Enhance Image
If FaceGeometrical
Verification Features
Percentage <= 90%
Project Proposal
Face Database
The figure 1 shows the proposed flowchart for detecting face images. It starts with
the employee entering the username and password in the Graphical User Interface
window set by the administrator. If the system detects the correct username and
password, then the employee will be directed to the verification process proper. The
captured image will then undergo testing if it will be detected successfully or not.
Enhancement of image is used when there is a failure to detect the image at an
instant. This is done through the adjustment of contrast level and brightness of an
image. If the face verification is greater than or equal to 90%, the computer will
import the users profile from the database and export it in GUI window.
2.1.1 Face Verification
Over the last few decades many techniques have been proposed for face
recognition. Many of the techniques proposed during the early stages of computer
vision cannot be considered successful, but almost all of the recent approaches to
the face recognition problem have been creditable. According to the research by
Brunelli and Poggio all approaches to human face recognition can be divided into
two strategies:
geometrical features and template matching.
Project Proposal
Page 9
Project Proposal
Page 10
Page 11
Project Proposal
Page 12
The next step is to locate the vertical positions of the object [1] the eyebrows,
and object [2] the eyes and remove some noise or small black parts of the image by
an application function that find specified objects.
Figure
Filtered Image
Figure 7 Eyes
Located
When the eye template is
two parts, the left eye and the right eye as shown in Figure 8 respectively.
Figure 8
Project Proposal
Page 13
Figure 10
shows
the
separated
template that will serve as means to locate the eyeball on each eye by their
concentration of black pixels, then finding the midpoint of the columns black area to
verify the eyeballs vertical position. Thus, when located, their distance to each other
will be calculated, by getting the distance of the blackest
column and the boundary where they are previously connected. With the data of
each template retrieved, getting their summation of the eyeball distance is obtained.
Figure 10 Eyeball Distance
There
feature
is
an
to
improve
additional
the
geometrical feature which is detecting the correct alignment of the face by the left
and right eye.
2.1.2.3 Locating the Nose and the Mouth
Using the same method in locating the eyes, the nose and the mouth can be
cropped from the image. At some point, the nose can be sometimes not visible so
the program will adjust the threshold and the level of the image.
2.1.2.4 Illumination and Thresholding
In every image, lighting is not only the factor but also the face angle and
position with respect to light. The camera must have a feature that will maintain the
constant lighting so that the light reflected on the image is not bright nor dark.
2.1.2.5 Face Verification Using Geometric Features and Template Distance
Ratios
Distance ratio is used for verifying the eyeball distance to nose width, mouth
width to eyeball distance, nose width to mouth width, eye template vertical distance
Project Proposal
Page 14
to nose template to eye template vertical distance to the mouth, and eye template
vertical distance to the mouth
2.2 Result
During face detection, the data we are gathered are the eyeball distance,
nose width, lip width and their respective distances from each other. The distance
ratios of facial features from other facial features are used to calculate the data. With
the template method, it will provide the same facial feature distance ratio when it is
taken a different distance from the camera. Theres additional advantage of using
this method it makes the systems rejection rate lower since many faces, even
though do not look like the other, may share the same facial features distance ratios.
2.3 Statement of Work
2.3.1 System with Controlled Environment
The face verification system should be placed in an environment that would
give constant lightning conditions and make the face detection more reliable. It
should enclosed size of an average cabinet where the computer, fluorescent lamp
and other hardware are located and covered with a black cloth. And if this doesnt
work in some terms, the system therefore should be improved in terms of adapting to
the intensity of light to any kind of environment.
2.3.2 Distance Range and Height Elevation
The distance range of the face to the camera depends on the face size of the
image. And also, the height elevation should be based on producing satisfactory of
the face detection result. Figure 11 shows the distance between the cloth and the
webcam. The distance should be 30-40 inches for the best results during face
detection. Outside of this range, the black cloth may reflect light and cause an error
in face detection.
Figure 11 Distance Range
Project Proposal
Page 15
2.3.3 Angles
Figure
or
the
12
correct
position
of
the
face detection. It
Project Proposal
Page 16
2.3.5
and
Contrast
Setting
Calibration
Database
The software
Saving
requires an automatic
calibration of contrast
environment where is to be placed and the users skin colour. Once that face image
was being captured, the contrast setting function will be automatically adapted to the
environment.
For the data of the samples, they were stored in a Microsoft Access Database
format file (*.mdb). The input of the data in the database is manual, and can only be
done by the system administrator.
2.3.6 System Security Measures
The initial log-on window provides the first security measure of the system. It
triggers a sound alarm, if an intruder fails three consecutive times in logging in.
The secondary security measure of the system was the face detection and
verification part or GUI of the system. If an intruder successfully logs-in an account
and
tries the face detection and verification but fails three consecutive times, a sound
alarm would be triggered and his/her face image would be captures and be saved in
the database and would be recognized as an intruder image. The database, images
and
software location within the computer are locked by the system administrator of the
computer and can never be accessed by any individual who has not been granted
permission or authorization by the system administrator.
Project Proposal
Page 17
and
password
while
the
Page 18
Speaker
Keyboard
Black Cloth
Mouse
Web Camera
CPU
Fix Stand
Project Proposal
Page 19
Computer
MB (maximum)
Disk Space
For the image size, one sample data consists of three
images with size of 8 KB, total of 24 KB for each sample.
The program code file size is 100 KB.
The database which is 12 samples is 200 KB.
Web Camera
The image resolution is at least 2560x1920 pixels
resolution
Software
MATLAB or MATLAB Compiler
Microsoft Access
4. Costs
4.1 Fiscal
The suggested prices for the whole system are as follows:
1x 20 pin DisplayPort,
4x Hi-Speed USB 4 pin USB Type A
The size and quality of the displays is as big as the role of the quality of the
content of the image. This monitor has accurate colours straight out of the box
without the need to calibrate the monitor in depth. There are various preset modes
as well, which help in easily viewing content without the need for heavy calibration.
Speaker- P 3730
Dimensions: 72 101.6 mm (height diameter)
Frequency response: 100-20,000 Hz (+/- 3db within this
15 watt digital amplifier
Weight: 424 g
Keyboard and Mouse- P 1300
typing
6 hot keys for media control and Internet
access
1200 dpi BlueEye mouse with mini receiver
range)
CPU- P 25,700
Processor: Core i7
Memory size: 6GB/8GB
Processor Speed: 3.40
Hard Drive: 1TB/2TB
Network: Wireless LAN Data rate: 10/100/1,000M
(RJ-45 connector) Wireless LAN Type:
IEEE802.11b/g/n
4.2 Time
The total time needed in order to accomplish all the tasks will be
approximately three months. Table 1 shows the complete list of tasks to be
accomplished.
Table 1. Tasks to be accomplished per week.
Week
Tasks
1st
Creating the pseudo code and the flow chart of the program
2nd 4th
5th- 6th
7th- 8th
8th - 9th
10th 11th
11th 12th
5. Conclusion
5.1 Summary
Face Verification System is an advance technological transition in school. It
will improve the security of the Accounting and Registrars Office. Human Face
Verification approaches the two methods which are geometrical feature analysis and
template matching. Geometrical Features is a basis for face recognition even at very
low resolution and with noisy images although it has a disadvantage that automated
extraction of facial geometrical is very hard. On the other hand, template matching is
a strategy to extract the whole facial region and compare it with the second images
of known individuals. It is an acceptable device in detecting unauthorized person,
who will
illegally access the students documents and financial files of the school because of
higher percentage requirement for face verification.
This technical proposal will contribute to added security measure for the
school. This will ensure the capability to recognize authorized persons to be
evaluated to maintain an orderly access in the office. Other than that, it will serve as
a stepping stone for other young innovative system developers in the country to
improve the system for technological development of the industry.
However, there are problems that will incur in adopting this proposal. Face
verification with a wide scale of samples will not be a 100% reliable due to the
factors affecting the resolution of the image.
5.2 Contact
References:
Balasuriya, L.S. & Kodikara N.D.., (May 2000) Frontal View and Human Face
Detection and Recognition. Retrieved December 6, 2013 from
http://citeseerx.ist.psu.edu/viewdoc/download?
doi=10.1.1.138.4223&rep=rep1&ty pe=pdf
The Mathworks Inc. (1994-2013). Retrieved December 11, 2013 from
http://www.mathworks.com