Sei sulla pagina 1di 7

FACE RECOGNITION USING SOFT COMPUTING TOOLS:

A SURVEY

Aradhana D Dr. K.Karibasappa Dr. A. Chennakeshva


Department of computer Department of electronics Reddy
science, BITM, Bellary, & communication, DSCE, Department of
Karnataka, INDIA. Bangalore, Karnataka, Mechanical, JNTU,
aradhanabm@gmail.com INDIA. Hydrabad, INDIA.
k_karibasappa@hotmail.com ack_reddy@gmail.com

ABSTRACT
The face recognition becomes one of the challenging areas for the researchers
in recent years. This paper provides an up-to-date review of human face
recognition using soft computing tools. We first present an overview of face
recognition and its applications & a brief note of soft computing tools. Next a
literature review of the most recent face recognition techniques, combined
techniques of soft computing discussed. And finally paper ended with
conclusion.

Keywords: Neural Networks, Genetic Algorithm, Fuzzy logic.

1 INTRODUCTION benefit of being a passive non intrusive system to


verify personal identify in a “natural” and friendly
Face recognition is one of the most wide way. In general, biometric devices can be explained
area pattern recognition & computer vision due to with a there step procedure (1) a sensor takes an
its numerous practical applications in the area of observation. The type of sensor and its observation
Biometrics, Information security access control,
depend on the type of biometric devices used. This
Law enforcement, smart cards and surveillance
system. observation gives us a “Biometric signature of the
A formal method of classifying faces was individual. (2) a computer algorithm “normalizes”
first proposed in [1]. The author proposed the biometric signature so that it is in the same
collecting facial profiles as curves, finding their formal as the signatures on the system’s database.
norm, and then classifying other profiles by their The normalization of the biometric signature’ gives
deviations from the norm. This classification is us a “normalized signature” of the individual (3).
multi modal, i.e. resulting is a vector of
A matcher compares the normalized signature with
independent measures that could be compared with
other vector in a database. the set of normalized signatures on the system’s
In the literatures, face recognition problem database and compares the individual’s normalized
can be formulated as static (still) or video images signature set.
of a scene, identify or verify one or more persons in Face recognition starts with the detection
the scene by comparing with faces stored in a of the face patterns in sometimes cluttered scenes,
database. proceeds by normalizing the face images to account
Face Recognition is a biometric approach for geometrical & illumination changes, possibly
that employs automated methods to verify or using information about the location & appearance
recognize the identity of a living person based on of facial landmarks, identifies the faces using
his /her physiological characteristics. In general, a appropriate classification algorithms & post
biometric identification system makes use of either processes the results using model-based schemes &
physiological characteristics (such as a finger print, logistic feedback .
palm, iris pattern of face) or behavior patterns The application of face recognition
(such as hand writing, voice, or key-stroke pattern) technique can be categorized into two main parts:
to identify a person. Face recognition has the law enforcement application and commercial
application. Face recognition technology is In this approach color image converted to
primarily used in law enforcement applications, into gray scale image. The normalization is
especially mug short (static matching) and performed by mapping the facial features to some
surveillance (real time matching by video image fixed locations in an MXN image. The face image
sequences). may be of poor contrast because of the limitations
The commercial application range from of the lighting conditions. So histogram
static matching of phonographs’ on credit cards, equalization is used to compensate for the lighting
ATM cards, passports, driver’s license and photo conditions & improve the contrast of the images.
ID to real time matching with still images or video Various sources of noise may exist in the input
images sequences for access control, Each image. The fine details of the image represent high
application presents different constraints in terms frequencies which mix up with those of major of
of processing. noise pewit filter is used to suppress.
All face recognition algorithms consistent The Genetic algorithm is a stochastic
of two major parts; 1) Face detection and search method based on the mechanics of natural
normalization and 2) face identification. selection & genetics analogous to natural evolution.
Algorithms that consist of both parts are referred to The algorithm starts with an initial set of random
as fully automatic algorithms & those that consist solutions called population. Each individual in the
of only the second part are called partially population, known as chromosome, represents a
automatic algorithms. Partially automatic particular solution of the problem. Each
algorithms partially automatic algorithm are given chromosome is assigned a fitness value depending
a facial image & the coordinates of the centre of on how good its solution of the problem. Each
eyes. Fully automatic algorithms are only given chromosome is assigned a fitness value depending
facial images. among how good its solution to the problem is after
Face recognitions are also done by using the fitness allotment, the natural selection is
some of soft computing tools there are many soft executed and the survival of the fittest chromosome
computing tools in that fuzzy logic , NN, GA, can prepare to breed for the next generation. A new
various approaches to face detection & facial population is then generated by means of genetic
features extraction. Many different approaches are operations: cross –over & mutation. This evolution
reported ranging from the geometrical description process is iterated until near-optimal solution is
of salient facial features of the expansion of obtained or a given number of generations are
digitized images of the face on appropriate basis of reached.
images. Different techniques have been introduced The fitness of a chromosome is defined as
recently such as neural networks, genetic the function of the difference between the intensity
algorithms, fuzzy logic, wavelet transform and value of the input image and that of the template
soon. All these are also called soft computing tools. image measured for the expected location of the
chromosome. I.e. for each chromosome n, fitness
2 FACE RECOGNITION USING SOFT function is defined as
COMPUTING TOOLS ( , ) ∑∈ | ( , ) , ( , )
( ) = 1−

2.1 Genetic algorithm


Where Bmax is the maximum brightness of the
Genetic algorithms belong to a class of
numbers of pixels in the horizontal and vertical
stochastic search method represented by natural
directions of the template images, f & fn,t are the
population genetics. The GA’s have been employed
intensity values of the original images and the
in a wide variety of problems related to pattern
template image when it is justified for the n –th
recognition, image processing, medical image
position of the chromosome respectively. Selection
registration image segmentation, contour
operator is a process in which chromosome are
recognition and so on.
selected in to a matching pool according to their
In face recognition using Genetic algorithms, first
fitness function.
Genetic search used to detect human face in a
Crossover operator randomly chooses a
complex background. Face detection is achieved by
crossover point where two parent chromosomes
employing template matching between a known
break and then exchanges the chromosome parts
face image & the input image.
after that point. Produce two off-springs from two
parent chromosomes. With the cross over successively larger features in a hierarchical set of
probability exchange parts of the two selected layers and provides partial invariance to translation,
chromosomes & create two offspring. Mutation, rotation, scale, and deformation. The authors
which is rare in nature, represents a change in the reported 96.2% correct recognition on ORL
gene and aids us in avoiding loss of genetic database of 400 images of 40 individuals.
diversity. Its role is to provide a guarantee that the The classification time is less than 0.5
search algorithm is not trapped on a local optimum. second, but the training time is as long as 4 hours.
The effectiveness and robustness of the Probabilistic decision-based neural network
algorithm is justified using different images with (PDBNN) can be applied effectively to 1) face
various kinds of expressions. When a complex detector: which finds the location of a human face
image is subjected in the input, the face detection in a cluttered image, 2) eye localizer: which
result highlights the facial part of the image. The determines the positions of both the eyes in order to
system can also cope with the problem of partial generate meaningful feature vectors, and 3) face
occlusions of mouth & wearing sunglasses images recognizer PDNN does not have fully connected
of different persons are taken at their own places network topology. Instead, it divides the network
and at different environments both in shiny & into K subnets. Each subnet is dedicated to
gloomy weather. The algorithm is capable of recognize one person in the database. PDNN uses
detecting single face in an image. A total of 150 the Gaussian activation function for its neurons,
images, including more than 80 different persons and the output of each “face subnet” is the
are used to investigate the capacity of the proposed weighted summation of the neuron outputs. In
algorithm. Among them only 2 faces are found other words, the face subnet estimates the
false. Experimental results demonstrate that the likelihood density using the popular mixture of
success rate of approximately 99% is achieved. The Gaussian model. Compared to the AWGN scheme,
main reason behind the failure of those images in mixture of Gaussian provides a much more flexible
finding face regions is the occlusion. and complex model for approximating the time
likelihood densities in the face space.
2.2 Neural Networks The learning scheme of the PDNN
consists of two phases, in the first phase; each
The attractiveness of using neural subnet is trained by its own face images. In the
networks could be due to its non linearity in the second phase, called the decision-based learning,
network. Hence, the feature extraction step may be the subnet parameters may be trained by some
more efficient than the linear Karhunen-Loeve particular samples from other face classes. The
methods. One of the first artificial neural networks decision-based learning scheme does not use all the
(ANN) techniques used for face recognition is a training samples for the training. Only
single layer adaptive network called WISARD misclassified patterns are used. if the sample is
which contains a separate network for each stored misclassified to the wrong subnet, the rightful
individual. The way in constructing a neural subnet will tune its parameters so that its decision-
network structure is crucial for successful region can be closer to the misclassified sample.
recognition. It is very much dependent on the PDBNN-based biometric identification
intended application. For face detection, multilayer system has the merits of both neural networks and
perception and convolution neural network have statistical approaches, and its distributed computing
been applied. For face verification is multi- principle is relatively easy to implement on parallel
resolution pyramid structure. In Proposed a hybrid computer. It was reported that PDBNN face
neural network which combines local image recognizer had the capability of recognizing up to
sampling, a self-organizing map (SOM) neural 200 people and could achieve up to 96% correct
network, and a convolution neural network. The recognition rate in approximately 1 second.
SOM provides a quantization of the image samples However, when the number of persons increases,
into a topological space where inputs that are the computing expanse will become more
nearby in the original space are also nearby in the demanding. In general neural network approached
output space, thereby providing dimension encounter problems when the number of classes
reduction and invariance to minor changes in the (i.e. individuals) increases. Moreover, they are not
image sample. The convolution network extracts suitable for a single model image recognition test
because multiple model images per person are cases failures were due to subjects wearing
necessary in order for training the systems to spectacles.
“optimal “parameter setting.
3.2 Eigen faces and Neural Networks.
3 COMBINED SOFT COMPUTING TOOLS Eigen faces has bee applied to extract the basic
face of the human images. Unique features of
3.1 Based Neural Networks & fuzzy logic human faces are extracted by using Eigen faces.
A face recognition system developed by The features vector can be used to identify an
neural networks & fuzz logic technique which unknown face by using the back propagation of
gives improved & lower parts of the human face neural network that user Euclidean distance for
feature is extracted for the face recognition process. classification & recognition. The Eigen’s faces
Different weight ages are given more weight age including implemented Jacobi’s method for Eigen
than the lower face features by using a fuzzy logic values and Eigen vectors has been performed. The
technique. This system has been proven effective in classification & recognition using back propagation
developing a security system with high recognition neural N/W showed impressive result to classify
rate for different human facial expressions. face images.
The Neural Network training is performed With the experiment, it shows that more
is offline mode & the trained upper & lower – face images, the Eigen faces become more whitening.
neural network are then employed in face Means, lesser images make the Eigen faces become
recognition mechanism during online recognition darker & indistinct.
mode. The Eigen faces used for each training images
In neural N/w training mode, acquisition & unknown images to determine its weight vectors
of a suitable face image is essential to train neural to describe class identify. These features are used
N/W that can characterize the user satisfactorily. for classification & recognition the unknown
There areas of interest on the face are used for human face.
neural N/W training upper face, lower face & eye. The back propagation neural network is used
A frame is divided into upper half & lower half. for the classification & networks 16 patterns are
For eye extraction a frame is used. In neural N/W used 8 inputs per-pattern, 5 hidden neurons, 3
training head detector & eye detector are done output neurons, 0.9 for momentum, 0.7 for learning
automatically in on-line. Spatial preening has been rate & the error were set to 0.001 for stopping
used to locate eye. Face rotation mapping is done condition.
for tilled image in this upper face. In the recognition, the identity of human face
A trained upper & lower face neural N/W is less than error (0.001). If entire training pattern
determines the recognition level associated with the used then recognition is very is performance high.
upper face & lower face of a given image If only one image is used than performance is
respectively the fuzzy system acts as the final decreases. How ever, when face images with
decision making stage by utilizing the recognition different pose are added in learning step, the
level information provided by the upper-face & recognition rate increase.
lower face neural networks.
In the recognition process, the fuzzy system 3.3 Genetic Algorithm and Neural Network
fuzzifies the recognition leveled from both the Feature selection & classification technique for
upper—face & lower face neural n/w by using the face recognition on using genetic algorithms &
input membership functions. Subsequently, the artificial neural networks.
fuzzified inputs are processed by an inference The Genetic algorithm & Artificial neural
engine in which the fuzzy system determines the network based technique is used to identify the
authority of a given image by means of well- significant areas in each facial region & perform
defined fuzzy sets and they are given in a form of fusion & selection of features for face recognition.
fuzzy associative namely Genetic algorithm is used to find potential
Tests are done for authorized & unauthorized significant features which will generate higher
faces. A system recorded 94% success for recognition rate. The areas represent the possible
authorized & 92 %.* success for unauthorized selection of the significant features. Each
chromosome is multiplied by the input features set
to generate the input feature vector to Artificial [5] M. Turk and A. Pentland. Eigen faces for
Neural Networks. The input features vector fed to recognition. Journal of Cognitive Neuroscience,
Artificial Neural Networks for classification. Back 3(1):71-86, Mar.1991.
propagation algorithm is used to train the network.
[6] W. Zhao, R. Chellappa, P.J. Phillips and A.
The testing classification error is used to calculate
the fitness of corresponding individual in Genetic Rosenfeld, “Face Recognition: A Literature
Algorithm. In the reproduction, the fittest Survey”, ACM Computing Surveys, vol. 35, no. 4,
individual that achieves the best testing pp 399-458, Dec 2003.
classification rate is retained in the next generation.
The chromosomes in each generation of genetic [7] D. J. Kim and Z. Bien, “Design of
Algorithm that achieve the best classification rate “Personalized” Classifier Using Soft Computing
are recorded. All the features are ranked according Techniques for “Personalized” Facial Expression
to how many times it has been selected. The areas Recognition,” IEEE Trans. on Fuzzy Systems, vol.
that contain the features inside top n ranking are the 16, no. 4, pp. 874-885, Aug. 2008.
top n significant areas.
The Genetic Algorithm and Artificial Neural [8] K. C. Kwak and W. Pedrycz, “Face recognition
The best testing classification rate is improved to using a fuzzy fisherface classifier,” Pattern
94% when compared with other methods the Recognition, vol. 38, pp. 1717-1732, 2005.
recognition rate is improved by 1.3% compared to
KAM, 36% compared to ARENA method, on data [9] W. Yang, H. Yan, J. Wang and J. Yang, “Face
set containing 3 images or class for training, It recognition using complete Fuzzy LDA,” Face
improved the recognition rate further when 4 or recognition using Complete Fuzzy LDA,” in Proc.
more images per class were used . 19th Int. Conf. on Pattern Recognition 2008, pp. 1-
4, Dec. 2008.
4 CONCLUSION
[10] Curran, K., X. Li, et al. (2005). "Neural
We conclude that soft computing tools are network face detection." Imaging Science Journal,
more effective in recognizing the face. With the 53(2): 105-115.
comparative result analysis, combined soft
computing tools are more accurate in face [11] Rowley, H. A., Baluja, S. and Kanade, T.
recognition. (1998). "Neural network-based face detection."
Pattern Analysis and Machine Intelligence, IEEE
5 REFERENCES Transactions on 20: 23-38.

[12] T.Kawaguchi, M.Rizon & T.Kunihiro,” A


[1] Anil.K.Jain, ArunRoss, and Salil Prabhakar, Face Recognition System Using Template
“An Introduction to Biometric Recognition” IEEE Matching and Iris Detection”, Proceedings of the
Transaction on circuits and systems for video IASTED International Conference Signal And
technology vol 14,no 1, jan 2004. Image Processing, 2001, pp.298-303.

[2] T. kanadae, Picture processing by computer [13] R. Brunelli and T. Poggio, “Face recognition:
complex and recognition of human faces, PhD Features vs. Templates” IEEE Trans. Pattern Anal.
Mach. Intel., vol. 15, no.10, pp. 1042–1053, Oct.
thesis kyolo university.
1993.

[3] Ahmad Fadzil.M.H., Lim Cheach Choon,”Face [14]. Goldberg, D.E., “Genetic Algorithms in
Recognition System Based on Neural Networks Search, Optimization and Machine Learning”,
and Fuzzy Logic”, IEEE 1997. Pearson Education, Singapore, 2002.

[4] Local feature based 3d face recognition. In [15]. S. Rajasekaran & G.A. Vijayalakshmi Pai,
Audio and Video-based Biometric Person “Neural Networks, Fuzzy Logic and Genetic
Authentication, 2005 International Conference on, Algorithms” Prentice-Hall of India Private Limited,
LNCS, volume 3546, pages 909–918, 2005. 2003.
[16] Face Recognition: A Convolution Neural
Network Approach Steve Lawrence, C. Lee
Giles1yz, Ah Chung Tsoi, Andrew D. Back, IEEE
Transactions on Neural Networks, Special Issue on
Neural Networks and Pattern Recognition, Volume
8 Number 1, pp.98–113, 1997.

[17] R. Chellappa, C. L.Wilson, and S. Sirohey,


“Human and machine recognition of faces: a
survey,” in Proc. IEEE, vol. 83, no. 5, pp. 705–740,
May 1995.

[18] Curran, K., X. Li, et al. (2005). "Neural


network face detection." Imaging Science Journal,
the 53(2): 105-115.

[19] K. C. Kwak and W. Pedrycz, “Face


recognition using a fuzzy fisherface classifier,”
Pattern Recognition, vol. 38, pp. 1717-1732, 2005.

[20] W. Yang, H. Yan, J. Wang and J. Yang, “Face


recognition using complete Fuzzy LDA,” Face
recognition using Complete Fuzzy LDA,” in Proc.
19th Int. Conf. on Pattern Recognition 2008, pp. 1-
4, Dec. 2008.

Potrebbero piacerti anche