Sei sulla pagina 1di 35

This project is entitled as Face Recognition in Various

Application is based on Security and authentication of a person


is a crucial part of any industry. There are many techniques used
for this purpose. One of them is face recognition. Face
recognition is an effective means of authenticating a person. The
advantage of this approach is that, it enables us to detect changes
in the face pattern of an individual to an appreciable extent. The
recognition system can tolerate local variations in the face
expression of an individual. Hence face recognition can be used
as a key factor in crime detection mainly to identify
criminals.
There are several approaches to face recognition of
which Principal Component Analysis (PCA) and
Neural Networks have been incorporated in our project.
The system consists of a database of a set of facial
patterns for each individual. The characteristic features
called Eigen faces are extracted from the stored
images using which the system is trained for
subsequent recognition of new images.
Face is a complex multidimensional visual model and
developing a computational model for face recognition is
difficult.
Facial recognition systems are computer-based security
systems that are able to automatically detect and identify
human faces.
These systems depend on a recognition algorithm. Principal
Component Analysis (PCA) is a statistical method under the
broad title of factor analysis .
Less accurate
It does not deal with biometric characteristics.
We propose a linear approach, called linear discriminate
analysis (LDA), for face recognition.
The transformed probe image is then matched with the gallery
images which displayed.
Neural Networks is used to increase reliability and offer a
accurate match are used as inputs for positive values variations
.
New test image is taken for recognition (from test dataset) and
its face descriptor is calculated from the Eigen faces found
before.
Processor : Pentium IV processor
Ram : 512 Mb
Hard Drive : 10GB
Keyboard : 104 Keys
Capturing Device : Web Camera
Operating System : Microsoft Windows XP
Front end : Net Beans
Program Language : Java
Back end : My SQL
The modules are
Authentication

Face recognition

Comparison

Bank application
This form shows about the file option
The Java programming language is a high level
language that can be characterized by all the
following buzzwords like
Integrated
Architecture
Simple
Dynamic
Secure
Object oriented
High performance
Robust
Net beans IDE provides java developers with
all tools needed to create professional desktop,
mobile and enterprise applications. The IDE
provides wizards and templates to let you create
java EE .A variety of technologies and frameworks
are supported out of the box. You can use wizards
and templates to create application that use OSGI
framework or net beans model system as a basic of
modular application.
My SQL is a relational database management
system that runs as a server providing multi-user
access to a number of databases.
My SQL is officially pronounced My Sequel.
It is named after developer Michael Widenius' .
The SQL phrase stands for Structured Query
Language.
The My SQL development project has made its
source code available.
Unit testing, also known as component testing,
refers to tests that verify the functionality of a
specific section of code, usually at the function
level .In an object-oriented environment, this is
usually at the class level, and the minimal unit
tests include the constructors and destructors.
Integration testing is any type of software testing
that seeks to verify the interfaces between
components against a software design.
Software components may be integrated in an
iterative way or all together.
It is focused on the functional requirements of the
software.
It is a complementary approach that is likely to
uncover a different class of errors than White Box
methods.
In this project, Face recognition is more effective since
the facial biometrics use more points on the face to match a
person. In addition to, by the use of LDA algorithm the
recognition can be more effective. Using this type of
algorithm the technique can be applied for a wide variety of
recognition problems.
The algorithm can be implemented over large confidential
organizations in order to protect the data and access from the
unauthorized individuals. The organization with this project
facility can greatly enhance in the field of security and the
unauthorized person can be easily identified and punished.
S. Z. Li and A. K. Jain, Eds. Handbook of Face
Recognition. 2nd Edition,Berlin, Germany: Springer,
2011 (ISBN 978-0-85729-931-4).
P. J. Phillips, P. J. Flynn T. Scruggs, K. W. Bowyer, J.
Chang, K.Hoffman, J. Marques, J. Min, and W. Worek,
Overview of the face recognition grand challenge, in
Proc. IEEE Compute
W. Zhao, R. Chellapa, P. J. Phillips, and A. Rosefeld,
Face recognition: A literature survey, J. ACM
Compute. Survey, vol. 35, pp. 399458, Dec. 2003.
www.NetBeans.in
www.w3schools.com
www.123netbeans.com
www.java.com

Potrebbero piacerti anche