Recent Advances in Applied & Biomedical Informatics and Computational Engineering in Systems Applications

Similar documents
Select source Click the Bio Settings button to modify device settings. Select Fingers Use Ctrl+Left mouse button to select multiple fingers to scan.

TEST PATTERNS COMPRESSION TECHNIQUES BASED ON SAT SOLVING FOR SCAN-BASED DIGITAL CIRCUITS

Broken Wires Diagnosis Method Numerical Simulation Based on Smart Cable Structure

Distortion Analysis Of Tamil Language Characters Recognition

SMART VEHICLE SCREENING SYSTEM USING ARTIFICIAL INTELLIGENCE METHODS

Music Information Retrieval with Temporal Features and Timbre

A Hybrid Model of Painting: Pictorial Representation of Visuospatial Attention through an Eye Tracking Research

Paulo V. K. Borges. Flat 1, 50A, Cephas Av. London, UK, E1 4AR (+44) PRESENTATION

IMIDTM. In Motion Identification. White Paper

Exploring the Rules in Species Counterpoint

ENGINEER AND CONSULTANT IP VIDEO BRIEFING BOOK

Analysing Musical Pieces Using harmony-analyser.org Tools

Chord Classification of an Audio Signal using Artificial Neural Network

2. Problem formulation

Reconstruction of Ca 2+ dynamics from low frame rate Ca 2+ imaging data CS229 final project. Submitted by: Limor Bursztyn

DISTRIBUTION STATEMENT A 7001Ö

Title of Paper, size 18 NTR * font

ANALYSIS OF SOUND DATA STREAMED OVER THE NETWORK

ECE Real Time Embedded Systems Final Project. Speeding Detecting System

Digital holographic security system based on multiple biometrics

EyeFace SDK v Technical Sheet

Hidden Markov Model based dance recognition

INTRODUCTION OF INTERNET OF THING TECHNOLOGY BASED ON PROTOTYPE

A Design Approach of Automatic Visitor Counting System Using Video Camera

A STUDY ON THE DEVELOPMENT OF THE DEDICATED OBU 1 FOR THE HANDICAPPED PERSONS USING HI-PASS 2 SYSTEM

Music Source Separation

Biometric Voting system

Handwriting Analysis, Forgery, and Counterfeiting. Forensic Science Chapter 10

Bar Codes to the Rescue!

From One-Light To Final Grade

VBM683 Machine Learning

Interlace and De-interlace Application on Video

TITLE OF CHAPTER FOR PD FCCS MONOGRAPHY: EXAMPLE WITH INSTRUCTIONS

Upgrading E-learning of basic measurement algorithms based on DSP and MATLAB Web Server. Milos Sedlacek 1, Ondrej Tomiska 2

UniVision Engineering Limited Modpark Parking System Technical Description. Automatic Vehicle Access Control by Video Identification/

NEW APPROACHES IN TRAFFIC SURVEILLANCE USING VIDEO DETECTION

Smart Traffic Control System Using Image Processing

Identifying Table Tennis Balls From Real Match Scenes Using Image Processing And Artificial Intelligence Techniques

Quality Control Experiences from a Large-Scale Film Digitisation Project

Fast MBAFF/PAFF Motion Estimation and Mode Decision Scheme for H.264

Iris-Biometric Fuzzy Commitment Schemes under Signal Degradation

Comparison Parameters and Speaker Similarity Coincidence Criteria:

DEEP REPRESENTATIONS FOR IRIS, FACE, AND FINGERPRINT SPOOFING DETECTION A. VIJAYA LAKSHMI 1, S. RANJITH 2

Deep Search Cannot Communicate Callsigns

White Paper ABC. The Costs of Print Book Collections: Making the case for large scale ebook acquisitions. springer.com. Read Now

Universität Bamberg Angewandte Informatik. Seminar KI: gestern, heute, morgen. We are Humor Beings. Understanding and Predicting visual Humor

Avoiding False Pass or False Fail

Fingerprint Verification System

A COMPARATIVE STUDY ALGORITHM FOR NOISY IMAGE RESTORATION IN THE FIELD OF MEDICAL IMAGING

Identification of Motion Artifact in Ambulatory ECG Signal Using Wavelet Techniques

BIBLIOGRAPHIC DATA: A DIFFERENT ANALYSIS PERSPECTIVE. Francesca De Battisti *, Silvia Salini

Focused Ion Beam System MI4050

A HIGHLY INTERACTIVE SYSTEM FOR PROCESSING LARGE VOLUMES OF ULTRASONIC TESTING DATA. H. L. Grothues, R. H. Peterson, D. R. Hamlin, K. s.

Delta Journal of Education 1 ISSN

Auto classification and simulation of mask defects using SEM and CAD images

Problem. Objective. Presentation Preview. Prior Work in Use of Color Segmentation. Prior Work in Face Detection & Recognition


Delta Journal of Education 1 ISSN

IDENTIFYING TABLE TENNIS BALLS FROM REAL MATCH SCENES USING IMAGE PROCESSING AND ARTIFICIAL INTELLIGENCE TECHNIQUES

CMS Upgrade Activities

@ Massachusetts Institute of Technology All rights reserved.

EEG Eye-Blinking Artefacts Power Spectrum Analysis

IMPROVING VIDEO ANALYTICS PERFORMANCE FACTORS THAT INFLUENCE VIDEO ANALYTIC PERFORMANCE WHITE PAPER

Quick Start Bruker Dimension Icon AFM

Comparative Study on Fingerprint Recognition Systems Project BioFinger

OPTIMIZING VIDEO CLIPS IN EDUCATIONAL MATERIALS

Create an Industrial 3D Machine Vision System using DLP Technology

QUESTIONS AND LOGICAL ANALYSIS OF NATURAL LANGUAGE: THE CASE OF TRANSPARENT INTENSIONAL LOGIC MICHAL PELIŠ

Automatic Commercial Monitoring for TV Broadcasting Using Audio Fingerprinting

The modern and intelligent CCTV (written by Vlado Damjanovski, CEO - ViDi Labs,

Accepted Manuscript. A new Optical Music Recognition system based on Combined Neural Network. Cuihong Wen, Ana Rebelo, Jing Zhang, Jaime Cardoso

Security in digital cinema

Laser coding still the technology of choice for the Pharma industry

A Parametric Autoregressive Model for the Extraction of Electric Network Frequency Fluctuations in Audio Forensic Authentication

DISPLAY WEEK 2015 REVIEW AND METROLOGY ISSUE

(12) United States Patent

M4000 Diagnostic Test System For Power Apparatus Condition Assessment

The software concept. Try yourself and experience how your processes are significantly simplified. You need. weqube.

THE INTERNET OF VISION ENABLED THINGS. Tom Brennan Artemis Vision

NDIA Army Science and Technology Conference EWA Government Systems, Inc.

Qs7-1 DEVELOPMENT OF AN IMAGE COMPRESSION AND AUTHENTICATION MODULE FOR VIDEO SURVEILLANCE SYSTEMS. DlSTRlBUllON OF THIS DOCUMENT IS UNLlditEb,d

Promotion Package Pricing

EXPERIMENTS WITH THE ACTIVE VIBRATION CONTROL OF A CANTILEVER BEAM

System Quality Indicators

Melodic Pattern Segmentation of Polyphonic Music as a Set Partitioning Problem

The effect of training data selection and sampling time intervals on signature verification

InSync White Paper : Achieving optimal conversions in UHDTV workflows April 2015

Type-2 Fuzzy Logic Sensor Fusion for Fire Detection Robots

GLI-12 V1.1 GLI 12 V2.0

Research Article Design and Analysis of a High Secure Video Encryption Algorithm with Integrated Compression and Denoising Block

Lip Sync of Audio/Video Distribution and Display

SURVIVAL OF THE BEAUTIFUL

SIL-2 8-Ch Analog Input Series Thermocouple, High Level, Low Level

Lyrics Classification using Naive Bayes

V9A01 Solution Specification V0.1

Supervision of Analogue Signal Paths in Legacy Media Migration Processes using Digital Signal Processing

International Journal of Advance Engineering and Research Development REMOTE VOTING MACHINE

Module 3: Video Sampling Lecture 16: Sampling of video in two dimensions: Progressive vs Interlaced scans. The Lecture Contains:

Data Mining in Medical Analysis and Performance Evaluation

ADC Peripheral in Microcontrollers. Petr Cesak, Jan Fischer, Jaroslav Roztocil

Transcription:

NEURAL NETWORK FACE IDENTIFICATION DAVID MALANIK, ROMAN JASEK Department of Informatics and Artificial Intelligence Tomas Bata University in Zlin Nad Stráněmi 4511, 760 05 Zlín CZECH REPUBLIC {dmalanik;jasek}@fai.utb.cz Abstract: - The identification of peoples represents the actual problem of this World. The problem is the methods for contact-free or extremely user-friendly methods. The potential solutions of this problem are based on the method, that doesn t require the direct contact. This paper deals with the face identification method. These methods have a marginal problem with the quality of the tested sample. The quality might be repaired with the neural network. Key-Words: - Neural networks, Hopfield, Face detection, Identification, Biometric. 1 Introduction The problem of identification represents very important issue of the present World. There is potentially danger which flowing from the current World situation. The identification systems might detect any people identities inside the specific area. The place might be an airport or some government building. The problem of the contact-free face identification for a long range is the quality of the identification samples. The next potentially problem might be represented by the different age of the identification people. These factors could limit the commonly used comparison methods [1]. 2 Problem Formulation The problem of the face identification is inside the quality of the picture and the age of source sample. These both problems are based on the pictures. The scanning methods have their own limits in quality of pictures and the second problem might be in patterning of the source data. The captured picture must be adapted to specific position and size. The identification figure or picture must be in the correct direction and must have the same size. The resizing and direction correcting is quite difficult. The marginal role plays the problem of quality. The contact free identification based on the face identification is popular in the places with the high movement or high density of people [2]. The best examples might be the public part of airports, a government meetings and a public celebration. 2.1 Quality of scanning/capturing There are many factors, which limited the quality of captured picture of the face. The commonly described factor is the factor of environment [3]. The external environment might be affected by nature. The rain or the fog might produce the less quality of the face picture. The authentication method must repair these pictures before the authentication method might continue with the verification or identification of these people. The picture with the upper described deformation represents the Fig. 1. Fig. 1 - low quality face picture The low quality picture might provide the false identification of approved people or the positive identification of non-certificated people. These ISBN: 978-1-61804-028-2 129

false identifications might affect the security steps. The face identification without any repair functions miss affects the identification. This paper describes the one the possible methods for reconstruction face identification picture with the self-repair neural network. Next parts will describe the procedures for improvement of the picture quality. The paper includes the test results from described solution. 3 Neural network reconstruction and identification The neural network represents the huge potential of availabilities, which might help us with many problems inside the security branch. There are many types of networks. Some of these networks have very specific abilities. The most interesting ability is the package with selfrepaired function. The one of the most popular self-repaired neural networks is The Hopfield neural network [4,5]. The basic structure of this network is on Fig. 2. face from the gray-scale or monochromatic picture [7]. The typical characteristics are the measurement of the eye position, position of nose, the size of nose, lips etc. Each of these measure-based methods required the picture of searched face [7]. Each of these algorithms deals with the quality of source with other methods and principles. 3.2 Hopfield network construction The neural network for the picture reconstruction is based on the Hopfield neural network. The testing samples were pictures of 6 different faces. There were some woman s faces and some man s faces captured from different positions. These faces are shown on Fig. 3. Fig. 3 - Source faces Fig. 2 - The Hopfield network structure [5] The network tries to repair the damaged source to one of the known originals. The Hopfield network might repair only the previously learned samples. 3.1 The human face The human face represented the complex biometric system for identification. The usability is done with the easy contact-free identification methods. For the user identification based on the specific face characteristics are used many methods [6]. The biometric system can detect and identify the The neural network contained 2500 neurons. Each neuron represented the one pixel of source image. The next step was learned the network with these 6 samples. The result from the learning has this description "Continuous Hopfield model for pattern vectors with 2500 components. Created 2011-5-4 at 15:35. Type of neuron: SaturatedLinear. 3.3 Face reconstruction The next step was producing the images with the lower quality. There was used a noise for simulation the nature problems such as the rain, the fog and the limited visibility. The level of noises was changed in interval <0.20;0.95>. The testing procedure contains the learned neural network (network was learned with the samples of faces). These experiments were ISBN: 978-1-61804-028-2 130

realized 10 times and the followed picture represents the outputs from the reconstruction. The Fig. 4 represents the very weak noise. The noise does not affect each sample. Some samples are still relatively clear and processing system might identify it. Fig. 6-40% of noise Fig. 4-20% of noise The reconstruction in the Fig. 7 shows, that the neural network might repair these damaged samples to the original state. The Fig. 5 represents the reconstructed picture from the neural network. These reconstructed samples are the same that the source samples. Identification is quite simple in this case. Fig. 7-40% of noise - reconstruction Fig. 5-20% of noise - reconstruction The next figure describes the samples with 40% of the noise. This level made marginal changes in some samples, especially the first and the second from the left in the second line. The identification of these samples is quite complicated, because samples lost some of their biometric characteristics. The Fig. 8 shows the medium level of the noise, the noise is at 60% level at this figure. The source samples are damaged and the human operator does not recognize the original samples. The pixel comparison method does not work, because the samples lost to much biometric identification markants [7]. The pictures are damaged. ISBN: 978-1-61804-028-2 131

repairs well, but there were false positive identification of sample. The second sample from the bottom right was identifying as the same that was second sample from the top left on the Fig. 11. This might provide the false positive identification of sample that does not approved for this area/work. Fig. 8-60% of noise The result from the neural network repair procedure is shown on the Fig. 9. The network can repair the original samples with extremely accuracy. The pictures were rebuilder to their original state. The identification system might analyse these samples and provide the positive or negative identification of selected peoples. The huge potential of the neural network selfrepair function is represented by these results. Fig. 10-80% of noise Fig. 11-80% of noise - reconstruction Fig. 9-60% of noise - reconstruction Next figures, starting with the Fig. 10 are not applicable for user identification. The level of damage is too high and perception of false positive identification rising marginally. The next figures represented only the ability of selfrepaired in extreme point of view. The Fig. 12 represents the potential limit for the neural network self-repair function. There are 2 damaged samples. The first sample from the top right is deformed and combined with other. The sample received some characteristics from the other one. So as the Fig. 13 shows, some samples are still reconstructing able and usable for identification. But the potential risk of false or positive identification is marginal. The Fig. 10 represents the samples with 80% of noise and the result from the neural network repairing. The less complicated samples were ISBN: 978-1-61804-028-2 132

Fig. 14-95% of noise Fig. 12-90% of noise Fig. 15-95% of noise - reconstruction Fig. 13-90% of noise - reconstruction The Fig. 15 represents the result; where is 3 maybe 4 false positive identifications. As it shown on the Fig. 15, there are 4 samples reconstructed to the one original. The figure contains 4 woman s faces with the same characteristics and 2 man s faces, but one of the man s samples is huge deformed. 4 Conclusion The previously shown results represent the ability and function of the neural network for the image processing and reconstruction. The reconstruction of the images; in these case face pictures, is important for the contact-free identification of people. The biometric identifications methods like the face identification represents the solution for the places where is impossible to identify each people with the biometric contact scanner. The main argument for the contact free identification might be the speed of identification. The camera just captures some pictures and system might detect faces and compares it with internal databases. The contact is not necessary. The controlled people could not know about this identification system. The system has one marginal issue. The issue is the quality of captured picture. This paper deals with this problem and showing the possibilities of usage the neural network for successfully image reconstruction and next processed identification of people based on the face identification. Samples represented the experiment, which had a specific purpose. The purpose was try to find the potentially limitation of neural network reconstruction and verification people with specific biometric characteristics such as their face. The contactfree identification represents the future of the ISBN: 978-1-61804-028-2 133

people identification [7]. These methods are addicted on the pictures and their quality. The neural network reconstruction might represent the image pre-processing subsystem for these identification methods. Acknowledgement: The research work was performed to financial support of grant reg. No. IGA/57/FAI/10/D and by the European Regional Development Fund under the Project CEBIA-Tech No. CZ.1.05/2.1.00/03.0089. References: [1] TIPTON, Harold F; KRAUSE, Micki. Information security management handbook. 6th ed. Boca Raton : Auerbach, 2007. 3231 s. ISBN 0-8493-7495-2 [2] GRAHAM, Benjamin; DODD, David L. Security analysis : principles and technique. 6th ed. New York : McGraw-Hill, 2009. 766 s. ISBN 978-0-07-159253-6 [3] BITTO, Ondřej. Šifrování a biometrika, aneb, Tajemné bity a dotyky. Vyd. 1. Kralice na Hané : Computer Media, 2005. 168 s. ISBN 80-86686-48-5 [4] ZELINKA, Ivan. Umělá inteligence aneb úvod do neuronových sítí, evolučních algoritmů. 1. vyd. Zlín : Univerzita Tomáše Bati, Fakulta technologická, 2005. 127 s. ISBN 8073182777. [5] ZELINKA, Ivan; OPLATKOVÁ, Zuzana; ŠENKEŘÍK, Roman. Aplikace umělé inteligence. Vyd. 1. Zlín : Univerzita Tomáše Bati ve Zlíně, 2010. 151 s. ISBN 978-80-7318-898-6 [6] MEYERS, E. and WOLF, L. Using Biologically Inspired Features for Face Processing. International Journal of Computer Vision. 76, 1 (Jul. 2007), pp. 93-104, DOI: 10.1007/s11263-007-0058-8. [7] MALTONI, D. and ECCV 2004 International Workshop. Biometric authentication : ECCV 2004 International Workshop, BioAW 2004, Prague, Czech Republic, May 15th, 2004 : proceedings. Springer, ISBN: 9783540224990. ISBN: 978-1-61804-028-2 134