SlideShare a Scribd company logo
Extracting individual information using facial recognition in a smart mirror
Guide Name: Submitted by
Dr. Sanjay Kumar Iqra Rani
Table of contents
Introduction
• A mirror is a common item that almost everyone owns today. A mirror is
something that the majority of people use every day, whether it is placed in
the living room, bedroom, or bathroom. Thus, it would appear simple to
convert a regular mirror into a smart mirror that can recognise emotional
problems in the user and offer both immediate and long-term support.
• A smart mirror is a two-way mirror with an electronic display behind the
glass. The display can show the viewer different kinds of information in the
form of widgets, such as weather, time, date, and news updates.
• The raspberry pi is programmed using python and connects to a monitor with
inbuilt speaker to provide onscreen interface and voice assistance.
• The smart device can simply perceive, process, and evaluate the information
that has been gathered.
Literature review
Continued…
Problem Statement
Objective
Applications
•Access Control.
•Security and Surveillance.
•Health and Safety.
•Time and Attendance.
•eKYC and Fintech.
•Smart Retail and Personalized
Customer Experiences.
•Law Enforcement.
Proposed Work
• Pre-processing
• Feature Extraction
• Classification of Data
Methodology
. Pre-processing phase:-
• It is a phase where the image's noise is eliminated. The noise in the image is removed through a Gaussian
filter. In these filters the weights are picked up as per the outline of the Gaussian function.
• The Gaussian functions contain 5 attributes using which they become suitable to process the vision in real-
time. These attributes represent the efficiency of these filters as low-pass filters according to the perception
of spatial and frequency domains.
2. Feature Extraction: -
• In order to extract features, the LBP algorithm is used. The initial computing process in the LBP is of
generating an intermediary image that, by emphasizing the face attributes, more accurately describes the
actual photo. A sliding window is deployed on the basis of radius and neighbors.
 Consider a grayscale image of a face.
 A window of 3x3 pixels can be used to extract a portion of this image.
 The intensity of each pixel (0–255) can be shown as a 3x3 matrix as another way to describe it.
 Next, the matrix's centre value utilizes to verify the threshold.
 This value employs to define new values of 8 neighbours.
 A new binary value will be established for every neighbour of the threshold value. The threshold was set at 1, with 0 denoting values below it, and 1
designating value equal to or higher than the threshold.
 The matrix only consisted of binary values. The concatenation of every binary value is done from every place in the matrix line by line for producing a
novel binary value. When several researchers combine multiple the binary values in diverse ways, no change is found in outcome.
 Thereafter, a central value of the matrix, a pixel from the original image, is set to this binary value subsequent to its transformation to a decimal value.
 When this procedure is completed, a novel image is obtained that leads to capture the qualities of the actual picture in more precise way.
LBP (Local Binary Pattern) Algorithm
Pseudo
code
of
Voting
Classification
Continued……
Result
Continued…..
Conclusion
Future Scope
References
[1] J. R. Terven, B. Raducanu, M. -E. Meza and J. Salas, "Evaluating Real-Time Mirroring of Head Gestures Using
Smart Glasses," 2015 IEEE International Conference on Computer Vision Workshop (ICCVW), 2015, pp. 452-460
[2] I. Bahendwar, R. Bhardwaj, S. Hindaria and V. Rathod, "Mirr-Active An Aritificially Intelligent Interactive Mirror,"
2018 International Conference on Advanced Computation and Telecommunication (ICACAT), 2018, pp. 1-6
[3] S. S. Abeydeera et al., "Smart Mirror with Virtual Twin," 2019 International Conference on Advancements in
Computing (ICAC), 2019, pp. 238-243
[4] I. Antzoulis, M. M. Chowdhury and S. Latiff, "IoT Security for Smart Home: Issues and Solutions," 2022 IEEE
International Conference on Electro Information Technology (eIT), 2022, pp. 1-7
References
[5] D. Torres, J. Zhang, S. Dooley, X. Tan and N. Sepúlveda, "Hysteresis-Based Mechanical State Programming of
MEMS Mirrors," in Journal of Microelectromechanical Systems, vol. 27, no. 2, pp. 344-354, April 2018
Zinelabidine Boulkenafet, Jukka Komulainen and Abdenour Hadid, “Face Spoofing Detection Using Colour
Texture Analysis”, 2018, IEEE Transactions on Information Forensics and Security, Vol. 45, No. 21, PP. 489-495
[6] L. Masek, “Recognition of Human Iris Patterns for Biometric Identification”, pp. 1-63, 2003.
[7] M. R. Saady, H. El-Borey, E.S.A. El-Dahshan, and A.S. Yahia, “Stand-Alone Intelligent Voice Recognition
System”, Journal of Signal and Information Processing, vol. 5, no. 4, pp. 179-190, 2014.
[8] A.A. Desyatchikov, D.V. Kovkov, V.V. Lobantsov, K.A. Makovkin, I.A. Matveev, A.B. Murynin, and V.Y.
Chuchupal, “A System of Algorithms for Stable Human Recognition. Journal of Computer and Systems Sciences
International, vol. 45, no. 6, pp. 958-969, 2006.
[9] D.N. Parmar, and B.B. Mehta, “Face Recognition Methods & Applications”, vol. 4, pp. 84-86, 2013.
References
[10] R. Jafri, and H.R. Arabnia, “A Survey of Face Recognition Techniques”, Journal of Information Processing
Systems, vol.5, no. 2, pp. 41-68, 2009.
[11] W. Zhao, R. Chellappa, P.J. Phillips, and A. Rosenfeld, “Face recognition: a literature a survey”, ACM Computing
Surveys, Vol. 35, no. 4, pp. 399- 458, 2003.
[12] J. Wang and T. Tan, “A new face detection method based on shape information”, Pattern Recognition Letters, vol.
21, no. 6-7, pp. 463–471, 2000.
[13] R. Chellappa, C. L. Wilson, and S. Sirohey, “Human and machine recognition of faces: A survey”, Proceedings of
the IEEE, vol. 83, no. 5, pp. 705-741, 1995.
[14] W. Zhao, R. Chellappa, P. J. Phillips, and A. Rosenfeld, “Face recognition: a literature survey, technical report
CAR-TR-948”, Center for Automation Research, University of Maryland (2002).
References
[15] A.F. Abate, M. Nappi, D. Riccio, and G. Sabatino, “2D and 3D face recognition: A survey”, Pattern Recognition
Letter, vol. 28, pp. 1885–1906, 2007.
[16] A.K. Jain, R. P. W. Duin, and J. C. Mao, “Statistical pattern recognition: a review”, IEEE Trans. Pattern Analysis
and Machine Intelligence, vol. 22, no. 1, pp. 4–37, 2000.
[17] M.H. Yang, D. J. Kriegman, and N. Ahuja, “Detecting face in images: a survey”, IEEE Trans. Pattern Analysis and
Machine Intelligence, vol. 24, no. 1, pp. 34–58, 2002.
[18] G. Yang and T. S. Huang, “Human face detection in complex background,” Pattern Recognition, vol. 27, no. 1, pp.
53-63, 1994.
[19] C.A. Hansen, “Face Recognition”, Institute for Computer Science University of Tromso, Norway, vol. 3, pp. 21-26,
2001.
References
[20] S. Suhas, A. Kurhe, Dr.P. Khanale, “Face Recognition Using Principal Component Analysis and Linear
Discriminant Analysis on Holistic Approach in Facial Images Database”, IOSR Journal of Engineering, vol. 2, pp.
15-23, 2012.
[21] W. Zhao, R. Chellappa, P.J. Phillips, and A. Rosenfeld, “Face recognitions literature survey”, ACM Computing
Surveys, vol. 35, pp. 399–458, 2003.
[22] M.A. Turk, and A.P. Pentland, "Face Recognition Using Eigenfaces", vol. 1, pp. 1-7, 1991.
[23] Dr.N. Thakare et al, “Face detection and recognition for automatic attendance system”, International Journal of
Computer Science and Mobile Computing, vol.5, pp. 74-78, 2016.
[24] B. Driessen, and M. Durmuth, “Achieving anonymity against major face recognition algorithms,” in IFIP
International Conference on Communications and Multimedia Security. Springer, pp. 18–33. 2013.
References
[25] V. Blanz, S. Romdhani, and T. Vetter, “Face identification across different poses and illuminations with a 3d
morphable model”, Proceedings of the fifth IEEE International Conference on Automatic Face and Gesture
recognition. IEEE, pp. 202–207, 2002
[26] D. Bitouk, N. Kumar, S. Dhillon, P. Belhumeur, and S.K. Nayar, “Face swapping: automatically replacing faces in
photographs”, ACM Trans- actions on Graphics (TOG), vol. 27, no. 3, pp. 39, 2008.
[27] P.J. Phillips, “Privacy operating characteristic for privacy protection in surveillance applications”, in International
Conference on Audio-and Video-Based Biometric Person Authentication. Springer, pp. 869–878, 2005.
[28] P. Chriskos, O. Zoidi, A. Tefas, and I. Pitas, “De-identifying facial images using singular value decom- position
and projections,” Multimedia Tools and Appli- cations, pp. 3435-3468, 2016.
[29] P. Viola, and M.J. Jones, “Robust real-time face detection,” International journal of computer vision, vol. 57, no.
2, pp. 137–154, 2004.
References
[30] G.H. Golub, and C.F. Van Loan, “Matrix computations”, vol. 3, JHU Press, 2012.
[31] I. Pitas, “Digital image processing algorithms and applications”, John Wiley & Sons, 2000.
[32] K. Messer, J. Matas, J. Kittler, J. Luet-tin, and G. Maitre, “Xm2vtsdb: The extended m2vts database,” in Second
international conference on audio and video-based biometric person authentication. Citeseer, vol. 964, pp. 965–
966,1999.
[33] O. M. Parkhi, A. Vedaldi, and A. Zisserman, “Deep face recognition,” in British Machine Vision Confer-ence,
2015.
[34] A. Maronidis, D. Bolis, A. Tefas, and I. Pitas, “Improving subspace learning for fa-cial expression recognition
using person dependent and geometrically enriched training sets,” Neural Networks, vol. 24, no. 8, pp. 814–823,
2011.
References
[35] K. M. Mohi Uddin, S. A. Shahela, N. Rahman, R. Mostafiz and M. M. Rahman, “Smart Home Security Using
Facial Authentication and Mobile Application”, I.J. Wireless and Microwave Technologies, vol. 2, no. 45, pp. 40-
50, 2022
[36] S. Bavalekar and N. Gaonkar, “Smart Mirror Using Raspberry PI: A Review”, International Journal of Advanced
Research in Science, Communication and Technology (IJARSCT), vol. 2, no. 1, pp. 64-77, 2022
[37] S. Jagadesh, M. ArulPugazhendhi and G. Rohith Raj, "Automatic Face Recognition and Virtual Assistant using
IOT and AI," 2021 International Conference on System, Computation, Automation and Networking (ICSCAN),
2021, pp. 1-6
[38] V. Jyothi and K. S. Kumar, “Design and implementation of smart mirror using Raspberry Pi 3”, International
Journal of Creative Research Thoughts (IJCRT), vol. 5, no. 2, pp. 213-222, 2021
[39] Z. Liu, L. Xiang, K. Shi, K. Zhang and Q. Wu, "Robust Manifold Embedding for Face Recognition," in IEEE
Access, vol. 8, pp. 101224-101234, 2020
References
[40] A. A. D’souza, P. Kaul, E. Paul and M. Dhuri, "Ambient Intelligence Using Smart Mirror-Personalized Smart
Mirror for Home Use," 2019 IEEE Bombay Section Signature Conference (IBSSC), 2019, pp. 1-5.
[41] N. Purohit, S. Mane, T. Soni, Y. Bhogle and G. Chauhan, "A computer vision based smart mirror with virtual
assistant," 2019 International Conference on Intelligent Computing and Control Systems (ICCS), 2019, pp. 151-
156
[42] M. Wani and P. Ahire, "Real Time Smart Mirror System Using Internet on Things," 2019 5th International
Conference On Computing, Communication, Control And Automation (ICCUBEA), 2019, pp. 1-4
[43] J. Kawale and P. Chaudhari, "IoT based Design of Intelligent Mirror using Raspberry Pi," 2019 IEEE 5th
International Conference for Convergence in Technology (I2CT), 2019, pp. 1-4
[44] R. -P. Yang, Z. -T. Liu, L. -D. Zheng, J. -P. Wu and C. -C. Hu, "Intelligent Mirror System Based on Facial
Expression Recognition and Color Emotion Adaptation — — iMirror," 2018 37th Chinese Control Conference
(CCC), 2018, pp. 3227-3232.
References
[45] S. Bianco, L. Celona and P. Napoletano, "Visual-based sentiment logging in magic smart mirrors," 2018 IEEE 8th
International Conference on Consumer Electronics - Berlin (ICCE-Berlin), 2018, pp. 1-4.
[46] K. Mukhopadhyay, C. Sinha, H. N. Saha, S. Rakshit and S. Auddy, "Smart Mirror - a Secured Application of
Artificial Intelligence Recognizing Human Face and Voice," 2018 IEEE 9th Annual Information Technology,
Electronics and Mobile Communication Conference (IEMCON), 2018, pp. 1279-1289
[47] P. Maheshwari, M. J. Kaur and S. Anand, “Smart Mirror: A Reflective Interface to Maximize Productivity”,
International Journal of Computer Applications, vol. 166, no. 9, pp. 130006-130019, 2017
[48] B. Cvetkoska, N. Marina, D. C. Bogatinoska and Z. Mitreski, "Smart mirror E-health assistant — Posture analyze
algorithm proposed model for upright posture," IEEE EUROCON 2017 -17th International Conference on Smart
Technologies, 2017, pp. 507-512.
[49] I. C. A. García, E. R. L. Salmón, R. V. Riega and A. B. Padilla, "Implementation and Customization of a Smart
Mirror through a Facial Recognition Authentication and a Personalized News Recommendation Algorithm," 2017
13th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS), 2017, pp. 35-39
References
[50] O. Gomez-Carmona and D. Casado-Mansilla, "SmiWork: An interactive smart mirror platform for workplace
health promotion," 2017 2nd International Multidisciplinary Conference on Computer and Energy Science
(SpliTech), 2017, pp. 1-6.
[51] M. Arsenovic, S. Sladojevic, A. Anderla, D. Stefanovic, “FaceTime – Deep Learning Based Face Recognition
Attendance System”, In 2017 IEEE 15th International Symposium on Intelligent Systems and Informatics (SISY),
vol. 4, pp. 53-58, 2017.
[52] G.B. de Souza , D.F. da Silva Santos, R.G. Pires, A.N. Marana, and J.P. Papa, “Deep Texture Features for Robust
Face Spoofing Detection”, IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS—II: EXPRESS BRIEFS,
VOL. 64, NO. 12, pp. 1397-1401, 2017.
[53] K. Mhou, D. van der Haar, W.S. Leung, “Face Spoof Detection Using Light Reflection in Moderate to Low
Lighting”, In 2017 2nd Asia-Pacific Conference on Intelligent Robot Systems, pp. 47-52, 2017.
[54] P. Chriskos, J. Munroy, V. Mygdalisy,and I. Pitasy, “FACE DETECTION HINDERING”, in 2017 IEEE Global
Conference on signal and information processing,pp. 403-407, 2017.
References
[55] R. Kaur, and P. S. Mann, “Techniques of Face Spoof Detection: A Review”, International Journal of Computer
Applications, Vol. 164, no. 1, pp. 975-8887, 2017
[56] S. Wang, G. Wen, and H. Cai, “Research on Face Detection based on fast Haar feature” 2017 10th International
Congress on Image and Signal Processing, BioMedical Engineering and Informatics, IEEE, pp. 1-6, 2017.
[57] D.A.R. Wati, and D. Abadianto, “Design of Face Detection and Recognition System for Smart Home Security
Application”, 2017 2nd International Conferences on Information Technology, Information Systems and Electrical
Engineering. IEEE, pp. 342-347, 2017.
[58] S. Sahana, M. Shraddha, M. P. Phalguni, R. K. Shashank, C. R. Aditya and M. C. Lavanya, "Smart Mirror using
Raspberry Pi: A Survey," 2021 5th International Conference on Computing Methodologies and Communication
(ICCMC), 2021, pp. 634-637
[59] S. Kim et al., "Real-Time Motion Feedback System based on Smart Mirror Vision," 2020 Joint 11th International
Conference on Soft Computing and Intelligent Systems and 21st International Symposium on Advanced
Intelligent Systems (SCIS-ISIS), 2020, pp. 1-4
References
[60] R. Nadaf and V. Bonal, "Smart Mirror using Raspberry Pi as a Security and Vigilance System," 2019 3rd
International Conference on Trends in Electronics and Informatics (ICOEI), 2019, pp. 360-365
[61] G. S. Kothawale, K. R. Yadav, P. D. Patil, V. S. Pawar and T. D. Yadav, “Smart Mirror using AI and Machine
Learning”, Advancement in Image Processing and Pattern Recognition, vol. 3, no. 2, pp. 454-460, 2020
[62] B. Huang, Z. Wang and C. Liang, “PLFace: Progressive Learning for Face Recognition with Mask Bias”,
Pattern Recognition, vol. 39, no. 5, pp. 1419-1429, 9 November 2022
[63] A. -C. Tsai, Y. -Y. Ou, W. -C. Wu and J. -F. Wang, "Occlusion Resistant Face Detection and Recognition
System," 2020 8th International Conference on Orange Technology (ICOT), 2020, pp. 1-4
[64] C. Song, Z. He, Y. Yu and Z. Zhang, "Low Resolution Face Recognition System Based on ESRGAN," 2021
3rd International Conference on Applied Machine Learning (ICAML), 2021, pp. 76-79
References
[65] M. -J. Wu, Y. -C. Chen, Y. -S. Liao, J. -A. Chen and H. -H. Lin, "Face-recognition System Design and Manufacture,"
2021 IEEE/ACIS 22nd International Conference on Software Engineering, Artificial Intelligence, Networking and
Parallel/Distributed Computing (SNPD), 2021, pp. 158-161
[66] X. Bai, F. Jiang, T. Shi and Y. Wu, "Design of Attendance System Based on Face Recognition and Android Platform,"
2020 International Conference on Computer Network, Electronic and Automation (ICCNEA), 2020, pp. 117-121
[67] S. M. Nejrs, "Face Recognition utilizing Novel Face Descriptor & Algorithm of Feature Extraction," 2022
International Conference for Advancement in Technology (ICONAT), 2022, pp. 1-7
[68] E. Winarno, I. Husni Al Amin, H. Februariyanti, P. W. Adi, W. Hadikurniawati and M. T. Anwar, "Attendance System
Based on Face Recognition System Using CNN-PCA Method and Real-time Camera," 2019 International Seminar
on Research of Information Technology and Intelligent Systems (ISRITI), 2019, pp. 301-304
[69] M. Luo, J. Cao, X. Ma, X. Zhang and R. He, "FA-GAN: Face Augmentation GAN for Deformation-Invariant Face
Recognition," in IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2341-2355, 2021
References
[70] Z. Jianxin and L. Haoran, "Local occluded face recognition based on 2D-DWT and sparse representation," 2020
5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE), 2020, pp. 2110-2114
[71] K. Eiamsaard, P. Bamrungthai and S. Jitpakdeebodin, "Smart Inventory Access Monitoring System (SIAMS) using
Embedded System with Face Recognition," 2021 18th International Joint Conference on Computer Science and
Software Engineering (JCSSE), 2021, pp. 1-4
[72] J. Liu, Q. Li, M. Liu and T. Wei, "CP-GAN: A Cross-Pose Profile Face Frontalization Boosting Pose-Invariant Face
Recognition," in IEEE Access, vol. 8, pp. 198659-198667, 2020
[73] X. Shi, X. Chai, J. Xie and T. Sun, "MC-GCN: A Multi-Scale Contrastive Graph Convolutional Network for
Unconstrained Face Recognition With Image Sets," in IEEE Transactions on Image Processing, vol. 31, pp. 3046-
3055, 2022
[74] Y. Guo, L. Jiao, S. Wang, S. Wang and F. Liu, "Fuzzy Sparse Autoencoder Framework for Single Image Per Person
Face Recognition," in IEEE Transactions on Cybernetics, vol. 48, no. 8, pp. 2402-2415, Aug. 2018
References
[75] H. B. Bae, T. Jeon, Y. Lee, S. Jang and S. Lee, "Non-Visual to Visual Translation for Cross-Domain Face
Recognition," in IEEE Access, vol. 8, pp. 50452-50464, 2020
[76] Y. Tao, W. Zheng, W. Yang, G. Wang and Q. Liao, "Frontal-Centers Guided Face: Boosting Face Recognition by
Learning Pose-Invariant Features," in IEEE Transactions on Information Forensics and Security, vol. 17, pp.
2272-2283, 2022
[77] R. He, X. Wu, Z. Sun and T. Tan, "Wasserstein CNN: Learning Invariant Features for NIR-VIS Face Recognition,"
in IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 41, no. 7, pp. 1761-1773, 1 July 2019,
[78] F. Liu, Q. Zhao, X. Liu and D. Zeng, "Joint Face Alignment and 3D Face Reconstruction with Application to Face
Recognition," in IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 42, no. 3, pp. 664-678, 1
March 2020
[79] C. Fu, X. Wu, Y. Hu, H. Huang and R. He, "DVG-Face: Dual Variational Generation for Heterogeneous Face
Recognition," in IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 44, no. 6, pp. 2938-2952, 1
June 2022
Extracting individual information using facial recognition in a smart mirror.pptx

More Related Content

PPT
PDF
76 s201920
PPTX
Real time face detection and recognition
PDF
IRJET- Digiyathra
PDF
Face Recognition and Increased Reality System for Mobile Devices
PDF
20120140504019
PPT
Facial_recognition_Siva vadapalli1.pptx.ppt
PPT
Week6 face detection
76 s201920
Real time face detection and recognition
IRJET- Digiyathra
Face Recognition and Increased Reality System for Mobile Devices
20120140504019
Facial_recognition_Siva vadapalli1.pptx.ppt
Week6 face detection

Similar to Extracting individual information using facial recognition in a smart mirror.pptx (20)

PPT
Face recognition
PDF
Top Cited Article in Informatics Engineering Research: October 2020
PDF
Face Recognition Using Simplified Fuzzy Artmap
PDF
Person identification based on facial biometrics in different lighting condit...
PDF
Hl2413221328
PDF
Image Based Facial Recognition
PDF
O24114119
PDF
Iaetsd multi-view and multi band face recognition
PDF
IRJET - A Review on Face Recognition using Deep Learning Algorithm
PDF
IRJET- Face Recognition using Deep Learning
PDF
Lecture 10 ming yang - face recognition systems
PPTX
LEARNING BASES OF ACTICITY
PDF
Paper id 25201441
PPT
Automated Face Detection and Recognition
PDF
Human Face Detection And Identification Of Facial Expressions Using MATLAB
PDF
Facial recognition based on enhanced neural network
PDF
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D Faces
PPT
Face recognition using laplacianfaces
PDF
Facial image classification and searching –a survey
PDF
Facial Image Classification And Searching - A Survey
Face recognition
Top Cited Article in Informatics Engineering Research: October 2020
Face Recognition Using Simplified Fuzzy Artmap
Person identification based on facial biometrics in different lighting condit...
Hl2413221328
Image Based Facial Recognition
O24114119
Iaetsd multi-view and multi band face recognition
IRJET - A Review on Face Recognition using Deep Learning Algorithm
IRJET- Face Recognition using Deep Learning
Lecture 10 ming yang - face recognition systems
LEARNING BASES OF ACTICITY
Paper id 25201441
Automated Face Detection and Recognition
Human Face Detection And Identification Of Facial Expressions Using MATLAB
Facial recognition based on enhanced neural network
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D Faces
Face recognition using laplacianfaces
Facial image classification and searching –a survey
Facial Image Classification And Searching - A Survey
Ad

Recently uploaded (20)

PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Empathic Computing: Creating Shared Understanding
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Electronic commerce courselecture one. Pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Modernizing your data center with Dell and AMD
PDF
Machine learning based COVID-19 study performance prediction
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
NewMind AI Monthly Chronicles - July 2025
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Empathic Computing: Creating Shared Understanding
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Electronic commerce courselecture one. Pdf
Spectral efficient network and resource selection model in 5G networks
Modernizing your data center with Dell and AMD
Machine learning based COVID-19 study performance prediction
The Rise and Fall of 3GPP – Time for a Sabbatical?
Building Integrated photovoltaic BIPV_UPV.pdf
The AUB Centre for AI in Media Proposal.docx
Network Security Unit 5.pdf for BCA BBA.
Understanding_Digital_Forensics_Presentation.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Ad

Extracting individual information using facial recognition in a smart mirror.pptx

  • 1. Extracting individual information using facial recognition in a smart mirror Guide Name: Submitted by Dr. Sanjay Kumar Iqra Rani
  • 3. Introduction • A mirror is a common item that almost everyone owns today. A mirror is something that the majority of people use every day, whether it is placed in the living room, bedroom, or bathroom. Thus, it would appear simple to convert a regular mirror into a smart mirror that can recognise emotional problems in the user and offer both immediate and long-term support. • A smart mirror is a two-way mirror with an electronic display behind the glass. The display can show the viewer different kinds of information in the form of widgets, such as weather, time, date, and news updates. • The raspberry pi is programmed using python and connects to a monitor with inbuilt speaker to provide onscreen interface and voice assistance. • The smart device can simply perceive, process, and evaluate the information that has been gathered.
  • 8. Applications •Access Control. •Security and Surveillance. •Health and Safety. •Time and Attendance. •eKYC and Fintech. •Smart Retail and Personalized Customer Experiences. •Law Enforcement.
  • 9. Proposed Work • Pre-processing • Feature Extraction • Classification of Data
  • 11. . Pre-processing phase:- • It is a phase where the image's noise is eliminated. The noise in the image is removed through a Gaussian filter. In these filters the weights are picked up as per the outline of the Gaussian function. • The Gaussian functions contain 5 attributes using which they become suitable to process the vision in real- time. These attributes represent the efficiency of these filters as low-pass filters according to the perception of spatial and frequency domains. 2. Feature Extraction: - • In order to extract features, the LBP algorithm is used. The initial computing process in the LBP is of generating an intermediary image that, by emphasizing the face attributes, more accurately describes the actual photo. A sliding window is deployed on the basis of radius and neighbors.
  • 12.  Consider a grayscale image of a face.  A window of 3x3 pixels can be used to extract a portion of this image.  The intensity of each pixel (0–255) can be shown as a 3x3 matrix as another way to describe it.  Next, the matrix's centre value utilizes to verify the threshold.  This value employs to define new values of 8 neighbours.  A new binary value will be established for every neighbour of the threshold value. The threshold was set at 1, with 0 denoting values below it, and 1 designating value equal to or higher than the threshold.  The matrix only consisted of binary values. The concatenation of every binary value is done from every place in the matrix line by line for producing a novel binary value. When several researchers combine multiple the binary values in diverse ways, no change is found in outcome.  Thereafter, a central value of the matrix, a pixel from the original image, is set to this binary value subsequent to its transformation to a decimal value.  When this procedure is completed, a novel image is obtained that leads to capture the qualities of the actual picture in more precise way. LBP (Local Binary Pattern) Algorithm
  • 19. References [1] J. R. Terven, B. Raducanu, M. -E. Meza and J. Salas, "Evaluating Real-Time Mirroring of Head Gestures Using Smart Glasses," 2015 IEEE International Conference on Computer Vision Workshop (ICCVW), 2015, pp. 452-460 [2] I. Bahendwar, R. Bhardwaj, S. Hindaria and V. Rathod, "Mirr-Active An Aritificially Intelligent Interactive Mirror," 2018 International Conference on Advanced Computation and Telecommunication (ICACAT), 2018, pp. 1-6 [3] S. S. Abeydeera et al., "Smart Mirror with Virtual Twin," 2019 International Conference on Advancements in Computing (ICAC), 2019, pp. 238-243 [4] I. Antzoulis, M. M. Chowdhury and S. Latiff, "IoT Security for Smart Home: Issues and Solutions," 2022 IEEE International Conference on Electro Information Technology (eIT), 2022, pp. 1-7
  • 20. References [5] D. Torres, J. Zhang, S. Dooley, X. Tan and N. Sepúlveda, "Hysteresis-Based Mechanical State Programming of MEMS Mirrors," in Journal of Microelectromechanical Systems, vol. 27, no. 2, pp. 344-354, April 2018 Zinelabidine Boulkenafet, Jukka Komulainen and Abdenour Hadid, “Face Spoofing Detection Using Colour Texture Analysis”, 2018, IEEE Transactions on Information Forensics and Security, Vol. 45, No. 21, PP. 489-495 [6] L. Masek, “Recognition of Human Iris Patterns for Biometric Identification”, pp. 1-63, 2003. [7] M. R. Saady, H. El-Borey, E.S.A. El-Dahshan, and A.S. Yahia, “Stand-Alone Intelligent Voice Recognition System”, Journal of Signal and Information Processing, vol. 5, no. 4, pp. 179-190, 2014. [8] A.A. Desyatchikov, D.V. Kovkov, V.V. Lobantsov, K.A. Makovkin, I.A. Matveev, A.B. Murynin, and V.Y. Chuchupal, “A System of Algorithms for Stable Human Recognition. Journal of Computer and Systems Sciences International, vol. 45, no. 6, pp. 958-969, 2006. [9] D.N. Parmar, and B.B. Mehta, “Face Recognition Methods & Applications”, vol. 4, pp. 84-86, 2013.
  • 21. References [10] R. Jafri, and H.R. Arabnia, “A Survey of Face Recognition Techniques”, Journal of Information Processing Systems, vol.5, no. 2, pp. 41-68, 2009. [11] W. Zhao, R. Chellappa, P.J. Phillips, and A. Rosenfeld, “Face recognition: a literature a survey”, ACM Computing Surveys, Vol. 35, no. 4, pp. 399- 458, 2003. [12] J. Wang and T. Tan, “A new face detection method based on shape information”, Pattern Recognition Letters, vol. 21, no. 6-7, pp. 463–471, 2000. [13] R. Chellappa, C. L. Wilson, and S. Sirohey, “Human and machine recognition of faces: A survey”, Proceedings of the IEEE, vol. 83, no. 5, pp. 705-741, 1995. [14] W. Zhao, R. Chellappa, P. J. Phillips, and A. Rosenfeld, “Face recognition: a literature survey, technical report CAR-TR-948”, Center for Automation Research, University of Maryland (2002).
  • 22. References [15] A.F. Abate, M. Nappi, D. Riccio, and G. Sabatino, “2D and 3D face recognition: A survey”, Pattern Recognition Letter, vol. 28, pp. 1885–1906, 2007. [16] A.K. Jain, R. P. W. Duin, and J. C. Mao, “Statistical pattern recognition: a review”, IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 22, no. 1, pp. 4–37, 2000. [17] M.H. Yang, D. J. Kriegman, and N. Ahuja, “Detecting face in images: a survey”, IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 24, no. 1, pp. 34–58, 2002. [18] G. Yang and T. S. Huang, “Human face detection in complex background,” Pattern Recognition, vol. 27, no. 1, pp. 53-63, 1994. [19] C.A. Hansen, “Face Recognition”, Institute for Computer Science University of Tromso, Norway, vol. 3, pp. 21-26, 2001.
  • 23. References [20] S. Suhas, A. Kurhe, Dr.P. Khanale, “Face Recognition Using Principal Component Analysis and Linear Discriminant Analysis on Holistic Approach in Facial Images Database”, IOSR Journal of Engineering, vol. 2, pp. 15-23, 2012. [21] W. Zhao, R. Chellappa, P.J. Phillips, and A. Rosenfeld, “Face recognitions literature survey”, ACM Computing Surveys, vol. 35, pp. 399–458, 2003. [22] M.A. Turk, and A.P. Pentland, "Face Recognition Using Eigenfaces", vol. 1, pp. 1-7, 1991. [23] Dr.N. Thakare et al, “Face detection and recognition for automatic attendance system”, International Journal of Computer Science and Mobile Computing, vol.5, pp. 74-78, 2016. [24] B. Driessen, and M. Durmuth, “Achieving anonymity against major face recognition algorithms,” in IFIP International Conference on Communications and Multimedia Security. Springer, pp. 18–33. 2013.
  • 24. References [25] V. Blanz, S. Romdhani, and T. Vetter, “Face identification across different poses and illuminations with a 3d morphable model”, Proceedings of the fifth IEEE International Conference on Automatic Face and Gesture recognition. IEEE, pp. 202–207, 2002 [26] D. Bitouk, N. Kumar, S. Dhillon, P. Belhumeur, and S.K. Nayar, “Face swapping: automatically replacing faces in photographs”, ACM Trans- actions on Graphics (TOG), vol. 27, no. 3, pp. 39, 2008. [27] P.J. Phillips, “Privacy operating characteristic for privacy protection in surveillance applications”, in International Conference on Audio-and Video-Based Biometric Person Authentication. Springer, pp. 869–878, 2005. [28] P. Chriskos, O. Zoidi, A. Tefas, and I. Pitas, “De-identifying facial images using singular value decom- position and projections,” Multimedia Tools and Appli- cations, pp. 3435-3468, 2016. [29] P. Viola, and M.J. Jones, “Robust real-time face detection,” International journal of computer vision, vol. 57, no. 2, pp. 137–154, 2004.
  • 25. References [30] G.H. Golub, and C.F. Van Loan, “Matrix computations”, vol. 3, JHU Press, 2012. [31] I. Pitas, “Digital image processing algorithms and applications”, John Wiley & Sons, 2000. [32] K. Messer, J. Matas, J. Kittler, J. Luet-tin, and G. Maitre, “Xm2vtsdb: The extended m2vts database,” in Second international conference on audio and video-based biometric person authentication. Citeseer, vol. 964, pp. 965– 966,1999. [33] O. M. Parkhi, A. Vedaldi, and A. Zisserman, “Deep face recognition,” in British Machine Vision Confer-ence, 2015. [34] A. Maronidis, D. Bolis, A. Tefas, and I. Pitas, “Improving subspace learning for fa-cial expression recognition using person dependent and geometrically enriched training sets,” Neural Networks, vol. 24, no. 8, pp. 814–823, 2011.
  • 26. References [35] K. M. Mohi Uddin, S. A. Shahela, N. Rahman, R. Mostafiz and M. M. Rahman, “Smart Home Security Using Facial Authentication and Mobile Application”, I.J. Wireless and Microwave Technologies, vol. 2, no. 45, pp. 40- 50, 2022 [36] S. Bavalekar and N. Gaonkar, “Smart Mirror Using Raspberry PI: A Review”, International Journal of Advanced Research in Science, Communication and Technology (IJARSCT), vol. 2, no. 1, pp. 64-77, 2022 [37] S. Jagadesh, M. ArulPugazhendhi and G. Rohith Raj, "Automatic Face Recognition and Virtual Assistant using IOT and AI," 2021 International Conference on System, Computation, Automation and Networking (ICSCAN), 2021, pp. 1-6 [38] V. Jyothi and K. S. Kumar, “Design and implementation of smart mirror using Raspberry Pi 3”, International Journal of Creative Research Thoughts (IJCRT), vol. 5, no. 2, pp. 213-222, 2021 [39] Z. Liu, L. Xiang, K. Shi, K. Zhang and Q. Wu, "Robust Manifold Embedding for Face Recognition," in IEEE Access, vol. 8, pp. 101224-101234, 2020
  • 27. References [40] A. A. D’souza, P. Kaul, E. Paul and M. Dhuri, "Ambient Intelligence Using Smart Mirror-Personalized Smart Mirror for Home Use," 2019 IEEE Bombay Section Signature Conference (IBSSC), 2019, pp. 1-5. [41] N. Purohit, S. Mane, T. Soni, Y. Bhogle and G. Chauhan, "A computer vision based smart mirror with virtual assistant," 2019 International Conference on Intelligent Computing and Control Systems (ICCS), 2019, pp. 151- 156 [42] M. Wani and P. Ahire, "Real Time Smart Mirror System Using Internet on Things," 2019 5th International Conference On Computing, Communication, Control And Automation (ICCUBEA), 2019, pp. 1-4 [43] J. Kawale and P. Chaudhari, "IoT based Design of Intelligent Mirror using Raspberry Pi," 2019 IEEE 5th International Conference for Convergence in Technology (I2CT), 2019, pp. 1-4 [44] R. -P. Yang, Z. -T. Liu, L. -D. Zheng, J. -P. Wu and C. -C. Hu, "Intelligent Mirror System Based on Facial Expression Recognition and Color Emotion Adaptation — — iMirror," 2018 37th Chinese Control Conference (CCC), 2018, pp. 3227-3232.
  • 28. References [45] S. Bianco, L. Celona and P. Napoletano, "Visual-based sentiment logging in magic smart mirrors," 2018 IEEE 8th International Conference on Consumer Electronics - Berlin (ICCE-Berlin), 2018, pp. 1-4. [46] K. Mukhopadhyay, C. Sinha, H. N. Saha, S. Rakshit and S. Auddy, "Smart Mirror - a Secured Application of Artificial Intelligence Recognizing Human Face and Voice," 2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), 2018, pp. 1279-1289 [47] P. Maheshwari, M. J. Kaur and S. Anand, “Smart Mirror: A Reflective Interface to Maximize Productivity”, International Journal of Computer Applications, vol. 166, no. 9, pp. 130006-130019, 2017 [48] B. Cvetkoska, N. Marina, D. C. Bogatinoska and Z. Mitreski, "Smart mirror E-health assistant — Posture analyze algorithm proposed model for upright posture," IEEE EUROCON 2017 -17th International Conference on Smart Technologies, 2017, pp. 507-512. [49] I. C. A. García, E. R. L. Salmón, R. V. Riega and A. B. Padilla, "Implementation and Customization of a Smart Mirror through a Facial Recognition Authentication and a Personalized News Recommendation Algorithm," 2017 13th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS), 2017, pp. 35-39
  • 29. References [50] O. Gomez-Carmona and D. Casado-Mansilla, "SmiWork: An interactive smart mirror platform for workplace health promotion," 2017 2nd International Multidisciplinary Conference on Computer and Energy Science (SpliTech), 2017, pp. 1-6. [51] M. Arsenovic, S. Sladojevic, A. Anderla, D. Stefanovic, “FaceTime – Deep Learning Based Face Recognition Attendance System”, In 2017 IEEE 15th International Symposium on Intelligent Systems and Informatics (SISY), vol. 4, pp. 53-58, 2017. [52] G.B. de Souza , D.F. da Silva Santos, R.G. Pires, A.N. Marana, and J.P. Papa, “Deep Texture Features for Robust Face Spoofing Detection”, IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS—II: EXPRESS BRIEFS, VOL. 64, NO. 12, pp. 1397-1401, 2017. [53] K. Mhou, D. van der Haar, W.S. Leung, “Face Spoof Detection Using Light Reflection in Moderate to Low Lighting”, In 2017 2nd Asia-Pacific Conference on Intelligent Robot Systems, pp. 47-52, 2017. [54] P. Chriskos, J. Munroy, V. Mygdalisy,and I. Pitasy, “FACE DETECTION HINDERING”, in 2017 IEEE Global Conference on signal and information processing,pp. 403-407, 2017.
  • 30. References [55] R. Kaur, and P. S. Mann, “Techniques of Face Spoof Detection: A Review”, International Journal of Computer Applications, Vol. 164, no. 1, pp. 975-8887, 2017 [56] S. Wang, G. Wen, and H. Cai, “Research on Face Detection based on fast Haar feature” 2017 10th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics, IEEE, pp. 1-6, 2017. [57] D.A.R. Wati, and D. Abadianto, “Design of Face Detection and Recognition System for Smart Home Security Application”, 2017 2nd International Conferences on Information Technology, Information Systems and Electrical Engineering. IEEE, pp. 342-347, 2017. [58] S. Sahana, M. Shraddha, M. P. Phalguni, R. K. Shashank, C. R. Aditya and M. C. Lavanya, "Smart Mirror using Raspberry Pi: A Survey," 2021 5th International Conference on Computing Methodologies and Communication (ICCMC), 2021, pp. 634-637 [59] S. Kim et al., "Real-Time Motion Feedback System based on Smart Mirror Vision," 2020 Joint 11th International Conference on Soft Computing and Intelligent Systems and 21st International Symposium on Advanced Intelligent Systems (SCIS-ISIS), 2020, pp. 1-4
  • 31. References [60] R. Nadaf and V. Bonal, "Smart Mirror using Raspberry Pi as a Security and Vigilance System," 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI), 2019, pp. 360-365 [61] G. S. Kothawale, K. R. Yadav, P. D. Patil, V. S. Pawar and T. D. Yadav, “Smart Mirror using AI and Machine Learning”, Advancement in Image Processing and Pattern Recognition, vol. 3, no. 2, pp. 454-460, 2020 [62] B. Huang, Z. Wang and C. Liang, “PLFace: Progressive Learning for Face Recognition with Mask Bias”, Pattern Recognition, vol. 39, no. 5, pp. 1419-1429, 9 November 2022 [63] A. -C. Tsai, Y. -Y. Ou, W. -C. Wu and J. -F. Wang, "Occlusion Resistant Face Detection and Recognition System," 2020 8th International Conference on Orange Technology (ICOT), 2020, pp. 1-4 [64] C. Song, Z. He, Y. Yu and Z. Zhang, "Low Resolution Face Recognition System Based on ESRGAN," 2021 3rd International Conference on Applied Machine Learning (ICAML), 2021, pp. 76-79
  • 32. References [65] M. -J. Wu, Y. -C. Chen, Y. -S. Liao, J. -A. Chen and H. -H. Lin, "Face-recognition System Design and Manufacture," 2021 IEEE/ACIS 22nd International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2021, pp. 158-161 [66] X. Bai, F. Jiang, T. Shi and Y. Wu, "Design of Attendance System Based on Face Recognition and Android Platform," 2020 International Conference on Computer Network, Electronic and Automation (ICCNEA), 2020, pp. 117-121 [67] S. M. Nejrs, "Face Recognition utilizing Novel Face Descriptor & Algorithm of Feature Extraction," 2022 International Conference for Advancement in Technology (ICONAT), 2022, pp. 1-7 [68] E. Winarno, I. Husni Al Amin, H. Februariyanti, P. W. Adi, W. Hadikurniawati and M. T. Anwar, "Attendance System Based on Face Recognition System Using CNN-PCA Method and Real-time Camera," 2019 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI), 2019, pp. 301-304 [69] M. Luo, J. Cao, X. Ma, X. Zhang and R. He, "FA-GAN: Face Augmentation GAN for Deformation-Invariant Face Recognition," in IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2341-2355, 2021
  • 33. References [70] Z. Jianxin and L. Haoran, "Local occluded face recognition based on 2D-DWT and sparse representation," 2020 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE), 2020, pp. 2110-2114 [71] K. Eiamsaard, P. Bamrungthai and S. Jitpakdeebodin, "Smart Inventory Access Monitoring System (SIAMS) using Embedded System with Face Recognition," 2021 18th International Joint Conference on Computer Science and Software Engineering (JCSSE), 2021, pp. 1-4 [72] J. Liu, Q. Li, M. Liu and T. Wei, "CP-GAN: A Cross-Pose Profile Face Frontalization Boosting Pose-Invariant Face Recognition," in IEEE Access, vol. 8, pp. 198659-198667, 2020 [73] X. Shi, X. Chai, J. Xie and T. Sun, "MC-GCN: A Multi-Scale Contrastive Graph Convolutional Network for Unconstrained Face Recognition With Image Sets," in IEEE Transactions on Image Processing, vol. 31, pp. 3046- 3055, 2022 [74] Y. Guo, L. Jiao, S. Wang, S. Wang and F. Liu, "Fuzzy Sparse Autoencoder Framework for Single Image Per Person Face Recognition," in IEEE Transactions on Cybernetics, vol. 48, no. 8, pp. 2402-2415, Aug. 2018
  • 34. References [75] H. B. Bae, T. Jeon, Y. Lee, S. Jang and S. Lee, "Non-Visual to Visual Translation for Cross-Domain Face Recognition," in IEEE Access, vol. 8, pp. 50452-50464, 2020 [76] Y. Tao, W. Zheng, W. Yang, G. Wang and Q. Liao, "Frontal-Centers Guided Face: Boosting Face Recognition by Learning Pose-Invariant Features," in IEEE Transactions on Information Forensics and Security, vol. 17, pp. 2272-2283, 2022 [77] R. He, X. Wu, Z. Sun and T. Tan, "Wasserstein CNN: Learning Invariant Features for NIR-VIS Face Recognition," in IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 41, no. 7, pp. 1761-1773, 1 July 2019, [78] F. Liu, Q. Zhao, X. Liu and D. Zeng, "Joint Face Alignment and 3D Face Reconstruction with Application to Face Recognition," in IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 42, no. 3, pp. 664-678, 1 March 2020 [79] C. Fu, X. Wu, Y. Hu, H. Huang and R. He, "DVG-Face: Dual Variational Generation for Heterogeneous Face Recognition," in IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 44, no. 6, pp. 2938-2952, 1 June 2022