SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 455
Face Recognition System and its Applications
Shantanu Shahi1, Balveer Singh2
1Research Scholar, Faculty of Science & Engineering, PK University, Shivpuri, India
2Professor, Department of Computer Science & Engineering, PK University, Shivpuri, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Face Detection has one of the hottest topics of
research and has many security and business applications in
the field of image processing and pattern analysis. Availability
of feasible technology as in addition to the growing demand
for reliable security systems in the world today has been an
encouraging many scientist to develop new methods for
capturing of facial knowledge. A large number of scientists do
different work for face detection from different fields such as
image processing, neural networks, computer vision,
psychology, computers graphics and pattern analysis and has
also been increasingly accepted by the public for use in
identification, security and law enforcement.
The face recognition system has been described in three parts.
The first describes the differences such as total aggregation,
subtraction process and hybrid process. The second describes
the application with examples, and finally the third discuss
about future research in the field of face recognition.
Key Words: Computer Vision, Holistic Matching Methods,
Feature-based Methods, Hybrid Methods
1. INTRODUCTION
Several face recognition algorithms and systems have
emerged submittedandmadesignificantprogressinlasttwo
decades. The performance of the face analysis system has
developed a new height in the case of recent developments.
However, a much work has been left to fulfill the need of
further improvement in the face recognition system. Some
environmental challenges changes in lighting, bodyposition,
facial expressions, etc. Performance of facial analysis the
system is directly related to theamountofchangeseenin the
portrait. If we can eliminate these effects, it provides better
face recognition results which lead a more reliable system
[1].
The main criteria which can be producing a better result are
listed below.
1.1 Illumination
The images of human face captured in different lightening
condition like image taken in sun light, image taking in a
room and image taking in night with different type of
lighting will produce different images of same person. This
may or may not weaken some of the facial featurescausetoo
bright or too dark objects in images. These imagesproducea
different attributes of face parameters and decrease the
performance of face recognitions system. (Fig. 1.)
Fig -1: Same image with different illumination
1.2 Head Position
In most cases face recognition systems are trained from the
images in which whole face is visible but, in many cases,
when we want to recognize the face of an unknown identity,
it is not necessary that his/her face is fully captured in
capturing device. Therefore, it is necessary that the image of
a person will be taken in front of where the personislooking
the camera.
1.3 Facial expression
As mentioned earlier, most face recognition algorithms are
standard and neutral portrait. Facial accessories such as
glasses, facial hair (beard and stubble), and emotional
expressions such as laughter, smile, grin, change some it can
affect facial symptoms and classification. Best for automatic
to overcome this problem, a face recognition system is
desired, for example by modifying it feature selection.
1.4 Occlusion
In general, people can know others even if they wear
sunglasses and scarf. This is a challenge for automatedfacial
recognition systems. Designed to replace the human brain.
Another object, partial closureofperson'sface,sunglasses or
scarf is a common problem with many facials analyzes
application. These barriers cover some of the facial features
and thus affect some of the facial features. The performance
of the portrait may deteriorate.Manywaystosolvethisissue
by splitting the closed parts of the image apart and ignoring
them corresponding activity.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 456
1.5 Inter-Class Similarities
It is not impossible to distinguish identical twins, but
sometimes it's a tough job for parents. Therefore, similarity
between classes is not just a challenge although it is a
biometric authentication technology; italsofacesthehuman
brain. That's the problem to distinguish between two
different subjects with very similar characteristics. Among
many cases multi-biometric techniques such as combining
face and fingerprint recognition increase performance.
2. FACE RECOGNITION METHODS
In the 1970s, facial recognition was seen as a two-
dimensional cognitive problem[2].Usedtoidentifydistances
from key points of facial recognition, such as measuring
differences in facial expressions. But the familiar face
recognition should be automatic. Face recognition is a
difficult but elaborate issue that appeals to researchers from
diverse backgrounds: psychiatry, cognitive impairment,
neural networks, computing view, and computer graphics.
In general, face recognition consists of two (2) stages,
registration and identification / verification, as shown in Fig.
1. There are several modules,which areimagedetection,face
recognition, training, knowledge and identification.
Fig -2: Block Diagram for the Face Recognition System
The list of face recognition methods are follows:-
1. Holistic Methods
2. Feature-based Methods
3. Hybrid Methods
2.1 Holistic Methods
In thisapproach, total face area is calculatedastheinputdata
for the face capture system. One of the best examples of
holistic approaches is eigenfaces [8] (the most widely used
facial recognition),keynoteanalysis,segregationanalysis[7],
and independent assessment, etc.
Fig -3: Face recognition method
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 457
2.2 Feature-based Methods
In this method features which are necessary for face
recognition are extracted. A major challenge of the delete
feature is the "back" feature, which is when the system tries
to recover features that are not visible due to major changes,
such as the head pose when we match the front image with
profile picture. [5].
2.3 Hybrid Methods
Hybrid face recognition technology combines holistic and
featureextraction methods. Usually 3D graphics are usedfor
mixing. The image of the face is captured in 3D, allowing the
system to record the curves of the eye, such as the image of
the chin or forehead. Even the face in contours can be used
because the system uses depth and measuring axes, which
provide enough information to create the whole face. 3D
technology generally does this: capture, locate, measure,
represent and compete. Capture - Capture faces by copying
photos or capturing them in real time. Position - Determine
the position, size and angle of the head. Measurements -
Measure each curve of the face to model, carefully observing
the outside of the eye, the inside of the eye, and the angle of
the nose. Representation- converting models into numbers-
digital representation and face-to-face comparison -
comparing data received with faces in existing data.
If you want to compare 3D images with existing 3D images,
there is no need to make any changes. Most, however,images
are rendered in 2D, which requires some modification to the
3D image.
3. FACE RECOGNITION APPLICATIONS
Face recognition system may be very useful in human-
computer interaction, virtual reality, data recovery,
multimedia, computer entertainment, information security,
and more. Other. Work Procedures, Medical Records,
Internet Banking, Biometrics, such asPersonal Information -
Passports, Driver's License, Automatic Self-Assessment -
Border Control, Policy Private, e.g. Video Surveillance,
Investigations, Personal Security - Driver Surveillance, and
Home Video Surveillance.
3.1 Face Identification
Facial recognition teachespeoplethroughfacial expressions.
Face recognition creates an authorized account rather than
just checking if an ID card (ID) or key is valid, or if the user
knows a unique identifier (Pins) or password. The following
is an example.
Eliminate the national electoral balance because there is
more than one election. Face recognition is directly
compared to the face of voters without the use of a different
ID number. When two faces are similar in question, then it is
necessary to differentiate between the persons.
3.2 Access Control
Facial recognitions systems are very useful in access control
applications like using computer access. The size of the
crowd to identify is small. The shape of the face is also taken
in a natural way, e.g. Front and interior lighting.
3.3 Security
Today, more than ever today, safety is a major concern at
airports, as well as in airport office workers and passengers.
Airport defense systems using face recognition technology
have been used in many airports.
Anyone who is accredited by the system will be further
investigated by the public safety authorities. To prevent
others from exchanging information or exchanging
information with others when an authorized person leaves
the computer terminal for a short period of time, the user
will be constantly monitored whether the person in front of
the computer screen or at the user is the same person
authorized who is logged in.
3.4 Image database investigations
Search for photo databases of licensed drivers,beneficiaries,
missing children, immigrants and booking authorities.
3.5 Proof of identity
Elections, financial services, e-commerce, newborn
identification, national ID card, passport, working ID card.
3.6 Surveillance
Like the security application in public places, monitoring
user satisfaction with face recognition is less or less. White
lighting, face guidance, and other classifications all make
using face recognition for weather monitoring a daunting
task. Below are some examples of facial observations.
To upgrade the city’s surveillance system in London
Newham City, 300 cameras were connected to a closed-
circuit television (CCTV) control room. The city council says
the device has helped reduce crime by 34 percent since its
inception. There are similar ordinances in Birmingham, UK.
In 1999, Visionics received a contract from the National
Institute of Justice to develop CCTV smart devices.
4. CONCLUSIONS
In this research paper, we present the concepts of facial
recognition and their applications. This research paper can
give the reader a better understandingoftheprocessandthe
use of face recognition system. Different type of face
recognitions algorithms and techniquesarediscussedinthis
paper.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 458
In the future, two dimensional and three dimensional face
recognition and major applications such as student ID card,
electronic commerce, driving license, aadhar card and voter
ID card is a viable option. Hard work in face recognition and
this topic needs further research.
REFERENCES
[1] R. Jafri, H. R. Arabnia, “A Survey of Face Recognition
Techniques”, Journal ofInformationProcessingSystems,
Vol.5, No.2, June 2009.
[2] C. A. Hansen, “Face Recognition”, Institute for Computer
Science University of Tromso, Norway.
[3] M. D. Kelly. Visual identification of people by computer.
PhD thesis, Stanford University,Stanford,CA,USA,1971.
[4] T. Kanade. Computer Recognition of Human Faces, 47,
1977.
[5] W. Zhao, R. Chellappa, P. J. Phillips & A. Rosenfeld, “Face
recognitions literature survey”, ACM Computing
Surveys, Vol. 35, No. 4, December 2003, pp. 399–458.
[6] C. Gonzalez, R. E. Woods, S. liddins, "Digital Image
processing Using MATLAB".
[7] S. Suhas, A. Kurhe, Dr.P. Khanale, “Face Recognition
Using Principal Component Analysis and Linear
Discriminant Analysis on Holistic Approach in Facial
Images Database”, IOSR Journal of Engineering e-ISSN:
2250-3021, p-ISSN: 2278-8719, Vol. 2, Issue 12 (Dec.
2012), ||V4|| PP 15-23
[8] M. A. Turk and A. P. Pentland, "Face Recognition Using
Eigenfaces", 1991.
[9] S. Asadi, Dr. D. V. Subba R. V. Saikrishna, "A Comparative
study of Face Recognition with PCA and Cross-
Correlation Technique", IJCA(0975-8887), Volume 10-
No.8, November 2010.
[10] E. A. Abusham, A. T. B. Jin, W. E. Kiong, "FaceRecognition
Based on Nonlinear Feature Approach", American
Journal of Applied Sciences, 2008.
[11] A. Nigam, P. Gupta, "A New Distance Measure for Face
Recognition System", 2009 Fifth International
Conference on Image and Graphics
[12] Fei Wang, Mengqing Jiang, Chen Qian, Shuo Yang, Cheng
Li, Honggang Zhang, Xiaogang Wang, and Xiaoou Tang.
Residual attention network for image classification. In
Proceedings of the IEEE conference on computer vision
and pattern recognition, pages 3156–3164, 2017.
[13] Kai Wang, Xiaojiang Peng, Jianfei Yang, Debin Meng,and
Yu Qiao. Region attention networks for pose and
occlusion robust facial expression recognition. IEEE
TransactionsonImageProcessing,29:4057–4069,2020.
[14] Kai Wang, Shuo Wang, Zhipeng Zhou, Xiaobo Wang,
Xiaojiang Peng, Baigui Sun, Hao Li, and Yang You. An
efficient training approach for very large scale face
recognition. arXiv preprint arXiv:2105.10375, 2021.
[15] Xiaobo Wang, Tianyu Fu, Shengcai Liao, Shuo Wang,
Zhen Lei, and Tao Mei. Exclusivity-consistency
regularized knowledge distillation for face recognition.
In European
[16] Conference on Computer Vision, pages 325–342.
Springer International Publishing, 2020.
[17] Xiaobo Wang, Shuo Wang, ChengChi,ShifengZhang,and
Tao Mei. Loss function search for face recognition. In
International Conference on Machine Learning, pages
10029–10038. PMLR, 2020.
[18] Xiaobo Wang, Shuo Wang, Shifeng Zhang, Tianyu Fu,
Hailin Shi, and Tao Mei. Support vector guided softmax
loss for face recognition. arXiv preprint
arXiv:1812.11317, 2018.

More Related Content

PPTX
Face Recognition by Sumudu Ranasinghe
PPTX
Face recognition
PDF
IRJET - Design and Development of Android Application for Face Detection and ...
PPTX
Pattern recognition facial recognition
PDF
IRJET-A Survey on Face Recognition based Security System and its Applications
PPT
Facial_recognition_Siva vadapalli1.pptx.ppt
PDF
IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...
PPTX
Biometric
Face Recognition by Sumudu Ranasinghe
Face recognition
IRJET - Design and Development of Android Application for Face Detection and ...
Pattern recognition facial recognition
IRJET-A Survey on Face Recognition based Security System and its Applications
Facial_recognition_Siva vadapalli1.pptx.ppt
IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...
Biometric

Similar to Face Recognition System and its Applications (20)

PPTX
Biometric
PDF
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
PDF
Face Recognition Techniques - An evaluation Study
PDF
Techniques for Face Detection & Recognition Systema Comprehensive Review
PDF
Techniques for Face Detection & Recognition Systema Comprehensive Review
PPTX
Movie on face recognition in e attendace
PDF
Face Recognition Technology
PPTX
Face recognition
PPTX
Face Recognition Technology by Rohit
PPTX
Face recognition Technology By Rohit
PPTX
Real time face detection and recognition
PDF
Facial Recognition Mini project 3.pdf
PDF
Image Based Facial Recognition
PDF
Ck36515520
PPTX
Facial_recognition_systtem.pptx
PDF
O24114119
PPTX
Facial recognition
PPTX
Face recognition technology
PPTX
Face recognition technology
PDF
An optimal face recoginition tool
Biometric
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
Face Recognition Techniques - An evaluation Study
Techniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive Review
Movie on face recognition in e attendace
Face Recognition Technology
Face recognition
Face Recognition Technology by Rohit
Face recognition Technology By Rohit
Real time face detection and recognition
Facial Recognition Mini project 3.pdf
Image Based Facial Recognition
Ck36515520
Facial_recognition_systtem.pptx
O24114119
Facial recognition
Face recognition technology
Face recognition technology
An optimal face recoginition tool
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Ad

Recently uploaded (20)

PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
additive manufacturing of ss316l using mig welding
PPT
Project quality management in manufacturing
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
Construction Project Organization Group 2.pptx
PPTX
UNIT 4 Total Quality Management .pptx
DOCX
573137875-Attendance-Management-System-original
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
Welding lecture in detail for understanding
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
Well-logging-methods_new................
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
CH1 Production IntroductoryConcepts.pptx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
R24 SURVEYING LAB MANUAL for civil enggi
additive manufacturing of ss316l using mig welding
Project quality management in manufacturing
Automation-in-Manufacturing-Chapter-Introduction.pdf
Construction Project Organization Group 2.pptx
UNIT 4 Total Quality Management .pptx
573137875-Attendance-Management-System-original
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Operating System & Kernel Study Guide-1 - converted.pdf
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Welding lecture in detail for understanding
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Well-logging-methods_new................
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Internet of Things (IOT) - A guide to understanding
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
CH1 Production IntroductoryConcepts.pptx

Face Recognition System and its Applications

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 455 Face Recognition System and its Applications Shantanu Shahi1, Balveer Singh2 1Research Scholar, Faculty of Science & Engineering, PK University, Shivpuri, India 2Professor, Department of Computer Science & Engineering, PK University, Shivpuri, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Face Detection has one of the hottest topics of research and has many security and business applications in the field of image processing and pattern analysis. Availability of feasible technology as in addition to the growing demand for reliable security systems in the world today has been an encouraging many scientist to develop new methods for capturing of facial knowledge. A large number of scientists do different work for face detection from different fields such as image processing, neural networks, computer vision, psychology, computers graphics and pattern analysis and has also been increasingly accepted by the public for use in identification, security and law enforcement. The face recognition system has been described in three parts. The first describes the differences such as total aggregation, subtraction process and hybrid process. The second describes the application with examples, and finally the third discuss about future research in the field of face recognition. Key Words: Computer Vision, Holistic Matching Methods, Feature-based Methods, Hybrid Methods 1. INTRODUCTION Several face recognition algorithms and systems have emerged submittedandmadesignificantprogressinlasttwo decades. The performance of the face analysis system has developed a new height in the case of recent developments. However, a much work has been left to fulfill the need of further improvement in the face recognition system. Some environmental challenges changes in lighting, bodyposition, facial expressions, etc. Performance of facial analysis the system is directly related to theamountofchangeseenin the portrait. If we can eliminate these effects, it provides better face recognition results which lead a more reliable system [1]. The main criteria which can be producing a better result are listed below. 1.1 Illumination The images of human face captured in different lightening condition like image taken in sun light, image taking in a room and image taking in night with different type of lighting will produce different images of same person. This may or may not weaken some of the facial featurescausetoo bright or too dark objects in images. These imagesproducea different attributes of face parameters and decrease the performance of face recognitions system. (Fig. 1.) Fig -1: Same image with different illumination 1.2 Head Position In most cases face recognition systems are trained from the images in which whole face is visible but, in many cases, when we want to recognize the face of an unknown identity, it is not necessary that his/her face is fully captured in capturing device. Therefore, it is necessary that the image of a person will be taken in front of where the personislooking the camera. 1.3 Facial expression As mentioned earlier, most face recognition algorithms are standard and neutral portrait. Facial accessories such as glasses, facial hair (beard and stubble), and emotional expressions such as laughter, smile, grin, change some it can affect facial symptoms and classification. Best for automatic to overcome this problem, a face recognition system is desired, for example by modifying it feature selection. 1.4 Occlusion In general, people can know others even if they wear sunglasses and scarf. This is a challenge for automatedfacial recognition systems. Designed to replace the human brain. Another object, partial closureofperson'sface,sunglasses or scarf is a common problem with many facials analyzes application. These barriers cover some of the facial features and thus affect some of the facial features. The performance of the portrait may deteriorate.Manywaystosolvethisissue by splitting the closed parts of the image apart and ignoring them corresponding activity.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 456 1.5 Inter-Class Similarities It is not impossible to distinguish identical twins, but sometimes it's a tough job for parents. Therefore, similarity between classes is not just a challenge although it is a biometric authentication technology; italsofacesthehuman brain. That's the problem to distinguish between two different subjects with very similar characteristics. Among many cases multi-biometric techniques such as combining face and fingerprint recognition increase performance. 2. FACE RECOGNITION METHODS In the 1970s, facial recognition was seen as a two- dimensional cognitive problem[2].Usedtoidentifydistances from key points of facial recognition, such as measuring differences in facial expressions. But the familiar face recognition should be automatic. Face recognition is a difficult but elaborate issue that appeals to researchers from diverse backgrounds: psychiatry, cognitive impairment, neural networks, computing view, and computer graphics. In general, face recognition consists of two (2) stages, registration and identification / verification, as shown in Fig. 1. There are several modules,which areimagedetection,face recognition, training, knowledge and identification. Fig -2: Block Diagram for the Face Recognition System The list of face recognition methods are follows:- 1. Holistic Methods 2. Feature-based Methods 3. Hybrid Methods 2.1 Holistic Methods In thisapproach, total face area is calculatedastheinputdata for the face capture system. One of the best examples of holistic approaches is eigenfaces [8] (the most widely used facial recognition),keynoteanalysis,segregationanalysis[7], and independent assessment, etc. Fig -3: Face recognition method
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 457 2.2 Feature-based Methods In this method features which are necessary for face recognition are extracted. A major challenge of the delete feature is the "back" feature, which is when the system tries to recover features that are not visible due to major changes, such as the head pose when we match the front image with profile picture. [5]. 2.3 Hybrid Methods Hybrid face recognition technology combines holistic and featureextraction methods. Usually 3D graphics are usedfor mixing. The image of the face is captured in 3D, allowing the system to record the curves of the eye, such as the image of the chin or forehead. Even the face in contours can be used because the system uses depth and measuring axes, which provide enough information to create the whole face. 3D technology generally does this: capture, locate, measure, represent and compete. Capture - Capture faces by copying photos or capturing them in real time. Position - Determine the position, size and angle of the head. Measurements - Measure each curve of the face to model, carefully observing the outside of the eye, the inside of the eye, and the angle of the nose. Representation- converting models into numbers- digital representation and face-to-face comparison - comparing data received with faces in existing data. If you want to compare 3D images with existing 3D images, there is no need to make any changes. Most, however,images are rendered in 2D, which requires some modification to the 3D image. 3. FACE RECOGNITION APPLICATIONS Face recognition system may be very useful in human- computer interaction, virtual reality, data recovery, multimedia, computer entertainment, information security, and more. Other. Work Procedures, Medical Records, Internet Banking, Biometrics, such asPersonal Information - Passports, Driver's License, Automatic Self-Assessment - Border Control, Policy Private, e.g. Video Surveillance, Investigations, Personal Security - Driver Surveillance, and Home Video Surveillance. 3.1 Face Identification Facial recognition teachespeoplethroughfacial expressions. Face recognition creates an authorized account rather than just checking if an ID card (ID) or key is valid, or if the user knows a unique identifier (Pins) or password. The following is an example. Eliminate the national electoral balance because there is more than one election. Face recognition is directly compared to the face of voters without the use of a different ID number. When two faces are similar in question, then it is necessary to differentiate between the persons. 3.2 Access Control Facial recognitions systems are very useful in access control applications like using computer access. The size of the crowd to identify is small. The shape of the face is also taken in a natural way, e.g. Front and interior lighting. 3.3 Security Today, more than ever today, safety is a major concern at airports, as well as in airport office workers and passengers. Airport defense systems using face recognition technology have been used in many airports. Anyone who is accredited by the system will be further investigated by the public safety authorities. To prevent others from exchanging information or exchanging information with others when an authorized person leaves the computer terminal for a short period of time, the user will be constantly monitored whether the person in front of the computer screen or at the user is the same person authorized who is logged in. 3.4 Image database investigations Search for photo databases of licensed drivers,beneficiaries, missing children, immigrants and booking authorities. 3.5 Proof of identity Elections, financial services, e-commerce, newborn identification, national ID card, passport, working ID card. 3.6 Surveillance Like the security application in public places, monitoring user satisfaction with face recognition is less or less. White lighting, face guidance, and other classifications all make using face recognition for weather monitoring a daunting task. Below are some examples of facial observations. To upgrade the city’s surveillance system in London Newham City, 300 cameras were connected to a closed- circuit television (CCTV) control room. The city council says the device has helped reduce crime by 34 percent since its inception. There are similar ordinances in Birmingham, UK. In 1999, Visionics received a contract from the National Institute of Justice to develop CCTV smart devices. 4. CONCLUSIONS In this research paper, we present the concepts of facial recognition and their applications. This research paper can give the reader a better understandingoftheprocessandthe use of face recognition system. Different type of face recognitions algorithms and techniquesarediscussedinthis paper.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 458 In the future, two dimensional and three dimensional face recognition and major applications such as student ID card, electronic commerce, driving license, aadhar card and voter ID card is a viable option. Hard work in face recognition and this topic needs further research. REFERENCES [1] R. Jafri, H. R. Arabnia, “A Survey of Face Recognition Techniques”, Journal ofInformationProcessingSystems, Vol.5, No.2, June 2009. [2] C. A. Hansen, “Face Recognition”, Institute for Computer Science University of Tromso, Norway. [3] M. D. Kelly. Visual identification of people by computer. PhD thesis, Stanford University,Stanford,CA,USA,1971. [4] T. Kanade. Computer Recognition of Human Faces, 47, 1977. [5] W. Zhao, R. Chellappa, P. J. Phillips & A. Rosenfeld, “Face recognitions literature survey”, ACM Computing Surveys, Vol. 35, No. 4, December 2003, pp. 399–458. [6] C. Gonzalez, R. E. Woods, S. liddins, "Digital Image processing Using MATLAB". [7] S. Suhas, A. Kurhe, Dr.P. Khanale, “Face Recognition Using Principal Component Analysis and Linear Discriminant Analysis on Holistic Approach in Facial Images Database”, IOSR Journal of Engineering e-ISSN: 2250-3021, p-ISSN: 2278-8719, Vol. 2, Issue 12 (Dec. 2012), ||V4|| PP 15-23 [8] M. A. Turk and A. P. Pentland, "Face Recognition Using Eigenfaces", 1991. [9] S. Asadi, Dr. D. V. Subba R. V. Saikrishna, "A Comparative study of Face Recognition with PCA and Cross- Correlation Technique", IJCA(0975-8887), Volume 10- No.8, November 2010. [10] E. A. Abusham, A. T. B. Jin, W. E. Kiong, "FaceRecognition Based on Nonlinear Feature Approach", American Journal of Applied Sciences, 2008. [11] A. Nigam, P. Gupta, "A New Distance Measure for Face Recognition System", 2009 Fifth International Conference on Image and Graphics [12] Fei Wang, Mengqing Jiang, Chen Qian, Shuo Yang, Cheng Li, Honggang Zhang, Xiaogang Wang, and Xiaoou Tang. Residual attention network for image classification. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 3156–3164, 2017. [13] Kai Wang, Xiaojiang Peng, Jianfei Yang, Debin Meng,and Yu Qiao. Region attention networks for pose and occlusion robust facial expression recognition. IEEE TransactionsonImageProcessing,29:4057–4069,2020. [14] Kai Wang, Shuo Wang, Zhipeng Zhou, Xiaobo Wang, Xiaojiang Peng, Baigui Sun, Hao Li, and Yang You. An efficient training approach for very large scale face recognition. arXiv preprint arXiv:2105.10375, 2021. [15] Xiaobo Wang, Tianyu Fu, Shengcai Liao, Shuo Wang, Zhen Lei, and Tao Mei. Exclusivity-consistency regularized knowledge distillation for face recognition. In European [16] Conference on Computer Vision, pages 325–342. Springer International Publishing, 2020. [17] Xiaobo Wang, Shuo Wang, ChengChi,ShifengZhang,and Tao Mei. Loss function search for face recognition. In International Conference on Machine Learning, pages 10029–10038. PMLR, 2020. [18] Xiaobo Wang, Shuo Wang, Shifeng Zhang, Tianyu Fu, Hailin Shi, and Tao Mei. Support vector guided softmax loss for face recognition. arXiv preprint arXiv:1812.11317, 2018.