For more project topics and materials visit: http://www.classgist.
com
Enquiries: http://www.classgist.com/contactus.aspx
DESIGN AND IMPLEMENTATION OF AN ANDROID FACE
DETECTION AND RECOGNITION SYSTEM
TABLE OF CONTENT
Cover page
Title page
Approval page
Dedication
Acknowledgment
Table of content
Abstract
CHAPTER ONE
1.0 Introduction
1.1 Background of the research
1.2 Statement of research problem
1.3 Objectives of the study
1.4 Significance of the study
1.5 Scope of the study
1.6 Limitation of the study
1.7 Definition of terms
CHAPTER TWO: LITERATURE REVIEW
2.0 Introduction
2.1 Review of concept
2.2 Review of related work
2.3 Empirical Study
2.4 System Architectural Framework/Structure
2.5 Summary of the review
CHAPTER THREE: SYSTEM ANALYSIS AND DESIGN
3.1 Introduction
3.5 Problem of the existing system
3.2 Method of data collection
3.3 Data preparation
3.4 Program structure
3.6 Justification for the new system
3.7 System modeling
3.8 System flow chat
3.9 Activity diagram
3.10 Program flow chart
3.11 Database specification and design
For more project topics and materials visit: http://www.classgist.com
Enquiries: http://www.classgist.com/contactus.aspx
CHAPTER FOUR: SYSTEM TESTING AND
DOCUMENTATION
4.1 Introduction
4.2 Program language justification
4.3 Systems requirement
4.4 Implementation details
4.5 Procedure testing plan
CHAPTER FIVE
SUMMARY, CONCLUSION AND RECOMMENDATIONS
5.1 Summary
5.2 Conclusion
5.3 Recommendation
Bibliography
Source code
CHAPTER ONE
1.0 INTRODUCTION
Face recognition system is an application for identifying
someone from image or videos. Face recognition is classified
into three stages ie)Face detection, Feature Extraction, Face
Recognition. Face detection method is a difficult task in image
analysis. Face detection is an application for detecting an
object, analyzing the face, understanding the localization of the
face and face recognition. It is used in many application for
new communication interface, security etc. Face Detection is
employed for detecting faces from an image or from videos.
The main goal of face detection is to detect human faces from
different images or videos. The face detection algorithm
converts the input images from a camera to binary pattern and
therefore the face location candidates using the AdaBoost
Algorithm. The proposed system explains regarding the face
detection based system on AdaBoost Algorithm. AdaBoost
Algorithm selects the best set of Haar features and implements
in cascade to decrease the detection time. The proposed
For more project topics and materials visit: http://www.classgist.com
Enquiries: http://www.classgist.com/contactus.aspx
System for face detection is intended by using Verilog and
ModelSim and also implemented in FPGA.
Face Detection System is to detect the face from image or
videos. To detect the face from video or image is gigantic. In
face recognition system the face detection is the primary stage.
Face recognition is a pattern recognition technique and one of
the most important biometrics; it is used in a broad spectrum
of applications. The accuracy is not a major problem that
specifies the performance of automatic face recognition system
alone, the time factor is also considered a major factor in real-
time environments. Recent architecture of the computer
system can be employed to solve the time problem, this
architecture represented by multi-core CPUs and many-core
GPUs that provide the possibility to perform various tasks by
parallel processing. However, harnessing the current
advancements in computer architecture is not without
difficulties. Motivated by such a challenge, this research
proposes a Face Detection and Recognition System (FDRS). In
doing so, this research work provides the architectural design,
detailed design, and four variant implementations of the FDRS.
1.1 BACKGROUND OF THE RESEARCH
Face recognition has gained substantial attention over in
past decades due to its increasing demand in security
applications like video surveillance and biometric surveillance.
Modern facilities like hospitals, airports, banks, and many more
other organizations are being equipped with security systems
including face recognition capability. Despite current success,
there is still ongoing research in this field to make facial
recognition system faster and accurate. The accuracy of any
face recognition system strongly depends on the face detection
system. The stronger the face detection system the better the
recognition system would be. A face detection system can
successfully detect a human face from a given image
containing face/faces and from live video involving human
presence. The main methods used in these days for face
detection are feature based and image based. Feature-based
method separates human features like skin color and facial
features whereas image-based method used some face
patterns and processed training images to distinguish between
face and non faces. Feature-based method has been chosen
because it is faster than image-based method and its’
For more project topics and materials visit: http://www.classgist.com
Enquiries: http://www.classgist.com/contactus.aspx
implementation is far more simplified. Face detection from an
image is achieved through image processing. Locating the
faces from images is not a trivial task; because images not just
contain human faces but also non-face objects in clutter
scenes. Moreover, there are other issues in face recognition
like lighting conditions, face orientations and skin colors. Due
to these reasons, the accuracy of any face recognition system
cannot be 100%.
Face recognition is one of the most important biometrics
methods. Despite the fact that there are more reliable
biometric recognition techniques such as fingerprint and iris
recognition, these techniques are intrusive and their success
depends highly on user cooperation. Therefore, face
recognition seems to be the most universal, non-intrusive, and
accessible system. It is easy to use, can be used efficiently for
mass scanning, which is quite difficult, in case of other
biometrics. Also, it is natural and socially accepted.
Moreover, technologies that require multiple individuals to use
the same equipment to capture their biological characteristics
probably expose the user to the transmission of germs and
impurities from other users. However, face recognition is
completely non-intrusive and does not carry any such health
dangers.
Biometrics is a rapidly developing branch of information
technology. Biometric technologies are automated methods and
means for identification based on biological and behavioral
characteristics of an individual. There are several advantages of
biometric technologies compared to traditional identification
methods. To take adequate measures against increasing
security risks in the modern world, countries are considering
these advantages and are shifting to new generation
identification systems based on biometric technologies.
1.2 STATEMENT OF RESEARCH PROBLEM
Biometric systems are becoming an important element
(gateway) for information security systems. Therefore
biometric systems themselves have to satisfy high-security
requirements. Unfortunately, producers of biometric
technologies do not always consider security precautions. In
publications regarding biometric technologies, drawbacks and
weaknesses of these technologies have been discussed. Since
For more project topics and materials visit: http://www.classgist.com
Enquiries: http://www.classgist.com/contactus.aspx
biometrics form the technology basis for large scale and very
sensitive identification systems (e.g. passports, identification
cards), the problem of adequate evaluation of the security of
biometric technologies is a current issue.
Also, some other issues with face detection and recognition
system are on individual with identical face like identical twins
and others, in situation like this it is possible for the system to
make mistake or error in processing the person image so as to
grant access to the rightful user.
1.3 OBJECTIVES OF THE STUDY
The objective of this project is to implement a face
recognition system which first detects the faces present in
either single image frames; and then identifies the particular
person by comparing the detected face with image database or
in both image frames.
In addition to the main objective of this research work, the
researcher also went far more to add other features to the new
system which are as fellow.
1. One of the objectives of this system is to design a system
that will help the organization maintain strong security in
the work environment.
2. Highlight areas of vulnerability in the new system
3. Develop a ridged and secure database for the organization
to enable them secure their sensitive data and records.
1.4 SIGNIFICANCE OF THE STUDY
This study is primarily aimed at increasing efficiency in
security, this research work will help the users in maintaining
data. This system will reduce the rate of fraudulent activities as
it can as well keep track of registered users and grant them
access upon face recognition completion.
Also, the knowledge that would be obtained from this research
will assist the management to grow; also this research work
will also be of help to the upcoming researcher in this field of
study both with the academic students on their study.
1.5 SCOPE OF THE STUDY
For more project topics and materials visit: http://www.classgist.com
Enquiries: http://www.classgist.com/contactus.aspx
The scope of this study covers only on face detection and
recognition, accessing previous records and making matched
for the data, updating of records and making delete.
1.6 LIMITATION OF THE STUDY
Many limitations encountered, were in the process of
gathering information for the development of this project work
to this extent. It was not an easy one; so many constraints
were encountered during the collection of data.
The limitation focuses on the following constraints;
i. FINANCIAL CONTRAINTS: the cost of sourcing for
information and data that are involved in this work is high in
the sense that we all know that information is money.
ii. TIME: A lot of time was involved in writing and developing
this work,
iii. Irregularities in power supply also dealt harshly with the
researcher.
1.7 DEFINITION OF TERMS
Analysis: Breaking a problem into successively manageable
parts for individual study.
Attribute: A data item that characterizes an object
Data flow: Movement of data in a system from a point of
origin to a specific destination indicated by a line and arrow
Data Security: Protection of data from loss, disclosure,
modification or destruction.
Design: Process of developing the technical and operational
specification of a candidate system for implements.
File: Collection of related records organized for a particular
purpose also called dataset.
Flow Chart: A graphical picture of the logical steps and
sequence involved in a procedure or a program.
Form: A physical carrier of data of information
Implementation: In system development-phase that focuses on
user training, site preparation and file conversion for installing
a candidate system.
Maintenance: Restoring to its original condition
Normalization: A process of replacing a given file with its
logical equivalent the object is to derive simple files with no
redundant elements.
For more project topics and materials visit: http://www.classgist.com
Enquiries: http://www.classgist.com/contactus.aspx
Operation System: In database – machine based software
that facilitates the availability of information or reports through
the DBMS.
Password: Identity authenticators a key that allows access to
a program system a procedure.
Record: A collection of aggregates or related items of data
treated as a unit.
Source Code: A procedure or format that allows
enhancements on a software package.
System: A regular or orderly arrangements of components or
parts in a connected and interrelated series or whole a group of
components necessary to some operation.
System Design: Detailed concentration on the technical and
other specification that will make the new system operational.
1.8 ORGANIZATION OF THE WORK
The project is organized in five chapters. With introduction
already being explained in chapter 1 and the whole idea of this
research work presentation in chapter one, like objective of the
study, statement of the research area of coverage limitation
and definition of terms all this makes up the chapter one.
Chapter 2; this section deals with the review of study, review
of concept theories upon which this work is built on, the
potential issues in any face recognition system in the form of
difference in the lighting conditions in which the same picture
appears differently and the variations in skin color and pose.
Chapter 3 talks about the software tools used in the project
mainly related to Android and JAVA programming language.
The methodology at which this research work will be
implemented.
In chapter 4 the system is implemented and presented with its
analysis. Functions of the system and the operation of the
system is also, in depth explained for reader understating and
comprehension. The system requirement is also detailed and
the platform at which the system can run on.
Chapter 5 summaries the whole work done and make possible
recommendation and suggest other points to be included into
the work for future propose
For more project topics and materials visit: http://www.classgist.com
Enquiries: http://www.classgist.com/contactus.aspx
REFERENCE
P. N. Belhumeur, J. P. Hespanha, and D. J. Kriegman,
"Eigenfaces vs. Fisherfaces: Recognition Using Class Specific
Linear Projection", IEEE Transactions on Pattern Analysis and
Machine Intelligence, vol. 19, no. 7, 1997, pp. 711-720.
W. H. Press, S. A. Teukolsky and W. T. Vetterling, Numerical
recipes in C: the art of scientific computing, 2nd ed.,
Cambridge University Press, 1992. ISBN:0-521-43108-5
I. Sajid, M.M. Ahmed, I. Taj, M. Humayun, F. Hameed, "Design
of High Performance FPGA based Face Recognition System",
PIERS 2008 in Cambridge, USA, 2-6 July, 2008.
R. Zhang, h. Chang, " A literature survey of face recognition
and reconstruction technique", Technical report, University of
Texas, December, 2005.
M. Turk, A. Pentland, Eigenfaces for Recognition, Journal of
Cognitive Neuroscience, vol. 3, no. 1. 1991, pp. 71-86.
[CrossRef]
Matsumoto T., Matsumoto H., Yamada K., Hoshino S., Impact
of artificial “gummy” fingers on fingerprint systems, in Optical
Security and Counterfeit Deterrence Techniques IV, vol. 4677
of Proceedings of SPIE, pp. 275–289, San Jose, Calif, USA,
January 2002.