• 沒有找到結果。

Chapter 4 Experimental Results

4.3 Discussion

For face detection, Table 1 shows that the detection rate of our face detector is more than eighty percent, and it is sufficient for a practical entrance system. The training and testing data are all frontal faces which contains many faces of eastern people.

However, there are still some situations that may cause the system fail. Figure 4-14 and Fig. 4-15 are the examples of system fail. Sometimes the shape and texture of non-faces is too close to the truly faces, the faces are non-frontal faces or partial occlusion or too small to be detected.

49

Fig. 4-14: Examples of system fail #1

Fig. 4-15: Examples of system fail #2

For face identification, Table 3 shows that the detection rate of our face identifier is more than ninety percent for the five training images for each person, and it is enough for many face identification applications. The training and testing data all consist of five images of different head orientations.

There are some situations making the system fail, such as false acceptance and false rejection. False acceptance means the impostor is identifying as the client by the face identifier; oppositely, false rejection means the client is identifying as the impostor. Figure 4-20 is an example of false acceptance , the impostor (Fig. 4-16(a)) is identified as the client (Fig. 4-16(b)).

50

(a)

(b)

Fig. 4-16: Examples of system fail #3: (a) the impostor (b) the client

51

Chapter 5

Conclusions and Future Work

In this thesis, we present a system for the multi-client identification using adaptive probabilistic model (APM). The design of this system is based on the principles of robustness and practicability.

For face detection, the technique of lighting normalization using histogram fitting is applied to improve the performance of face detector., and a region-based clustering method is proposed to deal with the problem of multi-candidates around the faces The experimental results show that the process of lighting normalization can actually improve the detection rate of face detector.

For face identification, adaptive probabilistic model (APM) is introduced to model the characteristic of the clients. According to the design of APM, the system can on-line register new clients and on-line update the information of the clients. The APM is composed of five images of different head orientations for each person. By the process of adaptive updating, the weights of five different poses and the matched probabilistic function are adjusted to adapt the latest information of registered clients..

The experimental results show that the proposed APM technique actually has the good performance for face identification.

To further improve the performance and the robustness of our system, some enhancements can be done in the future:

(a) A robust face detector is necessary for a practical face recognition system. If the faces are not extracted from the images correctly, the face identifier cannot work in the following process. For our system, one of the restrictions is that we cannot handle the variant poses of non-frontal faces, such as the

52

side faces. It is probably to select the variant poses of non-frontal faces be the training sets to solve this problem.

(b) It is hard to identify the face if the variation of the rotated angle for the face is too big. Before the process of face identifier, we may employ a method of face calibration to deal with this problem. Furthermore, this method of face calibration can also use in face detector.

(c) For face identification, a threshold is used to discriminate between the clients and the impostors. There is a trade-off problem on the selection of the threshold. A big threshold can prevent an imposter being identified as a client, but it also increases false rejections of clients. There are two possible solutions for this problem: one is to increase the specificity of face model, the other is to apply feature extraction methods which can extract more distinguishable features than eigenfaces.

(d) The tolerable degree of the proposed system may not be affordable for requirements of large numbers of clients, for instance, an entrance guard system for a big company with hundreds of staff. Hence the tolerable degree of the identification system should be improved in the future.

(e) This work lacks quantitative results of the whole face recognition system that consist of face detection and face identification. In the future work, this kind of experiments will be designed and implemented.

53

References

[1] A. k. Jain, R. Bolle, and S. Pankanti, “Biometrics: Personal Identification in Networked Society,” eds. Kluwer Academic, 1999.

[2] D. Zhang, “Automated Biometrics: Technologies Systems,” eds. Kluwer Academic, 2000.

[3] C.P. Papageorgiou, M. Oren, and T. Poggio, “A General Framework for Object Detection,” International Conference on Computer Vision, pp. 555-562, Jan.

1998.

[4] Viola Paul and J. Jones. Michael, “Robust Real-Time Face Detection,”

International Journal of Computer Vision 57(2), 137-154, 2004.

[5] Y. Freund and R. E. Schapire, “A decision-theoretic generalization of on-line learning and an application to boosting,” In Computational Learning Theory:

Eurocolt 95, Springer-Verlag, pp. 23-57, 1995.

[6] S. Z. Li, Q. Zhang, H. Shum, and H. J. Zhang, “FloatBoost Learning for Classification,” Neural Information Processing Systems, 2002.

[7] Rainer Lienhart and Jochen Maydt, “An Extended Set of Haar-like Features for Raid Object Detection,” IEEE ICIP 2002, Vol. 1, pp. 900-903, 2002.

[8] P. N. Belhumeur, J. Hespanha, and D. Kriegman, “Eigenfaces vs. fisherfaces:

recognition using class specific linear projection,” IEEE Trans. Pattern Anal.

Mach. Intell. 17 (7) (1997) 711-720.

[9] T. F. Cootes, J. F. Edwards, and C. J. Taylor. “Active appearance models,” IEEE Trans. Pattern Anal. Mach. Intell. 23 (6) (2001) 681-685.

[10] L. Wiskott, J. M. Fellous, and C. Von Der Malsburg, “Face recognition by elastic bunch graph matching,” IEEE Trans. Pattern Anal. Mach. Intell. 19 (1997)

54

775-779.

[11] K. W. Bowyer, K. Chang, and P. Flynn, “A Survey of approaches and challenges in 3D and multi-model 3D + 2D face recognition,” Comput. Vis. Image Understanding 101 (1) (2006) 1-15.

[12] W. Zhao, R. Chellappa, A. Rosenfeld, and P. J. Phillips, “Face recognition: a literature survey,” ACM Comput. Surv. (2003) 399-458.

[13] S. Du, and R. K. Ward, “Face recognition under pose variations,” J. Franklin Inst. 343 (2006) 596-613.

[14] D. J. Beymer, “Face recognition under varying pose,” Technical Report 1461, MIT AI Lab, Massachusetts Institute of Technology, Cambridge, MA, 1993.

[15] M. Kirby, and L. Sirovich, “Application of the KL procedure for the characterization of human faces,” IEEE Trans. Pattern Amal. Mach. Intell. 12 (1) (1990) 103-108.

[16] L. Sirovich, and M. Kirby, “Low-dimensional procedure for characterization of human faces,” J. Opt. Soc. Am. 4 (1987) 519-524.

[17] M. Turk, and A. Pentland, “Eigenfaces for recognition,” J. Cogn, Neurosci. 3 (1) (1991) 71-86.

[18] A. Sehad, H. Hocini, A. Hadid, M. Djeddi, and S. Ameur, “Face recognition under varying views,” Lect. Notes Comput. Sci. 1811 (2000) 258-267.

[19] H. Murase, and S. K. Nayar, “Visual learning and recognition of 3-D objects from appearance,” Int. J. Comput, Vis. 14 (1995) 5-24.

[20] R. C. Gonzales and R. E. Woods, “Digital Image Processing,” Addison Wesley, 1993.

[21] R. Ebrahimpour, E. Kabir, M. R. Yousefi, “Teacher-directed learning inview-independent face recognition with mixture of experts using single-view eigenspaces,” Journal of the Frankin Institute 345 (2008) 87-101.

55

[22] S. Lawrence, C. L. Giles, A. C. Tsoi ,and A. D. Back, “Face Recognition : A Convolutional Neural-Network Approach,” IEEE Transaction on Neural Networks, Vol. 8, NO.1, January 1997.

相關文件