Abstract—In this world of globalization there are many social networking sits and it contains huge database (images) that are uploaded on it. For mining those images for exact person, we haven’t any way for extracting those images from online social networking, thus the face detection method originate for social media side. In the image processing, face detection is one of the challenging problem yet we have novel methods present to face challenge. Face annotation methods are playing very important role in real world knowledge system such as online photo collection management, new video representation etc. Each method, which is used for auto face detection in real world, has well performance and other side it having limitations also. How to overcome from these limitations? For that a survey has taken and collects those problems. Also this paper addresses various methods that are used to facial image annotation and how to overcome from those limitations. This survey will help in future for image and web community also there are some new open challenging problems for face annotation. Index Terms—Face detection, face annotation, huge …show more content…
To extract images from database by CBIR method, firstly user has to provide retrieval system and query image or sample facial image, after that retrieval system will perform operation on query image and change it into internal representation of feature vector. Then similar feature of feature between feature vectors of query image in database are calculated and retrieve the results in indexing form. The indexing results will help to find the image in dataset. This how the CBIR is working [14],[19] and also to more on study we used paper [18], which consist the study of 200 papers of CBIR method and parallel there was one more method is semantic image annotation, which overcome problems related with the CBIR method
Thus our proposed optimal feature subset selection based on multi-level feature subset selection produced better results based on number of subset feature produced and classifier performance. The future scope of the work is to use these features to annotate the image regions, so that the image retrieval system can retrieve relevant images based on image semantics.
In accession to the binary images, the proposed method may be tested on discrete color images also. These type of
We have used support vector machine (SVM) for classification task. We have used RBF kernel for training the classifier. 10 fold cross-validation is used for determining cost parameter C and best kernel width for RBF kernel function. If we perform classification without any feature selection or feature extraction then the accuracy is 48.99% and 65.82% for AVIRIS and HYDICE image respectively which is very poor and it highly motivates us to apply feature reduction technique. In table II we have shown the classification accuracy for each of the pair of class for PCA, MI and PCA-QMI.
The face recognition model developed by Bruce and Young has eight key parts and it suggests how we process familiar and unfamiliar faces, including facial expressions. The diagram below shows how these parts are interconnected. Structural encoding is where facial features and expressions are encoded. This information is translated at the same time, down two different pathways, to various units. One being expression analysis, where the emotional state of the person is shown by facial features. By using facial speech analysis we can process auditory information. This was shown by McGurk (1976) who created two video clips, one with lip movements indicating 'Ba' and other indicating 'Fa'. Both clips had the sound 'Ba' played over the clip.
Another common and inappropriate use of facial recognition technology exists in many social media platforms and systems. In the current social media domain, when you post or are tagged in a photo, you are, in essence, saying goodbye to anonymity and the right to privacy that we value socially and culturally. Photos from Facebook, Twitter, and Instagram can all be used online to create an unintended profile: your “face print”. Using this “face print”,
Facial recognition is a technological product of the digital age that is continuing to evolve. The efficiency of the technology is an asset to crime detectives apprehending criminals, or the government tracking suspected terrorists for the safety of the country. It can also be used on a corporate level to allow a business to understand their ideal customer, or to increase the intractability of their website. While these abilities are positives to the people using them, the data collection may be harming more than it is helping. Considering the benefits of facial recognition, it is important for people to see what they are giving up for a more efficient experience. Facial recognition technology forces users to relinquish control of their own
Bruce and Young’s theory of recognition tells us that human’s extract several kinds of information from faces; and that there are eight different components of such information. Such as structural encoding, expression analysis, facial speech analysis, directed visual processing, face recognition nodes,
In the present contemporary era, facial recognition technologies are being installed by the companies in an extensive sense that surely reflects a continuum of growing hi-tech superiority and complexity. At the most ordinary level, facial detection is done by this technology which means that a photo is just detected and located for a face ("Facing Facts: Best Practices for Common Uses of Facial Recognition Technologies," 2012).
Marin Kaste wrote the article “A Look Into Facebook’s Potential To Recognize Anybody’s Face.” This article discusses the challenge of using facial recognition software to determine an individual’s name. The software used for facial recognition has numerous defects, which causes problems when trying to identify an individual using a poor quality photo. Another problem with facial recognition software is if an individual is not in the database, then they cannot be found using the software. The article explains that the problems of facial recognition could be solved by collecting all of the photos of individuals on Facebook to create a universal database.
Another common and inappropriate use of facial recognition technology exists in many social media platforms and systems. In the current social media domain,
Kakadiaris et al. [21] addressed the problem of deformation caused by large expression by fitting an annotated face model on facial surface. This model is well suited to study geometrical variability across faces and hence can model the deformation of face. Here the face annotation is fully automatic and they used advanced multistage alignment algorithms for matching the faces. The annotated face model is deformed elastically to fit each face, thus matching different anatomical areas such as the nose, eyes, and mouth. This work is able to recognize faces in presence facial expressions and it also provides invariance to 3D capture devices through suitable preprocessing steps. Here scalability in both time and space is achieved by converting
Through this routine of advanced technology analysis, it has been established to increase the results and have hastened the procedure of identifying suspects of crimes. Facial recognition is also necessary for public involvement and observation as it also aids law enforcement officials to more easily zone in on possible suspects of a crimes being caught. With the use of facial recognition, it constantly has been proven quite an effective method with the incorporation of this technique.
Out of all of my interests in computer technology, it is also the topic of my graduation thesis. Facial recognition has recently accomplished great achievements since its acknowledgment rate at many institutions has nearly reached 100%, but there are still many obstacles. One of them is the difficulty in recognizing children, understanding the meaning behind the picture and issues with age variation. The performance of most facial recognition algorithms significantly vary with different sample sets. My research is preliminarily and targeted to the aforementioned
Automatic face recognition has always been a major focus of research for a few decades, because of numerous practical applications where human identification is needed. Compared to other methods of identification (such as fingerprints, voice, footprint, or retina), face recognition has the advantage of its non-invasive and user friendly nature. Face images can be captured from a distance without interacting with the person, which is particularly beneficial for security and surveillance purposes. Furthermore, extra personal information, like gender, face expressions or age, can be obtained by further analyzing recognition results. Nowadays, face recognition technology has been widely applied to public security, person verification, Internet
The Report presents a hybrid neural network solution, which compares favorably with other methods and recognizes a person within a large database of faces. These neural systems typically return a list of most likely people in the database. Often only one image is available per person. First a database is created, which contains images of various persons. In the next stage, the available images are trained and stored in the database. Finally it classifies the authorized person’s face, which is used in security monitoring system. Faces represent complex, multidimensional, meaningful visual stimuli and developing a computational model for face recognition is difficult. Face has certain distinguishable landmarks that are the peaks and valleys that sum up the different facial features. There are about 80 peaks and valleys on a human face. The following are a few of the peaks and valleys that are measured by the software: