Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Jobin Reji Abraham, Jobin , Saniya P M, George Dominic, M Arjun
DOI Link: https://doi.org/10.22214/ijraset.2022.47854
Certificate: View Certificate
Due to various suspicious activity, the surveillance system continues to emerge in the technical field. Everyday security threats can have a serious impact on people\'s day-today activity. In this area, numerous techniques have been developed, however some issues have not yet been overcome. The research described in this white paper offers more precise video surveillance with less processing complexity. The system\'s most crucial component includes location, recognition and facial recognition. The technology pulls highlighted facial information from a live environment or video dataset. The currently recorded video data will then be used to extract the face and background frames. The extracted facial picture data is then compared to the database\'s face image. A security alarm or signal is issued to prompt the security team to take action if no data is discovered that fits the already-existing data. The suggested solution outperforms current systems in terms of accuracy, efficiency, and cost.
I. INTRODUCTION
The directed gradient graph has demonstrated great performance across a wide range of study areas, particularly in the detection of pedestrians. However, facial recognition systems hardly ever use this technique. This method aims to apply the original HOG and its variants to assess the impact of different factors and develop new facial recognition features quickly and efficiently. Information-theoretical criteria have also been developed to assess the potential classification of different functions. Although the comparative tests using the feature descriptor are relatively simple, the proposed HOG feature achieves approximately the same detection rate in a much shorter computation time than Haar-Cascade and the others. Other algorithms are widely used specific to do.
Facial recognition has important applications in biometrics and in many security and surveillance related systems. Over time, there will be strong developments in the field of technology, leading to the formation of a smart society. Smart civilizations try to limit the involvement of humans and machines. This concept also introduces a fresh paradigm for monitoring and security. The main issue of policing persons accessing the region must be addressed by all governmental and private security groups. Organizations face many challenges in this regard. Even if a person is authenticated, the employee still needs to be monitored, which affects the performance of the system. The identification of hostile activity in the monitored region in real-time is another significant difficulty in this field. System performance is also impacted by environmental modifications like weather and lightning.
False alarms are another issue. False alarms can bar authorised people from entering. Monitoring authentication based on a variety of criteria is one of the hottest security research topics. Biometrics and radio frequency identification tags are some of these criteria. The biometric technology features fingerprint and retinal eye matching in addition to face detection and identification. Facial recognition is one of the key biometric components in authentication.
The major goal of this study is to suggest a face detection and recognition system that uses facial features to identify a person. In this study, the classification job is carried out using a common multilayer neural network and specific face characteristics. As template vectors for the neural network, the extracted characteristics are recognised and displayed. Regardless of various facial motions, the learning algorithm detects faces by learning the approximate aspects of the face. Based on the movement of the face, the feature matrix alters. The classifier may be trained to recognise a specific individual in a crowd using the data from four separate video sequences. Specific face identification and recognition issues can be resolved using a variety of frameworks, including geometry and pattern matching techniques. In order to make the most information available with the least amount of complexity, Principal Components Analysis (PCA), a feature/variable reduction technique, reduces a big number of features/variables into a smaller number. The linear matching technique and linear discriminant analysis have a connection (LDA).
Almost usually, the sole source that can be utilised to find quiet things is image intensity, which contains both identification and noise.
The relative value, which takes into account changes in the structure and texture of the item, is what actually counts, not the absolute worth. Numerous feature selection and mining techniques are frequently employed. Both local descriptors and global approaches like PCA and LDA have lately been studied. A wide interlayer distribution and a small intraclass distribution are desirable characteristics for a descriptor for the local face region. In other words, the descriptor needs to be robust against things like low image quality, light alterations, and minor distortion. Information theory has been used to provide criteria for evaluating the possible categorization of various functions.
When used in conjunction with local spatial histograms and normalization in the scale-invariant feature-transform (SIFT) approach scale, HOG offers a fundamental picture patch descriptor for matching scale-invariant key points. The fundamental tenet of HOG features is that, even in the absence of antagonism, the local form and shape of an object may frequently be rather effectively described by the distribution of local intensity gradients or edge directions gradients precise shape or the appropriate edge places. Because the histogram offers translational invariance, directional analysis is effective for changes in light.
The HOG function is very helpful for locating textured objects with flexible forms as it summarises the distribution of measurements over various sections of the picture. Convolutions that are used to find the presence of a feature in an image are comparable to Haar features. Using machine learning methods, Haar-Cascades creates a function from a huge number of both negative and positive pictures. The algorithm's feature extraction step is this one.
II. LITERATURE SURVEY
Due to the rise in daily security dangers, CCTV has turned into an important study subject. Effective security threat mitigation techniques include face recognition and authentication. The first semi-automatic method for developing facial recognition systems was created in 1960. Viola and Jones have developed functional continuous real-time face recognition throughout the years built on wavelet. The initial phase in their system is motion and position detection. Particularly, face detection and identification are necessary for the remaining procedures. Through background removal models, a moving human face is detected and localised in the video.
Any object identification approach is based on the basic idea that pictures from a digital camera feed are first subjected to a set of rules using a background subtraction sample. This technique yields a picture devoid of any transfer components. Analysing the bottom pattern will reveal further information. Background exclusion has a number of drawbacks, including low-resolution cameras' bad signal-to-noise ratios, motion blur in the camera's lens, background noise, compression artefacts, altered illumination, and tree vibrations.
Additionally, recognition comes after face recognition and involves verifying a person's personality by asking if their facial coordinates are present in a dataset or database. Face recognition technology is becoming increasingly crucial in a variety of hot spots, and as a result, several extremely trustworthy everyday life apps are being created. Artificial neural networks have recently been used to a variety of facial recognition applications in an effort to get more accurate results. It is made up of various parts that cooperate to provide the intended purpose. The classification of gender and human facial expressions has also been done using neural networks. In order to improve accuracy, neural networks perform well on photographs taken under various lighting situations.
The main disadvantage of NN is that you need a lot of time to train it. ANN realized facial care through learning ancient skills. NN and advanced intelligence have been used jointly for facial recognition purposes. Probabilistic Neural Network (PNN) method devised by Vinitha and Santosh to detect and recognize faces from grayscale images containing face-to-face faces. The biggest advantage of PNN mining is that it requires a short training time.
Because the network in the PNN is not completely linked, it is partitioned into subnets. An artificial neural network called SOM (Self-Organizing Map Neural Network) with topological conservation qualities is utilised for face recognition. RBFN or FFNN are two common alternative NN classifiers that make the work of face recognition simpler and more accurate after feature extraction from face photos.
III. METHODOLOGY
A technique for recognising or validating a person's identification based on their face is facial recognition. There are many different facial recognition algorithms, however they can all be inaccurate. The suggested approach uses a histogram of gradients to recognise faces (HOG).
The fundamental tenet of HOG properties is that, even in the absence of exact information of their edge gradients or locations, the shape and shape of a local object may frequently be defined reasonably well as a distribution of local intensity gradients or edge directions.
Because histograms offer translational invariance, orientation analysis is resistant to changes in illumination. The HOG function is particularly helpful for detecting textured deformable objects and for summarising the distribution of measurements in an image region. You can compute the histogram rapidly using this approach since it is straightforward and quick. Each important location in the image is given its own initial HOG function. Each key point's immediate vicinity is partitioned into a number of evenly spaced cells, and for each cell, a local one-dimensional histogram is gathered for each pixel in either the slope direction or the edge direction. The distinguishing feature of this key point is histogram recordings of all cells surrounding a single key point. The representation of the image is created by the histogram function of all the important points combined.
The main steps in this process are:
Step 1: The Main objective of ??HOG is to break the image into parts that can be converted to small-small cell
Step 2: Calculate the histogram by frequency of the gray level of the image when the image is in hog format
Step 3: Combine all histograms to form a feature vector. That is, it creates one histogram from each small histogram that is unique to each face. The process is shown in the figure 1.
The briefing of the methodology of the system can be done step which are involved while designing the system. These steps are
IV. DESIGN CONSIDERATIONS
Every modern automated home must include a security and surveillance system. The fundamental design of a security system starts with an examination of the demands of the occupants, followed by surveys of available hardware and software, cost analyses, options for monitoring, and installation planning.
A security system's perimeter and interior protection are complemented by surveillance monitoring tools that let residents monitor the surroundings inside and outside of their home whether they are home or away.
Most contractors view video cameras and display systems as optional components in a home surveillance system. Depending on the homeowner's preferences, surveillance equipment may be used without the essential components of home security monitoring.
The general constraints that should be considered while designing the system
V. SYSTEM ARCHITECTURE
There are different levels in the system architecture specifically four. The details about this layer are briefed below,
The suggested face detection system has a real-time surveillance camera configuration. We tried to keep the architecture for implementing each step in the suggested design as simple as possible. We also took into account the role that hardware resource consumption played in the performance-performance trade-off. The suggested technique does not require a significant overhaul of the system to identify faces in cameras. Only the incoming video signal from the camera is read by our approach, which also identifies faces in each input frame.
The little clusters of connected pixel values that make up the recovered face image are referred to as cells. A cell's HOG edge direction pixels are identified. Each cell is separated into an angular bin based on the gradient's edge. The weighted gradient of the related angular bin, which is taken into consideration for determining block sizes for neighbouring group cells, includes the pixels of each cell. The division of cells into blocks serves as the basis for normalising histograms. The normalised histogram group serves as a representation of the block's histogram. The building up of these blocking histograms improves the HOG feature of a picture.
4. Alert Level: Following the facial recognition procedure, the timestamps of the identified faces are sent out, and if any unrecognised people are present, an alert message is sent.
a. The input layer/image acquisition layer scans and takes a person's image as part of the system design.
b. Application Layer/Database Layer: An organisation in charge of data compression, processing, storage, and data comparison between acquired and stored data.
c. Output layer: If it recognizes a person, this layer will send a notice; if not, it will send an alert.
We need to work in four stages to develop a real-time facial recognition model:
Figure 3 shows design of system architecture.
Figure 4 shows different phase of face recognition system. The system includes steps detailed below,
Above shown figure 5 gives brief explanation about the process. Here it includes most of all the components that are required for the system to work. By using the algorithm and library packages, we extract the features which defines the frame and it is then computerized. This is passed for the face matching process where it compares it with the data that are present on the dataset or the storage system. The conclusion is then been made and will be displayed on monitor.
VII. RESULTS
The system detects and identifies authorized individual by face recognition using the histogram of gradients method.
If any unidentified individual is found, the system alerts the authorized persons in form of an alert message send through media. The system labels unauthorized person as intruder. All the authorized persons facial data and recordings of the monitored area are stored in the database. The system intend to secure the monitored area by preventing unauthorized access. The figures show how the system works.
VIII. FUTURE SCOPE
This technology has several applications in a variety of industries, including the military, finance, forensics, etc. This system's high degree of compactness, facial identification functionality, and ability to deliver immediate media notice make it quite helpful. Face recognition can potentially be tested in the future in addition to this.
The core of every security system is recognition. For the greatest recognition system, we typically need a well-trained database that can serve as the foundation for our recognition. In order to construct a smart surveillance system that we can use in our daily life at home, we include face detection and identification.
The surveillance environment is often of very poor quality. Furthermore, because of how the cameras work, uncontrolled recording situations might lead to ambient changes such changes in lighting, facial expressions, light shadowing, and body or face motion blur. Consequently, the performance and efficiency of video-based face recognition systems might be impacted by the quality of facial captures made by security cameras. We have suggested a HOG feature-based and FFNN classifier-based video surveillance system, which takes into account the security requirements of today. However, owing to changes in face movement in a different film sequence, the feature pattern may vary. In the future, the system may be enhanced using convolutional neural networks and other deep learning approaches on larger datasets. Only those with permission are permitted in the allotted area, which is monitored by the system. In the database are all of the permitted person\'s faces. The technology flags any unauthorized individuals who enter the monitored area as intruders and notifies the authorised person via alert message. The area\'s observed sights are captured and kept in a database.
[1] Real-Time Surveillance Through Face Recognition Using HOG and Feedforward Neural Networks, muhammad awais1 , muhammad javed iqbal 1 , iftikhar ahmad 2 , madini o. alassafi 2 , rayed alghamdi 2 , mohammad basheri 2 , and muhammad waqas, ate of current version September 10, 2021. [2] Z. Shao, J. Cai, and Z. Wang, ‘‘Smart monitoring cameras driven intelligent processing to big surveillance video data,’’ IEEE Trans. Big Data, vol. 4, no. 1, pp. 105–116, Mar. 2018. 121242 VOLUME 7, 2019 M. Awais et al.: Real-Time Surveillance Through Face Recognition Using HOG and Feedforward NNs [3] M. A. Abuzneid and A. Mahmood, ‘‘Enhanced human face recognition using LBPH Descriptor, multi-KNN, and back-propagation neural network,’’ IEEE Access, vol. 6, pp. 20641–20651, 2018. [4] D. Meena and R. Sharan,‘‘An approach to face detection and recognition,’’ in Proc. Int. Conf. Recent Adv. Innov. Eng. (ICRAIE), Dec. 2016, pp. 1–6. [5] B. S. Satari, N. A. A. Rahman, and Z. M. Z. Abidin, ‘‘Face recognition for security efficiency in managing and monitoring visitors of an organization,’’ in Proc. Int. Symp. Biometrics Secur. Technol. (ISBAST), Aug. 2014, pp. 95–101. [6] N. Jamil, S. Lqbal, and N. Iqbal, ‘‘Face recognition using neural networks,’’ in Proc. IEEE 21st Century Int. Multi Topic Conf. (INMIC), Dec. 2001, pp. 277–281. [7] K. Bong, S. Choi, C. Kim, D. Han, and H.-J. Yoo, ‘‘A low-power convolutional neural network face recognition processor and a CIS integrated with always-on face detector,’’ IEEE J. Solid-State Circuits, vol. 53, no. 1, pp. 115–123, Jan. 2018. [8] Y.-H. Kim, H. Kim, S.-W. Kim, H.-Y. Kim, and S.-J. Ko, ‘‘Illumination normalisation using convolutional neural network with application to face recognition,’’ Electron. Lett., vol. 53, no. 6, pp. 399–401, 2017. [9] S. Z. Li and A. Jain, Handbook of Face Recognition. New York, NY, USA: Springer Verlag, 2011. [10] D. Malik and S. Bansal, ‘‘Face recognition based on principal component analysis and linear discriminant analysis,’’ Int. J. Res. Electron. Commun. Technol., vol. 3, pp. 7–10, Jun. 2016. [11] P. Padilla, J. F. Valenzuela-Valdés, J. L. Padilla, and F. Luna-Valero, ‘‘Electromagnetic near-field inhomogeneity reduction for image acquisition optimization in high-resolution multi-channel magnetic resonance imaging (MRI) systems,’’ IEEE Access, vol. 5, pp. 5149–5157, 2017.
Copyright © 2022 Jobin Reji Abraham, Jobin , Saniya P M, George Dominic, M Arjun. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET47854
Publish Date : 2022-12-03
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here