Project overview Face Recognition Security System Based on “Image Passport” Algorithm (FRSS)
-
Upload
lillian-reed -
Category
Documents
-
view
216 -
download
0
Transcript of Project overview Face Recognition Security System Based on “Image Passport” Algorithm (FRSS)
Project overviewProject overview
Face Recognition Security System Based on “Image Passport”
Algorithm (FRSS)
Face Recognition Security System Based on “Image Passport”
Algorithm (FRSS)
Project targetsProject targets
Target of this project is creating security system based on face recognition algorithm.
Development will take 1 years.
Target of this project is creating security system based on face recognition algorithm.
Development will take 1 years.
Organization structureOrganization structureProject Leader
Prof.Dr.
Lead Programmer-1
Programmers 2 ppl
Research conlultant-1
Dr.
Research conlultant-2
Dr.
Lead Programmer-1
Programmers 2 ppl
Usability Design Consultant (?)
Other expensesOther expenses
Other expenses: equipment (for example, particular type of video camera, software, etc.)
On stage 4-5 we will recommend to hire consultant in usability design for 2-3 consultation in order to improve interface design.
Other expenses: equipment (for example, particular type of video camera, software, etc.)
On stage 4-5 we will recommend to hire consultant in usability design for 2-3 consultation in order to improve interface design.
Calendar planCalendar plan
First stage: Preparations – 2-3 weeks. Second stage. Alpha version –3 months. Third stage. Beta version – 2.5 months. Fourth stage. Beta testing – 1 month. Fifth stage.Prerelease – 2 months. Sixth stage. Final testing – 1 month. Seventh stage. Master release – 2-3 months.
First stage: Preparations – 2-3 weeks. Second stage. Alpha version –3 months. Third stage. Beta version – 2.5 months. Fourth stage. Beta testing – 1 month. Fifth stage.Prerelease – 2 months. Sixth stage. Final testing – 1 month. Seventh stage. Master release – 2-3 months.
Extra...
This is not final version of plan and it can be changed after budget approval.
First stage: PreparationFirst stage: Preparation
Stage Stage description Result
Stage 1 Security system conception development. Some mathematical algorithm are developed and ready for implimintation on software level.
Report
Project Leader
Concept document development. Concept document
Programmers Learning engine capabilities and functionality. Initial porgramm modules are programmed and tested. Creating of testing image data base.
Report. Image data base.
Research Consultants
To develop mathematical and algorithmic details of the FRSS at a level sufficient for implementation in software (program source code) during the subsequent stages
Report, Algorithms
Second stage: Alpha VersionSecond stage: Alpha VersionStage Stage description Result
Stage 2 Alpha version FRSS is developed and some parts are ready for presentation.
Report
Project Leader Full system concept. System concept.
Porgrammers Alpha version is developed and some parts are ready for presentation. Code documentation. Creating of testing image data base.
Report: Program, code documentation
Research Consultant
To develop mathematical and algorithmic details of the FRSS at a level sufficient for implementation in software (program source code) during the subsequent stages
Report, Algorithms.
Third stage: Beta VersionThird stage: Beta VersionStage Stage description ResultStage 3 Beta version FRSS is developed and ready for
the presentation purposes. Operational/source code of FRSS-Beta is fully documented, such as any computer programmer unfamiliar with the code can modify and maintain it.
Report, Demo, Program code documentation
Project Leader FRSS complete concepte and arhitecture. Report.
Programmers Build of demo version. Creating of testing image data base.
Report
Research Consultant
Helping project leader and programmers tracking bugs and solving appearing mathematical and algorithmical problems
Report
Fourth stage: Beta Testing Fourth stage: Beta Testing Stage Stage description Result
Stage 4 Beta version testing. Additional program features
Report, Program
Project Leader Tracking bugs. Controlling all others to follow main FRSS concept. Improving FRSS concept
Report
Programmers Testing, improving, searching bugs. Working on interface design. Usability design testing.
Report, Program
Research conlultant
Helping project leader and programmers tracking bugs and solving appearing mathematical and algorithmical problems
Report
Fifth stage: PrereleaseFifth stage: PrereleaseStage Stage description Result
Stage 5 Completion of FRSS up to prerelease. Prerelease
Project leader Complete FRSS description. Documentation. Report
Programmers Catching of all possible bugs and development of FRSS up to prerelease version. Interface design. Usability design testing.
Report
Research consultant
Helping project leader and programmers tracking bugs and solving appearing mathematical and algorithmical problems
Report, algorithms
Sixth stage: Final TestingSixth stage: Final TestingStage Stage description Result
Stage 6 Final testing. Report. Bugreport.
Project leader Final testing. Report
Programmers Elimination of last bugs. Final release.
Research consultant
Helping project leader and programmers tracking bugs and solving appearing mathematical and algorithmical problems
Report, algorithms.
Seventh stage: Master ReleaseSeventh stage: Master Release
Stage Stage description Result
Stage 7 Complete product Release.
Programmers To eliminate last bugs. Complete testing image data base.
Release and demo version
All others To eliminate last mathematical and algorithmical problems.
Report
Calendar Plan: ChartCalendar Plan: Chart
01.06 02.06 03.06 04.06 05.06 06.06 07.06 08.06 09.06 10.06 11.06 12.06
Stage 1
Stage 2
Stage 3
Stage 4
Stage 5
Stage 6
Stage 7
Attachment 1: FRSSAttachment 1: FRSS
FRSS is an automated system of face video-capture, recognition and identification of person. The FRSS scans of observed scene and stores face images of every person passing camera. It analyzes and authenticates input data, calculates invariant features of input face, compares calculated features of input face with features of template faces stored at database and recognizes a person.
Face recognition technologies
The technology of biometric identification of a person by face image is based on algorithms of recognition and comparison of images. The algorithms are based on a modified method of independent components analysis (ICA). It requires calculation of maximally independent features specific for images of human faces.
The system receives digitized video image. Special-purpose algorithms search for a face image, outline it, define exact locations of eyes, position the image and normalize it with respect to perspective transformations. Then the system automatically codes the selected face image for the purpose of definition of the major specific invariant features. Then, the biometric identification system gives out a list of face images with a maximum similarity with the person. The list is sorted by correlation rate of appropriate vectors. In case the index of vector correlation is high and exceeds a specified peak value, it is
possible to consider the person being identified.
FRSS is an automated system of face video-capture, recognition and identification of person. The FRSS scans of observed scene and stores face images of every person passing camera. It analyzes and authenticates input data, calculates invariant features of input face, compares calculated features of input face with features of template faces stored at database and recognizes a person.
Face recognition technologies
The technology of biometric identification of a person by face image is based on algorithms of recognition and comparison of images. The algorithms are based on a modified method of independent components analysis (ICA). It requires calculation of maximally independent features specific for images of human faces.
The system receives digitized video image. Special-purpose algorithms search for a face image, outline it, define exact locations of eyes, position the image and normalize it with respect to perspective transformations. Then the system automatically codes the selected face image for the purpose of definition of the major specific invariant features. Then, the biometric identification system gives out a list of face images with a maximum similarity with the person. The list is sorted by correlation rate of appropriate vectors. In case the index of vector correlation is high and exceeds a specified peak value, it is
possible to consider the person being identified.
Attachment 1: FRSS (cont.)Attachment 1: FRSS (cont.)FRSS Features
Face detection, segmentation and database storage
Feature Extraction
Person identification Operative notification by preset schemes - for instance, in case a captured face
is similar to an image of a criminal stored at the database Quality transfer of video data via low-bandwidth communication channels High level of access control and automated management: every access attempt,
including unauthorized, are registered by the module Compact backup archives containing large volumes of data Export of specified images Export, printing and transfer of images Support of external execution devices Registration of all events (movements, changes of background) Flexible choice of recording modes - for instance, registration of faces stored
at the database Sorting and search of events by date, time and type Simultaneous playback, recording and search of backup data
FRSS Features
Face detection, segmentation and database storage
Feature Extraction
Person identification Operative notification by preset schemes - for instance, in case a captured face
is similar to an image of a criminal stored at the database Quality transfer of video data via low-bandwidth communication channels High level of access control and automated management: every access attempt,
including unauthorized, are registered by the module Compact backup archives containing large volumes of data Export of specified images Export, printing and transfer of images Support of external execution devices Registration of all events (movements, changes of background) Flexible choice of recording modes - for instance, registration of faces stored
at the database Sorting and search of events by date, time and type Simultaneous playback, recording and search of backup data
Attachment 1: FRSS (cont.)Attachment 1: FRSS (cont.)
Applications FRSS is designed for operation at public places, airports, stadiums, plants, prisons, and military sites.
Investigation and search activities. Upon recognition of a person, operator receives all available information and notifies law-enforcement authorities, if required.
Entrance and security check-points. Every person passing check-point is automatically registered at database (date, time, images). It is always possible to get later information on every person passed through.
Closed objects, requiring stronger access control measures. Traditional access control systems give intruders an opportunity of unauthorized access with false or another person's ID card. The FRSS module authenticates card holder automatically - by comparing faces with database data.
Face identification at frontier posts (by means of databases containing images of terrorists and wanted criminals), simultaneous authentication of a face with passport or ID photo.
Issuing authorities. Prevention of issue of duplicated documents, such as driver licenses, ID cards, etc.
Applications FRSS is designed for operation at public places, airports, stadiums, plants, prisons, and military sites.
Investigation and search activities. Upon recognition of a person, operator receives all available information and notifies law-enforcement authorities, if required.
Entrance and security check-points. Every person passing check-point is automatically registered at database (date, time, images). It is always possible to get later information on every person passed through.
Closed objects, requiring stronger access control measures. Traditional access control systems give intruders an opportunity of unauthorized access with false or another person's ID card. The FRSS module authenticates card holder automatically - by comparing faces with database data.
Face identification at frontier posts (by means of databases containing images of terrorists and wanted criminals), simultaneous authentication of a face with passport or ID photo.
Issuing authorities. Prevention of issue of duplicated documents, such as driver licenses, ID cards, etc.