000 06310na a2201273 4500
001 233395
003 koha_MIRAKIL
005 20221226090139.0
008 190118b tu 000 0
040 _aCY-NiCIU
_btur
_cCY-NiCIU
_erda
041 0 _aeng
090 _aYL 393
_b A96 2014
100 1 _aAyodeji, Ipinnimo Oluwaseyi
245 0 _aSecurity system based on real time face recognition
_cIpinnimo Oluwaseyi Ayodeji; Supervisor: Ziya Dereboylu
260 _aNicosia
_bCyprus International University
_c2014
300 _aX, 89 p.
_btable
_c30.5 cm
_eCD
336 _2rdacontent
_atext
_btxt
337 _2rdamedia
_aunmediated
_bn
338 _2rdacarrier
_avolume
_bnc
500 _3Includes CD
504 _aIncludes references (76-82 p.)
520 _a'ABSTRACT Automatic recognition of people has received much attention during the recent years due to its many applications in different fields such as law enforcement, security applications or video indexing. Face recognition is an important and very challenging technique to automatically recognize people's face. Face recognition systems play a vital role in many applications including surveillance, biometrics and security as the rapid development of computer science and pattern recognition, visual technology is widely applied in industry and daily life. The goal of this research is to implement face recognition on a real life platform for security system. The software should be able to take an image of a person through the camera connected to the USB of a computer, recognize the individual based on previously stored samples and grant access or deny access through a device connected to another port of the same computer. The method that will be considered is principal component analysis (PCA) method for face recognition. A database of trained images is stored on the computer for recognizing a test image. The image from the camera is resized and cropped with MATLAB. This image is further processed by comparing it with images in the database. If it matches any of the images in the database, a signal is sent to a device connected to another USB port (Embedded system) to grant access for the person that the image is taken from. If the image does not match any of the images in the database then, the accessis denied for the person. Key words: Face recognition, PCA, Embedded system'
650 0 0 _aYerleşik sistem
650 0 0 _aEmbedded system
650 0 0 _aYüz tanıma
650 0 0 _aFace recognition
700 0 _aSupervisor: Dereboylu, Ziya
_91656
942 _2ddc
_cTS
505 1 _g1
_tCHAPTER 1
505 1 _g1
_tINTRODUCTION
505 1 _g2
_tBIOMETRIC SYSTEM
505 1 _g3
_tApplications
505 1 _g3
_tBiometric error
505 1 _g4
_tINTRODUCTION TO FACE RECOGNITION
505 1 _g5
_tProblem that may occur during face recognition
505 1 _g5
_tScale invariance
505 1 _g5
_tShift invariance
505 1 _g6
_tIllumınatıon invariance
505 1 _g6
_tEmotional expression and detail invariance
505 1 _g6
_tNoise invariance
505 1 _g7
_tGOAL
505 1 _g7
_tOVERVIEW
505 1 _g8
_tCHAPTER 2
505 1 _g8
_tLITERATURE SURVEY
505 1 _g8
_tINTRODUCTION
505 1 _g8
_tFACE DETECTION
505 1 _g9
_tSkin tone face detection
505 1 _g11
_tViola-jones face detection algorithm
505 1 _g11
_tLocal SMQT based face detection
505 1 _g14
_tFACE RCOGNITION
505 1 _g14
_tBackground and related work
505 1 _g16
_tOutline of a typical face recognition system
505 1 _g16
_tThe Image acquisition module
505 1 _g17
_tThe pre-processing module
505 1 _g19
_tThe feature extraction module
505 1 _g19
_tThe classification module
505 1 _g19
_tTranning set
505 1 _g20
_tFace Library or Face database
505 1 _g20
_tCoventional techniques in face recognition
505 1 _g20
_tCorrelation
505 1 _g21
_tLinear Discriminant Analysis
505 1 _g23
_tIndependent Component Analysis
505 1 _g24
_tOther conventional methods for face recognition
505 1 _g25
_tLocal features analysis
505 1 _g26
_tNonnegative matirx factorization
505 1 _g27
_tIncrements nonnegative matrix factorization
505 1 _g29
_tHistogram based method for face recognition
505 1 _g29
_tLocal binary pattern for face recognition
505 1 _g30
_tPDF based face recognition system
505 1 _g32
_tCHAPTER 3
505 1 _g32
_tFACE RECOGNITION USING PCA
505 1 _g32
_tINTRODUCTION
505 1 _g37
_tEIGENFACES CALCULATION
505 1 _g42
_tUSING EIGENFACES TO CALSSIFY A FACE IMAGE
505 1 _g43
_tREBUILDING A FACE IMAGE WITH EIGENFACES
505 1 _g46
_tCHAPTER 4
505 1 _g46
_tEMBEDDED SYSTEM
505 1 _g46
_tINTRODUCTION
505 1 _g46
_tEMBEDDED SYSTEM
505 1 _g48
_tEMBEDDED SYSTEM USED IN THIS RESEARCH
505 1 _g48
_tDe-bounced switch
505 1 _g49
_tThe switching circuit (LCD)
505 1 _g50
_tElectric Lock
505 1 _g50
_tLiquid Crystal Display (LCD)
505 1 _g52
_tMicrocontroller (UC) PIC18F4550
505 1 _g53
_tOverview of the USB peripheral
505 1 _g54
_tUSB Status and Control
505 1 _g55
_tIMPLEMENTATION OF THE ES
505 1 _g56
_tCommunication with the ES
505 1 _g57
_tCHAPTER 5
505 1 _g57
_tTESTING AND RESULT
505 1 _g57
_tDATA SETS
505 1 _g57
_tAT & T database of faces(formerly known as ORL database of faces )
505 1 _g58
_tFace Recognition data, university of ESSEX, UK
505 1 _g58
_tPersonal data set
505 1 _g58
_tSYSTEM HARDWARE FOR TESTING
505 1 _g59
_tSYSTEM SOFTWARE FOR TESTING
505 1 _g60
_tTEST RESULT FOR AT&T DATABASE OF FACES
505 1 _g62
_tTEST RESULT FOR ESSEX DATA SET
505 1 _g64
_tTEST WITH PERSONAL DATA SET WITH NO FACE DETECTION
505 1 _g69
_tTEST WITH PERSONAL DATA SET WITH FACE DETECTION
505 1 _g71
_tOVERALL TEST OF THE SYSTEM
505 1 _g73
_tCHAPTER 6
505 1 _g73
_tCONCLUSION AND FURTHER RESEARCH
505 1 _g73
_tCONCLUSION
505 1 _g74
_tFURTHER RESEARCH
505 1 _g76
_tREFERENCES
999 _c448
_d448