000 | 06310na a2201273 4500 | ||
---|---|---|---|
001 | 233395 | ||
003 | koha_MIRAKIL | ||
005 | 20221226090139.0 | ||
008 | 190118b tu 000 0 | ||
040 |
_aCY-NiCIU _btur _cCY-NiCIU _erda |
||
041 | 0 | _aeng | |
090 |
_aYL 393 _b A96 2014 |
||
100 | 1 | _aAyodeji, Ipinnimo Oluwaseyi | |
245 | 0 |
_aSecurity system based on real time face recognition _cIpinnimo Oluwaseyi Ayodeji; Supervisor: Ziya Dereboylu |
|
260 |
_aNicosia _bCyprus International University _c2014 |
||
300 |
_aX, 89 p. _btable _c30.5 cm _eCD |
||
336 |
_2rdacontent _atext _btxt |
||
337 |
_2rdamedia _aunmediated _bn |
||
338 |
_2rdacarrier _avolume _bnc |
||
500 | _3Includes CD | ||
504 | _aIncludes references (76-82 p.) | ||
520 | _a'ABSTRACT Automatic recognition of people has received much attention during the recent years due to its many applications in different fields such as law enforcement, security applications or video indexing. Face recognition is an important and very challenging technique to automatically recognize people's face. Face recognition systems play a vital role in many applications including surveillance, biometrics and security as the rapid development of computer science and pattern recognition, visual technology is widely applied in industry and daily life. The goal of this research is to implement face recognition on a real life platform for security system. The software should be able to take an image of a person through the camera connected to the USB of a computer, recognize the individual based on previously stored samples and grant access or deny access through a device connected to another port of the same computer. The method that will be considered is principal component analysis (PCA) method for face recognition. A database of trained images is stored on the computer for recognizing a test image. The image from the camera is resized and cropped with MATLAB. This image is further processed by comparing it with images in the database. If it matches any of the images in the database, a signal is sent to a device connected to another USB port (Embedded system) to grant access for the person that the image is taken from. If the image does not match any of the images in the database then, the accessis denied for the person. Key words: Face recognition, PCA, Embedded system' | ||
650 | 0 | 0 | _aYerleşik sistem |
650 | 0 | 0 | _aEmbedded system |
650 | 0 | 0 | _aYüz tanıma |
650 | 0 | 0 | _aFace recognition |
700 | 0 |
_aSupervisor: Dereboylu, Ziya _91656 |
|
942 |
_2ddc _cTS |
||
505 | 1 |
_g1 _tCHAPTER 1 |
|
505 | 1 |
_g1 _tINTRODUCTION |
|
505 | 1 |
_g2 _tBIOMETRIC SYSTEM |
|
505 | 1 |
_g3 _tApplications |
|
505 | 1 |
_g3 _tBiometric error |
|
505 | 1 |
_g4 _tINTRODUCTION TO FACE RECOGNITION |
|
505 | 1 |
_g5 _tProblem that may occur during face recognition |
|
505 | 1 |
_g5 _tScale invariance |
|
505 | 1 |
_g5 _tShift invariance |
|
505 | 1 |
_g6 _tIllumınatıon invariance |
|
505 | 1 |
_g6 _tEmotional expression and detail invariance |
|
505 | 1 |
_g6 _tNoise invariance |
|
505 | 1 |
_g7 _tGOAL |
|
505 | 1 |
_g7 _tOVERVIEW |
|
505 | 1 |
_g8 _tCHAPTER 2 |
|
505 | 1 |
_g8 _tLITERATURE SURVEY |
|
505 | 1 |
_g8 _tINTRODUCTION |
|
505 | 1 |
_g8 _tFACE DETECTION |
|
505 | 1 |
_g9 _tSkin tone face detection |
|
505 | 1 |
_g11 _tViola-jones face detection algorithm |
|
505 | 1 |
_g11 _tLocal SMQT based face detection |
|
505 | 1 |
_g14 _tFACE RCOGNITION |
|
505 | 1 |
_g14 _tBackground and related work |
|
505 | 1 |
_g16 _tOutline of a typical face recognition system |
|
505 | 1 |
_g16 _tThe Image acquisition module |
|
505 | 1 |
_g17 _tThe pre-processing module |
|
505 | 1 |
_g19 _tThe feature extraction module |
|
505 | 1 |
_g19 _tThe classification module |
|
505 | 1 |
_g19 _tTranning set |
|
505 | 1 |
_g20 _tFace Library or Face database |
|
505 | 1 |
_g20 _tCoventional techniques in face recognition |
|
505 | 1 |
_g20 _tCorrelation |
|
505 | 1 |
_g21 _tLinear Discriminant Analysis |
|
505 | 1 |
_g23 _tIndependent Component Analysis |
|
505 | 1 |
_g24 _tOther conventional methods for face recognition |
|
505 | 1 |
_g25 _tLocal features analysis |
|
505 | 1 |
_g26 _tNonnegative matirx factorization |
|
505 | 1 |
_g27 _tIncrements nonnegative matrix factorization |
|
505 | 1 |
_g29 _tHistogram based method for face recognition |
|
505 | 1 |
_g29 _tLocal binary pattern for face recognition |
|
505 | 1 |
_g30 _tPDF based face recognition system |
|
505 | 1 |
_g32 _tCHAPTER 3 |
|
505 | 1 |
_g32 _tFACE RECOGNITION USING PCA |
|
505 | 1 |
_g32 _tINTRODUCTION |
|
505 | 1 |
_g37 _tEIGENFACES CALCULATION |
|
505 | 1 |
_g42 _tUSING EIGENFACES TO CALSSIFY A FACE IMAGE |
|
505 | 1 |
_g43 _tREBUILDING A FACE IMAGE WITH EIGENFACES |
|
505 | 1 |
_g46 _tCHAPTER 4 |
|
505 | 1 |
_g46 _tEMBEDDED SYSTEM |
|
505 | 1 |
_g46 _tINTRODUCTION |
|
505 | 1 |
_g46 _tEMBEDDED SYSTEM |
|
505 | 1 |
_g48 _tEMBEDDED SYSTEM USED IN THIS RESEARCH |
|
505 | 1 |
_g48 _tDe-bounced switch |
|
505 | 1 |
_g49 _tThe switching circuit (LCD) |
|
505 | 1 |
_g50 _tElectric Lock |
|
505 | 1 |
_g50 _tLiquid Crystal Display (LCD) |
|
505 | 1 |
_g52 _tMicrocontroller (UC) PIC18F4550 |
|
505 | 1 |
_g53 _tOverview of the USB peripheral |
|
505 | 1 |
_g54 _tUSB Status and Control |
|
505 | 1 |
_g55 _tIMPLEMENTATION OF THE ES |
|
505 | 1 |
_g56 _tCommunication with the ES |
|
505 | 1 |
_g57 _tCHAPTER 5 |
|
505 | 1 |
_g57 _tTESTING AND RESULT |
|
505 | 1 |
_g57 _tDATA SETS |
|
505 | 1 |
_g57 _tAT & T database of faces(formerly known as ORL database of faces ) |
|
505 | 1 |
_g58 _tFace Recognition data, university of ESSEX, UK |
|
505 | 1 |
_g58 _tPersonal data set |
|
505 | 1 |
_g58 _tSYSTEM HARDWARE FOR TESTING |
|
505 | 1 |
_g59 _tSYSTEM SOFTWARE FOR TESTING |
|
505 | 1 |
_g60 _tTEST RESULT FOR AT&T DATABASE OF FACES |
|
505 | 1 |
_g62 _tTEST RESULT FOR ESSEX DATA SET |
|
505 | 1 |
_g64 _tTEST WITH PERSONAL DATA SET WITH NO FACE DETECTION |
|
505 | 1 |
_g69 _tTEST WITH PERSONAL DATA SET WITH FACE DETECTION |
|
505 | 1 |
_g71 _tOVERALL TEST OF THE SYSTEM |
|
505 | 1 |
_g73 _tCHAPTER 6 |
|
505 | 1 |
_g73 _tCONCLUSION AND FURTHER RESEARCH |
|
505 | 1 |
_g73 _tCONCLUSION |
|
505 | 1 |
_g74 _tFURTHER RESEARCH |
|
505 | 1 |
_g76 _tREFERENCES |
|
999 |
_c448 _d448 |