Beruflich Dokumente
Kultur Dokumente
CONTENTS
1. ABSTRACT
2. INTRODUCTION
3. DESIGN PRINCIPLES & EXPLANATION
3.1. MODULES
3.2. MODULE DESCRIPTIOIN
4. PROJECT DICTIONARY
4.1. DATAFLOW DIAGRAMS
4.2. E-R DIAGRAMS
5. FORMS & REPORTS
5.1. I/O SAMPLES
6. BIBILIOGRAPHY
1. ABSTRACT
This document is limited to the description of the personal
identification project FACE RECOGNITION SYSTEM, a security facility
provided to the users which supports decision to make on the access
rights
to
the
authorized
users
by
authentication.
This
project
recognition
is
biometric
technique
for
personal
the
scientific,
industrial,
medical
and
forensic
applications.
features
also
include
speech,
handwriting,
face
very
difficult
to
differentiate
them.
Even
the
speech
and
Security
of
the
software
and
the
management
2. INTRODUCTION
BASIC CONCEPTS
BIOMETRIC SYSTEMS
A biometric system is essentially a pattern recognition system
that recognizes a person by determining the authenticity of a specific
physiological and/or behavioral
characteristic
possessed by that
An
identification
system
recognizes
an
individual
by
one-to-many
comparisons
to
establish
the
to let the system know the user identity regardless of the mode
(verification or identification). The enrollment module is responsible for
registering individuals in the biometric system database (system DB).
During the enrollment phase, the biometric characteristic of an
individual is first scanned by a biometric reader to produce a raw
digital representation of the characteristic. A quality check is generally
performed to ensure that the acquired sample can be reliably
processed by successive stages. In order to facilitate matching, the
raw digital representation is usually further processed by a feature
extractor to generate a compact but expressive representation, called
a template. Depending on the application, the template may be stored
in the central database of the biometric system or be recorded on a
magnetic card or smartcard issued to the individual. The verification
task is responsible for verifying individuals at the point of access.
During the operation phase, the users name or PIN (Personal
Identification Number) is entered through a keyboard (or a keypad);
the biometric reader captures the characteristic of the individual to be
recognized and converts it to a digital format, which is further
processed by the feature extractor to produce a compact digital
representation. The resulting representation is fed to the feature
matcher, which compares it against the template of a single user
(retrieved from the system DB based on the users PIN). In the
identification task, no PIN is provided and the system compares the
representation of the input biometric against the templates of all the
users in the system database; the output is either the identity of an
enrolled user or an alert message such as user not identified.
Because identification in large databases is computationally expensive,
classification and indexing techniques are often deployed to limit the
number of templates that have to be matched against the input. A
biometric system could operate either as an online system or an offline system. An on-line system requires the recognition to be
performed quickly and an immediate response is imposed (e.g., a
computer network logon application). On the other hand, an off-line
system usually does not require the recognition to be performed
immediately and a relatively long response delay is allowed (e.g., an
employee background check application. An application could operate
either in a positive or a negative recognition mode:
However,
drivers
license
application
typically
has
guided,
or
supervised
by
human
(e.g.,
security
officer).
Standard
applications
versus
generally
require
non-standard environments
attended
refer
to
performance,
which
refers
to
the
achievable
recognition
are in use in various applications. Each biometric has its strengths and
weaknesses and the choice typically depends on the application. No
single biometric is expected to effectively meet the requirements of all
the applications. The match between a biometric and an application is
determined depending upon the characteristics of the application and
the properties of the biometric.
the
application
is
attended
(semi-automatic)
or
and
depending
hygienic
on
the
standards
cultural,
of
ethical,
that
social,
society.
The
and
the
value/convenience
offered
by
Ear: It is known that the shape of the ear and the structure of
the cartilaginous tissue of the pinna are distinctive. The features
of an ear are not expected to be unique to an individual. The ear
recognition approaches are based on matching the distance of
salient points on the pinna from a landmark location on the ear.
exhaust
pipes,
may
drastically
affect
the
image
distinctiveness,
typically used
hand
geometry-based
systems
are
well for
Retinal
vasculature
can
reveal
some
medical
in
many
government,
legal,
and
commercial
by
physical
and
emotional
conditions
of
the
impressions
Furthermore,
of
their
signature
professional
are
forgers
can
significantly
reproduce
feasible
biometric
in
applications
requiring
person
communication
channel,
and
digitizer
These
various
biometric
identifiers
described
above
are
Biometric
Market
Report
(International
Biometric
Group)
PROJECT DESCRIPTION
In each and every organization security plays an important role.
All employees working in the organization are allowed entrance only
when they satisfy the security requirements. The security guards at
the main entrance check the identity of the person with the help of his
ID card. A record is maintained where the person has to enter the
details of the time he is walking in, his name, ID, designation,
department etc. and when he walks out he has to enter his out time.
This process is time consuming and not foolproof. The employees
as well as the visitors have to spend so much time and effort at the
entrance to enter in the records and satisfy the security requirements.
We can as well utilize this time and effort in something productive.
To provide a solution to this problem we took up the job of
automating the security check and providing the security guard with a
personal computer to crosscheck with the employee details. Now an
employee or visitor can gain entrance when their ID is scanned and
the Face of the employee is matched with the database maintained
with the security. First the employee ID is retrieved from the ID card
and then the employee record is opened and the Face is matched
electronically, if there is a match the other details are matched and if
we are successful in identifying the person the person gains entrance.
and
visitors
gain
entrance
and
the
safety
of
the
organization is maintained.
FACE CLASSIFICATION AND INDEXING
Large volumes of Faces are collected and stored every day in a
wide range of applications, including forensics, access control, and
drivers license registration. Automatic identification based on Faces
requires the input Face to be matched with a large number of Faces
stored in a database (e.g., the FBI database contains more than 200
million Face cards). To reduce the search time and computational
complexity, it is desirable to classify these Faces in an accurate and
consistent manner such that the input Face needs to be matched only
with a subset of the Faces in the database. Face classification is a
technique used to assign a Face to one of the several pre-specified
types already established. Face classification can be viewed as a
coarse-level matching of the Faces. An input Face is first matched to
one of the pre-specified types and then it is compared to a subset of
the database corresponding to that Face type. For example, if the Face
database is binned into five classes, and a Face classifier outputs two
classes (primary and secondary) with extremely high accuracy, then
the identification system will only need to search two of the five bins,
thus decreasing (in principle) the search space 2.5-fold. Unfortunately,
only a limited number of major Face categories have been identified
(e.g., five), the distribution of Faces into these categories is not
uniform, and there are many ambiguous Faces (see figure below),
whose exclusive membership cannot be reliably stated even by human
experts. In fact, the definition of each Face category is both complex
and vague. A human inspector needs a long period of experience to
reach a satisfactory level of performance in Face classification. About
17% of the 4000 images in the NIST Special Database 4 (Watson and
Wilson, 1992) have two different ground truth labels. This means that
even human experts could not agree on the true class of the Face for
about 17% of the Face images in this database. Therefore, in practice,
Face classification is not immune to errors and does not offer much
selectivity for Face searching in large databases.
Examples of Faces that are difficult to classify; a) tented arch; b) a
loop; c) a Whorl; it seems that all the Faces shown here should be in
the loop category.
To overcome
this
problem,
some
authors
have
proposed
approaches,
syntactic
approaches,
structural
approaches,
for
checking
whether
the
employee
belongs
to
the
System workflow
Generally System is used for two types of tasks: face detection and
face recognition. Doing face detection is pretty easy and straight
forward you just call Algo : detect .
System method with passing image you want to find faces in and get
the results. On the other hand, doing face recognition is composed of
several steps that should be done before doing any actual face
recognition. In other words, face recognition is composed of several
steps: face enrollment/training and face matching/recognition.
Face enrollment/training - during this step system creates a face
template from specified face (face tag) in image and adds created
template to data namespace. Data namespace is a place were all of
your face templates are stored, so in other words it is a face template
database (every user is allowed to create 2 data namespaces, which
can be used by different user's applications).
Face recognition during this step system tries to find a match for
specified faces in user defined data namespace.
Face enrollment steps (in order of calling):
Algo : detect detects faces in specified images, returns face tags
(every tag has unique tag id - tid).
tags/save saves specified face tags (by tid) with user specified
user id(eg. mark@docs, where docs - data namespace name).
Algo : train checks changes for specified user ids (eg. new tags
were added using tags/save or removed using tags/remove) and either
creates/updates/removes face template for specified user id from data
namespace.
Java is a programming language created by James Gosling from Sun Microsystems (Sun)
in 1991. The first publicly available version of Java (Java 1.0) was released in 1995. Sun
Microsystems was acquired by the Oracle Corporation in 2010. Over time new enhanced
versions of Java have been released. The current version of Java is Java 1.7 which is also
known as Java 7. From the Java programming language the Java platform evolved. The
Java platform allows software developers to write program code in other languages than
the Java programming language and still runs on the Java virtual machine. The Java
platform is usually associated with the Java virtual machine and the Java core libraries.
Java Virtual machine
The Java virtual machine (JVM) is a software implementation of a computer that
executes programs like a real machine. The Java virtual machine is written specifically
for a specific operating system, e.g. for Linux a special implementation is required as
well as for Windows.
Java Runtime Environment vs. Java Development Kit
A Java distribution comes typically in two flavors, the Java Runtime Environment (JRE)
and the Java Development Kit (JDK).The Java runtime environment (JRE) consists of the
JVM and the Java class libraries and contains the necessary functionality to start Java
programs. The JDK contains in addition the development tools necessary to create Java
programs. The JDK consists therefore of a Java compiler, the Java virtual machine, and
the Java class libraries.
Characteristics of Java
The target of Java is to write a program once and then run this program on multiple
operating systems.
CHAPTER 3
SOFTWARE DEVELOPMENT LIFE
CYCLE
3.1 V-MODEL
System Design
Systems design is the phase where system engineers analyze and understand the business
of the proposed system by studying the user requirements document. They figure out
possibilities and techniques by which the user requirements can be implemented. If any
of the requirements are not feasible, the user is informed of the issue. A resolution is
found and the user requirement document is edited accordingly.
Architecture Design
The phase of the design of computer architecture and software architecture can also be
referred to as high-level design. The baseline in selecting the architecture is that it should
realize all which typically consists of the list of modules, brief functionality of each
module, their interface relationships, dependencies, database tables, architecture
diagrams, technology details etc. The integration testing design is carried out in the
particular phase.
Module Design
The module design phase can also be referred to as low-level design. The designed
system is broken up into smaller units or modules and each of them is explained so that
the programmer can start coding directly. The low level design document or program
specifications will contain a detailed functional logic of the module, in pseudo code:
Database tables, with all elements, including their type and size.
Unit testing
Integration testing
Try to detect if all these functions are accessible in our application and they are properly
integrated.
System Testing
System testing checks if the integrated product meets the specified requirements.
Acceptance Testing
Acceptance testing is the phase of testing used to determine whether a system satisfies the
requirements specified in the requirements analysis phase. The acceptance test design is
derived from the requirements document. The acceptance test phase is the phase used by
the customer to determine whether to accept the system or not.
CHAPTER 4
SOFTWARE REQUIREMENT
SPECIFICATION
4.1 INTRODUCTION
Software Requirement Specification (SRS) is the starting point of the software
development activity. It is a complete description of the behavior of a system which is to
be developed. The SRS document enlists all necessary requirements for project
Correct - An SRS is correct if, and only if, every requirement stated therein is
one that the software shall meet. Traceability makes this procedure easier and less
prone to error.
Unambiguous - An SRS is unambiguous if, and only if, every requirement stated
therein has only one interpretation. As a minimum, this requires that each
characteristic of the final product be described using a single unique term.
Modifiable SRS is said to be modifiable if its structure and style are such that
any changes to the requirements can be made easily, completely and consistently
while retaining the structure and style.
new cards per day. Although the digitization of Face cards seemed to
be the most obvious choice, the resulting digital archive could become
extremely large. In fact, each Face card, when digitized at 500 dpi
requires about 10 Mbytes of storage. A simple multiplication by 200
million yields the massive storage requirement of 2000 terabytes for
the entire archive. The need for an effective compression technique
was then very urgent. Unfortunately, neither the well-known lossless
methods nor the JPEG methods were found to be satisfactory. A new
compression technique (with small acceptable loss), called Wavelet
Scalar
Quantization
(WSQ),
became
the
FBI
standard
for
the
Face images from: a) a live-scan FTIR-based optical scanner; b) a livescan capacitive scanner; c) a live-scan piezoelectric scanner; d) a livescan thermal scanner; e) an off-line inked impression; f) a latent Face.
There are a number of live-scan sensing mechanisms (e.g.,
optical FTIR, capacitive, thermal,
pressure-based, ultrasound, etc.) That can be used to detect the
ridges and valleys present in the fingertip. Figure below shows an offline Face image acquired with the ink technique, a latent Face image,
and some live-scan images acquired with different types of commercial
live-scan devices.
Discussed
below
are
some Face
sensing technologies,
saliency
and
suitability.
Saliency
means
that
properties
are
not
generally
correlated.
salient
the
maximum
amount
of
information,
makes
fewer
At the global level, the ridge line flow delineates a pattern similar
to one of those shown in Figure. Singular points, called loop and
delta (denoted as squares and triangles, respectively in Figure
below), are a sort of control points around which the ridge lines
are wrapped. Singular points and coarse ridge line shape are
very important for Face classification and indexing, but their
distinctiveness is not sufficient for accurate matching. External
Face shape, orientation image, and frequency image also belong
to the set of features that can be detected at the global level.
At
the
local
level,
total
of
150
different
local
ridge
representation
reliable
automatic
is
characterized
minutiae
by
extraction
a
can
high
be
Specific
sections
are
non-linear
distortion,
variable
pressure,
changing
skin
claim that two Faces are from the same finger, evaluate several
factors: I) global pattern configuration agreement, which means that
two Faces must be of the same type, ii) qualitative concordance, which
requires that the corresponding minute details must be identical, iii)
quantitative factor, which specifies that at least a certain number (a
minimum of 12 according to the forensic guidelines in the United
States) of corresponding minute details must be found, and iv)
corresponding minute details, which must be identically inter-related.
In practice, complex protocols have been defined for Face matching
and a detailed flowchart is available to guide Face examiners in
manually performing Face matching. Given below is a figure showing
the general method by which Faces are matched.
4. PROJECT DICTIONARY
4.1. DATAFLOW DIAGRAMS