pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

University of Minnesota Report Highlights AI Advances in Facial Recognition

Big data is leading to massive changes in our daily lives. The University of Minnesota has published a study on the advances in facial recognition technology, which are being used in law enforcement and other fields.

Role of Big Data and AI in Facial Recognition Technology

Data analytics has played a fundamental role in scientific, technological and business development in recent years. It is commonly used in advanced security systems, computer assistants for decision making, event prediction, anomaly detection, among others. One of these applications is face identification or facial recognition. The term face identification is used to describe the process in which a computer application verifies the identity of a person. Nowadays it is common to find this utility not only in security systems, but also in social networks and even smartphones.


The human face is an invaluable source of information. By means of a detailed analysis it is possible to determine the identity, approximate age, sex, mood, health and even what a person really wants to express. It all comes down to finding similarities in expressions, classifying them and developing systems that identify a face in one of the classified groups.

The common scheme called “automatic learning” consists of “training” an agent (program) with some data structure, which detects similarities and differences and groups (classifies) the related elements. This agent will be the one who later identifies an element in one of the detected groups.

The agent we will deal with in this article, for the case of face recognition, is the heuristic known as affinity propagation. This is an iterative clustering method that has been successful in the treatment of complex images (see this comparison chart with other methods, this article where they show a similar example of face classification and this article where they use affinity propagation to read handwritten documents).

Implementing a Face Identification Program

Initially it requires an extensive database with images of faces, with which to train an agent that will learn to distinguish different faces and group similar faces. On the website of researcher Libor Spacek of the University of Essex we can find sample databases to follow the exercise. The affinity propagation method requires a metric or measure of similarity between each of the images. Such a measure must be invariant under different transformations of light, colors, gestures, etc. to achieve a classification that is robust to such changes. In the implementation example presented in this article, the spatial correlation metric is used, which is invariant to luminosity changes and translation movements.

To train the agent we will use the version of Affinity Propagation implemented in Python’s scikit library. For scientific computing projects (like the one discussed in this article), Python is one of the most widely used programming languages, due to the flexibility and robustness it provides in the rapid prototyping of exploratory and scientific applications.

The example illustrates a basic process of automatic identification of people, however, if you require personalized advice and need additional information on the execution of technology implementation projects and data analysis can contact directly with Math Decision.

The classification made by the algorithm is presented in a list where the entry i is the group to which the image i should belong according to the agent.

For this example the faces94.zip database contained in the Libor Spacek web described above was chosen. The result when applying the previous algorithm, was a classification of a total of 133 different faces recognized from the database. To test if the classification was correct, groups were taken as representative samples of the classification and these are the results:

The agent correctly classified in various groups the related faces (similar) even though their facial expression is different and is now able to distinguish the classified subjects.

This procedure can be carried out on a large scale. With a database containing images of the faces of a country’s population, an agent can be trained to identify the individuals in the population. Each group classified by this agent uniquely corresponds to a person who has an identification. This agent can then be used to identify people in the classification groups according to their faces.

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)

Related

Filed Under: Digital Imaging

Latest Articles

How to Remove PC Optimizer Pro

How to Remove PC Optimizer Pro

PC Optimizer Pro is one of the biggest examples of duping people on the Internet. It is billed a as a free registry cleaner that is advertised with other free downloads. When it gets installed, it will alert you (falsely) with the claim that your computer is infected with all kinds of bugs. Then … [Read More...]

Handheld Applications

Handheld Applications

In the early days PDAs came with some variation on the set of familiar PIM applications, perhaps with a couple of games thrown in. The traditional PIM functionality has matured and grown in sophistication of the years, and continues to be present today. In addition to some form of … [Read More...]

Windows Defence Counsel

Windows Defence Counsel

Windows Defence Counsel If you've found this page, very likely you've been infected with Windows Defence Counsel. You must be wondering how something that can't even manage to spell defense correctly can cause so much trouble, we're right there with you. Generally speaking, Windows Defence Counsel … [Read More...]


What Are the Best eSports Games to Watch in 2020?

The esports industry is growing at a remarkable rate.  According to Statistica, the global market for esports is expected to reach $1.79 billion … [Read More...]

Choosing the Safest Crypto Wallet for the New Year

 There are a number of excellent benefits of cryptocurrencies.  They are extremely convenient and offer a tremendous amount of privacy. … [Read More...]

Guidelines on Troubleshooting Python Code

Whenever we write a computer program we need to verify that it works as expected. Usually we execute the code, if necessary we provide some inputs, … [Read More...]

Developing a Python to Extract Data from Your Smartphone

Many times we ask ourselves: "What part of the universe is this phone from?", even if we already know where it is, but we don't know which operator. … [Read More...]

Most Demanding Heroes to Play in Dota 2

Dota 2 is one of the most popular multi-player online combat games. It had an average player count of 485,000 throughout most of 2018. The peak number … [Read More...]

University of Minnesota Report Highlights AI Advances in Facial Recognition

Big data is leading to massive changes in our daily lives. The University of Minnesota has published a study on the advances in facial recognition … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

What Are the Best eSports Games to Watch in 2020?

The esports industry is growing at a remarkable rate.  According to Statistica, the global market for esports is expected to reach $1.79 billion … [Read More...]

Using Antivirus Reviews to Protect Your System

If you type the word “antivirus” into a web browser, you'll see a nearly limitless list of products asking for your money in exchange for … [Read More...]

Remove Omiga Plus virus (Removal Guide)

Categorized as a browser hijacker and PUP/Potentially Unwanted Program, is what Omiga Plus is. Once installed, with or without your permission through … [Read More...]

Return to top of page

Copyright © 2019 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors