pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

University of Minnesota Report Highlights AI Advances in Facial Recognition

Big data is leading to massive changes in our daily lives. The University of Minnesota has published a study on the advances in facial recognition technology, which are being used in law enforcement and other fields.

Role of Big Data and AI in Facial Recognition Technology

Data analytics has played a fundamental role in scientific, technological and business development in recent years. It is commonly used in advanced security systems, computer assistants for decision making, event prediction, anomaly detection, among others. One of these applications is face identification or facial recognition. The term face identification is used to describe the process in which a computer application verifies the identity of a person. Nowadays it is common to find this utility not only in security systems, but also in social networks and even smartphones.


The human face is an invaluable source of information. By means of a detailed analysis it is possible to determine the identity, approximate age, sex, mood, health and even what a person really wants to express. It all comes down to finding similarities in expressions, classifying them and developing systems that identify a face in one of the classified groups.

The common scheme called “automatic learning” consists of “training” an agent (program) with some data structure, which detects similarities and differences and groups (classifies) the related elements. This agent will be the one who later identifies an element in one of the detected groups.

The agent we will deal with in this article, for the case of face recognition, is the heuristic known as affinity propagation. This is an iterative clustering method that has been successful in the treatment of complex images (see this comparison chart with other methods, this article where they show a similar example of face classification and this article where they use affinity propagation to read handwritten documents).

Implementing a Face Identification Program

Initially it requires an extensive database with images of faces, with which to train an agent that will learn to distinguish different faces and group similar faces. On the website of researcher Libor Spacek of the University of Essex we can find sample databases to follow the exercise. The affinity propagation method requires a metric or measure of similarity between each of the images. Such a measure must be invariant under different transformations of light, colors, gestures, etc. to achieve a classification that is robust to such changes. In the implementation example presented in this article, the spatial correlation metric is used, which is invariant to luminosity changes and translation movements.

To train the agent we will use the version of Affinity Propagation implemented in Python’s scikit library. For scientific computing projects (like the one discussed in this article), Python is one of the most widely used programming languages, due to the flexibility and robustness it provides in the rapid prototyping of exploratory and scientific applications.

The example illustrates a basic process of automatic identification of people, however, if you require personalized advice and need additional information on the execution of technology implementation projects and data analysis can contact directly with Math Decision.

The classification made by the algorithm is presented in a list where the entry i is the group to which the image i should belong according to the agent.

For this example the faces94.zip database contained in the Libor Spacek web described above was chosen. The result when applying the previous algorithm, was a classification of a total of 133 different faces recognized from the database. To test if the classification was correct, groups were taken as representative samples of the classification and these are the results:

The agent correctly classified in various groups the related faces (similar) even though their facial expression is different and is now able to distinguish the classified subjects.

This procedure can be carried out on a large scale. With a database containing images of the faces of a country’s population, an agent can be trained to identify the individuals in the population. Each group classified by this agent uniquely corresponds to a person who has an identification. This agent can then be used to identify people in the classification groups according to their faces.

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)

Related

Filed Under: Digital Imaging

Latest Articles

Bridges

Bridges became commercially available in the early 1980s. At the time of their introduction their function was to connect separate homogeneous networks. Subsequently, bridging between different networks - for example, Ethernet and Token Ring - has … [Read More...]

The Ins and Outs of Dedicated Web Hosting

If you're new to the world of web hosting, you've likely been bombarded with options regarding how to best present your site. Perhaps you already know a thing or two about hosting and you're currently looking to move from shared to dedicated web hosting. If so, you're making a step toward … [Read More...]

Holographic Data Storage

In late 1995 a joint university/industry/government consortium initiated the Holographic Data Storage System (HDSS) programme, with the initial goals of developing several key components for the system, including a high-capacity, … [Read More...]

6 Simple Ways to Improve Security of Windows Computers

Millions of Windows PC users experience some form of cybercrime every year. According to one study, there were 2,953 reported cyberattacks between … [Read More...]

2021 PC Hardware Releases to Bolster Your Gaming

If you are a PC gamer, then chances are you are looking to upgrade your kit over the coming year. However, a lot of money can go into building the … [Read More...]

New Transfer Feature in Dropbox Enable Sharing files with Third Parties

Dropbox has been a popular P2P sharing platform for many years. They don't announce new features as often as other applications, since they have a … [Read More...]

Ransomware Operators Find Data Theft Profitable

How valuable is your data? That’s not a question that organizations or individuals have to ask themselves all that often. You might know the market … [Read More...]

Engineers Encounter the Quantum Challenge with Computers Running a Hundred Million Times Faster

Quantum computers have been a subject of discussion for many years. They have probably been something that philosophers and technology pundits have … [Read More...]

Transferring Image Files from Your Cell Phone Without Cables or Email

You don't have a cable available to transfer the photos from your cell phone to your computer? You don't feel comfortable sending them through your … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Testing the External DV Converter

To open Movie Maker, click Start > Programs > Accessories > Windows Movie Maker. Select Capture from video device to launch the Video … [Read More...]

IEEE 802.11n

Demand for wireless LAN hardware experienced phenomenal growth in the years following the ratification of the IEEE 802.11a standard in the … [Read More...]

How to Remove Personal Shield Pro

Easiest Removal Option: Remote Repair: Paying an expert to remove this threat is always the easiest option. It's also the most expensive. … [Read More...]

[footer_backtotop]

Copyright © 2021 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors