Face Detection
Face Detection
PROJECT REPORT
ON
FACE DETECTION
ROSHNI MAHARANA
SANTOSINI SAHU
SHRABANEE SAHU
CERTIFICATION
Berhampur
EXTERNAL:
Page |3
ABSTRACT
The project titled 'Face Detection' is done using the languages HTML, CSS, PHP as front end
and PYTHON as back end. This software offers an effective and easy way for a Detection
System. In this project, we have used voila-jones algorithm to detect faces. After being
registered, a person can look for his data, store data securely and do all the works online.
Human face detection has become a major field of interest in current research.
Page |4
ACKNOWLEDGEMENT
The achievement that is associated with the successful completion of this project would be
incomplete without mentioning the names whose endless cooperation made it possible. I
would like to convey my regards to our college 'SASHI BHUSAN RATH GOVT WOMEN'S
COLLEGE' and our respected Principal for giving us such nice opportunity to enhance our
skills in this domain.
I take this opportunity to express our deep gratitude towards our Project Supervisor, Mr.
SALAGRAM PADHI for giving us such valuable suggestion, guidance and encouragement
during the development of this project work.
Last but not the least we are grateful to all the faculty members for their support.
Page |5
DECLARATION
The above said proposed project is to be a part towards the fulfilment of the requirement of
course study. This project is an original one and has not been submitted to any organization
for the fulfilment of any course.
Page |6
Table of contents
FACE DETECTION
Simple solution of face detection with rich graphical design and image handling operations.
3. INTRODUCTION:
In this work, a software for human face detection is prepared. Initial implementation of this
work is service oriented. However, the analysis and design are done to promote the work as
product based. The work is entitled as Face Detection System.
Face Detection is an application software to deal with human face. It has the provisions to
collect image from the user so that they can detect the eyes, nose, mouth and whole face of
human in the image.
There are various advantages of developing a software using face detection and recognition
in the field of authentication.
Face detection is an easy and simple task for humans, but not so for computers. It has been
regarded as the most complex and challenging problem in the field of computer vision due to
large intra-class variations caused by the changes in facial appearance, lighting and
expression. Face detection is the process of identifying one or more human faces in images or
videos. It plays an important part in many biometric, security and surveillance systems, as
well as image and video indexing systems. Face detection can be regarded as a specific case
of object-class detection. In object-class detection, the task is to find the locations and sizes
of all objects in an image that belong to a given class.
Page |8
The project titled 'Face Detection' is to manage all the front- end back-end system of finding
or detecting particular region in human face. This software helps the people looking for more
advanced way of image processing system. Using this soft-ware they can easily find or detect
faces in image and also recognize the face after saving that. Face-detection algorithms focus
on the detection of frontal human faces. It is analogous to image detection in which the image
of a person is matched bit by bit. Image matches with the image stores in database. Any facial
feature changes in the database will invalidate the matching process.
Face detection is a computer technique that is based on artificial intelligence and is used to
detect and identify human faces. People can be monitored and tracked in real-time when this
technology is used in conjunction with biometric security systems (especially those that use
face recognition technology). You can click here to create your own face detection
application with cameralise.
Face detection is generally the initial step in apps that involve facial tracking, analysis, and
identification, and it has a substantial influence on how subsequent actions inside the
software will perform as a result. With face detection, it is possible to improve the accuracy
of the facial analysis by identifying the sections of a video or parts of a picture that should be
focused on when determining specialties like gender, age, and emotions.
Facial recognition systems (which build "faceprint" maps of facial traits) use a similar
approach with the help of face detection data being included in the application's algorithms.
Face detection assists in determining which portions of a video or picture are required in
order to create a faceprint.
It is difficult to detect faces in photographs because there is such a wide range of variability
in human faces, such as in their pose, their expression, their position and orientation, the
colour of their skin, the presence of glasses or facial hair, and differences in camera gain,
lighting conditions, and image resolution. Face Recognition makes analysing faces possible
easily with the help of a face detection algorithm.
OBJECTIVE:
4.FACE DETECTION:
Face detection is Computer technology being used in a variety of applications that identifies
human faces in digital images. The problem of face recognition is all about face detection.
This is a fact that seems quite bizarre to new researchers in this area. However, before face
recognition is possible, one must be able to reliably find a face and its landmarks. This is
essentially a segmentation problem and in practical systems, most of the effort goes into solving
this task. In- fact the actual recognition based on features extracted from these facial landmarks
is only a minor last step.
not a face. Once trained, the model extracts specific features, which are stored in a file
so that features from new images can be compared with the stored features at various
stages. If the image under study passes through each stage of the feature comparison,
then a face has been detected and operations can proceed.
Overall, traditional methods and deep learning-based methods have their strengths
and weaknesses. Traditional methods are computationally efficient and can work well
in low-resolution images, but they may not perform well in complex environments
with varying lighting conditions and facial expressions. In contrast, deep learning-
based methods used in face detection software can achieve high accuracy and
robustness in complex environments, but they require large amounts of training data
and are computationally intensive.
P a g e | 11
Face detection software uses several different methods, each with advantages and
disadvantages:
Appearance-based. This method uses statistical analysis and ML to find the relevant
characteristics of face images. The appearance-based method can struggle with
changes in lighting and orientation.
Single shot detector (SSD). While region proposal network-based approaches such as
R-CNN need two camera shots -- one for generating region proposals and one for
detecting the object of each proposal -- SSDs only require one shot to detect multiple
objects within the image. Therefore, SSDs are faster than R-CNN. However, SSDs
have difficulty detecting small faces or faces farther away from the camera.
P a g e | 12
Face detection application use AI algorithm, ML, statistical analysis and image
processing to find human faces within larger images and distinguish them from nonface
objects such as landscapes, buildings and other human body parts. Before face detection
begins, the analysed media is pre-processed to improve its quality and remove images that
might interface with detection.
P a g e | 13
A reliable face-detection approach based on the genetic algorithm and the eigen-face
technique.
Firstly, the possible human eye regions are detected by testing all the valley regions in the
grey-level image. Then the genetic algorithm is used to generate all the possible face regions
which include the eyebrows, the iris, the nostril and the mouth corners.
Each possible face candidate is normalized to reduce both the lightning effect, which is
caused by uneven illumination; and the shirring effect, which is due to head movement.
The fitness value of each candidate is measured based on its projection on the eigen-faces.
After a number of iterations, all the face candidates with a high fitness value are selected for
further verification. At this stage, the face symmetry is measured and the existence of the
different facial features is verified for each face candidate.
Face detection is gaining the interest of marketers. A webcam can be integrated into a
television and detect any face that walks by. The system then calculates the race, gender, and
age range of the face.
P a g e | 14
Planned approach towards working: The working in the organization will be well planned
and organized. The data image will be stored properly in database stores which will help in
retrieval of information as well as its storage.
➢ Accuracy: The level of accuracy in the proposed system will be higher. All operation
would be done correctly and it ensures that whatever information is coming from the
centre is accurate.
➢ Reliability: The reliability of the proposed system will be high due to the above
stated reasons. The reason for the increased reliability of the system is that now there
would be proper storage of information.
➢ No Redundancy: In the proposed system utmost care would be that no information is
repeated anywhere, in storage or otherwise. This would assure economic use of
storage space and consistency in the data stored.
➢ Immediate retrieval of information: The main objective of proposed system is to
provide for a quick and efficient detection of required information. Any type of
detection would be available whenever the user requires.
➢ Immediate storage of information: In manual system there are many problems to
store the largest amount of information for processing.
➢ Easy to Operate: The system should be easy to operate and should be such that it can
be developed within a short period of time and fit in the limited budget of the user.
The camera detects and locates the image of a face, either alone or in a crowd. The image
may show the person looking straight ahead or in profile.
Next, an image of the face is captured and analysed. Most facial recognition technology relies
on 2D rather than 3D images because it can more conveniently match a 2D image with public
photos or those in a database. The software reads the geometry of your face. Key factors
include the distance between your eyes, the depth of your eye sockets, the distance from
forehead to chin, the shape of your cheekbones, and the contour of the lips, ears, and chin.
The aim is to identify the facial landmarks that are key to distinguishing your face.
The face capture process transforms analog information (a face) into a set of digital
information (data) based on the person's facial features. Your face's analysis is essentially
P a g e | 15
turned into a mathematical formula. The numerical code is called a faceprint. In the same
way that thumbprints are unique, each person has their own faceprint.
Your faceprint is then compared against a database of other known faces. For example, the
FBI has access to up to 650 million photos, drawn from various state databases. On
Facebook, any photo tagged with a person's name becomes a part of Facebook's database,
which may also be used for facial recognition. If your faceprint matches an image in a facial
recognition database, then a determination is m
➢ 1.Trained and growing database: The accuracy rate of any FRS depends on the
database that its artificial intelligence was trained on. The data needs to be continually
growing, with diversity in terms of gender and ethnicity. The training data also needs
to have a variance in lighting, angles, and facial expressions. A good database also
carries different resolutions of images for the system to work with. Machine learning
P a g e | 16
programs are only as good as the database they use to learn, and the FRS is no
exception.
➢ 2. Security and user privacy: Any biometric software is closely tied to a person’s
identity. This means that data (in this case, faceprints) accumulated by the FRS is
highly sensitive. User data must be encrypted and purged at regular intervals. Software
providers must have a robust plan in place in case of a data breach.
➢ 3. Algorithm accuracy: The key metrics to look at while considering an FRS are false
acceptance rate (FAR) and false rejection rate (FRR). FAR is when different images
are falsely matched as identical. In this case, if you’re using it for security, the wrong
person may be allowed access. In FRR, exact images are falsely mismatched as
different. In this case, the right person may be denied access. In a practical security
scenario, the FAR must be low and the FRR high.
➢ 4. Scalability: For large enterprises looking to use FRS for authentication, scalability
is essential since the software needs to be deployed across multiple locations.
➢ 5.Adaptability and support: FRS providers must offer fallback options into account.
In case of system failure, human support and oversight might be required while the
system returns to normal. Support is also needed for setting up the hardware,
particularly cameras, for maximum accuracy.
➢ 6.Transparency and ethics: FRS has been called out several times in the last year
alone for the lack of transparency involved. Ensure that the software you use does not
resort to unethical practices like social media scrubbing to collect training data or
violate user privacy.
a) Crime prevention:
b) Attendance monitoring:
Face detection is a contactless and paperless technology that allows access and attendance for
the end user by verifying the captured image, video, or identification points from the initially
stored database. If they match, the attendance gets marked or authentication is granted.
c) Biometric identification:
Facial recognition uses technology and biometrics typically through Alto identify human
faces. It maps facial features from a photograph or video and then compares the information
with a database of known faces to find a match. Facial recognition can help verify a person's
identity.
d) Identity verification:
Facial recognition technology is a biometric technology that uses facial features to identify
individuals. It works by analysing and measuring various facial features, such as the distance
between the eyes, the shape of the jawline, and the size of the nose.
Face detection method analyses facial features from images or videos to identify individuals.
They compare the facial characteristics of missing persons with available images in databases
or on social media.
Facial recognition can be used to find missing persons and victims of human
trafficking. Suppose missing individuals are added to a database. In that case, law
enforcement can be alerted as soon as they are recognized by face recognition — whether it is
in an airport, retail store, or other public space.
f) Facial recognition:
Face detection often used as a part of (or together with) facial recognition.
g) Healthcare:
Applications of facial detection technology are used in hospitals, especially those working in
assisted living. The software serves to keep track of everything that is going on within a
hospital, ensuring patients are safe and the premise is secure.
P a g e | 18
If a patient wanders away from the care-giving facility with no identification, facial
recognition can help quickly identify and find them quickly to prevent any harm from coming
to them.
h) Access Control:
Outside of cars and smartphones, facial recognition can be used in the home to grant access
to certain IoT devices in addition to entry into the home itself. As this technology becomes
more and more advanced, people will feel better protected against home invasions and
robberies.
i) Education:
Other than federal and local security, facial recognition applications may exist most
prominently in the education sector.
A growing number of schools already use cameras that utilize facial recognition
software to identify students, staff, unauthorized individuals, and even behavior that
could present a threat to safety. This is one of many new tech trends that are
transforming education.
For schools using this technology, the main benefit they see is tracking student
attendance as well as maintaining the security of their campus. Unfortunately,
technology can be very biased and studies have shown evidence for the software to be
banned.
j) Unlocking phones:
Various phones, including the most recent iPhones, use face recognition to unlock the
device. The technology offers a powerful way to protect personal data and ensures
that sensitive data remains inaccessible if the phone is stolen. Apple claims that the
chance of a random face unlocking your phone is about one in 1 million.
k) Security:
Face detection is used in security cameras to detect people who enter restricted spaces or to
count how many people have entered an area. An additional use is drawing language
inferences from visual cues a form of lip reading. This can help computers determine who is
speaking and what they're saying, which helps with security applications.
Furthermore, face detection can be used to determine which parts of an image to blur to
ensure privacy, and used by public security cameras to map streets and the people on them in
real time.
Emotional interference
Accurate authentication
Fraud detection
Accelerate investigation
Entertainment
P a g e | 19
As a key element in facial imaging applications, such as facial recognition and face analysis,
face detection creates various advantages for users, including the following:
• Improved security: Face detection improves surveillance efforts and helps track down
criminals and terrorists. Personal security is enhanced when users use their faces in place of
passwords, because there's nothing for hackers to steal or change.
• Easy to integrate: Face detection and facial recognition technology is easy to integrate, and
most applications are compatible with the majority of cybersecurity, software.
Face detection algorithms typically start by searching for human eyes, one of the easiest
features to detect. They then try to detect facial landmarks, such as eyebrows, mouth, nose,
nostrils and irises. Once the algorithm concludes that it has found a facial region, it does
additional tests to confirm that it has detected a face.
• Massive data storage burden. The ML technology used in face detection requires a lot of
data storage that might not be available to all users.
• Inaccuracy: Face detection provides more accurate results than manual identification
processes, but it can also be thrown off by changes in appearance, camera angles, expression,
position, orientation, skin colour, pixel values, glasses, facial hair, and differences in camera
gain, lighting conditions and image resolution.
P a g e | 20
• A potential breach of privacy: Face detection's ability to help the government track down
criminals creates huge benefits. However, the same surveillance can let the government
observe private citizens. Strict regulations must be set to ensure the technology is used fairly
and in compliance with human privacy rights.
HTML:
▪ Hyper Text Markup Language or HTML is the standard markup language for
documents designed to be displayed in a web browser. It defines the content and
structure of web content.
▪ HTML consists of a series of elements
▪ HTML elements tell the browser how to display the content.
CSS:
▪ Cascading Style Sheets is a style sheet language used for specifying the presentation
and styling of a document written in a markup language such as HTML or XML.
▪ CSS is a cornerstone technology of the World Wide Web.
PHP
It handles dynamic content, database as well as session tracking for the website.
You can create sessions in PHP.
It can access cookies variable and also set cookies.
It helps to encrypt the data and apply validation.
PHP supports several protocols such as HTTP, POP3, SNMP, LDAP, IMAP, and
many more.
Using PHP language, you can control the user to access some pages of your website.
P a g e | 21
As PHP is easy to install and set up, this is the main reason why PHP is the best
language to learn.
PHP can handle the forms, such as - collect the data from users using forms, save it
into the database, and return useful information to the user. For example -
Registration form.
➢ PHP FEATURES:
PHP is very popular language because of its simplicity and open source. There are
some important features of PHP given below:
1.PERFOMENCE:
PHP script is executed much faster than those scripts which are written in other languages
such as JSP and ASP. PHP uses its own memory, so the server workload and loading time is
automatically reduced, which results in faster processing speed and better performance.
2.OPEN SOURCE:
PHP source code and software are freely available on the web. You can develop all the
versions of PHP according to your requirement without paying any cost. All its components
are free to download and use.
PHP has easily understandable syntax. Programmers are comfortable coding with it.
4.EMBEDDED:
PHP code can be easily embedded within HTML tags and script.
5.PLATFORM INDEPENDENT:
PHP is available for WINDOWS, MAC, LINUX & UNIX operating system. A PHP
application developed in one OS can be easily executed in other OS also.
6.DATABASE SUPPORT:
PHP supports all the leading databases such as MySQL, SQLite, ODBC, etc.
7.ERROR REPORTING:
PHP has predefined error reporting constants to generate an error notice or warning at
runtime. E.g., E_ERROR, E_WARNING, E_STRICT, E_PARSE.
PHP allows us to use a variable without declaring its datatype. It will be taken automatically
at the time of execution based on the type of data it contains on its value.
P a g e | 22
PHP is compatible with almost all local servers used today like Apache, Netscape, Microsoft
IIS, etc.
10.SECURITY:
PHP is a secure language to develop the website. It consists of multiple layers of security to
prevent threads and malicious attacks.
11.CONTROL:
Different programming languages require long script or code, whereas PHP can do the same
work in a few lines of code. It has maximum control over the websites like you can make
changes easily whenever you want.
➢ WEB DEVELOPMENT:
PHP is widely used in web development nowadays. PHP can develop dynamic
websites easily. But you must have the basic the knowledge of following technologies
for web development as well.
HTML
CSS
CSS - CSS helps to make the webpage content more effective and attractive.
Audience:
Our PHP tutorial is designed to help beginners and professionals. This PHP tutorial
will help those who are unaware about the concepts of PHP but have basic knowledge
of computer programming.
JAVASCRIPT
▪ JavaScript contains a standard library of objects, like Array, Date, and Math, and a
core set of language elements like operators, control structures, and statements.
System Specifications means those technical and functional requirements relating to the
design and performance. It also described the functionality of the product needs to fulfil the
needs of the user.
SOFTWARE SPECIFICATION:
HARDWARE SPECIFICATION:
Processor: 11th Gen Intel(R) Core (TM) i7-1165G7 @ 2.80GHz 2.80 GHz
RAM :16GB
Subtle variations in lighting conditions can challenge an automated facial detection algorithm
and skew the results – even if the person has a similar pose and expression.
Illumination can significantly change a face’s appearance. In many cases, two images of the
same face in a different light appear more different than the faces of two individuals with the
same illumination.
Facial detection algorithms are also sensitive to variations in angles or poses. An individual’s
pose changes based on head movements and camera positions. Using a different camera angle
or pose alters the overall facial appearance, creating variations that impact the success of the
facial recognition system. For example, suppose the database only contains frontal views of a
subject. In that case, the algorithm might struggle to identify a face with a higher rotation
angle, generating a flawed result or failing to recognize an identity altogether.
expressions (both macro and micro), potentially skewing the results of a facial recognition
system. In addition, face appearance can be changed by make-up and accessories such as
eyeglasses or earrings, which can also make face recognition more difficult.
1. AI Enhances Capabilities:
AI-driven identity verification for access control will become more capable and accessible in
the year ahead. No longer a theoretical technology, AI is more refined and actionable, ready
to deliver new real-world experiences.
Many businesses and building owners are balancing safety and convenience, often
compromising one to accommodate the other.
What’s more, there is frequently a chasm between executives’ intentions and actual process
implementation. For example, a PwC survey found “90% of C-suite executives believe their
company pays attention to people’s needs when introducing new technology, but only about
half (53%) of staff say the same.”
When it comes to securing physical spaces, this means accounting for access control
requirements. Physical authentication tools, like magnetic cards or badges, can be lost, stolen
or manipulated while eroding the user experience.
In 2022, facial recognition technologies will alleviate these concerns, allowing people to
access appropriate spaces with as little friction as possible.
Doorbell cameras and home security systems are increasingly prevalent in residential
dwellings, providing peace of mind and protection for people’s most valuable asset.
P a g e | 25
Facial recognition will enhance these systems, allowing people to derive more functionality
than ever before.
For instance, facial recognition technologies can be integrated with home- centred
applications to announce front door arrivals, provide remote residential access and other
access-related functionality.
However, when paired with facial recognition technologies, these assistants can be more
personal and responsive, serving as a more realistic and responsive alternative to today’s
robotic iterations.
Specifically, these technologies can be trained to detect emotions and other intuitive social
clues, making them more conversational and personally responsive.
Facial recognition is often used to facilitate some of our most important interactions,
including platform access, online payments and other secure spaces.
Of course, these developments will need to be paired with their own privacy standards, but
the net gain to users’ security is worth navigating and refining this complicated process.
authentication, including facial recognition, will play an important part in this security
landscape, a sentiment shared by many industry professionals worldwide.
15.SCREENSHORTS:
WEBSITE:
P a g e | 27
LOGIN PAGE:
P a g e | 28
15.CONCLISUION:
Our goal is to provide the users a wonderful experience of studying and gathering knowledge.
The computational models, which were implemented in this project, were chosen after
extensive research, and the successful testing results confirm that the choices made by the
researcher were reliable.
The system with manual face detection and automatic face recognition did not have
recognition accuracy over 90%, due to the limited number of eigen faces that were used for
the PCA transform. This system was tested under very robust conditions in this experimental
study and it is envisaged that real-world performance will be far more accurate.
The fully automated frontal view face detection system displayed virtually perfect accuracy
and in the researcher's opinion further work need not be conducted in this area.
This was one of the system requirements identified in section However, if some sort of
further processing, such as an eye detection technique, was implemented to further normalize
the segmented face image, performance will increase to levels comparable to the manual face
detection and recognition system. There are better techniques such as iris or retina
recognition and face recognition using the thermal spectrum for user access and user
verification applications since this need a very high degree of accuracy.