2018 Musa
2018 Musa
Abstract—Image processing technology in hardware and soft- Usually, the task of recognizing in computer science for face
ware has a significant development in all aspects of human recognition a someone based on identically from facial image.
civilization. Image processing is growing rapidly in various fields In the last decades, two method face recognition become very
such as medical image, Biometrics, Object identification, Object
character recognition (OCR), and many more. One biometric popular, the first is methods developed and the second are the
technique in an application detects and recognizes faces. Objec- high quality of the current videos/cameras.
tives of face recognition include recognizing emotions, identifying In the computer vision, the research of prototypes integrates
offenders, applying to security systems, image processing to ac- action with the result the retina analog functions (Smart Image
cess a door as an application of computer and human interaction. Sensor using analog Hmax) capable of realized autonomous
The facial recognition system in this research was conducted
live streaming using Local Binary Pattern Histogram (LBPH) vision systems accompanied by image treatments derived from
method. There is a constraint to a light intake received by the using 0.35µm CMOS technology as measurement and tools
camera through a sensor that captures the image. an image sensors. In the computer as autonomous vision
Based on the results of our research to make better facial systems, the action of mathematical calculation doesnt need a
recognition, we propose using adaptation methods on the intensity high precision and an analog filtering approach. Their project
of light that is around the image capture object. The method of
adaptation in this research is the Contrast Adaptive Limited proposal of prototypes integrates to embed a system on the
Histogram (CLAHE). retina analog functions into the image sensors. The superior
Index Terms—Image Processing, Biometric, Contrast-Limited position is projected in the instance of comparing with series
Adaptive Histogram (CLAHE), Local Binary Pattern Histogram of the digits 0 and 1 plan into effect is to specified condition
(LBPH), Face Recognition an approved of speed determination and power consumption
[2].
I. I NTRODUCTION Adaptive Histogram Equalization (AHE) tends to over am-
Now, in the world of information technology, biometrics plify noise in the relative region of an image. A variant
are relevant to the technology used for physical analysis and of Adaptive Histogram also Contrast-Limited Adaptive His-
human behavior for authentication. such as the introduction togram Equalization (CLAHE) aims to prevent over ampli-
of the physical human with the introduction of fingerprints, fication by limiting contrast amplification. The amplification
retina, iris, facial patterns, and signatures. contrast around the given pixel value is given by the slope
Face recognition support to human beings perform automat- function transformation. CLAHE limits present the amplifi-
ically any times, every day and practice with like easy task, cation by clipping based a predefined value in the histogram
but the process in the computer it has implemented to be a before CDF computing (cumulative distribution function) [3].
consisting of many different and connected parts of the task.
II. RELATED WORK
The computer needs dataset as variables that can the quality
of the methods, for example, version of illumination, low level A. Image Processing
of the resolution, occlusion, etc. The introduction of the future using digital image processing
The use of information technology in biometric tagging can as a basic concept and implementation for digital images is
be used in the identification model, where the biometric system the development phase of the field of study and the discipline
identifies each person and searches through the same code in of image processing, e.g: basic of images, compilation of
the database that has been compiled. The use of biometric is images in relating to spatial and frequency an area of image,
considered to have a higher level of security than traditional restoration, color unbalance, wavelets, image compression,
systems that use passwords or ID Card for authentication on morphology operation, segmentation image, motion and detec-
accessing a system [1]. tion objects, description of images, and the basics of objects
and patterns recognition [4]. • The variable L is the whole a number of gray levels
Expanded to development an image processing or novelty present at the image (usually 256),
in area image processing has coverage about deep learn- • The variable n is the number of pixels from dataset the
ing and deep neural networks, convolutional method, Neu- image, and
ral Networks, the Scale-Invariant Feature Transform (SIFT), • The variable Px (i) a representation of the image his-
Maximally-Stable Extremal Regions (MSERs), k-means clus- togram for the pixel into an index to i
tering and etc [5].
However, the image processing to an execution of these Algorithm 1 Histograms Equalization Function
rules to be followed in calculations is usually carried out in Require: ImageInput is ImageORIGIN AL , which ImageInput
digital form (using the computer) and need for a particular is convert to grayscale image
purpose intensive calculations not really compatible with the Ensure: ImageOutput is Image Histogram Equalized from
restriction of embedded systems. ImageInput
The embedded systems of camera sensors have the constraints 1: Using the function to read the image
of the quality of the images, a speed of treatment, the 2: Find the result into variable equ with convert image to
performance system of embedded processing, and low power histogram equalize
consumption [6]. 3: Stacking from the images side-by-side
4: Show the resulting image
B. Biometric
Before applied to computer technology, access systems on
a device still use special objects such as access cards or use When bringing with one quality image with distinct sources
memory power and the blocks are core low-level building of light dynamics conditions, the make the same in quantity
a multi-biometric system is implemented [7]. There are two and find to check the results.
reasons for using Biometric data today: Histogram equalization function has an approved of the
result during the histogram of the image outcome is confined
1) As a verification tools, where the required data is on an
to an intense region. It inoperable places where the relatively
object (such as a document or credit card). But they can
great size intensity difference and histogram covering an area,
be duplicated so that it can be misused by someone else.
which used to refer to two reflecting a lot of light and no light
2) As a verification codes, usually using a password. Some-
as representation gray level pixels are present in figure 1.
times we forget the codes. Even if we use the best
encryption algorithm, there are still algorithms that can
do the decryption
The use of biometrics has several advantages, as follows:
• Can not be lost or forgotten
• Difficult to duplicate, share or change hands
• Authenticity is guaranteed
(a) ClipLimit=0.5
Fig. 4. The result of Image using CLAHE method with different illumination
TABLE I
I MPLEMENTATION OF CLAHE FOR FACE R ECOGNATION
Case Face Recognation Description of the Image
Capture Image:
1. Exterior Room
1 2. Lumen = 240 lx
3. Accuration Recognation = 75%
4. Face Detect founded
5. Face Recogntion founded
Capture Image:
1. Exterior Room
2 2. Lumen = 198 lx
3. Accuration Recognation = 85%
4. Face Detect founded
5. Face Recogntion founded
Capture Image:
1. Interior Room
3 2. Lumen = 98 lx
3. Accuration Recognation = 95%
4. Face Detect founded IV. CONCLUSION
5. Face Recogntion founded
From the improved image results based on the contrast
Capture Image: boundary that has been adapted HE, it can improve the image
1. Interior Room obtained. If the contrast that captured by its image is very
4 2. Lumen = 65 lx
3. Accuration Recognation = 50%
dark, the contrast value will be brightening on the image
4. Face Detect founded result. Conversely, if the image captured is very bright, then
5. Face Recogntion founded the contrast value will be reducing on the image result and
Capture Image:
become darker.
1. Interior Room The application of LBPH method for face recognition on
5 2. Lumen = 65 lx this test results have been done, where this research can show
3. Accuration Recognation = 95%
4. Face Detect founded
detection and face recognition successfully recognize the face
5. Face Recogntion founded of every user who is outside and indoor received through
the camera. But when testing twins, sometimes it resulting
Experiments in the image results of the CLAHE test above error when doing face detection and recognition incorrect face
in table I, there is outdoor testing and indoors that result in matching.
different lumens. Each the result can recognize the face of the The continuation of this research for appropriate future
user tester, where every previous face has been stored in a technologies, as biometric data for the authentication of a
database. There are also tests on twins that have been tested system. Examples of applications that can be done are the
in cases 4 and 5. Although the success to detect and recognize attendance system and automatic door access by using a
the face of one of the twins only succeeded 50%, the results recognizable user face.
V. ACKNOWLEDGEMENT
This research was fully given assistance to realize this
project by the Department of Computer Science. The authors
thankfully acknowledge Universitas Gunadarma for especially
financially make available for use research funding and autho-
rization to access laboratory in using the research facilities.
R EFERENCES
[1] P. Musa, N. Yuliani, and M. Lamsani, “Rancang bangun pengendali
pintu automatis berdasarkan ciri wajah menggunakan metode euclidean
distance dan fuzzy c-mean,” 2008.
[2] M. Paindavoine, J. Dubois, and P. Musa, “Neuro-inspired smart image
sensor: analog hmax implementation,” vol. 9403, 2015, pp. 9403 –
9403 – 8. [Online]. Available: https://doi.org/10.1117/12.2079093
[3] S. M. Pizer, E. P. Amburn, J. D. Austin, R. Cromartie, A. Geselowitz,
T. Greer, B. ter Haar Romeny, J. B. Zimmerman, and K. Zuiderveld,
“Adaptive histogram equalization and its variations,” Computer Vision,
Graphics, and Image Processing, vol. 39, no. 3, pp. 355 – 368, 1987.
[4] A. Rosebrock, Practical Python and OpenCV: An Introductory, Example
Driven Guide to Image Processing and Computer Vision. PyImage-
Search, 2014.
[5] R. C. Gonzalez and R. E. Woods, Digital image processing, 4th ed.
Upper Saddle River, N.J.: Prentice Hall.
[6] P. Musa, S. A. Sudiro, E. P. Wibowo, S. Harmanto, and M. Paindavoine,
“Design and implementation of non-linear image processing functions
for CMOS image sensor,” in Optoelectronic Imaging and Multimedia
Technology II, vol. 8558, 2012, p. 85580O.
[7] R. I. Hammoud, B. R. Abidi, and M. A. Abidi, Face Biometrics for
Personal Identification: Multi-Sensory Multi-Modal Systems. Springer,
2007, p. 275.
[8] A. L. Ramadhani, P. Musa, and E. P. Wibowo, “Human face recognition
application using pca and eigenface approach,” in 2017 Second Interna-
tional Conference on Informatics and Computing (ICIC), 1-3, pp. 1–5.
[9] P. N. Belhumeur, J. P. Hespanha, and D. J. Kriegman, “Eigenfaces vs.
fisherfaces: Recognition using class specific linear projection,” IEEE
Trans. Pattern Anal. Mach. Intell., vol. 19, no. 7, pp. 711–720, Jul.
1997.
[10] H. Dienillah, “Aplikasi pengenalan wajah menggunakan algoritma lbph
berbasis opencv,” 2014.
[11] B. Yang and S. Chen, “A comparative study on local binary pattern
(lbp) based face recognition: Lbp histogram versus lbp image,” Neuro-
computing, vol. 120, pp. 365 – 379, 2013, image Feature Detection and
Description.
[12] K. Salton, “Face recognition: Understanding lbph algorithm,” Towards
Data Science, 2017.