• 검색 결과가 없습니다.

Implementation of Face Recognition Applications for Factory Work Management

N/A
N/A
Protected

Academic year: 2022

Share "Implementation of Face Recognition Applications for Factory Work Management"

Copied!
7
0
0

로드 중.... (전체 텍스트 보기)

전체 글

(1)

Implementation of Face Recognition Applications for Factory Work Management

Jungkyu Rho1, Woochang Shin2*

Associate Professor, Dept. of Computer Science, Seokyeong University, Korea1,2 jkrho@skuniv.ac.kr1, wcshin@skuniv.ac.kr2

Abstract

Facial recognition is a biometric technology that is used in various fields such as user authentication and identification of human characteristics.Face recognition applications are practically used in various fields, but very few applications have been developed to improve the factory work environment. We implemented applications that uses face recognition to identify a specific employee in a factory .work environment and provide customized information for each employee. Factory workers need documents describing the work in order to do their assigned work. Factory managers can use our application to register documents needed for each worker, and workers can view the documents assigned to them. Each worker is identified using face recognition, and by tracking the worker's face during work, it is possible to know that the worker is in the workplace. In addition, as a mobile app for workers is provided, workers can view the contents using a tablet, and we have defined a simple communication protocol to exchange information between our applications.We demonstrated the applications in a factory work environment and found several improvements were required for practical use. We expect these results can be used to improve factory work environments.

Keywords: Face Recognition, Face Detection, Human Identification, OpenCV, Smart Factory

1. Introduction

Recently, there are many cases of applying smart factory technologies in various fields such as production management, Internet of Things (IoT) sensor applications and inventory management [1]. However, there are relatively few smart factory applications that can be used in and small-scale factories having low technology level.

In this work, we developed a work management system that utilizes face recognition technologies to use in factory workbenches where machining is mainly performed. In a machining factory, workers need to see work order documents such as work specifications or blueprints in order to do their works. When a worker carries printed work order documents, there is a possibility that documents are left unattended on the workbench or lost. Compared to offices, the lighting of factory workbenches is usually not uniform and dark, or the brightness changes a lot depending on the sunlight, so it may be difficult to read the documents. To work out these

IJASC 20-3-32

Manuscript Received: August. 17, 2020 / Revised: August. 22, 2020 / Accepted: August. 28, 2020

*Corresponding Author: wcshin@skuniv.ac.kr Tel: +82-2-940-7755, Fax: +82-2-919-0345

Associate Professor, Dept. of Computer Science, Seokyeong University, Seoul, Korea

(2)

problems, we developed an application that displays a work document on a smart device that recognizes a worker's identity by face recognition. A large display screen is installed on the smart device so that the contents of the document can be seen well even in the dark. With using smart devices, information leakage is prevented by allowing only authorized workers to view the documents.

The work management system consists of a manager application and a worker application, and two application exchange information with each other via our own communication protocol. In the manager application, you can register individual workers, assign tasks to them, and register documents required for work. In the worker application, a list of tasks assigned to a worker and a work order can be viewed. Worker applications that run on mobile devices are also provided to prepare for cases where portability is required. We demonstrated the implementation in a factory environment and are looking for further requirements for practical use.

The remainder of this paper is organized as follows. Section 2 presents the background and related work, and Section 3 describes our implementation of the face recognition applications. Section 4 makes conclusion and discusses future works

2. Background

2.1 Face Recognition Technologies

Face recognition is a major field of image processing, and several theories and many applications and libraries have been developed. Among them, OpenCV is a popular image processing library because it supports various languages such as C++ and Python, and it is relatively easy to build face recognition applications using OpenCV [2]. Traditional machine learning models for face recognition include Principal Component Analysis (PCA) model, Linear Discriminate Analysis (LDA) model, and Support Vector Machine (SVM) model [3]. In addition, the introduction of deep learning has improved face recognition rate, and many researches based on deep learning have been conducted [4]. Bourlai and Cukic addressed the problems of intra-spectral and cross- spectral face recognition in homogeneous and heterogeneous environments [5]. Among the models mentioned above, SVM and deep learning models are difficult to implement on a low-spec computer due to high computational load. Since our goal is to apply face recognition applications to small and medium-sized factories, we tried to increase the practical recognition rate using PCA and LDA models.

2.2 Face Recognition Applications in Practice

Face recognition applications are practically used in various fields such as user authentication, surveillance, and attendance check. Zulfiqar et al. present a convolutional neural network based face recognition system [6].

Some researchers developed a technique to protect the face biometric during recognition, using the cancellable biometric [7]. NEC Corporation is a leading company in the practical use of face recognition, and its researchers proposed an identity-verification system for attendees of large-scale events using continuous face recognition improved by managing facial directions and eye contact of the attendees [8]. As an example of employing two types of cameras, a method which uses dome camera for tracking human movement and RGB- Depth camera for extracting facial information to identifying a person is proposed [9]. Sajjad and his colleagues proposed face recognition framework for law-enforcement services in smart cities [10].

3. Implementation of Face Recognition Applications

We implemented face recognition applications as a fixed display application and a mobile application that

(3)

can be used in tablets and smartphones. The full functionality is implemented in the fixed display application running on a Windows, and the mobile app runs on Android. The mobile application was developed for cases where installation is difficult or portability is required, and provides part of the Windows application functions.

3.1 Fixed Display Application

Figure 1 is the overall architecture of a fixed display application for face recognition. The entire system consists of manager and worker applications, the manager application is used in the office, the worker application is used on the displays placed in workplaces, and the network connection between them is Wi-Fi.

In the manager application, users are registered and work orders to be performed by each worker are added.

Images of each registered worker for face recognition are stored in the Face DB of the manager application, and it is replicated to the Face DB of the worker application. By using a replicated DB, it is possible to increase the recognition speed by reducing the data transmission time during worker identification. In the worker application, when a person approaches the display, a face is detected from images obtained by a camera mounted on the top of the display, and face recognition is performed using information stored in the Face DB.

We used template matching for face detection and PCA algorithm for face recognition. When a registered worker is identified, the list of assigned tasks is displayed and task selection is requested. If the selected task has not been previously worked on, the worker is asked to sign the work agreement form. When the work agreement signature is stored in the Work DB, the work order is displayed through the display. The work order is usually made up of several pages and can be moved between pages using a worker's gesture [11]. The worker application continuously tracks the worker's face while the worker is doing his/her job. Even if there are other people around the worker, only the first detected face is tracked. When face tracking fails, it is considered that the worker temporarily suspends the work and has left the workbench, then the work order is no longer displayed. When the worker returns to the workbench, face detection and recognition are executed again. When the worker selects previously performed task, the work order can be viewed without a signature, and the last page worked on is displayed.

Figure 1. System architecture of the face recognition factory application

We used face images of 10 persons for testing face recognition. For each person, more than 50 images were taken from different angles and illumination. Figure 2 shows some of the images stored in Face DB. Even after registering images, images of each worker can be added to Face DB to improve recognition rate. Since images of the same resolution should be used for machine learning, we implemented an application that detects a face from a camera image and converts it to a 92x112 resolution image.

(4)

Figure 2. Examples of face images store in Face DB

Figure 3 shows a demonstration of the implementation, the left is identifying a worker by face detection and recognition, the center is the continuous face tracking of the worker's face during work, and the right is only tracking the first detected person even if there are other people nearby. Continuous face tracking and one- person tracking functions showed resonable performance, but we found that face recognition speed needed to be improved.

Figure 3. Demonstrating face recognition (left), continuous face tracking (center), and tracking the first detected person only (right)

We defined Smart Factory Protocol (SFP) for information exchange between the worker application and the manager application. Figure 4 shows the message format of SFP. The SFP message size is 128 bytes, and the first byte represents that this message is an SFP message. DEVICE indicates whether the client is a fixed display or a mobile device, SERVICEID indicates whether a client is the worker application or the manager application, and USERID is an identifier of a logged-in user. MESSAGE indicates the type of message, PARAM1-PARAM5 and DATA are parameters and data for the message, respectively.

Figure 4. The SFP message format

Table 1 shows all possible SFP message types and descriptions for each message type.

SFP_MSG_PAGE_DONE indicates that the worker has completed the work specified in the work order, and SFT_MSG_LOGOUT indicates the situation in which the worker leaves the workbench and logs out. The SFP_MSG_TRAINING message means that Face DB of the worker application should be duplicated and machine learning should be done again.

(5)

Table 1. SFP message types

Message type Description

SFP_MSG_OK Getting permission, acceptance, or confirmation SFP_MSG_FAIL Requested operation failed

SFP_MSG_DENIED Requested operation is rejected SFP_MSG_PROGRAM_START Starting program

SFP_MSG_LOGIN_START Starting login

SFP_MSG_DETECTING_START Device is starting face recognition SFP_MSG_DETECT_USER Registered user detected

SFP_MSG_DETECT_ADMIN Administrator detected

SFP_MSG_DETECT_UNKNOWN Server could not detect any registered person SFP_MSG_DETECTING_END Finishing face recognition

SFP_MSG_SIGNATURE_REQUIRED Signature required before proceeding to next step SFP_MSG_SIGNATURE_UPLOAD Uploading a signature image

SFP_MSG_IMAGE_UPLOAD Uploading an image with file size and name specified in DATA SFP_MSG_PAGE_DONE Task finished

SFP_MSG_LOGOUT Processing logout

SFP_MSG_REQUEST_FILE Requesting to send a file with file name specified in DATA SFP_MSG_TRAING Requesting to update images for training

An example scenario where a worker application (client) requests a work order from the manager application (server) through SFP is as follows.

 The client sends the SFP_MSG_REQUEST_FILE message. The file name is specified in the DATA area.

 When the server receives SFP_MSG_REQUEST_FILE, the server checks the file name and responds with SFP_MSG_IMAGE_UPLOAD if the file can be transmitted, specifying the size of the file in the DATA area.

If the file cannot be transmitted, it responds with SFP_MSG_DENIED.

 The client receiving SFP_MSG_IMAGE_UPLOAD reads the size of the file, finishes preparing to receive the file, and sends SFP_MSG_OK.

 Receive a work order file from the server.

3.2 Mobile Application

We implemented the mobile application to view work orders on a mobile device in a workplace where installing a fixed display is difficult. Assuming that public devices are used, the devices do not have user identifiers, so user’s face image is used to identify the registered worker. The mobile app's functions include identifying workers with facial recognition, showing a list of assigned tasks, signing a work agreement, and displaying work orders. Unlike the fixed display application, the human face is not tracked after the worker is identified, so the worker must close the work order screen when stopping the work. Figure 5 shows the architecture of a mobile application. In this work, it is assumed that a high-performance mobile device is not used, and the mobile app does not directly perform face recognition, but sends the detected face image to the server to recognize the face. When the user is identified, the task list and work order are fetched from the server and displayed. Like a PC application, a work agreement can be signed on the mobile app.

(6)

Figure 5. System architecture of the mobile face recognition application

The mobile application also uses SFP to exchange information with the server. An example of a scenario in which the detected face image is sent to the server using the SFP to identify the user is as follows.

 The client sends a SFP_MSG_DETECTING_START message to the server.

 The server finishes preparing for face recognition and sends an SFP_MSG_OK message.

 The client receiving SFP_MSG_OK sends the SFP_MSG_IMAGE_UPLOAD message.

 The server sends the SFP_MSG_OK message to the client.

 The client sends the image to the server.

 After the server receives the image, it notifies the client of the result of face recognition. If it is a registered user, it sends SFP_MSG_DETECTING_IS_USER message.

 When the client receives SFP_MSG_DETECTING_IS_USER, the client has successfully logged in. If the client receives SFP_MSG_DETECTING_UNKNOWN, the user could not be identified from the image.

Figure 6 shows some of the activities of the mobile app. From the left, the activity detecting faces, the activity that displays a task list, the activity to sign the work agreement form, and the activity that displays the work order are shown. Work orders are usually made up of multiple pages and can be moved between pages by swiping the screen.

Figure 6. Detecting a face image, showing a task list, signing a work agreement form, and displaying a work order

4. Conclusion

We developed applications for worker identification and work order management in a small factory using the OpenCV library and demonstrated them in a factory environment. Managers can conveniently assign tasks to workers and manage each worker's work orders, as well as see the working status of each worker. Workers can use the application to view tasks and work orders assigned to them on the workbench and no longer need to bring printed work orders.

(7)

As a result of the demonstration, we found that recognition accuracy and recognition speed need to be improved. The factory work environment is affected by lighting and has a lower recognition rate than the office environment. The face tracking function worked relatively well, but face detection may fail when a worker turns his/her head in other direction during work. To solve these problems, we considered alternative options like employing an RGB-D camera, using Bluetooth communication, adopting Kinect sensor which can recognize a whole human body. The applications do not require high computing power and can be used for building smart factories.

References

[1] S-.H. Jang and J. Jeong, “Design and Implementation of OpenCV-based Inventory Management System to build Small and Medium Enterprise Smart Factory,” The Journal of The Institute of Internet, Broadcasting and Communication (JIIBC), Vol. 19, No. 1, pp.161-170, Feb. 2019.

DOI: https://doi.org/10.7236/JIIBC.2019.19.1.161

[2] OpenCV (Open Source Computer Vision Library). https://opencv.org/.

[3] E Gumus, N Kilic, A Sertbas, and O. N. Ucan, “Evaluation of face recognition techniques using PCA, wavelets and SVM,” Expert Systems with Applications, Vol. 37, Issue 9, pp. 6404-6408, Sep. 2010.

DOI: https://doi.org/10.1016/j.eswa.2010.02.079

[4] K. Grm, V. Štruc, A. Artiges, M. Caron, and H. K. Ekenel, “Strengths and weaknesses of deep learning models for face recognition against image degradations,” IET Biometrics, Vol. 7, Issue 1, pp. 81-89, Jan. 2018.

DOI: https://doi.org/10.1049/iet-bmt.2017.0083

[5] T. Bourlai and B. Cukic, “Multi-spectral face recognition: Identification of people in difficult environments,” in Proc.

2012 IEEE International Conference on Intelligence and Security Informatics, pp. 196-201, June 2012.

DOI: https://doi.org/10.1109/ISI.2012.6284307

[6] M. Zulfiqar, F. Syed, M. J. Khan, and K. Khurshid, “Deep Face Recognition for Biometric Authentication,” in Proc.

2019 International Conference on Electrical, Communication, and Computer Engineering, pp. 1-6, July 2019.

DOI: https://doi.org/10.1109/ICECCE47252.2019.8940725

[7] M. A. Dabbah, W. L. Woo, and S. S. Dlay, “Secure Authentication for Face Recognition,” in Proc. IEEE Symposium on Computational Intelligence in Image and Signal Processing, pp. 121-126, Apr. 2007.

DOI: https://doi.org/10.1109/CIISP.2007.369304

[8] A. Okumura, S. Handa, T. Hoshino, N. Tokunaga, and M. Kanda, “Improving Face Recognition for Identity Verification by Managing Facial Directions and Eye Contact of Event Attendees,” Journal of Information Processing Vol. 28, pp. 343-353, June 2020.

DOI: https://doi.org/10.2197/ipsjjip.28.343

[9] Y.H. Hong, S.J. Song, and J. Rho, “Real-time Tracking and Identification for Muli-Camera Surveillance System,”

International Journal of the Internet, Broadcasting and Communication (IJIBC), Vol. 10, No. 1, pp. 16-22, Feb. 2018.

DOI: https://doi.org/10.7236/IJIBC.2018.10.1.3

[10] M. Sajjad, M. Nasir, K. Muhammad, S. Khan, Z. Jan, A. K. Sangaiah, M. Elhoseny, and S. W. Baik, “Raspberry Pi assisted face recognition framework for enhanced law-enforcement services in smart cities,” Future Generation Computer Systems, Vol. 108, pp. 995-1007, July 2020.

DOI: https://doi.org/10.1016/j.future.2017.11.013

[11] Y.H. Hong, S.J. Song, K.M. Jang, and J. Rho, “Smart Factory Platform based on Multi-Touch and Image Recognition Technologies,” The Journal of the Institute of Internet, Broadcasting and Communication (JIIBC), Vol. 18, No. 1, pp. 23-28, Feb. 2018.

DOI: https://doi.org/10.7236/JIIBC.2018.18.1.23

참조

관련 문서

Our proposed method uses face detection trained with a head dataset to resolve the face deformation problem in the tracking process.. Further, we use robust face features

bility of our experimental setup, because viscoelastic property of ppy during electrochemical deposition has been recently examined in the electrolyte solution by Muramatsu et

• 대부분의 치료법은 환자의 이명 청력 및 소리의 편안함에 대한 보 고를 토대로

• 이명의 치료에 대한 매커니즘과 디지털 음향 기술에 대한 상업적으로의 급속한 발전으로 인해 치료 옵션은 증가했 지만, 선택 가이드 라인은 거의 없음.. •

12) Maestu I, Gómez-Aldaraví L, Torregrosa MD, Camps C, Llorca C, Bosch C, Gómez J, Giner V, Oltra A, Albert A. Gemcitabine and low dose carboplatin in the treatment of

Levi’s ® jeans were work pants.. Male workers wore them

A major cause in isolated speech recognition system is the inaccurate detection of the beginning and ending boundaries of test and reference patterns. Thus, it is

Herein we address this problem by proposing a hierarchical cascaded classifier for video face recognition, which is a multi-layer algorithm and accounts for the