Step right Up, Let The Computer Look At Your Face And Tell You Your Age

Like an age-guesser at a carnival, computer software being developed at the University of Illinois can fairly accurately estimate a person’s age. But, unlike age-guessers, who can view a person’s body, the software works by examining only the person’s face.

“Age-estimation software is useful in applications where you don’t need to specifically identify someone, such as a government employee, but would like to know their age,” said Thomas S. Huang, the William L. Everitt Distinguished Professor of Electrical and Computer Engineering at the U. of I.

For example, age-recognition algorithms could stop underage drinkers from entering bars, prevent minors from purchasing tobacco products from vending machines, and deny children access to adult Web sites, said Huang, who leads the Image Formation and Processing group at the university’s Beckman Institute.

Estimating someone’s age is not an easy task, even for a computer. That’s partly because the aging process is determined not only by a person’s genetic makeup, but by many other factors as well, including health, location and living conditions.

“Human faces do convey a significant amount of information, however, and provide important visual cues for estimating age,” Huang said. “Facial attributes, such as expression, gender and ethnic origin, play a crucial role in our image analysis.”

Consisting of three modules – face detection, discriminative manifold learning, and multiple linear regression – the researchers’ age-estimation software was trained on a database containing photos of 1,600 faces.

The software can estimate ages from 1 year to 93 years. The software’s accuracy ranges from about 50 percent when estimating ages to within 5 years, to more than 80 percent when estimating ages to within 10 years. The accuracy can be improved by additional training on larger databases of faces, Huang said.

In addition to performing tasks such as security control and surveillance monitoring, age-estimation software also could be used for electronic customer relationship management.

For example, a camera snapping photos of customers could collect demographic data – such as how many adult men and women buy burgers, or what percentage of teenagers purchase a particular soft drink.

Or, combined with algorithms that identify a person’s sex, age-estimation software could help target specific audiences for specific advertisements. For example, a store display might advertise a new automobile or boat as a man walks by, or new clothing or cosmetics as a woman walks by.

“All of this can be done without violating anyone’s privacy,” Huang said. “Our software does not identify specific individuals. It just estimates their ages.”

Huang is affiliated with the university’s Center for Advanced Study, Coordinated Science Laboratory, Information Trust Institute, and department of computer science.

Funding was provided by the National Science Foundation and the Intelligence Advanced Research Projects Activity. The researchers published their findings in the two journals IEEE Transactions on Multimedia and IEEE Transactions on Image Processing in 2008.

Editor’s note: To reach Thomas Huang, call 217-244-1638; e-mail: thuang1@illinois.edu

Media Contact

James E. Kloeppel University of Illinois

All latest news from the category: Information Technology

Here you can find a summary of innovations in the fields of information and data processing and up-to-date developments on IT equipment and hardware.

This area covers topics such as IT services, IT architectures, IT management and telecommunications.

Back to home

Comments (0)

Write a comment

Newest articles

Security vulnerability in browser interface

… allows computer access via graphics card. Researchers at Graz University of Technology were successful with three different side-channel attacks on graphics cards via the WebGPU browser interface. The attacks…

A closer look at mechanochemistry

Ferdi Schüth and his team at the Max Planck Institut für Kohlenforschung in Mülheim/Germany have been studying the phenomena of mechanochemistry for several years. But what actually happens at the…

Severe Vulnerabilities Discovered in Software to Protect Internet Routing

A research team from the National Research Center for Applied Cybersecurity ATHENE led by Prof. Dr. Haya Schulmann has uncovered 18 vulnerabilities in crucial software components of Resource Public Key…

Partners & Sponsors