SlideShare a Scribd company logo
1 of 9
Download to read offline
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.6, No.2, April 2015
DOI:10.5121/ijcses.2015.6201 1
FACIAL EXPRESSION RECOGNITION BASED ON
EDGE DETECTION
Xiaoming CHEN and Wushan CHENG
College of Mechanical Engineering, Shanghai University of Engineering Science,
Shanghai 201620, China
ABSTRACT
Relational Over the last two decades, the advances in computer vision and pattern recognition power have
opened the door to new opportunity of automatic facial expression recognition system[1]. This paper use
Canny edge detection method for facial expression recognition. Image color space transformation in the
first place and then to identify and locate human face .Next pick up the edge of eyes and mouth's features
extraction. Last we judge the facial expressions after compared with the expressions we known in the
database. This proposed approach provides full automatic solution of human expressions as well as
overcoming facial expressions variation and intensity problems.
KEYWORDS
Facial Expression Recognition; Color Space; Edge Detection.
1. INTRODUCTION
Facial expression is a kind of expression of the emotional state, human face has the great power
of expression, it provides a powerful and flexible nature expression in communication and
emotional state. Using facial expressions can not only express inner emotion, but also provide
important clues to the social communication. The facial expression of a speaker accounts for
about 55 percent of the effect of the communicated messages, 38 percent of the latter is conveyed
by voice intonation and 7 percent by the spoken words. So the facial expression plays an
important role in the communication. Research on facial expression recognition system is to
detect the real-time facial expression recognition from the information contained in the
independent judgment, emotional state and physical needs of human beings and the issue of the
correct instruction. Therefore, facial expression recognition system is widely used, such as
intensive care room, resistance training, testing etc. However, because the facial expression is
complex and changeable, which makes the expression more fuzzy classification and recognize
difficulty [2-3].
This paper introduces a study and design of the system of facial expression recognition based
edge detection algorithm, first for image preprocessing, image recognition processing allows easy
back; and then locate the eyes and lips, individually marked and extract the edge shape feature;
finally the system was trained by using face database, achieve the purpose of identifying other
face expression. The specific design process is shown in Fig. 1
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.6, No.2, April 2015
2
Figure 1. Flow chart of system design
2. FACE DETECTION AND LOCATION
Face detection and location is an important premise to extract facial features, therefore,
corresponding to the different environment, such as light conditions, face pose, wearing material
interference, detection of facial recognition system requirements with high accuracy and
robustness.
In the view of the complexity of face detection, the present methods of face detection technology
can be broadly divided into two categories: Based on the statistical method and based on the
knowledge method [4]. Face location based on statistical method is just as the name suggest, it
need a large amount of prior knowledge as theoretical basis, and through kinds of methods such
as self learning algorithm of neural network, the subspace dimensionality reduction method and
template matching to judge, although these methods are robust, but the large amount of
calculation, long computing time, so they are not up to the requirements of real-time
identification. Knowledge-based face detection method is to make full use of various
characteristic parameters of human face of this unique biological identification as a standard to
build models, commonly used has the organ distribution method, color and texture, motion
method, symmetric method, etc. Then computer analysis of the images extracted effective
characteristic parameters, contrast similarity with known facial feature parameters, so we can
realize the face location. For our facial features can be detected by using such as the distance
between two eyes, mouth and eyes or eyebrows and eye or some other fixed characteristics; and
the color as the main features of the face, the skin color detection can use a variety of color space
such as HIS color space, the YCbCr color space and CIE color space. Research shows that the
YCbCr color space is more suitable for face detection compared to other several color space [5].
We use the camera to photo collection, because the camera photographs in the RGB color space,
so it can be through a nonlinear transformation to make photographs by RGB color space to
YCbCr color space.










































B
G
R
--
--
rC
bC
Y
214.18786.93112
112203.74797.37
966.24533.128481.65
128
128
16
. (1)
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.6, No.2, April 2015
3
2.1. The Establishment of Skin Color Model
Gauss model is a model that decomposed the specific things into a probability density distribution
curve of Gauss (The normal distribution curve) to accurately quantify. Because of the similar face
skin color distribution and Gauss distribution, so for each point on the face image can use the
model of skin color to calculate each point probability. Then establish skin improved grayscale
based on skin color probability values of these points, and then the candidate region of human
face is the higher probability regions of skin color in the grayscale.
m {x} x r b T
E C C , ( , ), (2)
})m-x)(m-x{( T
EC  , (3)
m is the mean chroma component, C is covariance matrix, Through the Gauss skin distribution
calculation of skin probability image of an arbitrary point in value. For example, for a pixel, it is
converted from RGB space to YCbCr color space of skin color probability value of the formula is
as follows.
)]()(5.0[)( 1
m-xCm-x-expbCrCp T 
, , (4)
In the formula: T
rCbCx )( .
2.2. Skin Color Segmentation
Through the Gauss model we know the image of all points on the skin probability value, in order
to reduce the effect of high frequency noise, first the pictures will be transferred to the YCbCr
color space from RGB space through the low pass filter, determine the gray level of each pixel
point value, and then processing the skin area and other background regions separated threshold
segmentation and binaryzation[6], using the following formula to calculate the specific:


 

otherwise
Tyxfif
yxft
,0
),(,1
),( (5)
T is the selected threshold, that is greater than T the pixel is 1 (white),the other is 0 (black).
Usually T algorithm has the Bimodal method, P parameter method, Otsu method, iterative
method, here we use the Otsu method, the basic idea of Otsu method is to use an assumed gray
value t to divided image gray into two groups, when two groups of between class variance is
maximum, the gray value of image t is two the value of the optimal threshold [7]. Suppose the
image’s gray value is M, the range is 0~M-1, select the gray value of T within this range, the
image is divided into two groups of G0 and G1, G0 contains the pixel gray values in 0~t, G1’s
gray value is in t+1~M-1, with N as pixel number, ni said the number of pixel gray value of i the
number of assumptions, G0 and G1 two groups of pixels which occupies in the whole image
respectively, two groups of average gray value, so probability: 

t
i
pi
0
0 , 

1
01 1
-M
1ti
i -p 
.The average gray value are 

t
i
iip
0
0 and 

1
1
-M
1ti
iip . T is the optimal threshold.
1100   , (6)
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.6, No.2, April 2015
4
2
1010
2
11
2
00 )()()()t(g   , (7)
))(( tgargmaxT  , (8)
Morphological processing: morphology of two value morphology transform image is a view of
the process of the collection, its essence is the interaction by the image of objects, or the shape of
the set and structural elements of intersection and set operation. The main methods are corrosion
X and expansion Y:
E})xB(:x{B⊙  EX , (1)
})(:{  EyByBEY . (2)
Corrosion is a process to eliminate boundary point so that the boundary contraction to interior, it
can be used to eliminate small and insignificant objects. Expansion is on the contrary with
corrosion, it is a process that all the background point will contact with objects and merged into
the object, so that the boundary to the external expansion of the cavity can be used to fill the
object.
Through the steps above we can get the effective area of the faces in the image. Fig. 2 shows the
process of face detection and location
Figure 2.The rough location and precise positioning of human face
3. POSITIONING EYES AND LIPS
3.1. Edge Detection
The edge is the most basic feature of image. The so-called edge is the pixels collection of its
surrounding pixels having step edge or changes in the roof edge. Edge exists widely in the object
and the background, objects and between element and element. Therefore, it is an important
feature of image detection and extraction techniques. The step edge on both sides of the gray
value changes obviously, and at the junction of roof edge in gray level increase and decrease.
Another is the rise and drop which is formed by the combination of pulse shape edge profile
corresponds to a thin strip of gray value mutation. Commonly we use one order and two order
derivative to describe and edge detection.
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.6, No.2, April 2015
5
If a pixel in the image of a certain object boundary, then its neighborhood will become a gray
level change zone. The two most useful features of this change are the variance rate of gray level
and direction, and they express by the magnitude and direction of the gradient vector. Two
dimensional function f(x, y) is defined as the gradient vector direction derivative.
Edge detection operator checks the neighborhood of each pixel and to quantify the variance rate
of gray level, including determines direction, most of the use of methods based on directional
derivative mask convolution.
Several commonly used edge detection operator, as shown in Figure 3, the figure can be seen
from the results, the Canny operator to detect the edge is the most sophisticated, the most
straightforward is Robert operator, Laplace operator and Sobel operator are not obvious.
Figure 3 Comparison of the Effect of Edge Detection Algorithm
Original Canny Laplace Sobel Robert
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.6, No.2, April 2015
6
3.2.Canny Edge Detection
Since the eyes are located in the middle of the top face, lips are in the middle of the bottom face,
so the limited area search can improve the detection speed. First estimates the eyes and lips
region, and then use the Canny edge detection to determine the exact position of the eyes and
lips[8].
(1) Using Gauss filter to smooth the image, The Gauss smoothing function is computed as
2
22
2
ba
e)y,x( 


H , (3)
),(),(),( yxHyxfyxG  . (4)
(2) To calculate the gradient magnitude and direction by means of finite first-order partial
derivative; A first-order differential convolution template:
11
1-1-
H 1 , (5)
1-1
1-1
H 2 , (6)
),(),(),( 11 yxHnmfnm  , (7)
),(),(),( 22 yxHnmfnm  , (8)
),(),(),( 22
21 nmnmnm   , (9)
),(
),(
tan
1
21
nm
nm




 . (10)
(3) Using gradient direction to suppression non maxima on the gradient magnitude; Fig.4 show
the edge direction and angular direction of each point. the purpose is combined with the
amplitude and direction of the gradient vector to removal the false edge, specifically to along
the gradient direction of eight edge direction of each point one by one to detect modulus
maxima, and then compared with the pixels of the partial derivative, then maximum value as
the optimal edge points, set the point of gray value as 0.
Figure 4. Schematic diagram of the edge direction and 8 neighborhood angular direction
4 3 2
1 B 1
2 3 4
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.6, No.2, April 2015
7
(4) Using double threshold algorithm connecting edge; through suppression non maxima we can
removed the false edge beside real, for the false edge beside false edge need to further
removed to draw the edge contour clearly. The most important things are the two adaptive
threshold 1 and 2 , and general requirements 2 1 ≈ 2 , and the strong threshold 2
determined true edge image N2[i,j], then the weak threshold on the true edge connection
processing, making sure the edge is smoothly and completely [9].
According to different profile of the two eyes, testing individually and extract eyes and lips
edges, the Fig. 5 shows four kinds of facial expression by using the extracted edge algorithm
Normal Sad Smile Surprise
Figure 5.Four kinds of facial expression feature extraction
4. EXPERIMENTAL RESULTS
In order to test the accuracy of the recognition method, we choose the suitable for the color of
skin of Japanese Jaffe facial expression database as the material, and carries on the classification
according to the requirements of the experiment, selecting four kinds of facial expression, each
expression selects three pictures, including two as the training group, the other as a test group
[10]. Then use Matlab to training the selected samples, the training results as shown in Table 1
Table 1.Test results
Facial Expression
Discrimination(%)
Normal Sad Smile Surprise
Canny 100 91.3 99.4 95.7
Laplace 93.2 87.1 89.5 85.6
Sobel 63.4 49.7 66.8 64.9
Robert 49.8 30.1 42.5 48.2
As can be shown in the table, the algorithm of edge detection for normal and smile recognition
can achieve high accurate precision, which indicates that the algorithm of facial expression
recognition rules is effectively for normal and smile; as sorrow and surprise, because those kinds
of expression the physiological performances are different between different people, although the
algorithm rules cannot achieve without error identification, it also has high discrimination. In
addition, the other three kinds of edge detection operator are tested, by contrast, the recognition
effect is obvious worse than the first.
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.6, No.2, April 2015
8
Laplace operation use only one template, so the amount of calculation is small. Laplace algorithm
is sensitive to the noise in the image, but usually produces two pixels wide edge, so rarely used
for edge detection, is generally used to determine the pixel in the image is dark or light over there
in the known edge pixels after.
Using Sobel edge detection operator is the point (x, y) approximation of the gradient amplitude.
Sobel edge detection operator to better edge effect at the same time, and could smooth noise,
reduces the sensitivity to noise. But the detection of Sobel edge detection operator is thick, also
can detect some false edge, so the edge detection accuracy is relatively low.
The Robert edge detection operator is the most simple, but there are some limitations in its
function. Because the Robert edge detection operator is the difference of adjacent pixels detection
using two diagonal direction of the image gradient magnitude of the difference is in the
approximate locations in the gradient magnitude values. Detecting horizontal and vertical edges
better, but in the tilt direction of the edge detection accuracy is relatively poor, but also more
sensitive to noise. But its advantages are simple and fast.
In this experiment, the edge detection is the basis and premise of facial expression recognition,
The clear outline for detection of eyes and mouth parts are directly related to the accuracy of face
recognition, which requires the operator has good anti noise ability, also should have a better edge
detection precision in each direction, obviously Canny operator is the best choice.
5. CONCLUSIONS
In this paper, we introduced the design of a facial expression recognition system based on edge
character, is the main characteristics and training database under the condition of different
expression of eyes and lips edge by face in the ratio, thus the face recognition. The design of
other recognition system has a very high robustness with respect to conventional face recognition
effect, fast and accuracy. From the final recognition effect, that the gradient operator edge
algorithm is sensitive to noise, so it is suitable for the image edge gray value in the image is sharp
and under the condition of litter noise. However, the method used in this paper for photo quality
(such as light, high requirements definition), another paper training and test images are not
considering the effect of face wear fabrics, this also will be the direction of future research.
ACKNOWLEDGEMENTS
This work is supported by the Shanghai Science and Technology Committee.
REFERENCES
[1] Balasubramani, A.; Kalaivanan, K.; Karpagalakshmi, R.C.; Monikandan, R., "Automatic facial
expression recognition system," Computing, Communication and Networking, 2008. ICCCn 2008.
International Conference on , vol., no., pp.1,5, 18-20 Dec. 2008
[2] Thomas, N.; Mathew, M., "Facial expression recognition system using neural network and
MATLAB," Computing, Communication and Applications (ICCCA), 2012 International Conference
on , vol., no., pp.1,5, 22-24 Feb. 2012
[3] Girard, J.M.; Cohn, J.F.; Mahoor, M.H.; Mavadati, S.; Rosenwald, D.P., "Social risk and depression:
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.6, No.2, April 2015
9
Evidence from manual and automatic facial expression analysis," Automatic Face and Gesture
Recognition (FG), 2013 10th IEEE International Conference and Workshops on , vol., no., pp.1,8, 22-
26 April 2013
[4] Zhi-Huang Zou, Wu-Shan Cheng, Xin Sun,’’ real time face recognition system based on DSP’’,
modern machinery. [J]. 2008,02:64-66.
[5] Hai-Yang Wang,” The research on drowsy detection based on the information of eye images”,
Shenyang University of Technology, 2007
[6] Jiang-Jiang Huang, Research on driver fatigue test measurement system based on identification of
human eye.[D]. Jilin University, 2010
[7] Yong Cao, The research of face recognition algorithm based on geometric features. [D]. Jilin
University, 2008
[8] Jun Zeng, Research on image edge detection and its application. [D]. Huazhong University of Science
and Technology, 2011
[9] Na Wang,Xia Li,A new improve edge detection algorithm based on the Canny operator. [J]. Journal
of Shenzhen University, 2005,02:149-153.
[10] Rong-Ping Dong,Bo-Ling Tang, Facial Expression Recognition Using DCT一Back Propagation
Neural Network. [J]. microcomputer information, 2005,18:142-144.
Author
Xiaoming CHEN was born in 1991,and now the Shanghai University of Engineering
Science postgraduate. His present research interest is image analysis and processing.

More Related Content

What's hot

Fuzzy Region Merging Using Fuzzy Similarity Measurement on Image Segmentation
Fuzzy Region Merging Using Fuzzy Similarity Measurement  on Image Segmentation  Fuzzy Region Merging Using Fuzzy Similarity Measurement  on Image Segmentation
Fuzzy Region Merging Using Fuzzy Similarity Measurement on Image Segmentation IJECEIAES
 
Developing 3D Viewing Model from 2D Stereo Pair with its Occlusion Ratio
Developing 3D Viewing Model from 2D Stereo Pair with its Occlusion RatioDeveloping 3D Viewing Model from 2D Stereo Pair with its Occlusion Ratio
Developing 3D Viewing Model from 2D Stereo Pair with its Occlusion RatioCSCJournals
 
Offline Signiture and Numeral Recognition in Context of Cheque
Offline Signiture and Numeral Recognition in Context of ChequeOffline Signiture and Numeral Recognition in Context of Cheque
Offline Signiture and Numeral Recognition in Context of ChequeIJERA Editor
 
Nose Tip Detection Using Shape index and Energy Effective for 3d Face Recogni...
Nose Tip Detection Using Shape index and Energy Effective for 3d Face Recogni...Nose Tip Detection Using Shape index and Energy Effective for 3d Face Recogni...
Nose Tip Detection Using Shape index and Energy Effective for 3d Face Recogni...IJMER
 
IRJET- Facial Expression Recognition: Review
IRJET- Facial Expression Recognition: ReviewIRJET- Facial Expression Recognition: Review
IRJET- Facial Expression Recognition: ReviewIRJET Journal
 
Extraction of texture features by using gabor filter in wheat crop disease de...
Extraction of texture features by using gabor filter in wheat crop disease de...Extraction of texture features by using gabor filter in wheat crop disease de...
Extraction of texture features by using gabor filter in wheat crop disease de...eSAT Journals
 
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...ijfcstjournal
 
Improved Face Recognition across Poses using Fusion of Probabilistic Latent V...
Improved Face Recognition across Poses using Fusion of Probabilistic Latent V...Improved Face Recognition across Poses using Fusion of Probabilistic Latent V...
Improved Face Recognition across Poses using Fusion of Probabilistic Latent V...TELKOMNIKA JOURNAL
 
Zernike moment of invariants for effective image retrieval using gaussian fil...
Zernike moment of invariants for effective image retrieval using gaussian fil...Zernike moment of invariants for effective image retrieval using gaussian fil...
Zernike moment of invariants for effective image retrieval using gaussian fil...IAEME Publication
 
Bio medical image segmentation using marker controlled watershed algorithm a ...
Bio medical image segmentation using marker controlled watershed algorithm a ...Bio medical image segmentation using marker controlled watershed algorithm a ...
Bio medical image segmentation using marker controlled watershed algorithm a ...eSAT Publishing House
 
Image restoration based on morphological operations
Image restoration based on morphological operationsImage restoration based on morphological operations
Image restoration based on morphological operationsijcseit
 
Experimental study of minutiae based algorithm for fingerprint matching
Experimental study of minutiae based algorithm for fingerprint matchingExperimental study of minutiae based algorithm for fingerprint matching
Experimental study of minutiae based algorithm for fingerprint matchingcsandit
 
GABOR WAVELETS AND MORPHOLOGICAL SHARED WEIGHTED NEURAL NETWORK BASED AUTOMAT...
GABOR WAVELETS AND MORPHOLOGICAL SHARED WEIGHTED NEURAL NETWORK BASED AUTOMAT...GABOR WAVELETS AND MORPHOLOGICAL SHARED WEIGHTED NEURAL NETWORK BASED AUTOMAT...
GABOR WAVELETS AND MORPHOLOGICAL SHARED WEIGHTED NEURAL NETWORK BASED AUTOMAT...sipij
 
NOVEL ALGORITHM FOR SKIN COLOR BASED SEGMENTATION USING MIXTURE OF GMMS
NOVEL ALGORITHM FOR SKIN COLOR BASED SEGMENTATION USING MIXTURE OF GMMSNOVEL ALGORITHM FOR SKIN COLOR BASED SEGMENTATION USING MIXTURE OF GMMS
NOVEL ALGORITHM FOR SKIN COLOR BASED SEGMENTATION USING MIXTURE OF GMMSsipij
 
An application of morphological
An application of morphologicalAn application of morphological
An application of morphologicalNaresh Chilamakuri
 
COMPARATIVE STUDY OF DISTANCE METRICS FOR FINDING SKIN COLOR SIMILARITY OF TW...
COMPARATIVE STUDY OF DISTANCE METRICS FOR FINDING SKIN COLOR SIMILARITY OF TW...COMPARATIVE STUDY OF DISTANCE METRICS FOR FINDING SKIN COLOR SIMILARITY OF TW...
COMPARATIVE STUDY OF DISTANCE METRICS FOR FINDING SKIN COLOR SIMILARITY OF TW...cscpconf
 
Basic image matching techniques, epipolar geometry and normalized image
Basic image matching techniques, epipolar geometry and normalized imageBasic image matching techniques, epipolar geometry and normalized image
Basic image matching techniques, epipolar geometry and normalized imageNational Cheng Kung University
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...
A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...
A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...IJECEIAES
 

What's hot (19)

Fuzzy Region Merging Using Fuzzy Similarity Measurement on Image Segmentation
Fuzzy Region Merging Using Fuzzy Similarity Measurement  on Image Segmentation  Fuzzy Region Merging Using Fuzzy Similarity Measurement  on Image Segmentation
Fuzzy Region Merging Using Fuzzy Similarity Measurement on Image Segmentation
 
Developing 3D Viewing Model from 2D Stereo Pair with its Occlusion Ratio
Developing 3D Viewing Model from 2D Stereo Pair with its Occlusion RatioDeveloping 3D Viewing Model from 2D Stereo Pair with its Occlusion Ratio
Developing 3D Viewing Model from 2D Stereo Pair with its Occlusion Ratio
 
Offline Signiture and Numeral Recognition in Context of Cheque
Offline Signiture and Numeral Recognition in Context of ChequeOffline Signiture and Numeral Recognition in Context of Cheque
Offline Signiture and Numeral Recognition in Context of Cheque
 
Nose Tip Detection Using Shape index and Energy Effective for 3d Face Recogni...
Nose Tip Detection Using Shape index and Energy Effective for 3d Face Recogni...Nose Tip Detection Using Shape index and Energy Effective for 3d Face Recogni...
Nose Tip Detection Using Shape index and Energy Effective for 3d Face Recogni...
 
IRJET- Facial Expression Recognition: Review
IRJET- Facial Expression Recognition: ReviewIRJET- Facial Expression Recognition: Review
IRJET- Facial Expression Recognition: Review
 
Extraction of texture features by using gabor filter in wheat crop disease de...
Extraction of texture features by using gabor filter in wheat crop disease de...Extraction of texture features by using gabor filter in wheat crop disease de...
Extraction of texture features by using gabor filter in wheat crop disease de...
 
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
 
Improved Face Recognition across Poses using Fusion of Probabilistic Latent V...
Improved Face Recognition across Poses using Fusion of Probabilistic Latent V...Improved Face Recognition across Poses using Fusion of Probabilistic Latent V...
Improved Face Recognition across Poses using Fusion of Probabilistic Latent V...
 
Zernike moment of invariants for effective image retrieval using gaussian fil...
Zernike moment of invariants for effective image retrieval using gaussian fil...Zernike moment of invariants for effective image retrieval using gaussian fil...
Zernike moment of invariants for effective image retrieval using gaussian fil...
 
Bio medical image segmentation using marker controlled watershed algorithm a ...
Bio medical image segmentation using marker controlled watershed algorithm a ...Bio medical image segmentation using marker controlled watershed algorithm a ...
Bio medical image segmentation using marker controlled watershed algorithm a ...
 
Image restoration based on morphological operations
Image restoration based on morphological operationsImage restoration based on morphological operations
Image restoration based on morphological operations
 
Experimental study of minutiae based algorithm for fingerprint matching
Experimental study of minutiae based algorithm for fingerprint matchingExperimental study of minutiae based algorithm for fingerprint matching
Experimental study of minutiae based algorithm for fingerprint matching
 
GABOR WAVELETS AND MORPHOLOGICAL SHARED WEIGHTED NEURAL NETWORK BASED AUTOMAT...
GABOR WAVELETS AND MORPHOLOGICAL SHARED WEIGHTED NEURAL NETWORK BASED AUTOMAT...GABOR WAVELETS AND MORPHOLOGICAL SHARED WEIGHTED NEURAL NETWORK BASED AUTOMAT...
GABOR WAVELETS AND MORPHOLOGICAL SHARED WEIGHTED NEURAL NETWORK BASED AUTOMAT...
 
NOVEL ALGORITHM FOR SKIN COLOR BASED SEGMENTATION USING MIXTURE OF GMMS
NOVEL ALGORITHM FOR SKIN COLOR BASED SEGMENTATION USING MIXTURE OF GMMSNOVEL ALGORITHM FOR SKIN COLOR BASED SEGMENTATION USING MIXTURE OF GMMS
NOVEL ALGORITHM FOR SKIN COLOR BASED SEGMENTATION USING MIXTURE OF GMMS
 
An application of morphological
An application of morphologicalAn application of morphological
An application of morphological
 
COMPARATIVE STUDY OF DISTANCE METRICS FOR FINDING SKIN COLOR SIMILARITY OF TW...
COMPARATIVE STUDY OF DISTANCE METRICS FOR FINDING SKIN COLOR SIMILARITY OF TW...COMPARATIVE STUDY OF DISTANCE METRICS FOR FINDING SKIN COLOR SIMILARITY OF TW...
COMPARATIVE STUDY OF DISTANCE METRICS FOR FINDING SKIN COLOR SIMILARITY OF TW...
 
Basic image matching techniques, epipolar geometry and normalized image
Basic image matching techniques, epipolar geometry and normalized imageBasic image matching techniques, epipolar geometry and normalized image
Basic image matching techniques, epipolar geometry and normalized image
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...
A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...
A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...
 

Viewers also liked

Firewall and vpn investigation on cloud computing performance
Firewall and vpn investigation on cloud computing performanceFirewall and vpn investigation on cloud computing performance
Firewall and vpn investigation on cloud computing performanceIJCSES Journal
 
EVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNEL
EVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNELEVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNEL
EVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNELIJCSES Journal
 
Detection system design of subsea tree controller
Detection system design of subsea tree controllerDetection system design of subsea tree controller
Detection system design of subsea tree controllerIJCSES Journal
 
SIMULATION AND COMPARISON ANALYSIS OF DUE DATE ASSIGNMENT METHODS USING SCHED...
SIMULATION AND COMPARISON ANALYSIS OF DUE DATE ASSIGNMENT METHODS USING SCHED...SIMULATION AND COMPARISON ANALYSIS OF DUE DATE ASSIGNMENT METHODS USING SCHED...
SIMULATION AND COMPARISON ANALYSIS OF DUE DATE ASSIGNMENT METHODS USING SCHED...IJCSES Journal
 
Research and Development of DSP-Based Face Recognition System for Robotic Reh...
Research and Development of DSP-Based Face Recognition System for Robotic Reh...Research and Development of DSP-Based Face Recognition System for Robotic Reh...
Research and Development of DSP-Based Face Recognition System for Robotic Reh...IJCSES Journal
 
AUTOMATED DETECTION OF HARD EXUDATES IN FUNDUS IMAGES USING IMPROVED OTSU THR...
AUTOMATED DETECTION OF HARD EXUDATES IN FUNDUS IMAGES USING IMPROVED OTSU THR...AUTOMATED DETECTION OF HARD EXUDATES IN FUNDUS IMAGES USING IMPROVED OTSU THR...
AUTOMATED DETECTION OF HARD EXUDATES IN FUNDUS IMAGES USING IMPROVED OTSU THR...IJCSES Journal
 
Sign language converter
Sign language converterSign language converter
Sign language converterIJCSES Journal
 
Dynamic K-Means Algorithm for Optimized Routing in Mobile Ad Hoc Networks
Dynamic K-Means Algorithm for Optimized Routing in Mobile Ad Hoc Networks Dynamic K-Means Algorithm for Optimized Routing in Mobile Ad Hoc Networks
Dynamic K-Means Algorithm for Optimized Routing in Mobile Ad Hoc Networks IJCSES Journal
 
Process and product quality assurance
Process and product quality assuranceProcess and product quality assurance
Process and product quality assuranceIJCSES Journal
 
A SURVEY OF VIRTUAL PROTOTYPING TECHNIQUES FOR SYSTEM DEVELOPMENT AND VALIDATION
A SURVEY OF VIRTUAL PROTOTYPING TECHNIQUES FOR SYSTEM DEVELOPMENT AND VALIDATIONA SURVEY OF VIRTUAL PROTOTYPING TECHNIQUES FOR SYSTEM DEVELOPMENT AND VALIDATION
A SURVEY OF VIRTUAL PROTOTYPING TECHNIQUES FOR SYSTEM DEVELOPMENT AND VALIDATIONIJCSES Journal
 
PARTIAL MATCHING FACE RECOGNITION METHOD FOR REHABILITATION NURSING ROBOTS BEDS
PARTIAL MATCHING FACE RECOGNITION METHOD FOR REHABILITATION NURSING ROBOTS BEDSPARTIAL MATCHING FACE RECOGNITION METHOD FOR REHABILITATION NURSING ROBOTS BEDS
PARTIAL MATCHING FACE RECOGNITION METHOD FOR REHABILITATION NURSING ROBOTS BEDSIJCSES Journal
 
S ECURITY I SSUES A ND C HALLENGES I N M OBILE C OMPUTING A ND M - C ...
S ECURITY  I SSUES  A ND  C HALLENGES  I N  M OBILE  C OMPUTING  A ND  M - C ...S ECURITY  I SSUES  A ND  C HALLENGES  I N  M OBILE  C OMPUTING  A ND  M - C ...
S ECURITY I SSUES A ND C HALLENGES I N M OBILE C OMPUTING A ND M - C ...IJCSES Journal
 
A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...
A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...
A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...IJCSES Journal
 
A R ISK - A WARE B USINESS P ROCESS M ANAGEMENT R EFERENCE M ODEL AND IT...
A R ISK - A WARE  B USINESS  P ROCESS  M ANAGEMENT  R EFERENCE  M ODEL AND IT...A R ISK - A WARE  B USINESS  P ROCESS  M ANAGEMENT  R EFERENCE  M ODEL AND IT...
A R ISK - A WARE B USINESS P ROCESS M ANAGEMENT R EFERENCE M ODEL AND IT...IJCSES Journal
 
DETECTING BRAIN TUMOUR FROM MRI IMAGE USING MATLAB GUI PROGRAMME
DETECTING BRAIN TUMOUR FROM MRI IMAGE USING MATLAB GUI PROGRAMMEDETECTING BRAIN TUMOUR FROM MRI IMAGE USING MATLAB GUI PROGRAMME
DETECTING BRAIN TUMOUR FROM MRI IMAGE USING MATLAB GUI PROGRAMMEIJCSES Journal
 
A new study on biclustering tools,
A new study on biclustering tools,A new study on biclustering tools,
A new study on biclustering tools,IJCSES Journal
 
Security challenges in mobile ad hoc
Security challenges in mobile ad hocSecurity challenges in mobile ad hoc
Security challenges in mobile ad hocIJCSES Journal
 
A SURVEY ON MULTIMEDIA FILE CARVING
A SURVEY ON MULTIMEDIA FILE CARVINGA SURVEY ON MULTIMEDIA FILE CARVING
A SURVEY ON MULTIMEDIA FILE CARVINGIJCSES Journal
 
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGES
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGESSTATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGES
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGESIJCSES Journal
 

Viewers also liked (19)

Firewall and vpn investigation on cloud computing performance
Firewall and vpn investigation on cloud computing performanceFirewall and vpn investigation on cloud computing performance
Firewall and vpn investigation on cloud computing performance
 
EVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNEL
EVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNELEVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNEL
EVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNEL
 
Detection system design of subsea tree controller
Detection system design of subsea tree controllerDetection system design of subsea tree controller
Detection system design of subsea tree controller
 
SIMULATION AND COMPARISON ANALYSIS OF DUE DATE ASSIGNMENT METHODS USING SCHED...
SIMULATION AND COMPARISON ANALYSIS OF DUE DATE ASSIGNMENT METHODS USING SCHED...SIMULATION AND COMPARISON ANALYSIS OF DUE DATE ASSIGNMENT METHODS USING SCHED...
SIMULATION AND COMPARISON ANALYSIS OF DUE DATE ASSIGNMENT METHODS USING SCHED...
 
Research and Development of DSP-Based Face Recognition System for Robotic Reh...
Research and Development of DSP-Based Face Recognition System for Robotic Reh...Research and Development of DSP-Based Face Recognition System for Robotic Reh...
Research and Development of DSP-Based Face Recognition System for Robotic Reh...
 
AUTOMATED DETECTION OF HARD EXUDATES IN FUNDUS IMAGES USING IMPROVED OTSU THR...
AUTOMATED DETECTION OF HARD EXUDATES IN FUNDUS IMAGES USING IMPROVED OTSU THR...AUTOMATED DETECTION OF HARD EXUDATES IN FUNDUS IMAGES USING IMPROVED OTSU THR...
AUTOMATED DETECTION OF HARD EXUDATES IN FUNDUS IMAGES USING IMPROVED OTSU THR...
 
Sign language converter
Sign language converterSign language converter
Sign language converter
 
Dynamic K-Means Algorithm for Optimized Routing in Mobile Ad Hoc Networks
Dynamic K-Means Algorithm for Optimized Routing in Mobile Ad Hoc Networks Dynamic K-Means Algorithm for Optimized Routing in Mobile Ad Hoc Networks
Dynamic K-Means Algorithm for Optimized Routing in Mobile Ad Hoc Networks
 
Process and product quality assurance
Process and product quality assuranceProcess and product quality assurance
Process and product quality assurance
 
A SURVEY OF VIRTUAL PROTOTYPING TECHNIQUES FOR SYSTEM DEVELOPMENT AND VALIDATION
A SURVEY OF VIRTUAL PROTOTYPING TECHNIQUES FOR SYSTEM DEVELOPMENT AND VALIDATIONA SURVEY OF VIRTUAL PROTOTYPING TECHNIQUES FOR SYSTEM DEVELOPMENT AND VALIDATION
A SURVEY OF VIRTUAL PROTOTYPING TECHNIQUES FOR SYSTEM DEVELOPMENT AND VALIDATION
 
PARTIAL MATCHING FACE RECOGNITION METHOD FOR REHABILITATION NURSING ROBOTS BEDS
PARTIAL MATCHING FACE RECOGNITION METHOD FOR REHABILITATION NURSING ROBOTS BEDSPARTIAL MATCHING FACE RECOGNITION METHOD FOR REHABILITATION NURSING ROBOTS BEDS
PARTIAL MATCHING FACE RECOGNITION METHOD FOR REHABILITATION NURSING ROBOTS BEDS
 
S ECURITY I SSUES A ND C HALLENGES I N M OBILE C OMPUTING A ND M - C ...
S ECURITY  I SSUES  A ND  C HALLENGES  I N  M OBILE  C OMPUTING  A ND  M - C ...S ECURITY  I SSUES  A ND  C HALLENGES  I N  M OBILE  C OMPUTING  A ND  M - C ...
S ECURITY I SSUES A ND C HALLENGES I N M OBILE C OMPUTING A ND M - C ...
 
A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...
A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...
A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...
 
A R ISK - A WARE B USINESS P ROCESS M ANAGEMENT R EFERENCE M ODEL AND IT...
A R ISK - A WARE  B USINESS  P ROCESS  M ANAGEMENT  R EFERENCE  M ODEL AND IT...A R ISK - A WARE  B USINESS  P ROCESS  M ANAGEMENT  R EFERENCE  M ODEL AND IT...
A R ISK - A WARE B USINESS P ROCESS M ANAGEMENT R EFERENCE M ODEL AND IT...
 
DETECTING BRAIN TUMOUR FROM MRI IMAGE USING MATLAB GUI PROGRAMME
DETECTING BRAIN TUMOUR FROM MRI IMAGE USING MATLAB GUI PROGRAMMEDETECTING BRAIN TUMOUR FROM MRI IMAGE USING MATLAB GUI PROGRAMME
DETECTING BRAIN TUMOUR FROM MRI IMAGE USING MATLAB GUI PROGRAMME
 
A new study on biclustering tools,
A new study on biclustering tools,A new study on biclustering tools,
A new study on biclustering tools,
 
Security challenges in mobile ad hoc
Security challenges in mobile ad hocSecurity challenges in mobile ad hoc
Security challenges in mobile ad hoc
 
A SURVEY ON MULTIMEDIA FILE CARVING
A SURVEY ON MULTIMEDIA FILE CARVINGA SURVEY ON MULTIMEDIA FILE CARVING
A SURVEY ON MULTIMEDIA FILE CARVING
 
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGES
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGESSTATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGES
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGES
 

Similar to F ACIAL E XPRESSION R ECOGNITION B ASED ON E DGE D ETECTION

Human’s facial parts extraction to recognize facial expression
Human’s facial parts extraction to recognize facial expressionHuman’s facial parts extraction to recognize facial expression
Human’s facial parts extraction to recognize facial expressionijitjournal
 
A New Skin Color Based Face Detection Algorithm by Combining Three Color Mode...
A New Skin Color Based Face Detection Algorithm by Combining Three Color Mode...A New Skin Color Based Face Detection Algorithm by Combining Three Color Mode...
A New Skin Color Based Face Detection Algorithm by Combining Three Color Mode...iosrjce
 
A Modified Algorithm for Thresholding and Detection of Facial Information Fro...
A Modified Algorithm for Thresholding and Detection of Facial Information Fro...A Modified Algorithm for Thresholding and Detection of Facial Information Fro...
A Modified Algorithm for Thresholding and Detection of Facial Information Fro...sipij
 
A New Algorithm for Human Face Detection Using Skin Color Tone
A New Algorithm for Human Face Detection Using Skin Color ToneA New Algorithm for Human Face Detection Using Skin Color Tone
A New Algorithm for Human Face Detection Using Skin Color ToneIOSR Journals
 
A novel approach for performance parameter estimation of face recognition bas...
A novel approach for performance parameter estimation of face recognition bas...A novel approach for performance parameter estimation of face recognition bas...
A novel approach for performance parameter estimation of face recognition bas...IJMER
 
A Shot Boundary Detection Method for News Video Based Human Skin Region (Face...
A Shot Boundary Detection Method for News Video Based Human Skin Region (Face...A Shot Boundary Detection Method for News Video Based Human Skin Region (Face...
A Shot Boundary Detection Method for News Video Based Human Skin Region (Face...ijsrd.com
 
50Combining Color Spaces for Human Skin Detection in Color Images using Skin ...
50Combining Color Spaces for Human Skin Detection in Color Images using Skin ...50Combining Color Spaces for Human Skin Detection in Color Images using Skin ...
50Combining Color Spaces for Human Skin Detection in Color Images using Skin ...idescitation
 
Human Face Detection Systemin ANew Algorithm
Human Face Detection Systemin ANew AlgorithmHuman Face Detection Systemin ANew Algorithm
Human Face Detection Systemin ANew AlgorithmIOSRjournaljce
 
Face Detection for identification of people in Images of Internet
Face Detection for identification of people in Images of InternetFace Detection for identification of people in Images of Internet
Face Detection for identification of people in Images of Internetijceronline
 
IMPROVEMENT OF THE FINGERPRINT RECOGNITION PROCESS
IMPROVEMENT OF THE FINGERPRINT RECOGNITION PROCESSIMPROVEMENT OF THE FINGERPRINT RECOGNITION PROCESS
IMPROVEMENT OF THE FINGERPRINT RECOGNITION PROCESSADEIJ Journal
 
Improvement of the Fingerprint Recognition Process
Improvement of the Fingerprint Recognition ProcessImprovement of the Fingerprint Recognition Process
Improvement of the Fingerprint Recognition Processijbbjournal
 
REAL TIME INTELLIGENT EMOTIONAL MUSIC PLAYER USING ANDROID
REAL TIME INTELLIGENT EMOTIONAL MUSIC PLAYER USING ANDROIDREAL TIME INTELLIGENT EMOTIONAL MUSIC PLAYER USING ANDROID
REAL TIME INTELLIGENT EMOTIONAL MUSIC PLAYER USING ANDROIDJournal For Research
 
Model Based Emotion Detection using Point Clouds
Model Based Emotion Detection using Point CloudsModel Based Emotion Detection using Point Clouds
Model Based Emotion Detection using Point CloudsLakshmi Sarvani Videla
 
Skin Detection Based on Color Model and Low Level Features Combined with Expl...
Skin Detection Based on Color Model and Low Level Features Combined with Expl...Skin Detection Based on Color Model and Low Level Features Combined with Expl...
Skin Detection Based on Color Model and Low Level Features Combined with Expl...IJERA Editor
 
A study of techniques for facial detection and expression classification
A study of techniques for facial detection and expression classificationA study of techniques for facial detection and expression classification
A study of techniques for facial detection and expression classificationIJCSES Journal
 
DETECTION OF LESION USING SVM
DETECTION OF LESION USING SVMDETECTION OF LESION USING SVM
DETECTION OF LESION USING SVMadeij1
 

Similar to F ACIAL E XPRESSION R ECOGNITION B ASED ON E DGE D ETECTION (20)

Human’s facial parts extraction to recognize facial expression
Human’s facial parts extraction to recognize facial expressionHuman’s facial parts extraction to recognize facial expression
Human’s facial parts extraction to recognize facial expression
 
A New Skin Color Based Face Detection Algorithm by Combining Three Color Mode...
A New Skin Color Based Face Detection Algorithm by Combining Three Color Mode...A New Skin Color Based Face Detection Algorithm by Combining Three Color Mode...
A New Skin Color Based Face Detection Algorithm by Combining Three Color Mode...
 
B017310612
B017310612B017310612
B017310612
 
A Modified Algorithm for Thresholding and Detection of Facial Information Fro...
A Modified Algorithm for Thresholding and Detection of Facial Information Fro...A Modified Algorithm for Thresholding and Detection of Facial Information Fro...
A Modified Algorithm for Thresholding and Detection of Facial Information Fro...
 
A New Algorithm for Human Face Detection Using Skin Color Tone
A New Algorithm for Human Face Detection Using Skin Color ToneA New Algorithm for Human Face Detection Using Skin Color Tone
A New Algorithm for Human Face Detection Using Skin Color Tone
 
Ch 2
Ch 2Ch 2
Ch 2
 
A novel approach for performance parameter estimation of face recognition bas...
A novel approach for performance parameter estimation of face recognition bas...A novel approach for performance parameter estimation of face recognition bas...
A novel approach for performance parameter estimation of face recognition bas...
 
A Shot Boundary Detection Method for News Video Based Human Skin Region (Face...
A Shot Boundary Detection Method for News Video Based Human Skin Region (Face...A Shot Boundary Detection Method for News Video Based Human Skin Region (Face...
A Shot Boundary Detection Method for News Video Based Human Skin Region (Face...
 
Ck36515520
Ck36515520Ck36515520
Ck36515520
 
Ja3416401643
Ja3416401643Ja3416401643
Ja3416401643
 
50Combining Color Spaces for Human Skin Detection in Color Images using Skin ...
50Combining Color Spaces for Human Skin Detection in Color Images using Skin ...50Combining Color Spaces for Human Skin Detection in Color Images using Skin ...
50Combining Color Spaces for Human Skin Detection in Color Images using Skin ...
 
Human Face Detection Systemin ANew Algorithm
Human Face Detection Systemin ANew AlgorithmHuman Face Detection Systemin ANew Algorithm
Human Face Detection Systemin ANew Algorithm
 
Face Detection for identification of people in Images of Internet
Face Detection for identification of people in Images of InternetFace Detection for identification of people in Images of Internet
Face Detection for identification of people in Images of Internet
 
IMPROVEMENT OF THE FINGERPRINT RECOGNITION PROCESS
IMPROVEMENT OF THE FINGERPRINT RECOGNITION PROCESSIMPROVEMENT OF THE FINGERPRINT RECOGNITION PROCESS
IMPROVEMENT OF THE FINGERPRINT RECOGNITION PROCESS
 
Improvement of the Fingerprint Recognition Process
Improvement of the Fingerprint Recognition ProcessImprovement of the Fingerprint Recognition Process
Improvement of the Fingerprint Recognition Process
 
REAL TIME INTELLIGENT EMOTIONAL MUSIC PLAYER USING ANDROID
REAL TIME INTELLIGENT EMOTIONAL MUSIC PLAYER USING ANDROIDREAL TIME INTELLIGENT EMOTIONAL MUSIC PLAYER USING ANDROID
REAL TIME INTELLIGENT EMOTIONAL MUSIC PLAYER USING ANDROID
 
Model Based Emotion Detection using Point Clouds
Model Based Emotion Detection using Point CloudsModel Based Emotion Detection using Point Clouds
Model Based Emotion Detection using Point Clouds
 
Skin Detection Based on Color Model and Low Level Features Combined with Expl...
Skin Detection Based on Color Model and Low Level Features Combined with Expl...Skin Detection Based on Color Model and Low Level Features Combined with Expl...
Skin Detection Based on Color Model and Low Level Features Combined with Expl...
 
A study of techniques for facial detection and expression classification
A study of techniques for facial detection and expression classificationA study of techniques for facial detection and expression classification
A study of techniques for facial detection and expression classification
 
DETECTION OF LESION USING SVM
DETECTION OF LESION USING SVMDETECTION OF LESION USING SVM
DETECTION OF LESION USING SVM
 

Recently uploaded

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Recently uploaded (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

F ACIAL E XPRESSION R ECOGNITION B ASED ON E DGE D ETECTION

  • 1. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.6, No.2, April 2015 DOI:10.5121/ijcses.2015.6201 1 FACIAL EXPRESSION RECOGNITION BASED ON EDGE DETECTION Xiaoming CHEN and Wushan CHENG College of Mechanical Engineering, Shanghai University of Engineering Science, Shanghai 201620, China ABSTRACT Relational Over the last two decades, the advances in computer vision and pattern recognition power have opened the door to new opportunity of automatic facial expression recognition system[1]. This paper use Canny edge detection method for facial expression recognition. Image color space transformation in the first place and then to identify and locate human face .Next pick up the edge of eyes and mouth's features extraction. Last we judge the facial expressions after compared with the expressions we known in the database. This proposed approach provides full automatic solution of human expressions as well as overcoming facial expressions variation and intensity problems. KEYWORDS Facial Expression Recognition; Color Space; Edge Detection. 1. INTRODUCTION Facial expression is a kind of expression of the emotional state, human face has the great power of expression, it provides a powerful and flexible nature expression in communication and emotional state. Using facial expressions can not only express inner emotion, but also provide important clues to the social communication. The facial expression of a speaker accounts for about 55 percent of the effect of the communicated messages, 38 percent of the latter is conveyed by voice intonation and 7 percent by the spoken words. So the facial expression plays an important role in the communication. Research on facial expression recognition system is to detect the real-time facial expression recognition from the information contained in the independent judgment, emotional state and physical needs of human beings and the issue of the correct instruction. Therefore, facial expression recognition system is widely used, such as intensive care room, resistance training, testing etc. However, because the facial expression is complex and changeable, which makes the expression more fuzzy classification and recognize difficulty [2-3]. This paper introduces a study and design of the system of facial expression recognition based edge detection algorithm, first for image preprocessing, image recognition processing allows easy back; and then locate the eyes and lips, individually marked and extract the edge shape feature; finally the system was trained by using face database, achieve the purpose of identifying other face expression. The specific design process is shown in Fig. 1
  • 2. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.6, No.2, April 2015 2 Figure 1. Flow chart of system design 2. FACE DETECTION AND LOCATION Face detection and location is an important premise to extract facial features, therefore, corresponding to the different environment, such as light conditions, face pose, wearing material interference, detection of facial recognition system requirements with high accuracy and robustness. In the view of the complexity of face detection, the present methods of face detection technology can be broadly divided into two categories: Based on the statistical method and based on the knowledge method [4]. Face location based on statistical method is just as the name suggest, it need a large amount of prior knowledge as theoretical basis, and through kinds of methods such as self learning algorithm of neural network, the subspace dimensionality reduction method and template matching to judge, although these methods are robust, but the large amount of calculation, long computing time, so they are not up to the requirements of real-time identification. Knowledge-based face detection method is to make full use of various characteristic parameters of human face of this unique biological identification as a standard to build models, commonly used has the organ distribution method, color and texture, motion method, symmetric method, etc. Then computer analysis of the images extracted effective characteristic parameters, contrast similarity with known facial feature parameters, so we can realize the face location. For our facial features can be detected by using such as the distance between two eyes, mouth and eyes or eyebrows and eye or some other fixed characteristics; and the color as the main features of the face, the skin color detection can use a variety of color space such as HIS color space, the YCbCr color space and CIE color space. Research shows that the YCbCr color space is more suitable for face detection compared to other several color space [5]. We use the camera to photo collection, because the camera photographs in the RGB color space, so it can be through a nonlinear transformation to make photographs by RGB color space to YCbCr color space.                                           B G R -- -- rC bC Y 214.18786.93112 112203.74797.37 966.24533.128481.65 128 128 16 . (1)
  • 3. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.6, No.2, April 2015 3 2.1. The Establishment of Skin Color Model Gauss model is a model that decomposed the specific things into a probability density distribution curve of Gauss (The normal distribution curve) to accurately quantify. Because of the similar face skin color distribution and Gauss distribution, so for each point on the face image can use the model of skin color to calculate each point probability. Then establish skin improved grayscale based on skin color probability values of these points, and then the candidate region of human face is the higher probability regions of skin color in the grayscale. m {x} x r b T E C C , ( , ), (2) })m-x)(m-x{( T EC  , (3) m is the mean chroma component, C is covariance matrix, Through the Gauss skin distribution calculation of skin probability image of an arbitrary point in value. For example, for a pixel, it is converted from RGB space to YCbCr color space of skin color probability value of the formula is as follows. )]()(5.0[)( 1 m-xCm-x-expbCrCp T  , , (4) In the formula: T rCbCx )( . 2.2. Skin Color Segmentation Through the Gauss model we know the image of all points on the skin probability value, in order to reduce the effect of high frequency noise, first the pictures will be transferred to the YCbCr color space from RGB space through the low pass filter, determine the gray level of each pixel point value, and then processing the skin area and other background regions separated threshold segmentation and binaryzation[6], using the following formula to calculate the specific:      otherwise Tyxfif yxft ,0 ),(,1 ),( (5) T is the selected threshold, that is greater than T the pixel is 1 (white),the other is 0 (black). Usually T algorithm has the Bimodal method, P parameter method, Otsu method, iterative method, here we use the Otsu method, the basic idea of Otsu method is to use an assumed gray value t to divided image gray into two groups, when two groups of between class variance is maximum, the gray value of image t is two the value of the optimal threshold [7]. Suppose the image’s gray value is M, the range is 0~M-1, select the gray value of T within this range, the image is divided into two groups of G0 and G1, G0 contains the pixel gray values in 0~t, G1’s gray value is in t+1~M-1, with N as pixel number, ni said the number of pixel gray value of i the number of assumptions, G0 and G1 two groups of pixels which occupies in the whole image respectively, two groups of average gray value, so probability:   t i pi 0 0 ,   1 01 1 -M 1ti i -p  .The average gray value are   t i iip 0 0 and   1 1 -M 1ti iip . T is the optimal threshold. 1100   , (6)
  • 4. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.6, No.2, April 2015 4 2 1010 2 11 2 00 )()()()t(g   , (7) ))(( tgargmaxT  , (8) Morphological processing: morphology of two value morphology transform image is a view of the process of the collection, its essence is the interaction by the image of objects, or the shape of the set and structural elements of intersection and set operation. The main methods are corrosion X and expansion Y: E})xB(:x{B⊙  EX , (1) })(:{  EyByBEY . (2) Corrosion is a process to eliminate boundary point so that the boundary contraction to interior, it can be used to eliminate small and insignificant objects. Expansion is on the contrary with corrosion, it is a process that all the background point will contact with objects and merged into the object, so that the boundary to the external expansion of the cavity can be used to fill the object. Through the steps above we can get the effective area of the faces in the image. Fig. 2 shows the process of face detection and location Figure 2.The rough location and precise positioning of human face 3. POSITIONING EYES AND LIPS 3.1. Edge Detection The edge is the most basic feature of image. The so-called edge is the pixels collection of its surrounding pixels having step edge or changes in the roof edge. Edge exists widely in the object and the background, objects and between element and element. Therefore, it is an important feature of image detection and extraction techniques. The step edge on both sides of the gray value changes obviously, and at the junction of roof edge in gray level increase and decrease. Another is the rise and drop which is formed by the combination of pulse shape edge profile corresponds to a thin strip of gray value mutation. Commonly we use one order and two order derivative to describe and edge detection.
  • 5. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.6, No.2, April 2015 5 If a pixel in the image of a certain object boundary, then its neighborhood will become a gray level change zone. The two most useful features of this change are the variance rate of gray level and direction, and they express by the magnitude and direction of the gradient vector. Two dimensional function f(x, y) is defined as the gradient vector direction derivative. Edge detection operator checks the neighborhood of each pixel and to quantify the variance rate of gray level, including determines direction, most of the use of methods based on directional derivative mask convolution. Several commonly used edge detection operator, as shown in Figure 3, the figure can be seen from the results, the Canny operator to detect the edge is the most sophisticated, the most straightforward is Robert operator, Laplace operator and Sobel operator are not obvious. Figure 3 Comparison of the Effect of Edge Detection Algorithm Original Canny Laplace Sobel Robert
  • 6. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.6, No.2, April 2015 6 3.2.Canny Edge Detection Since the eyes are located in the middle of the top face, lips are in the middle of the bottom face, so the limited area search can improve the detection speed. First estimates the eyes and lips region, and then use the Canny edge detection to determine the exact position of the eyes and lips[8]. (1) Using Gauss filter to smooth the image, The Gauss smoothing function is computed as 2 22 2 ba e)y,x(    H , (3) ),(),(),( yxHyxfyxG  . (4) (2) To calculate the gradient magnitude and direction by means of finite first-order partial derivative; A first-order differential convolution template: 11 1-1- H 1 , (5) 1-1 1-1 H 2 , (6) ),(),(),( 11 yxHnmfnm  , (7) ),(),(),( 22 yxHnmfnm  , (8) ),(),(),( 22 21 nmnmnm   , (9) ),( ),( tan 1 21 nm nm      . (10) (3) Using gradient direction to suppression non maxima on the gradient magnitude; Fig.4 show the edge direction and angular direction of each point. the purpose is combined with the amplitude and direction of the gradient vector to removal the false edge, specifically to along the gradient direction of eight edge direction of each point one by one to detect modulus maxima, and then compared with the pixels of the partial derivative, then maximum value as the optimal edge points, set the point of gray value as 0. Figure 4. Schematic diagram of the edge direction and 8 neighborhood angular direction 4 3 2 1 B 1 2 3 4
  • 7. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.6, No.2, April 2015 7 (4) Using double threshold algorithm connecting edge; through suppression non maxima we can removed the false edge beside real, for the false edge beside false edge need to further removed to draw the edge contour clearly. The most important things are the two adaptive threshold 1 and 2 , and general requirements 2 1 ≈ 2 , and the strong threshold 2 determined true edge image N2[i,j], then the weak threshold on the true edge connection processing, making sure the edge is smoothly and completely [9]. According to different profile of the two eyes, testing individually and extract eyes and lips edges, the Fig. 5 shows four kinds of facial expression by using the extracted edge algorithm Normal Sad Smile Surprise Figure 5.Four kinds of facial expression feature extraction 4. EXPERIMENTAL RESULTS In order to test the accuracy of the recognition method, we choose the suitable for the color of skin of Japanese Jaffe facial expression database as the material, and carries on the classification according to the requirements of the experiment, selecting four kinds of facial expression, each expression selects three pictures, including two as the training group, the other as a test group [10]. Then use Matlab to training the selected samples, the training results as shown in Table 1 Table 1.Test results Facial Expression Discrimination(%) Normal Sad Smile Surprise Canny 100 91.3 99.4 95.7 Laplace 93.2 87.1 89.5 85.6 Sobel 63.4 49.7 66.8 64.9 Robert 49.8 30.1 42.5 48.2 As can be shown in the table, the algorithm of edge detection for normal and smile recognition can achieve high accurate precision, which indicates that the algorithm of facial expression recognition rules is effectively for normal and smile; as sorrow and surprise, because those kinds of expression the physiological performances are different between different people, although the algorithm rules cannot achieve without error identification, it also has high discrimination. In addition, the other three kinds of edge detection operator are tested, by contrast, the recognition effect is obvious worse than the first.
  • 8. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.6, No.2, April 2015 8 Laplace operation use only one template, so the amount of calculation is small. Laplace algorithm is sensitive to the noise in the image, but usually produces two pixels wide edge, so rarely used for edge detection, is generally used to determine the pixel in the image is dark or light over there in the known edge pixels after. Using Sobel edge detection operator is the point (x, y) approximation of the gradient amplitude. Sobel edge detection operator to better edge effect at the same time, and could smooth noise, reduces the sensitivity to noise. But the detection of Sobel edge detection operator is thick, also can detect some false edge, so the edge detection accuracy is relatively low. The Robert edge detection operator is the most simple, but there are some limitations in its function. Because the Robert edge detection operator is the difference of adjacent pixels detection using two diagonal direction of the image gradient magnitude of the difference is in the approximate locations in the gradient magnitude values. Detecting horizontal and vertical edges better, but in the tilt direction of the edge detection accuracy is relatively poor, but also more sensitive to noise. But its advantages are simple and fast. In this experiment, the edge detection is the basis and premise of facial expression recognition, The clear outline for detection of eyes and mouth parts are directly related to the accuracy of face recognition, which requires the operator has good anti noise ability, also should have a better edge detection precision in each direction, obviously Canny operator is the best choice. 5. CONCLUSIONS In this paper, we introduced the design of a facial expression recognition system based on edge character, is the main characteristics and training database under the condition of different expression of eyes and lips edge by face in the ratio, thus the face recognition. The design of other recognition system has a very high robustness with respect to conventional face recognition effect, fast and accuracy. From the final recognition effect, that the gradient operator edge algorithm is sensitive to noise, so it is suitable for the image edge gray value in the image is sharp and under the condition of litter noise. However, the method used in this paper for photo quality (such as light, high requirements definition), another paper training and test images are not considering the effect of face wear fabrics, this also will be the direction of future research. ACKNOWLEDGEMENTS This work is supported by the Shanghai Science and Technology Committee. REFERENCES [1] Balasubramani, A.; Kalaivanan, K.; Karpagalakshmi, R.C.; Monikandan, R., "Automatic facial expression recognition system," Computing, Communication and Networking, 2008. ICCCn 2008. International Conference on , vol., no., pp.1,5, 18-20 Dec. 2008 [2] Thomas, N.; Mathew, M., "Facial expression recognition system using neural network and MATLAB," Computing, Communication and Applications (ICCCA), 2012 International Conference on , vol., no., pp.1,5, 22-24 Feb. 2012 [3] Girard, J.M.; Cohn, J.F.; Mahoor, M.H.; Mavadati, S.; Rosenwald, D.P., "Social risk and depression:
  • 9. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.6, No.2, April 2015 9 Evidence from manual and automatic facial expression analysis," Automatic Face and Gesture Recognition (FG), 2013 10th IEEE International Conference and Workshops on , vol., no., pp.1,8, 22- 26 April 2013 [4] Zhi-Huang Zou, Wu-Shan Cheng, Xin Sun,’’ real time face recognition system based on DSP’’, modern machinery. [J]. 2008,02:64-66. [5] Hai-Yang Wang,” The research on drowsy detection based on the information of eye images”, Shenyang University of Technology, 2007 [6] Jiang-Jiang Huang, Research on driver fatigue test measurement system based on identification of human eye.[D]. Jilin University, 2010 [7] Yong Cao, The research of face recognition algorithm based on geometric features. [D]. Jilin University, 2008 [8] Jun Zeng, Research on image edge detection and its application. [D]. Huazhong University of Science and Technology, 2011 [9] Na Wang,Xia Li,A new improve edge detection algorithm based on the Canny operator. [J]. Journal of Shenzhen University, 2005,02:149-153. [10] Rong-Ping Dong,Bo-Ling Tang, Facial Expression Recognition Using DCT一Back Propagation Neural Network. [J]. microcomputer information, 2005,18:142-144. Author Xiaoming CHEN was born in 1991,and now the Shanghai University of Engineering Science postgraduate. His present research interest is image analysis and processing.