SlideShare a Scribd company logo
1 of 2
Download to read offline
C&T RF Antennas Inc
https://ctrfantennasinc.com/ https://lcantennas.com/ https://pcbantennas.com/
info@ctrfantennasinc.com
Please Contact us for more information, thank you.
 Coco Lu (+86)13412239096
What are the 3 Classic Face Recognition Algorithms?
What is face recognition algorithm?
The face recognition algorithm means that after a face is detected and key facial feature points
are located, the main face areas can be cropped out, pre-processed, and fed into the back-end
recognition algorithm.
The face recognition algorithm has to complete the extraction of facial features and compare
them with the known faces in the inventory to complete the final classification. There are three
classical face recognition algorithms, let's see what they are exactly.
Three classical face recognition algorithms
The classic face recognition algorithm 1. Eigenface method
Eigenface technology is a recently developed method for face or general rigid body recognition
and other face processing. The use of eigenfaces for face recognition was first proposed by
Sirovich and Kirby (1987) ("Low-dimensional procedure for the characterization of human faces")
and used by Matthew Turk and Alex Pentland for Eigenfaces for recognition").
A batch of face images is first converted into a set of feature vectors, called "Eigenfaces", which
are the basic components of the initial training image set.
The recognition process involves projecting a new image into the eigenface subspace and
determining and recognizing it by the position of its projection points in the subspace and the
length of the projection lines.
After transforming the image to another space, images of the same category will be clustered
together, and images of different categories will be clustered further away. It is difficult to cut the
images of different categories in the original pixel space in terms of distribution with simple lines
or faces, and transforming them into another space can separate them well.
The spatial transformation method chosen by Eigenfaces is PCA (Principal Component Analysis),
which is used to obtain the main components of the face distribution, and is implemented by
C&T RF Antennas Inc
https://ctrfantennasinc.com/ https://lcantennas.com/ https://pcbantennas.com/
info@ctrfantennasinc.com
Please Contact us for more information, thank you.
 Coco Lu (+86)13412239096
decomposing the covariance matrix of all face images in the training set to obtain the
corresponding eigenvectors, which are the "eigenfaces".
Each eigenvector or eigenface is equivalent to capturing or describing a variation or characteristic
among faces. This means that each face can be represented as a linear combination of these
eigenfaces.
The classic face recognition algorithm 2. Local Binary Patterns (LBP)
Local binary patterns (LBP) is a visual operator used for classification in the field of computer
vision.LBP, an operator used to describe texture features of images, was proposed by T. Ojala et al.
of the University of Oulu, Finland, in 1996 ("A comparative study of texture measures with
classification based on featured distributions").
In 2002, T. Ojala et al. published another paper on LBP in PAMI ("Multiresolution gray-scale and
rotation invariant texture classification with local binary patterns").
This paper very clearly illustrates the improved LBP features of multiresolution, gray-scale
invariant and rotation invariant, and equivalence patterns.
The core idea of LBP is that the grayscale value of the central pixel is used as a threshold and
compared with its domain to obtain the corresponding binary code to represent the local texture
features.
The significant advantage of the LBP method is that it is insensitive to illumination but still does
not solve the problem of pose and expression. However, the recognition rate of LBP has been
greatly improved compared to the feature face method.
The classic face recognition algorithm 3. Fisher face algorithm
Linear discriminant analysis, which considers category information while reducing dimensionality,
was invented by statistician Sir R. A. Fisher in 1936 ("The use of multiple measurements in
taxonomic problems").
In order to find a way to combine features in a way that achieves maximum interclass dispersion
and minimum intraclass dispersion.
The idea is simple: in a low-dimensional representation, identical classes should be clustered
tightly together, while different classes are as far apart as possible.
In 1997, Belhumer successfully applied the Fisher discriminant criterion to face classification and
proposed the Fisherface method based on linear discriminant analysis ("Eigenfaces vs. fisher
faces: Recognition using class specific linear projection").
Besides the What are the 3 Classic Face Recognition Algorithms article, you may also be
interested in the below articles?
What Is The Core 5G NR Technology?
2.4GHz/5.8GHz WiFi Antenna Principle And Parameters
5G Millimeter Wave
How To Choose 2.4G And 5G?
RF Circuit Design Tutorial
What Is Each RF 400MHz~6GHz Antenna Application?
How to Choose the Best Antenna for Lora?

More Related Content

Similar to What are the 3 Classic Face Recognition Algorithms.pdf

Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
Editor IJARCET
 
Appearance based face recognition by pca and lda
Appearance based face recognition by pca and ldaAppearance based face recognition by pca and lda
Appearance based face recognition by pca and lda
IAEME Publication
 

Similar to What are the 3 Classic Face Recognition Algorithms.pdf (20)

Criminal Detection System
Criminal Detection SystemCriminal Detection System
Criminal Detection System
 
Paper id 29201416
Paper id 29201416Paper id 29201416
Paper id 29201416
 
H0334749
H0334749H0334749
H0334749
 
Ch 2
Ch 2Ch 2
Ch 2
 
F ACIAL E XPRESSION R ECOGNITION B ASED ON E DGE D ETECTION
F ACIAL  E XPRESSION  R ECOGNITION  B ASED ON  E DGE  D ETECTIONF ACIAL  E XPRESSION  R ECOGNITION  B ASED ON  E DGE  D ETECTION
F ACIAL E XPRESSION R ECOGNITION B ASED ON E DGE D ETECTION
 
Face Emotion Analysis Using Gabor Features In Image Database for Crime Invest...
Face Emotion Analysis Using Gabor Features In Image Database for Crime Invest...Face Emotion Analysis Using Gabor Features In Image Database for Crime Invest...
Face Emotion Analysis Using Gabor Features In Image Database for Crime Invest...
 
Facial_recognition_Siva vadapalli1.pptx.ppt
Facial_recognition_Siva vadapalli1.pptx.pptFacial_recognition_Siva vadapalli1.pptx.ppt
Facial_recognition_Siva vadapalli1.pptx.ppt
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
 
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
 
Hybrid Domain based Face Recognition using DWT, FFT and Compressed CLBP
Hybrid Domain based Face Recognition using DWT, FFT and Compressed CLBPHybrid Domain based Face Recognition using DWT, FFT and Compressed CLBP
Hybrid Domain based Face Recognition using DWT, FFT and Compressed CLBP
 
A04430105
A04430105A04430105
A04430105
 
IRJET-Face Recognition using LDN Code
IRJET-Face Recognition using LDN CodeIRJET-Face Recognition using LDN Code
IRJET-Face Recognition using LDN Code
 
A survey on face recognition techniques
A survey on face recognition techniquesA survey on face recognition techniques
A survey on face recognition techniques
 
Facial expression recognition based on local binary patterns final
Facial expression recognition based on local binary patterns finalFacial expression recognition based on local binary patterns final
Facial expression recognition based on local binary patterns final
 
D017322027
D017322027D017322027
D017322027
 
Pose Invariant Face Recognition using Neuro-Fuzzy Approach
Pose Invariant Face Recognition using Neuro-Fuzzy ApproachPose Invariant Face Recognition using Neuro-Fuzzy Approach
Pose Invariant Face Recognition using Neuro-Fuzzy Approach
 
Feature extraction and classification methods of facial expression: A surey
Feature extraction and classification methods of facial  expression: A sureyFeature extraction and classification methods of facial  expression: A surey
Feature extraction and classification methods of facial expression: A surey
 
Appearance based face recognition by pca and lda
Appearance based face recognition by pca and ldaAppearance based face recognition by pca and lda
Appearance based face recognition by pca and lda
 

More from Antenna Manufacturer Coco

More from Antenna Manufacturer Coco (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
What are LPWAN Technologies Listed In IoT.pdf
What are LPWAN Technologies Listed In IoT.pdfWhat are LPWAN Technologies Listed In IoT.pdf
What are LPWAN Technologies Listed In IoT.pdf
 
Top 14 IoT Trends to Emerge in 2023.pdf
Top 14 IoT Trends to Emerge in 2023.pdfTop 14 IoT Trends to Emerge in 2023.pdf
Top 14 IoT Trends to Emerge in 2023.pdf
 
Comparison of GSM and NB-IoT Coverage Capability.pdf
Comparison of GSM and NB-IoT Coverage Capability.pdfComparison of GSM and NB-IoT Coverage Capability.pdf
Comparison of GSM and NB-IoT Coverage Capability.pdf
 
What Are NB-IoT Technology And Its Features.pdf
What Are NB-IoT Technology And Its Features.pdfWhat Are NB-IoT Technology And Its Features.pdf
What Are NB-IoT Technology And Its Features.pdf
 
LoRa Alliance Extends LoRaWAN Standard to Support IoT Applications.pdf
LoRa Alliance Extends LoRaWAN Standard to Support IoT Applications.pdfLoRa Alliance Extends LoRaWAN Standard to Support IoT Applications.pdf
LoRa Alliance Extends LoRaWAN Standard to Support IoT Applications.pdf
 
What is A Private 5G Network.pdf
What is A Private 5G Network.pdfWhat is A Private 5G Network.pdf
What is A Private 5G Network.pdf
 
What is LPWAN.pdf
What is LPWAN.pdfWhat is LPWAN.pdf
What is LPWAN.pdf
 
What is 5G LAN How Does It Work.pdf
What is 5G LAN How Does It Work.pdfWhat is 5G LAN How Does It Work.pdf
What is 5G LAN How Does It Work.pdf
 
Internal Antenna VS. External Antenna.pdf
Internal Antenna VS. External Antenna.pdfInternal Antenna VS. External Antenna.pdf
Internal Antenna VS. External Antenna.pdf
 
Yagi Antenna Design and 433MHz Antenna Design Example.pdf
Yagi Antenna Design and 433MHz Antenna Design Example.pdfYagi Antenna Design and 433MHz Antenna Design Example.pdf
Yagi Antenna Design and 433MHz Antenna Design Example.pdf
 
55 Different Types of Antennas With Examples Used in Wireless Communication.pdf
55 Different Types of Antennas With Examples Used in Wireless Communication.pdf55 Different Types of Antennas With Examples Used in Wireless Communication.pdf
55 Different Types of Antennas With Examples Used in Wireless Communication.pdf
 
WiFi vs. Cellular, Is WiFi Better Than Cellular.pdf
WiFi vs. Cellular, Is WiFi Better Than Cellular.pdfWiFi vs. Cellular, Is WiFi Better Than Cellular.pdf
WiFi vs. Cellular, Is WiFi Better Than Cellular.pdf
 
Mobile networks’ evolution from 1G to 5G.pdf
Mobile networks’ evolution from 1G to 5G.pdfMobile networks’ evolution from 1G to 5G.pdf
Mobile networks’ evolution from 1G to 5G.pdf
 
What is DTU.pdf
What is DTU.pdfWhat is DTU.pdf
What is DTU.pdf
 
What is a DTU and What Does it Do.pdf
What is a DTU and What Does it Do.pdfWhat is a DTU and What Does it Do.pdf
What is a DTU and What Does it Do.pdf
 
New Technology in Farming Applications.pdf
New Technology in Farming Applications.pdfNew Technology in Farming Applications.pdf
New Technology in Farming Applications.pdf
 
What is the Difference Between LTE and Wifi.pdf
What is the Difference Between LTE and Wifi.pdfWhat is the Difference Between LTE and Wifi.pdf
What is the Difference Between LTE and Wifi.pdf
 
Wifi vs LTE Technology.pdf
Wifi vs LTE Technology.pdfWifi vs LTE Technology.pdf
Wifi vs LTE Technology.pdf
 
Comparison of 7 Common Positioning Technologies.pdf
Comparison of 7 Common Positioning Technologies.pdfComparison of 7 Common Positioning Technologies.pdf
Comparison of 7 Common Positioning Technologies.pdf
 

Recently uploaded

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 

Recently uploaded (20)

Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 

What are the 3 Classic Face Recognition Algorithms.pdf

  • 1. C&T RF Antennas Inc https://ctrfantennasinc.com/ https://lcantennas.com/ https://pcbantennas.com/ info@ctrfantennasinc.com Please Contact us for more information, thank you.  Coco Lu (+86)13412239096 What are the 3 Classic Face Recognition Algorithms? What is face recognition algorithm? The face recognition algorithm means that after a face is detected and key facial feature points are located, the main face areas can be cropped out, pre-processed, and fed into the back-end recognition algorithm. The face recognition algorithm has to complete the extraction of facial features and compare them with the known faces in the inventory to complete the final classification. There are three classical face recognition algorithms, let's see what they are exactly. Three classical face recognition algorithms The classic face recognition algorithm 1. Eigenface method Eigenface technology is a recently developed method for face or general rigid body recognition and other face processing. The use of eigenfaces for face recognition was first proposed by Sirovich and Kirby (1987) ("Low-dimensional procedure for the characterization of human faces") and used by Matthew Turk and Alex Pentland for Eigenfaces for recognition"). A batch of face images is first converted into a set of feature vectors, called "Eigenfaces", which are the basic components of the initial training image set. The recognition process involves projecting a new image into the eigenface subspace and determining and recognizing it by the position of its projection points in the subspace and the length of the projection lines. After transforming the image to another space, images of the same category will be clustered together, and images of different categories will be clustered further away. It is difficult to cut the images of different categories in the original pixel space in terms of distribution with simple lines or faces, and transforming them into another space can separate them well. The spatial transformation method chosen by Eigenfaces is PCA (Principal Component Analysis), which is used to obtain the main components of the face distribution, and is implemented by
  • 2. C&T RF Antennas Inc https://ctrfantennasinc.com/ https://lcantennas.com/ https://pcbantennas.com/ info@ctrfantennasinc.com Please Contact us for more information, thank you.  Coco Lu (+86)13412239096 decomposing the covariance matrix of all face images in the training set to obtain the corresponding eigenvectors, which are the "eigenfaces". Each eigenvector or eigenface is equivalent to capturing or describing a variation or characteristic among faces. This means that each face can be represented as a linear combination of these eigenfaces. The classic face recognition algorithm 2. Local Binary Patterns (LBP) Local binary patterns (LBP) is a visual operator used for classification in the field of computer vision.LBP, an operator used to describe texture features of images, was proposed by T. Ojala et al. of the University of Oulu, Finland, in 1996 ("A comparative study of texture measures with classification based on featured distributions"). In 2002, T. Ojala et al. published another paper on LBP in PAMI ("Multiresolution gray-scale and rotation invariant texture classification with local binary patterns"). This paper very clearly illustrates the improved LBP features of multiresolution, gray-scale invariant and rotation invariant, and equivalence patterns. The core idea of LBP is that the grayscale value of the central pixel is used as a threshold and compared with its domain to obtain the corresponding binary code to represent the local texture features. The significant advantage of the LBP method is that it is insensitive to illumination but still does not solve the problem of pose and expression. However, the recognition rate of LBP has been greatly improved compared to the feature face method. The classic face recognition algorithm 3. Fisher face algorithm Linear discriminant analysis, which considers category information while reducing dimensionality, was invented by statistician Sir R. A. Fisher in 1936 ("The use of multiple measurements in taxonomic problems"). In order to find a way to combine features in a way that achieves maximum interclass dispersion and minimum intraclass dispersion. The idea is simple: in a low-dimensional representation, identical classes should be clustered tightly together, while different classes are as far apart as possible. In 1997, Belhumer successfully applied the Fisher discriminant criterion to face classification and proposed the Fisherface method based on linear discriminant analysis ("Eigenfaces vs. fisher faces: Recognition using class specific linear projection"). Besides the What are the 3 Classic Face Recognition Algorithms article, you may also be interested in the below articles? What Is The Core 5G NR Technology? 2.4GHz/5.8GHz WiFi Antenna Principle And Parameters 5G Millimeter Wave How To Choose 2.4G And 5G? RF Circuit Design Tutorial What Is Each RF 400MHz~6GHz Antenna Application? How to Choose the Best Antenna for Lora?