SlideShare a Scribd company logo
1 of 6
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 4, Ver. I (Jul.-Aug. 2016), PP 43-48
www.iosrjournals.org
DOI: 10.9790/0661-1804014348 www.iosrjournals.org 43 | Page
A Novel Based Approach For Pose Estimation And Normalization
Using Multi-Class Svm And Affine Transformation For Face
Recognition
1
shilpa R, 2
shreekumar T
1
M.Tech, CNE, Mangalore Institute of Technology and Engineering, Moodbidri, Karnataka
2
Associate Professor, CSE, Mangalore Institute of Technology and Engineering, Moodbidri, Karnataka
Abstract: The goal of the paper is to estimate the pose, normalize the pose, and remove the illumination to
recognize the face. The training section includes the techniques Affine Transformation and DCT. During the
testing section the estimation of pose is calculated and later normalized frames of the pose variant frames and
illumination variant frames of the testing person are obtained by using Affine Transformation and DCT methods
respectively. Once the normalization and illumination removal methods are done, face recognition is carried
out. The features are extracted using the principle component analysis; later face recognition is carried out by
matching the obtained features with the database features. Once the normalization and illumination removal
methods are done, face recognition is carried out. The features are extracted using the principle component
analysis; later face recognition is carried out by matching the obtained features with the database features.
Keywords: Support Vector Machine, Affine Transformation, Discrete Cosine Transformation, Principal
Component Analysis.
I. Introduction
In the recent years, the research based on face recognition has been significantly increased. Research
works have focused on factors like illumination, pose, identity, facial expression, hair style, aging, make-up,
scale etc [1, 2]. Out of these factors the main problems are illumination and pose. Disadvantage of illumination
is computational cost. Storing large number of views of each image is a difficult task. Varying illumination and
pose normalization is the challenging problem. Variations between the images of the same face due to
illumination are almost always larger than the image variations due to change in face identity [3]. So, it is
difficult for the computer to do the face recognition when the input images and gallery images are different. And
in recent years SVM classifier is used often because it gives superior recognition rate compared to other
classifiers. SVM is mainly designed for binary decision problems. Multi-class SVM is used to solve the pose
estimation problem.Decomposing the multi-class problems into several two-class problems is the popular
method of using multi-class SVM [7].
In the proposed system the modification is done using two stages, training section and testing section.
In the training section, the database is trained using Affine Transformation and DCT. In the testing section the
image of the person to be recognized is given as input. Pose estimation is calculated by using Multi Class SVM
algorithm [7]. The input may or may not have the pose and illumination variation. However the normalized
image of the person is obtained using Affine Transformation [4][11][13] and DCT [5][10][13] techniques
subsequently used for the dimension reduction and feature vector. The recognition is done by PCA algorithm [6]
[14] to get the good accuracy. The proposed system is given in section 2. The proposed approaches are
presented in Section 3.Section 4 includes experimental result and conclusion is given in section 5. Finally, the
acknowledgement is given in section 6.
II. System Overview
Fig. 1: The samples from the database
A Novel Based Approach For Pose Estimation And Normalization Using Multi-Class Svm And Affine..
DOI: 10.9790/0661-1804014348 www.iosrjournals.org 44 | Page
Fig. 2: Process of proposed system
In the proposed system face images of a single person with different pose are taken. The face samples
for normalization and illumination are shown in Fig. 1. The goal is to normalize the pose using Affine
Transformation and remove the illumination using DCT are done first. The system overview is shown in Fig. 2.
At first the pose estimation is carried out by Multi-Class SVM method. Then normalization is done using Affine
transformation to a non-frontal image. And illumination removal method is done using DCT algorithm [12].
Once the normalization technique is applied, all the images of different class are normalized to the frontal view.
All classes of images are normalized to the same image size and the same distance between two eyes. The
precise locations of irises can be got by the region growing search method [8]. Then illumination effect is
removed. Once these two processes are completed an image is given for recognition. Face recognition process is
done using PCA algorithm. Success result is then shown. In order to get the good accuracy and decrease the
computation cost these algorithms are used.
III. Algorithms Used
3.1 Support Vector Machine for pose estimation
The support vector machine is originally a binary classification method [15] [16]. There are varieties of
techniques used for the classification in SVM. They are One-against-all (OvA) and One-against-one (OvO).
Consider there are many images which are arranged in a binary tree structure [17]. A SVM in each node (i.e.
images) of the tree is trained using two of the classes. The algorithm then employs to measure the similarity
between the remaining samples and two classes used for training. All samples in the node are assigned to the
two sub nodes derived from the previously selected classes by similarity. This step repeats at every node until
each node contains only samples from one class. The main problem is the training time which decreases the
performance. An example of SVM that solves a 7 - class pattern recognition problem utilizing a binary tree, in
which each node makes binary decision using a SVM, is shown on Fig. 3. The hierarchy of binary decision
subtasks should be carefully designed before the training of each SVM classifier.
Fig. 3: Illustration of SVM binary tree.
The SVM method that proposed is based on recursively dividing the classes in two disjoint groups in
every node of the decision tree and training a SVM that will decide in which of the groups the incoming
unknown sample should be assigned. The groups are determined by a clustering algorithm according to their
A Novel Based Approach For Pose Estimation And Normalization Using Multi-Class Svm And Affine..
DOI: 10.9790/0661-1804014348 www.iosrjournals.org 45 | Page
class membership. For the training set (x1, y1) ... (xn, yn)with labels yi in [1ā€¦k], it finds the solution of the
following optimization problem during training.
3.2 Affine Transformation for pose normalization
A function between affine spaces which preserves points, straight lines and planes is called as affine
transformation. It is a combination of translation and linear map. Affine Transformation in two dimensional
includes translation, scaling, rotation, shear mapping. The method can be describes as follows, face region is
divided into three rectangles. Comparison between original image and specific pose are calculated. The
normalized face image in some pose can be geometrically warped into the frontal pose. Having the virtual
frontal pose view, then the DCT algorithm can be used to remove the illumination effect of an image. The
formula description is given below;
1) Two rectangleā€™s 8 vertices are given (Rl, Ro) under left pose and original front pose.
2) For the 4 vertices (ui,vi) i= 1,2,3,4 in Ro, after the transformation, corresponding 4 vertices are obtained (ui
'
,
vi
'
) i=1,2,3,4.
3) Letā€™s use Xo, A, Xl denote the three matrices and together it is written as;
Xo . A = Xl
So the parameter can be calculated by;
A = Xo-1
.Xl
4) Using there parameters, virtual frontal view is obtained. For each point (u, v) u=in the frontal view, first
rectangle is determined, then two parameters are decided and mapping of an image is done. Define (u', v')
as the transformed value (u, v) and expressed as,
uā€² = ao + a1 . u
š‘£ā€²
= š‘£
Let
š‘¢1 = š‘–š‘›š‘”(š‘¢ā€²)
š‘£1 = š‘£ā€²
and du = u' ā€“ int(u')
So, f(u, v) can be written as,
f(u, v) = (1-du).f'(u1,v1)+du.f'(u1+1.v1), where f(u, v) is given to frontal view and f'(u,v) is a value given to
non-frontal view.
3.3 Discrete Cosine Transformation for illumination removal
DCT was categorized into four slightly different transformations named DCT-I, DCT-II, DCT-III, and
DCT-IV [9]. The DCT is generally used in image processing and signal, mainly for lossy compression, because
it has a steady energy compaction property. DCT will take the input, it does partition based on the co-efficient.
After obtaining the coefficients, low frequency and high-frequency are separately modified to remove the
illumination effect. After the removal of illumination effect details of the images are highlighted. The modified
coefficients are used in order to reconstruct the new image via inverse discrete cosine transform. The
reconstructed image is used for recognition process.
The 2D DCT of x matrixis defined as follows;
Where
N is the length if the matrix x and x,y are the same size.
3.4 Principal Component Analysis for face recognition
Principal component analysis (PCA) is a statistical conversion process using orthogonal transform. It is
possible to display a set of related variables. It is non-correlated linearly to set the value of the variable so-called
A Novel Based Approach For Pose Estimation And Normalization Using Multi-Class Svm And Affine..
DOI: 10.9790/0661-1804014348 www.iosrjournals.org 46 | Page
principal component. Uncorrelated orthogonal basis set are obtained as resulting vector. The PCA algorithm
extracts the face features, and reduces the dimensionality of input space. Variations between the images are seen
due to the variations of pose and illumination. So the recognition rate obtained is very high which provides good
accuracy. Fig. 4 shows the face recognition system.
"Face Recognition" generally involves two stages:
1. Face Detection: where a photo is searched to find any face, then image processing cleans up the facial image
for easier recognition.
2. Face recognition: where that detected and processed face is compared to a database of known faces, to decide
who that person.
Fig. 4: Face recognition system
PCA has been extensively employed for face recognition algorithms. It not only reduces the
dimensionality of the image, but also retains some of the variations in the image data. Face image onto a feature
space that spans the significant variations. The significant features are known as eigenvectors (principle
component) of the set of faces they do not necessarily correspond to the features such as eyes, ears and noses.
So to recognize a particular face it is necessary only to compare these weights to those individuals.
IV. Experimental Analysis
The proposed Video face recognition system is implemented in MATALB platform and it is evaluated
using the dataset of FERET Face Database. All face images are normalized according to the different criterions
associated with different pose classes. All the frames in the database are masked. Fig. 5 represents the sample
frames set for normalization process and the Fig. 6 represents the sample frames set for lamination variant
process.
Fig. 5: Sample frameset for normalization process
Fig. 6: Sample frameset for illumination variant process
In the normalization process the normalized frames are obtained by Affine Transformation method and
in the illumination invariant process the removal of illumination effect images are obtained by DCT. Fig. 7
A Novel Based Approach For Pose Estimation And Normalization Using Multi-Class Svm And Affine..
DOI: 10.9790/0661-1804014348 www.iosrjournals.org 47 | Page
represents the normalized image after normalization process and Fig. 8 represents the illumination removal
image after illumination invariant process subsequently, obtained normalized images are subjected to face
recognition using PCA.
Fig. 6: Normalized face images after Affine Transformation
Fig. 6: Illumination effect removal after DCT
V. Conclusion
The pose normalization algorithm based on the statistical transformation is presented in this paper. The
proposed algorithm can solve the pose-invariant face recognition problem, especially when face rotation angle is
less than 30 degree. Experiments show that the method has a good performance for normalize the non-frontal
face images, and can dramatically increase the recognition rate with a very low time complexity. The results of
the pose estimation show that the speed of training and testing are improved, while keeping comparable or
offering better recognition rates than the other SVM multi-class methods. The experiments showed that this
method becomes more favourable as the number of classes in the recognition problem increases.The deal with
the illumination problem to make face recognition robust to illumination variations is given in this paper. This
method is based on the modification of discrete cosine transform coefficients. The experimental results show
that 100% face recognition rate was achieved on FERET Datasets. Then PCA method is used for face
recognition process. Facial features are extracted by the PCA method, which reduces the dimensionality of the
original face images while preserving some discriminating features within the training images. After performing
the PCA, structural information is acquired corresponding to each person from lower dimensional training
images. The experimental results obtained on both the face databases are found to be quite promising and better
than some of the PCA-based methods reported earlier.
Acknowledgments
Dedicating the paper work to my esteemed guide;Associate Professor, Mr Shreekumar T, whose
interest and guidance helped in the completion of the work successfully and also extending the gratitude to Prof.
Dr Nagesh H R (H.O.D Computer Science and Engineering Department) who has facilitated exploring the
subject with more enthusiasm.
References
[1]. Wu-Jun Li, Chong-Jun Wang, Dian-Xiang Xu and Shi-Fu Chen, "Illumination Invariant Face Recognition Based on Neural
Network Ensemble", In Proceedings of 16th IEEE International Conference on Tools with Artificial Intelligence, pp. 486-490,
November 2004.
[2]. Majumdar and Ward, "Pseudo-Fisher face Method for Single Image Per Person Face Recognition", In Proceedings of
IEEEInternational Conference on Acoustics, Speech and Signal Processing, Las Vegas, NV, pp. 989-992, 2008.
[3]. D. Beymer and T. Poggio. Face Recognition From One
[4]. Example View. ICCV, Boston, MA, pp. 500-507, 1995
[5]. Xiujuan Chai1, Shiguang Shan, Wen Gao, ā€œPose normalization for robust face recognition using Statistical Affine Transformationā€,
In proceeding of ICICS- PCM 2003, 15-18 Dec 2003, Singapore.
[6]. Shan Du, Mohamed Shehata, WalBadawy, ā€œA novel algorithm for illumination invariant DCT- based face recognitionā€, IN
proceeding with 25th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), 2012.
[7]. S. Thakur, J. K. Sing, D. K. Basu, M. Nasipuri, M. Kundu, ā€œFace recognition using principal component analysis and RBF- Neural
networkā€. IJSSST, Vol. 10, No. 5.
[8]. GjorgjiMadzarov, DejanGjorgjevikj and Ivan Chorbev, ā€œA Multi-class SVM Classifier Utilizing Binary Decision Treeā€, Informatica
33 (2009) 233-241 233.
[9]. B. Cao, S. Shan,W. Gao. Localizing the iris center by region growing search. Proceeding of the ICME2002.
A Novel Based Approach For Pose Estimation And Normalization Using Multi-Class Svm And Affine..
DOI: 10.9790/0661-1804014348 www.iosrjournals.org 48 | Page
[10]. Z. Wang, ā€œFast algorithms for the discrete W transform and for the discrete Fourier transform,ā€ IEEE Trans. On Acoustic, Speech,
and Signal Processing, vol. 32, pp. 803-816, 1984.
[11]. Shreekumar T and Nagaratna P. Hegde, ā€œAN APPROACH TO POSE AND ILLUMINATION INVARIANT FACE
RECOGNITION IN VIDEOā€, International Journal of Image Processing and Applications, 2(1), 2011, pp. 93-100.
[12]. Shreekumar T, Karunakara K, ā€œParticle Swam Optimization Based Identification of Face Images from Videoā€, International Journal
of Advanced Computational Engineering and Networking, ISSN: 2320-2106, Volume-4, Issue-2, Feb.-2016.
[13]. Shreekumar T, Dr. NagaratnaHegde, ā€œA New Method For Face Recognition From Video Sequence Using DCT and LLRā€, Internal
journal of System, algorithms & application, Volume 2, Issue ICRAET12, May 2012, ISSN Online: 2277-2677.
[14]. Mahesh Prasanna K, NagaratnaHegde, ā€œA Fast Recognition Method for Pose and Illumination Variant Faces on Video Sequencesā€,
IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 10, Issue 1 (Mar. - Apr.
2013), PP 08-18 www.iosrjournals.org.
[15]. Amith G K, Shreekumar T, ā€œA Novel Approach for Blurred and Noisy Face Image Recognitionā€, International Journal of Science
and Research (IJSR) ISSN (Online): 2319-7064.
[16]. V. Vapnik. The Nature of Statistical Learning Theory, 2nd Ed. Springer, New York, 1999.
[17]. C. J. C. Burges. A tutorial on support vector machine for pattern recognition. Data Min. Knowl. Disc. 2 (1998) 121.
[18]. B. Fei, J. Liu. Binary Tree of SVM: A New Fast Multiclass Training and Classification Algorithm. IEEE Transaction on neural
networks, Vol. 17, No. 3, May 2006.

More Related Content

What's hot

Video Segmentation
Video SegmentationVideo Segmentation
Video SegmentationSmriti Jain
Ā 
Comparative Analysis of Hand Gesture Recognition Techniques
Comparative Analysis of Hand Gesture Recognition TechniquesComparative Analysis of Hand Gesture Recognition Techniques
Comparative Analysis of Hand Gesture Recognition TechniquesIJERA Editor
Ā 
FAN search for image copy-move forgery-amalta 2014
 FAN search for image copy-move forgery-amalta 2014 FAN search for image copy-move forgery-amalta 2014
FAN search for image copy-move forgery-amalta 2014SondosFadl
Ā 
A novel approach to Image Fusion using combination of Wavelet Transform and C...
A novel approach to Image Fusion using combination of Wavelet Transform and C...A novel approach to Image Fusion using combination of Wavelet Transform and C...
A novel approach to Image Fusion using combination of Wavelet Transform and C...IJSRD
Ā 
Image pre processing
Image pre processingImage pre processing
Image pre processingAshish Kumar
Ā 
A vlsi architecture for efficient removal of noises and enhancement of images
A vlsi architecture for efficient removal of noises and enhancement of imagesA vlsi architecture for efficient removal of noises and enhancement of images
A vlsi architecture for efficient removal of noises and enhancement of imagesIAEME Publication
Ā 
Image pre processing - local processing
Image pre processing - local processingImage pre processing - local processing
Image pre processing - local processingAshish Kumar
Ā 
Marker Controlled Segmentation Technique for Medical application
Marker Controlled Segmentation Technique for Medical applicationMarker Controlled Segmentation Technique for Medical application
Marker Controlled Segmentation Technique for Medical applicationRushin Shah
Ā 
Image Segmentation (Digital Image Processing)
Image Segmentation (Digital Image Processing)Image Segmentation (Digital Image Processing)
Image Segmentation (Digital Image Processing)VARUN KUMAR
Ā 
Weighted Performance comparison of DWT and LWT with PCA for Face Image Retrie...
Weighted Performance comparison of DWT and LWT with PCA for Face Image Retrie...Weighted Performance comparison of DWT and LWT with PCA for Face Image Retrie...
Weighted Performance comparison of DWT and LWT with PCA for Face Image Retrie...cscpconf
Ā 
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier ExposurePerformance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposureiosrjce
Ā 
A proposed accelerated image copy-move forgery detection-vcip2014
A proposed accelerated image copy-move forgery detection-vcip2014A proposed accelerated image copy-move forgery detection-vcip2014
A proposed accelerated image copy-move forgery detection-vcip2014SondosFadl
Ā 
Improvement oh the recognition rate by random forest
Improvement oh the recognition rate by random forestImprovement oh the recognition rate by random forest
Improvement oh the recognition rate by random forestYoussef Rachidi
Ā 
Improvement of the Recognition Rate by Random Forest
Improvement of the Recognition Rate by Random ForestImprovement of the Recognition Rate by Random Forest
Improvement of the Recognition Rate by Random ForestIJERA Editor
Ā 

What's hot (20)

mini prjt
mini prjtmini prjt
mini prjt
Ā 
Video Segmentation
Video SegmentationVideo Segmentation
Video Segmentation
Ā 
Comparative Analysis of Hand Gesture Recognition Techniques
Comparative Analysis of Hand Gesture Recognition TechniquesComparative Analysis of Hand Gesture Recognition Techniques
Comparative Analysis of Hand Gesture Recognition Techniques
Ā 
FAN search for image copy-move forgery-amalta 2014
 FAN search for image copy-move forgery-amalta 2014 FAN search for image copy-move forgery-amalta 2014
FAN search for image copy-move forgery-amalta 2014
Ā 
A novel approach to Image Fusion using combination of Wavelet Transform and C...
A novel approach to Image Fusion using combination of Wavelet Transform and C...A novel approach to Image Fusion using combination of Wavelet Transform and C...
A novel approach to Image Fusion using combination of Wavelet Transform and C...
Ā 
Image pre processing
Image pre processingImage pre processing
Image pre processing
Ā 
Medial axis transformation based skeletonzation of image patterns using image...
Medial axis transformation based skeletonzation of image patterns using image...Medial axis transformation based skeletonzation of image patterns using image...
Medial axis transformation based skeletonzation of image patterns using image...
Ā 
A vlsi architecture for efficient removal of noises and enhancement of images
A vlsi architecture for efficient removal of noises and enhancement of imagesA vlsi architecture for efficient removal of noises and enhancement of images
A vlsi architecture for efficient removal of noises and enhancement of images
Ā 
Image pre processing - local processing
Image pre processing - local processingImage pre processing - local processing
Image pre processing - local processing
Ā 
Im seg04
Im seg04Im seg04
Im seg04
Ā 
Marker Controlled Segmentation Technique for Medical application
Marker Controlled Segmentation Technique for Medical applicationMarker Controlled Segmentation Technique for Medical application
Marker Controlled Segmentation Technique for Medical application
Ā 
Segmentation Techniques -I
Segmentation Techniques -ISegmentation Techniques -I
Segmentation Techniques -I
Ā 
Ijetr011917
Ijetr011917Ijetr011917
Ijetr011917
Ā 
Image Segmentation (Digital Image Processing)
Image Segmentation (Digital Image Processing)Image Segmentation (Digital Image Processing)
Image Segmentation (Digital Image Processing)
Ā 
Weighted Performance comparison of DWT and LWT with PCA for Face Image Retrie...
Weighted Performance comparison of DWT and LWT with PCA for Face Image Retrie...Weighted Performance comparison of DWT and LWT with PCA for Face Image Retrie...
Weighted Performance comparison of DWT and LWT with PCA for Face Image Retrie...
Ā 
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier ExposurePerformance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Ā 
Segmentation Techniques -II
Segmentation Techniques -IISegmentation Techniques -II
Segmentation Techniques -II
Ā 
A proposed accelerated image copy-move forgery detection-vcip2014
A proposed accelerated image copy-move forgery detection-vcip2014A proposed accelerated image copy-move forgery detection-vcip2014
A proposed accelerated image copy-move forgery detection-vcip2014
Ā 
Improvement oh the recognition rate by random forest
Improvement oh the recognition rate by random forestImprovement oh the recognition rate by random forest
Improvement oh the recognition rate by random forest
Ā 
Improvement of the Recognition Rate by Random Forest
Improvement of the Recognition Rate by Random ForestImprovement of the Recognition Rate by Random Forest
Improvement of the Recognition Rate by Random Forest
Ā 

Viewers also liked

Satin bridesmaid dresses gudeer.com
Satin bridesmaid dresses   gudeer.comSatin bridesmaid dresses   gudeer.com
Satin bridesmaid dresses gudeer.comGudeer Kitty
Ā 
Photos (backstage)
Photos (backstage)Photos (backstage)
Photos (backstage)platonkaterinis
Ā 
Chiffon bridesmaid dresses gudeer.com
Chiffon bridesmaid dresses   gudeer.comChiffon bridesmaid dresses   gudeer.com
Chiffon bridesmaid dresses gudeer.comGudeer Kitty
Ā 
Urus Izin Prinsip Perubahan ā€“ PMA / PMDN
Urus Izin Prinsip Perubahan ā€“ PMA / PMDNUrus Izin Prinsip Perubahan ā€“ PMA / PMDN
Urus Izin Prinsip Perubahan ā€“ PMA / PMDNlegalservice
Ā 
Cordial Labelling Of K-Regular Bipartite Graphs for K = 1, 2, N, N-1 Where K ...
Cordial Labelling Of K-Regular Bipartite Graphs for K = 1, 2, N, N-1 Where K ...Cordial Labelling Of K-Regular Bipartite Graphs for K = 1, 2, N, N-1 Where K ...
Cordial Labelling Of K-Regular Bipartite Graphs for K = 1, 2, N, N-1 Where K ...IOSR Journals
Ā 
One shoulder bridesmaid dresses gudeer.com
One shoulder bridesmaid dresses   gudeer.comOne shoulder bridesmaid dresses   gudeer.com
One shoulder bridesmaid dresses gudeer.comGudeer Kitty
Ā 
Digital Implementation of Fuzzy Logic Controller for Real Time Position Contr...
Digital Implementation of Fuzzy Logic Controller for Real Time Position Contr...Digital Implementation of Fuzzy Logic Controller for Real Time Position Contr...
Digital Implementation of Fuzzy Logic Controller for Real Time Position Contr...IOSR Journals
Ā 
LordJeshuaInheritanceJune2016
LordJeshuaInheritanceJune2016LordJeshuaInheritanceJune2016
LordJeshuaInheritanceJune2016Lord Jesus Christ
Ā 
Love Me Like You Do
Love Me Like You DoLove Me Like You Do
Love Me Like You Dohamilton santos
Ā 
Leslie.Archambeault.Thesis.December.4.2015.Final
Leslie.Archambeault.Thesis.December.4.2015.FinalLeslie.Archambeault.Thesis.December.4.2015.Final
Leslie.Archambeault.Thesis.December.4.2015.FinalLeslie Archambeault, JD
Ā 

Viewers also liked (20)

Satin bridesmaid dresses gudeer.com
Satin bridesmaid dresses   gudeer.comSatin bridesmaid dresses   gudeer.com
Satin bridesmaid dresses gudeer.com
Ā 
M010219295
M010219295M010219295
M010219295
Ā 
Photos (backstage)
Photos (backstage)Photos (backstage)
Photos (backstage)
Ā 
Chiffon bridesmaid dresses gudeer.com
Chiffon bridesmaid dresses   gudeer.comChiffon bridesmaid dresses   gudeer.com
Chiffon bridesmaid dresses gudeer.com
Ā 
Technology Commercialization Center (Russian presentation)
Technology Commercialization Center (Russian presentation)Technology Commercialization Center (Russian presentation)
Technology Commercialization Center (Russian presentation)
Ā 
Urus Izin Prinsip Perubahan ā€“ PMA / PMDN
Urus Izin Prinsip Perubahan ā€“ PMA / PMDNUrus Izin Prinsip Perubahan ā€“ PMA / PMDN
Urus Izin Prinsip Perubahan ā€“ PMA / PMDN
Ā 
Cordial Labelling Of K-Regular Bipartite Graphs for K = 1, 2, N, N-1 Where K ...
Cordial Labelling Of K-Regular Bipartite Graphs for K = 1, 2, N, N-1 Where K ...Cordial Labelling Of K-Regular Bipartite Graphs for K = 1, 2, N, N-1 Where K ...
Cordial Labelling Of K-Regular Bipartite Graphs for K = 1, 2, N, N-1 Where K ...
Ā 
One shoulder bridesmaid dresses gudeer.com
One shoulder bridesmaid dresses   gudeer.comOne shoulder bridesmaid dresses   gudeer.com
One shoulder bridesmaid dresses gudeer.com
Ā 
Digital Implementation of Fuzzy Logic Controller for Real Time Position Contr...
Digital Implementation of Fuzzy Logic Controller for Real Time Position Contr...Digital Implementation of Fuzzy Logic Controller for Real Time Position Contr...
Digital Implementation of Fuzzy Logic Controller for Real Time Position Contr...
Ā 
E1304023341
E1304023341E1304023341
E1304023341
Ā 
B010130508
B010130508B010130508
B010130508
Ā 
L010117579
L010117579L010117579
L010117579
Ā 
LordJeshuaInheritanceJune2016
LordJeshuaInheritanceJune2016LordJeshuaInheritanceJune2016
LordJeshuaInheritanceJune2016
Ā 
F017223742
F017223742F017223742
F017223742
Ā 
G012134044
G012134044G012134044
G012134044
Ā 
A012210104
A012210104A012210104
A012210104
Ā 
Love Me Like You Do
Love Me Like You DoLove Me Like You Do
Love Me Like You Do
Ā 
January7007.2016
January7007.2016January7007.2016
January7007.2016
Ā 
H017376369
H017376369H017376369
H017376369
Ā 
Leslie.Archambeault.Thesis.December.4.2015.Final
Leslie.Archambeault.Thesis.December.4.2015.FinalLeslie.Archambeault.Thesis.December.4.2015.Final
Leslie.Archambeault.Thesis.December.4.2015.Final
Ā 

Similar to G1804014348

Research Paper v2.0
Research Paper v2.0Research Paper v2.0
Research Paper v2.0Kapil Tiwari
Ā 
New Approach: Dominant and Additional Features Selection Based on Two Dimensi...
New Approach: Dominant and Additional Features Selection Based on Two Dimensi...New Approach: Dominant and Additional Features Selection Based on Two Dimensi...
New Approach: Dominant and Additional Features Selection Based on Two Dimensi...CSCJournals
Ā 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
Ā 
FIDUCIAL POINTS DETECTION USING SVM LINEAR CLASSIFIERS
FIDUCIAL POINTS DETECTION USING SVM LINEAR CLASSIFIERSFIDUCIAL POINTS DETECTION USING SVM LINEAR CLASSIFIERS
FIDUCIAL POINTS DETECTION USING SVM LINEAR CLASSIFIERScsandit
Ā 
Performance Evaluation of Object Tracking Technique Based on Position Vectors
Performance Evaluation of Object Tracking Technique Based on Position VectorsPerformance Evaluation of Object Tracking Technique Based on Position Vectors
Performance Evaluation of Object Tracking Technique Based on Position VectorsCSCJournals
Ā 
A Novel Super Resolution Algorithm Using Interpolation and LWT Based Denoisin...
A Novel Super Resolution Algorithm Using Interpolation and LWT Based Denoisin...A Novel Super Resolution Algorithm Using Interpolation and LWT Based Denoisin...
A Novel Super Resolution Algorithm Using Interpolation and LWT Based Denoisin...CSCJournals
Ā 
3D Reconstruction from Multiple uncalibrated 2D Images of an Object
3D Reconstruction from Multiple uncalibrated 2D Images of an Object3D Reconstruction from Multiple uncalibrated 2D Images of an Object
3D Reconstruction from Multiple uncalibrated 2D Images of an ObjectAnkur Tyagi
Ā 
Adaptive lifting based image compression scheme using interactive artificial ...
Adaptive lifting based image compression scheme using interactive artificial ...Adaptive lifting based image compression scheme using interactive artificial ...
Adaptive lifting based image compression scheme using interactive artificial ...csandit
Ā 
Improved nonlocal means based on pre classification and invariant block matching
Improved nonlocal means based on pre classification and invariant block matchingImproved nonlocal means based on pre classification and invariant block matching
Improved nonlocal means based on pre classification and invariant block matchingIAEME Publication
Ā 
Improved nonlocal means based on pre classification and invariant block matching
Improved nonlocal means based on pre classification and invariant block matchingImproved nonlocal means based on pre classification and invariant block matching
Improved nonlocal means based on pre classification and invariant block matchingIAEME Publication
Ā 
Face recognition based on curvelets, invariant moments features and SVM
Face recognition based on curvelets, invariant moments features and SVMFace recognition based on curvelets, invariant moments features and SVM
Face recognition based on curvelets, invariant moments features and SVMTELKOMNIKA JOURNAL
Ā 
CNN and its applications by ketaki
CNN and its applications by ketakiCNN and its applications by ketaki
CNN and its applications by ketakiKetaki Patwari
Ā 
Human Face Detection Based on Combination of Logistic Regression, Distance of...
Human Face Detection Based on Combination of Logistic Regression, Distance of...Human Face Detection Based on Combination of Logistic Regression, Distance of...
Human Face Detection Based on Combination of Logistic Regression, Distance of...IJCSIS Research Publications
Ā 
Ijctt v7 p104
Ijctt v7 p104Ijctt v7 p104
Ijctt v7 p104ssrgjournals
Ā 
Wavelet-Based Warping Technique for Mobile Devices
Wavelet-Based Warping Technique for Mobile DevicesWavelet-Based Warping Technique for Mobile Devices
Wavelet-Based Warping Technique for Mobile Devicescsandit
Ā 

Similar to G1804014348 (20)

Research Paper v2.0
Research Paper v2.0Research Paper v2.0
Research Paper v2.0
Ā 
New Approach: Dominant and Additional Features Selection Based on Two Dimensi...
New Approach: Dominant and Additional Features Selection Based on Two Dimensi...New Approach: Dominant and Additional Features Selection Based on Two Dimensi...
New Approach: Dominant and Additional Features Selection Based on Two Dimensi...
Ā 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
Ā 
FIDUCIAL POINTS DETECTION USING SVM LINEAR CLASSIFIERS
FIDUCIAL POINTS DETECTION USING SVM LINEAR CLASSIFIERSFIDUCIAL POINTS DETECTION USING SVM LINEAR CLASSIFIERS
FIDUCIAL POINTS DETECTION USING SVM LINEAR CLASSIFIERS
Ā 
Performance Evaluation of Object Tracking Technique Based on Position Vectors
Performance Evaluation of Object Tracking Technique Based on Position VectorsPerformance Evaluation of Object Tracking Technique Based on Position Vectors
Performance Evaluation of Object Tracking Technique Based on Position Vectors
Ā 
A Novel Super Resolution Algorithm Using Interpolation and LWT Based Denoisin...
A Novel Super Resolution Algorithm Using Interpolation and LWT Based Denoisin...A Novel Super Resolution Algorithm Using Interpolation and LWT Based Denoisin...
A Novel Super Resolution Algorithm Using Interpolation and LWT Based Denoisin...
Ā 
Real-Time Face Tracking with GPU Acceleration
Real-Time Face Tracking with GPU AccelerationReal-Time Face Tracking with GPU Acceleration
Real-Time Face Tracking with GPU Acceleration
Ā 
CUDA Accelerated Face Recognition
CUDA Accelerated Face RecognitionCUDA Accelerated Face Recognition
CUDA Accelerated Face Recognition
Ā 
3D Reconstruction from Multiple uncalibrated 2D Images of an Object
3D Reconstruction from Multiple uncalibrated 2D Images of an Object3D Reconstruction from Multiple uncalibrated 2D Images of an Object
3D Reconstruction from Multiple uncalibrated 2D Images of an Object
Ā 
Adaptive lifting based image compression scheme using interactive artificial ...
Adaptive lifting based image compression scheme using interactive artificial ...Adaptive lifting based image compression scheme using interactive artificial ...
Adaptive lifting based image compression scheme using interactive artificial ...
Ā 
Y34147151
Y34147151Y34147151
Y34147151
Ā 
Improved nonlocal means based on pre classification and invariant block matching
Improved nonlocal means based on pre classification and invariant block matchingImproved nonlocal means based on pre classification and invariant block matching
Improved nonlocal means based on pre classification and invariant block matching
Ā 
Improved nonlocal means based on pre classification and invariant block matching
Improved nonlocal means based on pre classification and invariant block matchingImproved nonlocal means based on pre classification and invariant block matching
Improved nonlocal means based on pre classification and invariant block matching
Ā 
Face recognition based on curvelets, invariant moments features and SVM
Face recognition based on curvelets, invariant moments features and SVMFace recognition based on curvelets, invariant moments features and SVM
Face recognition based on curvelets, invariant moments features and SVM
Ā 
CNN and its applications by ketaki
CNN and its applications by ketakiCNN and its applications by ketaki
CNN and its applications by ketaki
Ā 
Human Face Detection Based on Combination of Logistic Regression, Distance of...
Human Face Detection Based on Combination of Logistic Regression, Distance of...Human Face Detection Based on Combination of Logistic Regression, Distance of...
Human Face Detection Based on Combination of Logistic Regression, Distance of...
Ā 
Ijctt v7 p104
Ijctt v7 p104Ijctt v7 p104
Ijctt v7 p104
Ā 
Wavelet-Based Warping Technique for Mobile Devices
Wavelet-Based Warping Technique for Mobile DevicesWavelet-Based Warping Technique for Mobile Devices
Wavelet-Based Warping Technique for Mobile Devices
Ā 
40120140502010
4012014050201040120140502010
40120140502010
Ā 
40120140502010
4012014050201040120140502010
40120140502010
Ā 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
Ā 
M0111397100
M0111397100M0111397100
M0111397100
Ā 
L011138596
L011138596L011138596
L011138596
Ā 
K011138084
K011138084K011138084
K011138084
Ā 
J011137479
J011137479J011137479
J011137479
Ā 
I011136673
I011136673I011136673
I011136673
Ā 
G011134454
G011134454G011134454
G011134454
Ā 
H011135565
H011135565H011135565
H011135565
Ā 
F011134043
F011134043F011134043
F011134043
Ā 
E011133639
E011133639E011133639
E011133639
Ā 
D011132635
D011132635D011132635
D011132635
Ā 
C011131925
C011131925C011131925
C011131925
Ā 
B011130918
B011130918B011130918
B011130918
Ā 
A011130108
A011130108A011130108
A011130108
Ā 
I011125160
I011125160I011125160
I011125160
Ā 
H011124050
H011124050H011124050
H011124050
Ā 
G011123539
G011123539G011123539
G011123539
Ā 
F011123134
F011123134F011123134
F011123134
Ā 
E011122530
E011122530E011122530
E011122530
Ā 
D011121524
D011121524D011121524
D011121524
Ā 

Recently uploaded

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
Ā 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
Ā 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
Ā 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
Ā 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
Ā 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
Ā 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
Ā 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
Ā 
Bun (KitWorks Team Study ė…øė³„ė§ˆė£Ø ė°œķ‘œ 2024.4.22)
Bun (KitWorks Team Study ė…øė³„ė§ˆė£Ø ė°œķ‘œ 2024.4.22)Bun (KitWorks Team Study ė…øė³„ė§ˆė£Ø ė°œķ‘œ 2024.4.22)
Bun (KitWorks Team Study ė…øė³„ė§ˆė£Ø ė°œķ‘œ 2024.4.22)Wonjun Hwang
Ā 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
Ā 
SIEMENS: RAPUNZEL ā€“ A Tale About Knowledge Graph
SIEMENS: RAPUNZEL ā€“ A Tale About Knowledge GraphSIEMENS: RAPUNZEL ā€“ A Tale About Knowledge Graph
SIEMENS: RAPUNZEL ā€“ A Tale About Knowledge GraphNeo4j
Ā 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
Ā 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
Ā 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
Ā 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
Ā 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
Ā 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
Ā 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
Ā 

Recently uploaded (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
Ā 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
Ā 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
Ā 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
Ā 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Ā 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Ā 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Ā 
Hot Sexy call girls in Panjabi Bagh šŸ” 9953056974 šŸ” Delhi escort Service
Hot Sexy call girls in Panjabi Bagh šŸ” 9953056974 šŸ” Delhi escort ServiceHot Sexy call girls in Panjabi Bagh šŸ” 9953056974 šŸ” Delhi escort Service
Hot Sexy call girls in Panjabi Bagh šŸ” 9953056974 šŸ” Delhi escort Service
Ā 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
Ā 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
Ā 
Bun (KitWorks Team Study ė…øė³„ė§ˆė£Ø ė°œķ‘œ 2024.4.22)
Bun (KitWorks Team Study ė…øė³„ė§ˆė£Ø ė°œķ‘œ 2024.4.22)Bun (KitWorks Team Study ė…øė³„ė§ˆė£Ø ė°œķ‘œ 2024.4.22)
Bun (KitWorks Team Study ė…øė³„ė§ˆė£Ø ė°œķ‘œ 2024.4.22)
Ā 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Ā 
SIEMENS: RAPUNZEL ā€“ A Tale About Knowledge Graph
SIEMENS: RAPUNZEL ā€“ A Tale About Knowledge GraphSIEMENS: RAPUNZEL ā€“ A Tale About Knowledge Graph
SIEMENS: RAPUNZEL ā€“ A Tale About Knowledge Graph
Ā 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
Ā 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
Ā 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Ā 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Ā 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Ā 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Ā 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
Ā 

G1804014348

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 4, Ver. I (Jul.-Aug. 2016), PP 43-48 www.iosrjournals.org DOI: 10.9790/0661-1804014348 www.iosrjournals.org 43 | Page A Novel Based Approach For Pose Estimation And Normalization Using Multi-Class Svm And Affine Transformation For Face Recognition 1 shilpa R, 2 shreekumar T 1 M.Tech, CNE, Mangalore Institute of Technology and Engineering, Moodbidri, Karnataka 2 Associate Professor, CSE, Mangalore Institute of Technology and Engineering, Moodbidri, Karnataka Abstract: The goal of the paper is to estimate the pose, normalize the pose, and remove the illumination to recognize the face. The training section includes the techniques Affine Transformation and DCT. During the testing section the estimation of pose is calculated and later normalized frames of the pose variant frames and illumination variant frames of the testing person are obtained by using Affine Transformation and DCT methods respectively. Once the normalization and illumination removal methods are done, face recognition is carried out. The features are extracted using the principle component analysis; later face recognition is carried out by matching the obtained features with the database features. Once the normalization and illumination removal methods are done, face recognition is carried out. The features are extracted using the principle component analysis; later face recognition is carried out by matching the obtained features with the database features. Keywords: Support Vector Machine, Affine Transformation, Discrete Cosine Transformation, Principal Component Analysis. I. Introduction In the recent years, the research based on face recognition has been significantly increased. Research works have focused on factors like illumination, pose, identity, facial expression, hair style, aging, make-up, scale etc [1, 2]. Out of these factors the main problems are illumination and pose. Disadvantage of illumination is computational cost. Storing large number of views of each image is a difficult task. Varying illumination and pose normalization is the challenging problem. Variations between the images of the same face due to illumination are almost always larger than the image variations due to change in face identity [3]. So, it is difficult for the computer to do the face recognition when the input images and gallery images are different. And in recent years SVM classifier is used often because it gives superior recognition rate compared to other classifiers. SVM is mainly designed for binary decision problems. Multi-class SVM is used to solve the pose estimation problem.Decomposing the multi-class problems into several two-class problems is the popular method of using multi-class SVM [7]. In the proposed system the modification is done using two stages, training section and testing section. In the training section, the database is trained using Affine Transformation and DCT. In the testing section the image of the person to be recognized is given as input. Pose estimation is calculated by using Multi Class SVM algorithm [7]. The input may or may not have the pose and illumination variation. However the normalized image of the person is obtained using Affine Transformation [4][11][13] and DCT [5][10][13] techniques subsequently used for the dimension reduction and feature vector. The recognition is done by PCA algorithm [6] [14] to get the good accuracy. The proposed system is given in section 2. The proposed approaches are presented in Section 3.Section 4 includes experimental result and conclusion is given in section 5. Finally, the acknowledgement is given in section 6. II. System Overview Fig. 1: The samples from the database
  • 2. A Novel Based Approach For Pose Estimation And Normalization Using Multi-Class Svm And Affine.. DOI: 10.9790/0661-1804014348 www.iosrjournals.org 44 | Page Fig. 2: Process of proposed system In the proposed system face images of a single person with different pose are taken. The face samples for normalization and illumination are shown in Fig. 1. The goal is to normalize the pose using Affine Transformation and remove the illumination using DCT are done first. The system overview is shown in Fig. 2. At first the pose estimation is carried out by Multi-Class SVM method. Then normalization is done using Affine transformation to a non-frontal image. And illumination removal method is done using DCT algorithm [12]. Once the normalization technique is applied, all the images of different class are normalized to the frontal view. All classes of images are normalized to the same image size and the same distance between two eyes. The precise locations of irises can be got by the region growing search method [8]. Then illumination effect is removed. Once these two processes are completed an image is given for recognition. Face recognition process is done using PCA algorithm. Success result is then shown. In order to get the good accuracy and decrease the computation cost these algorithms are used. III. Algorithms Used 3.1 Support Vector Machine for pose estimation The support vector machine is originally a binary classification method [15] [16]. There are varieties of techniques used for the classification in SVM. They are One-against-all (OvA) and One-against-one (OvO). Consider there are many images which are arranged in a binary tree structure [17]. A SVM in each node (i.e. images) of the tree is trained using two of the classes. The algorithm then employs to measure the similarity between the remaining samples and two classes used for training. All samples in the node are assigned to the two sub nodes derived from the previously selected classes by similarity. This step repeats at every node until each node contains only samples from one class. The main problem is the training time which decreases the performance. An example of SVM that solves a 7 - class pattern recognition problem utilizing a binary tree, in which each node makes binary decision using a SVM, is shown on Fig. 3. The hierarchy of binary decision subtasks should be carefully designed before the training of each SVM classifier. Fig. 3: Illustration of SVM binary tree. The SVM method that proposed is based on recursively dividing the classes in two disjoint groups in every node of the decision tree and training a SVM that will decide in which of the groups the incoming unknown sample should be assigned. The groups are determined by a clustering algorithm according to their
  • 3. A Novel Based Approach For Pose Estimation And Normalization Using Multi-Class Svm And Affine.. DOI: 10.9790/0661-1804014348 www.iosrjournals.org 45 | Page class membership. For the training set (x1, y1) ... (xn, yn)with labels yi in [1ā€¦k], it finds the solution of the following optimization problem during training. 3.2 Affine Transformation for pose normalization A function between affine spaces which preserves points, straight lines and planes is called as affine transformation. It is a combination of translation and linear map. Affine Transformation in two dimensional includes translation, scaling, rotation, shear mapping. The method can be describes as follows, face region is divided into three rectangles. Comparison between original image and specific pose are calculated. The normalized face image in some pose can be geometrically warped into the frontal pose. Having the virtual frontal pose view, then the DCT algorithm can be used to remove the illumination effect of an image. The formula description is given below; 1) Two rectangleā€™s 8 vertices are given (Rl, Ro) under left pose and original front pose. 2) For the 4 vertices (ui,vi) i= 1,2,3,4 in Ro, after the transformation, corresponding 4 vertices are obtained (ui ' , vi ' ) i=1,2,3,4. 3) Letā€™s use Xo, A, Xl denote the three matrices and together it is written as; Xo . A = Xl So the parameter can be calculated by; A = Xo-1 .Xl 4) Using there parameters, virtual frontal view is obtained. For each point (u, v) u=in the frontal view, first rectangle is determined, then two parameters are decided and mapping of an image is done. Define (u', v') as the transformed value (u, v) and expressed as, uā€² = ao + a1 . u š‘£ā€² = š‘£ Let š‘¢1 = š‘–š‘›š‘”(š‘¢ā€²) š‘£1 = š‘£ā€² and du = u' ā€“ int(u') So, f(u, v) can be written as, f(u, v) = (1-du).f'(u1,v1)+du.f'(u1+1.v1), where f(u, v) is given to frontal view and f'(u,v) is a value given to non-frontal view. 3.3 Discrete Cosine Transformation for illumination removal DCT was categorized into four slightly different transformations named DCT-I, DCT-II, DCT-III, and DCT-IV [9]. The DCT is generally used in image processing and signal, mainly for lossy compression, because it has a steady energy compaction property. DCT will take the input, it does partition based on the co-efficient. After obtaining the coefficients, low frequency and high-frequency are separately modified to remove the illumination effect. After the removal of illumination effect details of the images are highlighted. The modified coefficients are used in order to reconstruct the new image via inverse discrete cosine transform. The reconstructed image is used for recognition process. The 2D DCT of x matrixis defined as follows; Where N is the length if the matrix x and x,y are the same size. 3.4 Principal Component Analysis for face recognition Principal component analysis (PCA) is a statistical conversion process using orthogonal transform. It is possible to display a set of related variables. It is non-correlated linearly to set the value of the variable so-called
  • 4. A Novel Based Approach For Pose Estimation And Normalization Using Multi-Class Svm And Affine.. DOI: 10.9790/0661-1804014348 www.iosrjournals.org 46 | Page principal component. Uncorrelated orthogonal basis set are obtained as resulting vector. The PCA algorithm extracts the face features, and reduces the dimensionality of input space. Variations between the images are seen due to the variations of pose and illumination. So the recognition rate obtained is very high which provides good accuracy. Fig. 4 shows the face recognition system. "Face Recognition" generally involves two stages: 1. Face Detection: where a photo is searched to find any face, then image processing cleans up the facial image for easier recognition. 2. Face recognition: where that detected and processed face is compared to a database of known faces, to decide who that person. Fig. 4: Face recognition system PCA has been extensively employed for face recognition algorithms. It not only reduces the dimensionality of the image, but also retains some of the variations in the image data. Face image onto a feature space that spans the significant variations. The significant features are known as eigenvectors (principle component) of the set of faces they do not necessarily correspond to the features such as eyes, ears and noses. So to recognize a particular face it is necessary only to compare these weights to those individuals. IV. Experimental Analysis The proposed Video face recognition system is implemented in MATALB platform and it is evaluated using the dataset of FERET Face Database. All face images are normalized according to the different criterions associated with different pose classes. All the frames in the database are masked. Fig. 5 represents the sample frames set for normalization process and the Fig. 6 represents the sample frames set for lamination variant process. Fig. 5: Sample frameset for normalization process Fig. 6: Sample frameset for illumination variant process In the normalization process the normalized frames are obtained by Affine Transformation method and in the illumination invariant process the removal of illumination effect images are obtained by DCT. Fig. 7
  • 5. A Novel Based Approach For Pose Estimation And Normalization Using Multi-Class Svm And Affine.. DOI: 10.9790/0661-1804014348 www.iosrjournals.org 47 | Page represents the normalized image after normalization process and Fig. 8 represents the illumination removal image after illumination invariant process subsequently, obtained normalized images are subjected to face recognition using PCA. Fig. 6: Normalized face images after Affine Transformation Fig. 6: Illumination effect removal after DCT V. Conclusion The pose normalization algorithm based on the statistical transformation is presented in this paper. The proposed algorithm can solve the pose-invariant face recognition problem, especially when face rotation angle is less than 30 degree. Experiments show that the method has a good performance for normalize the non-frontal face images, and can dramatically increase the recognition rate with a very low time complexity. The results of the pose estimation show that the speed of training and testing are improved, while keeping comparable or offering better recognition rates than the other SVM multi-class methods. The experiments showed that this method becomes more favourable as the number of classes in the recognition problem increases.The deal with the illumination problem to make face recognition robust to illumination variations is given in this paper. This method is based on the modification of discrete cosine transform coefficients. The experimental results show that 100% face recognition rate was achieved on FERET Datasets. Then PCA method is used for face recognition process. Facial features are extracted by the PCA method, which reduces the dimensionality of the original face images while preserving some discriminating features within the training images. After performing the PCA, structural information is acquired corresponding to each person from lower dimensional training images. The experimental results obtained on both the face databases are found to be quite promising and better than some of the PCA-based methods reported earlier. Acknowledgments Dedicating the paper work to my esteemed guide;Associate Professor, Mr Shreekumar T, whose interest and guidance helped in the completion of the work successfully and also extending the gratitude to Prof. Dr Nagesh H R (H.O.D Computer Science and Engineering Department) who has facilitated exploring the subject with more enthusiasm. References [1]. Wu-Jun Li, Chong-Jun Wang, Dian-Xiang Xu and Shi-Fu Chen, "Illumination Invariant Face Recognition Based on Neural Network Ensemble", In Proceedings of 16th IEEE International Conference on Tools with Artificial Intelligence, pp. 486-490, November 2004. [2]. Majumdar and Ward, "Pseudo-Fisher face Method for Single Image Per Person Face Recognition", In Proceedings of IEEEInternational Conference on Acoustics, Speech and Signal Processing, Las Vegas, NV, pp. 989-992, 2008. [3]. D. Beymer and T. Poggio. Face Recognition From One [4]. Example View. ICCV, Boston, MA, pp. 500-507, 1995 [5]. Xiujuan Chai1, Shiguang Shan, Wen Gao, ā€œPose normalization for robust face recognition using Statistical Affine Transformationā€, In proceeding of ICICS- PCM 2003, 15-18 Dec 2003, Singapore. [6]. Shan Du, Mohamed Shehata, WalBadawy, ā€œA novel algorithm for illumination invariant DCT- based face recognitionā€, IN proceeding with 25th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), 2012. [7]. S. Thakur, J. K. Sing, D. K. Basu, M. Nasipuri, M. Kundu, ā€œFace recognition using principal component analysis and RBF- Neural networkā€. IJSSST, Vol. 10, No. 5. [8]. GjorgjiMadzarov, DejanGjorgjevikj and Ivan Chorbev, ā€œA Multi-class SVM Classifier Utilizing Binary Decision Treeā€, Informatica 33 (2009) 233-241 233. [9]. B. Cao, S. Shan,W. Gao. Localizing the iris center by region growing search. Proceeding of the ICME2002.
  • 6. A Novel Based Approach For Pose Estimation And Normalization Using Multi-Class Svm And Affine.. DOI: 10.9790/0661-1804014348 www.iosrjournals.org 48 | Page [10]. Z. Wang, ā€œFast algorithms for the discrete W transform and for the discrete Fourier transform,ā€ IEEE Trans. On Acoustic, Speech, and Signal Processing, vol. 32, pp. 803-816, 1984. [11]. Shreekumar T and Nagaratna P. Hegde, ā€œAN APPROACH TO POSE AND ILLUMINATION INVARIANT FACE RECOGNITION IN VIDEOā€, International Journal of Image Processing and Applications, 2(1), 2011, pp. 93-100. [12]. Shreekumar T, Karunakara K, ā€œParticle Swam Optimization Based Identification of Face Images from Videoā€, International Journal of Advanced Computational Engineering and Networking, ISSN: 2320-2106, Volume-4, Issue-2, Feb.-2016. [13]. Shreekumar T, Dr. NagaratnaHegde, ā€œA New Method For Face Recognition From Video Sequence Using DCT and LLRā€, Internal journal of System, algorithms & application, Volume 2, Issue ICRAET12, May 2012, ISSN Online: 2277-2677. [14]. Mahesh Prasanna K, NagaratnaHegde, ā€œA Fast Recognition Method for Pose and Illumination Variant Faces on Video Sequencesā€, IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 10, Issue 1 (Mar. - Apr. 2013), PP 08-18 www.iosrjournals.org. [15]. Amith G K, Shreekumar T, ā€œA Novel Approach for Blurred and Noisy Face Image Recognitionā€, International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064. [16]. V. Vapnik. The Nature of Statistical Learning Theory, 2nd Ed. Springer, New York, 1999. [17]. C. J. C. Burges. A tutorial on support vector machine for pattern recognition. Data Min. Knowl. Disc. 2 (1998) 121. [18]. B. Fei, J. Liu. Binary Tree of SVM: A New Fast Multiclass Training and Classification Algorithm. IEEE Transaction on neural networks, Vol. 17, No. 3, May 2006.