SlideShare a Scribd company logo
1 of 8
Download to read offline
TELKOMNIKA, Vol. 16, No. 2, April 2018, pp. 739 ∼ 746
ISSN: 1693-6930, accredited A by DIKTI, Decree No: 58/DIKTI/Kep/2013
DOI: 10.12928/telkomnika.v16.i2.7418 739
Real Time Face Recognition Based on Face
Descriptor and Its Application
I Gede Pasek Suta Wijaya* , Ario Yudo Husodo , and I Wayan Agus Arimbawa
Department of Informatics Engineering, Engineering Faculty, Mataram University
Jl. Majapahit 62 Mataram, Lombok, Indonesia
*Corresponding Author, email: gpsutawijaya@unram.ac.id, ario@ti.ftunram.ac.id, arimbawa@unram.ac.id
Abstract
This paper presents a real time face recognition based on face descriptor and its application for door
locking. The face descriptor is represented by both local and global information. The local information, which
is the dominant frequency content of sub-face, is extracted by zoned discrete cosine transforms (DCT). While
the global information, which also is the dominant frequency content and shape information of the whole face,
is extracted by DCT and by Hu-moment. Therefore, face descriptor has rich information about a face image
which tends to provide good performance for real time face recognition. To decrease the dimensional size of
face descriptor, the predictive linear discriminant analysis (PDLDA) is employed and the face classification
is done by kNN. The experimental results show that the proposed real time face recognition provides good
performances which indicated by 98.30%, 21.99%, and 1.8% of accuracy, FPR, and FNR respectively. In
addition, it also needs short computational time (1 second).
Keyword: face recognition, real time, LDA, face descriptor, face classification
Copyright c 2018 Universitas Ahmad Dahlan. All rights reserved.
1. Introduction
This paper presents an application of real time face recognition based on face descriptor
for door locking system. The face descriptor is the dominant frequency content of sub-face (local)
and whole face (global). The face descriptor is extracted by zoned DCT, non-zoned DCT, and
Hu-moment. The main aim of DCT coefficients based face descriptor is to get rich information of
face image which can give better achievement than that of compact features (CF) based method
[1] for real time face recognition. The predictive linear discriminant analysis (PDLDA) is hired to
drop-off the dimensional size of the descriptor and the k nearest neighborhood (kNN) is utilized for
verification. The main aim of this work is to obtain strong face recognition against lighting variation
which can be applied to the security system, i.e. door locking system which is an extended version
of our previous work[2].
Face recognition has been widely developed by many researchers[3], such as statistical-
based (ICA, PCA, and naive Bayesian), global features-based, artificial intelligent-based (i.e.,
genetic algorithm, artificial neural network, SVM and etc,) and any their variations-based [1, 2]
face recognition algorithms. The most popular algorithm is face recognition based on subspace
projection: LDA, eigenface (PCA), and their variations [4, 5]. The LDA and their variation become
popular due to its simple implementation and less computation complexity. In addition, their dis-
crimination power is higher than that of the PCA, which make the performance of LDA and their
variation be better than PCA.
Discrete cosine transform (DCT) based face recognition [6] has been reported that it pro-
vided good performance compared to other approaches. Both PCA and LDA is possible to be
directly executed on images in JPEG standard format unaccompanied by performing inverse DCT
transform because they can work in DCT domain. The DCT-based system requires certain nor-
malization techniques to overcome variations in facial geometry and illumination. However, both
approaches extracted the face features using only block-based DCT. The face recognition method
using selection DCT coefficients from 75% to 100% DCT and setting the high frequency to zero
has been proposed to handle illumination problem[6]. However, it needs high computational time
Received September 28, 2017; Revised December 21, 2017 ; Accepted January 18, 2018
740 ISSN: 1693-6930
because inverse DCT transforms and Contrast Limited Adaptive Histogram Equalization (CLAHE)
is mandatory to obtain an illumination invariant face image.
Regarding real time face recognition algorithms[7, 8], mostly the eigenface (PCA) has
been successfully implemented. However, the PCA is lack of discriminant power, which make
the system be lack of accuracy. In addition, the combination of compact features (CF) and LDA
projection has been applied for real time face recognition[1]. The CF vector was extracted by LBP
and zoned DCT, while the classification was performed by nearest neighbor rules. The LDA was
employed for dimensional reduction of CF vector.
Therefore, alternative real time face recognition using DCT coefficients based face de-
scriptor which consists of dominant frequency content extracted by discrete cosine transforms
(DCT), local features extracted by zone DCT (block-based DCT) and shape information extracted
by Hu-moment. The DCT coefficients based face descriptor tends to improve the performance of
CF based face recognition because it has rich information.
2. Proposed Method
In this research, there are two main modules: face recognition engine and its implemen-
tation for a door-locking system. The face recognition engine principally has three subsystems:
face detection, feature extraction, recognition and verification rules, as shown in Fig. 1(a). While
the door-locking system consists of a face recognition engine and solenoid control circuit, as
presented in Fig. 1(b).
2.1. Proposed Face Recognition Engine
The mechanism of face recognition and verification can be described as follows:
1. Suppose, the training set is given to the recognition engine for finding out machine param-
eters and guiding the engine to be intelligent. Furthermore, face image descriptors that are
Fig. 1. Face recognition and verification process.
4.1 Face Detection
The face detection is one important modul in real time face recognition especially on
application of face recognition for electronics key. In this research, the haar-like based
face detection provided by provided by openCV library is implemented for face
detection. This algorithm has been reported than provide robust performance among the
other’s algorithm [19]. The face detection modul starts face localization for defining
Face signature
Face Descriptor
Extraction
Face Descriptor
Dimensional
Reduction
Electronic Keys
Verification Process
Using Metrics and kNN
Rule
Query Image Registered Images
Face Detection and
Normalization
Face Detection and
Normalization
ID and Registered
Key
(a)
Face Detection &
Features Extraction
Module
Solenoid Key
Control Module
Detect Face Close/Open
Key SignalControl
Instruction
Face Detection Unit Solenoid Control Unit
(b)
Figure 1. Diagram blocks: (a) face recognition engine[2] and (b) door-locking based on face
image.
TELKOMNIKA Vol. 16, No. 2, April 2018 : 739 ∼ 746
TELKOMNIKA ISSN: 1693-6930 741
extracted during the training process are stored in the database as registered face signa-
tures. The face image descriptor is extracted by using a fast zoned and non-zoned DCT, and
Hu-moment, then selected a small part of transformation coefficient having greatest magni-
tude. Then the chosen coefficients are quantized for sharpening the key features called as
face signature.
2. In the recognition process, the query face signature is extracted by using a similar technique
to the training process. Next, the similarity score is determined by matching query face
signature and registered face signatures. In this case, the smallest score is concluded as
the best likeness.
3. In the verification process, the kNN is hired to find the highest probability of query face
signature, which is close to the registered face signature. If the probability of query face
signature, which is close registered face signature of class B, the input query is verified as
class A. The kNN is chosen because it could give good performance (91.5% of recognition
rate and 2.66 seconds of computational time) for face recognition in small and compact
devices(ARM processor)[9].
2.1.1. Face Acquisition
Face image acquisition is done by using a standard USB camera. Next, histogram equal-
ization is utilized to decrease the effect of lighting condition during face acquisition. Finally, the
Haar-like based face detection[10], which has been widely examined and provide robust perfor-
mance among the others algorithm, is employed for face detection. Simply, the face detection
algorithm starts from face localization to define a region of interest (ROI) of face, and then from
the detected face ROI is confirmed by detecting the two eyes inside the ROI, finally the firmed
face ROI is cropped and passed to face recognition engine for further process on real time face
recognition. The illustration of face detection is presented in Fig. 2.
face the region of interest (ROI). The face ROI will be confirmed by detecting the two
eyes coordinates that existing inside the face ROI. Finally, the firmed face ROI is
cropped and saved for further process in real time face recognition. The illustration of
face detection is shown in Fig, 3. Based on our real-time experimental results, Haar-
likes face detection provides robust enough performances against the large illumination
variations and requires short time processing.
(a) (b) (c)
Fig. 2. Face detection processes: (a) face localization, (b) eyes detection, (c) cropping face.
4.2 Feature Extraction
In this research, a new approach to face features which is defined based one Different of
Gaussian (DoG). The DoG itself is implemented for finding out interesting key points in
the image can be implemented for illumination normalization because it work looks like
low-pass filtering. The DoG of image can be extracted using the illustration as shown in
Fig 3.
Fig. 3. The DoG extarction procedure[10].
This procedure works fast and efficient because it replaces a computationally intensive
of Laplacian of Gaussian process with a simple subtraction. Therefore, the DoG of
images is approximately the same as the Laplacian of Gaussian.
Figure 2. Face detection algorithms: (a) face localization, (b) eyes detection, (c) cropping face
2.1.2. Face Descriptor Extraction
In this paper, the face descriptor extraction process is shown by using diagram block in
Fig. 3. The filtering and contrast stretching are also employed to eliminate the lighting variation
effect during face capturing. In detail, the face descriptor extraction is done by using some steps
as follows:
1. Performing the local binary pattern (LBP) and followed by performing none-zone DCT (on
entire image) to obtain the global information of face image. LBP and its variation have
been successfully implemented for face recognition[11]. In this case, small part (less than
64) coefficients are selected as global information. The LBP is implemented to get robust
global information of face image against illuminations.
2. Performing zone DCT (as performed on JPEG compression) to obtain local features of the
face image, as shown in Fig. 4. In this case, less than four coefficients are selected from
Real Time Face Recognition Based on Face Descriptor ... (I Gede Pasek Suta Wijaya)
742 ISSN: 1693-6930
Feature Extraction
Normaliza
tion
LBP
Zone DCT
Shape
Analysis
U
Non-Zone
DCT
Figure 3. Face descriptor extraction processes
Feature Extraction
Normaliza
tion
LBP
Zone DCT
Shape
Analysis
U
Non-Zone
DCT
0 50 100 150 200 250
-2
0
2
4
6
8
10
12
Normalized
Face
Zone
DCT
Selected
coefficients
Figure 4. Local features extraction processes
each zone as local features. The local features represent specific information of sub face
image which is available in some low frequency components.
3. Performing the shape analysis using Hu-moment to get shape information of face image. In
this case, only four moments (first-fourth) is considered because the fifth-seventh moment’s
values are close to zero. It means that shape information is not available in the fifth-seventh
moments.
4. Finally, combining the global information, local features, and shape information to get rich
face descriptor.
In this work, the face descriptor is represented by the dominant frequency content of
whole and sub face images. The local features represent the most information of key point.
Similar to SIFT features, this face descriptor is rich of information which tends lighting invariant
because the lighting variation has been decreased by filtering and contrast stretching.
2.1.3. Dimensional Reductions
In this paper, the predictive LDA (PDLDA[1]) algorithm is hired to drop-off face descriptor
size. The PDLDA is similar to LDA which define optimum projection matrix, W, by eigen analysis
of the between class scatter, Sb, and the with-in class scatter, Sw[1, 4]. The W has to satisfy the
Eq. 1.
JLDA(W) = arg max
W
| WT
SbW |
| WT SwW |
(1)
This algorithm has been established that can avoid the retraining problem of LDA. It can
be done by redefining the Sb and the Sw using global mean, µa. It means the µa is estimated by
calculating it from l sub-sample data that is randomly selected from a given data set.
Finally, the dimensional reduction is done by Eq. 2.
yk
i = WT
xk
i (2)
where yk
i is projected face descriptor and xk
i is an input face descriptor. By using this
concept, the input face descriptor can be decreased more than 50% of original size.
2.2. Door-Locking System
The door locking hardware system consists of five subsystems named: Raspberry mod-
ule, a set of output power gain system, a server, a network switch, and a door solenoid system.
The Raspberry module is used to control the door solenoid to locked or unlocked depending on
the output status given by the software recognition system in the server. The server provides
a logic condition 1 (refers to unlocked) or 0 (refers to locked). This logic condition wrote in a file
which can be accessed through the network. A web server is installed on the server to provide this
feature. A network switch is used to connect the server and the Raspberry through the computer
network.
TELKOMNIKA Vol. 16, No. 2, April 2018 : 739 ∼ 746
TELKOMNIKA ISSN: 1693-6930 743
The Raspberry initial mode firstly sets to 0 which will lock the door solenoid. The Rasp-
berry continuously checks the server output condition through the network. If the server status
is different from the initial status, then the Raspberry processes the program to command the
solenoid. The server status will drive the program to control solenoid either lock or unlock. The
latest status, then used as the initial status, and the checking processes will continue.
The Raspberry uses servers logic output condition as an input and a Raspberry GPIO
(general purpose input output) pin as an output. This Raspberry GPIO output status is used as
an input by the door solenoid as a command to lock or unlock the door. Since the solenoid input
voltage requirement is 12VDC and the Raspberry GPIO output voltage is 3.3VDC then a relay
is needed to drive the solenoid. The relay has a minimum 5V input, which is higher than the
Raspberry GPIO output (3.3V) as well as the current. To drives the relay, Raspberry will need a
simple power gain system. A simple power gain system can be built using a transistor and some
resistors as shown in the Fig 5.
Figure 5. Circuits of door locking hardware system
3. Experiments and Result Discussions
Both off-line and real time experiments were carried out to know the performance of face
recognition engine based on face descriptor (FD). four well known face datasets: ORL[1, 12],
Image Media Laboratory Kumamoto University (ITS) [1, 4], and India (IND)[4], and Yale B[13]
were chosen for doing off-line experiments. The ORL dataset has 400 grayscale faces that were
taken from 40 persons. Face variations example of the ORL dataset is presented in Fig. 6(a)[1].
ITS face database belongs to Image Media Laboratory Kumamoto University, which is an ethnic
East Asia face image, especially Japan and Chinese. ITS has 90 samples and each sample has
(a) ORL dataset [12] (b) ITS dataset[4]
(c) IND face dataset[2]
Feature Extraction
(a) Sub-Set 1 (S1) (b) Sub-Set 2 (S2)
(c) Sub set 3 (S3) (d) Sub Set 4 (S4)
Staff TI
1
st
Day
2
nd
Day
3
rd
Day
4
th
Day
5th Day
(d) Yale B[13]
Figure 6. The example of face variations of tested datasets.
Real Time Face Recognition Based on Face Descriptor ... (I Gede Pasek Suta Wijaya)
744 ISSN: 1693-6930
10 to 15 face variations. Examples of face variations of the ITS face database can be presented
in Fig. 6(b)[1]. Thirdly, India dataset is color face image dataset which has 61 persons (22 female
and 39 male). Thee are eleven pose variations as presented in Fig. 6(c). Some facial emotions
are also included in this dataset such as smile, disgust, neutral, and laugh[4]. The Yele B dataset
is divided into four sets, as shown in Fig. 6(d). In this case, the sub-set 1 was chosen as training
and the remaining sub-sets were selected as testing.
In addition, the off-line experiments were carried out by under conditions: firstly, 50%
faces of each dataset were arbitrarily elected for training data and leftover part was chosen as
querying images; secondly 10-Fold cross-validation was enforced for performance evaluation;
finally, recognition rate and computational time were utilized as a performance indicator.
98.31
92.75
82.11
99.14
98.35
92.66
80
85
90
95
100
ITS ORL IND
RecognitionRate(%)
Face Databases
CF FD
100
75.60
12.55
100
89.89
16.54
10
20
30
40
50
60
70
80
90
100
S1 vs. S2 S1 vs. S3 S1 vs. S4
RecognitionRate(%)
Yale G Database
CF FD
(a) On ORL, ITS, and IND datasets
98.31
92.75
82.11
99.14
98.35
92.66
80
85
90
95
100
ITS ORL IND
RecognitionRate(%)
Face Databases
CF FD
100
75.60
12.55
100
89.89
16.54
10
20
30
40
50
60
70
80
90
100
S1 vs. S2 S1 vs. S3 S1 vs. S4
RecognitionRate(%)
Yale G Database
CF FD
(b) Yale B dataset
Figure 7. Off-line performances of our face recognition compared to baseline (CF based
method[1]) on tested datasets.
The experimental results (see Fig. 7) show that face recognition engine based on FD
gives better performance than those baseline methods (compact features (CF) based face recognition[1].
In average, the FD based face recognition engine provides by about 96.72% of recognition rate on
ORL, ITS, and IND datasets (see Fig. 7(a)). In other words, FD based face recognition engine can
improve by about 5.66% the performance of CF based face recognition[1]. It can be achieved by
our face descriptor that has rich information which is formed by global information, local features,
and shape information. The global and local information is represented by some low frequency
components of whole and sub-face images. This achievement is in line with the basic theory of
signal processing that the most signal information is located in the low-frequency element.
In terms of robustness of FD to any variations of lighting condition compared with the CF
method, the FD based method gives better performance than CF (see Fig. 7(b)). It proves that the
FD has rich information which robust to lighting invariant due to filtering and contrast stretching
before the extraction.
Regarding execution time, the FD based face recognition engine takes less than 1 second
in average for performing the matching between querying face descriptor among the registered
face descriptors of all tested datasets. It can be achieved because the face descriptor is repre-
sented by 32 elements of original size face images (128x128 pixels). From off-line experimental
data, the proposed face recognition engine is potential to be used for electronic keys for door
locking system.
In the real time experiments, the system was tested using large variability face images in
terms of pose and capturing time. In this case, 1002 face images have been collected by using
web camera Logitech C300 (1.3 MP (1280 x 1024)) from 13 persons of the staff on Informatics
Engineering Dept., Engineering Faculty, Mataram University, in fifth days. From this dataset, 159
face images captured on the first day (almost 11 images for each person) were used as the
training and 843 faces were prepared for testing. Examples of faces variation are shown in Fig. 8.
The parameters for real time evaluation of face recognition engine were accuracy, False
Positive Rate (FPR), False Negative Rate (FNR), and computational time. The evaluation results
affirm that the proposed face recognition engine using face descriptor has performed properly,
TELKOMNIKA Vol. 16, No. 2, April 2018 : 739 ∼ 746
TELKOMNIKA ISSN: 1693-6930 745
(a)Sub-Set 1 (S1) (b)Sub-Set 2 (S2)
(c) Sub set 3 (S3) (d)Sub Set 4 (S4)
Staff TI
1
st
Day
2
nd
Day
3
rd
Day
4
th
Day
5
th
Day
Staff TI
1
st
Day
2
nd
Day
3
rd
Day
4
th
Day
5
th
Day
Figure 8. Example of face images variations for real time evaluation.
97.96
25.03
2.20
98.46
17.66
1.67
0
20
40
60
80
100
120
Accuracy FNR FPR
Rate(%)
Evaluation Parameters
CF FD
(a) Acuracy, FNR, and FPR
74.97
73.50
82.34 81.45
40
50
60
70
80
90
Sensitivity Precission
Rate(%)
Evaluation Parameters
CF FD
(b) Sensitivity and precision
Figure 9. Performance of real time experiments.
which is indicated by more than 98% of accuracy and less than 2% and 18% of FPR and FNR,
respectively (see Fig. 9(a)). These performances can be achieved because the developed recog-
nition engine using the face descriptor of the DCT and sub-space analysis provides well data
separation. Compared to the performance of CF based face recognition, our proposed method
significantly decreases the FNR by about 7.37% and in another side, it is not much increase and
decrease the accuracy and FPR, as presented in Fig. 9(a).
The FD based face recognition engine also improves significantly sensitivity and precision
of CF based face recognition by about 7.37% and 7.95% respectively, as shown in Fig. 9(b). It
also affirms that our proposed method can handle the false negative problem of the baseline
method (the correct person is falsely recognized as others). Overall, the real time performances
confirm the off-line achievements which can improve the baseline performances.
The last experiment was carried out to know the performance of FD based face recog-
nition engine for door locking system which was done by the staff of Informatics Engineering
Dept., Engineering Faculty, Mataram University, in one week. The door locking system can work
properly, which is shown by the accuracy, FPR, and FNR by about 98.30%, 21.99%, and 1.8%,
respectively. The last result also re-affirm that the FD is powerful for real time face recognition
engine.
4. Conclusion and Future Work
The real time FD based face recognition engine gives better performances than those of
baseline (CF). From the Off-line evaluations, it provides high recognition rate (average more than
96%) for all tested datasets, while the real time experimental data provide high accuracy (more
than 98%) and less false verification rate (by about 17.66% of false negative and 1.67% of false
positive rate). Regarding the computational time, the proposed electronics key simulator needs
less than 1 second for the matching process. In addition, the application of FD face recognition
engine for the door-locking system also works properly, which is indicated by 98.30%, 21.99%,
and 1.8% of accuracy, FPR, and FNR respectively.
The door-locking system based on face image has to be evaluated in large size dataset
Real Time Face Recognition Based on Face Descriptor ... (I Gede Pasek Suta Wijaya)
746 ISSN: 1693-6930
to know its robust performance against the large variability of face images in pose, lighting, and
accessories. In addition, the proposed system still needs to be improved by adding some illu-
mination compensation, such as Contrast Limited Adaptive Histogram Equalization (CLAHE) to
decrease the false negative recognition.
Acknowledgment
We would like to send our great appreciation to the staff of informatics Engineering Dept.
on their participation in the evaluation of this system. In addition, our great honor is also to The
Minister of Research and Higher Education Republic of Indonesia for research funding under
scheme competitive research grant 2015-2016.
References
[1] I. G. P. S. Wijaya, A. Y. Husodo, and A. H. Jatmika, “Real time face recognition engine using
compact features for electronics key,” in International Seminar on Intelligent Technology and
Its Applications (ISITIA), Lombok, Indonesia, July 2016.
[2] I. G. P. S. Wijaya, A. Y. Husodo, and I. W. A. Arimbawa, “Real time face recognition using
dct coefficients face descriptory,” in International Conference on Informatics and Computing
(ICIC 2016), Lombok, Indonesia, October 2016.
[3] R. Chellappa, C. L. Wilson, and S. Sirohey, “Human and machine recognition of faces: a
survey,” Proceedings of the IEEE, vol. 83, no. 5, pp. 705–741, May 1995.
[4] I. G. P. S. Wijaya, K. Uchimura, and G. Koutakii, “Face recognition based on incremental
predictive linear discriminant analysis,” IEEJ Transactions on Electronics, Information and
Systems, vol. 133, no. 1, pp. 74–83, 8 2013.
[5] J. Zhang and D. Scholten, “A face recognition algorithm based on improved contourlet
transform and principle component analysis,” TELKOMNIKA (Telecommunication Comput-
ing Electronics and Control), vol. 14, no. 2A, pp. 114–119, 2016.
[6] A. Thamizharasi and J. Jayasudha, “An illumination invariant face recognition by selection of
dct coefficients,” International Journal of Image Processing (IJIP), vol. 10, no. 1, p. 14, 2016.
[7] H. H. Lwin, A. S. Khaing, and H. M. Tun, “Automatic door access system using face recog-
nition,” International Journal of Scientific & Technology Research, vol. 4, no. 6, pp. 210–221,
Jun 2016.
[8] M. Baykara and R. Da, “Real time face recognition and tracking system,” in Electronics,
Computer and Computation (ICECCO), 2013 International Conference on, Nov 2013, pp.
159–163.
[9] E. Setiawan and A. Muttaqin, “Implementation of k-nearest neightbors face recognition on
low-power processor,” TELKOMNIKA (Telecommunication Computing Electronics and Con-
trol), vol. 13, no. 3, pp. 949–954, 2015.
[10] P. Viola and M. Jones, “Rapid object detection using a boosted cascade of simple features,”
in Proceedings of the conference on Computer Vision and Pattern Recognition, 2001, pp.
511–518.
[11] S. R. Konda, V. Kumar, and V. Krishna, “Face recognition using multi region prominent lbp
representation,” International Journal of Electrical and Computer Engineering, vol. 6, no. 6,
p. 2781, 2016.
[12] F. S. Samaria and A. C. Harter, “Parameterisation of a stochastic model for human face
identification,” in Applications of Computer Vision, 1994., Proceedings of the Second IEEE
Workshop on. IEEE, 1994, pp. 138–142.
[13] Yale, “The extended yale face database b,” 2001. [Online]. Available:
http://vision.ucsd.edu/ iskwak/ExtYaleDatabase/ExtYaleB.html
TELKOMNIKA Vol. 16, No. 2, April 2018 : 739 ∼ 746

More Related Content

What's hot

Facial Expression Recognition Using SVM Classifier
Facial Expression Recognition Using SVM ClassifierFacial Expression Recognition Using SVM Classifier
Facial Expression Recognition Using SVM Classifier
ijeei-iaes
 

What's hot (20)

An Assimilated Face Recognition System with effective Gender Recognition Rate
An Assimilated Face Recognition System with effective Gender Recognition RateAn Assimilated Face Recognition System with effective Gender Recognition Rate
An Assimilated Face Recognition System with effective Gender Recognition Rate
 
Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters
Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters
Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters
 
IRJET- Analysis of Face Recognition using Docface+ Selfie Matching
IRJET-  	  Analysis of Face Recognition using Docface+ Selfie MatchingIRJET-  	  Analysis of Face Recognition using Docface+ Selfie Matching
IRJET- Analysis of Face Recognition using Docface+ Selfie Matching
 
IRJET- Face Recognition of Criminals for Security using Principal Component A...
IRJET- Face Recognition of Criminals for Security using Principal Component A...IRJET- Face Recognition of Criminals for Security using Principal Component A...
IRJET- Face Recognition of Criminals for Security using Principal Component A...
 
License Plate Recognition using Morphological Operation.
License Plate Recognition using Morphological Operation. License Plate Recognition using Morphological Operation.
License Plate Recognition using Morphological Operation.
 
IRJET- Automatic Identification, Analysis and Investigation of Printed Circui...
IRJET- Automatic Identification, Analysis and Investigation of Printed Circui...IRJET- Automatic Identification, Analysis and Investigation of Printed Circui...
IRJET- Automatic Identification, Analysis and Investigation of Printed Circui...
 
IRJET- Design of an Automated Attendance System using Face Recognition Algorithm
IRJET- Design of an Automated Attendance System using Face Recognition AlgorithmIRJET- Design of an Automated Attendance System using Face Recognition Algorithm
IRJET- Design of an Automated Attendance System using Face Recognition Algorithm
 
Progression in Large Age-Gap Face Verification
Progression in Large Age-Gap Face VerificationProgression in Large Age-Gap Face Verification
Progression in Large Age-Gap Face Verification
 
IRJET- A Review on Face Detection and Expression Recognition
IRJET-  	  A Review on Face Detection and Expression RecognitionIRJET-  	  A Review on Face Detection and Expression Recognition
IRJET- A Review on Face Detection and Expression Recognition
 
IRJET- Optical Character Recognition using Neural Networks by Classification ...
IRJET- Optical Character Recognition using Neural Networks by Classification ...IRJET- Optical Character Recognition using Neural Networks by Classification ...
IRJET- Optical Character Recognition using Neural Networks by Classification ...
 
50220130402003
5022013040200350220130402003
50220130402003
 
IRJET - A Detailed Review of Different Handwriting Recognition Methods
IRJET -  	  A Detailed Review of Different Handwriting Recognition MethodsIRJET -  	  A Detailed Review of Different Handwriting Recognition Methods
IRJET - A Detailed Review of Different Handwriting Recognition Methods
 
Ch 1
Ch 1Ch 1
Ch 1
 
IRJET- Class Attendance using Face Detection and Recognition with OPENCV
IRJET- Class Attendance using Face Detection and Recognition with OPENCVIRJET- Class Attendance using Face Detection and Recognition with OPENCV
IRJET- Class Attendance using Face Detection and Recognition with OPENCV
 
IRJET- Vehicle Seat Vacancy Identification using Image Processing Technique
IRJET- Vehicle Seat Vacancy Identification using Image Processing TechniqueIRJET- Vehicle Seat Vacancy Identification using Image Processing Technique
IRJET- Vehicle Seat Vacancy Identification using Image Processing Technique
 
IRJET- Multiple Feature Fusion for Facial Expression Recognition in Video: Su...
IRJET- Multiple Feature Fusion for Facial Expression Recognition in Video: Su...IRJET- Multiple Feature Fusion for Facial Expression Recognition in Video: Su...
IRJET- Multiple Feature Fusion for Facial Expression Recognition in Video: Su...
 
A novel approach for performance parameter estimation of face recognition bas...
A novel approach for performance parameter estimation of face recognition bas...A novel approach for performance parameter estimation of face recognition bas...
A novel approach for performance parameter estimation of face recognition bas...
 
Ch 2
Ch 2Ch 2
Ch 2
 
Facial Expression Recognition Using SVM Classifier
Facial Expression Recognition Using SVM ClassifierFacial Expression Recognition Using SVM Classifier
Facial Expression Recognition Using SVM Classifier
 
Enhanced Latent Fingerprint Segmentation through Dictionary Based Approach
Enhanced Latent Fingerprint Segmentation through Dictionary Based ApproachEnhanced Latent Fingerprint Segmentation through Dictionary Based Approach
Enhanced Latent Fingerprint Segmentation through Dictionary Based Approach
 

Similar to Real Time Face Recognition Based on Face Descriptor and Its Application

Deep learning for understanding faces
Deep learning for understanding facesDeep learning for understanding faces
Deep learning for understanding faces
sieubebu
 
Real time multi face detection using deep learning
Real time multi face detection using deep learningReal time multi face detection using deep learning
Real time multi face detection using deep learning
Reallykul Kuul
 

Similar to Real Time Face Recognition Based on Face Descriptor and Its Application (20)

Deep learning for understanding faces
Deep learning for understanding facesDeep learning for understanding faces
Deep learning for understanding faces
 
Real time multi face detection using deep learning
Real time multi face detection using deep learningReal time multi face detection using deep learning
Real time multi face detection using deep learning
 
IRJET - A Review on Face Recognition using Deep Learning Algorithm
IRJET -  	  A Review on Face Recognition using Deep Learning AlgorithmIRJET -  	  A Review on Face Recognition using Deep Learning Algorithm
IRJET - A Review on Face Recognition using Deep Learning Algorithm
 
Face recognition using assemble of low frequency of DCT features
Face recognition using assemble of low frequency of DCT featuresFace recognition using assemble of low frequency of DCT features
Face recognition using assemble of low frequency of DCT features
 
A face recognition system using convolutional feature extraction with linear...
A face recognition system using convolutional feature extraction  with linear...A face recognition system using convolutional feature extraction  with linear...
A face recognition system using convolutional feature extraction with linear...
 
IRJET- Smart Classroom Attendance System: Survey
IRJET- Smart Classroom Attendance System: SurveyIRJET- Smart Classroom Attendance System: Survey
IRJET- Smart Classroom Attendance System: Survey
 
Virtual Contact Discovery using Facial Recognition
Virtual Contact Discovery using Facial RecognitionVirtual Contact Discovery using Facial Recognition
Virtual Contact Discovery using Facial Recognition
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Realtime face matching and gender prediction based on deep learning
Realtime face matching and gender prediction based on deep learningRealtime face matching and gender prediction based on deep learning
Realtime face matching and gender prediction based on deep learning
 
A hybrid approach for face recognition using a convolutional neural network c...
A hybrid approach for face recognition using a convolutional neural network c...A hybrid approach for face recognition using a convolutional neural network c...
A hybrid approach for face recognition using a convolutional neural network c...
 
Optimization of deep learning features for age-invariant face recognition
Optimization of deep learning features for age-invariant face recognition Optimization of deep learning features for age-invariant face recognition
Optimization of deep learning features for age-invariant face recognition
 
Research and Development of DSP-Based Face Recognition System for Robotic Reh...
Research and Development of DSP-Based Face Recognition System for Robotic Reh...Research and Development of DSP-Based Face Recognition System for Robotic Reh...
Research and Development of DSP-Based Face Recognition System for Robotic Reh...
 
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDPAN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
AN EFFICIENT FACE RECOGNITION EMPLOYING SVM AND BU-LDP
 
Use of Illumination Invariant Feature Descriptor for Face Recognition
 Use of Illumination Invariant Feature Descriptor for Face Recognition Use of Illumination Invariant Feature Descriptor for Face Recognition
Use of Illumination Invariant Feature Descriptor for Face Recognition
 
184
184184
184
 
IRJET- Credit Card Authentication using Facial Recognition
IRJET-  	  Credit Card Authentication using Facial RecognitionIRJET-  	  Credit Card Authentication using Facial Recognition
IRJET- Credit Card Authentication using Facial Recognition
 
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptxReview A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
 
A comparative review of various approaches for feature extraction in Face rec...
A comparative review of various approaches for feature extraction in Face rec...A comparative review of various approaches for feature extraction in Face rec...
A comparative review of various approaches for feature extraction in Face rec...
 
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...
 
Illumination Invariant Face Recognition System using Local Directional Patter...
Illumination Invariant Face Recognition System using Local Directional Patter...Illumination Invariant Face Recognition System using Local Directional Patter...
Illumination Invariant Face Recognition System using Local Directional Patter...
 

More from TELKOMNIKA JOURNAL

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
TELKOMNIKA JOURNAL
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
TELKOMNIKA JOURNAL
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
TELKOMNIKA JOURNAL
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
TELKOMNIKA JOURNAL
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
TELKOMNIKA JOURNAL
 

More from TELKOMNIKA JOURNAL (20)

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
 

Recently uploaded

Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 

Recently uploaded (20)

Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stage
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptx
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 

Real Time Face Recognition Based on Face Descriptor and Its Application

  • 1. TELKOMNIKA, Vol. 16, No. 2, April 2018, pp. 739 ∼ 746 ISSN: 1693-6930, accredited A by DIKTI, Decree No: 58/DIKTI/Kep/2013 DOI: 10.12928/telkomnika.v16.i2.7418 739 Real Time Face Recognition Based on Face Descriptor and Its Application I Gede Pasek Suta Wijaya* , Ario Yudo Husodo , and I Wayan Agus Arimbawa Department of Informatics Engineering, Engineering Faculty, Mataram University Jl. Majapahit 62 Mataram, Lombok, Indonesia *Corresponding Author, email: gpsutawijaya@unram.ac.id, ario@ti.ftunram.ac.id, arimbawa@unram.ac.id Abstract This paper presents a real time face recognition based on face descriptor and its application for door locking. The face descriptor is represented by both local and global information. The local information, which is the dominant frequency content of sub-face, is extracted by zoned discrete cosine transforms (DCT). While the global information, which also is the dominant frequency content and shape information of the whole face, is extracted by DCT and by Hu-moment. Therefore, face descriptor has rich information about a face image which tends to provide good performance for real time face recognition. To decrease the dimensional size of face descriptor, the predictive linear discriminant analysis (PDLDA) is employed and the face classification is done by kNN. The experimental results show that the proposed real time face recognition provides good performances which indicated by 98.30%, 21.99%, and 1.8% of accuracy, FPR, and FNR respectively. In addition, it also needs short computational time (1 second). Keyword: face recognition, real time, LDA, face descriptor, face classification Copyright c 2018 Universitas Ahmad Dahlan. All rights reserved. 1. Introduction This paper presents an application of real time face recognition based on face descriptor for door locking system. The face descriptor is the dominant frequency content of sub-face (local) and whole face (global). The face descriptor is extracted by zoned DCT, non-zoned DCT, and Hu-moment. The main aim of DCT coefficients based face descriptor is to get rich information of face image which can give better achievement than that of compact features (CF) based method [1] for real time face recognition. The predictive linear discriminant analysis (PDLDA) is hired to drop-off the dimensional size of the descriptor and the k nearest neighborhood (kNN) is utilized for verification. The main aim of this work is to obtain strong face recognition against lighting variation which can be applied to the security system, i.e. door locking system which is an extended version of our previous work[2]. Face recognition has been widely developed by many researchers[3], such as statistical- based (ICA, PCA, and naive Bayesian), global features-based, artificial intelligent-based (i.e., genetic algorithm, artificial neural network, SVM and etc,) and any their variations-based [1, 2] face recognition algorithms. The most popular algorithm is face recognition based on subspace projection: LDA, eigenface (PCA), and their variations [4, 5]. The LDA and their variation become popular due to its simple implementation and less computation complexity. In addition, their dis- crimination power is higher than that of the PCA, which make the performance of LDA and their variation be better than PCA. Discrete cosine transform (DCT) based face recognition [6] has been reported that it pro- vided good performance compared to other approaches. Both PCA and LDA is possible to be directly executed on images in JPEG standard format unaccompanied by performing inverse DCT transform because they can work in DCT domain. The DCT-based system requires certain nor- malization techniques to overcome variations in facial geometry and illumination. However, both approaches extracted the face features using only block-based DCT. The face recognition method using selection DCT coefficients from 75% to 100% DCT and setting the high frequency to zero has been proposed to handle illumination problem[6]. However, it needs high computational time Received September 28, 2017; Revised December 21, 2017 ; Accepted January 18, 2018
  • 2. 740 ISSN: 1693-6930 because inverse DCT transforms and Contrast Limited Adaptive Histogram Equalization (CLAHE) is mandatory to obtain an illumination invariant face image. Regarding real time face recognition algorithms[7, 8], mostly the eigenface (PCA) has been successfully implemented. However, the PCA is lack of discriminant power, which make the system be lack of accuracy. In addition, the combination of compact features (CF) and LDA projection has been applied for real time face recognition[1]. The CF vector was extracted by LBP and zoned DCT, while the classification was performed by nearest neighbor rules. The LDA was employed for dimensional reduction of CF vector. Therefore, alternative real time face recognition using DCT coefficients based face de- scriptor which consists of dominant frequency content extracted by discrete cosine transforms (DCT), local features extracted by zone DCT (block-based DCT) and shape information extracted by Hu-moment. The DCT coefficients based face descriptor tends to improve the performance of CF based face recognition because it has rich information. 2. Proposed Method In this research, there are two main modules: face recognition engine and its implemen- tation for a door-locking system. The face recognition engine principally has three subsystems: face detection, feature extraction, recognition and verification rules, as shown in Fig. 1(a). While the door-locking system consists of a face recognition engine and solenoid control circuit, as presented in Fig. 1(b). 2.1. Proposed Face Recognition Engine The mechanism of face recognition and verification can be described as follows: 1. Suppose, the training set is given to the recognition engine for finding out machine param- eters and guiding the engine to be intelligent. Furthermore, face image descriptors that are Fig. 1. Face recognition and verification process. 4.1 Face Detection The face detection is one important modul in real time face recognition especially on application of face recognition for electronics key. In this research, the haar-like based face detection provided by provided by openCV library is implemented for face detection. This algorithm has been reported than provide robust performance among the other’s algorithm [19]. The face detection modul starts face localization for defining Face signature Face Descriptor Extraction Face Descriptor Dimensional Reduction Electronic Keys Verification Process Using Metrics and kNN Rule Query Image Registered Images Face Detection and Normalization Face Detection and Normalization ID and Registered Key (a) Face Detection & Features Extraction Module Solenoid Key Control Module Detect Face Close/Open Key SignalControl Instruction Face Detection Unit Solenoid Control Unit (b) Figure 1. Diagram blocks: (a) face recognition engine[2] and (b) door-locking based on face image. TELKOMNIKA Vol. 16, No. 2, April 2018 : 739 ∼ 746
  • 3. TELKOMNIKA ISSN: 1693-6930 741 extracted during the training process are stored in the database as registered face signa- tures. The face image descriptor is extracted by using a fast zoned and non-zoned DCT, and Hu-moment, then selected a small part of transformation coefficient having greatest magni- tude. Then the chosen coefficients are quantized for sharpening the key features called as face signature. 2. In the recognition process, the query face signature is extracted by using a similar technique to the training process. Next, the similarity score is determined by matching query face signature and registered face signatures. In this case, the smallest score is concluded as the best likeness. 3. In the verification process, the kNN is hired to find the highest probability of query face signature, which is close to the registered face signature. If the probability of query face signature, which is close registered face signature of class B, the input query is verified as class A. The kNN is chosen because it could give good performance (91.5% of recognition rate and 2.66 seconds of computational time) for face recognition in small and compact devices(ARM processor)[9]. 2.1.1. Face Acquisition Face image acquisition is done by using a standard USB camera. Next, histogram equal- ization is utilized to decrease the effect of lighting condition during face acquisition. Finally, the Haar-like based face detection[10], which has been widely examined and provide robust perfor- mance among the others algorithm, is employed for face detection. Simply, the face detection algorithm starts from face localization to define a region of interest (ROI) of face, and then from the detected face ROI is confirmed by detecting the two eyes inside the ROI, finally the firmed face ROI is cropped and passed to face recognition engine for further process on real time face recognition. The illustration of face detection is presented in Fig. 2. face the region of interest (ROI). The face ROI will be confirmed by detecting the two eyes coordinates that existing inside the face ROI. Finally, the firmed face ROI is cropped and saved for further process in real time face recognition. The illustration of face detection is shown in Fig, 3. Based on our real-time experimental results, Haar- likes face detection provides robust enough performances against the large illumination variations and requires short time processing. (a) (b) (c) Fig. 2. Face detection processes: (a) face localization, (b) eyes detection, (c) cropping face. 4.2 Feature Extraction In this research, a new approach to face features which is defined based one Different of Gaussian (DoG). The DoG itself is implemented for finding out interesting key points in the image can be implemented for illumination normalization because it work looks like low-pass filtering. The DoG of image can be extracted using the illustration as shown in Fig 3. Fig. 3. The DoG extarction procedure[10]. This procedure works fast and efficient because it replaces a computationally intensive of Laplacian of Gaussian process with a simple subtraction. Therefore, the DoG of images is approximately the same as the Laplacian of Gaussian. Figure 2. Face detection algorithms: (a) face localization, (b) eyes detection, (c) cropping face 2.1.2. Face Descriptor Extraction In this paper, the face descriptor extraction process is shown by using diagram block in Fig. 3. The filtering and contrast stretching are also employed to eliminate the lighting variation effect during face capturing. In detail, the face descriptor extraction is done by using some steps as follows: 1. Performing the local binary pattern (LBP) and followed by performing none-zone DCT (on entire image) to obtain the global information of face image. LBP and its variation have been successfully implemented for face recognition[11]. In this case, small part (less than 64) coefficients are selected as global information. The LBP is implemented to get robust global information of face image against illuminations. 2. Performing zone DCT (as performed on JPEG compression) to obtain local features of the face image, as shown in Fig. 4. In this case, less than four coefficients are selected from Real Time Face Recognition Based on Face Descriptor ... (I Gede Pasek Suta Wijaya)
  • 4. 742 ISSN: 1693-6930 Feature Extraction Normaliza tion LBP Zone DCT Shape Analysis U Non-Zone DCT Figure 3. Face descriptor extraction processes Feature Extraction Normaliza tion LBP Zone DCT Shape Analysis U Non-Zone DCT 0 50 100 150 200 250 -2 0 2 4 6 8 10 12 Normalized Face Zone DCT Selected coefficients Figure 4. Local features extraction processes each zone as local features. The local features represent specific information of sub face image which is available in some low frequency components. 3. Performing the shape analysis using Hu-moment to get shape information of face image. In this case, only four moments (first-fourth) is considered because the fifth-seventh moment’s values are close to zero. It means that shape information is not available in the fifth-seventh moments. 4. Finally, combining the global information, local features, and shape information to get rich face descriptor. In this work, the face descriptor is represented by the dominant frequency content of whole and sub face images. The local features represent the most information of key point. Similar to SIFT features, this face descriptor is rich of information which tends lighting invariant because the lighting variation has been decreased by filtering and contrast stretching. 2.1.3. Dimensional Reductions In this paper, the predictive LDA (PDLDA[1]) algorithm is hired to drop-off face descriptor size. The PDLDA is similar to LDA which define optimum projection matrix, W, by eigen analysis of the between class scatter, Sb, and the with-in class scatter, Sw[1, 4]. The W has to satisfy the Eq. 1. JLDA(W) = arg max W | WT SbW | | WT SwW | (1) This algorithm has been established that can avoid the retraining problem of LDA. It can be done by redefining the Sb and the Sw using global mean, µa. It means the µa is estimated by calculating it from l sub-sample data that is randomly selected from a given data set. Finally, the dimensional reduction is done by Eq. 2. yk i = WT xk i (2) where yk i is projected face descriptor and xk i is an input face descriptor. By using this concept, the input face descriptor can be decreased more than 50% of original size. 2.2. Door-Locking System The door locking hardware system consists of five subsystems named: Raspberry mod- ule, a set of output power gain system, a server, a network switch, and a door solenoid system. The Raspberry module is used to control the door solenoid to locked or unlocked depending on the output status given by the software recognition system in the server. The server provides a logic condition 1 (refers to unlocked) or 0 (refers to locked). This logic condition wrote in a file which can be accessed through the network. A web server is installed on the server to provide this feature. A network switch is used to connect the server and the Raspberry through the computer network. TELKOMNIKA Vol. 16, No. 2, April 2018 : 739 ∼ 746
  • 5. TELKOMNIKA ISSN: 1693-6930 743 The Raspberry initial mode firstly sets to 0 which will lock the door solenoid. The Rasp- berry continuously checks the server output condition through the network. If the server status is different from the initial status, then the Raspberry processes the program to command the solenoid. The server status will drive the program to control solenoid either lock or unlock. The latest status, then used as the initial status, and the checking processes will continue. The Raspberry uses servers logic output condition as an input and a Raspberry GPIO (general purpose input output) pin as an output. This Raspberry GPIO output status is used as an input by the door solenoid as a command to lock or unlock the door. Since the solenoid input voltage requirement is 12VDC and the Raspberry GPIO output voltage is 3.3VDC then a relay is needed to drive the solenoid. The relay has a minimum 5V input, which is higher than the Raspberry GPIO output (3.3V) as well as the current. To drives the relay, Raspberry will need a simple power gain system. A simple power gain system can be built using a transistor and some resistors as shown in the Fig 5. Figure 5. Circuits of door locking hardware system 3. Experiments and Result Discussions Both off-line and real time experiments were carried out to know the performance of face recognition engine based on face descriptor (FD). four well known face datasets: ORL[1, 12], Image Media Laboratory Kumamoto University (ITS) [1, 4], and India (IND)[4], and Yale B[13] were chosen for doing off-line experiments. The ORL dataset has 400 grayscale faces that were taken from 40 persons. Face variations example of the ORL dataset is presented in Fig. 6(a)[1]. ITS face database belongs to Image Media Laboratory Kumamoto University, which is an ethnic East Asia face image, especially Japan and Chinese. ITS has 90 samples and each sample has (a) ORL dataset [12] (b) ITS dataset[4] (c) IND face dataset[2] Feature Extraction (a) Sub-Set 1 (S1) (b) Sub-Set 2 (S2) (c) Sub set 3 (S3) (d) Sub Set 4 (S4) Staff TI 1 st Day 2 nd Day 3 rd Day 4 th Day 5th Day (d) Yale B[13] Figure 6. The example of face variations of tested datasets. Real Time Face Recognition Based on Face Descriptor ... (I Gede Pasek Suta Wijaya)
  • 6. 744 ISSN: 1693-6930 10 to 15 face variations. Examples of face variations of the ITS face database can be presented in Fig. 6(b)[1]. Thirdly, India dataset is color face image dataset which has 61 persons (22 female and 39 male). Thee are eleven pose variations as presented in Fig. 6(c). Some facial emotions are also included in this dataset such as smile, disgust, neutral, and laugh[4]. The Yele B dataset is divided into four sets, as shown in Fig. 6(d). In this case, the sub-set 1 was chosen as training and the remaining sub-sets were selected as testing. In addition, the off-line experiments were carried out by under conditions: firstly, 50% faces of each dataset were arbitrarily elected for training data and leftover part was chosen as querying images; secondly 10-Fold cross-validation was enforced for performance evaluation; finally, recognition rate and computational time were utilized as a performance indicator. 98.31 92.75 82.11 99.14 98.35 92.66 80 85 90 95 100 ITS ORL IND RecognitionRate(%) Face Databases CF FD 100 75.60 12.55 100 89.89 16.54 10 20 30 40 50 60 70 80 90 100 S1 vs. S2 S1 vs. S3 S1 vs. S4 RecognitionRate(%) Yale G Database CF FD (a) On ORL, ITS, and IND datasets 98.31 92.75 82.11 99.14 98.35 92.66 80 85 90 95 100 ITS ORL IND RecognitionRate(%) Face Databases CF FD 100 75.60 12.55 100 89.89 16.54 10 20 30 40 50 60 70 80 90 100 S1 vs. S2 S1 vs. S3 S1 vs. S4 RecognitionRate(%) Yale G Database CF FD (b) Yale B dataset Figure 7. Off-line performances of our face recognition compared to baseline (CF based method[1]) on tested datasets. The experimental results (see Fig. 7) show that face recognition engine based on FD gives better performance than those baseline methods (compact features (CF) based face recognition[1]. In average, the FD based face recognition engine provides by about 96.72% of recognition rate on ORL, ITS, and IND datasets (see Fig. 7(a)). In other words, FD based face recognition engine can improve by about 5.66% the performance of CF based face recognition[1]. It can be achieved by our face descriptor that has rich information which is formed by global information, local features, and shape information. The global and local information is represented by some low frequency components of whole and sub-face images. This achievement is in line with the basic theory of signal processing that the most signal information is located in the low-frequency element. In terms of robustness of FD to any variations of lighting condition compared with the CF method, the FD based method gives better performance than CF (see Fig. 7(b)). It proves that the FD has rich information which robust to lighting invariant due to filtering and contrast stretching before the extraction. Regarding execution time, the FD based face recognition engine takes less than 1 second in average for performing the matching between querying face descriptor among the registered face descriptors of all tested datasets. It can be achieved because the face descriptor is repre- sented by 32 elements of original size face images (128x128 pixels). From off-line experimental data, the proposed face recognition engine is potential to be used for electronic keys for door locking system. In the real time experiments, the system was tested using large variability face images in terms of pose and capturing time. In this case, 1002 face images have been collected by using web camera Logitech C300 (1.3 MP (1280 x 1024)) from 13 persons of the staff on Informatics Engineering Dept., Engineering Faculty, Mataram University, in fifth days. From this dataset, 159 face images captured on the first day (almost 11 images for each person) were used as the training and 843 faces were prepared for testing. Examples of faces variation are shown in Fig. 8. The parameters for real time evaluation of face recognition engine were accuracy, False Positive Rate (FPR), False Negative Rate (FNR), and computational time. The evaluation results affirm that the proposed face recognition engine using face descriptor has performed properly, TELKOMNIKA Vol. 16, No. 2, April 2018 : 739 ∼ 746
  • 7. TELKOMNIKA ISSN: 1693-6930 745 (a)Sub-Set 1 (S1) (b)Sub-Set 2 (S2) (c) Sub set 3 (S3) (d)Sub Set 4 (S4) Staff TI 1 st Day 2 nd Day 3 rd Day 4 th Day 5 th Day Staff TI 1 st Day 2 nd Day 3 rd Day 4 th Day 5 th Day Figure 8. Example of face images variations for real time evaluation. 97.96 25.03 2.20 98.46 17.66 1.67 0 20 40 60 80 100 120 Accuracy FNR FPR Rate(%) Evaluation Parameters CF FD (a) Acuracy, FNR, and FPR 74.97 73.50 82.34 81.45 40 50 60 70 80 90 Sensitivity Precission Rate(%) Evaluation Parameters CF FD (b) Sensitivity and precision Figure 9. Performance of real time experiments. which is indicated by more than 98% of accuracy and less than 2% and 18% of FPR and FNR, respectively (see Fig. 9(a)). These performances can be achieved because the developed recog- nition engine using the face descriptor of the DCT and sub-space analysis provides well data separation. Compared to the performance of CF based face recognition, our proposed method significantly decreases the FNR by about 7.37% and in another side, it is not much increase and decrease the accuracy and FPR, as presented in Fig. 9(a). The FD based face recognition engine also improves significantly sensitivity and precision of CF based face recognition by about 7.37% and 7.95% respectively, as shown in Fig. 9(b). It also affirms that our proposed method can handle the false negative problem of the baseline method (the correct person is falsely recognized as others). Overall, the real time performances confirm the off-line achievements which can improve the baseline performances. The last experiment was carried out to know the performance of FD based face recog- nition engine for door locking system which was done by the staff of Informatics Engineering Dept., Engineering Faculty, Mataram University, in one week. The door locking system can work properly, which is shown by the accuracy, FPR, and FNR by about 98.30%, 21.99%, and 1.8%, respectively. The last result also re-affirm that the FD is powerful for real time face recognition engine. 4. Conclusion and Future Work The real time FD based face recognition engine gives better performances than those of baseline (CF). From the Off-line evaluations, it provides high recognition rate (average more than 96%) for all tested datasets, while the real time experimental data provide high accuracy (more than 98%) and less false verification rate (by about 17.66% of false negative and 1.67% of false positive rate). Regarding the computational time, the proposed electronics key simulator needs less than 1 second for the matching process. In addition, the application of FD face recognition engine for the door-locking system also works properly, which is indicated by 98.30%, 21.99%, and 1.8% of accuracy, FPR, and FNR respectively. The door-locking system based on face image has to be evaluated in large size dataset Real Time Face Recognition Based on Face Descriptor ... (I Gede Pasek Suta Wijaya)
  • 8. 746 ISSN: 1693-6930 to know its robust performance against the large variability of face images in pose, lighting, and accessories. In addition, the proposed system still needs to be improved by adding some illu- mination compensation, such as Contrast Limited Adaptive Histogram Equalization (CLAHE) to decrease the false negative recognition. Acknowledgment We would like to send our great appreciation to the staff of informatics Engineering Dept. on their participation in the evaluation of this system. In addition, our great honor is also to The Minister of Research and Higher Education Republic of Indonesia for research funding under scheme competitive research grant 2015-2016. References [1] I. G. P. S. Wijaya, A. Y. Husodo, and A. H. Jatmika, “Real time face recognition engine using compact features for electronics key,” in International Seminar on Intelligent Technology and Its Applications (ISITIA), Lombok, Indonesia, July 2016. [2] I. G. P. S. Wijaya, A. Y. Husodo, and I. W. A. Arimbawa, “Real time face recognition using dct coefficients face descriptory,” in International Conference on Informatics and Computing (ICIC 2016), Lombok, Indonesia, October 2016. [3] R. Chellappa, C. L. Wilson, and S. Sirohey, “Human and machine recognition of faces: a survey,” Proceedings of the IEEE, vol. 83, no. 5, pp. 705–741, May 1995. [4] I. G. P. S. Wijaya, K. Uchimura, and G. Koutakii, “Face recognition based on incremental predictive linear discriminant analysis,” IEEJ Transactions on Electronics, Information and Systems, vol. 133, no. 1, pp. 74–83, 8 2013. [5] J. Zhang and D. Scholten, “A face recognition algorithm based on improved contourlet transform and principle component analysis,” TELKOMNIKA (Telecommunication Comput- ing Electronics and Control), vol. 14, no. 2A, pp. 114–119, 2016. [6] A. Thamizharasi and J. Jayasudha, “An illumination invariant face recognition by selection of dct coefficients,” International Journal of Image Processing (IJIP), vol. 10, no. 1, p. 14, 2016. [7] H. H. Lwin, A. S. Khaing, and H. M. Tun, “Automatic door access system using face recog- nition,” International Journal of Scientific & Technology Research, vol. 4, no. 6, pp. 210–221, Jun 2016. [8] M. Baykara and R. Da, “Real time face recognition and tracking system,” in Electronics, Computer and Computation (ICECCO), 2013 International Conference on, Nov 2013, pp. 159–163. [9] E. Setiawan and A. Muttaqin, “Implementation of k-nearest neightbors face recognition on low-power processor,” TELKOMNIKA (Telecommunication Computing Electronics and Con- trol), vol. 13, no. 3, pp. 949–954, 2015. [10] P. Viola and M. Jones, “Rapid object detection using a boosted cascade of simple features,” in Proceedings of the conference on Computer Vision and Pattern Recognition, 2001, pp. 511–518. [11] S. R. Konda, V. Kumar, and V. Krishna, “Face recognition using multi region prominent lbp representation,” International Journal of Electrical and Computer Engineering, vol. 6, no. 6, p. 2781, 2016. [12] F. S. Samaria and A. C. Harter, “Parameterisation of a stochastic model for human face identification,” in Applications of Computer Vision, 1994., Proceedings of the Second IEEE Workshop on. IEEE, 1994, pp. 138–142. [13] Yale, “The extended yale face database b,” 2001. [Online]. Available: http://vision.ucsd.edu/ iskwak/ExtYaleDatabase/ExtYaleB.html TELKOMNIKA Vol. 16, No. 2, April 2018 : 739 ∼ 746