SlideShare a Scribd company logo
1 of 7
Download to read offline
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 351
AN OPTIMAL FACE RECOGINITION TOOL
Marri.Lingareddy1
, D. Haritha2
1
Research scholar,2
Assistant professor, ECM Department, KL University, AP, India,
marrilingareddy@gmail.com. haritha_donavalli@kluniversity.in
Abstract
Face recognition is one of the crucial and important methods for the security purposes. The accuracy of the facial recognition system
degrades over time. Therefore the FRS system must be up-to-date. Sometimes the system will not be up-to-date because of unlabelled
face images, or because of change in the facial expressions or because of any relevant changes in face of person. Therefore in such
cases also the FRS must be self-trained to make the system up-to-date. In this paper a semi-supervised version, based on the self-
training method, of the classical PCA-based face recognition algorithm is proposed to exploit unlabelled data for off-line updating of
the Eigen space and the templates. Reported results show that the exploitation of unlabelled data by self-training can substantially
improve the performances achieved with a small set of labelled training examples.
Index Terms: Eigen faces, Face recognition, face classifier, occluded faces
-----------------------------------------------------------------------***-----------------------------------------------------------------------
1. INTRODUCTION
Face recognition is a method of automatically identifying or
verifying a person’s video frame or video source or any digital
image. Generally this type of method is used for security
purposes and the face its self is used as a key to identify the
systems password. Therefore a facial recognition system is a
computer application to check the identity of the person. One
of the ways to do this is by comparing selected facial features
from the image and a facial database.
1.1 Methods
There are three different type of techniques are employed to
detect the face. They are
I. Traditional method
II. 3-dimensional recognition
III. Skin texture analysis
In traditional method the facial recognition is done based on
extracting the landmarks or features from an image of his/her
face. Therefore an algorithm is written in such a way that
based on the relative position, size, and/or shape of the eyes,
nose, cheekbones and jaw are used to search for other images
with matching features. Recognition algorithms can be divided
into two main approaches, geometric, which look at
distinguishing features, or photometric, which is a statistical
approach that distils an image into values and compares the
values with templates to eliminate variances.
The 3-D face recognition method is a newly emerging method
and this method uses 3D sensors to capture information about
the shape of the face. This method is used to acquire improved
accurate results. Added advantage to this method is that the
face recognition is not affected by changes in lighting and can
also identify a face from a range of viewing angles, including
a profile view.
The skin texture method uses the unique lines, patterns and
spots apparent in a person’s skin and turns them into a
mathematical space. Facial recognition systems are also
beginning to be incorporated into unlocking mobile devices.
The android market is working with facial recognition and
integrating it into their cell phones. They have created an
application called Visidon Applock. This application allows
you to put a facial recognition lock on any of your
applications. This allows you to increase the safety of your
private apps and content. Facial recognition technology is
already implemented in the iPhoto application for Macintosh.
1.2 Face Accuracy
The accuracy of Face Recognition Systems (FRSs) on a user
will decrease with time [4][5][6][7]. The decrease in the
accuracy is the result of changes in facial appearance because
of factors such as ageing, hair-growth, surgery, weight
changes, sun-exposure, ancestry, sex, health, disease, drug
use, diet, sleep deprivation, and bio-mechanical factors
[1][8][9][10]. The appearance changes in user are illustrated
with the figure1.
Figure1: Facial appearance in a person due of hair growth
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 352
Therefore to maintain the accuracy of the facial recognition
system over time the FRS should be up-to-date. FRS will be
up-to-date through the self-update procedure. In this procedure
the system is re-tined with the unlabelled data, which is
acquired every time a user interacts with the system. The
unlabelled facial images are added to the training set
according to the predicted label.
1.3 Algorithm Types
The method of classifier is used for recognition affects the
long term accuracy of the self-updating FRS’s. Therefore three
different types of algorithms are designed [1]. They are
i. Eigen faces(EF)
ii. Fisher faces(FF)
iii. Similarity based fisher faces(SFF)
These algorithms are chosen because of their inductive
reasoning in their training process. The EF is purely a
transductive reasoning and doesn’t use inductive reasoning.
The FF is a little inductive in nature because it uses a global
statistics of the user data to find the best discriminating sub-
space. SFF is more inductive as user-specific models are built
in such a way that they are later used for recognition.
Induction is a method which uses training data to find
approximations of functions that describe the data.
2. RELATED WORK
Considerable research in social psychology has shown that
facial expressions help coordinate conversation and have
considerably more effect on whether a listener feels liked or
disliked than the speaker's spoken words.
Mehrabian indicated that the verbal part of a message
contributes only for 7 percent to the effect of the message as a
whole. The vocal part contributes for 38 percent, while facial
expression of the speaker contributes for 55 percent to the
effect of the spoken message. Therefore face recognition is an
important addition to computer vision research [1]. Computer
vision aims to duplicate the effect of human vision by
electronically perceiving and understanding an image.
Computer vision techniques use the results of mathematics,
pattern recognition, artificial intelligence, psycho-physiology,
computer science, electronics, and other scientific disciplines.
Recent advances in image analysis and pattern recognition
open up the possibility of automatic detection and
classification of emotional and conversational facial signals.
Automating facial expression analysis could bring facial
expressions into man-machine interaction as a new modality
and make interaction tighter and more efficient. Such a system
could also make classification of facial expressions widely
accessible as a tool for research in behavioral science and
medicine [1].
3. REPRESENTATION OF FACIAL ECOGNITION
SYSTEM
The outline of a typical face recognition system is given figure
2. This outline carries the characteristics of a typical pattern
recognition system.
Figure2: Generic representation of facial recognition
There are 4 main blocks that represent the face recognition. In
the input block an image is passed to the system for
classification. The images vary in format, size and resolution.
The image is pre-processed to remove unwanted noise from
light and the environment. The image also then is compressed
and normalized. The classifier decides whether the image
belongs to the face or the non-face class based on the
information learned during training. The output image
indicates whether the input image is thought to certain or not.
Some systems indicate its location.
4. PATTERN RECOGNITION
Pattern recognition is a modern day machine intelligence
problem with numerous applications in a wide field, including
face recognition, character recognition, speech recognition as
well as other types of object recognition. Its ability to read text
and shapes plays an important role in medical diagnostic
science, machine conditioning and monitoring and sorting.
The speed of processing is important for its real-time
application in banks, stores and voice recognition banks,
stores and voice recognition. A basic pattern classification
system consists of sensor inputs, feature extraction, selection
and classification. Sensors could be microphone, digital
camera orographic, features are extracted with statistical,
geometrical or descriptor means. The field of pattern
recognition is still very much in its infancy, although in recent
years some of the barriers that hampered such automated
pattern recognition systems have been lifted due to advances
in computer hardware providing machines capable of faster
and more complex computation. Pattern recognition can be
classified as the categorization of input data into identifiable
classes via the extraction of significant features or attributes of
the data from a background of irrelevant detail. The functional
block diagram of an adaptive pattern recognition system is
shown in Figure3.
PREPROCESS CLASSIFIER
OUTPUT
INPUT
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 353
5. FACE RECOGNITION
Face recognition is a pattern recognition task performed
specifically on faces. It can be described as classifying a face
either “known" or "unknown", after comparing it with stored
known individuals. It is desirable to have a system that has the
ability of learning to recognize unknown faces.
Figure3: Block diagram of Pattern recognition
Face recognition involves comparing an image with a database
of stored faces in order to identify the individual in the input
image. The related task of face detection has direct relevance
to recognition because images must be analyzed and faces
identified, before they can be recognized.
5.1 Types of image conditions
Face recognition, although a trivial task for the human brain
has proved to be extremely difficult to imitate artificially,
because although commonalities exist between faces, they can
vary considerably in terms of age, skin color, orientation,
facial expression and presence official furniture such as
glasses or facial hair. The problem is further complicated by
differing light conditions, image qualities and geometries, as
well as the possibility of partial occlusion and disguise. Hence,
a robust face recognition system should be capable of
classifying a face image as "known" under the following
conditions:
• Scale variance
• Orientation variance
• Illumination variance
• Background variance
• Emotional expression and detail variance
• Noise variance
For basic face recognition systems, some of these effects can
be avoided by assuming and ensuring a uniform background
and uniform light conditions.
Figure 4: Block diagram of face recognition system
This assumption is acceptable for some applications such as
automated separation of nuts from screws on a production
line, where light conditions can be controlled and the image
background will be uniform. Figure 4 outlines the block
diagram of a typical face recognition system.
Face recognition is the most natural, non-intrusive, and user-
friendly biometric measure, because it requires no disturbance
to the people being identified. Most of the existing systems
can successfully recognize faces only when they appear under
constrained conditions. The performance will degrade
significantly when face images are obtained under variable
illumination conditions, facial expressions, poses or
perspectives, especially when occlusion happens. Occlusions
may be caused by sunglasses, a thick beard, the wearing of a
scarf, or expression variations. In this paper, we will focus on
how to improve the performance for recognizing occluded
faces. In a nutshell, we first complete or repair the occluded
faces with our proposed spectral algorithm, and then perform
face recognition on the completed images. A face-completion
algorithm involves three main procedures: occluded face
clustering via the sparse representation, image-based data
mining, and face image repairing using the spectral graph
theory. Our algorithm is developed on the basis that global and
local similarities among different faces are widespread. A
damaged face can be considered as a signal sequence, in
which each un-occluded pixel is seen as the element. The
sequence is matched with faces in our large database via
sparse representation, and then the most similar local part to
the occluded part is selected after the sparse representation-
based clustering. Some other classification algorithms, e.g. the
Euclidean distance and Sum-of-Squared-Differences (SSD)
based classification, are alternative to this step. However,
compared to sparse representation, all the other methods
require solving the classification problem via an exhausting
search, which is very computationally intensive. The sparse
representation method is able to avoid searching all the items
in a more efficient way via dynamic programming.
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 354
Finally, in order to provide fusion and natural repairing
results, a mathematical model that follows an actual painters’
painting procedure, namely guided label learning, is developed
using the spectral graph theory. Image completion is one of
the most talked-about topics in the Graphics area]. A number
of useful tools, e.g. image in painting .Poisson equations, and
graph-cuts, have been established for real-scene image
completion. But these ideas require too much information
about the damaged images, and they are always performed on
high-resolution color images. When referring to face
recognition, the algorithms are usually developed based on
low-resolution gray-scale images, and the traditional
algorithms may lose their effectiveness. Hence, as per the
Poisson equation, we extend it to the graph-based domain.
Due to the flexibility of the graph topology, low-resolution
gray-scale images can be coped with quite well.
5.2 Proposed scheme
The major contributions of this paper are as follows:
i. We propose a new face reconstruction algorithm based
on sparse representation and a graphical model. Our
algorithm is established from a new perspective,
different from the existing face reconstruction
algorithms.
Figure 5: Flow chart of FRS system
ii. The proposed algorithm is able to improve the
recognition results dramatically, with an increase
of up to 30% in recognition rate.
Face analysis block: The face analysis block is responsible for
detection and segmentation of human faces.
Face detection: To detect faces accurately in real-time, our
system employs Viola and Jones face detection procedure
[11]. The detector works at a speed of 15 frames per second at
12 resolution levels, while achieving low false acceptance
rates.
Face segmentation: For the segmentation of the prominent
facial features our system employs Active Shape Models with
Invariant Optimal Features (IOFASM) [12]. This algorithm
can automatically locate the outlines of eyes, mouth, nose,
brows and silhouette contour of the face with an average error
of approximately 2% of the inter-eye distance.
Identification block: The identification block extracts texture
from a segmented face and uses it to identify a user.
Facial feature extraction: To make facial texture
independent of the facial expression, each image was warped
using a piece-wise affine mapping between the result of the
segmentation step and the mean shape. The texture parameters
for each image were extracted by constructing an image
intensity model of an Active Appearance Model [13].
Classification Once the texture parameters are obtained, they
are whitened [14] and then a distance-weighted k-Nearest
Neighbor classifier (k-NN) is used to identify the user in the
image. The distance between two texture vectors is defined as
the angle between them. The angle based distance metric was
shown to be a good choice for PCA-based algorithms [15]. All
the experiments in this paper were performed using the five
nearest neighbors (k = 5).
Automatic learning block Every time a facial image has been
identified, it goes through an automatic selection process that
determines whether it is suitable to be added to the training set
of the appropriate user. The selection process deems two
categories of images to be unsuitable for automatic learning:
1) images with outdated facial appearance,
2) Images where the algorithms used in our system produce
unreliable results.
6. ANALYSIS OF THE ALGORITHM USED
Figure6: Damaged face representation using graph cut
In this algorithm, we first cluster the images which have a
similar sparse representation to the query image. Then, these
clustered images are used to find the best-matched patch for
guiding the synthesis of the missing parts. The patch obtained
is used to guide the in-painting work of the damaged part of
the occluded face. Hence, the searched patch should have a
similar local property as the damaged part. The target region,
which needs to be filled in the damaged face image F, is de-
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 355
noted as R. The goal is to find the best-matched patch in the
sparse representation data-pool, which fits its neighborhood R
with the least SSD. This procedure is shown in Figure 6.
The region of missing pixels is defined as R, and the mask
region as J, on a damaged face image. Mathematically, mask J
is an expanded region of the damaged patch. We expand the
boundary of R by h pixels and define it as:
J (i, j)=0, if (d(i, j)>h)or((i, j)∈ R),1, I d(i, j)<h. (1)
The mask J is painted as a thin band surrounding the missing
region R. d (i, j) indicates the distance between the pixel (i, j)
and its nearest pixel in the damaged/occluded region R.
Figure7: The missing region R and masked region J of
damaged face F
7. PARTIALLY OCCLUDED FACE OMPLETION
AND RECOGNITION
In this section, we will apply the completion algorithm on
partially occluded face images. The occluded part of the face
is detected using the graph cut, which is a common method for
image segmentation. Consequently, the proposed spectral
graphic based image completion algorithm is employed for
each damaged faces.
Figure9: AR database for occluded faces
Some repaired results are shown as the second and the fourth
column in Figure9. The repairing algorithm is able to provide
a fusion and produce natural results. The recognition
experiment was also developed based on the AR database. For
training, 847 un-occluded images (121 subjects, 7 images per
subject) were used. For testing, the occluded faces were
divided into two subsets, denoted as AR1 and AR2. These two
sets included images with sun-glasses and images with a scarf,
respectively. The two methods common face recognition
algorithms, the PCA and Gabor methods, with and without
using the algorithm to evaluate the recognition performance.
Figure10: Synthetic partially occluded faces
For testing, synthetic occlusions were added to 484 images. As
shown in Figure9, the location of the occlusion is randomly
selected. And the curves of the recognition rates with different
amounts of occlusion are shown in Fig. 6. The occlusion
percentages range from 0% to 50%, in 12.5%additions.
7.1 Training and updating procedure
The k-NN classifier was trained with the texture parameters
obtained from the 472 images in the Training set and their
corresponding user IDs.
Using the images in the Update set (in chronological order),
three types of updates were performed to the Training set [2]:
i. UC. In this case, updates were performed with the total
confidence, C.
ii. UCc. The update process is similar to that performed in
[3]. In this scenario, if Cc computed for an image in the
Update set is greater than C of any of the images in the
Training set, then the image will be added to the
Training set. Otherwise, the image is ignored.
iii. UCt. This is a trivial update strategy where newer
images from Update set replace older ones in the
Training set. In other words, if an image has a Ct value
greater than that of any of the images in the Training
set, then it is added to the Training set.
CONCLUSIONS
Face recognition is both a challenging and important
recognition technique among all the biometric techniques; face
recognition approach possesses one great advantage, which is
its user-friendliness.
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 356
As face recognition system has become an important method
for security purpose the FRS system was made up-to-date
using self-trained method.
In this paper the classical PCA-based face recognition
algorithm & Guided labelled algorithm are used so that the
face is recognized in any of the cases (Such as age, growth of
hair or beard, any of the blurred images, or the low lighting
images and finally different pose of the faces).
Self-training performances are achieved with a small set of
labelled training examples. So the self-trained is used to keep
the system up-to-date and made the better FRS.
RESULTS
Figure 11: Face recognition is done even in growth of beard
Figure 12: Detected image when the age is grown
Figure 13: Face recognition is done when the person is aged
& having spectacles on his face
Figure 14: Face recognition is done even for blurred images
Figure 15: Face recognition is also done when the pose is
changed
REFERENCES
[1] An Experimental Evaluation of Three Classifiers for
Use in Self-Updating Face ecognition Systems Sri-
Kaushik Pavani, Federico M. Sukno, David Delgado-
Gomez, Constantine Butakoff, Xavier Planes, and
Alejandro F. Frangi
[2] A Confidence-based Update Rule for Self-Updating
Human Face Recognition Systems Sri-Kaushik Pavani
1;2 , Federico M. Sukno 2;1 ,
Constantine Butako®, Xavier Planes 1;2 and Alejandro
F. Frangi
[3] D. Mou, R. Schweer, and A. Rothermel. Automatic
databases for unsupervised face recognition.In CVPRW
2004, pages 90{97}.
[4] P. J. Phillips, P. Grother, R. Micheals,
D. M. Blackburn, E. Tabassi, and M. one, “Face
Recognit. Vendor Test 2002: Evaluation Report,”
National Inst. Standards Technol., Tech. Rep. NISTIR
6965, 2003.
[5] P. J. Flynn, K. W. Bowyer, and P. J. Phillips,
“Assessment of time dependency in face recognition:
An initial study,” in Proc. 4th Int. Conf. Audio- and
Video-Based Biometric Person Authentication. Lecture
Notes in Computer. Science, Guildford, U.K., 2003,
vol. 2688, pp. 44–51.
[6] H. Wang and P. J. Flynn, “Experimental evaluation of
eye location ac- curacies and time-lapse effects on face
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 357
recognition systems,” in Proc. 5th Int. Conf. Audio- and
Video-Based Biometric Person Authentica- tion.
Lecture Notes in Comput. Science, New York, NY,
2005, vol. 3546, pp. 627–636.
[7] H.Ling,S.Soatto,N.Ramanathan,andD.W.Jacobs,“Astud
yofface recognition as people age,” in Proc. 11th IEEE
Int. Conf. Comput. Vis., Rio de Janeiro, Brazil, 2007,
pp. 1–8.
[8] N. Ramanathan, R. Chellappa, and S. Biswas,
“Computational methods for modeling facial aging: A
survey,” J. Vis. Lang. omput., vol. 20, no. 3, pp. 131–
144, 2009, 1.
[9] L. Millsopp, L. Brandom, G. Humphris, D. Lowe, C.
Stat, and S. Rogers, “Facial appearance after operations
for oral and oropharyngeal cancer: A comparison of
casenotes and patient-completed questionnaire,” Brit. J.
Oral Maxillofacial Surg., vol. 44, no. 5, pp. 358–
363,2006.
[10] M. A. Taister, S. D. Holliday, and H. I. M. Borrman,
“Comments on facial aging in law enforcement
investigation,” Forensic Sci. Commun., vol. 2, no. 2,
2000 [Online]. Available: http://www.fbi.gov/about-us/
lab/forensic-science-
communications/fsc/april2000/taister.htm
[11] P. Viola and M. Jones. Robust real-time face detection.
Int. J. Comput. Vision, 57(2):137{154, 2004}.
[12] F. Sukno et al. Active shape models with invariant
optimal features. IEEE Trans. Pattern Anal. Mach.
Intell., 29(7):1105{1117, 2007}.
[13] T. Cootes, G. Edwards, and C. Taylor. Active
appearance models. IEEE Trans. Pattern Anal. Mach.
Intell., 23(6):681{685, 2001}.
[14] P. Navarrete and J. Ruiz del Solar. Comparative study
between di®erent
eigenspace-based approaches for face recognition. In FS 2002,
pages 178{184}.
[15] V. Perlibakas. Distance measures for PCA-based face
recognition. Pattern Recogn.Lett., 25(6):711{724,
2004}.
BIOGRAPHIES:
M. Linga Reddy has received his
B.Tech degree in ECE from ACE in
2011. He is presently pursuing M.Tech
in Embedded systems in E.C.M.
Department from KL University since
July 2011.
D. Haritha, Assistant professor, ECM Department, KL
University AP, India, haritha_donavalli@kluniversity.in

More Related Content

What's hot

IRJET - A Review on Face Recognition using Deep Learning Algorithm
IRJET -  	  A Review on Face Recognition using Deep Learning AlgorithmIRJET -  	  A Review on Face Recognition using Deep Learning Algorithm
IRJET - A Review on Face Recognition using Deep Learning AlgorithmIRJET Journal
 
IRJET- Facial Expression Recognition
IRJET- Facial Expression RecognitionIRJET- Facial Expression Recognition
IRJET- Facial Expression RecognitionIRJET Journal
 
IRJET - Facial Recognition based Attendance System with LBPH
IRJET -  	  Facial Recognition based Attendance System with LBPHIRJET -  	  Facial Recognition based Attendance System with LBPH
IRJET - Facial Recognition based Attendance System with LBPHIRJET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Facial Expression Recognition
Facial Expression Recognition Facial Expression Recognition
Facial Expression Recognition Rupinder Saini
 
Face Recognition Based Intelligent Door Control System
Face Recognition Based Intelligent Door Control SystemFace Recognition Based Intelligent Door Control System
Face Recognition Based Intelligent Door Control Systemijtsrd
 
IRJET- Class Attendance using Face Detection and Recognition with OPENCV
IRJET- Class Attendance using Face Detection and Recognition with OPENCVIRJET- Class Attendance using Face Detection and Recognition with OPENCV
IRJET- Class Attendance using Face Detection and Recognition with OPENCVIRJET Journal
 
IRJET-Facial Expression Recognition using Efficient LBP and CNN
IRJET-Facial Expression Recognition using Efficient LBP and CNNIRJET-Facial Expression Recognition using Efficient LBP and CNN
IRJET-Facial Expression Recognition using Efficient LBP and CNNIRJET Journal
 
ADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCA
ADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCAADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCA
ADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCAIAEME Publication
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
IRJET- Biometric Eye Recognition using Alex-Net
IRJET-  	  Biometric Eye Recognition using Alex-NetIRJET-  	  Biometric Eye Recognition using Alex-Net
IRJET- Biometric Eye Recognition using Alex-NetIRJET Journal
 
Explaining Aluminous Ascientification Of Significance Examples Of Personal St...
Explaining Aluminous Ascientification Of Significance Examples Of Personal St...Explaining Aluminous Ascientification Of Significance Examples Of Personal St...
Explaining Aluminous Ascientification Of Significance Examples Of Personal St...SubmissionResearchpa
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methodsIRJET Journal
 
Thermal Imaging Emotion Recognition final report 01
Thermal Imaging Emotion Recognition final report 01Thermal Imaging Emotion Recognition final report 01
Thermal Imaging Emotion Recognition final report 01Ai Zhang
 
FACE DETECTION USING PRINCIPAL COMPONENT ANALYSIS
FACE DETECTION USING PRINCIPAL COMPONENT ANALYSISFACE DETECTION USING PRINCIPAL COMPONENT ANALYSIS
FACE DETECTION USING PRINCIPAL COMPONENT ANALYSISIAEME Publication
 
Paper id 24201475
Paper id 24201475Paper id 24201475
Paper id 24201475IJRAT
 
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...IJTET Journal
 

What's hot (19)

IRJET - A Review on Face Recognition using Deep Learning Algorithm
IRJET -  	  A Review on Face Recognition using Deep Learning AlgorithmIRJET -  	  A Review on Face Recognition using Deep Learning Algorithm
IRJET - A Review on Face Recognition using Deep Learning Algorithm
 
IRJET- Facial Expression Recognition
IRJET- Facial Expression RecognitionIRJET- Facial Expression Recognition
IRJET- Facial Expression Recognition
 
IRJET - Facial Recognition based Attendance System with LBPH
IRJET -  	  Facial Recognition based Attendance System with LBPHIRJET -  	  Facial Recognition based Attendance System with LBPH
IRJET - Facial Recognition based Attendance System with LBPH
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Facial Expression Recognition
Facial Expression Recognition Facial Expression Recognition
Facial Expression Recognition
 
G0333946
G0333946G0333946
G0333946
 
IRJET- Digiyathra
IRJET-  	  DigiyathraIRJET-  	  Digiyathra
IRJET- Digiyathra
 
Face Recognition Based Intelligent Door Control System
Face Recognition Based Intelligent Door Control SystemFace Recognition Based Intelligent Door Control System
Face Recognition Based Intelligent Door Control System
 
IRJET- Class Attendance using Face Detection and Recognition with OPENCV
IRJET- Class Attendance using Face Detection and Recognition with OPENCVIRJET- Class Attendance using Face Detection and Recognition with OPENCV
IRJET- Class Attendance using Face Detection and Recognition with OPENCV
 
IRJET-Facial Expression Recognition using Efficient LBP and CNN
IRJET-Facial Expression Recognition using Efficient LBP and CNNIRJET-Facial Expression Recognition using Efficient LBP and CNN
IRJET-Facial Expression Recognition using Efficient LBP and CNN
 
ADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCA
ADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCAADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCA
ADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCA
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
IRJET- Biometric Eye Recognition using Alex-Net
IRJET-  	  Biometric Eye Recognition using Alex-NetIRJET-  	  Biometric Eye Recognition using Alex-Net
IRJET- Biometric Eye Recognition using Alex-Net
 
Explaining Aluminous Ascientification Of Significance Examples Of Personal St...
Explaining Aluminous Ascientification Of Significance Examples Of Personal St...Explaining Aluminous Ascientification Of Significance Examples Of Personal St...
Explaining Aluminous Ascientification Of Significance Examples Of Personal St...
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methods
 
Thermal Imaging Emotion Recognition final report 01
Thermal Imaging Emotion Recognition final report 01Thermal Imaging Emotion Recognition final report 01
Thermal Imaging Emotion Recognition final report 01
 
FACE DETECTION USING PRINCIPAL COMPONENT ANALYSIS
FACE DETECTION USING PRINCIPAL COMPONENT ANALYSISFACE DETECTION USING PRINCIPAL COMPONENT ANALYSIS
FACE DETECTION USING PRINCIPAL COMPONENT ANALYSIS
 
Paper id 24201475
Paper id 24201475Paper id 24201475
Paper id 24201475
 
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
 

Viewers also liked

городской конкурс птица счастья 2015
городской конкурс птица счастья   2015городской конкурс птица счастья   2015
городской конкурс птица счастья 2015virtualtaganrog
 
Mass deportations of Haitians feared
Mass deportations of Haitians fearedMass deportations of Haitians feared
Mass deportations of Haitians fearedhabitualentrant78
 
GERENCIA DE PROYECTOS
GERENCIA DE PROYECTOSGERENCIA DE PROYECTOS
GERENCIA DE PROYECTOSnuby betancur
 
8th alg -l7.2
8th alg -l7.28th alg -l7.2
8th alg -l7.2jdurst65
 
брошюра по антетерроту
брошюра по антетерротуброшюра по антетерроту
брошюра по антетерротуvirtualtaganrog
 
7th pre alg -l69
7th pre alg -l697th pre alg -l69
7th pre alg -l69jdurst65
 
RLC Presentations 3-23-15
RLC Presentations 3-23-15RLC Presentations 3-23-15
RLC Presentations 3-23-15Ronald Crawford
 
งานที่1
งานที่1งานที่1
งานที่1namfon_
 
1.power plant and locations
1.power plant and locations1.power plant and locations
1.power plant and locationsshaikusmanshag
 

Viewers also liked (12)

городской конкурс птица счастья 2015
городской конкурс птица счастья   2015городской конкурс птица счастья   2015
городской конкурс птица счастья 2015
 
Mass deportations of Haitians feared
Mass deportations of Haitians fearedMass deportations of Haitians feared
Mass deportations of Haitians feared
 
GERENCIA DE PROYECTOS
GERENCIA DE PROYECTOSGERENCIA DE PROYECTOS
GERENCIA DE PROYECTOS
 
8th alg -l7.2
8th alg -l7.28th alg -l7.2
8th alg -l7.2
 
брошюра по антетерроту
брошюра по антетерротуброшюра по антетерроту
брошюра по антетерроту
 
7th pre alg -l69
7th pre alg -l697th pre alg -l69
7th pre alg -l69
 
RLC Presentations 3-23-15
RLC Presentations 3-23-15RLC Presentations 3-23-15
RLC Presentations 3-23-15
 
metode greedy
metode greedymetode greedy
metode greedy
 
งานที่1
งานที่1งานที่1
งานที่1
 
B2015 noms binder-e
B2015 noms binder-eB2015 noms binder-e
B2015 noms binder-e
 
10 Red-Flag Puppy Behaviors
10 Red-Flag Puppy Behaviors10 Red-Flag Puppy Behaviors
10 Red-Flag Puppy Behaviors
 
1.power plant and locations
1.power plant and locations1.power plant and locations
1.power plant and locations
 

Similar to An optimal face recoginition tool

Face Liveness Detection for Biometric Antispoofing Applications using Color T...
Face Liveness Detection for Biometric Antispoofing Applications using Color T...Face Liveness Detection for Biometric Antispoofing Applications using Color T...
Face Liveness Detection for Biometric Antispoofing Applications using Color T...rahulmonikasharma
 
Efficient Facial Expression and Face Recognition using Ranking Method
Efficient Facial Expression and Face Recognition using Ranking MethodEfficient Facial Expression and Face Recognition using Ranking Method
Efficient Facial Expression and Face Recognition using Ranking MethodIJERA Editor
 
IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...
IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...
IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...IRJET Journal
 
Facial Expression Identification System
Facial Expression Identification SystemFacial Expression Identification System
Facial Expression Identification SystemIRJET Journal
 
IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...
IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...
IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...IRJET Journal
 
Intelligent multimodal identification system based on local feature fusion be...
Intelligent multimodal identification system based on local feature fusion be...Intelligent multimodal identification system based on local feature fusion be...
Intelligent multimodal identification system based on local feature fusion be...nooriasukmaningtyas
 
Review of facial expression recognition system and used datasets
Review of facial expression recognition system and used datasetsReview of facial expression recognition system and used datasets
Review of facial expression recognition system and used datasetseSAT Journals
 
Review of facial expression recognition system and
Review of facial expression recognition system andReview of facial expression recognition system and
Review of facial expression recognition system andeSAT Publishing House
 
IRJET - Real Time Facial Analysis using Tensorflowand OpenCV
IRJET -  	  Real Time Facial Analysis using Tensorflowand OpenCVIRJET -  	  Real Time Facial Analysis using Tensorflowand OpenCV
IRJET - Real Time Facial Analysis using Tensorflowand OpenCVIRJET Journal
 
IRJET - A Review on: Face Recognition using Laplacianface
IRJET - A Review on: Face Recognition using LaplacianfaceIRJET - A Review on: Face Recognition using Laplacianface
IRJET - A Review on: Face Recognition using LaplacianfaceIRJET Journal
 
IRJET- Age Analysis using Face Recognition with Hybrid Algorithm
IRJET-  	  Age Analysis using Face Recognition with Hybrid AlgorithmIRJET-  	  Age Analysis using Face Recognition with Hybrid Algorithm
IRJET- Age Analysis using Face Recognition with Hybrid AlgorithmIRJET Journal
 
Paper id 25201441
Paper id 25201441Paper id 25201441
Paper id 25201441IJRAT
 
A Biometric Fusion Based on Face and Fingerprint Recognition using ANN
A Biometric Fusion Based on Face and Fingerprint Recognition using ANNA Biometric Fusion Based on Face and Fingerprint Recognition using ANN
A Biometric Fusion Based on Face and Fingerprint Recognition using ANNrahulmonikasharma
 
IRJET- Facial Expression Recognition using Deep Learning: A Review
IRJET- Facial Expression Recognition using Deep Learning: A ReviewIRJET- Facial Expression Recognition using Deep Learning: A Review
IRJET- Facial Expression Recognition using Deep Learning: A ReviewIRJET Journal
 
A survey on content based medical image retrieval for
A survey on content based medical image retrieval forA survey on content based medical image retrieval for
A survey on content based medical image retrieval foreSAT Publishing House
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face RecognitionIRJET Journal
 
Face Recognition System and its Applications
Face Recognition System and its ApplicationsFace Recognition System and its Applications
Face Recognition System and its ApplicationsIRJET Journal
 
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKHUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKijiert bestjournal
 
Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...
Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...
Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...ijtsrd
 

Similar to An optimal face recoginition tool (20)

Face Liveness Detection for Biometric Antispoofing Applications using Color T...
Face Liveness Detection for Biometric Antispoofing Applications using Color T...Face Liveness Detection for Biometric Antispoofing Applications using Color T...
Face Liveness Detection for Biometric Antispoofing Applications using Color T...
 
Efficient Facial Expression and Face Recognition using Ranking Method
Efficient Facial Expression and Face Recognition using Ranking MethodEfficient Facial Expression and Face Recognition using Ranking Method
Efficient Facial Expression and Face Recognition using Ranking Method
 
IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...
IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...
IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...
 
Facial Expression Identification System
Facial Expression Identification SystemFacial Expression Identification System
Facial Expression Identification System
 
IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...
IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...
IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...
 
Intelligent multimodal identification system based on local feature fusion be...
Intelligent multimodal identification system based on local feature fusion be...Intelligent multimodal identification system based on local feature fusion be...
Intelligent multimodal identification system based on local feature fusion be...
 
Review of facial expression recognition system and used datasets
Review of facial expression recognition system and used datasetsReview of facial expression recognition system and used datasets
Review of facial expression recognition system and used datasets
 
Review of facial expression recognition system and
Review of facial expression recognition system andReview of facial expression recognition system and
Review of facial expression recognition system and
 
IRJET - Real Time Facial Analysis using Tensorflowand OpenCV
IRJET -  	  Real Time Facial Analysis using Tensorflowand OpenCVIRJET -  	  Real Time Facial Analysis using Tensorflowand OpenCV
IRJET - Real Time Facial Analysis using Tensorflowand OpenCV
 
IRJET - A Review on: Face Recognition using Laplacianface
IRJET - A Review on: Face Recognition using LaplacianfaceIRJET - A Review on: Face Recognition using Laplacianface
IRJET - A Review on: Face Recognition using Laplacianface
 
IRJET- Age Analysis using Face Recognition with Hybrid Algorithm
IRJET-  	  Age Analysis using Face Recognition with Hybrid AlgorithmIRJET-  	  Age Analysis using Face Recognition with Hybrid Algorithm
IRJET- Age Analysis using Face Recognition with Hybrid Algorithm
 
Paper id 25201441
Paper id 25201441Paper id 25201441
Paper id 25201441
 
A Biometric Fusion Based on Face and Fingerprint Recognition using ANN
A Biometric Fusion Based on Face and Fingerprint Recognition using ANNA Biometric Fusion Based on Face and Fingerprint Recognition using ANN
A Biometric Fusion Based on Face and Fingerprint Recognition using ANN
 
IRJET- Facial Expression Recognition using Deep Learning: A Review
IRJET- Facial Expression Recognition using Deep Learning: A ReviewIRJET- Facial Expression Recognition using Deep Learning: A Review
IRJET- Facial Expression Recognition using Deep Learning: A Review
 
A survey on content based medical image retrieval for
A survey on content based medical image retrieval forA survey on content based medical image retrieval for
A survey on content based medical image retrieval for
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face Recognition
 
Face Recognition System and its Applications
Face Recognition System and its ApplicationsFace Recognition System and its Applications
Face Recognition System and its Applications
 
G041041047
G041041047G041041047
G041041047
 
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKHUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
 
Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...
Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...
Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs &amp; gis techniques
Estimation of morphometric parameters and runoff using rs &amp; gis techniquesEstimation of morphometric parameters and runoff using rs &amp; gis techniques
Estimation of morphometric parameters and runoff using rs &amp; gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs &amp; gis techniques
Estimation of morphometric parameters and runoff using rs &amp; gis techniquesEstimation of morphometric parameters and runoff using rs &amp; gis techniques
Estimation of morphometric parameters and runoff using rs &amp; gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLManishPatel169454
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 

Recently uploaded (20)

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 

An optimal face recoginition tool

  • 1. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 351 AN OPTIMAL FACE RECOGINITION TOOL Marri.Lingareddy1 , D. Haritha2 1 Research scholar,2 Assistant professor, ECM Department, KL University, AP, India, marrilingareddy@gmail.com. haritha_donavalli@kluniversity.in Abstract Face recognition is one of the crucial and important methods for the security purposes. The accuracy of the facial recognition system degrades over time. Therefore the FRS system must be up-to-date. Sometimes the system will not be up-to-date because of unlabelled face images, or because of change in the facial expressions or because of any relevant changes in face of person. Therefore in such cases also the FRS must be self-trained to make the system up-to-date. In this paper a semi-supervised version, based on the self- training method, of the classical PCA-based face recognition algorithm is proposed to exploit unlabelled data for off-line updating of the Eigen space and the templates. Reported results show that the exploitation of unlabelled data by self-training can substantially improve the performances achieved with a small set of labelled training examples. Index Terms: Eigen faces, Face recognition, face classifier, occluded faces -----------------------------------------------------------------------***----------------------------------------------------------------------- 1. INTRODUCTION Face recognition is a method of automatically identifying or verifying a person’s video frame or video source or any digital image. Generally this type of method is used for security purposes and the face its self is used as a key to identify the systems password. Therefore a facial recognition system is a computer application to check the identity of the person. One of the ways to do this is by comparing selected facial features from the image and a facial database. 1.1 Methods There are three different type of techniques are employed to detect the face. They are I. Traditional method II. 3-dimensional recognition III. Skin texture analysis In traditional method the facial recognition is done based on extracting the landmarks or features from an image of his/her face. Therefore an algorithm is written in such a way that based on the relative position, size, and/or shape of the eyes, nose, cheekbones and jaw are used to search for other images with matching features. Recognition algorithms can be divided into two main approaches, geometric, which look at distinguishing features, or photometric, which is a statistical approach that distils an image into values and compares the values with templates to eliminate variances. The 3-D face recognition method is a newly emerging method and this method uses 3D sensors to capture information about the shape of the face. This method is used to acquire improved accurate results. Added advantage to this method is that the face recognition is not affected by changes in lighting and can also identify a face from a range of viewing angles, including a profile view. The skin texture method uses the unique lines, patterns and spots apparent in a person’s skin and turns them into a mathematical space. Facial recognition systems are also beginning to be incorporated into unlocking mobile devices. The android market is working with facial recognition and integrating it into their cell phones. They have created an application called Visidon Applock. This application allows you to put a facial recognition lock on any of your applications. This allows you to increase the safety of your private apps and content. Facial recognition technology is already implemented in the iPhoto application for Macintosh. 1.2 Face Accuracy The accuracy of Face Recognition Systems (FRSs) on a user will decrease with time [4][5][6][7]. The decrease in the accuracy is the result of changes in facial appearance because of factors such as ageing, hair-growth, surgery, weight changes, sun-exposure, ancestry, sex, health, disease, drug use, diet, sleep deprivation, and bio-mechanical factors [1][8][9][10]. The appearance changes in user are illustrated with the figure1. Figure1: Facial appearance in a person due of hair growth
  • 2. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 352 Therefore to maintain the accuracy of the facial recognition system over time the FRS should be up-to-date. FRS will be up-to-date through the self-update procedure. In this procedure the system is re-tined with the unlabelled data, which is acquired every time a user interacts with the system. The unlabelled facial images are added to the training set according to the predicted label. 1.3 Algorithm Types The method of classifier is used for recognition affects the long term accuracy of the self-updating FRS’s. Therefore three different types of algorithms are designed [1]. They are i. Eigen faces(EF) ii. Fisher faces(FF) iii. Similarity based fisher faces(SFF) These algorithms are chosen because of their inductive reasoning in their training process. The EF is purely a transductive reasoning and doesn’t use inductive reasoning. The FF is a little inductive in nature because it uses a global statistics of the user data to find the best discriminating sub- space. SFF is more inductive as user-specific models are built in such a way that they are later used for recognition. Induction is a method which uses training data to find approximations of functions that describe the data. 2. RELATED WORK Considerable research in social psychology has shown that facial expressions help coordinate conversation and have considerably more effect on whether a listener feels liked or disliked than the speaker's spoken words. Mehrabian indicated that the verbal part of a message contributes only for 7 percent to the effect of the message as a whole. The vocal part contributes for 38 percent, while facial expression of the speaker contributes for 55 percent to the effect of the spoken message. Therefore face recognition is an important addition to computer vision research [1]. Computer vision aims to duplicate the effect of human vision by electronically perceiving and understanding an image. Computer vision techniques use the results of mathematics, pattern recognition, artificial intelligence, psycho-physiology, computer science, electronics, and other scientific disciplines. Recent advances in image analysis and pattern recognition open up the possibility of automatic detection and classification of emotional and conversational facial signals. Automating facial expression analysis could bring facial expressions into man-machine interaction as a new modality and make interaction tighter and more efficient. Such a system could also make classification of facial expressions widely accessible as a tool for research in behavioral science and medicine [1]. 3. REPRESENTATION OF FACIAL ECOGNITION SYSTEM The outline of a typical face recognition system is given figure 2. This outline carries the characteristics of a typical pattern recognition system. Figure2: Generic representation of facial recognition There are 4 main blocks that represent the face recognition. In the input block an image is passed to the system for classification. The images vary in format, size and resolution. The image is pre-processed to remove unwanted noise from light and the environment. The image also then is compressed and normalized. The classifier decides whether the image belongs to the face or the non-face class based on the information learned during training. The output image indicates whether the input image is thought to certain or not. Some systems indicate its location. 4. PATTERN RECOGNITION Pattern recognition is a modern day machine intelligence problem with numerous applications in a wide field, including face recognition, character recognition, speech recognition as well as other types of object recognition. Its ability to read text and shapes plays an important role in medical diagnostic science, machine conditioning and monitoring and sorting. The speed of processing is important for its real-time application in banks, stores and voice recognition banks, stores and voice recognition. A basic pattern classification system consists of sensor inputs, feature extraction, selection and classification. Sensors could be microphone, digital camera orographic, features are extracted with statistical, geometrical or descriptor means. The field of pattern recognition is still very much in its infancy, although in recent years some of the barriers that hampered such automated pattern recognition systems have been lifted due to advances in computer hardware providing machines capable of faster and more complex computation. Pattern recognition can be classified as the categorization of input data into identifiable classes via the extraction of significant features or attributes of the data from a background of irrelevant detail. The functional block diagram of an adaptive pattern recognition system is shown in Figure3. PREPROCESS CLASSIFIER OUTPUT INPUT
  • 3. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 353 5. FACE RECOGNITION Face recognition is a pattern recognition task performed specifically on faces. It can be described as classifying a face either “known" or "unknown", after comparing it with stored known individuals. It is desirable to have a system that has the ability of learning to recognize unknown faces. Figure3: Block diagram of Pattern recognition Face recognition involves comparing an image with a database of stored faces in order to identify the individual in the input image. The related task of face detection has direct relevance to recognition because images must be analyzed and faces identified, before they can be recognized. 5.1 Types of image conditions Face recognition, although a trivial task for the human brain has proved to be extremely difficult to imitate artificially, because although commonalities exist between faces, they can vary considerably in terms of age, skin color, orientation, facial expression and presence official furniture such as glasses or facial hair. The problem is further complicated by differing light conditions, image qualities and geometries, as well as the possibility of partial occlusion and disguise. Hence, a robust face recognition system should be capable of classifying a face image as "known" under the following conditions: • Scale variance • Orientation variance • Illumination variance • Background variance • Emotional expression and detail variance • Noise variance For basic face recognition systems, some of these effects can be avoided by assuming and ensuring a uniform background and uniform light conditions. Figure 4: Block diagram of face recognition system This assumption is acceptable for some applications such as automated separation of nuts from screws on a production line, where light conditions can be controlled and the image background will be uniform. Figure 4 outlines the block diagram of a typical face recognition system. Face recognition is the most natural, non-intrusive, and user- friendly biometric measure, because it requires no disturbance to the people being identified. Most of the existing systems can successfully recognize faces only when they appear under constrained conditions. The performance will degrade significantly when face images are obtained under variable illumination conditions, facial expressions, poses or perspectives, especially when occlusion happens. Occlusions may be caused by sunglasses, a thick beard, the wearing of a scarf, or expression variations. In this paper, we will focus on how to improve the performance for recognizing occluded faces. In a nutshell, we first complete or repair the occluded faces with our proposed spectral algorithm, and then perform face recognition on the completed images. A face-completion algorithm involves three main procedures: occluded face clustering via the sparse representation, image-based data mining, and face image repairing using the spectral graph theory. Our algorithm is developed on the basis that global and local similarities among different faces are widespread. A damaged face can be considered as a signal sequence, in which each un-occluded pixel is seen as the element. The sequence is matched with faces in our large database via sparse representation, and then the most similar local part to the occluded part is selected after the sparse representation- based clustering. Some other classification algorithms, e.g. the Euclidean distance and Sum-of-Squared-Differences (SSD) based classification, are alternative to this step. However, compared to sparse representation, all the other methods require solving the classification problem via an exhausting search, which is very computationally intensive. The sparse representation method is able to avoid searching all the items in a more efficient way via dynamic programming.
  • 4. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 354 Finally, in order to provide fusion and natural repairing results, a mathematical model that follows an actual painters’ painting procedure, namely guided label learning, is developed using the spectral graph theory. Image completion is one of the most talked-about topics in the Graphics area]. A number of useful tools, e.g. image in painting .Poisson equations, and graph-cuts, have been established for real-scene image completion. But these ideas require too much information about the damaged images, and they are always performed on high-resolution color images. When referring to face recognition, the algorithms are usually developed based on low-resolution gray-scale images, and the traditional algorithms may lose their effectiveness. Hence, as per the Poisson equation, we extend it to the graph-based domain. Due to the flexibility of the graph topology, low-resolution gray-scale images can be coped with quite well. 5.2 Proposed scheme The major contributions of this paper are as follows: i. We propose a new face reconstruction algorithm based on sparse representation and a graphical model. Our algorithm is established from a new perspective, different from the existing face reconstruction algorithms. Figure 5: Flow chart of FRS system ii. The proposed algorithm is able to improve the recognition results dramatically, with an increase of up to 30% in recognition rate. Face analysis block: The face analysis block is responsible for detection and segmentation of human faces. Face detection: To detect faces accurately in real-time, our system employs Viola and Jones face detection procedure [11]. The detector works at a speed of 15 frames per second at 12 resolution levels, while achieving low false acceptance rates. Face segmentation: For the segmentation of the prominent facial features our system employs Active Shape Models with Invariant Optimal Features (IOFASM) [12]. This algorithm can automatically locate the outlines of eyes, mouth, nose, brows and silhouette contour of the face with an average error of approximately 2% of the inter-eye distance. Identification block: The identification block extracts texture from a segmented face and uses it to identify a user. Facial feature extraction: To make facial texture independent of the facial expression, each image was warped using a piece-wise affine mapping between the result of the segmentation step and the mean shape. The texture parameters for each image were extracted by constructing an image intensity model of an Active Appearance Model [13]. Classification Once the texture parameters are obtained, they are whitened [14] and then a distance-weighted k-Nearest Neighbor classifier (k-NN) is used to identify the user in the image. The distance between two texture vectors is defined as the angle between them. The angle based distance metric was shown to be a good choice for PCA-based algorithms [15]. All the experiments in this paper were performed using the five nearest neighbors (k = 5). Automatic learning block Every time a facial image has been identified, it goes through an automatic selection process that determines whether it is suitable to be added to the training set of the appropriate user. The selection process deems two categories of images to be unsuitable for automatic learning: 1) images with outdated facial appearance, 2) Images where the algorithms used in our system produce unreliable results. 6. ANALYSIS OF THE ALGORITHM USED Figure6: Damaged face representation using graph cut In this algorithm, we first cluster the images which have a similar sparse representation to the query image. Then, these clustered images are used to find the best-matched patch for guiding the synthesis of the missing parts. The patch obtained is used to guide the in-painting work of the damaged part of the occluded face. Hence, the searched patch should have a similar local property as the damaged part. The target region, which needs to be filled in the damaged face image F, is de-
  • 5. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 355 noted as R. The goal is to find the best-matched patch in the sparse representation data-pool, which fits its neighborhood R with the least SSD. This procedure is shown in Figure 6. The region of missing pixels is defined as R, and the mask region as J, on a damaged face image. Mathematically, mask J is an expanded region of the damaged patch. We expand the boundary of R by h pixels and define it as: J (i, j)=0, if (d(i, j)>h)or((i, j)∈ R),1, I d(i, j)<h. (1) The mask J is painted as a thin band surrounding the missing region R. d (i, j) indicates the distance between the pixel (i, j) and its nearest pixel in the damaged/occluded region R. Figure7: The missing region R and masked region J of damaged face F 7. PARTIALLY OCCLUDED FACE OMPLETION AND RECOGNITION In this section, we will apply the completion algorithm on partially occluded face images. The occluded part of the face is detected using the graph cut, which is a common method for image segmentation. Consequently, the proposed spectral graphic based image completion algorithm is employed for each damaged faces. Figure9: AR database for occluded faces Some repaired results are shown as the second and the fourth column in Figure9. The repairing algorithm is able to provide a fusion and produce natural results. The recognition experiment was also developed based on the AR database. For training, 847 un-occluded images (121 subjects, 7 images per subject) were used. For testing, the occluded faces were divided into two subsets, denoted as AR1 and AR2. These two sets included images with sun-glasses and images with a scarf, respectively. The two methods common face recognition algorithms, the PCA and Gabor methods, with and without using the algorithm to evaluate the recognition performance. Figure10: Synthetic partially occluded faces For testing, synthetic occlusions were added to 484 images. As shown in Figure9, the location of the occlusion is randomly selected. And the curves of the recognition rates with different amounts of occlusion are shown in Fig. 6. The occlusion percentages range from 0% to 50%, in 12.5%additions. 7.1 Training and updating procedure The k-NN classifier was trained with the texture parameters obtained from the 472 images in the Training set and their corresponding user IDs. Using the images in the Update set (in chronological order), three types of updates were performed to the Training set [2]: i. UC. In this case, updates were performed with the total confidence, C. ii. UCc. The update process is similar to that performed in [3]. In this scenario, if Cc computed for an image in the Update set is greater than C of any of the images in the Training set, then the image will be added to the Training set. Otherwise, the image is ignored. iii. UCt. This is a trivial update strategy where newer images from Update set replace older ones in the Training set. In other words, if an image has a Ct value greater than that of any of the images in the Training set, then it is added to the Training set. CONCLUSIONS Face recognition is both a challenging and important recognition technique among all the biometric techniques; face recognition approach possesses one great advantage, which is its user-friendliness.
  • 6. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 356 As face recognition system has become an important method for security purpose the FRS system was made up-to-date using self-trained method. In this paper the classical PCA-based face recognition algorithm & Guided labelled algorithm are used so that the face is recognized in any of the cases (Such as age, growth of hair or beard, any of the blurred images, or the low lighting images and finally different pose of the faces). Self-training performances are achieved with a small set of labelled training examples. So the self-trained is used to keep the system up-to-date and made the better FRS. RESULTS Figure 11: Face recognition is done even in growth of beard Figure 12: Detected image when the age is grown Figure 13: Face recognition is done when the person is aged & having spectacles on his face Figure 14: Face recognition is done even for blurred images Figure 15: Face recognition is also done when the pose is changed REFERENCES [1] An Experimental Evaluation of Three Classifiers for Use in Self-Updating Face ecognition Systems Sri- Kaushik Pavani, Federico M. Sukno, David Delgado- Gomez, Constantine Butakoff, Xavier Planes, and Alejandro F. Frangi [2] A Confidence-based Update Rule for Self-Updating Human Face Recognition Systems Sri-Kaushik Pavani 1;2 , Federico M. Sukno 2;1 , Constantine Butako®, Xavier Planes 1;2 and Alejandro F. Frangi [3] D. Mou, R. Schweer, and A. Rothermel. Automatic databases for unsupervised face recognition.In CVPRW 2004, pages 90{97}. [4] P. J. Phillips, P. Grother, R. Micheals, D. M. Blackburn, E. Tabassi, and M. one, “Face Recognit. Vendor Test 2002: Evaluation Report,” National Inst. Standards Technol., Tech. Rep. NISTIR 6965, 2003. [5] P. J. Flynn, K. W. Bowyer, and P. J. Phillips, “Assessment of time dependency in face recognition: An initial study,” in Proc. 4th Int. Conf. Audio- and Video-Based Biometric Person Authentication. Lecture Notes in Computer. Science, Guildford, U.K., 2003, vol. 2688, pp. 44–51. [6] H. Wang and P. J. Flynn, “Experimental evaluation of eye location ac- curacies and time-lapse effects on face
  • 7. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 357 recognition systems,” in Proc. 5th Int. Conf. Audio- and Video-Based Biometric Person Authentica- tion. Lecture Notes in Comput. Science, New York, NY, 2005, vol. 3546, pp. 627–636. [7] H.Ling,S.Soatto,N.Ramanathan,andD.W.Jacobs,“Astud yofface recognition as people age,” in Proc. 11th IEEE Int. Conf. Comput. Vis., Rio de Janeiro, Brazil, 2007, pp. 1–8. [8] N. Ramanathan, R. Chellappa, and S. Biswas, “Computational methods for modeling facial aging: A survey,” J. Vis. Lang. omput., vol. 20, no. 3, pp. 131– 144, 2009, 1. [9] L. Millsopp, L. Brandom, G. Humphris, D. Lowe, C. Stat, and S. Rogers, “Facial appearance after operations for oral and oropharyngeal cancer: A comparison of casenotes and patient-completed questionnaire,” Brit. J. Oral Maxillofacial Surg., vol. 44, no. 5, pp. 358– 363,2006. [10] M. A. Taister, S. D. Holliday, and H. I. M. Borrman, “Comments on facial aging in law enforcement investigation,” Forensic Sci. Commun., vol. 2, no. 2, 2000 [Online]. Available: http://www.fbi.gov/about-us/ lab/forensic-science- communications/fsc/april2000/taister.htm [11] P. Viola and M. Jones. Robust real-time face detection. Int. J. Comput. Vision, 57(2):137{154, 2004}. [12] F. Sukno et al. Active shape models with invariant optimal features. IEEE Trans. Pattern Anal. Mach. Intell., 29(7):1105{1117, 2007}. [13] T. Cootes, G. Edwards, and C. Taylor. Active appearance models. IEEE Trans. Pattern Anal. Mach. Intell., 23(6):681{685, 2001}. [14] P. Navarrete and J. Ruiz del Solar. Comparative study between di®erent eigenspace-based approaches for face recognition. In FS 2002, pages 178{184}. [15] V. Perlibakas. Distance measures for PCA-based face recognition. Pattern Recogn.Lett., 25(6):711{724, 2004}. BIOGRAPHIES: M. Linga Reddy has received his B.Tech degree in ECE from ACE in 2011. He is presently pursuing M.Tech in Embedded systems in E.C.M. Department from KL University since July 2011. D. Haritha, Assistant professor, ECM Department, KL University AP, India, haritha_donavalli@kluniversity.in