SlideShare a Scribd company logo
1 of 11
Download to read offline
International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.2, March 2016
DOI:10.5121/ijfcst.2016.6205 55
A FACE RECOGNITION USING LINEAR-DIAGONAL
BINARY GRAPH PATTERN FEATURE EXTRACTION
METHOD
Satyendra Rajput and Dr. Joyti Bharti
Department of Computer Science and Engineering, MANIT Bhopal, Madhya Pradesh,
India
ABSTRACT
Face recognition is one the most interesting topic in the field in computer vision and image processing.
Face recognition is a processing system that recognizes and identifies individuals human by their faces.
Automatic face recognition is powerful way to provide, authorized access to control their system. Face
recognition has many challenging problems (like face pose, face expression variation, illumination
variation, face orientation and noise) in the field of image analysis and computer vision. This method is
work on feature extraction part of face recognition. New way to extract face feature using LD-BGP code
operator it is like LGS and LBP feature extraction operator. In our LD-BGP-code operator work in two
direction first linear then diagonal. In both direction, its create eight digits code to every pixel of image.
Means of these two directional are taken so that is cover all neighbor of center pixel. First linear direction,
only horizontal and vertical pixel are taken. Second diagonal direction only diagonal pixels taken. In
matching phase, we use Euclidean distance to match a face image. We perform the Linear and diagonal
directional operator method on face database ORL. We get accuracy 95.3 %. LD-BGP method also works
on different type image like illuminated and expression variation image.
KEYWORDS
face recognition, text based local descriptor, biometric, pattern recognition and LD-BGP.
1. INTRODUCTION
Face recognition is one of the field of biometrics and computer vision system. Using digital face
image we analysis different individual person and recognized every individual with their
corresponding digital image. It has a wide range of applications in information security, image
retrieval, and access control and law enforcement surveillance. The area of face recognition has
achieved a significant research progress. This is due to the current systems performing well under
relatively controlled environments but tend to suffer when variations in different factors, such as
aging, illumination, facial expressions and pose, are present. Thus the main goal of the ongoing
research is to increase the performance and robustness of the system against various factors.
Mainly face recognition system task work in three phase figure 1.
International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.2, March 2016
56
Figure 1.Phases of face recognition system
Various approaches has been proposed in face recognition field. Eigen face was proposed by
Mathrew and Alex they use eigen value and eigen vector concept in face recognition problem.
[5]Other approach like LDA isused for face recognition system it is also known as fisher face. [6]
These two method is dimension reduction techniques that are reduce higher dimension into lower
dimension. Template matching method is also used in face recognition problem in which template
of facial feature is generate and do a template matching of each person image[7]. Neural network
is also in face recognition problem two basic neural network first feed forward second back
propagation neural network is used. [8, 9].
2. GENERAL DIFFICULTIES
There are two major factor that effect the face recognition problem. 1) Intrinsic factors 2)
extrinsic factors, [2] Intrinsic factors are due to the physical nature of the face and are
independent of the observer. These factors can be further divided into two classes: intrapersonal
and interpersonal. Intrapersonal factors are responsible for varying the facial appearance of the
same person, some examples being age, facial expression and facial paraphernalia (facial hair,
glasses, cosmetics, etc.). Interpersonal factors, however, are responsible for the differences in the
facial appearance of different people, some examples being ethnicity and gender.[2] Other
extrinsic factors cause the appearance of the face to alter via the interaction of light with the face
and the observer. These factors include illumination, Expression variation, face occlusion, tilted
face pose, scale and imaging parameters (e.g., resolution, focus, imaging, noise, etc.)
Figure 2. General difficulties i) illumination variation ii) expression change iii) occluded face iv) titled face
3. FACIAL FEATURE
Every facial is almost unique to identify the each person. For which feature of face is extracted by
different method. Research also has proposed different method for face feature extraction.
Basically two type of facial feature extraction method 1) local feature 2) holistic feature, In local
feature method we work on local feature of face image and holistic method hole image is consider
as feature to uniquely recognized individual.
International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.2, March 2016
57
3.1. Local Binary Pattern
Ojala et al. propsed the LBP operator which was originally designed for texture description and
analysis.[12] The operator assigns a label to every pixel of an image by thresholding the 3 x 3-
neighborhood of each pixel with the center pixel value and considering the result as a binary
number. Then, the histogram of the labels can be used as a texture descriptor. [4]
To be able to deal with textures at different scales, the LBP operator was later extended to use
neighborhoods of different sizes.
A) Image
52 4 9 0 0 0
65 61 63 1 1 153
67 33 85 1 0 1
C) Grey values D) binary values E) LBP values
Figure 3.Basic LBP operator
3.2. Local Graph Structure
It based on graph theory concept which is proposed by Eimad E.A. Abusham. LGS work on six
neighboring pixel, it choose a target threshold pixel C, then it starts by moving anti clockwise
direction at the left side of the target C pixel, If the neighboring pixel has a higher gray value than
that compared with the target pixel or it has same gray value, then it will assign 1 binary value on
the edge which is connecting the two vertices, otherwise it will assign a 0 binary value. After
finishing on the left side of graph we interlude for moment at the target pixel C and then it move
in horizontal way to the right side of graph region in clockwise direction and it apply the similar
process till the C target point is achieved. [1]
Figure 4. Local Graph structure operator
B) One pixel
Threshold
Binary
00011011
International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.2, March 2016
58
3.3. Symmetric Local Graph Structure
SLGS is an extended version of LGS, it is proposed by Mohd Fikri Azli Abdullah in 2014. [3]
This techniques is more balanced one as compared to LGS because it is symmetric to both side of
the central pixel. Each pixel is related with six neighboring pixel in a radius of one and two. This
techniques doesn’t contain any redundant information as left side and right side of center pixel
have a similar weightage. Figure 3, show the relationship of the neighbor pixels and the figure,
shows SLGS operator.[3]
Figure 5. Relationship of neighbor pixel with center pixel
Figure 6. The SLGS Operator
SLGS method is very easy and simple. But majority of neighboring relationship lies only on
horizontal pixels along left side and to the right side of the image. There is no focus on vertical
pixels neighbor relationship.
Among three local feature techniques SLGS gives more accurate result in face recognition
system. Comparison of these techniques is given in the table below:
International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.2, March 2016
59
Table 1.Summary of different face recognition techniques
Parameter
Techniques
Neighbor
pixels
Radius of
neighbors
Based On References
LBP 8 pixels 1 (General case) Neighbor
connectivity
[4]
LGS 5 pixels 1 left side, 2right
side
Graph
structure
[3]
SLGS 6 pixels 2 both side Symmetric
Graph
[1]
3.4. LD-BGP
In orl face database image size is 92X112 pixels values. Input image is grey image which is
divided in 4X4 part means 16 equal part each part of image is size of 23X28. These subimage is
called block of image. In each sub image total 456 pixel values are coded into LD-BGP-Code
operator. So total 456 LD-BGP-Code are generated. Per image total is 16 X 456 (16 X 19 X 24) =
7296 pixel values.
Block of
Image 1
(23 X 28)
Block of
Image 2
(23 X 28)
Block of
Image 3
(23 X 28)
Block of
Image 4
(23 X 28)
Block of
Image 5
Block of
Image 6
Block of
Image 7
Block of
Image 8
Block of
Image 9
Block of
Image 10
Block of
Image 11
Block of
Image 12
Block of
Image 13
(23 X 28)
Block of
Image 14
(23 X 28)
Block of
Image 15
(23 X 28)
Block of
Image 16
(23 X 28)
Figure 7. Blocks of image
In each blocks we apply Linear and Diagonal pattern method for feature extraction. Each
direction pattern generates 8 bit code corresponding to every pixel.
International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.2, March 2016
60
Figure 8. LD-BGP code operator
3.4.1. Linear Directional Binary Pattern
We take 5 X 5 matrix of image block. Then linear code is extraction corresponding to
directional matrix shown below. We also assign a weight in directional matrix. Using
weight we get eight digits code to center pixel value.
Figure 9.Linear direction binary pattern
International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.2, March 2016
61
Where, C= center pixel values, N= neighbor of center pixel
Above figure shown directional matrix of 5 X 5 and weighted matrix that is used in linear LD-
BGP-Code extraction. In linear we take all linear neighbor that are left, right, above and below
with radius of two. Total eight neighbors is used in linear LD-BGP-Code extraction method.
Linear LD-BGP-Code in equation (4.3)......
P(c) = { (f(x-2, y) -f(c)), (f(x-1, y) - f(c)), (f(x, y+1)- f(c)), ( f(x, y+2) -f(c)),
(f(x, y-1) - f(c)), (f(x, y-2) -f(c)), (f(x+1, y) -f(c)), (f(x+2, y) -f(c)) }
. . . . . . . . . . . . . . Equation (1)
Equation (1) shows general process of LD-BGP-Code extraction of center values.
3.4.2. DIAGONAL DIRECTION BINARY PATTERN
We take 5 X 5 matrix of image block. Then diagonal code is extraction corresponding to
directional matrix shown below. We also assign a weight in directional matrix. Using weight we
get eight digits code to center pixel value.
Figure 10. Diagonal direction LD-BGP-Code
Where, C= center pixel values, N= neighbor of center pixel
Figure 10 shown directional matrix of 5 X 5 and weighted matrix that is used in diagonal LD-
BGP-Code extraction. In linear we take all diagonal neighbor that are left corner above, right
corner above, below left corner and below right corner with radius of two. Total eight neighbors
is used in diagonal LD-BGP-Code extraction method.
International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.2, March 2016
62
Diagonal LD-BGP-Code equation ......
P(c) = {((f(x-2, y-2) –f(c)), (f(x-1, y-1) – f(c)), (f(x-1, y+1) - f(c)), ( f(x-2, y+2) –f(c)),
(f(x+1, y-1) - f(c)), (f(x+2, y-2)-f(c)), (f(x+1, y+1)-f(c)), (f(x+2, y+2)-f(c)) } . . . Equation (2)
4. EXPERIMENTAL DESIGN
Freely available orl face database (also known as AT & T) is use to test performance of LD-BGP.
[] In this database there are40 distinct person with ten different images of each person. For some
person, the images were taken at different times, varying the lighting, facial expressions (open /
closed eyes, smiling / not smiling) and facial details (glasses / no glasses). All the images were
taken against a dark homogeneous background with the subjects in an upright, frontal position
(with tolerance for some side movement).
Figure 11: Sample image of ORL face
5. RESULT
Experiment is conducted to compare the effectiveness of distance measures which are Euclidean
distance. The experiment used LDBGP for feature extraction algorithm on the ORL(AT&T)
database.
Table 1show accuracy on nearest neighbor with Euclidean distance of fine K, medium K and
weighted K nearest neighbor classifier. We get Overall maximum accuracy 95.30%.
Table 2. Accuracy on ORL database
Classifier Accuracy
Fine K-Nearest Neighbor 93.30
Medium K-nearest Neighbor 95.30
Weighted K-nearest Neighbor 95.30
Overall Maximum Accuracy 95.3
International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.2, March 2016
Table 3.Show accuracy of LD-
training files.
Table 3. Accuracy with different training files percentage.
Training files %
10
20
30
40
50
60
70
80
90
Figure 12.
6. APPLICATION
Primary face recognition is use for two task 1) verification 2) identification
offered an image of the face of a person unknown to the identity claim to determine if the
individual is who he / she claim
image of the person is unknown
database of known individual image data. Also known as one to many matching
88.76 89.54
60
65
70
75
80
85
90
95
100
10 20
Accuracy
International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.2, March 2016
-BGP method using distance measure with different number of
Accuracy with different training files percentage.
Training files % Accuracy % (Ed)
89.58
89.86
90.28
91.66
92.18
93.60
94.40
95.10
95.30
Figure 12. Graph for Accuracy with training files
Primary face recognition is use for two task 1) verification 2) identification, first: When I was
image of the face of a person unknown to the identity claim to determine if the
claim to be. Also known as one to one matching. Second Give an
and identification of the person by comparing this image with the
database of known individual image data. Also known as one to many matching. [11].
90.28 91.66 92.18 93.65 94.01 94.25
30 40 50 60 70 80
Training file %
Accuracy measures
International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.2, March 2016
63
BGP method using distance measure with different number of
, first: When I was
image of the face of a person unknown to the identity claim to determine if the
to be. Also known as one to one matching. Second Give an
mage with the
. [11].
94.57
90
International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.2, March 2016
64
There are numerous application areas in which face recognition can be exploited for these two
purposes, like 1) ATM access control system 2) Public Surveillances 3) General identification 4)
Smart card system 5) witness face reconstruction 6) Video indexing and 7) Criminal justice
system etc.
7. CONCLUSION AND FUTURE WORK
In this thesis work, we presented a fully automatic face recognition system which works in real-
time and which is robust to local illumination changes. In this system we presented novel feature
extraction method that is used in face recognition. Every image of face are code into new P-code
method which capture both linear directional feature and diagonal directional feature. These two
directional features are eight digit code. That is corresponding to all the pixel of face image.
These two directional features capture both straight connectivity and diagonal connectively. We
take means value of these two eight digits directional feature. Using means we take both
directional feature and also coded into eight digits. So that it is like LBP feature that is proposed
in 2002 by co. as compare to LBP feature extraction method LD-BGP feature extraction method
is different and capture more useful information about the neighbors to the center pixel.
LD-BGP feature extraction techniques accuracy on face recognition system can be improve by
using different preprocessing method in preprocessing phase. Like this accuracy also improve in
classification phase using different classifier. This technique is based on LBP and LGS. So that in
future new techniques of different graph based can also proposed.
So we think lot of work can possible in LD-BGP feature extraction techniques. But till this
techniques work nicely and give good result on face recognition system.
REFERENCES
[1] Eimad E.A. Abusham and Housam K. Bashir, (2011) “Face Recognition Using Local Graph
Structure (LGS)” , Springer-journal-Verlag Berlin Heidelberg Human-Computer Interaction, Part II,
HCII 2011, LNCS 6762, page no. 169–175.
[2] Rabia Jafri and Hamid R. Arabnia,(2009)“A Survey of Face Recognition Techniques”,Journal of
Information Processing Systems, Vol.5, No.2.
[3] Mohd Fikri Azli Abdullah, Md Shohel Sayeed, Kalaiarasi Sonai Muthu, Housam Khalifa Bashier,
Afizan Azman and Siti Zainab Ibrahim, (2014) “Face recognition with Symmetric Local Graph
Structure (SLGS)”, ELSEVIER Expert Systems with Applications journal 41 pp. 6131–6137.
[4] Timo Ahonen, Abdenour Hadid, and Matti Pietik¨ainen, (2004) “Face Recognition with Local Binary
Patterns”,Springer-Verlag Berlin Heidelberg, journal LNCS 3021, pp 469-481.
[5] Mathew Turk and alex pentland,(1991)“Eigen faces for recognition”,vision modeling Group the
media laboratory Massachusetts Institute of technology journal of cognitive neuroscience Vol. 3, No.
1.
[6] Suman Kumar Bhattacharyya, Kumar Rahul,(2013) “FACE RECOGNITION BY LINEAR
DISCRIMINANT ANALYSIS” International Journal of Communication Network Security, ISSN: 2231
– 1882, Vol. 2, Issue-2,
[7] sadhna sharma,(2013) “Template Matching Approach for Face Recognition System” International
Journal of Signal Processing Systems Vol. 1, No. 2.
International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.2, March 2016
65
[8] M.S.R.S. Prasad, S.S. Panda, G. Deepthi and V. Anisha, (2011) “Face Recognition Using PCA and
Feed Forward Neural Networks”, International Journal of Computer Science and
Telecommunications Vol. 2, Issue 8.
[9] Anissa Bouzalmat1, Naouar Belghini2, Arsalane Zarghili3 and Jamal Kharroubi, (2011)“Face
Detection and Recognition Using Back Propagation Neural Network and Fourier Gabor Filters”
Signal & Image Processing An International Journal (SIPIJ) Vol.2, No.3.
[10] Orl face databse link http://www.cl.cam.ac.uk/research/dtg/attarchive/facedatabase.html
Access time 1/08/2015.
[11] Divyarajsinh N. Parmar and Brijesh B. Mehta, (2013) “Face recognition method and applications”,
Int.J.Computer Technology & Applications, ISSN: 2229-6093 Vol 4 (1), pp 84-86.
[12] T. Ojala, M. Pietikäinen, and T. Mäenpää, (2002) "Multiresolution gray-scale and rotation invariant
texture classification with local binary patterns," IEEE Transactions on Pattern Analysis and Machine
Intelligence, Vol. 24, No. 7, pp. 971-987, 2002.
AUTHORS
Satyendra Rajput is pursuing Mtech (computer science) degree from MANIT Bhopal. His
current research interest includes image processing, biometric system, computer Graphics
and Computer network.
Dr. Joyti Bharti is renewed faculty in MANIT Bhopal. His Current research interest
includes image processing, ComputerVision, computer Graphics, image segment and
hiding.

More Related Content

What's hot

Fourier mellin transform based face recognition
Fourier mellin transform based face recognitionFourier mellin transform based face recognition
Fourier mellin transform based face recognitioniaemedu
 
Face skin color based recognition using local spectral and gray scale features
Face skin color based recognition using local spectral and gray scale featuresFace skin color based recognition using local spectral and gray scale features
Face skin color based recognition using local spectral and gray scale featureseSAT Journals
 
A novel approach for performance parameter estimation of face recognition bas...
A novel approach for performance parameter estimation of face recognition bas...A novel approach for performance parameter estimation of face recognition bas...
A novel approach for performance parameter estimation of face recognition bas...IJMER
 
NEURAL NETWORK BASED SUPERVISED SELF ORGANIZING MAPS FOR FACE RECOGNITION
NEURAL NETWORK BASED SUPERVISED SELF ORGANIZING MAPS FOR FACE RECOGNITIONNEURAL NETWORK BASED SUPERVISED SELF ORGANIZING MAPS FOR FACE RECOGNITION
NEURAL NETWORK BASED SUPERVISED SELF ORGANIZING MAPS FOR FACE RECOGNITIONijsc
 
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET TransformRotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET TransformIRJET Journal
 
IRJET - Facial Recognition based Attendance System with LBPH
IRJET -  	  Facial Recognition based Attendance System with LBPHIRJET -  	  Facial Recognition based Attendance System with LBPH
IRJET - Facial Recognition based Attendance System with LBPHIRJET Journal
 
OBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONS
OBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONSOBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONS
OBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONSijcseit
 
Regenerating face images from multi-spectral palm images using multiple fusio...
Regenerating face images from multi-spectral palm images using multiple fusio...Regenerating face images from multi-spectral palm images using multiple fusio...
Regenerating face images from multi-spectral palm images using multiple fusio...TELKOMNIKA JOURNAL
 
MSB based Face Recognition Using Compression and Dual Matching Techniques
MSB based Face Recognition Using Compression and Dual Matching TechniquesMSB based Face Recognition Using Compression and Dual Matching Techniques
MSB based Face Recognition Using Compression and Dual Matching TechniquesCSCJournals
 
Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters
Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters
Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters IJERA Editor
 
Multi modal face recognition using block based curvelet features
Multi modal face recognition using block based curvelet featuresMulti modal face recognition using block based curvelet features
Multi modal face recognition using block based curvelet featuresijcga
 
IRJET-Face Recognition using LDN Code
IRJET-Face Recognition using LDN CodeIRJET-Face Recognition using LDN Code
IRJET-Face Recognition using LDN CodeIRJET Journal
 

What's hot (15)

Fourier mellin transform based face recognition
Fourier mellin transform based face recognitionFourier mellin transform based face recognition
Fourier mellin transform based face recognition
 
Ijcet 06 08_005
Ijcet 06 08_005Ijcet 06 08_005
Ijcet 06 08_005
 
Face skin color based recognition using local spectral and gray scale features
Face skin color based recognition using local spectral and gray scale featuresFace skin color based recognition using local spectral and gray scale features
Face skin color based recognition using local spectral and gray scale features
 
A novel approach for performance parameter estimation of face recognition bas...
A novel approach for performance parameter estimation of face recognition bas...A novel approach for performance parameter estimation of face recognition bas...
A novel approach for performance parameter estimation of face recognition bas...
 
NEURAL NETWORK BASED SUPERVISED SELF ORGANIZING MAPS FOR FACE RECOGNITION
NEURAL NETWORK BASED SUPERVISED SELF ORGANIZING MAPS FOR FACE RECOGNITIONNEURAL NETWORK BASED SUPERVISED SELF ORGANIZING MAPS FOR FACE RECOGNITION
NEURAL NETWORK BASED SUPERVISED SELF ORGANIZING MAPS FOR FACE RECOGNITION
 
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET TransformRotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
 
Aa4102207210
Aa4102207210Aa4102207210
Aa4102207210
 
IRJET - Facial Recognition based Attendance System with LBPH
IRJET -  	  Facial Recognition based Attendance System with LBPHIRJET -  	  Facial Recognition based Attendance System with LBPH
IRJET - Facial Recognition based Attendance System with LBPH
 
OBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONS
OBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONSOBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONS
OBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONS
 
Ck36515520
Ck36515520Ck36515520
Ck36515520
 
Regenerating face images from multi-spectral palm images using multiple fusio...
Regenerating face images from multi-spectral palm images using multiple fusio...Regenerating face images from multi-spectral palm images using multiple fusio...
Regenerating face images from multi-spectral palm images using multiple fusio...
 
MSB based Face Recognition Using Compression and Dual Matching Techniques
MSB based Face Recognition Using Compression and Dual Matching TechniquesMSB based Face Recognition Using Compression and Dual Matching Techniques
MSB based Face Recognition Using Compression and Dual Matching Techniques
 
Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters
Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters
Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters
 
Multi modal face recognition using block based curvelet features
Multi modal face recognition using block based curvelet featuresMulti modal face recognition using block based curvelet features
Multi modal face recognition using block based curvelet features
 
IRJET-Face Recognition using LDN Code
IRJET-Face Recognition using LDN CodeIRJET-Face Recognition using LDN Code
IRJET-Face Recognition using LDN Code
 

Similar to Face Recognition Using Linear-Diagonal Binary Graph Pattern Feature Extraction

IRJET- Face Spoof Detection using Machine Learning with Colour Features
IRJET-  	  Face Spoof Detection using Machine Learning with Colour FeaturesIRJET-  	  Face Spoof Detection using Machine Learning with Colour Features
IRJET- Face Spoof Detection using Machine Learning with Colour FeaturesIRJET Journal
 
COMPRESSION BASED FACE RECOGNITION USING DWT AND SVM
COMPRESSION BASED FACE RECOGNITION USING DWT AND SVMCOMPRESSION BASED FACE RECOGNITION USING DWT AND SVM
COMPRESSION BASED FACE RECOGNITION USING DWT AND SVMsipij
 
Face Detection in Digital Image: A Technical Review
Face Detection in Digital Image: A Technical ReviewFace Detection in Digital Image: A Technical Review
Face Detection in Digital Image: A Technical ReviewIJERA Editor
 
An overview of face liveness detection
An overview of face liveness detectionAn overview of face liveness detection
An overview of face liveness detectionijitjournal
 
PERFORMANCE EVALUATION OF BLOCK-SIZED ALGORITHMS FOR MAJORITY VOTE IN FACIAL ...
PERFORMANCE EVALUATION OF BLOCK-SIZED ALGORITHMS FOR MAJORITY VOTE IN FACIAL ...PERFORMANCE EVALUATION OF BLOCK-SIZED ALGORITHMS FOR MAJORITY VOTE IN FACIAL ...
PERFORMANCE EVALUATION OF BLOCK-SIZED ALGORITHMS FOR MAJORITY VOTE IN FACIAL ...ijaia
 
PERFORMANCE EVALUATION OF BLOCK-SIZED ALGORITHMS FOR MAJORITY VOTE IN FACIAL ...
PERFORMANCE EVALUATION OF BLOCK-SIZED ALGORITHMS FOR MAJORITY VOTE IN FACIAL ...PERFORMANCE EVALUATION OF BLOCK-SIZED ALGORITHMS FOR MAJORITY VOTE IN FACIAL ...
PERFORMANCE EVALUATION OF BLOCK-SIZED ALGORITHMS FOR MAJORITY VOTE IN FACIAL ...gerogepatton
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)gerogepatton
 
EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...
EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...
EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...IJECEIAES
 
Face Recognition using Feature Descriptors and Classifiers
Face Recognition using Feature Descriptors and ClassifiersFace Recognition using Feature Descriptors and Classifiers
Face Recognition using Feature Descriptors and ClassifiersJournal For Research
 
IRJET- A Review on Face Detection and Expression Recognition
IRJET-  	  A Review on Face Detection and Expression RecognitionIRJET-  	  A Review on Face Detection and Expression Recognition
IRJET- A Review on Face Detection and Expression RecognitionIRJET Journal
 
Face Recognition Technique using ICA and LBPH
Face Recognition Technique using ICA and LBPHFace Recognition Technique using ICA and LBPH
Face Recognition Technique using ICA and LBPHIRJET Journal
 
Review of Image Segmentation Techniques based on Region Merging Approach
Review of Image Segmentation Techniques based on Region Merging ApproachReview of Image Segmentation Techniques based on Region Merging Approach
Review of Image Segmentation Techniques based on Region Merging ApproachEditor IJMTER
 
Face Recognition on Linear Motion-blurred Image
Face Recognition on Linear Motion-blurred ImageFace Recognition on Linear Motion-blurred Image
Face Recognition on Linear Motion-blurred ImageTELKOMNIKA JOURNAL
 
IRJET- Class Attendance using Face Detection and Recognition with OPENCV
IRJET- Class Attendance using Face Detection and Recognition with OPENCVIRJET- Class Attendance using Face Detection and Recognition with OPENCV
IRJET- Class Attendance using Face Detection and Recognition with OPENCVIRJET Journal
 
A Methodology for Extracting Standing Human Bodies from Single Images
A Methodology for Extracting Standing Human Bodies from Single ImagesA Methodology for Extracting Standing Human Bodies from Single Images
A Methodology for Extracting Standing Human Bodies from Single Imagesjournal ijrtem
 

Similar to Face Recognition Using Linear-Diagonal Binary Graph Pattern Feature Extraction (20)

Human Face Detection And Identification Of Facial Expressions Using MATLAB
Human Face Detection And Identification Of Facial Expressions Using MATLABHuman Face Detection And Identification Of Facial Expressions Using MATLAB
Human Face Detection And Identification Of Facial Expressions Using MATLAB
 
IRJET- Face Spoof Detection using Machine Learning with Colour Features
IRJET-  	  Face Spoof Detection using Machine Learning with Colour FeaturesIRJET-  	  Face Spoof Detection using Machine Learning with Colour Features
IRJET- Face Spoof Detection using Machine Learning with Colour Features
 
COMPRESSION BASED FACE RECOGNITION USING DWT AND SVM
COMPRESSION BASED FACE RECOGNITION USING DWT AND SVMCOMPRESSION BASED FACE RECOGNITION USING DWT AND SVM
COMPRESSION BASED FACE RECOGNITION USING DWT AND SVM
 
Face Detection in Digital Image: A Technical Review
Face Detection in Digital Image: A Technical ReviewFace Detection in Digital Image: A Technical Review
Face Detection in Digital Image: A Technical Review
 
An overview of face liveness detection
An overview of face liveness detectionAn overview of face liveness detection
An overview of face liveness detection
 
184
184184
184
 
PERFORMANCE EVALUATION OF BLOCK-SIZED ALGORITHMS FOR MAJORITY VOTE IN FACIAL ...
PERFORMANCE EVALUATION OF BLOCK-SIZED ALGORITHMS FOR MAJORITY VOTE IN FACIAL ...PERFORMANCE EVALUATION OF BLOCK-SIZED ALGORITHMS FOR MAJORITY VOTE IN FACIAL ...
PERFORMANCE EVALUATION OF BLOCK-SIZED ALGORITHMS FOR MAJORITY VOTE IN FACIAL ...
 
PERFORMANCE EVALUATION OF BLOCK-SIZED ALGORITHMS FOR MAJORITY VOTE IN FACIAL ...
PERFORMANCE EVALUATION OF BLOCK-SIZED ALGORITHMS FOR MAJORITY VOTE IN FACIAL ...PERFORMANCE EVALUATION OF BLOCK-SIZED ALGORITHMS FOR MAJORITY VOTE IN FACIAL ...
PERFORMANCE EVALUATION OF BLOCK-SIZED ALGORITHMS FOR MAJORITY VOTE IN FACIAL ...
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)
 
EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...
EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...
EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...
 
Face Recognition using Feature Descriptors and Classifiers
Face Recognition using Feature Descriptors and ClassifiersFace Recognition using Feature Descriptors and Classifiers
Face Recognition using Feature Descriptors and Classifiers
 
IRJET- A Review on Face Detection and Expression Recognition
IRJET-  	  A Review on Face Detection and Expression RecognitionIRJET-  	  A Review on Face Detection and Expression Recognition
IRJET- A Review on Face Detection and Expression Recognition
 
Real time facial expression analysis using pca
Real time facial expression analysis using pcaReal time facial expression analysis using pca
Real time facial expression analysis using pca
 
Face Recognition Technique using ICA and LBPH
Face Recognition Technique using ICA and LBPHFace Recognition Technique using ICA and LBPH
Face Recognition Technique using ICA and LBPH
 
Review of Image Segmentation Techniques based on Region Merging Approach
Review of Image Segmentation Techniques based on Region Merging ApproachReview of Image Segmentation Techniques based on Region Merging Approach
Review of Image Segmentation Techniques based on Region Merging Approach
 
Face Recognition on Linear Motion-blurred Image
Face Recognition on Linear Motion-blurred ImageFace Recognition on Linear Motion-blurred Image
Face Recognition on Linear Motion-blurred Image
 
IRJET- Class Attendance using Face Detection and Recognition with OPENCV
IRJET- Class Attendance using Face Detection and Recognition with OPENCVIRJET- Class Attendance using Face Detection and Recognition with OPENCV
IRJET- Class Attendance using Face Detection and Recognition with OPENCV
 
50220130402003
5022013040200350220130402003
50220130402003
 
A Methodology for Extracting Standing Human Bodies from Single Images
A Methodology for Extracting Standing Human Bodies from Single ImagesA Methodology for Extracting Standing Human Bodies from Single Images
A Methodology for Extracting Standing Human Bodies from Single Images
 
IRJET- Digiyathra
IRJET-  	  DigiyathraIRJET-  	  Digiyathra
IRJET- Digiyathra
 

More from ijfcstjournal

A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLINGA SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLINGijfcstjournal
 
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESA COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESijfcstjournal
 
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...ijfcstjournal
 
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...ijfcstjournal
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...ijfcstjournal
 
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...ijfcstjournal
 
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGAN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGijfcstjournal
 
EAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITYEAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITYijfcstjournal
 
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHSEDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHSijfcstjournal
 
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMCOMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMijfcstjournal
 
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSPSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSijfcstjournal
 
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...ijfcstjournal
 
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGA MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGijfcstjournal
 
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...ijfcstjournal
 
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHA NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHijfcstjournal
 
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSAGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSijfcstjournal
 
International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)ijfcstjournal
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESijfcstjournal
 
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...ijfcstjournal
 
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMS
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMSA STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMS
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMSijfcstjournal
 

More from ijfcstjournal (20)

A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLINGA SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
 
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESA COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
 
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
 
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
 
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
 
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGAN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
 
EAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITYEAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITY
 
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHSEDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
 
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMCOMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
 
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSPSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
 
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
 
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGA MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
 
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
 
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHA NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
 
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSAGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
 
International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
 
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
 
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMS
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMSA STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMS
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMS
 

Recently uploaded

OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 

Recently uploaded (20)

OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 

Face Recognition Using Linear-Diagonal Binary Graph Pattern Feature Extraction

  • 1. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.2, March 2016 DOI:10.5121/ijfcst.2016.6205 55 A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACTION METHOD Satyendra Rajput and Dr. Joyti Bharti Department of Computer Science and Engineering, MANIT Bhopal, Madhya Pradesh, India ABSTRACT Face recognition is one the most interesting topic in the field in computer vision and image processing. Face recognition is a processing system that recognizes and identifies individuals human by their faces. Automatic face recognition is powerful way to provide, authorized access to control their system. Face recognition has many challenging problems (like face pose, face expression variation, illumination variation, face orientation and noise) in the field of image analysis and computer vision. This method is work on feature extraction part of face recognition. New way to extract face feature using LD-BGP code operator it is like LGS and LBP feature extraction operator. In our LD-BGP-code operator work in two direction first linear then diagonal. In both direction, its create eight digits code to every pixel of image. Means of these two directional are taken so that is cover all neighbor of center pixel. First linear direction, only horizontal and vertical pixel are taken. Second diagonal direction only diagonal pixels taken. In matching phase, we use Euclidean distance to match a face image. We perform the Linear and diagonal directional operator method on face database ORL. We get accuracy 95.3 %. LD-BGP method also works on different type image like illuminated and expression variation image. KEYWORDS face recognition, text based local descriptor, biometric, pattern recognition and LD-BGP. 1. INTRODUCTION Face recognition is one of the field of biometrics and computer vision system. Using digital face image we analysis different individual person and recognized every individual with their corresponding digital image. It has a wide range of applications in information security, image retrieval, and access control and law enforcement surveillance. The area of face recognition has achieved a significant research progress. This is due to the current systems performing well under relatively controlled environments but tend to suffer when variations in different factors, such as aging, illumination, facial expressions and pose, are present. Thus the main goal of the ongoing research is to increase the performance and robustness of the system against various factors. Mainly face recognition system task work in three phase figure 1.
  • 2. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.2, March 2016 56 Figure 1.Phases of face recognition system Various approaches has been proposed in face recognition field. Eigen face was proposed by Mathrew and Alex they use eigen value and eigen vector concept in face recognition problem. [5]Other approach like LDA isused for face recognition system it is also known as fisher face. [6] These two method is dimension reduction techniques that are reduce higher dimension into lower dimension. Template matching method is also used in face recognition problem in which template of facial feature is generate and do a template matching of each person image[7]. Neural network is also in face recognition problem two basic neural network first feed forward second back propagation neural network is used. [8, 9]. 2. GENERAL DIFFICULTIES There are two major factor that effect the face recognition problem. 1) Intrinsic factors 2) extrinsic factors, [2] Intrinsic factors are due to the physical nature of the face and are independent of the observer. These factors can be further divided into two classes: intrapersonal and interpersonal. Intrapersonal factors are responsible for varying the facial appearance of the same person, some examples being age, facial expression and facial paraphernalia (facial hair, glasses, cosmetics, etc.). Interpersonal factors, however, are responsible for the differences in the facial appearance of different people, some examples being ethnicity and gender.[2] Other extrinsic factors cause the appearance of the face to alter via the interaction of light with the face and the observer. These factors include illumination, Expression variation, face occlusion, tilted face pose, scale and imaging parameters (e.g., resolution, focus, imaging, noise, etc.) Figure 2. General difficulties i) illumination variation ii) expression change iii) occluded face iv) titled face 3. FACIAL FEATURE Every facial is almost unique to identify the each person. For which feature of face is extracted by different method. Research also has proposed different method for face feature extraction. Basically two type of facial feature extraction method 1) local feature 2) holistic feature, In local feature method we work on local feature of face image and holistic method hole image is consider as feature to uniquely recognized individual.
  • 3. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.2, March 2016 57 3.1. Local Binary Pattern Ojala et al. propsed the LBP operator which was originally designed for texture description and analysis.[12] The operator assigns a label to every pixel of an image by thresholding the 3 x 3- neighborhood of each pixel with the center pixel value and considering the result as a binary number. Then, the histogram of the labels can be used as a texture descriptor. [4] To be able to deal with textures at different scales, the LBP operator was later extended to use neighborhoods of different sizes. A) Image 52 4 9 0 0 0 65 61 63 1 1 153 67 33 85 1 0 1 C) Grey values D) binary values E) LBP values Figure 3.Basic LBP operator 3.2. Local Graph Structure It based on graph theory concept which is proposed by Eimad E.A. Abusham. LGS work on six neighboring pixel, it choose a target threshold pixel C, then it starts by moving anti clockwise direction at the left side of the target C pixel, If the neighboring pixel has a higher gray value than that compared with the target pixel or it has same gray value, then it will assign 1 binary value on the edge which is connecting the two vertices, otherwise it will assign a 0 binary value. After finishing on the left side of graph we interlude for moment at the target pixel C and then it move in horizontal way to the right side of graph region in clockwise direction and it apply the similar process till the C target point is achieved. [1] Figure 4. Local Graph structure operator B) One pixel Threshold Binary 00011011
  • 4. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.2, March 2016 58 3.3. Symmetric Local Graph Structure SLGS is an extended version of LGS, it is proposed by Mohd Fikri Azli Abdullah in 2014. [3] This techniques is more balanced one as compared to LGS because it is symmetric to both side of the central pixel. Each pixel is related with six neighboring pixel in a radius of one and two. This techniques doesn’t contain any redundant information as left side and right side of center pixel have a similar weightage. Figure 3, show the relationship of the neighbor pixels and the figure, shows SLGS operator.[3] Figure 5. Relationship of neighbor pixel with center pixel Figure 6. The SLGS Operator SLGS method is very easy and simple. But majority of neighboring relationship lies only on horizontal pixels along left side and to the right side of the image. There is no focus on vertical pixels neighbor relationship. Among three local feature techniques SLGS gives more accurate result in face recognition system. Comparison of these techniques is given in the table below:
  • 5. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.2, March 2016 59 Table 1.Summary of different face recognition techniques Parameter Techniques Neighbor pixels Radius of neighbors Based On References LBP 8 pixels 1 (General case) Neighbor connectivity [4] LGS 5 pixels 1 left side, 2right side Graph structure [3] SLGS 6 pixels 2 both side Symmetric Graph [1] 3.4. LD-BGP In orl face database image size is 92X112 pixels values. Input image is grey image which is divided in 4X4 part means 16 equal part each part of image is size of 23X28. These subimage is called block of image. In each sub image total 456 pixel values are coded into LD-BGP-Code operator. So total 456 LD-BGP-Code are generated. Per image total is 16 X 456 (16 X 19 X 24) = 7296 pixel values. Block of Image 1 (23 X 28) Block of Image 2 (23 X 28) Block of Image 3 (23 X 28) Block of Image 4 (23 X 28) Block of Image 5 Block of Image 6 Block of Image 7 Block of Image 8 Block of Image 9 Block of Image 10 Block of Image 11 Block of Image 12 Block of Image 13 (23 X 28) Block of Image 14 (23 X 28) Block of Image 15 (23 X 28) Block of Image 16 (23 X 28) Figure 7. Blocks of image In each blocks we apply Linear and Diagonal pattern method for feature extraction. Each direction pattern generates 8 bit code corresponding to every pixel.
  • 6. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.2, March 2016 60 Figure 8. LD-BGP code operator 3.4.1. Linear Directional Binary Pattern We take 5 X 5 matrix of image block. Then linear code is extraction corresponding to directional matrix shown below. We also assign a weight in directional matrix. Using weight we get eight digits code to center pixel value. Figure 9.Linear direction binary pattern
  • 7. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.2, March 2016 61 Where, C= center pixel values, N= neighbor of center pixel Above figure shown directional matrix of 5 X 5 and weighted matrix that is used in linear LD- BGP-Code extraction. In linear we take all linear neighbor that are left, right, above and below with radius of two. Total eight neighbors is used in linear LD-BGP-Code extraction method. Linear LD-BGP-Code in equation (4.3)...... P(c) = { (f(x-2, y) -f(c)), (f(x-1, y) - f(c)), (f(x, y+1)- f(c)), ( f(x, y+2) -f(c)), (f(x, y-1) - f(c)), (f(x, y-2) -f(c)), (f(x+1, y) -f(c)), (f(x+2, y) -f(c)) } . . . . . . . . . . . . . . Equation (1) Equation (1) shows general process of LD-BGP-Code extraction of center values. 3.4.2. DIAGONAL DIRECTION BINARY PATTERN We take 5 X 5 matrix of image block. Then diagonal code is extraction corresponding to directional matrix shown below. We also assign a weight in directional matrix. Using weight we get eight digits code to center pixel value. Figure 10. Diagonal direction LD-BGP-Code Where, C= center pixel values, N= neighbor of center pixel Figure 10 shown directional matrix of 5 X 5 and weighted matrix that is used in diagonal LD- BGP-Code extraction. In linear we take all diagonal neighbor that are left corner above, right corner above, below left corner and below right corner with radius of two. Total eight neighbors is used in diagonal LD-BGP-Code extraction method.
  • 8. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.2, March 2016 62 Diagonal LD-BGP-Code equation ...... P(c) = {((f(x-2, y-2) –f(c)), (f(x-1, y-1) – f(c)), (f(x-1, y+1) - f(c)), ( f(x-2, y+2) –f(c)), (f(x+1, y-1) - f(c)), (f(x+2, y-2)-f(c)), (f(x+1, y+1)-f(c)), (f(x+2, y+2)-f(c)) } . . . Equation (2) 4. EXPERIMENTAL DESIGN Freely available orl face database (also known as AT & T) is use to test performance of LD-BGP. [] In this database there are40 distinct person with ten different images of each person. For some person, the images were taken at different times, varying the lighting, facial expressions (open / closed eyes, smiling / not smiling) and facial details (glasses / no glasses). All the images were taken against a dark homogeneous background with the subjects in an upright, frontal position (with tolerance for some side movement). Figure 11: Sample image of ORL face 5. RESULT Experiment is conducted to compare the effectiveness of distance measures which are Euclidean distance. The experiment used LDBGP for feature extraction algorithm on the ORL(AT&T) database. Table 1show accuracy on nearest neighbor with Euclidean distance of fine K, medium K and weighted K nearest neighbor classifier. We get Overall maximum accuracy 95.30%. Table 2. Accuracy on ORL database Classifier Accuracy Fine K-Nearest Neighbor 93.30 Medium K-nearest Neighbor 95.30 Weighted K-nearest Neighbor 95.30 Overall Maximum Accuracy 95.3
  • 9. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.2, March 2016 Table 3.Show accuracy of LD- training files. Table 3. Accuracy with different training files percentage. Training files % 10 20 30 40 50 60 70 80 90 Figure 12. 6. APPLICATION Primary face recognition is use for two task 1) verification 2) identification offered an image of the face of a person unknown to the identity claim to determine if the individual is who he / she claim image of the person is unknown database of known individual image data. Also known as one to many matching 88.76 89.54 60 65 70 75 80 85 90 95 100 10 20 Accuracy International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.2, March 2016 -BGP method using distance measure with different number of Accuracy with different training files percentage. Training files % Accuracy % (Ed) 89.58 89.86 90.28 91.66 92.18 93.60 94.40 95.10 95.30 Figure 12. Graph for Accuracy with training files Primary face recognition is use for two task 1) verification 2) identification, first: When I was image of the face of a person unknown to the identity claim to determine if the claim to be. Also known as one to one matching. Second Give an and identification of the person by comparing this image with the database of known individual image data. Also known as one to many matching. [11]. 90.28 91.66 92.18 93.65 94.01 94.25 30 40 50 60 70 80 Training file % Accuracy measures International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.2, March 2016 63 BGP method using distance measure with different number of , first: When I was image of the face of a person unknown to the identity claim to determine if the to be. Also known as one to one matching. Second Give an mage with the . [11]. 94.57 90
  • 10. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.2, March 2016 64 There are numerous application areas in which face recognition can be exploited for these two purposes, like 1) ATM access control system 2) Public Surveillances 3) General identification 4) Smart card system 5) witness face reconstruction 6) Video indexing and 7) Criminal justice system etc. 7. CONCLUSION AND FUTURE WORK In this thesis work, we presented a fully automatic face recognition system which works in real- time and which is robust to local illumination changes. In this system we presented novel feature extraction method that is used in face recognition. Every image of face are code into new P-code method which capture both linear directional feature and diagonal directional feature. These two directional features are eight digit code. That is corresponding to all the pixel of face image. These two directional features capture both straight connectivity and diagonal connectively. We take means value of these two eight digits directional feature. Using means we take both directional feature and also coded into eight digits. So that it is like LBP feature that is proposed in 2002 by co. as compare to LBP feature extraction method LD-BGP feature extraction method is different and capture more useful information about the neighbors to the center pixel. LD-BGP feature extraction techniques accuracy on face recognition system can be improve by using different preprocessing method in preprocessing phase. Like this accuracy also improve in classification phase using different classifier. This technique is based on LBP and LGS. So that in future new techniques of different graph based can also proposed. So we think lot of work can possible in LD-BGP feature extraction techniques. But till this techniques work nicely and give good result on face recognition system. REFERENCES [1] Eimad E.A. Abusham and Housam K. Bashir, (2011) “Face Recognition Using Local Graph Structure (LGS)” , Springer-journal-Verlag Berlin Heidelberg Human-Computer Interaction, Part II, HCII 2011, LNCS 6762, page no. 169–175. [2] Rabia Jafri and Hamid R. Arabnia,(2009)“A Survey of Face Recognition Techniques”,Journal of Information Processing Systems, Vol.5, No.2. [3] Mohd Fikri Azli Abdullah, Md Shohel Sayeed, Kalaiarasi Sonai Muthu, Housam Khalifa Bashier, Afizan Azman and Siti Zainab Ibrahim, (2014) “Face recognition with Symmetric Local Graph Structure (SLGS)”, ELSEVIER Expert Systems with Applications journal 41 pp. 6131–6137. [4] Timo Ahonen, Abdenour Hadid, and Matti Pietik¨ainen, (2004) “Face Recognition with Local Binary Patterns”,Springer-Verlag Berlin Heidelberg, journal LNCS 3021, pp 469-481. [5] Mathew Turk and alex pentland,(1991)“Eigen faces for recognition”,vision modeling Group the media laboratory Massachusetts Institute of technology journal of cognitive neuroscience Vol. 3, No. 1. [6] Suman Kumar Bhattacharyya, Kumar Rahul,(2013) “FACE RECOGNITION BY LINEAR DISCRIMINANT ANALYSIS” International Journal of Communication Network Security, ISSN: 2231 – 1882, Vol. 2, Issue-2, [7] sadhna sharma,(2013) “Template Matching Approach for Face Recognition System” International Journal of Signal Processing Systems Vol. 1, No. 2.
  • 11. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.2, March 2016 65 [8] M.S.R.S. Prasad, S.S. Panda, G. Deepthi and V. Anisha, (2011) “Face Recognition Using PCA and Feed Forward Neural Networks”, International Journal of Computer Science and Telecommunications Vol. 2, Issue 8. [9] Anissa Bouzalmat1, Naouar Belghini2, Arsalane Zarghili3 and Jamal Kharroubi, (2011)“Face Detection and Recognition Using Back Propagation Neural Network and Fourier Gabor Filters” Signal & Image Processing An International Journal (SIPIJ) Vol.2, No.3. [10] Orl face databse link http://www.cl.cam.ac.uk/research/dtg/attarchive/facedatabase.html Access time 1/08/2015. [11] Divyarajsinh N. Parmar and Brijesh B. Mehta, (2013) “Face recognition method and applications”, Int.J.Computer Technology & Applications, ISSN: 2229-6093 Vol 4 (1), pp 84-86. [12] T. Ojala, M. Pietikäinen, and T. Mäenpää, (2002) "Multiresolution gray-scale and rotation invariant texture classification with local binary patterns," IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 24, No. 7, pp. 971-987, 2002. AUTHORS Satyendra Rajput is pursuing Mtech (computer science) degree from MANIT Bhopal. His current research interest includes image processing, biometric system, computer Graphics and Computer network. Dr. Joyti Bharti is renewed faculty in MANIT Bhopal. His Current research interest includes image processing, ComputerVision, computer Graphics, image segment and hiding.