SlideShare a Scribd company logo
1 of 4
Download to read offline
Research Inventy: International Journal Of Engineering And Science
Vol.3, Issue 3 (June 2013), PP 25-28
Issn(e): 2278-4721, Issn(p):2319-6483, Www.Researchinventy.Com
25
Approach for Face Recognition using Local and Global Features
Santhosh Kumar S, Gurupadagouda P.K, BasavarajMirji, Praveen Kumar A.T
Department ofInformationr Science and Engineering
Srinivas Institute of Technology, valachil, Mangalore, Karnataka, India
ABSTRACT - Face Recognition using Discrete Cosine Transform (DCT) for Local and Global Features
involves recognizing the corresponding face image from the database. The face image obtained from the user is
cropped such that only the frontal face image is extracted, eliminating the background. The image is restricted to
a size of 128 × 128 pixels. All images in the database are gray level images. DCT is applied to the entire image.
This gives DCT coefficients, which are global features. Local features such as eyes, nose and mouth are also
extracted and DCT is applied to these features. Depending upon the recognition rate obtained for each feature,
they are given weightage and then combined. Both local and global features are used for comparison. By
comparing the ranks for global and local features, the false acceptance rate for DCT can be minimized
Keywords - Discrete Cosine transform, Local feature, Global feature.
I. INTRODUCTION
A face recognition system is essentially an application intended to identify or verify a person either
from a digital image or a video frame obtained from a video source. Although other reliable methods of
biometric personal identification exist, for e.g., fingerprint analysis or iris scans, these methods inherently rely
on the cooperation of the participants, whereas a personal identification system based on analysis of frontal or
profile images of the face is often effective without the participant‟s cooperation or intervention. One of the
many ways for automatic identification or verification is by comparing selected facial features from the image
and a facial database. This technique is typically used in security systems.
For e.g., This technology could be used as a security measure at ATM‟s; instead of using a bank card or
personal identification number, the ATM would capture an image of the person‟s face, and compare it to his/her
photo in the bank database to confirm the identity of the relevant person. On similar lines, this concept could
also be extrapolated to computers; by using a web cam to capture a digital image of a person, the face could
replace the commonly used password as a means to log-in and thus, authenticate oneself. Given a large database
of images and a photograph, the problem is to select from the database a small set of records such that one of the
image records matched the photograph. The success of the method could be measured in terms of the ratio of the
answer list to the number of records in the database.
The recognition problem is made difficult by the great variability in head rotation and tilt, lighting
intensity and angle, facial expression, aging, etc. Some other attempts at facial recognition by machines have
allowed for little or no variability in these quantities. A general statement of the problem of machine recognition
of faces can be formulated as: given a still or video image of a scene, identify or verify one or more persons in
the scene using a stored database of faces. Available collateral information such as race, age, gender, facial
expression, or speech may be used in narrowing the search. The solution to the problem involves segmentation
of faces, feature extraction from face regions, recognition, or verification. In identification problems, the input
to the system is an unknown face, and the system reports back the determined identity from a database of known
individuals, whereas in verification problems, the system needs to confirm or reject the claimed identity of the
input face.
Some of the various applications of face recognition include driving licenses, immigration, national ID,
passport, voter registration, security application, medical records, personal device login, desktop login, human-
robot-interaction, human-computer-interaction, smart cards etc.
One of its applications is Criminal Face Identification system. Establishing the identity of any criminal
by constructing the image of the criminal based on information given by eyewitnesses and comparing it with
existing criminal images in the database available with investigating agencies. Construction of the image of the
criminal using segmented/sliced images of human face like mouth, eyes, nose, ..etc is available in the database
with the help of eyewitnesses.
There are three approaches for Face recognition:
1.1 Holistic matching methods:
These methods use the whole face region (global feature) as a raw input to the recognition system. One
of the most widely used representations of the face region is Eigen pictures, which is inherently based on
principal component analysis.
Approach for Face Recognition using Local and Global Features
26
1.2 Feature-based matching methods:
Generally, in these methods, local features such as the eyes, nose and mouth are first extracted and their
locations and local statistics are fed as inputs into a classifier.
1.3 Hybrid methods:
It uses both local features and whole face region to recognize a face. This method could potentially
offer the better of the two types of methods.
Our aim is to extract local features from a given frontal face. The local features are left eye, right eye,
nose and mouth. These local features will be extracted manually. Discrete Cosine Transform (DCT) will be
applied to each of these local features individually and also to the global features. Finally, the results obtained in
both cases will be compared.
II. PROPOSED ALGORITHM
For creating the database Microsoft Access is used. Frontal images are extracted from the database.
Frontal face image extraction is carried out in order to reduce the effect of varying backgrounds on the proposed
face recognition system. The frontal face image is acquired. From the given frontal image, local features like
eyes, nose and mouth region are extracted manually. DCT is applied to each of these features. The DCT
coefficients of these regions are stored. These coefficients are then used for comparison. The recognition rates
obtained with these local features are compared to the recognition rate obtained when DCT is applied to the
global image.
DCT is an accurate and robust face recognition system and using certain normalization techniques, its
robustness to variations in facial geometry and illumination can be increased. Face normalization techniques are
also incorporated in the face recognition application discussed. Namely, an affine transformation is used to
correct scale, position, and orientation changes in faces. Due to this a tremendous improvements in recognition
rates can be achieved with such normalization. In order to the prevent problem of illumination variations, faces
in the databases used for the tests are uniformly illuminated. That is, certain illumination normalization
techniques are used to make all faces have the same overall gray-scale intensity. An alternative approach to the
DCT is KLT (Karhunen-Loeve transform). This transform exhibits pattern recognition properties that were
largely overlooked initially because of the complexity involved in its computation. This transform produces an
expansion of an input image in terms of a set of basis images or the so-called “Eigen images.” But DCT is better
than KLT because of following comparisons.
A complexity comparison between the DCT and the Karhunen-Loeve transform (KLT) is that, in the
proposed application, using DCT, training essentially means computing the DCT coefficients of all the database
faces. On the other hand, using the KLT, training entails computing the basis vectors of the transformation. This
means that the KLT is more computationally expensive with respect to DCT. However, once the KLT basis
vectors have been obtained, it may be argued that computing the KLT coefficients for recognition is trivial. But
this is also true of the DCT, with the additional provision that the DCT may take advantage of very efficient
computational algorithms.
DCT is a well-known signal analysis tool used in compression due to its compact representation power.
It is known that the KLT is the optimal transform in terms of information packing, however, its data dependent
nature makes it infeasible to implement in some practical tasks. Moreover, DCT closely approximates the
compact representation ability of the KLT, which makes it a very useful tool for signal representation both in
terms of information packing and in terms of computational complexity due to its data independent nature. DCT
helps to separate the image into parts of differing importance (with respect to the image's visual quality). DCT is
conceptually similar to Discrete Fourier Transform (DFT), in the way that it transforms a signal or an image
from the spatial domain to the frequency domain.
Fig 1: Image transformation from spatial domain to frequency domain
Discrete Cosine Transform Encoding
The basic encoding operation of the DCT is as follows:
• The size of the input image is N × M.
• f(i, j) is the intensity of the pixel at x(i, j).
• F(u, v) is the DCT coefficient for the pixel at x(i, j).
• For most images, much of the signal energy lies at low frequencies. These appear in the upper left corner of the
DCT.
Approach for Face Recognition using Local and Global Features
27
• Compression is achieved since the lower right values represent higher frequencies, and are often small enough
to be neglected with little visible distortion. The output array of DCT coefficients contains integers; these can
range from -1024 to 1023.
Computationally, it is easier to implement and also efficient to consider the DCT as a set of basis
functions which given a known input array size, for e.g., 8 × 8, can be pre-computed and stored. This involves
simply computing values for a convolution mask (8 × 8 window) that get applied.
III. EXPERIMENTS AND RESULT
4 test images is compared with the database that consists of a set of images of 25 people. There are 4
different test-methods: GLOBAL, LOCAL, GLOBAL+LOCAL and GLOBAL AND LOCAL. But we use
GLOBAL + LOCAL. In proposed application images are filtered using Gaussian low pass filter, sharpened and
converted to grayscale images. Finally intensity is adjusted and image is segmented and sliced to store both
global face image and also its local features such as eye nose and mouth separately in the database after the
images are normalized.
1) Normalization
Since the facial images are captured at different instants of the day or on different days, the intensity
for each image may exhibit variations. To avoid these light intensity variations, the test images are normalized
so as to have an average intensity value with respect to the registered image. The average intensity value of the
registered images is calculated as summation of all pixel values divided by the total number of pixels. Similarly,
average intensity value of the test image is calculated. The normalization value is calculated as:
Normalization Value = Average value of registered Image /Average value of tested Image.
This value is multiplied with each pixel of the test image. Thus we get a normalized image having an average
intensity with respect to that of the registered image.
Next is to perform zigzag scanning and apply DCT.
2) Zigzag scanning:
The purpose of Zigzag Scanning is to:
 Map M x N dimension vector to 1 x N dimensions
 Group low frequency coefficients present at the top of the vector
Local features such as eyes, nose and mouth are extracted manually from the given face image. The
image is used as an input. Local feature extraction, especially eye extraction, helps reduce the effect of varying
characteristics such as pose, expressions etc. on the face recognition system.
Fig 2: Zigzag scanning
After extracting the features, the images are compared using DCT and the comparison is done by
taking the Euclidean distance between the test and registered image.
Eye-R Eye-L Nose Mouth
Fig 3: Test image
For e.g., we take 50 coefficients of test image and 50 coefficients of registered image. The Euclidean
distance of each of the 50 coefficients of the test image and 50 coefficients of the registered image are
calculated. Add all the Euclidean distance of the 50 coefficients. Let the value of this addition be „X‟. Since
Approach for Face Recognition using Local and Global Features
28
there are 15 registered images, each of the test images will be compared with the 15 registered images. Thus we
have X1, X2, X3, . . . , X15 values. All these 15 values of „X‟ are sorted in ascending order, and the one with the
minimum value of „X‟ is given as the „rank 1‟. The next in the order is given „rank 2‟, „rank 3‟, till „rank 15‟.
This „rank 1‟ image is regarded as the best match. If the „rank 1‟ image is the same as the input image, the
person has been recognized correctly. Thus, the recognition rate is calculated as the ratio of number of images
correctly recognized to the total number of images tested. The number of coefficients is varied and the
recognition rate is calculated for each of them using the following equation:
Recognition rate = Number of correctly recognized image/ Total number of persons test image.
Results of the approach are,Face is identified with more accuracy and by comparing the ranks for
global and local features; the false acceptance rate for DCT is minimized.
IV. CONCLUSION
When using local features for recognition, the false acceptance rate should be minimized and false
rejection rate should be maximized as compared to that of global features. The recognition rate for local features
and the recognition rate for global features using DCT are calculated. Comparison between DCT global features
and DCT local features is done. The recognition rate improves when images are normalized. When local and
global features are combined, DCT gives a relatively high recognition rate.
REFERENCES
[1]. Yao-Jiunn Chen, Yen-Chun Lin,” Simple Face-detection Algorithm Based on Minimum Facial Features “,The 33rd Annual
Conference of the IEEE Industrial Electronics Society (IECON) Nov. 5-8,
[2]. Sanjay Kr Singh, Ashutosh Tripathi, Ankur Mahajan, Dr S Prabhakaran “Analysis of Face Recognition in MATLAB”,
International Journal of Scientific & Engineering Research, Volume 3, Issue 2, February 2012
[3]. ZIAD M. HAFED AND MARTIN D. LEVINE “Face Recognition Using the Discrete Cosine Transform” ,International Journal
of Computer Vision 43(3), 2001
[4]. Aman R. Chadha, Pallavi P. Vaidya, M. Mani Roja “Face Recognition Using Discrete Cosine Transform for Global and Local
Features”, Proceedings of the 2011 International Conference on Recent Advancements in Electrical, Electronics and Control
Engineering (IConRAEeCE)
[5]. Jae Young Choi, Yong Man Ro, Konstantinos N. Plataniotis “Color Local Texture Features for Color Face Recognition”, IEEE
TRANSACTIONS ON IMAGE PROCESSING, VOL. 21, NO. 3, MARCH 2012
[6]. Rafel C Gonzalez,Richard E Woods “Digital Image Processing Using matlab 2nd
Edn..,Pearson Education 2003
[7]. Milan Sonka,Vaclav Hlavac and Roger Boyle,”Image Processing,Analysis and Machine Vision”,2nd
Edn..,Thomoson
Learning,2001.

More Related Content

What's hot

Facial Expression Recognition
Facial Expression Recognition Facial Expression Recognition
Facial Expression Recognition Rupinder Saini
 
An interactive image segmentation using multiple user input’s
An interactive image segmentation using multiple user input’sAn interactive image segmentation using multiple user input’s
An interactive image segmentation using multiple user input’seSAT Publishing House
 
Facial expression recognition using pca and gabor with jaffe database 11748
Facial expression recognition using pca and gabor with jaffe database 11748Facial expression recognition using pca and gabor with jaffe database 11748
Facial expression recognition using pca and gabor with jaffe database 11748EditorIJAERD
 
Human Re-identification with Global and Local Siamese Convolution Neural Network
Human Re-identification with Global and Local Siamese Convolution Neural NetworkHuman Re-identification with Global and Local Siamese Convolution Neural Network
Human Re-identification with Global and Local Siamese Convolution Neural NetworkTELKOMNIKA JOURNAL
 
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDINGMULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDINGijistjournal
 
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSCOMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSijcsit
 
Medical Image Fusion Using Discrete Wavelet Transform
Medical Image Fusion Using Discrete Wavelet TransformMedical Image Fusion Using Discrete Wavelet Transform
Medical Image Fusion Using Discrete Wavelet TransformIJERA Editor
 
Possibility fuzzy c means clustering for expression invariant face recognition
Possibility fuzzy c means clustering for expression invariant face recognitionPossibility fuzzy c means clustering for expression invariant face recognition
Possibility fuzzy c means clustering for expression invariant face recognitionIJCI JOURNAL
 
IRJET - Factors Affecting Deployment of Deep Learning based Face Recognition ...
IRJET - Factors Affecting Deployment of Deep Learning based Face Recognition ...IRJET - Factors Affecting Deployment of Deep Learning based Face Recognition ...
IRJET - Factors Affecting Deployment of Deep Learning based Face Recognition ...IRJET Journal
 
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...cscpconf
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)theijes
 
Password Authentication Framework Based on Encrypted Negative Password
Password Authentication Framework Based on Encrypted Negative PasswordPassword Authentication Framework Based on Encrypted Negative Password
Password Authentication Framework Based on Encrypted Negative PasswordIJSRED
 
IRJET - Effective Workflow for High-Performance Recognition of Fruits using M...
IRJET - Effective Workflow for High-Performance Recognition of Fruits using M...IRJET - Effective Workflow for High-Performance Recognition of Fruits using M...
IRJET - Effective Workflow for High-Performance Recognition of Fruits using M...IRJET Journal
 
IRJET- Face Recognition using Machine Learning
IRJET- Face Recognition using Machine LearningIRJET- Face Recognition using Machine Learning
IRJET- Face Recognition using Machine LearningIRJET Journal
 
IRJET- Biometric Eye Recognition using Alex-Net
IRJET-  	  Biometric Eye Recognition using Alex-NetIRJET-  	  Biometric Eye Recognition using Alex-Net
IRJET- Biometric Eye Recognition using Alex-NetIRJET Journal
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
IRJET - Review of Various Multi-Focus Image Fusion Methods
IRJET - Review of Various Multi-Focus Image Fusion MethodsIRJET - Review of Various Multi-Focus Image Fusion Methods
IRJET - Review of Various Multi-Focus Image Fusion MethodsIRJET Journal
 

What's hot (20)

J01116164
J01116164J01116164
J01116164
 
Facial Expression Recognition
Facial Expression Recognition Facial Expression Recognition
Facial Expression Recognition
 
An interactive image segmentation using multiple user input’s
An interactive image segmentation using multiple user input’sAn interactive image segmentation using multiple user input’s
An interactive image segmentation using multiple user input’s
 
Facial expression recognition using pca and gabor with jaffe database 11748
Facial expression recognition using pca and gabor with jaffe database 11748Facial expression recognition using pca and gabor with jaffe database 11748
Facial expression recognition using pca and gabor with jaffe database 11748
 
Human Re-identification with Global and Local Siamese Convolution Neural Network
Human Re-identification with Global and Local Siamese Convolution Neural NetworkHuman Re-identification with Global and Local Siamese Convolution Neural Network
Human Re-identification with Global and Local Siamese Convolution Neural Network
 
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDINGMULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDING
 
N010226872
N010226872N010226872
N010226872
 
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSCOMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
 
Medical Image Fusion Using Discrete Wavelet Transform
Medical Image Fusion Using Discrete Wavelet TransformMedical Image Fusion Using Discrete Wavelet Transform
Medical Image Fusion Using Discrete Wavelet Transform
 
Possibility fuzzy c means clustering for expression invariant face recognition
Possibility fuzzy c means clustering for expression invariant face recognitionPossibility fuzzy c means clustering for expression invariant face recognition
Possibility fuzzy c means clustering for expression invariant face recognition
 
50220130402003
5022013040200350220130402003
50220130402003
 
IRJET - Factors Affecting Deployment of Deep Learning based Face Recognition ...
IRJET - Factors Affecting Deployment of Deep Learning based Face Recognition ...IRJET - Factors Affecting Deployment of Deep Learning based Face Recognition ...
IRJET - Factors Affecting Deployment of Deep Learning based Face Recognition ...
 
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
Password Authentication Framework Based on Encrypted Negative Password
Password Authentication Framework Based on Encrypted Negative PasswordPassword Authentication Framework Based on Encrypted Negative Password
Password Authentication Framework Based on Encrypted Negative Password
 
IRJET - Effective Workflow for High-Performance Recognition of Fruits using M...
IRJET - Effective Workflow for High-Performance Recognition of Fruits using M...IRJET - Effective Workflow for High-Performance Recognition of Fruits using M...
IRJET - Effective Workflow for High-Performance Recognition of Fruits using M...
 
IRJET- Face Recognition using Machine Learning
IRJET- Face Recognition using Machine LearningIRJET- Face Recognition using Machine Learning
IRJET- Face Recognition using Machine Learning
 
IRJET- Biometric Eye Recognition using Alex-Net
IRJET-  	  Biometric Eye Recognition using Alex-NetIRJET-  	  Biometric Eye Recognition using Alex-Net
IRJET- Biometric Eye Recognition using Alex-Net
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
IRJET - Review of Various Multi-Focus Image Fusion Methods
IRJET - Review of Various Multi-Focus Image Fusion MethodsIRJET - Review of Various Multi-Focus Image Fusion Methods
IRJET - Review of Various Multi-Focus Image Fusion Methods
 

Viewers also liked

B04102026
B04102026B04102026
B04102026inventy
 
A03120105
A03120105A03120105
A03120105inventy
 
D042021027
D042021027D042021027
D042021027inventy
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
B044010019
B044010019B044010019
B044010019inventy
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
A0320107
A0320107A0320107
A0320107inventy
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Analysis of Near-Far Problem using Power Control Technique for GNSS based App...
Analysis of Near-Far Problem using Power Control Technique for GNSS based App...Analysis of Near-Far Problem using Power Control Technique for GNSS based App...
Analysis of Near-Far Problem using Power Control Technique for GNSS based App...inventy
 
H042036039
H042036039H042036039
H042036039inventy
 
C032017020
C032017020C032017020
C032017020inventy
 
A043001006
A043001006A043001006
A043001006inventy
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
B04206015
B04206015B04206015
B04206015inventy
 
C0312010014
C0312010014C0312010014
C0312010014inventy
 

Viewers also liked (19)

B04102026
B04102026B04102026
B04102026
 
A03120105
A03120105A03120105
A03120105
 
D042021027
D042021027D042021027
D042021027
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
B044010019
B044010019B044010019
B044010019
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
A0320107
A0320107A0320107
A0320107
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Analysis of Near-Far Problem using Power Control Technique for GNSS based App...
Analysis of Near-Far Problem using Power Control Technique for GNSS based App...Analysis of Near-Far Problem using Power Control Technique for GNSS based App...
Analysis of Near-Far Problem using Power Control Technique for GNSS based App...
 
H042036039
H042036039H042036039
H042036039
 
C032017020
C032017020C032017020
C032017020
 
A043001006
A043001006A043001006
A043001006
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
B04206015
B04206015B04206015
B04206015
 
C0312010014
C0312010014C0312010014
C0312010014
 

Similar to Research Inventy : International Journal of Engineering and Science

Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyranjit banshpal
 
Deep hypersphere embedding for real-time face recognition
Deep hypersphere embedding for real-time face recognitionDeep hypersphere embedding for real-time face recognition
Deep hypersphere embedding for real-time face recognitionTELKOMNIKA JOURNAL
 
Iaetsd multi-view and multi band face recognition
Iaetsd multi-view and multi band face recognitionIaetsd multi-view and multi band face recognition
Iaetsd multi-view and multi band face recognitionIaetsd Iaetsd
 
Real Time Face Recognition Based on Face Descriptor and Its Application
Real Time Face Recognition Based on Face Descriptor and Its ApplicationReal Time Face Recognition Based on Face Descriptor and Its Application
Real Time Face Recognition Based on Face Descriptor and Its ApplicationTELKOMNIKA JOURNAL
 
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptxReview A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptxAravindHari22
 
IRJET - Face Recognition in Digital Documents with Live Image
IRJET - Face Recognition in Digital Documents with Live ImageIRJET - Face Recognition in Digital Documents with Live Image
IRJET - Face Recognition in Digital Documents with Live ImageIRJET Journal
 
Face Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image ProcessingFace Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image Processingpaperpublications3
 
Realtime human face tracking and recognition system on uncontrolled environment
Realtime human face tracking and recognition system on  uncontrolled environmentRealtime human face tracking and recognition system on  uncontrolled environment
Realtime human face tracking and recognition system on uncontrolled environmentIJECEIAES
 
Face Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image ProcessingFace Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image Processingpaperpublications3
 
Local Descriptor based Face Recognition System
Local Descriptor based Face Recognition SystemLocal Descriptor based Face Recognition System
Local Descriptor based Face Recognition SystemIRJET Journal
 
PCA and DCT Based Approach for Face Recognition
PCA and DCT Based Approach for Face RecognitionPCA and DCT Based Approach for Face Recognition
PCA and DCT Based Approach for Face Recognitionijtsrd
 
Vision based non-invasive tool for facial swelling assessment
Vision based non-invasive tool for facial swelling assessment Vision based non-invasive tool for facial swelling assessment
Vision based non-invasive tool for facial swelling assessment University of Moratuwa
 
Model Based Emotion Detection using Point Clouds
Model Based Emotion Detection using Point CloudsModel Based Emotion Detection using Point Clouds
Model Based Emotion Detection using Point CloudsLakshmi Sarvani Videla
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...ijceronline
 
WCTFR : W RAPPING C URVELET T RANSFORM B ASED F ACE R ECOGNITION
WCTFR : W RAPPING  C URVELET T RANSFORM  B ASED  F ACE  R ECOGNITIONWCTFR : W RAPPING  C URVELET T RANSFORM  B ASED  F ACE  R ECOGNITION
WCTFR : W RAPPING C URVELET T RANSFORM B ASED F ACE R ECOGNITIONcsandit
 
AN ILLUMINATION INVARIANT FACE RECOGNITION USING 2D DISCRETE COSINE TRANSFORM...
AN ILLUMINATION INVARIANT FACE RECOGNITION USING 2D DISCRETE COSINE TRANSFORM...AN ILLUMINATION INVARIANT FACE RECOGNITION USING 2D DISCRETE COSINE TRANSFORM...
AN ILLUMINATION INVARIANT FACE RECOGNITION USING 2D DISCRETE COSINE TRANSFORM...ijcsit
 
Facial emotion recognition using deep learning detector and classifier
Facial emotion recognition using deep learning detector and classifier Facial emotion recognition using deep learning detector and classifier
Facial emotion recognition using deep learning detector and classifier IJECEIAES
 
IRJET- Analysis of Face Recognition using Docface+ Selfie Matching
IRJET-  	  Analysis of Face Recognition using Docface+ Selfie MatchingIRJET-  	  Analysis of Face Recognition using Docface+ Selfie Matching
IRJET- Analysis of Face Recognition using Docface+ Selfie MatchingIRJET Journal
 

Similar to Research Inventy : International Journal of Engineering and Science (20)

Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Deep hypersphere embedding for real-time face recognition
Deep hypersphere embedding for real-time face recognitionDeep hypersphere embedding for real-time face recognition
Deep hypersphere embedding for real-time face recognition
 
Iaetsd multi-view and multi band face recognition
Iaetsd multi-view and multi band face recognitionIaetsd multi-view and multi band face recognition
Iaetsd multi-view and multi band face recognition
 
Ijebea14 276
Ijebea14 276Ijebea14 276
Ijebea14 276
 
Real Time Face Recognition Based on Face Descriptor and Its Application
Real Time Face Recognition Based on Face Descriptor and Its ApplicationReal Time Face Recognition Based on Face Descriptor and Its Application
Real Time Face Recognition Based on Face Descriptor and Its Application
 
G0352039045
G0352039045G0352039045
G0352039045
 
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptxReview A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
 
IRJET - Face Recognition in Digital Documents with Live Image
IRJET - Face Recognition in Digital Documents with Live ImageIRJET - Face Recognition in Digital Documents with Live Image
IRJET - Face Recognition in Digital Documents with Live Image
 
Face Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image ProcessingFace Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image Processing
 
Realtime human face tracking and recognition system on uncontrolled environment
Realtime human face tracking and recognition system on  uncontrolled environmentRealtime human face tracking and recognition system on  uncontrolled environment
Realtime human face tracking and recognition system on uncontrolled environment
 
Face Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image ProcessingFace Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image Processing
 
Local Descriptor based Face Recognition System
Local Descriptor based Face Recognition SystemLocal Descriptor based Face Recognition System
Local Descriptor based Face Recognition System
 
PCA and DCT Based Approach for Face Recognition
PCA and DCT Based Approach for Face RecognitionPCA and DCT Based Approach for Face Recognition
PCA and DCT Based Approach for Face Recognition
 
Vision based non-invasive tool for facial swelling assessment
Vision based non-invasive tool for facial swelling assessment Vision based non-invasive tool for facial swelling assessment
Vision based non-invasive tool for facial swelling assessment
 
Model Based Emotion Detection using Point Clouds
Model Based Emotion Detection using Point CloudsModel Based Emotion Detection using Point Clouds
Model Based Emotion Detection using Point Clouds
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
 
WCTFR : W RAPPING C URVELET T RANSFORM B ASED F ACE R ECOGNITION
WCTFR : W RAPPING  C URVELET T RANSFORM  B ASED  F ACE  R ECOGNITIONWCTFR : W RAPPING  C URVELET T RANSFORM  B ASED  F ACE  R ECOGNITION
WCTFR : W RAPPING C URVELET T RANSFORM B ASED F ACE R ECOGNITION
 
AN ILLUMINATION INVARIANT FACE RECOGNITION USING 2D DISCRETE COSINE TRANSFORM...
AN ILLUMINATION INVARIANT FACE RECOGNITION USING 2D DISCRETE COSINE TRANSFORM...AN ILLUMINATION INVARIANT FACE RECOGNITION USING 2D DISCRETE COSINE TRANSFORM...
AN ILLUMINATION INVARIANT FACE RECOGNITION USING 2D DISCRETE COSINE TRANSFORM...
 
Facial emotion recognition using deep learning detector and classifier
Facial emotion recognition using deep learning detector and classifier Facial emotion recognition using deep learning detector and classifier
Facial emotion recognition using deep learning detector and classifier
 
IRJET- Analysis of Face Recognition using Docface+ Selfie Matching
IRJET-  	  Analysis of Face Recognition using Docface+ Selfie MatchingIRJET-  	  Analysis of Face Recognition using Docface+ Selfie Matching
IRJET- Analysis of Face Recognition using Docface+ Selfie Matching
 

More from inventy

Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...
Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...
Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...inventy
 
Copper Strip Corrossion Test in Various Aviation Fuels
Copper Strip Corrossion Test in Various Aviation FuelsCopper Strip Corrossion Test in Various Aviation Fuels
Copper Strip Corrossion Test in Various Aviation Fuelsinventy
 
Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...
Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...
Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...inventy
 
Comparative Study of the Quality of Life, Quality of Work Life and Organisati...
Comparative Study of the Quality of Life, Quality of Work Life and Organisati...Comparative Study of the Quality of Life, Quality of Work Life and Organisati...
Comparative Study of the Quality of Life, Quality of Work Life and Organisati...inventy
 
A Study of Automated Decision Making Systems
A Study of Automated Decision Making SystemsA Study of Automated Decision Making Systems
A Study of Automated Decision Making Systemsinventy
 
Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous β -Form Nuclea...
Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous β -Form Nuclea...Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous β -Form Nuclea...
Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous β -Form Nuclea...inventy
 
Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...
Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...
Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...inventy
 
Application of Kennelly’model of Running Performances to Elite Endurance Runn...
Application of Kennelly’model of Running Performances to Elite Endurance Runn...Application of Kennelly’model of Running Performances to Elite Endurance Runn...
Application of Kennelly’model of Running Performances to Elite Endurance Runn...inventy
 
Development and Application of a Failure Monitoring System by Using the Vibra...
Development and Application of a Failure Monitoring System by Using the Vibra...Development and Application of a Failure Monitoring System by Using the Vibra...
Development and Application of a Failure Monitoring System by Using the Vibra...inventy
 
The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...
The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...
The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...inventy
 
Size distribution and biometric relationships of little tunny Euthynnus allet...
Size distribution and biometric relationships of little tunny Euthynnus allet...Size distribution and biometric relationships of little tunny Euthynnus allet...
Size distribution and biometric relationships of little tunny Euthynnus allet...inventy
 
Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...
Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...
Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...inventy
 
Effect of Various External and Internal Factors on the Carrier Mobility in n-...
Effect of Various External and Internal Factors on the Carrier Mobility in n-...Effect of Various External and Internal Factors on the Carrier Mobility in n-...
Effect of Various External and Internal Factors on the Carrier Mobility in n-...inventy
 
Transient flow analysis for horizontal axial upper-wind turbine
Transient flow analysis for horizontal axial upper-wind turbineTransient flow analysis for horizontal axial upper-wind turbine
Transient flow analysis for horizontal axial upper-wind turbineinventy
 
Choice of Numerical Integration Method for Wind Time History Analysis of Tall...
Choice of Numerical Integration Method for Wind Time History Analysis of Tall...Choice of Numerical Integration Method for Wind Time History Analysis of Tall...
Choice of Numerical Integration Method for Wind Time History Analysis of Tall...inventy
 
Impacts of Demand Side Management on System Reliability Evaluation
Impacts of Demand Side Management on System Reliability EvaluationImpacts of Demand Side Management on System Reliability Evaluation
Impacts of Demand Side Management on System Reliability Evaluationinventy
 
Reliability Evaluation of Riyadh System Incorporating Renewable Generation
Reliability Evaluation of Riyadh System Incorporating Renewable GenerationReliability Evaluation of Riyadh System Incorporating Renewable Generation
Reliability Evaluation of Riyadh System Incorporating Renewable Generationinventy
 
The effect of reduced pressure acetylene plasma treatment on physical charact...
The effect of reduced pressure acetylene plasma treatment on physical charact...The effect of reduced pressure acetylene plasma treatment on physical charact...
The effect of reduced pressure acetylene plasma treatment on physical charact...inventy
 
Experimental Investigation of Mini Cooler cum Freezer
Experimental Investigation of Mini Cooler cum FreezerExperimental Investigation of Mini Cooler cum Freezer
Experimental Investigation of Mini Cooler cum Freezerinventy
 
Growth and Magnetic properties of MnGeP2 thin films
Growth and Magnetic properties of MnGeP2 thin filmsGrowth and Magnetic properties of MnGeP2 thin films
Growth and Magnetic properties of MnGeP2 thin filmsinventy
 

More from inventy (20)

Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...
Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...
Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...
 
Copper Strip Corrossion Test in Various Aviation Fuels
Copper Strip Corrossion Test in Various Aviation FuelsCopper Strip Corrossion Test in Various Aviation Fuels
Copper Strip Corrossion Test in Various Aviation Fuels
 
Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...
Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...
Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...
 
Comparative Study of the Quality of Life, Quality of Work Life and Organisati...
Comparative Study of the Quality of Life, Quality of Work Life and Organisati...Comparative Study of the Quality of Life, Quality of Work Life and Organisati...
Comparative Study of the Quality of Life, Quality of Work Life and Organisati...
 
A Study of Automated Decision Making Systems
A Study of Automated Decision Making SystemsA Study of Automated Decision Making Systems
A Study of Automated Decision Making Systems
 
Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous β -Form Nuclea...
Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous β -Form Nuclea...Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous β -Form Nuclea...
Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous β -Form Nuclea...
 
Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...
Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...
Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...
 
Application of Kennelly’model of Running Performances to Elite Endurance Runn...
Application of Kennelly’model of Running Performances to Elite Endurance Runn...Application of Kennelly’model of Running Performances to Elite Endurance Runn...
Application of Kennelly’model of Running Performances to Elite Endurance Runn...
 
Development and Application of a Failure Monitoring System by Using the Vibra...
Development and Application of a Failure Monitoring System by Using the Vibra...Development and Application of a Failure Monitoring System by Using the Vibra...
Development and Application of a Failure Monitoring System by Using the Vibra...
 
The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...
The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...
The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...
 
Size distribution and biometric relationships of little tunny Euthynnus allet...
Size distribution and biometric relationships of little tunny Euthynnus allet...Size distribution and biometric relationships of little tunny Euthynnus allet...
Size distribution and biometric relationships of little tunny Euthynnus allet...
 
Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...
Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...
Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...
 
Effect of Various External and Internal Factors on the Carrier Mobility in n-...
Effect of Various External and Internal Factors on the Carrier Mobility in n-...Effect of Various External and Internal Factors on the Carrier Mobility in n-...
Effect of Various External and Internal Factors on the Carrier Mobility in n-...
 
Transient flow analysis for horizontal axial upper-wind turbine
Transient flow analysis for horizontal axial upper-wind turbineTransient flow analysis for horizontal axial upper-wind turbine
Transient flow analysis for horizontal axial upper-wind turbine
 
Choice of Numerical Integration Method for Wind Time History Analysis of Tall...
Choice of Numerical Integration Method for Wind Time History Analysis of Tall...Choice of Numerical Integration Method for Wind Time History Analysis of Tall...
Choice of Numerical Integration Method for Wind Time History Analysis of Tall...
 
Impacts of Demand Side Management on System Reliability Evaluation
Impacts of Demand Side Management on System Reliability EvaluationImpacts of Demand Side Management on System Reliability Evaluation
Impacts of Demand Side Management on System Reliability Evaluation
 
Reliability Evaluation of Riyadh System Incorporating Renewable Generation
Reliability Evaluation of Riyadh System Incorporating Renewable GenerationReliability Evaluation of Riyadh System Incorporating Renewable Generation
Reliability Evaluation of Riyadh System Incorporating Renewable Generation
 
The effect of reduced pressure acetylene plasma treatment on physical charact...
The effect of reduced pressure acetylene plasma treatment on physical charact...The effect of reduced pressure acetylene plasma treatment on physical charact...
The effect of reduced pressure acetylene plasma treatment on physical charact...
 
Experimental Investigation of Mini Cooler cum Freezer
Experimental Investigation of Mini Cooler cum FreezerExperimental Investigation of Mini Cooler cum Freezer
Experimental Investigation of Mini Cooler cum Freezer
 
Growth and Magnetic properties of MnGeP2 thin films
Growth and Magnetic properties of MnGeP2 thin filmsGrowth and Magnetic properties of MnGeP2 thin films
Growth and Magnetic properties of MnGeP2 thin films
 

Recently uploaded

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 

Recently uploaded (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

Research Inventy : International Journal of Engineering and Science

  • 1. Research Inventy: International Journal Of Engineering And Science Vol.3, Issue 3 (June 2013), PP 25-28 Issn(e): 2278-4721, Issn(p):2319-6483, Www.Researchinventy.Com 25 Approach for Face Recognition using Local and Global Features Santhosh Kumar S, Gurupadagouda P.K, BasavarajMirji, Praveen Kumar A.T Department ofInformationr Science and Engineering Srinivas Institute of Technology, valachil, Mangalore, Karnataka, India ABSTRACT - Face Recognition using Discrete Cosine Transform (DCT) for Local and Global Features involves recognizing the corresponding face image from the database. The face image obtained from the user is cropped such that only the frontal face image is extracted, eliminating the background. The image is restricted to a size of 128 × 128 pixels. All images in the database are gray level images. DCT is applied to the entire image. This gives DCT coefficients, which are global features. Local features such as eyes, nose and mouth are also extracted and DCT is applied to these features. Depending upon the recognition rate obtained for each feature, they are given weightage and then combined. Both local and global features are used for comparison. By comparing the ranks for global and local features, the false acceptance rate for DCT can be minimized Keywords - Discrete Cosine transform, Local feature, Global feature. I. INTRODUCTION A face recognition system is essentially an application intended to identify or verify a person either from a digital image or a video frame obtained from a video source. Although other reliable methods of biometric personal identification exist, for e.g., fingerprint analysis or iris scans, these methods inherently rely on the cooperation of the participants, whereas a personal identification system based on analysis of frontal or profile images of the face is often effective without the participant‟s cooperation or intervention. One of the many ways for automatic identification or verification is by comparing selected facial features from the image and a facial database. This technique is typically used in security systems. For e.g., This technology could be used as a security measure at ATM‟s; instead of using a bank card or personal identification number, the ATM would capture an image of the person‟s face, and compare it to his/her photo in the bank database to confirm the identity of the relevant person. On similar lines, this concept could also be extrapolated to computers; by using a web cam to capture a digital image of a person, the face could replace the commonly used password as a means to log-in and thus, authenticate oneself. Given a large database of images and a photograph, the problem is to select from the database a small set of records such that one of the image records matched the photograph. The success of the method could be measured in terms of the ratio of the answer list to the number of records in the database. The recognition problem is made difficult by the great variability in head rotation and tilt, lighting intensity and angle, facial expression, aging, etc. Some other attempts at facial recognition by machines have allowed for little or no variability in these quantities. A general statement of the problem of machine recognition of faces can be formulated as: given a still or video image of a scene, identify or verify one or more persons in the scene using a stored database of faces. Available collateral information such as race, age, gender, facial expression, or speech may be used in narrowing the search. The solution to the problem involves segmentation of faces, feature extraction from face regions, recognition, or verification. In identification problems, the input to the system is an unknown face, and the system reports back the determined identity from a database of known individuals, whereas in verification problems, the system needs to confirm or reject the claimed identity of the input face. Some of the various applications of face recognition include driving licenses, immigration, national ID, passport, voter registration, security application, medical records, personal device login, desktop login, human- robot-interaction, human-computer-interaction, smart cards etc. One of its applications is Criminal Face Identification system. Establishing the identity of any criminal by constructing the image of the criminal based on information given by eyewitnesses and comparing it with existing criminal images in the database available with investigating agencies. Construction of the image of the criminal using segmented/sliced images of human face like mouth, eyes, nose, ..etc is available in the database with the help of eyewitnesses. There are three approaches for Face recognition: 1.1 Holistic matching methods: These methods use the whole face region (global feature) as a raw input to the recognition system. One of the most widely used representations of the face region is Eigen pictures, which is inherently based on principal component analysis.
  • 2. Approach for Face Recognition using Local and Global Features 26 1.2 Feature-based matching methods: Generally, in these methods, local features such as the eyes, nose and mouth are first extracted and their locations and local statistics are fed as inputs into a classifier. 1.3 Hybrid methods: It uses both local features and whole face region to recognize a face. This method could potentially offer the better of the two types of methods. Our aim is to extract local features from a given frontal face. The local features are left eye, right eye, nose and mouth. These local features will be extracted manually. Discrete Cosine Transform (DCT) will be applied to each of these local features individually and also to the global features. Finally, the results obtained in both cases will be compared. II. PROPOSED ALGORITHM For creating the database Microsoft Access is used. Frontal images are extracted from the database. Frontal face image extraction is carried out in order to reduce the effect of varying backgrounds on the proposed face recognition system. The frontal face image is acquired. From the given frontal image, local features like eyes, nose and mouth region are extracted manually. DCT is applied to each of these features. The DCT coefficients of these regions are stored. These coefficients are then used for comparison. The recognition rates obtained with these local features are compared to the recognition rate obtained when DCT is applied to the global image. DCT is an accurate and robust face recognition system and using certain normalization techniques, its robustness to variations in facial geometry and illumination can be increased. Face normalization techniques are also incorporated in the face recognition application discussed. Namely, an affine transformation is used to correct scale, position, and orientation changes in faces. Due to this a tremendous improvements in recognition rates can be achieved with such normalization. In order to the prevent problem of illumination variations, faces in the databases used for the tests are uniformly illuminated. That is, certain illumination normalization techniques are used to make all faces have the same overall gray-scale intensity. An alternative approach to the DCT is KLT (Karhunen-Loeve transform). This transform exhibits pattern recognition properties that were largely overlooked initially because of the complexity involved in its computation. This transform produces an expansion of an input image in terms of a set of basis images or the so-called “Eigen images.” But DCT is better than KLT because of following comparisons. A complexity comparison between the DCT and the Karhunen-Loeve transform (KLT) is that, in the proposed application, using DCT, training essentially means computing the DCT coefficients of all the database faces. On the other hand, using the KLT, training entails computing the basis vectors of the transformation. This means that the KLT is more computationally expensive with respect to DCT. However, once the KLT basis vectors have been obtained, it may be argued that computing the KLT coefficients for recognition is trivial. But this is also true of the DCT, with the additional provision that the DCT may take advantage of very efficient computational algorithms. DCT is a well-known signal analysis tool used in compression due to its compact representation power. It is known that the KLT is the optimal transform in terms of information packing, however, its data dependent nature makes it infeasible to implement in some practical tasks. Moreover, DCT closely approximates the compact representation ability of the KLT, which makes it a very useful tool for signal representation both in terms of information packing and in terms of computational complexity due to its data independent nature. DCT helps to separate the image into parts of differing importance (with respect to the image's visual quality). DCT is conceptually similar to Discrete Fourier Transform (DFT), in the way that it transforms a signal or an image from the spatial domain to the frequency domain. Fig 1: Image transformation from spatial domain to frequency domain Discrete Cosine Transform Encoding The basic encoding operation of the DCT is as follows: • The size of the input image is N × M. • f(i, j) is the intensity of the pixel at x(i, j). • F(u, v) is the DCT coefficient for the pixel at x(i, j). • For most images, much of the signal energy lies at low frequencies. These appear in the upper left corner of the DCT.
  • 3. Approach for Face Recognition using Local and Global Features 27 • Compression is achieved since the lower right values represent higher frequencies, and are often small enough to be neglected with little visible distortion. The output array of DCT coefficients contains integers; these can range from -1024 to 1023. Computationally, it is easier to implement and also efficient to consider the DCT as a set of basis functions which given a known input array size, for e.g., 8 × 8, can be pre-computed and stored. This involves simply computing values for a convolution mask (8 × 8 window) that get applied. III. EXPERIMENTS AND RESULT 4 test images is compared with the database that consists of a set of images of 25 people. There are 4 different test-methods: GLOBAL, LOCAL, GLOBAL+LOCAL and GLOBAL AND LOCAL. But we use GLOBAL + LOCAL. In proposed application images are filtered using Gaussian low pass filter, sharpened and converted to grayscale images. Finally intensity is adjusted and image is segmented and sliced to store both global face image and also its local features such as eye nose and mouth separately in the database after the images are normalized. 1) Normalization Since the facial images are captured at different instants of the day or on different days, the intensity for each image may exhibit variations. To avoid these light intensity variations, the test images are normalized so as to have an average intensity value with respect to the registered image. The average intensity value of the registered images is calculated as summation of all pixel values divided by the total number of pixels. Similarly, average intensity value of the test image is calculated. The normalization value is calculated as: Normalization Value = Average value of registered Image /Average value of tested Image. This value is multiplied with each pixel of the test image. Thus we get a normalized image having an average intensity with respect to that of the registered image. Next is to perform zigzag scanning and apply DCT. 2) Zigzag scanning: The purpose of Zigzag Scanning is to:  Map M x N dimension vector to 1 x N dimensions  Group low frequency coefficients present at the top of the vector Local features such as eyes, nose and mouth are extracted manually from the given face image. The image is used as an input. Local feature extraction, especially eye extraction, helps reduce the effect of varying characteristics such as pose, expressions etc. on the face recognition system. Fig 2: Zigzag scanning After extracting the features, the images are compared using DCT and the comparison is done by taking the Euclidean distance between the test and registered image. Eye-R Eye-L Nose Mouth Fig 3: Test image For e.g., we take 50 coefficients of test image and 50 coefficients of registered image. The Euclidean distance of each of the 50 coefficients of the test image and 50 coefficients of the registered image are calculated. Add all the Euclidean distance of the 50 coefficients. Let the value of this addition be „X‟. Since
  • 4. Approach for Face Recognition using Local and Global Features 28 there are 15 registered images, each of the test images will be compared with the 15 registered images. Thus we have X1, X2, X3, . . . , X15 values. All these 15 values of „X‟ are sorted in ascending order, and the one with the minimum value of „X‟ is given as the „rank 1‟. The next in the order is given „rank 2‟, „rank 3‟, till „rank 15‟. This „rank 1‟ image is regarded as the best match. If the „rank 1‟ image is the same as the input image, the person has been recognized correctly. Thus, the recognition rate is calculated as the ratio of number of images correctly recognized to the total number of images tested. The number of coefficients is varied and the recognition rate is calculated for each of them using the following equation: Recognition rate = Number of correctly recognized image/ Total number of persons test image. Results of the approach are,Face is identified with more accuracy and by comparing the ranks for global and local features; the false acceptance rate for DCT is minimized. IV. CONCLUSION When using local features for recognition, the false acceptance rate should be minimized and false rejection rate should be maximized as compared to that of global features. The recognition rate for local features and the recognition rate for global features using DCT are calculated. Comparison between DCT global features and DCT local features is done. The recognition rate improves when images are normalized. When local and global features are combined, DCT gives a relatively high recognition rate. REFERENCES [1]. Yao-Jiunn Chen, Yen-Chun Lin,” Simple Face-detection Algorithm Based on Minimum Facial Features “,The 33rd Annual Conference of the IEEE Industrial Electronics Society (IECON) Nov. 5-8, [2]. Sanjay Kr Singh, Ashutosh Tripathi, Ankur Mahajan, Dr S Prabhakaran “Analysis of Face Recognition in MATLAB”, International Journal of Scientific & Engineering Research, Volume 3, Issue 2, February 2012 [3]. ZIAD M. HAFED AND MARTIN D. LEVINE “Face Recognition Using the Discrete Cosine Transform” ,International Journal of Computer Vision 43(3), 2001 [4]. Aman R. Chadha, Pallavi P. Vaidya, M. Mani Roja “Face Recognition Using Discrete Cosine Transform for Global and Local Features”, Proceedings of the 2011 International Conference on Recent Advancements in Electrical, Electronics and Control Engineering (IConRAEeCE) [5]. Jae Young Choi, Yong Man Ro, Konstantinos N. Plataniotis “Color Local Texture Features for Color Face Recognition”, IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 21, NO. 3, MARCH 2012 [6]. Rafel C Gonzalez,Richard E Woods “Digital Image Processing Using matlab 2nd Edn..,Pearson Education 2003 [7]. Milan Sonka,Vaclav Hlavac and Roger Boyle,”Image Processing,Analysis and Machine Vision”,2nd Edn..,Thomoson Learning,2001.