SlideShare a Scribd company logo
1 of 11
Download to read offline
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 5, May (2014), pp. 80-90 © IAEME
80
FACE RECOGNITION SYSTEM BY IMAGE PROCESSING
Bilal Salih Abed Alhayani1
, Prof. Milind Rane2
1
(Research Scholar, Department of Electronics Engineering, Vishwakarma Institute of
Technology Pune, University of Pune, India)
2
(Asst. Prof Dr. Department of Electronics Engineering, Vishwakarma Institute of Technology
Pune, University of Pune, India
ABSTRACT
A wide variety of systems require reliable person recognition schemes to either confirm
or determine the identity of an individual requesting their services. The purpose of such schemes
is to ensure that only a legitimate user and no one else access the rendered services. Examples of
such applications include secure access to buildings, computer systems, laptops, cellular phones,
and ATMs. Face can be used as Biometrics for person verification. Face is a complex
multidimensional structure and needs a good computing techniques for recognition. We treats
face recognition as a two-dimensional recognition problem. A well-known technique of Principal
Component Analysis (PCA) is used for face recognition. Face images are projected onto a face
space that encodes best variation among known face images. The face space is defined by Eigen
face which are eigenvectors of the set of faces, which may not correspond to general facial
features such as eyes, nose, lips. The system performs by projecting pre extracted face image
onto a set of face space that represent significant variations among known face images. The
variable reducing theory of PCA accounts for the smaller face space than the training set of face.
A Multire solution features based pattern recognition system used for face recognition based on
the combination of Radon and wavelet transforms. As the Radon transform is in-variant to
rotation and a Wavelet Transform provides the multiple resolution. This technique is robust for
face recognition. The technique computes Radon projections in different orientations and
captures the directional features of face images. Further, the wavelet transform applied on Radon
space provides multire solution features of the facial images. Being the line integral, Radon
transform improves the low-frequency components that are useful in face recognition.
INTERNATIONAL JOURNAL OF ELECTRONICS AND
COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)
ISSN 0976 – 6464(Print)
ISSN 0976 – 6472(Online)
Volume 5, Issue 5, May (2014), pp. 80-90
© IAEME: www.iaeme.com/ijecet.asp
Journal Impact Factor (2014): 7.2836 (Calculated by GISI)
www.jifactor.com
IJECET
© I A E M E
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 5, May (2014), pp. 80-90 © IAEME
81
Keyword: Introduction, Face Detection, Principal Component Analysis, Eigen Face Approach,
Radon Wavelet Transform, Principal Component Analysis, Result and Conclusion,
Bibliography.
INTRODUCTION
Within today's environment of increased importance of security and organization,
identification and authentication methods have developed into a key technology in various areas:
entrance control in buildings; access control for computers in general or for automatic teller
machines in particular; day-to-day affairs like withdrawing money from a bank account or
dealing with the post office; or in the prominent field of criminal investigation. Such requirement
for reliable personal identification in computerized access control has resulted in an increased
interest in biometrics. Biometric identification is the technique of automatically identifying or
verifying an individual by a physical characteristic or personal trait. The term automatically
means the biometric identification system must identify or verify a human characteristic or trait
quickly with little or no intervention from the user. Biometric technology was developed for use
in high-level security systems and law enforcement markets. The key element of biometric
technology is its ability to identify a human being and enforce security. Biometric characteristics
and traits are divided into behavioral or physical categories. Behavioral biometrics encompasses
such behaviors as signature and typing rhythms. Physical biometric systems use the eye, finger,
hand, voice, and face, for identification. Humans have used body characteristics such as face,
voice, and gait for thousands of years to recognize each other. Distinctiveness of the human
fingerprints has given significant and practical discovery of person recognition. Soon after this
discovery, many major law enforcement departments embraced the idea of first booking the
fingerprints of criminals and storing it in a database (card file). Later, the leftover (fragmentary)
fingerprints (latents) at the scene of crime could be lifted and matched with fingerprints in the
database to determine the identity of the criminals. Recently biometrics is increasingly used to
establish person recognition in a large number of civilian applications. Any human
phys1iological and/or behavioral characteristic can be used as a biometric characteristic as long
as it satisfies universality, distinctiveness, permanence, collectability, performance, acceptability,
and circumvention. A practical biometric system should meet the specified recognition accuracy,
speed, and resource requirements, be harmless to the users, be accepted by the intended
population, and be sufficiently robust to various fraudulent methods and attacks to the system.
FACE DETECTION
Human face detection is often the first step in applications such as video surveillance,
human computer interface, face recognition, and image database management. The aim of face
detection is to classify the segment of image as face or non-face(background of image). The task
of describing the human face is difficult due to the fact that the image varies based on external
factors like viewpoint, scale, different individual, occlusion, lighting, environmental conditions
and internal factors like facial expression, beard, moustache, glasses. Various approaches to face
detection are discussed in [18]. These approaches utilize techniques such as neural networks,
machine learning, (deformable) template matching, Hough transform, motion extraction, and
color analysis. The neural network-based [22] and view-based [35] approaches require a large
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 5, May (2014), pp. 80-90 © IAEME
82
number of face and non-face training examples, and are designed to find frontal faces in
grayscale images. A recent statistical approach [35] extends the detection of frontal faces to
profile views by training two separate classifiers. Model-based approaches are widely used in
tracking faces and often assume that the initial locations of faces are known. Skin color provides
an important cue for face detection. Detection of skin color in color images is a very popular and
useful technique for face detection. Many techniques have reported for locating skin color
regions in the input image. While the input color image is typically in the RGB format, these
techniques usually use color components in the color space, such as the HSV or YIQ formats.
That is because RGB components are subject to the lighting conditions thus the face detection
may fail if the lighting condition changes. In the Y CbCr color space, the luminance information
is contained in Y component; and, the chrominance information is in Cb and Cr. Therefore, the
luminance information can be easily de embedded. The RGB components were converted to the
Y CbCr components using the equation 3.1, equation 3.2, equation 3.3.
Y = 0.299R + 0.587G + 0.114B (3.1)
Cb = 0.169R0.332G + 0.500B (3.2)
Cr = 0.500R0.419G0.081B (3.3)
In the skin color detection process, each pixel was classified as skin or non-skin based on
its color components. The detection window for skin color was determined based on the mean
and standard deviation of Cr component, obtained using training faces. The following steps are
required to conduct for face detection.
1. To detect the skin pixels threshold the face image with threshold of Cr = 102
2. If the Cr value is less than 102 darken the pixel i.e. make pixel value equal to zero,
otherwise retain the pixel value. The obtained image is then binaries.
3. Number of regions we get after thresholding are required to reduce after finding the area of
that region. If the area of region is greater than the 1000 pixel it is a face image.
4. Find the bounding box which fits the area detected as face region.
5. Crop the face image from the original image using the coordinate of bounding boxes.
6. Display the detected face image The result of different steps of face detection are as given
below shows the original face image. We implement the algorithm successfully on the Face
94 and Face 96 databases. We implement a face detection algorithm for color images in the
presence of varying lighting conditions as well as complex backgrounds.
PRINCIPAL COMPONENT ANALYSIS (PCA)
Principal component analysis (PCA) was invented in 1901 by Karl Pearson. PCA is a
variable reduction procedure and useful when obtained data have some redundancy. This will
result introduction of variables into smaller number of variables which are called Principal
Components which will account for the most of the variance in the observed variable. Problems
arise when we wish to perform recognition in a high-dimensional space. Goal of PCA is to
reduce the dimensionality of the data by retaining as much as variation possible in our original
data set. On the other hand dimensionality reduction implies information loss. The best low-
dimensional space can be determined by best principal components. The major advantage of
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 5, May (2014), pp. 80-90 © IAEME
83
PCA is using it in Eigen face approach which helps in reducing the size of the database for
recognition of a test images. The images are stored as their feature vectors in the database which
are found out projecting each and every trained image to the set of Eigen faces obtained. PCA is
applied on Eigen face approach to reduce the dimensionality of a large data set.
EIGEN FACE APPROACH
It is adequate and efficient method to be used in face recognition due to its simplicity,
speed and learning capability. Eigen faces are a set of Eigen vectors used in the Computer Vision
problem of human face recognition. They refer to an appearance based approach to face
recognition that seeks to capture the variation in a collection of face images and use this
information to encode and compare images of individual faces in a holistic manner. The Eigen
faces are Principal Components of a distribution of faces, or equivalently, the Eigen vectors of
the covariance matrix of the set of the face images, where an image with N by N pixels is
considered a point in N 2 dimensional space. Previous work on face recognition ignored the issue
of face stimulus, assuming that predefined measurement were relevant and sufficient. This
suggests that coding and decoding of face images may give information of face images
emphasizing the significance of features. These features may or may not be related to facial
features such as eyes, nose, lips and hairs. We want to extract the relevant information in a face
image, encode it efficiently and compare one face encoding with a database of faces encoded
similarly. A simple approach to extracting the information content in an image of a face is to
somehow capture the variation in a collection of face images. We wish to find Principal
Components of the distribution of faces, or the Eigen vectors of the covariance matrix of the set
of face images. Each image location contributes to each Eigen vector, so that we can display the
Eigen vector as a sort of face. Each face image can be represented exactly in terms of linear
combination of the Eigen faces. The number of possible Eigen faces is equal to the number of
face image in the training set. The faces can also be approximated by using best Eigen face,
those that have the largest Eigen values, and which therefore account for most variance between
the set of face images. The primary reason for using fewer Eigen faces is computational
efficiency.
Eigen Values and Eigen Vectors
In linear algebra, the eigenvectors of a linear operator are non-zero vectors which, when
operated by the operator, result in a scalar multiple of them. Scalar is then called Eigen value (λ)
associated with the eigenvector (X). Eigen vector is a vector that is scaled by linear
transformation. It is a property of matrix. When a matrix acts on it, only the vector magnitude is
changed not the direction.
AX = λX, (4.1)
RADON WAVELET TRANSFORM
1. Radon transform
Radon transform is based on the parameterization of straight lines and the evaluation of
integrals of an image along these lines. Due to inherent properties of Radon transform, it is a
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 5, May (2014), pp. 80-90 © IAEME
84
useful tool to capture the directional features of an image [6] [7]. The classical Radon transform
of a two variable function u is Ru defined on a family of straight lines. The value of Ru on a
given line is the integral of u along this line [24]. Let the line in the plane (t, q) is represented as t
= τ + pq (5.1) where p is the slope and t is the offset of the line. The Radon transform of the
function over this line is given as (5.5) where N is the radius in pixels [33]. The Radon transform
has been extensively used to extract the local features in edge detection, texture and fingerprint
classification and image retrieval in computer tomography. In these approaches, images are
divided into sub-blocks and minimum number of Radon projections as specified by equation 5.4
and equation 5.5 of each block is computed to derive the local features. However, these
approaches are not computationally efficient (because of large dimensionalities) Facial features
are the directional low-frequency components. Earlier studies show that information in low
spatial frequency band plays a dominant role in face recognition. The low-frequency components
contribute to the global description, while the high frequency components contribute to the fine
details [6]. Radon transform preserves the variations in pixel intensities. While computing Radon
projections, the pixel intensities along a line are added. Improves the spatial frequency
components in a direction in which Radon projection is computed. When features are extracted
using Radon transform, the variations in the spatial frequency are not only preserved but boosted
also. With the proposed approach, global Radon projections for relatively less number of
orientations (compared to number of projections stated by equation 5.4 and equation 5.5 achieve
maximum recognition accuracy. It has been experimentally proved that the number of
projections required to attain the maximum recognition accuracy is approximately one-third of
that required for reconstruction. Discrete Wavelet Transform (DWT) applied on Radon
projections derives multire solution features of the face images. Hence, the approach reduces the
dimensionality and becomes computationally efficient. The advantage of the proposed approach
is its robustness to zero mean white noise. Suppose an image is represented as
f′(x, y) = f(x, y) + η(x, y) (5.6)
where η(x, y) is white noise with zero mean. Then its Radon transform is
R(r, θ)[f′(x, y)] = R(r, θ)[f(x, y)] + R(r, θ)[η(x, y)] (5.7)
Being the line integral, for the continuous case, the Radon transform of white noise is
constant for all of the points and directions and is equal to its mean value (if integrated over
infinite axis), which is assumed to be zero. Therefore,
R(r, θ)[f′(x, y)] = R(r, θ)[f(x, y)] (5.8)
However, this is not true for digital images because they are composed of a finite number of
pixels.
2. Wavelet Transform (Multire solution features)
Wavelet Transform has the nice features of space frequency localization and multire
solution. The main reasons for Wavelet Transforms popularity lie in its complete theoretical
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 5, May (2014), pp. 80-90 © IAEME
85
framework, the great flexibility in choosing the bases and the low computational complexity. Let
L2(R) denote the vector space of a measurable, square integrable, one-dimensional signal.
EXPERIMENTATION AND RESULTS
The project work is implemented on i-5 system with 4Gb Ram. The Matlab 2008a is used
for implementation and testing of algorithm. The four methods are implemented for the face
recognition as Principal component Analysis, Radon Transform, Wavelet Transform, Radon
Wavelet Transform.
Details of database
A database of OTCBVS colored face image is used for testing the algorithm. the database
consist of 23 personnel and each having 3 photos. For the further experiments the Database of
Face 94, Face 96 and AT and T are used.
1. Face 94 database consist of 150 subjects and 20 images per subject are given with different
poses and expression on the faces with simple background.
2. Face 96 database consist of 72 subjects and 20 images per subject are given with different
poses and expression on the faces and complex background.
3. AT and T database consist of 40 subjects and 10 images per subject
Results of face detection
The database is applied with the face detection algorithm for segmenting the face region
from the complex background.
Principal Component Analysis
The detected colour face image is then converted to gray scale image as grey scale
images are easier for applying computational techniques in image processing due to reduction in
dimension and there is no colour space constraints are required to take into account. A grey scale
face image is scaled for a fix pixel size as 24 _ 24 because different input images can be of
different size whenever we take a input face from database for recognition.
Mean Face, difference face and covariance matrix
Mean face is obtained by equation. Then the difference image is calculated by equation
and covariance matrix are calculated by using equation 4.7
1. Eigen Face
Calculate the eigenvectors µk and eigenvalues λk of the covariance matrix. find the
weights for each image and save it in database. Threshold value of the test face image to Eigen
face space which is Euclidean distance is taken minimum distance defines the matched image
which classifies the face. The algorithms for face recognition was tested on OTCBVS database
to compute recognition rate. The recognition rate for above proposed algorithms is carried out on
the 23 personnel images. The recognition
rate (GAR) is calculated to 59 percent for 69 images. Thus the face recognition system using
Principal Component Analysis and Eigen face approach is implemented successfully.
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 5, May (2014), pp. 80-90 © IAEME
86
2. Radon Wavelet Transform
Table 1: Recognition Rate for Face Recognition
The Experimentation is done on the three databases namely Face 94 Face 96 and AT and
T database. The detected Colour face image is then converted to gray scale image as grey scale
images are easier for applying computational techniques in image processing due to reduction in
dimension. The Radon Transform is the applied on the detected Face images. The feature vector
is formed for each face. The similarity measure of Euclidian distance is applied for face
recognition. The result for different databases are mentioned in Table 1. The Discrete Wavelet
Transform is applied on the detected face images. The feature vector is formed for each face. The
similarity measure of Euclidian distance is applied for face recognition. The result for different
databases are mentioned in Table 1. The recognition rate is improved by cascading the Radon
Transform and Discrete Wavelet Transform. First the Radon Transform is the applied on the
detected Face images. The obtained feature vector is the processed with the Discrete Wavelet
Transform to decompose up to the third level. The LL3 component is used for the feature vector
formation for each face. The similarity measure of Euclidian distance is applied for face
recognition. The result for different databases are mentioned in Table 1. For testing the Radon
Transform, Discrete Wavelet Transform(DWT), Radon Discrete Wavelet Transform(RDWT)
algorithm the databases are as mentioned below For experimentation we use Face 94, Face 96,
AT and T(ORL) databases
1. Face94 which contains the 152 subjects and 20 images per subject
2. Face 96 which consist of 150 subjects and 20 images per subject
3. AT and T which contains the 40 subjects and 10 images per subject
RESULT AND CONCLUSION
Face recognition has been an attractive field of research for both neuroscientists and
computer vision scientists. Humans are able to identify reliably a large number of faces and
neuroscientists are interested in understanding the perceptual and cognitive mechanisms at the
base of the face recognition process. Those researches illuminate computer vision scientists
studies. Although designers of face recognition algorithms and systems are aware of relevant
Algorithm FACE 94 FACE 96 AT and T
Radon Transform 94 70.62 82.04
Wavelet
Transform
92.79 67.50 79.30
RDWT 94.48 87.50 90.70
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 5, May (2014), pp. 80-90 © IAEME
87
psychophysics and neurophysiological studies, they also should be prudent in using only those
that are applicable or relevant from a practical/implementation point of view. Eigen-faces
algorithm has some shortcomings due to the use of image pixel gray values. As a result system
becomes sensitive to illumination changes, scaling, etc. and needs a beforehand pre-processing
step. Satisfactory recognition performances could be reached by successfully aligned face
images. When a new face attend to the database system needs to run from the beginning, unless a
universal database exists. In this presented work, a approach to face recognition with Radon
Discrete Wavelet Transform is presented. The method uses Radon Discrete Wavelet Transform
for both finding feature points and extracting feature vectors. From the experimental results, it is
seen that the method achieves better results compared to the Eigen-face methods, which are
known to be the most successive algorithms. A new facial image can also be simply added by
attaching new feature vectors to reference gallery while such an operation might be quite time
consuming for systems that need training.
BIBLIOGRAPHY
[1] A. Eriksson and P. Wretling, How flexible is the human voice? A case study of mimicry,
in Proceeding Europian Conference of Speech Technology, Rhodes, pp. 10431046, 1997.
[2] A.K. Jain, A. Ross, S. Prabhakar, “An introduction to biometric recognition,” IEEE
Trans. Circuits Syst. Video Technol. 14 (1), pp.420,2004.
[3] A M. Patil, S R. Kolhe, P M. Patil and M E Rane, Modified Fisher Face Approach for
Robust Biometric Recognition System, ICGST International Journal on Graphics, Vision
and Image Processing, GVIP, Vol. 10, Issue IV, pp. 9-15, 2010.
[4] A. Pentland, Looking at people: Sensing for ubiquitous and wearable computing, IEEE
Transaction Pattern Analysis and Machine Intelligence, vol. 22, pp. 107119, Jan. 2000.
[5] A. Samal and P. A. Iyengar, Automatic recognition and analysis of human faces and
facial expression: A survey, Pattern Recognition, vol. 25, no. 1, pp. 6577, 1992.
[6] B.-L. Zhang, H. Zhang, S. Sam, “Face recognition by applying wavelet sub band
representation and kernel associative memory,” IEEE Trans. Neural Netw. 15 (1),
pp.166177(2004).
[7] B. Scholkopf, A. Smola, K. Muller, “Nonlinear component analysis as a kernel
eigenvalue problem”, Neural Comput. 10, pp. 12991319, 1998.
[8] C. Liu and H. Wechsler, Evolutionary pursuit and its application to face recognition,
IEEE Transaction Pattern Analysis and Machine Intelligence, vol. 22, pp. 570582, June
2000.
[9] C. Liu, H. Wechsler, “Independent component analysis of Gabor features for face
recognition,” IEEE Transaction. Neural Network vol. 14 (4),pp. 919928, 2003. 47.
[10] C. Liu, H. Wechsler, Gabor feature based classification using the enhanced Fisher linear
discriminant model for face recognition, IEEE Trans. Image Process. 11 (4),pp.
467476,2002.
[11] C. Xiang, Feature extraction using recursive cluster based linear discriminant with
application to face recognition, IEEE Trans. Image Process. 15 (12), pp.38243832, 2006.
[12] D Maio, D Maltoni, R Cappelli, J L Wayman, and A K Jain, FVC2002: Fingerprint
verification competition, in Proceeding of International Conference of Pattern
Recognition (ICPR Canada), pp. 744747, 2002.
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 5, May (2014), pp. 80-90 © IAEME
88
[13] D. Zhang and W. Shu, Two novel characteristic in palmprint verification: Datum point
invariance and line feature matching, Pattern Recognition, vol. 32, no. 4, pp. 691702,
1999.
[14] D.L. Swets, J.Weng, Using discriminative Eigen features for image retrieval, IEEE
Transaction Pattern Analysis and Machine Intelligence, vol. 18 (8) 831836, 1996.
[15] D. Tao, X. Li, X.Wu, S.J. Maybank, “General tensor discriminant analysis and Gabor
features for gait recognition,” IEEE Trans. Pattern Anal. Machine Intell. 29 (10),
pp. 17001715, 2007.
[16] D. Tao, X. Li, X. Wu, S.J. Maybank, ”General average divergence analysis,” in:
Proceedings of the Seventh IEEE International Conference on Data Mining,, pp. 302311,
2007.
[17] D. Tao, X. Li, X. Wu, W. Hu, S.J. Maybank, ”Supervised tensor learning, Knowledge
Inform.” Syst. (Springer) 13 (1),pp. 142,2007.
[18] D. Maio and D. Maltoni, Real-time face location on grayscale static images, Pattern
Recognition, vo1.33, no. 9, pp. 1525-1539, Sept. 2000.
[19] D. Sidlauskas, HAND: give me five, IEEE Spectrum,pp. 24-25, February 1994.
[20] E. d. Os, H. Jongebloed, A. Stijsiger, and L. Boves, Speaker verification as a user-
friendly access for the visually impaired, in Proceeding Europian Conference of Speech
Technology,Budapest, Hungary, pp. 12631266, 1999.
[21] E. Magli, G. Olmo, L. Lo Presti, ”Pattern recognition by means of the Radon transform
and the continuous wavelet transform,” Signal Process. 73, pp.277289, 1999, 48.
[22] F. Smeraldi, 0. Carmona, and J. Bigun, Saccadic search with gabor features applied to
eye detection and real-time head tracking, Image and Vision Computing, vol. 18, no. 4,
pp. 323-329,2000.
[23] G. Sun, X. Dong, G. Xu, Tumor tissue identification based on gene expression data using
DWT feature extraction and PNN classifier, Neuro computing 69, pp. 387402, 2006.
[24] G. Beylkin, ”Discrete Radon transform,” IEEE Trans. Acoust., Speech Signal Process.
ASSP-35 (2) (1987) 162171.
[25] H. Jian, P.C. Yuen, C. Wen-Sheng, A novel subspace LDA algorithms for recognition of
face images with illumination and pose variations, Proceedings of the International
Conference on Machine Learning and Cybernetics, vol. 6, pp. 35893594, 2004.
[26] H. Schneiderman and T. Kanade, A statistical method for 3D object detection applied to
faces and cars, IEEE CVPR, June 2000.
[27] J. Daugman, Face and gesture recognition: Overview, IEEE Transaction Pattern Analysis
and Machine Intelligence, vol. 19, no. 7, pp.675676, 1997.
[28] J L Wayman, Fundamentals of biometric authentication technologies, International
Journal of Image Graphics, vol 1, no 1, pp 93113, 2001.
[29] J. Yang, A.F. Frangi, J.-y. Yang, D. Zhang, J.Zhong, KPCA plus LDA: a complete kernel
Fisher discriminant framework for feature extraction and recognition, IEEE Transaction
Pattern Analysis and Machine Intelligence, 27(2) (2005) 230244.
[30] J. Ye, R. Janardan, H.P. Cheong, P. Haesun, An optimization criterion for generalized
discriminant analysis on under sampled problems, IEEE Transaction Pattern Analysis and
Machine Intelligence, 26 (8), pp.982994,2004.
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 5, May (2014), pp. 80-90 © IAEME
89
[31] J. Lu, K.N. Plataniotis, A.N. Venetsanopoulos, S.Z. Li, ”Ensemble-based discriminant
learning with boosting for face recognition,” IEEE Trans. Neural Netw. 17
(1),pp.166178(2006).
[32] J. Lu, K.N. Plataniotis, A.N. Venetsanopoulos, ”Face recognition using kernel direct
discriminant analysis algorithms,” IEEE Trans. Neural Net. 14 (1), pp. 117126, (2003).49
[33] J.-K. Kourosh, S.-Z. Hamid, ”Rotation invariant multiresolution texture analysis using
Radon and wavelet transform”, IEEE Trans. Image Process. 14 (6), pp. 783794, 2005.
[34] J.E. Siedlarz, IRIS:more detailed than a fingerprint, IEEE spectrum, pp.27,February
1994.
[35] K.K. Sung and T. Poggio, Example-based learning for view-based human face detection,
lEEE Trans. PAMI, vol. 20, pp. 39-51, Jan. 1998.
[36] M Golfarelli, D Maio, and D Maltoni, On the error reject tradeoff in biometric
verification systems, IEEE Transaction Pattern Analysis and Machine Intelligence, vol
19, pp 786796,1997.
[37] M. Kirby and L. Sirovich, Application of the Karhunen-Loeve procedure for the
characterization of human faces, IEEE Transaction Pattern Analysis and Machine
Intelligence, vol.12, pp. 103108, 1990.
[38] M. Turk and A. Pentland, Eigenfaces for recognition, Journal of Cognitive
Neuroscience,vol. 13, no. 1, pp. 7186, 1991.
[39] P J Philips, P Grother, R J Micheals, D M Blackburn, E Tabassi, and J M Bone. FRVT
2002: Overview and Summary, Available:
http://www.frvt.org/FRVT2002/documents.htm
[40] P.N. Belhumeur, J.P. Hespanha, D.J. Kriegman, Eigenfaces vs. fisher faces: recognition
using class specific linear projection, IEEE Transaction Pattern Analysis and Machine
Intelligence, vol. 19 (7) 711720, 1997.
[41] R. Chellappa, C. L.Wilson, and S. Sirohey, Human and machine recognition of faces:
Asurvey, Proceeding IEEE, vol. 83, pp. 705740, May1995.
[42] R.Manddelbaum, SPEECH: just say the word, IEEE Spectrum, page 30, February 1994.
[43] R.C. Fowler, FINGERPRINT: an old touchstone decriminalized, IEEE Spectrum, pp.26,
February 1994.
[44] S. Mika, G. Rtsch, J. Weston, B. Schlkopf, A.Smola, K.-R. Mller, Constructing
descriptive and discriminative nonlinear features: Rayleigh coefficients in kernel feature
spaces,IEEE Transaction Pattern Analysis and Machine Intelligence, 25 (5), pp.623628,
(2003).50.
[45] S.Z. Li, R.F. Chu, S.C. Liao, L. Zhang, Illumination invariant face recognition using near
infrared images, IEEE Trans. Pattern Anal. Machine Intell. 29 (4), pp.627639, (2007).
[46] S. Srisuk, M. Petrou, W. Kurutach, A. Kadyrov, ”Face authentication using trace
transform,” in: Proceedings of the IEEE Computer Society Conference on Computer
Vision and Pattern Recognition (CVPR 03), pp. 305312, 2003.
[47] S. Mallat, ”A theory of multiresolution signal decomposition: the wavelet representation,
”IEEE Trans. Pattern Anal. Machine Intell. 11, pp. 674693, 1989.
[48] W. Zhao, R. Chellappa, P.J. Phillips, Subspace linear discriminant analysis for face
recognition, Technical Report CAR-TR-914,Center for Automation Research, University
of Maryland, College Park, 1999.
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 5, May (2014), pp. 80-90 © IAEME
90
[49] W. Zhao, R. Chellappa, N. Nandhakumar, Empirical performance analysis of lineardis
criminant classifiers, Proceedings of the IEEE Conference on Computer Vision and
Pattern Recognition, 1998, pp. 164169.
[50] W. Xiaogang, T. Xiaoou, A unified frame work for subspace face recognition, IEEE
Transaction Pattern Analysis and Machine Intelligence, 26(9) (2004) 12221228.
[51] X.-J. Wu, J. Kittler, J.-Y. Yang, K. Messerm S.Wang, A new direct LDA (D-LDA)
algorithm for feature extraction in face recognition, Proceedings of the International
Conference on Pattern Recognition vol. 4, pp. 545548, 2004.
[52] X.Y. Jing, Y.Y. Tang, D. Zhang, ”A Fourier-LDA approach for image recognition,”
Pattern Recogn. 38 (2), pp.453457, 2005.
[53] X.-Y. Jing, H.-S. Wong, D. Zhang, ”Face recognition based on discriminant fractional
Fourier feature extraction,” Pattern Recogn. Lett. 27, pp.14651471, 2006.
[54] X. Zhang, Y. Jia, ”Face recognition with local steerable phase feature,” Pattern Recogn.
Lett. 27, pp.19271933, 2006.
[55] U.K.Jaliya and J.M.Rathod, “A Survey on Human Face Recognition Invariant to
Illumination”, International journal of Computer Engineering & Technology (IJCET),
Volume 4, Issue 2, 2013, pp. 517 - 525, ISSN Print: 0976 – 6367, ISSN Online:
0976 – 6375.
[56] Abhishek Choubey and Girish D. Bonde, “Face Recognition Across Pose With
Estimation of Pose Parameters”, International Journal of Electronics and Communication
Engineering &Technology (IJECET), Volume 3, Issue 1, 2012, pp. 311 - 316,
ISSN Print: 0976- 6464, ISSN Online: 0976 –6472.
[57] J. V. Gorabal and Manjaiah D. H., “Texture Analysis for Face Recognition”,
International Journal of Graphics and Multimedia (IJGM), Volume 4, Issue 2, 2013,
pp. 20 - 30, ISSN Print: 0976 – 6448, ISSN Online: 0976 –6456.
[58] S. K. Hese and M. R. Banwaskar, “Appearance Based Face Recognition by PCA and
LDA”, International Journal of Electronics and Communication Engineering &
Technology (IJECET), Volume 4, Issue 2, 2013, pp. 48 - 57, ISSN Print: 0976- 6464,
ISSN Online: 0976 –6472.
[59] Sambhunath Biswas and Amrita Biswas, “Fourier Mellin Transform Based Face
Recognition”, International Journal of Computer Engineering & Technology (IJCET),
Volume 4, Issue 1, 2013, pp. 8 - 15, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
[60] Prof. B.S Patil and Prof. A.R Yardi, “Real Time Face Recognition System using Eigen
Faces”, International Journal of Electronics and Communication Engineering &
Technology (IJECET), Volume 4, Issue 2, 2013, pp. 72 - 79, ISSN Print: 0976- 6464,
ISSN Online: 0976 –6472.
[61] Steven Lawrence Fernandes and Dr. G Josemin Bala, “Analysing Recognition Rate of
LDA and LPP Based Algorithms for Face Recognition”, International journal of
Computer Engineering & Technology (IJCET), Volume 3, Issue 2, 2012, pp. 115 - 125,
ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.

More Related Content

What's hot

A comparative review of various approaches for feature extraction in Face rec...
A comparative review of various approaches for feature extraction in Face rec...A comparative review of various approaches for feature extraction in Face rec...
A comparative review of various approaches for feature extraction in Face rec...Vishnupriya T H
 
Facial Expression Recognition Using Local Binary Pattern and Support Vector M...
Facial Expression Recognition Using Local Binary Pattern and Support Vector M...Facial Expression Recognition Using Local Binary Pattern and Support Vector M...
Facial Expression Recognition Using Local Binary Pattern and Support Vector M...AM Publications
 
face recognition system
face recognition systemface recognition system
face recognition systemAnil Kumar
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterNIDHI SHARMA
 
IRJET- Automated Criminal Identification System using Face Detection and Reco...
IRJET- Automated Criminal Identification System using Face Detection and Reco...IRJET- Automated Criminal Identification System using Face Detection and Reco...
IRJET- Automated Criminal Identification System using Face Detection and Reco...IRJET Journal
 
IRJET- Persons Identification Tool for Visually Impaired - Digital Eye
IRJET-  	  Persons Identification Tool for Visually Impaired - Digital EyeIRJET-  	  Persons Identification Tool for Visually Impaired - Digital Eye
IRJET- Persons Identification Tool for Visually Impaired - Digital EyeIRJET Journal
 
Local Descriptor based Face Recognition System
Local Descriptor based Face Recognition SystemLocal Descriptor based Face Recognition System
Local Descriptor based Face Recognition SystemIRJET Journal
 
Face Recognition System under Varying Lighting Conditions
Face Recognition System under Varying Lighting ConditionsFace Recognition System under Varying Lighting Conditions
Face Recognition System under Varying Lighting ConditionsIOSR Journals
 
An Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint TechnologiesAn Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint Technologiesiosrjce
 
Face recognition a survey
Face recognition a surveyFace recognition a survey
Face recognition a surveyieijjournal
 
Face recognization using artificial nerual network
Face recognization using artificial nerual networkFace recognization using artificial nerual network
Face recognization using artificial nerual networkDharmesh Tank
 
IRJET- Autonamy of Attendence using Face Recognition
IRJET- Autonamy of Attendence using Face RecognitionIRJET- Autonamy of Attendence using Face Recognition
IRJET- Autonamy of Attendence using Face RecognitionIRJET Journal
 
IRJET- A Review on Face Recognition using Local Binary Pattern Algorithm
IRJET- A Review on Face Recognition using Local Binary Pattern AlgorithmIRJET- A Review on Face Recognition using Local Binary Pattern Algorithm
IRJET- A Review on Face Recognition using Local Binary Pattern AlgorithmIRJET Journal
 
IRJET- Face Recognition using Deep Learning
IRJET-  	  Face Recognition using Deep LearningIRJET-  	  Face Recognition using Deep Learning
IRJET- Face Recognition using Deep LearningIRJET Journal
 
An overview of face liveness detection
An overview of face liveness detectionAn overview of face liveness detection
An overview of face liveness detectionijitjournal
 

What's hot (19)

A comparative review of various approaches for feature extraction in Face rec...
A comparative review of various approaches for feature extraction in Face rec...A comparative review of various approaches for feature extraction in Face rec...
A comparative review of various approaches for feature extraction in Face rec...
 
N010226872
N010226872N010226872
N010226872
 
Facial Expression Recognition Using Local Binary Pattern and Support Vector M...
Facial Expression Recognition Using Local Binary Pattern and Support Vector M...Facial Expression Recognition Using Local Binary Pattern and Support Vector M...
Facial Expression Recognition Using Local Binary Pattern and Support Vector M...
 
face recognition system
face recognition systemface recognition system
face recognition system
 
Face recognition
Face recognitionFace recognition
Face recognition
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median Filter
 
IRJET- Automated Criminal Identification System using Face Detection and Reco...
IRJET- Automated Criminal Identification System using Face Detection and Reco...IRJET- Automated Criminal Identification System using Face Detection and Reco...
IRJET- Automated Criminal Identification System using Face Detection and Reco...
 
IRJET- Persons Identification Tool for Visually Impaired - Digital Eye
IRJET-  	  Persons Identification Tool for Visually Impaired - Digital EyeIRJET-  	  Persons Identification Tool for Visually Impaired - Digital Eye
IRJET- Persons Identification Tool for Visually Impaired - Digital Eye
 
Local Descriptor based Face Recognition System
Local Descriptor based Face Recognition SystemLocal Descriptor based Face Recognition System
Local Descriptor based Face Recognition System
 
Face Recognition System under Varying Lighting Conditions
Face Recognition System under Varying Lighting ConditionsFace Recognition System under Varying Lighting Conditions
Face Recognition System under Varying Lighting Conditions
 
An Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint TechnologiesAn Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint Technologies
 
Face recognition a survey
Face recognition a surveyFace recognition a survey
Face recognition a survey
 
G0333946
G0333946G0333946
G0333946
 
Face recognization using artificial nerual network
Face recognization using artificial nerual networkFace recognization using artificial nerual network
Face recognization using artificial nerual network
 
IRJET- Autonamy of Attendence using Face Recognition
IRJET- Autonamy of Attendence using Face RecognitionIRJET- Autonamy of Attendence using Face Recognition
IRJET- Autonamy of Attendence using Face Recognition
 
IRJET- A Review on Face Recognition using Local Binary Pattern Algorithm
IRJET- A Review on Face Recognition using Local Binary Pattern AlgorithmIRJET- A Review on Face Recognition using Local Binary Pattern Algorithm
IRJET- A Review on Face Recognition using Local Binary Pattern Algorithm
 
IRJET- Face Recognition using Deep Learning
IRJET-  	  Face Recognition using Deep LearningIRJET-  	  Face Recognition using Deep Learning
IRJET- Face Recognition using Deep Learning
 
Face recognition
Face recognitionFace recognition
Face recognition
 
An overview of face liveness detection
An overview of face liveness detectionAn overview of face liveness detection
An overview of face liveness detection
 

Viewers also liked

Incredible Aerial Photos
Incredible Aerial PhotosIncredible Aerial Photos
Incredible Aerial PhotosThilini
 
Trabajo Practico N°1
Trabajo Practico N°1Trabajo Practico N°1
Trabajo Practico N°1Cota94
 
Verdad Absoluta
Verdad AbsolutaVerdad Absoluta
Verdad AbsolutaJose Gomez
 
Historia de mexico uno.. uma.. 2o. tetra. 11 de enero 2010
Historia de mexico uno.. uma.. 2o. tetra. 11 de enero 2010Historia de mexico uno.. uma.. 2o. tetra. 11 de enero 2010
Historia de mexico uno.. uma.. 2o. tetra. 11 de enero 2010Eddras Coutiño Cruz
 
Cute Flamingo
Cute FlamingoCute Flamingo
Cute FlamingoThilini
 

Viewers also liked (7)

Incredible Aerial Photos
Incredible Aerial PhotosIncredible Aerial Photos
Incredible Aerial Photos
 
Trabajo Practico N°1
Trabajo Practico N°1Trabajo Practico N°1
Trabajo Practico N°1
 
Verdad Absoluta
Verdad AbsolutaVerdad Absoluta
Verdad Absoluta
 
ComisióN ..
ComisióN ..ComisióN ..
ComisióN ..
 
1
1 1
1
 
Historia de mexico uno.. uma.. 2o. tetra. 11 de enero 2010
Historia de mexico uno.. uma.. 2o. tetra. 11 de enero 2010Historia de mexico uno.. uma.. 2o. tetra. 11 de enero 2010
Historia de mexico uno.. uma.. 2o. tetra. 11 de enero 2010
 
Cute Flamingo
Cute FlamingoCute Flamingo
Cute Flamingo
 

Similar to 40120140505010 2-3

Facial Expression Recognition Using Local Binary Pattern and Support Vector M...
Facial Expression Recognition Using Local Binary Pattern and Support Vector M...Facial Expression Recognition Using Local Binary Pattern and Support Vector M...
Facial Expression Recognition Using Local Binary Pattern and Support Vector M...AM Publications
 
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...ijbuiiir1
 
IRJET- Application of MCNN in Object Detection
IRJET-  	  Application of MCNN in Object DetectionIRJET-  	  Application of MCNN in Object Detection
IRJET- Application of MCNN in Object DetectionIRJET Journal
 
IRJET- Facial Expression Recognition
IRJET- Facial Expression RecognitionIRJET- Facial Expression Recognition
IRJET- Facial Expression RecognitionIRJET Journal
 
Criminal Identification using Arm7
Criminal Identification using Arm7Criminal Identification using Arm7
Criminal Identification using Arm7IRJET Journal
 
Deep hypersphere embedding for real-time face recognition
Deep hypersphere embedding for real-time face recognitionDeep hypersphere embedding for real-time face recognition
Deep hypersphere embedding for real-time face recognitionTELKOMNIKA JOURNAL
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Face and facial expressions recognition for blind people
Face and facial expressions recognition for blind peopleFace and facial expressions recognition for blind people
Face and facial expressions recognition for blind peopleIRJET Journal
 
IRJET - Emotionalizer : Face Emotion Detection System
IRJET - Emotionalizer : Face Emotion Detection SystemIRJET - Emotionalizer : Face Emotion Detection System
IRJET - Emotionalizer : Face Emotion Detection SystemIRJET Journal
 
IRJET- Emotionalizer : Face Emotion Detection System
IRJET- Emotionalizer : Face Emotion Detection SystemIRJET- Emotionalizer : Face Emotion Detection System
IRJET- Emotionalizer : Face Emotion Detection SystemIRJET Journal
 
Deep learning for understanding faces
Deep learning for understanding facesDeep learning for understanding faces
Deep learning for understanding facessieubebu
 
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONESAN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONESAM Publications
 
Feature Level Fusion Based Bimodal Biometric Using Transformation Domine Tec...
Feature Level Fusion Based Bimodal Biometric Using  Transformation Domine Tec...Feature Level Fusion Based Bimodal Biometric Using  Transformation Domine Tec...
Feature Level Fusion Based Bimodal Biometric Using Transformation Domine Tec...IOSR Journals
 
IRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using AndroidIRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using AndroidIRJET Journal
 
Person identification based on facial biometrics in different lighting condit...
Person identification based on facial biometrics in different lighting condit...Person identification based on facial biometrics in different lighting condit...
Person identification based on facial biometrics in different lighting condit...IJECEIAES
 
Comparative Analysis of Face Recognition Methodologies and Techniques
Comparative Analysis of Face Recognition Methodologies and TechniquesComparative Analysis of Face Recognition Methodologies and Techniques
Comparative Analysis of Face Recognition Methodologies and TechniquesFarwa Ansari
 
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKHUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKijiert bestjournal
 
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationHighly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationIJERA Editor
 
IRJET - A Review on Face Recognition using Deep Learning Algorithm
IRJET -  	  A Review on Face Recognition using Deep Learning AlgorithmIRJET -  	  A Review on Face Recognition using Deep Learning Algorithm
IRJET - A Review on Face Recognition using Deep Learning AlgorithmIRJET Journal
 

Similar to 40120140505010 2-3 (20)

Facial Expression Recognition Using Local Binary Pattern and Support Vector M...
Facial Expression Recognition Using Local Binary Pattern and Support Vector M...Facial Expression Recognition Using Local Binary Pattern and Support Vector M...
Facial Expression Recognition Using Local Binary Pattern and Support Vector M...
 
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
 
IRJET- Application of MCNN in Object Detection
IRJET-  	  Application of MCNN in Object DetectionIRJET-  	  Application of MCNN in Object Detection
IRJET- Application of MCNN in Object Detection
 
IRJET- Facial Expression Recognition
IRJET- Facial Expression RecognitionIRJET- Facial Expression Recognition
IRJET- Facial Expression Recognition
 
Criminal Identification using Arm7
Criminal Identification using Arm7Criminal Identification using Arm7
Criminal Identification using Arm7
 
Deep hypersphere embedding for real-time face recognition
Deep hypersphere embedding for real-time face recognitionDeep hypersphere embedding for real-time face recognition
Deep hypersphere embedding for real-time face recognition
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Face and facial expressions recognition for blind people
Face and facial expressions recognition for blind peopleFace and facial expressions recognition for blind people
Face and facial expressions recognition for blind people
 
IRJET - Emotionalizer : Face Emotion Detection System
IRJET - Emotionalizer : Face Emotion Detection SystemIRJET - Emotionalizer : Face Emotion Detection System
IRJET - Emotionalizer : Face Emotion Detection System
 
IRJET- Emotionalizer : Face Emotion Detection System
IRJET- Emotionalizer : Face Emotion Detection SystemIRJET- Emotionalizer : Face Emotion Detection System
IRJET- Emotionalizer : Face Emotion Detection System
 
Deep learning for understanding faces
Deep learning for understanding facesDeep learning for understanding faces
Deep learning for understanding faces
 
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONESAN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
 
C017431730
C017431730C017431730
C017431730
 
Feature Level Fusion Based Bimodal Biometric Using Transformation Domine Tec...
Feature Level Fusion Based Bimodal Biometric Using  Transformation Domine Tec...Feature Level Fusion Based Bimodal Biometric Using  Transformation Domine Tec...
Feature Level Fusion Based Bimodal Biometric Using Transformation Domine Tec...
 
IRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using AndroidIRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using Android
 
Person identification based on facial biometrics in different lighting condit...
Person identification based on facial biometrics in different lighting condit...Person identification based on facial biometrics in different lighting condit...
Person identification based on facial biometrics in different lighting condit...
 
Comparative Analysis of Face Recognition Methodologies and Techniques
Comparative Analysis of Face Recognition Methodologies and TechniquesComparative Analysis of Face Recognition Methodologies and Techniques
Comparative Analysis of Face Recognition Methodologies and Techniques
 
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKHUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
 
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationHighly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
 
IRJET - A Review on Face Recognition using Deep Learning Algorithm
IRJET -  	  A Review on Face Recognition using Deep Learning AlgorithmIRJET -  	  A Review on Face Recognition using Deep Learning Algorithm
IRJET - A Review on Face Recognition using Deep Learning Algorithm
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 

40120140505010 2-3

  • 1. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 5, May (2014), pp. 80-90 © IAEME 80 FACE RECOGNITION SYSTEM BY IMAGE PROCESSING Bilal Salih Abed Alhayani1 , Prof. Milind Rane2 1 (Research Scholar, Department of Electronics Engineering, Vishwakarma Institute of Technology Pune, University of Pune, India) 2 (Asst. Prof Dr. Department of Electronics Engineering, Vishwakarma Institute of Technology Pune, University of Pune, India ABSTRACT A wide variety of systems require reliable person recognition schemes to either confirm or determine the identity of an individual requesting their services. The purpose of such schemes is to ensure that only a legitimate user and no one else access the rendered services. Examples of such applications include secure access to buildings, computer systems, laptops, cellular phones, and ATMs. Face can be used as Biometrics for person verification. Face is a complex multidimensional structure and needs a good computing techniques for recognition. We treats face recognition as a two-dimensional recognition problem. A well-known technique of Principal Component Analysis (PCA) is used for face recognition. Face images are projected onto a face space that encodes best variation among known face images. The face space is defined by Eigen face which are eigenvectors of the set of faces, which may not correspond to general facial features such as eyes, nose, lips. The system performs by projecting pre extracted face image onto a set of face space that represent significant variations among known face images. The variable reducing theory of PCA accounts for the smaller face space than the training set of face. A Multire solution features based pattern recognition system used for face recognition based on the combination of Radon and wavelet transforms. As the Radon transform is in-variant to rotation and a Wavelet Transform provides the multiple resolution. This technique is robust for face recognition. The technique computes Radon projections in different orientations and captures the directional features of face images. Further, the wavelet transform applied on Radon space provides multire solution features of the facial images. Being the line integral, Radon transform improves the low-frequency components that are useful in face recognition. INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) ISSN 0976 – 6464(Print) ISSN 0976 – 6472(Online) Volume 5, Issue 5, May (2014), pp. 80-90 © IAEME: www.iaeme.com/ijecet.asp Journal Impact Factor (2014): 7.2836 (Calculated by GISI) www.jifactor.com IJECET © I A E M E
  • 2. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 5, May (2014), pp. 80-90 © IAEME 81 Keyword: Introduction, Face Detection, Principal Component Analysis, Eigen Face Approach, Radon Wavelet Transform, Principal Component Analysis, Result and Conclusion, Bibliography. INTRODUCTION Within today's environment of increased importance of security and organization, identification and authentication methods have developed into a key technology in various areas: entrance control in buildings; access control for computers in general or for automatic teller machines in particular; day-to-day affairs like withdrawing money from a bank account or dealing with the post office; or in the prominent field of criminal investigation. Such requirement for reliable personal identification in computerized access control has resulted in an increased interest in biometrics. Biometric identification is the technique of automatically identifying or verifying an individual by a physical characteristic or personal trait. The term automatically means the biometric identification system must identify or verify a human characteristic or trait quickly with little or no intervention from the user. Biometric technology was developed for use in high-level security systems and law enforcement markets. The key element of biometric technology is its ability to identify a human being and enforce security. Biometric characteristics and traits are divided into behavioral or physical categories. Behavioral biometrics encompasses such behaviors as signature and typing rhythms. Physical biometric systems use the eye, finger, hand, voice, and face, for identification. Humans have used body characteristics such as face, voice, and gait for thousands of years to recognize each other. Distinctiveness of the human fingerprints has given significant and practical discovery of person recognition. Soon after this discovery, many major law enforcement departments embraced the idea of first booking the fingerprints of criminals and storing it in a database (card file). Later, the leftover (fragmentary) fingerprints (latents) at the scene of crime could be lifted and matched with fingerprints in the database to determine the identity of the criminals. Recently biometrics is increasingly used to establish person recognition in a large number of civilian applications. Any human phys1iological and/or behavioral characteristic can be used as a biometric characteristic as long as it satisfies universality, distinctiveness, permanence, collectability, performance, acceptability, and circumvention. A practical biometric system should meet the specified recognition accuracy, speed, and resource requirements, be harmless to the users, be accepted by the intended population, and be sufficiently robust to various fraudulent methods and attacks to the system. FACE DETECTION Human face detection is often the first step in applications such as video surveillance, human computer interface, face recognition, and image database management. The aim of face detection is to classify the segment of image as face or non-face(background of image). The task of describing the human face is difficult due to the fact that the image varies based on external factors like viewpoint, scale, different individual, occlusion, lighting, environmental conditions and internal factors like facial expression, beard, moustache, glasses. Various approaches to face detection are discussed in [18]. These approaches utilize techniques such as neural networks, machine learning, (deformable) template matching, Hough transform, motion extraction, and color analysis. The neural network-based [22] and view-based [35] approaches require a large
  • 3. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 5, May (2014), pp. 80-90 © IAEME 82 number of face and non-face training examples, and are designed to find frontal faces in grayscale images. A recent statistical approach [35] extends the detection of frontal faces to profile views by training two separate classifiers. Model-based approaches are widely used in tracking faces and often assume that the initial locations of faces are known. Skin color provides an important cue for face detection. Detection of skin color in color images is a very popular and useful technique for face detection. Many techniques have reported for locating skin color regions in the input image. While the input color image is typically in the RGB format, these techniques usually use color components in the color space, such as the HSV or YIQ formats. That is because RGB components are subject to the lighting conditions thus the face detection may fail if the lighting condition changes. In the Y CbCr color space, the luminance information is contained in Y component; and, the chrominance information is in Cb and Cr. Therefore, the luminance information can be easily de embedded. The RGB components were converted to the Y CbCr components using the equation 3.1, equation 3.2, equation 3.3. Y = 0.299R + 0.587G + 0.114B (3.1) Cb = 0.169R0.332G + 0.500B (3.2) Cr = 0.500R0.419G0.081B (3.3) In the skin color detection process, each pixel was classified as skin or non-skin based on its color components. The detection window for skin color was determined based on the mean and standard deviation of Cr component, obtained using training faces. The following steps are required to conduct for face detection. 1. To detect the skin pixels threshold the face image with threshold of Cr = 102 2. If the Cr value is less than 102 darken the pixel i.e. make pixel value equal to zero, otherwise retain the pixel value. The obtained image is then binaries. 3. Number of regions we get after thresholding are required to reduce after finding the area of that region. If the area of region is greater than the 1000 pixel it is a face image. 4. Find the bounding box which fits the area detected as face region. 5. Crop the face image from the original image using the coordinate of bounding boxes. 6. Display the detected face image The result of different steps of face detection are as given below shows the original face image. We implement the algorithm successfully on the Face 94 and Face 96 databases. We implement a face detection algorithm for color images in the presence of varying lighting conditions as well as complex backgrounds. PRINCIPAL COMPONENT ANALYSIS (PCA) Principal component analysis (PCA) was invented in 1901 by Karl Pearson. PCA is a variable reduction procedure and useful when obtained data have some redundancy. This will result introduction of variables into smaller number of variables which are called Principal Components which will account for the most of the variance in the observed variable. Problems arise when we wish to perform recognition in a high-dimensional space. Goal of PCA is to reduce the dimensionality of the data by retaining as much as variation possible in our original data set. On the other hand dimensionality reduction implies information loss. The best low- dimensional space can be determined by best principal components. The major advantage of
  • 4. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 5, May (2014), pp. 80-90 © IAEME 83 PCA is using it in Eigen face approach which helps in reducing the size of the database for recognition of a test images. The images are stored as their feature vectors in the database which are found out projecting each and every trained image to the set of Eigen faces obtained. PCA is applied on Eigen face approach to reduce the dimensionality of a large data set. EIGEN FACE APPROACH It is adequate and efficient method to be used in face recognition due to its simplicity, speed and learning capability. Eigen faces are a set of Eigen vectors used in the Computer Vision problem of human face recognition. They refer to an appearance based approach to face recognition that seeks to capture the variation in a collection of face images and use this information to encode and compare images of individual faces in a holistic manner. The Eigen faces are Principal Components of a distribution of faces, or equivalently, the Eigen vectors of the covariance matrix of the set of the face images, where an image with N by N pixels is considered a point in N 2 dimensional space. Previous work on face recognition ignored the issue of face stimulus, assuming that predefined measurement were relevant and sufficient. This suggests that coding and decoding of face images may give information of face images emphasizing the significance of features. These features may or may not be related to facial features such as eyes, nose, lips and hairs. We want to extract the relevant information in a face image, encode it efficiently and compare one face encoding with a database of faces encoded similarly. A simple approach to extracting the information content in an image of a face is to somehow capture the variation in a collection of face images. We wish to find Principal Components of the distribution of faces, or the Eigen vectors of the covariance matrix of the set of face images. Each image location contributes to each Eigen vector, so that we can display the Eigen vector as a sort of face. Each face image can be represented exactly in terms of linear combination of the Eigen faces. The number of possible Eigen faces is equal to the number of face image in the training set. The faces can also be approximated by using best Eigen face, those that have the largest Eigen values, and which therefore account for most variance between the set of face images. The primary reason for using fewer Eigen faces is computational efficiency. Eigen Values and Eigen Vectors In linear algebra, the eigenvectors of a linear operator are non-zero vectors which, when operated by the operator, result in a scalar multiple of them. Scalar is then called Eigen value (λ) associated with the eigenvector (X). Eigen vector is a vector that is scaled by linear transformation. It is a property of matrix. When a matrix acts on it, only the vector magnitude is changed not the direction. AX = λX, (4.1) RADON WAVELET TRANSFORM 1. Radon transform Radon transform is based on the parameterization of straight lines and the evaluation of integrals of an image along these lines. Due to inherent properties of Radon transform, it is a
  • 5. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 5, May (2014), pp. 80-90 © IAEME 84 useful tool to capture the directional features of an image [6] [7]. The classical Radon transform of a two variable function u is Ru defined on a family of straight lines. The value of Ru on a given line is the integral of u along this line [24]. Let the line in the plane (t, q) is represented as t = τ + pq (5.1) where p is the slope and t is the offset of the line. The Radon transform of the function over this line is given as (5.5) where N is the radius in pixels [33]. The Radon transform has been extensively used to extract the local features in edge detection, texture and fingerprint classification and image retrieval in computer tomography. In these approaches, images are divided into sub-blocks and minimum number of Radon projections as specified by equation 5.4 and equation 5.5 of each block is computed to derive the local features. However, these approaches are not computationally efficient (because of large dimensionalities) Facial features are the directional low-frequency components. Earlier studies show that information in low spatial frequency band plays a dominant role in face recognition. The low-frequency components contribute to the global description, while the high frequency components contribute to the fine details [6]. Radon transform preserves the variations in pixel intensities. While computing Radon projections, the pixel intensities along a line are added. Improves the spatial frequency components in a direction in which Radon projection is computed. When features are extracted using Radon transform, the variations in the spatial frequency are not only preserved but boosted also. With the proposed approach, global Radon projections for relatively less number of orientations (compared to number of projections stated by equation 5.4 and equation 5.5 achieve maximum recognition accuracy. It has been experimentally proved that the number of projections required to attain the maximum recognition accuracy is approximately one-third of that required for reconstruction. Discrete Wavelet Transform (DWT) applied on Radon projections derives multire solution features of the face images. Hence, the approach reduces the dimensionality and becomes computationally efficient. The advantage of the proposed approach is its robustness to zero mean white noise. Suppose an image is represented as f′(x, y) = f(x, y) + η(x, y) (5.6) where η(x, y) is white noise with zero mean. Then its Radon transform is R(r, θ)[f′(x, y)] = R(r, θ)[f(x, y)] + R(r, θ)[η(x, y)] (5.7) Being the line integral, for the continuous case, the Radon transform of white noise is constant for all of the points and directions and is equal to its mean value (if integrated over infinite axis), which is assumed to be zero. Therefore, R(r, θ)[f′(x, y)] = R(r, θ)[f(x, y)] (5.8) However, this is not true for digital images because they are composed of a finite number of pixels. 2. Wavelet Transform (Multire solution features) Wavelet Transform has the nice features of space frequency localization and multire solution. The main reasons for Wavelet Transforms popularity lie in its complete theoretical
  • 6. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 5, May (2014), pp. 80-90 © IAEME 85 framework, the great flexibility in choosing the bases and the low computational complexity. Let L2(R) denote the vector space of a measurable, square integrable, one-dimensional signal. EXPERIMENTATION AND RESULTS The project work is implemented on i-5 system with 4Gb Ram. The Matlab 2008a is used for implementation and testing of algorithm. The four methods are implemented for the face recognition as Principal component Analysis, Radon Transform, Wavelet Transform, Radon Wavelet Transform. Details of database A database of OTCBVS colored face image is used for testing the algorithm. the database consist of 23 personnel and each having 3 photos. For the further experiments the Database of Face 94, Face 96 and AT and T are used. 1. Face 94 database consist of 150 subjects and 20 images per subject are given with different poses and expression on the faces with simple background. 2. Face 96 database consist of 72 subjects and 20 images per subject are given with different poses and expression on the faces and complex background. 3. AT and T database consist of 40 subjects and 10 images per subject Results of face detection The database is applied with the face detection algorithm for segmenting the face region from the complex background. Principal Component Analysis The detected colour face image is then converted to gray scale image as grey scale images are easier for applying computational techniques in image processing due to reduction in dimension and there is no colour space constraints are required to take into account. A grey scale face image is scaled for a fix pixel size as 24 _ 24 because different input images can be of different size whenever we take a input face from database for recognition. Mean Face, difference face and covariance matrix Mean face is obtained by equation. Then the difference image is calculated by equation and covariance matrix are calculated by using equation 4.7 1. Eigen Face Calculate the eigenvectors µk and eigenvalues λk of the covariance matrix. find the weights for each image and save it in database. Threshold value of the test face image to Eigen face space which is Euclidean distance is taken minimum distance defines the matched image which classifies the face. The algorithms for face recognition was tested on OTCBVS database to compute recognition rate. The recognition rate for above proposed algorithms is carried out on the 23 personnel images. The recognition rate (GAR) is calculated to 59 percent for 69 images. Thus the face recognition system using Principal Component Analysis and Eigen face approach is implemented successfully.
  • 7. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 5, May (2014), pp. 80-90 © IAEME 86 2. Radon Wavelet Transform Table 1: Recognition Rate for Face Recognition The Experimentation is done on the three databases namely Face 94 Face 96 and AT and T database. The detected Colour face image is then converted to gray scale image as grey scale images are easier for applying computational techniques in image processing due to reduction in dimension. The Radon Transform is the applied on the detected Face images. The feature vector is formed for each face. The similarity measure of Euclidian distance is applied for face recognition. The result for different databases are mentioned in Table 1. The Discrete Wavelet Transform is applied on the detected face images. The feature vector is formed for each face. The similarity measure of Euclidian distance is applied for face recognition. The result for different databases are mentioned in Table 1. The recognition rate is improved by cascading the Radon Transform and Discrete Wavelet Transform. First the Radon Transform is the applied on the detected Face images. The obtained feature vector is the processed with the Discrete Wavelet Transform to decompose up to the third level. The LL3 component is used for the feature vector formation for each face. The similarity measure of Euclidian distance is applied for face recognition. The result for different databases are mentioned in Table 1. For testing the Radon Transform, Discrete Wavelet Transform(DWT), Radon Discrete Wavelet Transform(RDWT) algorithm the databases are as mentioned below For experimentation we use Face 94, Face 96, AT and T(ORL) databases 1. Face94 which contains the 152 subjects and 20 images per subject 2. Face 96 which consist of 150 subjects and 20 images per subject 3. AT and T which contains the 40 subjects and 10 images per subject RESULT AND CONCLUSION Face recognition has been an attractive field of research for both neuroscientists and computer vision scientists. Humans are able to identify reliably a large number of faces and neuroscientists are interested in understanding the perceptual and cognitive mechanisms at the base of the face recognition process. Those researches illuminate computer vision scientists studies. Although designers of face recognition algorithms and systems are aware of relevant Algorithm FACE 94 FACE 96 AT and T Radon Transform 94 70.62 82.04 Wavelet Transform 92.79 67.50 79.30 RDWT 94.48 87.50 90.70
  • 8. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 5, May (2014), pp. 80-90 © IAEME 87 psychophysics and neurophysiological studies, they also should be prudent in using only those that are applicable or relevant from a practical/implementation point of view. Eigen-faces algorithm has some shortcomings due to the use of image pixel gray values. As a result system becomes sensitive to illumination changes, scaling, etc. and needs a beforehand pre-processing step. Satisfactory recognition performances could be reached by successfully aligned face images. When a new face attend to the database system needs to run from the beginning, unless a universal database exists. In this presented work, a approach to face recognition with Radon Discrete Wavelet Transform is presented. The method uses Radon Discrete Wavelet Transform for both finding feature points and extracting feature vectors. From the experimental results, it is seen that the method achieves better results compared to the Eigen-face methods, which are known to be the most successive algorithms. A new facial image can also be simply added by attaching new feature vectors to reference gallery while such an operation might be quite time consuming for systems that need training. BIBLIOGRAPHY [1] A. Eriksson and P. Wretling, How flexible is the human voice? A case study of mimicry, in Proceeding Europian Conference of Speech Technology, Rhodes, pp. 10431046, 1997. [2] A.K. Jain, A. Ross, S. Prabhakar, “An introduction to biometric recognition,” IEEE Trans. Circuits Syst. Video Technol. 14 (1), pp.420,2004. [3] A M. Patil, S R. Kolhe, P M. Patil and M E Rane, Modified Fisher Face Approach for Robust Biometric Recognition System, ICGST International Journal on Graphics, Vision and Image Processing, GVIP, Vol. 10, Issue IV, pp. 9-15, 2010. [4] A. Pentland, Looking at people: Sensing for ubiquitous and wearable computing, IEEE Transaction Pattern Analysis and Machine Intelligence, vol. 22, pp. 107119, Jan. 2000. [5] A. Samal and P. A. Iyengar, Automatic recognition and analysis of human faces and facial expression: A survey, Pattern Recognition, vol. 25, no. 1, pp. 6577, 1992. [6] B.-L. Zhang, H. Zhang, S. Sam, “Face recognition by applying wavelet sub band representation and kernel associative memory,” IEEE Trans. Neural Netw. 15 (1), pp.166177(2004). [7] B. Scholkopf, A. Smola, K. Muller, “Nonlinear component analysis as a kernel eigenvalue problem”, Neural Comput. 10, pp. 12991319, 1998. [8] C. Liu and H. Wechsler, Evolutionary pursuit and its application to face recognition, IEEE Transaction Pattern Analysis and Machine Intelligence, vol. 22, pp. 570582, June 2000. [9] C. Liu, H. Wechsler, “Independent component analysis of Gabor features for face recognition,” IEEE Transaction. Neural Network vol. 14 (4),pp. 919928, 2003. 47. [10] C. Liu, H. Wechsler, Gabor feature based classification using the enhanced Fisher linear discriminant model for face recognition, IEEE Trans. Image Process. 11 (4),pp. 467476,2002. [11] C. Xiang, Feature extraction using recursive cluster based linear discriminant with application to face recognition, IEEE Trans. Image Process. 15 (12), pp.38243832, 2006. [12] D Maio, D Maltoni, R Cappelli, J L Wayman, and A K Jain, FVC2002: Fingerprint verification competition, in Proceeding of International Conference of Pattern Recognition (ICPR Canada), pp. 744747, 2002.
  • 9. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 5, May (2014), pp. 80-90 © IAEME 88 [13] D. Zhang and W. Shu, Two novel characteristic in palmprint verification: Datum point invariance and line feature matching, Pattern Recognition, vol. 32, no. 4, pp. 691702, 1999. [14] D.L. Swets, J.Weng, Using discriminative Eigen features for image retrieval, IEEE Transaction Pattern Analysis and Machine Intelligence, vol. 18 (8) 831836, 1996. [15] D. Tao, X. Li, X.Wu, S.J. Maybank, “General tensor discriminant analysis and Gabor features for gait recognition,” IEEE Trans. Pattern Anal. Machine Intell. 29 (10), pp. 17001715, 2007. [16] D. Tao, X. Li, X. Wu, S.J. Maybank, ”General average divergence analysis,” in: Proceedings of the Seventh IEEE International Conference on Data Mining,, pp. 302311, 2007. [17] D. Tao, X. Li, X. Wu, W. Hu, S.J. Maybank, ”Supervised tensor learning, Knowledge Inform.” Syst. (Springer) 13 (1),pp. 142,2007. [18] D. Maio and D. Maltoni, Real-time face location on grayscale static images, Pattern Recognition, vo1.33, no. 9, pp. 1525-1539, Sept. 2000. [19] D. Sidlauskas, HAND: give me five, IEEE Spectrum,pp. 24-25, February 1994. [20] E. d. Os, H. Jongebloed, A. Stijsiger, and L. Boves, Speaker verification as a user- friendly access for the visually impaired, in Proceeding Europian Conference of Speech Technology,Budapest, Hungary, pp. 12631266, 1999. [21] E. Magli, G. Olmo, L. Lo Presti, ”Pattern recognition by means of the Radon transform and the continuous wavelet transform,” Signal Process. 73, pp.277289, 1999, 48. [22] F. Smeraldi, 0. Carmona, and J. Bigun, Saccadic search with gabor features applied to eye detection and real-time head tracking, Image and Vision Computing, vol. 18, no. 4, pp. 323-329,2000. [23] G. Sun, X. Dong, G. Xu, Tumor tissue identification based on gene expression data using DWT feature extraction and PNN classifier, Neuro computing 69, pp. 387402, 2006. [24] G. Beylkin, ”Discrete Radon transform,” IEEE Trans. Acoust., Speech Signal Process. ASSP-35 (2) (1987) 162171. [25] H. Jian, P.C. Yuen, C. Wen-Sheng, A novel subspace LDA algorithms for recognition of face images with illumination and pose variations, Proceedings of the International Conference on Machine Learning and Cybernetics, vol. 6, pp. 35893594, 2004. [26] H. Schneiderman and T. Kanade, A statistical method for 3D object detection applied to faces and cars, IEEE CVPR, June 2000. [27] J. Daugman, Face and gesture recognition: Overview, IEEE Transaction Pattern Analysis and Machine Intelligence, vol. 19, no. 7, pp.675676, 1997. [28] J L Wayman, Fundamentals of biometric authentication technologies, International Journal of Image Graphics, vol 1, no 1, pp 93113, 2001. [29] J. Yang, A.F. Frangi, J.-y. Yang, D. Zhang, J.Zhong, KPCA plus LDA: a complete kernel Fisher discriminant framework for feature extraction and recognition, IEEE Transaction Pattern Analysis and Machine Intelligence, 27(2) (2005) 230244. [30] J. Ye, R. Janardan, H.P. Cheong, P. Haesun, An optimization criterion for generalized discriminant analysis on under sampled problems, IEEE Transaction Pattern Analysis and Machine Intelligence, 26 (8), pp.982994,2004.
  • 10. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 5, May (2014), pp. 80-90 © IAEME 89 [31] J. Lu, K.N. Plataniotis, A.N. Venetsanopoulos, S.Z. Li, ”Ensemble-based discriminant learning with boosting for face recognition,” IEEE Trans. Neural Netw. 17 (1),pp.166178(2006). [32] J. Lu, K.N. Plataniotis, A.N. Venetsanopoulos, ”Face recognition using kernel direct discriminant analysis algorithms,” IEEE Trans. Neural Net. 14 (1), pp. 117126, (2003).49 [33] J.-K. Kourosh, S.-Z. Hamid, ”Rotation invariant multiresolution texture analysis using Radon and wavelet transform”, IEEE Trans. Image Process. 14 (6), pp. 783794, 2005. [34] J.E. Siedlarz, IRIS:more detailed than a fingerprint, IEEE spectrum, pp.27,February 1994. [35] K.K. Sung and T. Poggio, Example-based learning for view-based human face detection, lEEE Trans. PAMI, vol. 20, pp. 39-51, Jan. 1998. [36] M Golfarelli, D Maio, and D Maltoni, On the error reject tradeoff in biometric verification systems, IEEE Transaction Pattern Analysis and Machine Intelligence, vol 19, pp 786796,1997. [37] M. Kirby and L. Sirovich, Application of the Karhunen-Loeve procedure for the characterization of human faces, IEEE Transaction Pattern Analysis and Machine Intelligence, vol.12, pp. 103108, 1990. [38] M. Turk and A. Pentland, Eigenfaces for recognition, Journal of Cognitive Neuroscience,vol. 13, no. 1, pp. 7186, 1991. [39] P J Philips, P Grother, R J Micheals, D M Blackburn, E Tabassi, and J M Bone. FRVT 2002: Overview and Summary, Available: http://www.frvt.org/FRVT2002/documents.htm [40] P.N. Belhumeur, J.P. Hespanha, D.J. Kriegman, Eigenfaces vs. fisher faces: recognition using class specific linear projection, IEEE Transaction Pattern Analysis and Machine Intelligence, vol. 19 (7) 711720, 1997. [41] R. Chellappa, C. L.Wilson, and S. Sirohey, Human and machine recognition of faces: Asurvey, Proceeding IEEE, vol. 83, pp. 705740, May1995. [42] R.Manddelbaum, SPEECH: just say the word, IEEE Spectrum, page 30, February 1994. [43] R.C. Fowler, FINGERPRINT: an old touchstone decriminalized, IEEE Spectrum, pp.26, February 1994. [44] S. Mika, G. Rtsch, J. Weston, B. Schlkopf, A.Smola, K.-R. Mller, Constructing descriptive and discriminative nonlinear features: Rayleigh coefficients in kernel feature spaces,IEEE Transaction Pattern Analysis and Machine Intelligence, 25 (5), pp.623628, (2003).50. [45] S.Z. Li, R.F. Chu, S.C. Liao, L. Zhang, Illumination invariant face recognition using near infrared images, IEEE Trans. Pattern Anal. Machine Intell. 29 (4), pp.627639, (2007). [46] S. Srisuk, M. Petrou, W. Kurutach, A. Kadyrov, ”Face authentication using trace transform,” in: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 03), pp. 305312, 2003. [47] S. Mallat, ”A theory of multiresolution signal decomposition: the wavelet representation, ”IEEE Trans. Pattern Anal. Machine Intell. 11, pp. 674693, 1989. [48] W. Zhao, R. Chellappa, P.J. Phillips, Subspace linear discriminant analysis for face recognition, Technical Report CAR-TR-914,Center for Automation Research, University of Maryland, College Park, 1999.
  • 11. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 5, May (2014), pp. 80-90 © IAEME 90 [49] W. Zhao, R. Chellappa, N. Nandhakumar, Empirical performance analysis of lineardis criminant classifiers, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 1998, pp. 164169. [50] W. Xiaogang, T. Xiaoou, A unified frame work for subspace face recognition, IEEE Transaction Pattern Analysis and Machine Intelligence, 26(9) (2004) 12221228. [51] X.-J. Wu, J. Kittler, J.-Y. Yang, K. Messerm S.Wang, A new direct LDA (D-LDA) algorithm for feature extraction in face recognition, Proceedings of the International Conference on Pattern Recognition vol. 4, pp. 545548, 2004. [52] X.Y. Jing, Y.Y. Tang, D. Zhang, ”A Fourier-LDA approach for image recognition,” Pattern Recogn. 38 (2), pp.453457, 2005. [53] X.-Y. Jing, H.-S. Wong, D. Zhang, ”Face recognition based on discriminant fractional Fourier feature extraction,” Pattern Recogn. Lett. 27, pp.14651471, 2006. [54] X. Zhang, Y. Jia, ”Face recognition with local steerable phase feature,” Pattern Recogn. Lett. 27, pp.19271933, 2006. [55] U.K.Jaliya and J.M.Rathod, “A Survey on Human Face Recognition Invariant to Illumination”, International journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 2, 2013, pp. 517 - 525, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [56] Abhishek Choubey and Girish D. Bonde, “Face Recognition Across Pose With Estimation of Pose Parameters”, International Journal of Electronics and Communication Engineering &Technology (IJECET), Volume 3, Issue 1, 2012, pp. 311 - 316, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472. [57] J. V. Gorabal and Manjaiah D. H., “Texture Analysis for Face Recognition”, International Journal of Graphics and Multimedia (IJGM), Volume 4, Issue 2, 2013, pp. 20 - 30, ISSN Print: 0976 – 6448, ISSN Online: 0976 –6456. [58] S. K. Hese and M. R. Banwaskar, “Appearance Based Face Recognition by PCA and LDA”, International Journal of Electronics and Communication Engineering & Technology (IJECET), Volume 4, Issue 2, 2013, pp. 48 - 57, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472. [59] Sambhunath Biswas and Amrita Biswas, “Fourier Mellin Transform Based Face Recognition”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 1, 2013, pp. 8 - 15, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [60] Prof. B.S Patil and Prof. A.R Yardi, “Real Time Face Recognition System using Eigen Faces”, International Journal of Electronics and Communication Engineering & Technology (IJECET), Volume 4, Issue 2, 2013, pp. 72 - 79, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472. [61] Steven Lawrence Fernandes and Dr. G Josemin Bala, “Analysing Recognition Rate of LDA and LPP Based Algorithms for Face Recognition”, International journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 2, 2012, pp. 115 - 125, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.