IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Personal identification using multibiometrics score level fusioneSAT Publishing House
This document summarizes a research paper on personal identification using multibiometric score-level fusion of face and signature biometrics. It begins by defining multibiometric and biometric fusion approaches. It then proposes a identification system that extracts features from fused face and signature templates, calculates matching scores for each using Euclidean distance, fusion scores using simple sum rule, and classifies matches using a neural network. Experimental results on 40 users showed the multibiometric system achieved a 94% genuine acceptance rate and 6% error rate, outperforming single face identification. Future work could explore other fusion levels, modalities, algorithms and classifiers to achieve lower error rates.
Local Descriptor based Face Recognition SystemIRJET Journal
This document describes a local descriptor-based face recognition system that uses the Asymmetric Region Local Binary Pattern (AR-LBP) operator along with Principal Component Analysis (PCA) for facial expression recognition. The proposed AR-LBP operator addresses limitations of existing LBP operators in terms of scale, feature histogram length, and discriminability. The system divides input face images into regions, extracts AR-LBP histograms from each region, and concatenates them into a feature vector. It was evaluated on three datasets and achieved recognition accuracies of 96.43%, 97.14%, and 86.67%, respectively. Evaluation using different similarity metrics found that Mahalanobis Cosine distance performed best. Experiments varied grid and operator sizes.
IRJET - A Review on: Face Recognition using LaplacianfaceIRJET Journal
This document reviews face recognition using LaplacianFace, an appearance-based method that maps face images into a subspace using Locality Preserving Projections (LPP) to analyze local information and detect essential face manifold structure. The Laplacianfaces are optimal linear approximations of the eigenfunctions of the Laplace Beltrami operator on the face manifold, which can eliminate unwanted variations from lighting, expression, and pose. The paper compares LaplacianFace to Eigenface and Fisherface methods on three datasets, finding Laplacianface provides better representation and lower error rates. It also surveys related work applying PCA, LDA, LPP and other techniques to challenges like single image training and discusses the LaplacianFace method's modules for loading images, res
Explaining Aluminous Ascientification Of Significance Examples Of Personal St...SubmissionResearchpa
This document describes research on algorithms for recognizing ear tags for biometric identification. It presents three algorithms: 1) using discrete cosine transformation to distinguish ear image characteristics, which achieved 86% accuracy; 2) using principal component analysis of ear images, which achieved 89% accuracy; and 3) segmenting ear images into static marks, which achieved the best result of 92% accuracy with 12 marks. The discrete cosine method was less accurate due to extracting too many characteristics, while the principal component and segmentation methods performed better with fewer extracted characteristics.
A survey paper on various biometric security system methodsIRJET Journal
This document summarizes various biometric security systems for identification. It discusses fingerprint recognition, iris recognition, and face recognition methods. It provides an overview of different approaches that have been proposed, including using watermarking, edge detection techniques, adaptive boosting algorithms, and fuzzy logic. The document also analyzes the drawbacks of previous methods and proposes using a multimodal biometric system that fuses fingerprints, iris, and face for more secure identification. Overall, the document surveys different biometric identification techniques and highlights that a multimodal approach can help overcome limitations of individual methods.
This document proposes and evaluates methods for fusing 3D ear and face biometrics at the score level and feature level for personal authentication. Local 3D features are extracted from ear and face data and fused using root mean square distance matching at the feature level. At the score level, matching scores from ear and face modalities are fused using weighted sum rule techniques. Experiments on a database of 990 ear and face images from 60 individuals show that the multimodal biometrics systems using feature level or score level fusion techniques have lower equal error rates compared to unimodal ear or face systems alone, demonstrating improved performance from fusing the biometric modalities.
Optimized Active Learning for User’s Behavior Modelling based on Non-Intrusiv...IJECEIAES
In order to protect the data in the smartphone, there is some protection mechanism that has been used. The current authentication uses PIN, password, and biometric-based method. These authentication methods are not sufficient due to convenience and security issue. Non-Intrusive authentication is more comfortable because it just collects user’s behavior to authenticate the user to the smartphone. Several non-intrusive authentication mechanisms were proposed but they do not care about the training sample that has a long data collection time. This paper propose a method to collect data more efficient using Optimized Active Learning. The Support Vector Machine (SVM) used to identify the effect of some small amount of training data. This proposed system has two main functionalities, to reduce the training data using optimized stop rule and maintain the Error Rate using modified model analysis to determine the training data that fit for each user.Finally, after we done the experiment, we conclude that our proposed system is better than Threshold-based Active Learning. The time required to collect the data can reduced to 41% from 17 to 10 minutes with the same Error Rate.
FACIAL EXTRACTION AND LIP TRACKING USING FACIAL POINTSijcseit
The document summarizes a research paper on facial feature extraction and lip tracking using facial points. It proposes a method to accurately extract facial features like eyes, nose, and mouth from images and then track selected facial points in image sequences using optical flow. A simple facial features model is developed using a triangular patch object model with vertices determined by tracked facial points. The model can track lip movements and synthesize facial expressions. Experimental results on a database show the model can successfully track features and deform to match expressions in original images.
Personal identification using multibiometrics score level fusioneSAT Publishing House
This document summarizes a research paper on personal identification using multibiometric score-level fusion of face and signature biometrics. It begins by defining multibiometric and biometric fusion approaches. It then proposes a identification system that extracts features from fused face and signature templates, calculates matching scores for each using Euclidean distance, fusion scores using simple sum rule, and classifies matches using a neural network. Experimental results on 40 users showed the multibiometric system achieved a 94% genuine acceptance rate and 6% error rate, outperforming single face identification. Future work could explore other fusion levels, modalities, algorithms and classifiers to achieve lower error rates.
Local Descriptor based Face Recognition SystemIRJET Journal
This document describes a local descriptor-based face recognition system that uses the Asymmetric Region Local Binary Pattern (AR-LBP) operator along with Principal Component Analysis (PCA) for facial expression recognition. The proposed AR-LBP operator addresses limitations of existing LBP operators in terms of scale, feature histogram length, and discriminability. The system divides input face images into regions, extracts AR-LBP histograms from each region, and concatenates them into a feature vector. It was evaluated on three datasets and achieved recognition accuracies of 96.43%, 97.14%, and 86.67%, respectively. Evaluation using different similarity metrics found that Mahalanobis Cosine distance performed best. Experiments varied grid and operator sizes.
IRJET - A Review on: Face Recognition using LaplacianfaceIRJET Journal
This document reviews face recognition using LaplacianFace, an appearance-based method that maps face images into a subspace using Locality Preserving Projections (LPP) to analyze local information and detect essential face manifold structure. The Laplacianfaces are optimal linear approximations of the eigenfunctions of the Laplace Beltrami operator on the face manifold, which can eliminate unwanted variations from lighting, expression, and pose. The paper compares LaplacianFace to Eigenface and Fisherface methods on three datasets, finding Laplacianface provides better representation and lower error rates. It also surveys related work applying PCA, LDA, LPP and other techniques to challenges like single image training and discusses the LaplacianFace method's modules for loading images, res
Explaining Aluminous Ascientification Of Significance Examples Of Personal St...SubmissionResearchpa
This document describes research on algorithms for recognizing ear tags for biometric identification. It presents three algorithms: 1) using discrete cosine transformation to distinguish ear image characteristics, which achieved 86% accuracy; 2) using principal component analysis of ear images, which achieved 89% accuracy; and 3) segmenting ear images into static marks, which achieved the best result of 92% accuracy with 12 marks. The discrete cosine method was less accurate due to extracting too many characteristics, while the principal component and segmentation methods performed better with fewer extracted characteristics.
A survey paper on various biometric security system methodsIRJET Journal
This document summarizes various biometric security systems for identification. It discusses fingerprint recognition, iris recognition, and face recognition methods. It provides an overview of different approaches that have been proposed, including using watermarking, edge detection techniques, adaptive boosting algorithms, and fuzzy logic. The document also analyzes the drawbacks of previous methods and proposes using a multimodal biometric system that fuses fingerprints, iris, and face for more secure identification. Overall, the document surveys different biometric identification techniques and highlights that a multimodal approach can help overcome limitations of individual methods.
This document proposes and evaluates methods for fusing 3D ear and face biometrics at the score level and feature level for personal authentication. Local 3D features are extracted from ear and face data and fused using root mean square distance matching at the feature level. At the score level, matching scores from ear and face modalities are fused using weighted sum rule techniques. Experiments on a database of 990 ear and face images from 60 individuals show that the multimodal biometrics systems using feature level or score level fusion techniques have lower equal error rates compared to unimodal ear or face systems alone, demonstrating improved performance from fusing the biometric modalities.
Optimized Active Learning for User’s Behavior Modelling based on Non-Intrusiv...IJECEIAES
In order to protect the data in the smartphone, there is some protection mechanism that has been used. The current authentication uses PIN, password, and biometric-based method. These authentication methods are not sufficient due to convenience and security issue. Non-Intrusive authentication is more comfortable because it just collects user’s behavior to authenticate the user to the smartphone. Several non-intrusive authentication mechanisms were proposed but they do not care about the training sample that has a long data collection time. This paper propose a method to collect data more efficient using Optimized Active Learning. The Support Vector Machine (SVM) used to identify the effect of some small amount of training data. This proposed system has two main functionalities, to reduce the training data using optimized stop rule and maintain the Error Rate using modified model analysis to determine the training data that fit for each user.Finally, after we done the experiment, we conclude that our proposed system is better than Threshold-based Active Learning. The time required to collect the data can reduced to 41% from 17 to 10 minutes with the same Error Rate.
FACIAL EXTRACTION AND LIP TRACKING USING FACIAL POINTSijcseit
The document summarizes a research paper on facial feature extraction and lip tracking using facial points. It proposes a method to accurately extract facial features like eyes, nose, and mouth from images and then track selected facial points in image sequences using optical flow. A simple facial features model is developed using a triangular patch object model with vertices determined by tracked facial points. The model can track lip movements and synthesize facial expressions. Experimental results on a database show the model can successfully track features and deform to match expressions in original images.
The document discusses face detection and recognition methods. It covers several topics:
1) Face detection can be categorized into knowledge-based (using facial features, skin color, templates) and image-based methods (AdaBoost, Eigenfaces, neural networks, support vector machines).
2) Important factors for face detection include facial features, skin color modeling, and template matching.
3) Face recognition uses linear/nonlinear projection methods, neural networks for 2D recognition, and 3D geometric measures for 3D recognition.
Face recognition systems are becoming increasingly important for security applications like surveillance cameras. They use biometric facial features which are easier for non-collaborating individuals compared to other biometrics. The document outlines the steps for a face recognition system as acquiring an image, detecting faces, recognizing faces to identify individuals. It discusses challenges like illumination, occlusion and methods are categorized as knowledge-based or appearance-based. The problem is to design a system for a robotics lab to detect and recognize frontal faces under changing lighting of at least 50 people, excluding sunglasses. The thesis outline covers literature review, proposed system theory, experiments and results, discussion and future work.
Face recognition is a widely used biometric approach. Face recognition technology has developed rapidly
in recent years and it is more direct, user friendly and convenient compared to other methods. But face
recognition systems are vulnerable to spoof attacks made by non-real faces. It is an easy way to spoof face
recognition systems by facial pictures such as portrait photographs. A secure system needs Liveness
detection in order to guard against such spoofing. In this work, face liveness detection approaches are
categorized based on the various types techniques used for liveness detection. This categorization helps
understanding different spoof attacks scenarios and their relation to the developed solutions. A review of
the latest works regarding face liveness detection works is presented. The main aim is to provide a simple
path for the future development of novel and more secured face liveness detection approach.
This document presents a facial expression recognition system that identifies and classifies seven basic expressions: happy, surprise, fear, disgust, sad, anger, and a neutral state. The system consists of four main parts: image acquisition, pre-processing, feature extraction, and classification. It was developed using both OpenCV and a web-based JavaScript approach. The system was tested on both real-time and pre-recorded video streams and can identify emotions in images and video input from a webcam in real-time. Evaluation showed the JavaScript implementation using a generalized dataset provided more accurate real-time predictions compared to the OpenCV approach.
IRJET - Biometric Traits and Applications of FingerprintIRJET Journal
This document summarizes research on using biometric traits, particularly fingerprints, for gender identification. It first discusses how fingerprints and other biometric traits can be used for identification and verification. It then reviews several research papers on using fingerprints and other traits like gait and facial recognition for gender classification. The document finds that fingerprints provide 86% accurate results for gender identification due to their permanence and uniqueness. It lists the applications of biometrics in various fields like personal, commercial, government, and forensic use. Finally, it concludes that a proposed algorithm combining fingerprint-based techniques achieves an average 86% accuracy for gender determination.
IRJET- Student Attendance System by Face DetectionIRJET Journal
This document describes a student attendance system using face detection and recognition. The system automatically takes attendance by identifying students' faces using image processing techniques. It stores a database of student faces during a training process. When students enter the classroom, the system detects faces in real-time camera footage and compares them to the stored database to identify and mark present any matching students. The system aims to make the attendance process more efficient and accurate compared to traditional manual methods. It provides automated attendance tracking to help monitor student performance without lengthy paperwork.
Biometrics is the science and technology of
measuring and analyzing biological data. In information
technology, biometrics refers to technologies that measure and
analyze human body characteristics, such as DNA, fingerprints,
eye retinas and irises, voice patterns, facial patterns and hand
measurements, for authentication purposes. This paper is about
the applications of biometric especially in the field of healthcare
and its future uses
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Face detection is one of the most suitable applications for image processing and biometric programs. Artificial neural networks have been used in the many field like image processing, pattern recognition, sales forecasting, customer research and data validation. Face detection and recognition have become one of the most popular biometric techniques over the past few years. There is a lack of research literature that provides an overview of studies and research-related research of Artificial neural networks face detection. Therefore, this study includes a review of facial recognition studies as well systems based on various Artificial neural networks methods and algorithms.
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...ijcsa
This paper proposes a Bio metric identification system for person identification using two bio metric traits
hand geometry and palm print. The hand image captured from digital camera is preprocessed to identify
key points on palm region of hand. Identified key points are used to find hand geometry feature and palm
print Region of interest (ROI). The discriminative palm print features are extracted by applying local
binary descriptor on palm print ROI. In a bio metric identification system the identity corresponding to the
input image (probe) is determined by comparing probe template with the templates of all identities enrolled
in biometric system (gallery). Response time to establish the identity of an individual increases in proportion to the number of enrollees. One way to reduce the response time is to retrieve a smaller set of candidate identity templates from the database for explicit comparison. In this paper we propose a coarseto-fine hierarchical approach to retrieve a smaller set of candidate identities called as candidate set to reduce the response time. The proposed approach is tested on the database collected at our institute.Proposed approach is of significance since hand geometry and palm print features can be extracted from the palm region of the hand. Also performance of identification system is enhanced by reducing the response time without compromising the identification accuracy.
This document describes a face detection method using principal component analysis. It first preprocesses images using histogram equalization to address illumination issues. It then detects faces using skin segmentation to identify skin regions. Finally, it recognizes the extracted facial features using principal component analysis and a neural network, which reduces the dimensionality of the images for efficient recognition.
India is one of the countries which has the electronic voting machine for parliamentary and assembly polls. But in every poll election commission is facing so much of troubles and various types of issues through the election. The most familiar issue which is faced by the election commission is, no proper acknowledgement regarding the confirmation of casting the votes, duplication or illegal casting of votes. In this project all these issues has been handled and overcome with the perfect solution. The main advantage of this project is handling of data by using biometric system such as finger print and face recognition (is done by masking technique). This is used to ensure the security to avoid fake and repeating voting. It also enhances the accuracy and speed of the process. The system performs with perfect recognition on a face and thumb impression of all the eligible voters in a constituency, which is done as pre-polled procedure. During election, thumb impression and face templates of voters is given as an input to the system. This is then compared with the already stored database and available records. If the particular pattern matches with the record then the voters are allowed to vote but incase if it doesn’t match or in case of repetition, voters vote are denied or gets rejected. The result is instant and counting is done.
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...cscpconf
Biometrics is one of the primary key concepts of real application domains such as aadhar card, passport, pan card, etc. In such applications user can provide two to three biometrics patterns
like face, finger, palm, signature, iris data, and so on. We considered face and finger patterns
for encoding and then also for verification. Using this data we proposed a novel model for
authentication in multimodal biometrics often called Context-Sensitive Exponent Associative Memory Model (CSEAM). It provides different stages of security for biometrics patterns. In
stage 1, face and finger patterns can be fusion through Principal Component Analysis (PCA), in stage 2 by applying SVD decomposition to generate keys from the fusion data and preprocessed face pattern and then in stage 3, using CSEAM model the generated keys can be encoded. The final key will be stored in the smart cards. In CSEAM model, exponential
kronecker product plays a critical role for encoding and also for verification to verify the chosen samples from the users. This paper discusses by considering realistic biometric data in
terms of time and space
A Biometric Fusion Based on Face and Fingerprint Recognition using ANNrahulmonikasharma
This document presents a biometric fusion system based on face and fingerprint recognition using artificial neural networks. The system first applies pre-processing to input images. It then extracts features from faces using extended local binary patterns and from fingerprints using minutia extraction. A genetic algorithm is used to optimize the extracted features. An artificial neural network is trained on the optimized features to classify images. The system fuses the face and fingerprint recognition results. Performance is evaluated based on false acceptance rate, false rejection rate and accuracy, with the proposed system achieving over 94% accuracy.
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...IRJET Journal
This document summarizes a research paper on multimodal biometrics identification using fingerprint and iris images. It discusses how a multimodal biometric system that fuses fingerprint and iris traits can improve identification accuracy over unimodal systems. The document outlines the architecture of multimodal biometric systems, including how different biometrics are acquired, processed independently, and then fused using techniques like score-level fusion. It also discusses related work on fingerprint and iris recognition individually, as well as previous research on multimodal biometrics fusion.
2.human verification using multiple fingerprint texture 7 20Alexander Decker
This document presents a multimodal biometric verification system that uses multiple fingerprint matchers to improve accuracy. It combines two fingerprint matching techniques - Spatial Grey Level Dependence Method (SGLDM) and Filterbank-based matching. Matching scores from the two techniques are normalized and combined using sum rule fusion. The system was tested on a fingerprint database and experimental results showed the proposed fusion strategy reduces total error rate, improving overall system accuracy compared to single matcher systems.
11.0002www.iiste.org call for paper.human verification using multiple fingerp...Alexander Decker
This document presents a multimodal biometric verification system that uses multiple fingerprint matchers for human verification. It proposes combining two fingerprint matching techniques, the Spatial Grey Level Dependence Method (SGLDM) and a Filterbank-based technique, at the score level to generate a final matching score. The SGLDM extracts statistical texture features from fingerprints, while the Filterbank-based technique utilizes both global and local fingerprint features. The individual matching scores from each technique are normalized and combined using the sum rule. Experimental results on a fingerprint database demonstrate that the proposed fusion strategy improves overall accuracy by reducing total error rates compared to the individual matchers.
This paper discusses the implementation issues of installing a commercially available hand geometry system in the current infrastructure of Purdue University's Recreational Sports Center. In addition to a performance analysis of the system, a pre- and post- data collection survey was distributed to the 129 test subjects gathering information on perceptions of biometrics, in particular hand geometry, as well as participants' thoughts and feelings during their interaction with the hand geometry device. The results of the survey suggest that participants were accepting of hand geometry. Additionally, analyses of the participants' survey responses revealed that 93% liked using hand geometry, 98% thought it was easy to use, and 87% preferred it to the existing card-based system, while nobody thought the device invaded their personal privacy. System performance achieved a 3-try match rate of 99.02% (FRR 0.98%) when "gaming"/potential impostor attempts were removed from analysis. The failure to enroll rate was zero. Statistical analyses exposed a significant difference in the scores of attempts made by users with prior hand geometry usage, and subjects that could not straighten out their hand on the device. However, there were no statistical difference in the effects of rings/no rings, improper hand placements/proper hand placements, or gender on hand geometry score.
IRJET- A Study on Automated Attendance System using Facial RecognitionIRJET Journal
The document discusses an automated attendance system using facial recognition. It begins with an introduction to facial recognition and the motivation for developing an automated attendance system. It then reviews previous work on facial recognition algorithms such as PCA, Viola-Jones, and neural networks. The proposed system is described as using SVM on LBP features for facial recognition due to its high accuracy. Key advantages of the proposed system include being cost-efficient, easy to deploy, and preventing time fraud. The document concludes facial recognition can effectively automate attendance tracking in educational or commercial organizations.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Factors affecting def and asr in the concrete dam at vrané nad vltavoueSAT Publishing House
1) The document examines factors affecting delayed ettringite formation (DEF) and alkali-silica reaction (ASR) in concrete from a dam in Vrané nad Vltavou, Czech Republic.
2) Samples were taken from 8 locations and tested for residual expansion, then analyzed using microscopy techniques. The sample with the highest residual expansion and microcracking was periodically exposed to water.
3) DEF was found to be the primary degradation mechanism. The sample most affected was located 1 meter above the water line and contained aggregates of acidic volcanic rock that are susceptible to DEF when periodically exposed to water.
The document discusses face detection and recognition methods. It covers several topics:
1) Face detection can be categorized into knowledge-based (using facial features, skin color, templates) and image-based methods (AdaBoost, Eigenfaces, neural networks, support vector machines).
2) Important factors for face detection include facial features, skin color modeling, and template matching.
3) Face recognition uses linear/nonlinear projection methods, neural networks for 2D recognition, and 3D geometric measures for 3D recognition.
Face recognition systems are becoming increasingly important for security applications like surveillance cameras. They use biometric facial features which are easier for non-collaborating individuals compared to other biometrics. The document outlines the steps for a face recognition system as acquiring an image, detecting faces, recognizing faces to identify individuals. It discusses challenges like illumination, occlusion and methods are categorized as knowledge-based or appearance-based. The problem is to design a system for a robotics lab to detect and recognize frontal faces under changing lighting of at least 50 people, excluding sunglasses. The thesis outline covers literature review, proposed system theory, experiments and results, discussion and future work.
Face recognition is a widely used biometric approach. Face recognition technology has developed rapidly
in recent years and it is more direct, user friendly and convenient compared to other methods. But face
recognition systems are vulnerable to spoof attacks made by non-real faces. It is an easy way to spoof face
recognition systems by facial pictures such as portrait photographs. A secure system needs Liveness
detection in order to guard against such spoofing. In this work, face liveness detection approaches are
categorized based on the various types techniques used for liveness detection. This categorization helps
understanding different spoof attacks scenarios and their relation to the developed solutions. A review of
the latest works regarding face liveness detection works is presented. The main aim is to provide a simple
path for the future development of novel and more secured face liveness detection approach.
This document presents a facial expression recognition system that identifies and classifies seven basic expressions: happy, surprise, fear, disgust, sad, anger, and a neutral state. The system consists of four main parts: image acquisition, pre-processing, feature extraction, and classification. It was developed using both OpenCV and a web-based JavaScript approach. The system was tested on both real-time and pre-recorded video streams and can identify emotions in images and video input from a webcam in real-time. Evaluation showed the JavaScript implementation using a generalized dataset provided more accurate real-time predictions compared to the OpenCV approach.
IRJET - Biometric Traits and Applications of FingerprintIRJET Journal
This document summarizes research on using biometric traits, particularly fingerprints, for gender identification. It first discusses how fingerprints and other biometric traits can be used for identification and verification. It then reviews several research papers on using fingerprints and other traits like gait and facial recognition for gender classification. The document finds that fingerprints provide 86% accurate results for gender identification due to their permanence and uniqueness. It lists the applications of biometrics in various fields like personal, commercial, government, and forensic use. Finally, it concludes that a proposed algorithm combining fingerprint-based techniques achieves an average 86% accuracy for gender determination.
IRJET- Student Attendance System by Face DetectionIRJET Journal
This document describes a student attendance system using face detection and recognition. The system automatically takes attendance by identifying students' faces using image processing techniques. It stores a database of student faces during a training process. When students enter the classroom, the system detects faces in real-time camera footage and compares them to the stored database to identify and mark present any matching students. The system aims to make the attendance process more efficient and accurate compared to traditional manual methods. It provides automated attendance tracking to help monitor student performance without lengthy paperwork.
Biometrics is the science and technology of
measuring and analyzing biological data. In information
technology, biometrics refers to technologies that measure and
analyze human body characteristics, such as DNA, fingerprints,
eye retinas and irises, voice patterns, facial patterns and hand
measurements, for authentication purposes. This paper is about
the applications of biometric especially in the field of healthcare
and its future uses
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Face detection is one of the most suitable applications for image processing and biometric programs. Artificial neural networks have been used in the many field like image processing, pattern recognition, sales forecasting, customer research and data validation. Face detection and recognition have become one of the most popular biometric techniques over the past few years. There is a lack of research literature that provides an overview of studies and research-related research of Artificial neural networks face detection. Therefore, this study includes a review of facial recognition studies as well systems based on various Artificial neural networks methods and algorithms.
A NOVEL BINNING AND INDEXING APPROACH USING HAND GEOMETRY AND PALM PRINT TO E...ijcsa
This paper proposes a Bio metric identification system for person identification using two bio metric traits
hand geometry and palm print. The hand image captured from digital camera is preprocessed to identify
key points on palm region of hand. Identified key points are used to find hand geometry feature and palm
print Region of interest (ROI). The discriminative palm print features are extracted by applying local
binary descriptor on palm print ROI. In a bio metric identification system the identity corresponding to the
input image (probe) is determined by comparing probe template with the templates of all identities enrolled
in biometric system (gallery). Response time to establish the identity of an individual increases in proportion to the number of enrollees. One way to reduce the response time is to retrieve a smaller set of candidate identity templates from the database for explicit comparison. In this paper we propose a coarseto-fine hierarchical approach to retrieve a smaller set of candidate identities called as candidate set to reduce the response time. The proposed approach is tested on the database collected at our institute.Proposed approach is of significance since hand geometry and palm print features can be extracted from the palm region of the hand. Also performance of identification system is enhanced by reducing the response time without compromising the identification accuracy.
This document describes a face detection method using principal component analysis. It first preprocesses images using histogram equalization to address illumination issues. It then detects faces using skin segmentation to identify skin regions. Finally, it recognizes the extracted facial features using principal component analysis and a neural network, which reduces the dimensionality of the images for efficient recognition.
India is one of the countries which has the electronic voting machine for parliamentary and assembly polls. But in every poll election commission is facing so much of troubles and various types of issues through the election. The most familiar issue which is faced by the election commission is, no proper acknowledgement regarding the confirmation of casting the votes, duplication or illegal casting of votes. In this project all these issues has been handled and overcome with the perfect solution. The main advantage of this project is handling of data by using biometric system such as finger print and face recognition (is done by masking technique). This is used to ensure the security to avoid fake and repeating voting. It also enhances the accuracy and speed of the process. The system performs with perfect recognition on a face and thumb impression of all the eligible voters in a constituency, which is done as pre-polled procedure. During election, thumb impression and face templates of voters is given as an input to the system. This is then compared with the already stored database and available records. If the particular pattern matches with the record then the voters are allowed to vote but incase if it doesn’t match or in case of repetition, voters vote are denied or gets rejected. The result is instant and counting is done.
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...cscpconf
Biometrics is one of the primary key concepts of real application domains such as aadhar card, passport, pan card, etc. In such applications user can provide two to three biometrics patterns
like face, finger, palm, signature, iris data, and so on. We considered face and finger patterns
for encoding and then also for verification. Using this data we proposed a novel model for
authentication in multimodal biometrics often called Context-Sensitive Exponent Associative Memory Model (CSEAM). It provides different stages of security for biometrics patterns. In
stage 1, face and finger patterns can be fusion through Principal Component Analysis (PCA), in stage 2 by applying SVD decomposition to generate keys from the fusion data and preprocessed face pattern and then in stage 3, using CSEAM model the generated keys can be encoded. The final key will be stored in the smart cards. In CSEAM model, exponential
kronecker product plays a critical role for encoding and also for verification to verify the chosen samples from the users. This paper discusses by considering realistic biometric data in
terms of time and space
A Biometric Fusion Based on Face and Fingerprint Recognition using ANNrahulmonikasharma
This document presents a biometric fusion system based on face and fingerprint recognition using artificial neural networks. The system first applies pre-processing to input images. It then extracts features from faces using extended local binary patterns and from fingerprints using minutia extraction. A genetic algorithm is used to optimize the extracted features. An artificial neural network is trained on the optimized features to classify images. The system fuses the face and fingerprint recognition results. Performance is evaluated based on false acceptance rate, false rejection rate and accuracy, with the proposed system achieving over 94% accuracy.
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...IRJET Journal
This document summarizes a research paper on multimodal biometrics identification using fingerprint and iris images. It discusses how a multimodal biometric system that fuses fingerprint and iris traits can improve identification accuracy over unimodal systems. The document outlines the architecture of multimodal biometric systems, including how different biometrics are acquired, processed independently, and then fused using techniques like score-level fusion. It also discusses related work on fingerprint and iris recognition individually, as well as previous research on multimodal biometrics fusion.
2.human verification using multiple fingerprint texture 7 20Alexander Decker
This document presents a multimodal biometric verification system that uses multiple fingerprint matchers to improve accuracy. It combines two fingerprint matching techniques - Spatial Grey Level Dependence Method (SGLDM) and Filterbank-based matching. Matching scores from the two techniques are normalized and combined using sum rule fusion. The system was tested on a fingerprint database and experimental results showed the proposed fusion strategy reduces total error rate, improving overall system accuracy compared to single matcher systems.
11.0002www.iiste.org call for paper.human verification using multiple fingerp...Alexander Decker
This document presents a multimodal biometric verification system that uses multiple fingerprint matchers for human verification. It proposes combining two fingerprint matching techniques, the Spatial Grey Level Dependence Method (SGLDM) and a Filterbank-based technique, at the score level to generate a final matching score. The SGLDM extracts statistical texture features from fingerprints, while the Filterbank-based technique utilizes both global and local fingerprint features. The individual matching scores from each technique are normalized and combined using the sum rule. Experimental results on a fingerprint database demonstrate that the proposed fusion strategy improves overall accuracy by reducing total error rates compared to the individual matchers.
This paper discusses the implementation issues of installing a commercially available hand geometry system in the current infrastructure of Purdue University's Recreational Sports Center. In addition to a performance analysis of the system, a pre- and post- data collection survey was distributed to the 129 test subjects gathering information on perceptions of biometrics, in particular hand geometry, as well as participants' thoughts and feelings during their interaction with the hand geometry device. The results of the survey suggest that participants were accepting of hand geometry. Additionally, analyses of the participants' survey responses revealed that 93% liked using hand geometry, 98% thought it was easy to use, and 87% preferred it to the existing card-based system, while nobody thought the device invaded their personal privacy. System performance achieved a 3-try match rate of 99.02% (FRR 0.98%) when "gaming"/potential impostor attempts were removed from analysis. The failure to enroll rate was zero. Statistical analyses exposed a significant difference in the scores of attempts made by users with prior hand geometry usage, and subjects that could not straighten out their hand on the device. However, there were no statistical difference in the effects of rings/no rings, improper hand placements/proper hand placements, or gender on hand geometry score.
IRJET- A Study on Automated Attendance System using Facial RecognitionIRJET Journal
The document discusses an automated attendance system using facial recognition. It begins with an introduction to facial recognition and the motivation for developing an automated attendance system. It then reviews previous work on facial recognition algorithms such as PCA, Viola-Jones, and neural networks. The proposed system is described as using SVM on LBP features for facial recognition due to its high accuracy. Key advantages of the proposed system include being cost-efficient, easy to deploy, and preventing time fraud. The document concludes facial recognition can effectively automate attendance tracking in educational or commercial organizations.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Factors affecting def and asr in the concrete dam at vrané nad vltavoueSAT Publishing House
1) The document examines factors affecting delayed ettringite formation (DEF) and alkali-silica reaction (ASR) in concrete from a dam in Vrané nad Vltavou, Czech Republic.
2) Samples were taken from 8 locations and tested for residual expansion, then analyzed using microscopy techniques. The sample with the highest residual expansion and microcracking was periodically exposed to water.
3) DEF was found to be the primary degradation mechanism. The sample most affected was located 1 meter above the water line and contained aggregates of acidic volcanic rock that are susceptible to DEF when periodically exposed to water.
Wear behaviour of si c reinforced al6061 alloy metal matrix composites by usi...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Seismic response of reinforced concrete structure by using different bracing ...eSAT Publishing House
This document analyzes the seismic response of a reinforced concrete structure with different bracing systems using ETABS software. 7 structural models of an 11-story building were analyzed: a bare frame (Model 1) and frames with X, inverted V, V, forward diagonal, backward diagonal, and K bracing systems (Models 2-7). Results for fundamental time period, base shear, story displacement, and story drift were compared. Model 2 with X bracing performed best with a 15.5% reduction in time period and 12-13% lower displacement compared to the bare frame. Bracing systems improved seismic performance by increasing stiffness and strength and reducing displacements within code limits.
Application of ibearugbulem’s model for optimizing granite concrete mixeSAT Publishing House
This document presents a mathematical model for predicting the compressive strength of granitic concrete using Ibearugbulem's regression model. 45 concrete cubes were cast using different mix ratios and tested to determine compressive strength. The first 11 mixes were used to determine the regression model coefficients, and the full 15 mixes were used to validate the model. A t-test found the model results adequately predicted the experimental compressive strengths at a 95% confidence level. The developed model can predict compressive strength or mix proportions for granitic concrete given one is known.
Modeling of laminar flow tubular reactor using velocity profileeSAT Publishing House
This document describes a new model for modeling laminar flow tubular reactors (LFTRs) without using residence time distribution (RTD) data. The model divides the reactor into 3D grid cells that each act as continuous stirred tank reactors (CSTRs) in series. The velocity profile within the LFTR is used to calculate flow rates and residence times for each cell. Conversion is then determined for each cell assuming ideal CSTR behavior. The model was tested on LFTRs and showed good agreement with established analytical methods without requiring computationally intensive simulations. The number of grid cells was optimized to balance accuracy and processing time.
Data discrimination prevention in customer relationship managmenteSAT Publishing House
This document discusses discrimination prevention in customer relationship management for online shopping systems. It begins by defining direct and indirect discrimination and describing how data mining can lead to both. It then proposes three approaches for preventing discrimination: preprocessing the data before mining, modifying mining algorithms during processing, and modifying resulting models after processing. The document focuses on location-based indirect discrimination in online shopping and proposes using the Apriori algorithm to identify alternative sellers or product specifications to prevent such discrimination from occurring. It concludes by discussing challenges in preventing both direct and indirect discrimination while maintaining data quality and mining accuracy.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Prediction of tool wear during turning of en9 work material against coated ca...eSAT Publishing House
This document summarizes a research study that analyzed tool wear during turning of EN-9 work material with a coated carbide insert. Tool vibration was measured during turning tests under different speed, feed, and depth of cut conditions. A correlation was established between tool flank wear and vibration acceleration. The results showed two peaks in vibration acceleration as flank wear increased, and the time and number of cuts until maximum flank wear was reached varied based on the process parameters. Regression analysis was used to develop trend lines showing the relationship between tool wear and vibration acceleration.
Control of inverters to support bidirectional power flow in grid connected sy...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...eSAT Publishing House
This document summarizes a research paper that proposes an energy efficient certificate revocation scheme (EECCRVC) for secure communications in mobile ad hoc networks. The scheme aims to both revoke intruder certificates to exclude them from the network and utilize node energy effectively. It adopts a certificate revocation scheme (CCRVC) that deals with false accusations while outperforming other techniques in revoking intruder certificates. The scheme also enhances reliability and accuracy by promptly vindicating warned nodes based on a threshold mechanism. Experimental results using the NS-2 simulator show that the proposed EECCRVC scheme provides secure communications with effective energy utilization in mobile ad hoc networks.
A novel approach for a secured intrusion detection system in maneteSAT Publishing House
This document proposes a novel intrusion detection system (IDS) for mobile ad hoc networks (MANETs) that promotes complete unlinkability and conceals packet contents to add privacy preservation. The proposed scheme uses a combination of group IDs and digital signatures for encrypted route discovery. This allows malicious nodes to be detected during route discovery and avoided for data transmission. Compared to existing approaches, the proposed scheme has lower end-to-end delay and improved packet delivery ratio.
Evaluate the effective resource management through pert analysiseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Comparative analysis of edge based and region based active contour using leve...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Performance of blended corrosion inhibitors for reinforced concreteeSAT Publishing House
This document discusses the performance of blended corrosion inhibitors for reinforced concrete. It summarizes the results of experiments conducted to evaluate the effect of a blend of calcium nitrite and calcium hypophosphite corrosion inhibitors on the physical properties and corrosion resistance of cement and concrete. The experiments found that the corrosion inhibitor blend did not adversely affect the setting time, pH, or compressive strength of cement or concrete. Electrochemical tests also showed that the corrosion inhibitor blend reduced the corrosion current density, demonstrating its potential to control corrosion initiation and propagation in reinforced concrete.
Measurable, safe and secure data management for sensitive users in cloud comp...eSAT Publishing House
This document summarizes a research paper that proposes a method for managing sensitive user data in cloud computing through measurable and secure data access controls. It discusses privacy issues with current data storage practices in cloud computing. The proposed method uses attribute-based encryption to assign users fine-grained access permissions to limited amounts of data for a specific time period. This aims to address issues with data leakage, privacy, and lack of data owner control in existing cloud data systems. The method was implemented in a simulation using .NET technologies to test access permissions between cloud service providers, consumers, and users.
Microstructure analysis of steel 85 & al 7050 for cold expanded holeseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
1. Pounding is a major cause of damage to adjacent buildings during earthquakes when they are constructed close together without sufficient separation.
2. The study analyzes seismic pounding forces between buildings of different heights and floor levels using software. It finds that pounding damage increases when buildings have different dynamic properties or are inadequately separated.
3. Pounding can cause non-structural to severe structural damage. The required minimum separation between buildings according to codes is 15-30 mm depending on building type, but may need to be larger.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Face Liveness Detection for Biometric Antispoofing Applications using Color T...rahulmonikasharma
Face recognition is a widely used biometric approach. Face recognition technology has developed rapidly in recent years and it is more direct, user friendly and convenient compared to other methods. But face recognition systems are vulnerable to spoof attacks made by non-real faces. It is an easy way to spoof face recognition systems by facial pictures such as portrait photographs. A secure system needs Liveness detection in order to guard against such spoofing. In this work, face liveness detection approaches are categorized based on the various types techniques used for liveness detection. This categorization helps understanding different spoof attacks scenarios and their relation to the developed solutions. A review of the latest works regarding face liveness detection works is presented. The main aim is to provide a simple path for the future development of novel and more secured face liveness detection approach.
Efficient Facial Expression and Face Recognition using Ranking MethodIJERA Editor
Expression detection is useful as a non-invasive method of lie detection and behaviour prediction. However, these facial expressions may be difficult to detect to the untrained eye. In this paper we implements facial expression recognition techniques using Ranking Method. The human face plays an important role in our social interaction, conveying people's identity. Using human face as a key to security, the biometrics face recognition technology has received significant attention in the past several years. Experiments are performed using standard database like surprise, sad and happiness. The universally accepted three principal emotions to be recognized are: surprise, sad and happiness along with neutral.
IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...IRJET Journal
This document provides a comprehensive survey and detailed study of various face recognition methods. It begins with an introduction to face recognition and its advantages over other biometric methods. It then categorizes face recognition methods into four types: knowledge-based, feature-based, template matching, and appearance-based. The majority of the document discusses these methods in further detail and provides examples of algorithms that fall under each type, such as Eigenfaces, LDA, ICA, and neural networks. It concludes by stating that reviewing existing face recognition algorithms may lead to improved methods for solving this fundamental problem.
IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...IRJET Journal
This document presents a proposed system to analyze the state of mind of an interviewee during an interview using facial expression recognition and classification. The system would use Fisher Face algorithm to detect facial features from video frames and Naive Bayes classification to categorize the detected expressions as indicators of emotional states like happy, sad, angry etc. This automated analysis of facial expressions could provide feedback to improve the interview process and selection of candidates. The summarized system aims to identify an individual's state of mind during an interview through facial expression recognition using deep learning techniques.
Intelligent multimodal identification system based on local feature fusion be...nooriasukmaningtyas
1. The document proposes an intelligent multimodal identification system based on fusing local features from iris and finger vein biometrics.
2. It uses preprocessing, feature extraction using SIFT, and template matching to identify individuals from their iris and finger vein patterns with high accuracy of 98% and low false acceptance and rejection rates.
3. The multimodal system is able to overcome challenges from single biometric systems by combining two independent biological traits to improve security and identification performance.
Review of facial expression recognition system and used datasetseSAT Journals
Abstract The human face is main part to recognize the individuals as well as provides the important information, current state of user behavior through their different expressions. Therefore, in biometric area of the research, automatically face & face expression recognition attracts researcher’s interest. The other areas which use such technique are computer science medicine, psychology etc. Usually face recognition system is consisting of many internal tasks. Face detection is thefirst task of such systems. Due to different variations across the human faces, the process of detecting face becomes complex. But with help of different modeling methods, it becomes possible to recognize the face and hence different face expressions. This paperpresents a literature review over the techniques and methods used for facial expression recognition. Also, different facial expression datasets available for the research or testing of existing methods of facial expression recognition are discussed. Keywords: Facial Expression, Face Detection, Features Extraction, Recognition, datasets.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IRJET - Real Time Facial Analysis using Tensorflowand OpenCVIRJET Journal
This document presents a real-time facial analysis system using TensorFlow and OpenCV. The system can detect facial expressions, age, and gender from images and video in real-time. It uses deep learning models trained on facial datasets to analyze faces. The system is designed for applications like security, attendance tracking, and finding lost children. It works by extracting facial features from images, applying preprocessing techniques, classifying faces, and making predictions about attributes. The document discusses the methodology, existing techniques like PCA and HMM, the proposed system architecture, sample code, and conclusions.
IRJET- Age Analysis using Face Recognition with Hybrid AlgorithmIRJET Journal
1) The document presents a study on age analysis of human faces using a hybrid algorithm combining multiple methods including convolutional neural networks.
2) Facial images are collected then preprocessed and trained on a detection model to extract features. A convolutional neural network model is used to classify ages from the extracted features.
3) The results found the proposed hybrid algorithm approach achieved 96.7% accuracy in age prediction from faces, outperforming existing methods. This shows promise for accurate automatic age analysis.
This document summarizes several research papers on human face recognition using feature extraction and measurements. It discusses using face recognition for applications like surveillance, access control, and banking validation. Key steps in face recognition systems include extracting features from captured images, comparing them to known images in a training database, and identifying errors like false acceptance and false rejection rates. Methods discussed for feature extraction and dimensionality reduction include Linear Discriminant Analysis and Principal Component Analysis. The document also examines factors that affect face recognition performance like illumination changes, aging, and expressions. Quantifying uncertainty in face recognition algorithms is identified as important for evaluating system performance.
IRJET- Facial Expression Recognition using Deep Learning: A ReviewIRJET Journal
This document provides a review of facial expression recognition using deep learning approaches. It begins with an introduction to facial expression recognition and its applications. It then discusses commonly used datasets for facial expression recognition, including image-based datasets like JAFFE and video-based datasets like CK+. The document reviews 26 previous research papers that used deep learning methods like convolutional neural networks for facial expression recognition. It concludes that convolutional neural networks provide more accurate results for facial expression recognition compared to traditional methods.
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Attendance System using Face RecognitionIRJET Journal
This document describes an automated attendance system using face recognition. It discusses using algorithms like Viola-Jones for face detection and PCA for feature extraction and SVM for classification. The system works by capturing images of students' faces with a camera as they enter the classroom. It then detects faces, recognizes the students, and automatically marks their attendance on an attendance sheet. The system is presented as an improvement over previous biometric-based attendance systems in that it is faster, more convenient, and helps monitor students.
Face Recognition System and its ApplicationsIRJET Journal
This document summarizes a research paper on face recognition systems and their applications. It begins by defining face recognition and describing the main challenges like illumination, head position, facial expressions, and occlusion. It then discusses the three main methods of face recognition: holistic, feature-based, and hybrid. Several applications of face recognition systems are outlined, including identification, access control, security/surveillance, and image database investigations. The document concludes that face recognition is an important topic that requires further research to address challenges and improve performance.
This document discusses face recognition using Scale Invariant Feature Transform (SIFT) from a single sample per person. It begins with an introduction to biometrics and face recognition. The proposed system uses SIFT to extract robust facial features and match faces despite variations. It performs image preprocessing, feature extraction using SIFT, face granulation to generate Difference of Gaussian pyramids, and face recognition by matching features to a database. The algorithm for DoG and SIFT are described. The system aims to accurately recognize faces from a single sample per person despite variations in illumination, expression, etc.
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKijiert bestjournal
Security and authentication of a person is a vital part of any business. There are many techniques use d for this purpose. One of technique is human face recognition . Human Face recognition is an effective means of authenticating a person. The benefit of this approa ch is that,it enables us to detect changes in the face pattern of an individual to substantial extent. The recognition s ystem can tolerate local variations in the face exp ression of an individual. Hence Human face recognition can be use d as a key factor in crime detection mainly to iden tify criminals. There are several approaches to Human fa ce recognition of which Image Processing Principal Component Analysis (PCA) and Neural Networks have been includ ed in our project. The system consists of a databas e of a set of facial patterns for each individual. The charact eristic features called �eigenfaces� are extracted from the stored images using which the system is trained for subseq uent recognition of new images.
Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...ijtsrd
In todays world, there are number of existing methods for facial recognition. These methods are based on frontal view face data. There are few methods which are based on non-frontal view face recognition method. In most of the face recognition algorithm, œFeature space approach is used. In this approach, different feature vectors are extracted from face. These distances are compared to determine matches. In this paper, it is proposed that how any person can be located in a campus or in a city using a cross pose face recognition method. This paper is focusing on three parts 1) generation of multi-view images 2) comparison of images 3) showing the actual location of a person. Sanjay D. Sawaitul"Cross Pose Facial Recognition Method for Tracking any Persons Location an Approach" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-1 , December 2017, URL: http://www.ijtsrd.com/papers/ijtsrd7186.pdf http://www.ijtsrd.com/computer-science/data-processing/7186/cross-pose-facial-recognition-method-for--tracking-any-persons-location-an-approach/sanjay-d-sawaitul
The biometric is a study of human behavior and features. Face recognition is a technique of biometric. Various approaches are used for it. Face recognition is emerging branch of biometric for security as no faces can be defeated as a security approach. So, how we can recognize a face with the help of computers is given in this paper. The typical way that a FRS can be used for identification purposes. The effectiveness of the whole system is highly dependent on the quality and characteristics of the captured face image. The process begins with face detection and extraction from the larger image, which generally contains a background and often more complex patterns and even other faces. A survey for all these techniques is in this paper for analyzing various algorithms and methods. Sagar Deshmukh | Sanjay Rawat | Shubhangi Patil"Face Recognition Technology" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-4 , June 2018, URL: http://www.ijtsrd.com/papers/ijtsrd14331.pdf http://www.ijtsrd.com/computer-science/artificial-intelligence/14331/face-recognition-technology/sagar-deshmukh
Now days, the task of face recognition is widely used application of image analysis as well as pattern recognition. In biometric area of the research, automatically face & face expression recognition attracts researcher’s interest. For classifying facial expressions into different categories, it is necessary to extract important facial features which contribute in identifying proper and particular expressions. Recognition and classification of human facial expression by computer is an important issue to develop automatic facial expression recognition system in vision community. In this paper the facial expression recognition system is proposed.
Hudhud cyclone caused extensive damage in Visakhapatnam, India in October 2014, especially to tree cover. This will likely impact the local environment in several ways: increased air pollution as trees absorb less; higher temperatures without tree canopy; increased erosion and landslides. It also created large amounts of waste from destroyed trees. Proper management of solid waste is needed to prevent disease spread. Suggested measures include restoring damaged plants, building fountains to reduce heat, mandating light-colored buildings, improving waste management, and educating public on health risks. Overall, changes are needed to water, land, and waste practices to rebuild the environment after the cyclone removed green cover.
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
1) In September-October 2009, unprecedented heavy rainfall and dam releases caused widespread flooding in Alampur village in Mahabub Nagar district, a historically drought-prone area.
2) The flood damaged or destroyed homes, buildings, infrastructure, crops, and documents. It displaced many residents and cut off the village.
3) The socioeconomic conditions and mud-based construction of homes in the village exacerbated the flood's impacts, making damage more severe and recovery more difficult.
The document summarizes the Hudhud cyclone that struck Visakhapatnam, India in October 2014. It describes the cyclone's formation, rapid intensification to winds of 175 km/h, and landfall near Visakhapatnam. The cyclone caused extensive damage estimated at over $1 billion and at least 109 deaths in India and Nepal. Infrastructure like buildings, bridges, and power lines were destroyed. Crops and fishing boats were also damaged. The document then discusses coping strategies and improvements needed to disaster management plans to better prepare for future cyclones.
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
This document summarizes the results of a geophysical investigation using vertical electrical sounding (VES) methods at 13 locations around an industrial area in India. The VES data was interpreted to generate geo-electric sections and pseudo-sections showing subsurface resistivity variations. Three main layers were typically identified - a high resistivity topsoil, a weathered middle layer, and a basement rock. Pseudo-sections revealed relatively more weathered areas in the northwest and southwest. Resistivity sections helped identify zones of possible high groundwater potential based on low resistivity anomalies sandwiched between more resistive layers. The study concluded the electrical resistivity method was useful for understanding subsurface geology and identifying areas prospective for groundwater exploration.
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
1. The document discusses urban flooding in Bangalore, India. It describes how factors like heavy rainfall, population growth, and improper land use have contributed to increased flooding in the city.
2. Flooding events in 2013 are analyzed in detail. A November rainfall caused runoff six times higher than the drainage capacity, inundating low-lying residential areas.
3. Impacts of urban flooding include disrupted daily life, damaged infrastructure, and decreased economic activity in affected areas. The document calls for improved flood management strategies to better mitigate urban flooding risks in Bangalore.
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
This document discusses enhancing post-disaster recovery through optimal infrastructure capacity building. It presents a model to minimize the cost of meeting demand using auxiliary capacities when disaster damages infrastructure. The model uses genetic algorithms to select optimal capacity combinations. The document reviews how infrastructure provides vital services supporting recovery activities and discusses classifying infrastructure into six types. When disaster reduces infrastructure services, a gap forms between community demands and available support, hindering recovery. The proposed research aims to identify this gap and optimize capacity selection to fill it cost-effectively.
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
This document analyzes the effect of lintels and lintel bands on the seismic performance of reinforced concrete masonry infilled frames through non-linear static pushover analysis. Four frame models are considered: a frame with a full masonry infill wall; a frame with a central opening but no lintel/band; a frame with a lintel above the opening; and a frame with a lintel band above the opening. The results show that the full infill wall model has 27% higher stiffness and 32% higher strength than the model with just an opening. Models with lintels or lintel bands have slightly higher strength and stiffness than the model with just an opening. The document concludes lintels and lintel
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
1) A cyclone with wind speeds of 175-200 kph caused massive damage to the green cover of Gitam University campus in Visakhapatnam, India. Thousands of trees were uprooted or damaged.
2) A study assessed different types of damage to trees from the cyclone, including defoliation, salt spray damage, damage to stems/branches, and uprooting. Certain tree species were more vulnerable than others.
3) The results of the study can help in selecting more wind-resistant tree species for future planting and reducing damage from future storms.
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
1) A visual study was conducted to assess wind damage from Cyclone Hudhud along the 27km Visakha-Bheemli Beach road in Visakhapatnam, India.
2) Residential and commercial buildings suffered extensive roof damage, while glass facades on hotels and restaurants were shattered. Infrastructure like electricity poles and bus shelters were destroyed.
3) Landscape elements faced damage, including collapsed trees that damaged pavements, and debris in parks. The cyclone wiped out over half the city's green cover and caused beach erosion around protected areas.
1) The document reviews factors that influence the shear strength of reinforced concrete deep beams, including compressive strength of concrete, percentage of tension reinforcement, vertical and horizontal web reinforcement, aggregate interlock, shear span-to-depth ratio, loading distribution, side cover, and beam depth.
2) It finds that compressive strength of concrete, tension reinforcement percentage, and web reinforcement all increase shear strength, while shear strength decreases as shear span-to-depth ratio increases.
3) The distribution and amount of vertical and horizontal web reinforcement also affects shear strength, but closely spaced stirrups do not necessarily enhance capacity or performance.
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
1) A team of 17 professional engineers from various disciplines called the "Griha Seva" team volunteered after the 2001 Gujarat earthquake to provide technical assistance.
2) The team conducted site visits, assessments, testing and recommended retrofitting strategies for damaged structures in Bhuj and Ahmedabad. They were able to fully assess and retrofit 20 buildings in Ahmedabad.
3) Factors observed that exacerbated the earthquake's impacts included unplanned construction, non-engineered buildings, improper prior retrofitting, and defective materials and workmanship. The professional engineers' technical expertise was crucial for effective post-disaster management.
This document discusses risk analysis and environmental hazard management. It begins by defining risk, hazard, and toxicity. It then outlines the steps involved in hazard identification, including HAZID, HAZOP, and HAZAN. The document presents a case study of a hypothetical gas collecting station, identifying potential accidents and hazards. It discusses quantitative and qualitative approaches to risk analysis, including calculating a fire and explosion index. The document concludes by discussing hazard management strategies like preventative measures, control measures, fire protection, relief operations, and the importance of training personnel on safety.
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
This document summarizes research on the performance of reinforced concrete shear walls that have been repaired after damage. It begins with an introduction to shear walls and their failure modes. The literature review then discusses the behavior of original shear walls as well as different repair techniques tested by other researchers, including conventional repair with new concrete, jacketing with steel plates or concrete, and use of fiber reinforced polymers. The document focuses on evaluating the strength retention of shear walls after being repaired with various methods.
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
This document summarizes a study on monitoring and assessing air quality with respect to dust particles (PM10 and PM2.5) in the urban environment of Visakhapatnam, India. Sampling was conducted in residential, commercial, and industrial areas from October 2013 to August 2014. The average PM2.5 and PM10 concentrations were within limits in residential areas but moderate to high in commercial and industrial areas. Exceedance factor levels indicated moderate pollution for residential areas and moderate to high pollution for commercial and industrial areas. There is a need for management measures like improved public transport and green spaces to combat particulate air pollution in the study areas.
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
This document describes a low-cost wireless sensor network and smartphone application system for disaster management. The system uses an Arduino-based wireless sensor network comprising nodes with various sensors to monitor the environment. The sensor data is transmitted to a central gateway and then to the cloud for analysis. A smartphone app connected to the cloud can detect disasters from the sensor data and send real-time alerts to users to help with early evacuation. The system aims to provide low-cost localized disaster detection and warnings to improve safety.
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
This document summarizes an analysis of seismic vulnerability along the east coast of India. It discusses the geotectonic setting of the region as a passive continental margin and reports some moderate seismic activity from offshore in recent decades. While seismic stability cannot be assumed given events like the 2004 tsunami, no major earthquakes have been recorded along this coast historically. The document calls for further study of active faults, neotectonics, and implementation of improved seismic building codes to mitigate vulnerability.
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
This document discusses how fracture mechanics can be used to better predict damage and failure of structures. It notes that current design codes are based on small-scale laboratory tests and do not account for size effects, which can lead to more brittle failures in larger structures. The document outlines how fracture mechanics considers factors like size effect, ductility, and minimum reinforcement that influence the strength and failure behavior of structures. It provides examples of how fracture mechanics has been applied to problems like evaluating shear strength in deep beams and investigating a failure of an oil platform structure. The document argues that fracture mechanics provides a more scientific basis for structural design compared to existing empirical code provisions.
This document discusses the assessment of seismic susceptibility of reinforced concrete (RC) buildings. It begins with an introduction to earthquakes and the importance of vulnerability assessment in mitigating earthquake risks and losses. It then describes modeling the nonlinear behavior of RC building elements and performing pushover analysis to evaluate building performance. The document outlines modeling RC frames and developing moment-curvature relationships. It also summarizes the results of pushover analyses on sample 2D and 3D RC frames with and without shear walls. The conclusions emphasize that pushover analysis effectively assesses building properties but has limitations, and that capacity spectrum method provides appropriate results for evaluating building response and retrofitting impact.
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
1) A 6.0 magnitude earthquake occurred off the coast of Paradip, Odisha in the Bay of Bengal on May 21, 2014 at a depth of around 40 km.
2) Analysis of magnetic and bathymetric data from the area revealed the presence of major lineaments in NW-SE and NE-SW directions that may be responsible for seismic activity through stress release.
3) Movements along growth faults at the margins of large Bengal channels, due to large sediment loads, could also contribute to seismic events by triggering movements along the faults.
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
This document discusses the effects of Cyclone Hudhud on the development of Visakhapatnam as a smart and green city through a case study and preliminary surveys. The surveys found that 31% of participants had experienced cyclones, 9% floods, and 59% landslides previously in Visakhapatnam. Awareness of disaster alarming systems increased from 14% before the 2004 tsunami to 85% during Cyclone Hudhud, while awareness of disaster management systems increased from 50% before the tsunami to 94% during Hudhud. The surveys indicate that initiatives after the tsunami improved awareness and preparedness. Developing Visakhapatnam as a smart, green city should consider governance
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Design and optimization of ion propulsion dronebjmsejournal
Electric propulsion technology is widely used in many kinds of vehicles in recent years, and aircrafts are no exception. Technically, UAVs are electrically propelled but tend to produce a significant amount of noise and vibrations. Ion propulsion technology for drones is a potential solution to this problem. Ion propulsion technology is proven to be feasible in the earth’s atmosphere. The study presented in this article shows the design of EHD thrusters and power supply for ion propulsion drones along with performance optimization of high-voltage power supply for endurance in earth’s atmosphere.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
artificial intelligence and data science contents.pptxGauravCar
What is artificial intelligence? Artificial intelligence is the ability of a computer or computer-controlled robot to perform tasks that are commonly associated with the intellectual processes characteristic of humans, such as the ability to reason.
› ...
Artificial intelligence (AI) | Definitio
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
1. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 351
AN OPTIMAL FACE RECOGINITION TOOL
Marri.Lingareddy1
, D. Haritha2
1
Research scholar,2
Assistant professor, ECM Department, KL University, AP, India,
marrilingareddy@gmail.com. haritha_donavalli@kluniversity.in
Abstract
Face recognition is one of the crucial and important methods for the security purposes. The accuracy of the facial recognition system
degrades over time. Therefore the FRS system must be up-to-date. Sometimes the system will not be up-to-date because of unlabelled
face images, or because of change in the facial expressions or because of any relevant changes in face of person. Therefore in such
cases also the FRS must be self-trained to make the system up-to-date. In this paper a semi-supervised version, based on the self-
training method, of the classical PCA-based face recognition algorithm is proposed to exploit unlabelled data for off-line updating of
the Eigen space and the templates. Reported results show that the exploitation of unlabelled data by self-training can substantially
improve the performances achieved with a small set of labelled training examples.
Index Terms: Eigen faces, Face recognition, face classifier, occluded faces
-----------------------------------------------------------------------***-----------------------------------------------------------------------
1. INTRODUCTION
Face recognition is a method of automatically identifying or
verifying a person’s video frame or video source or any digital
image. Generally this type of method is used for security
purposes and the face its self is used as a key to identify the
systems password. Therefore a facial recognition system is a
computer application to check the identity of the person. One
of the ways to do this is by comparing selected facial features
from the image and a facial database.
1.1 Methods
There are three different type of techniques are employed to
detect the face. They are
I. Traditional method
II. 3-dimensional recognition
III. Skin texture analysis
In traditional method the facial recognition is done based on
extracting the landmarks or features from an image of his/her
face. Therefore an algorithm is written in such a way that
based on the relative position, size, and/or shape of the eyes,
nose, cheekbones and jaw are used to search for other images
with matching features. Recognition algorithms can be divided
into two main approaches, geometric, which look at
distinguishing features, or photometric, which is a statistical
approach that distils an image into values and compares the
values with templates to eliminate variances.
The 3-D face recognition method is a newly emerging method
and this method uses 3D sensors to capture information about
the shape of the face. This method is used to acquire improved
accurate results. Added advantage to this method is that the
face recognition is not affected by changes in lighting and can
also identify a face from a range of viewing angles, including
a profile view.
The skin texture method uses the unique lines, patterns and
spots apparent in a person’s skin and turns them into a
mathematical space. Facial recognition systems are also
beginning to be incorporated into unlocking mobile devices.
The android market is working with facial recognition and
integrating it into their cell phones. They have created an
application called Visidon Applock. This application allows
you to put a facial recognition lock on any of your
applications. This allows you to increase the safety of your
private apps and content. Facial recognition technology is
already implemented in the iPhoto application for Macintosh.
1.2 Face Accuracy
The accuracy of Face Recognition Systems (FRSs) on a user
will decrease with time [4][5][6][7]. The decrease in the
accuracy is the result of changes in facial appearance because
of factors such as ageing, hair-growth, surgery, weight
changes, sun-exposure, ancestry, sex, health, disease, drug
use, diet, sleep deprivation, and bio-mechanical factors
[1][8][9][10]. The appearance changes in user are illustrated
with the figure1.
Figure1: Facial appearance in a person due of hair growth
2. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 352
Therefore to maintain the accuracy of the facial recognition
system over time the FRS should be up-to-date. FRS will be
up-to-date through the self-update procedure. In this procedure
the system is re-tined with the unlabelled data, which is
acquired every time a user interacts with the system. The
unlabelled facial images are added to the training set
according to the predicted label.
1.3 Algorithm Types
The method of classifier is used for recognition affects the
long term accuracy of the self-updating FRS’s. Therefore three
different types of algorithms are designed [1]. They are
i. Eigen faces(EF)
ii. Fisher faces(FF)
iii. Similarity based fisher faces(SFF)
These algorithms are chosen because of their inductive
reasoning in their training process. The EF is purely a
transductive reasoning and doesn’t use inductive reasoning.
The FF is a little inductive in nature because it uses a global
statistics of the user data to find the best discriminating sub-
space. SFF is more inductive as user-specific models are built
in such a way that they are later used for recognition.
Induction is a method which uses training data to find
approximations of functions that describe the data.
2. RELATED WORK
Considerable research in social psychology has shown that
facial expressions help coordinate conversation and have
considerably more effect on whether a listener feels liked or
disliked than the speaker's spoken words.
Mehrabian indicated that the verbal part of a message
contributes only for 7 percent to the effect of the message as a
whole. The vocal part contributes for 38 percent, while facial
expression of the speaker contributes for 55 percent to the
effect of the spoken message. Therefore face recognition is an
important addition to computer vision research [1]. Computer
vision aims to duplicate the effect of human vision by
electronically perceiving and understanding an image.
Computer vision techniques use the results of mathematics,
pattern recognition, artificial intelligence, psycho-physiology,
computer science, electronics, and other scientific disciplines.
Recent advances in image analysis and pattern recognition
open up the possibility of automatic detection and
classification of emotional and conversational facial signals.
Automating facial expression analysis could bring facial
expressions into man-machine interaction as a new modality
and make interaction tighter and more efficient. Such a system
could also make classification of facial expressions widely
accessible as a tool for research in behavioral science and
medicine [1].
3. REPRESENTATION OF FACIAL ECOGNITION
SYSTEM
The outline of a typical face recognition system is given figure
2. This outline carries the characteristics of a typical pattern
recognition system.
Figure2: Generic representation of facial recognition
There are 4 main blocks that represent the face recognition. In
the input block an image is passed to the system for
classification. The images vary in format, size and resolution.
The image is pre-processed to remove unwanted noise from
light and the environment. The image also then is compressed
and normalized. The classifier decides whether the image
belongs to the face or the non-face class based on the
information learned during training. The output image
indicates whether the input image is thought to certain or not.
Some systems indicate its location.
4. PATTERN RECOGNITION
Pattern recognition is a modern day machine intelligence
problem with numerous applications in a wide field, including
face recognition, character recognition, speech recognition as
well as other types of object recognition. Its ability to read text
and shapes plays an important role in medical diagnostic
science, machine conditioning and monitoring and sorting.
The speed of processing is important for its real-time
application in banks, stores and voice recognition banks,
stores and voice recognition. A basic pattern classification
system consists of sensor inputs, feature extraction, selection
and classification. Sensors could be microphone, digital
camera orographic, features are extracted with statistical,
geometrical or descriptor means. The field of pattern
recognition is still very much in its infancy, although in recent
years some of the barriers that hampered such automated
pattern recognition systems have been lifted due to advances
in computer hardware providing machines capable of faster
and more complex computation. Pattern recognition can be
classified as the categorization of input data into identifiable
classes via the extraction of significant features or attributes of
the data from a background of irrelevant detail. The functional
block diagram of an adaptive pattern recognition system is
shown in Figure3.
PREPROCESS CLASSIFIER
OUTPUT
INPUT
3. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 353
5. FACE RECOGNITION
Face recognition is a pattern recognition task performed
specifically on faces. It can be described as classifying a face
either “known" or "unknown", after comparing it with stored
known individuals. It is desirable to have a system that has the
ability of learning to recognize unknown faces.
Figure3: Block diagram of Pattern recognition
Face recognition involves comparing an image with a database
of stored faces in order to identify the individual in the input
image. The related task of face detection has direct relevance
to recognition because images must be analyzed and faces
identified, before they can be recognized.
5.1 Types of image conditions
Face recognition, although a trivial task for the human brain
has proved to be extremely difficult to imitate artificially,
because although commonalities exist between faces, they can
vary considerably in terms of age, skin color, orientation,
facial expression and presence official furniture such as
glasses or facial hair. The problem is further complicated by
differing light conditions, image qualities and geometries, as
well as the possibility of partial occlusion and disguise. Hence,
a robust face recognition system should be capable of
classifying a face image as "known" under the following
conditions:
• Scale variance
• Orientation variance
• Illumination variance
• Background variance
• Emotional expression and detail variance
• Noise variance
For basic face recognition systems, some of these effects can
be avoided by assuming and ensuring a uniform background
and uniform light conditions.
Figure 4: Block diagram of face recognition system
This assumption is acceptable for some applications such as
automated separation of nuts from screws on a production
line, where light conditions can be controlled and the image
background will be uniform. Figure 4 outlines the block
diagram of a typical face recognition system.
Face recognition is the most natural, non-intrusive, and user-
friendly biometric measure, because it requires no disturbance
to the people being identified. Most of the existing systems
can successfully recognize faces only when they appear under
constrained conditions. The performance will degrade
significantly when face images are obtained under variable
illumination conditions, facial expressions, poses or
perspectives, especially when occlusion happens. Occlusions
may be caused by sunglasses, a thick beard, the wearing of a
scarf, or expression variations. In this paper, we will focus on
how to improve the performance for recognizing occluded
faces. In a nutshell, we first complete or repair the occluded
faces with our proposed spectral algorithm, and then perform
face recognition on the completed images. A face-completion
algorithm involves three main procedures: occluded face
clustering via the sparse representation, image-based data
mining, and face image repairing using the spectral graph
theory. Our algorithm is developed on the basis that global and
local similarities among different faces are widespread. A
damaged face can be considered as a signal sequence, in
which each un-occluded pixel is seen as the element. The
sequence is matched with faces in our large database via
sparse representation, and then the most similar local part to
the occluded part is selected after the sparse representation-
based clustering. Some other classification algorithms, e.g. the
Euclidean distance and Sum-of-Squared-Differences (SSD)
based classification, are alternative to this step. However,
compared to sparse representation, all the other methods
require solving the classification problem via an exhausting
search, which is very computationally intensive. The sparse
representation method is able to avoid searching all the items
in a more efficient way via dynamic programming.
4. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 354
Finally, in order to provide fusion and natural repairing
results, a mathematical model that follows an actual painters’
painting procedure, namely guided label learning, is developed
using the spectral graph theory. Image completion is one of
the most talked-about topics in the Graphics area]. A number
of useful tools, e.g. image in painting .Poisson equations, and
graph-cuts, have been established for real-scene image
completion. But these ideas require too much information
about the damaged images, and they are always performed on
high-resolution color images. When referring to face
recognition, the algorithms are usually developed based on
low-resolution gray-scale images, and the traditional
algorithms may lose their effectiveness. Hence, as per the
Poisson equation, we extend it to the graph-based domain.
Due to the flexibility of the graph topology, low-resolution
gray-scale images can be coped with quite well.
5.2 Proposed scheme
The major contributions of this paper are as follows:
i. We propose a new face reconstruction algorithm based
on sparse representation and a graphical model. Our
algorithm is established from a new perspective,
different from the existing face reconstruction
algorithms.
Figure 5: Flow chart of FRS system
ii. The proposed algorithm is able to improve the
recognition results dramatically, with an increase
of up to 30% in recognition rate.
Face analysis block: The face analysis block is responsible for
detection and segmentation of human faces.
Face detection: To detect faces accurately in real-time, our
system employs Viola and Jones face detection procedure
[11]. The detector works at a speed of 15 frames per second at
12 resolution levels, while achieving low false acceptance
rates.
Face segmentation: For the segmentation of the prominent
facial features our system employs Active Shape Models with
Invariant Optimal Features (IOFASM) [12]. This algorithm
can automatically locate the outlines of eyes, mouth, nose,
brows and silhouette contour of the face with an average error
of approximately 2% of the inter-eye distance.
Identification block: The identification block extracts texture
from a segmented face and uses it to identify a user.
Facial feature extraction: To make facial texture
independent of the facial expression, each image was warped
using a piece-wise affine mapping between the result of the
segmentation step and the mean shape. The texture parameters
for each image were extracted by constructing an image
intensity model of an Active Appearance Model [13].
Classification Once the texture parameters are obtained, they
are whitened [14] and then a distance-weighted k-Nearest
Neighbor classifier (k-NN) is used to identify the user in the
image. The distance between two texture vectors is defined as
the angle between them. The angle based distance metric was
shown to be a good choice for PCA-based algorithms [15]. All
the experiments in this paper were performed using the five
nearest neighbors (k = 5).
Automatic learning block Every time a facial image has been
identified, it goes through an automatic selection process that
determines whether it is suitable to be added to the training set
of the appropriate user. The selection process deems two
categories of images to be unsuitable for automatic learning:
1) images with outdated facial appearance,
2) Images where the algorithms used in our system produce
unreliable results.
6. ANALYSIS OF THE ALGORITHM USED
Figure6: Damaged face representation using graph cut
In this algorithm, we first cluster the images which have a
similar sparse representation to the query image. Then, these
clustered images are used to find the best-matched patch for
guiding the synthesis of the missing parts. The patch obtained
is used to guide the in-painting work of the damaged part of
the occluded face. Hence, the searched patch should have a
similar local property as the damaged part. The target region,
which needs to be filled in the damaged face image F, is de-
5. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 355
noted as R. The goal is to find the best-matched patch in the
sparse representation data-pool, which fits its neighborhood R
with the least SSD. This procedure is shown in Figure 6.
The region of missing pixels is defined as R, and the mask
region as J, on a damaged face image. Mathematically, mask J
is an expanded region of the damaged patch. We expand the
boundary of R by h pixels and define it as:
J (i, j)=0, if (d(i, j)>h)or((i, j)∈ R),1, I d(i, j)<h. (1)
The mask J is painted as a thin band surrounding the missing
region R. d (i, j) indicates the distance between the pixel (i, j)
and its nearest pixel in the damaged/occluded region R.
Figure7: The missing region R and masked region J of
damaged face F
7. PARTIALLY OCCLUDED FACE OMPLETION
AND RECOGNITION
In this section, we will apply the completion algorithm on
partially occluded face images. The occluded part of the face
is detected using the graph cut, which is a common method for
image segmentation. Consequently, the proposed spectral
graphic based image completion algorithm is employed for
each damaged faces.
Figure9: AR database for occluded faces
Some repaired results are shown as the second and the fourth
column in Figure9. The repairing algorithm is able to provide
a fusion and produce natural results. The recognition
experiment was also developed based on the AR database. For
training, 847 un-occluded images (121 subjects, 7 images per
subject) were used. For testing, the occluded faces were
divided into two subsets, denoted as AR1 and AR2. These two
sets included images with sun-glasses and images with a scarf,
respectively. The two methods common face recognition
algorithms, the PCA and Gabor methods, with and without
using the algorithm to evaluate the recognition performance.
Figure10: Synthetic partially occluded faces
For testing, synthetic occlusions were added to 484 images. As
shown in Figure9, the location of the occlusion is randomly
selected. And the curves of the recognition rates with different
amounts of occlusion are shown in Fig. 6. The occlusion
percentages range from 0% to 50%, in 12.5%additions.
7.1 Training and updating procedure
The k-NN classifier was trained with the texture parameters
obtained from the 472 images in the Training set and their
corresponding user IDs.
Using the images in the Update set (in chronological order),
three types of updates were performed to the Training set [2]:
i. UC. In this case, updates were performed with the total
confidence, C.
ii. UCc. The update process is similar to that performed in
[3]. In this scenario, if Cc computed for an image in the
Update set is greater than C of any of the images in the
Training set, then the image will be added to the
Training set. Otherwise, the image is ignored.
iii. UCt. This is a trivial update strategy where newer
images from Update set replace older ones in the
Training set. In other words, if an image has a Ct value
greater than that of any of the images in the Training
set, then it is added to the Training set.
CONCLUSIONS
Face recognition is both a challenging and important
recognition technique among all the biometric techniques; face
recognition approach possesses one great advantage, which is
its user-friendliness.
6. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 356
As face recognition system has become an important method
for security purpose the FRS system was made up-to-date
using self-trained method.
In this paper the classical PCA-based face recognition
algorithm & Guided labelled algorithm are used so that the
face is recognized in any of the cases (Such as age, growth of
hair or beard, any of the blurred images, or the low lighting
images and finally different pose of the faces).
Self-training performances are achieved with a small set of
labelled training examples. So the self-trained is used to keep
the system up-to-date and made the better FRS.
RESULTS
Figure 11: Face recognition is done even in growth of beard
Figure 12: Detected image when the age is grown
Figure 13: Face recognition is done when the person is aged
& having spectacles on his face
Figure 14: Face recognition is done even for blurred images
Figure 15: Face recognition is also done when the pose is
changed
REFERENCES
[1] An Experimental Evaluation of Three Classifiers for
Use in Self-Updating Face ecognition Systems Sri-
Kaushik Pavani, Federico M. Sukno, David Delgado-
Gomez, Constantine Butakoff, Xavier Planes, and
Alejandro F. Frangi
[2] A Confidence-based Update Rule for Self-Updating
Human Face Recognition Systems Sri-Kaushik Pavani
1;2 , Federico M. Sukno 2;1 ,
Constantine Butako®, Xavier Planes 1;2 and Alejandro
F. Frangi
[3] D. Mou, R. Schweer, and A. Rothermel. Automatic
databases for unsupervised face recognition.In CVPRW
2004, pages 90{97}.
[4] P. J. Phillips, P. Grother, R. Micheals,
D. M. Blackburn, E. Tabassi, and M. one, “Face
Recognit. Vendor Test 2002: Evaluation Report,”
National Inst. Standards Technol., Tech. Rep. NISTIR
6965, 2003.
[5] P. J. Flynn, K. W. Bowyer, and P. J. Phillips,
“Assessment of time dependency in face recognition:
An initial study,” in Proc. 4th Int. Conf. Audio- and
Video-Based Biometric Person Authentication. Lecture
Notes in Computer. Science, Guildford, U.K., 2003,
vol. 2688, pp. 44–51.
[6] H. Wang and P. J. Flynn, “Experimental evaluation of
eye location ac- curacies and time-lapse effects on face
7. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 357
recognition systems,” in Proc. 5th Int. Conf. Audio- and
Video-Based Biometric Person Authentica- tion.
Lecture Notes in Comput. Science, New York, NY,
2005, vol. 3546, pp. 627–636.
[7] H.Ling,S.Soatto,N.Ramanathan,andD.W.Jacobs,“Astud
yofface recognition as people age,” in Proc. 11th IEEE
Int. Conf. Comput. Vis., Rio de Janeiro, Brazil, 2007,
pp. 1–8.
[8] N. Ramanathan, R. Chellappa, and S. Biswas,
“Computational methods for modeling facial aging: A
survey,” J. Vis. Lang. omput., vol. 20, no. 3, pp. 131–
144, 2009, 1.
[9] L. Millsopp, L. Brandom, G. Humphris, D. Lowe, C.
Stat, and S. Rogers, “Facial appearance after operations
for oral and oropharyngeal cancer: A comparison of
casenotes and patient-completed questionnaire,” Brit. J.
Oral Maxillofacial Surg., vol. 44, no. 5, pp. 358–
363,2006.
[10] M. A. Taister, S. D. Holliday, and H. I. M. Borrman,
“Comments on facial aging in law enforcement
investigation,” Forensic Sci. Commun., vol. 2, no. 2,
2000 [Online]. Available: http://www.fbi.gov/about-us/
lab/forensic-science-
communications/fsc/april2000/taister.htm
[11] P. Viola and M. Jones. Robust real-time face detection.
Int. J. Comput. Vision, 57(2):137{154, 2004}.
[12] F. Sukno et al. Active shape models with invariant
optimal features. IEEE Trans. Pattern Anal. Mach.
Intell., 29(7):1105{1117, 2007}.
[13] T. Cootes, G. Edwards, and C. Taylor. Active
appearance models. IEEE Trans. Pattern Anal. Mach.
Intell., 23(6):681{685, 2001}.
[14] P. Navarrete and J. Ruiz del Solar. Comparative study
between di®erent
eigenspace-based approaches for face recognition. In FS 2002,
pages 178{184}.
[15] V. Perlibakas. Distance measures for PCA-based face
recognition. Pattern Recogn.Lett., 25(6):711{724,
2004}.
BIOGRAPHIES:
M. Linga Reddy has received his
B.Tech degree in ECE from ACE in
2011. He is presently pursuing M.Tech
in Embedded systems in E.C.M.
Department from KL University since
July 2011.
D. Haritha, Assistant professor, ECM Department, KL
University AP, India, haritha_donavalli@kluniversity.in