The face describes the personality of humans and has adequate importance in the identification and verification process. The human face provides, information as age, gender, face expression and ethnicity. Research has been carried out in the area of face detection, identification, verification, and gender classification to correctly identify humans. The focus of this paper is on gender classification, for which various methods have been formulated based on the measurements of face features. An efficient technique of gender classification helps in accurate identification of a person as male or female and also enhances the performance of other applications like Computer-User Interface, Investigation, Monitoring, Business Profiling and Human Computer Interaction (HCI). In this paper, the most prominent gender classification techniques have been evaluated in terms of their strengths and limitations.
WCTFR : W RAPPING C URVELET T RANSFORM B ASED F ACE R ECOGNITIONcsandit
The recognition of a person based on biological fea
tures are efficient compared with traditional
knowledge based recognition system. In this paper w
e propose Wrapping Curvelet Transform
based Face Recognition (WCTFR). The Wrapping Curve
let Transform (WCT) is applied on
face images of database and test images to derive c
oefficients. The obtained coefficient matrix is
rearranged to form WCT features of each image. The
test image WCT features are compared
with database images using Euclidean Distance (ED)
to compute Equal Error Rate (EER) and
True Success Rate (TSR). The proposed algorithm wit
h WCT performs better than Curvelet
Transform algorithms used in [1], [10] and [11].
Face Recognition using Improved FFT Based Radon by PSO and PCA TechniquesCSCJournals
Abstract Face Recognition is one of the problems which can be handled very well using a Hybrid technique or mixed transform rather than single technique, it is a very well in terms of a good performance and a large size of the problem. In this paper we represent the using of the Fourier-Based Radon Transform which is improved by the Particle Swarm Optimization (PSO). PSO in this research is used to select the optimum directions (projection angles) that achieve a very high recognition rate and a fast computation. The number of directions selected using PSO is less than the number required by ordinary Radon. This leads to a small number of features. These number of features are reduced farther using PCA to produce a low number of features which used to represent faces in the database. Our method has been applied to ORL Database and achieves 100% recognition rate.
FACE RECOGNITION USING PRINCIPAL COMPONENT ANALYSIS WITH MEDIAN FOR NORMALIZA...csandit
Recognizing Faces helps to name the various subjects present in the image. This work focuses
on labeling faces on an image which includes faces of humans being of various age group
(heterogeneous set ). Principal component analysis concentrates on finds the mean of the data
set and subtracts the mean value from the data set with an intention to normalize that data.
Normalization with respect to image is the removal of common features from the data set. This
work brings in the novel idea of deploying the median another measure of central tendency for
normalization rather than mean. The above work was implemented using matlab. Results show
that Median is the best measure for normalization for a heterogeneous data set which gives
raise to outliers.
This paper describes for a robust face recognition system using skin segmentation technique. This paper addresses the problem of detecting faces in color images in the presence of various lighting conditions. In this paper the face is preprocessed using histogram equalization to avoid illumination problems and then is detected using skin segmentation method. The principal component analysis using neural network is used to recognize the extracted facial features.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
NEURAL NETWORK BASED SUPERVISED SELF ORGANIZING MAPS FOR FACE RECOGNITIONijsc
The word biometrics refers to the use of physiological or biological characteristics of human to recognize
and verify the identity of an individual. Face is one of the human biometrics for passive identification with
uniqueness and stability. In this manuscript we present a new face based biometric system based on neural
networks supervised self organizing maps (SOM). We name our method named SOM-F. We show that the
proposed SOM-F method improves the performance and robustness of recognition. We apply the proposed
method to a variety of datasets and show the results.
WCTFR : W RAPPING C URVELET T RANSFORM B ASED F ACE R ECOGNITIONcsandit
The recognition of a person based on biological fea
tures are efficient compared with traditional
knowledge based recognition system. In this paper w
e propose Wrapping Curvelet Transform
based Face Recognition (WCTFR). The Wrapping Curve
let Transform (WCT) is applied on
face images of database and test images to derive c
oefficients. The obtained coefficient matrix is
rearranged to form WCT features of each image. The
test image WCT features are compared
with database images using Euclidean Distance (ED)
to compute Equal Error Rate (EER) and
True Success Rate (TSR). The proposed algorithm wit
h WCT performs better than Curvelet
Transform algorithms used in [1], [10] and [11].
Face Recognition using Improved FFT Based Radon by PSO and PCA TechniquesCSCJournals
Abstract Face Recognition is one of the problems which can be handled very well using a Hybrid technique or mixed transform rather than single technique, it is a very well in terms of a good performance and a large size of the problem. In this paper we represent the using of the Fourier-Based Radon Transform which is improved by the Particle Swarm Optimization (PSO). PSO in this research is used to select the optimum directions (projection angles) that achieve a very high recognition rate and a fast computation. The number of directions selected using PSO is less than the number required by ordinary Radon. This leads to a small number of features. These number of features are reduced farther using PCA to produce a low number of features which used to represent faces in the database. Our method has been applied to ORL Database and achieves 100% recognition rate.
FACE RECOGNITION USING PRINCIPAL COMPONENT ANALYSIS WITH MEDIAN FOR NORMALIZA...csandit
Recognizing Faces helps to name the various subjects present in the image. This work focuses
on labeling faces on an image which includes faces of humans being of various age group
(heterogeneous set ). Principal component analysis concentrates on finds the mean of the data
set and subtracts the mean value from the data set with an intention to normalize that data.
Normalization with respect to image is the removal of common features from the data set. This
work brings in the novel idea of deploying the median another measure of central tendency for
normalization rather than mean. The above work was implemented using matlab. Results show
that Median is the best measure for normalization for a heterogeneous data set which gives
raise to outliers.
This paper describes for a robust face recognition system using skin segmentation technique. This paper addresses the problem of detecting faces in color images in the presence of various lighting conditions. In this paper the face is preprocessed using histogram equalization to avoid illumination problems and then is detected using skin segmentation method. The principal component analysis using neural network is used to recognize the extracted facial features.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
NEURAL NETWORK BASED SUPERVISED SELF ORGANIZING MAPS FOR FACE RECOGNITIONijsc
The word biometrics refers to the use of physiological or biological characteristics of human to recognize
and verify the identity of an individual. Face is one of the human biometrics for passive identification with
uniqueness and stability. In this manuscript we present a new face based biometric system based on neural
networks supervised self organizing maps (SOM). We name our method named SOM-F. We show that the
proposed SOM-F method improves the performance and robustness of recognition. We apply the proposed
method to a variety of datasets and show the results.
Multi Local Feature Selection Using Genetic Algorithm For Face IdentificationCSCJournals
Face recognition is a biometric authentication method that has become more significant and relevant in recent years. It is becoming a more mature technology that has been employed in many large scale systems such as Visa Information System, surveillance access control and multimedia search engine. Generally, there are three categories of approaches for recognition, namely global facial feature, local facial feature and hybrid feature. Although the global facial-based feature approach is the most researched area, this approach is still plagued with many difficulties and drawbacks due to factors such as face orientation, illumination, and the presence of foreign objects. This paper presents an improved offline face recognition algorithm based on a multi-local feature selection approach for grayscale images. The approach taken in this work consists of five stages, namely face detection, facial feature (eyes, nose and mouth) extraction, moment generation, facial feature classification and face identification. Subsequently, these stages were applied to 3065 images from three distinct facial databases, namely ORL, Yale and AR. The experimental results obtained have shown that recognition rates of more than 89% have been achieved as compared to other global-based features and local facial-based feature approaches. The results also revealed that the technique is robust and invariant to translation, orientation, and scaling.
Happiness Expression Recognition at Different Age ConditionsEditor IJMTER
Recognition of different internal emotions of human face under various critical
conditions is a difficult task. Facial expression recognition with different age variations is
considered in this study. This paper emphasizes on recognition of facial expression like
happiness mood of nine persons using subspace methods. This paper mainly focuses on new
robust subspace method which is based on Proposed Euclidean Distance Score Level Fusion
(PEDSLF) using PCA, ICA, SVD methods. All these methods and new robust method is
tested with FGNET database. An automatic recognition of facial expressions is being carried
out. Comparative analysis results surpluses PEDSLF method is more accurate for happiness
emotional facial expression recognition.
FACIAL EXTRACTION AND LIP TRACKING USING FACIAL POINTSijcseit
Automatic facial feature extraction is one of the most important and attempted problems in computer
vision. It is a necessary step in face recognition, facial image compression. There are many methods have
been proposed in the literature for the facial feature extraction task. However, all of them have still
disadvantage such as not complete reflection about face structure, face texture. In this paper, we propose
a method for fast and accurate extraction of feature points such as eyes, nose, mouth, eyebrows and the
like from dynamic images with the purpose of face recognition. These methods are far from satisfactory
in terms of extraction accuracy and processing speed. The proposed method achieves high position
accuracy at a low computing cost by combining shape extraction with geometric features of facial images
like eyes, nose, mouth etc. In this paper, a facial expressions synthesis system, based on the facial points
tracking in the frontal image sequences. Selected facial points are automatically tracked using a crosscorrelation based optical flow. The proposed synthesis system uses a simple facial features model with a
few set of control points that can be tracked in original facial image sequences.
Facial Expression Recognition Based on Facial Motion Patternsijeei-iaes
Facial expression is one of the most powerful and direct mediums embedded in human beings to communicate with other individuals’ feelings and abilities. In recent years, many surveys have been carried on facial expression analysis. With developments in machine vision and artificial intelligence, facial expression recognition is considered a key technique of the developments in computer interaction of mankind and is applied in the natural interaction between human and computer, machine vision and psycho- medical therapy. In this paper, we have developed a new method to recognize facial expressions based on discovering differences of facial expressions, and consequently appointed a unique pattern to each single expression.by analyzing the image by means of a neighboring window on it, this recognition system is locally estimated. The features are extracted as binary local features; and according to changes in points of windows, facial points get a directional motion per each facial expression. Using pointy motion of all facial expressions and stablishing a ranking system, we delete additional motion points that decrease and increase, respectively, the ranking size and strenghth. Classification is provided according to the nearest neighbor. In the conclusion of the paper, the results obtained from the experiments on tatal data of Cohn-Kanade demonstrate that our proposed algorithm, compared to previous methods (hierarchical algorithm combined with several features and morphological methods as well as geometrical algorithms), has a better performance and higher reliability.
Statistical Models for Face Recognition System With Different Distance MeasuresCSCJournals
Face recognition is one of the challenging applications of image processing. Robust face recognition algorithm should posses the ability to recognize identity despite many variations in pose, lighting and appearance. Principle Component Analysis (PCA) method has a wide application in the field of image processing for dimension reduction of the data. But these algorithms have certain limitations like poor discriminatory power and ability to handle large computational load. This paper proposes a face recognition techniques based on PCA with Gabor wavelets in the preprocessing stage and statistical modeling methods like LDA and ICA for feature extraction. The classification for the proposed system is done using various distance measure methods like Euclidean Distance(ED), Cosine Distance (CD), Mahalanobis Distance (MHD) methods and the recognition rate were compared for different distance measures. The proposed method has been successfully tested on ORL face data base with 400 frontal images corresponding to 40 different subjects which are acquired under variable illumination and facial expressions. It is observed from the results that use of PCA with Gabor filters and features extracted through ICA method gives a recognition rate of about 98% when classified using Mahalanobis distance classifier. This recognition rate stands better than the conventional PCA and PCA + LDA methods employing other and classifier techniques.
3-D Face Recognition Using Improved 3D Mixed TransformCSCJournals
This paper deals with the using of Improved 3D Mixed Transform (3D-IMT) for face recognition problem. The mixed transform consists; Fourier based 3D radon transform plus 1-D Wavelet transform (which is also known as 3D Ridgelet transform). The Mixed Transform is improved by using Particle swarm optimization ( PSO) , the improvement involves the selection of the best of directions for smart rectangle-to-polar transform as a part of the 3D Radon Transformation. The 3D-IMT is applied to the 3D representation of face images, and yields a few number of features, these features is projected into the maximized projection that achieves good recognition rate using the Linear Discriminant Analysis (LDA).
Identifying Gender from Facial Parts Using Support Vector Machine ClassifierEditor IJCATR
Gender classification can be stated as inferring female or male from a collection of facial images. There exist different
methods for gender classification, such as gait, iris, hand shape and hair, it is probably better way to find out gender based on facial
features. In this paper SVM basic kernel function has been employed firstly to detect and classify the human gender Image into
two labels i.e. (1) male and (2) female. The gender classifier achieves over 96% accuracy.
Independent Component Analysis of Edge Information for Face RecognitionCSCJournals
In this paper we address the problem of face recognition using edge information as independent components. The edge information is obtained by using Laplacian of Gaussian (LoG) and Canny edge detection methods then preprocessing is done by using Principle Component analysis (PCA) before applying the Independent Component Analysis (ICA) algorithm for training of images. The independent components obtained by ICA algorithm are used as feature vectors for classification. The Euclidean distance and Mahalanobis distance classifiers are used for testing of images. The algorithm is tested on two different databases of face images for variation in illumination and facial poses up to 180 degree rotation angle.
FACE VERIFICATION ACROSS AGE PROGRESSION USING ENHANCED CONVOLUTION NEURAL NE...sipij
This paper proposes a deep learning method for facial verification of aging subjects. Facial aging is a texture and shape variations that affect the human face as time progresses. Accordingly, there is a demand to develop robust methods to verify facial images when they age. In this paper, a deep learning method based on GoogLeNet pre-trained convolution network fused with Histogram Orientation Gradient (HOG) and Local Binary Pattern (LBP) feature descriptors have been applied for feature extraction and classification. The experiments are based on the facial images collected from MORPH and FG-Net benchmarked datasets. Euclidean distance has been used to measure the similarity between pairs of feature vectors with the age gap. Experiments results show an improvement in the validation accuracy conducted on the FG-NET database, which it reached 100%, while with MORPH database the validation accuracy is 99.8%. The proposed method has better performance and higher accuracy than current state-of-the-art methods.
ZERNIKE MOMENT-BASED FEATURE EXTRACTION FOR FACIAL RECOGNITION OF IDENTICAL T...ijcseit
Face recognition is one of the most challenging problems in the domain of image processing and machine
vision. The face recognition system is critical when individuals have very similar biometric signature such
as identical twins. In this paper, new efficient facial-based identical twins recognition is proposed
according to geometric moment. The utilized geometric moment is Zernike Moment (ZM) as a feature
extractor inside the facial area of identical twins images. Also, the facial area in an image is detected using
AdaBoost approach. The proposed method is evaluated on two datasets, Twins Days Festival and Iranian
Twin Society which contain scaled and rotated facial images of identical twins in different illuminations.
The results prove the ability of proposed method to recognize a pair of identical twins. Also, results show
that the proposed method is robust to rotation, scaling and changing illumination.
FACIAL AGE ESTIMATION USING TRANSFER LEARNING AND BAYESIAN OPTIMIZATION BASED...sipij
Age estimation of unrestricted imaging circumstances has attracted an augmented recognition as it is
appropriate in several real-world applications such as surveillance, face recognition, age synthesis, access
control, and electronic customer relationship management. Current deep learning-based methods have
displayed encouraging performance in age estimation field. Males and Females have a variable type of
appearance aging pattern; this results in age differently. This fact leads to assuming that using gender
information may improve the age estimator performance. We have proposed a novel model based on
Gender Classification. A Convolutional Neural Network (CNN) is used to get Gender Information, then
Bayesian Optimization is applied to this pre-trained CNN when fine-tuned for age estimation task.
Bayesian Optimization reduces the classification error on the validation set for the pre-trained model.
Extensive experiments are done to assess our proposed model on two data sets: FERET and FG-NET. The
experiments’ result indicates that using a pre-trained CNN containing Gender Information with Bayesian
Optimization outperforms the state of the arts on FERET and FG-NET data sets with a Mean Absolute
Error (MAE) of 1.2 and 2.67 respectively.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Implementation of user authentication as a service for cloud networkSalam Shah
There are so many security risks for the users of cloud computing, but still the organizations are switching towards the cloud. The cloud provides data protection and a huge amount of memory usage remotely or virtually. The organization has not adopted the cloud computing completely due to some security issues. The research in cloud computing has more focus on privacy and security in the new categorization attack surface. User authentication is the additional overhead for the companies besides the management of availability of cloud services. This paper is based on the proposed model to provide central authentication technique so that secured access of resources can be provided to users instead of adopting some unordered user authentication techniques. The model is also implemented as a prototype.
Multi Local Feature Selection Using Genetic Algorithm For Face IdentificationCSCJournals
Face recognition is a biometric authentication method that has become more significant and relevant in recent years. It is becoming a more mature technology that has been employed in many large scale systems such as Visa Information System, surveillance access control and multimedia search engine. Generally, there are three categories of approaches for recognition, namely global facial feature, local facial feature and hybrid feature. Although the global facial-based feature approach is the most researched area, this approach is still plagued with many difficulties and drawbacks due to factors such as face orientation, illumination, and the presence of foreign objects. This paper presents an improved offline face recognition algorithm based on a multi-local feature selection approach for grayscale images. The approach taken in this work consists of five stages, namely face detection, facial feature (eyes, nose and mouth) extraction, moment generation, facial feature classification and face identification. Subsequently, these stages were applied to 3065 images from three distinct facial databases, namely ORL, Yale and AR. The experimental results obtained have shown that recognition rates of more than 89% have been achieved as compared to other global-based features and local facial-based feature approaches. The results also revealed that the technique is robust and invariant to translation, orientation, and scaling.
Happiness Expression Recognition at Different Age ConditionsEditor IJMTER
Recognition of different internal emotions of human face under various critical
conditions is a difficult task. Facial expression recognition with different age variations is
considered in this study. This paper emphasizes on recognition of facial expression like
happiness mood of nine persons using subspace methods. This paper mainly focuses on new
robust subspace method which is based on Proposed Euclidean Distance Score Level Fusion
(PEDSLF) using PCA, ICA, SVD methods. All these methods and new robust method is
tested with FGNET database. An automatic recognition of facial expressions is being carried
out. Comparative analysis results surpluses PEDSLF method is more accurate for happiness
emotional facial expression recognition.
FACIAL EXTRACTION AND LIP TRACKING USING FACIAL POINTSijcseit
Automatic facial feature extraction is one of the most important and attempted problems in computer
vision. It is a necessary step in face recognition, facial image compression. There are many methods have
been proposed in the literature for the facial feature extraction task. However, all of them have still
disadvantage such as not complete reflection about face structure, face texture. In this paper, we propose
a method for fast and accurate extraction of feature points such as eyes, nose, mouth, eyebrows and the
like from dynamic images with the purpose of face recognition. These methods are far from satisfactory
in terms of extraction accuracy and processing speed. The proposed method achieves high position
accuracy at a low computing cost by combining shape extraction with geometric features of facial images
like eyes, nose, mouth etc. In this paper, a facial expressions synthesis system, based on the facial points
tracking in the frontal image sequences. Selected facial points are automatically tracked using a crosscorrelation based optical flow. The proposed synthesis system uses a simple facial features model with a
few set of control points that can be tracked in original facial image sequences.
Facial Expression Recognition Based on Facial Motion Patternsijeei-iaes
Facial expression is one of the most powerful and direct mediums embedded in human beings to communicate with other individuals’ feelings and abilities. In recent years, many surveys have been carried on facial expression analysis. With developments in machine vision and artificial intelligence, facial expression recognition is considered a key technique of the developments in computer interaction of mankind and is applied in the natural interaction between human and computer, machine vision and psycho- medical therapy. In this paper, we have developed a new method to recognize facial expressions based on discovering differences of facial expressions, and consequently appointed a unique pattern to each single expression.by analyzing the image by means of a neighboring window on it, this recognition system is locally estimated. The features are extracted as binary local features; and according to changes in points of windows, facial points get a directional motion per each facial expression. Using pointy motion of all facial expressions and stablishing a ranking system, we delete additional motion points that decrease and increase, respectively, the ranking size and strenghth. Classification is provided according to the nearest neighbor. In the conclusion of the paper, the results obtained from the experiments on tatal data of Cohn-Kanade demonstrate that our proposed algorithm, compared to previous methods (hierarchical algorithm combined with several features and morphological methods as well as geometrical algorithms), has a better performance and higher reliability.
Statistical Models for Face Recognition System With Different Distance MeasuresCSCJournals
Face recognition is one of the challenging applications of image processing. Robust face recognition algorithm should posses the ability to recognize identity despite many variations in pose, lighting and appearance. Principle Component Analysis (PCA) method has a wide application in the field of image processing for dimension reduction of the data. But these algorithms have certain limitations like poor discriminatory power and ability to handle large computational load. This paper proposes a face recognition techniques based on PCA with Gabor wavelets in the preprocessing stage and statistical modeling methods like LDA and ICA for feature extraction. The classification for the proposed system is done using various distance measure methods like Euclidean Distance(ED), Cosine Distance (CD), Mahalanobis Distance (MHD) methods and the recognition rate were compared for different distance measures. The proposed method has been successfully tested on ORL face data base with 400 frontal images corresponding to 40 different subjects which are acquired under variable illumination and facial expressions. It is observed from the results that use of PCA with Gabor filters and features extracted through ICA method gives a recognition rate of about 98% when classified using Mahalanobis distance classifier. This recognition rate stands better than the conventional PCA and PCA + LDA methods employing other and classifier techniques.
3-D Face Recognition Using Improved 3D Mixed TransformCSCJournals
This paper deals with the using of Improved 3D Mixed Transform (3D-IMT) for face recognition problem. The mixed transform consists; Fourier based 3D radon transform plus 1-D Wavelet transform (which is also known as 3D Ridgelet transform). The Mixed Transform is improved by using Particle swarm optimization ( PSO) , the improvement involves the selection of the best of directions for smart rectangle-to-polar transform as a part of the 3D Radon Transformation. The 3D-IMT is applied to the 3D representation of face images, and yields a few number of features, these features is projected into the maximized projection that achieves good recognition rate using the Linear Discriminant Analysis (LDA).
Identifying Gender from Facial Parts Using Support Vector Machine ClassifierEditor IJCATR
Gender classification can be stated as inferring female or male from a collection of facial images. There exist different
methods for gender classification, such as gait, iris, hand shape and hair, it is probably better way to find out gender based on facial
features. In this paper SVM basic kernel function has been employed firstly to detect and classify the human gender Image into
two labels i.e. (1) male and (2) female. The gender classifier achieves over 96% accuracy.
Independent Component Analysis of Edge Information for Face RecognitionCSCJournals
In this paper we address the problem of face recognition using edge information as independent components. The edge information is obtained by using Laplacian of Gaussian (LoG) and Canny edge detection methods then preprocessing is done by using Principle Component analysis (PCA) before applying the Independent Component Analysis (ICA) algorithm for training of images. The independent components obtained by ICA algorithm are used as feature vectors for classification. The Euclidean distance and Mahalanobis distance classifiers are used for testing of images. The algorithm is tested on two different databases of face images for variation in illumination and facial poses up to 180 degree rotation angle.
FACE VERIFICATION ACROSS AGE PROGRESSION USING ENHANCED CONVOLUTION NEURAL NE...sipij
This paper proposes a deep learning method for facial verification of aging subjects. Facial aging is a texture and shape variations that affect the human face as time progresses. Accordingly, there is a demand to develop robust methods to verify facial images when they age. In this paper, a deep learning method based on GoogLeNet pre-trained convolution network fused with Histogram Orientation Gradient (HOG) and Local Binary Pattern (LBP) feature descriptors have been applied for feature extraction and classification. The experiments are based on the facial images collected from MORPH and FG-Net benchmarked datasets. Euclidean distance has been used to measure the similarity between pairs of feature vectors with the age gap. Experiments results show an improvement in the validation accuracy conducted on the FG-NET database, which it reached 100%, while with MORPH database the validation accuracy is 99.8%. The proposed method has better performance and higher accuracy than current state-of-the-art methods.
ZERNIKE MOMENT-BASED FEATURE EXTRACTION FOR FACIAL RECOGNITION OF IDENTICAL T...ijcseit
Face recognition is one of the most challenging problems in the domain of image processing and machine
vision. The face recognition system is critical when individuals have very similar biometric signature such
as identical twins. In this paper, new efficient facial-based identical twins recognition is proposed
according to geometric moment. The utilized geometric moment is Zernike Moment (ZM) as a feature
extractor inside the facial area of identical twins images. Also, the facial area in an image is detected using
AdaBoost approach. The proposed method is evaluated on two datasets, Twins Days Festival and Iranian
Twin Society which contain scaled and rotated facial images of identical twins in different illuminations.
The results prove the ability of proposed method to recognize a pair of identical twins. Also, results show
that the proposed method is robust to rotation, scaling and changing illumination.
FACIAL AGE ESTIMATION USING TRANSFER LEARNING AND BAYESIAN OPTIMIZATION BASED...sipij
Age estimation of unrestricted imaging circumstances has attracted an augmented recognition as it is
appropriate in several real-world applications such as surveillance, face recognition, age synthesis, access
control, and electronic customer relationship management. Current deep learning-based methods have
displayed encouraging performance in age estimation field. Males and Females have a variable type of
appearance aging pattern; this results in age differently. This fact leads to assuming that using gender
information may improve the age estimator performance. We have proposed a novel model based on
Gender Classification. A Convolutional Neural Network (CNN) is used to get Gender Information, then
Bayesian Optimization is applied to this pre-trained CNN when fine-tuned for age estimation task.
Bayesian Optimization reduces the classification error on the validation set for the pre-trained model.
Extensive experiments are done to assess our proposed model on two data sets: FERET and FG-NET. The
experiments’ result indicates that using a pre-trained CNN containing Gender Information with Bayesian
Optimization outperforms the state of the arts on FERET and FG-NET data sets with a Mean Absolute
Error (MAE) of 1.2 and 2.67 respectively.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Implementation of user authentication as a service for cloud networkSalam Shah
There are so many security risks for the users of cloud computing, but still the organizations are switching towards the cloud. The cloud provides data protection and a huge amount of memory usage remotely or virtually. The organization has not adopted the cloud computing completely due to some security issues. The research in cloud computing has more focus on privacy and security in the new categorization attack surface. User authentication is the additional overhead for the companies besides the management of availability of cloud services. This paper is based on the proposed model to provide central authentication technique so that secured access of resources can be provided to users instead of adopting some unordered user authentication techniques. The model is also implemented as a prototype.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
A study of techniques for facial detection and expression classificationIJCSES Journal
Automatic recognition of facial expressions is an important component for human-machine interfaces. It
has lot of attraction in research area since 1990's.Although humans recognize face without effort or
delay, recognition by a machine is still a challenge. Some of its challenges are highly dynamic in their
orientation, lightening, scale, facial expression and occlusion. Applications are in the fields like user
authentication, person identification, video surveillance, information security, data privacy etc. The
various approaches for facial recognition are categorized into two namely holistic based facial
recognition and feature based facial recognition. Holistic based treat the image data as one entity without
isolating different region in the face where as feature based methods identify certain points on the face
such as eyes, nose and mouth etc. In this paper, facial expression recognition is analyzed with various
methods of facial detection,facial feature extraction and classification.
Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters IJERA Editor
The Biometrics is used to recognize a person effectively compared to traditional methods of identification. In this paper, we propose a Face recognition based on Single Tree Wavelet Transform (STWT) and Dual Tree Complex Wavelet transform (DTCWT). The Face Images are preprocessed to enhance quality of the image and resize. DTCWT and STWT are applied on face images to extract features. The Euclidian distance is used to compare features of database image with test face images to compute performance parameters. The performance of STWT is compared with DTCWT. It is observed that the DTCWT gives better results compared to STWT technique.
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...sipij
The physiological biometric trait face images are used to identify a person effectively. In this paper, we
propose compression based face recognition using transform domain features fused at matching level. The
2D images are converted into 1-D vectors using mean to compress number of pixels. The Fast Fourier
Transform (FFT) and Discrete Wavelet Transform (DWT) are used to extract features. The low and high
frequency coefficients of DWT are concatenated to obtained final DWT features. The performance
parameters are computed by comparing database and test image features of FFT and DWT using Euclidian
Distance (ED). The performance parameters of FFT and DWT are fused at matching level to obtain better
results. It is observed that the performance of proposed method is better than the existing methods.
Feature extraction and classification methods of facial expression: A sureyCSITiaesprime
Facial Expression is a significant role in affective computing and one of the non-verbal communication for human computer interaction. Automatic recognition of human affects has become more challenging and interesting problem in recent years. Facial Expression is the significant features to recognize the human emotion in human daily life. Facial expression recognition system (FERS) can be developed for the application of human affect analysis, health care assessment, distance learning, driver fatigue detection and human computer interaction. Basically, there are three main components to recognize the human facial expression. They are face or face’s components detection, feature extraction of face image, classification of expression. The study proposed the methods of feature extraction and classification for FER.
Age Estimation And Gender Prediction Using Convolutional Neural Network.pptxBulbul Agrawal
Identifying the attributes of humans such as age, gender, ethnicity, emotions etc. using computer vision have been given increased attention in recent years. Such attributes can play an important role in many applications such as human-computer interaction, surveillance, searching, biometrics, sale of product, entertainment, and cosmetology. Generally, it is possible to classify human life into one of four age groups: Children, Young, Adult, and Old. The image of a person’s face exhibits many variations which may affect the ability of a computer vision system to recognize the gender. In this dissertation, we evaluate the CNN architecture along with the PCA for gaining good performance.
An Efficient Face Recognition Using Multi-Kernel Based Scale Invariant Featur...CSCJournals
Face recognition has gained significant attention in research community due to its wide range of commercial and law enforcement applications. Due to the developments in the past few decades, in the current scenario, face recognition is employing advanced feature identification techniques and matching methods. In spite of vast research done, face recognition still remains an open problem due to the challenges posed by illumination, occlusions, pose variation, scaling, etc. This paper is aimed at proposing a face recognition technique with high accuracy. It focuses on face recognition based on improved SIFT algorithm. In the proposed approach, the face features are extracted using a novel multi-kernel function (MKF) based SIFT technique. The classification is done using SVM classifier. Experimental results shows the superiority of the proposed algorithm over the SIFT technique. Evaluation of the proposed approach is done on CVL face database and experimental results shows that the proposed approach has a recognition rate of 99%.
Multimodal Approach for Face Recognition using 3D-2D Face Feature FusionCSCJournals
3D Face recognition has been an area of interest among researchers for the past few decades especially in pattern recognition. The main advantage of 3D Face recognition is the availability of geometrical information of the face structure which is more or less unique for a subject. This paper focuses on the problems of person identification using 3D Face data. Use of unregistered 3D Face data for feature extraction significantly increases the operational speed of the system with huge database enrollment. In this work, unregistered 3D Face data is fed to a classifier in multiple spectral representations of the same data. Discrete Fourier Transform (DFT) and Discrete Cosine Transform (DCT) are used for the spectral representations. The face recognition accuracy obtained when the feature extractors are used individually is evaluated. The use of depth information alone in different spectral representation was not sufficient to increase the recognition rate. So a fusion of texture and depth information of face is proposed. Fusion of the matching scores proves that the recognition accuracy can be improved significantly by fusion of scores of multiple representations. FRAV3D database is used for testing the algorithm.
National Flags Recognition Based on Principal Component Analysisijtsrd
Recognizing an unknown flag in a scene is challenging due to the diversity of the data and to the complexity of the identification process. And flags are associated with geographical regions, countries and nations. But flag identification of different countries is a challenging and difficult task. Recognition of an unknown flag image in a scene is challenging due to the diversity of the data and to the complexity of the identification process. The aim of the study is to propose a feature extraction based recognition system for Myanmar's national flag. Image features are acquired from the region and state of flags which are identified by using principal component analysis PCA . PCA is a statistical approach used for reducing the number of features in National flags recognition system. Soe Moe Myint | Moe Moe Myint | Aye Aye Cho "National Flags Recognition Based on Principal Component Analysis" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26775.pdfPaper URL: https://www.ijtsrd.com/other-scientific-research-area/other/26775/national-flags-recognition-based-on-principal-component-analysis/soe-moe-myint
Face Verification Across Age Progression using Enhanced Convolution Neural Ne...sipij
This paper proposes a deep learning method for facial verification of aging subjects. Facial aging is a
texture and shape variations that affect the human face as time progresses. Accordingly, there is a demand
to develop robust methods to verify facial images when they age. In this paper, a deep learning method
based on GoogLeNet pre-trained convolution network fused with Histogram Orientation Gradient (HOG)
and Local Binary Pattern (LBP) feature descriptors have been applied for feature extraction and
classification
Region based elimination of noise pixels towards optimized classifier models ...IJERA Editor
The extraction of the skin pixels in a human image and rejection of non-skin pixels is called the skin segmentation. Skin pixel detection is the process of extracting the skin pixels in a human image which is typically used as a pre-processing step to extract the face regions from human image. In past, there are several computer vision approaches and techniques have been developed for skin pixel detection. In the process of skin detection, given pixels are been transformed into an appropriate color space such as RGB, HSV etc. And then skin classifier model have been applied to label the pixel into skin or non-skin regions. Here in this research a “Region based elimination of noise pixels and performance analysis of classifier models for skin pixel detection applied on human images” would be performed which involve the process of image representation in color models, elimination of non-skin pixels in the image, and then pre-processing and cleansing of the collected data, feature selection of the human image and then building the model for classifier. In this research and implementation of skin pixels classifier models are proposed with their comparative performance analysis. The definition of the feature vector is simply the selection of skin pixels from the human image or stack of human images. The performance is evaluated by comparing and analysing skin colour segmentation algorithms. During the course of research implementation, efforts are iterative which help in selection of optimized skin classifier based on the machine learning algorithms and their performance analysis.
Face Images Database Indexing for Person Identification ProblemCSCJournals
Face biometric data are with high dimensional features and hence, traditional searching techniques are not applicable to retrieve them. As a consequence, it is an issue to identify a person with face data from a large pool of face database in real-time. This paper addresses this issue and proposes an indexing technique to narrow down the search space. We create a two level index space based on the SURF key points and divide the index space into a number of cells. We define a set of hash functions to store the SURF descriptors of a face image into the cell. The SURF descriptors within an index cell are stored into kd-tree. A candidate set is retrieved from the index space by applying the same hash functions on the query key points and kd-tree based nearest neighbor searching. Finally, we rank the retrieved candidates according to their occurrences. We have done our experiment with three popular face databases namely, FERET, FRGC and CalTech face databases and achieved 95.57%, 97.00% and 92.31% hit rate with 7.90%, 12.55% and 23.72% penetration rate for FERET, FRGC and CalTech databases, respectively. The hit rate increases to 97.78%, 99.36% and 100% for FERET, FRGC and CalTech databases, respectively when we consider top fifty ranks. Further, in our proposed approach, it is possible to retrieve a set of face templates similar with query template in the order of milliseconds. From the experimental results we can substantiate that application of indexing using hash function on SURF key points is effective for fast and accurate face image retrieval.
Age Invariant Face Recognition using Convolutional Neural Network IJECEIAES
In the recent years, face recognition across aging has become very popular and challenging task in the area of face recognition. Many researchers have contributed in this area, but still there is a significant gap to fill in. Selection of feature extraction and classification algorithms plays an important role in this area. Deep Learning with Convolutional Neural Networks provides us a combination of feature extraction and classification in a single structure. In this paper, we have presented a novel idea of 7-Layer CNN architecture for solving the problem of aging for recognizing facial images across aging. We have done extensive experimentations to test the performance of the proposed system using two standard datasets FGNET and MORPH (Album II). Rank-1 recognition accuracy of our proposed system is 76.6% on FGNET and 92.5% on MORPH (Album II). Experimental results show the significant improvement over available state-of- the-arts with the proposed CNN architecture and the classifier.
Similar to Critical evaluation of frontal image based gender classification techniques (20)
A robust technique of brain mri classification using color features and k nea...Salam Shah
The analysis of MRI images is a manual process carried by experts which need to be automated to accurately classify the normal and abnormal images. We have proposed a reduced, three staged model having pre-processing, feature extraction and classification steps. In preprocessing the noise has been removed from grayscale images using a median filter, and then grayscale images have been converted to color (RGB) images. In feature extraction, red, green and blue channels from each channel of the RGB has been extracted because they are so much informative and easier to process. The first three color moments mean, variance, and skewness are calculated for each red, green and blue channel of images. The features extracted in the feature extraction stage are classified into normal and abnormal with K-Nearest Neighbors (k-NN). This method is applied to 100 images (70 normal, 30 abnormal). The proposed method gives 98.00% training and 95.00% test accuracy with datasets of normal images and 100% training and 90.00% test accuracy with abnormal images. The average computation time for each image was .06s.
An offline signature verification using pixels intensity levelsSalam Shah
Offline signature recognition has great importance in our day to day activities. Researchers are trying to use them as biometric identification in various areas like banks, security systems and for other identification purposes. Fingerprints, iris, thumb impression and face detection based biometrics are successfully used for identification of individuals because of their static nature. However, people’s signatures show variability that makes it difficult to recognize the original signatures correctly and to use them as biometrics. The handwritten signatures have importance in banks for cheque, credit card processing, legal and financial transactions, and the signatures are the main target of fraudulence. To deal with complex signatures, there should be a robust signature verification method in places such as banks that can correctly classify the signatures into genuine or forgery to avoid financial frauds. This paper, presents a pixels intensity level based offline signature verification model for the correct classification of signatures. To achieve the target, three statistical classifiers; Decision Tree (J48), probability based Naïve Bayes (NB tree) and Euclidean distance based k-Nearest Neighbor (IBk), are used.
For comparison of the accuracy rates of offline signatures with online signatures, three classifiers were applied on online signature database and achieved a 99.90% accuracy rate with decision tree (J48), 99.82% with Naïve Bayes Tree and 98.11% with K-Nearest Neighbor (with 10 fold cross validation). The results of offline signatures were 64.97% accuracy rate with decision tree (J48), 76.16% with Naïve Bayes Tree and 91.91% with k-Nearest Neighbor (IBk) (without forgeries). The accuracy rate dropped with the inclusion of forgery signatures as, 55.63% accuracy rate with decision tree (J48), 67.02% with Naïve Bayes Tree and 88.12% (with forgeries).
Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...Salam Shah
Cloud computing has attracted users due to high speed and bandwidth of the internet. The e-commerce systems are best utilizing the cloud computing. The cloud can be accessed by a password and username and is completely dependent upon the internet. The threats to confidentiality, integrity, authentication and other vulnerabilities that are associated with the internet are also associated with cloud. The internet and cloud can be secured from threats by ensuring proper security and authorization. The channel between user and cloud server must be secured with a proper authorization mechanism. The research has been carried out and different models have been proposed by the authors to ensure the security of clouds. In this paper, we have critically analyzed the already published literature on the security and authorization of the internet and cloud.
Testing desktop application police station information management systemSalam Shah
The police stations have adequate importance in the society to control the law and order situations of the country. In Pakistan, police stations manage criminal records and information manually. We have previously developed and improved a desktop application for the record keeping of the different registers of the police stations. The data of police stations is sensitive and that need to be handled within secured and fully functional software to avoid any unauthorized access. For the proper utilization of the newly developed software, it is necessary to test and analyze the system before deployment into the real environment. In this paper, we have performed the testing of an application. For this purpose, we have used Ranorex, automated testing tool for the functional and performance testing, and reported the results of test cases as pass or fail.
Navigation through citation network based on content similarity using cosine ...Salam Shah
The rate of scientific literature has been increased in the past few decades; new topics and information is added in the form of articles, papers, text documents, web logs, and patents. The growth of information at rapid rate caused a tremendous amount of additions in the current and past knowledge, during this process, new topics emerged, some topics split into many other sub-topics, on the other hand, many topics merge to formed single topic. The selection and search of a topic manually in such a huge amount of information have been found as an expensive and workforce-intensive task. For the emerging need of an automatic process to locate, organize, connect, and make associations among these sources the researchers have proposed different techniques that automatically extract components of the information presented in various formats and organize or structure them. The targeted data which is going to be processed for component extraction might be in the form of text, video or audio. The addition of different algorithms has structured information and grouped similar information into clusters and on the basis of their importance, weighted them. The organized, structured and weighted data is then compared with other structures to find similarity with the use of various algorithms. The semantic patterns can be found by employing visualization techniques that show similarity or relation between topics over time or related to a specific event. In this paper, we have proposed a model based on Cosine Similarity Algorithm for citation network which will answer the questions like, how to connect documents with the help of citation and content similarity and how to visualize and navigate through the document.
Risk management of telecommunication and engineering laboratorySalam Shah
The Telecommunication laboratory plays an important role in carrying out research in the different fields like Telecommunication, Information Technology, Wireless Sensor Networks, Mobile Networks and many other fields. Every Engineering University has a setup of laboratories for students particularly for Ph.D. scholars to work on the performance analysis of different Telecommunication Networks including WLANs, 3G/4G, and Long Term Evolution (LTE). The laboratories help students to have hand on practice on the theoretical concepts they have learned during the teachings at the university. The technical subjects have a practical part also which boosts the knowledge of students and learning of new ideas. The Telecommunication and Engineering laboratories are equipped with different electronic equipment’s like digital trainers, simulators etc. and some additional supportive devices like computers, air conditioners, projectors, and large screens, with power backup facility that creates the perfect environment for experimentation. The setup of Telecommunication and Engineering laboratories cost huge amount, required to purchase equipment, and maintain the equipment. In any working environment risk factor is involved. To handle and avoid risks there must be risk management policy to tackle with accidents and other damages during working in the laboratory, may it be human or equipment at risk. In this paper, we have proposed a risk management policy for the Telecommunication and Engineering laboratories, which can be generalized for similar type of laboratories in engineering fields of studies.
An evaluation of automated tumor detection techniques of brain magnetic reson...Salam Shah
Image processing is a technique developed by computer and Information technology scientist and being used in all field of research including medical sciences. The focus of this paper is the use of image processing in tumor detection from the brain Magnetic Resonance Imaging (MRI). For the brain tumor detection, Computed Tomography (CT) and Magnetic Resonance Imaging (MRI) are the prominent imaging techniques, but most of the experts prefer MRI over CT. The traditional method of tumor detection in MRI images is a manual inspection which provides variations in the results when analyzed by different experts, therefore, in view of the limitations of the manual analysis of MRI, there is a need for an automated system that can produce globally acceptable and accurate results. There is enough amount of published literature available to replace the manual inspection process of MRI images with the digital computer system using image processing techniques. In this paper, we have provided a review of digital image processing techniques in the context of brain MRI processing and critically analyzed them for the identification of the gaps and limitations of the techniques so that the gaps can be filled and limitations of various techniques can be improved for precise and better results.
An appraisal of offline signature verification techniquesSalam Shah
Biometrics is being commonly used nowadays for the identification and verification of humans everywhere in the world. In biometrics humans unique characteristics like palm, fingerprints, iris etc. are being used. Pattern Recognition and image processing are the major areas where research on signature verification is carried out. Hand written Signature of an individual is also unique and for identification of humans are being used and accepted specially in the banking and other financial transactions. The hand written signatures due to its importance are at target of fraudulence. In this paper we have surveyed different papers on techniques that are currently used for the identification and verification of Offline signatures.
An application development for police stations in pakistanSalam Shah
Program slice is the part of program that may take the program off the path of the
desired output at some point of its execution. Such point is known as the slicing criterion.
This point is generally identified at a location in a given program coupled with the subset
of variables of program. This process in which program slices are computed is called
program slicing. Weiser was the person who gave the original definition of program slice
in 1979. Since its first definition, many ideas related to the program slice have been
formulated along with the numerous numbers of techniques to compute program slice.
Meanwhile, distinction between the static slice and dynamic slice was also made.
Program slicing is now among the most useful techniques that can fetch the particular
elements of a program which are related to a particular computation. Quite a large
numbers of variants for the program slicing have been analyzed along with the
algorithms to compute the slice. Model based slicing split the large architectures of
software into smaller sub models during early stages of SDLC. Software testing is
regarded as an activity to evaluate the functionality and features of a system. It verifies
whether the system is meeting the requirement or not. A common practice now is to
extract the sub models out of the giant models based upon the slicing criteria. Process of
model based slicing is utilized to extract the desired lump out of slice diagram. This
specific survey focuses on slicing techniques in the fields of numerous programing
paradigms like web applications, object oriented, and components based. Owing to the
efforts of various researchers, this technique has been extended to numerous other
platforms that include debugging of program, program integration and analysis, testing
and maintenance of software, reengineering, and reverse engineering. This survey
portrays on the role of model based slicing and various techniques that are being taken
on to compute the slices.
A review of slicing techniques in software engineeringSalam Shah
Program slice is the part of program that may take the program off the path of the
desired output at some point of its execution. Such point is known as the slicing criterion.
This point is generally identified at a location in a given program coupled with the subset
of variables of program. This process in which program slices are computed is called
program slicing. Weiser was the person who gave the original definition of program slice
in 1979. Since its first definition, many ideas related to the program slice have been
formulated along with the numerous numbers of techniques to compute program slice.
Meanwhile, distinction between the static slice and dynamic slice was also made.
Program slicing is now among the most useful techniques that can fetch the particular
elements of a program which are related to a particular computation. Quite a large
numbers of variants for the program slicing have been analyzed along with the
algorithms to compute the slice. Model based slicing split the large architectures of
software into smaller sub models during early stages of SDLC. Software testing is
regarded as an activity to evaluate the functionality and features of a system. It verifies
whether the system is meeting the requirement or not. A common practice now is to
extract the sub models out of the giant models based upon the slicing criteria. Process of
model based slicing is utilized to extract the desired lump out of slice diagram. This
specific survey focuses on slicing techniques in the fields of numerous programing
paradigms like web applications, object oriented, and components based. Owing to the
efforts of various researchers, this technique has been extended to numerous other
platforms that include debugging of program, program integration and analysis, testing
and maintenance of software, reengineering, and reverse engineering. This survey
portrays on the role of model based slicing and various techniques that are being taken
on to compute the slices.
A model for handling overloading of literature review process for social scienceSalam Shah
Literature review is an excruciating part in the process of research. It requires an analysis of
published material on the topic on interest. Moreover, for a new researcher, it is challenging
extract a great number of required objectives, including the problem identification,
no more great deal in this era of Information and Communication Technology (ICT), instead
overloading of the literature is a major problem and the great change to be handle. Often
postgraduate research students raise three questions to their peers and supervisors. First, how
many articles are sufficed for a good literature review? Second, how many past years
literature will be enough to meet the required level for a good literature review? And third,
this research paper a novel hypothetical model is proposed to answer first two questions; the
number of articles required for a good and reasonable literature review and number of years
backward the analysis of articles required for the same. Our results indicate that analysis of
data partially support our hypothetical model and its assumptions.
Keywords: literature review; hypothetical model; load reduction; proposal writing;
information systems.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...NelTorrente
In this research, it concludes that while the readiness of teachers in Caloocan City to implement the MATATAG Curriculum is generally positive, targeted efforts in professional development, resource distribution, support networks, and comprehensive preparation can address the existing gaps and ensure successful curriculum implementation.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
Critical evaluation of frontal image based gender classification techniques
1. International Journal of Signal Processing, Image Processing and Pattern Recognition
Vol.9, No.10, (2016), pp.313-324
http://dx.doi.org/10.14257/ijsip.2016.9.10.27
ISSN: 2005-4254 IJSIP
Copyright ⓒ 2016 SERSC
Critical Evaluation of Frontal Image-Based Gender Classification
Techniques
Hira Khalid Khan1
, Abdul Salam Shah2*
and Muhammad Asim Khan3
1,2
SZABIST, Islamabad, Pakistan
3
FUUAST, Islamabad, Pakistan
1
somefragrance6@gmail.com, 2*
shahsalamss@gmail.com,
3
m.asimkhattak@gmail.com
Abstract
The face describes the personality of humans and has adequate importance in the
identification and verification process. The human face provides, information as age,
gender, face expression and ethnicity. Research has been carried out in the area of face
detection, identification, verification, and gender classification to correctly identify
humans. The focus of this paper is on gender classification, for which various methods
have been formulated based on the measurements of face features. An efficient technique
of gender classification helps in accurate identification of a person as male or female and
also enhances the performance of other applications like Computer-User Interface,
Investigation, Monitoring, Business Profiling and Human Computer Interaction (HCI). In
this paper, the most prominent gender classification techniques have been evaluated in
terms of their strengths and limitations.
Keywords: Gender Classification, Face Detection, Face Images, Discrete Wavelet
Transform (DWT), Human Computer Interaction (HCI), Support Vector Machine (SVM),
Principal Component Analysis (PCA)
1. Introduction
The Gender classification is the dynamic areas of research in image processing
and design recognition and presently, most of the work in this research area turns
around a frontal face image based classification. Gender classification is the process
to cluster male and female according to their category on the basis of identical
features of the face. Humans can easily distinguish between the genders by
observing the faces. The way they behave and interact with each other in the society
depends on the identification of the gender they meet. For the identification and
observation of the faces, humans can easily collect information such as face-
expression, feelings, and the estimation of age [1]. Humans can also identify the
gender accurately although if the male or female face is scratched. The gender
classification is a key problem for the machines like MRI Classification, Signature
Verification and Pattern recognition problems [2-3]. The computerized gender
classification is gaining much popularity because of rapid development in the fields
of the internet, human-computer interaction, Introduction of an electronic system in
banking and commerce, security [4-5]. Researchers have introduced different
techniques of gender classification based on the pixels and other features. A picture
is composed of thousands of pixels. Pixel-based techniques are slow as compared to
feature-based techniques. If insufficient face features are used, then the best face
feature classifier will be unable to accomplish a higher accuracy rate.
*Corresponding Author
O
nline
Version
O
nly.
Book
m
ade
by
this
file
is
ILLEG
AL.
2. International Journal of Signal Processing, Image Processing and Pattern Recognition
Vol. 9, No. 10, (2016)
314 Copyright ⓒ 2016 SERSC
Geometric based face features like eyes, nose, and chin, makes the system further
stable and is able to support changes of face expressions, brightness and poses [6].
The features are of two types; appearance-based and geometric-based. The
methods/models focusing on apparent features such as raw pixels, Haar-like
features, LBP features, have observed higher growth due to the manageability of
unchecked variants. Geometrical features relate to features that depend on
association such as the area, angle, distance and other measurements between
features of the face [7].
Normally every model has following three stages; pre-processing, features
extraction and classification as shown in Figure 1.
Figure 1. Gender Classification Steps
In this paper we will analyze each step of already proposed model, and identify
their limitations. The structure of the remaining paper is organized as; the Literature
Review is presented in Section 2, the Critical Evaluation table is provided in the
Section 3, and finally the Conclusion and Future work is provided in the Section 4.
2. Literature Review
Dey et. al., in [8] proposed gender detection technique. In the first step
identification of face area from a given input image has been carried out. The
detected facial area is then classified for the gender of the face. The proposed
method has four main concepts; Haar Features or Simple Rectangular face features,
Important Image for quick face recognition, Adaboost algorithm for the machine
learning method, and a Cascaded-Classifier for combining many characteristics
efficiently. The Region of Interest (ROI) from the image is selected and passed
through a Discrete Cosine Transformation (DCT) that subdivides the entire image
into sub-regions. The area outside of the ROI removed by applying the noise filter.
The histogram equalization has been used to adjust the gray scales of the image. The
Local Binary Pattern (LBP) has been used for feature extraction. The images have
been passed through the Discrete Cosine Transformation (DCT) module, for the
compression of the images and representation of an image having different
magnitudes and frequencies. They have used Gender Detection Classifier, to store
available examples and classify images based on a similarity measure. The decision
of classification is based on the hit score. The accuracy of the system is less than
70% without histogram equalization which increases up to 80% after applying
histogram equalization. This system does not work correctly with images which are
not in front sight also the angle faces decrease the performance. The system takes
less time for the detection of gender from face images. The overall accuracy of the
system is 78.91%.
Khan et. al., in [9] proposed a three stages method for grouping genders into male
and female. For the Feature Extraction authors have used geometrical
measurements. During the Classification Weka J48 classifier has been used for
training data set and generating rule set. Finally, to confirm the accuracy of
classified rule set Validation has been used. For the selection of feature-set for
training and test data a hybrid approach of gender, recognition was used. All the
numeric values have been obtained through geometrical measurements. A dataset
Pre-Processing ClassificationFeature Extraction
O
nline
Version
O
nly.
Book
m
ade
by
this
file
is
ILLEG
AL.
3. International Journal of Signal Processing, Image Processing and Pattern Recognition
Vol. 9, No. 10, (2016)
Copyright ⓒ 2016 SERSC 315
having 150 male and 150 female face images, obtained from the Stanford University
Medical Students database has been used for the training of the classifier. The image
processing distance tool of MATLAB has been used for the calculation of facial
features. The dataset of 300 images was arranged in the ".arff" file format for the
training of the J48 classifier. Later 200 more test images of the same size and
attributes were selected for the testing of classifier accuracy. The authors have used
200 female and 200 male grayscale face photos to test and train the classifier with
75% training and 25% testing percentage. The J48 generated a decision tree of 25
nodes for each image. The 13 leaf nodes represent the result of classification and
remaining 12 branch nodes of the tree explain the difference between the two
choices also known as the branching factor of the decision tree.
Nazir and Mirza, in [10] used block-based face feature selection, and face
detection. The authors have used Discrete Cosine Transformation (DCT) for the
detection of face parts in the image and Discrete Wavelet Transform (DWT) for the
better analysis of images. The important features of the image were selected by
Principal Component Analysis (PCA) instead of considering the entire input image.
The best feature can be selected from extracted face features by selecting at the first
left corner in a zigzag fashion. The dataset of images was divided into female and
male images. The image of female and male have different face expressions so the
authors have performed various experiments on Discrete Cosine Transformation and
Discrete Wavelet Transformation, by using k-NN Classifier. They have used various
values of ‘k’ to analyze the difference in accuracy. The experimental results show
that the proposed method performs better on LDA and Mahalanobis classifiers. The
classification results on the FERET database is 95.4%. The results obtained with
this technique are satisfactory with the reduced number of face features by PCA.
Ergen et. al., in [11] have used 100 male and100 female images, obtained from
Face Database (FEI). Discrete Wavelet Transform (DWT) has been used as a
preprocessing step. The features were extracted by applying Gray-Level Co-
Occurrence Matrix (GLCM). The feature group set consists of 2D wavelet transform
and GLCM. They have used SVM classifier for creating two features set. The
GLCM is the most famous methods for text analysis which uses Energy, Contrast,
Homogeneity, and Correlation for feature extraction. For each image, seven (7)
features were extracted and a feature set of 200 x 7 generated. Feature sets were
found from 103 different types of filter in which coif1 filter has a maximum result
which belongs to the Coiflet-filter family. By applying Standard Deviation, Average
and Entropy along with GLCM on the original image and 7 features were calculated
in all cases. With 200 x 7 feature set 60% result has been achieved, and with 200 x
49 feature set 89% result has been achieved.
Nazir et al., in [12] proposed efficient feature selection method for gender
classification. The histogram equalization has been used to overcome brightness
differences in the images of male and female. The input image has been divided into
the block and arranged the blocks in a zigzag order. The blocks were classified with
the k-NN classifier. The features were selected with Ada Boost algorithm. The
authors have used Discrete Cosine Transform (DCT) for image compression and for
dimension reduction. The k-NN has been used for gender classification with
Euclidean distance to find the closest neighbors. With k-NN classifier, the testing
ratio of image data set leads to 99.30% accuracy of classification.
Tin et. al., in [13] suggested a gender classification process having shape
explanation, gender classification, and feature extraction steps. The extracted
features of every face are represented in column matrix in a face image database to
find out the normal face of male and female of the same age group of facial images.
The Euclidean distance has been used to calculate the face distance of male and
female images. For the dimension reduction, Principal Component Analysis (PCA)
O
nline
Version
O
nly.
Book
m
ade
by
this
file
is
ILLEG
AL.
4. International Journal of Signal Processing, Image Processing and Pattern Recognition
Vol. 9, No. 10, (2016)
316 Copyright ⓒ 2016 SERSC
has been used. All face images of recognized faces are estimated on the face space
to pick sets of weights which describe the role of each vector. For the unknown face
of male or female a set of weights are compared to the sets of weights known as
male or female faces, through which face can be recognized. The largest eigenvalue
associated with eigenvector is used to reproduce the greatest change in the face
image and the smallest eigenvalue associated with eigenvector is used to reproduce
the small change in the face image. The weight patterns were classified to determine
the age. The age of the male or female is expected based on the smallest Euclidean
distance among the face class and each face space. The Nearest Neighbor has been
used for the classification. They have explained a gender classification technique on
the basis of 2D face images. They also applied the whole algorithm to a gender
classification structure by using a web camera. The proposed method is
implemented in a real-time prototype, the face recognition system for modified
customer uses has produced good results.
Basha et. al., in [14] applied 1-Dimensional Continuous Wavelet Transform
(CWT) method for face images, and calculated 100 wavelet measurements. The
Support Vector Machine (SVM) has been trained with 400 images having values 0
and 1 for male and female images, respectively. In the testing stage 200, images
were used. The SVM calculation rate is measured in terms of Mean Squared Error
(MSE). The feature extraction has been carried out using Discrete Wavelet
Transform, Radon Transform, and Continuous Wavelet Transform. The Wavelet
coefficient is used to represent the similarity between the image and the wavelet at
the specific scale. The Radon Transform calculates projections of a face images-
matrix with identified direction or with some given angles. These frontal face
images were with changes in expression, pose, and many illumination situations.
The main contribution of paper was to present the effects of different face feature
extraction techniques such as Discrete Wavelet Transform, Radon, and Continuous
Wavelet Transform on the Support Vector machine with Kernels such as
Polynomial, MLF, Linear, Quadratic, and RBF. The grey scale images and low-
resolution images have been used for experimentation. The Support Vector machine
performs best with Linear Kernel and CWT, which have produced only 2% error
rate and high accuracy rate is 98%. The error rate of the female images is high as
compared to the male error rate.
Bai et. al., in [15] have used from the database of the University of Essex, UK.
For classification, authors have used the Support Vector Machine (SVM). To reduce
inconsistency of randomly selected images for each person, the experimental
process was repeated for 10 folds. The standard deviation and normal classification
accuracy for each partition were calculated. While generating Universal data,
authors have investigated three different possibilities; randomly selection of one
female and one male image for training, and then calculate the average. Empirical
Distribution calculates the intensity values of each pixel (x, y) of the image training
data, in order to evaluate the 2D distribution of all pixel intensities. The Empirical
distribution is used to generate Universal samples. The authors have collected 50
images of animal faces and then manually cropped all the images which
approximately covers the portion of the image same like the human faces. The
images are also resized and converted to the format of human facial images. The
classification accuracy improved 2% to 3% by Universal generated data through
random averaging, and very small improvement approximately1% with the
empirical distribution. The use of animal faces as the Universal data reduces the
classification accuracy by 2% to 5% because the animal faces are not related to the
human faces so they have their own accuracy rate.
Tin, [16] method of gender classification based on face features extracted from
some specific face area. Extracted face features can be represented in the form of
O
nline
Version
O
nly.
Book
m
ade
by
this
file
is
ILLEG
AL.
5. International Journal of Signal Processing, Image Processing and Pattern Recognition
Vol. 9, No. 10, (2016)
Copyright ⓒ 2016 SERSC 317
column matrix. The image quality can be varied due to external conditions due to
which the approximation results are unstable. The author used k-NN classification,
which is one of the famous non-parametric methods. The k-Nearest Neighbor
classification provides a tradeoff for the scatterings of the image training data
through a priori likelihood of the involved classes. The k-NN is very robust to some
face image distortions like Rotation, brightness. The dimension reduction has been
carried out with Principal Component Analysis (PCA). The Pattern matching
activity used to pick the right and exact feature points of the face from the face
feature point, applicants. The edge existence has been measured. The correct
candidates between those detected feature points can be identified by the blob
detector by adjusting the complete frame model using energy reduction. This
method has disadvantages like no means of robust to face direction differences and
brightness abnormalities, the extraordinary cost of merging calculations, and the
dependency of detection on the initial factors. The pattern matching has been carried
out on the basis of subspace method to recognize correct face feature points. In this
pattern matching technique, edge extraction is not essential. This is similarly robust
to the noise in the image, as whole pattern information can be used. Approximately
140 face photos of various people with changed regions like European and Asian
were used. The accuracy of the proposed technique with 140 images is 96.3%. The
optimization can reduce the processing time of the proposed method.
Khan et. al., in [17], minimized the effects of illumination of the images taken
from FERET and SUMS, by histogram equalization technique. The VIOLA and
JONES method have been applied for the detection of the face. Adaboost algorithm
has been used for feature extraction. The background area was eliminated with
Adaboost classifier. DCT and LBP has been used for the calculation of appearance
and geometric information related features of the images. Experiments based on
psychology have proved that features relating to five parts of an individual face
(local features) such as eyes, mouth, eyebrows, chin, and nose are more informative
than the information of the whole face (global features). The extraction of local
features has been carried out with LBP. The optimization of extracted features has
been carried out using PSO and BA. The authors have reduced the data,
measurements, and tried to produce a best image feature set which represents a
gender's face more accurately. Using the geometric based and appearance based face
features and accuracy rate of 97.5% has been achieved with 10 geometric face
features.
Wilson et. al., in [18] have used Haar Classifiers, an algorithm based on Haar-
like features, developed by Viola and Jones, for the detection of face features. This
process takes into consideration the nearby rectangular areas of a particular spot in
the window of detection, adds up the intensity values of the pixels in these areas,
and calculates the variation between these additions. On the basis of this difference,
the selected parts of the image are classified. A set of two or more rectangles,
adjacent to each other on selected spots, make a Haar feature. The order of such
Haar-like features is termed as the classifier cascade. The transitional illustration of
the image (an integral image) has been used to calculate the rectangle features.
Integral images or Summed-area tables are defined as 2-D LUT (look up tables) in
the shape of a matrix having the same size as that of the original image. Every
element in the LUT represents a sum of pixels situated in the upper-left area of the
basic image. It helps in summing up of rectangular regions in the image. The use of
integral feature helps to calculate a Haar feature of any size in even time. The
feature calculation is efficient and very fast. Initially, for face detection, a large
number of positive and negative images are required to get the classifier trained.
Then features are extracted from it. Adaboost algorithm combined with Haar-like
feature algorithm has been used for the removal of irrelevant features. The training
O
nline
Version
O
nly.
Book
m
ade
by
this
file
is
ILLEG
AL.
6. International Journal of Signal Processing, Image Processing and Pattern Recognition
Vol. 9, No. 10, (2016)
318 Copyright ⓒ 2016 SERSC
of the classifier requires both negative and positive images. The authors have used
1500 images, taken from the front at different angles between 00
- 450
, for training
every facial feature. They trained three classifiers, one each for nose, mouth, and
eyes to be used for detecting features of the face from images selected from the
facial recognition technology database and computed the accuracy rate of the
classifier. They achieved a high detection rate except for mouth. The lower half of
the face image was considered for the detection of mouth. This method of
decreasing area for detection of features has proved more accurate. After
elimination of wrong test results around 95% percent for an eyes and nose detection
has been achieved. The mouth identification has a low accuracy rate through the
least size which is essential for detection.
Ravi et. al., [19] proposed a system that detects the face area using YCbCr skin-
color from the input image to minimize the computational complexity. The (Cb, Cr)
are chrominance and (Y) is the brightness or glow of skin color in the low and high
bright area of skin. The change in skin color is mostly due to the darkness or
fairness of the face skin. The midpoint of the gray image has been used to measure
the face boundary. The threshold of gray levels is used to measure the skin of the
face. Face feature detection, contains the face feature area assessment, Mouth and
Lip determination, Left Eye locating, Right Eye locating, and Nose estimation
stages. The classification has been carried out with the linear Support Vector
Machine (SVM) that is based on decision planes. Face image detection has been
carried out on the basis of some threshold value, if the value is greater than the
estimated threshold value, then the face is a MALE, otherwise, the image is a
FEMALE. The threshold selection is the drawback of this paper.
3. Critical Evaluation
Table 1. Critical Evaluation of Techniques
Ref.
No.
Technique Used Strengths Limitations Results
[8] DCT based facial
global face
feature
extraction.
Histogram
Equalization.
Discrete Cosine
Transformation
(DCT).
Local Binary
Pattern (LBP).
Robust to colors
effects.
Highly Accurate.
Takes less time to
detect gender
form image.
Inefficient if some
occlusion occurs.
The performance
reduces for those
facial images
which contain
glasses.
Performance
reduces with face
images which are
not in front sight.
Angle faces
decrease the
performance.
Just uses frontal
face image do not
use different
poses of faces.
It uses less than
20 milliseconds
to identify
Male/Female.
The Accuracy of
the system is
78.91%.
Without
histogram
equalization, the
accuracy is less
than 70%.
By Applying
histogram
equalization, the
performance
increases up to
80%.
[9] Gender
classification
using Decision
Trees.
J 48.
Face dimension
reduction results
in the relatively
high accuracy
rate.
The technique is
This algorithm
requires a data set
of a lot of images.
J 48 performs
complex
calculations.
With the total
number of 197
data items, the
accuracy is
98.5%.
Total 3 data
O
nline
Version
O
nly.
Book
m
ade
by
this
file
is
ILLEG
AL.
7. International Journal of Signal Processing, Image Processing and Pattern Recognition
Vol. 9, No. 10, (2016)
Copyright ⓒ 2016 SERSC 319
easy to understand
interpret and
implement.
items were
incorrectly
classified with
1.5% Error Rate.
[10] Principal
Component
Analysis (PCA).
Discrete Wavelet
Transform
(DWT).
Discrete Cosine
Transformation
(DCT).
Support Vector
Machine (SVM).
BPNN.
NMS.
NMC.
LDA.
Elimination of the
redundant face
features.
The method
performs well on
LDA and
Mahalanobis
classifiers.
Better
performance for
pose
identification, but
not suitable for
gender
classification.
The performance
of the proposed
model is
marginally lower
on the k-NN
classifier.
The accuracy of
Support Vector
Machine (SVM)
is 94.81%.
Classification
accuracy with
FERET database
is 95.35%.
[11] Gender
recognition using
Gray-Level Co-
Occurrence
Matrix (GLCM).
Discrete Wavelet
Transform
(DWT).
Local Binary
Pattern (LBP).
Coif1 Filter.
Unusual features
decrease the
similarity ratio.
Robust to classify,
and increase
reliability.
Iterative method
and time
consuming.
The result is not
as good with less
number of
features.
With 200 x 7
feature set 60%
accuracy
achieved.
With 200 x 49
feature set 89%
accuracy has
been achieved.
[12] DCT based facial
global features
extraction.
Ada Boost
algorithm.
Discrete Cosine
transform (DCT).
K-Nearest
Neighbor (k-NN).
Highly accurate.
Robust to varying
illuminations.
Adaboost can get
the high speed of
computation.
Not suitable if
some obstruction
occurs.
Adaboost suffers
from poor
classification rate.
Classification
Accuracy
99.30%.
[13] Principal
Component
Analysis (PCA).
Eigen Value.
k-Nearest
Neighbor (k-NN).
k-NN is very
compatible and
takes small
memory storage.
K-NN is highly
robust to the
twisted image like
illumination,
rotation.
The model has
small complexity
and is suitable for
real-time
applications.
The presence of
the person is
required for the
application.
Results not
clearly measured.
[14] Discrete Wavelet
Transform
(DWT).
Radon
Transform.
Fast calculation
and higher
accuracy with
male images.
The ORL face
database involves
a very small
number of facial
images of female
Only 2% error
rate and 98%
accuracy.
O
nline
Version
O
nly.
Book
m
ade
by
this
file
is
ILLEG
AL.
8. International Journal of Signal Processing, Image Processing and Pattern Recognition
Vol. 9, No. 10, (2016)
320 Copyright ⓒ 2016 SERSC
Continuous
Wavelet
Transform
(CWT).
Support Vector
Machine (SVM)
with Polynomial,
MLF, Linear,
Quadratic, and
RBF Kernels.
and does not have
occlusions.
The error rate of
the female image
is high as
compared to the
male error rate.
[15] Human face
recognition using
Inference by
Contradiction.
Linear Support
Vector Machine
(SVM).
Performance is
relatively robust
and stable.
Poorly chosen
images like
animal faces can
degrade
classification
performance.
The high
dimensionality of
data may take
more computation
time.
Generalization
performance
degrades with the
inappropriate
selection of
Universum data.
The Average
(Standard
Deviation) by
SVM with P-1,
84.4 (5.5),
P-2, 76.2 (6.0),
P-3, 82.6 (3.6),
P-4, 81.8 (4.1).
[16] Appearance
based face
features
extraction using
PCA.
Euclidean
Distance.
K-Nearest
Neighbor.
The suggested
system shows low
complexity which
can be appropriate
for real world
implementations
like real time face
animation.
Their conclusions
are stronger in the
presence of noise
and face
variations.
The output of this
method is good
robustness &
equitable accuracy
of face photos
from test images
set.
This method has
disadvantages like
no means of
robust to face
direction
differences and
brightness
abnormalities, the
extraordinary cost
of merging
calculations, and
the dependency of
detection on the
initial factors.
The processing
time can be
reduced by
optimization.
Accuracy of
96.3% with 140
images.
[17] Face feature
extractions using
Local Binary
Patterns (LBP).
Particle Swarm
Optimization
(PSO).
Histogram
Equalization.
Discrete Cosine
transform (DCT).
Data dimension
reduction by
selecting more
optimal features.
DCT
classification of
genders it has
shown very
accurate results
with minimum
costs of
PSO and BA
algorithm take
more time to
process the data
Using the
geometric based
and appearance
based face
features, 97.5%.
The accuracy rate
was achieved
while measuring
just 10 geometric
face features.
O
nline
Version
O
nly.
Book
m
ade
by
this
file
is
ILLEG
AL.
9. International Journal of Signal Processing, Image Processing and Pattern Recognition
Vol. 9, No. 10, (2016)
Copyright ⓒ 2016 SERSC 321
Bee Algorithm.
Support Vector
Machine (SVM).
Back Propagation
Neural Network.
K-Nearest
Neighbor (k-NN).
computation.
[18] Haar cascade
classifier for the
object detection.
Adaboost
algorithm.
Regionalization
can increase the
accuracy by the
elimination of
false results.
It is
comparatively
better because of
its speedy
calculation.
Cannot provide
more precise
details of the face
features for the
recognition of
human emotions.
The mouth
identification has
a low accuracy
rate through the
least size which is
essential for
detection.
After elimination
of wrong test
results around
95% percent for
the eyes and nose
detection has
been achieved.
[19] Support Vector
Machine (SVM).
YCbCr skin-
color.
Much more
accurate and can
overcome various
face variations.
Choosing the
correct threshold
value for
classification is
the problematic
part of this
research.
Results are not
properly
presented.
4. Conclusion and Future Work
In this paper, various gender classification methods proposed by authors, using
image processing techniques have been critically analyzed to point out their
deficiencies. We have observed that most of the classification techniques depend on
front face images and the main problem faced by them are facial variations. The
variations may be the change in expression, illumination, and occlusion. The size of
data, time of computation and computational complexities are also some difficulties
in the efficient application of these methods in real time applications. After
analyzing these techniques, it is concluded that for gender classification,
computational work on pixels is more expensive than the extraction of facial
features. The Support Vector Machine (SVM) has shown better accuracy rate as
compared to other classifiers.
References
[1] S. A. Khan, M. Ahmed, M. Nazir and N. Riaz, “A Comparative Analysis of Gender Classification
Techniques”, Middle-East Journal of Scientific Research,vol. 20, no. 1, (2014), pp. 1-13.
[2] F. Wahid, M. Fayaz and A. S. Shah, “An Evaluation of Automated Tumor Detection Techniques of
Brain Magnetic Resonance Imaging (MRI)”, International Journal of Bio-Science and Bio-Technology,
vol. 8, no. 2, (2016), pp. 265-278.
[3] M. Fayaz, A. S. Shah, F. Wahid and A. Shah, “A Robust Technique of Brain MRI Classification using
Color Features and K-Nearest Neighbors Algorithm”, International Journal of Signal Processing, Image
Processing and Pattern Recognition, vol. 9, no. 10, (2016).
[4] A. S. Shah, M. N. A. Khan, F. Subhan, M. Fayaz and A. Shah, “An Offline Signature Verification
Technique using Pixels Intensity Levels”, International Journal of Signal Processing, Image Processing
and Pattern Recognition, vol. 9, no. 8, (2016), pp. 205-222.
[5] A. S. Shah, M. N. A. Khan and A. Shah, “An Appraisal of Off-Line Signature Verification Techniques”,
International Journal of Modern Education and Computer Sciences, vol.7, no. 4, (2015), pp. 67-75.
[6] P. Rai and P. Khanna, “Gender Classification Techniques: A Review”, Advances in Computer Science,
Engineering & Applications, vol. 166, (2012), pp. 51-59.
O
nline
Version
O
nly.
Book
m
ade
by
this
file
is
ILLEG
AL.
10. International Journal of Signal Processing, Image Processing and Pattern Recognition
Vol. 9, No. 10, (2016)
322 Copyright ⓒ 2016 SERSC
[7] O. Singh, G. Bommagani, S. R. Ravula and V. K. Gunjan, “Pattern Based Gender Classification”,
International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, no.
10, (2013), pp. 888-895.
[8] E. K. Dey, M. Khan and M. H. Ali, “Computer Vision Based Gender Detection from Facial Image”,
International Journal of Advanced Computer Science, vol. 3, no. 8, (2013), pp. 428-433.
[9] M. N. A. Khan, S. A. Qureshi and N. Riaz, “Gender Classification with Decision Trees”, International
Journal of Signal Processing, Image Processing and Pattern Recognition, vol. 6, no. 1, (2013), pp. 165-
176.
[10] M. Nazir and A. M. Mirza, “Multi-view Gender Classification Using Hybrid Transformed Features”,
International Journal of Multimedia and Ubiquitous Engineering,vol. 7, no. 2, (2012), pp. 515-520.
[11] B. Ergen and S. A. But, “Gender Recognition Using Facial Images”, International Conference on
Agriculture and Biotechnology, vol. 60, no. 20, (2013), pp. 112-117.
[12] M. Nazir, M. Ishtiaq, A. Batool, M. A. Jaffar and A. M. Mirza, “Feature Selection for Efficient Gender
Classification”, 11th World Scientific and Engineering Academy and Society international conference
on Fuzzy Systems, Recent Advances in Neural Networks, (2010), pp. 70-75.
[13] H. H. K. Tin, “Gender and Age Estimation Based on Facial Images”, Acta Technica Napocensis
Electronics and Telecommunications, vol. 52, no. 3, (2011), pp. 73-40.
[14] A. F. Basha and G. S. B. Jahangeer, “Face Gender Image Classification Using Various Wavelet
Transform and Support Vector Machine with various Kernels”, International Journal of Computer
Science Issues, vol. 9, no. 6, (2012), pp. 150-157.
[15] X. Bai and V. Cherkassy, “Gender Classification of Human Faces Using Inference through
Contradictions”, International Joint Conference on Neural Networks, (2008), pp. 746-750.
[16] H. H. K. Tin, “Perceived Gender Classification from Face Images”, International journal of Modern
Education and Computer Science, vol. 1, (2012), pp. 12-18.
[17] S. A. Khan, M. Nazir and N. Riaz, “Optimized Features Selection for Gender Classification Using
Optimization Algorithms”, Turkish Journal of Electrical Engineering & Computer Science,vol.21,
(2013), pp. 1479-1494.
[18] P. I. Wilson and D. J. Fernandez, “Facial Feature Detection Using Haar Classifiers”, Journal of
Computer Science in Colleges, vol. 21, no. 4, (2006), pp. 127-133.
[19] S. Ravi and S. Wilson, “Face Detection with Facial Features and Gender Classification Based on
Support Vector Machine”, International Journal of Imaging Science and Engineering, (2010), pp. 23-28.
Authors
Hira Khalid Khan, has completed MS degree in Computer
Science from SZABIST, Islamabad, Pakistan in 2016. She has
received BS degree in Computer Science from University of
Science and Technology, Bannu, Khyber Pakhtunkhwa, Pakistan
in 2012. Besides her academic qualification, she has attended
training of Microsoft Experts Systems, Under Directorate of
Information Technology, Government of Khyber Pakhtunkhwa,
Peshawar, Pakistan in 2013.
Her research area includes, Machine Learning, Artificial
Intelligence, Pattern Recognition, and Digital Image Processing.
Abdul Salam Shah, is currently doing specialization in
Management Information System (MIS) from Virtual University of
Pakistan. He has completed MS degree in Computer Science from
SZABIST, Islamabad, Pakistan in 2016. He did his BS degree in
Computer Science from Isra University Hyderabad, Sindh Pakistan in
2012. In addition to his degree, he has completed short courses and
diploma certificates in Databases, Machine Learning, Artificial
Intelligence, Cybercrime, Cybersecurity, Networking, and Software
Engineering. He has published articles in various journals of high
repute. He is a young professional and he started his career in the
Ministry of Planning, Development and Reforms, Islamabad Pakistan.
His research area includes Machine Learning, Artificial Intelligence,
Digital Image Processing and Data Mining.
O
nline
Version
O
nly.
Book
m
ade
by
this
file
is
ILLEG
AL.
11. International Journal of Signal Processing, Image Processing and Pattern Recognition
Vol. 9, No. 10, (2016)
Copyright ⓒ 2016 SERSC 323
Mr. Shah has contributed in a book titled "Research
Methodologies; an Islamic perspectives," International Islamic
University Malaysia, November, 2015.
Muhammad Asim Khan, is currently working as Foreign
Education Expert with Jiangxi University of Science and Technology,
Ganzhou, China. His Ph.D. is under progress from International
Islamic University Islamabad, Pakistan. He received MS Computer
Science degree from Pir Mehar Ali Shah Arid Agriculture University
Rawalpindi, Pakistan in 2012 and BS Computer Science degree from
the same university in 2009. His research domain is Digital Image
Processing by using Machine Learning Techniques.
O
nline
Version
O
nly.
Book
m
ade
by
this
file
is
ILLEG
AL.
12. International Journal of Signal Processing, Image Processing and Pattern Recognition
Vol. 9, No. 10, (2016)
324 Copyright ⓒ 2016 SERSC
O
nline
Version
O
nly.
Book
m
ade
by
this
file
is
ILLEG
AL.