SlideShare a Scribd company logo
1 of 5
Download to read offline
ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012



       Depth-Image-based Facial Analysis between Age
            Groups and Recognition of 3D Faces
           Chiranji Lal Chowdhary1, Richa Dhanuka1, Arpana Kumari1, and Chandra Mouli P.V.S.S.R.2
                      1
                          School of Information Technology and Engineering, VIT University, Vellore, India
                             Email: chiranji.lal@vit.ac.in, richa.dhanuka@yahoo.co.in, arp.vit@gmail.com
                           2
                             School of Computing Science and Engineering, VIT University, Vellore, India
                                                     Email: chandramouli@vit.ac.in


Abstract—Face recognition is still an open problem. Many 2D              These features are as the contour of the face, chin, eye and
face recognition approaches came into light to achieve high              nose. Important factor in 3-D facial recognition is that this is
recognition rate. But these approaches are still challenged by           not affected by the lighting. This technique can also identify
the changes in illuminations, expressions, pose, noise, etc. A           a face with other pose angles.Biometric based face recognition
3D face recognition technique is proposed to overcome such
                                                                         systems are taken as the efficient technique in biometrics.
challenges and to enhance robustness to expression variations.
Here, we compare the person at different age groups with
                                                                         There are some risk factors like hacking or duplication
higher recognition rate in comparison to 2D face recognition             possible in fingerprint devices. One more issue when device
techniques. We propose a two stage procedure of 3D face                  may deny to access if the finger is dirty, wet or injured. Iris
recognition based on FLD (Fisher Linear Discriminant), SURF              recognition devices are more interfering devices. Voice
operator and depth-image. First, FLD is used on depth-image              recognition devices are having some conditions, e.g. if person
to perform recognition and then the SURF features of 2D                  is suffering by throat problem, that time they may fail to give
gray images to carry out the refined recognition. Finally, our           correct results. So Face recognition system will be
proposed work will increase the robustness in expression                 recommended even it may not reach to be perfect but this is
variations.
                                                                         more advanced than other techniques.
Index Terms—speeded up robust features, fisher linear
discriminant, depth image, principal component analysis.                                     II. LITERATURE SURVEY
                                                                         A. OVERVIEW
                          I. INTRODUCTION
                                                                             Present social world is too complex so the survival of an
    A computer application that identifies or verifies a digital         individual depends on the interpreting visual information
image or a video of any human is a facial recognition system.            about the personal factors like age, identity and emotional
This can be done by matching that facial image [2] with                  state of another person based on that face. Facial expressions
available facial database. This type of recognition system is            [2], facial poses, appearance of face and its illumination are
typically used in security systems. Such systems can be                  having a great impact in different adverse conditions. By
compared to existing biometrics like nose, fingerprint, eyes             using these, humans can perform face identification with
or whole face recognition systems.                                       good robustness without knowing more about individuals.
    Most of the face recognition algorithms identify faces by            Face recognition researchers using different techniques since
extracting features from an image of the subject’s face. The             1970s, and it got a significant importance in the last two
size of the image, shape of the eyes, nose, and relative position        decades. The reasons behind the growth for face recognition
of different features of the image are analyzed by the used              system are the possibility of wide range of applications of it
algorithms. The features are used to search for other images             and the emergence of affordable hardware. Hardware, such
with matching features. Some other algorithms normalize the              as digital cameras, made the capturing of high-quality and
gallery of face images and then compress the face data. After            high resolution images more similar.
that, only useful data are saved in images which are needed                  Many 2D based approaches such as PCA (principal
for face detection. A probe image is then compared with the              Component Analysis), FLD (Fisher Linear Discriminant), ICA
face data.                                                               (Independent Component Analysis), etc, can achieve high
    Recognition algorithms being used include Principal                  recognition rate under some reasonable conditions. However,
Component Analysis, Independent Component Analysis,                      they are still challenged by the changes of illumination, pose
Linear Discriminate Analysis, Markov model and many more.                and expressions. Recent progress in computation, storage
In recent years the three-dimensional object / face recognition          device and 3D sensors make it possible to perform recognition
technique is emerging and claiming to achieve high                       based on 3D face data. 3D face recognition [3, 7, 8, 11] is
accuracies. In 3-D face recognition technique a 3-D sensor               considered to be less influenced by the changes of
can be used to capture the shape of a face with relevant                 illumination, pose and is more robust to expression variations
information. The information collected by the 3-D sensor is              to some extent. Expression variation is still a big problem not
used to identify different features on the surface of a face.
© 2012 ACEEE                                                        27
DOI: 01.IJSIP.03.01.86
ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012


only for 2D face recognition but also for 3D face recognition.           subspace that minimizes the scatter between images of same
In order to enhance robustness to expression variations, some            class and maximizes the scatter between different class
effective ways have been presented. Bronstein et al. [3] used            images. In PCA image elements considers random variables
the bending-invariant canonical form in constructing                     with Gaussian distribution and also minimized the second-
expression-invariant representations of faces. It is found that          order statistics. But, for non-Gaussian distribution, largest
3D face recognition methods can achieve significantly high               variances would not correspond to PCA basis vectors. Now,
accuracy rate compared to 2D face recognition, because 3D                Independent Component Analysis (ICA) minimizes both
face recognition is a modality of facial recognition methods             second-order and higher-order dependencies in the input
in which the three-dimensional geometry of the human face                data. ICA attempts to find the basis along which the data
is used. The 3D face recognition also avoids some problems               (when projected onto them) are statistically independent.
of 2D face recognition algorithms such as change in lighting,            SIFT Operator (Scale Invariant Feature Transform) [4, 1, 10,
wearing spectacles, different facial expressions, head                   8] was proposed for extracting distinctive invariant features
orientation and make-up. The 3D models are used in improving             from images that can be invariant to image scale and rotation.
the accuracy of image based recognition after transforming               SURF (Speeded-Up Robust Features) algorithm was first
the head into knows views.                                               proposed by Bay in 2006 [10]. Essentially, it is the
                                                                         improvement of SIFT algorithm. At present, SURF has been
B. RELATED WORKS
                                                                         applied to image registration, camera calibration and object
    The survey on state of the art in 3D describes the latest
                                                                         recognition. Many SIFT or SURF-based researches have been
results and also, the recent research trends, showing that the
                                                                         carried out in face recognition. In order to enhance robustness
variety and sophistication of algorithmic approaches explored
                                                                         to expression variations, we propose a two-stage procedure
are expanding. It is challenging to improve the accuracy in
                                                                         of 3D face recognition based on depth image and SURF
recognition, facial expression robustness and rendering. So
                                                                         Operator. We use FLD method on the depth image to perform
representation of the scene is bulky and it needs good
                                                                         coarse recognition, and then we extract the SURF features of
algorithms for real-time rendering and efficient representation.
                                                                         the 2D gray images to carry out the refined recognition.
Many methods are using Principal Component Analysis
(PCA). RajKiran Gottumukkal et al. [9] which tested the
                                                                                                      III. PROPOSED SYSTEM
potential of PCA in modular approach and the facial image is
divided into modules and then PCA is applied over each                   We propose a 3D Face recognition and facial age analysis
module.                                                                  system which includes two steps.
    A real face is described by its 3D shape and texture so it is        First, carry out coarse recognition using FLD on the depth
reasonable to use geometry and color or intensity, to improve            images to increase the robustness and recognition rate.
recognition reliability. This is the idea behind 3D+2D face              FLD is an enhancement to PCA. It constructs a discriminant
recognition. Ashutosh Saxena et al.[8] is based on MRF to                subspace that minimizes the scatter between images of same
get the monocular cues from a single still image, and                    class and maximizes the scatter between different class
respectively convert it into 3D. Belhumeur et al. [5] proposed           images.
a comparative study of eigenfaces generated by PCA and
                                                                          Let X 1 , X 2 ,..., X c be the face classes in the database and
fisherfaces generated by LDA to show that fisherfaces are
more robust towards expressions. Kresimir Delac et al. [6]               let   each           face         class   X i , i  1, 2,...c has k facial
proposed a comparative study of different pattern recognition
algorithms ICA, PCA, LDA which provides an excellent                     images X j , j  1,2,..., k .
difference among these algorithms.
                                                                          The average face is calculated as
C. METHODS FOR ACQUIRING 3D IMAGE DATA                                               c    k
   There are various ways for representing 3D face data.
Point clouds, appearance-based, triangle mesh, layering,
                                                                         A    1
                                                                               kc    X
                                                                                    i 1 j 1
                                                                                                 ij

depth image etc are different approaches for 3D image data.               Each face differs from the average face by the vector
Out of these, Depth Images can be computed from the real
world using cameras or other scanning devices.                           Yij  X ij  A
D. ALGORITHMS   USED FOR FEATURE EXTRACTION
                                                                          The Covariance matrix C is obtained as:
    Principal component analysis (PCA) [5, 9] is a                                   c    k
                                                                                                           T
mathematical procedure used in transforming a number of                  C    1
                                                                               kc    Y .Y
                                                                                    i 1 j 1
                                                                                                ij    ij
                                                                                                               .
correlated variables into uncorrelated variables, i.e. principal
components. PCA calculates the eigenvalue decomposition                   The Eigenvectors are calculated from this covariance matrix.
of a data covariance matrix of a data matrix after mean centering
                                                                          We compute the mean image                i of each class X i as:
the data for each attribute.LDA (Linear Discriminant Analysis)
[5, 6] is an enhancement to PCA which constructs a
discriminant
© 2012 ACEEE                                                        28
DOI: 01.IJSIP.03.01.86
ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012


 Now, the mean image            of all the classes in the database        by light colors as compared to the portion which is farther
can be calculated as:                                                       away. This concept is used for the conversion of 2D image
         c
                                                                            into 3D perceived image. The brighter part of the image
  1  i                                                                  represents lesser depth as compared to the darker part.
    c
        i 1
                                                                            Feature extraction using FLD method based on depth image:
                                                                                Though the dimensions of depth image used in this work
We calculate within-class scatter matrix as:
                                                                            is reduced after pretreatment, the dimensions is still too high
        c                                                                   to use FLD directly so we are combining PCA with FLD to
                                             T
Sw            X
       i 1 X k X i
                       k     i X k   i                               solve this problem. The feature vectors are generated after
                                                                            applying PCA and FLD respectively over the images. The
We calculate the between-class scatter matrix as:                         process of PCA and FLD has been already described above.
        c
                                                                            These vectors are used for the similarity measurement.
                                        T                                   Recognition using SURF operator:
SB   N i   i   i 
       i 1
                                                                                In this module we will compute the recognition rate by
                                                                            calculating the similarity between training images and testing
We calculate the projection matrix as:
                                                                            image using SURF operator. The similarity is calculated by
W LDA  S W .SB                                                             calculating the distance between testing and training images.
We extract the feature vectors as:
                                                                                         IV. RESULTS AND DISCUSSIONS
        T    T
I ij  WLDA WPCA x ij
                                                                            In FRAV3D_1 database [12], we have used three classes
Secondly, extract the SURF features of the 2D gray images                 representing three different persons. Each class has 14 images
corresponding to 3D faces obtained by previous step, to                     representing different expressions of the same person within
perform the refined recognition.                                            the class.
Distance = sum (( Finaldatatesting –
Finaldatatraining ).^2).^0.5                                                A. OUTPUT / RESULTS
M = mean (Distance)                                                         In this proposed system, the outputs will vary as per the
L = min (Distance)                                                          given inputs. We are considering three different possible
Percentage = ((M – L)/M )* 100                                              outputs which are given below:
A. ASSUMPTIONS
    3D Face recognition should overcome the differences
which occur in faces due to viewing angle, facial expressions,
illumination etc. In this project we are concerned about the
differences related to facial expressions, so viewing angle is
assumed to be constant for all the images. We are taking a
facial expression database consisting of training images and
testing images for 3D face recognition system.
    We have used bmp files for both the training and testing
                                                                                  Figure1. (a) 2D testing image (b) Most Similar Image
set of images. We have assumed that the image format remains
constant throughout the process. Though we have used bmp                    Expression variant testing:
files only, it can work well with other image formats also. The                 We have taken a 2D testing image as an input shown in
size of all the images is assumed to be constant as variation               Figure 1(a), which is an expression variant image of the images
in size will lead to resizing of all the images to a constant               already existing in the database. Now, this input is processed
value. The facial images which we have used are of high                     as per the proposed system and the output will show the
quality and thus noise is ignored. If noisy image is to be                  most similar image of the given input as shown in Figure 1(b).
used, then we need to filter it.                                            The output will show the class to which the particular input
                                                                            image belongs to, as shown in Figure 2.
B. ARCHITECTURE SPECIFICATION
    This 3D Face recognition system consists of three
modules namely acquisition of depth image, feature extraction
using FLD method based on depth image, recognition using
SURF operator.
Acquisition of depth image:
    3D face data is obtained from the 2D image data by the
use of layering. Layering provides a common colormap to all
the images. The main concept used for layering is that in any
image, the part which is closer to the viewer is represented                                    Figure2. Matched Class

© 2012 ACEEE                                                           29
DOI: 01.IJSIP.03.01.86
ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012


Input testing image is not present in the database:                     C. DISCUSSION
   We have taken a 2D testing image as an input shown in                    From the experiments done over the images, it is found
Figure 3(a), whose class does not exist in the database.                that 3D data provides a higher rate of similarity as compared
                                                                        to 2D data. It can be found from Figure 6 that there is an
                                                                        upward shift in the graph of LDA with 3D.This shows the
                                                                        better similarity of the images. It can also be seen in the graph
                                                                        that there is less fluctuation in the similar class of LDA with
                                                                        3D as compared to the similar class of 2D. But the dissimilarity
                                                                        among different classes also decreases in the case of LDA
                                                                        with 3D, which can be considered as a drawback of this
                                                                        experiment.
                                                                            In both the cases i.e. LDA with 2D images and LDA with
                                                                        3D images, the curve is smooth around the dissimilar class.
        Figure3. (a) 2D Testing Image (b) Match Not Found
                                                                        So it can be concluded that 3D data does not provide much
    Now, this input is processed as per the proposed system.            difference with 2D data in case of dissimilarity.
As this particular input image does not exist in our database,
so it will pop up a window showing that the match is not
available in the database as shown in Figure 3(b).
Input image for facial age analysis:
    For facial age analysis, the input image will be an image of
a child as shown in Figure 4(a). Now, this input is processed
as per the proposed system and the output will show the
similar image of elder age of the given input as shown in
Figure 4(b).
                                                                                Figure6. Comparison of LDA in 3D and LDA in 2D
                                                                                            TABLEI. C OMPARISON T ABLE




            Figure1. (a) Younger Image (b) Elder Image
B. RESULT ANALYSIS
    The algorithm was tested on MATLAB 7.6.0. The
implementation had 14 expression samples each of 3 different
classes. We performed LDA with PCA on the actual samples.
There are different types of complexity which we go through
while implementing the algorithm.The experiment was
repeated with different number of eigenvectors.                         Case 1: Testing image is present in database
    It was observed that, as number of eigenvectors increase            Case 2: Testing image is an expression variant image of the
the recognition rate also increases as shown in Figure 5, but           training set images
at the cost of computational complexity. It was observed that           Case 3: Testing image whose class is not present in the
LDA with PCA is able to achieve higher rates of recognition             database.
than only PCA. Using only PCA implementation, the accuracy                                     CONCLUSIONS
of recognition is low and inconsistent as it is unable to
                                                                            The experiments on the database FRAV3D_1 [12] shows
recognize images having different expressions and it is very
                                                                        that face recognition with high accuracy and recognition rate
much affected due to same illumination of all the images.
                                                                        is still a challenge. Though 3D face data is more robust to
                                                                        expression variation, the high accuracy rate is still a challenge.
                                                                        The accuracy rate of 3D face recognition depends on the
                                                                        pretreatment of the images. There are various techniques for
                                                                        converting a 2D data into 3D data but all of them itself is a
                                                                        very broad research area. 3D face recognition technique is
                                                                        much more complicated as compared to that of 2D
                                                                        techniques.The FLD algorithm is applied over the PCA
        Figure1. Results of LDA for different Eigenvectors
                                                                        extracted feature vectors for extracting the expression
© 2012 ACEEE                                                       30
DOI: 01.IJSIP.03.01.86
ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012


invariant feature vectors. After this, the SURF operator algo-               417, 2006.
rithm is applied to calculate the similarity and dissimilarity.              [11] Alexander M. Bronstein, Michael M. Bronstein, and Ron
The accuracy rate is found to be 97.83%, shown in Table I.                   Kimmel, “Expression-Invariant 3D Face Recognition”, Proceedings
    The same procedure is applied for the age analysis also.                 of the 4th international conference on Audio- and video-based
                                                                             biometric person authentication AVBPA’03, LNCS 2688, pp. 62-
But it is found that the recognition rate for expression variant
                                                                             70, 2003.
images is high as compared to age differences. The images
used for age analysis is a real time image and thus noisy,                                    Chiranji Lal Chowdhary is an Assistant
which leads to low recognition rate. Also, only PCA is applied                               Professor (Sr.) and an internal part time
on the images, as the database for various expressions was                                   research scholar at VIT University, Vellore.
not used hence LDA cannot be applied, which also leads to                                    His research interests are in Image Processing
a low recognition rate. So, a better approach can be used to                                 and Computer Vision. He is a life member of
get a high recognition and accuracy rate.                                                    Indian Science Congress Association (ISCA).

                           REFERENCES
                                                                                             Richa Dhanuka is presently working in Misys
[1] Lei Yunqi, Lai Haibin, and Jiang Xutuan, “3D Face Recognition                            Software Solutions, Bangalore. She had
by SURF Operator based on depth image”, Department of computer                               BTech-IT from VIT University, Vellore in 2011.
science, Xiamen University, IEEE, pp 240-244, 2010.
[2] Q. M. Rizvi and R. Asthana, “Facial Analysis Between Age
Groups Using Distance Matrices”, Tryst Technical Conference,
                                                                                             Arpana Kumari had B.Tech-IT from VIT
pp 34-38, 2010.                                                                              University, Vellore in 2011. She got an offer
[3] A. M. Bronstein, M. M. Bronstein, and R. Kimmel, “Three-                                 from Sapient Corporation Private Limited,
dimensional Face Recognition”, Journal of Computer Vision (IJCV),                            Bangalore.
Vol. 64/1, pp.5-30, August 2005.
[4] Luo Juan, Oubong Gwun, “A Comparison of SIFT, PCA-SIFT                                    Dr. Chandra Mouli P.V.S.S.R. is an Associate
and SURF”, International Journal of Image Processing (IJIP), Volume                           Professor, School of Computing Science and
(3), Issue (4), pp 143-152, 2009.
                                                                                              Engineering, VIT University, Vellore, India.
[5] P.N. Belhumeur, J.P. Hespanha, and D.J. Kriegmanf, “Eigenfaces
vs. Fisherfaces: Recognition using class specific linear projection”,                         He received his Ph.D. in Digital Image
IEEE Trans. Pattern Anal. Machine Intell. 19 (7), 711-720, 1997.                              Processing from NIT Tiruchirappalli, India.
[6] Kresimir Delac , Mislav Grgic, and Sonja Grgic, “A comparative           His research interests include Digital Image Processing,
study of ICA, PCA and LDA”, Wiley Periodicals, Inc , Vol. 15,                Computer Vision, Pattern Recognition, Biometrics, Bio-
252–260, 2006.                                                               informatics and Image Retrieval. He has published more than
[7] Hanqi Zhuang, Teerapat Theerawong, Xin Guan, Salvatore                   13 refereed research papers in various international and
Morgera, and Abhi Pandya, “A Method for Creating 3D Face from                national journals and conferences. He was associated with
a 2D Face Image”, Florida Conference on Recent Advances in                   two sponsored research projects as Co-Investigator.
Robotics, May 25-26, 2006.
                                                                             Presently, he is working on a funded project from DRDO as
[8] Ashutosh Saxena, Min Sun, and Andrew Y. Ng, “Make3D:
Depth Perception from a Single Still Image”, Association for the             Principal Investigator. He is an IEEE member and life member
Advancement of Artificial Intelligence (www.aaai.org), 2008.                 of Indian Society of Technical Education (ISTE). He is a
[9] RajKiran Gottumukkal, and Vijaya K. Asari, “An improved                  reviewer for many international journals.
face recognition technique based on modular PCA approach”,
Pattern Recognition Letters Vol. 25 pp 429–436, 2004.
[10] H. Bay, T. Tuytelaars, and L. Van Gool, “Surf: Speeded up
robust features”, European Conference on Computer Vision, 1:404-




© 2012 ACEEE                                                            31
DOI: 01.IJSIP.03.01.86

More Related Content

What's hot

IRJET- Automated Criminal Identification System using Face Detection and Reco...
IRJET- Automated Criminal Identification System using Face Detection and Reco...IRJET- Automated Criminal Identification System using Face Detection and Reco...
IRJET- Automated Criminal Identification System using Face Detection and Reco...IRJET Journal
 
Vocord face control 3d facial-biometric system based on 3d
Vocord face control 3d   facial-biometric system based on 3dVocord face control 3d   facial-biometric system based on 3d
Vocord face control 3d facial-biometric system based on 3dnsokolov
 
IRIS Based Human Recognition System
IRIS Based Human Recognition SystemIRIS Based Human Recognition System
IRIS Based Human Recognition SystemCSCJournals
 
Model Based Emotion Detection using Point Clouds
Model Based Emotion Detection using Point CloudsModel Based Emotion Detection using Point Clouds
Model Based Emotion Detection using Point CloudsLakshmi Sarvani Videla
 
Face Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image ProcessingFace Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image Processingpaperpublications3
 
A Robust Approach in Iris Recognition for Person Authentication
A Robust Approach in Iris Recognition for Person AuthenticationA Robust Approach in Iris Recognition for Person Authentication
A Robust Approach in Iris Recognition for Person AuthenticationIOSR Journals
 
IRJET- A Review on Various Approaches of Face Recognition
IRJET- A Review on Various Approaches of Face RecognitionIRJET- A Review on Various Approaches of Face Recognition
IRJET- A Review on Various Approaches of Face RecognitionIRJET Journal
 
A study of techniques for facial detection and expression classification
A study of techniques for facial detection and expression classificationA study of techniques for facial detection and expression classification
A study of techniques for facial detection and expression classificationIJCSES Journal
 
Report Face Detection
Report Face DetectionReport Face Detection
Report Face DetectionJugal Patel
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVIRJET Journal
 
Automatic Attendance Using Face Recognition
Automatic Attendance Using Face RecognitionAutomatic Attendance Using Face Recognition
Automatic Attendance Using Face Recognitionrahulmonikasharma
 
IRJET- Pose Varying Face Recognition: Review
IRJET- Pose Varying Face Recognition: ReviewIRJET- Pose Varying Face Recognition: Review
IRJET- Pose Varying Face Recognition: ReviewIRJET Journal
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognitionMazin Alwaaly
 
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSINGAN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSINGijiert bestjournal
 
Face recognition using laplacianfaces
Face recognition using laplacianfaces Face recognition using laplacianfaces
Face recognition using laplacianfaces StudsPlanet.com
 
Facial powerpoint
Facial powerpointFacial powerpoint
Facial powerpoint12202843
 

What's hot (19)

IRJET- Automated Criminal Identification System using Face Detection and Reco...
IRJET- Automated Criminal Identification System using Face Detection and Reco...IRJET- Automated Criminal Identification System using Face Detection and Reco...
IRJET- Automated Criminal Identification System using Face Detection and Reco...
 
Vocord face control 3d facial-biometric system based on 3d
Vocord face control 3d   facial-biometric system based on 3dVocord face control 3d   facial-biometric system based on 3d
Vocord face control 3d facial-biometric system based on 3d
 
face recognition
face recognitionface recognition
face recognition
 
IRIS Based Human Recognition System
IRIS Based Human Recognition SystemIRIS Based Human Recognition System
IRIS Based Human Recognition System
 
Model Based Emotion Detection using Point Clouds
Model Based Emotion Detection using Point CloudsModel Based Emotion Detection using Point Clouds
Model Based Emotion Detection using Point Clouds
 
Face Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image ProcessingFace Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image Processing
 
A Robust Approach in Iris Recognition for Person Authentication
A Robust Approach in Iris Recognition for Person AuthenticationA Robust Approach in Iris Recognition for Person Authentication
A Robust Approach in Iris Recognition for Person Authentication
 
IRJET- A Review on Various Approaches of Face Recognition
IRJET- A Review on Various Approaches of Face RecognitionIRJET- A Review on Various Approaches of Face Recognition
IRJET- A Review on Various Approaches of Face Recognition
 
A study of techniques for facial detection and expression classification
A study of techniques for facial detection and expression classificationA study of techniques for facial detection and expression classification
A study of techniques for facial detection and expression classification
 
Report Face Detection
Report Face DetectionReport Face Detection
Report Face Detection
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCV
 
Hl2413221328
Hl2413221328Hl2413221328
Hl2413221328
 
Automatic Attendance Using Face Recognition
Automatic Attendance Using Face RecognitionAutomatic Attendance Using Face Recognition
Automatic Attendance Using Face Recognition
 
IRJET- Pose Varying Face Recognition: Review
IRJET- Pose Varying Face Recognition: ReviewIRJET- Pose Varying Face Recognition: Review
IRJET- Pose Varying Face Recognition: Review
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSINGAN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
 
Face recognition using laplacianfaces
Face recognition using laplacianfaces Face recognition using laplacianfaces
Face recognition using laplacianfaces
 
Facial powerpoint
Facial powerpointFacial powerpoint
Facial powerpoint
 

Viewers also liked

Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...
Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...
Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...IDES Editor
 
Neural Network Based Noise Identification in Digital Images
Neural Network Based Noise Identification in Digital ImagesNeural Network Based Noise Identification in Digital Images
Neural Network Based Noise Identification in Digital ImagesIDES Editor
 
User Controlled Privacy in Participatory Sensing
User Controlled Privacy in Participatory SensingUser Controlled Privacy in Participatory Sensing
User Controlled Privacy in Participatory SensingIDES Editor
 
An Information Maximization approach of ICA for Gender Classification
An Information Maximization approach of ICA for Gender ClassificationAn Information Maximization approach of ICA for Gender Classification
An Information Maximization approach of ICA for Gender ClassificationIDES Editor
 
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...IDES Editor
 
Energy efficient reliable routing considering residual energy in wireless ad ...
Energy efficient reliable routing considering residual energy in wireless ad ...Energy efficient reliable routing considering residual energy in wireless ad ...
Energy efficient reliable routing considering residual energy in wireless ad ...LeMeniz Infotech
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 

Viewers also liked (9)

Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...
Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...
Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...
 
Neural Network Based Noise Identification in Digital Images
Neural Network Based Noise Identification in Digital ImagesNeural Network Based Noise Identification in Digital Images
Neural Network Based Noise Identification in Digital Images
 
User Controlled Privacy in Participatory Sensing
User Controlled Privacy in Participatory SensingUser Controlled Privacy in Participatory Sensing
User Controlled Privacy in Participatory Sensing
 
An Information Maximization approach of ICA for Gender Classification
An Information Maximization approach of ICA for Gender ClassificationAn Information Maximization approach of ICA for Gender Classification
An Information Maximization approach of ICA for Gender Classification
 
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
 
Energy efficient reliable routing considering residual energy in wireless ad ...
Energy efficient reliable routing considering residual energy in wireless ad ...Energy efficient reliable routing considering residual energy in wireless ad ...
Energy efficient reliable routing considering residual energy in wireless ad ...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 

Similar to Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D Faces

IRJET- Pose Varying Face Recognition: Review
IRJET- Pose Varying Face Recognition: ReviewIRJET- Pose Varying Face Recognition: Review
IRJET- Pose Varying Face Recognition: ReviewIRJET Journal
 
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...ijbuiiir1
 
Face recognition system
Face recognition systemFace recognition system
Face recognition systemYogesh Lamture
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...ijceronline
 
Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...
Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...
Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...ijtsrd
 
Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...
Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...
Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...IRJET Journal
 
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKHUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKijiert bestjournal
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face RecognitionIRJET Journal
 
76 s201920
76 s20192076 s201920
76 s201920IJRAT
 
Face Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image ProcessingFace Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image Processingpaperpublications3
 
Project Report on High Speed Face Recognitions using DCT, RBF nueral network
Project Report on High Speed Face Recognitions using DCT, RBF nueral networkProject Report on High Speed Face Recognitions using DCT, RBF nueral network
Project Report on High Speed Face Recognitions using DCT, RBF nueral networkSagar Rai
 
ADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCA
ADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCAADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCA
ADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCAIAEME Publication
 
Face Recognition System and its Applications
Face Recognition System and its ApplicationsFace Recognition System and its Applications
Face Recognition System and its ApplicationsIRJET Journal
 
A Fast Recognition Method for Pose and Illumination Variant Faces on Video Se...
A Fast Recognition Method for Pose and Illumination Variant Faces on Video Se...A Fast Recognition Method for Pose and Illumination Variant Faces on Video Se...
A Fast Recognition Method for Pose and Illumination Variant Faces on Video Se...IOSR Journals
 
Techniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive ReviewTechniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive ReviewIOSR Journals
 
Techniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive ReviewTechniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive ReviewIOSR Journals
 

Similar to Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D Faces (20)

IRJET- Pose Varying Face Recognition: Review
IRJET- Pose Varying Face Recognition: ReviewIRJET- Pose Varying Face Recognition: Review
IRJET- Pose Varying Face Recognition: Review
 
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
 
Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...
Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...
Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...
 
Face recognition
Face recognitionFace recognition
Face recognition
 
G041041047
G041041047G041041047
G041041047
 
O24114119
O24114119O24114119
O24114119
 
Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...
Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...
Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...
 
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKHUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face Recognition
 
76 s201920
76 s20192076 s201920
76 s201920
 
C017431730
C017431730C017431730
C017431730
 
Face Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image ProcessingFace Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image Processing
 
Project Report on High Speed Face Recognitions using DCT, RBF nueral network
Project Report on High Speed Face Recognitions using DCT, RBF nueral networkProject Report on High Speed Face Recognitions using DCT, RBF nueral network
Project Report on High Speed Face Recognitions using DCT, RBF nueral network
 
ADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCA
ADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCAADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCA
ADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCA
 
Face Recognition System and its Applications
Face Recognition System and its ApplicationsFace Recognition System and its Applications
Face Recognition System and its Applications
 
A Fast Recognition Method for Pose and Illumination Variant Faces on Video Se...
A Fast Recognition Method for Pose and Illumination Variant Faces on Video Se...A Fast Recognition Method for Pose and Illumination Variant Faces on Video Se...
A Fast Recognition Method for Pose and Illumination Variant Faces on Video Se...
 
Techniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive ReviewTechniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive Review
 
Techniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive ReviewTechniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive Review
 

More from IDES Editor

Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 
Mental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive ModelMental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive ModelIDES Editor
 
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityGenetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityIDES Editor
 
3-D FFT Moving Object Signatures for Velocity Filtering
3-D FFT Moving Object Signatures for Velocity Filtering3-D FFT Moving Object Signatures for Velocity Filtering
3-D FFT Moving Object Signatures for Velocity FilteringIDES Editor
 

More from IDES Editor (20)

Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 
Mental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive ModelMental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive Model
 
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityGenetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
 
3-D FFT Moving Object Signatures for Velocity Filtering
3-D FFT Moving Object Signatures for Velocity Filtering3-D FFT Moving Object Signatures for Velocity Filtering
3-D FFT Moving Object Signatures for Velocity Filtering
 

Recently uploaded

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 

Recently uploaded (20)

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 

Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D Faces

  • 1. ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012 Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D Faces Chiranji Lal Chowdhary1, Richa Dhanuka1, Arpana Kumari1, and Chandra Mouli P.V.S.S.R.2 1 School of Information Technology and Engineering, VIT University, Vellore, India Email: chiranji.lal@vit.ac.in, richa.dhanuka@yahoo.co.in, arp.vit@gmail.com 2 School of Computing Science and Engineering, VIT University, Vellore, India Email: chandramouli@vit.ac.in Abstract—Face recognition is still an open problem. Many 2D These features are as the contour of the face, chin, eye and face recognition approaches came into light to achieve high nose. Important factor in 3-D facial recognition is that this is recognition rate. But these approaches are still challenged by not affected by the lighting. This technique can also identify the changes in illuminations, expressions, pose, noise, etc. A a face with other pose angles.Biometric based face recognition 3D face recognition technique is proposed to overcome such systems are taken as the efficient technique in biometrics. challenges and to enhance robustness to expression variations. Here, we compare the person at different age groups with There are some risk factors like hacking or duplication higher recognition rate in comparison to 2D face recognition possible in fingerprint devices. One more issue when device techniques. We propose a two stage procedure of 3D face may deny to access if the finger is dirty, wet or injured. Iris recognition based on FLD (Fisher Linear Discriminant), SURF recognition devices are more interfering devices. Voice operator and depth-image. First, FLD is used on depth-image recognition devices are having some conditions, e.g. if person to perform recognition and then the SURF features of 2D is suffering by throat problem, that time they may fail to give gray images to carry out the refined recognition. Finally, our correct results. So Face recognition system will be proposed work will increase the robustness in expression recommended even it may not reach to be perfect but this is variations. more advanced than other techniques. Index Terms—speeded up robust features, fisher linear discriminant, depth image, principal component analysis. II. LITERATURE SURVEY A. OVERVIEW I. INTRODUCTION Present social world is too complex so the survival of an A computer application that identifies or verifies a digital individual depends on the interpreting visual information image or a video of any human is a facial recognition system. about the personal factors like age, identity and emotional This can be done by matching that facial image [2] with state of another person based on that face. Facial expressions available facial database. This type of recognition system is [2], facial poses, appearance of face and its illumination are typically used in security systems. Such systems can be having a great impact in different adverse conditions. By compared to existing biometrics like nose, fingerprint, eyes using these, humans can perform face identification with or whole face recognition systems. good robustness without knowing more about individuals. Most of the face recognition algorithms identify faces by Face recognition researchers using different techniques since extracting features from an image of the subject’s face. The 1970s, and it got a significant importance in the last two size of the image, shape of the eyes, nose, and relative position decades. The reasons behind the growth for face recognition of different features of the image are analyzed by the used system are the possibility of wide range of applications of it algorithms. The features are used to search for other images and the emergence of affordable hardware. Hardware, such with matching features. Some other algorithms normalize the as digital cameras, made the capturing of high-quality and gallery of face images and then compress the face data. After high resolution images more similar. that, only useful data are saved in images which are needed Many 2D based approaches such as PCA (principal for face detection. A probe image is then compared with the Component Analysis), FLD (Fisher Linear Discriminant), ICA face data. (Independent Component Analysis), etc, can achieve high Recognition algorithms being used include Principal recognition rate under some reasonable conditions. However, Component Analysis, Independent Component Analysis, they are still challenged by the changes of illumination, pose Linear Discriminate Analysis, Markov model and many more. and expressions. Recent progress in computation, storage In recent years the three-dimensional object / face recognition device and 3D sensors make it possible to perform recognition technique is emerging and claiming to achieve high based on 3D face data. 3D face recognition [3, 7, 8, 11] is accuracies. In 3-D face recognition technique a 3-D sensor considered to be less influenced by the changes of can be used to capture the shape of a face with relevant illumination, pose and is more robust to expression variations information. The information collected by the 3-D sensor is to some extent. Expression variation is still a big problem not used to identify different features on the surface of a face. © 2012 ACEEE 27 DOI: 01.IJSIP.03.01.86
  • 2. ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012 only for 2D face recognition but also for 3D face recognition. subspace that minimizes the scatter between images of same In order to enhance robustness to expression variations, some class and maximizes the scatter between different class effective ways have been presented. Bronstein et al. [3] used images. In PCA image elements considers random variables the bending-invariant canonical form in constructing with Gaussian distribution and also minimized the second- expression-invariant representations of faces. It is found that order statistics. But, for non-Gaussian distribution, largest 3D face recognition methods can achieve significantly high variances would not correspond to PCA basis vectors. Now, accuracy rate compared to 2D face recognition, because 3D Independent Component Analysis (ICA) minimizes both face recognition is a modality of facial recognition methods second-order and higher-order dependencies in the input in which the three-dimensional geometry of the human face data. ICA attempts to find the basis along which the data is used. The 3D face recognition also avoids some problems (when projected onto them) are statistically independent. of 2D face recognition algorithms such as change in lighting, SIFT Operator (Scale Invariant Feature Transform) [4, 1, 10, wearing spectacles, different facial expressions, head 8] was proposed for extracting distinctive invariant features orientation and make-up. The 3D models are used in improving from images that can be invariant to image scale and rotation. the accuracy of image based recognition after transforming SURF (Speeded-Up Robust Features) algorithm was first the head into knows views. proposed by Bay in 2006 [10]. Essentially, it is the improvement of SIFT algorithm. At present, SURF has been B. RELATED WORKS applied to image registration, camera calibration and object The survey on state of the art in 3D describes the latest recognition. Many SIFT or SURF-based researches have been results and also, the recent research trends, showing that the carried out in face recognition. In order to enhance robustness variety and sophistication of algorithmic approaches explored to expression variations, we propose a two-stage procedure are expanding. It is challenging to improve the accuracy in of 3D face recognition based on depth image and SURF recognition, facial expression robustness and rendering. So Operator. We use FLD method on the depth image to perform representation of the scene is bulky and it needs good coarse recognition, and then we extract the SURF features of algorithms for real-time rendering and efficient representation. the 2D gray images to carry out the refined recognition. Many methods are using Principal Component Analysis (PCA). RajKiran Gottumukkal et al. [9] which tested the III. PROPOSED SYSTEM potential of PCA in modular approach and the facial image is divided into modules and then PCA is applied over each We propose a 3D Face recognition and facial age analysis module. system which includes two steps. A real face is described by its 3D shape and texture so it is First, carry out coarse recognition using FLD on the depth reasonable to use geometry and color or intensity, to improve images to increase the robustness and recognition rate. recognition reliability. This is the idea behind 3D+2D face FLD is an enhancement to PCA. It constructs a discriminant recognition. Ashutosh Saxena et al.[8] is based on MRF to subspace that minimizes the scatter between images of same get the monocular cues from a single still image, and class and maximizes the scatter between different class respectively convert it into 3D. Belhumeur et al. [5] proposed images. a comparative study of eigenfaces generated by PCA and  Let X 1 , X 2 ,..., X c be the face classes in the database and fisherfaces generated by LDA to show that fisherfaces are more robust towards expressions. Kresimir Delac et al. [6] let each face class X i , i  1, 2,...c has k facial proposed a comparative study of different pattern recognition algorithms ICA, PCA, LDA which provides an excellent images X j , j  1,2,..., k . difference among these algorithms.  The average face is calculated as C. METHODS FOR ACQUIRING 3D IMAGE DATA c k There are various ways for representing 3D face data. Point clouds, appearance-based, triangle mesh, layering, A 1 kc  X i 1 j 1 ij depth image etc are different approaches for 3D image data.  Each face differs from the average face by the vector Out of these, Depth Images can be computed from the real world using cameras or other scanning devices. Yij  X ij  A D. ALGORITHMS USED FOR FEATURE EXTRACTION  The Covariance matrix C is obtained as: Principal component analysis (PCA) [5, 9] is a c k T mathematical procedure used in transforming a number of C 1 kc  Y .Y i 1 j 1 ij ij . correlated variables into uncorrelated variables, i.e. principal components. PCA calculates the eigenvalue decomposition  The Eigenvectors are calculated from this covariance matrix. of a data covariance matrix of a data matrix after mean centering  We compute the mean image  i of each class X i as: the data for each attribute.LDA (Linear Discriminant Analysis) [5, 6] is an enhancement to PCA which constructs a discriminant © 2012 ACEEE 28 DOI: 01.IJSIP.03.01.86
  • 3. ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012  Now, the mean image  of all the classes in the database by light colors as compared to the portion which is farther can be calculated as: away. This concept is used for the conversion of 2D image c into 3D perceived image. The brighter part of the image   1  i represents lesser depth as compared to the darker part. c i 1 Feature extraction using FLD method based on depth image: Though the dimensions of depth image used in this work We calculate within-class scatter matrix as: is reduced after pretreatment, the dimensions is still too high c to use FLD directly so we are combining PCA with FLD to T Sw    X i 1 X k X i k   i X k   i  solve this problem. The feature vectors are generated after applying PCA and FLD respectively over the images. The We calculate the between-class scatter matrix as: process of PCA and FLD has been already described above. c These vectors are used for the similarity measurement. T Recognition using SURF operator: SB   N i   i   i  i 1 In this module we will compute the recognition rate by calculating the similarity between training images and testing We calculate the projection matrix as: image using SURF operator. The similarity is calculated by W LDA  S W .SB calculating the distance between testing and training images. We extract the feature vectors as: IV. RESULTS AND DISCUSSIONS T T I ij  WLDA WPCA x ij In FRAV3D_1 database [12], we have used three classes Secondly, extract the SURF features of the 2D gray images representing three different persons. Each class has 14 images corresponding to 3D faces obtained by previous step, to representing different expressions of the same person within perform the refined recognition. the class. Distance = sum (( Finaldatatesting – Finaldatatraining ).^2).^0.5 A. OUTPUT / RESULTS M = mean (Distance) In this proposed system, the outputs will vary as per the L = min (Distance) given inputs. We are considering three different possible Percentage = ((M – L)/M )* 100 outputs which are given below: A. ASSUMPTIONS 3D Face recognition should overcome the differences which occur in faces due to viewing angle, facial expressions, illumination etc. In this project we are concerned about the differences related to facial expressions, so viewing angle is assumed to be constant for all the images. We are taking a facial expression database consisting of training images and testing images for 3D face recognition system. We have used bmp files for both the training and testing Figure1. (a) 2D testing image (b) Most Similar Image set of images. We have assumed that the image format remains constant throughout the process. Though we have used bmp Expression variant testing: files only, it can work well with other image formats also. The We have taken a 2D testing image as an input shown in size of all the images is assumed to be constant as variation Figure 1(a), which is an expression variant image of the images in size will lead to resizing of all the images to a constant already existing in the database. Now, this input is processed value. The facial images which we have used are of high as per the proposed system and the output will show the quality and thus noise is ignored. If noisy image is to be most similar image of the given input as shown in Figure 1(b). used, then we need to filter it. The output will show the class to which the particular input image belongs to, as shown in Figure 2. B. ARCHITECTURE SPECIFICATION This 3D Face recognition system consists of three modules namely acquisition of depth image, feature extraction using FLD method based on depth image, recognition using SURF operator. Acquisition of depth image: 3D face data is obtained from the 2D image data by the use of layering. Layering provides a common colormap to all the images. The main concept used for layering is that in any image, the part which is closer to the viewer is represented Figure2. Matched Class © 2012 ACEEE 29 DOI: 01.IJSIP.03.01.86
  • 4. ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012 Input testing image is not present in the database: C. DISCUSSION We have taken a 2D testing image as an input shown in From the experiments done over the images, it is found Figure 3(a), whose class does not exist in the database. that 3D data provides a higher rate of similarity as compared to 2D data. It can be found from Figure 6 that there is an upward shift in the graph of LDA with 3D.This shows the better similarity of the images. It can also be seen in the graph that there is less fluctuation in the similar class of LDA with 3D as compared to the similar class of 2D. But the dissimilarity among different classes also decreases in the case of LDA with 3D, which can be considered as a drawback of this experiment. In both the cases i.e. LDA with 2D images and LDA with 3D images, the curve is smooth around the dissimilar class. Figure3. (a) 2D Testing Image (b) Match Not Found So it can be concluded that 3D data does not provide much Now, this input is processed as per the proposed system. difference with 2D data in case of dissimilarity. As this particular input image does not exist in our database, so it will pop up a window showing that the match is not available in the database as shown in Figure 3(b). Input image for facial age analysis: For facial age analysis, the input image will be an image of a child as shown in Figure 4(a). Now, this input is processed as per the proposed system and the output will show the similar image of elder age of the given input as shown in Figure 4(b). Figure6. Comparison of LDA in 3D and LDA in 2D TABLEI. C OMPARISON T ABLE Figure1. (a) Younger Image (b) Elder Image B. RESULT ANALYSIS The algorithm was tested on MATLAB 7.6.0. The implementation had 14 expression samples each of 3 different classes. We performed LDA with PCA on the actual samples. There are different types of complexity which we go through while implementing the algorithm.The experiment was repeated with different number of eigenvectors. Case 1: Testing image is present in database It was observed that, as number of eigenvectors increase Case 2: Testing image is an expression variant image of the the recognition rate also increases as shown in Figure 5, but training set images at the cost of computational complexity. It was observed that Case 3: Testing image whose class is not present in the LDA with PCA is able to achieve higher rates of recognition database. than only PCA. Using only PCA implementation, the accuracy CONCLUSIONS of recognition is low and inconsistent as it is unable to The experiments on the database FRAV3D_1 [12] shows recognize images having different expressions and it is very that face recognition with high accuracy and recognition rate much affected due to same illumination of all the images. is still a challenge. Though 3D face data is more robust to expression variation, the high accuracy rate is still a challenge. The accuracy rate of 3D face recognition depends on the pretreatment of the images. There are various techniques for converting a 2D data into 3D data but all of them itself is a very broad research area. 3D face recognition technique is much more complicated as compared to that of 2D techniques.The FLD algorithm is applied over the PCA Figure1. Results of LDA for different Eigenvectors extracted feature vectors for extracting the expression © 2012 ACEEE 30 DOI: 01.IJSIP.03.01.86
  • 5. ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012 invariant feature vectors. After this, the SURF operator algo- 417, 2006. rithm is applied to calculate the similarity and dissimilarity. [11] Alexander M. Bronstein, Michael M. Bronstein, and Ron The accuracy rate is found to be 97.83%, shown in Table I. Kimmel, “Expression-Invariant 3D Face Recognition”, Proceedings The same procedure is applied for the age analysis also. of the 4th international conference on Audio- and video-based biometric person authentication AVBPA’03, LNCS 2688, pp. 62- But it is found that the recognition rate for expression variant 70, 2003. images is high as compared to age differences. The images used for age analysis is a real time image and thus noisy, Chiranji Lal Chowdhary is an Assistant which leads to low recognition rate. Also, only PCA is applied Professor (Sr.) and an internal part time on the images, as the database for various expressions was research scholar at VIT University, Vellore. not used hence LDA cannot be applied, which also leads to His research interests are in Image Processing a low recognition rate. So, a better approach can be used to and Computer Vision. He is a life member of get a high recognition and accuracy rate. Indian Science Congress Association (ISCA). REFERENCES Richa Dhanuka is presently working in Misys [1] Lei Yunqi, Lai Haibin, and Jiang Xutuan, “3D Face Recognition Software Solutions, Bangalore. She had by SURF Operator based on depth image”, Department of computer BTech-IT from VIT University, Vellore in 2011. science, Xiamen University, IEEE, pp 240-244, 2010. [2] Q. M. Rizvi and R. Asthana, “Facial Analysis Between Age Groups Using Distance Matrices”, Tryst Technical Conference, Arpana Kumari had B.Tech-IT from VIT pp 34-38, 2010. University, Vellore in 2011. She got an offer [3] A. M. Bronstein, M. M. Bronstein, and R. Kimmel, “Three- from Sapient Corporation Private Limited, dimensional Face Recognition”, Journal of Computer Vision (IJCV), Bangalore. Vol. 64/1, pp.5-30, August 2005. [4] Luo Juan, Oubong Gwun, “A Comparison of SIFT, PCA-SIFT Dr. Chandra Mouli P.V.S.S.R. is an Associate and SURF”, International Journal of Image Processing (IJIP), Volume Professor, School of Computing Science and (3), Issue (4), pp 143-152, 2009. Engineering, VIT University, Vellore, India. [5] P.N. Belhumeur, J.P. Hespanha, and D.J. Kriegmanf, “Eigenfaces vs. Fisherfaces: Recognition using class specific linear projection”, He received his Ph.D. in Digital Image IEEE Trans. Pattern Anal. Machine Intell. 19 (7), 711-720, 1997. Processing from NIT Tiruchirappalli, India. [6] Kresimir Delac , Mislav Grgic, and Sonja Grgic, “A comparative His research interests include Digital Image Processing, study of ICA, PCA and LDA”, Wiley Periodicals, Inc , Vol. 15, Computer Vision, Pattern Recognition, Biometrics, Bio- 252–260, 2006. informatics and Image Retrieval. He has published more than [7] Hanqi Zhuang, Teerapat Theerawong, Xin Guan, Salvatore 13 refereed research papers in various international and Morgera, and Abhi Pandya, “A Method for Creating 3D Face from national journals and conferences. He was associated with a 2D Face Image”, Florida Conference on Recent Advances in two sponsored research projects as Co-Investigator. Robotics, May 25-26, 2006. Presently, he is working on a funded project from DRDO as [8] Ashutosh Saxena, Min Sun, and Andrew Y. Ng, “Make3D: Depth Perception from a Single Still Image”, Association for the Principal Investigator. He is an IEEE member and life member Advancement of Artificial Intelligence (www.aaai.org), 2008. of Indian Society of Technical Education (ISTE). He is a [9] RajKiran Gottumukkal, and Vijaya K. Asari, “An improved reviewer for many international journals. face recognition technique based on modular PCA approach”, Pattern Recognition Letters Vol. 25 pp 429–436, 2004. [10] H. Bay, T. Tuytelaars, and L. Van Gool, “Surf: Speeded up robust features”, European Conference on Computer Vision, 1:404- © 2012 ACEEE 31 DOI: 01.IJSIP.03.01.86