SlideShare a Scribd company logo
1 of 7
Download to read offline
Advanced Computing: An International Journal (ACIJ), Vol.5, No.2/3, May 2014
DOI : 10.5121/acij.2014.5304 33
FACE RECOGNITION FROM A SINGLE SAMPLE
USING RLOG FILTER AND MANIFOLD ANALYSIS
Jaya Susan Edith. S1
and A.Usha Ruby2
1
Department of Computer Science and Engineering,CSI College of Engineering,
2
Research scholar, Bharath University
ABSTRACT
Face recognition is A technique that has been widely used in various important field, this process helps in
the identification of an individual by a machine for the purpose of security and ease of work. The normal
technique of face recognition usually works better when there are multiple samples for a single person
(MSSP) is available. In present applications where this technique is to be used such as in social networks,
security systems, identification cards there is only a single sample per person (SSPP) that is readily
available. This less availability of the samples causes failure in the working of conventional face
recognition techniques which require multiple samples for a particular individual. To overcome this
drawback which sets back the system from the accurate functioning of face recognition this paper puts
forward a novel technique which makes use of discriminative multi-manifold analysis (DMMA) that
extracts distinctive features using image patches. Recognition is done by the process of manifold to
manifold matching. Hence there is an increment in the accuracy rate of face recognition.
KEYWORDS
Face recognition; manifold learning; filter; clustering.
1.INTRODUCTION
Face recognition is a process in which a machine system automatically recognizes an individual
from a digital image or video based on formerly stored samples of that individual. It is more
beneficial and easier to use than other biometric techniques used for security such as fingerprint
or iris recognition, because it can be done passively without any intervention of the person which
is a must for other techniques for the purpose of identification of the individual. Many techniques
are currently being used for the face recognition out of which one is to associate extracted facial
features with the facial database. A large number of algorithms have been proposed, where the
main goal is to learn in a supervised, semi-supervised or in unsupervised manner. The two
primary tasks for which face recognition has been used are verification and identification. And its
various applications include security, surveillances, general identity verification, criminal justice
systems, and other similar application.
Single image per person consists of frontal face image; there are two eyes, one nose, and one
mouth in the image. When comparison is done between eyes of two different persons the rate of
similarity in appearance is higher when compared to the eyes and nose of the same person. When
the image is made discrete into several local patches, it is more likely that these patches reside in
Advanced Computing: An International Journal (ACIJ), Vol.5, No.2/3, May 2014
34
a manifold and each patch corresponds to a point in the manifold. Manifold is a collection of
similar datasets. The overlapping between the patches of dissimilar persons is more because their
similarity is high and there is distance between the patches of one person. In order to increase the
distance between dissimilar individuals manifold margins discriminative multimanifold analysis
(DMMA) method is used.
2. RELATED WORK
To overcome the difficultly faced in using single sample per person (SSPP) for face recognition,
there have been several attempts and they are categorized into four basic categories they are; local
feature representations, generic learning, virtual sample generation, and image partitioning. In
local feature representation feature descriptor is applied to represent each face image as a feature
vector, and different persons features are expected to be separated from each other. In generic
training sets multiple samples per person are used to extract the discriminative features which are
used for the separation. For virtual sample generation each person’s images are virtually
generated. And image partitioning the sample image is portioned into multiple local patches used
for feature extraction.
3. PROPOSED APPROACH
This paper makes use of interest point detection for the purpose of feature extraction followed by
DMMA technique for the purpose of clustering all the points that are belonging to same
individual into a single group. Interest point detection is done with the help of RLOG (Rank order
Laplacian of Gaussian) filter which generates random interest points that help in the identification
and feature extraction of an individual. ROLG filter has the following advantages in detecting
interest points:
1. The light but strong structures has less influence on the output of the ROLG filter.
2. Structures, which incompletely fall in a detection window, have limited influence on the
response of the ROLG filter.
3.Only one peak is created at the center of a blob, and no ring is generated around the blob.
4. The ROLG filter suppresses the output of edges. Therefore, no point is detected along edges.
Figure 1. Interest point detection using RLOG filter.
Advanced Computing: An International Journal (ACIJ), Vol.5, No.2/3, May 2014
35
Fig. 2. Overlapping of patches of different persons.
The overlapping of patches is seen in figure 2 because eyes of two different people are similar in
shape and texture when compared to the eyes and nose of the same person. The feature patches of
the same individual are separated due to the dissimilarity in their appearance. To solve this
problem DMMA is being used to separate the patches that do not belong to the same person and
bring all the patches belonging to a single person into one manifold.
The main motive of using separate manifolds for different persons is that manifold for each
person is person specific feature extraction method gain more accuracy than generic methods.
The other reason is surviving techniques using manifold considers a single manifold for all faces
and the measurement of feature of all face samples is preferred the same for recognition. The
optimal feature dimension for each person may be different due to intrinsic differences of
different persons. Due to this we model each person as a manifold so that we can optimize the
feature dimensions for each individual.
Let X=[x1,x2,…,xN] be the training set, where xj is the training image of the jth person with the
size of m × n, 1 ≤ j ≤ N, N is the number of persons in the training set. Each image xj is
partitioned image is into t nonoverlapping feature patches with an equal size of ab where t=
.Let Mi = [xi1,xi2,….,xit] be the image patch set of the ith person, represented by manifold Mi.
Face is automatically detected using Viola-Jones face detector Each image is split into 20×20
nonoverlapping feature patches. The subjects are taken from database and the manifold structure
is formed. The appearance of the distribution of all the patches in the manifold is depicted in
figure 2. All patches of similar appearance are distributed together and the patches of one single
individual are distributed far away from each other. To bring all the patches belonging one
individual together DMMA technique is applied.
Advanced Computing: An International Journal (ACIJ), Vol.5, No.2/3, May 2014
36
Fig.3. Block diagram of face recognition system
I. DMMA method
Let M = [M1,M2,…,MN] be the training set of N people and Mi = [xi1,xi2,….,xit] be the
manifold of the ith person , xir € Rd , 1≤ i ≤ t . DMMA seeks N feature matrices W1,W2,
….,WN ,Wi Rd×di , i=1,2,…,N , to project the training set into N low dimensional feature spaces
in a way that the manifold margins are maximized, where d and di represent the feature
dimension of each original image patch and the low dimensional feature learned by Wi,
respectively.
There are two types of neighbor present in this manifold for a sample manifold xir, which is the
rth patch of the ith manifold as shown in figure 4: intermanifold neighbors Ninter and
intramanifold neighbors Nintra. Intermanifold neighbors are the patches of same person and
intramanifold neighbors are the patches of different persons. DMMA focuses on incrementing the
manifold margins by reducing intermanifold distance and thereby incrementing the intramanifold
distance.
max J(W1,W2, ….WN)
= J1(W1,W2,….,WN) —
J2(W1,W2, ….,WN)
Advanced Computing: An International Journal (ACIJ), Vol.5, No.2/3, May 2014
37
Where xirp represents the pth k1- nearest manifold and xirq denotes the qth k2- nearest
intramanifold neighbor of xir .
There are two affinity matrix Airp and Birq to characterize the similarity between xirp and xir as
well as that between xirq and xir.. The objective function of J1 is to ensure that if xir and xirp are
close and from dissimilar subjects, then their low dimensional illustrations are separated as far as
possible.On the other hand, J2 in ensures that if xir and xirq are close and from the same subject,
then their low dimensional illustrations are close as well.
Fig. 4. There are six intermanifold neighbors present ouside and three intramanifold neighbor in the inner
circle for local patch.
Procedure
Input: Manifold.
Output: Projection matrix.
Algorithm:
Step 1: Initialization.
Step 2: Similarity matrix calculation.
Step 3: Local optimization.
Step 4: Output Projection matrix.
Advanced Computing: An International Journal (ACIJ), Vol.5, No.2/3, May 2014
38
Fig. 5 Distribution of pixels after application of DMMA
We can select di eigenvectors to maximize . During the projection of specific eigenvector wj
corresponding to an eigenvalue j can be written as
J(wj) = J1(wj) —J2(wj)
= wjT( H1 — H2) wj
= wjT wj
= j
If j 0 , it means the intermanifold distance is larger than the intramanifold distance along the
direction of wj and the samples are correctly classified.
4.CONCLUSION
This paper introduces a novel high capacity face detection technology. In order to achieve a
higher quality detecting system discriminative multi-manifold technique has been introduced.
This technique makes use of only one image of a person stored in the database and this image is
split into various patches, based on features the matching is done. The best matching feature is
matched to the individual in the database hence this technique saves space and time.
REFERENCES
[1] Jiwen Lu, Member, IEEE, Yap-Peng Tan, Senior Member, IEEE, and Gang Wang, Member, IEEE,
Discriminative Multimanifold Analysis for Face Recognition from a Single Training Sample per
Person‖. IEEE transactions on pattern analysis and machine intelligence, vol. 35, no. 1, January 2013.
[2] H. Hu, ―Orthogonal Neighborhood Preserving Discriminant Analysis for Face Recognition,‖ Pattern
Recognition, vol. 41, No. 6, pp. 2045-2054, 2008.
[3] A. Lanitis, ―Evaluating the Performance of Face-Aging Algorithms,‖Proc. IEEE Int’l Conf.
Automatic Face and Gesture Recognition, pp. 1-6, 2008.
Advanced Computing: An International Journal (ACIJ), Vol.5, No.2/3, May 2014
39
[4] S. Yan, D. Xu, B. Zhang, H. Zhang, Q. Yang, and S. Lin, ―Graph Embedding and Extensions: A
General Framework for Dimensionality Reduction,‖ IEEE Trans. Pattern Analysis and Machine
Intelligence, vol. 29, no. 1, pp. 40-51, Jan. 2007.
[5] R. Wang and X. Chen. ‖Manifold Discriminant Analysis‖. In IEEE Conference on Computer Vision
and Pattern Recognition, pages 1–8, 2009.
[7] R. Wang, S. Shan, X. Chen, and W. Gao, ―Manifold-Manifold Distance with Application to Face
Recognition Based on Image Set,‖ Proc. IEEE Conf. Computer Vision and Pattern Recognition, pp. 1-
8, 2008.
[8] D. Zhang and Z. Zhou, ―2D2PCA: Two-Directional Two-Dimensional PCA for Efficient Face
Representation and Recognition,‖ Neurocomputing, vol. 69, nos. 1-3, pp. 224-231, 2005.
[9] Zhenwei Miao n, Xudong Jiang School of Electrical and Electronic Engineering, Nanyang
Technological University, Nanyang Link, Singapore 639798 ,Singapore. 2013 Elsevier.

More Related Content

What's hot

Facial image classification and searching –a survey
Facial image classification and searching –a surveyFacial image classification and searching –a survey
Facial image classification and searching –a surveyZac Darcy
 
Face Detection Using Modified Viola Jones Algorithm
Face Detection Using Modified Viola Jones AlgorithmFace Detection Using Modified Viola Jones Algorithm
Face Detection Using Modified Viola Jones Algorithmpaperpublications3
 
Model Based Emotion Detection using Point Clouds
Model Based Emotion Detection using Point CloudsModel Based Emotion Detection using Point Clouds
Model Based Emotion Detection using Point CloudsLakshmi Sarvani Videla
 
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...iosrjce
 
International Journal of Biometrics and Bioinformatics(IJBB) Volume (2) Issue...
International Journal of Biometrics and Bioinformatics(IJBB) Volume (2) Issue...International Journal of Biometrics and Bioinformatics(IJBB) Volume (2) Issue...
International Journal of Biometrics and Bioinformatics(IJBB) Volume (2) Issue...CSCJournals
 
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...IJTET Journal
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2prjpublications
 
IRJET - Facial Recognition based Attendance System with LBPH
IRJET -  	  Facial Recognition based Attendance System with LBPHIRJET -  	  Facial Recognition based Attendance System with LBPH
IRJET - Facial Recognition based Attendance System with LBPHIRJET Journal
 
Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsDetection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsredpel dot com
 
IRJET - Multi-Modal Palm Print and Finger Dorsal Biometric Authentication Sys...
IRJET - Multi-Modal Palm Print and Finger Dorsal Biometric Authentication Sys...IRJET - Multi-Modal Palm Print and Finger Dorsal Biometric Authentication Sys...
IRJET - Multi-Modal Palm Print and Finger Dorsal Biometric Authentication Sys...IRJET Journal
 
Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsDetection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsRaja Ram
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsDetection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsI3E Technologies
 
Optimized Biometric System Based on Combination of Face Images and Log Transf...
Optimized Biometric System Based on Combination of Face Images and Log Transf...Optimized Biometric System Based on Combination of Face Images and Log Transf...
Optimized Biometric System Based on Combination of Face Images and Log Transf...sipij
 

What's hot (19)

Facial image classification and searching –a survey
Facial image classification and searching –a surveyFacial image classification and searching –a survey
Facial image classification and searching –a survey
 
Face Detection Using Modified Viola Jones Algorithm
Face Detection Using Modified Viola Jones AlgorithmFace Detection Using Modified Viola Jones Algorithm
Face Detection Using Modified Viola Jones Algorithm
 
Model Based Emotion Detection using Point Clouds
Model Based Emotion Detection using Point CloudsModel Based Emotion Detection using Point Clouds
Model Based Emotion Detection using Point Clouds
 
ICPR Workshop ETCHB 2010
ICPR Workshop ETCHB 2010ICPR Workshop ETCHB 2010
ICPR Workshop ETCHB 2010
 
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
 
G0333946
G0333946G0333946
G0333946
 
International Journal of Biometrics and Bioinformatics(IJBB) Volume (2) Issue...
International Journal of Biometrics and Bioinformatics(IJBB) Volume (2) Issue...International Journal of Biometrics and Bioinformatics(IJBB) Volume (2) Issue...
International Journal of Biometrics and Bioinformatics(IJBB) Volume (2) Issue...
 
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2
 
IRJET - Facial Recognition based Attendance System with LBPH
IRJET -  	  Facial Recognition based Attendance System with LBPHIRJET -  	  Facial Recognition based Attendance System with LBPH
IRJET - Facial Recognition based Attendance System with LBPH
 
Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsDetection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprints
 
50220130402003
5022013040200350220130402003
50220130402003
 
IRJET - Multi-Modal Palm Print and Finger Dorsal Biometric Authentication Sys...
IRJET - Multi-Modal Palm Print and Finger Dorsal Biometric Authentication Sys...IRJET - Multi-Modal Palm Print and Finger Dorsal Biometric Authentication Sys...
IRJET - Multi-Modal Palm Print and Finger Dorsal Biometric Authentication Sys...
 
N010226872
N010226872N010226872
N010226872
 
Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsDetection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprints
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsDetection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprints
 
[IJET-V1I1P4]Author :Juhi Raut, Snehal Patil, Shraddha Gawade, Prof. Mamta Me...
[IJET-V1I1P4]Author :Juhi Raut, Snehal Patil, Shraddha Gawade, Prof. Mamta Me...[IJET-V1I1P4]Author :Juhi Raut, Snehal Patil, Shraddha Gawade, Prof. Mamta Me...
[IJET-V1I1P4]Author :Juhi Raut, Snehal Patil, Shraddha Gawade, Prof. Mamta Me...
 
Optimized Biometric System Based on Combination of Face Images and Log Transf...
Optimized Biometric System Based on Combination of Face Images and Log Transf...Optimized Biometric System Based on Combination of Face Images and Log Transf...
Optimized Biometric System Based on Combination of Face Images and Log Transf...
 

Similar to Face recogition from a single sample using rlog filter and manifold analysis

An overview of face liveness detection
An overview of face liveness detectionAn overview of face liveness detection
An overview of face liveness detectionijitjournal
 
Facial Image Classification And Searching - A Survey
Facial Image Classification And Searching - A SurveyFacial Image Classification And Searching - A Survey
Facial Image Classification And Searching - A SurveyZac Darcy
 
Face Liveness Detection for Biometric Antispoofing Applications using Color T...
Face Liveness Detection for Biometric Antispoofing Applications using Color T...Face Liveness Detection for Biometric Antispoofing Applications using Color T...
Face Liveness Detection for Biometric Antispoofing Applications using Color T...rahulmonikasharma
 
76 s201920
76 s20192076 s201920
76 s201920IJRAT
 
Review of facial expression recognition system and used datasets
Review of facial expression recognition system and used datasetsReview of facial expression recognition system and used datasets
Review of facial expression recognition system and used datasetseSAT Journals
 
Review of facial expression recognition system and
Review of facial expression recognition system andReview of facial expression recognition system and
Review of facial expression recognition system andeSAT Publishing House
 
FACE MASK DETECTION MODEL USING CONVOLUTIONAL NEURAL NETWORK
FACE MASK DETECTION MODEL USING CONVOLUTIONAL NEURAL NETWORKFACE MASK DETECTION MODEL USING CONVOLUTIONAL NEURAL NETWORK
FACE MASK DETECTION MODEL USING CONVOLUTIONAL NEURAL NETWORKmlaij
 
Paper id 24201475
Paper id 24201475Paper id 24201475
Paper id 24201475IJRAT
 
Adversarial Multi Scale Features Learning for Person Re Identification
Adversarial Multi Scale Features Learning for Person Re IdentificationAdversarial Multi Scale Features Learning for Person Re Identification
Adversarial Multi Scale Features Learning for Person Re Identificationijtsrd
 
EFFECT OF FACE TAMPERING ON FACE RECOGNITION
EFFECT OF FACE TAMPERING ON FACE RECOGNITIONEFFECT OF FACE TAMPERING ON FACE RECOGNITION
EFFECT OF FACE TAMPERING ON FACE RECOGNITIONsipij
 
A Review on Face Detection under Occlusion by Facial Accessories
A Review on Face Detection under Occlusion by Facial AccessoriesA Review on Face Detection under Occlusion by Facial Accessories
A Review on Face Detection under Occlusion by Facial AccessoriesIRJET Journal
 
LITERATURE SURVEY ON SPARSE REPRESENTATION FOR NEURAL NETWORK BASED FACE DETE...
LITERATURE SURVEY ON SPARSE REPRESENTATION FOR NEURAL NETWORK BASED FACE DETE...LITERATURE SURVEY ON SPARSE REPRESENTATION FOR NEURAL NETWORK BASED FACE DETE...
LITERATURE SURVEY ON SPARSE REPRESENTATION FOR NEURAL NETWORK BASED FACE DETE...csijjournal
 
A Face Recognition Using Linear-Diagonal Binary Graph Pattern Feature Extract...
A Face Recognition Using Linear-Diagonal Binary Graph Pattern Feature Extract...A Face Recognition Using Linear-Diagonal Binary Graph Pattern Feature Extract...
A Face Recognition Using Linear-Diagonal Binary Graph Pattern Feature Extract...ijfcstjournal
 
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...ijfcstjournal
 
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...ijfcstjournal
 
Human emotion detection and classification using modified Viola-Jones and con...
Human emotion detection and classification using modified Viola-Jones and con...Human emotion detection and classification using modified Viola-Jones and con...
Human emotion detection and classification using modified Viola-Jones and con...IAESIJAI
 
Neural Network based Supervised Self Organizing Maps for Face Recognition
Neural Network based Supervised Self Organizing Maps for Face Recognition  Neural Network based Supervised Self Organizing Maps for Face Recognition
Neural Network based Supervised Self Organizing Maps for Face Recognition ijsc
 
NEURAL NETWORK BASED SUPERVISED SELF ORGANIZING MAPS FOR FACE RECOGNITION
NEURAL NETWORK BASED SUPERVISED SELF ORGANIZING MAPS FOR FACE RECOGNITIONNEURAL NETWORK BASED SUPERVISED SELF ORGANIZING MAPS FOR FACE RECOGNITION
NEURAL NETWORK BASED SUPERVISED SELF ORGANIZING MAPS FOR FACE RECOGNITIONijsc
 

Similar to Face recogition from a single sample using rlog filter and manifold analysis (20)

An overview of face liveness detection
An overview of face liveness detectionAn overview of face liveness detection
An overview of face liveness detection
 
Facial Image Classification And Searching - A Survey
Facial Image Classification And Searching - A SurveyFacial Image Classification And Searching - A Survey
Facial Image Classification And Searching - A Survey
 
Face Liveness Detection for Biometric Antispoofing Applications using Color T...
Face Liveness Detection for Biometric Antispoofing Applications using Color T...Face Liveness Detection for Biometric Antispoofing Applications using Color T...
Face Liveness Detection for Biometric Antispoofing Applications using Color T...
 
E010222124
E010222124E010222124
E010222124
 
76 s201920
76 s20192076 s201920
76 s201920
 
Review of facial expression recognition system and used datasets
Review of facial expression recognition system and used datasetsReview of facial expression recognition system and used datasets
Review of facial expression recognition system and used datasets
 
Review of facial expression recognition system and
Review of facial expression recognition system andReview of facial expression recognition system and
Review of facial expression recognition system and
 
FACE MASK DETECTION MODEL USING CONVOLUTIONAL NEURAL NETWORK
FACE MASK DETECTION MODEL USING CONVOLUTIONAL NEURAL NETWORKFACE MASK DETECTION MODEL USING CONVOLUTIONAL NEURAL NETWORK
FACE MASK DETECTION MODEL USING CONVOLUTIONAL NEURAL NETWORK
 
G041041047
G041041047G041041047
G041041047
 
Paper id 24201475
Paper id 24201475Paper id 24201475
Paper id 24201475
 
Adversarial Multi Scale Features Learning for Person Re Identification
Adversarial Multi Scale Features Learning for Person Re IdentificationAdversarial Multi Scale Features Learning for Person Re Identification
Adversarial Multi Scale Features Learning for Person Re Identification
 
EFFECT OF FACE TAMPERING ON FACE RECOGNITION
EFFECT OF FACE TAMPERING ON FACE RECOGNITIONEFFECT OF FACE TAMPERING ON FACE RECOGNITION
EFFECT OF FACE TAMPERING ON FACE RECOGNITION
 
A Review on Face Detection under Occlusion by Facial Accessories
A Review on Face Detection under Occlusion by Facial AccessoriesA Review on Face Detection under Occlusion by Facial Accessories
A Review on Face Detection under Occlusion by Facial Accessories
 
LITERATURE SURVEY ON SPARSE REPRESENTATION FOR NEURAL NETWORK BASED FACE DETE...
LITERATURE SURVEY ON SPARSE REPRESENTATION FOR NEURAL NETWORK BASED FACE DETE...LITERATURE SURVEY ON SPARSE REPRESENTATION FOR NEURAL NETWORK BASED FACE DETE...
LITERATURE SURVEY ON SPARSE REPRESENTATION FOR NEURAL NETWORK BASED FACE DETE...
 
A Face Recognition Using Linear-Diagonal Binary Graph Pattern Feature Extract...
A Face Recognition Using Linear-Diagonal Binary Graph Pattern Feature Extract...A Face Recognition Using Linear-Diagonal Binary Graph Pattern Feature Extract...
A Face Recognition Using Linear-Diagonal Binary Graph Pattern Feature Extract...
 
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
 
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
 
Human emotion detection and classification using modified Viola-Jones and con...
Human emotion detection and classification using modified Viola-Jones and con...Human emotion detection and classification using modified Viola-Jones and con...
Human emotion detection and classification using modified Viola-Jones and con...
 
Neural Network based Supervised Self Organizing Maps for Face Recognition
Neural Network based Supervised Self Organizing Maps for Face Recognition  Neural Network based Supervised Self Organizing Maps for Face Recognition
Neural Network based Supervised Self Organizing Maps for Face Recognition
 
NEURAL NETWORK BASED SUPERVISED SELF ORGANIZING MAPS FOR FACE RECOGNITION
NEURAL NETWORK BASED SUPERVISED SELF ORGANIZING MAPS FOR FACE RECOGNITIONNEURAL NETWORK BASED SUPERVISED SELF ORGANIZING MAPS FOR FACE RECOGNITION
NEURAL NETWORK BASED SUPERVISED SELF ORGANIZING MAPS FOR FACE RECOGNITION
 

More from acijjournal

Jan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfJan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfacijjournal
 
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdfCall for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdfacijjournal
 
cs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdfcs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdfacijjournal
 
cs - ACIJ (2).pdf
cs - ACIJ (2).pdfcs - ACIJ (2).pdf
cs - ACIJ (2).pdfacijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)acijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...acijjournal
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)acijjournal
 
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable DevelopmentGraduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Developmentacijjournal
 
Genetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary MethodologyGenetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary Methodologyacijjournal
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...acijjournal
 
Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) acijjournal
 
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & PrinciplesE-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principlesacijjournal
 
10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...acijjournal
 
10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...acijjournal
 
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...acijjournal
 
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...acijjournal
 

More from acijjournal (20)

Jan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfJan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdf
 
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdfCall for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
 
cs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdfcs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdf
 
cs - ACIJ (2).pdf
cs - ACIJ (2).pdfcs - ACIJ (2).pdf
cs - ACIJ (2).pdf
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
 
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable DevelopmentGraduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
 
Genetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary MethodologyGenetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary Methodology
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...
 
Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ)
 
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & PrinciplesE-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
 
10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...
 
10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...
 
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
 
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
 

Recently uploaded

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Recently uploaded (20)

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

Face recogition from a single sample using rlog filter and manifold analysis

  • 1. Advanced Computing: An International Journal (ACIJ), Vol.5, No.2/3, May 2014 DOI : 10.5121/acij.2014.5304 33 FACE RECOGNITION FROM A SINGLE SAMPLE USING RLOG FILTER AND MANIFOLD ANALYSIS Jaya Susan Edith. S1 and A.Usha Ruby2 1 Department of Computer Science and Engineering,CSI College of Engineering, 2 Research scholar, Bharath University ABSTRACT Face recognition is A technique that has been widely used in various important field, this process helps in the identification of an individual by a machine for the purpose of security and ease of work. The normal technique of face recognition usually works better when there are multiple samples for a single person (MSSP) is available. In present applications where this technique is to be used such as in social networks, security systems, identification cards there is only a single sample per person (SSPP) that is readily available. This less availability of the samples causes failure in the working of conventional face recognition techniques which require multiple samples for a particular individual. To overcome this drawback which sets back the system from the accurate functioning of face recognition this paper puts forward a novel technique which makes use of discriminative multi-manifold analysis (DMMA) that extracts distinctive features using image patches. Recognition is done by the process of manifold to manifold matching. Hence there is an increment in the accuracy rate of face recognition. KEYWORDS Face recognition; manifold learning; filter; clustering. 1.INTRODUCTION Face recognition is a process in which a machine system automatically recognizes an individual from a digital image or video based on formerly stored samples of that individual. It is more beneficial and easier to use than other biometric techniques used for security such as fingerprint or iris recognition, because it can be done passively without any intervention of the person which is a must for other techniques for the purpose of identification of the individual. Many techniques are currently being used for the face recognition out of which one is to associate extracted facial features with the facial database. A large number of algorithms have been proposed, where the main goal is to learn in a supervised, semi-supervised or in unsupervised manner. The two primary tasks for which face recognition has been used are verification and identification. And its various applications include security, surveillances, general identity verification, criminal justice systems, and other similar application. Single image per person consists of frontal face image; there are two eyes, one nose, and one mouth in the image. When comparison is done between eyes of two different persons the rate of similarity in appearance is higher when compared to the eyes and nose of the same person. When the image is made discrete into several local patches, it is more likely that these patches reside in
  • 2. Advanced Computing: An International Journal (ACIJ), Vol.5, No.2/3, May 2014 34 a manifold and each patch corresponds to a point in the manifold. Manifold is a collection of similar datasets. The overlapping between the patches of dissimilar persons is more because their similarity is high and there is distance between the patches of one person. In order to increase the distance between dissimilar individuals manifold margins discriminative multimanifold analysis (DMMA) method is used. 2. RELATED WORK To overcome the difficultly faced in using single sample per person (SSPP) for face recognition, there have been several attempts and they are categorized into four basic categories they are; local feature representations, generic learning, virtual sample generation, and image partitioning. In local feature representation feature descriptor is applied to represent each face image as a feature vector, and different persons features are expected to be separated from each other. In generic training sets multiple samples per person are used to extract the discriminative features which are used for the separation. For virtual sample generation each person’s images are virtually generated. And image partitioning the sample image is portioned into multiple local patches used for feature extraction. 3. PROPOSED APPROACH This paper makes use of interest point detection for the purpose of feature extraction followed by DMMA technique for the purpose of clustering all the points that are belonging to same individual into a single group. Interest point detection is done with the help of RLOG (Rank order Laplacian of Gaussian) filter which generates random interest points that help in the identification and feature extraction of an individual. ROLG filter has the following advantages in detecting interest points: 1. The light but strong structures has less influence on the output of the ROLG filter. 2. Structures, which incompletely fall in a detection window, have limited influence on the response of the ROLG filter. 3.Only one peak is created at the center of a blob, and no ring is generated around the blob. 4. The ROLG filter suppresses the output of edges. Therefore, no point is detected along edges. Figure 1. Interest point detection using RLOG filter.
  • 3. Advanced Computing: An International Journal (ACIJ), Vol.5, No.2/3, May 2014 35 Fig. 2. Overlapping of patches of different persons. The overlapping of patches is seen in figure 2 because eyes of two different people are similar in shape and texture when compared to the eyes and nose of the same person. The feature patches of the same individual are separated due to the dissimilarity in their appearance. To solve this problem DMMA is being used to separate the patches that do not belong to the same person and bring all the patches belonging to a single person into one manifold. The main motive of using separate manifolds for different persons is that manifold for each person is person specific feature extraction method gain more accuracy than generic methods. The other reason is surviving techniques using manifold considers a single manifold for all faces and the measurement of feature of all face samples is preferred the same for recognition. The optimal feature dimension for each person may be different due to intrinsic differences of different persons. Due to this we model each person as a manifold so that we can optimize the feature dimensions for each individual. Let X=[x1,x2,…,xN] be the training set, where xj is the training image of the jth person with the size of m × n, 1 ≤ j ≤ N, N is the number of persons in the training set. Each image xj is partitioned image is into t nonoverlapping feature patches with an equal size of ab where t= .Let Mi = [xi1,xi2,….,xit] be the image patch set of the ith person, represented by manifold Mi. Face is automatically detected using Viola-Jones face detector Each image is split into 20×20 nonoverlapping feature patches. The subjects are taken from database and the manifold structure is formed. The appearance of the distribution of all the patches in the manifold is depicted in figure 2. All patches of similar appearance are distributed together and the patches of one single individual are distributed far away from each other. To bring all the patches belonging one individual together DMMA technique is applied.
  • 4. Advanced Computing: An International Journal (ACIJ), Vol.5, No.2/3, May 2014 36 Fig.3. Block diagram of face recognition system I. DMMA method Let M = [M1,M2,…,MN] be the training set of N people and Mi = [xi1,xi2,….,xit] be the manifold of the ith person , xir € Rd , 1≤ i ≤ t . DMMA seeks N feature matrices W1,W2, ….,WN ,Wi Rd×di , i=1,2,…,N , to project the training set into N low dimensional feature spaces in a way that the manifold margins are maximized, where d and di represent the feature dimension of each original image patch and the low dimensional feature learned by Wi, respectively. There are two types of neighbor present in this manifold for a sample manifold xir, which is the rth patch of the ith manifold as shown in figure 4: intermanifold neighbors Ninter and intramanifold neighbors Nintra. Intermanifold neighbors are the patches of same person and intramanifold neighbors are the patches of different persons. DMMA focuses on incrementing the manifold margins by reducing intermanifold distance and thereby incrementing the intramanifold distance. max J(W1,W2, ….WN) = J1(W1,W2,….,WN) — J2(W1,W2, ….,WN)
  • 5. Advanced Computing: An International Journal (ACIJ), Vol.5, No.2/3, May 2014 37 Where xirp represents the pth k1- nearest manifold and xirq denotes the qth k2- nearest intramanifold neighbor of xir . There are two affinity matrix Airp and Birq to characterize the similarity between xirp and xir as well as that between xirq and xir.. The objective function of J1 is to ensure that if xir and xirp are close and from dissimilar subjects, then their low dimensional illustrations are separated as far as possible.On the other hand, J2 in ensures that if xir and xirq are close and from the same subject, then their low dimensional illustrations are close as well. Fig. 4. There are six intermanifold neighbors present ouside and three intramanifold neighbor in the inner circle for local patch. Procedure Input: Manifold. Output: Projection matrix. Algorithm: Step 1: Initialization. Step 2: Similarity matrix calculation. Step 3: Local optimization. Step 4: Output Projection matrix.
  • 6. Advanced Computing: An International Journal (ACIJ), Vol.5, No.2/3, May 2014 38 Fig. 5 Distribution of pixels after application of DMMA We can select di eigenvectors to maximize . During the projection of specific eigenvector wj corresponding to an eigenvalue j can be written as J(wj) = J1(wj) —J2(wj) = wjT( H1 — H2) wj = wjT wj = j If j 0 , it means the intermanifold distance is larger than the intramanifold distance along the direction of wj and the samples are correctly classified. 4.CONCLUSION This paper introduces a novel high capacity face detection technology. In order to achieve a higher quality detecting system discriminative multi-manifold technique has been introduced. This technique makes use of only one image of a person stored in the database and this image is split into various patches, based on features the matching is done. The best matching feature is matched to the individual in the database hence this technique saves space and time. REFERENCES [1] Jiwen Lu, Member, IEEE, Yap-Peng Tan, Senior Member, IEEE, and Gang Wang, Member, IEEE, Discriminative Multimanifold Analysis for Face Recognition from a Single Training Sample per Person‖. IEEE transactions on pattern analysis and machine intelligence, vol. 35, no. 1, January 2013. [2] H. Hu, ―Orthogonal Neighborhood Preserving Discriminant Analysis for Face Recognition,‖ Pattern Recognition, vol. 41, No. 6, pp. 2045-2054, 2008. [3] A. Lanitis, ―Evaluating the Performance of Face-Aging Algorithms,‖Proc. IEEE Int’l Conf. Automatic Face and Gesture Recognition, pp. 1-6, 2008.
  • 7. Advanced Computing: An International Journal (ACIJ), Vol.5, No.2/3, May 2014 39 [4] S. Yan, D. Xu, B. Zhang, H. Zhang, Q. Yang, and S. Lin, ―Graph Embedding and Extensions: A General Framework for Dimensionality Reduction,‖ IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 29, no. 1, pp. 40-51, Jan. 2007. [5] R. Wang and X. Chen. ‖Manifold Discriminant Analysis‖. In IEEE Conference on Computer Vision and Pattern Recognition, pages 1–8, 2009. [7] R. Wang, S. Shan, X. Chen, and W. Gao, ―Manifold-Manifold Distance with Application to Face Recognition Based on Image Set,‖ Proc. IEEE Conf. Computer Vision and Pattern Recognition, pp. 1- 8, 2008. [8] D. Zhang and Z. Zhou, ―2D2PCA: Two-Directional Two-Dimensional PCA for Efficient Face Representation and Recognition,‖ Neurocomputing, vol. 69, nos. 1-3, pp. 224-231, 2005. [9] Zhenwei Miao n, Xudong Jiang School of Electrical and Electronic Engineering, Nanyang Technological University, Nanyang Link, Singapore 639798 ,Singapore. 2013 Elsevier.