Face Liveness Detection for Biometric Antispoofing Applications using Color T...rahulmonikasharma
Face recognition is a widely used biometric approach. Face recognition technology has developed rapidly in recent years and it is more direct, user friendly and convenient compared to other methods. But face recognition systems are vulnerable to spoof attacks made by non-real faces. It is an easy way to spoof face recognition systems by facial pictures such as portrait photographs. A secure system needs Liveness detection in order to guard against such spoofing. In this work, face liveness detection approaches are categorized based on the various types techniques used for liveness detection. This categorization helps understanding different spoof attacks scenarios and their relation to the developed solutions. A review of the latest works regarding face liveness detection works is presented. The main aim is to provide a simple path for the future development of novel and more secured face liveness detection approach.
A comparative review of various approaches for feature extraction in Face rec...Vishnupriya T H
Four feature extraction algorithms are discussed here.
1. Principal Component Analysis
2. Discreet LInear Transform
3. Independent Component Analysis
4. Linear Discriminant Aalysis
Face Liveness Detection for Biometric Antispoofing Applications using Color T...rahulmonikasharma
Face recognition is a widely used biometric approach. Face recognition technology has developed rapidly in recent years and it is more direct, user friendly and convenient compared to other methods. But face recognition systems are vulnerable to spoof attacks made by non-real faces. It is an easy way to spoof face recognition systems by facial pictures such as portrait photographs. A secure system needs Liveness detection in order to guard against such spoofing. In this work, face liveness detection approaches are categorized based on the various types techniques used for liveness detection. This categorization helps understanding different spoof attacks scenarios and their relation to the developed solutions. A review of the latest works regarding face liveness detection works is presented. The main aim is to provide a simple path for the future development of novel and more secured face liveness detection approach.
A comparative review of various approaches for feature extraction in Face rec...Vishnupriya T H
Four feature extraction algorithms are discussed here.
1. Principal Component Analysis
2. Discreet LInear Transform
3. Independent Component Analysis
4. Linear Discriminant Aalysis
FACE RECOGNITION ACROSS NON-UNIFORM MOTION BLUR Koduru KrisHna
we will get the original image by giving the read command in the MAT LAB code. The remaining images are the illuminated image, blurred image, de-blurred image, illuminated blurred image which is modulated with the LBP technique, original image which is modulated with the LBP technique and the closest match gallery image. The closest match gallery image is obtained by comparing with all the images present in the database.
INTELLIGENT FACE RECOGNITION TECHNIQUESChirag Jain
Face recognition is a form of biometric identification. A biometrics is, “Automated methods of recognizing an individual based on their unique physical or behavioral characteristics.” The process of facial recognition involves automated methods to determine identity, using facial features as essential elements of distinction.
INTRODUCTION
FACE RECOGNITION
CAPTURING OF IMAGE BY STANDARD VIDEO CAMERAS
COMPONENTS OF FACE RECOGNITION SYSTEMS
IMPLEMENTATION OF FACE RECOGNITION TECHNOLOGY
PERFORMANCE
SOFTWARE
ADVANTAGES AND DISADVANTAGES
APPLICATIONS
CONCLUSION
Face recognition is a widely used biometric approach. Face recognition technology has developed rapidly
in recent years and it is more direct, user friendly and convenient compared to other methods. But face
recognition systems are vulnerable to spoof attacks made by non-real faces. It is an easy way to spoof face
recognition systems by facial pictures such as portrait photographs. A secure system needs Liveness
detection in order to guard against such spoofing. In this work, face liveness detection approaches are
categorized based on the various types techniques used for liveness detection. This categorization helps
understanding different spoof attacks scenarios and their relation to the developed solutions. A review of
the latest works regarding face liveness detection works is presented. The main aim is to provide a simple
path for the future development of novel and more secured face liveness detection approach.
Face recognition across non uniform motionjpstudcorner
To get this project in ONLINE or through TRAINING Sessions,
Contact:JP INFOTECH, Old No.31, New No.86, 1st Floor, 1st Avenue, Ashok Pillar, Chennai -83. Landmark: Next to Kotak Mahendra Bank. Pondicherry Office: JP INFOTECH, #45, Kamaraj Salai, Thattanchavady, Puducherry -9. Landmark: Next to VVP Nagar Arch. Mobile: (0) 9952649690 , Email: jpinfotechprojects@gmail.com, web: www.jpinfotech.org Blog: www.jpinfotech.blogspot.com
FACE RECOGNITION ACROSS NON-UNIFORM MOTION BLUR Koduru KrisHna
we will get the original image by giving the read command in the MAT LAB code. The remaining images are the illuminated image, blurred image, de-blurred image, illuminated blurred image which is modulated with the LBP technique, original image which is modulated with the LBP technique and the closest match gallery image. The closest match gallery image is obtained by comparing with all the images present in the database.
INTELLIGENT FACE RECOGNITION TECHNIQUESChirag Jain
Face recognition is a form of biometric identification. A biometrics is, “Automated methods of recognizing an individual based on their unique physical or behavioral characteristics.” The process of facial recognition involves automated methods to determine identity, using facial features as essential elements of distinction.
INTRODUCTION
FACE RECOGNITION
CAPTURING OF IMAGE BY STANDARD VIDEO CAMERAS
COMPONENTS OF FACE RECOGNITION SYSTEMS
IMPLEMENTATION OF FACE RECOGNITION TECHNOLOGY
PERFORMANCE
SOFTWARE
ADVANTAGES AND DISADVANTAGES
APPLICATIONS
CONCLUSION
Face recognition is a widely used biometric approach. Face recognition technology has developed rapidly
in recent years and it is more direct, user friendly and convenient compared to other methods. But face
recognition systems are vulnerable to spoof attacks made by non-real faces. It is an easy way to spoof face
recognition systems by facial pictures such as portrait photographs. A secure system needs Liveness
detection in order to guard against such spoofing. In this work, face liveness detection approaches are
categorized based on the various types techniques used for liveness detection. This categorization helps
understanding different spoof attacks scenarios and their relation to the developed solutions. A review of
the latest works regarding face liveness detection works is presented. The main aim is to provide a simple
path for the future development of novel and more secured face liveness detection approach.
Face recognition across non uniform motionjpstudcorner
To get this project in ONLINE or through TRAINING Sessions,
Contact:JP INFOTECH, Old No.31, New No.86, 1st Floor, 1st Avenue, Ashok Pillar, Chennai -83. Landmark: Next to Kotak Mahendra Bank. Pondicherry Office: JP INFOTECH, #45, Kamaraj Salai, Thattanchavady, Puducherry -9. Landmark: Next to VVP Nagar Arch. Mobile: (0) 9952649690 , Email: jpinfotechprojects@gmail.com, web: www.jpinfotech.org Blog: www.jpinfotech.blogspot.com
Biometric Attendance System Service Provider in Bangalore - Call @ 0906665636...RajaGopal Reddy
Biometric Attendance System Service Provider in Bangalore - Call @ 09066656366 for Dealers and Price details in Bangalore. We are specialized for Biometric Fingerprint Attendance System, Biometric Time Attendance System, Biometric Access Control Attendance System, ESSL Biometric System.
NEC NEOFACE- Biometric Face Recognition SystemNECIndia
NEC NeoFace combines an extracted analysis of the eyes with a
detailed determination of facial feature, using a GLVQ based multiple matching face recognition system.Providing a reliable verification solution.
Biometric Attendance System records attendance of employee by using finger print and facial recognition. Biometric Attendance System is more useful than ID card punching and traditional method of attendance i.e. marking attendance in register. Divinity IT Solutions offers biometric attendance systems to companies and organizations who want to record their employee’s attendance accurately.
http://www.divinityit.com/Biometric-Attendance-Device.html
Biometrics refers to metrics related to human characteristics. Biometrics authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.
Biometrics refers to metrics related to human characteristics. Biometrics authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.
Humans often use faces to recognize individuals, and advancements in computing capability over the past few decades now enable similar recognitions automatically. Early facial recognition algorithms used simple geometric models, but the recognition process has now matured into a science of sophisticated mathematical representations and matching processes. Major advancements and initiatives in the past 10 to 15 years have propelled facial recognition technology into the spotlight. Facial recognition can be used for both verification and identification.
It is a machine learning based approach where a cascade function is trained from a lot of positive and negative images. It is then used to detect objects in other images. Here we will work with face detection.
A novel approach for performance parameter estimation of face recognition bas...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Techniques for Face Detection & Recognition Systema Comprehensive ReviewIOSR Journals
Abstract: Face detection and Facial recognition technology has emerged as a striking solution to address
many contemporary prerequisites for identification and the verification of identity prerogatives. It brings
together the potential of supplementary biometric systems, which attempt to link identity to individually
distinctive features of the body, and the more acquainted functionality of visual surveillance systems. In current
decades face recognition has experienced significant consideration from both research communities and the
marketplace, conversely still remained very electrifying in real applications. The assignment of face detection
and recognition has been dynamically researched in current eternities. This paper offers a conversant
evaluation of foremost human face recognition research. We first present a summary of face detection, face
recognition and its solicitations. Then, a literature review of the predominantly used face recognition techniques
is accessible.
Clarification and restrictions of the performance of these face recognition algorithms are specified.
Here we present a vital assessment of the current researches concomitant with the face recognition process. In
this paper, we present a broad range review of major researches on face recognition process based on various
circumstances. In addition, we present a summarizing description of Face detection and recognition process
and development along with the techniques connected with the various influences that affects the face
recognition process.
Keywords: Face Detection, Face Recognition System, Biometric System, Review Research.
Techniques for Face Detection & Recognition Systema Comprehensive ReviewIOSR Journals
Abstract: Face detection and Facial recognition technology has emerged as a striking solution to address
many contemporary prerequisites for identification and the verification of identity prerogatives. It brings
together the potential of supplementary biometric systems, which attempt to link identity to individually
distinctive features of the body, and the more acquainted functionality of visual surveillance systems. In current
decades face recognition has experienced significant consideration from both research communities and the
marketplace, conversely still remained very electrifying in real applications. The assignment of face detection
and recognition has been dynamically researched in current eternities. This paper offers a conversant
evaluation of foremost human face recognition research. We first present a summary of face detection, face
recognition and its solicitations. Then, a literature review of the predominantly used face recognition techniques
is accessible.
Clarification and restrictions of the performance of these face recognition algorithms are specified.
Here we present a vital assessment of the current researches concomitant with the face recognition process. In
this paper, we present a broad range review of major researches on face recognition process based on various
circumstances. In addition, we present a summarizing description of Face detection and recognition process
and development along with the techniques connected with the various influences that affects the face
recognition process.
Keywords: Face Detection, Face Recognition System, Biometric System, Review Research.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
2. Contents
Biometric, its types
Face recognition
Advantages
Across Non-Uniform Motion Blur, Illumination, and Pose
Template creation
Nodal points
Process
Modules
Conclusion
Reference
3. What is meant by Biometrics?
A biometric is a unique, measurable characteristic of a
human being that can be used to automatically recognize
an individual or verify an individual’s identity.
Biometrics can measure both
physiological and
behavioral characteristics.
6. Why Face Recognition…
Everyday actions are increasingly being handled electronically, instead
of pencil and paper or face to face.
This growth in electronic transactions results in great demand for fast
and accurate user identification and authentication.
Access codes for buildings, banks accounts and computer systems often
use PIN's for identification and security clearances.
Using the proper PIN gains access, but the user of the PIN is not
verified. When credit and ATM cards are lost or stolen, an unauthorized
user can often come up with the correct personal codes.
Face recognition technology may solve this problem since a face is
undeniably connected to its owner expect in the case of identical twins.
7. Advantages of using Face Recognition
It requires no physical interaction on behalf of the user.
It is accurate and allows for high enrolment and
verification rates.
It can use your existing hardware infrastructure, existing
cameras and image capture devices, with no problems.
8. Face Recognition… How?
In Facial recognition there are two types of comparisons:-
VERIFICATION- The system compares the given individual
with who they say they are and gives a yes or no decision.
IDENTIFICATION- The system compares the given
individual to all the Other individuals in the database and
gives a ranked list of matches.
9. All identification or authentication technologies operate using
the following four stages:
Capture: A physical or behavioral sample is captured by the
system during Enrollment and also in identification or
verification process.
Extraction: unique data is extracted from the sample and a
template is created.
Comparison: the template is then compared with a new
sample.
Match/non-match: the system decides if the features
extracted from the new samples are a match or a non match.
10. Across Non-Uniform Motion
Blur, Illumination, and Pose
Enrolment templates are normally created from a multiplicity
of processed facial images.
These templates can vary in size from less than 100 bytes,
generated through certain vendors and to over 3K for
templates.
The 3K template is by far the largest among technologies
considered physiological biometrics.
Larger templates are normally associated with behavioural
biometrics.
12. How Facial Recognition System Works
Facial recognition software is based on the ability to first
recognize faces, which is a technological feat in itself. If
you look at the mirror, you can see that your face has
certain distinguishable landmarks. These are the peaks
and valleys that make up the different facial features.
There are about 80 nodal points on a human face.
13. Nodal points used
Here are few nodal points that are measured by the
software.
1. distance between the eyes
2. width of the nose
3. depth of the eye socket
4. cheekbones
5. jaw line
6. chin
14. Detection- when the system is attached to a video surveilance
system, the recognition software searches the field of view of
a video camera for faces. If there is a face in the view, it is
detected within a fraction of a second. A multi-scale algorithm
is used to search for faces in low resolution. The system
switches to a high-resolution search only after a head-like
shape is detected.
Alignment- Once a face is detected, the system determines the
head's position, size and pose. A face needs to be turned at
least 35 degrees toward the camera for the system to register
it.
15. Face recognition systems that work with focused images have difficulty when
presented with blurred data. Approaches to face recognition from blurred
images can be broadly classified into four categories.
(i) Deblurring-based in which the probe image is first deblurred and then used for
recognition. However, deblurring artifacts are a major source of error especially for
moderate to heavy blurs.
(ii) Joint deblurring and recognition, the flip-side of which is computational
complexity.
(iii) Deriving blur-invariant features for recognition. But these are effective only for
mild blurs.
(iv) The direct recognition approach in which reblurred versions from the gallery are
compared with the blurred probe image.
It is important to note that all of
the above approaches assume a simplistic space-invariant blur model. For
handling illumination, there have mainly been two directions of pursuit
based on
(i) the 9D subspace model for face and
(ii) extracting and matching illumination insensitive facial features
16. (a) Focused image,
(b) synthetically blurred image obtained by
applying random in-plane translations and
rotations on the focused image,
(c) point spread functions (PSF) at various
locations in the image showing the
presence of non-uniform blur which cannot
be explained by the convolution
model
and (d, e, f) real blurred images
17. Process
Normalization-The image of the head is scaled and rotated so
that it can be registered and mapped into an appropriate size
and pose. Normalization is performed regardless of the head's
location and distance from the camera. Light does not impact
the normalization process.
Representation-The system translates the facial data into a
unique code. This coding process allows for easier comparison
of the newly acquired facial data to stored facial data.
Matching- The newly acquired facial data is compared to the
stored data and (ideally) linked to at least one stored facial
representation.
18. Modules
Motion blur model for faces
Face recognition across blur
Multiscale implementation
Recognition across blur, illumination and pose
19. Modular description
Motion blur model for faces
The apparent motion of scene points in the image will vary at
different locations.
The single blur kernel can’t explain this.
In the proposed method a space variant motion blur model is
presented and the explanation for geometric degradations of
faces resulting from camera motion is illustrated.
An optimization algorithm to recover the camera motion is
proposed.
20. Multiscale implementation
The difference in the displacement of a point light source due
to two different transformations from the discrete set T is at
least one pixel.
Doubling the sampling resolution increases the total number of
poses.
Face recognition across blur
We have M face classes with one focussed face fm for each class
m, m=1,2,… ,M. A convex combination of these are then
produced.
21. Recognition across blur, illumination and pose
Finally pose variation is allowed, in addition to blur and
illumination.
Four near frontal poses are selected, angles within ~15 degree
and an algorithm called MOBIL is applied in small variations in
pose
A correct pose is then obtained.
22. Conclusion
A methodology to perform face recognition under the combined
effects of non-uniform blur, illumination, and pose is proposed.
The set of all images obtained from a given image by non-
uniform blurring and changes in illumination forms a bi-convex
set, this result is used to develop non-uniform motion blur and
illumination-robust algorithm called MOBIL.
The limitation of his approach is that significant occlusions and
large changes in facial expressions cannot be handled.
23. References
• W. Zhao, R. Chellappa, P. J. Phillips, and A. Rosenfeld, “Face recognition: A
literature survey,”
• http://www.nec.com/en/global/solutions/biometrics/technologies/face_rec
ognition.html