SlideShare a Scribd company logo
1 of 7
Download to read offline
TELKOMNIKA Telecommunication, Computing, Electronics and Control
Vol. 18, No. 2, April 2020, pp. 733~739
ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018
DOI: 10.12928/TELKOMNIKA.v18i2.14106  733
Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA
Face recognition based on curvelets, invariant moments
features and SVM
Mohammed Talal Ghazal1
, Karam Abdullah2
1
Department of Computer Engineering Technology, Northern Technical University, Iraq
2
Department of Computer Science Education of pure science college, Mosul University, Iraq
Article Info ABSTRACT
Article history:
Received Sep 15, 2019
Revised Dec 30, 2019
Accepted Feb 9, 2020
Recent studies highlighted on face recognition methods. In this paper, a new
algorithm is proposed for face recognition by combining Fast Discrete
Curvelet Transform (FDCvT) and Invariant Moments with Support vector
machine (SVM), which improves rate of face recognition in various
situations. The reason of using this approach depends on two things. first,
Curvelet transform which is a multi-resolution method, that can efficiently
represent image edge discontinuities; Second, the Invariant Moments
analysis which is a statistical method that meets with the translation, rotation
and scale invariance in the image. Furthermore, SVM is employed to classify
the face image based on the extracted features. This process is applied on
each of ORL and Yale databases to evaluate the performance of
the suggested method. Experimentally, the proposed method results show
that our system can compose efficient and reasonable face recognition
feature, and obtain useful recognition accuracy, which is able to face and
side-face states detection of persons to decrease fault rate of production.
Keywords:
Curvelet
Face recognition
Invariant moment
Support vector machine
This is an open access article under the CC BY-SAlicense.
Corresponding Author:
Mohammed Talal Ghazal,
Department of Computer Engineering Technology,
Northern Technical University, Mosul, Iraq.
Email: mohammed.ghazal@ntu.edu.iq
1. INTRODUCTION
Face recognition represents the modern wave of identity and authentication solutions [1].
This technique has become a broad user acceptance for authentication solutions, getting rid of unsuitable and
long passwords. Automatic security system eliminates the need of security man to visually supervise
location, performs security checks and monitors security cameras [2, 3]. Currently, the researchers are
focusing on face recognition methods. Generally, these methods are consisting of the following steps: image
acquiring, preprocessing, features extraction and image classification [4].
The face feature extraction process is a crucial stage in expressing face images that have a great
impact on recognition rate. Furthermore, this process has an effect on computation time and storage size [5].
For feature extraction process the curvelet transform represents anisotropic multi-resolution method
compared with wavelet. It is having an efficient representation of edge discontinuities in the image of
the face [6, 7]. Recently, curvelet transform is used to perform some pattern recognition, such as character
recognition [8] and face recognition [9-11].
It is suggested that, most of these proposed methods have directly used the coefficients of curvelet.
Actually, curvelet anisotropic characteristic is not used suitably to represent the structure for the face image.
Illumination differences are a major source of difficulty for designing a face recognition system, the efficient
 ISSN:1693-6930
TELKOMNIKATelecommun Comput El Control, Vol. 18, No. 2, April 2020: 733-739
734
solution is done by extracting the illumination invariant features using moment invariants [12]. Moment
invariants are not affected by the change of scaling, shifting and rotation. A several methods of deriving
moment invariants have been proposed. In 1962, Hu proposed the theory of invariant moment by deriving
them from algebraic invariants. Li [13] calculated 52 invariant moments, and seven popular invariant
moments are approached. In this paper, a novel method for face recognition is proposed, using wavelets at
each scale based on curvelet transform and improved Support vector machine (SVM) classifier.
Section 2 of this paper explains the design of the face recognition system, involving curvelet and
Invariant Moments method and the principle of SVM as a classification method. Section 3 presents
the experimental results that evaluate the adopted techniques performance. Conclusions are reviewed in
Section 4.
2. PROPOSED SYSTEM DESIGN
The proposed system is based on decomposition of face image using curvelet transform, and then
reducing the dimension of curvelet coefficients to feed the invariant moment algorithm for invariant features
extraction. The feature sets produced by curvelet transform and invariant moment are used to train and test
the SVM classifier. The flowchart of the proposed algorithm is shown in Figure 1.
Figure 1. Block diagram of proposed system
3. CURVELET TRANSFORM
The curvelet transform represents one of the multiscale geometric transform family, which was
developed to get rid of traditional multiscale representations methods such as wavelets [14, 15]. The curvelet
transform solved the problem of isotropic scaling of wavelet, which makes it fit for face features extraction.
There are two different implementation methods of curvelet transform:
- Curvelet via unequally spaced fast Fourier transform (USFFT).
- Curvelet via wrapping of specially selected Fourier samples.
Both are shared the same properties of simplicity, fast and less redundant; compare with their earlier
generation versions. The first method has been taken in this paper, which is described as follows.
- Apply the 2D FFT and obtain Fourier samples 𝑓̂[𝑛1, 𝑛2],−
𝑛
2
≤ 𝑛1, 𝑛2 <
𝑛
2
.
- For each scale/angle pair (𝑗, 𝑙) , resample (or interpolate) 𝑓̂[𝑛1, 𝑛2] to obtain sampled values 𝑓̂[𝑛1, 𝑛2 −
𝑛1 tan 𝜃𝑙]for (𝑛1, 𝑛2) ∈ 𝑃𝑗.
- Multiply the interpolated (or shared) object 𝑓̂ with the parabolic window Ũ𝑗, effectively localizing 𝑓̂ near
the parallelogram with orientation 𝜃𝑙, and obtain:
𝑓̂𝑗,𝑙[𝑛1, 𝑛2] = 𝑓̂[𝑛1, 𝑛2 − 𝑛1 tan 𝜃𝑙] ∗ Ũ𝑗[𝑛1, 𝑛2]
- Apply the inverse 2D FFT to each 𝑓̂𝑗,𝑙, hence collecting the discrete coefficients 𝑐 𝐷(𝑗, 𝑙, 𝑘).
TELKOMNIKATelecommun Comput El Control 
Face recognition based on curvelets, invariant moments features and SVM (Mohammed Ghazal)
735
4. MOMENT INVARIANTS
Moment invariants are invariant under scaling, shifting and rotation. They are widely used in pattern
recognition [16, 17]. The derivation details of moment invariants that have been used in face features
extraction are discussed by Hu (1962). So that, the general linear transformation is presented below:
ω1= λ20+ λ02, (1)
ω2= (λ20−λ02)
2
+ 4 λ11
2
(2)
ω3= (λ30−3λ12)
2
+(3λ21−λ03)
2
(3)
ω4= ( λ30+λ12)
2
+ (λ21+λ03)
2
(4)
ω5=(λ30− 3λ12) (λ30+λ12) [(λ30+λ12)
2
−3(λ21+λ03)
2
] + (3λ21−λ03) (λ21+λ03) [3(λ30+ λ12)
2
− (λ21+λ03)
2
] (5)
ω6=(λ20−λ02) [(λ30+λ12)
2
−( λ21+λ03)
2
] +4λ11(λ30+λ12) ( λ21+λ03) (6)
ω7= (3λ21−λ03) (λ30+λ12) [(λ30+λ12)
2
− 3(λ21+λ03)
2
] + (3λ12−λ30) (λ21+λ03) [3(λ30+ λ12)
2
−(λ21+λ03)
2
]. (7)
The above formulas are used to calculate the features of face images. Figure 2 shows an example of the
extracted features by Curvelet and moment invariants.
Figure 2. Interface of features extraction
5. CLASSIFICATION
In this paper, support vector machine (SVM) was used for classification of face images [18, 19].
Many kernel functions and different parameters have been considered to enhance the performance
of the classifier. The data can be separated by several linear classifiers, but there is only one classifier that can
maximize the distance between it and the nearest data point of each class. This linear classifier is named by
 ISSN:1693-6930
TELKOMNIKATelecommun Comput El Control, Vol. 18, No. 2, April 2020: 733-739
736
optimal separating hyper plane [20]. So it is needed to find ω, which represents the coefficient of
the hyperplane. The support vector machine SVM is a supervised learning model in the field of machine
learning. It is generally used for pattern recognition, classification and regression analysis. The SVM depends
on structural risk minimization theory for constructing the optimal hyperplane segmentation in the feature
space, making learning editor get the global optimization. Problem description: Assume the training data,
(𝑥1, 𝑦1), … , (𝑥1, 𝑦1), 𝑥 ∈ 𝑅 𝑛
, 𝑦 ∈ {+1, −1}
This could be projected into a hyper-plane:
(ω. x) + b = 0, ω ∈ 𝑅 𝑛
, b ∈ 𝑅 (8)
For the normalization:
𝑦𝑖((ω. 𝑥𝑖) + 𝑏) ≥ 1, 𝑖 = 1, … , 𝑙
The classification of the interval is equal to:
2
||ω||
, when the maximum interval is equal to the minimum
|| ω||2
[21].
6. EXPERIMENTAL RESULTS
To clarify the efficiency of the proposed method, two different databases have been used to test and
evaluate the method performance. The first database is called Yale [22]. The second database is called
Olivetti-Oracle Research Lab (ORL) [23]. Table 1 summarizes the properties of these datasets [24].
Table 1. The used face databases
Database No. of subjects No. of Images per Subject
Total Images
per database
Sample image
Yale 15 11 165
ORL 40 10 400
Most of the methods attempt to recognize faces from images collected in a highly controlled
laboratory with high resolution faces. Accordingly, the system has been tested with images of different
resolutions as shown in Table 2. At 30x36 pixels the face becomes not recognized, because of face features
turns hard to detect.
Table 2. Results of face recognition at different resolutions.
Face Images
No. Pixels 92*112 69*84 52*63 30*36
Recognize? Yes Yes Yes No
In the side face images, there are more features that cannot be detected because of the head turn,
which makes part of the eyes and the lips invisible, for that, some examples of a head pose database [25] are
TELKOMNIKATelecommun Comput El Control 
Face recognition based on curvelets, invariant moments features and SVM (Mohammed Ghazal)
737
used in this method to recognize faces from side view as shown in Table 3. In the other poses image the face
is not recognized because of having no enough features. Different number of images are used for
training/testing to examine the recognition rate performance. Table 4 shows the recognition rate for the
dataset of (ORL and Yale).
Table 3. Results of face recognition at different head poses
Images
Poses Side view Side view Near frontal other
Recognize Yes Yes Yes No
Table 4. The results of system performance
Database No. of Testing Images No. of training Images Recognition Rate
Yale 80 20 96%
ORL 80 20 96.25%
A graphical user interface (GUI) is designed using MATLAB environment, to increase
the interactivity and expansibility for users. After training the system with dataset of images, the function of
GUI started, as shown in Figure 3. By selecting the test image features extraction will run, and invariant
features will be calculated and displayed. To recognize the subject face a click on the recognition process
button is needed. If the tested image is for a known person, the system will give a message for person
sequence number at the trained database, otherwise, a message of an unknown person will be displayed.
Figure 3. A graphical user interface (GUI) for face recognition system
7. CONCLUSION
In this paper, a new method of face recognition is proposed by using Curvelet transform
and invariant moments. Support Vector Machine (SVM) is used as a classifier, many experiments are
conducted on (ORL and Yale) face databases, moreover, head pose database is used to evaluate the system
 ISSN:1693-6930
TELKOMNIKATelecommun Comput El Control, Vol. 18, No. 2, April 2020: 733-739
738
performance. The experimental results proved that the use of invariant moments with Curvelet features can
improve the recognition rate in different conditions such as different illumination, resolution, and head
poses. The system accuracy is achieved up to 96% on the Yale and to 96.25% on the ORL databases. For
future studies, it is suggested to apply the proposed method to other face and facial expressions databases to
recognize the face regions such as eyes, lips and nose to classify different facial expressions and verify
the efficiency of the proposed method.
ACKNOWLEDGEMENTS
This research is funded by cooperation between Northern Technical University and Mosul University in
Iraq. Website: For Northern Technical University https://www.ntu.edu.iq, Website: For Mosul University
https://www.uomosul.edu.iq.
REFERENCES
[1] W. Lin, B. Wu, dan Q. Huang, “A face-recognition approach based on secret sharing for user authentication in
public-transportation security,” 2018 IEEE International Conference on Applied System Invention (ICASI), Chiba,
pp. 1350-1353, 2018.
[2] R. Gusain, H. Jain, dan S. Pratap, “Enhancing bank security system using Face Recognition, Iris Scanner and Palm
Vein Technology,” 2018 3rd International Conference On Internet of Things: Smart Innovation and Usages (IoT-
SIU), Bhimtal, pp. 1-5, 2018.
[3] I. G. P. S. Wijaya, A. Y. Husodo, and I. W. A. Arimbawa, “Real time face recognition based on face descriptor and
its application,” Telkomnika, vol. 16, no. 2, pp. 739–746, April 2018.
[4] M. Z. Al-Dabagh, M. H. Mohammed Alhabib, dan F. H. AL-Mukhtar, “Face Recognition System Based on Kernel
Discriminant Analysis, K-Nearest Neighbor and Support Vector Machine,” International Journal of Research and
Engineering, vol. 5, no. 3, pp. 335–338, March 2018.
[5] M. Tang dan F. Chen, “Facial expression recognition and its application based on curvelet transform and PSO-
SVM,” Optik, vol. 124, no. 22, pp. 5401–5406, November 2013.
[6] L. Zhou, W. Liu, Z. M. Lu, dan T. Nie, “Face recognition based on curvelets and local binary pattern features via
using local property preservation,” Journal of Systems and Software, vol. 95, pp. 209–216, 2014.
[7] I. Batioua, R. Benouini, K. Zenkouar, dan A. Zahi, “3D image analysis by separable discrete orthogonal moments
based on Krawtchouk and Tchebichef polynomials,” Pattern Recognit., vol. 71, pp. 264–277, November 2017.
[8] C. Boufenar, M. Batouche, dan M. Schoenauer, “An artificial immune system for offline isolated handwritten
arabic character recognition,” Evolving Systems, vol. 9, no. 1, pp. 25–41, March 2018.
[9] J. Zhang, Y. Wang, Z. Zhang, dan C. Xia, “Comparison of wavelet, Gabor and curvelet transform for face
recognition,” Optica Applicata, vol. 41, no. 1, pp. 183–193, January 2011.
[10] R. Benouini, I. Batioua, K. Zenkouar, S. Najah, dan H. Qjidaa, “Efficient 3D object classification by using direct
Krawtchouk moment invariants,” Multimedia Tools and Applications, vol. 77, no. 20, pp. 27517–27542,
October 2018.
[11] C. Page, “Hybrid techniques to improve face recognition based on features extraction methods and Haar discrete
wavelet transformation,” Journal Al-Qadisiyah for Computer Science Mathematics, vol. 10, no. 2, pp. 36–46, 2018.
[12] T. Alobaidi dan W. B. Mikhael, “Two-step feature extraction in a transform domain for face recognition,”
2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV,
pp. 1-4, 2017.
[13] Y. F. Y. L. T. Yanna dan Y. Qing, “Recognition of the Tea Sprout Based on Color and Shape Features,” in Nongye
Jixie Xuebao/Transactions of the Chinese Society of Agricultural Machinery,vol. 40, pp 119-123, September 2009.
[14] E. J. Candès dan D. L. Donoho, “New tight frames of curvelets and optimal representations of objects with
piecewise C2 singularities,” Communications on Pure and Applied Mathematics, vol. 57, no. 2, pp. 219–266,
November 2003.
[15] R. Benouini, I. Batioua, I. Elouariachi,K. Zenkouar, dan A. Zarghili, “ExplicitSeparable two dimensional Moment
Invariants for object recognition,” Procedia Comput. Science, vol. 148, pp. 409–417, 2019.
[16] Y. Zhu, L. C. De Silva, dan C. C. Ko, “Using moment invariants and HMM in facial expression recognition,”
Pattern Recognit. Lett., vol. 23, no. 1–3, pp. 83–91, January 2002.
[17] A. Hmimid, M. Sayyouri, dan H. Qjidaa, “Fast computation of separable two-dimensional discrete invariant
moments for image classification,” Pattern Recognit., vol. 48, no. 2, pp. 509–521, February 2015.
[18] Z. B. Lahaw, D. Essaidani,dan H. Seddik, “Robust Face Recognition Approaches Using PCA, ICA, LDA Based on
DWT, and SVM Algorithms,” 2018 41st International Conference on Telecommunications and Signal Processing
(TSP), Athens, pp. 1-5, 2018.
[19] J. M. Al Tuwaijari, S. I. Mohammed, dan M. A. B. Rahem, “Performance Evaluation Of Face Image Recognition
Based Voila Joins With SVM,” Iraqi Journal of Information Technology, vol. 9, no. 3, pp. 161-176, 2019.
[20] S. R. Gunn, “Support vector machines for classification and regression,” ISIS Technical Report, vol. 14, no. 1,
pp. 5–16, 1998.
[21] Y. Sun et al., “Image Classification base on PCA of Multi-view Deep Representation,” Journal of Visual
Communication and Image Representation, vol. 62, pp. 253-258, July 2019.
TELKOMNIKATelecommun Comput El Control 
Face recognition based on curvelets, invariant moments features and SVM (Mohammed Ghazal)
739
[22] P. N. Belhumeur, J. P. Hespanha, dan D. J. Kriegman, “Eigenfaces vs. fisherfaces: Recognition using class specific
linear projection,” in IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 19, no. 7, pp. 711-720,
July 1997.
[23] F. S. Samaria dan A. C. Harter, “Parameterisation of a stochastic model for human face identification,” in
Proceedings of 1994 IEEE Workshop on Applications of Computer Vision, Sarasota, FL, USA, pp. 138–142, 1994.
[24] A. Muntasa, I. A. Siradjuddin, “Contradictory of the Laplacian Smoothing Transform and Linear
Discriminant Analysis Modeling to Extract the Face Image Features,” Telkomnika, vol. 15, no. 4, pp. 1794-1807,
December 2017.
[25] N. Gourier, D. Hall, dan J. L. Crowley, “Estimating face orientation from robust detection of salient facial
structures,” FG Net Work. Vis. Obs. Deictic Gestures, pp. 17–25, January 2004.
BIOGRAPHIES OF AUTHORS
Mohammed Talal Ghazal obtained his M.Sc. degree from Computer Engineering Technology,
Northern Technical University, Mosul, Iraq in 2016. His M.Sc. thesis entitled: “Wheelchair
Robot Control Using EOG signals” and his current research focuses on the development of face
recognition algorithm.
Karam Muayad Abdullah obtained his M.Sc. degree from collage of computer science and
mathematics, Mosul University, Mosul, Iraq in 2010. His current research focuses on
the development of face recognition algorithm.

More Related Content

What's hot

MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATION
MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATIONMAGNETIC RESONANCE BRAIN IMAGE SEGMENTATION
MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATIONVLSICS Design
 
Ech a novel multilevel thresholding technique for minutiae based fingerprint ...
Ech a novel multilevel thresholding technique for minutiae based fingerprint ...Ech a novel multilevel thresholding technique for minutiae based fingerprint ...
Ech a novel multilevel thresholding technique for minutiae based fingerprint ...eSAT Publishing House
 
IRJET - Effective Workflow for High-Performance Recognition of Fruits using M...
IRJET - Effective Workflow for High-Performance Recognition of Fruits using M...IRJET - Effective Workflow for High-Performance Recognition of Fruits using M...
IRJET - Effective Workflow for High-Performance Recognition of Fruits using M...IRJET Journal
 
Detection of hard exudates using simulated annealing based thresholding mecha...
Detection of hard exudates using simulated annealing based thresholding mecha...Detection of hard exudates using simulated annealing based thresholding mecha...
Detection of hard exudates using simulated annealing based thresholding mecha...csandit
 
Performance Analysis of CRT for Image Encryption
Performance Analysis of CRT for Image Encryption Performance Analysis of CRT for Image Encryption
Performance Analysis of CRT for Image Encryption ijcisjournal
 
Image fusion using nsct denoising and target extraction for visual surveillance
Image fusion using nsct denoising and target extraction for visual surveillanceImage fusion using nsct denoising and target extraction for visual surveillance
Image fusion using nsct denoising and target extraction for visual surveillanceeSAT Publishing House
 
Copy Move Forgery Detection Using GLCM Based Statistical Features
Copy Move Forgery Detection Using GLCM Based Statistical Features Copy Move Forgery Detection Using GLCM Based Statistical Features
Copy Move Forgery Detection Using GLCM Based Statistical Features ijcisjournal
 
An Approach for Iris Recognition Based On Singular Value Decomposition and Hi...
An Approach for Iris Recognition Based On Singular Value Decomposition and Hi...An Approach for Iris Recognition Based On Singular Value Decomposition and Hi...
An Approach for Iris Recognition Based On Singular Value Decomposition and Hi...paperpublications3
 
LOCAL REGION PSEUDO-ZERNIKE MOMENT- BASED FEATURE EXTRACTION FOR FACIAL RECOG...
LOCAL REGION PSEUDO-ZERNIKE MOMENT- BASED FEATURE EXTRACTION FOR FACIAL RECOG...LOCAL REGION PSEUDO-ZERNIKE MOMENT- BASED FEATURE EXTRACTION FOR FACIAL RECOG...
LOCAL REGION PSEUDO-ZERNIKE MOMENT- BASED FEATURE EXTRACTION FOR FACIAL RECOG...aciijournal
 
A modified pso based graph cut algorithm for the selection of optimal regular...
A modified pso based graph cut algorithm for the selection of optimal regular...A modified pso based graph cut algorithm for the selection of optimal regular...
A modified pso based graph cut algorithm for the selection of optimal regular...IAEME Publication
 
A Robust Method for Moving Object Detection Using Modified Statistical Mean M...
A Robust Method for Moving Object Detection Using Modified Statistical Mean M...A Robust Method for Moving Object Detection Using Modified Statistical Mean M...
A Robust Method for Moving Object Detection Using Modified Statistical Mean M...ijait
 
Enhancement of genetic image watermarking robust against cropping attack
Enhancement of genetic image watermarking robust against cropping attackEnhancement of genetic image watermarking robust against cropping attack
Enhancement of genetic image watermarking robust against cropping attackijfcstjournal
 
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...IJAAS Team
 
Application of gaussian filter with principal component analysis
Application of gaussian filter with principal component analysisApplication of gaussian filter with principal component analysis
Application of gaussian filter with principal component analysisIAEME Publication
 
MULTIFOCUS IMAGE FUSION USING MULTIRESOLUTION APPROACH WITH BILATERAL GRADIEN...
MULTIFOCUS IMAGE FUSION USING MULTIRESOLUTION APPROACH WITH BILATERAL GRADIEN...MULTIFOCUS IMAGE FUSION USING MULTIRESOLUTION APPROACH WITH BILATERAL GRADIEN...
MULTIFOCUS IMAGE FUSION USING MULTIRESOLUTION APPROACH WITH BILATERAL GRADIEN...cscpconf
 
Persian character recognition using new
Persian character recognition using newPersian character recognition using new
Persian character recognition using newijcsity
 

What's hot (19)

Medial axis transformation based skeletonzation of image patterns using image...
Medial axis transformation based skeletonzation of image patterns using image...Medial axis transformation based skeletonzation of image patterns using image...
Medial axis transformation based skeletonzation of image patterns using image...
 
MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATION
MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATIONMAGNETIC RESONANCE BRAIN IMAGE SEGMENTATION
MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATION
 
Ech a novel multilevel thresholding technique for minutiae based fingerprint ...
Ech a novel multilevel thresholding technique for minutiae based fingerprint ...Ech a novel multilevel thresholding technique for minutiae based fingerprint ...
Ech a novel multilevel thresholding technique for minutiae based fingerprint ...
 
IRJET - Effective Workflow for High-Performance Recognition of Fruits using M...
IRJET - Effective Workflow for High-Performance Recognition of Fruits using M...IRJET - Effective Workflow for High-Performance Recognition of Fruits using M...
IRJET - Effective Workflow for High-Performance Recognition of Fruits using M...
 
Detection of hard exudates using simulated annealing based thresholding mecha...
Detection of hard exudates using simulated annealing based thresholding mecha...Detection of hard exudates using simulated annealing based thresholding mecha...
Detection of hard exudates using simulated annealing based thresholding mecha...
 
Performance Analysis of CRT for Image Encryption
Performance Analysis of CRT for Image Encryption Performance Analysis of CRT for Image Encryption
Performance Analysis of CRT for Image Encryption
 
Image fusion using nsct denoising and target extraction for visual surveillance
Image fusion using nsct denoising and target extraction for visual surveillanceImage fusion using nsct denoising and target extraction for visual surveillance
Image fusion using nsct denoising and target extraction for visual surveillance
 
Copy Move Forgery Detection Using GLCM Based Statistical Features
Copy Move Forgery Detection Using GLCM Based Statistical Features Copy Move Forgery Detection Using GLCM Based Statistical Features
Copy Move Forgery Detection Using GLCM Based Statistical Features
 
An Approach for Iris Recognition Based On Singular Value Decomposition and Hi...
An Approach for Iris Recognition Based On Singular Value Decomposition and Hi...An Approach for Iris Recognition Based On Singular Value Decomposition and Hi...
An Approach for Iris Recognition Based On Singular Value Decomposition and Hi...
 
LOCAL REGION PSEUDO-ZERNIKE MOMENT- BASED FEATURE EXTRACTION FOR FACIAL RECOG...
LOCAL REGION PSEUDO-ZERNIKE MOMENT- BASED FEATURE EXTRACTION FOR FACIAL RECOG...LOCAL REGION PSEUDO-ZERNIKE MOMENT- BASED FEATURE EXTRACTION FOR FACIAL RECOG...
LOCAL REGION PSEUDO-ZERNIKE MOMENT- BASED FEATURE EXTRACTION FOR FACIAL RECOG...
 
50120130405020
5012013040502050120130405020
50120130405020
 
A modified pso based graph cut algorithm for the selection of optimal regular...
A modified pso based graph cut algorithm for the selection of optimal regular...A modified pso based graph cut algorithm for the selection of optimal regular...
A modified pso based graph cut algorithm for the selection of optimal regular...
 
I04302068075
I04302068075I04302068075
I04302068075
 
A Robust Method for Moving Object Detection Using Modified Statistical Mean M...
A Robust Method for Moving Object Detection Using Modified Statistical Mean M...A Robust Method for Moving Object Detection Using Modified Statistical Mean M...
A Robust Method for Moving Object Detection Using Modified Statistical Mean M...
 
Enhancement of genetic image watermarking robust against cropping attack
Enhancement of genetic image watermarking robust against cropping attackEnhancement of genetic image watermarking robust against cropping attack
Enhancement of genetic image watermarking robust against cropping attack
 
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
 
Application of gaussian filter with principal component analysis
Application of gaussian filter with principal component analysisApplication of gaussian filter with principal component analysis
Application of gaussian filter with principal component analysis
 
MULTIFOCUS IMAGE FUSION USING MULTIRESOLUTION APPROACH WITH BILATERAL GRADIEN...
MULTIFOCUS IMAGE FUSION USING MULTIRESOLUTION APPROACH WITH BILATERAL GRADIEN...MULTIFOCUS IMAGE FUSION USING MULTIRESOLUTION APPROACH WITH BILATERAL GRADIEN...
MULTIFOCUS IMAGE FUSION USING MULTIRESOLUTION APPROACH WITH BILATERAL GRADIEN...
 
Persian character recognition using new
Persian character recognition using newPersian character recognition using new
Persian character recognition using new
 

Similar to Face recognition based on curvelets, invariant moments features and SVM

Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
 
IRJET-Analysis of Face Recognition System for Different Classifier
IRJET-Analysis of Face Recognition System for Different ClassifierIRJET-Analysis of Face Recognition System for Different Classifier
IRJET-Analysis of Face Recognition System for Different ClassifierIRJET Journal
 
Method of optimization of the fundamental matrix by technique speeded up rob...
Method of optimization of the fundamental matrix by technique  speeded up rob...Method of optimization of the fundamental matrix by technique  speeded up rob...
Method of optimization of the fundamental matrix by technique speeded up rob...IJECEIAES
 
Realtime face matching and gender prediction based on deep learning
Realtime face matching and gender prediction based on deep learningRealtime face matching and gender prediction based on deep learning
Realtime face matching and gender prediction based on deep learningIJECEIAES
 
Face Recognition on Linear Motion-blurred Image
Face Recognition on Linear Motion-blurred ImageFace Recognition on Linear Motion-blurred Image
Face Recognition on Linear Motion-blurred ImageTELKOMNIKA JOURNAL
 
EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...
EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...
EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...IJECEIAES
 
ADVANCED ALGORITHMS FOR ETCHING SIMULATION OF 3D MEMS-TUNABLE LASERS
ADVANCED ALGORITHMS FOR ETCHING SIMULATION OF 3D MEMS-TUNABLE LASERSADVANCED ALGORITHMS FOR ETCHING SIMULATION OF 3D MEMS-TUNABLE LASERS
ADVANCED ALGORITHMS FOR ETCHING SIMULATION OF 3D MEMS-TUNABLE LASERSijctcm
 
Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...
Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...
Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...ZaidHussein6
 
ANALYSIS OF INTEREST POINTS OF CURVELET COEFFICIENTS CONTRIBUTIONS OF MICROS...
ANALYSIS OF INTEREST POINTS OF CURVELET  COEFFICIENTS CONTRIBUTIONS OF MICROS...ANALYSIS OF INTEREST POINTS OF CURVELET  COEFFICIENTS CONTRIBUTIONS OF MICROS...
ANALYSIS OF INTEREST POINTS OF CURVELET COEFFICIENTS CONTRIBUTIONS OF MICROS...sipij
 
Medial Axis Transformation based Skeletonzation of Image Patterns using Image...
Medial Axis Transformation based Skeletonzation of Image Patterns using Image...Medial Axis Transformation based Skeletonzation of Image Patterns using Image...
Medial Axis Transformation based Skeletonzation of Image Patterns using Image...IOSR Journals
 
IRJET- A Review on Data Dependent Label Distribution Learning for Age Estimat...
IRJET- A Review on Data Dependent Label Distribution Learning for Age Estimat...IRJET- A Review on Data Dependent Label Distribution Learning for Age Estimat...
IRJET- A Review on Data Dependent Label Distribution Learning for Age Estimat...IRJET Journal
 
Performance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image Retrieval
Performance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image RetrievalPerformance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image Retrieval
Performance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image RetrievalCSEIJJournal
 
Performance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image Retrieval
Performance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image RetrievalPerformance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image Retrieval
Performance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image RetrievalCSEIJJournal
 
One-Sample Face Recognition Using HMM Model of Fiducial Areas
One-Sample Face Recognition Using HMM Model of Fiducial AreasOne-Sample Face Recognition Using HMM Model of Fiducial Areas
One-Sample Face Recognition Using HMM Model of Fiducial AreasCSCJournals
 
Matching algorithm performance analysis for autocalibration method of stereo ...
Matching algorithm performance analysis for autocalibration method of stereo ...Matching algorithm performance analysis for autocalibration method of stereo ...
Matching algorithm performance analysis for autocalibration method of stereo ...TELKOMNIKA JOURNAL
 

Similar to Face recognition based on curvelets, invariant moments features and SVM (20)

Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
 
IRJET-Analysis of Face Recognition System for Different Classifier
IRJET-Analysis of Face Recognition System for Different ClassifierIRJET-Analysis of Face Recognition System for Different Classifier
IRJET-Analysis of Face Recognition System for Different Classifier
 
Method of optimization of the fundamental matrix by technique speeded up rob...
Method of optimization of the fundamental matrix by technique  speeded up rob...Method of optimization of the fundamental matrix by technique  speeded up rob...
Method of optimization of the fundamental matrix by technique speeded up rob...
 
Realtime face matching and gender prediction based on deep learning
Realtime face matching and gender prediction based on deep learningRealtime face matching and gender prediction based on deep learning
Realtime face matching and gender prediction based on deep learning
 
Face Recognition on Linear Motion-blurred Image
Face Recognition on Linear Motion-blurred ImageFace Recognition on Linear Motion-blurred Image
Face Recognition on Linear Motion-blurred Image
 
G1804014348
G1804014348G1804014348
G1804014348
 
D04402024029
D04402024029D04402024029
D04402024029
 
EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...
EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...
EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...
 
Towards more accurate iris recognition system by using hybrid approach for f...
Towards more accurate iris recognition system by using hybrid  approach for f...Towards more accurate iris recognition system by using hybrid  approach for f...
Towards more accurate iris recognition system by using hybrid approach for f...
 
ADVANCED ALGORITHMS FOR ETCHING SIMULATION OF 3D MEMS-TUNABLE LASERS
ADVANCED ALGORITHMS FOR ETCHING SIMULATION OF 3D MEMS-TUNABLE LASERSADVANCED ALGORITHMS FOR ETCHING SIMULATION OF 3D MEMS-TUNABLE LASERS
ADVANCED ALGORITHMS FOR ETCHING SIMULATION OF 3D MEMS-TUNABLE LASERS
 
Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...
Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...
Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...
 
ANALYSIS OF INTEREST POINTS OF CURVELET COEFFICIENTS CONTRIBUTIONS OF MICROS...
ANALYSIS OF INTEREST POINTS OF CURVELET  COEFFICIENTS CONTRIBUTIONS OF MICROS...ANALYSIS OF INTEREST POINTS OF CURVELET  COEFFICIENTS CONTRIBUTIONS OF MICROS...
ANALYSIS OF INTEREST POINTS OF CURVELET COEFFICIENTS CONTRIBUTIONS OF MICROS...
 
Medial Axis Transformation based Skeletonzation of Image Patterns using Image...
Medial Axis Transformation based Skeletonzation of Image Patterns using Image...Medial Axis Transformation based Skeletonzation of Image Patterns using Image...
Medial Axis Transformation based Skeletonzation of Image Patterns using Image...
 
A280108
A280108A280108
A280108
 
IRJET- A Review on Data Dependent Label Distribution Learning for Age Estimat...
IRJET- A Review on Data Dependent Label Distribution Learning for Age Estimat...IRJET- A Review on Data Dependent Label Distribution Learning for Age Estimat...
IRJET- A Review on Data Dependent Label Distribution Learning for Age Estimat...
 
Performance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image Retrieval
Performance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image RetrievalPerformance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image Retrieval
Performance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image Retrieval
 
Performance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image Retrieval
Performance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image RetrievalPerformance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image Retrieval
Performance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image Retrieval
 
23-02-03[1]
23-02-03[1]23-02-03[1]
23-02-03[1]
 
One-Sample Face Recognition Using HMM Model of Fiducial Areas
One-Sample Face Recognition Using HMM Model of Fiducial AreasOne-Sample Face Recognition Using HMM Model of Fiducial Areas
One-Sample Face Recognition Using HMM Model of Fiducial Areas
 
Matching algorithm performance analysis for autocalibration method of stereo ...
Matching algorithm performance analysis for autocalibration method of stereo ...Matching algorithm performance analysis for autocalibration method of stereo ...
Matching algorithm performance analysis for autocalibration method of stereo ...
 

More from TELKOMNIKA JOURNAL

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesTELKOMNIKA JOURNAL
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
 
ResNet-n/DR: Automated diagnosis of diabetic retinopathy using a residual neu...
ResNet-n/DR: Automated diagnosis of diabetic retinopathy using a residual neu...ResNet-n/DR: Automated diagnosis of diabetic retinopathy using a residual neu...
ResNet-n/DR: Automated diagnosis of diabetic retinopathy using a residual neu...TELKOMNIKA JOURNAL
 

More from TELKOMNIKA JOURNAL (20)

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
 
ResNet-n/DR: Automated diagnosis of diabetic retinopathy using a residual neu...
ResNet-n/DR: Automated diagnosis of diabetic retinopathy using a residual neu...ResNet-n/DR: Automated diagnosis of diabetic retinopathy using a residual neu...
ResNet-n/DR: Automated diagnosis of diabetic retinopathy using a residual neu...
 

Recently uploaded

(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 

Recently uploaded (20)

(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 

Face recognition based on curvelets, invariant moments features and SVM

  • 1. TELKOMNIKA Telecommunication, Computing, Electronics and Control Vol. 18, No. 2, April 2020, pp. 733~739 ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018 DOI: 10.12928/TELKOMNIKA.v18i2.14106  733 Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA Face recognition based on curvelets, invariant moments features and SVM Mohammed Talal Ghazal1 , Karam Abdullah2 1 Department of Computer Engineering Technology, Northern Technical University, Iraq 2 Department of Computer Science Education of pure science college, Mosul University, Iraq Article Info ABSTRACT Article history: Received Sep 15, 2019 Revised Dec 30, 2019 Accepted Feb 9, 2020 Recent studies highlighted on face recognition methods. In this paper, a new algorithm is proposed for face recognition by combining Fast Discrete Curvelet Transform (FDCvT) and Invariant Moments with Support vector machine (SVM), which improves rate of face recognition in various situations. The reason of using this approach depends on two things. first, Curvelet transform which is a multi-resolution method, that can efficiently represent image edge discontinuities; Second, the Invariant Moments analysis which is a statistical method that meets with the translation, rotation and scale invariance in the image. Furthermore, SVM is employed to classify the face image based on the extracted features. This process is applied on each of ORL and Yale databases to evaluate the performance of the suggested method. Experimentally, the proposed method results show that our system can compose efficient and reasonable face recognition feature, and obtain useful recognition accuracy, which is able to face and side-face states detection of persons to decrease fault rate of production. Keywords: Curvelet Face recognition Invariant moment Support vector machine This is an open access article under the CC BY-SAlicense. Corresponding Author: Mohammed Talal Ghazal, Department of Computer Engineering Technology, Northern Technical University, Mosul, Iraq. Email: mohammed.ghazal@ntu.edu.iq 1. INTRODUCTION Face recognition represents the modern wave of identity and authentication solutions [1]. This technique has become a broad user acceptance for authentication solutions, getting rid of unsuitable and long passwords. Automatic security system eliminates the need of security man to visually supervise location, performs security checks and monitors security cameras [2, 3]. Currently, the researchers are focusing on face recognition methods. Generally, these methods are consisting of the following steps: image acquiring, preprocessing, features extraction and image classification [4]. The face feature extraction process is a crucial stage in expressing face images that have a great impact on recognition rate. Furthermore, this process has an effect on computation time and storage size [5]. For feature extraction process the curvelet transform represents anisotropic multi-resolution method compared with wavelet. It is having an efficient representation of edge discontinuities in the image of the face [6, 7]. Recently, curvelet transform is used to perform some pattern recognition, such as character recognition [8] and face recognition [9-11]. It is suggested that, most of these proposed methods have directly used the coefficients of curvelet. Actually, curvelet anisotropic characteristic is not used suitably to represent the structure for the face image. Illumination differences are a major source of difficulty for designing a face recognition system, the efficient
  • 2.  ISSN:1693-6930 TELKOMNIKATelecommun Comput El Control, Vol. 18, No. 2, April 2020: 733-739 734 solution is done by extracting the illumination invariant features using moment invariants [12]. Moment invariants are not affected by the change of scaling, shifting and rotation. A several methods of deriving moment invariants have been proposed. In 1962, Hu proposed the theory of invariant moment by deriving them from algebraic invariants. Li [13] calculated 52 invariant moments, and seven popular invariant moments are approached. In this paper, a novel method for face recognition is proposed, using wavelets at each scale based on curvelet transform and improved Support vector machine (SVM) classifier. Section 2 of this paper explains the design of the face recognition system, involving curvelet and Invariant Moments method and the principle of SVM as a classification method. Section 3 presents the experimental results that evaluate the adopted techniques performance. Conclusions are reviewed in Section 4. 2. PROPOSED SYSTEM DESIGN The proposed system is based on decomposition of face image using curvelet transform, and then reducing the dimension of curvelet coefficients to feed the invariant moment algorithm for invariant features extraction. The feature sets produced by curvelet transform and invariant moment are used to train and test the SVM classifier. The flowchart of the proposed algorithm is shown in Figure 1. Figure 1. Block diagram of proposed system 3. CURVELET TRANSFORM The curvelet transform represents one of the multiscale geometric transform family, which was developed to get rid of traditional multiscale representations methods such as wavelets [14, 15]. The curvelet transform solved the problem of isotropic scaling of wavelet, which makes it fit for face features extraction. There are two different implementation methods of curvelet transform: - Curvelet via unequally spaced fast Fourier transform (USFFT). - Curvelet via wrapping of specially selected Fourier samples. Both are shared the same properties of simplicity, fast and less redundant; compare with their earlier generation versions. The first method has been taken in this paper, which is described as follows. - Apply the 2D FFT and obtain Fourier samples 𝑓̂[𝑛1, 𝑛2],− 𝑛 2 ≤ 𝑛1, 𝑛2 < 𝑛 2 . - For each scale/angle pair (𝑗, 𝑙) , resample (or interpolate) 𝑓̂[𝑛1, 𝑛2] to obtain sampled values 𝑓̂[𝑛1, 𝑛2 − 𝑛1 tan 𝜃𝑙]for (𝑛1, 𝑛2) ∈ 𝑃𝑗. - Multiply the interpolated (or shared) object 𝑓̂ with the parabolic window Ũ𝑗, effectively localizing 𝑓̂ near the parallelogram with orientation 𝜃𝑙, and obtain: 𝑓̂𝑗,𝑙[𝑛1, 𝑛2] = 𝑓̂[𝑛1, 𝑛2 − 𝑛1 tan 𝜃𝑙] ∗ Ũ𝑗[𝑛1, 𝑛2] - Apply the inverse 2D FFT to each 𝑓̂𝑗,𝑙, hence collecting the discrete coefficients 𝑐 𝐷(𝑗, 𝑙, 𝑘).
  • 3. TELKOMNIKATelecommun Comput El Control  Face recognition based on curvelets, invariant moments features and SVM (Mohammed Ghazal) 735 4. MOMENT INVARIANTS Moment invariants are invariant under scaling, shifting and rotation. They are widely used in pattern recognition [16, 17]. The derivation details of moment invariants that have been used in face features extraction are discussed by Hu (1962). So that, the general linear transformation is presented below: ω1= λ20+ λ02, (1) ω2= (λ20−λ02) 2 + 4 λ11 2 (2) ω3= (λ30−3λ12) 2 +(3λ21−λ03) 2 (3) ω4= ( λ30+λ12) 2 + (λ21+λ03) 2 (4) ω5=(λ30− 3λ12) (λ30+λ12) [(λ30+λ12) 2 −3(λ21+λ03) 2 ] + (3λ21−λ03) (λ21+λ03) [3(λ30+ λ12) 2 − (λ21+λ03) 2 ] (5) ω6=(λ20−λ02) [(λ30+λ12) 2 −( λ21+λ03) 2 ] +4λ11(λ30+λ12) ( λ21+λ03) (6) ω7= (3λ21−λ03) (λ30+λ12) [(λ30+λ12) 2 − 3(λ21+λ03) 2 ] + (3λ12−λ30) (λ21+λ03) [3(λ30+ λ12) 2 −(λ21+λ03) 2 ]. (7) The above formulas are used to calculate the features of face images. Figure 2 shows an example of the extracted features by Curvelet and moment invariants. Figure 2. Interface of features extraction 5. CLASSIFICATION In this paper, support vector machine (SVM) was used for classification of face images [18, 19]. Many kernel functions and different parameters have been considered to enhance the performance of the classifier. The data can be separated by several linear classifiers, but there is only one classifier that can maximize the distance between it and the nearest data point of each class. This linear classifier is named by
  • 4.  ISSN:1693-6930 TELKOMNIKATelecommun Comput El Control, Vol. 18, No. 2, April 2020: 733-739 736 optimal separating hyper plane [20]. So it is needed to find ω, which represents the coefficient of the hyperplane. The support vector machine SVM is a supervised learning model in the field of machine learning. It is generally used for pattern recognition, classification and regression analysis. The SVM depends on structural risk minimization theory for constructing the optimal hyperplane segmentation in the feature space, making learning editor get the global optimization. Problem description: Assume the training data, (𝑥1, 𝑦1), … , (𝑥1, 𝑦1), 𝑥 ∈ 𝑅 𝑛 , 𝑦 ∈ {+1, −1} This could be projected into a hyper-plane: (ω. x) + b = 0, ω ∈ 𝑅 𝑛 , b ∈ 𝑅 (8) For the normalization: 𝑦𝑖((ω. 𝑥𝑖) + 𝑏) ≥ 1, 𝑖 = 1, … , 𝑙 The classification of the interval is equal to: 2 ||ω|| , when the maximum interval is equal to the minimum || ω||2 [21]. 6. EXPERIMENTAL RESULTS To clarify the efficiency of the proposed method, two different databases have been used to test and evaluate the method performance. The first database is called Yale [22]. The second database is called Olivetti-Oracle Research Lab (ORL) [23]. Table 1 summarizes the properties of these datasets [24]. Table 1. The used face databases Database No. of subjects No. of Images per Subject Total Images per database Sample image Yale 15 11 165 ORL 40 10 400 Most of the methods attempt to recognize faces from images collected in a highly controlled laboratory with high resolution faces. Accordingly, the system has been tested with images of different resolutions as shown in Table 2. At 30x36 pixels the face becomes not recognized, because of face features turns hard to detect. Table 2. Results of face recognition at different resolutions. Face Images No. Pixels 92*112 69*84 52*63 30*36 Recognize? Yes Yes Yes No In the side face images, there are more features that cannot be detected because of the head turn, which makes part of the eyes and the lips invisible, for that, some examples of a head pose database [25] are
  • 5. TELKOMNIKATelecommun Comput El Control  Face recognition based on curvelets, invariant moments features and SVM (Mohammed Ghazal) 737 used in this method to recognize faces from side view as shown in Table 3. In the other poses image the face is not recognized because of having no enough features. Different number of images are used for training/testing to examine the recognition rate performance. Table 4 shows the recognition rate for the dataset of (ORL and Yale). Table 3. Results of face recognition at different head poses Images Poses Side view Side view Near frontal other Recognize Yes Yes Yes No Table 4. The results of system performance Database No. of Testing Images No. of training Images Recognition Rate Yale 80 20 96% ORL 80 20 96.25% A graphical user interface (GUI) is designed using MATLAB environment, to increase the interactivity and expansibility for users. After training the system with dataset of images, the function of GUI started, as shown in Figure 3. By selecting the test image features extraction will run, and invariant features will be calculated and displayed. To recognize the subject face a click on the recognition process button is needed. If the tested image is for a known person, the system will give a message for person sequence number at the trained database, otherwise, a message of an unknown person will be displayed. Figure 3. A graphical user interface (GUI) for face recognition system 7. CONCLUSION In this paper, a new method of face recognition is proposed by using Curvelet transform and invariant moments. Support Vector Machine (SVM) is used as a classifier, many experiments are conducted on (ORL and Yale) face databases, moreover, head pose database is used to evaluate the system
  • 6.  ISSN:1693-6930 TELKOMNIKATelecommun Comput El Control, Vol. 18, No. 2, April 2020: 733-739 738 performance. The experimental results proved that the use of invariant moments with Curvelet features can improve the recognition rate in different conditions such as different illumination, resolution, and head poses. The system accuracy is achieved up to 96% on the Yale and to 96.25% on the ORL databases. For future studies, it is suggested to apply the proposed method to other face and facial expressions databases to recognize the face regions such as eyes, lips and nose to classify different facial expressions and verify the efficiency of the proposed method. ACKNOWLEDGEMENTS This research is funded by cooperation between Northern Technical University and Mosul University in Iraq. Website: For Northern Technical University https://www.ntu.edu.iq, Website: For Mosul University https://www.uomosul.edu.iq. REFERENCES [1] W. Lin, B. Wu, dan Q. Huang, “A face-recognition approach based on secret sharing for user authentication in public-transportation security,” 2018 IEEE International Conference on Applied System Invention (ICASI), Chiba, pp. 1350-1353, 2018. [2] R. Gusain, H. Jain, dan S. Pratap, “Enhancing bank security system using Face Recognition, Iris Scanner and Palm Vein Technology,” 2018 3rd International Conference On Internet of Things: Smart Innovation and Usages (IoT- SIU), Bhimtal, pp. 1-5, 2018. [3] I. G. P. S. Wijaya, A. Y. Husodo, and I. W. A. Arimbawa, “Real time face recognition based on face descriptor and its application,” Telkomnika, vol. 16, no. 2, pp. 739–746, April 2018. [4] M. Z. Al-Dabagh, M. H. Mohammed Alhabib, dan F. H. AL-Mukhtar, “Face Recognition System Based on Kernel Discriminant Analysis, K-Nearest Neighbor and Support Vector Machine,” International Journal of Research and Engineering, vol. 5, no. 3, pp. 335–338, March 2018. [5] M. Tang dan F. Chen, “Facial expression recognition and its application based on curvelet transform and PSO- SVM,” Optik, vol. 124, no. 22, pp. 5401–5406, November 2013. [6] L. Zhou, W. Liu, Z. M. Lu, dan T. Nie, “Face recognition based on curvelets and local binary pattern features via using local property preservation,” Journal of Systems and Software, vol. 95, pp. 209–216, 2014. [7] I. Batioua, R. Benouini, K. Zenkouar, dan A. Zahi, “3D image analysis by separable discrete orthogonal moments based on Krawtchouk and Tchebichef polynomials,” Pattern Recognit., vol. 71, pp. 264–277, November 2017. [8] C. Boufenar, M. Batouche, dan M. Schoenauer, “An artificial immune system for offline isolated handwritten arabic character recognition,” Evolving Systems, vol. 9, no. 1, pp. 25–41, March 2018. [9] J. Zhang, Y. Wang, Z. Zhang, dan C. Xia, “Comparison of wavelet, Gabor and curvelet transform for face recognition,” Optica Applicata, vol. 41, no. 1, pp. 183–193, January 2011. [10] R. Benouini, I. Batioua, K. Zenkouar, S. Najah, dan H. Qjidaa, “Efficient 3D object classification by using direct Krawtchouk moment invariants,” Multimedia Tools and Applications, vol. 77, no. 20, pp. 27517–27542, October 2018. [11] C. Page, “Hybrid techniques to improve face recognition based on features extraction methods and Haar discrete wavelet transformation,” Journal Al-Qadisiyah for Computer Science Mathematics, vol. 10, no. 2, pp. 36–46, 2018. [12] T. Alobaidi dan W. B. Mikhael, “Two-step feature extraction in a transform domain for face recognition,” 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, pp. 1-4, 2017. [13] Y. F. Y. L. T. Yanna dan Y. Qing, “Recognition of the Tea Sprout Based on Color and Shape Features,” in Nongye Jixie Xuebao/Transactions of the Chinese Society of Agricultural Machinery,vol. 40, pp 119-123, September 2009. [14] E. J. Candès dan D. L. Donoho, “New tight frames of curvelets and optimal representations of objects with piecewise C2 singularities,” Communications on Pure and Applied Mathematics, vol. 57, no. 2, pp. 219–266, November 2003. [15] R. Benouini, I. Batioua, I. Elouariachi,K. Zenkouar, dan A. Zarghili, “ExplicitSeparable two dimensional Moment Invariants for object recognition,” Procedia Comput. Science, vol. 148, pp. 409–417, 2019. [16] Y. Zhu, L. C. De Silva, dan C. C. Ko, “Using moment invariants and HMM in facial expression recognition,” Pattern Recognit. Lett., vol. 23, no. 1–3, pp. 83–91, January 2002. [17] A. Hmimid, M. Sayyouri, dan H. Qjidaa, “Fast computation of separable two-dimensional discrete invariant moments for image classification,” Pattern Recognit., vol. 48, no. 2, pp. 509–521, February 2015. [18] Z. B. Lahaw, D. Essaidani,dan H. Seddik, “Robust Face Recognition Approaches Using PCA, ICA, LDA Based on DWT, and SVM Algorithms,” 2018 41st International Conference on Telecommunications and Signal Processing (TSP), Athens, pp. 1-5, 2018. [19] J. M. Al Tuwaijari, S. I. Mohammed, dan M. A. B. Rahem, “Performance Evaluation Of Face Image Recognition Based Voila Joins With SVM,” Iraqi Journal of Information Technology, vol. 9, no. 3, pp. 161-176, 2019. [20] S. R. Gunn, “Support vector machines for classification and regression,” ISIS Technical Report, vol. 14, no. 1, pp. 5–16, 1998. [21] Y. Sun et al., “Image Classification base on PCA of Multi-view Deep Representation,” Journal of Visual Communication and Image Representation, vol. 62, pp. 253-258, July 2019.
  • 7. TELKOMNIKATelecommun Comput El Control  Face recognition based on curvelets, invariant moments features and SVM (Mohammed Ghazal) 739 [22] P. N. Belhumeur, J. P. Hespanha, dan D. J. Kriegman, “Eigenfaces vs. fisherfaces: Recognition using class specific linear projection,” in IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 19, no. 7, pp. 711-720, July 1997. [23] F. S. Samaria dan A. C. Harter, “Parameterisation of a stochastic model for human face identification,” in Proceedings of 1994 IEEE Workshop on Applications of Computer Vision, Sarasota, FL, USA, pp. 138–142, 1994. [24] A. Muntasa, I. A. Siradjuddin, “Contradictory of the Laplacian Smoothing Transform and Linear Discriminant Analysis Modeling to Extract the Face Image Features,” Telkomnika, vol. 15, no. 4, pp. 1794-1807, December 2017. [25] N. Gourier, D. Hall, dan J. L. Crowley, “Estimating face orientation from robust detection of salient facial structures,” FG Net Work. Vis. Obs. Deictic Gestures, pp. 17–25, January 2004. BIOGRAPHIES OF AUTHORS Mohammed Talal Ghazal obtained his M.Sc. degree from Computer Engineering Technology, Northern Technical University, Mosul, Iraq in 2016. His M.Sc. thesis entitled: “Wheelchair Robot Control Using EOG signals” and his current research focuses on the development of face recognition algorithm. Karam Muayad Abdullah obtained his M.Sc. degree from collage of computer science and mathematics, Mosul University, Mosul, Iraq in 2010. His current research focuses on the development of face recognition algorithm.