SlideShare a Scribd company logo
Local Directional Number Pattern for Face Analysis: Face and
Expression Recognition
ABSTRACT:
This paper proposes a novel local feature descriptor, local directional number pattern (LDN),
for face analysis, i.e., face and expression recognition. LDN encodes the directional information
of the face’s textures (i.e., the texture’s structure) in a compact way, producing a more
discriminative code than current methods. We compute the structure of each micro-pattern with
the aid of a compass mask that extracts directional information, and we encode such
information using the prominent direction indices (directional numbers) and sign—which
allows us to distinguish among similar structural patterns that have different intensity
transitions. We divide the face into several regions, and extract the distribution of the LDN
features from them. Then, we concatenate these features into a feature vector, and we use it as a
face descriptor. We perform several experiments in which our descriptor performs consistently
under illumination, noise, expression, and time lapse variations. Moreover, we test our
descriptor with different masks to analyze its performance in different face analysis tasks
EXISTING SYSTEM:
GLOBALSOFT TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
In the literature, there are many methods for the holistic class, such as, Eigenfaces and
Fisherfaces, which are built on Principal Component Analysis (PCA); the more recent 2D PCA,
and Linear Discriminant Analysis are also examples of holistic methods. Although these
methods have been studied widely, local descriptors have gained attention because of their
robustness to illumination and pose variations. Heiseleet al.showed the validity of the
component-based methods, and how they outperform holistic methods. The local-feature
methods compute the descriptor from parts of the face, and then gather the information into one
descriptor. Among these methods are Local Features Analysis, Gabor features, Elastic Bunch
Graph Matching, and Local Binary Pattern (LBP). The last one is an extension of the LBP
feature that was originally designed for texture description, applied to face recognition. LBP
achieved better performance than previous methods, thus it gained popularity, and was studied
extensively. Newer methods tried to overcome the shortcomings of LBP, like Local Ternary
Pattern (LTP), and Local Directional Pattern (LDiP). The last method encodes the directional
information in the neighborhood, instead of the intensity. Also, Zhanget al. explored the use of
higher order local derivatives (LDeP) to produce better results than LBP. Both methods use
other information, instead of intensity, to overcome noise and illumination variation problems.
However, these methods still suffer in non-monotonic illumination variation, random noise, and
changes in pose, age, and expression conditions. Although some methods, like Gradientfaces,
have a high discrimination power under illumination variation, they still have low recognition
capabilities for expression and age variation conditions. However, some methods explored
different features, such as, infrared, near infrared, and phase information, to overcome the
illumination problem while maintaining the performance under difficult conditions.
DISADVANTAGES OF EXISTING SYSTEM:
 Both methods use other information, instead of intensity, to overcome noise and
illumination variation problems.
 However, these methods still suffer in non-monotonic illumination variation, random
noise, and changes in pose, age, and expression conditions.
 Although some methods, like Gradientfaces, have a high discrimination power under
illumination variation, they still have low recognition capabilities for expression and age
variation conditions.
PROPOSED SYSTEM:
In this paper, we propose a face descriptor, Local Directional Number Pattern (LDN), for robust
face recognition that encodes the structural information and the intensity variations of the face’s
texture. LDN encodes the structure of a local neighborhood by analyzing its directional
information. Consequently, we compute the edge responses in the neighborhood, in eight
different directions with a compass mask. Then, from all the directions, we choose the top
positive and negative directions to produce a meaningful descriptor for different textures with
similar structural patterns. This approach allows us to distinguish intensity changes (e.g., from
bright to dark and vice versa) in the texture. Furthermore, our descriptor uses the information of
the entire neighborhood, instead of using sparse points for its computation like LBP. Hence, our
approach conveys more information into the code, yet it is more compact—as it is six bit long.
Moreover, we experiment with different masks and resolutions of the mask to acquire
characteristics that may be neglected by just one, and combine them to extend the encoded
information. We found that the inclusion of multiple encoding levels produces an improvement
in the detection process.
ADVANTAGES OF PROPOSED SYSTEM:
1) The coding scheme is based on directional numbers, instead of bit strings, which encodes
the information of the neighborhood in a more efficient way
2) The implicit use of sign information, in comparison with previous directional and
derivative methods we encode more information in less space, and, at the same time,
discriminate more textures; and
3) The use of gradient information makes the method robust against illumination changes
and noise.
SYSTEM CONFIGURATION:-
HARDWARE REQUIREMENTS:-
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 256 MB(min)
 Hard Disk - 20 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
SOFTWARE REQUIREMENTS:
• Operating system : - Windows XP.
• Coding Language : C#.Net
REFERENCE:
Adin Ramirez Rivera,Student Member, IEEE,Jorge Rojas Castillo,Student Member, IEEE, and
Oksam Chae,Member, IEEE ―Local Directional Number Pattern for Face Analysis: Face and
Expression Recognition‖- IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 22,
NO. 5, MAY 2013.
CLOUING
DOMAIN: WIRELESS NETWORK PROJECTS

More Related Content

What's hot

S0450598102
S0450598102S0450598102
S0450598102
IJERA Editor
 
HVDLP : HORIZONTAL VERTICAL DIAGONAL LOCAL PATTERN BASED FACE RECOGNITION
HVDLP : HORIZONTAL VERTICAL DIAGONAL LOCAL PATTERN BASED FACE RECOGNITION HVDLP : HORIZONTAL VERTICAL DIAGONAL LOCAL PATTERN BASED FACE RECOGNITION
HVDLP : HORIZONTAL VERTICAL DIAGONAL LOCAL PATTERN BASED FACE RECOGNITION
sipij
 
Af35178182
Af35178182Af35178182
Af35178182
IJERA Editor
 
A New Skin Color Based Face Detection Algorithm by Combining Three Color Mode...
A New Skin Color Based Face Detection Algorithm by Combining Three Color Mode...A New Skin Color Based Face Detection Algorithm by Combining Three Color Mode...
A New Skin Color Based Face Detection Algorithm by Combining Three Color Mode...
iosrjce
 
50Combining Color Spaces for Human Skin Detection in Color Images using Skin ...
50Combining Color Spaces for Human Skin Detection in Color Images using Skin ...50Combining Color Spaces for Human Skin Detection in Color Images using Skin ...
50Combining Color Spaces for Human Skin Detection in Color Images using Skin ...
idescitation
 
Expression invariant face recognition
Expression invariant face recognitionExpression invariant face recognition
Expression invariant face recognitionSumit Agarwal
 
An improved double coding local binary pattern algorithm for face recognition
An improved double coding local binary pattern algorithm for face recognitionAn improved double coding local binary pattern algorithm for face recognition
An improved double coding local binary pattern algorithm for face recognition
eSAT Journals
 
Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters
Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters
Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters
IJERA Editor
 
Improved Face Recognition across Poses using Fusion of Probabilistic Latent V...
Improved Face Recognition across Poses using Fusion of Probabilistic Latent V...Improved Face Recognition across Poses using Fusion of Probabilistic Latent V...
Improved Face Recognition across Poses using Fusion of Probabilistic Latent V...
TELKOMNIKA JOURNAL
 
Advanced Hybrid Color Space Normalization for Human Face Extraction and Detec...
Advanced Hybrid Color Space Normalization for Human Face Extraction and Detec...Advanced Hybrid Color Space Normalization for Human Face Extraction and Detec...
Advanced Hybrid Color Space Normalization for Human Face Extraction and Detec...
ijsrd.com
 
An Enhanced Independent Component-Based Human Facial Expression Recognition ...
An Enhanced Independent Component-Based Human Facial Expression Recognition  ...An Enhanced Independent Component-Based Human Facial Expression Recognition  ...
An Enhanced Independent Component-Based Human Facial Expression Recognition ...
أحلام انصارى
 
Performance Evaluation of Illumination Invariant Face Recognition Algorthims
Performance Evaluation of Illumination Invariant Face Recognition AlgorthimsPerformance Evaluation of Illumination Invariant Face Recognition Algorthims
Performance Evaluation of Illumination Invariant Face Recognition Algorthims
IRJET Journal
 
DEVELOPMENT OF AN ANDROID APPLICATION FOR OBJECT DETECTION BASED ON COLOR, SH...
DEVELOPMENT OF AN ANDROID APPLICATION FOR OBJECT DETECTION BASED ON COLOR, SH...DEVELOPMENT OF AN ANDROID APPLICATION FOR OBJECT DETECTION BASED ON COLOR, SH...
DEVELOPMENT OF AN ANDROID APPLICATION FOR OBJECT DETECTION BASED ON COLOR, SH...
ijma
 
Facial expression recognition using pca and gabor with jaffe database 11748
Facial expression recognition using pca and gabor with jaffe database 11748Facial expression recognition using pca and gabor with jaffe database 11748
Facial expression recognition using pca and gabor with jaffe database 11748
EditorIJAERD
 
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET TransformRotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
IRJET Journal
 
Use of Illumination Invariant Feature Descriptor for Face Recognition
 Use of Illumination Invariant Feature Descriptor for Face Recognition Use of Illumination Invariant Feature Descriptor for Face Recognition
Use of Illumination Invariant Feature Descriptor for Face Recognition
IJCSIS Research Publications
 

What's hot (18)

S0450598102
S0450598102S0450598102
S0450598102
 
HVDLP : HORIZONTAL VERTICAL DIAGONAL LOCAL PATTERN BASED FACE RECOGNITION
HVDLP : HORIZONTAL VERTICAL DIAGONAL LOCAL PATTERN BASED FACE RECOGNITION HVDLP : HORIZONTAL VERTICAL DIAGONAL LOCAL PATTERN BASED FACE RECOGNITION
HVDLP : HORIZONTAL VERTICAL DIAGONAL LOCAL PATTERN BASED FACE RECOGNITION
 
Af35178182
Af35178182Af35178182
Af35178182
 
A New Skin Color Based Face Detection Algorithm by Combining Three Color Mode...
A New Skin Color Based Face Detection Algorithm by Combining Three Color Mode...A New Skin Color Based Face Detection Algorithm by Combining Three Color Mode...
A New Skin Color Based Face Detection Algorithm by Combining Three Color Mode...
 
50Combining Color Spaces for Human Skin Detection in Color Images using Skin ...
50Combining Color Spaces for Human Skin Detection in Color Images using Skin ...50Combining Color Spaces for Human Skin Detection in Color Images using Skin ...
50Combining Color Spaces for Human Skin Detection in Color Images using Skin ...
 
Expression invariant face recognition
Expression invariant face recognitionExpression invariant face recognition
Expression invariant face recognition
 
An improved double coding local binary pattern algorithm for face recognition
An improved double coding local binary pattern algorithm for face recognitionAn improved double coding local binary pattern algorithm for face recognition
An improved double coding local binary pattern algorithm for face recognition
 
Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters
Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters
Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters
 
ICIC-2015
ICIC-2015ICIC-2015
ICIC-2015
 
Improved Face Recognition across Poses using Fusion of Probabilistic Latent V...
Improved Face Recognition across Poses using Fusion of Probabilistic Latent V...Improved Face Recognition across Poses using Fusion of Probabilistic Latent V...
Improved Face Recognition across Poses using Fusion of Probabilistic Latent V...
 
Advanced Hybrid Color Space Normalization for Human Face Extraction and Detec...
Advanced Hybrid Color Space Normalization for Human Face Extraction and Detec...Advanced Hybrid Color Space Normalization for Human Face Extraction and Detec...
Advanced Hybrid Color Space Normalization for Human Face Extraction and Detec...
 
J01116164
J01116164J01116164
J01116164
 
An Enhanced Independent Component-Based Human Facial Expression Recognition ...
An Enhanced Independent Component-Based Human Facial Expression Recognition  ...An Enhanced Independent Component-Based Human Facial Expression Recognition  ...
An Enhanced Independent Component-Based Human Facial Expression Recognition ...
 
Performance Evaluation of Illumination Invariant Face Recognition Algorthims
Performance Evaluation of Illumination Invariant Face Recognition AlgorthimsPerformance Evaluation of Illumination Invariant Face Recognition Algorthims
Performance Evaluation of Illumination Invariant Face Recognition Algorthims
 
DEVELOPMENT OF AN ANDROID APPLICATION FOR OBJECT DETECTION BASED ON COLOR, SH...
DEVELOPMENT OF AN ANDROID APPLICATION FOR OBJECT DETECTION BASED ON COLOR, SH...DEVELOPMENT OF AN ANDROID APPLICATION FOR OBJECT DETECTION BASED ON COLOR, SH...
DEVELOPMENT OF AN ANDROID APPLICATION FOR OBJECT DETECTION BASED ON COLOR, SH...
 
Facial expression recognition using pca and gabor with jaffe database 11748
Facial expression recognition using pca and gabor with jaffe database 11748Facial expression recognition using pca and gabor with jaffe database 11748
Facial expression recognition using pca and gabor with jaffe database 11748
 
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET TransformRotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
 
Use of Illumination Invariant Feature Descriptor for Face Recognition
 Use of Illumination Invariant Feature Descriptor for Face Recognition Use of Illumination Invariant Feature Descriptor for Face Recognition
Use of Illumination Invariant Feature Descriptor for Face Recognition
 

Viewers also liked

Query adaptive image search with hash codes
Query adaptive image search with hash codesQuery adaptive image search with hash codes
Query adaptive image search with hash codes
IEEEFINALYEARPROJECTS
 
Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsScalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewords
IEEEFINALYEARPROJECTS
 
Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsScalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewords
IEEEFINALYEARPROJECTS
 
Enforcing secure and privacy preserving information brokering in distributed ...
Enforcing secure and privacy preserving information brokering in distributed ...Enforcing secure and privacy preserving information brokering in distributed ...
Enforcing secure and privacy preserving information brokering in distributed ...
IEEEFINALYEARPROJECTS
 
Reversible watermarking based on invariant image classification and dynamic h...
Reversible watermarking based on invariant image classification and dynamic h...Reversible watermarking based on invariant image classification and dynamic h...
Reversible watermarking based on invariant image classification and dynamic h...
IEEEFINALYEARPROJECTS
 
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Noise reduction based on partial reference, dual-tree complex wavelet transfo...Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
IEEEFINALYEARPROJECTS
 
Reversible data hiding with optimal value transfer
Reversible data hiding with optimal value transferReversible data hiding with optimal value transfer
Reversible data hiding with optimal value transfer
IEEEFINALYEARPROJECTS
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptPrivacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Girish Chandra
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
Sreelekshmi Sree
 

Viewers also liked (9)

Query adaptive image search with hash codes
Query adaptive image search with hash codesQuery adaptive image search with hash codes
Query adaptive image search with hash codes
 
Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsScalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewords
 
Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsScalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewords
 
Enforcing secure and privacy preserving information brokering in distributed ...
Enforcing secure and privacy preserving information brokering in distributed ...Enforcing secure and privacy preserving information brokering in distributed ...
Enforcing secure and privacy preserving information brokering in distributed ...
 
Reversible watermarking based on invariant image classification and dynamic h...
Reversible watermarking based on invariant image classification and dynamic h...Reversible watermarking based on invariant image classification and dynamic h...
Reversible watermarking based on invariant image classification and dynamic h...
 
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Noise reduction based on partial reference, dual-tree complex wavelet transfo...Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
 
Reversible data hiding with optimal value transfer
Reversible data hiding with optimal value transferReversible data hiding with optimal value transfer
Reversible data hiding with optimal value transfer
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptPrivacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 

Similar to Local directional number pattern for face analysis face and expression recognition

Local directional number pattern for face analysis face and expression recogn...
Local directional number pattern for face analysis face and expression recogn...Local directional number pattern for face analysis face and expression recogn...
Local directional number pattern for face analysis face and expression recogn...
Ecway Technologies
 
Matlab local directional number pattern for face analysis face and expressio...
Matlab  local directional number pattern for face analysis face and expressio...Matlab  local directional number pattern for face analysis face and expressio...
Matlab local directional number pattern for face analysis face and expressio...
Ecway Technologies
 
A Comprehensive Survey on Down Syndrome Identification using Facial Features
A Comprehensive Survey on Down Syndrome Identification using Facial FeaturesA Comprehensive Survey on Down Syndrome Identification using Facial Features
A Comprehensive Survey on Down Syndrome Identification using Facial Features
IRJET Journal
 
Illumination Invariant Face Recognition System using Local Directional Patter...
Illumination Invariant Face Recognition System using Local Directional Patter...Illumination Invariant Face Recognition System using Local Directional Patter...
Illumination Invariant Face Recognition System using Local Directional Patter...
Editor IJCATR
 
Cl4301502506
Cl4301502506Cl4301502506
Cl4301502506
IJERA Editor
 
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptxReview A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
AravindHari22
 
Face recognition using laplacianfaces
Face recognition using laplacianfaces Face recognition using laplacianfaces
Face recognition using laplacianfaces
StudsPlanet.com
 
Multi-Directional Multi-Level Dual-Cross Patterns for Robust Face Recognition
Multi-Directional Multi-Level Dual-Cross Patterns for Robust Face RecognitionMulti-Directional Multi-Level Dual-Cross Patterns for Robust Face Recognition
Multi-Directional Multi-Level Dual-Cross Patterns for Robust Face Recognition
Peachy Essay
 
a case study on various preprocessing methods and their impact on face recogn...
a case study on various preprocessing methods and their impact on face recogn...a case study on various preprocessing methods and their impact on face recogn...
a case study on various preprocessing methods and their impact on face recogn...
HANAN ALGHARIB
 
Ieee transactions on image processing
Ieee transactions on image processingIeee transactions on image processing
Ieee transactions on image processing
tsysglobalsolutions
 
Facial recognition using modified local binary pattern and random forest
Facial recognition using modified local binary pattern and random forestFacial recognition using modified local binary pattern and random forest
Facial recognition using modified local binary pattern and random forest
ijaia
 
MONOGENIC SCALE SPACE BASED REGION COVARIANCE MATRIX DESCRIPTOR FOR FACE RECO...
MONOGENIC SCALE SPACE BASED REGION COVARIANCE MATRIX DESCRIPTOR FOR FACE RECO...MONOGENIC SCALE SPACE BASED REGION COVARIANCE MATRIX DESCRIPTOR FOR FACE RECO...
MONOGENIC SCALE SPACE BASED REGION COVARIANCE MATRIX DESCRIPTOR FOR FACE RECO...
cscpconf
 
A survey on feature descriptors for texture image classification
A survey on feature descriptors for texture image classificationA survey on feature descriptors for texture image classification
A survey on feature descriptors for texture image classification
IRJET Journal
 
Implementation of High Dimension Colour Transform in Domain of Image Processing
Implementation of High Dimension Colour Transform in Domain of Image ProcessingImplementation of High Dimension Colour Transform in Domain of Image Processing
Implementation of High Dimension Colour Transform in Domain of Image Processing
IRJET Journal
 
Matlab abstract 2016
Matlab abstract 2016Matlab abstract 2016
Matlab abstract 2016
Nexgen Technology
 
Statistical Models for Face Recognition System With Different Distance Measures
Statistical Models for Face Recognition System With Different Distance MeasuresStatistical Models for Face Recognition System With Different Distance Measures
Statistical Models for Face Recognition System With Different Distance Measures
CSCJournals
 
Selective local binary pattern with convolutional neural network for facial ...
Selective local binary pattern with convolutional neural  network for facial ...Selective local binary pattern with convolutional neural  network for facial ...
Selective local binary pattern with convolutional neural network for facial ...
IJECEIAES
 
Effectual Face Recognition System for Uncontrolled Illumination
Effectual Face Recognition System for Uncontrolled IlluminationEffectual Face Recognition System for Uncontrolled Illumination
Effectual Face Recognition System for Uncontrolled Illumination
IIRindia
 
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...
sipij
 
Matlab image processing_2013_ieee
Matlab image processing_2013_ieeeMatlab image processing_2013_ieee
Matlab image processing_2013_ieee
Igslabs Malleswaram
 

Similar to Local directional number pattern for face analysis face and expression recognition (20)

Local directional number pattern for face analysis face and expression recogn...
Local directional number pattern for face analysis face and expression recogn...Local directional number pattern for face analysis face and expression recogn...
Local directional number pattern for face analysis face and expression recogn...
 
Matlab local directional number pattern for face analysis face and expressio...
Matlab  local directional number pattern for face analysis face and expressio...Matlab  local directional number pattern for face analysis face and expressio...
Matlab local directional number pattern for face analysis face and expressio...
 
A Comprehensive Survey on Down Syndrome Identification using Facial Features
A Comprehensive Survey on Down Syndrome Identification using Facial FeaturesA Comprehensive Survey on Down Syndrome Identification using Facial Features
A Comprehensive Survey on Down Syndrome Identification using Facial Features
 
Illumination Invariant Face Recognition System using Local Directional Patter...
Illumination Invariant Face Recognition System using Local Directional Patter...Illumination Invariant Face Recognition System using Local Directional Patter...
Illumination Invariant Face Recognition System using Local Directional Patter...
 
Cl4301502506
Cl4301502506Cl4301502506
Cl4301502506
 
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptxReview A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
 
Face recognition using laplacianfaces
Face recognition using laplacianfaces Face recognition using laplacianfaces
Face recognition using laplacianfaces
 
Multi-Directional Multi-Level Dual-Cross Patterns for Robust Face Recognition
Multi-Directional Multi-Level Dual-Cross Patterns for Robust Face RecognitionMulti-Directional Multi-Level Dual-Cross Patterns for Robust Face Recognition
Multi-Directional Multi-Level Dual-Cross Patterns for Robust Face Recognition
 
a case study on various preprocessing methods and their impact on face recogn...
a case study on various preprocessing methods and their impact on face recogn...a case study on various preprocessing methods and their impact on face recogn...
a case study on various preprocessing methods and their impact on face recogn...
 
Ieee transactions on image processing
Ieee transactions on image processingIeee transactions on image processing
Ieee transactions on image processing
 
Facial recognition using modified local binary pattern and random forest
Facial recognition using modified local binary pattern and random forestFacial recognition using modified local binary pattern and random forest
Facial recognition using modified local binary pattern and random forest
 
MONOGENIC SCALE SPACE BASED REGION COVARIANCE MATRIX DESCRIPTOR FOR FACE RECO...
MONOGENIC SCALE SPACE BASED REGION COVARIANCE MATRIX DESCRIPTOR FOR FACE RECO...MONOGENIC SCALE SPACE BASED REGION COVARIANCE MATRIX DESCRIPTOR FOR FACE RECO...
MONOGENIC SCALE SPACE BASED REGION COVARIANCE MATRIX DESCRIPTOR FOR FACE RECO...
 
A survey on feature descriptors for texture image classification
A survey on feature descriptors for texture image classificationA survey on feature descriptors for texture image classification
A survey on feature descriptors for texture image classification
 
Implementation of High Dimension Colour Transform in Domain of Image Processing
Implementation of High Dimension Colour Transform in Domain of Image ProcessingImplementation of High Dimension Colour Transform in Domain of Image Processing
Implementation of High Dimension Colour Transform in Domain of Image Processing
 
Matlab abstract 2016
Matlab abstract 2016Matlab abstract 2016
Matlab abstract 2016
 
Statistical Models for Face Recognition System With Different Distance Measures
Statistical Models for Face Recognition System With Different Distance MeasuresStatistical Models for Face Recognition System With Different Distance Measures
Statistical Models for Face Recognition System With Different Distance Measures
 
Selective local binary pattern with convolutional neural network for facial ...
Selective local binary pattern with convolutional neural  network for facial ...Selective local binary pattern with convolutional neural  network for facial ...
Selective local binary pattern with convolutional neural network for facial ...
 
Effectual Face Recognition System for Uncontrolled Illumination
Effectual Face Recognition System for Uncontrolled IlluminationEffectual Face Recognition System for Uncontrolled Illumination
Effectual Face Recognition System for Uncontrolled Illumination
 
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...
 
Matlab image processing_2013_ieee
Matlab image processing_2013_ieeeMatlab image processing_2013_ieee
Matlab image processing_2013_ieee
 

More from IEEEFINALYEARPROJECTS

An access point based fec mechanism for video transmission over wireless la ns
An access point based fec mechanism for video transmission over wireless la nsAn access point based fec mechanism for video transmission over wireless la ns
An access point based fec mechanism for video transmission over wireless la ns
IEEEFINALYEARPROJECTS
 
Towards differential query services in cost efficient clouds
Towards differential query services in cost efficient cloudsTowards differential query services in cost efficient clouds
Towards differential query services in cost efficient clouds
IEEEFINALYEARPROJECTS
 
Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...
IEEEFINALYEARPROJECTS
 
Secure and efficient data transmission for cluster based wireless sensor netw...
Secure and efficient data transmission for cluster based wireless sensor netw...Secure and efficient data transmission for cluster based wireless sensor netw...
Secure and efficient data transmission for cluster based wireless sensor netw...
IEEEFINALYEARPROJECTS
 
Privacy preserving back propagation neural network learning over arbitrarily ...
Privacy preserving back propagation neural network learning over arbitrarily ...Privacy preserving back propagation neural network learning over arbitrarily ...
Privacy preserving back propagation neural network learning over arbitrarily ...
IEEEFINALYEARPROJECTS
 
Non cooperative location privacy
Non cooperative location privacyNon cooperative location privacy
Non cooperative location privacy
IEEEFINALYEARPROJECTS
 
Harnessing the cloud for securely outsourcing large
Harnessing the cloud for securely outsourcing largeHarnessing the cloud for securely outsourcing large
Harnessing the cloud for securely outsourcing large
IEEEFINALYEARPROJECTS
 
Geo community-based broadcasting for data dissemination in mobile social netw...
Geo community-based broadcasting for data dissemination in mobile social netw...Geo community-based broadcasting for data dissemination in mobile social netw...
Geo community-based broadcasting for data dissemination in mobile social netw...
IEEEFINALYEARPROJECTS
 
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
IEEEFINALYEARPROJECTS
 
Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...
IEEEFINALYEARPROJECTS
 
A secure protocol for spontaneous wireless ad hoc networks creation
A secure protocol for spontaneous wireless ad hoc networks creationA secure protocol for spontaneous wireless ad hoc networks creation
A secure protocol for spontaneous wireless ad hoc networks creation
IEEEFINALYEARPROJECTS
 
Utility privacy tradeoff in databases an information-theoretic approach
Utility privacy tradeoff in databases an information-theoretic approachUtility privacy tradeoff in databases an information-theoretic approach
Utility privacy tradeoff in databases an information-theoretic approach
IEEEFINALYEARPROJECTS
 
Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networks
IEEEFINALYEARPROJECTS
 
Spatial approximate string search
Spatial approximate string searchSpatial approximate string search
Spatial approximate string search
IEEEFINALYEARPROJECTS
 
Sort a self organizing trust model for peer-to-peer systems
Sort a self organizing trust model for peer-to-peer systemsSort a self organizing trust model for peer-to-peer systems
Sort a self organizing trust model for peer-to-peer systems
IEEEFINALYEARPROJECTS
 
Security analysis of a single sign on mechanism for distributed computer netw...
Security analysis of a single sign on mechanism for distributed computer netw...Security analysis of a single sign on mechanism for distributed computer netw...
Security analysis of a single sign on mechanism for distributed computer netw...
IEEEFINALYEARPROJECTS
 
Securing class initialization in java like languages
Securing class initialization in java like languagesSecuring class initialization in java like languages
Securing class initialization in java like languages
IEEEFINALYEARPROJECTS
 
Secure encounter based mobile social networks requirements, designs, and trad...
Secure encounter based mobile social networks requirements, designs, and trad...Secure encounter based mobile social networks requirements, designs, and trad...
Secure encounter based mobile social networks requirements, designs, and trad...
IEEEFINALYEARPROJECTS
 
Reversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionReversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryption
IEEEFINALYEARPROJECTS
 
Privacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignmentPrivacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignment
IEEEFINALYEARPROJECTS
 

More from IEEEFINALYEARPROJECTS (20)

An access point based fec mechanism for video transmission over wireless la ns
An access point based fec mechanism for video transmission over wireless la nsAn access point based fec mechanism for video transmission over wireless la ns
An access point based fec mechanism for video transmission over wireless la ns
 
Towards differential query services in cost efficient clouds
Towards differential query services in cost efficient cloudsTowards differential query services in cost efficient clouds
Towards differential query services in cost efficient clouds
 
Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...
 
Secure and efficient data transmission for cluster based wireless sensor netw...
Secure and efficient data transmission for cluster based wireless sensor netw...Secure and efficient data transmission for cluster based wireless sensor netw...
Secure and efficient data transmission for cluster based wireless sensor netw...
 
Privacy preserving back propagation neural network learning over arbitrarily ...
Privacy preserving back propagation neural network learning over arbitrarily ...Privacy preserving back propagation neural network learning over arbitrarily ...
Privacy preserving back propagation neural network learning over arbitrarily ...
 
Non cooperative location privacy
Non cooperative location privacyNon cooperative location privacy
Non cooperative location privacy
 
Harnessing the cloud for securely outsourcing large
Harnessing the cloud for securely outsourcing largeHarnessing the cloud for securely outsourcing large
Harnessing the cloud for securely outsourcing large
 
Geo community-based broadcasting for data dissemination in mobile social netw...
Geo community-based broadcasting for data dissemination in mobile social netw...Geo community-based broadcasting for data dissemination in mobile social netw...
Geo community-based broadcasting for data dissemination in mobile social netw...
 
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
 
Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...
 
A secure protocol for spontaneous wireless ad hoc networks creation
A secure protocol for spontaneous wireless ad hoc networks creationA secure protocol for spontaneous wireless ad hoc networks creation
A secure protocol for spontaneous wireless ad hoc networks creation
 
Utility privacy tradeoff in databases an information-theoretic approach
Utility privacy tradeoff in databases an information-theoretic approachUtility privacy tradeoff in databases an information-theoretic approach
Utility privacy tradeoff in databases an information-theoretic approach
 
Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networks
 
Spatial approximate string search
Spatial approximate string searchSpatial approximate string search
Spatial approximate string search
 
Sort a self organizing trust model for peer-to-peer systems
Sort a self organizing trust model for peer-to-peer systemsSort a self organizing trust model for peer-to-peer systems
Sort a self organizing trust model for peer-to-peer systems
 
Security analysis of a single sign on mechanism for distributed computer netw...
Security analysis of a single sign on mechanism for distributed computer netw...Security analysis of a single sign on mechanism for distributed computer netw...
Security analysis of a single sign on mechanism for distributed computer netw...
 
Securing class initialization in java like languages
Securing class initialization in java like languagesSecuring class initialization in java like languages
Securing class initialization in java like languages
 
Secure encounter based mobile social networks requirements, designs, and trad...
Secure encounter based mobile social networks requirements, designs, and trad...Secure encounter based mobile social networks requirements, designs, and trad...
Secure encounter based mobile social networks requirements, designs, and trad...
 
Reversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionReversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryption
 
Privacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignmentPrivacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignment
 

Recently uploaded

Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 

Recently uploaded (20)

Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 

Local directional number pattern for face analysis face and expression recognition

  • 1. Local Directional Number Pattern for Face Analysis: Face and Expression Recognition ABSTRACT: This paper proposes a novel local feature descriptor, local directional number pattern (LDN), for face analysis, i.e., face and expression recognition. LDN encodes the directional information of the face’s textures (i.e., the texture’s structure) in a compact way, producing a more discriminative code than current methods. We compute the structure of each micro-pattern with the aid of a compass mask that extracts directional information, and we encode such information using the prominent direction indices (directional numbers) and sign—which allows us to distinguish among similar structural patterns that have different intensity transitions. We divide the face into several regions, and extract the distribution of the LDN features from them. Then, we concatenate these features into a feature vector, and we use it as a face descriptor. We perform several experiments in which our descriptor performs consistently under illumination, noise, expression, and time lapse variations. Moreover, we test our descriptor with different masks to analyze its performance in different face analysis tasks EXISTING SYSTEM: GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
  • 2. In the literature, there are many methods for the holistic class, such as, Eigenfaces and Fisherfaces, which are built on Principal Component Analysis (PCA); the more recent 2D PCA, and Linear Discriminant Analysis are also examples of holistic methods. Although these methods have been studied widely, local descriptors have gained attention because of their robustness to illumination and pose variations. Heiseleet al.showed the validity of the component-based methods, and how they outperform holistic methods. The local-feature methods compute the descriptor from parts of the face, and then gather the information into one descriptor. Among these methods are Local Features Analysis, Gabor features, Elastic Bunch Graph Matching, and Local Binary Pattern (LBP). The last one is an extension of the LBP feature that was originally designed for texture description, applied to face recognition. LBP achieved better performance than previous methods, thus it gained popularity, and was studied extensively. Newer methods tried to overcome the shortcomings of LBP, like Local Ternary Pattern (LTP), and Local Directional Pattern (LDiP). The last method encodes the directional information in the neighborhood, instead of the intensity. Also, Zhanget al. explored the use of higher order local derivatives (LDeP) to produce better results than LBP. Both methods use other information, instead of intensity, to overcome noise and illumination variation problems. However, these methods still suffer in non-monotonic illumination variation, random noise, and changes in pose, age, and expression conditions. Although some methods, like Gradientfaces, have a high discrimination power under illumination variation, they still have low recognition capabilities for expression and age variation conditions. However, some methods explored different features, such as, infrared, near infrared, and phase information, to overcome the illumination problem while maintaining the performance under difficult conditions. DISADVANTAGES OF EXISTING SYSTEM:  Both methods use other information, instead of intensity, to overcome noise and illumination variation problems.  However, these methods still suffer in non-monotonic illumination variation, random noise, and changes in pose, age, and expression conditions.
  • 3.  Although some methods, like Gradientfaces, have a high discrimination power under illumination variation, they still have low recognition capabilities for expression and age variation conditions. PROPOSED SYSTEM: In this paper, we propose a face descriptor, Local Directional Number Pattern (LDN), for robust face recognition that encodes the structural information and the intensity variations of the face’s texture. LDN encodes the structure of a local neighborhood by analyzing its directional information. Consequently, we compute the edge responses in the neighborhood, in eight different directions with a compass mask. Then, from all the directions, we choose the top positive and negative directions to produce a meaningful descriptor for different textures with similar structural patterns. This approach allows us to distinguish intensity changes (e.g., from bright to dark and vice versa) in the texture. Furthermore, our descriptor uses the information of the entire neighborhood, instead of using sparse points for its computation like LBP. Hence, our approach conveys more information into the code, yet it is more compact—as it is six bit long. Moreover, we experiment with different masks and resolutions of the mask to acquire characteristics that may be neglected by just one, and combine them to extend the encoded information. We found that the inclusion of multiple encoding levels produces an improvement in the detection process. ADVANTAGES OF PROPOSED SYSTEM: 1) The coding scheme is based on directional numbers, instead of bit strings, which encodes the information of the neighborhood in a more efficient way 2) The implicit use of sign information, in comparison with previous directional and derivative methods we encode more information in less space, and, at the same time, discriminate more textures; and 3) The use of gradient information makes the method robust against illumination changes and noise.
  • 4. SYSTEM CONFIGURATION:- HARDWARE REQUIREMENTS:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA SOFTWARE REQUIREMENTS: • Operating system : - Windows XP. • Coding Language : C#.Net REFERENCE: Adin Ramirez Rivera,Student Member, IEEE,Jorge Rojas Castillo,Student Member, IEEE, and Oksam Chae,Member, IEEE ―Local Directional Number Pattern for Face Analysis: Face and Expression Recognition‖- IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 22, NO. 5, MAY 2013.
  • 5.