The biometrics are used to identify a person effectively. In this paper, we propose optimised Face
recognition system based on log transformation and combination of face image features vectors. The face
images are preprocessed using Gaussian filter to enhance the quality of an image. The log transformation
is applied on enhanced image to generate features. The feature vectors of many images of a single person
image are converted into single vector using average arithmetic addition. The Euclidian distance(ED) is
used to compare test image feature vector with database feature vectors to identify a person. It is
experimented that, the performance of proposed algorithm is better compared to existing algorithms.
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...sipij
The physiological biometric trait face images are used to identify a person effectively. In this paper, we
propose compression based face recognition using transform domain features fused at matching level. The
2D images are converted into 1-D vectors using mean to compress number of pixels. The Fast Fourier
Transform (FFT) and Discrete Wavelet Transform (DWT) are used to extract features. The low and high
frequency coefficients of DWT are concatenated to obtained final DWT features. The performance
parameters are computed by comparing database and test image features of FFT and DWT using Euclidian
Distance (ED). The performance parameters of FFT and DWT are fused at matching level to obtain better
results. It is observed that the performance of proposed method is better than the existing methods.
MULTI SCALE ICA BASED IRIS RECOGNITION USING BSIF AND HOG sipij
Iris is a physiological biometric trait, which is unique among all biometric traits to recognize person
effectively. In this paper we propose Multi-scale Independent Component Analysis (ICA) based Iris
Recognition using Binarized Statistical Image Features (BSIF) and Histogram of Gradient orientation
(HOG). The Left and Right portion is extracted from eye images of CASIA V 1.0 database leaving top and
bottom portion of iris. The multi-scale ICA filter sizes of 5X5, 7X7 and 17X17 are used to correlate with
iris template to obtain BSIF. The HOGs are applied on BSIFs to extract initial features. The final feature is
obtained by fusing three HOGs. The Euclidian Distance is used to compare the final feature of database
image with test image final features to compute performance parameters. It is observed that the
performance of the proposed method is better compared to existing methods.
IRDO: Iris Recognition by fusion of DTCWT and OLBPIJERA Editor
Iris Biometric is a physiological trait of human beings. In this paper, we propose Iris an Recognition using
Fusion of Dual Tree Complex Wavelet Transform (DTCWT) and Over Lapping Local Binary Pattern (OLBP)
Features. An eye is preprocessed to extract the iris part and obtain the Region of Interest (ROI) area from an iris.
The complex wavelet features are extracted for region from the Iris DTCWT. OLBP is further applied on ROI to
generate features of magnitude coefficients. The resultant features are generated by fusing DTCWT and OLBP
using arithmetic addition. The Euclidean Distance (ED) is used to compare test iris with database iris features to
identify a person. It is observed that the values of Total Success Rate (TSR) and Equal Error Rate (EER) are
better in the case of proposed IRDO compared to the state-of-the art techniques.
MultiModal Identification System in Monozygotic TwinsCSCJournals
With the increase in the number of twin births in recent decades, there is a need to develop alternate approaches that can secure the biometric system. In this paper an effective fusion scheme is presented that combines information presented by multiple domain experts based on the rank-level fusion integration method. The developed multimodal biometric system possesses a number of unique qualities, starting from utilizing Fisher’s Linear Discriminant methods for face matching, Principal Component Analysis for fingerprint matching and Local binary pattern features for iris matching and fused the information for effective recognition and authentication The importance of considering these boundary conditions, such as twins, where the possibility of errors is maximum will lead us to design a more reliable and robust security system.The proposed approach is tested on a real database consisting of 50 pair of identical twin images and shows promising results compared to other techniques. The Receiver Operating Characteristics also shows that the proposed method is superior compared to other techniques under study.
Novel Approach to Use HU Moments with Image Processing Techniques for Real Ti...CSCJournals
Sign language is the fundamental communication method among people who suffer from speech and hearing defects. The rest of the world doesn’t have a clear idea of sign language. “Sign Language Communicator” (SLC) is designed to solve the language barrier between the sign language users and the rest of the world. The main objective of this research is to provide a low cost affordable method of sign language interpretation. This system will also be very useful to the sign language learners as they can practice the sign language. During the research available human computer interaction techniques in posture recognition was tested and evaluated. A series of image processing techniques with Hu-moment classification was identified as the best approach. To improve the accuracy of the system, a new approach; height to width ratio filtration was implemented along with Hu-moments. System is able to recognize selected Sign Language signs with the accuracy of 84% without a controlled background with small light adjustments.
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...sipij
The physiological biometric trait face images are used to identify a person effectively. In this paper, we
propose compression based face recognition using transform domain features fused at matching level. The
2D images are converted into 1-D vectors using mean to compress number of pixels. The Fast Fourier
Transform (FFT) and Discrete Wavelet Transform (DWT) are used to extract features. The low and high
frequency coefficients of DWT are concatenated to obtained final DWT features. The performance
parameters are computed by comparing database and test image features of FFT and DWT using Euclidian
Distance (ED). The performance parameters of FFT and DWT are fused at matching level to obtain better
results. It is observed that the performance of proposed method is better than the existing methods.
MULTI SCALE ICA BASED IRIS RECOGNITION USING BSIF AND HOG sipij
Iris is a physiological biometric trait, which is unique among all biometric traits to recognize person
effectively. In this paper we propose Multi-scale Independent Component Analysis (ICA) based Iris
Recognition using Binarized Statistical Image Features (BSIF) and Histogram of Gradient orientation
(HOG). The Left and Right portion is extracted from eye images of CASIA V 1.0 database leaving top and
bottom portion of iris. The multi-scale ICA filter sizes of 5X5, 7X7 and 17X17 are used to correlate with
iris template to obtain BSIF. The HOGs are applied on BSIFs to extract initial features. The final feature is
obtained by fusing three HOGs. The Euclidian Distance is used to compare the final feature of database
image with test image final features to compute performance parameters. It is observed that the
performance of the proposed method is better compared to existing methods.
IRDO: Iris Recognition by fusion of DTCWT and OLBPIJERA Editor
Iris Biometric is a physiological trait of human beings. In this paper, we propose Iris an Recognition using
Fusion of Dual Tree Complex Wavelet Transform (DTCWT) and Over Lapping Local Binary Pattern (OLBP)
Features. An eye is preprocessed to extract the iris part and obtain the Region of Interest (ROI) area from an iris.
The complex wavelet features are extracted for region from the Iris DTCWT. OLBP is further applied on ROI to
generate features of magnitude coefficients. The resultant features are generated by fusing DTCWT and OLBP
using arithmetic addition. The Euclidean Distance (ED) is used to compare test iris with database iris features to
identify a person. It is observed that the values of Total Success Rate (TSR) and Equal Error Rate (EER) are
better in the case of proposed IRDO compared to the state-of-the art techniques.
MultiModal Identification System in Monozygotic TwinsCSCJournals
With the increase in the number of twin births in recent decades, there is a need to develop alternate approaches that can secure the biometric system. In this paper an effective fusion scheme is presented that combines information presented by multiple domain experts based on the rank-level fusion integration method. The developed multimodal biometric system possesses a number of unique qualities, starting from utilizing Fisher’s Linear Discriminant methods for face matching, Principal Component Analysis for fingerprint matching and Local binary pattern features for iris matching and fused the information for effective recognition and authentication The importance of considering these boundary conditions, such as twins, where the possibility of errors is maximum will lead us to design a more reliable and robust security system.The proposed approach is tested on a real database consisting of 50 pair of identical twin images and shows promising results compared to other techniques. The Receiver Operating Characteristics also shows that the proposed method is superior compared to other techniques under study.
Novel Approach to Use HU Moments with Image Processing Techniques for Real Ti...CSCJournals
Sign language is the fundamental communication method among people who suffer from speech and hearing defects. The rest of the world doesn’t have a clear idea of sign language. “Sign Language Communicator” (SLC) is designed to solve the language barrier between the sign language users and the rest of the world. The main objective of this research is to provide a low cost affordable method of sign language interpretation. This system will also be very useful to the sign language learners as they can practice the sign language. During the research available human computer interaction techniques in posture recognition was tested and evaluated. A series of image processing techniques with Hu-moment classification was identified as the best approach. To improve the accuracy of the system, a new approach; height to width ratio filtration was implemented along with Hu-moments. System is able to recognize selected Sign Language signs with the accuracy of 84% without a controlled background with small light adjustments.
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...AM Publications
Biometric authentication scheme used for person identification. Biometric authentication scheme consists of
uniqueness for identifying human using physiological and behavioral characteristics. So this technique is used for
criminal identification and this technique is used in civil service areas. In order to provide security to the data (2, 2)
secret sharing scheme. Basically iris recognition is the most secured scheme. Visual cryptography is the techniques
that divide the secret into shares.
Region based elimination of noise pixels towards optimized classifier models ...IJERA Editor
The extraction of the skin pixels in a human image and rejection of non-skin pixels is called the skin segmentation. Skin pixel detection is the process of extracting the skin pixels in a human image which is typically used as a pre-processing step to extract the face regions from human image. In past, there are several computer vision approaches and techniques have been developed for skin pixel detection. In the process of skin detection, given pixels are been transformed into an appropriate color space such as RGB, HSV etc. And then skin classifier model have been applied to label the pixel into skin or non-skin regions. Here in this research a “Region based elimination of noise pixels and performance analysis of classifier models for skin pixel detection applied on human images” would be performed which involve the process of image representation in color models, elimination of non-skin pixels in the image, and then pre-processing and cleansing of the collected data, feature selection of the human image and then building the model for classifier. In this research and implementation of skin pixels classifier models are proposed with their comparative performance analysis. The definition of the feature vector is simply the selection of skin pixels from the human image or stack of human images. The performance is evaluated by comparing and analysing skin colour segmentation algorithms. During the course of research implementation, efforts are iterative which help in selection of optimized skin classifier based on the machine learning algorithms and their performance analysis.
Transform Domain Based Iris Recognition using EMD and FFTIOSRJVSP
Iris is one of the physiological trait which is used to identify the individuals. In this paper Transform Domain Based Iris Recognition using EMD and FFT is proposed. Circular Hough Transform is used in the Preprocessing stage to extract circular part of eye. The circular iris part is converted into rectangular rubber sheet model in Region of Interest (ROI).Empirical Mode Functions (EMF)’s are obtained by applying Empirical Mode Decomposition (EMD) on the Iris. FFT is also applied on ROI to extract the features. These features are added arithmetically to obtain final features. The features of the database are compared with test iris using Euclidian Distance(ED) to compute performance parameters. It is observed that the values of CRR and EER are better in the case of propsed algorithm compared to existing algorithms.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
An Efficient Face Recognition Using Multi-Kernel Based Scale Invariant Featur...CSCJournals
Face recognition has gained significant attention in research community due to its wide range of commercial and law enforcement applications. Due to the developments in the past few decades, in the current scenario, face recognition is employing advanced feature identification techniques and matching methods. In spite of vast research done, face recognition still remains an open problem due to the challenges posed by illumination, occlusions, pose variation, scaling, etc. This paper is aimed at proposing a face recognition technique with high accuracy. It focuses on face recognition based on improved SIFT algorithm. In the proposed approach, the face features are extracted using a novel multi-kernel function (MKF) based SIFT technique. The classification is done using SVM classifier. Experimental results shows the superiority of the proposed algorithm over the SIFT technique. Evaluation of the proposed approach is done on CVL face database and experimental results shows that the proposed approach has a recognition rate of 99%.
The Biometric Algorithm based on Fusion of DWT Frequency Components of Enhanc...CSCJournals
The biometrics are used to authenticate a person effectively compared to conventional methods of identification. In this paper we propose the biometric algorithm based on fusion of Discrete Wavelet Transform(DWT) frequency components of enhanced iris image.The iris template is extracted from an eye image by considering horizontal pixels in an iris part.The iris template contrast is enhanced using Adaptive Histogram Equalization (AHE) and Histogram Equalization (HE).The DWT is applied on enhanced iris template.The features are formed by straight line fusion of low and high frequency coefficients of DWT.The Euclidian distance is used to compare final test features with database features. It is observed that the performance parameters are better in the case of proposed algorithm compared to existing algorithms.
A Hybrid Approach to Face Detection And Feature Extractioniosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Statistical Models for Face Recognition System With Different Distance MeasuresCSCJournals
Face recognition is one of the challenging applications of image processing. Robust face recognition algorithm should posses the ability to recognize identity despite many variations in pose, lighting and appearance. Principle Component Analysis (PCA) method has a wide application in the field of image processing for dimension reduction of the data. But these algorithms have certain limitations like poor discriminatory power and ability to handle large computational load. This paper proposes a face recognition techniques based on PCA with Gabor wavelets in the preprocessing stage and statistical modeling methods like LDA and ICA for feature extraction. The classification for the proposed system is done using various distance measure methods like Euclidean Distance(ED), Cosine Distance (CD), Mahalanobis Distance (MHD) methods and the recognition rate were compared for different distance measures. The proposed method has been successfully tested on ORL face data base with 400 frontal images corresponding to 40 different subjects which are acquired under variable illumination and facial expressions. It is observed from the results that use of PCA with Gabor filters and features extracted through ICA method gives a recognition rate of about 98% when classified using Mahalanobis distance classifier. This recognition rate stands better than the conventional PCA and PCA + LDA methods employing other and classifier techniques.
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Multi Local Feature Selection Using Genetic Algorithm For Face IdentificationCSCJournals
Face recognition is a biometric authentication method that has become more significant and relevant in recent years. It is becoming a more mature technology that has been employed in many large scale systems such as Visa Information System, surveillance access control and multimedia search engine. Generally, there are three categories of approaches for recognition, namely global facial feature, local facial feature and hybrid feature. Although the global facial-based feature approach is the most researched area, this approach is still plagued with many difficulties and drawbacks due to factors such as face orientation, illumination, and the presence of foreign objects. This paper presents an improved offline face recognition algorithm based on a multi-local feature selection approach for grayscale images. The approach taken in this work consists of five stages, namely face detection, facial feature (eyes, nose and mouth) extraction, moment generation, facial feature classification and face identification. Subsequently, these stages were applied to 3065 images from three distinct facial databases, namely ORL, Yale and AR. The experimental results obtained have shown that recognition rates of more than 89% have been achieved as compared to other global-based features and local facial-based feature approaches. The results also revealed that the technique is robust and invariant to translation, orientation, and scaling.
Face Recognition for Human Identification using BRISK Feature and Normal Dist...ijtsrd
Face recognition is a kind of automatic human identification from face images has been performed widely research in image processing and machine learning. Face image, facial information of the person is presented and unique information for each person even two person possessed the same face. We propose a methodology for automatic human classification based on Binary Robust Invariant Scalable Keypoints BRISK feature of face images and the normal distribution model. In our proposed methodology, the normal distribution model is used to represent the statistical information of face image as a global feature. The human name is the output of the system according to the input face image. Our proposed feature is applied with Artificial Neural Networks to recognize face for human identification. The proposed feature is extracted from the face image of the Extended Yale Face Database B to perform human identification and highlight the properties of the proposed feature. Khin Mar Thi "Face Recognition for Human Identification using BRISK Feature and Normal Distribution Model" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26589.pdfPaper URL: https://www.ijtsrd.com/computer-science/multimedia/26589/face-recognition-for-human-identification-using-brisk-feature-and-normal-distribution-model/khin-mar-thi
The paper addresses the automation of the task of an epigraphist in reading and deciphering inscriptions.
The automation steps include Pre-processing, Segmentation, Feature Extraction and Recognition. Preprocessing
involves, enhancement of degraded ancient document images which is achieved through Spatial
filtering methods, followed by binarization of the enhanced image. Segmentation is carried out using Drop
Fall and Water Reservoir approaches, to obtain sampled characters. Next Gabor and Zonal features are
extracted for the sampled characters, and stored as feature vectors for training. Artificial Neural Network
(ANN) is trained with these feature vectors and later used for classification of new test characters. Finally
the classified characters are mapped to characters of modern form. The system showed good results when
tested on the nearly 150 samples of ancient Kannada epigraphs from Ashoka and Hoysala periods. An
average Recognition accuracy of 80.2% for Ashoka period and 75.6% for Hoysala period is achieved.
A FLUXGATE SENSOR APPLICATION: COIN IDENTIFICATIONsipij
Today, coins are used to operate many electric devices that are open to the public service. Washing machines, play stations, computers, auto brooms, foam machines, beverage machines, telephone chargers, hair dryers and water heaters are some examples of these devices These devices include coin recognition systems. In these systems, there are coils at two different radius, which become electromagnets when the
current is passed through them. The AC current supplied to the coils creates a variable magnetic field, which induces the eddy current on the coil during the passing of money. The magnetic field generated by the Eddy current reduces the current passing through the coil. The amount of change of current in the coil gives information about the coin; the type of metal (element) and the amount of metal (element). In this
study, a new coin identification system (magnetic measurement system) is designed. In this system, the
magnetic anomaly generated by the coin as a result of applying direct current to the coils is tried to be
detected by fluxgate sensor. In this study, sensor voltages are acquired in computer environment by using
developed electronic unit and LabVIEW based software. In the paper, experimental results have been
discussed in detail.
Automatic meal inspection system using lbp hf feature for central kitchensipij
This paper proposes an intelligent and automatic meal inspection system which can be applied to the meal
inspection for the application of central kitchen automation. The diet specifically designed for the patients are required with providing personalized diet such as low sodium intake or some necessary food. Hence,
the proposed system can benefit the inspection process that is often performed manually. In the proposed
system, firstly, the meal box can be detected and located automatically with the vision-based method and
then all the food ingredients can be identified by using the color and LBP-HF texture features. Secondly,
the quantity for each of food ingredient is estimated by using the image depth information. The experimental results show that the meal inspection accuracy can approach 80%, meal inspection efficiency can reach1200ms, and the food quantity accuracy is about 90%. The proposed system is expected to increase the capacity of meal supply over 50% and be helpful to the dietician in the hospital for saving the time in the diet inspection process.
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...AM Publications
Biometric authentication scheme used for person identification. Biometric authentication scheme consists of
uniqueness for identifying human using physiological and behavioral characteristics. So this technique is used for
criminal identification and this technique is used in civil service areas. In order to provide security to the data (2, 2)
secret sharing scheme. Basically iris recognition is the most secured scheme. Visual cryptography is the techniques
that divide the secret into shares.
Region based elimination of noise pixels towards optimized classifier models ...IJERA Editor
The extraction of the skin pixels in a human image and rejection of non-skin pixels is called the skin segmentation. Skin pixel detection is the process of extracting the skin pixels in a human image which is typically used as a pre-processing step to extract the face regions from human image. In past, there are several computer vision approaches and techniques have been developed for skin pixel detection. In the process of skin detection, given pixels are been transformed into an appropriate color space such as RGB, HSV etc. And then skin classifier model have been applied to label the pixel into skin or non-skin regions. Here in this research a “Region based elimination of noise pixels and performance analysis of classifier models for skin pixel detection applied on human images” would be performed which involve the process of image representation in color models, elimination of non-skin pixels in the image, and then pre-processing and cleansing of the collected data, feature selection of the human image and then building the model for classifier. In this research and implementation of skin pixels classifier models are proposed with their comparative performance analysis. The definition of the feature vector is simply the selection of skin pixels from the human image or stack of human images. The performance is evaluated by comparing and analysing skin colour segmentation algorithms. During the course of research implementation, efforts are iterative which help in selection of optimized skin classifier based on the machine learning algorithms and their performance analysis.
Transform Domain Based Iris Recognition using EMD and FFTIOSRJVSP
Iris is one of the physiological trait which is used to identify the individuals. In this paper Transform Domain Based Iris Recognition using EMD and FFT is proposed. Circular Hough Transform is used in the Preprocessing stage to extract circular part of eye. The circular iris part is converted into rectangular rubber sheet model in Region of Interest (ROI).Empirical Mode Functions (EMF)’s are obtained by applying Empirical Mode Decomposition (EMD) on the Iris. FFT is also applied on ROI to extract the features. These features are added arithmetically to obtain final features. The features of the database are compared with test iris using Euclidian Distance(ED) to compute performance parameters. It is observed that the values of CRR and EER are better in the case of propsed algorithm compared to existing algorithms.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
An Efficient Face Recognition Using Multi-Kernel Based Scale Invariant Featur...CSCJournals
Face recognition has gained significant attention in research community due to its wide range of commercial and law enforcement applications. Due to the developments in the past few decades, in the current scenario, face recognition is employing advanced feature identification techniques and matching methods. In spite of vast research done, face recognition still remains an open problem due to the challenges posed by illumination, occlusions, pose variation, scaling, etc. This paper is aimed at proposing a face recognition technique with high accuracy. It focuses on face recognition based on improved SIFT algorithm. In the proposed approach, the face features are extracted using a novel multi-kernel function (MKF) based SIFT technique. The classification is done using SVM classifier. Experimental results shows the superiority of the proposed algorithm over the SIFT technique. Evaluation of the proposed approach is done on CVL face database and experimental results shows that the proposed approach has a recognition rate of 99%.
The Biometric Algorithm based on Fusion of DWT Frequency Components of Enhanc...CSCJournals
The biometrics are used to authenticate a person effectively compared to conventional methods of identification. In this paper we propose the biometric algorithm based on fusion of Discrete Wavelet Transform(DWT) frequency components of enhanced iris image.The iris template is extracted from an eye image by considering horizontal pixels in an iris part.The iris template contrast is enhanced using Adaptive Histogram Equalization (AHE) and Histogram Equalization (HE).The DWT is applied on enhanced iris template.The features are formed by straight line fusion of low and high frequency coefficients of DWT.The Euclidian distance is used to compare final test features with database features. It is observed that the performance parameters are better in the case of proposed algorithm compared to existing algorithms.
A Hybrid Approach to Face Detection And Feature Extractioniosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Statistical Models for Face Recognition System With Different Distance MeasuresCSCJournals
Face recognition is one of the challenging applications of image processing. Robust face recognition algorithm should posses the ability to recognize identity despite many variations in pose, lighting and appearance. Principle Component Analysis (PCA) method has a wide application in the field of image processing for dimension reduction of the data. But these algorithms have certain limitations like poor discriminatory power and ability to handle large computational load. This paper proposes a face recognition techniques based on PCA with Gabor wavelets in the preprocessing stage and statistical modeling methods like LDA and ICA for feature extraction. The classification for the proposed system is done using various distance measure methods like Euclidean Distance(ED), Cosine Distance (CD), Mahalanobis Distance (MHD) methods and the recognition rate were compared for different distance measures. The proposed method has been successfully tested on ORL face data base with 400 frontal images corresponding to 40 different subjects which are acquired under variable illumination and facial expressions. It is observed from the results that use of PCA with Gabor filters and features extracted through ICA method gives a recognition rate of about 98% when classified using Mahalanobis distance classifier. This recognition rate stands better than the conventional PCA and PCA + LDA methods employing other and classifier techniques.
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Multi Local Feature Selection Using Genetic Algorithm For Face IdentificationCSCJournals
Face recognition is a biometric authentication method that has become more significant and relevant in recent years. It is becoming a more mature technology that has been employed in many large scale systems such as Visa Information System, surveillance access control and multimedia search engine. Generally, there are three categories of approaches for recognition, namely global facial feature, local facial feature and hybrid feature. Although the global facial-based feature approach is the most researched area, this approach is still plagued with many difficulties and drawbacks due to factors such as face orientation, illumination, and the presence of foreign objects. This paper presents an improved offline face recognition algorithm based on a multi-local feature selection approach for grayscale images. The approach taken in this work consists of five stages, namely face detection, facial feature (eyes, nose and mouth) extraction, moment generation, facial feature classification and face identification. Subsequently, these stages were applied to 3065 images from three distinct facial databases, namely ORL, Yale and AR. The experimental results obtained have shown that recognition rates of more than 89% have been achieved as compared to other global-based features and local facial-based feature approaches. The results also revealed that the technique is robust and invariant to translation, orientation, and scaling.
Face Recognition for Human Identification using BRISK Feature and Normal Dist...ijtsrd
Face recognition is a kind of automatic human identification from face images has been performed widely research in image processing and machine learning. Face image, facial information of the person is presented and unique information for each person even two person possessed the same face. We propose a methodology for automatic human classification based on Binary Robust Invariant Scalable Keypoints BRISK feature of face images and the normal distribution model. In our proposed methodology, the normal distribution model is used to represent the statistical information of face image as a global feature. The human name is the output of the system according to the input face image. Our proposed feature is applied with Artificial Neural Networks to recognize face for human identification. The proposed feature is extracted from the face image of the Extended Yale Face Database B to perform human identification and highlight the properties of the proposed feature. Khin Mar Thi "Face Recognition for Human Identification using BRISK Feature and Normal Distribution Model" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26589.pdfPaper URL: https://www.ijtsrd.com/computer-science/multimedia/26589/face-recognition-for-human-identification-using-brisk-feature-and-normal-distribution-model/khin-mar-thi
The paper addresses the automation of the task of an epigraphist in reading and deciphering inscriptions.
The automation steps include Pre-processing, Segmentation, Feature Extraction and Recognition. Preprocessing
involves, enhancement of degraded ancient document images which is achieved through Spatial
filtering methods, followed by binarization of the enhanced image. Segmentation is carried out using Drop
Fall and Water Reservoir approaches, to obtain sampled characters. Next Gabor and Zonal features are
extracted for the sampled characters, and stored as feature vectors for training. Artificial Neural Network
(ANN) is trained with these feature vectors and later used for classification of new test characters. Finally
the classified characters are mapped to characters of modern form. The system showed good results when
tested on the nearly 150 samples of ancient Kannada epigraphs from Ashoka and Hoysala periods. An
average Recognition accuracy of 80.2% for Ashoka period and 75.6% for Hoysala period is achieved.
A FLUXGATE SENSOR APPLICATION: COIN IDENTIFICATIONsipij
Today, coins are used to operate many electric devices that are open to the public service. Washing machines, play stations, computers, auto brooms, foam machines, beverage machines, telephone chargers, hair dryers and water heaters are some examples of these devices These devices include coin recognition systems. In these systems, there are coils at two different radius, which become electromagnets when the
current is passed through them. The AC current supplied to the coils creates a variable magnetic field, which induces the eddy current on the coil during the passing of money. The magnetic field generated by the Eddy current reduces the current passing through the coil. The amount of change of current in the coil gives information about the coin; the type of metal (element) and the amount of metal (element). In this
study, a new coin identification system (magnetic measurement system) is designed. In this system, the
magnetic anomaly generated by the coin as a result of applying direct current to the coils is tried to be
detected by fluxgate sensor. In this study, sensor voltages are acquired in computer environment by using
developed electronic unit and LabVIEW based software. In the paper, experimental results have been
discussed in detail.
Automatic meal inspection system using lbp hf feature for central kitchensipij
This paper proposes an intelligent and automatic meal inspection system which can be applied to the meal
inspection for the application of central kitchen automation. The diet specifically designed for the patients are required with providing personalized diet such as low sodium intake or some necessary food. Hence,
the proposed system can benefit the inspection process that is often performed manually. In the proposed
system, firstly, the meal box can be detected and located automatically with the vision-based method and
then all the food ingredients can be identified by using the color and LBP-HF texture features. Secondly,
the quantity for each of food ingredient is estimated by using the image depth information. The experimental results show that the meal inspection accuracy can approach 80%, meal inspection efficiency can reach1200ms, and the food quantity accuracy is about 90%. The proposed system is expected to increase the capacity of meal supply over 50% and be helpful to the dietician in the hospital for saving the time in the diet inspection process.
MULTIPLE OBJECTS TRACKING IN SURVEILLANCE VIDEO USING COLOR AND HU MOMENTSsipij
Multiple objects tracking finds its applications in many high level vision analysis like object behaviour
interpretation and gait recognition. In this paper, a feature based method to track the multiple moving
objects in surveillance video sequence is proposed. Object tracking is done by extracting the color and Hu
moments features from the motion segmented object blob and establishing the association of objects in the
successive frames of the video sequence based on Chi-Square dissimilarity measure and nearest neighbor
classifier. The benchmark IEEE PETS and IEEE Change Detection datasets has been used to show the
robustness of the proposed method. The proposed method is assessed quantitatively using the precision and
recall accuracy metrics. Further, comparative evaluation with related works has been carried out to exhibit
the efficacy of the proposed method.
Ultrasound images and SAR i.e. synthetic aperture radar images are usually corrupted because of speckle
noise also called as granular noise. It is quite a tedious task to remove such noise and analyze those
corrupted images. Till now many researchers worked to remove speckle noise using frequency domain
methods, temporal methods, and adaptive methods. Different filters have been developed as Mean and
Median filters, Statistic Lee filter, Statistic Kuan filter, Frost filter, Srad filter. This paper reviews filters
used to remove speckle noise.
An Innovative Moving Object Detection and Tracking System by Using Modified R...sipij
The ultimate goal of this study is to afford enhanced video object detection and tracking by eliminating the
limitations which are existing nowadays. Although high performance ratio for video object detection and
tracking is achieved in the earlier work it takes more time for computation. Consequently we are in need to
propose a novel video object detection and tracking technique so as to minimize the computational
complexity. Our proposed technique covers five stages they are preprocessing, segmentation, feature
extraction, background subtraction and hole filling. Originally the video clip in the database is split into
frames. Then preprocessing is performed so as to get rid of noise, an adaptive median filter is used in this
stage to eliminate the noise. The preprocessed image then undergoes segmentation by means of modified
region growing algorithm. The segmented image is subjected to feature extraction phase so as to extract
the multi features from the segmented image and the background image, the feature value thus obtained
are compared so as to attain optimal value, consequently a foreground image is attained in this stage. The
foreground image is then subjected to morphological operations of erosion and dilation so as to fill the
holes and to get the object accurately as these foreground image contains holes and discontinuities. Thus
the moving object is tracked in this stage. This method will be employed in MATLAB platform and the
outcomes will be studied and compared with the existing techniques so as to reveal the performance of the
novel video object detection and tracking technique.
A BINARY TO RESIDUE CONVERSION USING NEW PROPOSED NON-COPRIME MODULI SETsipij
Residue Number System is generally supposed to use co-prime moduli set. Non-coprime moduli sets are a
field in RNS which is little studied. That's why this work was devoted to them. The resources that discuss
non-coprime in RNS are very limited. For the previous reasons, this paper analyses the RNS conversion
using suggested non-coprime moduli set.
This paper suggests a new non-coprime moduli set and investigates its performance. The suggested new
moduli set has the general representation as {2n
–2, 2n
, 2n+2}, where n ∈ {2,3,…..,∞}. The calculations
among the moduli are done with this n value. These moduli are 2 spaces apart on the numbers line from
each other. This range helps in the algorithm’s calculations as to be shown.
The proposed non-coprime moduli set is investigated. Conversion algorithm from Binary to Residue is
developed. Correctness of the algorithm was obtained through simulation program. Conversion algorithm
is implemented.
DESIGN REALIZATION AND PERFORMANCE EVALUATION OF AN ACOUSTIC ECHO CANCELLATIO...sipij
Nowadays, in the field of communications, AEC (acoustic echo cancellation) is truly essential with respect
to the quality of multimedia transmission. In this paper, we designed and developed an efficient AEC based
on adaptive filters to improve quality of service in telecommunications against the phenomena of acoustic
echo, which is indeed a problem in hands-free communications.The main advantage of the proposed algorithm is its capacity of tracking non-stationary signals such as acoustic echo. In this work the acoustic echo cancellation (AEC) is modeled using a digital signal
processing technique especially Simulink Blocksets. The algorithm’s code is generated in Matlab Simulink
programming environment. At simulation level, results of simulink implementation prove that module
behavior is realistic when it comes to cancellation of echo in hands free communication using adaptive algorithm.Results obtained with our algorithm in terms of ERLE criteria are confronted to IUT-T recommendation
G.168.
Efficient pu mode decision and motion estimation for h.264 avc to hevc transc...sipij
H.264/AVC has been widely applied to various applications. However, a new video compression standard,
High Efficient Video Coding (HEVC), had been finalized in 2013. In this work, a fast transcoder from
H.264/AVC to HEVC is proposed. The proposed algorithm includes the fast prediction unit (PU) decision
and the fast motion estimation. With the strong relation between H.264/AVC and HEVC, the modes,
residuals, and variance of motion vectors (MVs) extracted from H.264/AVC can be reused to predict the
current encoding PU of HEVC. Furthermore, the MVs from H.264/AVC are used to decide the search
range of PU during motion estimation. Simulation results show that the proposed algorithm can save up to
53% of the encoding time and maintains the rate-distortion (R-D) performance for HEVC.
Stem calyx recognition of an apple using shape descriptorssipij
This paper presents a novel method to recognize stem - calyx of an apple using shape descriptors. The main
drawback of existing apple grading techniques is that stem - calyx part of an apple is treated as defects,
this leads to poor grading of apples. In order to overcome this drawback, we proposed an approach to
recognize stem-calyx and differentiated from true defects based on shape features. Our method comprises
of steps such as segmentation of apple using grow-cut method, candidate objects such as stem-calyx and
small defects are detected using multi-threshold segmentation. The shape features are extracted from
detected objects using Multifractal, Fourier and Radon descriptor and finally stem-calyx regions are
recognized and differentiated from true defects using SVM classifier. The proposed algorithm is evaluated
using experiments conducted on apple image dataset and results exhibit considerable improvement in
recognition of stem-calyx region compared to other techniques.
A Hybrid Architecture for Tracking People in Real-Time Using a Video Surveill...sipij
This paper describes a novel method for tracking customers using images taken from video-surveillance
cameras. This system analyzes the number of customers and their motions through the aisles of big-box
stores (supermarkets) in real-time. The originality of our approach is based on the study of the blobs
properties for managing the splitting/merging issues using a mathematical morphology operator. In the
order hand, in order to manage a high number of customers in real-time, we combine the advantage of two
tracking algorithms.
A R EVIEW P APER : N OISE M ODELS IN D IGITAL I MAGE P ROCESSINGsipij
Noise is always presents in digital images during
image acquisition, coding, transmission, and proces
sing
steps. Noise is very difficult to remove it from t
he digital images without the prior knowledge of no
ise
model. That is why, review of noise models are esse
ntial in the study of image denoising techniques. I
n this
paper, we express a brief overview of various noise
models. These noise models can be selected by anal
ysis
of their origin. In this way, we present a complete
and quantitative analysis of noise models availabl
e in
digital images.
TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...sipij
We consider the problem of localizing a target taking the help of a set of anchor beacon nodes. A small
number of beacon nodes are deployed at known locations in the area. The target can detect a beacon
provided it happens to lie within the beacon’s transmission range. Thus, the target obtains a measurement
vector containing the readings of the beacons: ‘1’ corresponding to a beacon if it is able to detect the
target, and ‘0’ if the beacon is not able to detect the target. The goal is twofold: to determine the location
of the target based on the binary measurement vector at the target; and to study the behaviour of the
localization uncertainty as a function of the beacon transmission range (sensing radius) and the number of
beacons deployed. Beacon transmission range means signal strength of the beacon to transmit and receive
the signals which is called as Received Signal Strength (RSS). To localize the target, we propose a gridmapping
based approach, where the readings corresponding to locations on a grid overlaid on the region
of interest are used to localize the target. To study the behaviour of the localization uncertainty as a
function of the sensing radius and number of beacons, extensive simulations and numerical experiments
are carried out. The results provide insights into the importance of optimally setting the sensing radius and
the improvement obtainable with increasing number of beacons.
AN MINIMUM RECONFIGURATION PROBABILITY ROUTING ALGORITHM FOR RWA IN ALL-OPTIC...sipij
In this paper, we present a detailed study of Minimum Reconfiguration Probability Routing (MRPR) algorithm, and its performance evaluation in comparison with Adaptive unconstrained routing (AUR) and Least Loaded routing (LLR) algorithms. We have minimized the effects of failures on link and router failure in the network under changing load conditions, we assess the probability of service and number of light path failures due to link or route failure on Wavelength Interchange(WI) network. The computation complexity is reduced by using Kalman Filter(KF) techniques. The minimum reconfiguration probability
routing (MRPR) algorithm selects most reliable routes and assign wavelengths to connections in a manner that utilizes the light path(LP) established efficiently considering all possible requests.
Objective Quality Assessment of Image Enhancement Methods in Digital Mammogra...sipij
Breast cancer is the most common cancer among women worldwide constituting more than 25%
of all cancer incidences occurring in the world [1]. Statistics show that US, India and China
account for more than one third of all breast cancer cases [2]. Also, there has been a steady
increase in the breast cancer incidence among young generation in the world. In India, one out of
two women die after being detected with breast cancer where as in China it is one in four and in
USA it is one in eight [2]. Therefore, the statistics show that cancer mortality is highest in India
among all other nations in the world. In US, though the number of women diagnosed with cancer
is more than that in India, their mortality
FUZZY CLUSTERING BASED GLAUCOMA DETECTION USING THE CDR sipij
Glaucoma is a serious eye disease, overtime it will result in gradual blindness. Early detection of thedisease will help prevent against developing a more serious condition. A vertical cup-to-disc ratio which isthe ratio of the vertical diameter of the optic cup to that of the optic disc, of the fundus eye image is an important clinical indicator for glaucoma diagnosis. This paper presents an automated method for the extraction of optic disc and optic cup using Fuzzy C Means clustering technique combined with
thresholding. Using the extracted optic disc and optic cup the vertical cup-to-disc ratio was calculated.
The validity of this new method has been tested on 365 colour fundus images from two different publicly
available databases DRION, DIARATDB0 and images from an ophthalmologist. The result of the method
seems to be promising and useful for clinical work.
INHIBITION AND SET-SHIFTING TASKS IN CENTRAL EXECUTIVE FUNCTION OF WORKING ME...sipij
Understanding of neuro-dynamics of a complex higher cognitive process, Working Memory (WM) is
challenging. In WM, information processing occurs through four subsystems: phonological loop, visual
sketch pad, memory buffer and central executive function (CEF). CEF plays a principal role in WM. In this
study, our objective was to understand the neurospatial correlates of CEF during inhibition and set-shifting
processes. Thirty healthy educated subjects were selected. Event-Related Potential (ERP) related to visual
inhibition and set-shifting task was collected using 32 channel EEG system. Activation of those ERPs
components was analyzed using amplitudes of positive and negative peaks. Experiment was controlled
using certain parametric constraints to judge behavior, based on average responses in order to establish
relationship between ERP and local area of brain activation and represented using standardized low
resolution brain electromagnetic tomography. The average score of correct responses was higher for
inhibition task (87.5%) as compared to set-shifting task (59.5%). The peak amplitude of neuronal activity
for inhibition task was lower compared to set-shifting task in fronto-parieto-central regions. Hence this
proposed paradigm and technique can be used to measure inhibition and set-shifting neuronal processes in
understanding pathological central executive functioning in patients with neuro-psychiatric disorders.
DETERMINATION OF BURIED MAGNETIC MATERIAL’S GEOMETRIC DIMENSIONSsipij
It is important to find buried magnetic material’s geometric features that are parallel to the soil surface in
order to determine anti-tank and anti-personnel mine compatible to standards. So that it is possible to
decrease the number of false alarms by separating the samples that have got non-standard geometries. For
this purpose, in this study the anomalies occurred at horizontal component of the earth’s magnetic field by
buried samples are determined with magnetic sensor. In the study, KMZ51 AMR is used as the magnetic
sensor. The position-controlled movement of the sensor along x-y axis is provided with 2D scanning system.
Trigger values of sensor output are evaluated with respect to the scanning field. The experiments are
redone for the samples at different geometries and variables are defined for geometric analysis. The
experimental conclusions obtained from this paper will be discussed in detail.
Hybrid Domain based Face Recognition using DWT, FFT and Compressed CLBPCSCJournals
The characteristics of human body parts and behaviour are measured with biometrics, which are used to authenticate a person. In this paper, we propose Hybrid Domain based Face Recognition using DWT, FFT and Compressed CLBP. The face images are preprocessed to enhance sharpness of images using Discrete Wavelet Transform (DWT) and Laplacian filter. The Compound Local Binary Pattern (CLBP) is applied on sharpened preprocessed face image to compute magnitude and sign components. The histogram is applied on CLBP components to compress number of features. The Fast Fourier Transformation (FFT) is applied on preprocessed image and compute magnitudes. The histogram features and FFT magnitude features are fused to generate final feature. The Euclidian Distance (ED) is used to compare final features of test face images with data base face images to compute performance parameters. It is observed that the percentage recognition rate is high in the case of proposed algorithm compared to existing algorithms.
HVDLP : HORIZONTAL VERTICAL DIAGONAL LOCAL PATTERN BASED FACE RECOGNITION sipij
Face image is an efficient biometric trait to recognize human beings without expecting any co-operation from a person. In this paper, we propose HVDLP: Horizontal Vertical Diagonal Local Pattern based face recognition using Discrete Wavelet Transform (DWT) and Local Binary Pattern (LBP). The face images of different sizes are converted into uniform size of 108×990and color images are converted to gray scale images in pre-processing. The Discrete Wavelet Transform (DWT) is applied on pre-processed images and LL band is obtained with the size of 54×45. The Novel concept of HVDLP is introduced in the proposed method to enhance the performance. The HVDLP is applied on 9×9 sub matrix of LL band to consider HVDLP coefficients. The local Binary Pattern (LBP) is applied on HVDLP of LL band. The final features are generated by using Guided filters on HVDLP and LBP matrices. The Euclidean Distance (ED) is used to compare final features of face database and test images to compute the performance parameters.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters IJERA Editor
The Biometrics is used to recognize a person effectively compared to traditional methods of identification. In this paper, we propose a Face recognition based on Single Tree Wavelet Transform (STWT) and Dual Tree Complex Wavelet transform (DTCWT). The Face Images are preprocessed to enhance quality of the image and resize. DTCWT and STWT are applied on face images to extract features. The Euclidian distance is used to compare features of database image with test face images to compute performance parameters. The performance of STWT is compared with DTCWT. It is observed that the DTCWT gives better results compared to STWT technique.
Happiness Expression Recognition at Different Age ConditionsEditor IJMTER
Recognition of different internal emotions of human face under various critical
conditions is a difficult task. Facial expression recognition with different age variations is
considered in this study. This paper emphasizes on recognition of facial expression like
happiness mood of nine persons using subspace methods. This paper mainly focuses on new
robust subspace method which is based on Proposed Euclidean Distance Score Level Fusion
(PEDSLF) using PCA, ICA, SVD methods. All these methods and new robust method is
tested with FGNET database. An automatic recognition of facial expressions is being carried
out. Comparative analysis results surpluses PEDSLF method is more accurate for happiness
emotional facial expression recognition.
Technique for recognizing faces using a hybrid of moments and a local binary...IJECEIAES
The face recognition process is widely studied, and the researchers made great achievements, but there are still many challenges facing the applications of face detection and recognition systems. This research contributes to overcoming some of those challenges and reducing the gap in the previous systems for identifying and recognizing faces of individuals in images. The research deals with increasing the precision of recognition using a hybrid method of moments and local binary patterns (LBP). The moment technique computed several critical parameters. Those parameters were used as descriptors and classifiers to recognize faces in images. The LBP technique has three phases: representation of a face, feature extraction, and classification. The face in the image was subdivided into variable-size blocks to compute their histograms and discover their features. Fidelity criteria were used to estimate and evaluate the findings. The proposed technique used the standard Olivetti Research Laboratory dataset in the proposed system training and recognition phases. The research experiments showed that adopting a hybrid technique (moments and LBP) recognized the faces in images and provide a suitable representation for identifying those faces. The proposed technique increases accuracy, robustness, and efficiency. The results show enhancement in recognition precision by 3% to reach 98.78%.
A study of techniques for facial detection and expression classificationIJCSES Journal
Automatic recognition of facial expressions is an important component for human-machine interfaces. It
has lot of attraction in research area since 1990's.Although humans recognize face without effort or
delay, recognition by a machine is still a challenge. Some of its challenges are highly dynamic in their
orientation, lightening, scale, facial expression and occlusion. Applications are in the fields like user
authentication, person identification, video surveillance, information security, data privacy etc. The
various approaches for facial recognition are categorized into two namely holistic based facial
recognition and feature based facial recognition. Holistic based treat the image data as one entity without
isolating different region in the face where as feature based methods identify certain points on the face
such as eyes, nose and mouth etc. In this paper, facial expression recognition is analyzed with various
methods of facial detection,facial feature extraction and classification.
Age Invariant Face Recognition using Convolutional Neural Network IJECEIAES
In the recent years, face recognition across aging has become very popular and challenging task in the area of face recognition. Many researchers have contributed in this area, but still there is a significant gap to fill in. Selection of feature extraction and classification algorithms plays an important role in this area. Deep Learning with Convolutional Neural Networks provides us a combination of feature extraction and classification in a single structure. In this paper, we have presented a novel idea of 7-Layer CNN architecture for solving the problem of aging for recognizing facial images across aging. We have done extensive experimentations to test the performance of the proposed system using two standard datasets FGNET and MORPH (Album II). Rank-1 recognition accuracy of our proposed system is 76.6% on FGNET and 92.5% on MORPH (Album II). Experimental results show the significant improvement over available state-of- the-arts with the proposed CNN architecture and the classifier.
COMPRESSION BASED FACE RECOGNITION USING DWT AND SVMsipij
The biometric is used to identify a person effectively and employ in almost all applications of day to day
activities. In this paper, we propose compression based face recognition using Discrete Wavelet Transform
(DWT) and Support Vector Machine (SVM). The novel concept of converting many images of single person
into one image using averaging technique is introduced to reduce execution time and memory. The DWT is
applied on averaged face image to obtain approximation (LL) and detailed bands. The LL band coefficients
are given as input to SVM to obtain Support vectors (SV’s). The LL coefficients of DWT and SV’s are fused
based on arithmetic addition to extract final features. The Euclidean Distance (ED) is used to compare test
image features with database image features to compute performance parameters. It is observed that, the
proposed algorithm is better in terms of performance compared to existing algorithms.
Implementation of Face Recognition in Cloud Vision Using Eigen FacesIJERA Editor
Cloud computing comes in several different forms and this article documents how service, Face is a complex multidimensional visual model and developing a computational model for face recognition is difficult. The papers discuss a methodology for face recognition based on information theory approach of coding and decoding the face image. Proposed System is connection of two stages – Feature extraction using principle component analysis and recognition using the back propagation Network. This paper also discusses our work with the design and implementation of face recognition applications using our mobile-cloudlet-cloud architecture named MOCHA and its initial performance results. The dispute lies with how to performance task partitioning from mobile devices to cloud and distribute compute load among cloud servers to minimize the response time given diverse communication latencies and server compute powers
Adversarial sketch-photo transformation for enhanced face recognition accurac...IJECEIAES
This research provides a strategy for enhancing the precision of face sketch identification through adversarial sketch-photo transformation. The approach uses a generative adversarial network (GAN) to learn to convert sketches into photographs, which may subsequently be utilized to enhance the precision of face sketch identification. The suggested method is evaluated in comparison to state-of-the-art face sketch recognition and synthesis techniques, such as sketchy GAN, similarity-preserving GAN (SPGAN), and super-resolution GAN (SRGAN). Possible domains of use for the proposed adversarial sketch- photo transformation approach include law enforcement, where reliable face sketch recognition is essential for the identification of suspects. The suggested approach can be generalized to various contexts, such as the creation of creative photographs from drawings or the conversion of pictures between modalities. The suggested method outperforms state-of-the-art face sketch recognition and synthesis techniques, confirming the usefulness of adversarial learning in this context. Our method is highly efficient for photo-sketch synthesis, with a structural similarity index (SSIM) of 0.65 on The Chinese University of Hong Kong dataset and 0.70 on the custom-generated dataset.
Ensemble-based face expression recognition approach for image sentiment anal...IJECEIAES
Sentiment analysis based on images is an evolving area of study. Developing a reliable facial expression recognition (FER) device remains a difficult challenge as recognizing emotional feelings reflected in an image is dependent on a diverse set of factors. This paper presented an ensemblebased model for FER that incorporates multiple classification models: i) customized convolutional neural network (CNN), ii) ResNet50, and iii) InceptionV3. The model averaging ensemble classifier method is used to ensemble the predictions from the three models. Subsequently, the proposed FER model is trained and tested on a dataset with an uncontrolled environment (FER-2013 dataset). The experiment demonstrated that ensembling multiple classifiers outperformed all single classifiers in classifying positive and neutral expressions (91.7%, 81.7% and 76.5% accuracy rate for happy, surprise, and neutral, respectively). However, when classifying disgust, anger, and sadness, the ResNet50 model alone is the better choice. Although the Custom CNN performs the best in classifying fear expression (55.7% accuracy), the proposed FER model can still classify fear expression with comparable performance (52.8% accuracy). This paper demonstrated the potential of using the ensemble-based method to enhance the performance of FER. As a result, the proposed FER model has shown a 72.3% accuracy rate.
Selective local binary pattern with convolutional neural network for facial ...IJECEIAES
Variation in images in terms of head pose and illumination is a challenge in facial expression recognition. This research presents a hybrid approach that combines the conventional and deep learning, to improve facial expression recognition performance and aims to solve the challenge. We propose a selective local binary pattern (SLBP) method to obtain a more stable image representation fed to the learning process in convolutional neural network (CNN). In the preprocessing stage, we use adaptive gamma transformation to reduce illumination variability. The proposed SLBP selects the discriminant features in facial images with head pose variation using the median-based standard deviation of local binary pattern images. We experimented on the Karolinska directed emotional faces (KDEF) dataset containing thousands of images with variations in head pose and illumination and Japanese female facial expression (JAFFE) dataset containing seven facial expressions of Japanese females’ frontal faces. The experiments show that the proposed method is superior compared to the other related approaches with an accuracy of 92.21% on KDEF dataset and 94.28% on JAFFE dataset.
Face recognition is a widely used biometric approach. Face recognition technology has developed rapidly
in recent years and it is more direct, user friendly and convenient compared to other methods. But face
recognition systems are vulnerable to spoof attacks made by non-real faces. It is an easy way to spoof face
recognition systems by facial pictures such as portrait photographs. A secure system needs Liveness
detection in order to guard against such spoofing. In this work, face liveness detection approaches are
categorized based on the various types techniques used for liveness detection. This categorization helps
understanding different spoof attacks scenarios and their relation to the developed solutions. A review of
the latest works regarding face liveness detection works is presented. The main aim is to provide a simple
path for the future development of novel and more secured face liveness detection approach.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Planning Of Procurement o different goods and services
Optimized Biometric System Based on Combination of Face Images and Log Transformation
1. Signal & Image Processing : An International Journal (SIPIJ) Vol.7, No.2, April 2016
DOI : 10.5121/sipij.2016.7204 57
OPTIMIZED BIOMETRIC SYSTEM BASED ON
COMBINATION OF FACE IMAGES AND LOG
TRANSFORMATION
Sateesh Kumar H C1
Raja K B2
and Venugopal KR3
1
Department of Electronics and Communication Engineering,
Sai Vidya Institute of Technology, Bangalore, India
2
Department of Electronics and Communication Engineering,
University Visvesvaraya College of Engineering, Bangalore, India
3
Principal, University Visvesvaraya College of Engineering, Bangalore, India
ABSTRACT
The biometrics are used to identify a person effectively. In this paper, we propose optimised Face
recognition system based on log transformation and combination of face image features vectors. The face
images are preprocessed using Gaussian filter to enhance the quality of an image. The log transformation
is applied on enhanced image to generate features. The feature vectors of many images of a single person
image are converted into single vector using average arithmetic addition. The Euclidian distance(ED) is
used to compare test image feature vector with database feature vectors to identify a person. It is
experimented that, the performance of proposed algorithm is better compared to existing algorithms.
KEYWORDS
Biometric, Face recognition, log Transformation, ED, Fusion, Gaussian filter
1. INTRODUCTION
Biometrics is the measurement and analysis of behavioural and physiological trait characteristics
of a person. It is used to identify a person to utilise electronic gadgets and entry in to restricted
areas through smart gates or doors. The conventional human authentication methods used are
smart cards, passwords, Personnel identification number (PIN) etc. The disadvantages are (i)
Passwords are hard to remember (ii) PIN and smart cards can be stolen or lost. Biometrics is the
alternate to conventional methods of authentication as the traits of biometrics are attached to
human body parts and based on the behaviour of person. The biometric system has three
divisions viz., (i) enrolment division (ii) test division and (iii) matching division. In enrolment
division, the database images are loaded preprocessed and features are extracted. In test division,
the test images are loaded, preprocessed and features are extracted. The matching division has
classifiers to classify images inside the database.
2. Signal & Image Processing : An International Journal (SIPIJ) Vol.7, No.2, April 2016
58
The biometrics are broadly divided into two categories viz., (i)Physiological biometric traits
which are related to parts of human body and the characteristics are constant in lifetime and
(ii)behavioural biometric traits, that are based on behaviour of a person like walking style,
writing style, speaking accent etc., which vary in lifetime. In our research work, face images are
used to identify a person. The advantage of this trait is, images can be captured without the
cooperation of a person. The challenges in face recognition are (i) Orientation of face images, (ii)
Illumination variations (iii) Accessories of face images and (iv) Expressions.
The applications of biometrics are (i) Identification of a person in crowded places like bus stand,
railway station, airport etc., using face recognition system. (ii)The fingerprint identification is
used to identify criminals in the scenario of crime (iii) The biometrics are used in cloud
computing (iv) Used in secured communication(v)Used in IOT (vi)Used in National
Identification card (AADHAR) to create national database (vii)Bank transactions (viii) Property
registration (ix)to protect Intellectual property.
Contribution: In this paper, the novel concept of converting feature vectors of many images with
illumination variations, orientation variation etc., of a single person into one feature vector per
person. The Gaussian filer and log transformations are used to enhance quality of images. The
features are extracted using log transformations.
Organisation: Survey of recent research is discussed section 2. Section 3 presents proposed
model. Proposed Algorithm is described in section 4. Performance Analysis is explained in the
section 5. Conclusion is given in Section 6.
2. LITERATURE SURVEY
In this section, the literature review of existing biometric algorithms is discussed. Abhijith
Punnappurath and Ambasamudram Narayanan Rajagopalan [1] proposed a face recognition
technique under non uniform blur, Illumination and pose. The blurred images are modelled as a
convex set. Illumination variations are handled by exploiting the fact non uniform blurred and
changed illumination image forms Biconvex set. The disadvantage of this technique is large
changes in the face and significant occlusions cannot be handled. Yong You et al.,[2] presented
high accuracy Face Recognition technique with lower complexity for image with variable
illumination, pose and facial expressions. This is achieved by first exploiting the original training
samples to synthesise virtual training samples, which reflects the possible variations in the face.
A theorem is used to fix upper bound for number of useful training samples.
Chia -Po Wei et al.,[3] proposed face recognition when the data is corrupted due to occlusion or
disguise. This problem is addressed by low rank matrix decomposition. This gives additional
discriminating ability as it enforces bases learned for different classes are independent. Muwei
Jian and Kin-Man Lam[4] proposed a novel approach for face recognition and verification of low
resolution of images based on singular value decomposition .This technique is based on the fact
that low resolution (LR) and high resolution (HR) images have linear relation. Based on LR-HR
pairs, the mapping functions for interpolating the two matrices in SVD representation for
reconstruction of high resolution images is done accurately. Changxing Ding et al.,[5] proposed
robust face recognition technique to variation in the pose, expression and illumination. This
method extracts multi directional, multi level dual-cross patterns. Difference in illumination is
3. Signal & Image Processing : An International Journal (SIPIJ) Vol.7, No.2, April 2016
59
addressed by taking first derivative of Gaussian operator. It increases the robustness in pose
variation and expression variation but it doubles the cost of local binary pattern.
Yi Wen Wang and Shutao Li[6] proposed a rapid face recognition based on the brain computer
interface. It uses combination of electro encephalography signal along with regular face
recognition technique. In neuroscience face images stands differently, it produces large amplitude
of face specific components in EEG other than natural images. Leyuan Fang et al.,[7] proposed a
Gabor features based face recognition technique which exploits the correlated Gabor features
using multitask adoptive sparse representation model. This algorithm gives better representation,
as selected atoms for the Gabor features are varied with in each class. Jiwen Lu et al.,[8]
proposed a joint feature learning technique for face recognition. In this method different regions
of the face are considered will have different physical characteristics. By jointly learning multiple
and related sparse features for different face regions, more position specific discriminative
information is extracted for face representation.
Hamdi Dibeklioglu et al.,[9] proposed age estimation method by capturing face images. Age is
estimated by studying dynamic facial features by analyzing frequently changing facial
expressions. The spontaneous and posed smiles have different and distinct dynamics concept
outperform over other technique.Rosario Campomanes-Alvarez et al.,[10] proposed a method for
identifying a person by overlaying skulls with the images of missing person.This is done by
modelling impression related to the facial soft tissue depth between corresponding pairs of cranial
and facial landmarks.
Shenghua Gao et al.,[11] proposed a supervised auto encoder and used it to build deep neural
network architecture for extracting robust features for single sample per person representation.
Here face images are enforced with variants to be mapped with canonical face of the person and
also enforcing features corresponding to same person which are similar. Yiwen Wang et al.,[12]
proposed a close loop face retrieval which combines existing face recognition with EEG signals.
In this method random face images are taken and outputs the ranking of all of the images in the
data base according to their similarities to the target individual. At each iteration event related
potentials are taken. Xiaochun Cao et al.,[13] proposed a face clustering technique to cluster
videos. The constrained multi view video face clustering under a unified graph based method is
used. The constrained sparse subspace representation is forced to explore unknown relationships.
In the constrained spectral clustering, the constraints are used to guide for learning more
reasonable new representations.
Xudong Jiang and Jian Lai[14] proposed a sparse and dense-hybrid representation based face
recognition which uses low rank dictionary decomposition/learning. In this method every sample
uses its class specific component to compete against the others collaboratively with the non-class
specific components of all the samples. Priyanka V. Bankar and Anjali C. Pise[15] proposed a
face recognition method using GABOR and LBP. This method encodes the discriminative
features by combining both colour and text information. To make full use of colour and texture
information, the opponent colour texture features are used. Muhammad Uzair et al.,[16] proposed
a hyper spectral face recognition. It uses a spatial- spectral covariance for band fusion and partial
least square regression for classification. Hyper spectral face recognition is an image set
classification problem and performance is evaluated using seven state of art image set
classification techniques. Samiksha Agrawal and Pallavi Khatri [17] proposed a high speed
accurate face recognition algorithm based on Viola and Jones algorithm and principle component
4. Signal & Image Processing : An International Journal (SIPIJ) Vol.7, No.2, April 2016
60
analysis. The principle component analysis uses eigen phases and reconstruction of phase is
possible with small amount of information. Xiao Shuang Shi et al.,[18] proposed a method to
reduce the influence of grosses like variations in lighting, facial expressions and occlusions to
improve the robustness of Face recognition system. The two dimensional whitening
reconstruction reduces the pixel redundancy of internal image and it maintains important intrinsic
features this improve the robustness of PCA methods on classification and clustering, especially
for faces with severe illumination changes.
3. PROPOSED MODEL
The novel technique of converting many image feature vectors of single person into one image
feature vector is introduced in the proposed algorithm and block diagram is shown in the figure 1.
The Gaussian filter, Log Transformation and fusion technique are used to optimize the
algorithms.
3.1 Face Image Databases:
The proposed algorithm is tested using some of the universally available databases such as
JAFFE, YALE, Indian male, Indian females.
1. JAFFE Database [19] (Japanese Female Facial Expressions database):It consists of 213
Images. It has 7 facial expressions such as neutral, angry, happiness, disgust, sad, fear and
disgust. Out of seven facial expressions 6 are basic facial expressions and one is neutral
expression. These are the images taken from 10 Japanese female models. The database is created
by considering 6 images per person, there are 42 database images. JAFFE database images are as
shown in figure 2
2. YALE Database [20]: It consists of 165 gray scale images in GIF format of 15 persons.. 11
images were taken from each person. It contain Different facial expressions like Centre light,
With glasses, happy, left light, with no glasses, normal, right-light, sad, sleepy surprised and
wink. The database is created by taking images of 10 persons with 6 samples per person. Figure 3
shows Yale database images.
3. Indian male database [21]: Indian male face database has twenty persons with approximately
eleven images per person. The images were taken in homogeneous background with an upright
and frontal position. The eleven different images include facial orientations such as looking front,
looking left, looking right, looking up, looking up towards left, looking up towards right, looking
down, with emotions neutral, smile, laughter, sad/disgust. The database is formed by taking
images of 15 persons with 6 images per person. Samples of Indian male face images of a person
are shown in fig. 4.
4. Database of Indian female [21]: The face database of Indian females has twenty two persons
with nearly eleven images per person. Pose and expressions variations are same as Indian male
face database. The database is formed by considering first 17 persons and 6 images of each
person. Total images in the database are 102. Out of database persons are 5. Hence total images
outside the database Figure 5 shows Indian female face image samples of a person.
5. Signal & Image Processing : An International Journal (SIPIJ) Vol.7, No.2, April 2016
61
Figure 1. Block diagram of proposed Face Recognition using Natural logarithm and vector compression
Figure 2. Samples of JAFFE face images of a person
6. Signal & Image Processing : An International Journal (SIPIJ) Vol.7, No.2, April 2016
62
Figure 3. YALE face image samples of a person
Figure 4. face image Samples a person of Indian male
Figure 5. Indian female face image Samples of a person
3.2. Gaussian Filter [22]:
The filter is used to transform the image to smoothened image by removing high frequency
edges. The basic equation for two dimensional Gaussian filter is given in equation (1).
Where, x is the distance from the origin in the horizontal axis
y is the distance from the origin in the vertical axis.
σ is the standard deviation of the Gaussian distribution.
The Gaussian mask filter of 3x3 is derived from equation (1) to obtain mask given in equation
(2).
7. Signal & Image Processing : An International Journal (SIPIJ) Vol.7, No.2, April 2016
63
The Gaussian filter is obtained by multiplying Gaussian mask with 3x3 sub-matrix of an image as
given in equation 3.
Where, a11 to a33 are 3x3 sub-matrix pixel values of an image.
3.3 Log Transformation
It is a spatial domain technique which operates directly on the pixel intensities. The low and high
Intensity values are converted into medium intensity values i.e., intensity values are distributed
uniformly in an image. The very low intensity values are increased to moderate values and high
intensity values are reduced to moderate values using log transformation. The gray level intensity
values of transformation is given by the equation (5)
s = Clog (1+r) (5)
where, c is constant, r = Intensity value of original Image
a) Original image (b) log image
Figure 6. Logarithmic transformation of an image
The log transformation of an image is as shown in fig 6. The log transformation is applied on all
database images to obtain matrix of log coefficients. The matrix of each image is converted into
column vector. The database column vectors of log coefficients for all images are derived in the
database features.
8. Signal & Image Processing : An International Journal (SIPIJ) Vol.7, No.2, April 2016
64
3.4. Fusion of Vector:
It is the process of converting many feature vectors of single person into one vector using average
arithmetic addition of corresponding coefficients. The algorithm is optimized since only one
vector for each person.
Example:
Let seven images per person and the corresponding features vectors are say V1,V2,V3,V4,V5,V6
and V7. The image size is considered as 256*256 ie., number of features for each image are
65536. The feature elements in each vector are given in equation (6)
The seven feature vectors are converted into single vector (V) using fusion technique given in
equation (7)
Many feature vectors of single person is converted into one feature vector per person. The
advantage is reduction in computation time, which will optimize the algorithm.
9. Signal & Image Processing : An International Journal (SIPIJ) Vol.7, No.2, April 2016
65
3.5 Euclidian Distance:
The Euclidian distance is used as matching metric to compare two feature templates of face
images. Equation (8) gives Euclidian distance equation.
4. ALGORITHM
In this section problem definition, objectives and algorithm are discussed and the proposed
algorithm for face recognition is given in table 1.
problem definition: Optimised face recognition Algorithm is developed using log transformation
and feature vector fusion to identify a person efficiently.
Table 1: Algorithm of proposed method
10. Signal & Image Processing : An International Journal (SIPIJ) Vol.7, No.2, April 2016
66
Objectives are-
i) To recognise the persons efficiently
ii) To increase recognition rate.
iii) To decrease error rates such as FRR, FAR and EER
In the proposed concept of converting many images of single person into one image per person
using average arithmetic addition is introduced in the proposed algorithm.
5. PERFORMANCE ANALYSIS
In this section, the definitions of performance parameters, variations of performance parameters
with threshold and comparison of proposed method with existing methods are discussed.
5.1 Definition of performance parameters.
5.1.1 True Success Rate or Correct Recognition Rate (TSR or CRR):
It is defined as the number of test images correctly matched with database images to the total
number of persons in the database as given in equation (9)
5.1.2 False Rejection Rate (FRR):
It is defined as the ratio of number of guanine test persons rejected to the total number of persons
in the database as given in equation (10)
5.1.3 False Acceptance Rate (FAR):
It is the number of imposter persons accepted to the total number of persons in the outside the
database as given in equation (11)
5.1.4 Equal Error Rate (EER):
It is an optimum error of an Algorithm. The EER is the Intersection of FAR and FRR. The EER
value must be low for better performance of an algorithm.
11. Signal & Image Processing : An International Journal (SIPIJ) Vol.7, No.2, April 2016
67
5.2 Performance parameter variations:-
In this section, The threshold values are varied and performance parameter values are noted for
different face image databases such as Indian Female, Jaffe, Yale and Indian male.
5.2.1. Parameter variation with Jaffe Face Database:-
seven persons with six samples per person are used to create face database by considering seven
persons with six samples per person. ie., forty two image samples in the database. The values of
the FAR are computed by considering three persons as outside the database. The variations of
FRR, FAR and TSR with threshold are shown in fig. 7
Figure 7. JAFFE database Performance parameters variations with threshold.
FAR and TSR values increases with threshold values, where as the FRR decreases with threshold
values. The value of EER is zero and corresponding TSR value is one hundred percent The
performance values are better since the variations in the image are less.
5.2.2 Parameter variation with Yale Face Database:-
The face database is formed by considering ten persons with six samples per person. ie., sixty
image samples in the database. The value of the FAR is computed by considering five persons as
outside the database. The variations of FRR, FAR and TSR with threshold are shown in fig. 8
The values of FAR and TSR increases with threshold values, where as the FRR decreases with
threshold values. The value of EER is thirty two percent and corresponding TSR value is seventy
percent. The performance values are poor since the variation of illuminations in images are more.
12. Signal & Image Processing : An International Journal (SIPIJ) Vol.7, No.2, April 2016
68
Figure 8. Performance parameters variations with threshold for YALE database
5.2.3 Parameter variation with Indian male Face Database:-
The face database is created by considering fifteen persons with six samples per person. ie.,
Ninety image samples in the database. The value of the FAR is computed by considering five
persons as outside the database. The variations of FRR, FAR and TSR with threshold are shown
in fig. 9
Figure 9. Performance parameters variations with threshold for Indian male database
The values of FAR and TSR increases with threshold values, where as the FRR decreases with
threshold values. The value of EER is fifty and corresponding TSR value is fifty percent.
13. Signal & Image Processing : An International Journal (SIPIJ) Vol.7, No.2, April 2016
69
5.2.4 Parameter variation with Face Database of Indian female:-
The face database is formed by considering seventeen persons with six samples per person. ie.,
one hundred and two samples in the database. The value of the FAR is computed by considering
five persons as outside the database. The variations of FRR, FAR and TSR with threshold are
shown in fig. 10
Figure 10. Performance parameters variations with threshold for Indian female database
The FAR and TSR increases with threshold values, where as the FRR decreases with threshold
values. The value of EER is ten and corresponding TSR value is ninety one percent.
5.3 Comparison of Performance parameters with different databases
The performance parameters such as EER , Optimum TSR (opt. TSR) and Maximum TSR (Max.
TSR) for different face databases viz., JAFFE, YALE, Indian Male and Indian Female are
tabulated in table 2. The value of EER is low with higher values of opt. TSR and maximum TSR
for JAFFE database. The performance of proposed algorithm is better with JAFFE database since
variations in illumination and orientations are less. The performance of algorithm with Indian
male database is very poor since the orientation in face images is very high.
Table 2: Comparison of EER, opt. TSR and Max. TSR for different face databases
Databases EER Opt. TSR Max.TSR
JAFFE 0 100 100
YALE 32 70 100
Indian Male 50 50 92.401
Indian Female 10 91 100
14. Signal & Image Processing : An International Journal (SIPIJ) Vol.7, No.2, April 2016
70
5.4 Comparison of proposed Algorithm with Existing Algorithms.
The optimised percentage TSR of proposed method is compared with existing methods presented
by Rangaswamy[23] and Ramesh and Raja[24] for JAFFE face database is given in table 3. It is
noticed that the value of percentage TSR is better in the case of proposed method compared to
existing methods.
Table 3: Comparison of proposed Algorithm with existing algorithms for JAFFE database
Sl.No Authors Techniques TSR(%)
1 Rangaswamy et al.,[23] DTCWT+FFT 80
2 Ramesha K and K B Raja[24] DTBFEFR 90.3
3 Proposed method Log Transformation and
vector compression
100
The performance parameter values are better in the case of proposed method for the following
reasons
i. The features are extracted using nonlinear technique.
ii. The single person's feature vectors of many samples of single person are fused to convert
into single vector per person.
iii. The single feature vector of many samples of a person will optimize recognition rate.
iv. The method is useful for real time applications.
6. CONCLUSIONS
The face recognition is powerful biometric trait to identify a person as the images can be captured
without the knowledge of a person. In this paper, optimised face recognition system based on log
transformation and combination of face image vectors is proposed. The face image quality is
improved using Gaussian filter. The log transformation is used to extract features. The novel
concept of converting many image feature vectors of single person into single feature vector
using fusion technique to optimize the algorithm is introduced. It is observed that the
performance parameters of the proposed algorithm are improved compared to existing
algorithms. In future, algorithm can be tested with other biometric traits and can be combined for
better performance. The algorithm can be tested for optimisation using hardware.
REFERENCES
[1] Abhijith Punnappurath and Ambasamudram Narayanan Rajagopalan "Face Recognition Across Non-
Uniform Motion Blur, Illumination and Pose", IEEE Transactions on Image Processing, vol. 24, no.
7, pp. 2067-2082, July 2015.
[2] Yong Xu, Xiaozhao Fang, Xuelong Li, Jiang Yang, Jane You, Hong Liu and Shaohua Teng, "Data
Uncertainty in Face Recognition", IEEE Transactions on Cybernetics, vol. 44, no. 10, pp. 1950-1961,
October 2014
[3] Chia-Po Wei, Chih-Fan Chen, and Yu-Chiang Frank Wang, "Robust Face Recognition With
Structurally Incoherent Low-Rank Matrix Decomposition", IEEE Transactions on Image Processing,
Vol. 23, No. 8, pp. 3294-3307, August 2014.
[4] Muwei Jian and Kin-Man Lam, "Simultaneous Hallucination and Recognition of Low-Resolution
Faces Based on Singular Value Decomposition", IEEE Transactions on Circuits and Systems for
Video Technology, Vol. 25, No. 11, pp. 1761-1772, November 2015
15. Signal & Image Processing : An International Journal (SIPIJ) Vol.7, No.2, April 2016
71
[5] Changxing Ding, Jonghyun Choi, Dacheng Tao and Larry S. Davis, "Multi-Directional Multi-Level
Dual-Cross Patterns for Robust Face Recognition", IEEE Transactions on Pattern Analysis and
Machine Intelligence, vol. 38, issue 3, pp. 518 - 531, July 2015.
[6] Yiwen Wang, Lei Jiang,, Yun Wang Bangyu Cai,Yueming Wang, Weidong Chen, Sanyuan Zhang,
and Xiaoxiang Zheng, "An Iterative Approach for EEG-Based Rapid Face Search: A Refined
Retrieval by Brain Computer Interfaces", IEEE Transactions on Autonomous Mental Development,
Vol. 7, No. 3, pp. 211-222, September 2015.
[7] Leyuan Fang and Shutao Li, "Face Recognition by Exploiting Local Gabor Features with Multitask
Adaptive Sparse Representation", IEEE Transactions on Instrumentation and Measurement, Vol. 64,
No. 10, pp. 2605-2615, October 2015,
[8] Jiwen Lu, Venice Erin Liong, Gang Wang and Pierre Moulin, "Joint Feature Learning for Face
Recognition", IEEE Transactions on Information Forensics and Security, Vol. 10, No. 7, pp. 1571-
1383, July 2015.
[9] Hamdi Dibeklio˘glu, Fares Alnajar, Albert Ali Salah and Theo Gevers, "Combining Facial Dynamics
with Appearance for Age Estimation", IEEE Transactions on Image Processing, Vol. 24, No. 6, pp.
1928-1943, June 2015.
[10] B. Rosario Campomanes-Álvarez, Oscar Ibá˜nez, Carmen Campomanes-Álvarez, Sergio Damas, and
Oscar Cordón, "Modeling Facial Soft Tissue Thickness for Automatic Skull-Face Overlay", IEEE
Transactions on Information Forensics and Security, Vol. 10, No. 10, pp. 2057-2070, October 2015.
[11] Shenghua Gao, Yuting Zhang, Kui Jia, Jiwen Lu and Yingying Zhang, "Single Sample Face
Recognition via Learning Deep Supervised Auto Encoders", IEEE Transactions on Information
Forensics and Security, Vol. 10, No. 10, pp. 2108-2118, October 2015.
[12] Yiwen Wang, Lei Jiang, Yun Wang, Bangyu Cai,Yueming Wang, Weidong Chen, Sanyuan Zhang,
and Xiaoxiang Zheng, "An Iterative Approach for EEG-Based Rapid Face Search: A Refined
Retrieval by Brain Computer Interfaces", IEEE Transactions on Autonomous Mental Development,
Vol. 7, No. 3, pp. 211-222, September 2015.
[13] Xiaochun Cao, Changqing Zhang and Chengju Zhou, "Huazhu Fu, and Hassan Foroosh, Constrained
Multi-View Video Face Clustering", IEEE Transactions on Image Processing, Vol. 24, No. 11, pp.
4381-4393, November 2015.
[14] Xudong Jiang and Jian Lai, "Sparse and Dense Hybrid Representation via Dictionary Decomposition
for Face Recognition", IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 37, No.
5, pp. 1067-1079, May 2015.
[15] Priyanka V. Bankar and Anjali C. Pise, "Face Recognition by using GABOR and LBP", IEEE
International Conference on Communications and Signal Processing (ICCSP 2015) pp. 45-48, April
2015.
[16] Muhammad Uzair, Arif Mahmood and Ajmal Mian. "Hyperspectral Face Recognition with
Spatiospectral Information Fusion and PLS Regression", IEEE Transactions on Image Processing,
Vol. 24, No. 3, pp. 1127-1137, March 2015.
[17] Samiksha and Pallavi Khatri, "Facial Expression Detection Techniques: based on Viola and Jones
Algorithm and Principal Component Analysis", Fifth International Conference on Advanced
Computing and Communication Technologies (ACCT), PP. 108-112, February 2015.
[18] Xiaoshuang Shi, Zhenhua Guo, Feiping Nie, Lin Yang, Jane You, and Dacheng Tao, "Two
Dimensional Whitening Reconstruction for Enhancing Robustness of Principal Component
Analysis", IEEE Transactions on Pattern Analysis and Machine Intelligence, issue 99, November
2015.
[19] http://www.kasrl.org/jaffe_download.html.
[20] http://vision.ucsd.edu/datasets/yale_face_dataset_original/yalefaces.zip
[21] http://viswww.cs.umass.edu/~vidit/IndianFaceDatabase
[22] Guruprasad G and Veena S K, "Face Recognition using Transform Domain Techniques", IOSR
Journal of VLSI and Signal Processing (IOSR-JVSP) Volume 5, Issue 3, Ver. II, May - Jun. 2015, PP
06-12
16. Signal & Image Processing : An International Journal (SIPIJ) Vol.7, No.2, April 2016
72
[23] Y. Rangaswamy K B Raja and K R Venugopal, "Face Recognition using Fusion of DTCWT and FFT
Features" Eleventh International Multi-Conference on Information Processing-2015 (IMCIP- 2015),
pp. 809-817, 2015.
[24] Ramesha K and K B Raja, " Dual Transform based Feature Extraction for Face Recognition"
International Journal of Computer Science Issues, Vol. 8, Issue 5, No 2, pp. 115-124, September
2011.
AUTHORS
Sateesh Kumar H.C. is a Associate Professor in the Dept of Electronics and
Communication Engineering at Sai Vidya Institute of Technology, Bangalore. He
obtained his B.E. degree in Electronics Engineering from Bangalore University. His
specialization in Master degree was Bio-Medical Instrumentation from Mysore
University and currently he is pursuing Ph.D. in the area of Image segmentation under
the guidance of Dr. K B Raja, Professor, Dept of Electronics and Communication
Engineering, University Visvesvaraya college of Engineering, Bangalore. He has over
23 research publications in refereed International Journals and Conference Proceedings. His area of interest
is in the field of Signal Processing and Communication Engineering. He is the life member of Institution of
Engineers (India), Institution of Electronics and Telecommunication Engineers and Indian society for
Technical Education.
Raja K.B. is a Professor, Department of Electronics and Communication Engineering,
University Visvesvaraya college of Engineering, Bangalore University, Bangalore. He
obtained his B.E and M.E in Electronics and Communication Engineering from
University Visvesvaraya College of Engineering, Bangalore. He was awarded Ph.D. in
Computer Science and Engineering from Bangalore University. He has over 180
research publications in refereed International Journals and Conference Proceedings.
He has guided 11 Ph.D students. His research interests include Image Processing,
Biometrics, VLSI Signal Processing, computer networks.
Venugopal K.R. is currently the Principal and Dean, Faculty of Engineering,
University Visvesvaraya College of Engineering, Bangalore University, Bangalore. He
obtained his Bachelor of Engineering from University Visvesvaraya College of
Engineering. He received his Master’s degree in Computer Science and Automation
from Indian Institute of Science, Bangalore. He was awarded Ph.D. in Economics
from Bangalore University and Ph.D. in Computer Science from Indian Institute of
Technology, Madras. He has a distinguished academic career and has degrees in
Electronics, Economics, Law, Business Finance, Public Relations, Communications,
Industrial Relations, Computer Science and Journalism. He has authored 27 books on Computer Science
and Economics, which include Petrodollar and the World Economy, C Aptitude, Mastering C,
Microprocessor Programming, Mastering C++ etc. He has been serving as the Professor and Chairman,
Department of Computer Science and Engineering, University Visvesvaraya College of Engineering,
Bangalore University, Bangalore. During his three decades of service at UVCE he has over 520 research
papers to his credit. His research interests include computer networks, parallel and distributed systems,
digital signal processing and data mining.