SlideShare a Scribd company logo
C&T RF Antennas Inc
https://ctrfantennasinc.com/ https://lcantennas.com/ https://pcbantennas.com/
info@ctrfantennasinc.com
Please Contact us for more information, thank you.
 Coco Lu (+86)13412239096
What are the 3 Classic Face Recognition Algorithms?
What is face recognition algorithm?
The face recognition algorithm means that after a face is detected and key facial feature points
are located, the main face areas can be cropped out, pre-processed, and fed into the back-end
recognition algorithm.
The face recognition algorithm has to complete the extraction of facial features and compare
them with the known faces in the inventory to complete the final classification. There are three
classical face recognition algorithms, let's see what they are exactly.
Three classical face recognition algorithms
The classic face recognition algorithm 1. Eigenface method
Eigenface technology is a recently developed method for face or general rigid body recognition
and other face processing. The use of eigenfaces for face recognition was first proposed by
Sirovich and Kirby (1987) ("Low-dimensional procedure for the characterization of human faces")
and used by Matthew Turk and Alex Pentland for Eigenfaces for recognition").
A batch of face images is first converted into a set of feature vectors, called "Eigenfaces", which
are the basic components of the initial training image set.
The recognition process involves projecting a new image into the eigenface subspace and
determining and recognizing it by the position of its projection points in the subspace and the
length of the projection lines.
After transforming the image to another space, images of the same category will be clustered
together, and images of different categories will be clustered further away. It is difficult to cut the
images of different categories in the original pixel space in terms of distribution with simple lines
or faces, and transforming them into another space can separate them well.
The spatial transformation method chosen by Eigenfaces is PCA (Principal Component Analysis),
which is used to obtain the main components of the face distribution, and is implemented by
C&T RF Antennas Inc
https://ctrfantennasinc.com/ https://lcantennas.com/ https://pcbantennas.com/
info@ctrfantennasinc.com
Please Contact us for more information, thank you.
 Coco Lu (+86)13412239096
decomposing the covariance matrix of all face images in the training set to obtain the
corresponding eigenvectors, which are the "eigenfaces".
Each eigenvector or eigenface is equivalent to capturing or describing a variation or characteristic
among faces. This means that each face can be represented as a linear combination of these
eigenfaces.
The classic face recognition algorithm 2. Local Binary Patterns (LBP)
Local binary patterns (LBP) is a visual operator used for classification in the field of computer
vision.LBP, an operator used to describe texture features of images, was proposed by T. Ojala et al.
of the University of Oulu, Finland, in 1996 ("A comparative study of texture measures with
classification based on featured distributions").
In 2002, T. Ojala et al. published another paper on LBP in PAMI ("Multiresolution gray-scale and
rotation invariant texture classification with local binary patterns").
This paper very clearly illustrates the improved LBP features of multiresolution, gray-scale
invariant and rotation invariant, and equivalence patterns.
The core idea of LBP is that the grayscale value of the central pixel is used as a threshold and
compared with its domain to obtain the corresponding binary code to represent the local texture
features.
The significant advantage of the LBP method is that it is insensitive to illumination but still does
not solve the problem of pose and expression. However, the recognition rate of LBP has been
greatly improved compared to the feature face method.
The classic face recognition algorithm 3. Fisher face algorithm
Linear discriminant analysis, which considers category information while reducing dimensionality,
was invented by statistician Sir R. A. Fisher in 1936 ("The use of multiple measurements in
taxonomic problems").
In order to find a way to combine features in a way that achieves maximum interclass dispersion
and minimum intraclass dispersion.
The idea is simple: in a low-dimensional representation, identical classes should be clustered
tightly together, while different classes are as far apart as possible.
In 1997, Belhumer successfully applied the Fisher discriminant criterion to face classification and
proposed the Fisherface method based on linear discriminant analysis ("Eigenfaces vs. fisher
faces: Recognition using class specific linear projection").
Besides the What are the 3 Classic Face Recognition Algorithms article, you may also be
interested in the below articles?
What Is The Core 5G NR Technology?
2.4GHz/5.8GHz WiFi Antenna Principle And Parameters
5G Millimeter Wave
How To Choose 2.4G And 5G?
RF Circuit Design Tutorial
What Is Each RF 400MHz~6GHz Antenna Application?
How to Choose the Best Antenna for Lora?

More Related Content

Similar to What are the 3 Classic Face Recognition Algorithms.pdf

Criminal Detection System
Criminal Detection SystemCriminal Detection System
Criminal Detection SystemIntrader Amit
 
Paper id 29201416
Paper id 29201416Paper id 29201416
Paper id 29201416IJRAT
 
F ACIAL E XPRESSION R ECOGNITION B ASED ON E DGE D ETECTION
F ACIAL  E XPRESSION  R ECOGNITION  B ASED ON  E DGE  D ETECTIONF ACIAL  E XPRESSION  R ECOGNITION  B ASED ON  E DGE  D ETECTION
F ACIAL E XPRESSION R ECOGNITION B ASED ON E DGE D ETECTIONIJCSES Journal
 
Face Emotion Analysis Using Gabor Features In Image Database for Crime Invest...
Face Emotion Analysis Using Gabor Features In Image Database for Crime Invest...Face Emotion Analysis Using Gabor Features In Image Database for Crime Invest...
Face Emotion Analysis Using Gabor Features In Image Database for Crime Invest...Waqas Tariq
 
Facial_recognition_Siva vadapalli1.pptx.ppt
Facial_recognition_Siva vadapalli1.pptx.pptFacial_recognition_Siva vadapalli1.pptx.ppt
Facial_recognition_Siva vadapalli1.pptx.pptvijaynaidu51
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...MangaiK4
 
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...MangaiK4
 
Hybrid Domain based Face Recognition using DWT, FFT and Compressed CLBP
Hybrid Domain based Face Recognition using DWT, FFT and Compressed CLBPHybrid Domain based Face Recognition using DWT, FFT and Compressed CLBP
Hybrid Domain based Face Recognition using DWT, FFT and Compressed CLBPCSCJournals
 
IRJET-Face Recognition using LDN Code
IRJET-Face Recognition using LDN CodeIRJET-Face Recognition using LDN Code
IRJET-Face Recognition using LDN CodeIRJET Journal
 
A survey on face recognition techniques
A survey on face recognition techniquesA survey on face recognition techniques
A survey on face recognition techniquesAlexander Decker
 
Facial expression recognition based on local binary patterns final
Facial expression recognition based on local binary patterns finalFacial expression recognition based on local binary patterns final
Facial expression recognition based on local binary patterns finalahmad abdelhafeez
 
Pose Invariant Face Recognition using Neuro-Fuzzy Approach
Pose Invariant Face Recognition using Neuro-Fuzzy ApproachPose Invariant Face Recognition using Neuro-Fuzzy Approach
Pose Invariant Face Recognition using Neuro-Fuzzy Approachiosrjce
 
Feature extraction and classification methods of facial expression: A surey
Feature extraction and classification methods of facial  expression: A sureyFeature extraction and classification methods of facial  expression: A surey
Feature extraction and classification methods of facial expression: A sureyCSITiaesprime
 
Appearance based face recognition by pca and lda
Appearance based face recognition by pca and ldaAppearance based face recognition by pca and lda
Appearance based face recognition by pca and ldaIAEME Publication
 

Similar to What are the 3 Classic Face Recognition Algorithms.pdf (20)

Criminal Detection System
Criminal Detection SystemCriminal Detection System
Criminal Detection System
 
Paper id 29201416
Paper id 29201416Paper id 29201416
Paper id 29201416
 
H0334749
H0334749H0334749
H0334749
 
Ch 2
Ch 2Ch 2
Ch 2
 
F ACIAL E XPRESSION R ECOGNITION B ASED ON E DGE D ETECTION
F ACIAL  E XPRESSION  R ECOGNITION  B ASED ON  E DGE  D ETECTIONF ACIAL  E XPRESSION  R ECOGNITION  B ASED ON  E DGE  D ETECTION
F ACIAL E XPRESSION R ECOGNITION B ASED ON E DGE D ETECTION
 
Face Emotion Analysis Using Gabor Features In Image Database for Crime Invest...
Face Emotion Analysis Using Gabor Features In Image Database for Crime Invest...Face Emotion Analysis Using Gabor Features In Image Database for Crime Invest...
Face Emotion Analysis Using Gabor Features In Image Database for Crime Invest...
 
Facial_recognition_Siva vadapalli1.pptx.ppt
Facial_recognition_Siva vadapalli1.pptx.pptFacial_recognition_Siva vadapalli1.pptx.ppt
Facial_recognition_Siva vadapalli1.pptx.ppt
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
 
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
 
Hybrid Domain based Face Recognition using DWT, FFT and Compressed CLBP
Hybrid Domain based Face Recognition using DWT, FFT and Compressed CLBPHybrid Domain based Face Recognition using DWT, FFT and Compressed CLBP
Hybrid Domain based Face Recognition using DWT, FFT and Compressed CLBP
 
A04430105
A04430105A04430105
A04430105
 
IRJET-Face Recognition using LDN Code
IRJET-Face Recognition using LDN CodeIRJET-Face Recognition using LDN Code
IRJET-Face Recognition using LDN Code
 
A survey on face recognition techniques
A survey on face recognition techniquesA survey on face recognition techniques
A survey on face recognition techniques
 
Facial expression recognition based on local binary patterns final
Facial expression recognition based on local binary patterns finalFacial expression recognition based on local binary patterns final
Facial expression recognition based on local binary patterns final
 
D017322027
D017322027D017322027
D017322027
 
Pose Invariant Face Recognition using Neuro-Fuzzy Approach
Pose Invariant Face Recognition using Neuro-Fuzzy ApproachPose Invariant Face Recognition using Neuro-Fuzzy Approach
Pose Invariant Face Recognition using Neuro-Fuzzy Approach
 
Feature extraction and classification methods of facial expression: A surey
Feature extraction and classification methods of facial  expression: A sureyFeature extraction and classification methods of facial  expression: A surey
Feature extraction and classification methods of facial expression: A surey
 
Appearance based face recognition by pca and lda
Appearance based face recognition by pca and ldaAppearance based face recognition by pca and lda
Appearance based face recognition by pca and lda
 

More from Antenna Manufacturer Coco

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
What are LPWAN Technologies Listed In IoT.pdf
What are LPWAN Technologies Listed In IoT.pdfWhat are LPWAN Technologies Listed In IoT.pdf
What are LPWAN Technologies Listed In IoT.pdfAntenna Manufacturer Coco
 
Comparison of GSM and NB-IoT Coverage Capability.pdf
Comparison of GSM and NB-IoT Coverage Capability.pdfComparison of GSM and NB-IoT Coverage Capability.pdf
Comparison of GSM and NB-IoT Coverage Capability.pdfAntenna Manufacturer Coco
 
What Are NB-IoT Technology And Its Features.pdf
What Are NB-IoT Technology And Its Features.pdfWhat Are NB-IoT Technology And Its Features.pdf
What Are NB-IoT Technology And Its Features.pdfAntenna Manufacturer Coco
 
LoRa Alliance Extends LoRaWAN Standard to Support IoT Applications.pdf
LoRa Alliance Extends LoRaWAN Standard to Support IoT Applications.pdfLoRa Alliance Extends LoRaWAN Standard to Support IoT Applications.pdf
LoRa Alliance Extends LoRaWAN Standard to Support IoT Applications.pdfAntenna Manufacturer Coco
 
Yagi Antenna Design and 433MHz Antenna Design Example.pdf
Yagi Antenna Design and 433MHz Antenna Design Example.pdfYagi Antenna Design and 433MHz Antenna Design Example.pdf
Yagi Antenna Design and 433MHz Antenna Design Example.pdfAntenna Manufacturer Coco
 
55 Different Types of Antennas With Examples Used in Wireless Communication.pdf
55 Different Types of Antennas With Examples Used in Wireless Communication.pdf55 Different Types of Antennas With Examples Used in Wireless Communication.pdf
55 Different Types of Antennas With Examples Used in Wireless Communication.pdfAntenna Manufacturer Coco
 
WiFi vs. Cellular, Is WiFi Better Than Cellular.pdf
WiFi vs. Cellular, Is WiFi Better Than Cellular.pdfWiFi vs. Cellular, Is WiFi Better Than Cellular.pdf
WiFi vs. Cellular, Is WiFi Better Than Cellular.pdfAntenna Manufacturer Coco
 
Mobile networks’ evolution from 1G to 5G.pdf
Mobile networks’ evolution from 1G to 5G.pdfMobile networks’ evolution from 1G to 5G.pdf
Mobile networks’ evolution from 1G to 5G.pdfAntenna Manufacturer Coco
 
What is the Difference Between LTE and Wifi.pdf
What is the Difference Between LTE and Wifi.pdfWhat is the Difference Between LTE and Wifi.pdf
What is the Difference Between LTE and Wifi.pdfAntenna Manufacturer Coco
 
Comparison of 7 Common Positioning Technologies.pdf
Comparison of 7 Common Positioning Technologies.pdfComparison of 7 Common Positioning Technologies.pdf
Comparison of 7 Common Positioning Technologies.pdfAntenna Manufacturer Coco
 

More from Antenna Manufacturer Coco (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
What are LPWAN Technologies Listed In IoT.pdf
What are LPWAN Technologies Listed In IoT.pdfWhat are LPWAN Technologies Listed In IoT.pdf
What are LPWAN Technologies Listed In IoT.pdf
 
Top 14 IoT Trends to Emerge in 2023.pdf
Top 14 IoT Trends to Emerge in 2023.pdfTop 14 IoT Trends to Emerge in 2023.pdf
Top 14 IoT Trends to Emerge in 2023.pdf
 
Comparison of GSM and NB-IoT Coverage Capability.pdf
Comparison of GSM and NB-IoT Coverage Capability.pdfComparison of GSM and NB-IoT Coverage Capability.pdf
Comparison of GSM and NB-IoT Coverage Capability.pdf
 
What Are NB-IoT Technology And Its Features.pdf
What Are NB-IoT Technology And Its Features.pdfWhat Are NB-IoT Technology And Its Features.pdf
What Are NB-IoT Technology And Its Features.pdf
 
LoRa Alliance Extends LoRaWAN Standard to Support IoT Applications.pdf
LoRa Alliance Extends LoRaWAN Standard to Support IoT Applications.pdfLoRa Alliance Extends LoRaWAN Standard to Support IoT Applications.pdf
LoRa Alliance Extends LoRaWAN Standard to Support IoT Applications.pdf
 
What is A Private 5G Network.pdf
What is A Private 5G Network.pdfWhat is A Private 5G Network.pdf
What is A Private 5G Network.pdf
 
What is LPWAN.pdf
What is LPWAN.pdfWhat is LPWAN.pdf
What is LPWAN.pdf
 
What is 5G LAN How Does It Work.pdf
What is 5G LAN How Does It Work.pdfWhat is 5G LAN How Does It Work.pdf
What is 5G LAN How Does It Work.pdf
 
Internal Antenna VS. External Antenna.pdf
Internal Antenna VS. External Antenna.pdfInternal Antenna VS. External Antenna.pdf
Internal Antenna VS. External Antenna.pdf
 
Yagi Antenna Design and 433MHz Antenna Design Example.pdf
Yagi Antenna Design and 433MHz Antenna Design Example.pdfYagi Antenna Design and 433MHz Antenna Design Example.pdf
Yagi Antenna Design and 433MHz Antenna Design Example.pdf
 
55 Different Types of Antennas With Examples Used in Wireless Communication.pdf
55 Different Types of Antennas With Examples Used in Wireless Communication.pdf55 Different Types of Antennas With Examples Used in Wireless Communication.pdf
55 Different Types of Antennas With Examples Used in Wireless Communication.pdf
 
WiFi vs. Cellular, Is WiFi Better Than Cellular.pdf
WiFi vs. Cellular, Is WiFi Better Than Cellular.pdfWiFi vs. Cellular, Is WiFi Better Than Cellular.pdf
WiFi vs. Cellular, Is WiFi Better Than Cellular.pdf
 
Mobile networks’ evolution from 1G to 5G.pdf
Mobile networks’ evolution from 1G to 5G.pdfMobile networks’ evolution from 1G to 5G.pdf
Mobile networks’ evolution from 1G to 5G.pdf
 
What is DTU.pdf
What is DTU.pdfWhat is DTU.pdf
What is DTU.pdf
 
What is a DTU and What Does it Do.pdf
What is a DTU and What Does it Do.pdfWhat is a DTU and What Does it Do.pdf
What is a DTU and What Does it Do.pdf
 
New Technology in Farming Applications.pdf
New Technology in Farming Applications.pdfNew Technology in Farming Applications.pdf
New Technology in Farming Applications.pdf
 
What is the Difference Between LTE and Wifi.pdf
What is the Difference Between LTE and Wifi.pdfWhat is the Difference Between LTE and Wifi.pdf
What is the Difference Between LTE and Wifi.pdf
 
Wifi vs LTE Technology.pdf
Wifi vs LTE Technology.pdfWifi vs LTE Technology.pdf
Wifi vs LTE Technology.pdf
 
Comparison of 7 Common Positioning Technologies.pdf
Comparison of 7 Common Positioning Technologies.pdfComparison of 7 Common Positioning Technologies.pdf
Comparison of 7 Common Positioning Technologies.pdf
 

Recently uploaded

ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupCatarinaPereira64715
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesThousandEyes
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
 
UiPath New York Community Day in-person event
UiPath New York Community Day in-person eventUiPath New York Community Day in-person event
UiPath New York Community Day in-person eventDianaGray10
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...Sri Ambati
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»QADay
 

Recently uploaded (20)

ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
UiPath New York Community Day in-person event
UiPath New York Community Day in-person eventUiPath New York Community Day in-person event
UiPath New York Community Day in-person event
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Ransomware Mallox [EN].pdf
Ransomware         Mallox       [EN].pdfRansomware         Mallox       [EN].pdf
Ransomware Mallox [EN].pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
 

What are the 3 Classic Face Recognition Algorithms.pdf

  • 1. C&T RF Antennas Inc https://ctrfantennasinc.com/ https://lcantennas.com/ https://pcbantennas.com/ info@ctrfantennasinc.com Please Contact us for more information, thank you.  Coco Lu (+86)13412239096 What are the 3 Classic Face Recognition Algorithms? What is face recognition algorithm? The face recognition algorithm means that after a face is detected and key facial feature points are located, the main face areas can be cropped out, pre-processed, and fed into the back-end recognition algorithm. The face recognition algorithm has to complete the extraction of facial features and compare them with the known faces in the inventory to complete the final classification. There are three classical face recognition algorithms, let's see what they are exactly. Three classical face recognition algorithms The classic face recognition algorithm 1. Eigenface method Eigenface technology is a recently developed method for face or general rigid body recognition and other face processing. The use of eigenfaces for face recognition was first proposed by Sirovich and Kirby (1987) ("Low-dimensional procedure for the characterization of human faces") and used by Matthew Turk and Alex Pentland for Eigenfaces for recognition"). A batch of face images is first converted into a set of feature vectors, called "Eigenfaces", which are the basic components of the initial training image set. The recognition process involves projecting a new image into the eigenface subspace and determining and recognizing it by the position of its projection points in the subspace and the length of the projection lines. After transforming the image to another space, images of the same category will be clustered together, and images of different categories will be clustered further away. It is difficult to cut the images of different categories in the original pixel space in terms of distribution with simple lines or faces, and transforming them into another space can separate them well. The spatial transformation method chosen by Eigenfaces is PCA (Principal Component Analysis), which is used to obtain the main components of the face distribution, and is implemented by
  • 2. C&T RF Antennas Inc https://ctrfantennasinc.com/ https://lcantennas.com/ https://pcbantennas.com/ info@ctrfantennasinc.com Please Contact us for more information, thank you.  Coco Lu (+86)13412239096 decomposing the covariance matrix of all face images in the training set to obtain the corresponding eigenvectors, which are the "eigenfaces". Each eigenvector or eigenface is equivalent to capturing or describing a variation or characteristic among faces. This means that each face can be represented as a linear combination of these eigenfaces. The classic face recognition algorithm 2. Local Binary Patterns (LBP) Local binary patterns (LBP) is a visual operator used for classification in the field of computer vision.LBP, an operator used to describe texture features of images, was proposed by T. Ojala et al. of the University of Oulu, Finland, in 1996 ("A comparative study of texture measures with classification based on featured distributions"). In 2002, T. Ojala et al. published another paper on LBP in PAMI ("Multiresolution gray-scale and rotation invariant texture classification with local binary patterns"). This paper very clearly illustrates the improved LBP features of multiresolution, gray-scale invariant and rotation invariant, and equivalence patterns. The core idea of LBP is that the grayscale value of the central pixel is used as a threshold and compared with its domain to obtain the corresponding binary code to represent the local texture features. The significant advantage of the LBP method is that it is insensitive to illumination but still does not solve the problem of pose and expression. However, the recognition rate of LBP has been greatly improved compared to the feature face method. The classic face recognition algorithm 3. Fisher face algorithm Linear discriminant analysis, which considers category information while reducing dimensionality, was invented by statistician Sir R. A. Fisher in 1936 ("The use of multiple measurements in taxonomic problems"). In order to find a way to combine features in a way that achieves maximum interclass dispersion and minimum intraclass dispersion. The idea is simple: in a low-dimensional representation, identical classes should be clustered tightly together, while different classes are as far apart as possible. In 1997, Belhumer successfully applied the Fisher discriminant criterion to face classification and proposed the Fisherface method based on linear discriminant analysis ("Eigenfaces vs. fisher faces: Recognition using class specific linear projection"). Besides the What are the 3 Classic Face Recognition Algorithms article, you may also be interested in the below articles? What Is The Core 5G NR Technology? 2.4GHz/5.8GHz WiFi Antenna Principle And Parameters 5G Millimeter Wave How To Choose 2.4G And 5G? RF Circuit Design Tutorial What Is Each RF 400MHz~6GHz Antenna Application? How to Choose the Best Antenna for Lora?