SlideShare a Scribd company logo
International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017
Issue 08, Volume 5 (October 2018) www.ijiris.com
___________________________________________________________________________________________________________________________________
IJIRIS: Impact Factor Value – SJIF: Innospace, Morocco (2016): 4.651
Indexcopernicus: (ICV 2016): 88.20
© 2014- 18, IJIRIS- All Rights Reserved Page -475
ZERNIKE-ENTROPY IMAGE SIMILARITY MEASURE
BASED ON JOINT HISTOGRAM FOR FACE
RECOGNITION
Mohammed Abdulameer Aljanabi*
School of Computer Science and Technology,
Huazhong University of Science and Technology, China
mohammed@hust.edu.cn
Zahir M. Hussain
Faculty of Computer Science & Mathematics,
University of Kufa, Iraq
zmhussain@ieee.org
NoorAbd Alrazak Shnain
School of Computer Science and Technology,
Huazhong University of Science and Technology, China
nooraljanabi@hust.edu.cn
Song Feng Lu
School of Computer Science and Technology, Huazhong University of Science and Technology, China
Shenzhen Huazhong University of Science and Technology Research Institute, China
lusongfeng@hust.edu.cn
Manuscript History
Number: IJIRIS/RS/Vol.05/Issue08/OCIS10080
DOI: 10.26562/IJIRAE.2018.OCIS10080
Received: 04, October 2018
Final Correction: 10, October 2018
Final Accepted: 14, October 2018
Published: October 2018
Citation: Abdulameer, A. M., M., H. Z., Alrazak, S. N. A. & Lu, S. F. (2018). ZERNIKE-ENTROPY IMAGE SIMILARITY
MEASURE BASED ON JOINT HISTOGRAM FOR FACE RECOGNITION. IJIRIS:: International Journal of Innovative
Research in Information Security, Volume V, 475-485. doi://10.26562/IJIRIS.2018.OCIS10080
Editor: Dr.A.Arul L.S, Chief Editor, IJIRIS, AM Publications, India
Copyright: ©2018 This is an open access article distributed under the terms of the Creative Commons Attribution
License, Which Permits unrestricted use, distribution, and reproduction in any medium, provided the original author
and source are credited
Abstract— The direction of image similarity for face recognition required a combination of powerful tools and
stable in case of any challenges such as different illumination, various environment and complex poses etc. In this
paper, we combined very robust measures in image similarity and face recognition which is Zernike moment and
information theory in one proposed measure namely Zernike-Entropy Image Similarity Measure (Z-EISM). Z-EISM
based on incorporates the concepts of Picard entropy and a modified one dimension version of the two
dimensions joint histogram of the two images under test. Four datasets have been used to test, compare, and
prove that the proposed Z-EISM has better performance than the existing measures.
Keywords: Zernike moment; Entropy; Joint Histogram; Feature-based structural measure; Statistical approaches;
I. INTRODUCTION
Digital image processing is a wide scope and the images similarity or facial recognition are more interesting and
significant topics in the image processing field because of its process a sensitive case in the security systems. The
comparison of any two images to finding the similarity and dissimilarity between them by using image similarity
metric has several purposes, some examples of image similarity applications include image searches on the
internet whether for personal or for detecting copyright infringement. Another application of image similarity
measures for reconstructing a large still image from a database of small images [1].
International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017
Issue 08, Volume 5 (October 2018) www.ijiris.com
___________________________________________________________________________________________________________________________________
IJIRIS: Impact Factor Value – SJIF: Innospace, Morocco (2016): 4.651
Indexcopernicus: (ICV 2016): 88.20
© 2014- 18, IJIRIS- All Rights Reserved Page -476
Perhaps the most important image similarity application is its use for the security purposes through finding the
similarity between two face images and this is our point in this paper and our proposed metric is more confident
to decide the proper face image and non-face image. For each technique, there are some challenges facing the
researchers and the developers of this technique. For images similarity approach also we have some challenges
essential. Some of these challenges are fundamental and actively being researched. Some are resolved relatively,
and others remain largely unsolved. The challenge of designing a model of human visual processing which can
cope with natural images and this case need to improve the model of the primary visual cortex, more ground-truth
data on natural images, and models that incorporate processing by higher-level visual areas. Researchers also face
a problem when designing an algorithm that can cope with the diversity of distortions that image similarity
algorithms can face. Distortion of the image's appearance is a particular challenge when researchers want to
design an algorithm for image similarity. In fact, there are differences between distortions perceived as additive
and distortions that affect the image's objects. There is a need for adaptive visual approaches and other high-level
effects that humans use when judging quality. Images that are simultaneously distorted by multiple types of
distortions are an interesting challenge for researchers who design and improve image similarity approaches;
where the effects of multiple distortions on image quality and the potential perceptual interactions between the
distortions and their joint effects on images. Geometric changes to images are one of the challenges of image
similarity algorithms faced by researchers [2]. Other challenges in image similarity technique stem from lack of
complete perceptual models for natural images, supra threshold distortions, interactions between distortions and
images, images containing multiple and non-traditional distortions, and images containing enhancements. The
objective of this paper is not only to highlight the limitations in our current knowledge of image quality, but to
also emphasize the need for additional fundamental research in similarity perception [3]. This paper handles the
information-theoretic approach and includes the following sections: Section 2 describes the related works that
give high-performance measures; Section 3 presents the existing measures and the proposed measure; Section 4
shows simulation results and discussion, and Section 5 presents conclusions and future work.
II. RELATED WORKS
Due to the many works which are used the same existing measures for comparison in image similarity or facial
recognition because of the robustness of these measures, so the idea of this section is to overview the related
works with the proposed work in this paper. In general, the Zernike moment is the best for face recognition tasks.
This orthogonal moment is better than other types of moments in terms of information redundancy and image
representation, so Zernike moments are very popular in image analysis due to its feature representation
capability with minimal information redundancy and due to its low dimension and enhanced discriminatory
power even under noisy environment. In 2009 S. Lajevardi and Z. Hussain presented a facial expression
recognition system using Zernike moment as a feature extractor and they considered the challenges that face this
system such as the illumination condition, pose, rotation, noise and others. The experimental results show that the
presented system has high performance and good results obtained in images with noise and rotation whereas
feature extraction time rate is slower than other methods [4]. In 2010 respectively the same authors (Lajevardi &
Hussain) proposed a rotation and noise invariant face recognition system using an orthogonal invariant moment
as a feature extractor and Naive Bayesian as classifier. The system is tested under different facial expressions,
illumination condition, pose, rotation, noise and others. Simulation results on different databases indicated
observed that the high performance of the proposed system [5]. The proposed metric in this paper is mainly based
on the combination of the Zernike moment and entropy. Simultaneously, the proposed measure based on
incorporates the concepts of Picard entropy and a modified 1D version of the 2D joint histogram of the two images
under test. G. Pass and R. Zabih proposed a joint histogram which is an alternative to the colour histogram and
incorporates further information without losing the accuracy of the colour histogram. Joint Histogram (JH)
constructed based on a set of local pixel features and constructing a multidimensional histogram. Each entry in JH
contains the number of pixels in the image that is described by a particular combination of feature values.
Evaluate the performance of JH on a database with over 210,000 images. JH outperform colour histograms by an
order of magnitude when using it to find the similarity of images [6]. Overall there are two directions in image
similarity assessment: statistical-based and information-theoretic based measures. The state of art statistical
measure has been proposed by NA Shnain et al [7], called, FSM, used the best features of the traditional image
similarity measure called SSIM [8] and the feature similarity index measure called (FSIM) [9] for image-quality
assessment, while the information theory measures have been used for the sake of image similarity and face
recognition or image similarity for face recognition by MA Aljanabi et al. [10], [11].
III. THE EXISTING MEASURES AND THE PROPOSED MEASURE
It's a good plan to utilize the combination of more than one measure and balance them mathematically to get one
algorithm can use the whole features of each metric which are used in the proposed algorithm. Two existing
images similarity and face recognition measures addressed in this paper, one for combination and other for
comparison.
International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017
Issue 08, Volume 5 (October 2018) www.ijiris.com
___________________________________________________________________________________________________________________________________
IJIRIS: Impact Factor Value – SJIF: Innospace, Morocco (2016): 4.651
Indexcopernicus: (ICV 2016): 88.20
© 2014- 18, IJIRIS- All Rights Reserved Page -477
A. Zernike Moments (ZMs)
A type of moment function; considers an efficient global image descriptors. It is mapping an image onto a set of
complex Zernike polynomials; these polynomials are orthogonal to each other. The orthogonality of Zernike
moments can appear the properties of an image without any redundancy or overlap of information between the
moments, this characteristic makes each moment to be unique of the information in an image. Due to these
properties, Zernike moments have been used as feature sets in applications such as pattern recognition, content-
based image retrieval, and other image analysis systems. In this work we will extract various Zernike moments
(Zernike domain) as face features, then define a similarity measure after imposing a distance measure in this
domain. The distance measure will be Euclidean distance metrics.
The ZMs of an image function with order and repetition are given as[12]:
(1)
The radial polynomial is given in this equation:
(2)
When and is even.
The discrete approximation of equation (1) is defined as:
(3)
Where and when ;
(4)
The features of an image can be represented by a vector of selected Zernike moments and the features of
image can represent by a vector . The Euclidean Metric is the distance measure which is applied to feature
vectors of two images in the Zernike domain as in following equation:
(5)
B. Feature-Based Structural Measure (FSM)
FSM is an efficient state-of-art similarity measure [8], based on combining the best features and statistical
properties provided by SSIM and FSIM, trading off between their performances for similar and dissimilar images.
While Canny edge detector added a distinctive structural feature, where (after processing by Canny’s edge filter
[13]) two binary images, and , are obtained from the original two images x and y. FSM can be given by:
(6)
where, represents FSM similarity between two images and ; usually, represents the reference
image and represents a corrupted version of ; represents the feature similarity measure (FSIM) where given
by
(7)
International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017
Issue 08, Volume 5 (October 2018) www.ijiris.com
___________________________________________________________________________________________________________________________________
IJIRIS: Impact Factor Value – SJIF: Innospace, Morocco (2016): 4.651
Indexcopernicus: (ICV 2016): 88.20
© 2014- 18, IJIRIS- All Rights Reserved Page -478
And represents the structural similarity measure (SSIM) given by
(8)
The constants are chosen as =5, =3 and =7, while =0.01 is added to balance the quotient and avoid division
by zero. The function refers to the global 2D correlation between the images, as follows:
(9)
where and are the image global means. This function is applied here as on the new images
obtained from the application of edge detection to the original images and .
C. Zernike-Entropy Image Similarity Measure (Z-EISM)
In this paper, two main tools have been employed in our introduced measure, one of them is Zernike moments
which is proven effective in the extraction of image features, and the other one was based information theoretic
approach, represented by entropy because the information theory has a high capability to predict the relationship
between image intensity values. In this paper, we use Picard entropy [14] and apply it to image a joint histogram
as a probabilistic distribution and then combined the result with the Zernike approach. The proposed measure is
given by flowing formulas respectively:
(10)
where is a Picard entropy and . is a discrete random variable, and is
corresponding probabilities for . After this definition of entropy, then we have to applied entropy to
the joint histogram as follows:
A 2D joint histogram entry for two images and represents the probability that a pixel intensity
value from image co-occurs with pixel intensity value from image . The normalized joint histogram for two
images x and y of size is defined here as follows:
where:
or:
Now we apply the entropy to measure the information held in the joint histogram that represents the joint
probability of pixel co-occurrence. Note that both and range from to . First, the Picard entropy
measure is applied to get Picard-Histogram Similarity Measure (PHS) as follows:
where reshapes the 2D joint histogram into a one-dimensional column vector via the colon
operator, as defined in MATLAB, with a new dimension and ; . Using
other entropies could be more helpful. However, this is beyond the scope of this paper at the moment and will be
investigated in future works. Now, after the detailed discretion of the entropy and joint histogram, then we are
going to introduce the final formula for the proposed measure.
where refers to the similarity between two images and , always represents the reference image and
represents a corrupted version of it. denotes to Zernike moments and is the Picard entropy
after applied the joint histogram as defined in equation (14).
International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017
Issue 08, Volume 5 (October 2018) www.ijiris.com
___________________________________________________________________________________________________________________________________
IJIRIS: Impact Factor Value – SJIF: Innospace, Morocco (2016): 4.651
Indexcopernicus: (ICV 2016): 88.20
© 2014- 18, IJIRIS- All Rights Reserved Page -479
Fig. 1 Eight TID2008 non-face reference images used for the test and comparison image similarity measures.
IV. RESULTS AND DISCUSSION
In order to prove that the proposed measure is better than current measures, all measures must be tested in
abnormal conditions to come out with a measure can be used it in a real-time, more robust and challengeable. To
show the excellent results were obtained after applied the introduced measure against FSM and ZM metrics by
using MATLAB 2015a, four datasets have been used to evaluate the performance of all measures in this paper.
TID2008 [15], IVC [16], AT&T [17] and FEI [18] as a face and non-face images databases for testing. The following
figures show these sets respectively.
Fig. 2 Ten IVC non-face reference images used for the test and comparison image similarity measures
Fig 3 Forty AT&T reference face images, each person have ten deferent poses, facial expression and lighting used
for the test and comparison the measures to find image similarity for face recognition.
International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017
Issue 08, Volume 5 (October 2018) www.ijiris.com
___________________________________________________________________________________________________________________________________
IJIRIS: Impact Factor Value – SJIF: Innospace, Morocco (2016): 4.651
Indexcopernicus: (ICV 2016): 88.20
© 2014- 18, IJIRIS- All Rights Reserved Page -480
Fig. 4 Fifty FEI reference face images, each person have fourteen deferent pose, facial expression and lighting used
for the test and comparison the measures to find image similarity for face recognition.
In this test we divided all datasets into two subgroups: testing group and the training group. In training group, we
choose a random face image from the faces database and non-face images from the non-face database to be a
reference image, and then we select a different facial expression, distortion and pose from the testing group, for
the same image as a challenging image to evaluate the performance of measures in recognition and similarity.
(a) (b)
SimilaritywithReferencepo
(c)
Fig. 5 Performance of recognition measures using original image and distort of the original image; (a) The
reference image; (b). The distorted version of it (c). Performance of FSM, ZSM and Z-EISM using non-face image.
Confidence in recognition for FSM, ZSM and Z-EISM is 0.8731, 0.5664 and 0.9951 respectively.
In this results, we have two kinds of tests: one is for similarity of images and the other for recognition (face &non-
face) to evaluate and test the proposed Z-EISM versus the Zernike moments and FSM, in addition, we will find the
average similarity for each measure as a confidence method for the presented measure.
International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017
Issue 08, Volume 5 (October 2018) www.ijiris.com
___________________________________________________________________________________________________________________________________
IJIRIS: Impact Factor Value – SJIF: Innospace, Morocco (2016): 4.651
Indexcopernicus: (ICV 2016): 88.20
© 2014- 18, IJIRIS- All Rights Reserved Page -481
In the first test, we used two images (reference image and test image) from the environment of the two databases
(TID2008 and IVC, respectively) randomly; note that other images also achieve good results with high
performance. Figure (4) have three images: (a) is the reference image, (b) is the test image (distorted version of
the reference image) and (c) is the performance of all measures to find the similarity. In the figure (5), we will
repeat the process in the previous step but we will change the reference image. Figures (6) and (7) do the test on
face images from AT&T and FEI databases. The great results show that the presented measure is outperform the
current measures by give big distance function while the others find the proper image but there is low confidence
in their decision because there are many cases of distrust (big similarities with wrong images) in their decisions
(similarities). This is a big challenge when we employ these measures in security recognition tasks. Even if there
are some similar pixels in very different image but the use of joint histogram in our proposed measure never give
this result and this is the characteristic of the Zernike-Entropy Image Similarity Measure (Z-EISM).
(a) (b)
Image index, p
0 2 4 6 8 10 12 14
SimilaritywithReferencepo
-0.2
0
0.2
0.4
0.6
0.8
1
Max sim at p = 9
Image Recognition Using Similarity Measures
FSM
ZSM
Z-EISM
(c)
Fig. 6 Performance of recognition measures using original image and distort of the original image; (a) The
reference image; (b). The distorted version of it (c). Performance of FSM, ZSM and Z-EISM using non-face image.
Confidence in recognition for FSM, ZSM and Z-EISM is 0.7944, 0.3791 and 0.9937 respectively.
(a) (b)
International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017
Issue 08, Volume 5 (October 2018) www.ijiris.com
___________________________________________________________________________________________________________________________________
IJIRIS: Impact Factor Value – SJIF: Innospace, Morocco (2016): 4.651
Indexcopernicus: (ICV 2016): 88.20
© 2014- 18, IJIRIS- All Rights Reserved Page -482
SimilaritywithReferencep
o
(c)
Fig. 7 Performance of recognition measures using original image and pose image; (a) The reference image; (b).
Different pose and facial expression of reference image (c). Performance of FSM, ZSM and Z-EISM using face image.
Confidence in recognition for FSM, ZSM and Z-EISM is 0.8004, 0.3511 and 0.9930 respectively.
(a) (b)
SimilaritywithReferencepo
(c)
Fig. 8 Performance of recognition measures using original image and pose image; (a) The reference image; (b).
Different pose and facial expression of reference image (c). Performance of FSM, ZSM and Z-EISM using face image.
Confidence in recognition for FSM, ZSM and Z-EISM is 0.6846, 0.4318 and 0.9939 respectively.
(a) (b)
International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017
Issue 08, Volume 5 (October 2018) www.ijiris.com
___________________________________________________________________________________________________________________________________
IJIRIS: Impact Factor Value – SJIF: Innospace, Morocco (2016): 4.651
Indexcopernicus: (ICV 2016): 88.20
© 2014- 18, IJIRIS- All Rights Reserved Page -483
Image index, p
0 5 10 15 20 25 30 35 40 45 50
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
Max sim at p = 11
Image Recognition Using Similarity Measures
FSM
ZSM
Z-EISM
(c)
Fig. 9 Performance of recognition measures using original image and pose image; (a) The reference image; (b).
Different pose and facial expression of reference image (c). Performance of FSM, ZSM and Z-EISM using face image.
Confidence in recognition for FSM, ZSM and Z-EISM is 0.6998, 0.2295 and 0.9937 respectively.
(a) (b)
(c)
Fig. 9 Performance of recognition measures using original image and pose image; (a) The reference image; (b).
Different pose, facial expression and lighting of reference image (c). Performance of FSM, ZSM and Z-EISM using
face image. Confidence in recognition for FSM, ZSM and Z-EISM is 0.6873, 0.4241 and 0.9950 respectively.
The difference in the values of the peaks of each measure is a new feature showing the high performance of the
proposed (Z-EISM). If the distance between the highest match and the second-best match is higher, that means the
measure has better performance and vice versa; i.e., if the distance is less, that means the measure has been
confused in deciding the best match by giving a non-trivial similarity between the different images. The new
feature of recognition confidence can be very useful in security systems of big databases. To show the real
performance of the proposed measure, we provided an average similarity difference using all images as a
reference image and all images as test images. In this case, similarity difference is (best match of reference image)-
(second best match within any other images).
International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017
Issue 08, Volume 5 (October 2018) www.ijiris.com
___________________________________________________________________________________________________________________________________
IJIRIS: Impact Factor Value – SJIF: Innospace, Morocco (2016): 4.651
Indexcopernicus: (ICV 2016): 88.20
© 2014- 18, IJIRIS- All Rights Reserved Page -484
In this paper, we did an average of the similarity as a confidence measure for every images in the TID2008 and IVC
datasets. The global average can be obtained as the mean of all these sub averages. Let denote the similarity
confidence when the image ( ) with the distorted version of it ( ) is the reference image while recognizing image
( ) among all images under distorted ( ), and let refers to number of all images (original images and distorted
images), denotes to the distorted images and denote the number of original images. Then the global
confidence average is taken as = ( ) . Table 1 shows the performance of the proposed ISSM
versus other methods. The preparation of the database that is more suitable for this approach (e.g., in security
applications) should take into consideration some important factors like lighting, expression, and viewpoint, while
the reference image should consider the same factors.
TABLE I- THE GLOBAL AVERAGE SIMILARITY DIFFERENCE OF BEST MATCH AND SECOND-BEST MATCH
WITHIN ALL IMAGES.
Measures
All persons
Z-EISM Zernike FSM
Average 0.0704 0.0625 0.0279
V. CONCLUSION
The use of information theory in the field of image similarity assessment or in the field of facial recognition
assessment by finding similarities between images has high accuracy and we have proved the strength and
consistency of this method in our previous work. The application of joint histogram to the entropy in comparing
images gives very accurate results in detecting similarities between images, especially within large image
databases. The integration of more than one algorithm to the similarity of images in one measure where each
algorithm gives the best features; this leads to the stable and reliable results and can be applied in real time to its
efficiency in recognition.
One of the most widely used methods of face recognition is the Zernike moments, which were employed in the
proposed measure by combining with the joint histogram as in equation (15) and getting Zernike-Entropy Image
Similarity (Z-EISM). The proposed measure has been tested with the state of art method based on the statistical
approach of finding similarities between the images and thus we proved that the method that depends on the
information theory is more efficient than the statistical method. The results show the effectiveness of the
proposed approach and we will develop it in future work by adding other features that have a stronger effect in
extracting image features
REFERENCE
[1]. Chalom, Edmond, Eran Asa, and Elior Biton. "Measuring image similarity: an overview of some useful
applications." IEEE Instrumentation & Measurement Magazine 16.1 (2013): 24-28.
[2]. Chandler, Damon M. "Seven challenges in image quality assessment: past, present, and future
research." ISRN Signal Processing 2013 (2013).
[3]. Chandler, Damon M., Md Mushfiqul Alam, and Thien D. Phan. "Seven challenges for image quality
research." Human Vision and Electronic Imaging XIX. Vol. 9014. International Society for Optics and
Photonics, 2014.
[4]. Lajevardi, Seyed Mehdi, and Zahir M. Hussain. "Zernike moments for facial expression recognition." rn 2
(2009): 3.
[5]. Lajevardi, Seyed Mehdi, and Zahir M. Hussain. "Higher order orthogonal moments for invariant facial
expression recognition." Digital Signal Processing 20.6 (2010): 1771-1779.
[6]. Pass, Greg, and Ramin Zabih. "Comparing images using joint histograms." Multimedia systems 7.3 (1999):
234-240.
[7]. Shnain, Noor Abdalrazak, Zahir M. Hussain, and Song Feng Lu. "A feature-based structural measure: An
image similarity measure for face recognition." Applied Sciences 7.8 (2017): 786.
[8]. Wang, Zhou, et al. "Image quality assessment: from error visibility to structural similarity." IEEE
transactions on image processing 13.4 (2004): 600-612.
[9]. Zhang, Lin, et al. "FSIM: a feature similarity index for image quality assessment." IEEE transactions on
Image Processing20.8 (2011): 2378-2386.
[10]. Aljanabi, Mohammed Abdulameer, Zahir M. Hussain, and Song Feng Lu. "An entropy-histogram approach
for image similarity and face recognition." Mathematical Problems in Engineering 2018 (2018).
[11]. Aljanabi, Mohammed Abdulameer, Noor Abdalrazak Shnain, and Song Feng Lu. "An image similarity
measure based on joint histogram—Entropy for face recognition." Computer and Communications (ICCC),
2017 3rd IEEE International Conference on. IEEE, 2017.
International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017
Issue 08, Volume 5 (October 2018) www.ijiris.com
___________________________________________________________________________________________________________________________________
IJIRIS: Impact Factor Value – SJIF: Innospace, Morocco (2016): 4.651
Indexcopernicus: (ICV 2016): 88.20
© 2014- 18, IJIRIS- All Rights Reserved Page -485
[12]. Hwang, Sun-Kyoo, and Whoi-Yul Kim. "A novel approach to the fast computation of Zernike
moments." Pattern Recognition 39.11 (2006): 2065-2076.
[13]. Canny, John. "A computational approach to edge detection." IEEE Transactions on pattern analysis and
machine intelligence 6 (1986): 679-698.
[14]. Picard, C. F. "The use of information theory in the study of the diversity of biological populations." Proc.
Fifth Berk. Symp. IV. 1979.
[15]. Ponomarenko, Nikolay, et al. "TID2008-a database for evaluation of full-reference visual quality assessment
metrics." Advances of Modern Radioelectronics 10.4 (2009): 30-45.
[16]. Ninassi, A., P. Le Callet, and F. Autrusseau. "Subjective quality assessment-IVC database." online]
http://www. irccyn. ec-nantes. fr/ivcdb (2006).
[17]. “Laboratories, A.T. The Database of Faces,”
http://www.cl.cam.ac.uk/research/dtg/attarchive/facedatabase.html
[18]. “FEI Face Database,” http://fei.edu.br/∼cet/facedatabase.html

More Related Content

What's hot

11.comparative analysis and evaluation of image imprinting algorithms
11.comparative analysis and evaluation of image imprinting algorithms11.comparative analysis and evaluation of image imprinting algorithms
11.comparative analysis and evaluation of image imprinting algorithmsAlexander Decker
 
F010224446
F010224446F010224446
F010224446
IOSR Journals
 
15 8484 9348-1-rv crowd edit septian
15 8484 9348-1-rv crowd edit septian15 8484 9348-1-rv crowd edit septian
15 8484 9348-1-rv crowd edit septian
IAESIJEECS
 
Analysis of Digital Image Forgery Detection using Adaptive Over-Segmentation ...
Analysis of Digital Image Forgery Detection using Adaptive Over-Segmentation ...Analysis of Digital Image Forgery Detection using Adaptive Over-Segmentation ...
Analysis of Digital Image Forgery Detection using Adaptive Over-Segmentation ...
IRJET Journal
 
LEARNING BASES OF ACTICITY
LEARNING BASES OF ACTICITYLEARNING BASES OF ACTICITY
LEARNING BASES OF ACTICITY
Padma Kannan
 
H0334749
H0334749H0334749
H0334749
iosrjournals
 
Segmentation of MR Images using Active Contours: Methods, Challenges and Appl...
Segmentation of MR Images using Active Contours: Methods, Challenges and Appl...Segmentation of MR Images using Active Contours: Methods, Challenges and Appl...
Segmentation of MR Images using Active Contours: Methods, Challenges and Appl...
AM Publications
 
Fusion of Images using DWT and fDCT Methods
Fusion of Images using DWT and fDCT MethodsFusion of Images using DWT and fDCT Methods
Fusion of Images using DWT and fDCT Methods
IRJET Journal
 
Mri brain image retrieval using multi support vector machine classifier
Mri brain image retrieval using multi support vector machine classifierMri brain image retrieval using multi support vector machine classifier
Mri brain image retrieval using multi support vector machine classifier
srilaxmi524
 
A Hybrid Approach to Face Detection And Feature Extraction
A Hybrid Approach to Face Detection And Feature ExtractionA Hybrid Approach to Face Detection And Feature Extraction
A Hybrid Approach to Face Detection And Feature Extraction
iosrjce
 
Adaptive Image Resizing using Edge Contrasting
Adaptive Image Resizing using Edge ContrastingAdaptive Image Resizing using Edge Contrasting
Adaptive Image Resizing using Edge Contrasting
ijtsrd
 
IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method
IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) MethodIRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method
IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method
IRJET Journal
 
Kh3418561861
Kh3418561861Kh3418561861
Kh3418561861
IJERA Editor
 
V.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEV.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLE
KARTHIKEYAN V
 
ROLE OF HYBRID LEVEL SET IN FETAL CONTOUR EXTRACTION
ROLE OF HYBRID LEVEL SET IN FETAL CONTOUR EXTRACTIONROLE OF HYBRID LEVEL SET IN FETAL CONTOUR EXTRACTION
ROLE OF HYBRID LEVEL SET IN FETAL CONTOUR EXTRACTION
sipij
 
A0340106
A0340106A0340106
A0340106
iosrjournals
 

What's hot (20)

50120130405017 2
50120130405017 250120130405017 2
50120130405017 2
 
11.comparative analysis and evaluation of image imprinting algorithms
11.comparative analysis and evaluation of image imprinting algorithms11.comparative analysis and evaluation of image imprinting algorithms
11.comparative analysis and evaluation of image imprinting algorithms
 
F010224446
F010224446F010224446
F010224446
 
15 8484 9348-1-rv crowd edit septian
15 8484 9348-1-rv crowd edit septian15 8484 9348-1-rv crowd edit septian
15 8484 9348-1-rv crowd edit septian
 
Analysis of Digital Image Forgery Detection using Adaptive Over-Segmentation ...
Analysis of Digital Image Forgery Detection using Adaptive Over-Segmentation ...Analysis of Digital Image Forgery Detection using Adaptive Over-Segmentation ...
Analysis of Digital Image Forgery Detection using Adaptive Over-Segmentation ...
 
LEARNING BASES OF ACTICITY
LEARNING BASES OF ACTICITYLEARNING BASES OF ACTICITY
LEARNING BASES OF ACTICITY
 
H0334749
H0334749H0334749
H0334749
 
Segmentation of MR Images using Active Contours: Methods, Challenges and Appl...
Segmentation of MR Images using Active Contours: Methods, Challenges and Appl...Segmentation of MR Images using Active Contours: Methods, Challenges and Appl...
Segmentation of MR Images using Active Contours: Methods, Challenges and Appl...
 
Fusion of Images using DWT and fDCT Methods
Fusion of Images using DWT and fDCT MethodsFusion of Images using DWT and fDCT Methods
Fusion of Images using DWT and fDCT Methods
 
Mri brain image retrieval using multi support vector machine classifier
Mri brain image retrieval using multi support vector machine classifierMri brain image retrieval using multi support vector machine classifier
Mri brain image retrieval using multi support vector machine classifier
 
A Hybrid Approach to Face Detection And Feature Extraction
A Hybrid Approach to Face Detection And Feature ExtractionA Hybrid Approach to Face Detection And Feature Extraction
A Hybrid Approach to Face Detection And Feature Extraction
 
40120140505017
4012014050501740120140505017
40120140505017
 
50120130405009
5012013040500950120130405009
50120130405009
 
Adaptive Image Resizing using Edge Contrasting
Adaptive Image Resizing using Edge ContrastingAdaptive Image Resizing using Edge Contrasting
Adaptive Image Resizing using Edge Contrasting
 
Ijetcas14 447
Ijetcas14 447Ijetcas14 447
Ijetcas14 447
 
IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method
IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) MethodIRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method
IRJET- Copy-Move Forgery Detection using Discrete Wavelet Transform (DWT) Method
 
Kh3418561861
Kh3418561861Kh3418561861
Kh3418561861
 
V.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEV.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLE
 
ROLE OF HYBRID LEVEL SET IN FETAL CONTOUR EXTRACTION
ROLE OF HYBRID LEVEL SET IN FETAL CONTOUR EXTRACTIONROLE OF HYBRID LEVEL SET IN FETAL CONTOUR EXTRACTION
ROLE OF HYBRID LEVEL SET IN FETAL CONTOUR EXTRACTION
 
A0340106
A0340106A0340106
A0340106
 

Similar to ZERNIKE-ENTROPY IMAGE SIMILARITY MEASURE BASED ON JOINT HISTOGRAM FOR FACE RECOGNITION

Face Annotation using Co-Relation based Matching for Improving Image Mining ...
Face Annotation using Co-Relation based Matching  for Improving Image Mining ...Face Annotation using Co-Relation based Matching  for Improving Image Mining ...
Face Annotation using Co-Relation based Matching for Improving Image Mining ...
IRJET Journal
 
(2011) Comparison of Face Image Quality Metrics
(2011) Comparison of Face Image Quality Metrics(2011) Comparison of Face Image Quality Metrics
(2011) Comparison of Face Image Quality Metrics
International Center for Biometric Research
 
A Hybrid Approach to Recognize Facial Image using Feature Extraction Method
A Hybrid Approach to Recognize Facial Image using Feature Extraction MethodA Hybrid Approach to Recognize Facial Image using Feature Extraction Method
A Hybrid Approach to Recognize Facial Image using Feature Extraction Method
IRJET Journal
 
Comparative analysis of augmented datasets performances of age invariant face...
Comparative analysis of augmented datasets performances of age invariant face...Comparative analysis of augmented datasets performances of age invariant face...
Comparative analysis of augmented datasets performances of age invariant face...
journalBEEI
 
An Approach to Face Recognition Using Feed Forward Neural Network
An Approach to Face Recognition Using Feed Forward Neural NetworkAn Approach to Face Recognition Using Feed Forward Neural Network
An Approach to Face Recognition Using Feed Forward Neural Network
Editor IJCATR
 
IRJET- A Review on Various Approaches of Face Recognition
IRJET- A Review on Various Approaches of Face RecognitionIRJET- A Review on Various Approaches of Face Recognition
IRJET- A Review on Various Approaches of Face Recognition
IRJET Journal
 
IRJET- A Survey on Image Retrieval using Machine Learning
IRJET- A Survey on Image Retrieval using Machine LearningIRJET- A Survey on Image Retrieval using Machine Learning
IRJET- A Survey on Image Retrieval using Machine Learning
IRJET Journal
 
Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...
Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...
Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...
IRJET Journal
 
Age Invariant Face Recognition using Convolutional Neural Network
Age Invariant Face Recognition using Convolutional  Neural Network Age Invariant Face Recognition using Convolutional  Neural Network
Age Invariant Face Recognition using Convolutional Neural Network
IJECEIAES
 
Novel framework for optimized digital forensic for mitigating complex image ...
Novel framework for optimized digital forensic  for mitigating complex image ...Novel framework for optimized digital forensic  for mitigating complex image ...
Novel framework for optimized digital forensic for mitigating complex image ...
IJECEIAES
 
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET TransformRotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
IRJET Journal
 
Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...
Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...
Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...
IJERA Editor
 
Real time voting system using face recognition for different expressions and ...
Real time voting system using face recognition for different expressions and ...Real time voting system using face recognition for different expressions and ...
Real time voting system using face recognition for different expressions and ...
eSAT Publishing House
 
Visual Saliency Model Using Sift and Comparison of Learning Approaches
Visual Saliency Model Using Sift and Comparison of Learning ApproachesVisual Saliency Model Using Sift and Comparison of Learning Approaches
Visual Saliency Model Using Sift and Comparison of Learning Approaches
csandit
 
REVIEW OF FACE DETECTION SYSTEMS BASED ARTIFICIAL NEURAL NETWORKS ALGORITHMS
REVIEW OF FACE DETECTION SYSTEMS BASED ARTIFICIAL NEURAL NETWORKS ALGORITHMSREVIEW OF FACE DETECTION SYSTEMS BASED ARTIFICIAL NEURAL NETWORKS ALGORITHMS
REVIEW OF FACE DETECTION SYSTEMS BASED ARTIFICIAL NEURAL NETWORKS ALGORITHMS
ijma
 
Review of face detection systems based artificial neural networks algorithms
Review of face detection systems based artificial neural networks algorithmsReview of face detection systems based artificial neural networks algorithms
Review of face detection systems based artificial neural networks algorithms
ijma
 
PRE-PROCESSING TECHNIQUES FOR FACIAL EMOTION RECOGNITION SYSTEM
PRE-PROCESSING TECHNIQUES FOR FACIAL EMOTION RECOGNITION SYSTEMPRE-PROCESSING TECHNIQUES FOR FACIAL EMOTION RECOGNITION SYSTEM
PRE-PROCESSING TECHNIQUES FOR FACIAL EMOTION RECOGNITION SYSTEM
IAEME Publication
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
ijceronline
 
K017247882
K017247882K017247882
K017247882
IOSR Journals
 

Similar to ZERNIKE-ENTROPY IMAGE SIMILARITY MEASURE BASED ON JOINT HISTOGRAM FOR FACE RECOGNITION (20)

Face Annotation using Co-Relation based Matching for Improving Image Mining ...
Face Annotation using Co-Relation based Matching  for Improving Image Mining ...Face Annotation using Co-Relation based Matching  for Improving Image Mining ...
Face Annotation using Co-Relation based Matching for Improving Image Mining ...
 
(2011) Comparison of Face Image Quality Metrics
(2011) Comparison of Face Image Quality Metrics(2011) Comparison of Face Image Quality Metrics
(2011) Comparison of Face Image Quality Metrics
 
A Hybrid Approach to Recognize Facial Image using Feature Extraction Method
A Hybrid Approach to Recognize Facial Image using Feature Extraction MethodA Hybrid Approach to Recognize Facial Image using Feature Extraction Method
A Hybrid Approach to Recognize Facial Image using Feature Extraction Method
 
Comparative analysis of augmented datasets performances of age invariant face...
Comparative analysis of augmented datasets performances of age invariant face...Comparative analysis of augmented datasets performances of age invariant face...
Comparative analysis of augmented datasets performances of age invariant face...
 
An Approach to Face Recognition Using Feed Forward Neural Network
An Approach to Face Recognition Using Feed Forward Neural NetworkAn Approach to Face Recognition Using Feed Forward Neural Network
An Approach to Face Recognition Using Feed Forward Neural Network
 
IRJET- A Review on Various Approaches of Face Recognition
IRJET- A Review on Various Approaches of Face RecognitionIRJET- A Review on Various Approaches of Face Recognition
IRJET- A Review on Various Approaches of Face Recognition
 
IRJET- A Survey on Image Retrieval using Machine Learning
IRJET- A Survey on Image Retrieval using Machine LearningIRJET- A Survey on Image Retrieval using Machine Learning
IRJET- A Survey on Image Retrieval using Machine Learning
 
Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...
Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...
Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...
 
Age Invariant Face Recognition using Convolutional Neural Network
Age Invariant Face Recognition using Convolutional  Neural Network Age Invariant Face Recognition using Convolutional  Neural Network
Age Invariant Face Recognition using Convolutional Neural Network
 
G041041047
G041041047G041041047
G041041047
 
Novel framework for optimized digital forensic for mitigating complex image ...
Novel framework for optimized digital forensic  for mitigating complex image ...Novel framework for optimized digital forensic  for mitigating complex image ...
Novel framework for optimized digital forensic for mitigating complex image ...
 
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET TransformRotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
 
Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...
Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...
Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...
 
Real time voting system using face recognition for different expressions and ...
Real time voting system using face recognition for different expressions and ...Real time voting system using face recognition for different expressions and ...
Real time voting system using face recognition for different expressions and ...
 
Visual Saliency Model Using Sift and Comparison of Learning Approaches
Visual Saliency Model Using Sift and Comparison of Learning ApproachesVisual Saliency Model Using Sift and Comparison of Learning Approaches
Visual Saliency Model Using Sift and Comparison of Learning Approaches
 
REVIEW OF FACE DETECTION SYSTEMS BASED ARTIFICIAL NEURAL NETWORKS ALGORITHMS
REVIEW OF FACE DETECTION SYSTEMS BASED ARTIFICIAL NEURAL NETWORKS ALGORITHMSREVIEW OF FACE DETECTION SYSTEMS BASED ARTIFICIAL NEURAL NETWORKS ALGORITHMS
REVIEW OF FACE DETECTION SYSTEMS BASED ARTIFICIAL NEURAL NETWORKS ALGORITHMS
 
Review of face detection systems based artificial neural networks algorithms
Review of face detection systems based artificial neural networks algorithmsReview of face detection systems based artificial neural networks algorithms
Review of face detection systems based artificial neural networks algorithms
 
PRE-PROCESSING TECHNIQUES FOR FACIAL EMOTION RECOGNITION SYSTEM
PRE-PROCESSING TECHNIQUES FOR FACIAL EMOTION RECOGNITION SYSTEMPRE-PROCESSING TECHNIQUES FOR FACIAL EMOTION RECOGNITION SYSTEM
PRE-PROCESSING TECHNIQUES FOR FACIAL EMOTION RECOGNITION SYSTEM
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
 
K017247882
K017247882K017247882
K017247882
 

More from AM Publications

DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
AM Publications
 
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
AM Publications
 
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNTHE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
AM Publications
 
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
AM Publications
 
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
AM Publications
 
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
AM Publications
 
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
AM Publications
 
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
AM Publications
 
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONHMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
AM Publications
 
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
AM Publications
 
INTELLIGENT BLIND STICK
INTELLIGENT BLIND STICKINTELLIGENT BLIND STICK
INTELLIGENT BLIND STICK
AM Publications
 
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
AM Publications
 
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
AM Publications
 
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
AM Publications
 
OPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNOPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNN
AM Publications
 
DETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTDETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECT
AM Publications
 
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTSIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
AM Publications
 
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
AM Publications
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
AM Publications
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
AM Publications
 

More from AM Publications (20)

DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
 
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
 
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNTHE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
 
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
 
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
 
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
 
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
 
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
 
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONHMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
 
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
 
INTELLIGENT BLIND STICK
INTELLIGENT BLIND STICKINTELLIGENT BLIND STICK
INTELLIGENT BLIND STICK
 
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
 
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
 
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
 
OPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNOPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNN
 
DETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTDETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECT
 
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTSIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
 
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
 

Recently uploaded

Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
veerababupersonal22
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Basic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparelBasic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparel
top1002
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
ssuser7dcef0
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABSDESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
itech2017
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
symbo111
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 

Recently uploaded (20)

Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Basic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparelBasic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparel
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABSDESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 

ZERNIKE-ENTROPY IMAGE SIMILARITY MEASURE BASED ON JOINT HISTOGRAM FOR FACE RECOGNITION

  • 1. International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017 Issue 08, Volume 5 (October 2018) www.ijiris.com ___________________________________________________________________________________________________________________________________ IJIRIS: Impact Factor Value – SJIF: Innospace, Morocco (2016): 4.651 Indexcopernicus: (ICV 2016): 88.20 © 2014- 18, IJIRIS- All Rights Reserved Page -475 ZERNIKE-ENTROPY IMAGE SIMILARITY MEASURE BASED ON JOINT HISTOGRAM FOR FACE RECOGNITION Mohammed Abdulameer Aljanabi* School of Computer Science and Technology, Huazhong University of Science and Technology, China mohammed@hust.edu.cn Zahir M. Hussain Faculty of Computer Science & Mathematics, University of Kufa, Iraq zmhussain@ieee.org NoorAbd Alrazak Shnain School of Computer Science and Technology, Huazhong University of Science and Technology, China nooraljanabi@hust.edu.cn Song Feng Lu School of Computer Science and Technology, Huazhong University of Science and Technology, China Shenzhen Huazhong University of Science and Technology Research Institute, China lusongfeng@hust.edu.cn Manuscript History Number: IJIRIS/RS/Vol.05/Issue08/OCIS10080 DOI: 10.26562/IJIRAE.2018.OCIS10080 Received: 04, October 2018 Final Correction: 10, October 2018 Final Accepted: 14, October 2018 Published: October 2018 Citation: Abdulameer, A. M., M., H. Z., Alrazak, S. N. A. & Lu, S. F. (2018). ZERNIKE-ENTROPY IMAGE SIMILARITY MEASURE BASED ON JOINT HISTOGRAM FOR FACE RECOGNITION. IJIRIS:: International Journal of Innovative Research in Information Security, Volume V, 475-485. doi://10.26562/IJIRIS.2018.OCIS10080 Editor: Dr.A.Arul L.S, Chief Editor, IJIRIS, AM Publications, India Copyright: ©2018 This is an open access article distributed under the terms of the Creative Commons Attribution License, Which Permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited Abstract— The direction of image similarity for face recognition required a combination of powerful tools and stable in case of any challenges such as different illumination, various environment and complex poses etc. In this paper, we combined very robust measures in image similarity and face recognition which is Zernike moment and information theory in one proposed measure namely Zernike-Entropy Image Similarity Measure (Z-EISM). Z-EISM based on incorporates the concepts of Picard entropy and a modified one dimension version of the two dimensions joint histogram of the two images under test. Four datasets have been used to test, compare, and prove that the proposed Z-EISM has better performance than the existing measures. Keywords: Zernike moment; Entropy; Joint Histogram; Feature-based structural measure; Statistical approaches; I. INTRODUCTION Digital image processing is a wide scope and the images similarity or facial recognition are more interesting and significant topics in the image processing field because of its process a sensitive case in the security systems. The comparison of any two images to finding the similarity and dissimilarity between them by using image similarity metric has several purposes, some examples of image similarity applications include image searches on the internet whether for personal or for detecting copyright infringement. Another application of image similarity measures for reconstructing a large still image from a database of small images [1].
  • 2. International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017 Issue 08, Volume 5 (October 2018) www.ijiris.com ___________________________________________________________________________________________________________________________________ IJIRIS: Impact Factor Value – SJIF: Innospace, Morocco (2016): 4.651 Indexcopernicus: (ICV 2016): 88.20 © 2014- 18, IJIRIS- All Rights Reserved Page -476 Perhaps the most important image similarity application is its use for the security purposes through finding the similarity between two face images and this is our point in this paper and our proposed metric is more confident to decide the proper face image and non-face image. For each technique, there are some challenges facing the researchers and the developers of this technique. For images similarity approach also we have some challenges essential. Some of these challenges are fundamental and actively being researched. Some are resolved relatively, and others remain largely unsolved. The challenge of designing a model of human visual processing which can cope with natural images and this case need to improve the model of the primary visual cortex, more ground-truth data on natural images, and models that incorporate processing by higher-level visual areas. Researchers also face a problem when designing an algorithm that can cope with the diversity of distortions that image similarity algorithms can face. Distortion of the image's appearance is a particular challenge when researchers want to design an algorithm for image similarity. In fact, there are differences between distortions perceived as additive and distortions that affect the image's objects. There is a need for adaptive visual approaches and other high-level effects that humans use when judging quality. Images that are simultaneously distorted by multiple types of distortions are an interesting challenge for researchers who design and improve image similarity approaches; where the effects of multiple distortions on image quality and the potential perceptual interactions between the distortions and their joint effects on images. Geometric changes to images are one of the challenges of image similarity algorithms faced by researchers [2]. Other challenges in image similarity technique stem from lack of complete perceptual models for natural images, supra threshold distortions, interactions between distortions and images, images containing multiple and non-traditional distortions, and images containing enhancements. The objective of this paper is not only to highlight the limitations in our current knowledge of image quality, but to also emphasize the need for additional fundamental research in similarity perception [3]. This paper handles the information-theoretic approach and includes the following sections: Section 2 describes the related works that give high-performance measures; Section 3 presents the existing measures and the proposed measure; Section 4 shows simulation results and discussion, and Section 5 presents conclusions and future work. II. RELATED WORKS Due to the many works which are used the same existing measures for comparison in image similarity or facial recognition because of the robustness of these measures, so the idea of this section is to overview the related works with the proposed work in this paper. In general, the Zernike moment is the best for face recognition tasks. This orthogonal moment is better than other types of moments in terms of information redundancy and image representation, so Zernike moments are very popular in image analysis due to its feature representation capability with minimal information redundancy and due to its low dimension and enhanced discriminatory power even under noisy environment. In 2009 S. Lajevardi and Z. Hussain presented a facial expression recognition system using Zernike moment as a feature extractor and they considered the challenges that face this system such as the illumination condition, pose, rotation, noise and others. The experimental results show that the presented system has high performance and good results obtained in images with noise and rotation whereas feature extraction time rate is slower than other methods [4]. In 2010 respectively the same authors (Lajevardi & Hussain) proposed a rotation and noise invariant face recognition system using an orthogonal invariant moment as a feature extractor and Naive Bayesian as classifier. The system is tested under different facial expressions, illumination condition, pose, rotation, noise and others. Simulation results on different databases indicated observed that the high performance of the proposed system [5]. The proposed metric in this paper is mainly based on the combination of the Zernike moment and entropy. Simultaneously, the proposed measure based on incorporates the concepts of Picard entropy and a modified 1D version of the 2D joint histogram of the two images under test. G. Pass and R. Zabih proposed a joint histogram which is an alternative to the colour histogram and incorporates further information without losing the accuracy of the colour histogram. Joint Histogram (JH) constructed based on a set of local pixel features and constructing a multidimensional histogram. Each entry in JH contains the number of pixels in the image that is described by a particular combination of feature values. Evaluate the performance of JH on a database with over 210,000 images. JH outperform colour histograms by an order of magnitude when using it to find the similarity of images [6]. Overall there are two directions in image similarity assessment: statistical-based and information-theoretic based measures. The state of art statistical measure has been proposed by NA Shnain et al [7], called, FSM, used the best features of the traditional image similarity measure called SSIM [8] and the feature similarity index measure called (FSIM) [9] for image-quality assessment, while the information theory measures have been used for the sake of image similarity and face recognition or image similarity for face recognition by MA Aljanabi et al. [10], [11]. III. THE EXISTING MEASURES AND THE PROPOSED MEASURE It's a good plan to utilize the combination of more than one measure and balance them mathematically to get one algorithm can use the whole features of each metric which are used in the proposed algorithm. Two existing images similarity and face recognition measures addressed in this paper, one for combination and other for comparison.
  • 3. International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017 Issue 08, Volume 5 (October 2018) www.ijiris.com ___________________________________________________________________________________________________________________________________ IJIRIS: Impact Factor Value – SJIF: Innospace, Morocco (2016): 4.651 Indexcopernicus: (ICV 2016): 88.20 © 2014- 18, IJIRIS- All Rights Reserved Page -477 A. Zernike Moments (ZMs) A type of moment function; considers an efficient global image descriptors. It is mapping an image onto a set of complex Zernike polynomials; these polynomials are orthogonal to each other. The orthogonality of Zernike moments can appear the properties of an image without any redundancy or overlap of information between the moments, this characteristic makes each moment to be unique of the information in an image. Due to these properties, Zernike moments have been used as feature sets in applications such as pattern recognition, content- based image retrieval, and other image analysis systems. In this work we will extract various Zernike moments (Zernike domain) as face features, then define a similarity measure after imposing a distance measure in this domain. The distance measure will be Euclidean distance metrics. The ZMs of an image function with order and repetition are given as[12]: (1) The radial polynomial is given in this equation: (2) When and is even. The discrete approximation of equation (1) is defined as: (3) Where and when ; (4) The features of an image can be represented by a vector of selected Zernike moments and the features of image can represent by a vector . The Euclidean Metric is the distance measure which is applied to feature vectors of two images in the Zernike domain as in following equation: (5) B. Feature-Based Structural Measure (FSM) FSM is an efficient state-of-art similarity measure [8], based on combining the best features and statistical properties provided by SSIM and FSIM, trading off between their performances for similar and dissimilar images. While Canny edge detector added a distinctive structural feature, where (after processing by Canny’s edge filter [13]) two binary images, and , are obtained from the original two images x and y. FSM can be given by: (6) where, represents FSM similarity between two images and ; usually, represents the reference image and represents a corrupted version of ; represents the feature similarity measure (FSIM) where given by (7)
  • 4. International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017 Issue 08, Volume 5 (October 2018) www.ijiris.com ___________________________________________________________________________________________________________________________________ IJIRIS: Impact Factor Value – SJIF: Innospace, Morocco (2016): 4.651 Indexcopernicus: (ICV 2016): 88.20 © 2014- 18, IJIRIS- All Rights Reserved Page -478 And represents the structural similarity measure (SSIM) given by (8) The constants are chosen as =5, =3 and =7, while =0.01 is added to balance the quotient and avoid division by zero. The function refers to the global 2D correlation between the images, as follows: (9) where and are the image global means. This function is applied here as on the new images obtained from the application of edge detection to the original images and . C. Zernike-Entropy Image Similarity Measure (Z-EISM) In this paper, two main tools have been employed in our introduced measure, one of them is Zernike moments which is proven effective in the extraction of image features, and the other one was based information theoretic approach, represented by entropy because the information theory has a high capability to predict the relationship between image intensity values. In this paper, we use Picard entropy [14] and apply it to image a joint histogram as a probabilistic distribution and then combined the result with the Zernike approach. The proposed measure is given by flowing formulas respectively: (10) where is a Picard entropy and . is a discrete random variable, and is corresponding probabilities for . After this definition of entropy, then we have to applied entropy to the joint histogram as follows: A 2D joint histogram entry for two images and represents the probability that a pixel intensity value from image co-occurs with pixel intensity value from image . The normalized joint histogram for two images x and y of size is defined here as follows: where: or: Now we apply the entropy to measure the information held in the joint histogram that represents the joint probability of pixel co-occurrence. Note that both and range from to . First, the Picard entropy measure is applied to get Picard-Histogram Similarity Measure (PHS) as follows: where reshapes the 2D joint histogram into a one-dimensional column vector via the colon operator, as defined in MATLAB, with a new dimension and ; . Using other entropies could be more helpful. However, this is beyond the scope of this paper at the moment and will be investigated in future works. Now, after the detailed discretion of the entropy and joint histogram, then we are going to introduce the final formula for the proposed measure. where refers to the similarity between two images and , always represents the reference image and represents a corrupted version of it. denotes to Zernike moments and is the Picard entropy after applied the joint histogram as defined in equation (14).
  • 5. International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017 Issue 08, Volume 5 (October 2018) www.ijiris.com ___________________________________________________________________________________________________________________________________ IJIRIS: Impact Factor Value – SJIF: Innospace, Morocco (2016): 4.651 Indexcopernicus: (ICV 2016): 88.20 © 2014- 18, IJIRIS- All Rights Reserved Page -479 Fig. 1 Eight TID2008 non-face reference images used for the test and comparison image similarity measures. IV. RESULTS AND DISCUSSION In order to prove that the proposed measure is better than current measures, all measures must be tested in abnormal conditions to come out with a measure can be used it in a real-time, more robust and challengeable. To show the excellent results were obtained after applied the introduced measure against FSM and ZM metrics by using MATLAB 2015a, four datasets have been used to evaluate the performance of all measures in this paper. TID2008 [15], IVC [16], AT&T [17] and FEI [18] as a face and non-face images databases for testing. The following figures show these sets respectively. Fig. 2 Ten IVC non-face reference images used for the test and comparison image similarity measures Fig 3 Forty AT&T reference face images, each person have ten deferent poses, facial expression and lighting used for the test and comparison the measures to find image similarity for face recognition.
  • 6. International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017 Issue 08, Volume 5 (October 2018) www.ijiris.com ___________________________________________________________________________________________________________________________________ IJIRIS: Impact Factor Value – SJIF: Innospace, Morocco (2016): 4.651 Indexcopernicus: (ICV 2016): 88.20 © 2014- 18, IJIRIS- All Rights Reserved Page -480 Fig. 4 Fifty FEI reference face images, each person have fourteen deferent pose, facial expression and lighting used for the test and comparison the measures to find image similarity for face recognition. In this test we divided all datasets into two subgroups: testing group and the training group. In training group, we choose a random face image from the faces database and non-face images from the non-face database to be a reference image, and then we select a different facial expression, distortion and pose from the testing group, for the same image as a challenging image to evaluate the performance of measures in recognition and similarity. (a) (b) SimilaritywithReferencepo (c) Fig. 5 Performance of recognition measures using original image and distort of the original image; (a) The reference image; (b). The distorted version of it (c). Performance of FSM, ZSM and Z-EISM using non-face image. Confidence in recognition for FSM, ZSM and Z-EISM is 0.8731, 0.5664 and 0.9951 respectively. In this results, we have two kinds of tests: one is for similarity of images and the other for recognition (face &non- face) to evaluate and test the proposed Z-EISM versus the Zernike moments and FSM, in addition, we will find the average similarity for each measure as a confidence method for the presented measure.
  • 7. International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017 Issue 08, Volume 5 (October 2018) www.ijiris.com ___________________________________________________________________________________________________________________________________ IJIRIS: Impact Factor Value – SJIF: Innospace, Morocco (2016): 4.651 Indexcopernicus: (ICV 2016): 88.20 © 2014- 18, IJIRIS- All Rights Reserved Page -481 In the first test, we used two images (reference image and test image) from the environment of the two databases (TID2008 and IVC, respectively) randomly; note that other images also achieve good results with high performance. Figure (4) have three images: (a) is the reference image, (b) is the test image (distorted version of the reference image) and (c) is the performance of all measures to find the similarity. In the figure (5), we will repeat the process in the previous step but we will change the reference image. Figures (6) and (7) do the test on face images from AT&T and FEI databases. The great results show that the presented measure is outperform the current measures by give big distance function while the others find the proper image but there is low confidence in their decision because there are many cases of distrust (big similarities with wrong images) in their decisions (similarities). This is a big challenge when we employ these measures in security recognition tasks. Even if there are some similar pixels in very different image but the use of joint histogram in our proposed measure never give this result and this is the characteristic of the Zernike-Entropy Image Similarity Measure (Z-EISM). (a) (b) Image index, p 0 2 4 6 8 10 12 14 SimilaritywithReferencepo -0.2 0 0.2 0.4 0.6 0.8 1 Max sim at p = 9 Image Recognition Using Similarity Measures FSM ZSM Z-EISM (c) Fig. 6 Performance of recognition measures using original image and distort of the original image; (a) The reference image; (b). The distorted version of it (c). Performance of FSM, ZSM and Z-EISM using non-face image. Confidence in recognition for FSM, ZSM and Z-EISM is 0.7944, 0.3791 and 0.9937 respectively. (a) (b)
  • 8. International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017 Issue 08, Volume 5 (October 2018) www.ijiris.com ___________________________________________________________________________________________________________________________________ IJIRIS: Impact Factor Value – SJIF: Innospace, Morocco (2016): 4.651 Indexcopernicus: (ICV 2016): 88.20 © 2014- 18, IJIRIS- All Rights Reserved Page -482 SimilaritywithReferencep o (c) Fig. 7 Performance of recognition measures using original image and pose image; (a) The reference image; (b). Different pose and facial expression of reference image (c). Performance of FSM, ZSM and Z-EISM using face image. Confidence in recognition for FSM, ZSM and Z-EISM is 0.8004, 0.3511 and 0.9930 respectively. (a) (b) SimilaritywithReferencepo (c) Fig. 8 Performance of recognition measures using original image and pose image; (a) The reference image; (b). Different pose and facial expression of reference image (c). Performance of FSM, ZSM and Z-EISM using face image. Confidence in recognition for FSM, ZSM and Z-EISM is 0.6846, 0.4318 and 0.9939 respectively. (a) (b)
  • 9. International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017 Issue 08, Volume 5 (October 2018) www.ijiris.com ___________________________________________________________________________________________________________________________________ IJIRIS: Impact Factor Value – SJIF: Innospace, Morocco (2016): 4.651 Indexcopernicus: (ICV 2016): 88.20 © 2014- 18, IJIRIS- All Rights Reserved Page -483 Image index, p 0 5 10 15 20 25 30 35 40 45 50 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 Max sim at p = 11 Image Recognition Using Similarity Measures FSM ZSM Z-EISM (c) Fig. 9 Performance of recognition measures using original image and pose image; (a) The reference image; (b). Different pose and facial expression of reference image (c). Performance of FSM, ZSM and Z-EISM using face image. Confidence in recognition for FSM, ZSM and Z-EISM is 0.6998, 0.2295 and 0.9937 respectively. (a) (b) (c) Fig. 9 Performance of recognition measures using original image and pose image; (a) The reference image; (b). Different pose, facial expression and lighting of reference image (c). Performance of FSM, ZSM and Z-EISM using face image. Confidence in recognition for FSM, ZSM and Z-EISM is 0.6873, 0.4241 and 0.9950 respectively. The difference in the values of the peaks of each measure is a new feature showing the high performance of the proposed (Z-EISM). If the distance between the highest match and the second-best match is higher, that means the measure has better performance and vice versa; i.e., if the distance is less, that means the measure has been confused in deciding the best match by giving a non-trivial similarity between the different images. The new feature of recognition confidence can be very useful in security systems of big databases. To show the real performance of the proposed measure, we provided an average similarity difference using all images as a reference image and all images as test images. In this case, similarity difference is (best match of reference image)- (second best match within any other images).
  • 10. International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017 Issue 08, Volume 5 (October 2018) www.ijiris.com ___________________________________________________________________________________________________________________________________ IJIRIS: Impact Factor Value – SJIF: Innospace, Morocco (2016): 4.651 Indexcopernicus: (ICV 2016): 88.20 © 2014- 18, IJIRIS- All Rights Reserved Page -484 In this paper, we did an average of the similarity as a confidence measure for every images in the TID2008 and IVC datasets. The global average can be obtained as the mean of all these sub averages. Let denote the similarity confidence when the image ( ) with the distorted version of it ( ) is the reference image while recognizing image ( ) among all images under distorted ( ), and let refers to number of all images (original images and distorted images), denotes to the distorted images and denote the number of original images. Then the global confidence average is taken as = ( ) . Table 1 shows the performance of the proposed ISSM versus other methods. The preparation of the database that is more suitable for this approach (e.g., in security applications) should take into consideration some important factors like lighting, expression, and viewpoint, while the reference image should consider the same factors. TABLE I- THE GLOBAL AVERAGE SIMILARITY DIFFERENCE OF BEST MATCH AND SECOND-BEST MATCH WITHIN ALL IMAGES. Measures All persons Z-EISM Zernike FSM Average 0.0704 0.0625 0.0279 V. CONCLUSION The use of information theory in the field of image similarity assessment or in the field of facial recognition assessment by finding similarities between images has high accuracy and we have proved the strength and consistency of this method in our previous work. The application of joint histogram to the entropy in comparing images gives very accurate results in detecting similarities between images, especially within large image databases. The integration of more than one algorithm to the similarity of images in one measure where each algorithm gives the best features; this leads to the stable and reliable results and can be applied in real time to its efficiency in recognition. One of the most widely used methods of face recognition is the Zernike moments, which were employed in the proposed measure by combining with the joint histogram as in equation (15) and getting Zernike-Entropy Image Similarity (Z-EISM). The proposed measure has been tested with the state of art method based on the statistical approach of finding similarities between the images and thus we proved that the method that depends on the information theory is more efficient than the statistical method. The results show the effectiveness of the proposed approach and we will develop it in future work by adding other features that have a stronger effect in extracting image features REFERENCE [1]. Chalom, Edmond, Eran Asa, and Elior Biton. "Measuring image similarity: an overview of some useful applications." IEEE Instrumentation & Measurement Magazine 16.1 (2013): 24-28. [2]. Chandler, Damon M. "Seven challenges in image quality assessment: past, present, and future research." ISRN Signal Processing 2013 (2013). [3]. Chandler, Damon M., Md Mushfiqul Alam, and Thien D. Phan. "Seven challenges for image quality research." Human Vision and Electronic Imaging XIX. Vol. 9014. International Society for Optics and Photonics, 2014. [4]. Lajevardi, Seyed Mehdi, and Zahir M. Hussain. "Zernike moments for facial expression recognition." rn 2 (2009): 3. [5]. Lajevardi, Seyed Mehdi, and Zahir M. Hussain. "Higher order orthogonal moments for invariant facial expression recognition." Digital Signal Processing 20.6 (2010): 1771-1779. [6]. Pass, Greg, and Ramin Zabih. "Comparing images using joint histograms." Multimedia systems 7.3 (1999): 234-240. [7]. Shnain, Noor Abdalrazak, Zahir M. Hussain, and Song Feng Lu. "A feature-based structural measure: An image similarity measure for face recognition." Applied Sciences 7.8 (2017): 786. [8]. Wang, Zhou, et al. "Image quality assessment: from error visibility to structural similarity." IEEE transactions on image processing 13.4 (2004): 600-612. [9]. Zhang, Lin, et al. "FSIM: a feature similarity index for image quality assessment." IEEE transactions on Image Processing20.8 (2011): 2378-2386. [10]. Aljanabi, Mohammed Abdulameer, Zahir M. Hussain, and Song Feng Lu. "An entropy-histogram approach for image similarity and face recognition." Mathematical Problems in Engineering 2018 (2018). [11]. Aljanabi, Mohammed Abdulameer, Noor Abdalrazak Shnain, and Song Feng Lu. "An image similarity measure based on joint histogram—Entropy for face recognition." Computer and Communications (ICCC), 2017 3rd IEEE International Conference on. IEEE, 2017.
  • 11. International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017 Issue 08, Volume 5 (October 2018) www.ijiris.com ___________________________________________________________________________________________________________________________________ IJIRIS: Impact Factor Value – SJIF: Innospace, Morocco (2016): 4.651 Indexcopernicus: (ICV 2016): 88.20 © 2014- 18, IJIRIS- All Rights Reserved Page -485 [12]. Hwang, Sun-Kyoo, and Whoi-Yul Kim. "A novel approach to the fast computation of Zernike moments." Pattern Recognition 39.11 (2006): 2065-2076. [13]. Canny, John. "A computational approach to edge detection." IEEE Transactions on pattern analysis and machine intelligence 6 (1986): 679-698. [14]. Picard, C. F. "The use of information theory in the study of the diversity of biological populations." Proc. Fifth Berk. Symp. IV. 1979. [15]. Ponomarenko, Nikolay, et al. "TID2008-a database for evaluation of full-reference visual quality assessment metrics." Advances of Modern Radioelectronics 10.4 (2009): 30-45. [16]. Ninassi, A., P. Le Callet, and F. Autrusseau. "Subjective quality assessment-IVC database." online] http://www. irccyn. ec-nantes. fr/ivcdb (2006). [17]. “Laboratories, A.T. The Database of Faces,” http://www.cl.cam.ac.uk/research/dtg/attarchive/facedatabase.html [18]. “FEI Face Database,” http://fei.edu.br/∼cet/facedatabase.html