An Integrated Tool for Virtual Restoration of Byzantine Icons
|
|
- Elmer Wright
- 6 years ago
- Views:
Transcription
1 An Integrated Tool for Virtual Restoration of Byzantine Icons Anastasios Maronidis, Chrysanthos Voutounos and Andreas Lanitis Visual Media Computing Lab Dept. of Multimedia and Graphic Arts Cyprus University of Technology P.O. Box 50329, 3036 Lemesos, Cyprus {anastasios.maronidis, c.voutounos, Abstract An integrated tool that can be used for damage detection, shape restoration and texture restoration of faces appearing in Byzantine icons, is presented. The damage detection process involves the estimation of residuals obtained after the coding and reconstruction of face image regions using trained Principal Component Analysis (PCA) texture models. Shape restoration is accomplished using a model-based approach that employs a 3D shape model generated by taking into account a set of geometrical rules adopted by Byzantine style iconographers. Texture restoration is performed using a customized version of the recursive PCA technique. For this purpose dedicated PCA texture models representing different categories of faces appearing in icons, are used. All methods developed as part of the project are incorporated into a userfriendly application, which can be utilized by both amateurs and professionals. Indicative visual and quantitative results show the potential of the developed application. Keywords-Occlusion Detection; Shape Restoration; Texture Restotration; Icon Restoration; Cultural Heritage Preservation I. INTRODUCTION Byzantine art refers to the artistic style associated with Byzantine Empire. A large number of Byzantine icons and frescoes showing different Saints, dating back to the 15th century, can be found in churches and monasteries in Eastern Europe. However, in many occasions Byzantine icons of high historical importance are obscured by several types of distortion caused either by deliberate human actions or by physical causes like humidity, high temperatures, earthquakes, etc., (see Fig. 1). Figure 1. Examples of damaged icons. In this paper we present an integrated application that can be used for digital restoration of faces appearing in icons. The proposed methodology is focused on the restoration of facial regions in icons restoration of the remaining parts can be performed using conventional image retouching methods. The proposed work involves the development of digital image processing techniques that can be used for predicting the overall appearance of faces appearing in icons, even in the cases that such faces are highly damaged. The anticipated results of our work will enable the generation of digitally restored icons leaving in that way the original icons unaffected. Our work in this area contributes towards the virtual preservation of Byzantine cultural heritage. The proposed application consists of several modules that include landmark annotation, shape restoration, damage detection and texture restoration. The landmark annotation module enables the location of a number of visible landmarks on the raw face using a semi-automatic method. The remaining landmarks that correspond to the damaged facial regions are recovered by the shape restoration module. The damage detection module takes the shape-recovered face as input and locates the position and extent of the damage. Finally, the damage-detected icon constitutes the input to the texture restoration module where the texture of the damaged regions is recovered so that the final restored icon is synthesized. The main modules described above are depicted with bold in the block diagram that is provided in Fig. 2. The underlying processes related to each one of them are also contained in Fig. 2 and will be described in the remainder of this paper. In our previous work [1], [2], different aspects of each module were presented and tested. Based on the results from our previous experimentation in the area, in this paper we present improved versions of the algorithms involved. In addition, we also present the integration of all modules into a single tool that can be used either by trained conservators or other individuals interested in icon restoration such as painters, art historians and museum curators. Our work in this area was influenced by the work of professional Byzantine icon conservators that was observed and studied during the process of designing the restoration tool. In addition, our work was influenced by previous research efforts in the area of detecting and eliminating occlusions on human face images [3], [4]. However, because faces in Byzantine icons are governed by unique geometrical and chromatic rules, human face image processing algorithms had to be customized for dealing with the unique case of Byzantine style. To the best of our knowledge, this is the first time that a customized integrated tool for Byzantine icon restoration is presented. The remainder of this paper is organized as follows: In Section II a literature review of related bibliography is presented. The shape restoration, damage detection and texture restoration modules are described in Section III, IV
2 and V, respectively. The results of validation experiments are presented in Section VI. In Section VII, the integrated tool that combines all the modules is described and in Section VIII conclusions and plans for future work are outlined. Figure 2. Block diagram of the main modules along with the underlying processes related to them. II. LITERATURE REVIEW In this section, a brief literature review of previous work on facial occlusion detection and facial texture restoration is presented. Park et al. [3] and Wang et al. [4] describe a method for removing glasses based on the recursive Principal Component Analysis (PCA) method. The occluded regions are enhanced by processing the difference between a PCA-reconstructed and original image. In an iterative procedure, the occluded regions detected in the difference image are replaced by the corresponding pixels from the mean image among the training set until the eyeglasses are removed. Colombo et al. [5] address the problem of occlusion detection and appearance restoration of 3D faces. Occlusions are coarsely detected by examining the local curvature of the 3D face model and a variation of the recursive PCA method is then employed for restoring the appearance of the occluded facial regions. A method based on a 2D morphable face model is proposed in [6] for reconstructing a partially occluded face. Using the undamaged region, the PCA coefficients that minimize the shape and texture difference between an out of sample face image and basis images of the undamaged region are estimated. The optimal coefficients are applied in the occluded regions of the basis images for restoring the occluded facial regions. Occlusion detection methods have also been used for face recognition. In a probabilistic framework, Smet et al. [7] attempt to fit a 3D morphable model to the occluded 2D face image while minimizing the interference of occlusions by using a visibility map. In [8], a separate eigenspace is constructed for different parts of the face. The subspace that represents the localization error of the face is modeled using a mixture of Gaussians. Then Mahalanobis distance associated to the above mixture of Gaussians is used to find the best local match. In [9] Support Vector Machines are used for classifying the skin color and the non-skin color in a face allowing in that way the detection of occluded regions. Kim et al. [10] also utilize an occlusion detection method based on skincolor classification method. In a Bayesian framework, Venkat et al. [11] decompose the face image in sub-regions. For each sub-region, they learn its conditional probability of influencing the face recognition task allowing in that way the recognition of occluded faces. In [12] a Gabor local feature representation combined with sparse representation based classification is used for face recognition. Moreover, an associated Gabor occlusion dictionary computing technique is proposed for dealing with the occluded face recognition problem. III. SHAPE RESTORATION The 2D shape of an icon is defined by a set of 68 landmark points. When an icon is damaged, its shape is represented by the coordinates of the landmarks corresponding to the non-damaged regions. Restoring the shape of an icon involves the recovery of the position of the landmarks that correspond to the damaged regions. A key aspect of our work is the use of a 3D deformable face shape model suitable for representing the geometry of Byzantine faces, the so-called Byzantine Style Specific Model (BSSM). The use of this model enables the shape restoration of a raw icon in a way that guarantees the Byzantine style preservation during the process of shape restoration. The main problem in generating a BSSM is that Byzantine faces are depicted only in 2D icons. Hence, it is not possible to train a BSSM using a set of real 3D samples. Instead, a generic 3D deformable human face model is tuned toward the representation of Byzantine faces. The approach adopted for training a BSSM is outlined in the following subsections. A. Generic Statistical 3D Face Model A training set with 60 laser-scanned 3D human face instances is used for training a generic 3D deformable model [13]. The trained model serves as the basis for a reversible face shape coding scheme where it is possible to code 3D face shapes into a small number of model parameters (about 50) and to generate novel 3D face shapes by setting values to the model parameters. B. Byzantine Specific Statistical 3D Model A BSSM is generated by enforcing rule-based constraints on the model trained using human faces. In this study, a set of 23 geometric Byzantine iconography rules acquired from the related literature [14] form the set of rules used for applying constraints to the human face model. The 23 rules were chosen because they provide an adequate description of the geometric form adapted in Byzantine icons. Some indicative rules are given below: Rule 1: The distance between the lower and the upper edge of the eye is equal to one third of the nose-length. Rule 2: The length of the mouth is in the range between one third to one half of the nose-length. Rule 3: The nose width from wing to wing, the distance between the two upper eyelashes and the distance between the inner edges of the eyes are equal. For each of the 23 geometric rules, a discrepancy metric is defined based on distances between vertices associated with each rule so that given a 3D face it is possible to estimate the deviation of the face from the rule considered.
3 Along these lines the total discrepancy is estimated as the weighted sum of the discrepancies of each of the 23 rules considered. The weights used during the calculation of the total discrepancy were estimated by taking into account the specificity of each rule to the Byzantine icon style. During the process of weight estimation, a dataset with 39 faces extracted from Byzantine icons and a dataset with 76 human faces were used. Images of human faces used in the experiment, were selected so that they display facial expressions and poses similar to the ones encountered in Byzantine icons. All faces from both datasets have been annotated with 68 landmark points and 3D reconstructed using the generic statistical 3D model. For each 3D Byzantine face we calculated its discrepancy for every rule. We then collected these discrepancies and estimated their distributions across the Byzantine icon and human face training sets. For each rule, we calculated the Mahalanobis distance between the distributions of discrepancies between the Byzantine and human samples. The estimated distances among the datasets were used for establishing the weights for each rule so that rules for which the discrepancy between human and Byzantine faces was maximized, received more attention during the estimation of the total discrepancy. In order to generate a BSSM, a number of random synthetic samples are generated by providing random parameter values to the generic 3D shape model. The total weighted discrepancy of each of these samples is calculated based on the Byzantine geometric rules and the distribution of the weighted discrepancies is estimated. By setting a discrepancy threshold as the 3% left side tail of the distribution, the separation of the samples into those that comply and those that do not comply with the Byzantine rules is achieved. The Byzantine compliant samples constitute the training set, for training a BSSM. C. Shape Restoration Using BSSM The synthetic instance of a BSSM whose 3D landmarks when projected to the 2D plane best fit the visible 68 2D landmarks of the raw face comprises the 3D reconstruction of the face. The missing 2D landmarks are restored by projecting the corresponding 3D instance back to the 2D plane. According to the results of a quantitative evaluation [2], the use of a BSSM during the process of shape restoration ensures that the Byzantine style is preserved. An example of the shape restoration approach is illustrated in Fig. 7, (b). IV. DAMAGE DETECTION Recovering the exact position of the 68 2D landmarks via the shape restoration process enables the detection of the position and extent of the damage in the icon. In [15], a set of non-occluded and a set of artificially occluded faces is coded into PCA texture model parameters and reconstructed. The residual values between the original and the reconstructed images are calculated at each pixel for the two sets. Using the distributions of these residuals, each pixel is classified as occluded or non-occluded. The methodology presented in [15] has been extended in an attempt to be customized for detecting the damage on Byzantine icons. Variations of the main methodology with respect to the size of the texture models, the sampling method and the classification approach have been investigated [1], so that the occlusion detection methods that perform better are used in the proposed icon restoration tool. In this section we provide a brief overview of the basic occlusion detection methodology and outline the results of a comparative experimental evaluation. A. Basic Methodology Given a dataset of non-damaged Byzantine faces, a texture PCA model is trained [16]. This model, serves as a space within which a raw face can be represented as a vector that contains a set of parameters. Reversely, a vector that belongs to this space can be mapped as a face in the initial face space. The model can compactly code and reconstruct only non-damaged faces, since it has been trained using only such faces. When attempting to code and reconstruct a damaged face, where the damaged regions display textural variation not encountered in the training set, the reconstructed face should differ from the original. Therefore the differences between the intensities of original pixel and the corresponding reconstructed ones (i.e. the residuals) are expected to be larger in the damaged regions. This evidence is exploited in order to efficiently detect the damages on an icon. The basic method consists of the training and detection phases as outlined below. 1) Training Phase The training phase requires a dataset of non-damaged Byzantine icons. For each icon, a set of 68 landmarks is firstly located in order to outline the shape of the faces in the training set. Using these landmarks, the face in each icon is warped into the mean shape, producing a corresponding shape-free face. Using the set of the warped non-damaged faces, a PCA texture model is trained. In a next step, the non-damaged data samples are corrupted by overlaying occlusions in the form of uniform noise, Gaussian noise or constant RGB value producing a second dataset containing artificially occluded icons. For each dataset separately, the samples are coded into the texture PCA model parameters and subsequently reconstructed and the residuals at each pixel are calculated. The above procedure results in two residual distributions per pixel: the non-damaged pixel and the damaged pixel residual distribution. 2) Detection Phase Given a damaged raw face along with the set of 68 2D landmarks, as this has been recovered during the shape restoration process, the raw face is warped to the mean reference face extracted from the training phase. Based on the residual values obtained from the face codereconstruction scheme, each pixel is classified to the damaged or non-damaged distribution allowing in that way the detection of possible occlusions. B. Modified Methodology Several variations of the basic method presented above, were evaluated experimentally in [1]. In particular, variations
4 of the basic methods related to the size of the local facial regions considered, the sampling method and the classification algorithm were considered. Variations related to the local region include test cases where the shape-free facial region is treated as a single region (Holistic approach), cases where the shape-free region is divided into multiple non-overlapping local patches and cases where the shape-free region is divided into multiple overlapping local patches. Moreover, two different sampling schemes are investigated: the canonical and the interlaced scheme. The canonical sampling involves the extraction of all intensity values within the region of interest (ROI). The interlaced scheme decomposes the ROI into two pixel-vectors: the odd and the even vector and substitutes the odd pixels with the corresponding pixels of the mean local region derived from the training set. For classifying the pixels to damaged or non-damaged, a voting rule and a Support Vector Machine (SVM) are used. When the voting rule is used, a patch is classified as damaged or non-damaged, according to the majority pixellabels. When an SVM is used, each patch is considered as a vector and an SVM is trained using these vectors for all training samples. An out of sample patch is then assigned as damaged or non-damaged based on the corresponding trained SVM classifier. The most efficient method for damage detection in Byzantine icons was determined through a comprehensive experimental evaluation. Within this framework icons were artificially occluded with regions of different sizes and different intensities. The accuracy of damage detection of each method was determined by considering the ratio of the number of correctly classified pixels over the total number of pixels in the facial region. According to the results, the Holistic approach utilizing the interlaced scheme outperforms the rest of the methods with a damage detection accuracy of 92.6%. More details related to the damage detection methods, experimental evaluation and results are presented in [1]. V. TEXTURE RESTORATION Once the damaged pixels on a raw icon are detected, the texture restoration process is initiated by utilizing the recursive PCA technique [3], [4]. This technique combines the texture information from the non-damaged pixels of the face along with the texture information of a trained PCA texture model in order to predict the texture of the damaged pixels. Texture restoration is performed on the 3D reconstructed face so that the proposed methods can be applied to faces of varying orientations. The restored 3D face is finally rendered onto the 2D plane. A. Recursive PCA A texture PCA model is trained using 101 3D reconstructed non-damaged icons. This model forms the basis for the reversible coding of an arbitrary icon into a number of model parameters. During the application of the recursive PCA method, the most similar sample to the raw icon from the training dataset is located by comparing the texture difference between the non-damaged regions of the raw icon and each data sample. The texture of the damaged regions of the raw icon is then replaced by the corresponding texture of the selected sample. This step guarantees a reasonable initialization of the restoration process. In a second step, the whole texture of the new icon is coded into the model parameters and reconstructed back to the initial face space. The difference between the texture that belongs to the non-damaged regions of the reconstructed and the original face is calculated. If this difference is minimized, the process is completed. Otherwise, the texture of the non-damaged regions of the resulting face is replaced by the texture of the original face and the process is recurred. The basic methodology that has been described in the previous subsection uses the whole set of icons for training a global texture PCA model. An alternative method that utilizes sub-sets of the training set that contain samples most similar to the given images, is also implemented. Within this context, subsets showing different Saints are used for training models that are more specific to the given icon. VI. VALIDATION EXPERIMENTS We have conducted a series of experiments for validating the performance of the presented methodology for restoring Byzantine icons. 1) BSSM Validation The ability of using a BSSM for shape restoration is heavily based on the efficient enforcement of Byzantine style geometric rules that allow the estimation of the discrepancy of a 3D face shape from Byzantine faces. An experiment that aims to assess the specificity of the weighted discrepancy metric to Byzantine faces was staged. For each Byzantine and real face from the image sets described in section III.B we estimated both the mean weighted discrepancy (as defined in section III.B) and the mean non-weighted discrepancy, that is the sum of the discrepancy values among all 23 rules. In Fig. 3, the mean non-weighted and the mean weighted discrepancy distributions of the two categories of faces (i.e., Byzantine and human) are depicted. Figure 3. Mean non-weighted discrepancy (left), mean weighted discrepancy (right). Comparing the two diagrams it is evident that nonweighted discrepancy distributions are perplexed. In contrast, it is clear that employing weighted discrepancy, the two distributions are efficiently discriminated. This implies that the trained BSSM shows increased specificity to Byzantine faces. Hence, it is suitable for enforcing the appropriate shape constraints during the shape restoration process.
5 2) Texture Restoration In order to assess the texture restoration process, a training set containing 101 non-damaged Byzantine icons was used. The test set consists of 12 previously unseen Byzantine icons which have been categorized into the following six groups with respect to the face that is depicted on them: i) Virgin Mary, ii) Jesus iii) Female iv) Old Male, v) Middle-aged Male and vi) Young Male. Each of the icons in the test set was artificially occluded on the following eight predefined regions: chin, left cheek, right cheek, left eye, right eye, moustache, mouth and nose. For restoring the icons, a texture PCA model was trained using the Byzantine icons training set in conjunction with the recursive PCA technique. The restored icons have been compared with several types of potential plausible restoration solutions, which include the replacement of the intensities in the occluded region with: the mean RGB values calculated from the training set, random RGB values of uniform distribution and random RGB values of a Gaussian distribution. In the case of Gaussian distribution, the mean value and standard deviation of each pixel distribution have been calculated from the corresponding pixel values of the training samples. Fig. 4 shows typical samples of the test cases considered. VII. INTEGRATED APPLICATION The methods for damage detection and restoration described in the previous sections have been incorporated into an integrated application intending to assist both amateur and professional restorers in their work. A screenshot of the interface is illustrated in Fig. 6. The final application deals in an integrated way with the landmark location, damage detection, shape and texture restoration modules. Examples, where all the presented functionalities of the tool have been applied are illustrated in Fig. 7. Figure 6. Application interface. Figure 4. Typical test samples of the texture validation experiment, where the left eye is restored. From left to right: occluded, uniform, Gaussian, mean, recursive PCA restored. For each resulting restored icon, we calculated the average difference between the restored pixels and the original non-damaged ones. This value constitutes an error that indicates the similarity between the restored icon and the ground truth. The results of this experiment are illustrated in Fig. 5. The errors have been calculated separately for each group and for each region using all types of occlusions. From Fig. 5 it is strongly evident that in all cases recursive PCA returns the best results, while mean, Gaussian and uniform follow in this order. This result validates the superiority of recursive PCA against some naïve but reasonable texture restoration approaches. Figure 5. Texture restoration errors for different groups (left) and different regions (right). (a) (b) (c) (d) Figure 7. (a) Damaged icon, (b) Landmarks (red: visible, blue: restored), (c) Damage detection, (d) Restored icon. Apart from the modules described earlier, the tool incorporates a special functionality for dealing with cases that an overall face in icons is occluded. In this case, the user specifies the main features of the missing face (i.e. who is the Saint shown among the group of e.g. Jesus, Virgin Mary, etc.), so that all faces within the training set compatible with the given constraints are located. The facial region from all compatible faces in the training set is extracted and rendered iteratively on the given image so that the user can select the most viable match. During the process both the face orientation and color shadings are optimized so that the best match is obtained. Fig. 8 shows an example of the overall face restoration process. VIII. CONCLUSIONS An integrated tool that can be used for virtual restoration of faces portrayed in Byzantine icons is presented. The proposed method utilizes learned shape and texture constraints associated with Byzantine faces in order to detect and eliminate damages within the facial region of faces in
6 icons. In the final implementation of the tool both icons with partially and totally damaged facial regions are handled. (a) (b) (c) (d) (e) (f) Figure 8. (a) Raw icon, (b)-(d) Indicative candidates, (e) Selected candidate, (f) Color adjusted selected candidate. An experimental evaluation has proven the efficiency of using a BSSM in Byzantine style preservation during the process of shape restoration. The superiority of recursive PCA technique against a number of other viable solutions has also been validated via a quantitative analysis. Indicative visual examples of the adaptation of the presented tool in truly distorted icons show the potential of the proposed application in real cases. Currently, we attempt to extend the current tool, so that it enables the interactive utilization of both human and machine expertise in order to optimize the icon restoration and conservation process. Along these lines, the system will interactively provide clues and suggestions to the restorers in order to facilitate the task of icon conservation and/or restoration. Also, in the future we plan to stage extended quantitative performance evaluation tests along with usability tests in order to ensure that both the performance of the system is adequate and at the same time the ease and efficiency of using the system is proven. For this purpose, the application will be evaluated by professional Byzantine icon conservators and trained iconographers. Early results of the user evaluation process, which is currently being executed, reveal a positive feedback of the participants towards the usability, functionality and usefulness of the system. In the future, we also plan to adapt and apply the techniques employed to other similar problem domains associated with the virtual restoration of either 2D or 3D cultural heritage artifacts. For example, we are in the process of applying our methods to the problem of restoring fragmented terracotta figurines excavated from archeological sites [17]. ACKNOWLEDGMENT This work was supported by the Cyprus Research Promotion Foundation and the European Union Structural Funds (project ΤΠΕ/ΠΛΗΡΟ/0609(ΒΙΕ)/05). We would also like to thank Dr. D. Demosthenous and Mr. C. Karis for their valuable help. REFERENCES [1] A. Maronidis and A. Lanitis, An automated methodology for assessing the damage on Byzantine icons, M. Ioannides et al. (Eds.): International Conference on Cultural Heritage EuroMed 2012, LNCS 7616, pp , [2] A. Lanitis, G. Stylianou and C. Voutounos, Virtual restoration of faces appearing in Byzantine icons, International Journal of Cultural Heritage, Elsevier, (doi: /j.culher ), [3] J.-S. Park, Y. Oh, S. Ahn and S.-W. Lee, Glasses removal from facial image using recursive PCA reconstruction, LNCS 2688 (2003) [4] Z. M. Wang and J. H. Tao, Reconstruction of partially occluded face by fast recursive PCA, International conference on computational intelligence and security workshops, Harbin, December 15 19, [5] A. Colombo, C. Cusano and R. Schettini, Three-dimensional occlusion detection and restoration of partially occluded faces, Journal of Mathematical Imaging and Vision 40 (2011) [6] B. W. Hwang and S. W. Lee, Reconstruction of partially damaged face images based on a morphable face model, IEEE Transactions on Pattern Analysis and Machine Intelligence 25 (2003) [7] M. D. Smet, R. Fransens and L. V. Gool, A generalized EM approach for 3D model based face recognition under occlusions, IEEE Computer Society Conference on, Computer Vision and Pattern Recognition (2006) [8] A. M. Martinez, Recognizing imprecisely localized, partially occluded, and expression variant faces from a single sample per class, IEEE Transactions on Pattern Analysis and Machine Intelligence 24 (2002) [9] G. S. Kumar, P. Reddy, M. S. Swamy and S. Gupta, Skin based occlusion detection and face recognition using machine learning techniques, International Journal of Computer Applications, 41, 11-15, [10] G. Kim, J. K. Suhr, H. G. Jung and J. Kim, Face occlusion detection by using B-spline active contour and skin color information, 11th International Conference on Control, Automation, Robotics and Vision, (ICARCV), , [11] I. Venkat, A. T. Khader, K. G. Subramanian and P. De Wilde, Recognizing occluded faces by exploiting psychophysically inspired similarity maps, Pattern Recognition Letters, doi: [12] M. Yang and L. Zhang, Gabor feature based sparse representation for face recognition, In ECCV, , [13] V. Blanz and T. Vetter, Face recognition based on fitting 3D morphable model, IEEE Transactions on Pattern Analysis and Machine Intelligence 25 (2003) [14] I. C. Vranos, H techniki tis agiographias, P. S. Pournaras (In Greek), Thessaloniki, [15] A. Lanitis, Person identification from heavily occluded face images, Proceedings of the 2004 ACM symposium on Applied computing, 5-9, [16] G. J. Edwards, A. Lanitis, C. J. Taylor and T. F. Cootes, Statistical face models: Improving specificity, Image and Vision Computing, 16 (3), , [17] G. Papantoniou, F. Loizides, A. Lanitis, and D. Michaelides, Digitization, restoration and visualization of Terracotta figurines from the House of Orpheus, Nea Paphos, Cyprus, M. Ioannides et al. (Eds.): International Conference on Cultural Heritage EuroMed 2012, LNCS 7616, pp , 2012.
Generic Face Alignment Using an Improved Active Shape Model
Generic Face Alignment Using an Improved Active Shape Model Liting Wang, Xiaoqing Ding, Chi Fang Electronic Engineering Department, Tsinghua University, Beijing, China {wanglt, dxq, fangchi} @ocrserv.ee.tsinghua.edu.cn
More informationLinear Discriminant Analysis for 3D Face Recognition System
Linear Discriminant Analysis for 3D Face Recognition System 3.1 Introduction Face recognition and verification have been at the top of the research agenda of the computer vision community in recent times.
More informationDigital Vision Face recognition
Ulrik Söderström ulrik.soderstrom@tfe.umu.se 27 May 2007 Digital Vision Face recognition 1 Faces Faces are integral to human interaction Manual facial recognition is already used in everyday authentication
More informationAn Automatic Face Identification System Using Flexible Appearance Models
An Automatic Face Identification System Using Flexible Appearance Models A. Lanitis, C.J.Taylor and T.F.Cootes Dpt. of Medical Biophysics, University of Manchester email: lan@wiau.mb.man.ac.uk We describe
More informationEvaluating the Performance of Face-Aging Algorithms
Evaluating the Performance of Face-Aging Algorithms Andreas Lanitis Department of Multimedia and Graphic Arts, Cyprus University of Technology, P.O. Box 50329, 3036, Lemesos, Cyprus andreas.lanitis@cut.ac.cy
More informationFacial Expression Recognition Using Non-negative Matrix Factorization
Facial Expression Recognition Using Non-negative Matrix Factorization Symeon Nikitidis, Anastasios Tefas and Ioannis Pitas Artificial Intelligence & Information Analysis Lab Department of Informatics Aristotle,
More informationFace Alignment Under Various Poses and Expressions
Face Alignment Under Various Poses and Expressions Shengjun Xin and Haizhou Ai Computer Science and Technology Department, Tsinghua University, Beijing 100084, China ahz@mail.tsinghua.edu.cn Abstract.
More informationFace Hallucination Based on Eigentransformation Learning
Advanced Science and Technology etters, pp.32-37 http://dx.doi.org/10.14257/astl.2016. Face allucination Based on Eigentransformation earning Guohua Zou School of software, East China University of Technology,
More informationTexture Image Segmentation using FCM
Proceedings of 2012 4th International Conference on Machine Learning and Computing IPCSIT vol. 25 (2012) (2012) IACSIT Press, Singapore Texture Image Segmentation using FCM Kanchan S. Deshmukh + M.G.M
More informationIMPROVED FACE RECOGNITION USING ICP TECHNIQUES INCAMERA SURVEILLANCE SYSTEMS. Kirthiga, M.E-Communication system, PREC, Thanjavur
IMPROVED FACE RECOGNITION USING ICP TECHNIQUES INCAMERA SURVEILLANCE SYSTEMS Kirthiga, M.E-Communication system, PREC, Thanjavur R.Kannan,Assistant professor,prec Abstract: Face Recognition is important
More informationEstimating Human Pose in Images. Navraj Singh December 11, 2009
Estimating Human Pose in Images Navraj Singh December 11, 2009 Introduction This project attempts to improve the performance of an existing method of estimating the pose of humans in still images. Tasks
More informationA Survey of Light Source Detection Methods
A Survey of Light Source Detection Methods Nathan Funk University of Alberta Mini-Project for CMPUT 603 November 30, 2003 Abstract This paper provides an overview of the most prominent techniques for light
More informationComponent-based Face Recognition with 3D Morphable Models
Component-based Face Recognition with 3D Morphable Models B. Weyrauch J. Huang benjamin.weyrauch@vitronic.com jenniferhuang@alum.mit.edu Center for Biological and Center for Biological and Computational
More informationSparse Shape Registration for Occluded Facial Feature Localization
Shape Registration for Occluded Facial Feature Localization Fei Yang, Junzhou Huang and Dimitris Metaxas Abstract This paper proposes a sparsity driven shape registration method for occluded facial feature
More informationPartial Face Matching between Near Infrared and Visual Images in MBGC Portal Challenge
Partial Face Matching between Near Infrared and Visual Images in MBGC Portal Challenge Dong Yi, Shengcai Liao, Zhen Lei, Jitao Sang, and Stan Z. Li Center for Biometrics and Security Research, Institute
More informationLearning based face hallucination techniques: A survey
Vol. 3 (2014-15) pp. 37-45. : A survey Premitha Premnath K Department of Computer Science & Engineering Vidya Academy of Science & Technology Thrissur - 680501, Kerala, India (email: premithakpnath@gmail.com)
More informationSemi-Supervised PCA-based Face Recognition Using Self-Training
Semi-Supervised PCA-based Face Recognition Using Self-Training Fabio Roli and Gian Luca Marcialis Dept. of Electrical and Electronic Engineering, University of Cagliari Piazza d Armi, 09123 Cagliari, Italy
More informationSelf-supervised Multi-level Face Model Learning for Monocular Reconstruction at over 250 Hz Supplemental Material
Self-supervised Multi-level Face Model Learning for Monocular Reconstruction at over 250 Hz Supplemental Material Ayush Tewari 1,2 Michael Zollhöfer 1,2,3 Pablo Garrido 1,2 Florian Bernard 1,2 Hyeongwoo
More informationGender Classification Technique Based on Facial Features using Neural Network
Gender Classification Technique Based on Facial Features using Neural Network Anushri Jaswante Dr. Asif Ullah Khan Dr. Bhupesh Gour Computer Science & Engineering, Rajiv Gandhi Proudyogiki Vishwavidyalaya,
More information3D Active Appearance Model for Aligning Faces in 2D Images
3D Active Appearance Model for Aligning Faces in 2D Images Chun-Wei Chen and Chieh-Chih Wang Abstract Perceiving human faces is one of the most important functions for human robot interaction. The active
More informationDefinition, Detection, and Evaluation of Meeting Events in Airport Surveillance Videos
Definition, Detection, and Evaluation of Meeting Events in Airport Surveillance Videos Sung Chun Lee, Chang Huang, and Ram Nevatia University of Southern California, Los Angeles, CA 90089, USA sungchun@usc.edu,
More informationFace View Synthesis Across Large Angles
Face View Synthesis Across Large Angles Jiang Ni and Henry Schneiderman Robotics Institute, Carnegie Mellon University, Pittsburgh, PA 1513, USA Abstract. Pose variations, especially large out-of-plane
More informationLOCAL APPEARANCE BASED FACE RECOGNITION USING DISCRETE COSINE TRANSFORM
LOCAL APPEARANCE BASED FACE RECOGNITION USING DISCRETE COSINE TRANSFORM Hazim Kemal Ekenel, Rainer Stiefelhagen Interactive Systems Labs, University of Karlsruhe Am Fasanengarten 5, 76131, Karlsruhe, Germany
More informationOccluded Facial Expression Tracking
Occluded Facial Expression Tracking Hugo Mercier 1, Julien Peyras 2, and Patrice Dalle 1 1 Institut de Recherche en Informatique de Toulouse 118, route de Narbonne, F-31062 Toulouse Cedex 9 2 Dipartimento
More informationFacial Feature Extraction Based On FPD and GLCM Algorithms
Facial Feature Extraction Based On FPD and GLCM Algorithms Dr. S. Vijayarani 1, S. Priyatharsini 2 Assistant Professor, Department of Computer Science, School of Computer Science and Engineering, Bharathiar
More informationDetecting Burnscar from Hyperspectral Imagery via Sparse Representation with Low-Rank Interference
Detecting Burnscar from Hyperspectral Imagery via Sparse Representation with Low-Rank Interference Minh Dao 1, Xiang Xiang 1, Bulent Ayhan 2, Chiman Kwan 2, Trac D. Tran 1 Johns Hopkins Univeristy, 3400
More informationAN EXAMINING FACE RECOGNITION BY LOCAL DIRECTIONAL NUMBER PATTERN (Image Processing)
AN EXAMINING FACE RECOGNITION BY LOCAL DIRECTIONAL NUMBER PATTERN (Image Processing) J.Nithya 1, P.Sathyasutha2 1,2 Assistant Professor,Gnanamani College of Engineering, Namakkal, Tamil Nadu, India ABSTRACT
More informationActive Wavelet Networks for Face Alignment
Active Wavelet Networks for Face Alignment Changbo Hu, Rogerio Feris, Matthew Turk Dept. Computer Science, University of California, Santa Barbara {cbhu,rferis,mturk}@cs.ucsb.edu Abstract The active appearance
More informationCOSC160: Detection and Classification. Jeremy Bolton, PhD Assistant Teaching Professor
COSC160: Detection and Classification Jeremy Bolton, PhD Assistant Teaching Professor Outline I. Problem I. Strategies II. Features for training III. Using spatial information? IV. Reducing dimensionality
More informationComponent-based Face Recognition with 3D Morphable Models
Component-based Face Recognition with 3D Morphable Models Jennifer Huang 1, Bernd Heisele 1,2, and Volker Blanz 3 1 Center for Biological and Computational Learning, M.I.T., Cambridge, MA, USA 2 Honda
More informationA Hierarchical Face Identification System Based on Facial Components
A Hierarchical Face Identification System Based on Facial Components Mehrtash T. Harandi, Majid Nili Ahmadabadi, and Babak N. Araabi Control and Intelligent Processing Center of Excellence Department of
More informationHUMAN S FACIAL PARTS EXTRACTION TO RECOGNIZE FACIAL EXPRESSION
HUMAN S FACIAL PARTS EXTRACTION TO RECOGNIZE FACIAL EXPRESSION Dipankar Das Department of Information and Communication Engineering, University of Rajshahi, Rajshahi-6205, Bangladesh ABSTRACT Real-time
More informationCost-alleviative Learning for Deep Convolutional Neural Network-based Facial Part Labeling
[DOI: 10.2197/ipsjtcva.7.99] Express Paper Cost-alleviative Learning for Deep Convolutional Neural Network-based Facial Part Labeling Takayoshi Yamashita 1,a) Takaya Nakamura 1 Hiroshi Fukui 1,b) Yuji
More informationAutomatic Shadow Removal by Illuminance in HSV Color Space
Computer Science and Information Technology 3(3): 70-75, 2015 DOI: 10.13189/csit.2015.030303 http://www.hrpub.org Automatic Shadow Removal by Illuminance in HSV Color Space Wenbo Huang 1, KyoungYeon Kim
More informationGraph Matching Iris Image Blocks with Local Binary Pattern
Graph Matching Iris Image Blocs with Local Binary Pattern Zhenan Sun, Tieniu Tan, and Xianchao Qiu Center for Biometrics and Security Research, National Laboratory of Pattern Recognition, Institute of
More informationTRANSPARENT OBJECT DETECTION USING REGIONS WITH CONVOLUTIONAL NEURAL NETWORK
TRANSPARENT OBJECT DETECTION USING REGIONS WITH CONVOLUTIONAL NEURAL NETWORK 1 Po-Jen Lai ( 賴柏任 ), 2 Chiou-Shann Fuh ( 傅楸善 ) 1 Dept. of Electrical Engineering, National Taiwan University, Taiwan 2 Dept.
More informationClassification of Face Images for Gender, Age, Facial Expression, and Identity 1
Proc. Int. Conf. on Artificial Neural Networks (ICANN 05), Warsaw, LNCS 3696, vol. I, pp. 569-574, Springer Verlag 2005 Classification of Face Images for Gender, Age, Facial Expression, and Identity 1
More informationEnhanced Active Shape Models with Global Texture Constraints for Image Analysis
Enhanced Active Shape Models with Global Texture Constraints for Image Analysis Shiguang Shan, Wen Gao, Wei Wang, Debin Zhao, Baocai Yin Institute of Computing Technology, Chinese Academy of Sciences,
More informationFace Recognition At-a-Distance Based on Sparse-Stereo Reconstruction
Face Recognition At-a-Distance Based on Sparse-Stereo Reconstruction Ham Rara, Shireen Elhabian, Asem Ali University of Louisville Louisville, KY {hmrara01,syelha01,amali003}@louisville.edu Mike Miller,
More informationImproving Latent Fingerprint Matching Performance by Orientation Field Estimation using Localized Dictionaries
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,
More informationColor Local Texture Features Based Face Recognition
Color Local Texture Features Based Face Recognition Priyanka V. Bankar Department of Electronics and Communication Engineering SKN Sinhgad College of Engineering, Korti, Pandharpur, Maharashtra, India
More informationActive Appearance Models
Active Appearance Models Edwards, Taylor, and Cootes Presented by Bryan Russell Overview Overview of Appearance Models Combined Appearance Models Active Appearance Model Search Results Constrained Active
More informationA Laplacian Based Novel Approach to Efficient Text Localization in Grayscale Images
A Laplacian Based Novel Approach to Efficient Text Localization in Grayscale Images Karthik Ram K.V & Mahantesh K Department of Electronics and Communication Engineering, SJB Institute of Technology, Bangalore,
More informationLearning to Recognize Faces in Realistic Conditions
000 001 002 003 004 005 006 007 008 009 010 011 012 013 014 015 016 017 018 019 020 021 022 023 024 025 026 027 028 029 030 031 032 033 034 035 036 037 038 039 040 041 042 043 044 045 046 047 048 049 050
More informationRecognition of Animal Skin Texture Attributes in the Wild. Amey Dharwadker (aap2174) Kai Zhang (kz2213)
Recognition of Animal Skin Texture Attributes in the Wild Amey Dharwadker (aap2174) Kai Zhang (kz2213) Motivation Patterns and textures are have an important role in object description and understanding
More informationProbabilistic Facial Feature Extraction Using Joint Distribution of Location and Texture Information
Probabilistic Facial Feature Extraction Using Joint Distribution of Location and Texture Information Mustafa Berkay Yilmaz, Hakan Erdogan, Mustafa Unel Sabanci University, Faculty of Engineering and Natural
More informationNonrigid Surface Modelling. and Fast Recovery. Department of Computer Science and Engineering. Committee: Prof. Leo J. Jia and Prof. K. H.
Nonrigid Surface Modelling and Fast Recovery Zhu Jianke Supervisor: Prof. Michael R. Lyu Committee: Prof. Leo J. Jia and Prof. K. H. Wong Department of Computer Science and Engineering May 11, 2007 1 2
More informationModel-Based Face Computation
Model-Based Face Computation 1. Research Team Project Leader: Post Doc(s): Graduate Students: Prof. Ulrich Neumann, IMSC and Computer Science John P. Lewis Hea-juen Hwang, Zhenyao Mo, Gordon Thomas 2.
More informationOn Modeling Variations for Face Authentication
On Modeling Variations for Face Authentication Xiaoming Liu Tsuhan Chen B.V.K. Vijaya Kumar Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA 15213 xiaoming@andrew.cmu.edu
More informationFace Recognition using Eigenfaces SMAI Course Project
Face Recognition using Eigenfaces SMAI Course Project Satarupa Guha IIIT Hyderabad 201307566 satarupa.guha@research.iiit.ac.in Ayushi Dalmia IIIT Hyderabad 201307565 ayushi.dalmia@research.iiit.ac.in Abstract
More informationSegmentation and Tracking of Partial Planar Templates
Segmentation and Tracking of Partial Planar Templates Abdelsalam Masoud William Hoff Colorado School of Mines Colorado School of Mines Golden, CO 800 Golden, CO 800 amasoud@mines.edu whoff@mines.edu Abstract
More informationDETECTION OF SMOOTH TEXTURE IN FACIAL IMAGES FOR THE EVALUATION OF UNNATURAL CONTRAST ENHANCEMENT
DETECTION OF SMOOTH TEXTURE IN FACIAL IMAGES FOR THE EVALUATION OF UNNATURAL CONTRAST ENHANCEMENT 1 NUR HALILAH BINTI ISMAIL, 2 SOONG-DER CHEN 1, 2 Department of Graphics and Multimedia, College of Information
More information22 October, 2012 MVA ENS Cachan. Lecture 5: Introduction to generative models Iasonas Kokkinos
Machine Learning for Computer Vision 1 22 October, 2012 MVA ENS Cachan Lecture 5: Introduction to generative models Iasonas Kokkinos Iasonas.kokkinos@ecp.fr Center for Visual Computing Ecole Centrale Paris
More informationJournal of Industrial Engineering Research
IWNEST PUBLISHER Journal of Industrial Engineering Research (ISSN: 2077-4559) Journal home page: http://www.iwnest.com/aace/ Mammogram Image Segmentation Using voronoi Diagram Properties Dr. J. Subash
More informationPostprint.
http://www.diva-portal.org Postprint This is the accepted version of a paper presented at 14th International Conference of the Biometrics Special Interest Group, BIOSIG, Darmstadt, Germany, 9-11 September,
More informationThe Processing of Form Documents
The Processing of Form Documents David S. Doermann and Azriel Rosenfeld Document Processing Group, Center for Automation Research University of Maryland, College Park 20742 email: doermann@cfar.umd.edu,
More informationString distance for automatic image classification
String distance for automatic image classification Nguyen Hong Thinh*, Le Vu Ha*, Barat Cecile** and Ducottet Christophe** *University of Engineering and Technology, Vietnam National University of HaNoi,
More informationNearest Clustering Algorithm for Satellite Image Classification in Remote Sensing Applications
Nearest Clustering Algorithm for Satellite Image Classification in Remote Sensing Applications Anil K Goswami 1, Swati Sharma 2, Praveen Kumar 3 1 DRDO, New Delhi, India 2 PDM College of Engineering for
More informationGaussian Mixture Model Coupled with Independent Component Analysis for Palmprint Verification
Gaussian Mixture Model Coupled with Independent Component Analysis for Palmprint Verification Raghavendra.R, Bernadette Dorizzi, Ashok Rao, Hemantha Kumar G Abstract In this paper we present a new scheme
More informationA Novel Image Super-resolution Reconstruction Algorithm based on Modified Sparse Representation
, pp.162-167 http://dx.doi.org/10.14257/astl.2016.138.33 A Novel Image Super-resolution Reconstruction Algorithm based on Modified Sparse Representation Liqiang Hu, Chaofeng He Shijiazhuang Tiedao University,
More informationDigital Makeup Face Generation
Digital Makeup Face Generation Wut Yee Oo Mechanical Engineering Stanford University wutyee@stanford.edu Abstract Make up applications offer photoshop tools to get users inputs in generating a make up
More informationA Novel Extreme Point Selection Algorithm in SIFT
A Novel Extreme Point Selection Algorithm in SIFT Ding Zuchun School of Electronic and Communication, South China University of Technolog Guangzhou, China zucding@gmail.com Abstract. This paper proposes
More informationEnsemble of Bayesian Filters for Loop Closure Detection
Ensemble of Bayesian Filters for Loop Closure Detection Mohammad Omar Salameh, Azizi Abdullah, Shahnorbanun Sahran Pattern Recognition Research Group Center for Artificial Intelligence Faculty of Information
More information2.1 Optimized Importance Map
3rd International Conference on Multimedia Technology(ICMT 2013) Improved Image Resizing using Seam Carving and scaling Yan Zhang 1, Jonathan Z. Sun, Jingliang Peng Abstract. Seam Carving, the popular
More informationAccurate 3D Face and Body Modeling from a Single Fixed Kinect
Accurate 3D Face and Body Modeling from a Single Fixed Kinect Ruizhe Wang*, Matthias Hernandez*, Jongmoo Choi, Gérard Medioni Computer Vision Lab, IRIS University of Southern California Abstract In this
More informationClassification of Subject Motion for Improved Reconstruction of Dynamic Magnetic Resonance Imaging
1 CS 9 Final Project Classification of Subject Motion for Improved Reconstruction of Dynamic Magnetic Resonance Imaging Feiyu Chen Department of Electrical Engineering ABSTRACT Subject motion is a significant
More informationIris Recognition for Eyelash Detection Using Gabor Filter
Iris Recognition for Eyelash Detection Using Gabor Filter Rupesh Mude 1, Meenakshi R Patel 2 Computer Science and Engineering Rungta College of Engineering and Technology, Bhilai Abstract :- Iris recognition
More informationSelecting Models from Videos for Appearance-Based Face Recognition
Selecting Models from Videos for Appearance-Based Face Recognition Abdenour Hadid and Matti Pietikäinen Machine Vision Group Infotech Oulu and Department of Electrical and Information Engineering P.O.
More informationarxiv: v1 [cs.cv] 16 Nov 2015
Coarse-to-fine Face Alignment with Multi-Scale Local Patch Regression Zhiao Huang hza@megvii.com Erjin Zhou zej@megvii.com Zhimin Cao czm@megvii.com arxiv:1511.04901v1 [cs.cv] 16 Nov 2015 Abstract Facial
More informationLearning and Inferring Depth from Monocular Images. Jiyan Pan April 1, 2009
Learning and Inferring Depth from Monocular Images Jiyan Pan April 1, 2009 Traditional ways of inferring depth Binocular disparity Structure from motion Defocus Given a single monocular image, how to infer
More informationSemi-Automatic Techniques for Generating BIM Façade Models of Historic Buildings
Semi-Automatic Techniques for Generating BIM Façade Models of Historic Buildings C. Dore, M. Murphy School of Surveying & Construction Management Dublin Institute of Technology Bolton Street Campus, Dublin
More informationJournal of Asian Scientific Research FEATURES COMPOSITION FOR PROFICIENT AND REAL TIME RETRIEVAL IN CBIR SYSTEM. Tohid Sedghi
Journal of Asian Scientific Research, 013, 3(1):68-74 Journal of Asian Scientific Research journal homepage: http://aessweb.com/journal-detail.php?id=5003 FEATURES COMPOSTON FOR PROFCENT AND REAL TME RETREVAL
More informationREAL-TIME FACE SWAPPING IN VIDEO SEQUENCES: MAGIC MIRROR
REAL-TIME FACE SWAPPING IN VIDEO SEQUENCES: MAGIC MIRROR Nuri Murat Arar1, Fatma Gu ney1, Nasuh Kaan Bekmezci1, Hua Gao2 and Hazım Kemal Ekenel1,2,3 1 Department of Computer Engineering, Bogazici University,
More informationHuman pose estimation using Active Shape Models
Human pose estimation using Active Shape Models Changhyuk Jang and Keechul Jung Abstract Human pose estimation can be executed using Active Shape Models. The existing techniques for applying to human-body
More informationWhy study Computer Vision?
Why study Computer Vision? Images and movies are everywhere Fast-growing collection of useful applications building representations of the 3D world from pictures automated surveillance (who s doing what)
More informationCHAPTER 5 GLOBAL AND LOCAL FEATURES FOR FACE RECOGNITION
122 CHAPTER 5 GLOBAL AND LOCAL FEATURES FOR FACE RECOGNITION 5.1 INTRODUCTION Face recognition, means checking for the presence of a face from a database that contains many faces and could be performed
More informationPairwise Threshold for Gaussian Mixture Classification and its Application on Human Tracking Enhancement
Pairwise Threshold for Gaussian Mixture Classification and its Application on Human Tracking Enhancement Daegeon Kim Sung Chun Lee Institute for Robotics and Intelligent Systems University of Southern
More informationLinear Discriminant Analysis in Ottoman Alphabet Character Recognition
Linear Discriminant Analysis in Ottoman Alphabet Character Recognition ZEYNEB KURT, H. IREM TURKMEN, M. ELIF KARSLIGIL Department of Computer Engineering, Yildiz Technical University, 34349 Besiktas /
More informationDynamic Human Shape Description and Characterization
Dynamic Human Shape Description and Characterization Z. Cheng*, S. Mosher, Jeanne Smith H. Cheng, and K. Robinette Infoscitex Corporation, Dayton, Ohio, USA 711 th Human Performance Wing, Air Force Research
More informationAn Adaptive Threshold LBP Algorithm for Face Recognition
An Adaptive Threshold LBP Algorithm for Face Recognition Xiaoping Jiang 1, Chuyu Guo 1,*, Hua Zhang 1, and Chenghua Li 1 1 College of Electronics and Information Engineering, Hubei Key Laboratory of Intelligent
More informationCHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.1 Introduction Pattern recognition is a set of mathematical, statistical and heuristic techniques used in executing `man-like' tasks on computers. Pattern recognition plays an
More informationCombining PGMs and Discriminative Models for Upper Body Pose Detection
Combining PGMs and Discriminative Models for Upper Body Pose Detection Gedas Bertasius May 30, 2014 1 Introduction In this project, I utilized probabilistic graphical models together with discriminative
More informationSupplementary Material Estimating Correspondences of Deformable Objects In-the-wild
Supplementary Material Estimating Correspondences of Deformable Objects In-the-wild Yuxiang Zhou Epameinondas Antonakos Joan Alabort-i-Medina Anastasios Roussos Stefanos Zafeiriou, Department of Computing,
More informationA Morphable Model for the Synthesis of 3D Faces
A Morphable Model for the Synthesis of 3D Faces Marco Nef Volker Blanz, Thomas Vetter SIGGRAPH 99, Los Angeles Presentation overview Motivation Introduction Database Morphable 3D Face Model Matching a
More informationA THREE LAYERED MODEL TO PERFORM CHARACTER RECOGNITION FOR NOISY IMAGES
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONSAND ROBOTICS ISSN 2320-7345 A THREE LAYERED MODEL TO PERFORM CHARACTER RECOGNITION FOR NOISY IMAGES 1 Neha, 2 Anil Saroliya, 3 Varun Sharma 1,
More informationFace Objects Detection in still images using Viola-Jones Algorithm through MATLAB TOOLS
Face Objects Detection in still images using Viola-Jones Algorithm through MATLAB TOOLS Dr. Mridul Kumar Mathur 1, Priyanka Bhati 2 Asst. Professor (Selection Grade), Dept. of Computer Science, LMCST,
More informationLearning a Manifold as an Atlas Supplementary Material
Learning a Manifold as an Atlas Supplementary Material Nikolaos Pitelis Chris Russell School of EECS, Queen Mary, University of London [nikolaos.pitelis,chrisr,lourdes]@eecs.qmul.ac.uk Lourdes Agapito
More informationHybrid Textons: Modeling Surfaces with Reflectance and Geometry
Hybrid Textons: Modeling Surfaces with Reflectance and Geometry Jing Wang and Kristin J. Dana Electrical and Computer Engineering Department Rutgers University Piscataway, NJ, USA {jingwang,kdana}@caip.rutgers.edu
More informationCS 231A Computer Vision (Winter 2014) Problem Set 3
CS 231A Computer Vision (Winter 2014) Problem Set 3 Due: Feb. 18 th, 2015 (11:59pm) 1 Single Object Recognition Via SIFT (45 points) In his 2004 SIFT paper, David Lowe demonstrates impressive object recognition
More informationEye Detection by Haar wavelets and cascaded Support Vector Machine
Eye Detection by Haar wavelets and cascaded Support Vector Machine Vishal Agrawal B.Tech 4th Year Guide: Simant Dubey / Amitabha Mukherjee Dept of Computer Science and Engineering IIT Kanpur - 208 016
More informationFactorization with Missing and Noisy Data
Factorization with Missing and Noisy Data Carme Julià, Angel Sappa, Felipe Lumbreras, Joan Serrat, and Antonio López Computer Vision Center and Computer Science Department, Universitat Autònoma de Barcelona,
More informationReal time facial expression recognition from image sequences using Support Vector Machines
Real time facial expression recognition from image sequences using Support Vector Machines I. Kotsia a and I. Pitas a a Aristotle University of Thessaloniki, Department of Informatics, Box 451, 54124 Thessaloniki,
More informationFACE RECOGNITION FROM A SINGLE SAMPLE USING RLOG FILTER AND MANIFOLD ANALYSIS
FACE RECOGNITION FROM A SINGLE SAMPLE USING RLOG FILTER AND MANIFOLD ANALYSIS Jaya Susan Edith. S 1 and A.Usha Ruby 2 1 Department of Computer Science and Engineering,CSI College of Engineering, 2 Research
More informationFacial Feature Detection
Facial Feature Detection Rainer Stiefelhagen 21.12.2009 Interactive Systems Laboratories, Universität Karlsruhe (TH) Overview Resear rch Group, Universität Karlsruhe (TH H) Introduction Review of already
More informationFacial Expression Detection Using Implemented (PCA) Algorithm
Facial Expression Detection Using Implemented (PCA) Algorithm Dileep Gautam (M.Tech Cse) Iftm University Moradabad Up India Abstract: Facial expression plays very important role in the communication with
More informationImage Compression and Resizing Using Improved Seam Carving for Retinal Images
Image Compression and Resizing Using Improved Seam Carving for Retinal Images Prabhu Nayak 1, Rajendra Chincholi 2, Dr.Kalpana Vanjerkhede 3 1 PG Student, Department of Electronics and Instrumentation
More informationCS 231A Computer Vision (Fall 2012) Problem Set 3
CS 231A Computer Vision (Fall 2012) Problem Set 3 Due: Nov. 13 th, 2012 (2:15pm) 1 Probabilistic Recursion for Tracking (20 points) In this problem you will derive a method for tracking a point of interest
More informationFACE RECOGNITION USING INDEPENDENT COMPONENT
Chapter 5 FACE RECOGNITION USING INDEPENDENT COMPONENT ANALYSIS OF GABORJET (GABORJET-ICA) 5.1 INTRODUCTION PCA is probably the most widely used subspace projection technique for face recognition. A major
More informationA Statistical Consistency Check for the Space Carving Algorithm.
A Statistical Consistency Check for the Space Carving Algorithm. A. Broadhurst and R. Cipolla Dept. of Engineering, Univ. of Cambridge, Cambridge, CB2 1PZ aeb29 cipolla @eng.cam.ac.uk Abstract This paper
More informationA Survey on Feature Extraction Techniques for Palmprint Identification
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 03 Issue. 12 A Survey on Feature Extraction Techniques for Palmprint Identification Sincy John 1, Kumudha Raimond 2 1
More information