CHAPTER 6 PERFORMANCE ANALYSIS OF SOFT COMPUTING BASED FACE RECOGNITION
|
|
- Phebe Pope
- 6 years ago
- Views:
Transcription
1 137 CHAPTER 6 PERFORMANCE ANALYSIS OF SOFT COMPUTING BASED FACE RECOGNITION In the previous chapters, a brief description about the theory and experimental results of PCA, FLDA, Gabor, Neural, Db wavelets and Fuzzy C-means clustering based algorithms for human Face recognition are presented. In this chapter, some description about performance metrics (Shepherd et al 1991) of Face Recognition like Recognition rate, Execution time, False Acceptance Ratio (FAR) and False Rejection Ratio (FRR) for all the above algorithms are discussed. 6.1 PERFORMANCE ANALYSIS In this section six algorithms for face recognition under different aspects of light, pose and facial expressions are compared based on some performance metrics like recognition rate, execution time and FAR and FRR (Sherrah 2004). In Chapters 3, 4 and 5, various algorithms of Face recognition using Eigenfaces method, and the Fisher face method, Gabor wavelets, Back propagation Neural Network, Cascaded Neural network, Fuzzy Integral and Fuzzy C- means Clustering are discussed. The experimentation is applied on three important data bases like ORL, YALE and FERET. Finally, it is concluded that the Fuzzy C means clustering with BPNN method has lower error rate than any of the other methods. Apart from this, the successful implementation of these algorithms involves huge training set with multiple images in different pose and
2 138 expression for each person. Also, the performance of these algorithms varies under different training set and different test set. The performance metrics like Recognition rate, Accuracy, FAR, FRR and Execution time are calculated as per the formulas given in equations (3.15) to (3.17) Recognition Rate Recognition Rates (RR) are compared for all the algorithms in Chapters 2, 3, 4 and it is concluded that the algorithm that combines FLDA, FCM and BPNN achieves the best. False Acceptance Rate (FAR) is that each of the test images of a single subject is compared with all images of all other subjects but not its own images. False rejection rate (FRR) is that each of the test images of a single subject is compared with each of the training image of that subject. No image is compared with itself (i.e. training and testing images should be different) and each pair is compared only once. Results are compared using the RR, FAR, FRR and Accuracy. The two standard biometric measures, FAR and FRR indicate the identifying power. The lower the equal value, the better identifying power the system possesses Execution Time For all the above algorithms, execution time (i.e.) total time taken to recognize the given image in seconds is compared and it ranges from seconds for 50 to 400 images. Among the algorithms, the combination of FLDA, FCM Gabor and BPNN is found to be having less execution time. In MATLAB total execution time is measured by the program using Tic and Tac commands Accuracy For all the above algorithms, overall accuracy is calculated and it is found to be around 90 % for sixty images. The best accuracy is obtained from
3 139 the FLDA, FCM and BPNN. The comparison of the performance parameters with all above said algorithm are experimentally verified with all databases. Tabulation and Graphical analysis of ORL data base for recognition rate, execution time and accuracy are presented in Tables 6.1, 6.2, 6.3 and Figures 6.1, 6.2, 6.3 respectively. Table 6.1 Comparison of recognition rate for all algorithms Recognition rate (%) No. of images PCA FLDA BPNN CNN DB+FLDA FCM+BPNN Figure 6.1 Graphical analysis of all algorithms for recognition rate
4 140 Table 6.2 Comparison of execution time for all algorithm No. of Images Execution time (sec) PCA FLDA BPNN CNN DB +FLDA FCM+BPNN Figure 6.2 Graphical analysis of execution time for all algorithms
5 141 False acceptance ratio (FAR) is an instance where the system traces incorrect identity and false rejections ratio (FRR) is an instance where the system rejects a valid identity. Accuracy is calculated using FAR & FRR as follows. Accuracy = [1-(FAR+FRR) /2] * 100 % ---- (6.1) Table 6.3 Overall accuracy of all algorithms Sl. No No of Images Accuracy (%) Authorized trials Unauthorized trials ORL Yale FERET Real time images Figure 6.3 Graphical analysis of accuracy for all algorithms
6 OVERALL COMPARISON Various types of algorithms applied in face recognition technology have their own significance, problems and complications. In this section main features, advantages and disadvantages of PCA, FLDA, GW, BPNN, FI and FCM based algorithms are discussed. Among all these FLDA, FCM, BPNN are found to have enhanced recognition. Principal Component Analysis (PCA) is a standard tool in modern data analysis and it is a simple, non-parametric method for extracting relevant information from the confusing data sets. Main advantages of PCA are its ability to recognize fast and its easy implementation. Eigenfaces algorithm has some shortcomings due to the use of image pixel gray values. In PCA, the size and location of each face image must remain the same. Different illumination, head pose and Facial Expressions lead to reduced recognition rate. The PCA approach typically requires the full frontal face to be presented each time; otherwise the image results in poor performance. Although the face recognition results were acceptable, the system using only eigenfaces might not be applicable as a real system. It needs to be more robust and to have other Discriminant features. PCA is Translation variant, Scale variant, Background variant, lighting variant. PCA derives the most expressive and inspired features, and provides a good discrimination. Finally, it is focused that speed and efficiency is high in PCA and it is suitable for Linear, but not suitable for Dissimilar, different lighting and poses. Fisher face method provides better ability to recognize a face and provides better discrimination between faces. FLDA works well for different illumination and different facial expressions. This statistically motivated method maximizes the ratio of the determinant of between-class scatter matrix
7 143 and within-class scatter matrix and in this sense attempts to involve information about classes of the patterns under consideration providing lower error rate. The solution for recognition of facial image in FLDA, involves segmentation of faces from the cluttered scenes or background, extraction of feature vector from the face region, identification and matching. The images used in this work can have variations in head orientations, scaling and lighting. This approach requires a high degree of correlation between the pixel intensities of the sample and the test images. FLDA approach has limitations over the variations in light, size and in the head orientation. Nevertheless, this method showed very good classifications of faces. A good recognition system should have the ability to adapt over time. A difficulty in using the FLDA method for face recognition is the high-dimensional nature of the image vector. In this FLDA technique, variations in illumination and expressions are reduced substantially. Speed and efficiency is high but it is not efficient for small databases and linear problems. Gabor wavelet provides the optimized resolution in both time and frequency domains for time frequency analysis. As it saves neighborhood relationship between pixels, it performs better than other traditional approaches in terms of efficiency and accuracy. It is invariant to homogenous illumination changes, rotational and scale. Gabor filters have fast recognition and low computational cost, Due to its biological similarity to human vision system, Gabor wavelets have been widely used in object recognition applications like fingerprint recognition, character recognition, etc. Gabor wavelet representations are among the most successful mathematical tools and are
8 144 mainly applied in signal analysis, image processing and many other information-related areas. Despite the success of Gabor wavelet based face recognition systems, both the feature extraction process and the huge dimension of Gabor features extracted demand large computation and memory costs, which makes them impractical for real applications. Another limitation in the case of Gabor wavelets is that the time for Gabor feature extraction is very long and its dimension is prohibitively large. Neural classification is suitable for both linear and nonlinear problems. It has the advantages of high accuracy, high recognition rate and easy to implement. BPNN is a gradient descent based algorithm and it is difficult to train and training time is more, but the execution time is less.also some inherent difficulties like slow convergence and difficulty in escaping from a local minimum are encountered. In BPNN, large number of neurons in the hidden layer can give high generalization error due to over fitting and high variance. Cascade-Correlation is much useful for incremental learning, in which new information is added to an already-trained net. There is no need to guess the size, depth and connectivity pattern of the network in advance. A reasonably small net is built automatically. It may be possible to build networks with a mixture of nonlinear unit-types. Cascade-Correlation learns fast. In backpropogation, the hidden units engage in a complex way before they settle into distinct useful roles; in Cascade-Correlation, each unit sees a fixed problem and can move decisively to solve that problem. Cascade-Correlation can build deep nets without the dramatic slowdown seen in back-propagation networks with more than one or two hidden layers
9 145 In CNN, there is no need to propagate error signals backwards through the network connections as in BPNN. As cascade-correlation network builds hidden units into the neural network as it goes, the neural network designer is relieved of the task of having to guess at the best configuration of hidden units for a particular problem. Cascade-correlation can converge quickly. As the Training time is very fast, it makes cascade correlation networks suitable for large training sets. As with all types of models, there are some disadvantages to cascade correlation networks. They have an extreme potential for over fitting the training data; this results in excellent accuracy on the training data but poor accuracy on new, unseen data. Cascade correlation networks usually are less accurate than probabilistic and general regression neural networks on small to medium size problems (i.e., fewer than a couple of thousand training rows). Cascade correlation is less likely to get trapped in local minima than multilayer perceptron networks. Thus this DB wavelets, FLDA and FI method, in comparison with other methods, has the advantages of low computational cost and requires less time for classification for small number of database images. Further, the variation in illumination, pose or facial expression does not affect the recognition process. The fuzzy integral data fusion technique also has its limitation. The number of fuzzy measures increases exponentially with the number of parameters. One of the distinguishing features of fuzzy measure and fuzzy integral technique is that it is able to represent certain interactions between criteria. Finally, it has been experimentally demonstrated that the aggregation of classifiers resulting from fisher face operating on four sub image sets generated by wavelet decomposition leads to better classification
10 146 results. In this method, images under different illumination and expressions can be recognized. FCM has the advantages of low computational cost and requires less time for classification. Further, the variation in illumination, pose or facial expressions does not affect the recognition process. The fuzzy integral data fusion technique also has its limitation. The number of fuzzy measures increases exponentially with the number of parameters. The Fuzzy C-means (FCM) algorithm has successfully been applied to a wide variety of clustering problems. However, these algorithms work better for unlabeled data, for this project an algorithm which can utilize the labels of the data is needed for a better performance. Fuzzy Clustering algorithms partition methods that can be used to assign objects of dataset to their clusters. These algorithms optimize a subjective function that evaluates a given Fuzzy assignment of object to clusters. The problem of Fuzzy clustering is to find a fuzzy pseudo partition and the associated cluster centers, by which the structure of the data is represented as best as possible. To solve the fuzzy clustering problem, a performance index is formulated. Similar images are grouped by FCM; the group of images can be recognized within few minutes with better recognition. 6.3 APPLICATIONS OF FACE RECOGNITION Today, face recognition technology is being used to combat passport fraud, support law enforcement, identify missing children, and minimize benefit/identity fraud. The computer-based face recognition industry has made much useful advancement in the past decade. The proposed system of face recognition may be applied in identification systems,
11 147 document control and access control. The face similarity meter was found to perform satisfactorily in adverse conditions of exposure, illumination and contrast variations and face pose. Biometric technologies have found application in four broad application categories: surveillance, screening, enrollment identification and identity verification. General security tasks, such as access control to buildings, can be accomplished by a face recognition system. Banking operations and credit card transactions could also be verified by matching the image encoded in the magnetic strip of the card with the person using the card at any time. As one of the most successful applications of image analysis and understanding, face recognition has recently received significant attention, especially during the past several years. At least two reasons account for this trend: the first is the wide range of commercial and law enforcement applications, and the second is the availability of feasible technologies after 30 years of research. Even though current machine recognition systems have reached a certain level of maturity, their success is limited by the conditions imposed by many real applications. For example, recognition of face images acquired in an outdoor environment with changes in illumination and/or pose remains a largely unsolved problem. In other words, current systems are still far away from the capability of the human perception system. Face recognition can be used for both verification and identification (open-set and closed-set). Face recognition has received substantial attention from researches in biometrics, pattern recognition field and computer vision communities. The recognition of faces is very important because of its potential commercial applications, such as in the area of video surveillance, access control systems, retrieval of an identity from a data base for criminal investigations and user authentication.
12 148 The application of face recognition technique can be categorized into two main parts: law enforcement application and commercial application. major contribution. The following is a list of areas where face recognition can make a Law enforcement: Historically, the major user of biometrics, police agencies have used face recognition as a means of identifying criminals for well over a hundred years. Police gain the most benefit because a criminal's biometric information such as fingerprints, face recognition, DNA, etc, may already be held in a database. This enables forensic information collected at a crime scene and a witness description in the case of facial image, to be matched against it. Law enforcement agencies have achieved significant success with facial recognition, matching the mugshot (or even composite drawing) of a suspect against a database of offenders. This is particularly useful where the individual has refused to give his name, or has given a false name. Airport security: As in many cases, the only information available on suspected terrorists was a mug shot or surveillance photo and facial recognition was thrust to center stage as the biometric which could help identify them before they board the plane. While much work has been done in this area, the practical and logistical issues which have to be overcome have meant that so far implementation has not been as fast as originally anticipated. Child recovery: The proliferation of the Worldwide Web in the second half of the 90's had led to an explosion in the exchange of pedophilic imagery. Imaging and biometric technologies have achieved notable successes in tracking down pedophiles and identifying missing and abused children.
13 149 Access control: The use of fingerprints to verify an individual is well-established in biometrics. While a photo on a pass card helps prevent the use of the card by someone other than the individual to whom it was issued, it is far from infallible. The issue here is identity fraud, where the agency needs to know primarily three things: Before issuing a document, has a similar document already been issued to this individual under a different name? On subsequent presentation of the document, say at a Point of Entry, is the individual presenting it the same individual to whom it was issued? If not the same individual, who are they? Various biometrics can be used for these purposes. In 2003 the International Civil Aviation Organization (ICAO), stated a preference for fingerprints and facial recognition to be used on travel documents. Driver s Licenses: While driver s license is in many ways a similar application to ID cards, it is still the case in most countries that ID cards are not used and therefore the driver s license database is by far the largest database available of adult citizens. Drivers licenses are an ideal application for facial recognition because the individuals cooperate in having their photo taken, while the environment has been set up with optimal lighting, camera resolution, distance from the subject and neutral background. While this offers a potentially invaluable tool in identifying individuals whose details are in the database, because of privacy concerns it cannot be used for this purpose in certain jurisdictions. Smartcards: Smartcards are not a different application, but a particularly secure means of providing an individual with an identity card.
14 150 They are especially appropriate for biometrics because sufficient memory can be made available to hold the individual's facial image and a number of encode arrays. While these will always be held in a central database as well, having them on the card itself enables it to be used in locations where there may be no network access. Naturally, it is expected that the same techniques could be applied to identifying facial expressions where the set of training images is divided into classes based on the facial expression. Face recognition technology has numerous commercial and law enforcement applications. These applications range from static matching of controlled format photographs such as passports, credit cards, photo ID s, driver s licenses and mug shots to real time matching of surveillance video images. Understanding the human mechanisms employed to recognize a face constitutes a challenge for psychologists and neural scientists. In addition to the cognitive aspects, understanding face recognition is important, since the same underlying mechanisms could be used to build a system for the automatic identification of faces by machine. Machine recognition of faces is gradually becoming very important due to its wide range of commercial and law enforcement applications, which include forensic identification, access control, border surveillance and human computer interactions. Static matching of photographs (Mug-shot), Biometric security, Passport control at terminals in airports, Participant identification in meetings, Scanning for criminal persons, Video surveillance, Law enforcement (mug shot identification), Verification for personal identification (driver s licenses, passports, etc.), Electoral verification, Surveillance of crowd behavior are the various significant application of face recognition technology.
15 LIMITATIONS OF FACE RECOGNITION Face recognition is not so robust against extreme variations in expressions, pose and background. Also this cannot be used efficiently for faces with lateral head rotation. The computing power in general makes face recognition suitable for offline applications as online applications require high computing power. Face recognition alone as of now, cannot be successfully used for authentication but can be used for identification and classification. Identical twins cannot be distinguished using face recognition.
CHAPTER 3 PRINCIPAL COMPONENT ANALYSIS AND FISHER LINEAR DISCRIMINANT ANALYSIS
38 CHAPTER 3 PRINCIPAL COMPONENT ANALYSIS AND FISHER LINEAR DISCRIMINANT ANALYSIS 3.1 PRINCIPAL COMPONENT ANALYSIS (PCA) 3.1.1 Introduction In the previous chapter, a brief literature review on conventional
More informationIMPROVED FACE RECOGNITION USING ICP TECHNIQUES INCAMERA SURVEILLANCE SYSTEMS. Kirthiga, M.E-Communication system, PREC, Thanjavur
IMPROVED FACE RECOGNITION USING ICP TECHNIQUES INCAMERA SURVEILLANCE SYSTEMS Kirthiga, M.E-Communication system, PREC, Thanjavur R.Kannan,Assistant professor,prec Abstract: Face Recognition is important
More informationDigital Vision Face recognition
Ulrik Söderström ulrik.soderstrom@tfe.umu.se 27 May 2007 Digital Vision Face recognition 1 Faces Faces are integral to human interaction Manual facial recognition is already used in everyday authentication
More informationA FACE RECOGNITION SYSTEM BASED ON PRINCIPAL COMPONENT ANALYSIS USING BACK PROPAGATION NEURAL NETWORKS
A FACE RECOGNITION SYSTEM BASED ON PRINCIPAL COMPONENT ANALYSIS USING BACK PROPAGATION NEURAL NETWORKS 1 Dr. Umesh Sehgal and 2 Surender Saini 1 Asso. Prof. Arni University, umeshsehgalind@gmail.com 2
More informationFace Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image Processing Chandani Sharma Research Scholar Department of Electronics & Communication Engg. Graphic Era University, Dehradun, U K, INDIA Abstract: Face Recognition
More informationDr. Enrique Cabello Pardos July
Dr. Enrique Cabello Pardos July 20 2011 Dr. Enrique Cabello Pardos July 20 2011 ONCE UPON A TIME, AT THE LABORATORY Research Center Contract Make it possible. (as fast as possible) Use the best equipment.
More informationStudy of Face-Recognition Parameters and its finding using DSP Software
Study of Face-Recognition Parameters and its finding using DSP Software Manisha Urkude 1, Dr. S.B. Kishor 2 and Dr. Sunil Naranje 3 1 Researcher, RTMNU, Nagpur and Working in RCERT, Chandrapur 2 Head of
More informationFACE RECOGNITION USING FUZZY NEURAL NETWORK
FACE RECOGNITION USING FUZZY NEURAL NETWORK TADI.CHANDRASEKHAR Research Scholar, Dept. of ECE, GITAM University, Vishakapatnam, AndraPradesh Assoc. Prof., Dept. of. ECE, GIET Engineering College, Vishakapatnam,
More informationDr. K. Nagabhushan Raju Professor, Dept. of Instrumentation Sri Krishnadevaraya University, Anantapuramu, Andhra Pradesh, India
Volume 6, Issue 10, October 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Design and
More informationHaresh D. Chande #, Zankhana H. Shah *
Illumination Invariant Face Recognition System Haresh D. Chande #, Zankhana H. Shah * # Computer Engineering Department, Birla Vishvakarma Mahavidyalaya, Gujarat Technological University, India * Information
More informationCHAPTER 2 LITERATURE REVIEW
9 CHAPTER 2 LITERATURE REVIEW 2.1 INTRODUCTION In this chapter the literature available within the purview of the objectives of the present study is reviewed and the need for the proposed work is discussed.
More informationFace recognition for enhanced security.
Face recognition for enhanced security. Cognitec Systems - the face recognition company FaceVACS : Face Recognition Technology FaceVACS Face Recognition Technology Cognitec s patented FaceVACS technology
More informationApplications Video Surveillance (On-line or off-line)
Face Face Recognition: Dimensionality Reduction Biometrics CSE 190-a Lecture 12 CSE190a Fall 06 CSE190a Fall 06 Face Recognition Face is the most common biometric used by humans Applications range from
More informationAn Integrated Face Recognition Algorithm Based on Wavelet Subspace
, pp.20-25 http://dx.doi.org/0.4257/astl.204.48.20 An Integrated Face Recognition Algorithm Based on Wavelet Subspace Wenhui Li, Ning Ma, Zhiyan Wang College of computer science and technology, Jilin University,
More informationA Survey on Feature Extraction Techniques for Palmprint Identification
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 03 Issue. 12 A Survey on Feature Extraction Techniques for Palmprint Identification Sincy John 1, Kumudha Raimond 2 1
More informationForensic Sketches matching
Forensic Sketches matching Ms Neha S.Syed 1 Dept. of Comp. Science & Engineering People s Education Society s college of Engineering Aurangabad, India. E-mail: nehas1708@gmail.com Abstract In this paper
More informationFace Recognition for Mobile Devices
Face Recognition for Mobile Devices Aditya Pabbaraju (adisrinu@umich.edu), Srujankumar Puchakayala (psrujan@umich.edu) INTRODUCTION Face recognition is an application used for identifying a person from
More informationCHAPTER 6 HYBRID AI BASED IMAGE CLASSIFICATION TECHNIQUES
CHAPTER 6 HYBRID AI BASED IMAGE CLASSIFICATION TECHNIQUES 6.1 INTRODUCTION The exploration of applications of ANN for image classification has yielded satisfactory results. But, the scope for improving
More informationRecognition of Non-symmetric Faces Using Principal Component Analysis
Recognition of Non-symmetric Faces Using Principal Component Analysis N. Krishnan Centre for Information Technology & Engineering Manonmaniam Sundaranar University, Tirunelveli-627012, India Krishnan17563@yahoo.com
More informationMachine Learning 13. week
Machine Learning 13. week Deep Learning Convolutional Neural Network Recurrent Neural Network 1 Why Deep Learning is so Popular? 1. Increase in the amount of data Thanks to the Internet, huge amount of
More informationSemi-Supervised PCA-based Face Recognition Using Self-Training
Semi-Supervised PCA-based Face Recognition Using Self-Training Fabio Roli and Gian Luca Marcialis Dept. of Electrical and Electronic Engineering, University of Cagliari Piazza d Armi, 09123 Cagliari, Italy
More informationFace Recognition using Eigenfaces SMAI Course Project
Face Recognition using Eigenfaces SMAI Course Project Satarupa Guha IIIT Hyderabad 201307566 satarupa.guha@research.iiit.ac.in Ayushi Dalmia IIIT Hyderabad 201307565 ayushi.dalmia@research.iiit.ac.in Abstract
More informationImage Processing and Image Representations for Face Recognition
Image Processing and Image Representations for Face Recognition 1 Introduction Face recognition is an active area of research in image processing and pattern recognition. Since the general topic of face
More informationFace recognition based on improved BP neural network
Face recognition based on improved BP neural network Gaili Yue, Lei Lu a, College of Electrical and Control Engineering, Xi an University of Science and Technology, Xi an 710043, China Abstract. In order
More information6. Multimodal Biometrics
6. Multimodal Biometrics Multimodal biometrics is based on combination of more than one type of biometric modalities or traits. The most compelling reason to combine different modalities is to improve
More informationCOSC160: Detection and Classification. Jeremy Bolton, PhD Assistant Teaching Professor
COSC160: Detection and Classification Jeremy Bolton, PhD Assistant Teaching Professor Outline I. Problem I. Strategies II. Features for training III. Using spatial information? IV. Reducing dimensionality
More informationRange Imaging Through Triangulation. Range Imaging Through Triangulation. Range Imaging Through Triangulation. Range Imaging Through Triangulation
Obviously, this is a very slow process and not suitable for dynamic scenes. To speed things up, we can use a laser that projects a vertical line of light onto the scene. This laser rotates around its vertical
More informationA Survey on Face-Sketch Matching Techniques
A Survey on Face-Sketch Matching Techniques Reshma C Mohan 1, M. Jayamohan 2, Arya Raj S 3 1 Department of Computer Science, SBCEW 2 Department of Computer Science, College of Applied Science 3 Department
More informationSpatial Frequency Domain Methods for Face and Iris Recognition
Spatial Frequency Domain Methods for Face and Iris Recognition Dept. of Electrical and Computer Engineering Carnegie Mellon University Pittsburgh, PA 15213 e-mail: Kumar@ece.cmu.edu Tel.: (412) 268-3026
More informationNon-Cooperative Biometrics. Patricia Wolfhope Program Manager Resilient Systems Division Science and Technology Directorate
Non-Cooperative Biometrics Patricia Wolfhope Program Manager Resilient Systems Division Science and Technology Directorate patricia.wolfhope@dhs.gov DHS Organization 2 Resilient Systems Division 3 DHS
More informationWebpage: Volume 3, Issue VII, July 2015 ISSN
Independent Component Analysis (ICA) Based Face Recognition System S.Narmatha 1, K.Mahesh 2 1 Research Scholar, 2 Associate Professor 1,2 Department of Computer Science and Engineering, Alagappa University,
More informationFuzzy Segmentation. Chapter Introduction. 4.2 Unsupervised Clustering.
Chapter 4 Fuzzy Segmentation 4. Introduction. The segmentation of objects whose color-composition is not common represents a difficult task, due to the illumination and the appropriate threshold selection
More informationA Study on Different Challenges in Facial Recognition Methods
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.521
More informationEE 589 INTRODUCTION TO ARTIFICIAL NETWORK REPORT OF THE TERM PROJECT REAL TIME ODOR RECOGNATION SYSTEM FATMA ÖZYURT SANCAR
EE 589 INTRODUCTION TO ARTIFICIAL NETWORK REPORT OF THE TERM PROJECT REAL TIME ODOR RECOGNATION SYSTEM FATMA ÖZYURT SANCAR 1.Introductıon. 2.Multi Layer Perception.. 3.Fuzzy C-Means Clustering.. 4.Real
More informationFacial Expression Recognition Using Non-negative Matrix Factorization
Facial Expression Recognition Using Non-negative Matrix Factorization Symeon Nikitidis, Anastasios Tefas and Ioannis Pitas Artificial Intelligence & Information Analysis Lab Department of Informatics Aristotle,
More informationA Matlab based Face Recognition GUI system Using Principal Component Analysis and Artificial Neural Network
A Matlab based Face Recognition GUI system Using Principal Component Analysis and Artificial Neural Network Achala Khandelwal 1 and Jaya Sharma 2 1,2 Asst Prof Department of Electrical Engineering, Shri
More informationThree-Dimensional Face Recognition: A Fishersurface Approach
Three-Dimensional Face Recognition: A Fishersurface Approach Thomas Heseltine, Nick Pears, Jim Austin Department of Computer Science, The University of York, United Kingdom Abstract. Previous work has
More informationColor Local Texture Features Based Face Recognition
Color Local Texture Features Based Face Recognition Priyanka V. Bankar Department of Electronics and Communication Engineering SKN Sinhgad College of Engineering, Korti, Pandharpur, Maharashtra, India
More informationFACE RECOGNITION USING INDEPENDENT COMPONENT
Chapter 5 FACE RECOGNITION USING INDEPENDENT COMPONENT ANALYSIS OF GABORJET (GABORJET-ICA) 5.1 INTRODUCTION PCA is probably the most widely used subspace projection technique for face recognition. A major
More informationFace Recognition using Laplacianfaces
Journal homepage: www.mjret.in ISSN:2348-6953 Kunal kawale Face Recognition using Laplacianfaces Chinmay Gadgil Mohanish Khunte Ajinkya Bhuruk Prof. Ranjana M.Kedar Abstract Security of a system is an
More informationNeoFace Watch real-time face recognition How does it work? May 2018 Global Face Recognition Centre of Excellence NEC Europe
NeoFace Watch real-time face recognition How does it work? May 2018 Global Face Recognition Centre of Excellence NEC Europe Executive Summary There is much misunderstanding about the operation of real-time
More informationComponent-based Face Recognition with 3D Morphable Models
Component-based Face Recognition with 3D Morphable Models B. Weyrauch J. Huang benjamin.weyrauch@vitronic.com jenniferhuang@alum.mit.edu Center for Biological and Center for Biological and Computational
More informationCS6220: DATA MINING TECHNIQUES
CS6220: DATA MINING TECHNIQUES Image Data: Classification via Neural Networks Instructor: Yizhou Sun yzsun@ccs.neu.edu November 19, 2015 Methods to Learn Classification Clustering Frequent Pattern Mining
More informationA Study on the Neural Network Model for Finger Print Recognition
A Study on the Neural Network Model for Finger Print Recognition Vijaya Sathiaraj Dept of Computer science and Engineering Bharathidasan University, Trichirappalli-23 Abstract: Finger Print Recognition
More informationLinear Discriminant Analysis for 3D Face Recognition System
Linear Discriminant Analysis for 3D Face Recognition System 3.1 Introduction Face recognition and verification have been at the top of the research agenda of the computer vision community in recent times.
More informationIllumination invariant face detection
University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2009 Illumination invariant face detection Alister Cordiner University
More informationMobile Face Recognization
Mobile Face Recognization CS4670 Final Project Cooper Bills and Jason Yosinski {csb88,jy495}@cornell.edu December 12, 2010 Abstract We created a mobile based system for detecting faces within a picture
More informationSu et al. Shape Descriptors - III
Su et al. Shape Descriptors - III Siddhartha Chaudhuri http://www.cse.iitb.ac.in/~cs749 Funkhouser; Feng, Liu, Gong Recap Global A shape descriptor is a set of numbers that describes a shape in a way that
More informationImage enhancement for face recognition using color segmentation and Edge detection algorithm
Image enhancement for face recognition using color segmentation and Edge detection algorithm 1 Dr. K Perumal and 2 N Saravana Perumal 1 Computer Centre, Madurai Kamaraj University, Madurai-625021, Tamilnadu,
More informationAbstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric;
Analysis Of Finger Print Detection Techniques Prof. Trupti K. Wable *1(Assistant professor of Department of Electronics & Telecommunication, SVIT Nasik, India) trupti.wable@pravara.in*1 Abstract -Fingerprints
More informationCHAPTER 5 GLOBAL AND LOCAL FEATURES FOR FACE RECOGNITION
122 CHAPTER 5 GLOBAL AND LOCAL FEATURES FOR FACE RECOGNITION 5.1 INTRODUCTION Face recognition, means checking for the presence of a face from a database that contains many faces and could be performed
More informationFace Recognition System Using PCA
Face Recognition System Using PCA M.V.N.R. Pavan Kumar 1, Shaikh Arshad A. 2, Katwate Dhananjay P. 3,Jamdar Rohit N. 4 Department of Electronics and Telecommunication Engineering 1,2,3,4, LNBCIET, Satara-415020
More informationTraining Algorithms for Robust Face Recognition using a Template-matching Approach
Training Algorithms for Robust Face Recognition using a Template-matching Approach Xiaoyan Mu, Mehmet Artiklar, Metin Artiklar, and Mohamad H. Hassoun Department of Electrical and Computer Engineering
More informationCombining Gabor Features: Summing vs.voting in Human Face Recognition *
Combining Gabor Features: Summing vs.voting in Human Face Recognition * Xiaoyan Mu and Mohamad H. Hassoun Department of Electrical and Computer Engineering Wayne State University Detroit, MI 4822 muxiaoyan@wayne.edu
More informationFACE RECOGNITION BASED ON GENDER USING A MODIFIED METHOD OF 2D-LINEAR DISCRIMINANT ANALYSIS
FACE RECOGNITION BASED ON GENDER USING A MODIFIED METHOD OF 2D-LINEAR DISCRIMINANT ANALYSIS 1 Fitri Damayanti, 2 Wahyudi Setiawan, 3 Sri Herawati, 4 Aeri Rachmad 1,2,3,4 Faculty of Engineering, University
More informationImage-Based Face Recognition using Global Features
Image-Based Face Recognition using Global Features Xiaoyin xu Research Centre for Integrated Microsystems Electrical and Computer Engineering University of Windsor Supervisors: Dr. Ahmadi May 13, 2005
More informationHW2 due on Thursday. Face Recognition: Dimensionality Reduction. Biometrics CSE 190 Lecture 11. Perceptron Revisited: Linear Separators
HW due on Thursday Face Recognition: Dimensionality Reduction Biometrics CSE 190 Lecture 11 CSE190, Winter 010 CSE190, Winter 010 Perceptron Revisited: Linear Separators Binary classification can be viewed
More informationHuman Identification at a Distance Using Body Shape Information
IOP Conference Series: Materials Science and Engineering OPEN ACCESS Human Identification at a Distance Using Body Shape Information To cite this article: N K A M Rashid et al 2013 IOP Conf Ser: Mater
More informationFace detection and recognition. Detection Recognition Sally
Face detection and recognition Detection Recognition Sally Face detection & recognition Viola & Jones detector Available in open CV Face recognition Eigenfaces for face recognition Metric learning identification
More informationFacial Expression Detection Using Implemented (PCA) Algorithm
Facial Expression Detection Using Implemented (PCA) Algorithm Dileep Gautam (M.Tech Cse) Iftm University Moradabad Up India Abstract: Facial expression plays very important role in the communication with
More informationFACE RECOGNITION USING SUPPORT VECTOR MACHINES
FACE RECOGNITION USING SUPPORT VECTOR MACHINES Ashwin Swaminathan ashwins@umd.edu ENEE633: Statistical and Neural Pattern Recognition Instructor : Prof. Rama Chellappa Project 2, Part (b) 1. INTRODUCTION
More informationBreaking it Down: The World as Legos Benjamin Savage, Eric Chu
Breaking it Down: The World as Legos Benjamin Savage, Eric Chu To devise a general formalization for identifying objects via image processing, we suggest a two-pronged approach of identifying principal
More informationFinger Vein Biometric Approach for Personal Identification Using IRT Feature and Gabor Filter Implementation
Finger Vein Biometric Approach for Personal Identification Using IRT Feature and Gabor Filter Implementation Sowmya. A (Digital Electronics (MTech), BITM Ballari), Shiva kumar k.s (Associate Professor,
More informationAn Efficient Back Propagation Neural Network Based Face Recognition System Using Haar Wavelet Transform and PCA
An Efficient Back Propagation Neural Network Based Face Recognition System Using Haar Wavelet Transform and PCA *Ravi Prakash Abstract With fast evolving technology, it is necessary to design an efficient
More informationROTATION INVARIANT SPARSE CODING AND PCA
ROTATION INVARIANT SPARSE CODING AND PCA NATHAN PFLUEGER, RYAN TIMMONS Abstract. We attempt to encode an image in a fashion that is only weakly dependent on rotation of objects within the image, as an
More informationAn Introduction to Content Based Image Retrieval
CHAPTER -1 An Introduction to Content Based Image Retrieval 1.1 Introduction With the advancement in internet and multimedia technologies, a huge amount of multimedia data in the form of audio, video and
More informationCLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS
CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS CHAPTER 4 CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS 4.1 Introduction Optical character recognition is one of
More informationGender Classification
Gender Classification Thomas Witzig Master student, 76128 Karlsruhe, Germany, Computer Vision for Human-Computer Interaction Lab KIT University of the State of Baden-Wuerttemberg and National Research
More informationFACE DETECTION USING CURVELET TRANSFORM AND PCA
Volume 119 No. 15 2018, 1565-1575 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ http://www.acadpubl.eu/hub/ FACE DETECTION USING CURVELET TRANSFORM AND PCA Abai Kumar M 1, Ajith Kumar
More informationCursive Handwriting Recognition System Using Feature Extraction and Artificial Neural Network
Cursive Handwriting Recognition System Using Feature Extraction and Artificial Neural Network Utkarsh Dwivedi 1, Pranjal Rajput 2, Manish Kumar Sharma 3 1UG Scholar, Dept. of CSE, GCET, Greater Noida,
More informationFace and Facial Expression Detection Using Viola-Jones and PCA Algorithm
Face and Facial Expression Detection Using Viola-Jones and PCA Algorithm MandaVema Reddy M.Tech (Computer Science) Mailmv999@gmail.com Abstract Facial expression is a prominent posture beneath the skin
More informationOutline 7/2/201011/6/
Outline Pattern recognition in computer vision Background on the development of SIFT SIFT algorithm and some of its variations Computational considerations (SURF) Potential improvement Summary 01 2 Pattern
More informationA Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation
A Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation * A. H. M. Al-Helali, * W. A. Mahmmoud, and * H. A. Ali * Al- Isra Private University Email: adnan_hadi@yahoo.com Abstract:
More informationFace Detection Using Convolutional Neural Networks and Gabor Filters
Face Detection Using Convolutional Neural Networks and Gabor Filters Bogdan Kwolek Rzeszów University of Technology W. Pola 2, 35-959 Rzeszów, Poland bkwolek@prz.rzeszow.pl Abstract. This paper proposes
More informationCHAPTER 5 PALMPRINT RECOGNITION WITH ENHANCEMENT
145 CHAPTER 5 PALMPRINT RECOGNITION WITH ENHANCEMENT 5.1 INTRODUCTION This chapter discusses the application of enhancement technique in palmprint recognition system. Section 5.2 describes image sharpening
More informationFace recognition algorithms: performance evaluation
Face recognition algorithms: performance evaluation Project Report Marco Del Coco - Pierluigi Carcagnì Institute of Applied Sciences and Intelligent systems c/o Dhitech scarl Campus Universitario via Monteroni
More informationCMU Lecture 18: Deep learning and Vision: Convolutional neural networks. Teacher: Gianni A. Di Caro
CMU 15-781 Lecture 18: Deep learning and Vision: Convolutional neural networks Teacher: Gianni A. Di Caro DEEP, SHALLOW, CONNECTED, SPARSE? Fully connected multi-layer feed-forward perceptrons: More powerful
More information5 Machine Learning Abstractions and Numerical Optimization
Machine Learning Abstractions and Numerical Optimization 25 5 Machine Learning Abstractions and Numerical Optimization ML ABSTRACTIONS [some meta comments on machine learning] [When you write a large computer
More informationLOCAL APPEARANCE BASED FACE RECOGNITION USING DISCRETE COSINE TRANSFORM
LOCAL APPEARANCE BASED FACE RECOGNITION USING DISCRETE COSINE TRANSFORM Hazim Kemal Ekenel, Rainer Stiefelhagen Interactive Systems Labs, University of Karlsruhe Am Fasanengarten 5, 76131, Karlsruhe, Germany
More informationEigenfaces and Fisherfaces A comparison of face detection techniques. Abstract. Pradyumna Desale SCPD, NVIDIA
Eigenfaces and Fisherfaces A comparison of face detection techniques Pradyumna Desale SCPD, NVIDIA pdesale@nvidia.com Angelica Perez Stanford University pereza77@stanford.edu Abstract In this project we
More informationExpression Detection in Video. Abstract Expression detection is useful as a non-invasive method of lie detection and
Wes Miller 5/11/2011 Comp Sci 534 Expression Detection in Video Abstract Expression detection is useful as a non-invasive method of lie detection and behavior prediction, as many facial expressions are
More informationPROBLEM FORMULATION AND RESEARCH METHODOLOGY
PROBLEM FORMULATION AND RESEARCH METHODOLOGY ON THE SOFT COMPUTING BASED APPROACHES FOR OBJECT DETECTION AND TRACKING IN VIDEOS CHAPTER 3 PROBLEM FORMULATION AND RESEARCH METHODOLOGY The foregoing chapter
More informationNIST. Support Vector Machines. Applied to Face Recognition U56 QC 100 NO A OS S. P. Jonathon Phillips. Gaithersburg, MD 20899
^ A 1 1 1 OS 5 1. 4 0 S Support Vector Machines Applied to Face Recognition P. Jonathon Phillips U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Information
More informationMobile Human Detection Systems based on Sliding Windows Approach-A Review
Mobile Human Detection Systems based on Sliding Windows Approach-A Review Seminar: Mobile Human detection systems Njieutcheu Tassi cedrique Rovile Department of Computer Engineering University of Heidelberg
More informationAN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE
AN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE sbsridevi89@gmail.com 287 ABSTRACT Fingerprint identification is the most prominent method of biometric
More informationHuman Detection and Tracking for Video Surveillance: A Cognitive Science Approach
Human Detection and Tracking for Video Surveillance: A Cognitive Science Approach Vandit Gajjar gajjar.vandit.381@ldce.ac.in Ayesha Gurnani gurnani.ayesha.52@ldce.ac.in Yash Khandhediya khandhediya.yash.364@ldce.ac.in
More informationGraph Matching Iris Image Blocks with Local Binary Pattern
Graph Matching Iris Image Blocs with Local Binary Pattern Zhenan Sun, Tieniu Tan, and Xianchao Qiu Center for Biometrics and Security Research, National Laboratory of Pattern Recognition, Institute of
More informationRobust Face Recognition via Sparse Representation Authors: John Wright, Allen Y. Yang, Arvind Ganesh, S. Shankar Sastry, and Yi Ma
Robust Face Recognition via Sparse Representation Authors: John Wright, Allen Y. Yang, Arvind Ganesh, S. Shankar Sastry, and Yi Ma Presented by Hu Han Jan. 30 2014 For CSE 902 by Prof. Anil K. Jain: Selected
More informationPCA and KPCA algorithms for Face Recognition A Survey
PCA and KPCA algorithms for Face Recognition A Survey Surabhi M. Dhokai 1, Vaishali B.Vala 2,Vatsal H. Shah 3 1 Department of Information Technology, BVM Engineering College, surabhidhokai@gmail.com 2
More informationNeural Networks. CE-725: Statistical Pattern Recognition Sharif University of Technology Spring Soleymani
Neural Networks CE-725: Statistical Pattern Recognition Sharif University of Technology Spring 2013 Soleymani Outline Biological and artificial neural networks Feed-forward neural networks Single layer
More informationDisguised Face Identification (DFI) with Facial KeyPoints using Spatial Fusion Convolutional Network. Nathan Sun CIS601
Disguised Face Identification (DFI) with Facial KeyPoints using Spatial Fusion Convolutional Network Nathan Sun CIS601 Introduction Face ID is complicated by alterations to an individual s appearance Beard,
More informationFace Detection and Recognition in an Image Sequence using Eigenedginess
Face Detection and Recognition in an Image Sequence using Eigenedginess B S Venkatesh, S Palanivel and B Yegnanarayana Department of Computer Science and Engineering. Indian Institute of Technology, Madras
More informationCriminal Identification System Using Face Detection and Recognition
Criminal Identification System Using Face Detection and Recognition Piyush Kakkar 1, Mr. Vibhor Sharma 2 Information Technology Department, Maharaja Agrasen Institute of Technology, Delhi 1 Assistant Professor,
More informationTexture Image Segmentation using FCM
Proceedings of 2012 4th International Conference on Machine Learning and Computing IPCSIT vol. 25 (2012) (2012) IACSIT Press, Singapore Texture Image Segmentation using FCM Kanchan S. Deshmukh + M.G.M
More informationFace Recognition using Tensor Analysis. Prahlad R. Enuganti
Face Recognition using Tensor Analysis Prahlad R. Enuganti The University of Texas at Austin Literature Survey EE381K 14 Multidimensional Digital Signal Processing March 25, 2005 Submitted to Prof. Brian
More information4.12 Generalization. In back-propagation learning, as many training examples as possible are typically used.
1 4.12 Generalization In back-propagation learning, as many training examples as possible are typically used. It is hoped that the network so designed generalizes well. A network generalizes well when
More informationFace Recognition using Principle Component Analysis, Eigenface and Neural Network
Face Recognition using Principle Component Analysis, Eigenface and Neural Network Mayank Agarwal Student Member IEEE Noida,India mayank.agarwal@ieee.org Nikunj Jain Student Noida,India nikunj262@gmail.com
More informationPALM PRINT RECOGNITION AND AUTHENTICATION USING DIGITAL IMAGE PROCESSSING TECHNIQUE
PALM PRINT RECOGNITION AND AUTHENTICATION USING DIGITAL IMAGE PROCESSSING TECHNIQUE Prof.V.R.Raut 1, Prof.Ms.S.S.Kukde 2, Shraddha S. Pande 3 3 Student of M.E Department of Electronics and telecommunication,
More informationSUMMARY: DISTINCTIVE IMAGE FEATURES FROM SCALE- INVARIANT KEYPOINTS
SUMMARY: DISTINCTIVE IMAGE FEATURES FROM SCALE- INVARIANT KEYPOINTS Cognitive Robotics Original: David G. Lowe, 004 Summary: Coen van Leeuwen, s1460919 Abstract: This article presents a method to extract
More informationA Hierarchical Face Identification System Based on Facial Components
A Hierarchical Face Identification System Based on Facial Components Mehrtash T. Harandi, Majid Nili Ahmadabadi, and Babak N. Araabi Control and Intelligent Processing Center of Excellence Department of
More information