CHAPTER 6 PERFORMANCE ANALYSIS OF SOFT COMPUTING BASED FACE RECOGNITION

Size: px
Start display at page:

Download "CHAPTER 6 PERFORMANCE ANALYSIS OF SOFT COMPUTING BASED FACE RECOGNITION"

Transcription

1 137 CHAPTER 6 PERFORMANCE ANALYSIS OF SOFT COMPUTING BASED FACE RECOGNITION In the previous chapters, a brief description about the theory and experimental results of PCA, FLDA, Gabor, Neural, Db wavelets and Fuzzy C-means clustering based algorithms for human Face recognition are presented. In this chapter, some description about performance metrics (Shepherd et al 1991) of Face Recognition like Recognition rate, Execution time, False Acceptance Ratio (FAR) and False Rejection Ratio (FRR) for all the above algorithms are discussed. 6.1 PERFORMANCE ANALYSIS In this section six algorithms for face recognition under different aspects of light, pose and facial expressions are compared based on some performance metrics like recognition rate, execution time and FAR and FRR (Sherrah 2004). In Chapters 3, 4 and 5, various algorithms of Face recognition using Eigenfaces method, and the Fisher face method, Gabor wavelets, Back propagation Neural Network, Cascaded Neural network, Fuzzy Integral and Fuzzy C- means Clustering are discussed. The experimentation is applied on three important data bases like ORL, YALE and FERET. Finally, it is concluded that the Fuzzy C means clustering with BPNN method has lower error rate than any of the other methods. Apart from this, the successful implementation of these algorithms involves huge training set with multiple images in different pose and

2 138 expression for each person. Also, the performance of these algorithms varies under different training set and different test set. The performance metrics like Recognition rate, Accuracy, FAR, FRR and Execution time are calculated as per the formulas given in equations (3.15) to (3.17) Recognition Rate Recognition Rates (RR) are compared for all the algorithms in Chapters 2, 3, 4 and it is concluded that the algorithm that combines FLDA, FCM and BPNN achieves the best. False Acceptance Rate (FAR) is that each of the test images of a single subject is compared with all images of all other subjects but not its own images. False rejection rate (FRR) is that each of the test images of a single subject is compared with each of the training image of that subject. No image is compared with itself (i.e. training and testing images should be different) and each pair is compared only once. Results are compared using the RR, FAR, FRR and Accuracy. The two standard biometric measures, FAR and FRR indicate the identifying power. The lower the equal value, the better identifying power the system possesses Execution Time For all the above algorithms, execution time (i.e.) total time taken to recognize the given image in seconds is compared and it ranges from seconds for 50 to 400 images. Among the algorithms, the combination of FLDA, FCM Gabor and BPNN is found to be having less execution time. In MATLAB total execution time is measured by the program using Tic and Tac commands Accuracy For all the above algorithms, overall accuracy is calculated and it is found to be around 90 % for sixty images. The best accuracy is obtained from

3 139 the FLDA, FCM and BPNN. The comparison of the performance parameters with all above said algorithm are experimentally verified with all databases. Tabulation and Graphical analysis of ORL data base for recognition rate, execution time and accuracy are presented in Tables 6.1, 6.2, 6.3 and Figures 6.1, 6.2, 6.3 respectively. Table 6.1 Comparison of recognition rate for all algorithms Recognition rate (%) No. of images PCA FLDA BPNN CNN DB+FLDA FCM+BPNN Figure 6.1 Graphical analysis of all algorithms for recognition rate

4 140 Table 6.2 Comparison of execution time for all algorithm No. of Images Execution time (sec) PCA FLDA BPNN CNN DB +FLDA FCM+BPNN Figure 6.2 Graphical analysis of execution time for all algorithms

5 141 False acceptance ratio (FAR) is an instance where the system traces incorrect identity and false rejections ratio (FRR) is an instance where the system rejects a valid identity. Accuracy is calculated using FAR & FRR as follows. Accuracy = [1-(FAR+FRR) /2] * 100 % ---- (6.1) Table 6.3 Overall accuracy of all algorithms Sl. No No of Images Accuracy (%) Authorized trials Unauthorized trials ORL Yale FERET Real time images Figure 6.3 Graphical analysis of accuracy for all algorithms

6 OVERALL COMPARISON Various types of algorithms applied in face recognition technology have their own significance, problems and complications. In this section main features, advantages and disadvantages of PCA, FLDA, GW, BPNN, FI and FCM based algorithms are discussed. Among all these FLDA, FCM, BPNN are found to have enhanced recognition. Principal Component Analysis (PCA) is a standard tool in modern data analysis and it is a simple, non-parametric method for extracting relevant information from the confusing data sets. Main advantages of PCA are its ability to recognize fast and its easy implementation. Eigenfaces algorithm has some shortcomings due to the use of image pixel gray values. In PCA, the size and location of each face image must remain the same. Different illumination, head pose and Facial Expressions lead to reduced recognition rate. The PCA approach typically requires the full frontal face to be presented each time; otherwise the image results in poor performance. Although the face recognition results were acceptable, the system using only eigenfaces might not be applicable as a real system. It needs to be more robust and to have other Discriminant features. PCA is Translation variant, Scale variant, Background variant, lighting variant. PCA derives the most expressive and inspired features, and provides a good discrimination. Finally, it is focused that speed and efficiency is high in PCA and it is suitable for Linear, but not suitable for Dissimilar, different lighting and poses. Fisher face method provides better ability to recognize a face and provides better discrimination between faces. FLDA works well for different illumination and different facial expressions. This statistically motivated method maximizes the ratio of the determinant of between-class scatter matrix

7 143 and within-class scatter matrix and in this sense attempts to involve information about classes of the patterns under consideration providing lower error rate. The solution for recognition of facial image in FLDA, involves segmentation of faces from the cluttered scenes or background, extraction of feature vector from the face region, identification and matching. The images used in this work can have variations in head orientations, scaling and lighting. This approach requires a high degree of correlation between the pixel intensities of the sample and the test images. FLDA approach has limitations over the variations in light, size and in the head orientation. Nevertheless, this method showed very good classifications of faces. A good recognition system should have the ability to adapt over time. A difficulty in using the FLDA method for face recognition is the high-dimensional nature of the image vector. In this FLDA technique, variations in illumination and expressions are reduced substantially. Speed and efficiency is high but it is not efficient for small databases and linear problems. Gabor wavelet provides the optimized resolution in both time and frequency domains for time frequency analysis. As it saves neighborhood relationship between pixels, it performs better than other traditional approaches in terms of efficiency and accuracy. It is invariant to homogenous illumination changes, rotational and scale. Gabor filters have fast recognition and low computational cost, Due to its biological similarity to human vision system, Gabor wavelets have been widely used in object recognition applications like fingerprint recognition, character recognition, etc. Gabor wavelet representations are among the most successful mathematical tools and are

8 144 mainly applied in signal analysis, image processing and many other information-related areas. Despite the success of Gabor wavelet based face recognition systems, both the feature extraction process and the huge dimension of Gabor features extracted demand large computation and memory costs, which makes them impractical for real applications. Another limitation in the case of Gabor wavelets is that the time for Gabor feature extraction is very long and its dimension is prohibitively large. Neural classification is suitable for both linear and nonlinear problems. It has the advantages of high accuracy, high recognition rate and easy to implement. BPNN is a gradient descent based algorithm and it is difficult to train and training time is more, but the execution time is less.also some inherent difficulties like slow convergence and difficulty in escaping from a local minimum are encountered. In BPNN, large number of neurons in the hidden layer can give high generalization error due to over fitting and high variance. Cascade-Correlation is much useful for incremental learning, in which new information is added to an already-trained net. There is no need to guess the size, depth and connectivity pattern of the network in advance. A reasonably small net is built automatically. It may be possible to build networks with a mixture of nonlinear unit-types. Cascade-Correlation learns fast. In backpropogation, the hidden units engage in a complex way before they settle into distinct useful roles; in Cascade-Correlation, each unit sees a fixed problem and can move decisively to solve that problem. Cascade-Correlation can build deep nets without the dramatic slowdown seen in back-propagation networks with more than one or two hidden layers

9 145 In CNN, there is no need to propagate error signals backwards through the network connections as in BPNN. As cascade-correlation network builds hidden units into the neural network as it goes, the neural network designer is relieved of the task of having to guess at the best configuration of hidden units for a particular problem. Cascade-correlation can converge quickly. As the Training time is very fast, it makes cascade correlation networks suitable for large training sets. As with all types of models, there are some disadvantages to cascade correlation networks. They have an extreme potential for over fitting the training data; this results in excellent accuracy on the training data but poor accuracy on new, unseen data. Cascade correlation networks usually are less accurate than probabilistic and general regression neural networks on small to medium size problems (i.e., fewer than a couple of thousand training rows). Cascade correlation is less likely to get trapped in local minima than multilayer perceptron networks. Thus this DB wavelets, FLDA and FI method, in comparison with other methods, has the advantages of low computational cost and requires less time for classification for small number of database images. Further, the variation in illumination, pose or facial expression does not affect the recognition process. The fuzzy integral data fusion technique also has its limitation. The number of fuzzy measures increases exponentially with the number of parameters. One of the distinguishing features of fuzzy measure and fuzzy integral technique is that it is able to represent certain interactions between criteria. Finally, it has been experimentally demonstrated that the aggregation of classifiers resulting from fisher face operating on four sub image sets generated by wavelet decomposition leads to better classification

10 146 results. In this method, images under different illumination and expressions can be recognized. FCM has the advantages of low computational cost and requires less time for classification. Further, the variation in illumination, pose or facial expressions does not affect the recognition process. The fuzzy integral data fusion technique also has its limitation. The number of fuzzy measures increases exponentially with the number of parameters. The Fuzzy C-means (FCM) algorithm has successfully been applied to a wide variety of clustering problems. However, these algorithms work better for unlabeled data, for this project an algorithm which can utilize the labels of the data is needed for a better performance. Fuzzy Clustering algorithms partition methods that can be used to assign objects of dataset to their clusters. These algorithms optimize a subjective function that evaluates a given Fuzzy assignment of object to clusters. The problem of Fuzzy clustering is to find a fuzzy pseudo partition and the associated cluster centers, by which the structure of the data is represented as best as possible. To solve the fuzzy clustering problem, a performance index is formulated. Similar images are grouped by FCM; the group of images can be recognized within few minutes with better recognition. 6.3 APPLICATIONS OF FACE RECOGNITION Today, face recognition technology is being used to combat passport fraud, support law enforcement, identify missing children, and minimize benefit/identity fraud. The computer-based face recognition industry has made much useful advancement in the past decade. The proposed system of face recognition may be applied in identification systems,

11 147 document control and access control. The face similarity meter was found to perform satisfactorily in adverse conditions of exposure, illumination and contrast variations and face pose. Biometric technologies have found application in four broad application categories: surveillance, screening, enrollment identification and identity verification. General security tasks, such as access control to buildings, can be accomplished by a face recognition system. Banking operations and credit card transactions could also be verified by matching the image encoded in the magnetic strip of the card with the person using the card at any time. As one of the most successful applications of image analysis and understanding, face recognition has recently received significant attention, especially during the past several years. At least two reasons account for this trend: the first is the wide range of commercial and law enforcement applications, and the second is the availability of feasible technologies after 30 years of research. Even though current machine recognition systems have reached a certain level of maturity, their success is limited by the conditions imposed by many real applications. For example, recognition of face images acquired in an outdoor environment with changes in illumination and/or pose remains a largely unsolved problem. In other words, current systems are still far away from the capability of the human perception system. Face recognition can be used for both verification and identification (open-set and closed-set). Face recognition has received substantial attention from researches in biometrics, pattern recognition field and computer vision communities. The recognition of faces is very important because of its potential commercial applications, such as in the area of video surveillance, access control systems, retrieval of an identity from a data base for criminal investigations and user authentication.

12 148 The application of face recognition technique can be categorized into two main parts: law enforcement application and commercial application. major contribution. The following is a list of areas where face recognition can make a Law enforcement: Historically, the major user of biometrics, police agencies have used face recognition as a means of identifying criminals for well over a hundred years. Police gain the most benefit because a criminal's biometric information such as fingerprints, face recognition, DNA, etc, may already be held in a database. This enables forensic information collected at a crime scene and a witness description in the case of facial image, to be matched against it. Law enforcement agencies have achieved significant success with facial recognition, matching the mugshot (or even composite drawing) of a suspect against a database of offenders. This is particularly useful where the individual has refused to give his name, or has given a false name. Airport security: As in many cases, the only information available on suspected terrorists was a mug shot or surveillance photo and facial recognition was thrust to center stage as the biometric which could help identify them before they board the plane. While much work has been done in this area, the practical and logistical issues which have to be overcome have meant that so far implementation has not been as fast as originally anticipated. Child recovery: The proliferation of the Worldwide Web in the second half of the 90's had led to an explosion in the exchange of pedophilic imagery. Imaging and biometric technologies have achieved notable successes in tracking down pedophiles and identifying missing and abused children.

13 149 Access control: The use of fingerprints to verify an individual is well-established in biometrics. While a photo on a pass card helps prevent the use of the card by someone other than the individual to whom it was issued, it is far from infallible. The issue here is identity fraud, where the agency needs to know primarily three things: Before issuing a document, has a similar document already been issued to this individual under a different name? On subsequent presentation of the document, say at a Point of Entry, is the individual presenting it the same individual to whom it was issued? If not the same individual, who are they? Various biometrics can be used for these purposes. In 2003 the International Civil Aviation Organization (ICAO), stated a preference for fingerprints and facial recognition to be used on travel documents. Driver s Licenses: While driver s license is in many ways a similar application to ID cards, it is still the case in most countries that ID cards are not used and therefore the driver s license database is by far the largest database available of adult citizens. Drivers licenses are an ideal application for facial recognition because the individuals cooperate in having their photo taken, while the environment has been set up with optimal lighting, camera resolution, distance from the subject and neutral background. While this offers a potentially invaluable tool in identifying individuals whose details are in the database, because of privacy concerns it cannot be used for this purpose in certain jurisdictions. Smartcards: Smartcards are not a different application, but a particularly secure means of providing an individual with an identity card.

14 150 They are especially appropriate for biometrics because sufficient memory can be made available to hold the individual's facial image and a number of encode arrays. While these will always be held in a central database as well, having them on the card itself enables it to be used in locations where there may be no network access. Naturally, it is expected that the same techniques could be applied to identifying facial expressions where the set of training images is divided into classes based on the facial expression. Face recognition technology has numerous commercial and law enforcement applications. These applications range from static matching of controlled format photographs such as passports, credit cards, photo ID s, driver s licenses and mug shots to real time matching of surveillance video images. Understanding the human mechanisms employed to recognize a face constitutes a challenge for psychologists and neural scientists. In addition to the cognitive aspects, understanding face recognition is important, since the same underlying mechanisms could be used to build a system for the automatic identification of faces by machine. Machine recognition of faces is gradually becoming very important due to its wide range of commercial and law enforcement applications, which include forensic identification, access control, border surveillance and human computer interactions. Static matching of photographs (Mug-shot), Biometric security, Passport control at terminals in airports, Participant identification in meetings, Scanning for criminal persons, Video surveillance, Law enforcement (mug shot identification), Verification for personal identification (driver s licenses, passports, etc.), Electoral verification, Surveillance of crowd behavior are the various significant application of face recognition technology.

15 LIMITATIONS OF FACE RECOGNITION Face recognition is not so robust against extreme variations in expressions, pose and background. Also this cannot be used efficiently for faces with lateral head rotation. The computing power in general makes face recognition suitable for offline applications as online applications require high computing power. Face recognition alone as of now, cannot be successfully used for authentication but can be used for identification and classification. Identical twins cannot be distinguished using face recognition.

CHAPTER 3 PRINCIPAL COMPONENT ANALYSIS AND FISHER LINEAR DISCRIMINANT ANALYSIS

CHAPTER 3 PRINCIPAL COMPONENT ANALYSIS AND FISHER LINEAR DISCRIMINANT ANALYSIS 38 CHAPTER 3 PRINCIPAL COMPONENT ANALYSIS AND FISHER LINEAR DISCRIMINANT ANALYSIS 3.1 PRINCIPAL COMPONENT ANALYSIS (PCA) 3.1.1 Introduction In the previous chapter, a brief literature review on conventional

More information

IMPROVED FACE RECOGNITION USING ICP TECHNIQUES INCAMERA SURVEILLANCE SYSTEMS. Kirthiga, M.E-Communication system, PREC, Thanjavur

IMPROVED FACE RECOGNITION USING ICP TECHNIQUES INCAMERA SURVEILLANCE SYSTEMS. Kirthiga, M.E-Communication system, PREC, Thanjavur IMPROVED FACE RECOGNITION USING ICP TECHNIQUES INCAMERA SURVEILLANCE SYSTEMS Kirthiga, M.E-Communication system, PREC, Thanjavur R.Kannan,Assistant professor,prec Abstract: Face Recognition is important

More information

Digital Vision Face recognition

Digital Vision Face recognition Ulrik Söderström ulrik.soderstrom@tfe.umu.se 27 May 2007 Digital Vision Face recognition 1 Faces Faces are integral to human interaction Manual facial recognition is already used in everyday authentication

More information

A FACE RECOGNITION SYSTEM BASED ON PRINCIPAL COMPONENT ANALYSIS USING BACK PROPAGATION NEURAL NETWORKS

A FACE RECOGNITION SYSTEM BASED ON PRINCIPAL COMPONENT ANALYSIS USING BACK PROPAGATION NEURAL NETWORKS A FACE RECOGNITION SYSTEM BASED ON PRINCIPAL COMPONENT ANALYSIS USING BACK PROPAGATION NEURAL NETWORKS 1 Dr. Umesh Sehgal and 2 Surender Saini 1 Asso. Prof. Arni University, umeshsehgalind@gmail.com 2

More information

Face Recognition & Detection Using Image Processing

Face Recognition & Detection Using Image Processing Face Recognition & Detection Using Image Processing Chandani Sharma Research Scholar Department of Electronics & Communication Engg. Graphic Era University, Dehradun, U K, INDIA Abstract: Face Recognition

More information

Dr. Enrique Cabello Pardos July

Dr. Enrique Cabello Pardos July Dr. Enrique Cabello Pardos July 20 2011 Dr. Enrique Cabello Pardos July 20 2011 ONCE UPON A TIME, AT THE LABORATORY Research Center Contract Make it possible. (as fast as possible) Use the best equipment.

More information

Study of Face-Recognition Parameters and its finding using DSP Software

Study of Face-Recognition Parameters and its finding using DSP Software Study of Face-Recognition Parameters and its finding using DSP Software Manisha Urkude 1, Dr. S.B. Kishor 2 and Dr. Sunil Naranje 3 1 Researcher, RTMNU, Nagpur and Working in RCERT, Chandrapur 2 Head of

More information

FACE RECOGNITION USING FUZZY NEURAL NETWORK

FACE RECOGNITION USING FUZZY NEURAL NETWORK FACE RECOGNITION USING FUZZY NEURAL NETWORK TADI.CHANDRASEKHAR Research Scholar, Dept. of ECE, GITAM University, Vishakapatnam, AndraPradesh Assoc. Prof., Dept. of. ECE, GIET Engineering College, Vishakapatnam,

More information

Dr. K. Nagabhushan Raju Professor, Dept. of Instrumentation Sri Krishnadevaraya University, Anantapuramu, Andhra Pradesh, India

Dr. K. Nagabhushan Raju Professor, Dept. of Instrumentation Sri Krishnadevaraya University, Anantapuramu, Andhra Pradesh, India Volume 6, Issue 10, October 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Design and

More information

Haresh D. Chande #, Zankhana H. Shah *

Haresh D. Chande #, Zankhana H. Shah * Illumination Invariant Face Recognition System Haresh D. Chande #, Zankhana H. Shah * # Computer Engineering Department, Birla Vishvakarma Mahavidyalaya, Gujarat Technological University, India * Information

More information

CHAPTER 2 LITERATURE REVIEW

CHAPTER 2 LITERATURE REVIEW 9 CHAPTER 2 LITERATURE REVIEW 2.1 INTRODUCTION In this chapter the literature available within the purview of the objectives of the present study is reviewed and the need for the proposed work is discussed.

More information

Face recognition for enhanced security.

Face recognition for enhanced security. Face recognition for enhanced security. Cognitec Systems - the face recognition company FaceVACS : Face Recognition Technology FaceVACS Face Recognition Technology Cognitec s patented FaceVACS technology

More information

Applications Video Surveillance (On-line or off-line)

Applications Video Surveillance (On-line or off-line) Face Face Recognition: Dimensionality Reduction Biometrics CSE 190-a Lecture 12 CSE190a Fall 06 CSE190a Fall 06 Face Recognition Face is the most common biometric used by humans Applications range from

More information

An Integrated Face Recognition Algorithm Based on Wavelet Subspace

An Integrated Face Recognition Algorithm Based on Wavelet Subspace , pp.20-25 http://dx.doi.org/0.4257/astl.204.48.20 An Integrated Face Recognition Algorithm Based on Wavelet Subspace Wenhui Li, Ning Ma, Zhiyan Wang College of computer science and technology, Jilin University,

More information

A Survey on Feature Extraction Techniques for Palmprint Identification

A Survey on Feature Extraction Techniques for Palmprint Identification International Journal Of Computational Engineering Research (ijceronline.com) Vol. 03 Issue. 12 A Survey on Feature Extraction Techniques for Palmprint Identification Sincy John 1, Kumudha Raimond 2 1

More information

Forensic Sketches matching

Forensic Sketches matching Forensic Sketches matching Ms Neha S.Syed 1 Dept. of Comp. Science & Engineering People s Education Society s college of Engineering Aurangabad, India. E-mail: nehas1708@gmail.com Abstract In this paper

More information

Face Recognition for Mobile Devices

Face Recognition for Mobile Devices Face Recognition for Mobile Devices Aditya Pabbaraju (adisrinu@umich.edu), Srujankumar Puchakayala (psrujan@umich.edu) INTRODUCTION Face recognition is an application used for identifying a person from

More information

CHAPTER 6 HYBRID AI BASED IMAGE CLASSIFICATION TECHNIQUES

CHAPTER 6 HYBRID AI BASED IMAGE CLASSIFICATION TECHNIQUES CHAPTER 6 HYBRID AI BASED IMAGE CLASSIFICATION TECHNIQUES 6.1 INTRODUCTION The exploration of applications of ANN for image classification has yielded satisfactory results. But, the scope for improving

More information

Recognition of Non-symmetric Faces Using Principal Component Analysis

Recognition of Non-symmetric Faces Using Principal Component Analysis Recognition of Non-symmetric Faces Using Principal Component Analysis N. Krishnan Centre for Information Technology & Engineering Manonmaniam Sundaranar University, Tirunelveli-627012, India Krishnan17563@yahoo.com

More information

Machine Learning 13. week

Machine Learning 13. week Machine Learning 13. week Deep Learning Convolutional Neural Network Recurrent Neural Network 1 Why Deep Learning is so Popular? 1. Increase in the amount of data Thanks to the Internet, huge amount of

More information

Semi-Supervised PCA-based Face Recognition Using Self-Training

Semi-Supervised PCA-based Face Recognition Using Self-Training Semi-Supervised PCA-based Face Recognition Using Self-Training Fabio Roli and Gian Luca Marcialis Dept. of Electrical and Electronic Engineering, University of Cagliari Piazza d Armi, 09123 Cagliari, Italy

More information

Face Recognition using Eigenfaces SMAI Course Project

Face Recognition using Eigenfaces SMAI Course Project Face Recognition using Eigenfaces SMAI Course Project Satarupa Guha IIIT Hyderabad 201307566 satarupa.guha@research.iiit.ac.in Ayushi Dalmia IIIT Hyderabad 201307565 ayushi.dalmia@research.iiit.ac.in Abstract

More information

Image Processing and Image Representations for Face Recognition

Image Processing and Image Representations for Face Recognition Image Processing and Image Representations for Face Recognition 1 Introduction Face recognition is an active area of research in image processing and pattern recognition. Since the general topic of face

More information

Face recognition based on improved BP neural network

Face recognition based on improved BP neural network Face recognition based on improved BP neural network Gaili Yue, Lei Lu a, College of Electrical and Control Engineering, Xi an University of Science and Technology, Xi an 710043, China Abstract. In order

More information

6. Multimodal Biometrics

6. Multimodal Biometrics 6. Multimodal Biometrics Multimodal biometrics is based on combination of more than one type of biometric modalities or traits. The most compelling reason to combine different modalities is to improve

More information

COSC160: Detection and Classification. Jeremy Bolton, PhD Assistant Teaching Professor

COSC160: Detection and Classification. Jeremy Bolton, PhD Assistant Teaching Professor COSC160: Detection and Classification Jeremy Bolton, PhD Assistant Teaching Professor Outline I. Problem I. Strategies II. Features for training III. Using spatial information? IV. Reducing dimensionality

More information

Range Imaging Through Triangulation. Range Imaging Through Triangulation. Range Imaging Through Triangulation. Range Imaging Through Triangulation

Range Imaging Through Triangulation. Range Imaging Through Triangulation. Range Imaging Through Triangulation. Range Imaging Through Triangulation Obviously, this is a very slow process and not suitable for dynamic scenes. To speed things up, we can use a laser that projects a vertical line of light onto the scene. This laser rotates around its vertical

More information

A Survey on Face-Sketch Matching Techniques

A Survey on Face-Sketch Matching Techniques A Survey on Face-Sketch Matching Techniques Reshma C Mohan 1, M. Jayamohan 2, Arya Raj S 3 1 Department of Computer Science, SBCEW 2 Department of Computer Science, College of Applied Science 3 Department

More information

Spatial Frequency Domain Methods for Face and Iris Recognition

Spatial Frequency Domain Methods for Face and Iris Recognition Spatial Frequency Domain Methods for Face and Iris Recognition Dept. of Electrical and Computer Engineering Carnegie Mellon University Pittsburgh, PA 15213 e-mail: Kumar@ece.cmu.edu Tel.: (412) 268-3026

More information

Non-Cooperative Biometrics. Patricia Wolfhope Program Manager Resilient Systems Division Science and Technology Directorate

Non-Cooperative Biometrics. Patricia Wolfhope Program Manager Resilient Systems Division Science and Technology Directorate Non-Cooperative Biometrics Patricia Wolfhope Program Manager Resilient Systems Division Science and Technology Directorate patricia.wolfhope@dhs.gov DHS Organization 2 Resilient Systems Division 3 DHS

More information

Webpage: Volume 3, Issue VII, July 2015 ISSN

Webpage:   Volume 3, Issue VII, July 2015 ISSN Independent Component Analysis (ICA) Based Face Recognition System S.Narmatha 1, K.Mahesh 2 1 Research Scholar, 2 Associate Professor 1,2 Department of Computer Science and Engineering, Alagappa University,

More information

Fuzzy Segmentation. Chapter Introduction. 4.2 Unsupervised Clustering.

Fuzzy Segmentation. Chapter Introduction. 4.2 Unsupervised Clustering. Chapter 4 Fuzzy Segmentation 4. Introduction. The segmentation of objects whose color-composition is not common represents a difficult task, due to the illumination and the appropriate threshold selection

More information

A Study on Different Challenges in Facial Recognition Methods

A Study on Different Challenges in Facial Recognition Methods Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.521

More information

EE 589 INTRODUCTION TO ARTIFICIAL NETWORK REPORT OF THE TERM PROJECT REAL TIME ODOR RECOGNATION SYSTEM FATMA ÖZYURT SANCAR

EE 589 INTRODUCTION TO ARTIFICIAL NETWORK REPORT OF THE TERM PROJECT REAL TIME ODOR RECOGNATION SYSTEM FATMA ÖZYURT SANCAR EE 589 INTRODUCTION TO ARTIFICIAL NETWORK REPORT OF THE TERM PROJECT REAL TIME ODOR RECOGNATION SYSTEM FATMA ÖZYURT SANCAR 1.Introductıon. 2.Multi Layer Perception.. 3.Fuzzy C-Means Clustering.. 4.Real

More information

Facial Expression Recognition Using Non-negative Matrix Factorization

Facial Expression Recognition Using Non-negative Matrix Factorization Facial Expression Recognition Using Non-negative Matrix Factorization Symeon Nikitidis, Anastasios Tefas and Ioannis Pitas Artificial Intelligence & Information Analysis Lab Department of Informatics Aristotle,

More information

A Matlab based Face Recognition GUI system Using Principal Component Analysis and Artificial Neural Network

A Matlab based Face Recognition GUI system Using Principal Component Analysis and Artificial Neural Network A Matlab based Face Recognition GUI system Using Principal Component Analysis and Artificial Neural Network Achala Khandelwal 1 and Jaya Sharma 2 1,2 Asst Prof Department of Electrical Engineering, Shri

More information

Three-Dimensional Face Recognition: A Fishersurface Approach

Three-Dimensional Face Recognition: A Fishersurface Approach Three-Dimensional Face Recognition: A Fishersurface Approach Thomas Heseltine, Nick Pears, Jim Austin Department of Computer Science, The University of York, United Kingdom Abstract. Previous work has

More information

Color Local Texture Features Based Face Recognition

Color Local Texture Features Based Face Recognition Color Local Texture Features Based Face Recognition Priyanka V. Bankar Department of Electronics and Communication Engineering SKN Sinhgad College of Engineering, Korti, Pandharpur, Maharashtra, India

More information

FACE RECOGNITION USING INDEPENDENT COMPONENT

FACE RECOGNITION USING INDEPENDENT COMPONENT Chapter 5 FACE RECOGNITION USING INDEPENDENT COMPONENT ANALYSIS OF GABORJET (GABORJET-ICA) 5.1 INTRODUCTION PCA is probably the most widely used subspace projection technique for face recognition. A major

More information

Face Recognition using Laplacianfaces

Face Recognition using Laplacianfaces Journal homepage: www.mjret.in ISSN:2348-6953 Kunal kawale Face Recognition using Laplacianfaces Chinmay Gadgil Mohanish Khunte Ajinkya Bhuruk Prof. Ranjana M.Kedar Abstract Security of a system is an

More information

NeoFace Watch real-time face recognition How does it work? May 2018 Global Face Recognition Centre of Excellence NEC Europe

NeoFace Watch real-time face recognition How does it work? May 2018 Global Face Recognition Centre of Excellence NEC Europe NeoFace Watch real-time face recognition How does it work? May 2018 Global Face Recognition Centre of Excellence NEC Europe Executive Summary There is much misunderstanding about the operation of real-time

More information

Component-based Face Recognition with 3D Morphable Models

Component-based Face Recognition with 3D Morphable Models Component-based Face Recognition with 3D Morphable Models B. Weyrauch J. Huang benjamin.weyrauch@vitronic.com jenniferhuang@alum.mit.edu Center for Biological and Center for Biological and Computational

More information

CS6220: DATA MINING TECHNIQUES

CS6220: DATA MINING TECHNIQUES CS6220: DATA MINING TECHNIQUES Image Data: Classification via Neural Networks Instructor: Yizhou Sun yzsun@ccs.neu.edu November 19, 2015 Methods to Learn Classification Clustering Frequent Pattern Mining

More information

A Study on the Neural Network Model for Finger Print Recognition

A Study on the Neural Network Model for Finger Print Recognition A Study on the Neural Network Model for Finger Print Recognition Vijaya Sathiaraj Dept of Computer science and Engineering Bharathidasan University, Trichirappalli-23 Abstract: Finger Print Recognition

More information

Linear Discriminant Analysis for 3D Face Recognition System

Linear Discriminant Analysis for 3D Face Recognition System Linear Discriminant Analysis for 3D Face Recognition System 3.1 Introduction Face recognition and verification have been at the top of the research agenda of the computer vision community in recent times.

More information

Illumination invariant face detection

Illumination invariant face detection University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2009 Illumination invariant face detection Alister Cordiner University

More information

Mobile Face Recognization

Mobile Face Recognization Mobile Face Recognization CS4670 Final Project Cooper Bills and Jason Yosinski {csb88,jy495}@cornell.edu December 12, 2010 Abstract We created a mobile based system for detecting faces within a picture

More information

Su et al. Shape Descriptors - III

Su et al. Shape Descriptors - III Su et al. Shape Descriptors - III Siddhartha Chaudhuri http://www.cse.iitb.ac.in/~cs749 Funkhouser; Feng, Liu, Gong Recap Global A shape descriptor is a set of numbers that describes a shape in a way that

More information

Image enhancement for face recognition using color segmentation and Edge detection algorithm

Image enhancement for face recognition using color segmentation and Edge detection algorithm Image enhancement for face recognition using color segmentation and Edge detection algorithm 1 Dr. K Perumal and 2 N Saravana Perumal 1 Computer Centre, Madurai Kamaraj University, Madurai-625021, Tamilnadu,

More information

Abstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric;

Abstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric; Analysis Of Finger Print Detection Techniques Prof. Trupti K. Wable *1(Assistant professor of Department of Electronics & Telecommunication, SVIT Nasik, India) trupti.wable@pravara.in*1 Abstract -Fingerprints

More information

CHAPTER 5 GLOBAL AND LOCAL FEATURES FOR FACE RECOGNITION

CHAPTER 5 GLOBAL AND LOCAL FEATURES FOR FACE RECOGNITION 122 CHAPTER 5 GLOBAL AND LOCAL FEATURES FOR FACE RECOGNITION 5.1 INTRODUCTION Face recognition, means checking for the presence of a face from a database that contains many faces and could be performed

More information

Face Recognition System Using PCA

Face Recognition System Using PCA Face Recognition System Using PCA M.V.N.R. Pavan Kumar 1, Shaikh Arshad A. 2, Katwate Dhananjay P. 3,Jamdar Rohit N. 4 Department of Electronics and Telecommunication Engineering 1,2,3,4, LNBCIET, Satara-415020

More information

Training Algorithms for Robust Face Recognition using a Template-matching Approach

Training Algorithms for Robust Face Recognition using a Template-matching Approach Training Algorithms for Robust Face Recognition using a Template-matching Approach Xiaoyan Mu, Mehmet Artiklar, Metin Artiklar, and Mohamad H. Hassoun Department of Electrical and Computer Engineering

More information

Combining Gabor Features: Summing vs.voting in Human Face Recognition *

Combining Gabor Features: Summing vs.voting in Human Face Recognition * Combining Gabor Features: Summing vs.voting in Human Face Recognition * Xiaoyan Mu and Mohamad H. Hassoun Department of Electrical and Computer Engineering Wayne State University Detroit, MI 4822 muxiaoyan@wayne.edu

More information

FACE RECOGNITION BASED ON GENDER USING A MODIFIED METHOD OF 2D-LINEAR DISCRIMINANT ANALYSIS

FACE RECOGNITION BASED ON GENDER USING A MODIFIED METHOD OF 2D-LINEAR DISCRIMINANT ANALYSIS FACE RECOGNITION BASED ON GENDER USING A MODIFIED METHOD OF 2D-LINEAR DISCRIMINANT ANALYSIS 1 Fitri Damayanti, 2 Wahyudi Setiawan, 3 Sri Herawati, 4 Aeri Rachmad 1,2,3,4 Faculty of Engineering, University

More information

Image-Based Face Recognition using Global Features

Image-Based Face Recognition using Global Features Image-Based Face Recognition using Global Features Xiaoyin xu Research Centre for Integrated Microsystems Electrical and Computer Engineering University of Windsor Supervisors: Dr. Ahmadi May 13, 2005

More information

HW2 due on Thursday. Face Recognition: Dimensionality Reduction. Biometrics CSE 190 Lecture 11. Perceptron Revisited: Linear Separators

HW2 due on Thursday. Face Recognition: Dimensionality Reduction. Biometrics CSE 190 Lecture 11. Perceptron Revisited: Linear Separators HW due on Thursday Face Recognition: Dimensionality Reduction Biometrics CSE 190 Lecture 11 CSE190, Winter 010 CSE190, Winter 010 Perceptron Revisited: Linear Separators Binary classification can be viewed

More information

Human Identification at a Distance Using Body Shape Information

Human Identification at a Distance Using Body Shape Information IOP Conference Series: Materials Science and Engineering OPEN ACCESS Human Identification at a Distance Using Body Shape Information To cite this article: N K A M Rashid et al 2013 IOP Conf Ser: Mater

More information

Face detection and recognition. Detection Recognition Sally

Face detection and recognition. Detection Recognition Sally Face detection and recognition Detection Recognition Sally Face detection & recognition Viola & Jones detector Available in open CV Face recognition Eigenfaces for face recognition Metric learning identification

More information

Facial Expression Detection Using Implemented (PCA) Algorithm

Facial Expression Detection Using Implemented (PCA) Algorithm Facial Expression Detection Using Implemented (PCA) Algorithm Dileep Gautam (M.Tech Cse) Iftm University Moradabad Up India Abstract: Facial expression plays very important role in the communication with

More information

FACE RECOGNITION USING SUPPORT VECTOR MACHINES

FACE RECOGNITION USING SUPPORT VECTOR MACHINES FACE RECOGNITION USING SUPPORT VECTOR MACHINES Ashwin Swaminathan ashwins@umd.edu ENEE633: Statistical and Neural Pattern Recognition Instructor : Prof. Rama Chellappa Project 2, Part (b) 1. INTRODUCTION

More information

Breaking it Down: The World as Legos Benjamin Savage, Eric Chu

Breaking it Down: The World as Legos Benjamin Savage, Eric Chu Breaking it Down: The World as Legos Benjamin Savage, Eric Chu To devise a general formalization for identifying objects via image processing, we suggest a two-pronged approach of identifying principal

More information

Finger Vein Biometric Approach for Personal Identification Using IRT Feature and Gabor Filter Implementation

Finger Vein Biometric Approach for Personal Identification Using IRT Feature and Gabor Filter Implementation Finger Vein Biometric Approach for Personal Identification Using IRT Feature and Gabor Filter Implementation Sowmya. A (Digital Electronics (MTech), BITM Ballari), Shiva kumar k.s (Associate Professor,

More information

An Efficient Back Propagation Neural Network Based Face Recognition System Using Haar Wavelet Transform and PCA

An Efficient Back Propagation Neural Network Based Face Recognition System Using Haar Wavelet Transform and PCA An Efficient Back Propagation Neural Network Based Face Recognition System Using Haar Wavelet Transform and PCA *Ravi Prakash Abstract With fast evolving technology, it is necessary to design an efficient

More information

ROTATION INVARIANT SPARSE CODING AND PCA

ROTATION INVARIANT SPARSE CODING AND PCA ROTATION INVARIANT SPARSE CODING AND PCA NATHAN PFLUEGER, RYAN TIMMONS Abstract. We attempt to encode an image in a fashion that is only weakly dependent on rotation of objects within the image, as an

More information

An Introduction to Content Based Image Retrieval

An Introduction to Content Based Image Retrieval CHAPTER -1 An Introduction to Content Based Image Retrieval 1.1 Introduction With the advancement in internet and multimedia technologies, a huge amount of multimedia data in the form of audio, video and

More information

CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS

CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS CHAPTER 4 CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS 4.1 Introduction Optical character recognition is one of

More information

Gender Classification

Gender Classification Gender Classification Thomas Witzig Master student, 76128 Karlsruhe, Germany, Computer Vision for Human-Computer Interaction Lab KIT University of the State of Baden-Wuerttemberg and National Research

More information

FACE DETECTION USING CURVELET TRANSFORM AND PCA

FACE DETECTION USING CURVELET TRANSFORM AND PCA Volume 119 No. 15 2018, 1565-1575 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ http://www.acadpubl.eu/hub/ FACE DETECTION USING CURVELET TRANSFORM AND PCA Abai Kumar M 1, Ajith Kumar

More information

Cursive Handwriting Recognition System Using Feature Extraction and Artificial Neural Network

Cursive Handwriting Recognition System Using Feature Extraction and Artificial Neural Network Cursive Handwriting Recognition System Using Feature Extraction and Artificial Neural Network Utkarsh Dwivedi 1, Pranjal Rajput 2, Manish Kumar Sharma 3 1UG Scholar, Dept. of CSE, GCET, Greater Noida,

More information

Face and Facial Expression Detection Using Viola-Jones and PCA Algorithm

Face and Facial Expression Detection Using Viola-Jones and PCA Algorithm Face and Facial Expression Detection Using Viola-Jones and PCA Algorithm MandaVema Reddy M.Tech (Computer Science) Mailmv999@gmail.com Abstract Facial expression is a prominent posture beneath the skin

More information

Outline 7/2/201011/6/

Outline 7/2/201011/6/ Outline Pattern recognition in computer vision Background on the development of SIFT SIFT algorithm and some of its variations Computational considerations (SURF) Potential improvement Summary 01 2 Pattern

More information

A Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation

A Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation A Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation * A. H. M. Al-Helali, * W. A. Mahmmoud, and * H. A. Ali * Al- Isra Private University Email: adnan_hadi@yahoo.com Abstract:

More information

Face Detection Using Convolutional Neural Networks and Gabor Filters

Face Detection Using Convolutional Neural Networks and Gabor Filters Face Detection Using Convolutional Neural Networks and Gabor Filters Bogdan Kwolek Rzeszów University of Technology W. Pola 2, 35-959 Rzeszów, Poland bkwolek@prz.rzeszow.pl Abstract. This paper proposes

More information

CHAPTER 5 PALMPRINT RECOGNITION WITH ENHANCEMENT

CHAPTER 5 PALMPRINT RECOGNITION WITH ENHANCEMENT 145 CHAPTER 5 PALMPRINT RECOGNITION WITH ENHANCEMENT 5.1 INTRODUCTION This chapter discusses the application of enhancement technique in palmprint recognition system. Section 5.2 describes image sharpening

More information

Face recognition algorithms: performance evaluation

Face recognition algorithms: performance evaluation Face recognition algorithms: performance evaluation Project Report Marco Del Coco - Pierluigi Carcagnì Institute of Applied Sciences and Intelligent systems c/o Dhitech scarl Campus Universitario via Monteroni

More information

CMU Lecture 18: Deep learning and Vision: Convolutional neural networks. Teacher: Gianni A. Di Caro

CMU Lecture 18: Deep learning and Vision: Convolutional neural networks. Teacher: Gianni A. Di Caro CMU 15-781 Lecture 18: Deep learning and Vision: Convolutional neural networks Teacher: Gianni A. Di Caro DEEP, SHALLOW, CONNECTED, SPARSE? Fully connected multi-layer feed-forward perceptrons: More powerful

More information

5 Machine Learning Abstractions and Numerical Optimization

5 Machine Learning Abstractions and Numerical Optimization Machine Learning Abstractions and Numerical Optimization 25 5 Machine Learning Abstractions and Numerical Optimization ML ABSTRACTIONS [some meta comments on machine learning] [When you write a large computer

More information

LOCAL APPEARANCE BASED FACE RECOGNITION USING DISCRETE COSINE TRANSFORM

LOCAL APPEARANCE BASED FACE RECOGNITION USING DISCRETE COSINE TRANSFORM LOCAL APPEARANCE BASED FACE RECOGNITION USING DISCRETE COSINE TRANSFORM Hazim Kemal Ekenel, Rainer Stiefelhagen Interactive Systems Labs, University of Karlsruhe Am Fasanengarten 5, 76131, Karlsruhe, Germany

More information

Eigenfaces and Fisherfaces A comparison of face detection techniques. Abstract. Pradyumna Desale SCPD, NVIDIA

Eigenfaces and Fisherfaces A comparison of face detection techniques. Abstract. Pradyumna Desale SCPD, NVIDIA Eigenfaces and Fisherfaces A comparison of face detection techniques Pradyumna Desale SCPD, NVIDIA pdesale@nvidia.com Angelica Perez Stanford University pereza77@stanford.edu Abstract In this project we

More information

Expression Detection in Video. Abstract Expression detection is useful as a non-invasive method of lie detection and

Expression Detection in Video. Abstract Expression detection is useful as a non-invasive method of lie detection and Wes Miller 5/11/2011 Comp Sci 534 Expression Detection in Video Abstract Expression detection is useful as a non-invasive method of lie detection and behavior prediction, as many facial expressions are

More information

PROBLEM FORMULATION AND RESEARCH METHODOLOGY

PROBLEM FORMULATION AND RESEARCH METHODOLOGY PROBLEM FORMULATION AND RESEARCH METHODOLOGY ON THE SOFT COMPUTING BASED APPROACHES FOR OBJECT DETECTION AND TRACKING IN VIDEOS CHAPTER 3 PROBLEM FORMULATION AND RESEARCH METHODOLOGY The foregoing chapter

More information

NIST. Support Vector Machines. Applied to Face Recognition U56 QC 100 NO A OS S. P. Jonathon Phillips. Gaithersburg, MD 20899

NIST. Support Vector Machines. Applied to Face Recognition U56 QC 100 NO A OS S. P. Jonathon Phillips. Gaithersburg, MD 20899 ^ A 1 1 1 OS 5 1. 4 0 S Support Vector Machines Applied to Face Recognition P. Jonathon Phillips U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Information

More information

Mobile Human Detection Systems based on Sliding Windows Approach-A Review

Mobile Human Detection Systems based on Sliding Windows Approach-A Review Mobile Human Detection Systems based on Sliding Windows Approach-A Review Seminar: Mobile Human detection systems Njieutcheu Tassi cedrique Rovile Department of Computer Engineering University of Heidelberg

More information

AN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE

AN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE AN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE sbsridevi89@gmail.com 287 ABSTRACT Fingerprint identification is the most prominent method of biometric

More information

Human Detection and Tracking for Video Surveillance: A Cognitive Science Approach

Human Detection and Tracking for Video Surveillance: A Cognitive Science Approach Human Detection and Tracking for Video Surveillance: A Cognitive Science Approach Vandit Gajjar gajjar.vandit.381@ldce.ac.in Ayesha Gurnani gurnani.ayesha.52@ldce.ac.in Yash Khandhediya khandhediya.yash.364@ldce.ac.in

More information

Graph Matching Iris Image Blocks with Local Binary Pattern

Graph Matching Iris Image Blocks with Local Binary Pattern Graph Matching Iris Image Blocs with Local Binary Pattern Zhenan Sun, Tieniu Tan, and Xianchao Qiu Center for Biometrics and Security Research, National Laboratory of Pattern Recognition, Institute of

More information

Robust Face Recognition via Sparse Representation Authors: John Wright, Allen Y. Yang, Arvind Ganesh, S. Shankar Sastry, and Yi Ma

Robust Face Recognition via Sparse Representation Authors: John Wright, Allen Y. Yang, Arvind Ganesh, S. Shankar Sastry, and Yi Ma Robust Face Recognition via Sparse Representation Authors: John Wright, Allen Y. Yang, Arvind Ganesh, S. Shankar Sastry, and Yi Ma Presented by Hu Han Jan. 30 2014 For CSE 902 by Prof. Anil K. Jain: Selected

More information

PCA and KPCA algorithms for Face Recognition A Survey

PCA and KPCA algorithms for Face Recognition A Survey PCA and KPCA algorithms for Face Recognition A Survey Surabhi M. Dhokai 1, Vaishali B.Vala 2,Vatsal H. Shah 3 1 Department of Information Technology, BVM Engineering College, surabhidhokai@gmail.com 2

More information

Neural Networks. CE-725: Statistical Pattern Recognition Sharif University of Technology Spring Soleymani

Neural Networks. CE-725: Statistical Pattern Recognition Sharif University of Technology Spring Soleymani Neural Networks CE-725: Statistical Pattern Recognition Sharif University of Technology Spring 2013 Soleymani Outline Biological and artificial neural networks Feed-forward neural networks Single layer

More information

Disguised Face Identification (DFI) with Facial KeyPoints using Spatial Fusion Convolutional Network. Nathan Sun CIS601

Disguised Face Identification (DFI) with Facial KeyPoints using Spatial Fusion Convolutional Network. Nathan Sun CIS601 Disguised Face Identification (DFI) with Facial KeyPoints using Spatial Fusion Convolutional Network Nathan Sun CIS601 Introduction Face ID is complicated by alterations to an individual s appearance Beard,

More information

Face Detection and Recognition in an Image Sequence using Eigenedginess

Face Detection and Recognition in an Image Sequence using Eigenedginess Face Detection and Recognition in an Image Sequence using Eigenedginess B S Venkatesh, S Palanivel and B Yegnanarayana Department of Computer Science and Engineering. Indian Institute of Technology, Madras

More information

Criminal Identification System Using Face Detection and Recognition

Criminal Identification System Using Face Detection and Recognition Criminal Identification System Using Face Detection and Recognition Piyush Kakkar 1, Mr. Vibhor Sharma 2 Information Technology Department, Maharaja Agrasen Institute of Technology, Delhi 1 Assistant Professor,

More information

Texture Image Segmentation using FCM

Texture Image Segmentation using FCM Proceedings of 2012 4th International Conference on Machine Learning and Computing IPCSIT vol. 25 (2012) (2012) IACSIT Press, Singapore Texture Image Segmentation using FCM Kanchan S. Deshmukh + M.G.M

More information

Face Recognition using Tensor Analysis. Prahlad R. Enuganti

Face Recognition using Tensor Analysis. Prahlad R. Enuganti Face Recognition using Tensor Analysis Prahlad R. Enuganti The University of Texas at Austin Literature Survey EE381K 14 Multidimensional Digital Signal Processing March 25, 2005 Submitted to Prof. Brian

More information

4.12 Generalization. In back-propagation learning, as many training examples as possible are typically used.

4.12 Generalization. In back-propagation learning, as many training examples as possible are typically used. 1 4.12 Generalization In back-propagation learning, as many training examples as possible are typically used. It is hoped that the network so designed generalizes well. A network generalizes well when

More information

Face Recognition using Principle Component Analysis, Eigenface and Neural Network

Face Recognition using Principle Component Analysis, Eigenface and Neural Network Face Recognition using Principle Component Analysis, Eigenface and Neural Network Mayank Agarwal Student Member IEEE Noida,India mayank.agarwal@ieee.org Nikunj Jain Student Noida,India nikunj262@gmail.com

More information

PALM PRINT RECOGNITION AND AUTHENTICATION USING DIGITAL IMAGE PROCESSSING TECHNIQUE

PALM PRINT RECOGNITION AND AUTHENTICATION USING DIGITAL IMAGE PROCESSSING TECHNIQUE PALM PRINT RECOGNITION AND AUTHENTICATION USING DIGITAL IMAGE PROCESSSING TECHNIQUE Prof.V.R.Raut 1, Prof.Ms.S.S.Kukde 2, Shraddha S. Pande 3 3 Student of M.E Department of Electronics and telecommunication,

More information

SUMMARY: DISTINCTIVE IMAGE FEATURES FROM SCALE- INVARIANT KEYPOINTS

SUMMARY: DISTINCTIVE IMAGE FEATURES FROM SCALE- INVARIANT KEYPOINTS SUMMARY: DISTINCTIVE IMAGE FEATURES FROM SCALE- INVARIANT KEYPOINTS Cognitive Robotics Original: David G. Lowe, 004 Summary: Coen van Leeuwen, s1460919 Abstract: This article presents a method to extract

More information

A Hierarchical Face Identification System Based on Facial Components

A Hierarchical Face Identification System Based on Facial Components A Hierarchical Face Identification System Based on Facial Components Mehrtash T. Harandi, Majid Nili Ahmadabadi, and Babak N. Araabi Control and Intelligent Processing Center of Excellence Department of

More information