Face Identification Based on Contrast Limited Adaptive Histogram Equalization (CLAHE).
|
|
- Felix Farmer
- 5 years ago
- Views:
Transcription
1 Face Identification Based on Contrast Limited Adaptive Histogram Equalization (CLAHE). Gibran Benitez-Garcia, Jesus Olivares-Mercado, Gualberto Aguilar-Torres, Gabriel Sanchez-Perez and Hector Perez-Meana Mechanical and Electrical Engineering School of National Polytechnic Institute of Mexico. Mexico, Mexico D.F. Abstract This paper proposes a face identification method based on Contrast Limited Adaptive Histogram Equalization (CLAHE) robust to facial expressions, occlusion and specially to illumination changes. Based on Eigenphases algorithm for feature extraction, the Principal Components Analysis (PCA) and the Phase Spectrum was used as feature extraction stage, and Support Vector Machine (SVM) as a classifier. The results were obtained using a database that includes face images of 120 subjects (60 males and 60 females) with illumination changes, facial expressions and partial occlusion. The proposed method provides results with a correct recognition up to 97%. Keywords: Face Identification, CLAHE, Eigenphases and SVM. 1. Introduction In business and personal life today, security protection systems are critical for many application domains: transaction protection, access control, computer and network security, and most important, personal and public safety. Since the tragic terrorist attacks of September 11, 2001, there has been a greater awareness of security threats and increased acceptance of more intrusive security systems [1]. Biometrics systems are a solution for this problem, because are automated methods of verifying or identifying the identity of a person on the basis of some physiological or behavior characteristic [1]. It is important to consider the difference among identification and verification. Identification is when the system output determines the identity of the person with the highest approximation among a set of known persons (saved in the database) and verification is when the system determines if the person is whom he/she claims to be. The biometric identification and verification methods can be divided in two categories: behavioral methods such as signatures, keyboard typing, and voice print; and physiological methods such as fingerprint, iris pattern, palm geometry, DNA, and facial features [2]. The general structure of biometric system basically consists of a capture stage, when the pattern (either physiological or behavioral) is captured, a feature extraction stage, when the pattern will be converted in a vector feature, and the classification stage when generate templates based on vectors features, and the system compares and decides whether the extracted features vector agrees or disagrees with the estimated template, Fig. 1 shows this structure. Fig. 1: General structure of biometric system. In particular the face recognition has been a topic of active research because the face is the most direct way to recognize people [3]. Additionally, the data acquisition of this method consists in taking a picture, this doing the face recognition one of the biometric methods with larger acceptance among the users. Over the past two decades, the problem of face recognition has attracted substantial attention from various disciplines and has witnessed an impressive growth in basic and applied research, product development, and applications. Face recognition systems have already been deployed at ports of entry at international airports such as Australia and Portugal [4]. In recent years, there have been proposed different face recognition methods to improve the identification accuracy [1], [3], [4]. However, the variations in face images used in systems decreases the accuracy drastically. These variations arise mainly from changes in facial expressions, as well as illumination conditions in which they are, and in some cases partial occlusion. M. Savvides et al proposed the Eigenphases algorithm [5], which focused on feature extraction stage, reduces the illumination problems that affect the recognition of faces, as it uses the phase extracted from the Fast Fourier Transform together with Principal Components Analysis (PCA) to obtain the main features of that stage. A variation of this method is to include a pre-processing stage in which the face images is adapted, to insert an "enhanced image" in the stage of feature extraction, histogram equalization [6] and the normalization of an image [7] are some methods to adjust the images on the pre-processing stage. This paper proposes a face identification algorithm using Contrast Limited Adaptive Histogram Equalization
2 (CLAHE) in the pre-processing stage to enhance the illumination of the face images, the PCA and the Phase Spectrum are used in the features extraction stage, and the Support Vector Machine (SVM) as classifier. The results obtained with the proposed method are compared with Eigenphases [5] and Eigenphases using Histogram Equalization [6]. The proposed and conventional methods are evaluated under the same conditions, using a face database created in the National Polytechnic Institute of Mexico which includes 24 face images of 120 subjects with different illumination, facial expressions variations and partial occlusion. 2. Proposed System The proposed algorithm for face identification is shown in Fig. 2, the system output provides the identity of one person among all, that are in the database. Fig. 2: Proposed face identification algorithm. The method is divided in two phases (training and identification) and both consist of four modules: CLAHE: this module belongs to the pre-processing stage, this is where the image is enhanced; Obtain Phase Spectrum: in this module obtains phase extracted from the Fast Fourier Transform; PCA: this and the previous module are in the stage of feature extraction; and SVM: this module gets the templates for the training phase and making the decision in the identification phase. 2.1 A. Contrast Limited Adaptive Histogram Equalization Firstly the histogram of a digital image with intensity levels in the range [0, L 1] is a discrete function: h(r k ) = n k (1) Where r k is the kth intensity value and n k is the number of pixel in the image with intensity r k [8]. A normalized histogram is given by: p r (r k ) = n k MN k = 0, 1, 2,..., L 1 (2) Loosely speaking p r (r k ) is an estimated of the probability of occurrence of intensity level r k in an image. The sum of all components of normalized histogram is equal to 1. The histogram equalization is a method in image processing of contrast adjustment using the image s histogram. This method usually increases the global contrast of many images, through transforming the original image histogram to a uniform histogram, that is, trying to make uniform the distribution intensity pixels of the image. The histogram equalization is obtained by next equation: s k = (L 1) k p r (r j ) k = 0, 1, 2,..., L 1 (3) j=0 where s k is the new distribution of the histogram. This procedure is based on the assumption that the image quality is uniform over all areas and one unique grayscale mapping provides similar enhancement for all regions of the image. However, when distributions of grayscales change from one region to another, this assumption is not valid. In this case, an adaptive histogram equalization technique can significantly outperform the standard approach. In this case, the image is divided into a limited number of regions and the same histogram equalization technique is applied to pixels in each region [9]. Even in some cases this method can not resolve the problem, when grayscale distribution is highly localized, it might not be desirable to transform very low-contrast images by full histogram equalization. In these cases, the mapping curve may include segments with high slopes, meaning that two very close grayscales might be mapped to significantly different grayscales. This issue is resolved by limiting the contrast that is allowed through histogram equalization. The combination of this limited contrast approach with the aforementioned adaptive histogram equalization results in what is referred to as Contrast Limited Adaptive Histogram Equalization (CLAHE) proposed in [10]. The CLAHE procedure consists in: First the image has to be divided into several nonoverlapping regions of almost equal sizes. Secondly the histogram of each region is calculated. Then, based on a desired limit for contrast expansion, a clip limit for clipping histograms is obtained. Next, each histogram is redistributed in such a way that its height does not go beyond the clip limit. The clip limit β is obtained by: β = MN ( 1 + α ) L 100 (s max 1) (4) where α is a clip factor, if clip factor is equal to zero the clip limit becomes exactly equal to ( MN L ), moreover if clip limit is equal to 100 the maximum allowable slope is s max.
3 Finally, cumulative distribution functions (CDF) of the resultant contrast limited histograms are determined for grayscale mapping. The pixels are mapped by linearly combining the results from the mappings of the four nearest regions; this process is explained in [11]. The Fig. 3 shows the differences among histograms of same image, applying both methods before mentioned CLAHE and Histogram Equalization. θ(u) = arctan [ ] I(u) R(u) This is also demonstrated by Oppenheimt s experiment shown in Fig. 4, in this experiment the Fourier Transform was applied to these two images and obtain the magnitude and phase. If combine the phase of the image 1 with the magnitude of the image 2 and the phase of the image 2 with the magnitude of the image 1, is prove that the component that provides more information about the image is the phase. (7) Fig. 4: Oppenheimt s experiment. Fig. 3: Comparison of CLAHE and Histogram Equalization. a) Original image and its histogram. b) CLAHE image dividing (a) in four regions of equal size and its histogram. c) Histogram equalization image and its histogram. 2.2 Phase Spectrum Oppenheim et al. [12] show that phase information retains the most part of the intelligibility of an image, because the phase spectrum contains most of the image information. This can be computed trough of a Fourier Transform which is given by: 2.3 Principal Components Analysis The PCA is a way of identifying patterns in data, and expressing the data in such a way as to highlight their similarities and differences. Since patterns in data can be hard to find in data of high dimension, where the luxury of graphical representation is not available, PCA is a powerful tool for analyzing data [13]. The other main advantage of PCA is that once these patterns are found in the data, and the data is compress, the number of dimensions are reduce, without much loss of information. F (u) = F (u) exp jθ(u) (5) where the magnitude is: and the phase is: F (u) = [R 2 (u) + I 2 (u)] 1 2 (6) Fig. 5: Feature extraction system by PCA. Fig. 5 shows the procedure for PCA application which is used in both phases training and recognition. The next procedure was used in training phase:
4 Firstly the training images are converted in column vectors, and then these vectors make a matrix (Principal Matrix). Next the principal components were extracted of the Principal Matrix to obtain a matrix of dominant features (D.F). Finally the vector of each person is multiplied by D.F to generate a feature vector, subsequently these vectors conform a matrix of feature vectors. This step is only used in the identification phase Support Vector Machine A support vector machine is basically a binary pattern classification method, whose objective is to assign each pattern to a class [14]. The SVM is used differently in each one of the phases using the vectors features obtained by PCA method. On training phase the SVM generates templates of each person, and in recognition phase decides whether feature vector agree or disagree with all templates. in conjunction with the obtain phase spectrum, the result is convert in vector for initialize the step of PCA. The first modification (CLAHE (2,2)) consists in apply the CLAHE dividing the original image in 2 parts in y axis and 2 in x axis generating four blocks, for later apply the Fast Fourier Transform (FFT) to obtain the phase spectrum of full image, this process shown in Fig. 7. Fig. 7: First variant of system called CLAHE (2,2). This variation is compare in the evaluation results with one method proposed in [6] which used histogram Equalization in full image for after extract the phase spectrum also of full image (Full HE). Moreover is compared with the original Eigenphases method. The Fig. 8 shows the process of these two methods. Fig. 6: Decision step by SVM in identification phase. The decision step is shows in Fig. 6. The feature vector of the person to recognize is applied to all one vs. all SVMs. The class given the Maximum Likelihood is used as the person s identity; the equation to obtain the Maximum Likelihood is as follows: Ŝ = arg max 1 k S P (λ k x) (8) where Ŝ is the winner and thus revealing the person s identity to whom this image was assigned, x is the column vector of the image to analyze and λ k is the SVM model of the person k [15]. 2.5 Algorithm Variations As mentioned earlier the proposed system was compared with the original method of Eigenphases [5] and the based in Histogram Equalization [6], for this comparison there were performed three variations in the proposed algorithm. It is noteworthy that variations are on the pre-processing stage Fig. 8: Differences among CLAHE (2, 2) and Full HE (white lines are not part of the image, only used to illustrate the number of divisions used by CLAHE). The second variation (CLAHE (8,6)) is based on applying the CLAHE and dividing the original image in 8, 6 parts (y, x axes) generating 48 blocks each one of 6x6 pixels, next the Fast Fourier Transform is applied to extract the phase spectrum of full image, the Fig. 9 shows this process. Fig. 9: Second variant of system called CLAHE (8,6).
5 This method which compares the face image is firstly segmented in blocks of size 6x6. Next the histogram equalization is applied to each block, which concatenated to reconstruct the face image under analysis. Finally the Fourier Transform is applied to the whole image to estimate the phase spectrum (Local HE), as shown in Fig. 10. Fig. 12: Differences among Fourier CLAHE and Fourier HE (white lines are not part of the image, only used to illustrate the concatenation of the blocks by phase spectrum extracted). Fig. 10: Differences among CLAHE (8,6) and Local HE (white lines are not part of the image, only used to illustrate the 48 blocks used by CLAHE). The Fig. 11 shows the finally variation of the system, which consists on applying the CLAHE to form 48 blocks of 6x6 pixels as in the previous structure, next the Fast Fourier Transform is applied to each block, to estimate the phase spectrum of the face image, finally these blocks are concatenated to reconstruct the phase spectrum of the face image, which is obtained using the estimated phase of each block (Fourier CLAHE). conditions, using a face data base created in to the National Polytechnic Institute of Mexico which contains 2880 face images. This data base includes 24 face images of 120 subjects, 60 males and 60 females, under controlled conditions such as different illumination, facial expressions variations and partial occlusion using sunglasses, the size of the images is 480 x 360 pixels. As shown in Fig. 13. Fig. 11: Final variant of system called Fourier CLAHE. The final method is compared with its similar with HE this is shown in the Fig. 12, that is the same procedure as Local HE but the Fast Fourier Transform is applied to each block, to estimate the phase spectrum of the face image, and with these blocks which are concatenated to reconstruct the phase spectrum of the face image, which is obtained using the estimated phase of each block called Fourier HE. 3. EVALUATION RESULTS To evaluate the results of proposed and conventional methods, there have realized the tests under the same Fig. 13: Example of the face images in the database.
6 Six images were used for the training phase to generate a template for each person, all images are resized to 48 x 36 pixels, to calculate the PCA. The number of training images was calculated trying to get the best results with the least number of images possible. The results for obtaining the number of training images are shown in the graph on Fig. 14. Table 1: RESULTS WITH HE VARIATIONS AND EIGEN- PHASE METHOD Result % Eigenphases Full HE Local HE Fourier HE The Table 2 shows the results of CLAHE method and its variations. All these results are better than the obtained using the original method, Fourier CLAHE was the best of these results. Table 2: RESULTS WITH CLAHE VARIATIONS Result % CLAHE (2,2) CLAHE (8,6) Fourier CLAHE Fig. 14: Graph of results to determine the number of training images. The graph shown the result for the recognition using 2, 3, 5 and 6 images in training phase applying "Full HE" variation of the system, this test was performed with all database using the 24 face images of 120 people. Therefore in the following results there were used 6 images for training, these images shown in Fig. 15. The Fig. 16 shows the comparison among the results of Eigenphases with the best result of HE variation (Fourier HE) and the best of CLAHE variation (Fourier CLAHE). Fourier CLAHE is the best result of this comparison, providing accuracy identification from 97.36%. Fig. 16: Comparison among Fourier HE and Fourier CLAHE with the conventional method Eigenphases, using the same conditions. Fig. 15: Training images example. In the variations using HE and the original algorithm Eigenphases the results is shown in Table 1, in which it is noted that the best result is obtained by Fourier HE enhancement about 6 percentage points to the original method. 4. Conclusion The best identification result obtained in this paper is the "Fourier CLAHEŤ, surpassing 6% to conventional method Eigenphases [5] and a little " Fourier HE ", as seen in Figure 16. "Fourier HE" in turn is the best result obtained using Histogram Equalization variations proposed in [6]. It is important to mention that the 3 proposed variations using CLAHE improve the conventional method Eigenphases, in contrast to the 3 variations using HE as it "Full HE" presents a lower assertiveness than Eigenphases.
7 Moreover, the proposed system shown to be robust to changes in the database used, which are illumination changes and partial occlusion by using sunglasses, where the results obtained are greater than 90% and in the best cases obtained a 97.36% which is acceptable for a face recognition system. Acknowledgment Thanks to everyone who helped make this project, especially those who gave their time voluntarily for the realization of the database. References [1] S. Y. Kung, M. W. Mak and S. H. Lin, Biometric Authentication: A Machine Learning Approach, New York: Prentice Hall, 2005, vol. 3. [2] H. M. El-Bakry and N. Mastorakis, "Personal identification through biometric technology," 9th WSEAS International Conference on Applied Informatics and Communications (AIC 09), Moscow, Russia, pp , [3] Stan Z. Li and Anil K. Jain, Handbook of Face Recognition, Ed. Berlin, Germany: Springer-Verlag, [4] R. Chellapa, P. Sinha, P. J. Phillips, "Face recognition by computers and humans," Computer Magazine, Vol. 43, pp , Feb [5] M. Savvides, B. V. K. Vijaya Kumar, and P. K. Khosla, "Eigenphases vs. Eigenfaces," Proc. 17th International Conference on Pattern Recognition, ICPR, vol. 3, pp , Aug [6] K. Ramirez-Gutierrez, D. Cruz-Perez, J. Olivares-Mercado, M. Nakano- Miyatake, and H. Perez-Meana, "A Face Recognition Algorithm using Eigenphases and Histogram Equalization," International Journal of Computers Issue 1, Volume 5, pp , January, [7] J. Olivares-Mercado, K. Hotta, H. Takahashi, M. Nakano-Miyatake, K. Toscano-Medina, H. Perez-Meana, "Improving the eigenphase method for face recognition", IEICE Electronic Express, vol. 6, pp , June, [8] Rafael C. Gonzalez and Richard E. Woods, Digital Image Processing, 3th ed., Ed. Pearson Prentice Hall, [9] Ali M. Reza. "Realization of the Contrast Limited Adaptive Histogram Equalization (CLAHE) for Real-Time Image Enhancement." Jurnal of VLSI Signal Processing, vol. 38, pp 35-44, [10] S.M. Pizer, E.P. Amburn, J.D. Austin, R. Cromartie, A. Geselowitz, T. Greer, B.M. ter Haar Romeny, J.B. Zimmerman, and K. Zuiderveld, "Adaptive Histogram Equalization and its Variations," Computer Vision, Graphics and Image Processing, vol. 39, 1987, pp [11] K. Zuiderveld, Contrast Limited Adaptive Histogram Equalization, Heckbert., Ed. Cambridge, MA, Academic Press, [12] A. V. Oppenheim and J. S. Lim, "The importance of phase in signals," Proc. IEEE, vol 69, pp , May [13] Lindsay I Smith. "A tutorial on Principal Components Analysis." February 26, [14] W. M. Campbell, J. P. Campbell, D. A. Reynolds, E. Singer, y P. A. Torres-Carrasquillo. "Support vector machines for speaker and language recognition," Computer Speech and Language, Vol. 20, N. 2-3, pp , 2006b. [15] T. Glasmachers and C. Igel, "Maximum Likelihood Model Selection for 1-Norm Soft Margin SVMs with Multiple Parameters," IEEE Transactions On Pattern Analysis And Machine Intelligence, Vol. 32, No. 8, pp , August 2010.
Face Recognition and Verification using Histogram Equalization
Recognition and Verification using KELSEY RAMÍREZ-GUTIÉRREZ, DANIEL CRUZ-PÉREZ, HÉCTOR PÉREZ-MEANA Postgraduate Section of Studies and Investigation Mechanical and Electrical Engineering School, National
More informationFace Recognition based Only on Eyes Information and Local Binary Pattern
Face Recognition based Only on Eyes Information and Local Binary Pattern Francisco Rosario-Verde, Joel Perez-Siles, Luis Aviles-Brito, Jesus Olivares-Mercado, Karina Toscano-Medina, and Hector Perez-Meana
More informationFace Recognition using Several Levels of Features Fusion
Face Recognition using Several Levels of Features Fusion Elizabeth García-Rios, Gualberto Aguilar-Torres, Enrique Escamilla-Hernandez, Omar Jacobo-Sanchez 2, ariko Nakano-iyatake, Hector Perez-eana echanical
More informationTraffic sign recognition application based on image processing techniques
Preprints of the 19th World Congress The International Federation of Automatic Control Traffic sign recognition application based on image processing techniques Rubén Laguna*, Rubén Barrientos*, L. Felipe
More informationFingerprint Recognition using Texture Features
Fingerprint Recognition using Texture Features Manidipa Saha, Jyotismita Chaki, Ranjan Parekh,, School of Education Technology, Jadavpur University, Kolkata, India Abstract: This paper proposes an efficient
More informationBiometric Security System Using Palm print
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
More informationAn Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image
International Journal of Computer Science Issues, Vol. 2, 2009 ISSN (Online): 694-0784 ISSN (Print): 694-084 49 An Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image Nageshkumar.M,
More informationFinger Vein Biometric Approach for Personal Identification Using IRT Feature and Gabor Filter Implementation
Finger Vein Biometric Approach for Personal Identification Using IRT Feature and Gabor Filter Implementation Sowmya. A (Digital Electronics (MTech), BITM Ballari), Shiva kumar k.s (Associate Professor,
More informationA FACE RECOGNITION SYSTEM BASED ON PRINCIPAL COMPONENT ANALYSIS USING BACK PROPAGATION NEURAL NETWORKS
A FACE RECOGNITION SYSTEM BASED ON PRINCIPAL COMPONENT ANALYSIS USING BACK PROPAGATION NEURAL NETWORKS 1 Dr. Umesh Sehgal and 2 Surender Saini 1 Asso. Prof. Arni University, umeshsehgalind@gmail.com 2
More informationFace Recognition Using Vector Quantization Histogram and Support Vector Machine Classifier Rong-sheng LI, Fei-fei LEE *, Yan YAN and Qiu CHEN
2016 International Conference on Artificial Intelligence: Techniques and Applications (AITA 2016) ISBN: 978-1-60595-389-2 Face Recognition Using Vector Quantization Histogram and Support Vector Machine
More informationColor Space Projection, Feature Fusion and Concurrent Neural Modules for Biometric Image Recognition
Proceedings of the 5th WSEAS Int. Conf. on COMPUTATIONAL INTELLIGENCE, MAN-MACHINE SYSTEMS AND CYBERNETICS, Venice, Italy, November 20-22, 2006 286 Color Space Projection, Fusion and Concurrent Neural
More informationPalmprint Recognition Using Transform Domain and Spatial Domain Techniques
Palmprint Recognition Using Transform Domain and Spatial Domain Techniques Jayshri P. Patil 1, Chhaya Nayak 2 1# P. G. Student, M. Tech. Computer Science and Engineering, 2* HOD, M. Tech. Computer Science
More informationVolume 2, Issue 9, September 2014 ISSN
Fingerprint Verification of the Digital Images by Using the Discrete Cosine Transformation, Run length Encoding, Fourier transformation and Correlation. Palvee Sharma 1, Dr. Rajeev Mahajan 2 1M.Tech Student
More informationFingerprint Verification applying Invariant Moments
Fingerprint Verification applying Invariant Moments J. Leon, G Sanchez, G. Aguilar. L. Toscano. H. Perez, J. M. Ramirez National Polytechnic Institute SEPI ESIME CULHUACAN Mexico City, Mexico National
More informationLinear Discriminant Analysis in Ottoman Alphabet Character Recognition
Linear Discriminant Analysis in Ottoman Alphabet Character Recognition ZEYNEB KURT, H. IREM TURKMEN, M. ELIF KARSLIGIL Department of Computer Engineering, Yildiz Technical University, 34349 Besiktas /
More informationSemi-Automatic Global Contrast Enhancement
Semi-Automatic Global Contrast Enhancement S. Somorjeet Singh Department of Computer Science Manipur University, Canchipur ABSTRACT Since local contrast enhancement is not sufficient for a detailed visibility
More informationMinutiae Based Fingerprint Authentication System
Minutiae Based Fingerprint Authentication System Laya K Roy Student, Department of Computer Science and Engineering Jyothi Engineering College, Thrissur, India Abstract: Fingerprint is the most promising
More informationRobust Face Recognition via Sparse Representation Authors: John Wright, Allen Y. Yang, Arvind Ganesh, S. Shankar Sastry, and Yi Ma
Robust Face Recognition via Sparse Representation Authors: John Wright, Allen Y. Yang, Arvind Ganesh, S. Shankar Sastry, and Yi Ma Presented by Hu Han Jan. 30 2014 For CSE 902 by Prof. Anil K. Jain: Selected
More informationSpatial Frequency Domain Methods for Face and Iris Recognition
Spatial Frequency Domain Methods for Face and Iris Recognition Dept. of Electrical and Computer Engineering Carnegie Mellon University Pittsburgh, PA 15213 e-mail: Kumar@ece.cmu.edu Tel.: (412) 268-3026
More informationFACE RECOGNITION IN 2D IMAGES USING LDA AS THE CLASSIFIER TO TACKLE POSING AND ILLUMINATION VARIATIONS
FACE RECOGNITION IN 2D IMAGES USING LDA AS T CLASSIFIER TO TACKLE POSING AND ILLUMINATION VARIATIONS M. Jasmine Pemeena Priyadarsini and Ajay Kumar R. School of Electronics Engineering, VIT University,
More informationSemi-Supervised PCA-based Face Recognition Using Self-Training
Semi-Supervised PCA-based Face Recognition Using Self-Training Fabio Roli and Gian Luca Marcialis Dept. of Electrical and Electronic Engineering, University of Cagliari Piazza d Armi, 09123 Cagliari, Italy
More information[Gaikwad *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor
GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES LBP AND PCA BASED ON FACE RECOGNITION SYSTEM Ashok T. Gaikwad Institute of Management Studies and Information Technology, Aurangabad, (M.S), India ABSTRACT
More informationPCA and KPCA algorithms for Face Recognition A Survey
PCA and KPCA algorithms for Face Recognition A Survey Surabhi M. Dhokai 1, Vaishali B.Vala 2,Vatsal H. Shah 3 1 Department of Information Technology, BVM Engineering College, surabhidhokai@gmail.com 2
More informationFACE DETECTION USING CURVELET TRANSFORM AND PCA
Volume 119 No. 15 2018, 1565-1575 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ http://www.acadpubl.eu/hub/ FACE DETECTION USING CURVELET TRANSFORM AND PCA Abai Kumar M 1, Ajith Kumar
More informationBIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition
BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition Hiren D. Joshi Phd, Dept. of Computer Science Rollwala Computer Centre
More informationInvariant Moments Applied to Fingerprint Recognition
Invariant Moments Applied to Fingerprint Recognition Jorge Leon-Garcia, Gabriel Sanchez-Perez, Karina Toscano-Medina, Gualberto Aguilar-Torres, Hector Perez-Meana Abstract In this paper an automatic fingerprint
More informationK-Nearest Neighbor Classification Approach for Face and Fingerprint at Feature Level Fusion
K-Nearest Neighbor Classification Approach for Face and Fingerprint at Feature Level Fusion Dhriti PEC University of Technology Chandigarh India Manvjeet Kaur PEC University of Technology Chandigarh India
More informationFace Recognition for Different Facial Expressions Using Principal Component analysis
Face Recognition for Different Facial Expressions Using Principal Component analysis ASHISH SHRIVASTAVA *, SHEETESH SAD # # Department of Electronics & Communications, CIIT, Indore Dewas Bypass Road, Arandiya
More informationHybrid Face Recognition and Classification System for Real Time Environment
Hybrid Face Recognition and Classification System for Real Time Environment Dr.Matheel E. Abdulmunem Department of Computer Science University of Technology, Baghdad, Iraq. Fatima B. Ibrahim Department
More informationRotation Invariant Finger Vein Recognition *
Rotation Invariant Finger Vein Recognition * Shaohua Pang, Yilong Yin **, Gongping Yang, and Yanan Li School of Computer Science and Technology, Shandong University, Jinan, China pangshaohua11271987@126.com,
More informationA Survey on Feature Extraction Techniques for Palmprint Identification
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 03 Issue. 12 A Survey on Feature Extraction Techniques for Palmprint Identification Sincy John 1, Kumudha Raimond 2 1
More informationAuthentication of Fingerprint Recognition Using Natural Language Processing
Authentication of Fingerprint Recognition Using Natural Language Shrikala B. Digavadekar 1, Prof. Ravindra T. Patil 2 1 Tatyasaheb Kore Institute of Engineering & Technology, Warananagar, India 2 Tatyasaheb
More informationComparison of fingerprint enhancement techniques through Mean Square Error and Peak-Signal to Noise Ratio
Comparison of fingerprint enhancement techniques through Mean Square Error and Peak-Signal to Noise Ratio M. M. Kazi A. V. Mane R. R. Manza, K. V. Kale, Professor and Head, Abstract In the fingerprint
More informationGurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3
Volume 8 Issue 2 March 2017 - Sept 2017 pp. 72-80 available online at www.csjournals.com A Novel Approach to Improve the Biometric Security using Liveness Detection Gurmeet Kaur 1, Parikshit 2, Dr. Chander
More informationGlobal-Local Contrast Enhancement
Global-Local Contrast S. Somorjeet Singh N. Gourakishwar Singh Th. Tangkeshwar Singh H. Mamata Devi ABSTRACT Using, low image can be improved in its quality ly. The enhanced output image, with such type
More informationImage Compression with Singular Value Decomposition & Correlation: a Graphical Analysis
ISSN -7X Volume, Issue June 7 Image Compression with Singular Value Decomposition & Correlation: a Graphical Analysis Tamojay Deb, Anjan K Ghosh, Anjan Mukherjee Tripura University (A Central University),
More informationFast Image Matching on Web Pages
Fast Image Matching on Web Pages HAZEM M. EL-BAKRY Faculty of Computer Science & Information Systems, Mansoura University, EGYPT E-mail: helbakry20@yahoo.com NIKOS MASTORAKIS Technical University of Sofia,
More informationPerformance Evaluation of Optimised PCA and Projection Combined PCA methods in Facial Images
Journal of Computations & Modelling, vol.2, no.3, 2012, 17-29 ISSN: 1792-7625 (print), 1792-8850 (online) Scienpress Ltd, 2012 Performance Evaluation of Optimised PCA and Projection Combined PCA methods
More informationComputer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 8. Face recognition attendance system based on PCA approach
Computer Aided Drafting, Design and Manufacturing Volume 6, Number, June 016, Page 8 CADDM Face recognition attendance system based on PCA approach Li Yanling 1,, Chen Yisong, Wang Guoping 1. Department
More informationPeg-Free Hand Geometry Verification System
Peg-Free Hand Geometry Verification System Pavan K Rudravaram Venu Govindaraju Center for Unified Biometrics and Sensors (CUBS), University at Buffalo,New York,USA. {pkr, govind} @cedar.buffalo.edu http://www.cubs.buffalo.edu
More informationAlgorithm for Efficient Attendance Management: Face Recognition based approach
www.ijcsi.org 146 Algorithm for Efficient Attendance Management: Face Recognition based approach Naveed Khan Balcoh, M. Haroon Yousaf, Waqar Ahmad and M. Iram Baig Abstract Students attendance in the classroom
More informationA Study on Similarity Computations in Template Matching Technique for Identity Verification
A Study on Similarity Computations in Template Matching Technique for Identity Verification Lam, S. K., Yeong, C. Y., Yew, C. T., Chai, W. S., Suandi, S. A. Intelligent Biometric Group, School of Electrical
More informationFace Recognition System Using PCA
Face Recognition System Using PCA M.V.N.R. Pavan Kumar 1, Shaikh Arshad A. 2, Katwate Dhananjay P. 3,Jamdar Rohit N. 4 Department of Electronics and Telecommunication Engineering 1,2,3,4, LNBCIET, Satara-415020
More informationFeature-level Fusion for Effective Palmprint Authentication
Feature-level Fusion for Effective Palmprint Authentication Adams Wai-Kin Kong 1, 2 and David Zhang 1 1 Biometric Research Center, Department of Computing The Hong Kong Polytechnic University, Kowloon,
More informationII. LITERATURE REVIEW
Matlab Implementation of Face Recognition Using Local Binary Variance Pattern N.S.Gawai 1, V.R.Pandit 2, A.A.Pachghare 3, R.G.Mundada 4, S.A.Fanan 5 1,2,3,4,5 Department of Electronics & Telecommunication
More informationAn Enhanced Face Recognition System based on Rotated Two Dimensional Principal Components
An Enhanced Face Recognition System based on Two Dimensional Principal Components Garima, Sujit Tiwari Abstract Face has been one of the widely used modality from very beginning of biometrics recognition
More informationA Matlab based Face Recognition GUI system Using Principal Component Analysis and Artificial Neural Network
A Matlab based Face Recognition GUI system Using Principal Component Analysis and Artificial Neural Network Achala Khandelwal 1 and Jaya Sharma 2 1,2 Asst Prof Department of Electrical Engineering, Shri
More informationFACE RECOGNITION USING SUPPORT VECTOR MACHINES
FACE RECOGNITION USING SUPPORT VECTOR MACHINES Ashwin Swaminathan ashwins@umd.edu ENEE633: Statistical and Neural Pattern Recognition Instructor : Prof. Rama Chellappa Project 2, Part (b) 1. INTRODUCTION
More informationOn Modeling Variations for Face Authentication
On Modeling Variations for Face Authentication Xiaoming Liu Tsuhan Chen B.V.K. Vijaya Kumar Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA 15213 xiaoming@andrew.cmu.edu
More informationImproving Latent Fingerprint Matching Performance by Orientation Field Estimation using Localized Dictionaries
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,
More informationFacial Feature Extraction Based On FPD and GLCM Algorithms
Facial Feature Extraction Based On FPD and GLCM Algorithms Dr. S. Vijayarani 1, S. Priyatharsini 2 Assistant Professor, Department of Computer Science, School of Computer Science and Engineering, Bharathiar
More informationRecognition of Non-symmetric Faces Using Principal Component Analysis
Recognition of Non-symmetric Faces Using Principal Component Analysis N. Krishnan Centre for Information Technology & Engineering Manonmaniam Sundaranar University, Tirunelveli-627012, India Krishnan17563@yahoo.com
More informationSeveral pattern recognition approaches for region-based image analysis
Several pattern recognition approaches for region-based image analysis Tudor Barbu Institute of Computer Science, Iaşi, Romania Abstract The objective of this paper is to describe some pattern recognition
More informationMulti-Modal Human Verification Using Face and Speech
22 Multi-Modal Human Verification Using Face and Speech Changhan Park 1 and Joonki Paik 2 1 Advanced Technology R&D Center, Samsung Thales Co., Ltd., 2 Graduate School of Advanced Imaging Science, Multimedia,
More informationNOWADAYS, there are many human jobs that can. Face Recognition Performance in Facing Pose Variation
CommIT (Communication & Information Technology) Journal 11(1), 1 7, 2017 Face Recognition Performance in Facing Pose Variation Alexander A. S. Gunawan 1 and Reza A. Prasetyo 2 1,2 School of Computer Science,
More informationBiometrics- Fingerprint Recognition
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 11 (2014), pp. 1097-1102 International Research Publications House http://www. irphouse.com Biometrics- Fingerprint
More informationPERFORMANCE OF FACE RECOGNITION WITH PRE- PROCESSING TECHNIQUES ON ROBUST REGRESSION METHOD
ISSN: 2186-2982 (P), 2186-2990 (O), Japan, DOI: https://doi.org/10.21660/2018.50. IJCST30 Special Issue on Science, Engineering & Environment PERFORMANCE OF FACE RECOGNITION WITH PRE- PROCESSING TECHNIQUES
More informationAn Integrated Face Recognition Algorithm Based on Wavelet Subspace
, pp.20-25 http://dx.doi.org/0.4257/astl.204.48.20 An Integrated Face Recognition Algorithm Based on Wavelet Subspace Wenhui Li, Ning Ma, Zhiyan Wang College of computer science and technology, Jilin University,
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Fingerprint Recognition using Robust Local Features Madhuri and
More informationImage Quality Measures for Fingerprint Image Enhancement
Image Quality Measures for Fingerprint Image Enhancement Chaohong Wu, Sergey Tulyakov and Venu Govindaraju Center for Unified Biometrics and Sensors (CUBS) SUNY at Buffalo, USA Abstract. Fingerprint image
More informationSkin Infection Recognition using Curvelet
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834, p- ISSN: 2278-8735. Volume 4, Issue 6 (Jan. - Feb. 2013), PP 37-41 Skin Infection Recognition using Curvelet Manisha
More informationA Novel Technique to Detect Face Skin Regions using YC b C r Color Model
A Novel Technique to Detect Face Skin Regions using YC b C r Color Model M.Lakshmipriya 1, K.Krishnaveni 2 1 M.Phil Scholar, Department of Computer Science, S.R.N.M.College, Tamil Nadu, India 2 Associate
More informationHybrid Biometric Person Authentication Using Face and Voice Features
Paper presented in the Third International Conference, Audio- and Video-Based Biometric Person Authentication AVBPA 2001, Halmstad, Sweden, proceedings pages 348-353, June 2001. Hybrid Biometric Person
More informationIris Recognition for Eyelash Detection Using Gabor Filter
Iris Recognition for Eyelash Detection Using Gabor Filter Rupesh Mude 1, Meenakshi R Patel 2 Computer Science and Engineering Rungta College of Engineering and Technology, Bhilai Abstract :- Iris recognition
More informationMultimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint
Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint Navdeep Bajwa M.Tech (Student) Computer Science GIMET, PTU Regional Center Amritsar, India Er. Gaurav Kumar M.Tech (Supervisor)
More informationA Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation
A Fast Personal Palm print Authentication based on 3D-Multi Wavelet Transformation * A. H. M. Al-Helali, * W. A. Mahmmoud, and * H. A. Ali * Al- Isra Private University Email: adnan_hadi@yahoo.com Abstract:
More informationIllumination invariant face recognition and impostor rejection using different MINACE filter algorithms
Illumination invariant face recognition and impostor rejection using different MINACE filter algorithms Rohit Patnaik and David Casasent Dept. of Electrical and Computer Engineering, Carnegie Mellon University,
More informationSubject-Oriented Image Classification based on Face Detection and Recognition
000 001 002 003 004 005 006 007 008 009 010 011 012 013 014 015 016 017 018 019 020 021 022 023 024 025 026 027 028 029 030 031 032 033 034 035 036 037 038 039 040 041 042 043 044 045 046 047 048 049 050
More informationApproach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion
Approach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion Er. Munish Kumar, Er. Prabhjit Singh M-Tech(Scholar) Global Institute of Management and Emerging Technology Assistant
More informationApplications Video Surveillance (On-line or off-line)
Face Face Recognition: Dimensionality Reduction Biometrics CSE 190-a Lecture 12 CSE190a Fall 06 CSE190a Fall 06 Face Recognition Face is the most common biometric used by humans Applications range from
More informationA Representative Sample Selection Approach for SRC
DEIM Forum 2011 E9-1 AliceChen, NTT, 239-0847 1-1 School of Computing Science, Simon Fraser University 8888 University Drive, Burnaby BC, V5A 1S6 Canada E-mail: {alice.chen,eda.takeharu,katafuchi.norifumi,kataoka.ryoji}@lab.ntt.co.jp
More informationFace recognition based on improved BP neural network
Face recognition based on improved BP neural network Gaili Yue, Lei Lu a, College of Electrical and Control Engineering, Xi an University of Science and Technology, Xi an 710043, China Abstract. In order
More informationAbstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric;
Analysis Of Finger Print Detection Techniques Prof. Trupti K. Wable *1(Assistant professor of Department of Electronics & Telecommunication, SVIT Nasik, India) trupti.wable@pravara.in*1 Abstract -Fingerprints
More informationGPU Based Face Recognition System for Authentication
GPU Based Face Recognition System for Authentication Bhumika Agrawal, Chelsi Gupta, Meghna Mandloi, Divya Dwivedi, Jayesh Surana Information Technology, SVITS Gram Baroli, Sanwer road, Indore, MP, India
More informationFootprint Recognition using Modified Sequential Haar Energy Transform (MSHET)
47 Footprint Recognition using Modified Sequential Haar Energy Transform (MSHET) V. D. Ambeth Kumar 1 M. Ramakrishnan 2 1 Research scholar in sathyabamauniversity, Chennai, Tamil Nadu- 600 119, India.
More informationAutomated Canvas Analysis for Painting Conservation. By Brendan Tobin
Automated Canvas Analysis for Painting Conservation By Brendan Tobin 1. Motivation Distinctive variations in the spacings between threads in a painting's canvas can be used to show that two sections of
More informationComputer Science Faculty, Bandar Lampung University, Bandar Lampung, Indonesia
Application Object Detection Using Histogram of Oriented Gradient For Artificial Intelegence System Module of Nao Robot (Control System Laboratory (LSKK) Bandung Institute of Technology) A K Saputra 1.,
More informationEAR RECOGNITION AND OCCLUSION
EAR RECOGNITION AND OCCLUSION B. S. El-Desouky 1, M. El-Kady 2, M. Z. Rashad 3, Mahmoud M. Eid 4 1 Mathematics Department, Faculty of Science, Mansoura University, Egypt b_desouky@yahoo.com 2 Mathematics
More informationFace Recognition Based On Granular Computing Approach and Hybrid Spatial Features
Face Recognition Based On Granular Computing Approach and Hybrid Spatial Features S.Sankara vadivu 1, K. Aravind Kumar 2 Final Year Student of M.E, Department of Computer Science and Engineering, Manonmaniam
More informationDetermination of 3-D Image Viewpoint Using Modified Nearest Feature Line Method in Its Eigenspace Domain
Determination of 3-D Image Viewpoint Using Modified Nearest Feature Line Method in Its Eigenspace Domain LINA +, BENYAMIN KUSUMOPUTRO ++ + Faculty of Information Technology Tarumanagara University Jl.
More informationKeywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure and Reliable
More informationBiometrics Technology: Image Processing & Pattern Recognition (by Dr. Dickson Tong)
Biometrics Technology: Image Processing & Pattern Recognition (by Dr. Dickson Tong) References: [1] http://homepages.inf.ed.ac.uk/rbf/hipr2/index.htm [2] http://www.cs.wisc.edu/~dyer/cs540/notes/vision.html
More informationCOMPUTER VISION. Dr. Sukhendu Das Deptt. of Computer Science and Engg., IIT Madras, Chennai
COMPUTER VISION Dr. Sukhendu Das Deptt. of Computer Science and Engg., IIT Madras, Chennai 600036. Email: sdas@iitm.ac.in URL: //www.cs.iitm.ernet.in/~sdas 1 INTRODUCTION 2 Human Vision System (HVS) Vs.
More informationImplementation of Fingerprint Matching Algorithm
RESEARCH ARTICLE International Journal of Engineering and Techniques - Volume 2 Issue 2, Mar Apr 2016 Implementation of Fingerprint Matching Algorithm Atul Ganbawle 1, Prof J.A. Shaikh 2 Padmabhooshan
More informationBiometrics Technology: Multi-modal (Part 2)
Biometrics Technology: Multi-modal (Part 2) References: At the Level: [M7] U. Dieckmann, P. Plankensteiner and T. Wagner, "SESAM: A biometric person identification system using sensor fusion ", Pattern
More informationDrywall state detection in image data for automatic indoor progress monitoring C. Kropp, C. Koch and M. König
Drywall state detection in image data for automatic indoor progress monitoring C. Kropp, C. Koch and M. König Chair for Computing in Engineering, Department of Civil and Environmental Engineering, Ruhr-Universität
More informationPublished by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1
Minutiae Points Extraction using Biometric Fingerprint- Enhancement Vishal Wagh 1, Shefali Sonavane 2 1 Computer Science and Engineering Department, Walchand College of Engineering, Sangli, Maharashtra-416415,
More informationIllumination Normalization in Face Recognition Using DCT and Supporting Vector Machine (SVM)
Illumination Normalization in Face Recognition Using DCT and Supporting Vector Machine (SVM) 1 Yun-Wen Wang ( 王詠文 ), 2 Wen-Yu Wang ( 王文昱 ), 2 Chiou-Shann Fuh ( 傅楸善 ) 1 Graduate Institute of Electronics
More informationAN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE
AN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE sbsridevi89@gmail.com 287 ABSTRACT Fingerprint identification is the most prominent method of biometric
More informationA new approach to reference point location in fingerprint recognition
A new approach to reference point location in fingerprint recognition Piotr Porwik a) and Lukasz Wieclaw b) Institute of Informatics, Silesian University 41 200 Sosnowiec ul. Bedzinska 39, Poland a) porwik@us.edu.pl
More informationFusion of Hand Geometry and Palmprint Biometrics
(Working Paper, Dec. 2003) Fusion of Hand Geometry and Palmprint Biometrics D.C.M. Wong, C. Poon and H.C. Shen * Department of Computer Science, Hong Kong University of Science and Technology, Clear Water
More informationFace Detection and Recognition in an Image Sequence using Eigenedginess
Face Detection and Recognition in an Image Sequence using Eigenedginess B S Venkatesh, S Palanivel and B Yegnanarayana Department of Computer Science and Engineering. Indian Institute of Technology, Madras
More informationA Study on Different Challenges in Facial Recognition Methods
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.521
More informationLinear Discriminant Analysis for 3D Face Recognition System
Linear Discriminant Analysis for 3D Face Recognition System 3.1 Introduction Face recognition and verification have been at the top of the research agenda of the computer vision community in recent times.
More informationComponent-based Face Recognition with 3D Morphable Models
Component-based Face Recognition with 3D Morphable Models Jennifer Huang 1, Bernd Heisele 1,2, and Volker Blanz 3 1 Center for Biological and Computational Learning, M.I.T., Cambridge, MA, USA 2 Honda
More informationImage enhancement for face recognition using color segmentation and Edge detection algorithm
Image enhancement for face recognition using color segmentation and Edge detection algorithm 1 Dr. K Perumal and 2 N Saravana Perumal 1 Computer Centre, Madurai Kamaraj University, Madurai-625021, Tamilnadu,
More informationAnalysis of Algorithms used in Biometric using Fingerprint Authentication for 3D Authentication System
Analysis of Algorithms used in Biometric using Fingerprint Authentication for 3D Authentication System Ayushi Mathur 1, Mr. Rupal Gupta 2 1 Research Scholar, CCSIT, Teerthankar Mahaveer University, Moradabad
More informationMULTI-FINGER PENETRATION RATE AND ROC VARIABILITY FOR AUTOMATIC FINGERPRINT IDENTIFICATION SYSTEMS
MULTI-FINGER PENETRATION RATE AND ROC VARIABILITY FOR AUTOMATIC FINGERPRINT IDENTIFICATION SYSTEMS I. Introduction James L. Wayman, Director U.S. National Biometric Test Center College of Engineering San
More informationInvarianceness for Character Recognition Using Geo-Discretization Features
Computer and Information Science; Vol. 9, No. 2; 2016 ISSN 1913-8989 E-ISSN 1913-8997 Published by Canadian Center of Science and Education Invarianceness for Character Recognition Using Geo-Discretization
More informationModifications to the Eigenphases Method for Face Recognition Based on SVM
Ingeniería Investigación y Tecnología, volumen XVII (número 1), enero-marzo 2016: 119-129 ISSN 1405-7743 FI-UNAM (artículo arbitrado) Modifications to the Eigenphases Method for Face Recognition Based
More information