33
33
May 25, 2017
05/17
by
Phillips, P. Jonathon; Moon, Hyeonjoon; Rizvi, Syed A.; Rauss, Patrick J.
texts
eye 33
favorite 0
comment 0
Topic: Human face recognition (Computer science)
In every college there will be a huge number of students who uses the facility of library to access or to refer different varieties of books to gain knowledge about subjects. Every Library maintains a register to maintain the data about members who entered library. Some colleges still use the traditional approaches of maintaining register, which is difficult to maintain, to check and to analyze data. So, we propose a new system in which students are passed through camera at entry point of the...
Topics: Face Recognition, Attendance, Artificial Intelligence
Humans are able to process a face in a variety of ways to categorize it by its identity, along with a number of other demographic characteristics, including race, gender , and age. Experimental results are based on a face database containing subjects. Race and gender also play an important role in face-related applications. Experimental results are indicated that participants categorized the race of the face and this categorization drives the perceptual process. A face image data set is...
Topics: race identification, PCA, face recognition
Humans are able to process a face in a variety of ways to categorize it by its identity, along with a number of other demographic characteristics, including race, gender , and age. Experimental results are based on a face database containing subjects. Race and gender also play an important role in face-related applications. Experimental results are indicated that participants categorized the race of the face and this categorization drives the perceptual process. A face image data set is...
Topics: race identification, PCA, face recognition
50
50
May 25, 2017
05/17
by
Phillips, P. Jonathon
texts
eye 50
favorite 0
comment 0
Topic: Human face recognition (Computer science)
Folkscanomy Miscellaneous
1,164
1.2K
Dec 30, 2015
12/15
by
Wechsler, Harry, 1948-; North Atlantic Treaty Organization. Scientific Affairs Division; NATO Advanced Study Institute on Face Recognition: From Theory to Applications (1997 : Stirling, Stirling, Scotland)
texts
eye 1,164
favorite 0
comment 0
Face Recognition: From Theory to Applications Author: Harry Wechsler, P. Jonathon Phillips, Vicki Bruce, Françoise Fogelman Soulié, Thomas S. Huang Published by Springer Berlin Heidelberg ISBN: 978-3-642-72203-5 DOI: 10.1007/978-3-642-72201-1 Table of Contents: Neural and Psychophysical Analysis of Object and Face Recognition Multi-Modal Person Authentication Human Face Perception and Identification Discriminant Analysis of Principal Components for Face Recognition Inductive Principles for...
Topics: Human face recognition (Computer science), Perception des visages, Human face recognition (Computer...
33
33
Jun 22, 2017
06/17
by
Rizvi, Syed A.; Phillips, P. Jonathon; Moon, Hyeonjoon
texts
eye 33
favorite 0
comment 0
Topic: Human face recognition (Computer science)
92
92
Jan 27, 2017
01/17
by
ICGST LLC
texts
eye 92
favorite 0
comment 0
Abstract: In this paper, a new face recognition technique based on Hidden Markov Model (HMM), Pre-processing, and feature extraction (Canny) is proposed. Two main contributions are presented. In the pre-processing, the input image’s edge is fixed to five pixels and spacing between various parts of the pixels is fixed to a trial threshold. The second contribution is a new technique to extract the image's features by splitting the image into non-uniform height depending on the distribution of...
Topics: HMM, Canny Operator, Face Recognition, Accuracy
94
94
Jan 27, 2017
01/17
by
ICGST LLC
texts
eye 94
favorite 0
comment 0
In this paper, a new face recognition technique based on Hidden Markov Model (HMM), Pre-processing, and feature extraction (K-means and the Sobel operator) is proposed. Two main contributions are presented; the first contribution in the pre-processing were image’s edges are normalized to enhance the HMM models to be non- sensitive to different edges. The second contribution is a new technique to extract the image's features by splitting the image into non-uniform height depending on the...
Topics: HMM, Sobel operator, Face Recognition, Accuracy
Face recognition system is very beneficial in real time applications, concentrated in security control systems. Face Detection and Recognition is a vital area in the province of validation. In this project, the Open CV based face recognition strategy has been proposed. This model integrates a camera that captures an input image, an algorithm Haar Cascade Algorithm for detecting face from an input image, identifying the face and marking the attendance in an excel sheet. The proposed system...
Topics: Face Recognition, Haarcascades, Adaboost, OpenCv, LBPH
45
45
Jun 22, 2017
06/17
by
Phillips, P. Jonathon; O'Toole, Alice J.; Cheng, Yi; Ross, Brendan; Wild, Heather A.
texts
eye 45
favorite 0
comment 0
Topics: Algorithms, Human face recognition (Computer science)
12
12
data
eye 12
favorite 0
comment 0
Illustration of face recognition technology Free Vector
Topic: Illustration of face recognition technology Free Vector
116
116
Jun 10, 2016
06/16
by
IASET JOURNALS
texts
eye 116
favorite 0
comment 0
Face recognition is actively growing area of research because it is applied in numerous practical applications such as bank identification, security cameras, criminal investigations, security monitoring, and surveillance system and helps to aid national security. Face is a type of biometric characteristic of the human which is unique to each human. The face is recognized by considering features i.e. eye distance, nose distance, lip distance, etc. In this paper, a human presence is detected by...
Topics: Skin Detection, Neuro-Fuzzy, Eigenface, Face Recognition
In the era of modern technologies emerging at rapid pace there is no reason why a crucial event in education sector such as attendance should be done in the old boring traditional way. Attendance monitoring system will save a lot of time and energy for the both parties teaching staff as well as the students. Attendance will be monitored by the face recognition algorithm by recognizing only the face of the students from the rest of the objects and then marking the students as present. The system...
Topics: Face Detection, Face Recognition, Viola-Jones, LBPH
16
16
texts
eye 16
favorite 0
comment 0
Abstract flat face recognition background Free Vector
Topic: Abstract flat face recognition background Free Vector
Eigen face approach is one of the earliest face recognition approach introduced in the year 1991 by M. Turk and A. Pentland. It is a Principal Component Analysis (PCA) based approach. Initially, PCA decomposes the face image into a small set of characteristic features known as eigen faces, followed the computation of distance between the resultant position in the face space and the known face classes. This analysis reduces the dimensionality of the training set, leaving only those features that...
Topics: Symmetric Face Recognition Using Eigen Faces, PCA
4
4.0
texts
eye 4
favorite 1
comment 0
xv, 275 p. : 24 cm
Topics: Human face recognition (Computer science), Biometric identification
15
15
Mar 22, 2021
03/21
by
Hamsa A. Abdullah
texts
eye 15
favorite 0
comment 0
Human face recognition (HFR) is the method of recognizing people in images or videos. There are different HFR methods such as feature-based, eigen-faces, hidden markov model and neural network (NN) based methods. Feature extraction or preprocessing used in first three mentioned methods that associated with the category of the image to recognize. While in the NN method, any type of image can be useful without the requirement to particular data about the type of image, and simultaneously provides...
Topics: Face recognition, Feature based, Fuzzy, Neural network
Collaborative representation based classification (CRC) has received much attention in the field of pattern recognition. CRC uses a simple way to code a testing sample as a linear combination of all the training samples and classifies the testing sample into the class with the minimum representation error. But the original algorithm of CRC suffers from the following problem. It must perform the matrix inverse operation, which may cause unstable numerical computation. With this paper, in order...
Topics: Face Recognition, Collaborative Representation, Iterative, Classifier, CRC
Eigen face approach is one of the earliest face recognition approach introduced in the year 1991 by M. Turk and A. Pentland. It is a Principal Component Analysis (PCA) based approach. Initially, PCA decomposes the face image into a small set of characteristic features known as eigen faces, followed the computation of distance between the resultant position in the face space and the known face classes. This analysis reduces the dimensionality of the training set, leaving only those features that...
Topics: Symmetric Face Recognition Using Eigen Faces, PCA
33
33
Apr 26, 2021
04/21
by
G. Ramkumar, E. Logashanmugam
texts
eye 33
favorite 0
comment 0
In recent times face tracking and face recognition have turned out to be increasingly dynamic research field in image processing. This work proposed the framework DEtecting Contiguous Outliers in the LOw-rank Representation for face tracking, in this algorithm the background is assessed by a low-rank network and foreground articles can be distinguished as anomalies. This is suitable for non-rigid foreground motion and moving camera. The face of a foreground person is caught from the frame and...
Topics: Biometrics, Face Recognition, Face Tracking, Image Analysis, Simulation
This paper try to construct an intelligent security system based on face recognition. The data used in this research are frontal face images and without obstacles, and facial images with obstacles. In this research, we used Content Based Image Retrieval or CBIR method. Approximately 10,000 images used in this work which is collected from internet, police department office, and shooting directly as primary data. Facial image data are stored in the database object-based files through process of...
Topics: Face recognition, CBIR, intelligent: security system, criminal, similarity.
International Journal of Innovative Technology and Creative Engineering (ISSN:2045-8711)
Topics: Face recognition with occlusion, Markov Chain, residual image
40
40
Jun 22, 2017
06/17
by
Grother, P.; Michaels, R.; Phillips, J.
texts
eye 40
favorite 0
comment 0
Topics: Human face recognition (Computer science), Biometry -- Data processing
A smart student attendance system (SSAS) is presented in this paper. The system is divided into two phases: hardware and software. The Hardware phase is implemented based on Arduino's camera while the software phase is achieved by using image processing with face recognition depended on the cross-correlation technique. In comparison with traditional attendance systems, roll call, and sign-in sheet, the proposed system is faster and more reliable (because there is no action needed by a human...
Topics: Arduino, Attendance system, Cross-correlation, Face recognition, Normalization
16
16
Mar 23, 2021
03/21
by
Mohammed Talal Ghazal, Karam Abdullah
texts
eye 16
favorite 0
comment 0
Recent studies highlighted on face recognition methods. In this paper, a new algorithm is proposed for face recognition by combining Fast Discrete Curvelet Transform (FDCvT) and Invariant Moments with Support vector machine (SVM), which improves rate of face recognition in various situations. The reason of using this approach depends on two things. first, Curvelet transform which is a multi-resolution method, that can efficiently represent image edge discontinuities; Second, the Invariant...
Topics: Curvelet, Face recognition, Invariant moment, Support vector machine
In recent years there has been an increased interest in effective individual control and enhanced security measures, and face recognition schemes play an important role in this increasing market. In the past, most face recognition research studies have been conducted with visible imaging data. Only recently have IR imaging face recognition studies been reported for wide use applications, as uncooled IR imaging technology has improved to the point where the resolution of these much cheaper...
Topics: Human face recognition (Computer science), Pattern recognition systems, Infrared imaging,...
36
36
Apr 5, 2021
04/21
by
Nur Ateqah Binti Mat Kasim, Nur Hidayah Binti Abd Rahman, Zaidah Ibrahim, Nur Nabilah Abu Mangshor
texts
eye 36
favorite 0
comment 0
Face recognition is one of the well studied problems by researchers in computer visions. Among the challenges of this task are the occurrence of different facial expressions like happy or sad, and different views of the images such as front and side views. This paper experiments a publicly available dataset that consists of 200,000 images of celebrity faces. Deep Learning technique is gaining its popularity in computer vision and this paper applies this technique for face recognition problem....
Topics: AlexNet, Convolutional neural network, Deep learning, Face recognition, GoogLeNet
In today's world, there are number of existing methods for facial recognition. These methods are based on frontal view face data. There are few methods which are based on non-frontal view face recognition method. In most of the face recognition algorithm, 'œFeature space' approach is used. In this approach, different feature vectors are extracted from face. These distances are compared to determine matches. In this paper, it is proposed that how any person can be located in a campus or in a...
Topics: Feature Space, Face Recognition, Cross Pose method., Data Processing
19
19
Jun 12, 2021
06/21
by
Israa Hadi, Alyaa Mahdi
texts
eye 19
favorite 0
comment 0
One of the most common approaches to address the partial face recognition challenge is to crop the full face image into segments. The problem is how the full face image must be cropped in a uniform way to generate informative segments. The un-blindly strategy was applied in this paper to generate informative segments, it depends on localizing the facial landmarks and selecting the more informative facial points as a key points, as more as the knearest neighbor concept was explored to select the...
Topics: Facial landmarks, Key points, KNN, Partial face recognition, Segmentation
Face recognition is gaining popularity as one of the biometrics methods for an attendance system in an organization. Due to the pandemic, the common face recognition system needs to be modified to meet the current needs, whereby facemask detection is necessary. The main objective of this paper is to investigate and develop a real-time face recognition system for the attendance system based on the current scenarios. The proposed framework consists of face detection, mask detection, face...
Topics: Attendance system, Face recognition, Mask detection, Real-time system
In today's world, there are number of existing methods for facial recognition. These methods are based on frontal view face data. There are few methods which are based on non-frontal view face recognition method. In most of the face recognition algorithm, "Feature space" approach is used. In this approach, different feature vectors are extracted from face. These distances are compared to determine matches. In this paper, it is proposed that how any person can be located in a campus or...
Topics: Feature Space, Face Recognition, Cross Pose method., Data Processing
Face recognition is an emerging research area in recognition of the people. A novel feature extraction technique was introduced for robust face recognition. Enhanced Local binary pattern (EnLBP) divided the image into sub regions. For each sub region, the salient features are extracted by obtaining the mean value of each sub region. In LBP, each pixel was replaced by applying LBP into each sub region. In this paper, the mean value of sub region was replaced for the sub region. It reduced the...
Topics: Face recognition, Feature extraction, Local binary pattern, Local descriptor
Content-based indexing methods are of great interest for image and video retrieval in audio-visual archives, such as in the DiVAN project that we are currently developing. Detecting and recognizing human faces automatically in video data provide users with powerful tools for performing queries. The work is done for recognition of the face by using wavelet packet decomposition. Each face is described by a subset of band filtered images containing wavelet coefficients. These coefficients...
Topics: Artificial Intelligence Face Recognition, Wavelet packet decomposition, Bhattacharyya distance
220
220
Dec 31, 2013
12/13
by
Adegoke,Oduwole,Oyediran,Olawuyi
texts
eye 220
favorite 0
comment 0
This paper examines Fisherface (Linear Discriminant Analysis) methods, its different modifications as applied to feature extraction in face recognition. Researchers showed that Fisher algorithm, though it performs better than PCA, Eigenface and some other fundamental methods, computational complexity, enormous hardware resources usage are inhibitors to its implementation. Different versions or adaptations of Fisher algorithm had been developed, and applied to face recognition and validated...
Topics: Databases, Face Recognition, Fisher’s Linear Discriminant Analysis, Recognition Accuracy.
Technological advancements are inevitable and the field of IoT is no exception. The utilization of the technologies in various sectors is highly employed. Even though we use technology in various sectors, the employment of technology for security purposes is very low. The Existing security in various places only CCTV is used for monitoring and recording. Even there are existing security systems where an alert is sent via an email which requires a stable internet connection. It is unlikely that...
Topics: Computer Engineering, Face recognition, Image Processing, IoT, Security system
In today's world, there are number of existing methods for facial recognition. These methods are based on frontal view face data. There are few methods which are based on non-frontal view face recognition method. In most of the face recognition algorithm, "Feature space" approach is used. In this approach, different feature vectors are extracted from face. These distances are compared to determine matches. In this paper, it is proposed that how any person can be located in a campus or...
Topics: Feature Space, Face Recognition, Cross Pose method., Data Processing
This paper presents three novelty aspects in developing biometric system-based face recognition software for human identification applications. First, the computations cost is greatly reduced by eliminating the feature extraction phase and considering only the detected face features from the phase congruency. Secondly, a motivation towards applying a new technique, named mean-based training (MBT) is applied urgently to overcome the matching delay caused by the long feature vector. The last...
Topics: Decision fusion, Edge-angle, Face recognition, Optimization, Phase congurency
This study investigated a (IR) face recognition system using an uncooled IR camera. A computer-based image collection set-up was designed and used to create a small database of 420 facial images, from 14 volunteers. Man-ual and automated facial image cropping routines were implemented. Two linear approaches for the dataset di-mension reduction and classification were implemented and their resulting classification performances compared: PCA-based and LDA approaches. Results show that the best...
Topics: Infrared imaging, Face Recognition, Classification, PCA, LDA, IR, Infrared, eigenvectors
Face recognition is a challenge due to facial expression, direction, light, and scale variations. The system requires a suitable algorithm to perform recognition task in order to reduce the system complexity. This paper focuses on a development of a new local feature extraction in frequency domain to reduce dimension of feature space. In the propose method, assemble of DCT coefficients are used to extract important features and reduces the features vector. PCA is performed to further reduce...
Topics: DCT, Face recognition, Local feature extraction, Low frequency features, PCA
In this era of Digitization and Automation, the life of human beings is getting simpler as almost everything is automatic, replacing the old manual systems. Nowadays humans have made internet an integral part of their everyday life without which they are helpless. Internet of things IOT provides a platform that allows devices to connect, sensed and controlled remotely across a network infrastructure. Our project basically focuses on Laboratory automation using smart phone and computer. The IOT...
Topics: Internet of Things, automate lab components, save energy, face recognition
Face identification is a fundamental report field of example recognition. Today, it has created decent enthusiasm for researchers in these fields, similar to PC vision and example identification. We will affirm that crafted by the face acknowledgment framework is chosen by the best approach to portion factor vector absolutely and to convey them into a class appropriately. A technique perfection to help features acknowledgment pace by intertwining the part and size of Gabors delineations of the...
Topics: Other, Face Recognition, Gabor, Support Vector Machine, Principal components analysis
23
23
Jun 2, 2021
06/21
by
Fadhlan Hafizhelmi Kamaru Zaman, Juliana Johari, Ahmad Ihsan Mohd Yassin
texts
eye 23
favorite 0
comment 0
Face verification focuses on the task of determining whether two face images belong to the same identity or not. For unrestricted faces in the wild, this is a very challenging task. Besides significant degradation due to images that have large variations in pose, illumination, expression, aging, and occlusions, it also suffers from large-scale ever-expanding data needed to perform one-to-many recognition task. In this paper, we propose a face verification method by learning face similarities...
Topics: Face verification, Face similarities, Unrestricted face, Face recognition, Deep learning
177
177
texts
eye 177
favorite 0
comment 0
In this work we examine a face recognition system based on advanced correlation filters. A thorough theoretical design analysis of, Minimum Average Correlation Energy (MACE) filters and Optimum Trade-off Synthetic Discriminant Function (OTSDF) also commonly known as Optimal Trade-off Filter (OTF) is provided. In practice one of the major computational aspects in the correlation filter design is representation of complex floating point Discrete Fourier Transform (DFT) coefficients using limited...
Topics: correlation filters, discrete cosine transform, face recognition, synthetic discriminant function
22
22
May 25, 2021
05/21
by
Arulananth T. S, Baskar M, Sateesh R.
texts
eye 22
favorite 0
comment 0
Face detection, monitoring of human face and recognition is a high-quality venture in safety, surveillance and regulation enforcement systems with greater accuracy. There are many motives at the back of in this trouble. Which include function of the human face; pose version, negative environmental conditions, terrible lightning and picture tilt etc,. So we must locate a few feasible solutions to clear up those issues by means of imposing a brand new system. Our proposed venture might be...
Topics: Contour matching, Face detection, Face monitoring, Face recognition, Geometric contours
Through the increasingly common use of devices that provide ubiquitous sensor data such as wearables, mobile phones, and Internet-connected devices of the sort, privacy challenges are becoming even more significant. One major challenge that requires more focus is bystanders' privacy, as there are too few solutions that solve the issue. Of the solutions available, many of them do not give bystanders a choice in how their private data is used, Bystanders' privacy has become an afterthought when...
Topics: Privacy, Face Detection, Face Recognition, Wearables, Internet of Things, FacePET
This study continues a previous face recognition investigation using uncooled infrared technology. The database developed in an earlier study is further expanded to include 50 volunteers with 30 facial images from each subject. The automatic image reduction method reduces the pixel size of each image from 160 120 to 60 45 . The study reexamines two linear classification methods: the Principal Component Analysis (PCA) and Fisher Linear Discriminant Analysis (LDA). Both PCA and LDA apply...
Topics: Infrared imaging, Human face recognition (Computer science), Uncooled infrared imaging, Face...
Modernization of railways has forever been an issue focused on the development of the fundamental infrastructure of a nation. Since the railways represent one of the most effective modes of transport offered to the people, It is important to keep a check on the security issues that are arising in today’s world. According to the need there must be an up gradation in systems we use. One such up gradation is that the role of Artificial Intelligence and e ticketing that is achieved with the...
Topics: Face recognition, Ticket verification, K- Nearest Neighbours, OpenCV, Haar cascade classifier
This paper introduces car theft prevention using Face recognition in IoT base Home automation. Internet of things is of connecting of all the devices such as sensors actuators and other embedded devices through communication protocol. Iot is used in Home Automation for controlling Home appliances such as controlling home door, getting information about room temperature gas leakage and fire alarm notification in home from anywhere in the world. Nowadays car theft prevention is important to keep...
Topics: Home Automation, car theft Face recognition, controllers, sensors, RFID, Computer Engineering
This paper introduces car theft prevention using Face recognition in IoT base Home automation. Internet of things is of connecting of all the devices such as sensors actuators and other embedded devices through communication protocol. Iot is used in Home Automation for controlling Home appliances such as controlling home door, getting information about room temperature gas leakage and fire alarm notification in home from anywhere in the world. Nowadays car theft prevention is important to keep...
Topics: Home Automation, car theft Face recognition, controllers, sensors, RFID, Computer Engineering