SlideShare uma empresa Scribd logo
1 de 9
Baixar para ler offline
Journal of Information Engineering and Applications                                            www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.1, 2011

  Similarity of Inference Face Matching On Angle Oriented Face
                            Recognition
                                     Naga Venkata Jagan Mohan Remani
                              Research Scholar, Acharya Nagarjuna University
                           Mobile: +91-9848957141 Email:mohanrnvj@gmail.com
                                           Subba Rao Rachakonda
                                 Professor in Dept of Science and Humanities
           Shri Vishnu Engineering College for Women, Bhimavaram-534202, Andhra Pradesh, India
                          Mobile: +91-9440976619 Email:rsr_vishnu@svcw.edu.in
                                            Raja Sekhara Rao Kurra
                             Principal, Konearu Laxmiah College of Engineering
                            Vaddeswaram Guntur-522510, Andhra Pradesh, India
                                  Mobile: +91-9848452344 Email:rajasekhar.kurra@klce.ac.in

Abstract
Face recognition is one of the wide applications of image processing technique. In this paper complete image of
face recognition algorithm is proposed. In the prepared algorithm the local information is extracted using angle
oriented discrete cosine transforms and invokes certain normalization techniques. To increase the Reliability of
the Face detection process, neighborhood pixel information is incorporated into the proposed method. Discrete
Cosine Transform (DCT) are renowned methods are implementing in the field of access control and security are
utilizing the feature extraction capabilities. But these algorithms have certain limitations like poor
discriminatory power and disability to handle large computational load. The face matching classification for the
proposed system is done using various distance measure methods like Euclidean Distance, Manhattan Distance
and Cosine Distance methods and the recognition rate were compared for different distance measures. The
proposed method has been successfully tested on image database which is acquired under variable illumination
and facial expressions. It is observed from the results that use of face matching like various method gives a
recognition rate are high while comparing other methods. Also this study analyzes and compares the obtained
results from the proposed Angle oriented face recognition with threshold based face detector to show the level of
robustness using texture features in the proposed face detector. It was verified that a face recognition based on
textual features can lead to an efficient and more reliable face detection method compared with KLT (Karhunen
Loeve Transform), a threshold face detector.

Keywords: Angle Oriented, Cosine Similarity, Discrete Cosine Transform, Euclidean Distance, Face Matching,
Feature Extraction, Face Recognition, Image texture features.

1. Introduction
Many authors discussed the face recognition by comparing the face of human being with the database and
identifying the features of image. Face Recognition has received considerable attention over past two decades,
where variation caused by illumination is most significant factor that alerts the appearance of face Chellappa et
al., 1995. The database of system consists of individual facial features along with their geometrical relations. So
for the input taken the facial features are compared with the database. If a match is found the face of the person
is said to be recognized. In this process we consider feature extraction capabilities of discrete cosine transform
(DCT) and invoke certain normalization techniques which increase its robust face recognition.

The face recognition falls in to two main categories, Chellappa et al., 1995; they are (i) feature-based and (ii)
holistic. Feature-based approach to face recognition relies on detection and characterization of the individual
facial features like eyes, nose and mouth etc, and their geometrical relationships. On the other hand, holistic
approach to face recognition involves encoding of the entire facial image. Earlier works on face recognition as
discussed by Ziad M.Hafed and Martin Levine 2001, Ting Shan et al 2006, are considered. Alaa Y. Taqa and
Hamid A. Jalab 2010 are proposed color-based or texture-based skin detector approaches.

In this paper we discussed a new computational approach that is converting the input image to database image
using Angle orientation technique in section2. Section 3 deals with the mathematical definition of the discrete
cosine transform its relationship to KLT and Euclidean Distance with Cosine Similarities. The basics of face
recognition system using DCT that includes the details of proposed algorithm and discussion of various
parameters which affect its performance are discussed in section 4. The experimental results of the proposed


46 | P a g e
www.iiste.org
Journal of Information Engineering and Applications                                            www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.1, 2011
system are highlighted in section 5.The conclusion and future perceptives are mentioned in section 6.

2. Angle Orientation

First the input image is selected and compared with the database image. If input image size is not equivalent to
database size, the input image is to be resized to match with the size of database image. We compare the pose of
the image in both input and database images. If the input image is not at an angle of 900 we can’t compare the
images; some authors Ziad. M. Hafed and Martine D. Levine (2001) used eye coordinates techniques to
recognize such an image. In this approach one can identify the feature images of the faces even though they are
angle oriented. If the input image angle is not 900, rotate the image to 900 and then apply normalization
technique such as geometric and illumination technique. Recognition of an image by using rotational axis is
easy to achieve or recognize the face. When the input image rotates from horizontal axis to vertical axis the face
rotates anti-clock wise and the face appears in which it is the same as the database pose, then the object is
recognized. Similarly, when the input image rotates from vertical axis to horizontal axis the face rotates clock
wise and the face appears in which it is the same as the database pose, then the object is recognized. Therefore if
input image is Angle oriented, the pose is changed or Angle is altered using rotational axis and then compared.
The Two types of angle rotations, clock wise and Anti-clock wise, with different angles are given in the images
of Figure.2.1 and Figure 2.2.




                           Figure2.1: Angle Rotation – Anti Clock Wise Direction




                                      Figure2.2: Angle Rotation – Clock Wise Direction



47 | P a g e
www.iiste.org
Journal of Information Engineering and Applications                                            www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.1, 2011
3. Mathematical Methods
3.0. Discrete Cosine Transform

Discrete cosine transform (DCT) has been used as a feature extraction step in various studies on face
recognition. Until now, discrete cosine transforms have been performed either in a holistic appearance-based
sense [7], or in a local appearance-based sense ignoring the spatial information to some extent during the
classification step by feeding some kind of neural networks with local DCT coefficients or by modelling them
with some kind of statistical tools.

Ahmed, Natarajan, and Rao (1974) first introduced the discrete cosine transform (DCT) in the early seventies.
Ever since, the DCT has grown in popularity, and several variants have been proposed (Rao and Yip, 1990). In
particular, the DCT was categorized by Wang (1984) into four slightly different transformations named DCT-I,
DCT-II, DCT-III, and DCT-IV. Of the four classes we concern with DCT-II suggested by Wang, in this paper.


                  y k, 1      w k                 x n cos               ,k     1, … , N                (3.0.1)


                                      ,         1
                  Where

                                  √

                                  , 2                 !
                              √
                                                                                                        (3.0.2)



N is the length of x; x and y of the same size. If x is a matrix, DCT transforms its columns. The series is indexed
from n = 1 and k = 1 instead of the usual n = 0 and k = 0 because vectors run from 1 to N instead of 0 to N-
1.Using the formulae (3.0.1) and (3.0.2) we find the feature vectors of an input sequence using discrete cosine
transform.

3.1. Taxonomy of Face Matching Methods

The main objective of matching methods for measure is to define a value that allows the comparison of feature
vectors (reduced vectors in discrete cosine transform frameworks). With this measure the identification of a new
feature vector will be possible by searching the most similar vector into the database. This is the well-known
nearest-neighbor method. One way to define similarity is to use a measure of distance, d(x, y), in which the
similarity between vectors, S(x, y) is inverse to the distance measure. In the next sub-sections distance measures
are shown Euclidean Distance, Manhattan Distance and Cosine similarity.
3.1.0. Manhattan Distance

Initially, to recognizing a specific input image, the system compares the image’s feature vector to feature vectors
of the database image using a Manhattan distance which is used shortest distance classifier (Paul E, Black,
1987). If the feature vector of the probe is x and that of a database face is y, where x=(x1, x2, x3….xn) and y=
(y1, y2….., yn). The Manhattan distance, d1, between two vectors x, y in an n-dimensional real vector space with
fixed Cartesian coordinate system, is the sum of the lengths of the projections of the line segment between the
points onto the coordinate axes.

Manhattan Distance(x, y) = ", #           ∑'   ( |"   & #|
(3.1.0)

3.1.1. Euclidean Distance:

On the other hand, for recognizing a particular input image, the system compares the image’s feature vector to
the feature vectors of the database image using a Euclidean distance nearest-neighbor classifier (Duda and Hart,
1973). If the feature vector of the probe is x and that of a database face is y, where x=(x1, x2, x3….xn) and y=
(y1, y2…... yn). The position of a point in a Euclidean n-space is a Euclidean vector. So, x and y are Euclidean
vectors, starting from the origin of the space, and their tips indicate two points. The Euclidean norm, or
Euclidean length, or magnitude of a vector measures the length of the vector.

Euclidean Distance (x, y) =√∑'        "&#
(3.1.1)


48 | P a g e
www.iiste.org
Journal of Information Engineering and Applications                                            www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.1, 2011

3.1.2. Cosine Similarity

Another face matching distance classifier method where interested is cosine similarity and can be calculated as
follows. For any two given vectors x and y, the cosine similarity, θ, is represented using a dot product and
magnitude as

Cosine Similarity (x, y) = (xTy/||x||.||y||)
(3.1.2)

For face matching, the attribute vectors x and y are usually the term frequency vectors of the images. The cosine
similarity can be seen as a method of normalizing image length during comparison. The resulting similarity
ranges from −1 meaning exactly opposite, to 1 meaning exactly the same, with 0 usually indicating
independence, and in-between values indicating intermediate similarity or dissimilarity.

3.2. Relationship with KLT

Karhunen-Loeve Transform (KLT) is a unitary transform that diagonalizes the covariance or the correlation
matrix of a discrete random sequence. Also it is considered as an optimal transform among all discrete
transforms based on a number of criteria. It is, however, used infrequently as it is dependent on the statistics of
the sequence i.e. when the statistics changes so as the KLT. Because of this signal dependence, generally it has
no fast algorithm. Other discrete transforms such as cosine transform (DCT) even though suboptimal; have been
extremely popular in video coding. The principal reasons for the heavy usage of DCT are that it is signal
independent and it has fast algorithms resulting in efficient implementation. In spite of this, KLT has been used
as a bench mark in evaluating the performance of other transforms. Furthermore, DCT closely approximates the
compact representation ability of the KLT, which makes it a very useful tool for signal representation both in
terms of information packing and in terms of computational complexity due to its data independent nature.

4. Basic Algorithm for Angle Oriented Face Recognition using DCT

The basic algorithm for Angle Oriented Face Recognition discussed in this paper is depicted in figure 3.1. The
algorithm involves both face normalization and Recognization. Mathew Turk and Alex Pentland [15] expanded
the idea of face recognition. It can be seen in the figure 3.1 that the system receives input image of size N x N
and is compared with the size of database image, if the input image and database image are not equal, is to be
resized the image. While implementing an image processing solution, the selection of suitable illumination is a
crucial element in determining the quality of the captured images and can have a huge effect on the subsequent
evaluation of the image. If the pose of the selected image is required to rotate to obtain the database image rotate
the face with an angle θ until it matches with the database image. The rotation of the image may be
bidirectional, clock wise or anti-clock wise, depending on the selected pose of the image.

Once a normalized face obtained, it can be compared with other faces, under the same nominal size, orientation,
position, and illumination conditions. This comparison is based on features extracted using DCT. The input
images are divided into N x N blocks to define the local regions of processing. The N x N two-dimensional
Discrete Cosine Transform (DCT) is used to transform the data into the frequency domain. Thereafter, statistical
operators that calculate various functions of spatial frequency in the block are used to produce a block-level
DCT coefficient.

To recognize a particular input image or face, the system compares this image feature vector to the feature
vector of database faces using a Euclidean Distance nearest neighbor classifier (Duda and Fart, 1973),
Manhattan distance and Cosine Similarity. After obtaining the Manhattan Distance or Euclidean Distances or
Cosine Similarity for N x N Matrix one needs to find the averages of the each column of the matrix, and then
find the average of all these averages, if the overall average is negative we may say there is a match between the
input image and database image.




49 | P a g e
www.iiste.org
Journal of Information Engineering and Applications                                        www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.1, 2011




                           Figure 4.1: Angle Oriented Face Recognition using DCT
5. Experimental Results

This section is focused on the Discrete Cosine-based face recognition systems using the projection methods and
similarity measures previously presented. Two different face image databases were used in order to test the
recognition ability of each system image database of the Shree Vasista Educational Society.

5.1. Clock wise Rotation

The experimental Results are calculated for various angles of θ in clock wise direction using the three methods
Euclidean distance and Cosine Similarity. The mean recognition values of three methods are measured. Out of a
sample of 13 observations 12 are recognized. The percentage of recognition for DCT with Manhattan distance is
92.30%.




50 | P a g e
www.iiste.org
Journal of Information Engineering and Applications                                            www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.1, 2011
                 60
                 40
                 20
                  0
                 -20   1 2 3 4 5 6 7 8 9 10 11 12 13
                                                                           Euclidean Distance
                 -40
                                                                           Cosine Similarity
                 -60
                                                                           Manhattan Distance
                 -80
                -100
                -120
                -140
                -160
                              Figure 5.1 Mean values for Clock Wise Rotation

The obtained data was presented in Figure 5.1. In Figure 5.1 the red line indicates the recognition level for
Cosine Similarity and the blue gives Euclidean distance and green indicates Manhattan distance. It can be
observed that the recognition level of input image in DCT with Manhattan distance is very high. It is also
noticed that as the sample size is increasing the recognition level is also increasing in DCT with Manhattan
distance while comparing with others.

5.2. Anti-Clock Wise Rotation

The same methodology as that of clock wise rotation is maintained in anti-clock wise rotation, as well. The
comparisons of mean recognition values are Manhattan distance; Euclidean distance and Cosine Similarity for
the both methods are calculated for several values of θ using Anti-Clock wise direction. In this method also
Manhattan distance, Euclidean distance has shown high reliability of recognition level. In Figure 5.2 the results
are shown graphically, we can find the rapid decrease in the graph for Manhattan distance, Euclidean distance
and Cosine Similarity which showed with blue colored line indicates the high reliability of recognition of the
input image.
                 60
                 40
                 20
                  0
                       1 2 3 4 5 6 7 8 9 10 11 12 13                       Manhattan Distance
                 -20
                                                                           Euclidean Distance
                 -40
                                                                           Cosine Distance
                 -60
                 -80
                -100
                -120
                             Figure 5.2: Mean values for Anti-clock Rotation

5.3. Comparison between DCT and KLT

The DCT and KLT techniques are experimented under standard execution environment by considering the
synthesized data of the students of Sri Vishnu Educational Society. The Percentage of recognition level in both
the methods of experimental results is shown in Table 4.3.1. The phenomenal growth of DCT reliability is
observed when compared with KLT.


51 | P a g e
www.iiste.org
Journal of Information Engineering and Applications                                          www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.1, 2011
The Performance of recognition level of 10000 records for both the methods of experimental results is given in
Figure 4.3.2. The graph clearly shows that the reliability performance of DCT is constant increasing with respect
to KLT while the number of records is increased.


              S. No.       No. of records       Performance in DCT       Performance in KLT
              1            1000                 91.46                    65.42
              2            2000                 92.01                    64.23
              3            3000                 93.25                    52.15
              4            4000                 94.12                    54.12
              5            5000                 94.62                    53.10
              6            6000                 96.5                     52.63
              7            7000                 97.23                    51.71
              8            8000                 97.56                    50.46
              9            9000                 98.46                    50.04
              10           10000                98.89                    54.13
                             Table 5.3.1: Performance Records in DCT and KLT

              120

              100

                80

                60                                                          Performance in DCT
                                                                            Performance in KLT
                40

                20

                0
                       1     2   3    4     5    6   7   8    9    10

                           Figure 5.3.2: Bar Chart for Performance in DCT and KLT

6. Conclusion and Future Perspectives

Holistic approach to face recognition is used which has involved in encoding the entire facial image. An angle
oriented algorithm which can be rotated either clock wise or anti clock wise directions is proposed and
successfully implemented through the experimental results. The algorithm is proposed with the mean values of
the Euclidian classifiers. It is proved that the proposed angle oriented discrete cosine transform increases the
reliability of the face detection when compared with the KLT.

This approach has applications in Intrusion detection and new technologies like Biometric systems etc. The
authors view a random variable which indicates the magnitude of the recognition level of an image which will
follow some probability distribution.

References

Alaa Y.Taqa and Hamid A.Jalab (2010), “Increasing the Reliability of Fuzzy Inference System Skin Detector”
American Journal of Applied Sciences 7(8):1129-1138.

Alaa Y.Taqa and Hamid A.Jalab (2010),”Increasing the reliability of skin detectors” Scientific Research and
Essays Vol.5 (17), P.P.2480-2490.


52 | P a g e
www.iiste.org
Journal of Information Engineering and Applications                                      www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.1, 2011
Almas Anjum, M., and Yunus Javed M (2006), “Face Images Feature Extraction Analysis for Recognition in
Frequency Domain” Proc. of the 6th WSEAS Int. Conf. on Signal Processing, Computational Geometry &
Artificial Vision, Elounda, Greece.

Annadurai S and Saradha A (2004), “Discrete Cosine Transform Based Face Recognition Using Linear
Discriminate Analysis” Proceedings of International Conference on Intelligent Knowledge Systems.

Chellappa R and Wilson C and Sirohey S (1995), Human and machine recognition of faces: A survey. In Proc.
IEEE, 83(5):705-740.

Duda R O and Hart P E (1973), Pattern Classification and Scene Analysis. Wiley: New York, NY.

Ekenel H K and Stiefelhagen R (2005), “Local Appearance based Face Recognition Using Discrete Cosine
Transform”, EUSIPCO, Antalya, Turkey.

Manhattan distance Paul E Black (1987), Dictionary of Algorithms and Data Structures, NIST.

Nefian A (1999), “A Hidden Markov Model-based Approach for Face Detection and Recognition“, PhD thesis,
Georgia Institute of Technology.

Pan Z and Bolouri H (1999), “High speed face recognition based on discrete cosine transforms and neural
networks”, Technical report, University of Hertfordshire, UK.

Rao K and Yip P (1990), Discrete Cosine Transform-Algorithm, Advantages, Applications. Academic: New
York, N.Y.

Sanderson and Paliwal K K (2003), “Features for robust face based identity verification”, Signal processing,
83(5).

Scott W L (2003), “Block-level Discrete Cosine Transform Coefficients for Autonomic Face Recognition”, P.hd
thesis, Louisiana State University, USA.

Shin D and Lee H S and Kim D (2008), “Illumination-robust face recognition using ridge    regressive bilinear
models”, Pattern Recognition Letters, Vol.29, no.1, P.P, 49-58.

Ting Shan and Brain Lovell C and Shaokang Chen (2006), “Face Recognition to Head Pose from One sample
Image” proceedings of the 18th International conference on Pattern Recognition.

Turk M and Pentland A (1991), “Eigen faces for recognition”, Journal of Cognitive Neuroscience, vol.3, no.1,
pp.71-86.

Wang Z (1984), Fast algorithms for the discrete W transform and for the Discrete Fourier Transform. IEEE
Trans. Acoust., Speech, and Signal Proc., 32:803-816.

Ziad Hafed M and Martin Levine (2001), “Face Recognition using Discrete Cosine Transform”, International
Journal of Computer Vision 43(3), 167-188.




53 | P a g e
www.iiste.org
International Journals Call for Paper
The IISTE, a U.S. publisher, is currently hosting the academic journals listed below. The peer review process of the following journals
usually takes LESS THAN 14 business days and IISTE usually publishes a qualified article within 30 days. Authors should
send their full paper to the following email address. More information can be found in the IISTE website : www.iiste.org

Business, Economics, Finance and Management               PAPER SUBMISSION EMAIL
European Journal of Business and Management               EJBM@iiste.org
Research Journal of Finance and Accounting                RJFA@iiste.org
Journal of Economics and Sustainable Development          JESD@iiste.org
Information and Knowledge Management                      IKM@iiste.org
Developing Country Studies                                DCS@iiste.org
Industrial Engineering Letters                            IEL@iiste.org


Physical Sciences, Mathematics and Chemistry              PAPER SUBMISSION EMAIL
Journal of Natural Sciences Research                      JNSR@iiste.org
Chemistry and Materials Research                          CMR@iiste.org
Mathematical Theory and Modeling                          MTM@iiste.org
Advances in Physics Theories and Applications             APTA@iiste.org
Chemical and Process Engineering Research                 CPER@iiste.org


Engineering, Technology and Systems                       PAPER SUBMISSION EMAIL
Computer Engineering and Intelligent Systems              CEIS@iiste.org
Innovative Systems Design and Engineering                 ISDE@iiste.org
Journal of Energy Technologies and Policy                 JETP@iiste.org
Information and Knowledge Management                      IKM@iiste.org
Control Theory and Informatics                            CTI@iiste.org
Journal of Information Engineering and Applications       JIEA@iiste.org
Industrial Engineering Letters                            IEL@iiste.org
Network and Complex Systems                               NCS@iiste.org


Environment, Civil, Materials Sciences                    PAPER SUBMISSION EMAIL
Journal of Environment and Earth Science                  JEES@iiste.org
Civil and Environmental Research                          CER@iiste.org
Journal of Natural Sciences Research                      JNSR@iiste.org
Civil and Environmental Research                          CER@iiste.org


Life Science, Food and Medical Sciences                   PAPER SUBMISSION EMAIL
Journal of Natural Sciences Research                      JNSR@iiste.org
Journal of Biology, Agriculture and Healthcare            JBAH@iiste.org
Food Science and Quality Management                       FSQM@iiste.org
Chemistry and Materials Research                          CMR@iiste.org


Education, and other Social Sciences                      PAPER SUBMISSION EMAIL
Journal of Education and Practice                         JEP@iiste.org
Journal of Law, Policy and Globalization                  JLPG@iiste.org                       Global knowledge sharing:
New Media and Mass Communication                          NMMC@iiste.org                       EBSCO, Index Copernicus, Ulrich's
Journal of Energy Technologies and Policy                 JETP@iiste.org                       Periodicals Directory, JournalTOCS, PKP
Historical Research Letter                                HRL@iiste.org                        Open Archives Harvester, Bielefeld
                                                                                               Academic Search Engine, Elektronische
Public Policy and Administration Research                 PPAR@iiste.org                       Zeitschriftenbibliothek EZB, Open J-Gate,
International Affairs and Global Strategy                 IAGS@iiste.org                       OCLC WorldCat, Universe Digtial Library ,
Research on Humanities and Social Sciences                RHSS@iiste.org                       NewJour, Google Scholar.

Developing Country Studies                                DCS@iiste.org                        IISTE is member of CrossRef. All journals
Arts and Design Studies                                   ADS@iiste.org                        have high IC Impact Factor Values (ICV).

Mais conteúdo relacionado

Mais procurados

Multimodal Approach for Face Recognition using 3D-2D Face Feature Fusion
Multimodal Approach for Face Recognition using 3D-2D Face Feature FusionMultimodal Approach for Face Recognition using 3D-2D Face Feature Fusion
Multimodal Approach for Face Recognition using 3D-2D Face Feature FusionCSCJournals
 
COMPRESSION BASED FACE RECOGNITION USING DWT AND SVM
COMPRESSION BASED FACE RECOGNITION USING DWT AND SVMCOMPRESSION BASED FACE RECOGNITION USING DWT AND SVM
COMPRESSION BASED FACE RECOGNITION USING DWT AND SVMsipij
 
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET TransformRotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET TransformIRJET Journal
 
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...sipij
 
HVDLP : HORIZONTAL VERTICAL DIAGONAL LOCAL PATTERN BASED FACE RECOGNITION
HVDLP : HORIZONTAL VERTICAL DIAGONAL LOCAL PATTERN BASED FACE RECOGNITION HVDLP : HORIZONTAL VERTICAL DIAGONAL LOCAL PATTERN BASED FACE RECOGNITION
HVDLP : HORIZONTAL VERTICAL DIAGONAL LOCAL PATTERN BASED FACE RECOGNITION sipij
 
An Assimilated Face Recognition System with effective Gender Recognition Rate
An Assimilated Face Recognition System with effective Gender Recognition RateAn Assimilated Face Recognition System with effective Gender Recognition Rate
An Assimilated Face Recognition System with effective Gender Recognition RateIRJET Journal
 
Face Recognition System Using Local Ternary Pattern and Signed Number Multipl...
Face Recognition System Using Local Ternary Pattern and Signed Number Multipl...Face Recognition System Using Local Ternary Pattern and Signed Number Multipl...
Face Recognition System Using Local Ternary Pattern and Signed Number Multipl...inventionjournals
 
Face Recognition on Linear Motion-blurred Image
Face Recognition on Linear Motion-blurred ImageFace Recognition on Linear Motion-blurred Image
Face Recognition on Linear Motion-blurred ImageTELKOMNIKA JOURNAL
 
An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...IJCI JOURNAL
 
AN ILLUMINATION INVARIANT FACE RECOGNITION USING 2D DISCRETE COSINE TRANSFORM...
AN ILLUMINATION INVARIANT FACE RECOGNITION USING 2D DISCRETE COSINE TRANSFORM...AN ILLUMINATION INVARIANT FACE RECOGNITION USING 2D DISCRETE COSINE TRANSFORM...
AN ILLUMINATION INVARIANT FACE RECOGNITION USING 2D DISCRETE COSINE TRANSFORM...ijcsit
 
A combined-conventional-and-differential-evolution-method-for-model-order-red...
A combined-conventional-and-differential-evolution-method-for-model-order-red...A combined-conventional-and-differential-evolution-method-for-model-order-red...
A combined-conventional-and-differential-evolution-method-for-model-order-red...Cemal Ardil
 
Independent Component Analysis of Edge Information for Face Recognition
Independent Component Analysis of Edge Information for Face RecognitionIndependent Component Analysis of Edge Information for Face Recognition
Independent Component Analysis of Edge Information for Face RecognitionCSCJournals
 

Mais procurados (15)

Multimodal Approach for Face Recognition using 3D-2D Face Feature Fusion
Multimodal Approach for Face Recognition using 3D-2D Face Feature FusionMultimodal Approach for Face Recognition using 3D-2D Face Feature Fusion
Multimodal Approach for Face Recognition using 3D-2D Face Feature Fusion
 
COMPRESSION BASED FACE RECOGNITION USING DWT AND SVM
COMPRESSION BASED FACE RECOGNITION USING DWT AND SVMCOMPRESSION BASED FACE RECOGNITION USING DWT AND SVM
COMPRESSION BASED FACE RECOGNITION USING DWT AND SVM
 
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET TransformRotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
 
50120130406014
5012013040601450120130406014
50120130406014
 
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...
 
HVDLP : HORIZONTAL VERTICAL DIAGONAL LOCAL PATTERN BASED FACE RECOGNITION
HVDLP : HORIZONTAL VERTICAL DIAGONAL LOCAL PATTERN BASED FACE RECOGNITION HVDLP : HORIZONTAL VERTICAL DIAGONAL LOCAL PATTERN BASED FACE RECOGNITION
HVDLP : HORIZONTAL VERTICAL DIAGONAL LOCAL PATTERN BASED FACE RECOGNITION
 
An Assimilated Face Recognition System with effective Gender Recognition Rate
An Assimilated Face Recognition System with effective Gender Recognition RateAn Assimilated Face Recognition System with effective Gender Recognition Rate
An Assimilated Face Recognition System with effective Gender Recognition Rate
 
Face Recognition System Using Local Ternary Pattern and Signed Number Multipl...
Face Recognition System Using Local Ternary Pattern and Signed Number Multipl...Face Recognition System Using Local Ternary Pattern and Signed Number Multipl...
Face Recognition System Using Local Ternary Pattern and Signed Number Multipl...
 
Face Recognition on Linear Motion-blurred Image
Face Recognition on Linear Motion-blurred ImageFace Recognition on Linear Motion-blurred Image
Face Recognition on Linear Motion-blurred Image
 
Aa4102207210
Aa4102207210Aa4102207210
Aa4102207210
 
An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...
 
Ijcatr04051013
Ijcatr04051013Ijcatr04051013
Ijcatr04051013
 
AN ILLUMINATION INVARIANT FACE RECOGNITION USING 2D DISCRETE COSINE TRANSFORM...
AN ILLUMINATION INVARIANT FACE RECOGNITION USING 2D DISCRETE COSINE TRANSFORM...AN ILLUMINATION INVARIANT FACE RECOGNITION USING 2D DISCRETE COSINE TRANSFORM...
AN ILLUMINATION INVARIANT FACE RECOGNITION USING 2D DISCRETE COSINE TRANSFORM...
 
A combined-conventional-and-differential-evolution-method-for-model-order-red...
A combined-conventional-and-differential-evolution-method-for-model-order-red...A combined-conventional-and-differential-evolution-method-for-model-order-red...
A combined-conventional-and-differential-evolution-method-for-model-order-red...
 
Independent Component Analysis of Edge Information for Face Recognition
Independent Component Analysis of Edge Information for Face RecognitionIndependent Component Analysis of Edge Information for Face Recognition
Independent Component Analysis of Edge Information for Face Recognition
 

Destaque

11.assessing and prioritizing affecting factors in e learning websites using ...
11.assessing and prioritizing affecting factors in e learning websites using ...11.assessing and prioritizing affecting factors in e learning websites using ...
11.assessing and prioritizing affecting factors in e learning websites using ...Alexander Decker
 
11.the theoretician and the practitioner represent a language community or it...
11.the theoretician and the practitioner represent a language community or it...11.the theoretician and the practitioner represent a language community or it...
11.the theoretician and the practitioner represent a language community or it...Alexander Decker
 
Understanding satirical texts in kenya’s television
Understanding satirical texts in kenya’s televisionUnderstanding satirical texts in kenya’s television
Understanding satirical texts in kenya’s televisionAlexander Decker
 
Tuber size distribution of potato (solanum tuberosum l.) as influenced by loc...
Tuber size distribution of potato (solanum tuberosum l.) as influenced by loc...Tuber size distribution of potato (solanum tuberosum l.) as influenced by loc...
Tuber size distribution of potato (solanum tuberosum l.) as influenced by loc...Alexander Decker
 
Vitamins a, c and lycopene contents of some varieties
Vitamins a, c and lycopene contents of some varietiesVitamins a, c and lycopene contents of some varieties
Vitamins a, c and lycopene contents of some varietiesAlexander Decker
 
Use of various chelates as soil extractants
Use of various chelates as soil extractantsUse of various chelates as soil extractants
Use of various chelates as soil extractantsAlexander Decker
 
Using optimized features for modified optical backpropagation
Using optimized features for modified optical backpropagationUsing optimized features for modified optical backpropagation
Using optimized features for modified optical backpropagationAlexander Decker
 
Urdu medium intermediaries issues getting higher education in english medium ...
Urdu medium intermediaries issues getting higher education in english medium ...Urdu medium intermediaries issues getting higher education in english medium ...
Urdu medium intermediaries issues getting higher education in english medium ...Alexander Decker
 
Transformation of values of makassarese local culture based character building
Transformation of values of makassarese local culture based character buildingTransformation of values of makassarese local culture based character building
Transformation of values of makassarese local culture based character buildingAlexander Decker
 
Treatment of stakeholders in capitalistic approach and cooperative approach t...
Treatment of stakeholders in capitalistic approach and cooperative approach t...Treatment of stakeholders in capitalistic approach and cooperative approach t...
Treatment of stakeholders in capitalistic approach and cooperative approach t...Alexander Decker
 
Using social media to maximize students’ learning outcomes
Using social media to maximize students’ learning outcomesUsing social media to maximize students’ learning outcomes
Using social media to maximize students’ learning outcomesAlexander Decker
 
Using of plant extracts for cinnamon, syzygium and thyme to
Using of plant extracts for cinnamon, syzygium and thyme toUsing of plant extracts for cinnamon, syzygium and thyme to
Using of plant extracts for cinnamon, syzygium and thyme toAlexander Decker
 
Towards low carbon economy via carbon intensity reduction in malaysia
Towards low carbon economy via carbon intensity reduction in malaysiaTowards low carbon economy via carbon intensity reduction in malaysia
Towards low carbon economy via carbon intensity reduction in malaysiaAlexander Decker
 
Utilization of archival materials in nnamdi azikiwe library, university of ni...
Utilization of archival materials in nnamdi azikiwe library, university of ni...Utilization of archival materials in nnamdi azikiwe library, university of ni...
Utilization of archival materials in nnamdi azikiwe library, university of ni...Alexander Decker
 
Visual perception and electromagnetic conception for the
Visual perception and electromagnetic conception for theVisual perception and electromagnetic conception for the
Visual perception and electromagnetic conception for theAlexander Decker
 
Trust, privacy, and peer group correlates of intention to adopt
Trust, privacy, and peer group correlates of intention to adoptTrust, privacy, and peer group correlates of intention to adopt
Trust, privacy, and peer group correlates of intention to adoptAlexander Decker
 
Trace metals concentration determination in domestic water
Trace metals concentration determination in domestic waterTrace metals concentration determination in domestic water
Trace metals concentration determination in domestic waterAlexander Decker
 
Waqf and its role in the social and economic development of the hashemite kin...
Waqf and its role in the social and economic development of the hashemite kin...Waqf and its role in the social and economic development of the hashemite kin...
Waqf and its role in the social and economic development of the hashemite kin...Alexander Decker
 
Why full disclosure poses no threat to the survival of foreign aid
Why full disclosure poses no threat to the survival of foreign aidWhy full disclosure poses no threat to the survival of foreign aid
Why full disclosure poses no threat to the survival of foreign aidAlexander Decker
 
Traditional ingenuity in ghanaian atumpan drum construction
Traditional ingenuity in ghanaian atumpan drum constructionTraditional ingenuity in ghanaian atumpan drum construction
Traditional ingenuity in ghanaian atumpan drum constructionAlexander Decker
 

Destaque (20)

11.assessing and prioritizing affecting factors in e learning websites using ...
11.assessing and prioritizing affecting factors in e learning websites using ...11.assessing and prioritizing affecting factors in e learning websites using ...
11.assessing and prioritizing affecting factors in e learning websites using ...
 
11.the theoretician and the practitioner represent a language community or it...
11.the theoretician and the practitioner represent a language community or it...11.the theoretician and the practitioner represent a language community or it...
11.the theoretician and the practitioner represent a language community or it...
 
Understanding satirical texts in kenya’s television
Understanding satirical texts in kenya’s televisionUnderstanding satirical texts in kenya’s television
Understanding satirical texts in kenya’s television
 
Tuber size distribution of potato (solanum tuberosum l.) as influenced by loc...
Tuber size distribution of potato (solanum tuberosum l.) as influenced by loc...Tuber size distribution of potato (solanum tuberosum l.) as influenced by loc...
Tuber size distribution of potato (solanum tuberosum l.) as influenced by loc...
 
Vitamins a, c and lycopene contents of some varieties
Vitamins a, c and lycopene contents of some varietiesVitamins a, c and lycopene contents of some varieties
Vitamins a, c and lycopene contents of some varieties
 
Use of various chelates as soil extractants
Use of various chelates as soil extractantsUse of various chelates as soil extractants
Use of various chelates as soil extractants
 
Using optimized features for modified optical backpropagation
Using optimized features for modified optical backpropagationUsing optimized features for modified optical backpropagation
Using optimized features for modified optical backpropagation
 
Urdu medium intermediaries issues getting higher education in english medium ...
Urdu medium intermediaries issues getting higher education in english medium ...Urdu medium intermediaries issues getting higher education in english medium ...
Urdu medium intermediaries issues getting higher education in english medium ...
 
Transformation of values of makassarese local culture based character building
Transformation of values of makassarese local culture based character buildingTransformation of values of makassarese local culture based character building
Transformation of values of makassarese local culture based character building
 
Treatment of stakeholders in capitalistic approach and cooperative approach t...
Treatment of stakeholders in capitalistic approach and cooperative approach t...Treatment of stakeholders in capitalistic approach and cooperative approach t...
Treatment of stakeholders in capitalistic approach and cooperative approach t...
 
Using social media to maximize students’ learning outcomes
Using social media to maximize students’ learning outcomesUsing social media to maximize students’ learning outcomes
Using social media to maximize students’ learning outcomes
 
Using of plant extracts for cinnamon, syzygium and thyme to
Using of plant extracts for cinnamon, syzygium and thyme toUsing of plant extracts for cinnamon, syzygium and thyme to
Using of plant extracts for cinnamon, syzygium and thyme to
 
Towards low carbon economy via carbon intensity reduction in malaysia
Towards low carbon economy via carbon intensity reduction in malaysiaTowards low carbon economy via carbon intensity reduction in malaysia
Towards low carbon economy via carbon intensity reduction in malaysia
 
Utilization of archival materials in nnamdi azikiwe library, university of ni...
Utilization of archival materials in nnamdi azikiwe library, university of ni...Utilization of archival materials in nnamdi azikiwe library, university of ni...
Utilization of archival materials in nnamdi azikiwe library, university of ni...
 
Visual perception and electromagnetic conception for the
Visual perception and electromagnetic conception for theVisual perception and electromagnetic conception for the
Visual perception and electromagnetic conception for the
 
Trust, privacy, and peer group correlates of intention to adopt
Trust, privacy, and peer group correlates of intention to adoptTrust, privacy, and peer group correlates of intention to adopt
Trust, privacy, and peer group correlates of intention to adopt
 
Trace metals concentration determination in domestic water
Trace metals concentration determination in domestic waterTrace metals concentration determination in domestic water
Trace metals concentration determination in domestic water
 
Waqf and its role in the social and economic development of the hashemite kin...
Waqf and its role in the social and economic development of the hashemite kin...Waqf and its role in the social and economic development of the hashemite kin...
Waqf and its role in the social and economic development of the hashemite kin...
 
Why full disclosure poses no threat to the survival of foreign aid
Why full disclosure poses no threat to the survival of foreign aidWhy full disclosure poses no threat to the survival of foreign aid
Why full disclosure poses no threat to the survival of foreign aid
 
Traditional ingenuity in ghanaian atumpan drum construction
Traditional ingenuity in ghanaian atumpan drum constructionTraditional ingenuity in ghanaian atumpan drum construction
Traditional ingenuity in ghanaian atumpan drum construction
 

Semelhante a 11.similarity of inference face matching on angle oriented face recognition

Similarity of inference face matching on angle oriented
Similarity of inference face matching on angle orientedSimilarity of inference face matching on angle oriented
Similarity of inference face matching on angle orientedAlexander Decker
 
11.similarity of inference face matching on angle oriented
11.similarity of inference face matching on angle oriented11.similarity of inference face matching on angle oriented
11.similarity of inference face matching on angle orientedAlexander Decker
 
EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...
EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...
EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...IJECEIAES
 
WCTFR : W RAPPING C URVELET T RANSFORM B ASED F ACE R ECOGNITION
WCTFR : W RAPPING  C URVELET T RANSFORM  B ASED  F ACE  R ECOGNITIONWCTFR : W RAPPING  C URVELET T RANSFORM  B ASED  F ACE  R ECOGNITION
WCTFR : W RAPPING C URVELET T RANSFORM B ASED F ACE R ECOGNITIONcsandit
 
Comparative Analysis of Face Recognition Algorithms for Medical Application
Comparative Analysis of Face Recognition Algorithms for Medical ApplicationComparative Analysis of Face Recognition Algorithms for Medical Application
Comparative Analysis of Face Recognition Algorithms for Medical ApplicationAM Publications
 
Fourier mellin transform based face recognition
Fourier mellin transform based face recognitionFourier mellin transform based face recognition
Fourier mellin transform based face recognitioniaemedu
 
Fourier mellin transform based face recognition
Fourier mellin transform based face recognitionFourier mellin transform based face recognition
Fourier mellin transform based face recognitionIAEME Publication
 
Fourier mellin transform based face recognition
Fourier mellin transform based face recognitionFourier mellin transform based face recognition
Fourier mellin transform based face recognitionIAEME Publication
 
Coherence enhancement diffusion using robust orientation estimation
Coherence enhancement diffusion using robust orientation estimationCoherence enhancement diffusion using robust orientation estimation
Coherence enhancement diffusion using robust orientation estimationcsandit
 
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...IJCSEIT Journal
 
3-D Face Recognition Using Improved 3D Mixed Transform
3-D Face Recognition Using Improved 3D Mixed Transform3-D Face Recognition Using Improved 3D Mixed Transform
3-D Face Recognition Using Improved 3D Mixed TransformCSCJournals
 
Face Recognition using Improved FFT Based Radon by PSO and PCA Techniques
Face Recognition using Improved FFT Based Radon by PSO and PCA TechniquesFace Recognition using Improved FFT Based Radon by PSO and PCA Techniques
Face Recognition using Improved FFT Based Radon by PSO and PCA TechniquesCSCJournals
 
Gesture Recognition using Principle Component Analysis & Viola-Jones Algorithm
Gesture Recognition using Principle Component Analysis &  Viola-Jones AlgorithmGesture Recognition using Principle Component Analysis &  Viola-Jones Algorithm
Gesture Recognition using Principle Component Analysis & Viola-Jones AlgorithmIJMER
 
Happiness Expression Recognition at Different Age Conditions
Happiness Expression Recognition at Different Age ConditionsHappiness Expression Recognition at Different Age Conditions
Happiness Expression Recognition at Different Age ConditionsEditor IJMTER
 
Simplified Multimodal Biometric Identification
Simplified Multimodal Biometric IdentificationSimplified Multimodal Biometric Identification
Simplified Multimodal Biometric Identificationijeei-iaes
 
SVM Based Identification of Psychological Personality Using Handwritten Text
SVM Based Identification of Psychological Personality Using Handwritten Text SVM Based Identification of Psychological Personality Using Handwritten Text
SVM Based Identification of Psychological Personality Using Handwritten Text IJERA Editor
 
A Hybrid Approach to Recognize Facial Image using Feature Extraction Method
A Hybrid Approach to Recognize Facial Image using Feature Extraction MethodA Hybrid Approach to Recognize Facial Image using Feature Extraction Method
A Hybrid Approach to Recognize Facial Image using Feature Extraction MethodIRJET Journal
 
Image Registration for Recovering Affine Transformation Using Nelder Mead Sim...
Image Registration for Recovering Affine Transformation Using Nelder Mead Sim...Image Registration for Recovering Affine Transformation Using Nelder Mead Sim...
Image Registration for Recovering Affine Transformation Using Nelder Mead Sim...CSCJournals
 

Semelhante a 11.similarity of inference face matching on angle oriented face recognition (20)

Similarity of inference face matching on angle oriented
Similarity of inference face matching on angle orientedSimilarity of inference face matching on angle oriented
Similarity of inference face matching on angle oriented
 
11.similarity of inference face matching on angle oriented
11.similarity of inference face matching on angle oriented11.similarity of inference face matching on angle oriented
11.similarity of inference face matching on angle oriented
 
EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...
EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...
EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...
 
WCTFR : W RAPPING C URVELET T RANSFORM B ASED F ACE R ECOGNITION
WCTFR : W RAPPING  C URVELET T RANSFORM  B ASED  F ACE  R ECOGNITIONWCTFR : W RAPPING  C URVELET T RANSFORM  B ASED  F ACE  R ECOGNITION
WCTFR : W RAPPING C URVELET T RANSFORM B ASED F ACE R ECOGNITION
 
Comparative Analysis of Face Recognition Algorithms for Medical Application
Comparative Analysis of Face Recognition Algorithms for Medical ApplicationComparative Analysis of Face Recognition Algorithms for Medical Application
Comparative Analysis of Face Recognition Algorithms for Medical Application
 
Jw2517421747
Jw2517421747Jw2517421747
Jw2517421747
 
Jw2517421747
Jw2517421747Jw2517421747
Jw2517421747
 
Fourier mellin transform based face recognition
Fourier mellin transform based face recognitionFourier mellin transform based face recognition
Fourier mellin transform based face recognition
 
Fourier mellin transform based face recognition
Fourier mellin transform based face recognitionFourier mellin transform based face recognition
Fourier mellin transform based face recognition
 
Fourier mellin transform based face recognition
Fourier mellin transform based face recognitionFourier mellin transform based face recognition
Fourier mellin transform based face recognition
 
Coherence enhancement diffusion using robust orientation estimation
Coherence enhancement diffusion using robust orientation estimationCoherence enhancement diffusion using robust orientation estimation
Coherence enhancement diffusion using robust orientation estimation
 
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...
 
3-D Face Recognition Using Improved 3D Mixed Transform
3-D Face Recognition Using Improved 3D Mixed Transform3-D Face Recognition Using Improved 3D Mixed Transform
3-D Face Recognition Using Improved 3D Mixed Transform
 
Face Recognition using Improved FFT Based Radon by PSO and PCA Techniques
Face Recognition using Improved FFT Based Radon by PSO and PCA TechniquesFace Recognition using Improved FFT Based Radon by PSO and PCA Techniques
Face Recognition using Improved FFT Based Radon by PSO and PCA Techniques
 
Gesture Recognition using Principle Component Analysis & Viola-Jones Algorithm
Gesture Recognition using Principle Component Analysis &  Viola-Jones AlgorithmGesture Recognition using Principle Component Analysis &  Viola-Jones Algorithm
Gesture Recognition using Principle Component Analysis & Viola-Jones Algorithm
 
Happiness Expression Recognition at Different Age Conditions
Happiness Expression Recognition at Different Age ConditionsHappiness Expression Recognition at Different Age Conditions
Happiness Expression Recognition at Different Age Conditions
 
Simplified Multimodal Biometric Identification
Simplified Multimodal Biometric IdentificationSimplified Multimodal Biometric Identification
Simplified Multimodal Biometric Identification
 
SVM Based Identification of Psychological Personality Using Handwritten Text
SVM Based Identification of Psychological Personality Using Handwritten Text SVM Based Identification of Psychological Personality Using Handwritten Text
SVM Based Identification of Psychological Personality Using Handwritten Text
 
A Hybrid Approach to Recognize Facial Image using Feature Extraction Method
A Hybrid Approach to Recognize Facial Image using Feature Extraction MethodA Hybrid Approach to Recognize Facial Image using Feature Extraction Method
A Hybrid Approach to Recognize Facial Image using Feature Extraction Method
 
Image Registration for Recovering Affine Transformation Using Nelder Mead Sim...
Image Registration for Recovering Affine Transformation Using Nelder Mead Sim...Image Registration for Recovering Affine Transformation Using Nelder Mead Sim...
Image Registration for Recovering Affine Transformation Using Nelder Mead Sim...
 

Mais de Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

Mais de Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Último

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Último (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

11.similarity of inference face matching on angle oriented face recognition

  • 1. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.1, 2011 Similarity of Inference Face Matching On Angle Oriented Face Recognition Naga Venkata Jagan Mohan Remani Research Scholar, Acharya Nagarjuna University Mobile: +91-9848957141 Email:mohanrnvj@gmail.com Subba Rao Rachakonda Professor in Dept of Science and Humanities Shri Vishnu Engineering College for Women, Bhimavaram-534202, Andhra Pradesh, India Mobile: +91-9440976619 Email:rsr_vishnu@svcw.edu.in Raja Sekhara Rao Kurra Principal, Konearu Laxmiah College of Engineering Vaddeswaram Guntur-522510, Andhra Pradesh, India Mobile: +91-9848452344 Email:rajasekhar.kurra@klce.ac.in Abstract Face recognition is one of the wide applications of image processing technique. In this paper complete image of face recognition algorithm is proposed. In the prepared algorithm the local information is extracted using angle oriented discrete cosine transforms and invokes certain normalization techniques. To increase the Reliability of the Face detection process, neighborhood pixel information is incorporated into the proposed method. Discrete Cosine Transform (DCT) are renowned methods are implementing in the field of access control and security are utilizing the feature extraction capabilities. But these algorithms have certain limitations like poor discriminatory power and disability to handle large computational load. The face matching classification for the proposed system is done using various distance measure methods like Euclidean Distance, Manhattan Distance and Cosine Distance methods and the recognition rate were compared for different distance measures. The proposed method has been successfully tested on image database which is acquired under variable illumination and facial expressions. It is observed from the results that use of face matching like various method gives a recognition rate are high while comparing other methods. Also this study analyzes and compares the obtained results from the proposed Angle oriented face recognition with threshold based face detector to show the level of robustness using texture features in the proposed face detector. It was verified that a face recognition based on textual features can lead to an efficient and more reliable face detection method compared with KLT (Karhunen Loeve Transform), a threshold face detector. Keywords: Angle Oriented, Cosine Similarity, Discrete Cosine Transform, Euclidean Distance, Face Matching, Feature Extraction, Face Recognition, Image texture features. 1. Introduction Many authors discussed the face recognition by comparing the face of human being with the database and identifying the features of image. Face Recognition has received considerable attention over past two decades, where variation caused by illumination is most significant factor that alerts the appearance of face Chellappa et al., 1995. The database of system consists of individual facial features along with their geometrical relations. So for the input taken the facial features are compared with the database. If a match is found the face of the person is said to be recognized. In this process we consider feature extraction capabilities of discrete cosine transform (DCT) and invoke certain normalization techniques which increase its robust face recognition. The face recognition falls in to two main categories, Chellappa et al., 1995; they are (i) feature-based and (ii) holistic. Feature-based approach to face recognition relies on detection and characterization of the individual facial features like eyes, nose and mouth etc, and their geometrical relationships. On the other hand, holistic approach to face recognition involves encoding of the entire facial image. Earlier works on face recognition as discussed by Ziad M.Hafed and Martin Levine 2001, Ting Shan et al 2006, are considered. Alaa Y. Taqa and Hamid A. Jalab 2010 are proposed color-based or texture-based skin detector approaches. In this paper we discussed a new computational approach that is converting the input image to database image using Angle orientation technique in section2. Section 3 deals with the mathematical definition of the discrete cosine transform its relationship to KLT and Euclidean Distance with Cosine Similarities. The basics of face recognition system using DCT that includes the details of proposed algorithm and discussion of various parameters which affect its performance are discussed in section 4. The experimental results of the proposed 46 | P a g e www.iiste.org
  • 2. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.1, 2011 system are highlighted in section 5.The conclusion and future perceptives are mentioned in section 6. 2. Angle Orientation First the input image is selected and compared with the database image. If input image size is not equivalent to database size, the input image is to be resized to match with the size of database image. We compare the pose of the image in both input and database images. If the input image is not at an angle of 900 we can’t compare the images; some authors Ziad. M. Hafed and Martine D. Levine (2001) used eye coordinates techniques to recognize such an image. In this approach one can identify the feature images of the faces even though they are angle oriented. If the input image angle is not 900, rotate the image to 900 and then apply normalization technique such as geometric and illumination technique. Recognition of an image by using rotational axis is easy to achieve or recognize the face. When the input image rotates from horizontal axis to vertical axis the face rotates anti-clock wise and the face appears in which it is the same as the database pose, then the object is recognized. Similarly, when the input image rotates from vertical axis to horizontal axis the face rotates clock wise and the face appears in which it is the same as the database pose, then the object is recognized. Therefore if input image is Angle oriented, the pose is changed or Angle is altered using rotational axis and then compared. The Two types of angle rotations, clock wise and Anti-clock wise, with different angles are given in the images of Figure.2.1 and Figure 2.2. Figure2.1: Angle Rotation – Anti Clock Wise Direction Figure2.2: Angle Rotation – Clock Wise Direction 47 | P a g e www.iiste.org
  • 3. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.1, 2011 3. Mathematical Methods 3.0. Discrete Cosine Transform Discrete cosine transform (DCT) has been used as a feature extraction step in various studies on face recognition. Until now, discrete cosine transforms have been performed either in a holistic appearance-based sense [7], or in a local appearance-based sense ignoring the spatial information to some extent during the classification step by feeding some kind of neural networks with local DCT coefficients or by modelling them with some kind of statistical tools. Ahmed, Natarajan, and Rao (1974) first introduced the discrete cosine transform (DCT) in the early seventies. Ever since, the DCT has grown in popularity, and several variants have been proposed (Rao and Yip, 1990). In particular, the DCT was categorized by Wang (1984) into four slightly different transformations named DCT-I, DCT-II, DCT-III, and DCT-IV. Of the four classes we concern with DCT-II suggested by Wang, in this paper. y k, 1 w k x n cos ,k 1, … , N (3.0.1) , 1 Where √ , 2 ! √ (3.0.2) N is the length of x; x and y of the same size. If x is a matrix, DCT transforms its columns. The series is indexed from n = 1 and k = 1 instead of the usual n = 0 and k = 0 because vectors run from 1 to N instead of 0 to N- 1.Using the formulae (3.0.1) and (3.0.2) we find the feature vectors of an input sequence using discrete cosine transform. 3.1. Taxonomy of Face Matching Methods The main objective of matching methods for measure is to define a value that allows the comparison of feature vectors (reduced vectors in discrete cosine transform frameworks). With this measure the identification of a new feature vector will be possible by searching the most similar vector into the database. This is the well-known nearest-neighbor method. One way to define similarity is to use a measure of distance, d(x, y), in which the similarity between vectors, S(x, y) is inverse to the distance measure. In the next sub-sections distance measures are shown Euclidean Distance, Manhattan Distance and Cosine similarity. 3.1.0. Manhattan Distance Initially, to recognizing a specific input image, the system compares the image’s feature vector to feature vectors of the database image using a Manhattan distance which is used shortest distance classifier (Paul E, Black, 1987). If the feature vector of the probe is x and that of a database face is y, where x=(x1, x2, x3….xn) and y= (y1, y2….., yn). The Manhattan distance, d1, between two vectors x, y in an n-dimensional real vector space with fixed Cartesian coordinate system, is the sum of the lengths of the projections of the line segment between the points onto the coordinate axes. Manhattan Distance(x, y) = ", # ∑' ( |" & #| (3.1.0) 3.1.1. Euclidean Distance: On the other hand, for recognizing a particular input image, the system compares the image’s feature vector to the feature vectors of the database image using a Euclidean distance nearest-neighbor classifier (Duda and Hart, 1973). If the feature vector of the probe is x and that of a database face is y, where x=(x1, x2, x3….xn) and y= (y1, y2…... yn). The position of a point in a Euclidean n-space is a Euclidean vector. So, x and y are Euclidean vectors, starting from the origin of the space, and their tips indicate two points. The Euclidean norm, or Euclidean length, or magnitude of a vector measures the length of the vector. Euclidean Distance (x, y) =√∑' "&# (3.1.1) 48 | P a g e www.iiste.org
  • 4. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.1, 2011 3.1.2. Cosine Similarity Another face matching distance classifier method where interested is cosine similarity and can be calculated as follows. For any two given vectors x and y, the cosine similarity, θ, is represented using a dot product and magnitude as Cosine Similarity (x, y) = (xTy/||x||.||y||) (3.1.2) For face matching, the attribute vectors x and y are usually the term frequency vectors of the images. The cosine similarity can be seen as a method of normalizing image length during comparison. The resulting similarity ranges from −1 meaning exactly opposite, to 1 meaning exactly the same, with 0 usually indicating independence, and in-between values indicating intermediate similarity or dissimilarity. 3.2. Relationship with KLT Karhunen-Loeve Transform (KLT) is a unitary transform that diagonalizes the covariance or the correlation matrix of a discrete random sequence. Also it is considered as an optimal transform among all discrete transforms based on a number of criteria. It is, however, used infrequently as it is dependent on the statistics of the sequence i.e. when the statistics changes so as the KLT. Because of this signal dependence, generally it has no fast algorithm. Other discrete transforms such as cosine transform (DCT) even though suboptimal; have been extremely popular in video coding. The principal reasons for the heavy usage of DCT are that it is signal independent and it has fast algorithms resulting in efficient implementation. In spite of this, KLT has been used as a bench mark in evaluating the performance of other transforms. Furthermore, DCT closely approximates the compact representation ability of the KLT, which makes it a very useful tool for signal representation both in terms of information packing and in terms of computational complexity due to its data independent nature. 4. Basic Algorithm for Angle Oriented Face Recognition using DCT The basic algorithm for Angle Oriented Face Recognition discussed in this paper is depicted in figure 3.1. The algorithm involves both face normalization and Recognization. Mathew Turk and Alex Pentland [15] expanded the idea of face recognition. It can be seen in the figure 3.1 that the system receives input image of size N x N and is compared with the size of database image, if the input image and database image are not equal, is to be resized the image. While implementing an image processing solution, the selection of suitable illumination is a crucial element in determining the quality of the captured images and can have a huge effect on the subsequent evaluation of the image. If the pose of the selected image is required to rotate to obtain the database image rotate the face with an angle θ until it matches with the database image. The rotation of the image may be bidirectional, clock wise or anti-clock wise, depending on the selected pose of the image. Once a normalized face obtained, it can be compared with other faces, under the same nominal size, orientation, position, and illumination conditions. This comparison is based on features extracted using DCT. The input images are divided into N x N blocks to define the local regions of processing. The N x N two-dimensional Discrete Cosine Transform (DCT) is used to transform the data into the frequency domain. Thereafter, statistical operators that calculate various functions of spatial frequency in the block are used to produce a block-level DCT coefficient. To recognize a particular input image or face, the system compares this image feature vector to the feature vector of database faces using a Euclidean Distance nearest neighbor classifier (Duda and Fart, 1973), Manhattan distance and Cosine Similarity. After obtaining the Manhattan Distance or Euclidean Distances or Cosine Similarity for N x N Matrix one needs to find the averages of the each column of the matrix, and then find the average of all these averages, if the overall average is negative we may say there is a match between the input image and database image. 49 | P a g e www.iiste.org
  • 5. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.1, 2011 Figure 4.1: Angle Oriented Face Recognition using DCT 5. Experimental Results This section is focused on the Discrete Cosine-based face recognition systems using the projection methods and similarity measures previously presented. Two different face image databases were used in order to test the recognition ability of each system image database of the Shree Vasista Educational Society. 5.1. Clock wise Rotation The experimental Results are calculated for various angles of θ in clock wise direction using the three methods Euclidean distance and Cosine Similarity. The mean recognition values of three methods are measured. Out of a sample of 13 observations 12 are recognized. The percentage of recognition for DCT with Manhattan distance is 92.30%. 50 | P a g e www.iiste.org
  • 6. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.1, 2011 60 40 20 0 -20 1 2 3 4 5 6 7 8 9 10 11 12 13 Euclidean Distance -40 Cosine Similarity -60 Manhattan Distance -80 -100 -120 -140 -160 Figure 5.1 Mean values for Clock Wise Rotation The obtained data was presented in Figure 5.1. In Figure 5.1 the red line indicates the recognition level for Cosine Similarity and the blue gives Euclidean distance and green indicates Manhattan distance. It can be observed that the recognition level of input image in DCT with Manhattan distance is very high. It is also noticed that as the sample size is increasing the recognition level is also increasing in DCT with Manhattan distance while comparing with others. 5.2. Anti-Clock Wise Rotation The same methodology as that of clock wise rotation is maintained in anti-clock wise rotation, as well. The comparisons of mean recognition values are Manhattan distance; Euclidean distance and Cosine Similarity for the both methods are calculated for several values of θ using Anti-Clock wise direction. In this method also Manhattan distance, Euclidean distance has shown high reliability of recognition level. In Figure 5.2 the results are shown graphically, we can find the rapid decrease in the graph for Manhattan distance, Euclidean distance and Cosine Similarity which showed with blue colored line indicates the high reliability of recognition of the input image. 60 40 20 0 1 2 3 4 5 6 7 8 9 10 11 12 13 Manhattan Distance -20 Euclidean Distance -40 Cosine Distance -60 -80 -100 -120 Figure 5.2: Mean values for Anti-clock Rotation 5.3. Comparison between DCT and KLT The DCT and KLT techniques are experimented under standard execution environment by considering the synthesized data of the students of Sri Vishnu Educational Society. The Percentage of recognition level in both the methods of experimental results is shown in Table 4.3.1. The phenomenal growth of DCT reliability is observed when compared with KLT. 51 | P a g e www.iiste.org
  • 7. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.1, 2011 The Performance of recognition level of 10000 records for both the methods of experimental results is given in Figure 4.3.2. The graph clearly shows that the reliability performance of DCT is constant increasing with respect to KLT while the number of records is increased. S. No. No. of records Performance in DCT Performance in KLT 1 1000 91.46 65.42 2 2000 92.01 64.23 3 3000 93.25 52.15 4 4000 94.12 54.12 5 5000 94.62 53.10 6 6000 96.5 52.63 7 7000 97.23 51.71 8 8000 97.56 50.46 9 9000 98.46 50.04 10 10000 98.89 54.13 Table 5.3.1: Performance Records in DCT and KLT 120 100 80 60 Performance in DCT Performance in KLT 40 20 0 1 2 3 4 5 6 7 8 9 10 Figure 5.3.2: Bar Chart for Performance in DCT and KLT 6. Conclusion and Future Perspectives Holistic approach to face recognition is used which has involved in encoding the entire facial image. An angle oriented algorithm which can be rotated either clock wise or anti clock wise directions is proposed and successfully implemented through the experimental results. The algorithm is proposed with the mean values of the Euclidian classifiers. It is proved that the proposed angle oriented discrete cosine transform increases the reliability of the face detection when compared with the KLT. This approach has applications in Intrusion detection and new technologies like Biometric systems etc. The authors view a random variable which indicates the magnitude of the recognition level of an image which will follow some probability distribution. References Alaa Y.Taqa and Hamid A.Jalab (2010), “Increasing the Reliability of Fuzzy Inference System Skin Detector” American Journal of Applied Sciences 7(8):1129-1138. Alaa Y.Taqa and Hamid A.Jalab (2010),”Increasing the reliability of skin detectors” Scientific Research and Essays Vol.5 (17), P.P.2480-2490. 52 | P a g e www.iiste.org
  • 8. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.1, 2011 Almas Anjum, M., and Yunus Javed M (2006), “Face Images Feature Extraction Analysis for Recognition in Frequency Domain” Proc. of the 6th WSEAS Int. Conf. on Signal Processing, Computational Geometry & Artificial Vision, Elounda, Greece. Annadurai S and Saradha A (2004), “Discrete Cosine Transform Based Face Recognition Using Linear Discriminate Analysis” Proceedings of International Conference on Intelligent Knowledge Systems. Chellappa R and Wilson C and Sirohey S (1995), Human and machine recognition of faces: A survey. In Proc. IEEE, 83(5):705-740. Duda R O and Hart P E (1973), Pattern Classification and Scene Analysis. Wiley: New York, NY. Ekenel H K and Stiefelhagen R (2005), “Local Appearance based Face Recognition Using Discrete Cosine Transform”, EUSIPCO, Antalya, Turkey. Manhattan distance Paul E Black (1987), Dictionary of Algorithms and Data Structures, NIST. Nefian A (1999), “A Hidden Markov Model-based Approach for Face Detection and Recognition“, PhD thesis, Georgia Institute of Technology. Pan Z and Bolouri H (1999), “High speed face recognition based on discrete cosine transforms and neural networks”, Technical report, University of Hertfordshire, UK. Rao K and Yip P (1990), Discrete Cosine Transform-Algorithm, Advantages, Applications. Academic: New York, N.Y. Sanderson and Paliwal K K (2003), “Features for robust face based identity verification”, Signal processing, 83(5). Scott W L (2003), “Block-level Discrete Cosine Transform Coefficients for Autonomic Face Recognition”, P.hd thesis, Louisiana State University, USA. Shin D and Lee H S and Kim D (2008), “Illumination-robust face recognition using ridge regressive bilinear models”, Pattern Recognition Letters, Vol.29, no.1, P.P, 49-58. Ting Shan and Brain Lovell C and Shaokang Chen (2006), “Face Recognition to Head Pose from One sample Image” proceedings of the 18th International conference on Pattern Recognition. Turk M and Pentland A (1991), “Eigen faces for recognition”, Journal of Cognitive Neuroscience, vol.3, no.1, pp.71-86. Wang Z (1984), Fast algorithms for the discrete W transform and for the Discrete Fourier Transform. IEEE Trans. Acoust., Speech, and Signal Proc., 32:803-816. Ziad Hafed M and Martin Levine (2001), “Face Recognition using Discrete Cosine Transform”, International Journal of Computer Vision 43(3), 167-188. 53 | P a g e www.iiste.org
  • 9. International Journals Call for Paper The IISTE, a U.S. publisher, is currently hosting the academic journals listed below. The peer review process of the following journals usually takes LESS THAN 14 business days and IISTE usually publishes a qualified article within 30 days. Authors should send their full paper to the following email address. More information can be found in the IISTE website : www.iiste.org Business, Economics, Finance and Management PAPER SUBMISSION EMAIL European Journal of Business and Management EJBM@iiste.org Research Journal of Finance and Accounting RJFA@iiste.org Journal of Economics and Sustainable Development JESD@iiste.org Information and Knowledge Management IKM@iiste.org Developing Country Studies DCS@iiste.org Industrial Engineering Letters IEL@iiste.org Physical Sciences, Mathematics and Chemistry PAPER SUBMISSION EMAIL Journal of Natural Sciences Research JNSR@iiste.org Chemistry and Materials Research CMR@iiste.org Mathematical Theory and Modeling MTM@iiste.org Advances in Physics Theories and Applications APTA@iiste.org Chemical and Process Engineering Research CPER@iiste.org Engineering, Technology and Systems PAPER SUBMISSION EMAIL Computer Engineering and Intelligent Systems CEIS@iiste.org Innovative Systems Design and Engineering ISDE@iiste.org Journal of Energy Technologies and Policy JETP@iiste.org Information and Knowledge Management IKM@iiste.org Control Theory and Informatics CTI@iiste.org Journal of Information Engineering and Applications JIEA@iiste.org Industrial Engineering Letters IEL@iiste.org Network and Complex Systems NCS@iiste.org Environment, Civil, Materials Sciences PAPER SUBMISSION EMAIL Journal of Environment and Earth Science JEES@iiste.org Civil and Environmental Research CER@iiste.org Journal of Natural Sciences Research JNSR@iiste.org Civil and Environmental Research CER@iiste.org Life Science, Food and Medical Sciences PAPER SUBMISSION EMAIL Journal of Natural Sciences Research JNSR@iiste.org Journal of Biology, Agriculture and Healthcare JBAH@iiste.org Food Science and Quality Management FSQM@iiste.org Chemistry and Materials Research CMR@iiste.org Education, and other Social Sciences PAPER SUBMISSION EMAIL Journal of Education and Practice JEP@iiste.org Journal of Law, Policy and Globalization JLPG@iiste.org Global knowledge sharing: New Media and Mass Communication NMMC@iiste.org EBSCO, Index Copernicus, Ulrich's Journal of Energy Technologies and Policy JETP@iiste.org Periodicals Directory, JournalTOCS, PKP Historical Research Letter HRL@iiste.org Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Public Policy and Administration Research PPAR@iiste.org Zeitschriftenbibliothek EZB, Open J-Gate, International Affairs and Global Strategy IAGS@iiste.org OCLC WorldCat, Universe Digtial Library , Research on Humanities and Social Sciences RHSS@iiste.org NewJour, Google Scholar. Developing Country Studies DCS@iiste.org IISTE is member of CrossRef. All journals Arts and Design Studies ADS@iiste.org have high IC Impact Factor Values (ICV).