SlideShare a Scribd company logo
1 of 6
Download to read offline
ACEEE Int. J. on Information Technology, Vol. 02, No. 02, April 2012



        An Information Maximization approach of ICA
                    for Gender Classification
                                            1
                                                Sunita Kumari , 2Banshidhar Majhi
                                       National Institute of Technology, Rourkela, India
                                        1
                                          sunita.nitrkl@gmail.com, 2bmajhi.nitrkl.ac.in


Abstract—In this paper, a novel and successful method for             Baek et al. [8] claims that PCA performs better than ICA.
gender classification from human faces using dimensionality           Moghaddam claims that there is no significant difference
reduction technique is proposed. Independent Component                between PCA and ICA [9]. It carries same effect in case of
Analysis (ICA) is one of such techniques. In the current              gender classification also.
scheme, a thrust is given on the different algorithms and
                                                                          There exist various algorithms of ICA like Jade algorithm,
architectures of ICA. An information maximization ICA is
discussed with its two architecture and compared with the two         infomax ICA, fastICA [10]. In [11], a technique based on
architectures of fast ICA. Support Vector Machine (SVM) is            fastICA with Support Vector Machine (SVM) is developed
used as a classifier for the separation of male and female            for gender classification with an accuracy of 95.67%, but this
classes. All experiments are done on FERET database. Results          approach lacks with the description of its architecture. In
are obtained for the different combinations of train and test         this paper, a gender classifier based on SVM is developed
database sizes. For larger                                            which deals with infomax and fast ICA with its two
training set SVM is performing with an accuracy of 98%. The           architecture.The rest of the paper is organized as follows:
accuracy values are varied for change in size of testing set and      Section II provides a description of the feature extraction
the proposed system performs with an average accuracy of
                                                                      techniques used. The proposed system is discussed in
96%. An improvement in performance is achieved using class
discriminability which performs with 100% accuracy.                   Section III. Section IV has been presented with simulation
                                                                      results and comparative analysis. Finally, Section V gives
Index Terms—infomax, fast, ICA, ICA-1, ICA-2                          concluding remarks.

                       I. INTRODUCTION                                      II. DIMENSIONALITY REDUCTION    USING INDEPENDENT
                                                                                           COMPONENT ANALYSIS
    Face biometric has gained popularity because it is one of
the most communicative part of social interactions. Human-            The present work has been motivated by the keen interest
Computer Interaction as well needs face recognition, gender           of researchers in face recognition using infomax ICA [5].
recognition, and estimation of age for passive surveillance.          ICA gives independent data which can be defined in terms of
However, during identification of any individual the False            probability density functions (PDFs). Two variables y1 and
Acceptance Rate (FAR) increases as the database size                  y2 are said to be independent if the joint PDF of y1 and y2
increases [1]. Further the time required increases exponentially      will be factorizable in terms of their marginal PDF and can be
as we need 1: 5ØAÜ comparisons for identification. Hence,             achieved by either minimizing mutual information or by
more thrust is put in any biometric system to reduce the              maximizing non-gaussianity.
search time without compromising with accuracy. In a face             ICA is defined as:
recognition system, partitioning the database based on                For the given set of input sample x, ICA finds a linear transform
gender is an important research direction. The major challenge        in such a way that s  Wx
forgender classification is two-fold, (1) to find discriminating          Such that the components s are as independent as
features and (2) an optimum hyperplane for separating male            possible. Here, w is an unknown separating matrix and
and female classes. Hence, most researchers thrust on these           needs to be determined. There exists several algorithms for
two issues while attempting gender classification using face.         determining w like Jade, Information Maximization (infomax)
    There are several methods for dimensionality reduction
                                                                      and Fast fixed point (fast) ICA. Proposed scheme uses
like Principal Component Analysis (PCA), Factor Analysis
                                                                      infomax and fast ICA algorithm for finding separating matrix.
(FA), Independent Component Analysis (ICA) and many
                                                                      These algorithms are discussed in the following subsections.
others [2]. PCA has been first applied by Kirby and Sirovich
[3] and it is shown that it is an optimal compression scheme          A. FAST FIXED POINT ICA
that minimizes the mean square error (MSE) between the                   This algorithm is based on maximizing non-Gaussian
original and reconstructed image. Later, authors in [4] have          property of the estimated sources and is measured with the
shown that it is the most popular method for face recognition.        help of differential entropy J called as negentropy.
                                                                                                                         .
ICA is a generalization of PCA. This field is contradictory
with respect to the performance of its algorithms. For face           J ( y )  H ( y Gauss )  H ( y )
recognition, Bartlett et al. [5], Yuen and Lai [6], and Liu and
Wechsler [7] have claimed that ICA outperforms PCA while              Where, H ( y Gauss ) is the entropy of the gaussian random
© 2012 ACEEE                                                     16
DOI: 01.IJIT.02.02. 99
ACEEE Int. J. on Information Technology, Vol. 02, No. 02, April 2012


variable and H ( y ) is the entropy of the observed random            D. ARCHITECTURE OF ICA
variable. Since the gaussian random variables has the most                The goal is to find a better set of basis images so that it
                                                                      can easily estimate an unknown dataset. There are two ways
entropy among all random variables, maximizing J leads to
                                                                      to achieve this goal:
extracting sources as independent as possible.                        1) Architecture–1/ ICA–1: It produces a set of statistically
                                                                      independent basis images. The data matrix X is constructed
B. INFORMATION MAXIMIZATION ICA
                                                                      in such a way that each row represents an individual image.
   Infomax is a gradient based neural network and it                  This architecture deals about independence of images so
maximizes information from input to the output network as             that images are considered as random variables and pixels as
proposed by Bell and Sejnosky [12]. The information                   trials as shown in Fig. 1.
maximization is achieved by maximizing the joint entropy of
                                                                         Two images X i and X        j   are independent if it is not
transformed vector z  g (W , x ) where g is a sigmoidal
function. The joint entropy is:                                       possible to predict the value of an image X      j   from X i by
                          H ( y )   E[ln f ( y )]                   moving across pixels. A set of coefficients can be determined
                                                                      by the linear combination of the independent basis images
Where f ( y ) is the multivariate joint density function of           from which each individual image can be easily constructed.
y.                                                                    2) Architecture–2/ ICA–2: In ICA–1, the basis images were
                                                                      statistically independent from each other but the coefficients
                  f (x)
 f ( y)           JW
                                                                      were not but in Architecture–2, the coefficients are statistically
                                                                      independent. It finds a factorial face code for the set of face
                                                                      images. The data matrix X is constructed in such a way that
Here, J W        denotes the absolute value of Jacobian matrix        each column corresponds to an individual image. This
                                                                      architecture deals with independence of pixels such that
J W , which is defined as                                             pixels will become random variable and images as trials. Two
                                                                      pixels i and j are said to be independent, if by moving
                               J W  det           i
                                                  yi
                                                  xi                 across set of images it is not possible to predict the value of
                                                                       j from pixel i as shown in Fig. 2.
On combining the above equations, H ( y ) can be written
as:
              H ( y )  E[ln J W ]  H ( x)
   Maximization of H ( y ) can be achieved by adapting W
and can be achieved using only the first term.
C. PREPROCESSING OF THE DATA
   Two preprocessing techniques are required to make the
problem of ICA estimation simpler and better conditioned,
namely,
1) Mean/ Centering: It gives the zero–mean data like for
                                                                                            Fig 1. Architecture-1
an input vector x subtract the mean ( m  Ex ) from it.
2) Sphering/Whitening: It is a linear transformation method
                                 ~
which gives the whiten signal x from an input signal x
such that its components are uncorrelated and their variances
equal unity. Unit variance can be achieved by making
      ~
       T
. E ( x x )  I ( IdentityMa trix ) .

                                  
Whitening is done by E xx T  ADE T .

                                                          
Here, E is the orthogonal matrix of eigenvectors of E xx T
and D is the diagonal matrix of its eigenvalues. The values of
                                                                                            Fig 2. Architecture-2
~                          ~
x is determined as x  ED               1 / 2
                                                 ETx
© 2012 ACEEE                                                     17
DOI: 01.IJIT.02.02. 99
ACEEE Int. J. on Information Technology, Vol. 02, No. 02, April 2012


        III. PROPOSED GENDER CLASSIFICATION SYSTEM
    Proposed methodology for gender classification is shown
in Fig. 3. The performance of gender classification system
has been evaluated for two ICA architectures using infomax
algorithm and fastICA on the FERET database [13]. Sample
images from this database are shown in Fig. 4.
                                                                                 Fig 5. Conventional Triangularization Approach




                                                                             Fig 6. Basis images from Principal Component Analysis




           Fig 3. Proposed gender classification system
    The dataset consists of images from 500 subjects of which
250 are male and rest is female. To train the SVM, 200 images
have been randomly selected from this dataset. From the
remaining 300 images, four groups of testing dataset have
                                                                             Fig 7. Basis images from ICA Architecture-1: Statistical
been made. First test dataset consists of 50 individuals, second                       Independent Images (infomax ICA)
has 100 individuals, third consists of 150 and fourth has 200
individual images. Performance of the proposed system is
shown on all these test datasets using same training set. The
original size of the image was 384×256. All these images have
been aligned first and then conventional triangularization
approach is applied to get region of interest as shown in Fig.
5.
    Features have been extracted using infomax and fast ICA
from the cropped images of size 293×241. The size of data               Fig 8. Basis images from ICA Architecture-2: A factorial Face Code
matrix is 500×70613, where each row corresponds to one                                           (infomax ICA)
particular image. The number of independent components
                                                                        A. CONFUSION MATRIX
(ICs) obtained using ICA algorithm corresponds to the
dimensionality of the input. As the performance merely                      The performance of any classifier can be expressed in
depends on the number of separated components so there is               terms of confusion matrix [14]. Confusion matrix contains
a need to control the number of ICs. To achieve this, ICA is            information about actual and predicted classifications done
performed on linear combination of original images and for              by a classification system. Performance of such systems can
this, PCA has used 200 eigenvectors. Thus, ICA has 200 ICs.             be evaluated using data present in the matrix and can be
Basis images obtained from PCA is shown in Fig. 6 and of                defined in the terms of True Positive (TP) and False Positive
infomax ICA–1 is shown in Fig. 7. Fig. 8 shows the same as              (FP) rate. The tabular representation of confusion matrix is as
obtained from infomax ICA–2.                                            shown in Table 1.
                                                                                             TABLE I. CONFUSION MATRIX




               Fig 4. Images from FERET database

© 2012 ACEEE                                                       18
DOI: 01.IJIT.02.02.99
ACEEE Int. J. on Information Technology, Vol. 02, No. 02, April 2012


The entries in the confusion matrix are as following:                           TABLE III. C ONFUSION MATRIX FOR INFORMATION MAXIMIZATION ICA
 a is the number of correct predictions that an instance is                                           ARCHITECTURE - 2
negative.
 b is the number of incorrect predictions that an instance is
positive.
 c is the number of incorrect predictions that an instance is
negative.
 d is the correct number of predictions that an instance is
positive.
    The performance of confusion matrix can be measured in
the following terms:
True positive rate: It is the proportion of positive cases
that are correctly classified.     TP  a      c  d
 False positive rate: It is the proportion of negative cases
that are incorrectly classified as
                                                                            B. RESULTS FROM FAST ICA
positive. FP  b         a  b
                                                                               In this section, an emphasis is given on fast ICA using
Accuracy: It is the total number of predictions that are
                                                                            architecture–2 and is compared with architecture–1. Table 4
correct.
                                                                            and 5 describes architecture–1 and architecture–2
Accuracy  ( a  d )     (a  b  c  d )                                   respectively. FastICA performs better with architecture–2 in
                                                                            comparison to architecture–1. Thus, global features are given
                   IV. EXPERIMENTAL RESULTS                                 more weight in case of fast ICA for gender classification.
A. RESULTS FROM INFOMAX ICA                                                   TABLE IV. C ONFUSION MATRIX FOR FAST   FIXED POINT   ICA ARCHITECTURE-1
    The distribution of TP and FP rates and corresponding
accuracies for different datasets using infomaxICA for its
two architectures is shown in Table 2 and 3. From table, it is
clear that the male and female classes are more separable in
case of architecture–1 in comparison to architecture–2.
    Thus, statistical independent images perform better than
statistical independent coefficients. As literature entails that
ICA–1 and ICA–2 gives local and global features respectively,
thus, the proposed gender classifier is performing well with
local features than compared to global for separation of male
and female classes.
    TABLE II. C ONFUSION MATRIX FOR INFORMATION MAXIMIZATION ICA
                          ARCHITECTURE - 1


                                                                             TABLE V. CONFUSION MATRIX FOR FAST FIXED POINT ICA ARCHITECTURE - 2




© 2012 ACEEE                                                           19
DOI: 01.IJIT.02.02. 99
ACEEE Int. J. on Information Technology, Vol. 02, No. 02, April 2012


The separation between true positive and false positive rates               ICA–2 and fast ICA–1 is also similar and all these techniques
is described in Fig. 9 for both algorithms and architecture of              performs better than PCA. Thus it is observed that both the
ICA. The graph shows the relationship between TP and FP                     algorithms are giving same performance but it merely depends
against change in test database size. It shows that, the                    on the architecture. Infomax ICA performs better in
separation between TP and FP is more for infomaxICA–1 than                  architecture–1 and fast ICA performs better in architecture–
others scheme. From results, it has been inferred that fast                 2.
ICA– 2 performs better than fast ICA–1.
                                                                            D. MUTUAL INFORMATION
Based on their TP and FP rates, the corresponding drawn
Receiver Operating Characteristic (ROC) graph is shown in                       Variation of accuracy achieved in case of ICA–1 and ICA–
Fig. 10. ROC graph defines the tradeoff between the ability of              2 depends on the mutual information conserved in their basis
a classifier to correctly identify positive cases and the number            images as it is a measure of statistical dependence. Mutual
of negative cases that are incorrectly classified. The ROC                  information is calculated as
curve shows the plot of false positive rate against true                    I ( X , Y )  H ( X )  H (Y )  H ( X , Y )
positive rate. A point (0, 1) in the ROC graph shows perfect
classification which classifies all positive and negative cases             Where   H (X ) and H (Y ) are the marginal entropies and
correctly.
                                                                            H ( X , Y ) is the joint entropy of X and Y .




Fig 9. Separation between true positive and false positive rates for              Fig 11. Comparison of proposed scheme with existing
                        different datasets
                                                                                                        Schemes
    The point (0, 0) represents a classifier which predicts all                 Two similar images contains high mutual information while
cases as negative. FP and TP values are obtained for all                    mutual information between dissimilar images are low. Such
testdata sets and ROC is plotted against them. From above                   observation is also found in the current approach. A
graph, it can be said that infomax classifier work better than              comparison of mutual information between original gray level
others.                                                                     images and basis images obtained from ICA is shown in Fig.
                                                                            12.
                                                                                This graph shows the mutual information present among
                                                                            various images and their basis images. This is obtained using
                                                                            10 images and the mutual information with respect to other
                                                                            images are calculated. The mutual information present in ICA–
                                                                            1 is less than that of ICA–2 and the original gray level images
                                                                            have greater mutual information than ICA–2. Mutual
                                                                            information is inversely proportional to the independence of
                                                                            the data.Thus ICA–1 have more independence than ICA–2
                                                                            and original images. For this reason, ICA–1 performs better
                                                                            than ICA–2.
      Fig 10. Receiver operating characteristic (ROC) graph
                                                                            E. FEATURE SUB-SPACE SELECTION
C. COMPARATIVE ANALYSIS                                                         All results are obtained using 200 basis vectors but among
     Author in [4] has evaluated the performance of fastICA                 all these coefficients, some of them are less significant than
in Architecture–1 with an accuracy of 95.67%. For comparison                others. Thus, an improvement in performance can be achieved
issues, the proposed system has also evaluated the                          by discarding those less significant coefficients while training
performance using fastICA architecture–2 and then it is                     the SVM. One of the most popular approach for coefficient
compared with the results obtained from infomax ICA–1,                      selection is by maximizing the ratio of between class to within
infonax ICA–2, fastICA–1 and PCA based scheme as shown                      class variance which is also known as class discriminability
in Fig. 11. By comparative analysis, it has been observed that              (cd) and can be obtained as
infomax ICA– 1 performs superior than all other schemes and
it is almost similar to fast ICA–2. The performance of infomax
                                                                                            cd   between /  within
© 2012 ACEEE                                                           20
DOI: 01.IJIT.02.02. 99
ACEEE Int. J. on Information Technology, Vol. 02, No. 02, April 2012


                                                                              the classifier performance is increased. So, gender
                                                                              classification system is acceptable in reducing the search
                                                                              space for a real-time face recognition system.

                                                                                                        CONCLUSIONS
                                                                                  This paper proposes a gender classification scheme based
                                                                              on ICA. Two well-known algorithms for ICA are infomax ICA
                                                                              and fast ICA. SVM is used as a classifier. The performance of
                                                                              the SVM has been studied using different architectures
                                                                              namely, ICA–1 and ICA–2. Comparative analysis has been
 Fig 12. Comparison of mutual information between original and                made with the existing PCA based classification scheme. It
basis images from ICA–1 and ICA–2(this is obtained with 10 basis              has been found that infomax ICA results better in
   images where mutual information of first image with itself is              architecture–1 with 100% accuracy and fast ICA performs
    calculated first and then it is calculated with other images.)
                                                                              better in architecture–2 with an accuracy of 100%. Both the
Where  between is the variance between male and female                       algorithms outperform PCA. Thus, gender classification using
                                                                              human faces can be taken as a trusted step while dealing
classes and    within is the sum of variances within each                    with the large databases. This can be used for filtering
                                                                              databases during identification.
class.
    The coefficients with low 5ØPÜ5ØQÜ values are
                                                                                                       REFERENCES
discarded and SVM is trained with the rest. In the current
scheme the cd coefficient’s value lies between 0.00008635–                    [1] A. K. J. D. Maltoni, D. Maio and S. Prabhakar, Guide to
6.6646. An analysis has been made using these coefficients                    Biometrics, Springer Verlag 2003.
and is shown in Fig. 13. It is inferred that if the coefficients              [2] K. K. Sergios Theodoridis, Pattern Recognition, Springer-Verlag
are selected with the value greater than 0.15 or 0.2, accuracy                2006.
                                                                              [3] L. Sirovich and M. Kirby. Low-dimensional procedure for the
reaches to 100%. However, the accuracy degrades further if
                                                                              characterization of human faces. J. Opt. Soc. Am. A, 4(3):519–524,
the value is increased as shown in Fig. 13.                                   Mar 1987.
                                                                              [4] M. Turk and A. Pentland. Eigenfaces for recognition. Journal
                                                                              of Cognitive Neuroscience, 3(1):71–86, 1991.
                                                                              [5] M. Bartlett, J. Movellan, and T. Sejnowski. Face recognition by
                                                                              independent component analysis, Neural Networks, IEEE
                                                                              Transactions, Neural Networks, IEEE Transactions, 13(6):1450-
                                                                              1464, Nov-2002
                                                                              [6] P. C. Yuen and J. H. Lai. Independent component analysis of
                                                                              face images. In IEEE Workshop on Biologically Motivated Computer
                                                                              Vision, 2000.
                                                                              [7] C. Liu and H. Wechsler. Comparative assessment of independent
                                                                              component analysis (ica) for face recognition. In International
      Fig 13. Performance measure with sub-space selection                    Conference on Audio and Video Based Biometric Person
                                                                              Authentication, pages 22–24, 1999.
                                                                              [8] K. Baek, B. A. Draper, J. R. Beveridge, and K. She pca vs ica: A
                                                                              comparision on the feret dataset.Algorithm. JOINT
                                                                              CONFERENCE ON INFORMATION SCIENCES. pages 824–
                                                                              827,2002
                                                                              [9] B. Moghaddam, Principal manifolds and Bayesian subspaces
                                                                              for visual recognition. In computer vision, The proceedings of the
                                                                              7th IEEE international conference. Pages 1131-1136 vol 2.
                                                                              [10] A. Hyvrinen and E. Oja. Independent component analysis:
                                                                              algorithm and applications. Neural Networks, 13:411430, 2000
                                                                              [11] A. Jain and J. Huang. Integrating independent components and
                                                                              support vector machines for gender classification. Volume 3, pages
                                                                              558 – 561, Aug 2004..
Fig 14. Class discriminabilty between male and female classes (each           [12] A.J. Bell and T. J. Sejnowski An information maximization
 solid line represents the coefficient’s cd value and circle lists the        approach to blind separation and blind deconvolution. NEURAL
                        discarded coefficients)                               COMPUTATION, 7:1129–1159, 1995.
With the implementation of above scheme, the classifier                       [13] P.J.Phillips H.Moon, S.A.Rizvi and P.Z.Rauss. The FERET
performance has increased significantly. The accuracy                         evaluation methodology for face recognition.
                                                                              [14] http://www2.cs.uregina.ca/~hamilton/courses/831/notes/
obtained is 100% for infomax ICA–1 with 50 testdata and 200
                                                                              confusion_matrix/confusion_matrix.html
traindata size. Thus using such feature selection schemes,

© 2012 ACEEE                                                             21
DOI: 01.IJIT.02.02. 99

More Related Content

What's hot

Paper id 24201464
Paper id 24201464Paper id 24201464
Paper id 24201464IJRAT
 
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...IJCSEIT Journal
 
A new approachto image classification based on adeep multiclass AdaBoosting e...
A new approachto image classification based on adeep multiclass AdaBoosting e...A new approachto image classification based on adeep multiclass AdaBoosting e...
A new approachto image classification based on adeep multiclass AdaBoosting e...IJECEIAES
 
Performance Evaluation of Object Tracking Technique Based on Position Vectors
Performance Evaluation of Object Tracking Technique Based on Position VectorsPerformance Evaluation of Object Tracking Technique Based on Position Vectors
Performance Evaluation of Object Tracking Technique Based on Position VectorsCSCJournals
 
X trepan an extended trepan for
X trepan an extended trepan forX trepan an extended trepan for
X trepan an extended trepan forijaia
 
Image Steganography Using Wavelet Transform And Genetic Algorithm
Image Steganography Using Wavelet Transform And Genetic AlgorithmImage Steganography Using Wavelet Transform And Genetic Algorithm
Image Steganography Using Wavelet Transform And Genetic AlgorithmAM Publications
 
X-TREPAN : A Multi Class Regression and Adapted Extraction of Comprehensible ...
X-TREPAN : A Multi Class Regression and Adapted Extraction of Comprehensible ...X-TREPAN : A Multi Class Regression and Adapted Extraction of Comprehensible ...
X-TREPAN : A Multi Class Regression and Adapted Extraction of Comprehensible ...csandit
 
Mr image compression based on selection of mother wavelet and lifting based w...
Mr image compression based on selection of mother wavelet and lifting based w...Mr image compression based on selection of mother wavelet and lifting based w...
Mr image compression based on selection of mother wavelet and lifting based w...ijma
 
IRJET-Multiclass Classification Method Based On Deep Learning For Leaf Identi...
IRJET-Multiclass Classification Method Based On Deep Learning For Leaf Identi...IRJET-Multiclass Classification Method Based On Deep Learning For Leaf Identi...
IRJET-Multiclass Classification Method Based On Deep Learning For Leaf Identi...IRJET Journal
 
FUZZY SET THEORETIC APPROACH TO IMAGE THRESHOLDING
FUZZY SET THEORETIC APPROACH TO IMAGE THRESHOLDINGFUZZY SET THEORETIC APPROACH TO IMAGE THRESHOLDING
FUZZY SET THEORETIC APPROACH TO IMAGE THRESHOLDINGIJCSEA Journal
 
Ijarcet vol-2-issue-2-855-860
Ijarcet vol-2-issue-2-855-860Ijarcet vol-2-issue-2-855-860
Ijarcet vol-2-issue-2-855-860Editor IJARCET
 
Computer Vision: Visual Extent of an Object
Computer Vision: Visual Extent of an ObjectComputer Vision: Visual Extent of an Object
Computer Vision: Visual Extent of an ObjectIOSR Journals
 
National Flags Recognition Based on Principal Component Analysis
National Flags Recognition Based on Principal Component AnalysisNational Flags Recognition Based on Principal Component Analysis
National Flags Recognition Based on Principal Component Analysisijtsrd
 
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...Faster Training Algorithms in Neural Network Based Approach For Handwritten T...
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...CSCJournals
 
An Approach For Single Object Detection In Images
An Approach For Single Object Detection In ImagesAn Approach For Single Object Detection In Images
An Approach For Single Object Detection In ImagesCSCJournals
 
Symbolic-Connectionist Representational Model for Optimizing Decision Making ...
Symbolic-Connectionist Representational Model for Optimizing Decision Making ...Symbolic-Connectionist Representational Model for Optimizing Decision Making ...
Symbolic-Connectionist Representational Model for Optimizing Decision Making ...IJECEIAES
 
Background Estimation Using Principal Component Analysis Based on Limited Mem...
Background Estimation Using Principal Component Analysis Based on Limited Mem...Background Estimation Using Principal Component Analysis Based on Limited Mem...
Background Estimation Using Principal Component Analysis Based on Limited Mem...IJECEIAES
 
APPLYING NEURAL NETWORKS FOR SUPERVISED LEARNING OF MEDICAL DATA
APPLYING NEURAL NETWORKS FOR SUPERVISED LEARNING OF MEDICAL DATAAPPLYING NEURAL NETWORKS FOR SUPERVISED LEARNING OF MEDICAL DATA
APPLYING NEURAL NETWORKS FOR SUPERVISED LEARNING OF MEDICAL DATAIJDKP
 

What's hot (19)

Paper id 24201464
Paper id 24201464Paper id 24201464
Paper id 24201464
 
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...
 
A new approachto image classification based on adeep multiclass AdaBoosting e...
A new approachto image classification based on adeep multiclass AdaBoosting e...A new approachto image classification based on adeep multiclass AdaBoosting e...
A new approachto image classification based on adeep multiclass AdaBoosting e...
 
Performance Evaluation of Object Tracking Technique Based on Position Vectors
Performance Evaluation of Object Tracking Technique Based on Position VectorsPerformance Evaluation of Object Tracking Technique Based on Position Vectors
Performance Evaluation of Object Tracking Technique Based on Position Vectors
 
A280108
A280108A280108
A280108
 
X trepan an extended trepan for
X trepan an extended trepan forX trepan an extended trepan for
X trepan an extended trepan for
 
Image Steganography Using Wavelet Transform And Genetic Algorithm
Image Steganography Using Wavelet Transform And Genetic AlgorithmImage Steganography Using Wavelet Transform And Genetic Algorithm
Image Steganography Using Wavelet Transform And Genetic Algorithm
 
X-TREPAN : A Multi Class Regression and Adapted Extraction of Comprehensible ...
X-TREPAN : A Multi Class Regression and Adapted Extraction of Comprehensible ...X-TREPAN : A Multi Class Regression and Adapted Extraction of Comprehensible ...
X-TREPAN : A Multi Class Regression and Adapted Extraction of Comprehensible ...
 
Mr image compression based on selection of mother wavelet and lifting based w...
Mr image compression based on selection of mother wavelet and lifting based w...Mr image compression based on selection of mother wavelet and lifting based w...
Mr image compression based on selection of mother wavelet and lifting based w...
 
IRJET-Multiclass Classification Method Based On Deep Learning For Leaf Identi...
IRJET-Multiclass Classification Method Based On Deep Learning For Leaf Identi...IRJET-Multiclass Classification Method Based On Deep Learning For Leaf Identi...
IRJET-Multiclass Classification Method Based On Deep Learning For Leaf Identi...
 
FUZZY SET THEORETIC APPROACH TO IMAGE THRESHOLDING
FUZZY SET THEORETIC APPROACH TO IMAGE THRESHOLDINGFUZZY SET THEORETIC APPROACH TO IMAGE THRESHOLDING
FUZZY SET THEORETIC APPROACH TO IMAGE THRESHOLDING
 
Ijarcet vol-2-issue-2-855-860
Ijarcet vol-2-issue-2-855-860Ijarcet vol-2-issue-2-855-860
Ijarcet vol-2-issue-2-855-860
 
Computer Vision: Visual Extent of an Object
Computer Vision: Visual Extent of an ObjectComputer Vision: Visual Extent of an Object
Computer Vision: Visual Extent of an Object
 
National Flags Recognition Based on Principal Component Analysis
National Flags Recognition Based on Principal Component AnalysisNational Flags Recognition Based on Principal Component Analysis
National Flags Recognition Based on Principal Component Analysis
 
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...Faster Training Algorithms in Neural Network Based Approach For Handwritten T...
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...
 
An Approach For Single Object Detection In Images
An Approach For Single Object Detection In ImagesAn Approach For Single Object Detection In Images
An Approach For Single Object Detection In Images
 
Symbolic-Connectionist Representational Model for Optimizing Decision Making ...
Symbolic-Connectionist Representational Model for Optimizing Decision Making ...Symbolic-Connectionist Representational Model for Optimizing Decision Making ...
Symbolic-Connectionist Representational Model for Optimizing Decision Making ...
 
Background Estimation Using Principal Component Analysis Based on Limited Mem...
Background Estimation Using Principal Component Analysis Based on Limited Mem...Background Estimation Using Principal Component Analysis Based on Limited Mem...
Background Estimation Using Principal Component Analysis Based on Limited Mem...
 
APPLYING NEURAL NETWORKS FOR SUPERVISED LEARNING OF MEDICAL DATA
APPLYING NEURAL NETWORKS FOR SUPERVISED LEARNING OF MEDICAL DATAAPPLYING NEURAL NETWORKS FOR SUPERVISED LEARNING OF MEDICAL DATA
APPLYING NEURAL NETWORKS FOR SUPERVISED LEARNING OF MEDICAL DATA
 

Viewers also liked

Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...
Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...
Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...IDES Editor
 
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D Faces
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D FacesDepth-Image-based Facial Analysis between Age Groups and Recognition of 3D Faces
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D FacesIDES Editor
 
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...IDES Editor
 
User Controlled Privacy in Participatory Sensing
User Controlled Privacy in Participatory SensingUser Controlled Privacy in Participatory Sensing
User Controlled Privacy in Participatory SensingIDES Editor
 
Neural Network Based Noise Identification in Digital Images
Neural Network Based Noise Identification in Digital ImagesNeural Network Based Noise Identification in Digital Images
Neural Network Based Noise Identification in Digital ImagesIDES Editor
 
Energy efficient reliable routing considering residual energy in wireless ad ...
Energy efficient reliable routing considering residual energy in wireless ad ...Energy efficient reliable routing considering residual energy in wireless ad ...
Energy efficient reliable routing considering residual energy in wireless ad ...LeMeniz Infotech
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 

Viewers also liked (9)

Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...
Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...
Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...
 
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D Faces
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D FacesDepth-Image-based Facial Analysis between Age Groups and Recognition of 3D Faces
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D Faces
 
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
 
User Controlled Privacy in Participatory Sensing
User Controlled Privacy in Participatory SensingUser Controlled Privacy in Participatory Sensing
User Controlled Privacy in Participatory Sensing
 
Neural Network Based Noise Identification in Digital Images
Neural Network Based Noise Identification in Digital ImagesNeural Network Based Noise Identification in Digital Images
Neural Network Based Noise Identification in Digital Images
 
Energy efficient reliable routing considering residual energy in wireless ad ...
Energy efficient reliable routing considering residual energy in wireless ad ...Energy efficient reliable routing considering residual energy in wireless ad ...
Energy efficient reliable routing considering residual energy in wireless ad ...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 

Similar to An Information Maximization approach of ICA for Gender Classification

Facial expression recognition based on wapa and oepa fastica
Facial expression recognition based on wapa and oepa fasticaFacial expression recognition based on wapa and oepa fastica
Facial expression recognition based on wapa and oepa fasticaijaia
 
CONVOLUTIONAL NEURAL NETWORK BASED FEATURE EXTRACTION FOR IRIS RECOGNITION
CONVOLUTIONAL NEURAL NETWORK BASED FEATURE EXTRACTION FOR IRIS RECOGNITION CONVOLUTIONAL NEURAL NETWORK BASED FEATURE EXTRACTION FOR IRIS RECOGNITION
CONVOLUTIONAL NEURAL NETWORK BASED FEATURE EXTRACTION FOR IRIS RECOGNITION AIRCC Publishing Corporation
 
CONVOLUTIONAL NEURAL NETWORK BASED FEATURE EXTRACTION FOR IRIS RECOGNITION
CONVOLUTIONAL NEURAL NETWORK BASED FEATURE EXTRACTION FOR IRIS RECOGNITION CONVOLUTIONAL NEURAL NETWORK BASED FEATURE EXTRACTION FOR IRIS RECOGNITION
CONVOLUTIONAL NEURAL NETWORK BASED FEATURE EXTRACTION FOR IRIS RECOGNITION ijcsit
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
COMPRESSION BASED FACE RECOGNITION USING DWT AND SVM
COMPRESSION BASED FACE RECOGNITION USING DWT AND SVMCOMPRESSION BASED FACE RECOGNITION USING DWT AND SVM
COMPRESSION BASED FACE RECOGNITION USING DWT AND SVMsipij
 
Face Recognition Using Gabor features And PCA
Face Recognition Using Gabor features And PCAFace Recognition Using Gabor features And PCA
Face Recognition Using Gabor features And PCAIOSR Journals
 
Independent Component Analysis of Edge Information for Face Recognition
Independent Component Analysis of Edge Information for Face RecognitionIndependent Component Analysis of Edge Information for Face Recognition
Independent Component Analysis of Edge Information for Face RecognitionCSCJournals
 
IMPROVING EXPLANATIONS OF IMAGE CLASSIFIERS: ENSEMBLES AND MULTITASK LEARNING
IMPROVING EXPLANATIONS OF IMAGE CLASSIFIERS: ENSEMBLES AND MULTITASK LEARNINGIMPROVING EXPLANATIONS OF IMAGE CLASSIFIERS: ENSEMBLES AND MULTITASK LEARNING
IMPROVING EXPLANATIONS OF IMAGE CLASSIFIERS: ENSEMBLES AND MULTITASK LEARNINGijaia
 
Standard Statistical Feature analysis of Image Features for Facial Images usi...
Standard Statistical Feature analysis of Image Features for Facial Images usi...Standard Statistical Feature analysis of Image Features for Facial Images usi...
Standard Statistical Feature analysis of Image Features for Facial Images usi...Bulbul Agrawal
 
New artificial neural network design for Chua chaotic system prediction usin...
New artificial neural network design for Chua chaotic system  prediction usin...New artificial neural network design for Chua chaotic system  prediction usin...
New artificial neural network design for Chua chaotic system prediction usin...IJECEIAES
 
fuzzy LBP for face recognition ppt
fuzzy LBP for face recognition pptfuzzy LBP for face recognition ppt
fuzzy LBP for face recognition pptAbdullah Gubbi
 
RunPool: A Dynamic Pooling Layer for Convolution Neural Network
RunPool: A Dynamic Pooling Layer for Convolution Neural NetworkRunPool: A Dynamic Pooling Layer for Convolution Neural Network
RunPool: A Dynamic Pooling Layer for Convolution Neural NetworkPutra Wanda
 
Image Splicing Detection involving Moment-based Feature Extraction and Classi...
Image Splicing Detection involving Moment-based Feature Extraction and Classi...Image Splicing Detection involving Moment-based Feature Extraction and Classi...
Image Splicing Detection involving Moment-based Feature Extraction and Classi...IDES Editor
 
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...IJCNCJournal
 
Utilizing XAI Technique to Improve Autoencoder based Model for Computer Netwo...
Utilizing XAI Technique to Improve Autoencoder based Model for Computer Netwo...Utilizing XAI Technique to Improve Autoencoder based Model for Computer Netwo...
Utilizing XAI Technique to Improve Autoencoder based Model for Computer Netwo...IJCNCJournal
 
Optimized Neural Network for Classification of Multispectral Images
Optimized Neural Network for Classification of Multispectral ImagesOptimized Neural Network for Classification of Multispectral Images
Optimized Neural Network for Classification of Multispectral ImagesIDES Editor
 
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...IRJET Journal
 
Image Denoising Based On Sparse Representation In A Probabilistic Framework
Image Denoising Based On Sparse Representation In A Probabilistic FrameworkImage Denoising Based On Sparse Representation In A Probabilistic Framework
Image Denoising Based On Sparse Representation In A Probabilistic FrameworkCSCJournals
 

Similar to An Information Maximization approach of ICA for Gender Classification (20)

Facial expression recognition based on wapa and oepa fastica
Facial expression recognition based on wapa and oepa fasticaFacial expression recognition based on wapa and oepa fastica
Facial expression recognition based on wapa and oepa fastica
 
Dx25751756
Dx25751756Dx25751756
Dx25751756
 
CONVOLUTIONAL NEURAL NETWORK BASED FEATURE EXTRACTION FOR IRIS RECOGNITION
CONVOLUTIONAL NEURAL NETWORK BASED FEATURE EXTRACTION FOR IRIS RECOGNITION CONVOLUTIONAL NEURAL NETWORK BASED FEATURE EXTRACTION FOR IRIS RECOGNITION
CONVOLUTIONAL NEURAL NETWORK BASED FEATURE EXTRACTION FOR IRIS RECOGNITION
 
CONVOLUTIONAL NEURAL NETWORK BASED FEATURE EXTRACTION FOR IRIS RECOGNITION
CONVOLUTIONAL NEURAL NETWORK BASED FEATURE EXTRACTION FOR IRIS RECOGNITION CONVOLUTIONAL NEURAL NETWORK BASED FEATURE EXTRACTION FOR IRIS RECOGNITION
CONVOLUTIONAL NEURAL NETWORK BASED FEATURE EXTRACTION FOR IRIS RECOGNITION
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
COMPRESSION BASED FACE RECOGNITION USING DWT AND SVM
COMPRESSION BASED FACE RECOGNITION USING DWT AND SVMCOMPRESSION BASED FACE RECOGNITION USING DWT AND SVM
COMPRESSION BASED FACE RECOGNITION USING DWT AND SVM
 
Face Recognition Using Gabor features And PCA
Face Recognition Using Gabor features And PCAFace Recognition Using Gabor features And PCA
Face Recognition Using Gabor features And PCA
 
Independent Component Analysis of Edge Information for Face Recognition
Independent Component Analysis of Edge Information for Face RecognitionIndependent Component Analysis of Edge Information for Face Recognition
Independent Component Analysis of Edge Information for Face Recognition
 
IMPROVING EXPLANATIONS OF IMAGE CLASSIFIERS: ENSEMBLES AND MULTITASK LEARNING
IMPROVING EXPLANATIONS OF IMAGE CLASSIFIERS: ENSEMBLES AND MULTITASK LEARNINGIMPROVING EXPLANATIONS OF IMAGE CLASSIFIERS: ENSEMBLES AND MULTITASK LEARNING
IMPROVING EXPLANATIONS OF IMAGE CLASSIFIERS: ENSEMBLES AND MULTITASK LEARNING
 
Standard Statistical Feature analysis of Image Features for Facial Images usi...
Standard Statistical Feature analysis of Image Features for Facial Images usi...Standard Statistical Feature analysis of Image Features for Facial Images usi...
Standard Statistical Feature analysis of Image Features for Facial Images usi...
 
New artificial neural network design for Chua chaotic system prediction usin...
New artificial neural network design for Chua chaotic system  prediction usin...New artificial neural network design for Chua chaotic system  prediction usin...
New artificial neural network design for Chua chaotic system prediction usin...
 
fuzzy LBP for face recognition ppt
fuzzy LBP for face recognition pptfuzzy LBP for face recognition ppt
fuzzy LBP for face recognition ppt
 
RunPool: A Dynamic Pooling Layer for Convolution Neural Network
RunPool: A Dynamic Pooling Layer for Convolution Neural NetworkRunPool: A Dynamic Pooling Layer for Convolution Neural Network
RunPool: A Dynamic Pooling Layer for Convolution Neural Network
 
Image Splicing Detection involving Moment-based Feature Extraction and Classi...
Image Splicing Detection involving Moment-based Feature Extraction and Classi...Image Splicing Detection involving Moment-based Feature Extraction and Classi...
Image Splicing Detection involving Moment-based Feature Extraction and Classi...
 
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
 
Utilizing XAI Technique to Improve Autoencoder based Model for Computer Netwo...
Utilizing XAI Technique to Improve Autoencoder based Model for Computer Netwo...Utilizing XAI Technique to Improve Autoencoder based Model for Computer Netwo...
Utilizing XAI Technique to Improve Autoencoder based Model for Computer Netwo...
 
Optimized Neural Network for Classification of Multispectral Images
Optimized Neural Network for Classification of Multispectral ImagesOptimized Neural Network for Classification of Multispectral Images
Optimized Neural Network for Classification of Multispectral Images
 
H0334749
H0334749H0334749
H0334749
 
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...
 
Image Denoising Based On Sparse Representation In A Probabilistic Framework
Image Denoising Based On Sparse Representation In A Probabilistic FrameworkImage Denoising Based On Sparse Representation In A Probabilistic Framework
Image Denoising Based On Sparse Representation In A Probabilistic Framework
 

More from IDES Editor

Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 
Mental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive ModelMental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive ModelIDES Editor
 
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityGenetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityIDES Editor
 
3-D FFT Moving Object Signatures for Velocity Filtering
3-D FFT Moving Object Signatures for Velocity Filtering3-D FFT Moving Object Signatures for Velocity Filtering
3-D FFT Moving Object Signatures for Velocity FilteringIDES Editor
 

More from IDES Editor (20)

Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 
Mental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive ModelMental Stress Evaluation using an Adaptive Model
Mental Stress Evaluation using an Adaptive Model
 
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityGenetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
 
3-D FFT Moving Object Signatures for Velocity Filtering
3-D FFT Moving Object Signatures for Velocity Filtering3-D FFT Moving Object Signatures for Velocity Filtering
3-D FFT Moving Object Signatures for Velocity Filtering
 

Recently uploaded

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Recently uploaded (20)

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

An Information Maximization approach of ICA for Gender Classification

  • 1. ACEEE Int. J. on Information Technology, Vol. 02, No. 02, April 2012 An Information Maximization approach of ICA for Gender Classification 1 Sunita Kumari , 2Banshidhar Majhi National Institute of Technology, Rourkela, India 1 sunita.nitrkl@gmail.com, 2bmajhi.nitrkl.ac.in Abstract—In this paper, a novel and successful method for Baek et al. [8] claims that PCA performs better than ICA. gender classification from human faces using dimensionality Moghaddam claims that there is no significant difference reduction technique is proposed. Independent Component between PCA and ICA [9]. It carries same effect in case of Analysis (ICA) is one of such techniques. In the current gender classification also. scheme, a thrust is given on the different algorithms and There exist various algorithms of ICA like Jade algorithm, architectures of ICA. An information maximization ICA is discussed with its two architecture and compared with the two infomax ICA, fastICA [10]. In [11], a technique based on architectures of fast ICA. Support Vector Machine (SVM) is fastICA with Support Vector Machine (SVM) is developed used as a classifier for the separation of male and female for gender classification with an accuracy of 95.67%, but this classes. All experiments are done on FERET database. Results approach lacks with the description of its architecture. In are obtained for the different combinations of train and test this paper, a gender classifier based on SVM is developed database sizes. For larger which deals with infomax and fast ICA with its two training set SVM is performing with an accuracy of 98%. The architecture.The rest of the paper is organized as follows: accuracy values are varied for change in size of testing set and Section II provides a description of the feature extraction the proposed system performs with an average accuracy of techniques used. The proposed system is discussed in 96%. An improvement in performance is achieved using class discriminability which performs with 100% accuracy. Section III. Section IV has been presented with simulation results and comparative analysis. Finally, Section V gives Index Terms—infomax, fast, ICA, ICA-1, ICA-2 concluding remarks. I. INTRODUCTION II. DIMENSIONALITY REDUCTION USING INDEPENDENT COMPONENT ANALYSIS Face biometric has gained popularity because it is one of the most communicative part of social interactions. Human- The present work has been motivated by the keen interest Computer Interaction as well needs face recognition, gender of researchers in face recognition using infomax ICA [5]. recognition, and estimation of age for passive surveillance. ICA gives independent data which can be defined in terms of However, during identification of any individual the False probability density functions (PDFs). Two variables y1 and Acceptance Rate (FAR) increases as the database size y2 are said to be independent if the joint PDF of y1 and y2 increases [1]. Further the time required increases exponentially will be factorizable in terms of their marginal PDF and can be as we need 1: 5ØAÜ comparisons for identification. Hence, achieved by either minimizing mutual information or by more thrust is put in any biometric system to reduce the maximizing non-gaussianity. search time without compromising with accuracy. In a face ICA is defined as: recognition system, partitioning the database based on For the given set of input sample x, ICA finds a linear transform gender is an important research direction. The major challenge in such a way that s  Wx forgender classification is two-fold, (1) to find discriminating Such that the components s are as independent as features and (2) an optimum hyperplane for separating male possible. Here, w is an unknown separating matrix and and female classes. Hence, most researchers thrust on these needs to be determined. There exists several algorithms for two issues while attempting gender classification using face. determining w like Jade, Information Maximization (infomax) There are several methods for dimensionality reduction and Fast fixed point (fast) ICA. Proposed scheme uses like Principal Component Analysis (PCA), Factor Analysis infomax and fast ICA algorithm for finding separating matrix. (FA), Independent Component Analysis (ICA) and many These algorithms are discussed in the following subsections. others [2]. PCA has been first applied by Kirby and Sirovich [3] and it is shown that it is an optimal compression scheme A. FAST FIXED POINT ICA that minimizes the mean square error (MSE) between the This algorithm is based on maximizing non-Gaussian original and reconstructed image. Later, authors in [4] have property of the estimated sources and is measured with the shown that it is the most popular method for face recognition. help of differential entropy J called as negentropy. . ICA is a generalization of PCA. This field is contradictory with respect to the performance of its algorithms. For face J ( y )  H ( y Gauss )  H ( y ) recognition, Bartlett et al. [5], Yuen and Lai [6], and Liu and Wechsler [7] have claimed that ICA outperforms PCA while Where, H ( y Gauss ) is the entropy of the gaussian random © 2012 ACEEE 16 DOI: 01.IJIT.02.02. 99
  • 2. ACEEE Int. J. on Information Technology, Vol. 02, No. 02, April 2012 variable and H ( y ) is the entropy of the observed random D. ARCHITECTURE OF ICA variable. Since the gaussian random variables has the most The goal is to find a better set of basis images so that it can easily estimate an unknown dataset. There are two ways entropy among all random variables, maximizing J leads to to achieve this goal: extracting sources as independent as possible. 1) Architecture–1/ ICA–1: It produces a set of statistically independent basis images. The data matrix X is constructed B. INFORMATION MAXIMIZATION ICA in such a way that each row represents an individual image. Infomax is a gradient based neural network and it This architecture deals about independence of images so maximizes information from input to the output network as that images are considered as random variables and pixels as proposed by Bell and Sejnosky [12]. The information trials as shown in Fig. 1. maximization is achieved by maximizing the joint entropy of Two images X i and X j are independent if it is not transformed vector z  g (W , x ) where g is a sigmoidal function. The joint entropy is: possible to predict the value of an image X j from X i by H ( y )   E[ln f ( y )] moving across pixels. A set of coefficients can be determined by the linear combination of the independent basis images Where f ( y ) is the multivariate joint density function of from which each individual image can be easily constructed. y. 2) Architecture–2/ ICA–2: In ICA–1, the basis images were statistically independent from each other but the coefficients f (x) f ( y)  JW were not but in Architecture–2, the coefficients are statistically independent. It finds a factorial face code for the set of face images. The data matrix X is constructed in such a way that Here, J W denotes the absolute value of Jacobian matrix each column corresponds to an individual image. This architecture deals with independence of pixels such that J W , which is defined as pixels will become random variable and images as trials. Two pixels i and j are said to be independent, if by moving J W  det  i yi xi across set of images it is not possible to predict the value of j from pixel i as shown in Fig. 2. On combining the above equations, H ( y ) can be written as: H ( y )  E[ln J W ]  H ( x) Maximization of H ( y ) can be achieved by adapting W and can be achieved using only the first term. C. PREPROCESSING OF THE DATA Two preprocessing techniques are required to make the problem of ICA estimation simpler and better conditioned, namely, 1) Mean/ Centering: It gives the zero–mean data like for Fig 1. Architecture-1 an input vector x subtract the mean ( m  Ex ) from it. 2) Sphering/Whitening: It is a linear transformation method ~ which gives the whiten signal x from an input signal x such that its components are uncorrelated and their variances equal unity. Unit variance can be achieved by making ~ T . E ( x x )  I ( IdentityMa trix ) .   Whitening is done by E xx T  ADE T .   Here, E is the orthogonal matrix of eigenvectors of E xx T and D is the diagonal matrix of its eigenvalues. The values of Fig 2. Architecture-2 ~ ~ x is determined as x  ED 1 / 2 ETx © 2012 ACEEE 17 DOI: 01.IJIT.02.02. 99
  • 3. ACEEE Int. J. on Information Technology, Vol. 02, No. 02, April 2012 III. PROPOSED GENDER CLASSIFICATION SYSTEM Proposed methodology for gender classification is shown in Fig. 3. The performance of gender classification system has been evaluated for two ICA architectures using infomax algorithm and fastICA on the FERET database [13]. Sample images from this database are shown in Fig. 4. Fig 5. Conventional Triangularization Approach Fig 6. Basis images from Principal Component Analysis Fig 3. Proposed gender classification system The dataset consists of images from 500 subjects of which 250 are male and rest is female. To train the SVM, 200 images have been randomly selected from this dataset. From the remaining 300 images, four groups of testing dataset have Fig 7. Basis images from ICA Architecture-1: Statistical been made. First test dataset consists of 50 individuals, second Independent Images (infomax ICA) has 100 individuals, third consists of 150 and fourth has 200 individual images. Performance of the proposed system is shown on all these test datasets using same training set. The original size of the image was 384×256. All these images have been aligned first and then conventional triangularization approach is applied to get region of interest as shown in Fig. 5. Features have been extracted using infomax and fast ICA from the cropped images of size 293×241. The size of data Fig 8. Basis images from ICA Architecture-2: A factorial Face Code matrix is 500×70613, where each row corresponds to one (infomax ICA) particular image. The number of independent components A. CONFUSION MATRIX (ICs) obtained using ICA algorithm corresponds to the dimensionality of the input. As the performance merely The performance of any classifier can be expressed in depends on the number of separated components so there is terms of confusion matrix [14]. Confusion matrix contains a need to control the number of ICs. To achieve this, ICA is information about actual and predicted classifications done performed on linear combination of original images and for by a classification system. Performance of such systems can this, PCA has used 200 eigenvectors. Thus, ICA has 200 ICs. be evaluated using data present in the matrix and can be Basis images obtained from PCA is shown in Fig. 6 and of defined in the terms of True Positive (TP) and False Positive infomax ICA–1 is shown in Fig. 7. Fig. 8 shows the same as (FP) rate. The tabular representation of confusion matrix is as obtained from infomax ICA–2. shown in Table 1. TABLE I. CONFUSION MATRIX Fig 4. Images from FERET database © 2012 ACEEE 18 DOI: 01.IJIT.02.02.99
  • 4. ACEEE Int. J. on Information Technology, Vol. 02, No. 02, April 2012 The entries in the confusion matrix are as following: TABLE III. C ONFUSION MATRIX FOR INFORMATION MAXIMIZATION ICA  a is the number of correct predictions that an instance is ARCHITECTURE - 2 negative.  b is the number of incorrect predictions that an instance is positive.  c is the number of incorrect predictions that an instance is negative.  d is the correct number of predictions that an instance is positive. The performance of confusion matrix can be measured in the following terms: True positive rate: It is the proportion of positive cases that are correctly classified. TP  a c  d  False positive rate: It is the proportion of negative cases that are incorrectly classified as B. RESULTS FROM FAST ICA positive. FP  b a  b In this section, an emphasis is given on fast ICA using Accuracy: It is the total number of predictions that are architecture–2 and is compared with architecture–1. Table 4 correct. and 5 describes architecture–1 and architecture–2 Accuracy  ( a  d ) (a  b  c  d ) respectively. FastICA performs better with architecture–2 in comparison to architecture–1. Thus, global features are given IV. EXPERIMENTAL RESULTS more weight in case of fast ICA for gender classification. A. RESULTS FROM INFOMAX ICA TABLE IV. C ONFUSION MATRIX FOR FAST FIXED POINT ICA ARCHITECTURE-1 The distribution of TP and FP rates and corresponding accuracies for different datasets using infomaxICA for its two architectures is shown in Table 2 and 3. From table, it is clear that the male and female classes are more separable in case of architecture–1 in comparison to architecture–2. Thus, statistical independent images perform better than statistical independent coefficients. As literature entails that ICA–1 and ICA–2 gives local and global features respectively, thus, the proposed gender classifier is performing well with local features than compared to global for separation of male and female classes. TABLE II. C ONFUSION MATRIX FOR INFORMATION MAXIMIZATION ICA ARCHITECTURE - 1 TABLE V. CONFUSION MATRIX FOR FAST FIXED POINT ICA ARCHITECTURE - 2 © 2012 ACEEE 19 DOI: 01.IJIT.02.02. 99
  • 5. ACEEE Int. J. on Information Technology, Vol. 02, No. 02, April 2012 The separation between true positive and false positive rates ICA–2 and fast ICA–1 is also similar and all these techniques is described in Fig. 9 for both algorithms and architecture of performs better than PCA. Thus it is observed that both the ICA. The graph shows the relationship between TP and FP algorithms are giving same performance but it merely depends against change in test database size. It shows that, the on the architecture. Infomax ICA performs better in separation between TP and FP is more for infomaxICA–1 than architecture–1 and fast ICA performs better in architecture– others scheme. From results, it has been inferred that fast 2. ICA– 2 performs better than fast ICA–1. D. MUTUAL INFORMATION Based on their TP and FP rates, the corresponding drawn Receiver Operating Characteristic (ROC) graph is shown in Variation of accuracy achieved in case of ICA–1 and ICA– Fig. 10. ROC graph defines the tradeoff between the ability of 2 depends on the mutual information conserved in their basis a classifier to correctly identify positive cases and the number images as it is a measure of statistical dependence. Mutual of negative cases that are incorrectly classified. The ROC information is calculated as curve shows the plot of false positive rate against true I ( X , Y )  H ( X )  H (Y )  H ( X , Y ) positive rate. A point (0, 1) in the ROC graph shows perfect classification which classifies all positive and negative cases Where H (X ) and H (Y ) are the marginal entropies and correctly. H ( X , Y ) is the joint entropy of X and Y . Fig 9. Separation between true positive and false positive rates for Fig 11. Comparison of proposed scheme with existing different datasets Schemes The point (0, 0) represents a classifier which predicts all Two similar images contains high mutual information while cases as negative. FP and TP values are obtained for all mutual information between dissimilar images are low. Such testdata sets and ROC is plotted against them. From above observation is also found in the current approach. A graph, it can be said that infomax classifier work better than comparison of mutual information between original gray level others. images and basis images obtained from ICA is shown in Fig. 12. This graph shows the mutual information present among various images and their basis images. This is obtained using 10 images and the mutual information with respect to other images are calculated. The mutual information present in ICA– 1 is less than that of ICA–2 and the original gray level images have greater mutual information than ICA–2. Mutual information is inversely proportional to the independence of the data.Thus ICA–1 have more independence than ICA–2 and original images. For this reason, ICA–1 performs better than ICA–2. Fig 10. Receiver operating characteristic (ROC) graph E. FEATURE SUB-SPACE SELECTION C. COMPARATIVE ANALYSIS All results are obtained using 200 basis vectors but among Author in [4] has evaluated the performance of fastICA all these coefficients, some of them are less significant than in Architecture–1 with an accuracy of 95.67%. For comparison others. Thus, an improvement in performance can be achieved issues, the proposed system has also evaluated the by discarding those less significant coefficients while training performance using fastICA architecture–2 and then it is the SVM. One of the most popular approach for coefficient compared with the results obtained from infomax ICA–1, selection is by maximizing the ratio of between class to within infonax ICA–2, fastICA–1 and PCA based scheme as shown class variance which is also known as class discriminability in Fig. 11. By comparative analysis, it has been observed that (cd) and can be obtained as infomax ICA– 1 performs superior than all other schemes and it is almost similar to fast ICA–2. The performance of infomax cd   between /  within © 2012 ACEEE 20 DOI: 01.IJIT.02.02. 99
  • 6. ACEEE Int. J. on Information Technology, Vol. 02, No. 02, April 2012 the classifier performance is increased. So, gender classification system is acceptable in reducing the search space for a real-time face recognition system. CONCLUSIONS This paper proposes a gender classification scheme based on ICA. Two well-known algorithms for ICA are infomax ICA and fast ICA. SVM is used as a classifier. The performance of the SVM has been studied using different architectures namely, ICA–1 and ICA–2. Comparative analysis has been Fig 12. Comparison of mutual information between original and made with the existing PCA based classification scheme. It basis images from ICA–1 and ICA–2(this is obtained with 10 basis has been found that infomax ICA results better in images where mutual information of first image with itself is architecture–1 with 100% accuracy and fast ICA performs calculated first and then it is calculated with other images.) better in architecture–2 with an accuracy of 100%. Both the Where  between is the variance between male and female algorithms outperform PCA. Thus, gender classification using human faces can be taken as a trusted step while dealing classes and  within is the sum of variances within each with the large databases. This can be used for filtering databases during identification. class. The coefficients with low 5ØPÜ5ØQÜ values are REFERENCES discarded and SVM is trained with the rest. In the current scheme the cd coefficient’s value lies between 0.00008635– [1] A. K. J. D. Maltoni, D. Maio and S. Prabhakar, Guide to 6.6646. An analysis has been made using these coefficients Biometrics, Springer Verlag 2003. and is shown in Fig. 13. It is inferred that if the coefficients [2] K. K. Sergios Theodoridis, Pattern Recognition, Springer-Verlag are selected with the value greater than 0.15 or 0.2, accuracy 2006. [3] L. Sirovich and M. Kirby. Low-dimensional procedure for the reaches to 100%. However, the accuracy degrades further if characterization of human faces. J. Opt. Soc. Am. A, 4(3):519–524, the value is increased as shown in Fig. 13. Mar 1987. [4] M. Turk and A. Pentland. Eigenfaces for recognition. Journal of Cognitive Neuroscience, 3(1):71–86, 1991. [5] M. Bartlett, J. Movellan, and T. Sejnowski. Face recognition by independent component analysis, Neural Networks, IEEE Transactions, Neural Networks, IEEE Transactions, 13(6):1450- 1464, Nov-2002 [6] P. C. Yuen and J. H. Lai. Independent component analysis of face images. In IEEE Workshop on Biologically Motivated Computer Vision, 2000. [7] C. Liu and H. Wechsler. Comparative assessment of independent component analysis (ica) for face recognition. In International Fig 13. Performance measure with sub-space selection Conference on Audio and Video Based Biometric Person Authentication, pages 22–24, 1999. [8] K. Baek, B. A. Draper, J. R. Beveridge, and K. She pca vs ica: A comparision on the feret dataset.Algorithm. JOINT CONFERENCE ON INFORMATION SCIENCES. pages 824– 827,2002 [9] B. Moghaddam, Principal manifolds and Bayesian subspaces for visual recognition. In computer vision, The proceedings of the 7th IEEE international conference. Pages 1131-1136 vol 2. [10] A. Hyvrinen and E. Oja. Independent component analysis: algorithm and applications. Neural Networks, 13:411430, 2000 [11] A. Jain and J. Huang. Integrating independent components and support vector machines for gender classification. Volume 3, pages 558 – 561, Aug 2004.. Fig 14. Class discriminabilty between male and female classes (each [12] A.J. Bell and T. J. Sejnowski An information maximization solid line represents the coefficient’s cd value and circle lists the approach to blind separation and blind deconvolution. NEURAL discarded coefficients) COMPUTATION, 7:1129–1159, 1995. With the implementation of above scheme, the classifier [13] P.J.Phillips H.Moon, S.A.Rizvi and P.Z.Rauss. The FERET performance has increased significantly. The accuracy evaluation methodology for face recognition. [14] http://www2.cs.uregina.ca/~hamilton/courses/831/notes/ obtained is 100% for infomax ICA–1 with 50 testdata and 200 confusion_matrix/confusion_matrix.html traindata size. Thus using such feature selection schemes, © 2012 ACEEE 21 DOI: 01.IJIT.02.02. 99