SlideShare una empresa de Scribd logo
1 de 8
Descargar para leer sin conexión
Journal of Information Engineering and Applications                                            www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.1, 2011

  Similarity of Inference Face Matching On Angle Oriented Face
                            Recognition
                                     Naga Venkata Jagan Mohan Remani
                              Research Scholar, Acharya Nagarjuna University
                           Mobile: +91-9848957141 Email:mohanrnvj@gmail.com
                                           Subba Rao Rachakonda
                                 Professor in Dept of Science and Humanities
           Shri Vishnu Engineering College for Women, Bhimavaram-534202, Andhra Pradesh, India
                          Mobile: +91-9440976619 Email:rsr_vishnu@svcw.edu.in
                                            Raja Sekhara Rao Kurra
                             Principal, Konearu Laxmiah College of Engineering
                            Vaddeswaram Guntur-522510, Andhra Pradesh, India
                                  Mobile: +91-9848452344 Email:rajasekhar.kurra@klce.ac.in

Abstract
Face recognition is one of the wide applications of image processing technique. In this paper complete image of
face recognition algorithm is proposed. In the prepared algorithm the local information is extracted using angle
oriented discrete cosine transforms and invokes certain normalization techniques. To increase the Reliability of
the Face detection process, neighborhood pixel information is incorporated into the proposed method. Discrete
Cosine Transform (DCT) are renowned methods are implementing in the field of access control and security are
utilizing the feature extraction capabilities. But these algorithms have certain limitations like poor
discriminatory power and disability to handle large computational load. The face matching classification for the
proposed system is done using various distance measure methods like Euclidean Distance, Manhattan Distance
and Cosine Distance methods and the recognition rate were compared for different distance measures. The
proposed method has been successfully tested on image database which is acquired under variable illumination
and facial expressions. It is observed from the results that use of face matching like various method gives a
recognition rate are high while comparing other methods. Also this study analyzes and compares the obtained
results from the proposed Angle oriented face recognition with threshold based face detector to show the level of
robustness using texture features in the proposed face detector. It was verified that a face recognition based on
textual features can lead to an efficient and more reliable face detection method compared with KLT (Karhunen
Loeve Transform), a threshold face detector.

Keywords: Angle Oriented, Cosine Similarity, Discrete Cosine Transform, Euclidean Distance, Face Matching,
Feature Extraction, Face Recognition, Image texture features.

1. Introduction
Many authors discussed the face recognition by comparing the face of human being with the database and
identifying the features of image. Face Recognition has received considerable attention over past two decades,
where variation caused by illumination is most significant factor that alerts the appearance of face Chellappa et
al., 1995. The database of system consists of individual facial features along with their geometrical relations. So
for the input taken the facial features are compared with the database. If a match is found the face of the person
is said to be recognized. In this process we consider feature extraction capabilities of discrete cosine transform
(DCT) and invoke certain normalization techniques which increase its robust face recognition.

The face recognition falls in to two main categories, Chellappa et al., 1995; they are (i) feature-based and (ii)
holistic. Feature-based approach to face recognition relies on detection and characterization of the individual
facial features like eyes, nose and mouth etc, and their geometrical relationships. On the other hand, holistic
approach to face recognition involves encoding of the entire facial image. Earlier works on face recognition as
discussed by Ziad M.Hafed and Martin Levine 2001, Ting Shan et al 2006, are considered. Alaa Y. Taqa and
Hamid A. Jalab 2010 are proposed color-based or texture-based skin detector approaches.

In this paper we discussed a new computational approach that is converting the input image to database image
using Angle orientation technique in section2. Section 3 deals with the mathematical definition of the discrete
cosine transform its relationship to KLT and Euclidean Distance with Cosine Similarities. The basics of face
recognition system using DCT that includes the details of proposed algorithm and discussion of various
parameters which affect its performance are discussed in section 4. The experimental results of the proposed


46 | P a g e
www.iiste.org
Journal of Information Engineering and Applications                                            www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.1, 2011
system are highlighted in section 5.The conclusion and future perceptives are mentioned in section 6.

2. Angle Orientation

First the input image is selected and compared with the database image. If input image size is not equivalent to
database size, the input image is to be resized to match with the size of database image. We compare the pose of
the image in both input and database images. If the input image is not at an angle of 900 we can’t compare the
images; some authors Ziad. M. Hafed and Martine D. Levine (2001) used eye coordinates techniques to
recognize such an image. In this approach one can identify the feature images of the faces even though they are
angle oriented. If the input image angle is not 900, rotate the image to 900 and then apply normalization
technique such as geometric and illumination technique. Recognition of an image by using rotational axis is
easy to achieve or recognize the face. When the input image rotates from horizontal axis to vertical axis the face
rotates anti-clock wise and the face appears in which it is the same as the database pose, then the object is
recognized. Similarly, when the input image rotates from vertical axis to horizontal axis the face rotates clock
wise and the face appears in which it is the same as the database pose, then the object is recognized. Therefore if
input image is Angle oriented, the pose is changed or Angle is altered using rotational axis and then compared.
The Two types of angle rotations, clock wise and Anti-clock wise, with different angles are given in the images
of Figure.2.1 and Figure 2.2.




                           Figure2.1: Angle Rotation – Anti Clock Wise Direction




                                      Figure2.2: Angle Rotation – Clock Wise Direction



47 | P a g e
www.iiste.org
Journal of Information Engineering and Applications                                            www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.1, 2011
3. Mathematical Methods
3.0. Discrete Cosine Transform

Discrete cosine transform (DCT) has been used as a feature extraction step in various studies on face
recognition. Until now, discrete cosine transforms have been performed either in a holistic appearance-based
sense [7], or in a local appearance-based sense ignoring the spatial information to some extent during the
classification step by feeding some kind of neural networks with local DCT coefficients or by modelling them
with some kind of statistical tools.

Ahmed, Natarajan, and Rao (1974) first introduced the discrete cosine transform (DCT) in the early seventies.
Ever since, the DCT has grown in popularity, and several variants have been proposed (Rao and Yip, 1990). In
particular, the DCT was categorized by Wang (1984) into four slightly different transformations named DCT-I,
DCT-II, DCT-III, and DCT-IV. Of the four classes we concern with DCT-II suggested by Wang, in this paper.


                  y k, 1      w k                 x n cos               ,k     1, … , N                (3.0.1)


                                      ,         1
                  Where

                                  √

                                  , 2                 !
                              √
                                                                                                        (3.0.2)



N is the length of x; x and y of the same size. If x is a matrix, DCT transforms its columns. The series is indexed
from n = 1 and k = 1 instead of the usual n = 0 and k = 0 because vectors run from 1 to N instead of 0 to N-
1.Using the formulae (3.0.1) and (3.0.2) we find the feature vectors of an input sequence using discrete cosine
transform.

3.1. Taxonomy of Face Matching Methods

The main objective of matching methods for measure is to define a value that allows the comparison of feature
vectors (reduced vectors in discrete cosine transform frameworks). With this measure the identification of a new
feature vector will be possible by searching the most similar vector into the database. This is the well-known
nearest-neighbor method. One way to define similarity is to use a measure of distance, d(x, y), in which the
similarity between vectors, S(x, y) is inverse to the distance measure. In the next sub-sections distance measures
are shown Euclidean Distance, Manhattan Distance and Cosine similarity.
3.1.0. Manhattan Distance

Initially, to recognizing a specific input image, the system compares the image’s feature vector to feature vectors
of the database image using a Manhattan distance which is used shortest distance classifier (Paul E, Black,
1987). If the feature vector of the probe is x and that of a database face is y, where x=(x1, x2, x3….xn) and y=
(y1, y2….., yn). The Manhattan distance, d1, between two vectors x, y in an n-dimensional real vector space with
fixed Cartesian coordinate system, is the sum of the lengths of the projections of the line segment between the
points onto the coordinate axes.

Manhattan Distance(x, y) = ", #           ∑'   ( |"   & #|
(3.1.0)

3.1.1. Euclidean Distance:

On the other hand, for recognizing a particular input image, the system compares the image’s feature vector to
the feature vectors of the database image using a Euclidean distance nearest-neighbor classifier (Duda and Hart,
1973). If the feature vector of the probe is x and that of a database face is y, where x=(x1, x2, x3….xn) and y=
(y1, y2…... yn). The position of a point in a Euclidean n-space is a Euclidean vector. So, x and y are Euclidean
vectors, starting from the origin of the space, and their tips indicate two points. The Euclidean norm, or
Euclidean length, or magnitude of a vector measures the length of the vector.

Euclidean Distance (x, y) =√∑'        "&#
(3.1.1)


48 | P a g e
www.iiste.org
Journal of Information Engineering and Applications                                            www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.1, 2011

3.1.2. Cosine Similarity

Another face matching distance classifier method where interested is cosine similarity and can be calculated as
follows. For any two given vectors x and y, the cosine similarity, θ, is represented using a dot product and
magnitude as

Cosine Similarity (x, y) = (xTy/||x||.||y||)
(3.1.2)

For face matching, the attribute vectors x and y are usually the term frequency vectors of the images. The cosine
similarity can be seen as a method of normalizing image length during comparison. The resulting similarity
ranges from −1 meaning exactly opposite, to 1 meaning exactly the same, with 0 usually indicating
independence, and in-between values indicating intermediate similarity or dissimilarity.

3.2. Relationship with KLT

Karhunen-Loeve Transform (KLT) is a unitary transform that diagonalizes the covariance or the correlation
matrix of a discrete random sequence. Also it is considered as an optimal transform among all discrete
transforms based on a number of criteria. It is, however, used infrequently as it is dependent on the statistics of
the sequence i.e. when the statistics changes so as the KLT. Because of this signal dependence, generally it has
no fast algorithm. Other discrete transforms such as cosine transform (DCT) even though suboptimal; have been
extremely popular in video coding. The principal reasons for the heavy usage of DCT are that it is signal
independent and it has fast algorithms resulting in efficient implementation. In spite of this, KLT has been used
as a bench mark in evaluating the performance of other transforms. Furthermore, DCT closely approximates the
compact representation ability of the KLT, which makes it a very useful tool for signal representation both in
terms of information packing and in terms of computational complexity due to its data independent nature.

4. Basic Algorithm for Angle Oriented Face Recognition using DCT

The basic algorithm for Angle Oriented Face Recognition discussed in this paper is depicted in figure 3.1. The
algorithm involves both face normalization and Recognization. Mathew Turk and Alex Pentland [15] expanded
the idea of face recognition. It can be seen in the figure 3.1 that the system receives input image of size N x N
and is compared with the size of database image, if the input image and database image are not equal, is to be
resized the image. While implementing an image processing solution, the selection of suitable illumination is a
crucial element in determining the quality of the captured images and can have a huge effect on the subsequent
evaluation of the image. If the pose of the selected image is required to rotate to obtain the database image rotate
the face with an angle θ until it matches with the database image. The rotation of the image may be
bidirectional, clock wise or anti-clock wise, depending on the selected pose of the image.

Once a normalized face obtained, it can be compared with other faces, under the same nominal size, orientation,
position, and illumination conditions. This comparison is based on features extracted using DCT. The input
images are divided into N x N blocks to define the local regions of processing. The N x N two-dimensional
Discrete Cosine Transform (DCT) is used to transform the data into the frequency domain. Thereafter, statistical
operators that calculate various functions of spatial frequency in the block are used to produce a block-level
DCT coefficient.

To recognize a particular input image or face, the system compares this image feature vector to the feature
vector of database faces using a Euclidean Distance nearest neighbor classifier (Duda and Fart, 1973),
Manhattan distance and Cosine Similarity. After obtaining the Manhattan Distance or Euclidean Distances or
Cosine Similarity for N x N Matrix one needs to find the averages of the each column of the matrix, and then
find the average of all these averages, if the overall average is negative we may say there is a match between the
input image and database image.




49 | P a g e
www.iiste.org
Journal of Information Engineering and Applications                                        www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.1, 2011




                           Figure 4.1: Angle Oriented Face Recognition using DCT
5. Experimental Results

This section is focused on the Discrete Cosine-based face recognition systems using the projection methods and
similarity measures previously presented. Two different face image databases were used in order to test the
recognition ability of each system image database of the Shree Vasista Educational Society.

5.1. Clock wise Rotation

The experimental Results are calculated for various angles of θ in clock wise direction using the three methods
Euclidean distance and Cosine Similarity. The mean recognition values of three methods are measured. Out of a
sample of 13 observations 12 are recognized. The percentage of recognition for DCT with Manhattan distance is
92.30%.




50 | P a g e
www.iiste.org
Journal of Information Engineering and Applications                                            www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.1, 2011
                 60
                 40
                 20
                  0
                 -20   1 2 3 4 5 6 7 8 9 10 11 12 13
                                                                           Euclidean Distance
                 -40
                                                                           Cosine Similarity
                 -60
                                                                           Manhattan Distance
                 -80
                -100
                -120
                -140
                -160
                              Figure 5.1 Mean values for Clock Wise Rotation

The obtained data was presented in Figure 5.1. In Figure 5.1 the red line indicates the recognition level for
Cosine Similarity and the blue gives Euclidean distance and green indicates Manhattan distance. It can be
observed that the recognition level of input image in DCT with Manhattan distance is very high. It is also
noticed that as the sample size is increasing the recognition level is also increasing in DCT with Manhattan
distance while comparing with others.

5.2. Anti-Clock Wise Rotation

The same methodology as that of clock wise rotation is maintained in anti-clock wise rotation, as well. The
comparisons of mean recognition values are Manhattan distance; Euclidean distance and Cosine Similarity for
the both methods are calculated for several values of θ using Anti-Clock wise direction. In this method also
Manhattan distance, Euclidean distance has shown high reliability of recognition level. In Figure 5.2 the results
are shown graphically, we can find the rapid decrease in the graph for Manhattan distance, Euclidean distance
and Cosine Similarity which showed with blue colored line indicates the high reliability of recognition of the
input image.
                 60
                 40
                 20
                  0
                       1 2 3 4 5 6 7 8 9 10 11 12 13                       Manhattan Distance
                 -20
                                                                           Euclidean Distance
                 -40
                                                                           Cosine Distance
                 -60
                 -80
                -100
                -120
                             Figure 5.2: Mean values for Anti-clock Rotation

5.3. Comparison between DCT and KLT

The DCT and KLT techniques are experimented under standard execution environment by considering the
synthesized data of the students of Sri Vishnu Educational Society. The Percentage of recognition level in both
the methods of experimental results is shown in Table 4.3.1. The phenomenal growth of DCT reliability is
observed when compared with KLT.


51 | P a g e
www.iiste.org
Journal of Information Engineering and Applications                                          www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.1, 2011
The Performance of recognition level of 10000 records for both the methods of experimental results is given in
Figure 4.3.2. The graph clearly shows that the reliability performance of DCT is constant increasing with respect
to KLT while the number of records is increased.


              S. No.       No. of records       Performance in DCT       Performance in KLT
              1            1000                 91.46                    65.42
              2            2000                 92.01                    64.23
              3            3000                 93.25                    52.15
              4            4000                 94.12                    54.12
              5            5000                 94.62                    53.10
              6            6000                 96.5                     52.63
              7            7000                 97.23                    51.71
              8            8000                 97.56                    50.46
              9            9000                 98.46                    50.04
              10           10000                98.89                    54.13
                             Table 5.3.1: Performance Records in DCT and KLT

              120

              100

                80

                60                                                          Performance in DCT
                                                                            Performance in KLT
                40

                20

                0
                       1     2   3    4     5    6   7   8    9    10

                           Figure 5.3.2: Bar Chart for Performance in DCT and KLT

6. Conclusion and Future Perspectives

Holistic approach to face recognition is used which has involved in encoding the entire facial image. An angle
oriented algorithm which can be rotated either clock wise or anti clock wise directions is proposed and
successfully implemented through the experimental results. The algorithm is proposed with the mean values of
the Euclidian classifiers. It is proved that the proposed angle oriented discrete cosine transform increases the
reliability of the face detection when compared with the KLT.

This approach has applications in Intrusion detection and new technologies like Biometric systems etc. The
authors view a random variable which indicates the magnitude of the recognition level of an image which will
follow some probability distribution.

References

Alaa Y.Taqa and Hamid A.Jalab (2010), “Increasing the Reliability of Fuzzy Inference System Skin Detector”
American Journal of Applied Sciences 7(8):1129-1138.

Alaa Y.Taqa and Hamid A.Jalab (2010),”Increasing the reliability of skin detectors” Scientific Research and
Essays Vol.5 (17), P.P.2480-2490.


52 | P a g e
www.iiste.org
Journal of Information Engineering and Applications                                      www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.1, 2011
Almas Anjum, M., and Yunus Javed M (2006), “Face Images Feature Extraction Analysis for Recognition in
Frequency Domain” Proc. of the 6th WSEAS Int. Conf. on Signal Processing, Computational Geometry &
Artificial Vision, Elounda, Greece.

Annadurai S and Saradha A (2004), “Discrete Cosine Transform Based Face Recognition Using Linear
Discriminate Analysis” Proceedings of International Conference on Intelligent Knowledge Systems.

Chellappa R and Wilson C and Sirohey S (1995), Human and machine recognition of faces: A survey. In Proc.
IEEE, 83(5):705-740.

Duda R O and Hart P E (1973), Pattern Classification and Scene Analysis. Wiley: New York, NY.

Ekenel H K and Stiefelhagen R (2005), “Local Appearance based Face Recognition Using Discrete Cosine
Transform”, EUSIPCO, Antalya, Turkey.

Manhattan distance Paul E Black (1987), Dictionary of Algorithms and Data Structures, NIST.

Nefian A (1999), “A Hidden Markov Model-based Approach for Face Detection and Recognition“, PhD thesis,
Georgia Institute of Technology.

Pan Z and Bolouri H (1999), “High speed face recognition based on discrete cosine transforms and neural
networks”, Technical report, University of Hertfordshire, UK.

Rao K and Yip P (1990), Discrete Cosine Transform-Algorithm, Advantages, Applications. Academic: New
York, N.Y.

Sanderson and Paliwal K K (2003), “Features for robust face based identity verification”, Signal processing,
83(5).

Scott W L (2003), “Block-level Discrete Cosine Transform Coefficients for Autonomic Face Recognition”, P.hd
thesis, Louisiana State University, USA.

Shin D and Lee H S and Kim D (2008), “Illumination-robust face recognition using ridge    regressive bilinear
models”, Pattern Recognition Letters, Vol.29, no.1, P.P, 49-58.

Ting Shan and Brain Lovell C and Shaokang Chen (2006), “Face Recognition to Head Pose from One sample
Image” proceedings of the 18th International conference on Pattern Recognition.

Turk M and Pentland A (1991), “Eigen faces for recognition”, Journal of Cognitive Neuroscience, vol.3, no.1,
pp.71-86.

Wang Z (1984), Fast algorithms for the discrete W transform and for the Discrete Fourier Transform. IEEE
Trans. Acoust., Speech, and Signal Proc., 32:803-816.

Ziad Hafed M and Martin Levine (2001), “Face Recognition using Discrete Cosine Transform”, International
Journal of Computer Vision 43(3), 167-188.




53 | P a g e
www.iiste.org

Más contenido relacionado

La actualidad más candente

Multimodal Approach for Face Recognition using 3D-2D Face Feature Fusion
Multimodal Approach for Face Recognition using 3D-2D Face Feature FusionMultimodal Approach for Face Recognition using 3D-2D Face Feature Fusion
Multimodal Approach for Face Recognition using 3D-2D Face Feature FusionCSCJournals
 
COMPRESSION BASED FACE RECOGNITION USING DWT AND SVM
COMPRESSION BASED FACE RECOGNITION USING DWT AND SVMCOMPRESSION BASED FACE RECOGNITION USING DWT AND SVM
COMPRESSION BASED FACE RECOGNITION USING DWT AND SVMsipij
 
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET TransformRotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET TransformIRJET Journal
 
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...sipij
 
HVDLP : HORIZONTAL VERTICAL DIAGONAL LOCAL PATTERN BASED FACE RECOGNITION
HVDLP : HORIZONTAL VERTICAL DIAGONAL LOCAL PATTERN BASED FACE RECOGNITION HVDLP : HORIZONTAL VERTICAL DIAGONAL LOCAL PATTERN BASED FACE RECOGNITION
HVDLP : HORIZONTAL VERTICAL DIAGONAL LOCAL PATTERN BASED FACE RECOGNITION sipij
 
An Assimilated Face Recognition System with effective Gender Recognition Rate
An Assimilated Face Recognition System with effective Gender Recognition RateAn Assimilated Face Recognition System with effective Gender Recognition Rate
An Assimilated Face Recognition System with effective Gender Recognition RateIRJET Journal
 
Face Recognition System Using Local Ternary Pattern and Signed Number Multipl...
Face Recognition System Using Local Ternary Pattern and Signed Number Multipl...Face Recognition System Using Local Ternary Pattern and Signed Number Multipl...
Face Recognition System Using Local Ternary Pattern and Signed Number Multipl...inventionjournals
 
Face Recognition on Linear Motion-blurred Image
Face Recognition on Linear Motion-blurred ImageFace Recognition on Linear Motion-blurred Image
Face Recognition on Linear Motion-blurred ImageTELKOMNIKA JOURNAL
 
An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...IJCI JOURNAL
 
AN ILLUMINATION INVARIANT FACE RECOGNITION USING 2D DISCRETE COSINE TRANSFORM...
AN ILLUMINATION INVARIANT FACE RECOGNITION USING 2D DISCRETE COSINE TRANSFORM...AN ILLUMINATION INVARIANT FACE RECOGNITION USING 2D DISCRETE COSINE TRANSFORM...
AN ILLUMINATION INVARIANT FACE RECOGNITION USING 2D DISCRETE COSINE TRANSFORM...ijcsit
 
A combined-conventional-and-differential-evolution-method-for-model-order-red...
A combined-conventional-and-differential-evolution-method-for-model-order-red...A combined-conventional-and-differential-evolution-method-for-model-order-red...
A combined-conventional-and-differential-evolution-method-for-model-order-red...Cemal Ardil
 
Independent Component Analysis of Edge Information for Face Recognition
Independent Component Analysis of Edge Information for Face RecognitionIndependent Component Analysis of Edge Information for Face Recognition
Independent Component Analysis of Edge Information for Face RecognitionCSCJournals
 

La actualidad más candente (15)

Multimodal Approach for Face Recognition using 3D-2D Face Feature Fusion
Multimodal Approach for Face Recognition using 3D-2D Face Feature FusionMultimodal Approach for Face Recognition using 3D-2D Face Feature Fusion
Multimodal Approach for Face Recognition using 3D-2D Face Feature Fusion
 
COMPRESSION BASED FACE RECOGNITION USING DWT AND SVM
COMPRESSION BASED FACE RECOGNITION USING DWT AND SVMCOMPRESSION BASED FACE RECOGNITION USING DWT AND SVM
COMPRESSION BASED FACE RECOGNITION USING DWT AND SVM
 
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET TransformRotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
 
50120130406014
5012013040601450120130406014
50120130406014
 
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...
 
HVDLP : HORIZONTAL VERTICAL DIAGONAL LOCAL PATTERN BASED FACE RECOGNITION
HVDLP : HORIZONTAL VERTICAL DIAGONAL LOCAL PATTERN BASED FACE RECOGNITION HVDLP : HORIZONTAL VERTICAL DIAGONAL LOCAL PATTERN BASED FACE RECOGNITION
HVDLP : HORIZONTAL VERTICAL DIAGONAL LOCAL PATTERN BASED FACE RECOGNITION
 
An Assimilated Face Recognition System with effective Gender Recognition Rate
An Assimilated Face Recognition System with effective Gender Recognition RateAn Assimilated Face Recognition System with effective Gender Recognition Rate
An Assimilated Face Recognition System with effective Gender Recognition Rate
 
Face Recognition System Using Local Ternary Pattern and Signed Number Multipl...
Face Recognition System Using Local Ternary Pattern and Signed Number Multipl...Face Recognition System Using Local Ternary Pattern and Signed Number Multipl...
Face Recognition System Using Local Ternary Pattern and Signed Number Multipl...
 
Face Recognition on Linear Motion-blurred Image
Face Recognition on Linear Motion-blurred ImageFace Recognition on Linear Motion-blurred Image
Face Recognition on Linear Motion-blurred Image
 
Aa4102207210
Aa4102207210Aa4102207210
Aa4102207210
 
An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...
 
Ijcatr04051013
Ijcatr04051013Ijcatr04051013
Ijcatr04051013
 
AN ILLUMINATION INVARIANT FACE RECOGNITION USING 2D DISCRETE COSINE TRANSFORM...
AN ILLUMINATION INVARIANT FACE RECOGNITION USING 2D DISCRETE COSINE TRANSFORM...AN ILLUMINATION INVARIANT FACE RECOGNITION USING 2D DISCRETE COSINE TRANSFORM...
AN ILLUMINATION INVARIANT FACE RECOGNITION USING 2D DISCRETE COSINE TRANSFORM...
 
A combined-conventional-and-differential-evolution-method-for-model-order-red...
A combined-conventional-and-differential-evolution-method-for-model-order-red...A combined-conventional-and-differential-evolution-method-for-model-order-red...
A combined-conventional-and-differential-evolution-method-for-model-order-red...
 
Independent Component Analysis of Edge Information for Face Recognition
Independent Component Analysis of Edge Information for Face RecognitionIndependent Component Analysis of Edge Information for Face Recognition
Independent Component Analysis of Edge Information for Face Recognition
 

Destacado

Hazard reduction strategies for flood vulnerable communities of anambra state...
Hazard reduction strategies for flood vulnerable communities of anambra state...Hazard reduction strategies for flood vulnerable communities of anambra state...
Hazard reduction strategies for flood vulnerable communities of anambra state...Alexander Decker
 
Supply Chain Visibility in Business Networks - Summary Charts - 11 MAR 2014
Supply Chain Visibility in Business Networks - Summary Charts - 11 MAR 2014Supply Chain Visibility in Business Networks - Summary Charts - 11 MAR 2014
Supply Chain Visibility in Business Networks - Summary Charts - 11 MAR 2014Lora Cecere
 
[Student Exchange Vietnam] Pre-Departure Guide - Life in Vietnam v8
[Student Exchange Vietnam] Pre-Departure Guide - Life in Vietnam v8[Student Exchange Vietnam] Pre-Departure Guide - Life in Vietnam v8
[Student Exchange Vietnam] Pre-Departure Guide - Life in Vietnam v8Student Exchange Vietnam
 
11.teaching aptitude of elementary and secondary level teacher educators
11.teaching aptitude of elementary and secondary level teacher educators11.teaching aptitude of elementary and secondary level teacher educators
11.teaching aptitude of elementary and secondary level teacher educatorsAlexander Decker
 
Consuming and Publishing Ordnance Survey Open Data with Open Source Software
Consuming and Publishing Ordnance Survey Open Data with Open Source SoftwareConsuming and Publishing Ordnance Survey Open Data with Open Source Software
Consuming and Publishing Ordnance Survey Open Data with Open Source SoftwareJoanne Cook
 
143715main process.of.invention
143715main process.of.invention143715main process.of.invention
143715main process.of.inventionGanesh Matsagar
 
Rixton Terms and Conditions
Rixton Terms and ConditionsRixton Terms and Conditions
Rixton Terms and ConditionsDeezer-Comps
 
Bhs eap supervisor orientation 2014
Bhs eap supervisor orientation 2014Bhs eap supervisor orientation 2014
Bhs eap supervisor orientation 2014pipkint101
 
[224] 번역 모델 기반_질의_교정_시스템
[224] 번역 모델 기반_질의_교정_시스템[224] 번역 모델 기반_질의_교정_시스템
[224] 번역 모델 기반_질의_교정_시스템NAVER D2
 
Performance Improvement of a Domestic Refrigerator Using Phase change Materia...
Performance Improvement of a Domestic Refrigerator Using Phase change Materia...Performance Improvement of a Domestic Refrigerator Using Phase change Materia...
Performance Improvement of a Domestic Refrigerator Using Phase change Materia...IOSR Journals
 
Eddie Antar PowerPoint
Eddie Antar PowerPointEddie Antar PowerPoint
Eddie Antar PowerPointeastonr89
 
Cambium networks pmp 450 ap spec sheet 091613
Cambium networks pmp 450 ap spec sheet 091613Cambium networks pmp 450 ap spec sheet 091613
Cambium networks pmp 450 ap spec sheet 091613Advantec Distribution
 
Li-Fi Technology - Would it be the next leader of telecommunication market?
Li-Fi Technology - Would it be the next leader of telecommunication market?Li-Fi Technology - Would it be the next leader of telecommunication market?
Li-Fi Technology - Would it be the next leader of telecommunication market?Jiyoon Jessie Jeong
 
Daniel Perez Colomar Xing Anei Redes Profesionales
Daniel Perez Colomar Xing Anei Redes ProfesionalesDaniel Perez Colomar Xing Anei Redes Profesionales
Daniel Perez Colomar Xing Anei Redes ProfesionalesDaniel Perez Colomar
 
Television / Movies :: Criminal Minds Season 6 Episode 13 The Thirteenth Step
Television / Movies :: Criminal Minds Season 6 Episode 13 The Thirteenth StepTelevision / Movies :: Criminal Minds Season 6 Episode 13 The Thirteenth Step
Television / Movies :: Criminal Minds Season 6 Episode 13 The Thirteenth Stepbashfulshopper843
 
One and One Makes One
One and One Makes OneOne and One Makes One
One and One Makes OneDave Stewart
 
Vertical Market Excellence: Your Path to Success
Vertical Market Excellence: Your Path to SuccessVertical Market Excellence: Your Path to Success
Vertical Market Excellence: Your Path to SuccessCA Nimsoft
 

Destacado (20)

Hazard reduction strategies for flood vulnerable communities of anambra state...
Hazard reduction strategies for flood vulnerable communities of anambra state...Hazard reduction strategies for flood vulnerable communities of anambra state...
Hazard reduction strategies for flood vulnerable communities of anambra state...
 
Supply Chain Visibility in Business Networks - Summary Charts - 11 MAR 2014
Supply Chain Visibility in Business Networks - Summary Charts - 11 MAR 2014Supply Chain Visibility in Business Networks - Summary Charts - 11 MAR 2014
Supply Chain Visibility in Business Networks - Summary Charts - 11 MAR 2014
 
[Student Exchange Vietnam] Pre-Departure Guide - Life in Vietnam v8
[Student Exchange Vietnam] Pre-Departure Guide - Life in Vietnam v8[Student Exchange Vietnam] Pre-Departure Guide - Life in Vietnam v8
[Student Exchange Vietnam] Pre-Departure Guide - Life in Vietnam v8
 
11.teaching aptitude of elementary and secondary level teacher educators
11.teaching aptitude of elementary and secondary level teacher educators11.teaching aptitude of elementary and secondary level teacher educators
11.teaching aptitude of elementary and secondary level teacher educators
 
Fifty questions with answers in aptitude
Fifty questions with answers in aptitudeFifty questions with answers in aptitude
Fifty questions with answers in aptitude
 
Consuming and Publishing Ordnance Survey Open Data with Open Source Software
Consuming and Publishing Ordnance Survey Open Data with Open Source SoftwareConsuming and Publishing Ordnance Survey Open Data with Open Source Software
Consuming and Publishing Ordnance Survey Open Data with Open Source Software
 
143715main process.of.invention
143715main process.of.invention143715main process.of.invention
143715main process.of.invention
 
Rixton Terms and Conditions
Rixton Terms and ConditionsRixton Terms and Conditions
Rixton Terms and Conditions
 
Bhs eap supervisor orientation 2014
Bhs eap supervisor orientation 2014Bhs eap supervisor orientation 2014
Bhs eap supervisor orientation 2014
 
[224] 번역 모델 기반_질의_교정_시스템
[224] 번역 모델 기반_질의_교정_시스템[224] 번역 모델 기반_질의_교정_시스템
[224] 번역 모델 기반_질의_교정_시스템
 
Pretest Chapter 24,25,26
Pretest Chapter 24,25,26Pretest Chapter 24,25,26
Pretest Chapter 24,25,26
 
Performance Improvement of a Domestic Refrigerator Using Phase change Materia...
Performance Improvement of a Domestic Refrigerator Using Phase change Materia...Performance Improvement of a Domestic Refrigerator Using Phase change Materia...
Performance Improvement of a Domestic Refrigerator Using Phase change Materia...
 
Eddie Antar PowerPoint
Eddie Antar PowerPointEddie Antar PowerPoint
Eddie Antar PowerPoint
 
Cambium networks pmp 450 ap spec sheet 091613
Cambium networks pmp 450 ap spec sheet 091613Cambium networks pmp 450 ap spec sheet 091613
Cambium networks pmp 450 ap spec sheet 091613
 
Li-Fi Technology - Would it be the next leader of telecommunication market?
Li-Fi Technology - Would it be the next leader of telecommunication market?Li-Fi Technology - Would it be the next leader of telecommunication market?
Li-Fi Technology - Would it be the next leader of telecommunication market?
 
Negotiable Instruments and BK
Negotiable Instruments and BKNegotiable Instruments and BK
Negotiable Instruments and BK
 
Daniel Perez Colomar Xing Anei Redes Profesionales
Daniel Perez Colomar Xing Anei Redes ProfesionalesDaniel Perez Colomar Xing Anei Redes Profesionales
Daniel Perez Colomar Xing Anei Redes Profesionales
 
Television / Movies :: Criminal Minds Season 6 Episode 13 The Thirteenth Step
Television / Movies :: Criminal Minds Season 6 Episode 13 The Thirteenth StepTelevision / Movies :: Criminal Minds Season 6 Episode 13 The Thirteenth Step
Television / Movies :: Criminal Minds Season 6 Episode 13 The Thirteenth Step
 
One and One Makes One
One and One Makes OneOne and One Makes One
One and One Makes One
 
Vertical Market Excellence: Your Path to Success
Vertical Market Excellence: Your Path to SuccessVertical Market Excellence: Your Path to Success
Vertical Market Excellence: Your Path to Success
 

Similar a 7.[46 53]similarity of inference face matching on angle oriented face recognition

Similarity of inference face matching on angle oriented
Similarity of inference face matching on angle orientedSimilarity of inference face matching on angle oriented
Similarity of inference face matching on angle orientedAlexander Decker
 
11.similarity of inference face matching on angle oriented
11.similarity of inference face matching on angle oriented11.similarity of inference face matching on angle oriented
11.similarity of inference face matching on angle orientedAlexander Decker
 
EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...
EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...
EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...IJECEIAES
 
WCTFR : W RAPPING C URVELET T RANSFORM B ASED F ACE R ECOGNITION
WCTFR : W RAPPING  C URVELET T RANSFORM  B ASED  F ACE  R ECOGNITIONWCTFR : W RAPPING  C URVELET T RANSFORM  B ASED  F ACE  R ECOGNITION
WCTFR : W RAPPING C URVELET T RANSFORM B ASED F ACE R ECOGNITIONcsandit
 
Comparative Analysis of Face Recognition Algorithms for Medical Application
Comparative Analysis of Face Recognition Algorithms for Medical ApplicationComparative Analysis of Face Recognition Algorithms for Medical Application
Comparative Analysis of Face Recognition Algorithms for Medical ApplicationAM Publications
 
Fourier mellin transform based face recognition
Fourier mellin transform based face recognitionFourier mellin transform based face recognition
Fourier mellin transform based face recognitioniaemedu
 
Fourier mellin transform based face recognition
Fourier mellin transform based face recognitionFourier mellin transform based face recognition
Fourier mellin transform based face recognitionIAEME Publication
 
Fourier mellin transform based face recognition
Fourier mellin transform based face recognitionFourier mellin transform based face recognition
Fourier mellin transform based face recognitionIAEME Publication
 
Coherence enhancement diffusion using robust orientation estimation
Coherence enhancement diffusion using robust orientation estimationCoherence enhancement diffusion using robust orientation estimation
Coherence enhancement diffusion using robust orientation estimationcsandit
 
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...IJCSEIT Journal
 
3-D Face Recognition Using Improved 3D Mixed Transform
3-D Face Recognition Using Improved 3D Mixed Transform3-D Face Recognition Using Improved 3D Mixed Transform
3-D Face Recognition Using Improved 3D Mixed TransformCSCJournals
 
Face Recognition using Improved FFT Based Radon by PSO and PCA Techniques
Face Recognition using Improved FFT Based Radon by PSO and PCA TechniquesFace Recognition using Improved FFT Based Radon by PSO and PCA Techniques
Face Recognition using Improved FFT Based Radon by PSO and PCA TechniquesCSCJournals
 
Gesture Recognition using Principle Component Analysis & Viola-Jones Algorithm
Gesture Recognition using Principle Component Analysis &  Viola-Jones AlgorithmGesture Recognition using Principle Component Analysis &  Viola-Jones Algorithm
Gesture Recognition using Principle Component Analysis & Viola-Jones AlgorithmIJMER
 
Happiness Expression Recognition at Different Age Conditions
Happiness Expression Recognition at Different Age ConditionsHappiness Expression Recognition at Different Age Conditions
Happiness Expression Recognition at Different Age ConditionsEditor IJMTER
 
Simplified Multimodal Biometric Identification
Simplified Multimodal Biometric IdentificationSimplified Multimodal Biometric Identification
Simplified Multimodal Biometric Identificationijeei-iaes
 
SVM Based Identification of Psychological Personality Using Handwritten Text
SVM Based Identification of Psychological Personality Using Handwritten Text SVM Based Identification of Psychological Personality Using Handwritten Text
SVM Based Identification of Psychological Personality Using Handwritten Text IJERA Editor
 
A Hybrid Approach to Recognize Facial Image using Feature Extraction Method
A Hybrid Approach to Recognize Facial Image using Feature Extraction MethodA Hybrid Approach to Recognize Facial Image using Feature Extraction Method
A Hybrid Approach to Recognize Facial Image using Feature Extraction MethodIRJET Journal
 
Image Registration for Recovering Affine Transformation Using Nelder Mead Sim...
Image Registration for Recovering Affine Transformation Using Nelder Mead Sim...Image Registration for Recovering Affine Transformation Using Nelder Mead Sim...
Image Registration for Recovering Affine Transformation Using Nelder Mead Sim...CSCJournals
 

Similar a 7.[46 53]similarity of inference face matching on angle oriented face recognition (20)

Similarity of inference face matching on angle oriented
Similarity of inference face matching on angle orientedSimilarity of inference face matching on angle oriented
Similarity of inference face matching on angle oriented
 
11.similarity of inference face matching on angle oriented
11.similarity of inference face matching on angle oriented11.similarity of inference face matching on angle oriented
11.similarity of inference face matching on angle oriented
 
EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...
EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...
EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...
 
WCTFR : W RAPPING C URVELET T RANSFORM B ASED F ACE R ECOGNITION
WCTFR : W RAPPING  C URVELET T RANSFORM  B ASED  F ACE  R ECOGNITIONWCTFR : W RAPPING  C URVELET T RANSFORM  B ASED  F ACE  R ECOGNITION
WCTFR : W RAPPING C URVELET T RANSFORM B ASED F ACE R ECOGNITION
 
Comparative Analysis of Face Recognition Algorithms for Medical Application
Comparative Analysis of Face Recognition Algorithms for Medical ApplicationComparative Analysis of Face Recognition Algorithms for Medical Application
Comparative Analysis of Face Recognition Algorithms for Medical Application
 
Jw2517421747
Jw2517421747Jw2517421747
Jw2517421747
 
Jw2517421747
Jw2517421747Jw2517421747
Jw2517421747
 
Fourier mellin transform based face recognition
Fourier mellin transform based face recognitionFourier mellin transform based face recognition
Fourier mellin transform based face recognition
 
Fourier mellin transform based face recognition
Fourier mellin transform based face recognitionFourier mellin transform based face recognition
Fourier mellin transform based face recognition
 
Fourier mellin transform based face recognition
Fourier mellin transform based face recognitionFourier mellin transform based face recognition
Fourier mellin transform based face recognition
 
Coherence enhancement diffusion using robust orientation estimation
Coherence enhancement diffusion using robust orientation estimationCoherence enhancement diffusion using robust orientation estimation
Coherence enhancement diffusion using robust orientation estimation
 
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...
 
3-D Face Recognition Using Improved 3D Mixed Transform
3-D Face Recognition Using Improved 3D Mixed Transform3-D Face Recognition Using Improved 3D Mixed Transform
3-D Face Recognition Using Improved 3D Mixed Transform
 
Face Recognition using Improved FFT Based Radon by PSO and PCA Techniques
Face Recognition using Improved FFT Based Radon by PSO and PCA TechniquesFace Recognition using Improved FFT Based Radon by PSO and PCA Techniques
Face Recognition using Improved FFT Based Radon by PSO and PCA Techniques
 
Gesture Recognition using Principle Component Analysis & Viola-Jones Algorithm
Gesture Recognition using Principle Component Analysis &  Viola-Jones AlgorithmGesture Recognition using Principle Component Analysis &  Viola-Jones Algorithm
Gesture Recognition using Principle Component Analysis & Viola-Jones Algorithm
 
Happiness Expression Recognition at Different Age Conditions
Happiness Expression Recognition at Different Age ConditionsHappiness Expression Recognition at Different Age Conditions
Happiness Expression Recognition at Different Age Conditions
 
Simplified Multimodal Biometric Identification
Simplified Multimodal Biometric IdentificationSimplified Multimodal Biometric Identification
Simplified Multimodal Biometric Identification
 
SVM Based Identification of Psychological Personality Using Handwritten Text
SVM Based Identification of Psychological Personality Using Handwritten Text SVM Based Identification of Psychological Personality Using Handwritten Text
SVM Based Identification of Psychological Personality Using Handwritten Text
 
A Hybrid Approach to Recognize Facial Image using Feature Extraction Method
A Hybrid Approach to Recognize Facial Image using Feature Extraction MethodA Hybrid Approach to Recognize Facial Image using Feature Extraction Method
A Hybrid Approach to Recognize Facial Image using Feature Extraction Method
 
Image Registration for Recovering Affine Transformation Using Nelder Mead Sim...
Image Registration for Recovering Affine Transformation Using Nelder Mead Sim...Image Registration for Recovering Affine Transformation Using Nelder Mead Sim...
Image Registration for Recovering Affine Transformation Using Nelder Mead Sim...
 

Más de Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

Más de Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Último

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 

Último (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 

7.[46 53]similarity of inference face matching on angle oriented face recognition

  • 1. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.1, 2011 Similarity of Inference Face Matching On Angle Oriented Face Recognition Naga Venkata Jagan Mohan Remani Research Scholar, Acharya Nagarjuna University Mobile: +91-9848957141 Email:mohanrnvj@gmail.com Subba Rao Rachakonda Professor in Dept of Science and Humanities Shri Vishnu Engineering College for Women, Bhimavaram-534202, Andhra Pradesh, India Mobile: +91-9440976619 Email:rsr_vishnu@svcw.edu.in Raja Sekhara Rao Kurra Principal, Konearu Laxmiah College of Engineering Vaddeswaram Guntur-522510, Andhra Pradesh, India Mobile: +91-9848452344 Email:rajasekhar.kurra@klce.ac.in Abstract Face recognition is one of the wide applications of image processing technique. In this paper complete image of face recognition algorithm is proposed. In the prepared algorithm the local information is extracted using angle oriented discrete cosine transforms and invokes certain normalization techniques. To increase the Reliability of the Face detection process, neighborhood pixel information is incorporated into the proposed method. Discrete Cosine Transform (DCT) are renowned methods are implementing in the field of access control and security are utilizing the feature extraction capabilities. But these algorithms have certain limitations like poor discriminatory power and disability to handle large computational load. The face matching classification for the proposed system is done using various distance measure methods like Euclidean Distance, Manhattan Distance and Cosine Distance methods and the recognition rate were compared for different distance measures. The proposed method has been successfully tested on image database which is acquired under variable illumination and facial expressions. It is observed from the results that use of face matching like various method gives a recognition rate are high while comparing other methods. Also this study analyzes and compares the obtained results from the proposed Angle oriented face recognition with threshold based face detector to show the level of robustness using texture features in the proposed face detector. It was verified that a face recognition based on textual features can lead to an efficient and more reliable face detection method compared with KLT (Karhunen Loeve Transform), a threshold face detector. Keywords: Angle Oriented, Cosine Similarity, Discrete Cosine Transform, Euclidean Distance, Face Matching, Feature Extraction, Face Recognition, Image texture features. 1. Introduction Many authors discussed the face recognition by comparing the face of human being with the database and identifying the features of image. Face Recognition has received considerable attention over past two decades, where variation caused by illumination is most significant factor that alerts the appearance of face Chellappa et al., 1995. The database of system consists of individual facial features along with their geometrical relations. So for the input taken the facial features are compared with the database. If a match is found the face of the person is said to be recognized. In this process we consider feature extraction capabilities of discrete cosine transform (DCT) and invoke certain normalization techniques which increase its robust face recognition. The face recognition falls in to two main categories, Chellappa et al., 1995; they are (i) feature-based and (ii) holistic. Feature-based approach to face recognition relies on detection and characterization of the individual facial features like eyes, nose and mouth etc, and their geometrical relationships. On the other hand, holistic approach to face recognition involves encoding of the entire facial image. Earlier works on face recognition as discussed by Ziad M.Hafed and Martin Levine 2001, Ting Shan et al 2006, are considered. Alaa Y. Taqa and Hamid A. Jalab 2010 are proposed color-based or texture-based skin detector approaches. In this paper we discussed a new computational approach that is converting the input image to database image using Angle orientation technique in section2. Section 3 deals with the mathematical definition of the discrete cosine transform its relationship to KLT and Euclidean Distance with Cosine Similarities. The basics of face recognition system using DCT that includes the details of proposed algorithm and discussion of various parameters which affect its performance are discussed in section 4. The experimental results of the proposed 46 | P a g e www.iiste.org
  • 2. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.1, 2011 system are highlighted in section 5.The conclusion and future perceptives are mentioned in section 6. 2. Angle Orientation First the input image is selected and compared with the database image. If input image size is not equivalent to database size, the input image is to be resized to match with the size of database image. We compare the pose of the image in both input and database images. If the input image is not at an angle of 900 we can’t compare the images; some authors Ziad. M. Hafed and Martine D. Levine (2001) used eye coordinates techniques to recognize such an image. In this approach one can identify the feature images of the faces even though they are angle oriented. If the input image angle is not 900, rotate the image to 900 and then apply normalization technique such as geometric and illumination technique. Recognition of an image by using rotational axis is easy to achieve or recognize the face. When the input image rotates from horizontal axis to vertical axis the face rotates anti-clock wise and the face appears in which it is the same as the database pose, then the object is recognized. Similarly, when the input image rotates from vertical axis to horizontal axis the face rotates clock wise and the face appears in which it is the same as the database pose, then the object is recognized. Therefore if input image is Angle oriented, the pose is changed or Angle is altered using rotational axis and then compared. The Two types of angle rotations, clock wise and Anti-clock wise, with different angles are given in the images of Figure.2.1 and Figure 2.2. Figure2.1: Angle Rotation – Anti Clock Wise Direction Figure2.2: Angle Rotation – Clock Wise Direction 47 | P a g e www.iiste.org
  • 3. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.1, 2011 3. Mathematical Methods 3.0. Discrete Cosine Transform Discrete cosine transform (DCT) has been used as a feature extraction step in various studies on face recognition. Until now, discrete cosine transforms have been performed either in a holistic appearance-based sense [7], or in a local appearance-based sense ignoring the spatial information to some extent during the classification step by feeding some kind of neural networks with local DCT coefficients or by modelling them with some kind of statistical tools. Ahmed, Natarajan, and Rao (1974) first introduced the discrete cosine transform (DCT) in the early seventies. Ever since, the DCT has grown in popularity, and several variants have been proposed (Rao and Yip, 1990). In particular, the DCT was categorized by Wang (1984) into four slightly different transformations named DCT-I, DCT-II, DCT-III, and DCT-IV. Of the four classes we concern with DCT-II suggested by Wang, in this paper. y k, 1 w k x n cos ,k 1, … , N (3.0.1) , 1 Where √ , 2 ! √ (3.0.2) N is the length of x; x and y of the same size. If x is a matrix, DCT transforms its columns. The series is indexed from n = 1 and k = 1 instead of the usual n = 0 and k = 0 because vectors run from 1 to N instead of 0 to N- 1.Using the formulae (3.0.1) and (3.0.2) we find the feature vectors of an input sequence using discrete cosine transform. 3.1. Taxonomy of Face Matching Methods The main objective of matching methods for measure is to define a value that allows the comparison of feature vectors (reduced vectors in discrete cosine transform frameworks). With this measure the identification of a new feature vector will be possible by searching the most similar vector into the database. This is the well-known nearest-neighbor method. One way to define similarity is to use a measure of distance, d(x, y), in which the similarity between vectors, S(x, y) is inverse to the distance measure. In the next sub-sections distance measures are shown Euclidean Distance, Manhattan Distance and Cosine similarity. 3.1.0. Manhattan Distance Initially, to recognizing a specific input image, the system compares the image’s feature vector to feature vectors of the database image using a Manhattan distance which is used shortest distance classifier (Paul E, Black, 1987). If the feature vector of the probe is x and that of a database face is y, where x=(x1, x2, x3….xn) and y= (y1, y2….., yn). The Manhattan distance, d1, between two vectors x, y in an n-dimensional real vector space with fixed Cartesian coordinate system, is the sum of the lengths of the projections of the line segment between the points onto the coordinate axes. Manhattan Distance(x, y) = ", # ∑' ( |" & #| (3.1.0) 3.1.1. Euclidean Distance: On the other hand, for recognizing a particular input image, the system compares the image’s feature vector to the feature vectors of the database image using a Euclidean distance nearest-neighbor classifier (Duda and Hart, 1973). If the feature vector of the probe is x and that of a database face is y, where x=(x1, x2, x3….xn) and y= (y1, y2…... yn). The position of a point in a Euclidean n-space is a Euclidean vector. So, x and y are Euclidean vectors, starting from the origin of the space, and their tips indicate two points. The Euclidean norm, or Euclidean length, or magnitude of a vector measures the length of the vector. Euclidean Distance (x, y) =√∑' "&# (3.1.1) 48 | P a g e www.iiste.org
  • 4. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.1, 2011 3.1.2. Cosine Similarity Another face matching distance classifier method where interested is cosine similarity and can be calculated as follows. For any two given vectors x and y, the cosine similarity, θ, is represented using a dot product and magnitude as Cosine Similarity (x, y) = (xTy/||x||.||y||) (3.1.2) For face matching, the attribute vectors x and y are usually the term frequency vectors of the images. The cosine similarity can be seen as a method of normalizing image length during comparison. The resulting similarity ranges from −1 meaning exactly opposite, to 1 meaning exactly the same, with 0 usually indicating independence, and in-between values indicating intermediate similarity or dissimilarity. 3.2. Relationship with KLT Karhunen-Loeve Transform (KLT) is a unitary transform that diagonalizes the covariance or the correlation matrix of a discrete random sequence. Also it is considered as an optimal transform among all discrete transforms based on a number of criteria. It is, however, used infrequently as it is dependent on the statistics of the sequence i.e. when the statistics changes so as the KLT. Because of this signal dependence, generally it has no fast algorithm. Other discrete transforms such as cosine transform (DCT) even though suboptimal; have been extremely popular in video coding. The principal reasons for the heavy usage of DCT are that it is signal independent and it has fast algorithms resulting in efficient implementation. In spite of this, KLT has been used as a bench mark in evaluating the performance of other transforms. Furthermore, DCT closely approximates the compact representation ability of the KLT, which makes it a very useful tool for signal representation both in terms of information packing and in terms of computational complexity due to its data independent nature. 4. Basic Algorithm for Angle Oriented Face Recognition using DCT The basic algorithm for Angle Oriented Face Recognition discussed in this paper is depicted in figure 3.1. The algorithm involves both face normalization and Recognization. Mathew Turk and Alex Pentland [15] expanded the idea of face recognition. It can be seen in the figure 3.1 that the system receives input image of size N x N and is compared with the size of database image, if the input image and database image are not equal, is to be resized the image. While implementing an image processing solution, the selection of suitable illumination is a crucial element in determining the quality of the captured images and can have a huge effect on the subsequent evaluation of the image. If the pose of the selected image is required to rotate to obtain the database image rotate the face with an angle θ until it matches with the database image. The rotation of the image may be bidirectional, clock wise or anti-clock wise, depending on the selected pose of the image. Once a normalized face obtained, it can be compared with other faces, under the same nominal size, orientation, position, and illumination conditions. This comparison is based on features extracted using DCT. The input images are divided into N x N blocks to define the local regions of processing. The N x N two-dimensional Discrete Cosine Transform (DCT) is used to transform the data into the frequency domain. Thereafter, statistical operators that calculate various functions of spatial frequency in the block are used to produce a block-level DCT coefficient. To recognize a particular input image or face, the system compares this image feature vector to the feature vector of database faces using a Euclidean Distance nearest neighbor classifier (Duda and Fart, 1973), Manhattan distance and Cosine Similarity. After obtaining the Manhattan Distance or Euclidean Distances or Cosine Similarity for N x N Matrix one needs to find the averages of the each column of the matrix, and then find the average of all these averages, if the overall average is negative we may say there is a match between the input image and database image. 49 | P a g e www.iiste.org
  • 5. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.1, 2011 Figure 4.1: Angle Oriented Face Recognition using DCT 5. Experimental Results This section is focused on the Discrete Cosine-based face recognition systems using the projection methods and similarity measures previously presented. Two different face image databases were used in order to test the recognition ability of each system image database of the Shree Vasista Educational Society. 5.1. Clock wise Rotation The experimental Results are calculated for various angles of θ in clock wise direction using the three methods Euclidean distance and Cosine Similarity. The mean recognition values of three methods are measured. Out of a sample of 13 observations 12 are recognized. The percentage of recognition for DCT with Manhattan distance is 92.30%. 50 | P a g e www.iiste.org
  • 6. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.1, 2011 60 40 20 0 -20 1 2 3 4 5 6 7 8 9 10 11 12 13 Euclidean Distance -40 Cosine Similarity -60 Manhattan Distance -80 -100 -120 -140 -160 Figure 5.1 Mean values for Clock Wise Rotation The obtained data was presented in Figure 5.1. In Figure 5.1 the red line indicates the recognition level for Cosine Similarity and the blue gives Euclidean distance and green indicates Manhattan distance. It can be observed that the recognition level of input image in DCT with Manhattan distance is very high. It is also noticed that as the sample size is increasing the recognition level is also increasing in DCT with Manhattan distance while comparing with others. 5.2. Anti-Clock Wise Rotation The same methodology as that of clock wise rotation is maintained in anti-clock wise rotation, as well. The comparisons of mean recognition values are Manhattan distance; Euclidean distance and Cosine Similarity for the both methods are calculated for several values of θ using Anti-Clock wise direction. In this method also Manhattan distance, Euclidean distance has shown high reliability of recognition level. In Figure 5.2 the results are shown graphically, we can find the rapid decrease in the graph for Manhattan distance, Euclidean distance and Cosine Similarity which showed with blue colored line indicates the high reliability of recognition of the input image. 60 40 20 0 1 2 3 4 5 6 7 8 9 10 11 12 13 Manhattan Distance -20 Euclidean Distance -40 Cosine Distance -60 -80 -100 -120 Figure 5.2: Mean values for Anti-clock Rotation 5.3. Comparison between DCT and KLT The DCT and KLT techniques are experimented under standard execution environment by considering the synthesized data of the students of Sri Vishnu Educational Society. The Percentage of recognition level in both the methods of experimental results is shown in Table 4.3.1. The phenomenal growth of DCT reliability is observed when compared with KLT. 51 | P a g e www.iiste.org
  • 7. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.1, 2011 The Performance of recognition level of 10000 records for both the methods of experimental results is given in Figure 4.3.2. The graph clearly shows that the reliability performance of DCT is constant increasing with respect to KLT while the number of records is increased. S. No. No. of records Performance in DCT Performance in KLT 1 1000 91.46 65.42 2 2000 92.01 64.23 3 3000 93.25 52.15 4 4000 94.12 54.12 5 5000 94.62 53.10 6 6000 96.5 52.63 7 7000 97.23 51.71 8 8000 97.56 50.46 9 9000 98.46 50.04 10 10000 98.89 54.13 Table 5.3.1: Performance Records in DCT and KLT 120 100 80 60 Performance in DCT Performance in KLT 40 20 0 1 2 3 4 5 6 7 8 9 10 Figure 5.3.2: Bar Chart for Performance in DCT and KLT 6. Conclusion and Future Perspectives Holistic approach to face recognition is used which has involved in encoding the entire facial image. An angle oriented algorithm which can be rotated either clock wise or anti clock wise directions is proposed and successfully implemented through the experimental results. The algorithm is proposed with the mean values of the Euclidian classifiers. It is proved that the proposed angle oriented discrete cosine transform increases the reliability of the face detection when compared with the KLT. This approach has applications in Intrusion detection and new technologies like Biometric systems etc. The authors view a random variable which indicates the magnitude of the recognition level of an image which will follow some probability distribution. References Alaa Y.Taqa and Hamid A.Jalab (2010), “Increasing the Reliability of Fuzzy Inference System Skin Detector” American Journal of Applied Sciences 7(8):1129-1138. Alaa Y.Taqa and Hamid A.Jalab (2010),”Increasing the reliability of skin detectors” Scientific Research and Essays Vol.5 (17), P.P.2480-2490. 52 | P a g e www.iiste.org
  • 8. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.1, 2011 Almas Anjum, M., and Yunus Javed M (2006), “Face Images Feature Extraction Analysis for Recognition in Frequency Domain” Proc. of the 6th WSEAS Int. Conf. on Signal Processing, Computational Geometry & Artificial Vision, Elounda, Greece. Annadurai S and Saradha A (2004), “Discrete Cosine Transform Based Face Recognition Using Linear Discriminate Analysis” Proceedings of International Conference on Intelligent Knowledge Systems. Chellappa R and Wilson C and Sirohey S (1995), Human and machine recognition of faces: A survey. In Proc. IEEE, 83(5):705-740. Duda R O and Hart P E (1973), Pattern Classification and Scene Analysis. Wiley: New York, NY. Ekenel H K and Stiefelhagen R (2005), “Local Appearance based Face Recognition Using Discrete Cosine Transform”, EUSIPCO, Antalya, Turkey. Manhattan distance Paul E Black (1987), Dictionary of Algorithms and Data Structures, NIST. Nefian A (1999), “A Hidden Markov Model-based Approach for Face Detection and Recognition“, PhD thesis, Georgia Institute of Technology. Pan Z and Bolouri H (1999), “High speed face recognition based on discrete cosine transforms and neural networks”, Technical report, University of Hertfordshire, UK. Rao K and Yip P (1990), Discrete Cosine Transform-Algorithm, Advantages, Applications. Academic: New York, N.Y. Sanderson and Paliwal K K (2003), “Features for robust face based identity verification”, Signal processing, 83(5). Scott W L (2003), “Block-level Discrete Cosine Transform Coefficients for Autonomic Face Recognition”, P.hd thesis, Louisiana State University, USA. Shin D and Lee H S and Kim D (2008), “Illumination-robust face recognition using ridge regressive bilinear models”, Pattern Recognition Letters, Vol.29, no.1, P.P, 49-58. Ting Shan and Brain Lovell C and Shaokang Chen (2006), “Face Recognition to Head Pose from One sample Image” proceedings of the 18th International conference on Pattern Recognition. Turk M and Pentland A (1991), “Eigen faces for recognition”, Journal of Cognitive Neuroscience, vol.3, no.1, pp.71-86. Wang Z (1984), Fast algorithms for the discrete W transform and for the Discrete Fourier Transform. IEEE Trans. Acoust., Speech, and Signal Proc., 32:803-816. Ziad Hafed M and Martin Levine (2001), “Face Recognition using Discrete Cosine Transform”, International Journal of Computer Vision 43(3), 167-188. 53 | P a g e www.iiste.org