FACE RECOGNITION USING FEATURE EXTRACTION AND NEURO-FUZZY TECHNIQUES
|
|
|
- Osborne Whitehead
- 9 years ago
- Views:
Transcription
1 International Journal of Electronics and Computer Science Engineering 2048 Available Online at ISSN : FACE RECOGNITION USING FEATURE EXTRACTION AND NEURO-FUZZY TECHNIQUES Ritesh Vyas 1, Gourav Garg 2 1 M.tech Student, Electronics Engineering Department,YMCAUST, Faridabad, Haryana 1 [email protected] 2 M.tech Student, ECE Department,Bhai Gurdas Institute of Engg. & Technology, Sangrur, Punjab 2 [email protected] Abstract- Face is a primary focus of attention in social intercourse, playing a major role in conveying identity and emotion. The human ability to recognize faces is remarkable. People can recognize thousands of faces learned throughout their lifetime and identify familiar faces at a glance even after years of separation. This skill is quite robust, despite large changes in the visual stimulus due to viewing conditions, expression, aging, and distractions such as glasses, beards or changes in hair style. In this work, a system is designed to recognize human faces depending on their facial features. Also to reveal the outline of the face, eyes and nose, edge detection technique has been used. Facial features are extracted in the form of distance between important feature points. After normalization, these feature vectors are learned by artificial neural network and used to recognize facial image. Keywords-- Image processing, Artificial neural network, Edge detection, Feature Extraction. I. INTRODUCTION A problem of personal verification and identification is an actively growing area of research. Face, Voice, Lip Movements, Hand geometry, Odours, Gait, Iris, Retina, Fingerprint are the most commonly used authentication methods. All of these behavioural and psychological characteristics of a person are called biometrics. The biometrics have a significant advantage over the traditional authentication techniques due to the biometric characteristics of individuals are not easily transferable, are unique of every person, and cannot be lost, stolen or broken. Face Recognition is one of the methods to identify the features of face of every individual. Research in this area has been conducted for more than 30 years, using a pre-stored image database, the face recognition system is able to identify or verify one or more persons in the database. The face is recognized by considering features viz., eye distance, nose distance, lip distance etc.. Thai Hoang Le[1] presented Applying Artificial Neural Networks for Face Recognition. That paper introduces some novel models for all steps of a face recognition system. In the step of face detection, they proposed hybrid model combining AdaBoost and Artificial Neural Network (ABANN) to solve the process efficiently. Shamla Mantri and Kalpana Bapat [2] proposed Neural Network Based Face Recognition Using Matlab. In this paper, they proposed to label a Self-Organizing Map (SOM) to measure image similarity. The SOM method was trained on images from one database. The novelty of that work comes from the integration of Images from input database, Training and Mapping. Aborisade, D.O [3] proposed Novel Fuzzy logic Based Edge Detection Technique. This paper is based on the development of a fuzzy logic based edge detection technique in digital images. The proposed technique used three linear spatial filters to generate three edge strength values at each pixel of a digital image through spatial convolution process. Mandeep Singh Sandhu, et al. [4] presented Image Edge Detection by Using Rule Based
2 FACE RECOGNITION USING FEATURE EXTRACTION AND NEURO-FUZZY TECHNIQUES Fuzzy Classifier. In that research work Fuzzy image processing was used for edge detection, which was a collection of fuzzy logic and image processing that understand, represent and process the images as fuzzy sets. Face recognition is a visual pattern recognition problem. In detail, a face recognition system with the input of an arbitrary image will search in database to output people s identification in the input image. Advanced image processing or computer vision techniques will enhance the quality of symbolization of faces in video corpus. Robust face detection and tracking in videos is still challenging. The advantage of using neural networks for face detection is the feasibility of training a system to capture the complex class conditional density of face patterns. However, one drawback is that the network architecture has to be extensively tuned (number of layers, number of nodes, learning rates, etc.) to get exceptional performance. Many research efforts have been made in face detection, especially for surveillance and biometrics. Broadly, face recognition methods can be categorized into two groups: feature-based and appearancebased. In feature-based approach, a set of local features is extracted from the image such as eyes; nose, mouth etc. and they are used to classify the face. The major benefit of this approach is its relative robustness to variations in illumination, contrast, and small amounts of out-of-plane rotation. The appearance-based approaches use the entire image as the pattern to be classified, thus using all information available in the image. However, they tend to be more sensitive to image variations. In this paper, a system has been designed which is based on edge detection and feature extraction. A general block diagram is shown below: image Edge Detection Face Outline Feature Extraction Feature Normalization Feature vector Artificial Neural Network Training Testing of Neural Network with test feature vector Enrolled users Feature Matching Face ID Figure 1. Block diagram II. EDGE DETECTION An edge is sharp change in intensity of an image. If the edges in an image are identified accurately, all the objects are located and their basic properties such as area, perimeter and shape can be measured. In this paper, Uncertainty of image processing is handled within the frame work of fuzzy logic. Figure 2 shows the essential components of fuzzy logic system. The FIS designed in this thesis is given four inputs and one output.. The four inputs P1, P2, P3 and P4 are the four pixel values of the window mask used. The triangular membership functions are used both for the inputs and the output.
3 IJECSE,Volume1,Number 4 Ritesh Vyas and Gourav Garg 2050 A. Design of FIS for edge detection Figure 2. Fuzzy logic system Two fuzzy sets are used for the input Black and White and three fuzzy sets are used for the output. Fuzzy sets for input and output variables are designed as shown below: Figure 3. Fuzzy sets of input pixels (P1-P4) Figure 4. Fuzzy set of output pixel P4 out
4 FACE RECOGNITION USING FEATURE EXTRACTION AND NEURO-FUZZY TECHNIQUES Rules for the FIS are enlisted in the form of a matrix in Table 1. Table 1. Fuzzy rule base Fuzzy Inputs Fuzzy Outputs P1 P2 P3 P4 P4_out B B B B B B B B W E B B W B E B B W W E B W B B E B W B W E B W W B E B W W W W W B B B E W B B W E W B W B E W B W W E W W B B E W W B W E W W W B E W W W W W B. Results of Edge Detection Initially, the facial image was captured in true colour format. But it is so large, the process of extracting features spent a lot of times and memory space. Therefore the experiments were done with grayscale image with 256 gray levels. Following are the results of edge detection algorithm using FIS. From this edge detected image, we can extract the features.
5 IJECSE,Volume1,Number 4 Ritesh Vyas and Gourav Garg 2052 Figure 5(a). Original image Figure 5(b). Grayscale equivalent Figure 5(c). Edges Detected III. FEATURE EXTRACTION The task of the feature extraction and selection methods is to obtain the most relevant information from the original data and represent that information in a lower dimensionality space. The goal is to select, among all the available features, those that will perform better. In this paper, following 15 features have been used, all the features are in the form of distance. Feature 1: width of nose Feature 2: left eye to right eye Feature 3: width of mouth Feature 4: left eye to left side of nose Feature 5: right eye to right side of nose Feature 6: left side of nose to right side of mouth Feature 7: right side of nose to left side of mouth Feature 8: left eye to middle of nose Feature 9: right eye to middle of nose Feature 10: vertical distance from mouth to nose Feature 11: horizontal distance from left edge of face to left side of nose Feature 12: horizontal distance from right edge of face to right side of nose Feature 13: horizontal distance from left edge of face to left side of mouth Feature 14: horizontal distance from right edge of face to right side of mouth Feature 15: vertical distance from eye to nose The value of feature vector represents absolute distance between feature points. For example, let the left eye(x,,y,) and middle of nose(x,,y,). Then, their absolute distance is calculated by fe( 8) = ( X Y X 1) + ( Y2 1)
6 FACE RECOGNITION USING FEATURE EXTRACTION AND NEURO-FUZZY TECHNIQUES IV. FEATURE NORMALIZATION Since it is not possible to get the facial image as same size all the time, though he is same person, therefore, the feature vector has to be normalized so as not to be sensitive of the size. Feature vectors are represented using fuzzy linguistic variables. In this work, fuzzy linguistic variable concept has been proposed to settle above problems in representing feature vector. Figure 6. Fuzzy linguistic variable and membership function Table 2. Real Value of Feature Vector Table 3. Feature vector represented as fuzzy linguistic variables fe1= fe2= fe3= fe4= fe5= fe6= fe7= fe8= fe9= fe10= fe11= fe12= fe13= fe14= fe15= fe1= fe2= fe3= fe4= fe5= fe6= fe7= fe8= fe9= fe10= fe11= fe12= fe13= fe14= fe15=
7 IJECSE,Volume1,Number 4 Ritesh Vyas and Gourav Garg 2054 V. RECOGNIZING FACIAL IMAGE After extracting feature vector having 15 elements, a face pattern recognizer has been designed which learns relationships between features using 3-layered artificial neural network system. Figure 7. shows the architecture of the face pattern recognizer. Figure 7. Neural network architecture Face patterns are learned by Error Back Propagation Algorithm[7]. A Back Propagation network learns by example. You give the algorithm examples of what you want the network to do and it changes the network s weights so that, when training is finished, it will give you the required output for a particular input. The input and its corresponding target are called a Training Pair. Back Propagation networks are ideal for simple Pattern Recognition and Mapping Tasks. As just mentioned, to train the network you need to give it examples of what you want the output you want (called the Target) for a particular input. The training using Back Propagation Algorithm involves four stages: 1. Initialization of weights. 2. Feed forward. 3. Back Propagation of errors. 4. Updating of weights and biases. VI. EXPERIMENTS AND RESULTS A neural network model is used consisting of 15 input units, 25 hidden units and 3 output units, and is fully connected. There is one input element for each feature. Output unit represents the binary equivalent of the enrolled faces. Back propagation algorithm has been used for learning of the neural network. 5 iterations of training and learning are employed. Table 4 shows the data used for experiments. Figure 8 shows the performance curve for the neural network training. After training, the neural network is tested for the test feature vector. The test feature vector from any enrolled user is given as input to the pattern recognizer network. At the output, the network gives the binary equivalent number of the enrolled user. In this experiment, the neural network has been trained for faces of 5 persons and could recognize all persons correctly.
8 FACE RECOGNITION USING FEATURE EXTRACTION AND NEURO-FUZZY TECHNIQUES Table 4. Input data and target output S.No. Image Corresponding Feature vector Output/Target (binary of image no.)
9 IJECSE,Volume1,Number 4 Ritesh Vyas and Gourav Garg 2056 Figure 8. Performance plot for neural network training VII. CONCLUSION We have developed a method to extract feature vector that is very important to recognize facial image. We used edge detection technique to reveal the outline of the face. And then, we found other facial features using facial outline and eyes location. So, we got a feature vector having 15 elements. We proposed fuzzy linguistic variable to settle normalization of them. We design a face pattern recognizer which learns relationships between facial features using 3-layered artificial neural network system. It was learned faces of 5 persons and could recognize all persons correctly. VIII. REFERENCES [1] Thai Hoang Le, (2011) Research Article Applying Artificial Neural Networks for Face Recognition, Hindawi Publishing Corporation, Advances in Artificial Neural Systems, Volume 2011, Article ID , 16 pages, doi: /2011/ [2] Shamla Mantri & Kalpana Bapat, (2011) Neural Network Based Face Recognition Using Matlab, IJCSET, Feb 2011, Vol 1, Issue 1, 6-9. [3] Aborisade, D.O, (2011) Novel Fuzzy logic Based Edge Detection Technique, International Journal of Advanced Science and Technology Vol. 29, April, [4] Mandeep Singh Sandhu, Vikram Mutneja & Nishi, (2011) Image Edge Detection by Using Rule based Fuzzy Classifier, (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 2 (5), 2011, [5] Kyoung-Man Lim, Young-Chul Sim and Kyung-Wan Oh, A Face Recognition System Using Fuzzy Logic and Artificial Neural Network, Artificial Intelligence Research Lab., Department of Computer Science, SoGang Univ., C.P.O.BOX 1142 Seoul , Korea. [6] Y. Kuo, C. Lee, and C. Liu, A New Fuzzy Edge Detection Method for image Enhancement, IEEE Inter. Conf. on Fuzzy Systems, 1997, pp [7] Introduction to Fuzzy Logic using MATLAB by S. N. Sivanandam, S. Sumathi and S. N. Deepa.
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION Saurabh Asija 1, Rakesh Singh 2 1 Research Scholar (Computer Engineering Department), Punjabi University, Patiala. 2 Asst.
International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014
Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. [email protected]
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA
Face Recognition For Remote Database Backup System
Face Recognition For Remote Database Backup System Aniza Mohamed Din, Faudziah Ahmad, Mohamad Farhan Mohamad Mohsin, Ku Ruhana Ku-Mahamud, Mustafa Mufawak Theab 2 Graduate Department of Computer Science,UUM
Automatic Detection of PCB Defects
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 6 November 2014 ISSN (online): 2349-6010 Automatic Detection of PCB Defects Ashish Singh PG Student Vimal H.
Analecta Vol. 8, No. 2 ISSN 2064-7964
EXPERIMENTAL APPLICATIONS OF ARTIFICIAL NEURAL NETWORKS IN ENGINEERING PROCESSING SYSTEM S. Dadvandipour Institute of Information Engineering, University of Miskolc, Egyetemváros, 3515, Miskolc, Hungary,
FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
FPGA Implementation of Human Behavior Analysis Using Facial Image
RESEARCH ARTICLE OPEN ACCESS FPGA Implementation of Human Behavior Analysis Using Facial Image A.J Ezhil, K. Adalarasu Department of Electronics & Communication Engineering PSNA College of Engineering
Colour Image Segmentation Technique for Screen Printing
60 R.U. Hewage and D.U.J. Sonnadara Department of Physics, University of Colombo, Sri Lanka ABSTRACT Screen-printing is an industry with a large number of applications ranging from printing mobile phone
HANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT
International Journal of Scientific and Research Publications, Volume 2, Issue 4, April 2012 1 HANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT Akhil Gupta, Akash Rathi, Dr. Y. Radhika
Image Processing Based Automatic Visual Inspection System for PCBs
IOSR Journal of Engineering (IOSRJEN) ISSN: 2250-3021 Volume 2, Issue 6 (June 2012), PP 1451-1455 www.iosrjen.org Image Processing Based Automatic Visual Inspection System for PCBs Sanveer Singh 1, Manu
Low-resolution Image Processing based on FPGA
Abstract Research Journal of Recent Sciences ISSN 2277-2502. Low-resolution Image Processing based on FPGA Mahshid Aghania Kiau, Islamic Azad university of Karaj, IRAN Available online at: www.isca.in,
Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks
Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks Ph. D. Student, Eng. Eusebiu Marcu Abstract This paper introduces a new method of combining the
Keywords image processing, signature verification, false acceptance rate, false rejection rate, forgeries, feature vectors, support vector machines.
International Journal of Computer Application and Engineering Technology Volume 3-Issue2, Apr 2014.Pp. 188-192 www.ijcaet.net OFFLINE SIGNATURE VERIFICATION SYSTEM -A REVIEW Pooja Department of Computer
Taking Inverse Graphics Seriously
CSC2535: 2013 Advanced Machine Learning Taking Inverse Graphics Seriously Geoffrey Hinton Department of Computer Science University of Toronto The representation used by the neural nets that work best
Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies
Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com Image
Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
The Implementation of Face Security for Authentication Implemented on Mobile Phone
The Implementation of Face Security for Authentication Implemented on Mobile Phone Emir Kremić *, Abdulhamit Subaşi * * Faculty of Engineering and Information Technology, International Burch University,
An Analysis on Density Based Clustering of Multi Dimensional Spatial Data
An Analysis on Density Based Clustering of Multi Dimensional Spatial Data K. Mumtaz 1 Assistant Professor, Department of MCA Vivekanandha Institute of Information and Management Studies, Tiruchengode,
An Algorithm for Classification of Five Types of Defects on Bare Printed Circuit Board
IJCSES International Journal of Computer Sciences and Engineering Systems, Vol. 5, No. 3, July 2011 CSES International 2011 ISSN 0973-4406 An Algorithm for Classification of Five Types of Defects on Bare
KNOWLEDGE-BASED IN MEDICAL DECISION SUPPORT SYSTEM BASED ON SUBJECTIVE INTELLIGENCE
JOURNAL OF MEDICAL INFORMATICS & TECHNOLOGIES Vol. 22/2013, ISSN 1642-6037 medical diagnosis, ontology, subjective intelligence, reasoning, fuzzy rules Hamido FUJITA 1 KNOWLEDGE-BASED IN MEDICAL DECISION
Multimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD
DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD P.N.Ganorkar 1, Kalyani Pendke 2 1 Mtech, 4 th Sem, Rajiv Gandhi College of Engineering and Research, R.T.M.N.U Nagpur (Maharashtra),
A Dynamic Approach to Extract Texts and Captions from Videos
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals Chun Lei He, Ping Zhang, Jianxiong Dong, Ching Y. Suen, Tien D. Bui Centre for Pattern Recognition and Machine Intelligence,
Index Terms: Face Recognition, Face Detection, Monitoring, Attendance System, and System Access Control.
Modern Technique Of Lecture Attendance Using Face Recognition. Shreya Nallawar, Neha Giri, Neeraj Deshbhratar, Shamal Sane, Trupti Gautre, Avinash Bansod Bapurao Deshmukh College Of Engineering, Sewagram,
2. IMPLEMENTATION. International Journal of Computer Applications (0975 8887) Volume 70 No.18, May 2013
Prediction of Market Capital for Trading Firms through Data Mining Techniques Aditya Nawani Department of Computer Science, Bharati Vidyapeeth s College of Engineering, New Delhi, India Himanshu Gupta
Mouse Control using a Web Camera based on Colour Detection
Mouse Control using a Web Camera based on Colour Detection Abhik Banerjee 1, Abhirup Ghosh 2, Koustuvmoni Bharadwaj 3, Hemanta Saikia 4 1, 2, 3, 4 Department of Electronics & Communication Engineering,
Automatic Extraction of Signatures from Bank Cheques and other Documents
Automatic Extraction of Signatures from Bank Cheques and other Documents Vamsi Krishna Madasu *, Mohd. Hafizuddin Mohd. Yusof, M. Hanmandlu ß, Kurt Kubik * *Intelligent Real-Time Imaging and Sensing group,
Template-based Eye and Mouth Detection for 3D Video Conferencing
Template-based Eye and Mouth Detection for 3D Video Conferencing Jürgen Rurainsky and Peter Eisert Fraunhofer Institute for Telecommunications - Heinrich-Hertz-Institute, Image Processing Department, Einsteinufer
Efficient on-line Signature Verification System
International Journal of Engineering & Technology IJET-IJENS Vol:10 No:04 42 Efficient on-line Signature Verification System Dr. S.A Daramola 1 and Prof. T.S Ibiyemi 2 1 Department of Electrical and Information
Credit Card Fraud Detection Using Self Organised Map
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 13 (2014), pp. 1343-1348 International Research Publications House http://www. irphouse.com Credit Card Fraud
Visibility optimization for data visualization: A Survey of Issues and Techniques
Visibility optimization for data visualization: A Survey of Issues and Techniques Ch Harika, Dr.Supreethi K.P Student, M.Tech, Assistant Professor College of Engineering, Jawaharlal Nehru Technological
Classification of Engineering Consultancy Firms Using Self-Organizing Maps: A Scientific Approach
International Journal of Civil & Environmental Engineering IJCEE-IJENS Vol:13 No:03 46 Classification of Engineering Consultancy Firms Using Self-Organizing Maps: A Scientific Approach Mansour N. Jadid
COMPARISON OF OBJECT BASED AND PIXEL BASED CLASSIFICATION OF HIGH RESOLUTION SATELLITE IMAGES USING ARTIFICIAL NEURAL NETWORKS
COMPARISON OF OBJECT BASED AND PIXEL BASED CLASSIFICATION OF HIGH RESOLUTION SATELLITE IMAGES USING ARTIFICIAL NEURAL NETWORKS B.K. Mohan and S. N. Ladha Centre for Studies in Resources Engineering IIT
A secure face tracking system
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 10 (2014), pp. 959-964 International Research Publications House http://www. irphouse.com A secure face tracking
An Energy-Based Vehicle Tracking System using Principal Component Analysis and Unsupervised ART Network
Proceedings of the 8th WSEAS Int. Conf. on ARTIFICIAL INTELLIGENCE, KNOWLEDGE ENGINEERING & DATA BASES (AIKED '9) ISSN: 179-519 435 ISBN: 978-96-474-51-2 An Energy-Based Vehicle Tracking System using Principal
Efficient Attendance Management: A Face Recognition Approach
Efficient Attendance Management: A Face Recognition Approach Badal J. Deshmukh, Sudhir M. Kharad Abstract Taking student attendance in a classroom has always been a tedious task faultfinders. It is completely
Artificial Neural Networks are bio-inspired mechanisms for intelligent decision support. Artificial Neural Networks. Research Article 2014
An Experiment to Signify Fuzzy Logic as an Effective User Interface Tool for Artificial Neural Network Nisha Macwan *, Priti Srinivas Sajja G.H. Patel Department of Computer Science India Abstract Artificial
SIGNATURE VERIFICATION
SIGNATURE VERIFICATION Dr. H.B.Kekre, Dr. Dhirendra Mishra, Ms. Shilpa Buddhadev, Ms. Bhagyashree Mall, Mr. Gaurav Jangid, Ms. Nikita Lakhotia Computer engineering Department, MPSTME, NMIMS University
ARTIFICIAL INTELLIGENCE METHODS IN EARLY MANUFACTURING TIME ESTIMATION
1 ARTIFICIAL INTELLIGENCE METHODS IN EARLY MANUFACTURING TIME ESTIMATION B. Mikó PhD, Z-Form Tool Manufacturing and Application Ltd H-1082. Budapest, Asztalos S. u 4. Tel: (1) 477 1016, e-mail: [email protected]
ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan
Handwritten Signature Verification ECE 533 Project Report by Ashish Dhawan Aditi R. Ganesan Contents 1. Abstract 3. 2. Introduction 4. 3. Approach 6. 4. Pre-processing 8. 5. Feature Extraction 9. 6. Verification
A Simple Feature Extraction Technique of a Pattern By Hopfield Network
A Simple Feature Extraction Technique of a Pattern By Hopfield Network A.Nag!, S. Biswas *, D. Sarkar *, P.P. Sarkar *, B. Gupta **! Academy of Technology, Hoogly - 722 *USIC, University of Kalyani, Kalyani
SUCCESSFUL PREDICTION OF HORSE RACING RESULTS USING A NEURAL NETWORK
SUCCESSFUL PREDICTION OF HORSE RACING RESULTS USING A NEURAL NETWORK N M Allinson and D Merritt 1 Introduction This contribution has two main sections. The first discusses some aspects of multilayer perceptrons,
This method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger.
According to the SysAdmin, Audit, Network, Security Institute (SANS), authentication problems are among the top twenty critical Internet security vulnerabilities. These problems arise from the use of basic
Artificial Neural Network and Location Coordinates based Security in Credit Cards
Artificial Neural Network and Location Coordinates based Security in Credit Cards 1 Hakam Singh, 2 Vandna Thakur Department of Computer Science Career Point University Hamirpur Himachal Pradesh,India Abstract
A Learning Based Method for Super-Resolution of Low Resolution Images
A Learning Based Method for Super-Resolution of Low Resolution Images Emre Ugur June 1, 2004 [email protected] Abstract The main objective of this project is the study of a learning based method
Face Model Fitting on Low Resolution Images
Face Model Fitting on Low Resolution Images Xiaoming Liu Peter H. Tu Frederick W. Wheeler Visualization and Computer Vision Lab General Electric Global Research Center Niskayuna, NY, 1239, USA {liux,tu,wheeler}@research.ge.com
REAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING
REAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING Ms.PALLAVI CHOUDEKAR Ajay Kumar Garg Engineering College, Department of electrical and electronics Ms.SAYANTI BANERJEE Ajay Kumar Garg Engineering
How To Fix Out Of Focus And Blur Images With A Dynamic Template Matching Algorithm
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X Image Estimation Algorithm for Out of Focus and Blur Images to Retrieve the Barcode
Check List for identifying Special Needs Children among School age children. Cerebral Palsy
Check List for identifying Special Needs Children among School age children Cerebral Palsy Sl. 1. The child has drooling? 2. The child has problems in controlling voluntary movements? 3. The child has
Framework for Biometric Enabled Unified Core Banking
Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty
Electroencephalography Analysis Using Neural Network and Support Vector Machine during Sleep
Engineering, 23, 5, 88-92 doi:.4236/eng.23.55b8 Published Online May 23 (http://www.scirp.org/journal/eng) Electroencephalography Analysis Using Neural Network and Support Vector Machine during Sleep JeeEun
A Various Biometric application for authentication and identification
A Various Biometric application for authentication and identification 1 Karuna Soni, 2 Umesh Kumar, 3 Priya Dosodia, Government Mahila Engineering College, Ajmer, India Abstract: In today s environment,
International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
Role of Neural network in data mining
Role of Neural network in data mining Chitranjanjit kaur Associate Prof Guru Nanak College, Sukhchainana Phagwara,(GNDU) Punjab, India Pooja kapoor Associate Prof Swami Sarvanand Group Of Institutes Dinanagar(PTU)
Circle Object Recognition Based on Monocular Vision for Home Security Robot
Journal of Applied Science and Engineering, Vol. 16, No. 3, pp. 261 268 (2013) DOI: 10.6180/jase.2013.16.3.05 Circle Object Recognition Based on Monocular Vision for Home Security Robot Shih-An Li, Ching-Chang
Neural Network based Vehicle Classification for Intelligent Traffic Control
Neural Network based Vehicle Classification for Intelligent Traffic Control Saeid Fazli 1, Shahram Mohammadi 2, Morteza Rahmani 3 1,2,3 Electrical Engineering Department, Zanjan University, Zanjan, IRAN
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 6367(Print), ISSN 0976 6367(Print) ISSN 0976 6375(Online)
Short Term Electricity Price Forecasting Using ANN and Fuzzy Logic under Deregulated Environment
Short Term Electricity Price Forecasting Using ANN and Fuzzy Logic under Deregulated Environment Aarti Gupta 1, Pankaj Chawla 2, Sparsh Chawla 3 Assistant Professor, Dept. of EE, Hindu College of Engineering,
Context-aware Library Management System using Augmented Reality
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 9 (2014), pp. 923-929 International Research Publication House http://www.irphouse.com Context-aware Library
Face detection is a process of localizing and extracting the face region from the
Chapter 4 FACE NORMALIZATION 4.1 INTRODUCTION Face detection is a process of localizing and extracting the face region from the background. The detected face varies in rotation, brightness, size, etc.
Master s Program in Information Systems
The University of Jordan King Abdullah II School for Information Technology Department of Information Systems Master s Program in Information Systems 2006/2007 Study Plan Master Degree in Information Systems
Normalisation of 3D Face Data
Normalisation of 3D Face Data Chris McCool, George Mamic, Clinton Fookes and Sridha Sridharan Image and Video Research Laboratory Queensland University of Technology, 2 George Street, Brisbane, Australia,
UNIVERSITY OF BOLTON SCHOOL OF ENGINEERING MS SYSTEMS ENGINEERING AND ENGINEERING MANAGEMENT SEMESTER 1 EXAMINATION 2015/2016 INTELLIGENT SYSTEMS
TW72 UNIVERSITY OF BOLTON SCHOOL OF ENGINEERING MS SYSTEMS ENGINEERING AND ENGINEERING MANAGEMENT SEMESTER 1 EXAMINATION 2015/2016 INTELLIGENT SYSTEMS MODULE NO: EEM7010 Date: Monday 11 th January 2016
Novelty Detection in image recognition using IRF Neural Networks properties
Novelty Detection in image recognition using IRF Neural Networks properties Philippe Smagghe, Jean-Luc Buessler, Jean-Philippe Urban Université de Haute-Alsace MIPS 4, rue des Frères Lumière, 68093 Mulhouse,
TIETS34 Seminar: Data Mining on Biometric identification
TIETS34 Seminar: Data Mining on Biometric identification Youming Zhang Computer Science, School of Information Sciences, 33014 University of Tampere, Finland [email protected] Course Description Content
Biometric Authentication using Online Signature
University of Trento Department of Mathematics Outline Introduction An example of authentication scheme Performance analysis and possible improvements Outline Introduction An example of authentication
Visual-based ID Verification by Signature Tracking
Visual-based ID Verification by Signature Tracking Mario E. Munich and Pietro Perona California Institute of Technology www.vision.caltech.edu/mariomu Outline Biometric ID Visual Signature Acquisition
A Prediction Model for Taiwan Tourism Industry Stock Index
A Prediction Model for Taiwan Tourism Industry Stock Index ABSTRACT Han-Chen Huang and Fang-Wei Chang Yu Da University of Science and Technology, Taiwan Investors and scholars pay continuous attention
STATIC SIGNATURE RECOGNITION SYSTEM FOR USER AUTHENTICATION BASED TWO LEVEL COG, HOUGH TRANSFORM AND NEURAL NETWORK
Volume 6, Issue 3, pp: 335343 IJESET STATIC SIGNATURE RECOGNITION SYSTEM FOR USER AUTHENTICATION BASED TWO LEVEL COG, HOUGH TRANSFORM AND NEURAL NETWORK Dipti Verma 1, Sipi Dubey 2 1 Department of Computer
How To Filter Spam Image From A Picture By Color Or Color
Image Content-Based Email Spam Image Filtering Jianyi Wang and Kazuki Katagishi Abstract With the population of Internet around the world, email has become one of the main methods of communication among
Visualization of Breast Cancer Data by SOM Component Planes
International Journal of Science and Technology Volume 3 No. 2, February, 2014 Visualization of Breast Cancer Data by SOM Component Planes P.Venkatesan. 1, M.Mullai 2 1 Department of Statistics,NIRT(Indian
DIAGONAL BASED FEATURE EXTRACTION FOR HANDWRITTEN ALPHABETS RECOGNITION SYSTEM USING NEURAL NETWORK
DIAGONAL BASED FEATURE EXTRACTION FOR HANDWRITTEN ALPHABETS RECOGNITION SYSTEM USING NEURAL NETWORK J.Pradeep 1, E.Srinivasan 2 and S.Himavathi 3 1,2 Department of ECE, Pondicherry College Engineering,
Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means.
Definition Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means. Description Physiological biometrics is based
High-Performance Signature Recognition Method using SVM
High-Performance Signature Recognition Method using SVM Saeid Fazli Research Institute of Modern Biological Techniques University of Zanjan Shima Pouyan Electrical Engineering Department University of
Mean-Shift Tracking with Random Sampling
1 Mean-Shift Tracking with Random Sampling Alex Po Leung, Shaogang Gong Department of Computer Science Queen Mary, University of London, London, E1 4NS Abstract In this work, boosting the efficiency of
Performance Evaluation of Online Image Compression Tools
Performance Evaluation of Online Image Compression Tools Rupali Sharma 1, aresh Kumar 1, Department of Computer Science, PTUGZS Campus, Bathinda (Punjab), India 1 [email protected], [email protected]
EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set
EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set Amhmed A. Bhih School of Electrical and Electronic Engineering Princy Johnson School of Electrical and Electronic Engineering Martin
Think of the beards as a layer on top of the face rather than part of the face itself. Using
Tyler Ambroziak Ryan Fox CS 638-1 (Dyer) Spring 2010 Virtual Barber Abstract What would you look like without a beard? Or how about with a different type of beard? Think of the beards as a layer on top
SOURCE SCANNER IDENTIFICATION FOR SCANNED DOCUMENTS. Nitin Khanna and Edward J. Delp
SOURCE SCANNER IDENTIFICATION FOR SCANNED DOCUMENTS Nitin Khanna and Edward J. Delp Video and Image Processing Laboratory School of Electrical and Computer Engineering Purdue University West Lafayette,
Tracking Moving Objects In Video Sequences Yiwei Wang, Robert E. Van Dyck, and John F. Doherty Department of Electrical Engineering The Pennsylvania State University University Park, PA16802 Abstract{Object
Support Vector Machine-Based Human Behavior Classification in Crowd through Projection and Star Skeletonization
Journal of Computer Science 6 (9): 1008-1013, 2010 ISSN 1549-3636 2010 Science Publications Support Vector Machine-Based Human Behavior Classification in Crowd through Projection and Star Skeletonization
NAVIGATING SCIENTIFIC LITERATURE A HOLISTIC PERSPECTIVE. Venu Govindaraju
NAVIGATING SCIENTIFIC LITERATURE A HOLISTIC PERSPECTIVE Venu Govindaraju BIOMETRICS DOCUMENT ANALYSIS PATTERN RECOGNITION 8/24/2015 ICDAR- 2015 2 Towards a Globally Optimal Approach for Learning Deep Unsupervised
6.2.8 Neural networks for data mining
6.2.8 Neural networks for data mining Walter Kosters 1 In many application areas neural networks are known to be valuable tools. This also holds for data mining. In this chapter we discuss the use of neural
Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
Knowledge Based Descriptive Neural Networks
Knowledge Based Descriptive Neural Networks J. T. Yao Department of Computer Science, University or Regina Regina, Saskachewan, CANADA S4S 0A2 Email: [email protected] Abstract This paper presents a
A New Image Edge Detection Method using Quality-based Clustering. Bijay Neupane Zeyar Aung Wei Lee Woon. Technical Report DNA #2012-01.
A New Image Edge Detection Method using Quality-based Clustering Bijay Neupane Zeyar Aung Wei Lee Woon Technical Report DNA #2012-01 April 2012 Data & Network Analytics Research Group (DNA) Computing and
Accurate and robust image superresolution by neural processing of local image representations
Accurate and robust image superresolution by neural processing of local image representations Carlos Miravet 1,2 and Francisco B. Rodríguez 1 1 Grupo de Neurocomputación Biológica (GNB), Escuela Politécnica
addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from
Preface In the last decade biometrics has emerged as a valuable means to automatically recognize people, on the base is of their either physiological or behavioral characteristics, due to several inherent
Digital image processing
746A27 Remote Sensing and GIS Lecture 4 Digital image processing Chandan Roy Guest Lecturer Department of Computer and Information Science Linköping University Digital Image Processing Most of the common
A Study on SURF Algorithm and Real-Time Tracking Objects Using Optical Flow
, pp.233-237 http://dx.doi.org/10.14257/astl.2014.51.53 A Study on SURF Algorithm and Real-Time Tracking Objects Using Optical Flow Giwoo Kim 1, Hye-Youn Lim 1 and Dae-Seong Kang 1, 1 Department of electronices
EFFICIENT DATA PRE-PROCESSING FOR DATA MINING
EFFICIENT DATA PRE-PROCESSING FOR DATA MINING USING NEURAL NETWORKS JothiKumar.R 1, Sivabalan.R.V 2 1 Research scholar, Noorul Islam University, Nagercoil, India Assistant Professor, Adhiparasakthi College
A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA
A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA N. Zarrinpanjeh a, F. Dadrassjavan b, H. Fattahi c * a Islamic Azad University of Qazvin - [email protected]
Understanding The Face Image Format Standards
Understanding The Face Image Format Standards Paul Griffin, Ph.D. Chief Technology Officer Identix April 2005 Topics The Face Image Standard The Record Format Frontal Face Images Face Images and Compression
