SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
ACEEE Int. J. on Network Security , Vol. 02, No. 03, July 2011



       Improving Performance of Texture Based Face
      Recognition Systems by Segmenting Face Region
                                                 R. Reena Rose#1, A. Suruliandi*2
                                 1
                                     St. Xavier’s Catholic College of Engineering, Nagercoil, India.
                                                      mailtoreenarose@yahoo.in
                                       2
                                         Manonmaniam Sundaranar University, Tirunelveli, India.
                                                        suruliandi@yahoo.com

Abstract— Textures play an important role in recognition of               etc., of the texture as a whole [2]. GLCM, LBP and ELBT are
images. This paper investigates the efficiency of performance             few among existing texture feature extraction methods. Face
of three texture based feature extraction methods for face                recognition systems that use ELBT signs and their modification
recognition. The methods for comparative study are Grey Level             give high results on both speed and accuracy [10].
Co_occurence Matrix (GLCM), Local Binary Pattern (LBP)
and Elliptical Local Binary Template (ELBT). Experiments                  B. Outline of the Approach
were conducted on a facial expression database, Japanese                      This paper analyzes the performance of three methods:
Female Facial Expression (JAFFE). With all facial expressions
                                                                          GLCM, LBP and ELBT. In all the methods a subspace in the face
LBP with 16 vicinity pixels is found to be a better face
recognition method among the tested methods. Experimental
                                                                          is selected for recognition by face anthropometric measure
results show that classification based on segmenting face                 (distance between eye centers). Eye centers are selected
region improves recognition accuracy.                                     manually. JAFFE database [12] is used for the experiment.
                                                                          Following figure is an outline of the process.
Keywords— face recognition, face anthropometric measures,
grey level co_occurence matrix, local binary pattern, elliptical
local binary template, chi-square statistic.

                        I. INTRODUCTION
     Face recognition plays an important role in the field of
computer vision, and has many real-world applications including
biometric authentication and computer-human interaction.
Many traditional face recognition systems use intensity of
images that are very sensitive to slight variations in lighting,
pose and expression. One of the most important characteristics
that can be used to recognize a person is a texture feature. Some
of the features that are used to recognize faces are geometric,
photometric, 3-D and skin texture. Texture plays a vital role in
recognition of objects and scenes. Texture based facial
                                                                          The latter part of this study is organized as follows: Section (2)
recognition is an ongoing research. Textures are specified by
                                                                          explains the methods. Section (3) describes the classification
the statistical distribution of spatial dependencies of gray level
                                                                          algorithm and distance measures used. Section (4) focuses on
properties [18]. Grey level co-occurrence matrix based features
                                                                          results and discussion. Section (5) deals with conclusion.
are first introduced by Haralick in the year 1979. The grey level
co-occurrence matrices of an image estimate second-order                              II. T EXTURE FEATURE EXTRACTION METHODS
statistics [13]. Ojala et al. introduced LBP operator that helps
                                                                          A.GLCM
one to extract texture pattern in an image. LBP operators are
easy to compute. So they are suitable for real time applications.             This method helps one to statistically sample the way certain
One of the advantages of LBP is economy of memory [10]. ELBT              grey-levels occur in relation to other grey-levels. The grey level
is a modification of LBP, which uses LBP operator for histogram           co-occurrence matrix Pd for a displacement vector d= (dx, dy) is
computation. ELBT differs from LBP in such a way that vicinity            defined as follows. Every entry (i, j) of Pd is the frequency of
pixels lie on an ellipse rather than circle [10].                         occurrences of two pixels, with grey-levels i and j appearing in
                                                                          the window separated by a displacement vector d. As an example,
A. Motivation and Justification                                           consider the following 4×4 image containing three different grey
    Nowadays face recognition has become a very challenging               values:
aspect because of the variations in pose, illumination and
orientation of face images. It is still difficult to develop an
automatic system for face recognition. Texture based feature
extraction methods help us to extract uniformity, roughness,
lightness, density, regularity, linearity, phase, directionality,         The 3×3 grey level co-occurrence matrix for this image for a
randomness, coarseness, fineness, granulation, smoothness,                displacement vector of d = (0, 1) is given as follows:
                                                                     23
© 2011 ACEEE
DOI: 01.IJNS.02.03.165
ACEEE Int. J. on Network Security , Vol. 02, No. 03, July 2011

                                                                               use LBT, have been recently attracting the researchers [10]. LBT
                                                                               was first introduced in 1996 for analyzing texture features in
                                                                               grey-scale images [14]. In ELBT vicinity pixels lie on ellipse
                                                                               relating to the central pixel. Let the vertical radius of the ellipse
                                                                               be vr, horizontal radius be hr and total number of vicinity pixel
 Here the entry (0, 0) of Pd is 5 because there are five pixel pairs of        be m. Then the coordinates cix and ciy for each vicinity pixel
(0, 0) that are offset by (0, 1) amount. Table I lists some of the             will be computed using (2). Coordinates of vicinity dots are
texture features that can be computed from the matrix.                         not always in the center of pixel; therefore bilinear interpolation
                 TABLE 1. TEXTURE FEATURES
                                                                               is used to calculate them. The histogram for a region of the
                                                                               image shall be formed according to (4).




                                                                                Fig. 2. Selection of vicinity pixels with different values of hr, vr and
                                                                                                                  m.
B. LBP
    The LBP method was first introduced by Ojala et al [14]. LBP
operator labels every pixels by thresholding the 3*3
neighborhood of the pixels with the center value and considers
the result as a binary number as illustrated in the fig. 1. Then the
histogram of the labels is used as texture descriptor [3].


                                                                                                  Fig. 3. 7×7 regions of face image.




                        Binary :11001011
                           Decimal :203

                    Fig. 1. Operation of LBP operator.
    The LBP method can be regarded as a truly unifying
approach. Instead of trying to explain texture formation on a
pixel level, local patterns are formed. Each pixel is labeled with
the code of the texture primitive that best matches the local
neighborhood. Thus each LBP code can be regarded as a micro-
texton. Local primitives detected by the LBP include spots, flat
areas, edges, edge ends, curves and so on [20]. Uniform LBPs
are used for economy of memory and to determine important
local textures. LBP that has not more but two transitions from (0)
to (1) or otherwise are called as uniform LBP. In LBP the vicinity
pixels are on a circle with any radius. The number of dots on the
circle may be chosen arbitrarily. For determining the values in
the dots bilinear interpolation is used [10].
C. ELBT
  Methods for extracting texture features from face image, which
                                                                          24
© 2011 ACEEE
DOI: 01.IJNS.02.03.165
ACEEE Int. J. on Network Security , Vol. 02, No. 03, July 2011

              III. CLASSIFICATION PRINCIPLE
A. K-Nearest Neighborhood Classification
     For classification k-nearest neighborhood algorithm is used.
The algorithm is as follows.
Every class of the training set is assigned to have unique tag
value.
Dissimilarity measure is found out for every image in the training        and with weighted k×k region. To avoid complexity of using
set.                                                                        features of entire face, face anthropometric measure (distance
 Sort the images in the trained set by the chi square value               between eye centers) is used to select a subspace in the face
obtained from the aforesaid step.                                           image [5] as shown in Fig. 4. by using (7)-(10). The eye centers
 The majority of the images that belong to same class is                  are selected manually. In GLCM method grey level co-occurrence
determined from the first three images which has the least chi              matrices are computed for displacement vectors (0, 1), (1, 0) and
square value.                                                               (1, 1). Then texture features listed in Table I are computer for
                                                                            individual matrix and are averaged to get final value [13]. For the
B. Distance Measure                                                         methods LBP and ELBT, vicinity pixels are computed using (1),
   Dissimilarity between two objects can be measured using                  (2) and (3). Number of vicinity pixels considered for LBP and
Chi square statistic (χ 2). Dissimilarity measure among observed            ELBT are 16 by substituting the values hr and vr as 3 for LBP,
(O) and expected (E) facial images are measured using following             and hr as 2 and vr as 3 for ELBT.
formula.
                                                                            B. Experiment I – Single Region
                                                                                In this experiment, the region selected for recognition is
                                                                            considered as a single region and features are computed for the
In the above formula i,j indicates ith region jth feature value.            entire region. A result of the experiment is shown in Table II.
Some region in the face has more importance than other, so
weights can be assigned to every region in such a way that                  C. Experiment II – With k×k Regions
weight are assigned to regions depending on their impor-                         For this experiment the selected region is divided into k×k
tance in recognition of face. In such cases the following for-              region as shown in Fig. 3. and features are computed for
mula can be used.                                                           individual regions separately. To recognize an image in the test
                                                                            set, the feature of one region is compared with the feature of the
                                                                            respective region in the trained images. The three methods are
                                                                            tested against 5×5 region and 7×7 region. Result of the experiment
In formula (6) wi is the weigh assigned to every region i.                  is given in Table II.
                                                                            D. Experiment III – With Weighted k×k Regions
                 IV. EXPERIMENTS AND RESULTS                                    In this experiment, selected region in the face is divided into
A. Experimental Setup                                                       7×7 region. And they are assigned some weight as in [10]. Fig.
                                                                            5. Shows the applied weights. Experimental result is given in
    In this paper performance of three texture based methods
GLCM, LBP and ELBT are evaluated. For testing JAFFE                         Table II.
database is used. The database contains 213 images of 7 facial
expressions posed by 10 Japanese female models. The methods
are experimented in three ways: with single region, k×k region,




                                                                                           Fig. 5. Weights applied for 7×7 region.

                                                                            E. Analysis of the result
                                                                                 Results of the experiments show that multiple regioning
                                                                            method yields more accuracy than single regioning. 7×7
                                                                            segmentation method gives better result than 5×5 segmentation
                                                                            method. The recognition rate of GLCM, LBP and ELBT shows
                                                                            that experiment II and III is better than experiment I for recognizing
                                                                            facial expression images.
       Fig. 4. Subspace selection by face anthropometric measure.
                                                                       25
© 2011 ACEEE
DOI: 01.IJNS.02.03.165
ACEEE Int. J. on Network Security , Vol. 02, No. 03, July 2011




                                                   Fig. 6. Sample images from JAFFE

                                               TABLE II. ACCURACY OF RECOGNITION




                                                                          [4] Chandra Mohan M., Vijaya Kumar V., Subbaiah K. V., “A New
                       V. CONCLUSION                                      Method of Face Recognition Based on Texture Feature Extraction
                                                                          on Individual Components of Face,” International Journal of Signal
    GLCM, LBP and ELBT methods were evaluated by using                    and Image Processing, Vol. 1, pp. 69-74, 2010.
JAFFE database. With all the expressions in the database,                 [5] Farkas L. G., “Anthropometry of the Head and Face,” Raven
accuracy of recognition of LBP with 16 vicinity pixels is found to        Press, 1994.
be better than the other two methods. When advanced version               [6] Guillaume Heusch and Sebastien Marcel,”A novel statistical
of LBP is experimented with, results better than the one obtained         generative model dedicated to face recognition,” Image and Vision
here can be achieved. Experiment I, II & III show that weighted           Computing 28 (2010) 101-110.
                                                                          [7] Guoying Zhao and Matti Pietikainen, “Dynamic Texture
regioning method works well for expression databases. Texture
                                                                          Recognition using Local Binary Patterns with an Application to
features can be combined with geometry based features to                  Facial Expressions,” IEEE transactions on Pattern Analysis and
enhance the performance of face recognition techniques. It is             Machine Intelligence, 2007.
observed from the experiments that face recognition techniques            [8] Lei Yu, Zhongshi He, Qi Cao, “Gabor texture representation
yield better results when face region under consideration is              method for face recognition using the Gamma and generalized
divided into many sub regions                                             Gaussian models,” Image and Vision Computing 28 (2010) 177-
                                                                          187.
                          REFERENCES                                      [9] Lu D. and Weng Q., “A survey of image classification methods
                                                                          and techniques for improving classification performance,”
[1] Andre Riccardo Backes, Wesley Nunes Goncalves, Alexandre              International Journal of Remote Sensing, Vol. 28, No. 5,pp. 823-
Souto Martinez and Odemir Martinez Bruno, “Texture analysis               870, 2007.
and classification using deterministic tourist walk,” Patter              [10] Masliy R. V., “Using Local Binary Template Faces Recognition
Recognition 43, pp. 685-694, 2010.                                        On Gray-Scale Images,” Information Technologies and Computer
[2] Andrzej Materka and Michal Strzelecki, “Texture Analysis              Engineering, Vol. No. 4, BHTY 2008.
Methods – A Review,” Technical University of Lodz, Institute of           [11] Matthew Turk and Alex Pentland, “Eigenfaces for
Electronics, COST B11 report, Brussels 1998.                              Recognition,” Journal of Cognitive Neuroscience, Vol. 3, No. 1,
[3] Caifeng Shan, Shaogang Gong, Peter W. McOwan, “Robust                 1991.
Facial Expression Recognition Using Local Binary Patterns,” in            [12] Michael J. Lyons, Shigeru Akamatsu, Miyuoki Kamachi and
IEEE, 2005.                                                               Jiro Gyoba, “Coding Facial Expressions with Gabor Wavelets,” In
                                                                     26
© 2011 ACEEE
DOI: 01.IJNS.02.03.165
ACEEE Int. J. on Network Security , Vol. 02, No. 03, July 2011

the proc. of 3rd IEEE International Conference on Automatic                  [17] Robert M. Haralick, K. Shanmugam, and Its’hak Dinstein,
Face and Gesture Recognition, pp. 200-205, 1998.                             “Textural features for Image Classification,” IEEE Transactions on
[13] Mihran Tuceryan, Anil K. Jain, “Texture Analysis,” The                  systems, Man, and Cybernetics, Vol. SMC-3, No. 6. 1973.
Handbook of Pattern Recognition and Computer Vision(2nd                      [18] Selim Aksoy, Robert M. Haralick, “Textural Features for Image
Edition), by C. H. Chen, L. F. Pau, P. S. P. Wang (eds.), pp. 207-           Database Retrieval”
248, World Scientific Publishing Co., 1998.                                  [19] Timo Ahonen, Abdenour Hadid, and Matti Pietikainen, “Face
[14] Ojala T., Pietikinen M., and Harwood D., “A comparative                 Description with Local Binary Patterns: Application to Face
study of texture measures with classification based on featured              Recognition,”
distribution,” Pattern Recognition, vol. 29, No. 1, 1996.                    [20] Topi Maempaa , Matti Pietikainen, “Texture Analysis with
[15] Ojala T., Pietikinen M., Maenpaa M., “Multiresolution gray-             Local Binary Patterns,” Chapter 1, Review Volume, 2004.
scale and rotation invariant texture classification with local binary        [21] Yann Rodriguez, “Face Detection and Verification using Local
patterns,” IEEE transactions on Pattern Analysis and Machine                 Binary Patterns,” A thesis, pp. 24-26, 2006.
Intelligence 24(7), 971–987(2002).                                           [22] Yousra BEN JEMAA and Sana KHANFIR , “Automatic Local
[16] Rishi Jobanputra, David A. Clausi, “Preserving boundaries               Gabor features extracton for face recognition,” International Journal
for image texture segmentation using grey level co-occurring                 of Computer Science and Information Security, Vol. 3, No. 1, 2009.
probabilities,” Pattern Recognition 39 (2006) 234-245.                       [23] Zao W., Chellappa R., Phillips P. J. and Rosenfeld A., “Face
                                                                             recognition : a literature survey,” ACM Comput. Surv. 35(4) , pp.
                                                                             399-459, 2003.




                                                                        27
© 2011 ACEEE
DOI: 01.IJNS.02.03.165

Weitere ähnliche Inhalte

Was ist angesagt?

TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSINGTYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSINGKamana Tripathi
 
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSINGTYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSINGKamana Tripathi
 
A Combined Model for Image Inpainting
A Combined Model for Image InpaintingA Combined Model for Image Inpainting
A Combined Model for Image Inpaintingiosrjce
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
IMAGE SEGMENTATION TECHNIQUES
IMAGE SEGMENTATION TECHNIQUESIMAGE SEGMENTATION TECHNIQUES
IMAGE SEGMENTATION TECHNIQUESVicky Kumar
 
Region based image segmentation
Region based image segmentationRegion based image segmentation
Region based image segmentationSafayet Hossain
 
Improvement of Objective Image Quality Evaluation Applying Colour Differences...
Improvement of Objective Image Quality Evaluation Applying Colour Differences...Improvement of Objective Image Quality Evaluation Applying Colour Differences...
Improvement of Objective Image Quality Evaluation Applying Colour Differences...CSCJournals
 
Object based image enhancement
Object based image enhancementObject based image enhancement
Object based image enhancementijait
 
Ajay ppt region segmentation new copy
Ajay ppt region segmentation new   copyAjay ppt region segmentation new   copy
Ajay ppt region segmentation new copyAjay Kumar Singh
 
Content Based Image Retrieval using Color Boosted Salient Points and Shape fe...
Content Based Image Retrieval using Color Boosted Salient Points and Shape fe...Content Based Image Retrieval using Color Boosted Salient Points and Shape fe...
Content Based Image Retrieval using Color Boosted Salient Points and Shape fe...CSCJournals
 
Zernike moment of invariants for effective image retrieval using gaussian fil...
Zernike moment of invariants for effective image retrieval using gaussian fil...Zernike moment of invariants for effective image retrieval using gaussian fil...
Zernike moment of invariants for effective image retrieval using gaussian fil...IAEME Publication
 
Face skin color based recognition using local spectral and gray scale features
Face skin color based recognition using local spectral and gray scale featuresFace skin color based recognition using local spectral and gray scale features
Face skin color based recognition using local spectral and gray scale featureseSAT Journals
 
Ijarcet vol-2-issue-7-2246-2251
Ijarcet vol-2-issue-7-2246-2251Ijarcet vol-2-issue-7-2246-2251
Ijarcet vol-2-issue-7-2246-2251Editor IJARCET
 

Was ist angesagt? (17)

Watershed
WatershedWatershed
Watershed
 
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSINGTYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
 
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSINGTYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
 
A Combined Model for Image Inpainting
A Combined Model for Image InpaintingA Combined Model for Image Inpainting
A Combined Model for Image Inpainting
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
IMAGE SEGMENTATION TECHNIQUES
IMAGE SEGMENTATION TECHNIQUESIMAGE SEGMENTATION TECHNIQUES
IMAGE SEGMENTATION TECHNIQUES
 
Region based image segmentation
Region based image segmentationRegion based image segmentation
Region based image segmentation
 
Improvement of Objective Image Quality Evaluation Applying Colour Differences...
Improvement of Objective Image Quality Evaluation Applying Colour Differences...Improvement of Objective Image Quality Evaluation Applying Colour Differences...
Improvement of Objective Image Quality Evaluation Applying Colour Differences...
 
Object based image enhancement
Object based image enhancementObject based image enhancement
Object based image enhancement
 
Ajay ppt region segmentation new copy
Ajay ppt region segmentation new   copyAjay ppt region segmentation new   copy
Ajay ppt region segmentation new copy
 
Content Based Image Retrieval using Color Boosted Salient Points and Shape fe...
Content Based Image Retrieval using Color Boosted Salient Points and Shape fe...Content Based Image Retrieval using Color Boosted Salient Points and Shape fe...
Content Based Image Retrieval using Color Boosted Salient Points and Shape fe...
 
B01460713
B01460713B01460713
B01460713
 
N42018588
N42018588N42018588
N42018588
 
Zernike moment of invariants for effective image retrieval using gaussian fil...
Zernike moment of invariants for effective image retrieval using gaussian fil...Zernike moment of invariants for effective image retrieval using gaussian fil...
Zernike moment of invariants for effective image retrieval using gaussian fil...
 
I017417176
I017417176I017417176
I017417176
 
Face skin color based recognition using local spectral and gray scale features
Face skin color based recognition using local spectral and gray scale featuresFace skin color based recognition using local spectral and gray scale features
Face skin color based recognition using local spectral and gray scale features
 
Ijarcet vol-2-issue-7-2246-2251
Ijarcet vol-2-issue-7-2246-2251Ijarcet vol-2-issue-7-2246-2251
Ijarcet vol-2-issue-7-2246-2251
 

Ähnlich wie Improving Performance of Texture Based Face Recognition Systems by Segmenting Face Region

IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...IRJET Journal
 
A combined method of fractal and glcm features for mri and ct scan images cla...
A combined method of fractal and glcm features for mri and ct scan images cla...A combined method of fractal and glcm features for mri and ct scan images cla...
A combined method of fractal and glcm features for mri and ct scan images cla...sipij
 
IRJET-Face Recognition using LDN Code
IRJET-Face Recognition using LDN CodeIRJET-Face Recognition using LDN Code
IRJET-Face Recognition using LDN CodeIRJET Journal
 
SEMANTIC IMAGE RETRIEVAL USING MULTIPLE FEATURES
SEMANTIC IMAGE RETRIEVAL USING MULTIPLE FEATURESSEMANTIC IMAGE RETRIEVAL USING MULTIPLE FEATURES
SEMANTIC IMAGE RETRIEVAL USING MULTIPLE FEATUREScscpconf
 
Use of Illumination Invariant Feature Descriptor for Face Recognition
 Use of Illumination Invariant Feature Descriptor for Face Recognition Use of Illumination Invariant Feature Descriptor for Face Recognition
Use of Illumination Invariant Feature Descriptor for Face RecognitionIJCSIS Research Publications
 
BAYESIAN CLASSIFICATION OF FABRICS USING BINARY CO-OCCURRENCE MATRIX
BAYESIAN CLASSIFICATION OF FABRICS USING BINARY CO-OCCURRENCE MATRIXBAYESIAN CLASSIFICATION OF FABRICS USING BINARY CO-OCCURRENCE MATRIX
BAYESIAN CLASSIFICATION OF FABRICS USING BINARY CO-OCCURRENCE MATRIXijistjournal
 
BAYESIAN CLASSIFICATION OF FABRICS USING BINARY CO-OCCURRENCE MATRIX
BAYESIAN CLASSIFICATION OF FABRICS USING BINARY CO-OCCURRENCE MATRIXBAYESIAN CLASSIFICATION OF FABRICS USING BINARY CO-OCCURRENCE MATRIX
BAYESIAN CLASSIFICATION OF FABRICS USING BINARY CO-OCCURRENCE MATRIXijistjournal
 
Selective local binary pattern with convolutional neural network for facial ...
Selective local binary pattern with convolutional neural  network for facial ...Selective local binary pattern with convolutional neural  network for facial ...
Selective local binary pattern with convolutional neural network for facial ...IJECEIAES
 
IRJET- Multi Image Morphing: A Review
IRJET- Multi Image Morphing: A ReviewIRJET- Multi Image Morphing: A Review
IRJET- Multi Image Morphing: A ReviewIRJET Journal
 
A comparative study on content based image retrieval methods
A comparative study on content based image retrieval methodsA comparative study on content based image retrieval methods
A comparative study on content based image retrieval methodsIJLT EMAS
 
An Improved Way of Segmentation and Classification of Remote Sensing Images U...
An Improved Way of Segmentation and Classification of Remote Sensing Images U...An Improved Way of Segmentation and Classification of Remote Sensing Images U...
An Improved Way of Segmentation and Classification of Remote Sensing Images U...ijsrd.com
 
A Face Recognition Using Linear-Diagonal Binary Graph Pattern Feature Extract...
A Face Recognition Using Linear-Diagonal Binary Graph Pattern Feature Extract...A Face Recognition Using Linear-Diagonal Binary Graph Pattern Feature Extract...
A Face Recognition Using Linear-Diagonal Binary Graph Pattern Feature Extract...ijfcstjournal
 
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...ijfcstjournal
 
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...ijfcstjournal
 
A survey on feature descriptors for texture image classification
A survey on feature descriptors for texture image classificationA survey on feature descriptors for texture image classification
A survey on feature descriptors for texture image classificationIRJET Journal
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...ijcseit
 

Ähnlich wie Improving Performance of Texture Based Face Recognition Systems by Segmenting Face Region (20)

IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...
IRJET- Digital Image Forgery Detection using Local Binary Patterns (LBP) and ...
 
IJET-V2I6P17
IJET-V2I6P17IJET-V2I6P17
IJET-V2I6P17
 
A combined method of fractal and glcm features for mri and ct scan images cla...
A combined method of fractal and glcm features for mri and ct scan images cla...A combined method of fractal and glcm features for mri and ct scan images cla...
A combined method of fractal and glcm features for mri and ct scan images cla...
 
IRJET-Face Recognition using LDN Code
IRJET-Face Recognition using LDN CodeIRJET-Face Recognition using LDN Code
IRJET-Face Recognition using LDN Code
 
SEMANTIC IMAGE RETRIEVAL USING MULTIPLE FEATURES
SEMANTIC IMAGE RETRIEVAL USING MULTIPLE FEATURESSEMANTIC IMAGE RETRIEVAL USING MULTIPLE FEATURES
SEMANTIC IMAGE RETRIEVAL USING MULTIPLE FEATURES
 
Use of Illumination Invariant Feature Descriptor for Face Recognition
 Use of Illumination Invariant Feature Descriptor for Face Recognition Use of Illumination Invariant Feature Descriptor for Face Recognition
Use of Illumination Invariant Feature Descriptor for Face Recognition
 
Ed34785790
Ed34785790Ed34785790
Ed34785790
 
H017416670
H017416670H017416670
H017416670
 
BAYESIAN CLASSIFICATION OF FABRICS USING BINARY CO-OCCURRENCE MATRIX
BAYESIAN CLASSIFICATION OF FABRICS USING BINARY CO-OCCURRENCE MATRIXBAYESIAN CLASSIFICATION OF FABRICS USING BINARY CO-OCCURRENCE MATRIX
BAYESIAN CLASSIFICATION OF FABRICS USING BINARY CO-OCCURRENCE MATRIX
 
BAYESIAN CLASSIFICATION OF FABRICS USING BINARY CO-OCCURRENCE MATRIX
BAYESIAN CLASSIFICATION OF FABRICS USING BINARY CO-OCCURRENCE MATRIXBAYESIAN CLASSIFICATION OF FABRICS USING BINARY CO-OCCURRENCE MATRIX
BAYESIAN CLASSIFICATION OF FABRICS USING BINARY CO-OCCURRENCE MATRIX
 
Selective local binary pattern with convolutional neural network for facial ...
Selective local binary pattern with convolutional neural  network for facial ...Selective local binary pattern with convolutional neural  network for facial ...
Selective local binary pattern with convolutional neural network for facial ...
 
IRJET- Multi Image Morphing: A Review
IRJET- Multi Image Morphing: A ReviewIRJET- Multi Image Morphing: A Review
IRJET- Multi Image Morphing: A Review
 
A comparative study on content based image retrieval methods
A comparative study on content based image retrieval methodsA comparative study on content based image retrieval methods
A comparative study on content based image retrieval methods
 
An Improved Way of Segmentation and Classification of Remote Sensing Images U...
An Improved Way of Segmentation and Classification of Remote Sensing Images U...An Improved Way of Segmentation and Classification of Remote Sensing Images U...
An Improved Way of Segmentation and Classification of Remote Sensing Images U...
 
A Face Recognition Using Linear-Diagonal Binary Graph Pattern Feature Extract...
A Face Recognition Using Linear-Diagonal Binary Graph Pattern Feature Extract...A Face Recognition Using Linear-Diagonal Binary Graph Pattern Feature Extract...
A Face Recognition Using Linear-Diagonal Binary Graph Pattern Feature Extract...
 
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
 
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
 
A survey on feature descriptors for texture image classification
A survey on feature descriptors for texture image classificationA survey on feature descriptors for texture image classification
A survey on feature descriptors for texture image classification
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
 
93 98
93 9893 98
93 98
 

Mehr von IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

Mehr von IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Kürzlich hochgeladen

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Kürzlich hochgeladen (20)

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Improving Performance of Texture Based Face Recognition Systems by Segmenting Face Region

  • 1. ACEEE Int. J. on Network Security , Vol. 02, No. 03, July 2011 Improving Performance of Texture Based Face Recognition Systems by Segmenting Face Region R. Reena Rose#1, A. Suruliandi*2 1 St. Xavier’s Catholic College of Engineering, Nagercoil, India. mailtoreenarose@yahoo.in 2 Manonmaniam Sundaranar University, Tirunelveli, India. suruliandi@yahoo.com Abstract— Textures play an important role in recognition of etc., of the texture as a whole [2]. GLCM, LBP and ELBT are images. This paper investigates the efficiency of performance few among existing texture feature extraction methods. Face of three texture based feature extraction methods for face recognition systems that use ELBT signs and their modification recognition. The methods for comparative study are Grey Level give high results on both speed and accuracy [10]. Co_occurence Matrix (GLCM), Local Binary Pattern (LBP) and Elliptical Local Binary Template (ELBT). Experiments B. Outline of the Approach were conducted on a facial expression database, Japanese This paper analyzes the performance of three methods: Female Facial Expression (JAFFE). With all facial expressions GLCM, LBP and ELBT. In all the methods a subspace in the face LBP with 16 vicinity pixels is found to be a better face recognition method among the tested methods. Experimental is selected for recognition by face anthropometric measure results show that classification based on segmenting face (distance between eye centers). Eye centers are selected region improves recognition accuracy. manually. JAFFE database [12] is used for the experiment. Following figure is an outline of the process. Keywords— face recognition, face anthropometric measures, grey level co_occurence matrix, local binary pattern, elliptical local binary template, chi-square statistic. I. INTRODUCTION Face recognition plays an important role in the field of computer vision, and has many real-world applications including biometric authentication and computer-human interaction. Many traditional face recognition systems use intensity of images that are very sensitive to slight variations in lighting, pose and expression. One of the most important characteristics that can be used to recognize a person is a texture feature. Some of the features that are used to recognize faces are geometric, photometric, 3-D and skin texture. Texture plays a vital role in recognition of objects and scenes. Texture based facial The latter part of this study is organized as follows: Section (2) recognition is an ongoing research. Textures are specified by explains the methods. Section (3) describes the classification the statistical distribution of spatial dependencies of gray level algorithm and distance measures used. Section (4) focuses on properties [18]. Grey level co-occurrence matrix based features results and discussion. Section (5) deals with conclusion. are first introduced by Haralick in the year 1979. The grey level co-occurrence matrices of an image estimate second-order II. T EXTURE FEATURE EXTRACTION METHODS statistics [13]. Ojala et al. introduced LBP operator that helps A.GLCM one to extract texture pattern in an image. LBP operators are easy to compute. So they are suitable for real time applications. This method helps one to statistically sample the way certain One of the advantages of LBP is economy of memory [10]. ELBT grey-levels occur in relation to other grey-levels. The grey level is a modification of LBP, which uses LBP operator for histogram co-occurrence matrix Pd for a displacement vector d= (dx, dy) is computation. ELBT differs from LBP in such a way that vicinity defined as follows. Every entry (i, j) of Pd is the frequency of pixels lie on an ellipse rather than circle [10]. occurrences of two pixels, with grey-levels i and j appearing in the window separated by a displacement vector d. As an example, A. Motivation and Justification consider the following 4×4 image containing three different grey Nowadays face recognition has become a very challenging values: aspect because of the variations in pose, illumination and orientation of face images. It is still difficult to develop an automatic system for face recognition. Texture based feature extraction methods help us to extract uniformity, roughness, lightness, density, regularity, linearity, phase, directionality, The 3×3 grey level co-occurrence matrix for this image for a randomness, coarseness, fineness, granulation, smoothness, displacement vector of d = (0, 1) is given as follows: 23 © 2011 ACEEE DOI: 01.IJNS.02.03.165
  • 2. ACEEE Int. J. on Network Security , Vol. 02, No. 03, July 2011 use LBT, have been recently attracting the researchers [10]. LBT was first introduced in 1996 for analyzing texture features in grey-scale images [14]. In ELBT vicinity pixels lie on ellipse relating to the central pixel. Let the vertical radius of the ellipse be vr, horizontal radius be hr and total number of vicinity pixel Here the entry (0, 0) of Pd is 5 because there are five pixel pairs of be m. Then the coordinates cix and ciy for each vicinity pixel (0, 0) that are offset by (0, 1) amount. Table I lists some of the will be computed using (2). Coordinates of vicinity dots are texture features that can be computed from the matrix. not always in the center of pixel; therefore bilinear interpolation TABLE 1. TEXTURE FEATURES is used to calculate them. The histogram for a region of the image shall be formed according to (4). Fig. 2. Selection of vicinity pixels with different values of hr, vr and m. B. LBP The LBP method was first introduced by Ojala et al [14]. LBP operator labels every pixels by thresholding the 3*3 neighborhood of the pixels with the center value and considers the result as a binary number as illustrated in the fig. 1. Then the histogram of the labels is used as texture descriptor [3]. Fig. 3. 7×7 regions of face image. Binary :11001011 Decimal :203 Fig. 1. Operation of LBP operator. The LBP method can be regarded as a truly unifying approach. Instead of trying to explain texture formation on a pixel level, local patterns are formed. Each pixel is labeled with the code of the texture primitive that best matches the local neighborhood. Thus each LBP code can be regarded as a micro- texton. Local primitives detected by the LBP include spots, flat areas, edges, edge ends, curves and so on [20]. Uniform LBPs are used for economy of memory and to determine important local textures. LBP that has not more but two transitions from (0) to (1) or otherwise are called as uniform LBP. In LBP the vicinity pixels are on a circle with any radius. The number of dots on the circle may be chosen arbitrarily. For determining the values in the dots bilinear interpolation is used [10]. C. ELBT Methods for extracting texture features from face image, which 24 © 2011 ACEEE DOI: 01.IJNS.02.03.165
  • 3. ACEEE Int. J. on Network Security , Vol. 02, No. 03, July 2011 III. CLASSIFICATION PRINCIPLE A. K-Nearest Neighborhood Classification For classification k-nearest neighborhood algorithm is used. The algorithm is as follows. Every class of the training set is assigned to have unique tag value. Dissimilarity measure is found out for every image in the training and with weighted k×k region. To avoid complexity of using set. features of entire face, face anthropometric measure (distance  Sort the images in the trained set by the chi square value between eye centers) is used to select a subspace in the face obtained from the aforesaid step. image [5] as shown in Fig. 4. by using (7)-(10). The eye centers  The majority of the images that belong to same class is are selected manually. In GLCM method grey level co-occurrence determined from the first three images which has the least chi matrices are computed for displacement vectors (0, 1), (1, 0) and square value. (1, 1). Then texture features listed in Table I are computer for individual matrix and are averaged to get final value [13]. For the B. Distance Measure methods LBP and ELBT, vicinity pixels are computed using (1), Dissimilarity between two objects can be measured using (2) and (3). Number of vicinity pixels considered for LBP and Chi square statistic (χ 2). Dissimilarity measure among observed ELBT are 16 by substituting the values hr and vr as 3 for LBP, (O) and expected (E) facial images are measured using following and hr as 2 and vr as 3 for ELBT. formula. B. Experiment I – Single Region In this experiment, the region selected for recognition is considered as a single region and features are computed for the In the above formula i,j indicates ith region jth feature value. entire region. A result of the experiment is shown in Table II. Some region in the face has more importance than other, so weights can be assigned to every region in such a way that C. Experiment II – With k×k Regions weight are assigned to regions depending on their impor- For this experiment the selected region is divided into k×k tance in recognition of face. In such cases the following for- region as shown in Fig. 3. and features are computed for mula can be used. individual regions separately. To recognize an image in the test set, the feature of one region is compared with the feature of the respective region in the trained images. The three methods are tested against 5×5 region and 7×7 region. Result of the experiment In formula (6) wi is the weigh assigned to every region i. is given in Table II. D. Experiment III – With Weighted k×k Regions IV. EXPERIMENTS AND RESULTS In this experiment, selected region in the face is divided into A. Experimental Setup 7×7 region. And they are assigned some weight as in [10]. Fig. 5. Shows the applied weights. Experimental result is given in In this paper performance of three texture based methods GLCM, LBP and ELBT are evaluated. For testing JAFFE Table II. database is used. The database contains 213 images of 7 facial expressions posed by 10 Japanese female models. The methods are experimented in three ways: with single region, k×k region, Fig. 5. Weights applied for 7×7 region. E. Analysis of the result Results of the experiments show that multiple regioning method yields more accuracy than single regioning. 7×7 segmentation method gives better result than 5×5 segmentation method. The recognition rate of GLCM, LBP and ELBT shows that experiment II and III is better than experiment I for recognizing facial expression images. Fig. 4. Subspace selection by face anthropometric measure. 25 © 2011 ACEEE DOI: 01.IJNS.02.03.165
  • 4. ACEEE Int. J. on Network Security , Vol. 02, No. 03, July 2011 Fig. 6. Sample images from JAFFE TABLE II. ACCURACY OF RECOGNITION [4] Chandra Mohan M., Vijaya Kumar V., Subbaiah K. V., “A New V. CONCLUSION Method of Face Recognition Based on Texture Feature Extraction on Individual Components of Face,” International Journal of Signal GLCM, LBP and ELBT methods were evaluated by using and Image Processing, Vol. 1, pp. 69-74, 2010. JAFFE database. With all the expressions in the database, [5] Farkas L. G., “Anthropometry of the Head and Face,” Raven accuracy of recognition of LBP with 16 vicinity pixels is found to Press, 1994. be better than the other two methods. When advanced version [6] Guillaume Heusch and Sebastien Marcel,”A novel statistical of LBP is experimented with, results better than the one obtained generative model dedicated to face recognition,” Image and Vision here can be achieved. Experiment I, II & III show that weighted Computing 28 (2010) 101-110. [7] Guoying Zhao and Matti Pietikainen, “Dynamic Texture regioning method works well for expression databases. Texture Recognition using Local Binary Patterns with an Application to features can be combined with geometry based features to Facial Expressions,” IEEE transactions on Pattern Analysis and enhance the performance of face recognition techniques. It is Machine Intelligence, 2007. observed from the experiments that face recognition techniques [8] Lei Yu, Zhongshi He, Qi Cao, “Gabor texture representation yield better results when face region under consideration is method for face recognition using the Gamma and generalized divided into many sub regions Gaussian models,” Image and Vision Computing 28 (2010) 177- 187. REFERENCES [9] Lu D. and Weng Q., “A survey of image classification methods and techniques for improving classification performance,” [1] Andre Riccardo Backes, Wesley Nunes Goncalves, Alexandre International Journal of Remote Sensing, Vol. 28, No. 5,pp. 823- Souto Martinez and Odemir Martinez Bruno, “Texture analysis 870, 2007. and classification using deterministic tourist walk,” Patter [10] Masliy R. V., “Using Local Binary Template Faces Recognition Recognition 43, pp. 685-694, 2010. On Gray-Scale Images,” Information Technologies and Computer [2] Andrzej Materka and Michal Strzelecki, “Texture Analysis Engineering, Vol. No. 4, BHTY 2008. Methods – A Review,” Technical University of Lodz, Institute of [11] Matthew Turk and Alex Pentland, “Eigenfaces for Electronics, COST B11 report, Brussels 1998. Recognition,” Journal of Cognitive Neuroscience, Vol. 3, No. 1, [3] Caifeng Shan, Shaogang Gong, Peter W. McOwan, “Robust 1991. Facial Expression Recognition Using Local Binary Patterns,” in [12] Michael J. Lyons, Shigeru Akamatsu, Miyuoki Kamachi and IEEE, 2005. Jiro Gyoba, “Coding Facial Expressions with Gabor Wavelets,” In 26 © 2011 ACEEE DOI: 01.IJNS.02.03.165
  • 5. ACEEE Int. J. on Network Security , Vol. 02, No. 03, July 2011 the proc. of 3rd IEEE International Conference on Automatic [17] Robert M. Haralick, K. Shanmugam, and Its’hak Dinstein, Face and Gesture Recognition, pp. 200-205, 1998. “Textural features for Image Classification,” IEEE Transactions on [13] Mihran Tuceryan, Anil K. Jain, “Texture Analysis,” The systems, Man, and Cybernetics, Vol. SMC-3, No. 6. 1973. Handbook of Pattern Recognition and Computer Vision(2nd [18] Selim Aksoy, Robert M. Haralick, “Textural Features for Image Edition), by C. H. Chen, L. F. Pau, P. S. P. Wang (eds.), pp. 207- Database Retrieval” 248, World Scientific Publishing Co., 1998. [19] Timo Ahonen, Abdenour Hadid, and Matti Pietikainen, “Face [14] Ojala T., Pietikinen M., and Harwood D., “A comparative Description with Local Binary Patterns: Application to Face study of texture measures with classification based on featured Recognition,” distribution,” Pattern Recognition, vol. 29, No. 1, 1996. [20] Topi Maempaa , Matti Pietikainen, “Texture Analysis with [15] Ojala T., Pietikinen M., Maenpaa M., “Multiresolution gray- Local Binary Patterns,” Chapter 1, Review Volume, 2004. scale and rotation invariant texture classification with local binary [21] Yann Rodriguez, “Face Detection and Verification using Local patterns,” IEEE transactions on Pattern Analysis and Machine Binary Patterns,” A thesis, pp. 24-26, 2006. Intelligence 24(7), 971–987(2002). [22] Yousra BEN JEMAA and Sana KHANFIR , “Automatic Local [16] Rishi Jobanputra, David A. Clausi, “Preserving boundaries Gabor features extracton for face recognition,” International Journal for image texture segmentation using grey level co-occurring of Computer Science and Information Security, Vol. 3, No. 1, 2009. probabilities,” Pattern Recognition 39 (2006) 234-245. [23] Zao W., Chellappa R., Phillips P. J. and Rosenfeld A., “Face recognition : a literature survey,” ACM Comput. Surv. 35(4) , pp. 399-459, 2003. 27 © 2011 ACEEE DOI: 01.IJNS.02.03.165