SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
Int. J. Advanced Networking and Applications
Volume: 6 Issue: 4 Pages: 2393-2397 (2015) ISSN: 0975-0290
2393
Face Recognition Techniques - An evaluation
Study
Dr.Asmahan M Altaher
Department of Management Information System, Applied Science University, 166-11391, Jordan
Email: a_altaher68@hotmail.com
----------------------------------------------------------------ABSTRACT------------------------------------------------------------------
Face recognition is the ability of categorize a set of images based on certain discriminatory features.
Classification of the recognition patterns can be difficult problem and it is still very active field of research. The
paper introduces conceptual framework for descriptive study on techniques of face recognition systems. It aims to
describe the previous researches have been study the face recognition system, in order scope on the algorithms,
usages, benefits , challenges and problems in this felids, the paper proposed the face recognition as sensitive
learning task experiments on a large face databases demonstrate of the new feature. The researcher recommends
that there's a needs to evaluate the previous studies and researches, especially on face recognition field and 3D,
hopeful for advanced techniques and methods in the near future.
Keywords - Face recognition Techniques, recognition algorithm, automated Facial
System, evolutionary Pursuit, and Kernel Methods.
--------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: October 30, 2014 Date of Acceptance: December 29, 2014
-------------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
The Humans have recognition capabilities that are
unparalleled in the modern computing era. Humans
have always had the a ability to recognize and distinguish
between faces features . Recently the computers have been
shown the same ability. In the mid of 1960s, scientists
began work on using the computer to recognize human
faces, since that time the facial recognition software has
come a long way, the governments and private companies
start to used the face recognition system . A lot of changes
are being made to enhance scientists capabilities in this
field (Zhang al et., 2009). Many researchers belief that
face recognition need to be about face detection, the prior
step to face recognition, the accurate detection of human
faces in arbitrary scenes, is the most important process
involved. Human faces are remarkably similar in global
properties, including size, aspect ratio, and location of
main features, but can vary considerably in details across
individuals, gender, race, or due to facial expression, most
traditional face recognition systems attempt to achieve a
low recognition error rate, implicitly assuming that the
losses of all misclassifications are the same (Shlizerman,
2011). Facial recognition software in any given episode,
the security department at the fictional. Montecito Hotel
and Casino uses its video surveillance system to pull an
image of a card counter, thief or blacklisted individual,
then runs that image through the database to find a match
and identify the person. In 2001, the Tampa Police
Department installed police cameras equipped with facial
recognition technology in their City nightlife district in an
attempt to cut down on crime in the area, the system failed
to do the job, and it was scrapped in 2003 due to
ineffectiveness (Patra and Das. 2008).The remainder of
this paper is organized as follows; the first Section was,
introduced framework and discuss -phase of this
framework from reviewed the previous studies. In Second
Section, were about methodology, finally, the researcher
results and concludes.
Research Framework
The paper descript the conceptual framework of face
recognition systems through scope on the algorithms,
usages, benefits, challenges and problems in this felids,
Figure (1)
Figure (1) Face Recognition Framework
Resource: researcher adapted
Literature review
D. Wilkes et. Al., (1992) start with a study related face
recognition system exploited the mobility of the camera by
used low-level image data to drive the camera to a
standard viewpoint with respect to an unknown object,
from such a viewpoint, the object recognition task is
reduced to a two-dimensional pattern recognition problem,
the system was used an efficient tree-based, probabilistic
indexing scheme to find the model object that is likely to
face recognition
techniques
APPLICATION&
ALHORITHMS
FACE RECGNITION
BENFITE
FACE RECGNITION
CHALENGES
Int. J. Advanced Networking and Applications
Volume: 6 Issue: 4 Pages: 2393-2397 (2015) ISSN: 0975-0290
2394
have generated the observed data, and for line tracking
uses a modification of the token-based tracking scheme of
The system has been successfully tested on a set of
origami objects. Given sufficiently accurate low-level data
(CHEN AL ET. 2005) (Jianke, 2009). Recognition time is
expected to grow only logarithmically with the number of
objects stored. (Xiong, 2010).
Thus, Dyar. C.R (1994) argued that there are two basic
behaviors that allow reconstruction of a patch around any
point in a reconstruction surface region. These behaviors
rely only on information extracted directly from face
images, and are simple enough to be executed in real time.
Global surface reconstruction can be provably achieved by
integrating these behaviors to iteratively “grow” the
reconstructed regions integrating these behaviors to
iteratively “grow” the reconstructed regions (Dyar.
C.R.,1994) (PIter, alet, 2008).
In the other hand Jianke Zhu,(2009) was present a fusion
approach to solve the nonrigid shape recovery problem,
which takes advantage of both the appearance information
and the local features, they have two major contributions.
First, they propose a novel progressive finite Newton
optimization scheme for the feature-based nonrigid surface
detection problem, which is reduced to only solving a set
of linear equations. The key is to formulate the non rigid
surface detection as an unconstrained quadratic
optimization problem that has a closed-form solution for a
given set of observations. Second, they proposed a
deformable Lucas-Kanade algorithm that triangulates the
template image into small patches and constrains,
algorithm for both efficient and effective issues.
However, YUN FU (2010) introduced paper about Age
estimation from facial images has promising applications
in human-computer interaction, biometrics, visual
surveillance, and electronic customer relationship
management, etc. Most existing techniques and systems
can only handle frontal or near frontal view age estimation
due to the difficulties of (1) differentiating diverse
variations from uncontrollable and personalized aging
patterns on faces and (2) collecting a fairly large database
covering the chronometrical image series for each
individual in different views, the researcher proposed a
robust framework to deal with multi view age estimation
problem, also a large face database, with significant age,
pose, gender, and identity variations, which should be
followed by classification or regression algorithms (YIN.,
2010).
Also Zheng, (2009) was written in the same topic and
focused on the human action recognition problem and
propose a new Curve-Distance approach based on the
geometry modeling of video appearance manifold and the
human action time series statistics on the geometry
information, he present experimental results on the KTH
database demonstrate the solution to be effective and
promising (Zhang, 2009).
Finally Gao.,et al.,(2008) was proposed a novel high-
order local pattern descriptor, local derivative pattern
(LDP), for face recognition. LDP is a general framework
to encode directional pattern features based on local
derivative variations. The nth-order LDP is proposed to
encode the (n-1)th -order local derivative direction
variations, which can capture more detailed information,
they discover that the high-order LDP consistently
performs much better than LBP for both face
identification and face verification under various
conditions. Next section will be on face recognition
applications
.
Applications of Face Recognition
Allot of application design are available to help in face
recognition, her bellow some of the applications are:
1- Application number one is related to find a face within
a large database of faces. In this approach the system
returns a possible list of faces from the database. The most
useful applications contain crowd surveillance, video
content indexing, and personal identification: driver’s
license, mug shots matching are examples of this type of
application (Wang. 2009) (Whaite et al., 1991).
2- Application number tow is about the real time face
recognition: Here, face recognition is used to identify a
person on the spot and grant access to a building or a
compound, thus avoiding security hassles. In this case the
face is compared will be against a multiple samples of a
person (Bartoli, 2006) (Wright, 2009).
Existing Algorithms
Face Recognition Based on Principal Component
Analysis.
Principal Component Analysis (PCA) is known as
algorithm that used in face recognition. The basic idea in
PCA is to determine a vector of much lower dimension
that best approximates in some sense a given data vector,
thus, in face recognition, it takes an s-dimensional vector
representation of each face in a training set of images
as input, and determines a t-dimensional subspace
whose basis vector is maximum corresponding to the
original image, the dimension of this new subspace is
lower than the original one (t <<s). If the original image
elements are considered as random variables, then the
principal components are along the eigenvectors
corresponding to the larger eigen values of the correlation
matrix, and error minimization is done in a least-squares
sense(Qing Chen, Xiaoli Yang, Jiying Zhao, 2006).
Face Recognition Based on Independent
Component Analysis
Like the PCA based technique, this is also a technique
to extract the statistics of the random variables. However,
in this case, the second-order and higher-order
dependencies of the input data are minimized by the
technique and the basis along which the data is statically
independent are found(Xu.,et al 2007)
Evolutionary Pursuit
This is an eigenspace-based approach that searches for
the best set of projection axes in order to maximize a
fitness function, measuring at the same time the
classification accuracy and generalization ability of the
Int. J. Advanced Networking and Applicatio
Volume: 6 Issue: 4 Pages: 2393-2397 (2
system. Because the dimension of the solu
too big, it is solved using a specific k
algorithm called; Evolutionary Pursuit
2010)
Figure (2) Face Recognition- eigensp
Recourse: Moghaddam et. al.,
Elastic Bunch Graph Matching
All human faces share a similar topolog
faces are represented as graphs, with node
fiducially points (eyes, nose, etc.) and edg
2-D distance vectors. Each node contain
complex Gabor wavelet coefficients at d
and orientations (phase, amplitude), th
"jets". Recognition is based on labeled gra
graph is a set of nodes connected by edge
labeled as jets, edges are labeled as distanc
2006).
Kernel Methods
The face manifold in subspace need n
Kernel methods are a generalization of li
Direct non-linear manifold schemes are
learn this non-linear manifold (Wiskott, al e
Trace Transform
The Trace transform, a generalization
transform, is a new tool for image process
be used for recognizing objects under tr
e.g. rotation, translation and scaling; to
Trace transform one computes a fun
tracing lines of an image. Different Trace
be produced from an image using d
functional (Hu L and Wei Z, 2009).
ons
015) ISSN: 0975-0290
ution space is
ind of genetic
(Yong, et al.,
pace-based
, 1998
gical structure;
es positioned at
es labeled with
ns a set of 40
different scales
hey are called
aphs, a labeled
s; each node is
ces (Zhao et al,
not be linear.
inear methods.
e explored to
et, 1995).
of the Radon
sing which can
ransformations,
o produce the
nctional along
transforms can
different trace
Figure (3) Tesco’s facial rec
Resource: Does Tesco’s facial recog
cross “the creepy lin
(Does, 2013).
Research Methodology
The researcher use descriptive st
framework which formulates the face
as a multiclass cost-sensitive learnin
algorithms was proposed to face recog
Benefits of face recognition systems
Understanding of face scanning bio
important tools for works controlling
biometric clocks can benefit compa
employees.
Benefit 1 - No More Time Fraud:
One of the big benefits of using facial b
in companies is that they weren't have
fraud, it will be impossible for buddy p
since everyone has to have go thru face
biometrics devices to clock (Yun. al., e
Benefit 2 - Better Security :
The companies also enjoy better se
biometrics system, not only can track t
biometrics time attendance tracking, b
be added to the system and tracked
too, anyone that is not in the system
access(Gao , B. Cao , S. Shan , X. C
Zhang and D. Z
Benefit 3 - Automated Facial System
Many companies like the fact that
systems are automated, they weren't h
having someone there to monitor the
day (Xuet al,. 2007).
2395
cognition
gnition ad targeting
ne
tudy to propose a
recognition problem
ng task, and related
nition.
ometrics security is
and monitoring, the
anies in monitoring
biometric systems
to worry about time
punching to occur,
e scanning
et 2010)
ecurity with a face
their employees thru
but any visitors can
throughout the area
m will not be given
Chen , D. Zhou , X.
Zhao ., 2008).
m:
biometric imaging
have to worry about
e system 24 hours a
Int. J. Advanced Networking and Applications
Volume: 6 Issue: 4 Pages: 2393-2397 (2015) ISSN: 0975-0290
2396
Benefit 4 - Easy Integration:
Integrated Biometric facial systems are also easy to
program into the companies computer system, usually they
will work with existing software that they have in place
(Wiskott, ,al et, 1995).
Benefit 5 - High Success Rate:
Facial biometrics technology today has a high success
rate, especially with the emergence of 3d face recognition
technologies, it is extremely difficult to fool the system,
and so you can feel secure knowing that your biometrics
computer security system will be successful at tracking
time and attendance while providing better security
(Jianke Zhu, 2009). Companies with a biometric security
device today can purchase a variety of security devices,
including safes, locks, time clocks, and more (Wilkes et
al., 1992).
Face recognition techniques challenging
One of the most important challenging of face recognition
is the fact that capturing technology requires cooperation
from a subject, for example lens or laser based scanners
require the subject to be at a certain distance from the
sensor, furthermore, a laser scanner requires a few seconds
of complete immobility. In addition, there are currently
very few high-quality face databases available for testing
and evaluation purposes, those databases that are available
should compare to databases used for ( Yun et al., 2010).
Furthermore, the comparison of the different face
recognition techniques is challenging for a number of
reasons:
Firstly; there are a few standardized face databases which
are used for benchmarking purposes, thus, the size and
type of 3D face datasets varies significantly across
different publications.
Secondly; there are differences in the experimental setup
and in the metrics which are used to evaluate the
performance of face recognition techniques, in terms of
the data and algorithms used and the reported recognition
performance. (Yong., et al. 2010).
Even though 3D face recognition is still a new emerging
area, there is a need to compare the strength of each
technique in a controlled setting where they would be
subjected to the same evaluation protocol on a large
dataset; this need for objective evaluation prompted
the design of the evaluation studies as well as the
upcoming. (Moghaddam, & Pentland., 1998) (Bartoli,
2006)
The principles of biometric evaluation laid down in the
evaluation strategy, so far, these evaluation studies are
limited to 2D face recognition techniques but will
hopefully include 3D face recognition techniques in the
near future
II. CONCLUSION
Face images are the inputs of the face
recognition system, there are a deferent algorithms, and
methods used for faces recognizing, even though, the
fields still have a challenges and limitations; it is still now
need more accurate techniques, especially for the 3D, also
the capturing technology requires of cooperation subject
still face a problems and, challenges, furthermore the
e x t e n s i o n of current face recognition has a bigger
problem of face detection, the network need parameters
leading to reduced poor generalization capabilities, and
face detection tasks are needed for given highs
images detection. Finally researchers find that the
change of recognition rate is not appreciable when the
number of hidden neurons is more than 40, the researcher
recommends that there's a needs for evaluation studies,
and researches especially on face recognition field and
3D, in order reduces problems and challenges in the
felids, will hopefully for new advanced techniques and
methods in the near future.
ACKNOWLEDGEMENTS
The author asmahan altaher is grateful to the
Applied science Private University , Amman , Jordan , for
the full financial support granted to this research project
(DRGS-2014-2015-37)
References
[1] A. Patra and S. Das. (2008) Enhancing decision
combination of face and fingerprint by exploitation of
individual classifier space: An approach to multi-modal
biometry. Pattern Recognition, 41(7):2298-2308.
[2] D. Zhang and Y. Wang. (2009)Gender Recognition
Based on Fusion of Face and Multi-view Gait.(2009) In
LNCS, volume 5558, pages 1010-1018. Springer, 2009.
[3]Hu L and Wei Z,(2009) "An Algorithm of Glass-Image
Recognition Based on Wavelet Packet Decomposition,
"International Conference on Computational Intelligence
and Natural Computing, vol.1, 2009, pp.206-209.
[4] Yun Fu,(2010) Age Synthesis and Estimation via
Faces: IEEE CONFERENCE PUBLICATIONS A Survey,
2010 , Page(s): 2590 - 2597
Cited by: Papers (3).
[5] Zhang. D and Y. Wang.(2009)" Gender Recognition
Based on Fusion of Face and Multi-view Gait". In LNCS,
volume 5558, pages 1010-1018. Springer,
[6] Whaite., p.and Ferrie,.P (1991) "From uncertainty to
visual exploration", IEEE T-PAMI, vol. 13, no. 10,
pp.1038 -1049 1991.
[7] Wilkes,. D. and Tsotsos,. J. K. (1992) "Active object
recognition", Proc. CVPR, pp.136 -141 1992
[8] Jianke Zhu,(2009) A Fast 2D Shape Recovery
Approach by Fusing Features and Appearance Pattern
Int. J. Advanced Networking and Applications
Volume: 6 Issue: 4 Pages: 2393-2397 (2015) ISSN: 0975-0290
2397
Analysis and Machine Intelligence, IEEE Transactions on,
Volume:31 , Issue: 7
[9]. Pilet, V. Lepetit and P. Fua,(2008) "Fast Non-Rigid
Surface Detection, Registration and Realistic
Augmentation," Int',l J. Computer Vision, vol. 76, no. 2,
pp. 109-122, 2008.
[10] Zhao W., R. Chellappa , P. J. Phillips and A.
Rosenfeld,(2006) "Face recognition: A literature survey",
ACM Comput. Surv., vol. 35, no. 4, pp.399 -459 2006.
[11] Bartoli, A (2006)"Groupwise Geometric and
Photometric Direct Image Registration," Proc. 17th British
Machine Vision Conf., Sept. 2006.
[12] Moghaddam.B, Wahid W. & Pentland A., (1998) "
International conference on face & Gesture
Recognition,Nara, Japan.
[13]http://www.troyhunt.com/,Does (2013) Tesco’s facial
recognition ad targeting cross “the creepy line”?,
November 6, 2013.
[14] Zheng, Haomian (2009) "Efficient human action
recognition by luminance field trajectory and geometry
information, Multimedia and Expo", 2009. ICME 2009.
IEEE International Conference on, Pages, 842 – 845
[15] Qing Chen, Xiaoli Yang, Jiying Zhao,(2005)
"Robust image watermarking with Zernike moments,"
IEEE 1-4 May 2005 Page(s):1340 – 1343.
[16] Wright, J.; Yang, A.Y.; Ganesh, A.; Sastry, S.S.; Yi
Ma,(2009) "Robust Face Recognition via Sparse
Representation," Pattern Analysis and Machine
Intelligence, IEEE Transactions on , vol.31, no.2,
pp.210-227, Feb. 2009
[17] Shlizerman, Kemelmacher- (2011)'3D Face
Reconstruction from a Single Image Using a Single
Reference Face Shape", Biometrics Compendium, IEEE,
Volume:33 , Issue: 2). 2011 , Page(s): 394 – 405.
[18]Yong sheng Gao ; Sanqiang Zhao ; Jianzhuang
Liu.,(2010)Local Derivative Pattern Versus Local Binary
Pattern: Face Recognition With High-Order Local Pattern
Descriptor, Image Processing,Biometrics Compendium,
IEEE Transactions on (Volume:19 , Issue: 2 ).
[19] Gao , B. Cao , S. Shan , X. Chen , D. Zhou , X. Zhang
and D. Zhao (2008) "The CAS-PEAL large-scale Chinese
face database and baseline evaluations", IEEE Trans.
Syst., Man., Cybern. A, Syst. Humans, vol. 38, no. 1,
pp.149 -161 2008.
[20]Xiong Li ; Xu Zhao ; Yun Fu ; Yuncai Liu , ( 2010)
Bimodal gender recognition from face and fingerprint. :
IEEE CONFERENCE PUBLICATIONS A Survey.
[21]X. Xu and T. S. Huang. (2007)SODA-Boosting and its
application to gender recognition. In IEEE International
Workshop on Analysis and Modeling of Faces and
Gestures, volume 4778, pages 193-204, 2007.
[22]Yin Zhang,(2010) " Cost-Sensitive Face Recognition",
Biometrics Compendium, 32 , Issue: 10 , Biometrics
Compendium, IEEE , 2010 , Page(s): 1758 – 1769
[23] Wiskott,L, Fellous, J. Kruger,N and C. von der
Malsburg.(1995)" Face recognition and gender
determination. In IEEE International Workshop on
Automatic Face and Gesture Recognition, 1995.
[24] Dyar. C.R (1994) "Global surface reconstruction by
purposive control of observer motion", Computer Vision
and Pattern Recognition, 1994. Proceedings CVPR '94.,
1994 IEEE Computer Society Conference .
Authors Biography
Dr.Asmahan M Altaher, Associate
professor Faculty of Business
Administration. Management Information
system Department –Applied Science
Private University, Amman- Jordan Sep –
2009 – till now.

Weitere ähnliche Inhalte

Was ist angesagt?

face recognition system
face recognition systemface recognition system
face recognition system
Anil Kumar
 

Was ist angesagt? (19)

Review of facial expression recognition system and used datasets
Review of facial expression recognition system and used datasetsReview of facial expression recognition system and used datasets
Review of facial expression recognition system and used datasets
 
Review of facial expression recognition system and
Review of facial expression recognition system andReview of facial expression recognition system and
Review of facial expression recognition system and
 
An optimal face recoginition tool
An optimal face recoginition toolAn optimal face recoginition tool
An optimal face recoginition tool
 
An interactive image segmentation using multiple user input’s
An interactive image segmentation using multiple user input’sAn interactive image segmentation using multiple user input’s
An interactive image segmentation using multiple user input’s
 
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
 
Face Recognition System under Varying Lighting Conditions
Face Recognition System under Varying Lighting ConditionsFace Recognition System under Varying Lighting Conditions
Face Recognition System under Varying Lighting Conditions
 
Antispoofing techniques in Facial recognition
Antispoofing techniques in Facial recognitionAntispoofing techniques in Facial recognition
Antispoofing techniques in Facial recognition
 
Explaining Aluminous Ascientification Of Significance Examples Of Personal St...
Explaining Aluminous Ascientification Of Significance Examples Of Personal St...Explaining Aluminous Ascientification Of Significance Examples Of Personal St...
Explaining Aluminous Ascientification Of Significance Examples Of Personal St...
 
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSINGAN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
 
M phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projectsM phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projects
 
Face Annotation using Co-Relation based Matching for Improving Image Mining ...
Face Annotation using Co-Relation based Matching  for Improving Image Mining ...Face Annotation using Co-Relation based Matching  for Improving Image Mining ...
Face Annotation using Co-Relation based Matching for Improving Image Mining ...
 
face recognition system
face recognition systemface recognition system
face recognition system
 
Comparative Analysis of Face Recognition Methodologies and Techniques
Comparative Analysis of Face Recognition Methodologies and TechniquesComparative Analysis of Face Recognition Methodologies and Techniques
Comparative Analysis of Face Recognition Methodologies and Techniques
 
Different Viewpoints of Recognizing Fleeting Facial Expressions with DWT
Different Viewpoints of Recognizing Fleeting Facial Expressions with DWTDifferent Viewpoints of Recognizing Fleeting Facial Expressions with DWT
Different Viewpoints of Recognizing Fleeting Facial Expressions with DWT
 
IRJET- Customized Campus Surveillance System
IRJET- Customized Campus Surveillance SystemIRJET- Customized Campus Surveillance System
IRJET- Customized Campus Surveillance System
 
Built-in Face Recognition for Smart Phone Devices
Built-in Face Recognition for Smart Phone DevicesBuilt-in Face Recognition for Smart Phone Devices
Built-in Face Recognition for Smart Phone Devices
 
A comparative review of various approaches for feature extraction in Face rec...
A comparative review of various approaches for feature extraction in Face rec...A comparative review of various approaches for feature extraction in Face rec...
A comparative review of various approaches for feature extraction in Face rec...
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
 
Facerecognition
FacerecognitionFacerecognition
Facerecognition
 

Andere mochten auch

Brunei inc for brunei research symposium uk 2013
Brunei inc for brunei research symposium uk 2013Brunei inc for brunei research symposium uk 2013
Brunei inc for brunei research symposium uk 2013
Malik Omar
 
CL434 Dissertation
CL434 DissertationCL434 Dissertation
CL434 Dissertation
Gordon Best
 
The Lessons of the Financial Crisis
The Lessons of the Financial CrisisThe Lessons of the Financial Crisis
The Lessons of the Financial Crisis
Gordon Best
 
EPM Class Report B
EPM Class Report  BEPM Class Report  B
EPM Class Report B
Gordon Best
 

Andere mochten auch (19)

Ph.d in english
Ph.d in englishPh.d in english
Ph.d in english
 
Ph.d in sanskrit
Ph.d in sanskritPh.d in sanskrit
Ph.d in sanskrit
 
Vudactrungky
VudactrungkyVudactrungky
Vudactrungky
 
Micro Nutrient Fortification
Micro Nutrient FortificationMicro Nutrient Fortification
Micro Nutrient Fortification
 
The Devolution of Powers of BSB: “Would the introduction of the Mayoral Syste...
The Devolution of Powers of BSB: “Would the introduction of the Mayoral Syste...The Devolution of Powers of BSB: “Would the introduction of the Mayoral Syste...
The Devolution of Powers of BSB: “Would the introduction of the Mayoral Syste...
 
Brunei inc for brunei research symposium uk 2013
Brunei inc for brunei research symposium uk 2013Brunei inc for brunei research symposium uk 2013
Brunei inc for brunei research symposium uk 2013
 
Lòng mẹ
Lòng mẹLòng mẹ
Lòng mẹ
 
Vertical Industrial Policy Debate
Vertical Industrial Policy DebateVertical Industrial Policy Debate
Vertical Industrial Policy Debate
 
fluoride application
fluoride applicationfluoride application
fluoride application
 
Best Practices for Getting the Most out of SolarWinds Engineer’s Toolset
Best Practices for Getting the Most out of SolarWinds Engineer’s ToolsetBest Practices for Getting the Most out of SolarWinds Engineer’s Toolset
Best Practices for Getting the Most out of SolarWinds Engineer’s Toolset
 
Georg Simon Ohm MBA program Germany
Georg Simon Ohm MBA program GermanyGeorg Simon Ohm MBA program Germany
Georg Simon Ohm MBA program Germany
 
International business the internationalization of quixote into the emergin...
International business   the internationalization of quixote into the emergin...International business   the internationalization of quixote into the emergin...
International business the internationalization of quixote into the emergin...
 
Android Auto instrumentation
Android Auto instrumentationAndroid Auto instrumentation
Android Auto instrumentation
 
CL434 Dissertation
CL434 DissertationCL434 Dissertation
CL434 Dissertation
 
The Lessons of the Financial Crisis
The Lessons of the Financial CrisisThe Lessons of the Financial Crisis
The Lessons of the Financial Crisis
 
EPM Class Report B
EPM Class Report  BEPM Class Report  B
EPM Class Report B
 
Marketing de videojuegos
Marketing de videojuegosMarketing de videojuegos
Marketing de videojuegos
 
Matt maycock understanding masculinity 26th jan 2016
Matt maycock   understanding masculinity 26th jan 2016Matt maycock   understanding masculinity 26th jan 2016
Matt maycock understanding masculinity 26th jan 2016
 
Delirium
DeliriumDelirium
Delirium
 

Ähnlich wie Face Recognition Techniques - An evaluation Study

Smriti's research paper
Smriti's research paperSmriti's research paper
Smriti's research paper
Smriti Tikoo
 
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
ijbuiiir1
 
Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...
Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...
Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...
IJERA Editor
 

Ähnlich wie Face Recognition Techniques - An evaluation Study (20)

IRJET- A Review on Various Techniques for Face Detection
IRJET- A Review on Various Techniques for Face DetectionIRJET- A Review on Various Techniques for Face Detection
IRJET- A Review on Various Techniques for Face Detection
 
Person identification based on facial biometrics in different lighting condit...
Person identification based on facial biometrics in different lighting condit...Person identification based on facial biometrics in different lighting condit...
Person identification based on facial biometrics in different lighting condit...
 
K017247882
K017247882K017247882
K017247882
 
A Hybrid Approach to Face Detection And Feature Extraction
A Hybrid Approach to Face Detection And Feature ExtractionA Hybrid Approach to Face Detection And Feature Extraction
A Hybrid Approach to Face Detection And Feature Extraction
 
Smriti's research paper
Smriti's research paperSmriti's research paper
Smriti's research paper
 
Progression in Large Age-Gap Face Verification
Progression in Large Age-Gap Face VerificationProgression in Large Age-Gap Face Verification
Progression in Large Age-Gap Face Verification
 
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
 
184
184184
184
 
IRJET- Vehicle Seat Vacancy Identification using Image Processing Technique
IRJET- Vehicle Seat Vacancy Identification using Image Processing TechniqueIRJET- Vehicle Seat Vacancy Identification using Image Processing Technique
IRJET- Vehicle Seat Vacancy Identification using Image Processing Technique
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
 
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
 
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
 
Face Recognition Smart Attendance System- A Survey
Face Recognition Smart Attendance System- A SurveyFace Recognition Smart Attendance System- A Survey
Face Recognition Smart Attendance System- A Survey
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Realtime human face tracking and recognition system on uncontrolled environment
Realtime human face tracking and recognition system on  uncontrolled environmentRealtime human face tracking and recognition system on  uncontrolled environment
Realtime human face tracking and recognition system on uncontrolled environment
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
 
Kh3418561861
Kh3418561861Kh3418561861
Kh3418561861
 
Facial recognition based on enhanced neural network
Facial recognition based on enhanced neural networkFacial recognition based on enhanced neural network
Facial recognition based on enhanced neural network
 
Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...
Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...
Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...
 
Local Descriptor based Face Recognition System
Local Descriptor based Face Recognition SystemLocal Descriptor based Face Recognition System
Local Descriptor based Face Recognition System
 

Mehr von Eswar Publications

Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Eswar Publications
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
Eswar Publications
 

Mehr von Eswar Publications (20)

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A Survey
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using Microcontroller
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality Parameters
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case Study
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon Perspectives
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC Algorithm
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
 

Kürzlich hochgeladen

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 

Face Recognition Techniques - An evaluation Study

  • 1. Int. J. Advanced Networking and Applications Volume: 6 Issue: 4 Pages: 2393-2397 (2015) ISSN: 0975-0290 2393 Face Recognition Techniques - An evaluation Study Dr.Asmahan M Altaher Department of Management Information System, Applied Science University, 166-11391, Jordan Email: a_altaher68@hotmail.com ----------------------------------------------------------------ABSTRACT------------------------------------------------------------------ Face recognition is the ability of categorize a set of images based on certain discriminatory features. Classification of the recognition patterns can be difficult problem and it is still very active field of research. The paper introduces conceptual framework for descriptive study on techniques of face recognition systems. It aims to describe the previous researches have been study the face recognition system, in order scope on the algorithms, usages, benefits , challenges and problems in this felids, the paper proposed the face recognition as sensitive learning task experiments on a large face databases demonstrate of the new feature. The researcher recommends that there's a needs to evaluate the previous studies and researches, especially on face recognition field and 3D, hopeful for advanced techniques and methods in the near future. Keywords - Face recognition Techniques, recognition algorithm, automated Facial System, evolutionary Pursuit, and Kernel Methods. -------------------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: October 30, 2014 Date of Acceptance: December 29, 2014 ------------------------------------------------------------------------------------------------------------------------------------------------- I. INTRODUCTION The Humans have recognition capabilities that are unparalleled in the modern computing era. Humans have always had the a ability to recognize and distinguish between faces features . Recently the computers have been shown the same ability. In the mid of 1960s, scientists began work on using the computer to recognize human faces, since that time the facial recognition software has come a long way, the governments and private companies start to used the face recognition system . A lot of changes are being made to enhance scientists capabilities in this field (Zhang al et., 2009). Many researchers belief that face recognition need to be about face detection, the prior step to face recognition, the accurate detection of human faces in arbitrary scenes, is the most important process involved. Human faces are remarkably similar in global properties, including size, aspect ratio, and location of main features, but can vary considerably in details across individuals, gender, race, or due to facial expression, most traditional face recognition systems attempt to achieve a low recognition error rate, implicitly assuming that the losses of all misclassifications are the same (Shlizerman, 2011). Facial recognition software in any given episode, the security department at the fictional. Montecito Hotel and Casino uses its video surveillance system to pull an image of a card counter, thief or blacklisted individual, then runs that image through the database to find a match and identify the person. In 2001, the Tampa Police Department installed police cameras equipped with facial recognition technology in their City nightlife district in an attempt to cut down on crime in the area, the system failed to do the job, and it was scrapped in 2003 due to ineffectiveness (Patra and Das. 2008).The remainder of this paper is organized as follows; the first Section was, introduced framework and discuss -phase of this framework from reviewed the previous studies. In Second Section, were about methodology, finally, the researcher results and concludes. Research Framework The paper descript the conceptual framework of face recognition systems through scope on the algorithms, usages, benefits, challenges and problems in this felids, Figure (1) Figure (1) Face Recognition Framework Resource: researcher adapted Literature review D. Wilkes et. Al., (1992) start with a study related face recognition system exploited the mobility of the camera by used low-level image data to drive the camera to a standard viewpoint with respect to an unknown object, from such a viewpoint, the object recognition task is reduced to a two-dimensional pattern recognition problem, the system was used an efficient tree-based, probabilistic indexing scheme to find the model object that is likely to face recognition techniques APPLICATION& ALHORITHMS FACE RECGNITION BENFITE FACE RECGNITION CHALENGES
  • 2. Int. J. Advanced Networking and Applications Volume: 6 Issue: 4 Pages: 2393-2397 (2015) ISSN: 0975-0290 2394 have generated the observed data, and for line tracking uses a modification of the token-based tracking scheme of The system has been successfully tested on a set of origami objects. Given sufficiently accurate low-level data (CHEN AL ET. 2005) (Jianke, 2009). Recognition time is expected to grow only logarithmically with the number of objects stored. (Xiong, 2010). Thus, Dyar. C.R (1994) argued that there are two basic behaviors that allow reconstruction of a patch around any point in a reconstruction surface region. These behaviors rely only on information extracted directly from face images, and are simple enough to be executed in real time. Global surface reconstruction can be provably achieved by integrating these behaviors to iteratively “grow” the reconstructed regions integrating these behaviors to iteratively “grow” the reconstructed regions (Dyar. C.R.,1994) (PIter, alet, 2008). In the other hand Jianke Zhu,(2009) was present a fusion approach to solve the nonrigid shape recovery problem, which takes advantage of both the appearance information and the local features, they have two major contributions. First, they propose a novel progressive finite Newton optimization scheme for the feature-based nonrigid surface detection problem, which is reduced to only solving a set of linear equations. The key is to formulate the non rigid surface detection as an unconstrained quadratic optimization problem that has a closed-form solution for a given set of observations. Second, they proposed a deformable Lucas-Kanade algorithm that triangulates the template image into small patches and constrains, algorithm for both efficient and effective issues. However, YUN FU (2010) introduced paper about Age estimation from facial images has promising applications in human-computer interaction, biometrics, visual surveillance, and electronic customer relationship management, etc. Most existing techniques and systems can only handle frontal or near frontal view age estimation due to the difficulties of (1) differentiating diverse variations from uncontrollable and personalized aging patterns on faces and (2) collecting a fairly large database covering the chronometrical image series for each individual in different views, the researcher proposed a robust framework to deal with multi view age estimation problem, also a large face database, with significant age, pose, gender, and identity variations, which should be followed by classification or regression algorithms (YIN., 2010). Also Zheng, (2009) was written in the same topic and focused on the human action recognition problem and propose a new Curve-Distance approach based on the geometry modeling of video appearance manifold and the human action time series statistics on the geometry information, he present experimental results on the KTH database demonstrate the solution to be effective and promising (Zhang, 2009). Finally Gao.,et al.,(2008) was proposed a novel high- order local pattern descriptor, local derivative pattern (LDP), for face recognition. LDP is a general framework to encode directional pattern features based on local derivative variations. The nth-order LDP is proposed to encode the (n-1)th -order local derivative direction variations, which can capture more detailed information, they discover that the high-order LDP consistently performs much better than LBP for both face identification and face verification under various conditions. Next section will be on face recognition applications . Applications of Face Recognition Allot of application design are available to help in face recognition, her bellow some of the applications are: 1- Application number one is related to find a face within a large database of faces. In this approach the system returns a possible list of faces from the database. The most useful applications contain crowd surveillance, video content indexing, and personal identification: driver’s license, mug shots matching are examples of this type of application (Wang. 2009) (Whaite et al., 1991). 2- Application number tow is about the real time face recognition: Here, face recognition is used to identify a person on the spot and grant access to a building or a compound, thus avoiding security hassles. In this case the face is compared will be against a multiple samples of a person (Bartoli, 2006) (Wright, 2009). Existing Algorithms Face Recognition Based on Principal Component Analysis. Principal Component Analysis (PCA) is known as algorithm that used in face recognition. The basic idea in PCA is to determine a vector of much lower dimension that best approximates in some sense a given data vector, thus, in face recognition, it takes an s-dimensional vector representation of each face in a training set of images as input, and determines a t-dimensional subspace whose basis vector is maximum corresponding to the original image, the dimension of this new subspace is lower than the original one (t <<s). If the original image elements are considered as random variables, then the principal components are along the eigenvectors corresponding to the larger eigen values of the correlation matrix, and error minimization is done in a least-squares sense(Qing Chen, Xiaoli Yang, Jiying Zhao, 2006). Face Recognition Based on Independent Component Analysis Like the PCA based technique, this is also a technique to extract the statistics of the random variables. However, in this case, the second-order and higher-order dependencies of the input data are minimized by the technique and the basis along which the data is statically independent are found(Xu.,et al 2007) Evolutionary Pursuit This is an eigenspace-based approach that searches for the best set of projection axes in order to maximize a fitness function, measuring at the same time the classification accuracy and generalization ability of the
  • 3. Int. J. Advanced Networking and Applicatio Volume: 6 Issue: 4 Pages: 2393-2397 (2 system. Because the dimension of the solu too big, it is solved using a specific k algorithm called; Evolutionary Pursuit 2010) Figure (2) Face Recognition- eigensp Recourse: Moghaddam et. al., Elastic Bunch Graph Matching All human faces share a similar topolog faces are represented as graphs, with node fiducially points (eyes, nose, etc.) and edg 2-D distance vectors. Each node contain complex Gabor wavelet coefficients at d and orientations (phase, amplitude), th "jets". Recognition is based on labeled gra graph is a set of nodes connected by edge labeled as jets, edges are labeled as distanc 2006). Kernel Methods The face manifold in subspace need n Kernel methods are a generalization of li Direct non-linear manifold schemes are learn this non-linear manifold (Wiskott, al e Trace Transform The Trace transform, a generalization transform, is a new tool for image process be used for recognizing objects under tr e.g. rotation, translation and scaling; to Trace transform one computes a fun tracing lines of an image. Different Trace be produced from an image using d functional (Hu L and Wei Z, 2009). ons 015) ISSN: 0975-0290 ution space is ind of genetic (Yong, et al., pace-based , 1998 gical structure; es positioned at es labeled with ns a set of 40 different scales hey are called aphs, a labeled s; each node is ces (Zhao et al, not be linear. inear methods. e explored to et, 1995). of the Radon sing which can ransformations, o produce the nctional along transforms can different trace Figure (3) Tesco’s facial rec Resource: Does Tesco’s facial recog cross “the creepy lin (Does, 2013). Research Methodology The researcher use descriptive st framework which formulates the face as a multiclass cost-sensitive learnin algorithms was proposed to face recog Benefits of face recognition systems Understanding of face scanning bio important tools for works controlling biometric clocks can benefit compa employees. Benefit 1 - No More Time Fraud: One of the big benefits of using facial b in companies is that they weren't have fraud, it will be impossible for buddy p since everyone has to have go thru face biometrics devices to clock (Yun. al., e Benefit 2 - Better Security : The companies also enjoy better se biometrics system, not only can track t biometrics time attendance tracking, b be added to the system and tracked too, anyone that is not in the system access(Gao , B. Cao , S. Shan , X. C Zhang and D. Z Benefit 3 - Automated Facial System Many companies like the fact that systems are automated, they weren't h having someone there to monitor the day (Xuet al,. 2007). 2395 cognition gnition ad targeting ne tudy to propose a recognition problem ng task, and related nition. ometrics security is and monitoring, the anies in monitoring biometric systems to worry about time punching to occur, e scanning et 2010) ecurity with a face their employees thru but any visitors can throughout the area m will not be given Chen , D. Zhou , X. Zhao ., 2008). m: biometric imaging have to worry about e system 24 hours a
  • 4. Int. J. Advanced Networking and Applications Volume: 6 Issue: 4 Pages: 2393-2397 (2015) ISSN: 0975-0290 2396 Benefit 4 - Easy Integration: Integrated Biometric facial systems are also easy to program into the companies computer system, usually they will work with existing software that they have in place (Wiskott, ,al et, 1995). Benefit 5 - High Success Rate: Facial biometrics technology today has a high success rate, especially with the emergence of 3d face recognition technologies, it is extremely difficult to fool the system, and so you can feel secure knowing that your biometrics computer security system will be successful at tracking time and attendance while providing better security (Jianke Zhu, 2009). Companies with a biometric security device today can purchase a variety of security devices, including safes, locks, time clocks, and more (Wilkes et al., 1992). Face recognition techniques challenging One of the most important challenging of face recognition is the fact that capturing technology requires cooperation from a subject, for example lens or laser based scanners require the subject to be at a certain distance from the sensor, furthermore, a laser scanner requires a few seconds of complete immobility. In addition, there are currently very few high-quality face databases available for testing and evaluation purposes, those databases that are available should compare to databases used for ( Yun et al., 2010). Furthermore, the comparison of the different face recognition techniques is challenging for a number of reasons: Firstly; there are a few standardized face databases which are used for benchmarking purposes, thus, the size and type of 3D face datasets varies significantly across different publications. Secondly; there are differences in the experimental setup and in the metrics which are used to evaluate the performance of face recognition techniques, in terms of the data and algorithms used and the reported recognition performance. (Yong., et al. 2010). Even though 3D face recognition is still a new emerging area, there is a need to compare the strength of each technique in a controlled setting where they would be subjected to the same evaluation protocol on a large dataset; this need for objective evaluation prompted the design of the evaluation studies as well as the upcoming. (Moghaddam, & Pentland., 1998) (Bartoli, 2006) The principles of biometric evaluation laid down in the evaluation strategy, so far, these evaluation studies are limited to 2D face recognition techniques but will hopefully include 3D face recognition techniques in the near future II. CONCLUSION Face images are the inputs of the face recognition system, there are a deferent algorithms, and methods used for faces recognizing, even though, the fields still have a challenges and limitations; it is still now need more accurate techniques, especially for the 3D, also the capturing technology requires of cooperation subject still face a problems and, challenges, furthermore the e x t e n s i o n of current face recognition has a bigger problem of face detection, the network need parameters leading to reduced poor generalization capabilities, and face detection tasks are needed for given highs images detection. Finally researchers find that the change of recognition rate is not appreciable when the number of hidden neurons is more than 40, the researcher recommends that there's a needs for evaluation studies, and researches especially on face recognition field and 3D, in order reduces problems and challenges in the felids, will hopefully for new advanced techniques and methods in the near future. ACKNOWLEDGEMENTS The author asmahan altaher is grateful to the Applied science Private University , Amman , Jordan , for the full financial support granted to this research project (DRGS-2014-2015-37) References [1] A. Patra and S. Das. (2008) Enhancing decision combination of face and fingerprint by exploitation of individual classifier space: An approach to multi-modal biometry. Pattern Recognition, 41(7):2298-2308. [2] D. Zhang and Y. Wang. (2009)Gender Recognition Based on Fusion of Face and Multi-view Gait.(2009) In LNCS, volume 5558, pages 1010-1018. Springer, 2009. [3]Hu L and Wei Z,(2009) "An Algorithm of Glass-Image Recognition Based on Wavelet Packet Decomposition, "International Conference on Computational Intelligence and Natural Computing, vol.1, 2009, pp.206-209. [4] Yun Fu,(2010) Age Synthesis and Estimation via Faces: IEEE CONFERENCE PUBLICATIONS A Survey, 2010 , Page(s): 2590 - 2597 Cited by: Papers (3). [5] Zhang. D and Y. Wang.(2009)" Gender Recognition Based on Fusion of Face and Multi-view Gait". In LNCS, volume 5558, pages 1010-1018. Springer, [6] Whaite., p.and Ferrie,.P (1991) "From uncertainty to visual exploration", IEEE T-PAMI, vol. 13, no. 10, pp.1038 -1049 1991. [7] Wilkes,. D. and Tsotsos,. J. K. (1992) "Active object recognition", Proc. CVPR, pp.136 -141 1992 [8] Jianke Zhu,(2009) A Fast 2D Shape Recovery Approach by Fusing Features and Appearance Pattern
  • 5. Int. J. Advanced Networking and Applications Volume: 6 Issue: 4 Pages: 2393-2397 (2015) ISSN: 0975-0290 2397 Analysis and Machine Intelligence, IEEE Transactions on, Volume:31 , Issue: 7 [9]. Pilet, V. Lepetit and P. Fua,(2008) "Fast Non-Rigid Surface Detection, Registration and Realistic Augmentation," Int',l J. Computer Vision, vol. 76, no. 2, pp. 109-122, 2008. [10] Zhao W., R. Chellappa , P. J. Phillips and A. Rosenfeld,(2006) "Face recognition: A literature survey", ACM Comput. Surv., vol. 35, no. 4, pp.399 -459 2006. [11] Bartoli, A (2006)"Groupwise Geometric and Photometric Direct Image Registration," Proc. 17th British Machine Vision Conf., Sept. 2006. [12] Moghaddam.B, Wahid W. & Pentland A., (1998) " International conference on face & Gesture Recognition,Nara, Japan. [13]http://www.troyhunt.com/,Does (2013) Tesco’s facial recognition ad targeting cross “the creepy line”?, November 6, 2013. [14] Zheng, Haomian (2009) "Efficient human action recognition by luminance field trajectory and geometry information, Multimedia and Expo", 2009. ICME 2009. IEEE International Conference on, Pages, 842 – 845 [15] Qing Chen, Xiaoli Yang, Jiying Zhao,(2005) "Robust image watermarking with Zernike moments," IEEE 1-4 May 2005 Page(s):1340 – 1343. [16] Wright, J.; Yang, A.Y.; Ganesh, A.; Sastry, S.S.; Yi Ma,(2009) "Robust Face Recognition via Sparse Representation," Pattern Analysis and Machine Intelligence, IEEE Transactions on , vol.31, no.2, pp.210-227, Feb. 2009 [17] Shlizerman, Kemelmacher- (2011)'3D Face Reconstruction from a Single Image Using a Single Reference Face Shape", Biometrics Compendium, IEEE, Volume:33 , Issue: 2). 2011 , Page(s): 394 – 405. [18]Yong sheng Gao ; Sanqiang Zhao ; Jianzhuang Liu.,(2010)Local Derivative Pattern Versus Local Binary Pattern: Face Recognition With High-Order Local Pattern Descriptor, Image Processing,Biometrics Compendium, IEEE Transactions on (Volume:19 , Issue: 2 ). [19] Gao , B. Cao , S. Shan , X. Chen , D. Zhou , X. Zhang and D. Zhao (2008) "The CAS-PEAL large-scale Chinese face database and baseline evaluations", IEEE Trans. Syst., Man., Cybern. A, Syst. Humans, vol. 38, no. 1, pp.149 -161 2008. [20]Xiong Li ; Xu Zhao ; Yun Fu ; Yuncai Liu , ( 2010) Bimodal gender recognition from face and fingerprint. : IEEE CONFERENCE PUBLICATIONS A Survey. [21]X. Xu and T. S. Huang. (2007)SODA-Boosting and its application to gender recognition. In IEEE International Workshop on Analysis and Modeling of Faces and Gestures, volume 4778, pages 193-204, 2007. [22]Yin Zhang,(2010) " Cost-Sensitive Face Recognition", Biometrics Compendium, 32 , Issue: 10 , Biometrics Compendium, IEEE , 2010 , Page(s): 1758 – 1769 [23] Wiskott,L, Fellous, J. Kruger,N and C. von der Malsburg.(1995)" Face recognition and gender determination. In IEEE International Workshop on Automatic Face and Gesture Recognition, 1995. [24] Dyar. C.R (1994) "Global surface reconstruction by purposive control of observer motion", Computer Vision and Pattern Recognition, 1994. Proceedings CVPR '94., 1994 IEEE Computer Society Conference . Authors Biography Dr.Asmahan M Altaher, Associate professor Faculty of Business Administration. Management Information system Department –Applied Science Private University, Amman- Jordan Sep – 2009 – till now.