SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
517
A SURVEY ON HUMAN FACE RECOGNITION INVARIANT TO
ILLUMINATION
U.K. Jaliya1
, J.M. Rathod2
1
Assistant Professor, Department of Computer Engineering, BVM Engineering College,
Vallabh Vidyanagr, Anand, Gujarat, India
2
Associate Professor, Department of Electronics, BVM Engineering College, Vallabh
Vidyanagr, Anand, Gujarat, India
ABSTRACT
Human face recognition is one of the research areas in the current era of the research.
It is one the widely used biometric technique for identification and verification of the human
face. There are many challenges to face recognition which degrade the performance of the
algorithm. The illumination variation problem is one of the well-known problems in face
recognition in uncontrolled environment. In this paper an extensive and up-to-date survey of
the existing techniques to address this problem is presented. Different authors have given so
many techniques for illumination reduction from the face image but still some combined
survey is missing so we have tried to fill that gaps in this paper. We have collected various
preprocessing techniques suggested by different authors and shown their results in a tabular
form. After preprocessing we can use any of the recognition method for face recognition.
There are so many online face databases available so we can use any of them.
Keywords: PCA (Principle component Analysis), HE (Histogram Equalization), AHE
(Adaptive Histogram Equalization), BHE (Block-based Histogram Equalization), DWT
(Discrete Wavelet Transform), DCT (Discrete Cosine Transform), LBP (Local Binary
Pattern), DMQI (Dynamic Morphological Quotient Image), LTP (Local Ternary Pattern),
DSFQI (Different Smoothing filters Quotient Image).
I. INTRODUCTION
Face recognition has been an active research area over the last 30 years. It has been
studied by scientists from different areas of psychophysical sciences and those from different
areas of computer sciences. Psychologists and neuroscientists mainly deal with the human
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING
& TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 4, Issue 2, March – April (2013), pp. 517-525
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2013): 6.1302 (Calculated by GISI)
www.jifactor.com
IJCET
© I A E M E
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
518
perception part of the topic, whereas engineers studying on machine recognition of human
faces deal with the computational aspects of face recognition.
Face recognition has applications mainly in the fields of biometrics, access control,
law enforcement, and security and surveillance systems. Biometrics are methods to
automatically verify or identify individuals using their physiological or behavioral
characteristics [1].
The necessity for personal identification in the fields of private and secure systems
made face recognition one of the main fields among other biometric technologies. The
importance of face recognition rises from the fact that a face recognition system does not
require the cooperation of the individual while the other systems need such cooperation.
Figure 1.shows the sketch for any pattern recognition technique.
Figure 1 Sketch of pattern recognition architecture
The topic seems to be easy for a human, where limited memory can be a main
problem; whereas the problems in machine recognition are manifold. Some of possible
problems for a machine face recognition system are mainly;
1) Facial expression change
2) Illumination change
3) Aging
4) Rotation:
5) Size of the image
6) Frontal vs. Profile
II. ILLUMINATION PROCESSIONG
Illumination variation is one the main challenging problem in any face recognition
system. There are two main approaches for illumination processing: Active approach and
Passive approach [2].Active approaches apply active sensing techniques to capture face
images which are invariant to environment illumination. Passive approach attempt to
overcome illumination variation in face images due to environment illumination change and
we will focus on this approach. Figure 2 is the framework of any face recognition methods
invariant to illumination.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
519
Figure 2. Framework of face recognition methods
III. PRE-PROCESSING
Often images are not in the correct form to be plugged straight into a recognition
algorithm. The image may contain more information than one single face, and the lighting
conditions in the test image may not be the same as in the sample data for training the
algorithm. This can greatly affect the effectiveness or the recognition rate of the algorithm.
Therefore, to obtain the best possible results, it is necessary to pre-process an image to
normalize lighting and remove noise before inserting it into a recognition algorithm. Many
researchers have used so many techniques some of which are explained in following section.
1) Histogram Equalization (HE)
Histogram equalization (HE) is a classic method. It is commonly used to make an
image with a uniform histogram, which is considered to produce an optimal global contrast in
the image. However, HE may make an image under uneven illumination turn to be more
uneven [3].
Figure 3. Histogram equalization of an image
2) Adaptive Histogram Equalization (AHE)
It computes the histogram of a local image region centered at a given pixel to
determine the mapped value for that pixel; this can achieve a local contrast enhancement.
However, the enhancement often leads to noise amplification in “flat” regions, and “ring”
artifacts at strong edges. In addition, this technique is computationally intensive [4].
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
520
3) Block-based Histogram Equalization (BHE)
This method is also called local histogram equalization or region based histogram
equalization. The face image can be divided into several small blocks according to the
positions of eyebrows, eyes, nose and mouth. Each block is processed by HE. In order to
avoid the discontinuity between adjacent blocks, they are overlapped by half with each other.
BHE is simple so that the computation required of BHE is much lower than that of AHE. The
noise produced by BHE is also very little.
4) LogAbout Method
The LogAbout method which is an improved logarithmic transformations as the
following equation:
cb
yxf
ayxg
ln
)1),(ln(
),(
+
+= (1)
Where g(x, y) is the output image; f(x, y) is the input image; a, b and c are parameters which
control the location and shape of the logarithmic distribution. Logarithmic transformations
enhance low gray levels and compress the high ones. They are useful for non-uniform
illumination distribution and shadowed images. However, they are not effective for high
bright images [6]. An example of what the LogAbout algorithm does can be seen in below
figure 4.
Figure 4. LogAbout Illumination Normalization
5) Sub-Image Homomorphic Filtering
In Sub-Image Homomorphic filtering method, the original image is split vertically in
two halves, generating two sub-images from the original one (see the upper part of below
figure 5). Afterwards, a Homomorphic Filtering is applied in each sub-image and the
resultant sub-images are combined to form the whole image. The filtering is subject to the
illumination reflectance model as follows:
),(),(),( yxLyxRyxI = (2)
Where I(x, y) is the intensity of the image; R(x, y) is the reflectance function, which is
the intrinsic property of the face; L(x, y) is the luminance function. Based on the assumption
that the illumination varies slowly across different locations of the image and the local
reflectance changes quickly across different locations, a high-pass filtering can be performed
on the logarithm of the image I(x, y) to reduce the luminance part, which is the low frequency
component of the image, and amplify the reflectance part, which corresponds to the high
frequency component [7].
Similarly, the original image can also be divided horizontally (see the lower part of
below figure 5) and the same procedure is applied. But the high pass filter can be different.
At last, the two resultant images are grouped together in order to obtain the output image.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
521
Figure 5. Sub-Image Homomorphic Filtering
6) Discrete Cosine Transform (DCT)
In a face image, illumination usually changes slowly compared with the reflectance
except some casting shadows and secularities on the face. As a result, illumination variations
mainly lie in the low-frequency band. Therefore, we can remove the low frequency part to
reduce illumination variation. The low frequency DCT coefficients are set to zero to
eliminate illumination variations. Figure 6 shows the images with various illumination
conditions and normalized images using DCT components [8].
Figure 6. Original and DCT applied images
7) Discrete Wavelet Transform (DWT)
Besides the DCT, discrete wavelet transform (DWT) is another common method in
face recognition. There are several similarities between the DCT and the DWT: 1) They both
transform the data into frequency domain; 2) As data dimension reduction methods, they are
both independent of training data compared to the PCA. Because of these similarities, there
are also several studies on illumination invariant recognition based on the DWT. Similar to
the idea in (Chen et al., 2006), a method on discarding low frequency coefficients of the
DWT instead of the DCT was proposed (Nie et al., 2008). Face images are transformed from
spatial domain to logarithm domain and 2-dimension wavelet transform is calculated by the
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
522
algorithm. Then coefficients of low-low sub band image in n-th wavelet decomposition are
discarded for face illumination compensation in logarithm domain. The experimental results
prove that the proposed method outperforms the DCT and the quotient images. The kind of
wavelet function and how many levels of the DWT need to carry out are the key factors for
the performance of the method. Different from the method in (Nie et al., 2008), Han et al.
(2008) proposed that the coefficients in low-high, high-low and high-high sub band images
were also contributed to the effect of illumination variation besides the low-low sub band
images in n-th level. Based on the assumption, a homomorphic filtering is applied to separate
the illumination component from the low-high, high-low, and high-high sub band images in
all scale levels. A high-pass Butterworth filter is used as the homomorphic filter. Figure 7
shows the wavelet decomposition of an image.
Figure 7. Wavelet decomposition of an image.
The novelty of the DWT method is that the light variation in an image can be modeled
as multiplicative noise and additive noise, instead of only the multiplicative term in which
may be instructive in modeling the face under illumination variations in future.
However, by comparing the results of the DWT method and the DCT, we find the result of
the DWT method is worse than that of the DCT. Hence, the DWT method is not as effective
as the DCT for illumination invariant recognition.
8) Dynamic Morphological Quotient Image (DMQI) method
In the framework of Lambertian model, the intensity of point (x, y) in an image I is
modeled as shown in equation (1), where R and L are components of reflectance and
illumination respectively. Estimating R and L only from the input image I is a well-known ill-
posed problem. Therefore there are two assumptions: (1) the illumination L is smooth and (2)
the reflectance R can be varied randomly [9].
According to the Lambertian reflectance theory, R depends on the albedo and surface normal
and hence is the intrinsic representation of an object. It is R that represents the identity of a
face. L is the illumination and is the extrinsic factor.
Dynamic Morphological Quotient Image (DMQI) method in which mathematical
morphology operation is employed to smooth the original image to obtain a better luminance
estimate. However, in DMQI, there is some pepper noise in dark area.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
523
9) Different Smoothing filters Quotient Image (DSFQI)
Different Smoothing filters Quotient Image (DSFQI) give a new demonstration in
which it is proved that the same smoothing functions with different scales also contribute to
extract the illumination invariant features. Figure 8 denotes this merit. It tends to retain the
remarkable face features such as edges and verges, and gains the intrinsic representation of an
object [10].
Figure 8. Original, DMQI and DSFQI images
10) Local Binary Pattern (LBP)
Local Binary Pattern (LBP) (Ojala et al., 2002) is a local feature which characterizes
the intensity relationship between a pixel and its neighbors. The face image can be divided
into some small facets from which LBP features can be extracted. These features are
concatenated into a single feature histogram efficiently representing the face image. LBP is
unaffected by any monotonic grayscale transformation in that the pixel intensity order is not
changed after such a transformation [11].
11) Improved Local Binary Pattern (ILBP)
In order to utilize the excellent discriminative power and computational simplicity of
the LBP descriptor, while abating the performance degradation due to varying illumination
conditions for face recognition. We have shown an enhanced LBP-based face recognition
algorithm that fuses illumination invariant DMQI with discriminative LBP descriptors. In our
DMQI-LBP algorithm, illumination variations in face images are first normalized with the
DMQI, then the DMQI is segmented into 7×7 sub-blocks, and uniform patterns are extracted
in these sub-blocks to form the LBP feature histograms. Finally, LBP histograms from all
sub-blocks are concatenated into face feature vectors, and a weighted chi-square distance
metric which considers the different roles of each sub-block for face recognition, is evaluated
to measure the similarity between a probe face feature and the stored subject face features
[11].
12) Local Ternary Pattern (LTP)
A local ternary pattern (LTP), another important extension of original LBP is
proposed. The most important difference between the LTP and LBP is that the LTP use 3-
valued codes instead 2-valued codes in the LBP. Because of the extension, the LTP is more
discriminant and less sensitive to noise. To apply the uniform pattern in the LTP, a coding
scheme that split each ternary pattern into its positive and negative halves is also proposed in
(Tan & Triggs, 2010). The resulted halves can be treated as two separated LBPs and used for
further recognition task. The local directional pattern is more robust against noise and non-
monotonic illumination changes [11].
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
524
IV. COMPARISON OF DIFFERENT PRE-PROCESSING METHODS
Here in this section we are comparing the performance results given by various
authors in their research paper. To evaluate the performances of different methods under
varying lighting conditions without other variances, there are four popular face databases, the
Yale B, Extended Yale B, CMU PIE and FERET database. In the Yale Face database B, there
are 64 different illumination conditions for nine poses per person. To study the performances
of methods under different light directions, the images are divided into 5 subsets based on the
angle between the lighting direction and the camera axis. The Extended Yale B database
consist 16128 images of 28 subjects with the same condition as the Original Yale B. In the
CMU PIE, there are altogether 68 subjects with pose, illumination and expression variations.
The performances of several pre-processing techniques are shown in table 1.This table shows
the error rate calculated by different methods by varying images in the subset from different
databases. The dotted lines in the table in one row indicate the result obtained by extended
Yale B database. In table ‘n/a’ indicate that author has not used that database for performance
measure. In method column in table ‘+‘is used for combining preprocessing methods.
Table 1 Performance Comparisons of Different Methods
V. CONCLUSION
The modeling approach is the fundamental way to handle illumination variations, but
it always takes heavy computational burden and high requirement for the number of training
samples. The LBP is an attractive area which can tackle illumination variation coupled with
other variations such as pose and expression. For normalization methods, the methods on
discarding low-frequency coefficients are simple but effective way to solve the illumination
variation problem. However, a more accurate model needs to be studied instead of simply
discarding low-frequency coefficients. However, each technique still has its own drawbacks.
Methods
Error Rate (%)
Yale B / Yale B + Extended Yale B CMU
PIE
FERET
Sub set3 Sub set4 Sub set5
Non 10.8 51.4 77.4 43.0 n/a
RHE 17.8 71.1 79.4 14.6 n/a
LogAbout 14.4 42 30.7 43.0 n/a
LOG+DCT
n/a n/a n/a
0 n/a
12.9 12.4 15.2
HE
9.2 54.2 41.1
47.8 n/a
62.3 78.7 89.9
DCT
0 0.18 1.71 0.36
n/a
16.4 14.5 16.2
DCT+LBP 10.12 15.33 17.29 n/a n/a
DWT 0 0.19 0.53 n/a n/a
LTV
n/a n/a n/a
0
n/a20.6 23.9 21.7
DCT+PCA n/a 5.84
DMQI 2.98 3.98 4.93 n/a n/a
DSFQI 1.22 1.62 1.76 n/a n/a
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
525
VI. ACKNOWLEDGEMENTS
We are very thankful to our principal Dr. F.S. Umrigar and Prof.P.B.Swadas, Head
Computer Engineering Department, BVM Engineering College for encourages us to write
this review paper.
REFERENCES
[1]. P. S. Huang, C. J. Harris, and M. S. Nixon, “Human Gait Recognition in Canonical
Space using Temporal Templates”, IEE Proc.-Vis. Image Signal Process, Vol. 146, No.
2, April 1999.
[2]. Gonzales, R.C. & Woods, R.E. (1992). Digital Image Processing, second ed., Prentice
Hall, ISBN-10: 0201180758, Upper Saddle River.
[3]. Pizer, S.M. & Amburn, E.P. (1990). Adaptive Histogram Equalization and Its
Variations. Comput. Vision Graphics, Image Process, 39, pp. 355-368.
[4]. Xie, X. & Lam, K.M. (2005). Face Recognition under Varying Illumination based on a
2D Face Shape Model, Pattern Recognition, 38(2), pp. 221-230.
[5]. Liu, H.; Gao, W.; Miao, J.; Zhao, D.; Deng, G. & Li, J. (2001).Illumination
Compensation and Feedback of Illumination Feature in Face Detection, Proc. IEEE
International Conferences on Info-tech and Info-net, 23, pp. 444-449.
[6]. Delac, K.; Grgic, M. & Kos, T. (2006). Sub-Image Homomorphic Filtering Techniques
for Improving Facial Identification under Difficult Illumination Conditions.
International Conference on System, Signals and Image Processing, Budapest.
[7]. Shermina.J, (2011). Illumination Invariant Face Recognition Using Discrete Cosine
Transform And Principal Component Analysis.IEEE Proceedings Of Icetect.
[8]. X.G. He, J. Tian, L.F. Wu, Y.Y. Zhang, X. Yang l. llumaination Normalization with
Morphological Quotient Image,” Journal ofSoftware, Vol.18(9) pp.2318-2325, 2007.
[9]. Yu CHENG, Zhigang JIN, Cunming HAO (2010)“Illumination Normalization based on
Different Smoothing Filters Quotient Image” IEEE Third International Conference on
Intelligent Networks and Intelligent Systems.pp.28-31.
[10]. PAN Hong, XIA Si-Yu, JIN Li-Zuo, XIA Liang-Zheng School of Automation,
Southeast University, Nanjing 210096, P. R. China “Illumination Invariant Face
Recognition Based on Improved Local Binary Pattern” Proceedings of the 30th Chinese
Control IEEE Conference Jul y 22-24, 2011, Yantai, China.
[11]. K. Ramachandra Murthy, Asish Ghosh “An Efficient Illumination Invariant Face
Recognition Technique using Two DimensionalLinear Discriminant Analysis” 1st Int’l
IEEE Conf. on Recent Advances in Information Technology | RAIT-2012 |.
[12]. Prof. B.S Patil and Prof. A.R Yardi, “Real Time Face Recognition System using Eigen
Faces”, International Jjournal of Electronics and Communication Engineering &
Technology (IJECET), Volume 4, Issue 2, 2013, pp. 72 - 79, ISSN Print: 0976- 6464,
ISSN Online: 0976 –6472.
[13]. Steven Lawrence Fernandes and Dr. G Josemin Bala, “Analysing Recognition Rate of
LDA and LPP Based Algorithms for Face Recognition”, International Journal of
Computer Engineering & Technology (IJCET), Volume 3, Issue 2, 2012, pp. 115 - 125,
ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.

Weitere ähnliche Inhalte

Was ist angesagt?

Brain tumor segmentation using asymmetry based histogram thresholding and k m...
Brain tumor segmentation using asymmetry based histogram thresholding and k m...Brain tumor segmentation using asymmetry based histogram thresholding and k m...
Brain tumor segmentation using asymmetry based histogram thresholding and k m...eSAT Publishing House
 
Effective face feature for human identification
Effective face feature for human identificationEffective face feature for human identification
Effective face feature for human identificationeSAT Publishing House
 
IRJET- A Review on Face Detection and Expression Recognition
IRJET-  	  A Review on Face Detection and Expression RecognitionIRJET-  	  A Review on Face Detection and Expression Recognition
IRJET- A Review on Face Detection and Expression RecognitionIRJET Journal
 
Analysis of Digital Image Forgery Detection using Adaptive Over-Segmentation ...
Analysis of Digital Image Forgery Detection using Adaptive Over-Segmentation ...Analysis of Digital Image Forgery Detection using Adaptive Over-Segmentation ...
Analysis of Digital Image Forgery Detection using Adaptive Over-Segmentation ...IRJET Journal
 
A novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm forA novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm forprjpublications
 
Segmentation of Tumor Region in MRI Images of Brain using Mathematical Morpho...
Segmentation of Tumor Region in MRI Images of Brain using Mathematical Morpho...Segmentation of Tumor Region in MRI Images of Brain using Mathematical Morpho...
Segmentation of Tumor Region in MRI Images of Brain using Mathematical Morpho...CSCJournals
 
Development of Human Tracking System For Video Surveillance
Development of Human Tracking System For Video SurveillanceDevelopment of Human Tracking System For Video Surveillance
Development of Human Tracking System For Video Surveillancecscpconf
 
ROBUST STATISTICAL APPROACH FOR EXTRACTION OF MOVING HUMAN SILHOUETTES FROM V...
ROBUST STATISTICAL APPROACH FOR EXTRACTION OF MOVING HUMAN SILHOUETTES FROM V...ROBUST STATISTICAL APPROACH FOR EXTRACTION OF MOVING HUMAN SILHOUETTES FROM V...
ROBUST STATISTICAL APPROACH FOR EXTRACTION OF MOVING HUMAN SILHOUETTES FROM V...ijitjournal
 
NEURAL NETWORK BASED SUPERVISED SELF ORGANIZING MAPS FOR FACE RECOGNITION
NEURAL NETWORK BASED SUPERVISED SELF ORGANIZING MAPS FOR FACE RECOGNITIONNEURAL NETWORK BASED SUPERVISED SELF ORGANIZING MAPS FOR FACE RECOGNITION
NEURAL NETWORK BASED SUPERVISED SELF ORGANIZING MAPS FOR FACE RECOGNITIONijsc
 
Binary operation based hard exudate detection and fuzzy based classification ...
Binary operation based hard exudate detection and fuzzy based classification ...Binary operation based hard exudate detection and fuzzy based classification ...
Binary operation based hard exudate detection and fuzzy based classification ...IJECEIAES
 
Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters
Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters
Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters IJERA Editor
 
IRJET- Digit Identification in Natural Images
IRJET- Digit Identification in Natural ImagesIRJET- Digit Identification in Natural Images
IRJET- Digit Identification in Natural ImagesIRJET Journal
 
FPGA ARCHITECTURE FOR FACIAL-FEATURES AND COMPONENTS EXTRACTION
FPGA ARCHITECTURE FOR FACIAL-FEATURES AND COMPONENTS EXTRACTIONFPGA ARCHITECTURE FOR FACIAL-FEATURES AND COMPONENTS EXTRACTION
FPGA ARCHITECTURE FOR FACIAL-FEATURES AND COMPONENTS EXTRACTIONijcseit
 
ADOPTING AND IMPLEMENTATION OF SELF ORGANIZING FEATURE MAP FOR IMAGE FUSION
ADOPTING AND IMPLEMENTATION OF SELF ORGANIZING FEATURE MAP FOR IMAGE FUSIONADOPTING AND IMPLEMENTATION OF SELF ORGANIZING FEATURE MAP FOR IMAGE FUSION
ADOPTING AND IMPLEMENTATION OF SELF ORGANIZING FEATURE MAP FOR IMAGE FUSIONijistjournal
 
Iris Localization - a Biometric Approach Referring Daugman's Algorithm
Iris Localization - a Biometric Approach Referring Daugman's AlgorithmIris Localization - a Biometric Approach Referring Daugman's Algorithm
Iris Localization - a Biometric Approach Referring Daugman's AlgorithmEditor IJCATR
 
MSB based Face Recognition Using Compression and Dual Matching Techniques
MSB based Face Recognition Using Compression and Dual Matching TechniquesMSB based Face Recognition Using Compression and Dual Matching Techniques
MSB based Face Recognition Using Compression and Dual Matching TechniquesCSCJournals
 

Was ist angesagt? (19)

Brain tumor segmentation using asymmetry based histogram thresholding and k m...
Brain tumor segmentation using asymmetry based histogram thresholding and k m...Brain tumor segmentation using asymmetry based histogram thresholding and k m...
Brain tumor segmentation using asymmetry based histogram thresholding and k m...
 
Effective face feature for human identification
Effective face feature for human identificationEffective face feature for human identification
Effective face feature for human identification
 
IRJET- A Review on Face Detection and Expression Recognition
IRJET-  	  A Review on Face Detection and Expression RecognitionIRJET-  	  A Review on Face Detection and Expression Recognition
IRJET- A Review on Face Detection and Expression Recognition
 
Analysis of Digital Image Forgery Detection using Adaptive Over-Segmentation ...
Analysis of Digital Image Forgery Detection using Adaptive Over-Segmentation ...Analysis of Digital Image Forgery Detection using Adaptive Over-Segmentation ...
Analysis of Digital Image Forgery Detection using Adaptive Over-Segmentation ...
 
A novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm forA novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm for
 
Segmentation of Tumor Region in MRI Images of Brain using Mathematical Morpho...
Segmentation of Tumor Region in MRI Images of Brain using Mathematical Morpho...Segmentation of Tumor Region in MRI Images of Brain using Mathematical Morpho...
Segmentation of Tumor Region in MRI Images of Brain using Mathematical Morpho...
 
Development of Human Tracking System For Video Surveillance
Development of Human Tracking System For Video SurveillanceDevelopment of Human Tracking System For Video Surveillance
Development of Human Tracking System For Video Surveillance
 
20120140504019
2012014050401920120140504019
20120140504019
 
50120130406013
5012013040601350120130406013
50120130406013
 
ROBUST STATISTICAL APPROACH FOR EXTRACTION OF MOVING HUMAN SILHOUETTES FROM V...
ROBUST STATISTICAL APPROACH FOR EXTRACTION OF MOVING HUMAN SILHOUETTES FROM V...ROBUST STATISTICAL APPROACH FOR EXTRACTION OF MOVING HUMAN SILHOUETTES FROM V...
ROBUST STATISTICAL APPROACH FOR EXTRACTION OF MOVING HUMAN SILHOUETTES FROM V...
 
NEURAL NETWORK BASED SUPERVISED SELF ORGANIZING MAPS FOR FACE RECOGNITION
NEURAL NETWORK BASED SUPERVISED SELF ORGANIZING MAPS FOR FACE RECOGNITIONNEURAL NETWORK BASED SUPERVISED SELF ORGANIZING MAPS FOR FACE RECOGNITION
NEURAL NETWORK BASED SUPERVISED SELF ORGANIZING MAPS FOR FACE RECOGNITION
 
Binary operation based hard exudate detection and fuzzy based classification ...
Binary operation based hard exudate detection and fuzzy based classification ...Binary operation based hard exudate detection and fuzzy based classification ...
Binary operation based hard exudate detection and fuzzy based classification ...
 
Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters
Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters
Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters
 
D04402024029
D04402024029D04402024029
D04402024029
 
IRJET- Digit Identification in Natural Images
IRJET- Digit Identification in Natural ImagesIRJET- Digit Identification in Natural Images
IRJET- Digit Identification in Natural Images
 
FPGA ARCHITECTURE FOR FACIAL-FEATURES AND COMPONENTS EXTRACTION
FPGA ARCHITECTURE FOR FACIAL-FEATURES AND COMPONENTS EXTRACTIONFPGA ARCHITECTURE FOR FACIAL-FEATURES AND COMPONENTS EXTRACTION
FPGA ARCHITECTURE FOR FACIAL-FEATURES AND COMPONENTS EXTRACTION
 
ADOPTING AND IMPLEMENTATION OF SELF ORGANIZING FEATURE MAP FOR IMAGE FUSION
ADOPTING AND IMPLEMENTATION OF SELF ORGANIZING FEATURE MAP FOR IMAGE FUSIONADOPTING AND IMPLEMENTATION OF SELF ORGANIZING FEATURE MAP FOR IMAGE FUSION
ADOPTING AND IMPLEMENTATION OF SELF ORGANIZING FEATURE MAP FOR IMAGE FUSION
 
Iris Localization - a Biometric Approach Referring Daugman's Algorithm
Iris Localization - a Biometric Approach Referring Daugman's AlgorithmIris Localization - a Biometric Approach Referring Daugman's Algorithm
Iris Localization - a Biometric Approach Referring Daugman's Algorithm
 
MSB based Face Recognition Using Compression and Dual Matching Techniques
MSB based Face Recognition Using Compression and Dual Matching TechniquesMSB based Face Recognition Using Compression and Dual Matching Techniques
MSB based Face Recognition Using Compression and Dual Matching Techniques
 

Andere mochten auch

CHARM(A Cost-Efficient Multi-Cloud Data Hosting Scheme with High Availability)
CHARM(A Cost-Efficient Multi-Cloud Data Hosting Scheme with High Availability)CHARM(A Cost-Efficient Multi-Cloud Data Hosting Scheme with High Availability)
CHARM(A Cost-Efficient Multi-Cloud Data Hosting Scheme with High Availability)Deeksha Arya
 
Recognition of Facial Expressions using Local Binary Patterns of Important Fa...
Recognition of Facial Expressions using Local Binary Patterns of Important Fa...Recognition of Facial Expressions using Local Binary Patterns of Important Fa...
Recognition of Facial Expressions using Local Binary Patterns of Important Fa...CSCJournals
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system pptRavi Kumar
 
cloud computing preservity
cloud computing preservitycloud computing preservity
cloud computing preservitychennuruvishnu
 
FACE RECOGNITION ACROSS NON-UNIFORM MOTION BLUR
FACE RECOGNITION ACROSS  NON-UNIFORM MOTION BLUR FACE RECOGNITION ACROSS  NON-UNIFORM MOTION BLUR
FACE RECOGNITION ACROSS NON-UNIFORM MOTION BLUR Koduru KrisHna
 
Web Design Of Education Consultancy
Web Design Of  Education Consultancy Web Design Of  Education Consultancy
Web Design Of Education Consultancy Mohammad Qasim Malik
 
Face recognization using artificial nerual network
Face recognization using artificial nerual networkFace recognization using artificial nerual network
Face recognization using artificial nerual networkDharmesh Tank
 
Human detection iccv09
Human detection iccv09Human detection iccv09
Human detection iccv09fanghuaxue
 
Facial expression recognition based on local binary patterns final
Facial expression recognition based on local binary patterns finalFacial expression recognition based on local binary patterns final
Facial expression recognition based on local binary patterns finalahmad abdelhafeez
 
Face recognition using neural network
Face recognition using neural networkFace recognition using neural network
Face recognition using neural networkIndira Nayak
 
Face recognition using artificial neural network
Face recognition using artificial neural networkFace recognition using artificial neural network
Face recognition using artificial neural networkSumeet Kakani
 
Home Automation Using RPI
Home Automation Using  RPIHome Automation Using  RPI
Home Automation Using RPIAnkara JUG
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyAgrani Rastogi
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition systemDivya Sushma
 
IOT Based Home Automation using Raspberry Pi-3
IOT Based Home Automation using Raspberry Pi-3IOT Based Home Automation using Raspberry Pi-3
IOT Based Home Automation using Raspberry Pi-3Mohammad Qasim Malik
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYJASHU JASWANTH
 
Smart Home Automation - An Overview
Smart Home Automation - An OverviewSmart Home Automation - An Overview
Smart Home Automation - An OverviewSmart Automation
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 

Andere mochten auch (20)

CHARM(A Cost-Efficient Multi-Cloud Data Hosting Scheme with High Availability)
CHARM(A Cost-Efficient Multi-Cloud Data Hosting Scheme with High Availability)CHARM(A Cost-Efficient Multi-Cloud Data Hosting Scheme with High Availability)
CHARM(A Cost-Efficient Multi-Cloud Data Hosting Scheme with High Availability)
 
Recognition of Facial Expressions using Local Binary Patterns of Important Fa...
Recognition of Facial Expressions using Local Binary Patterns of Important Fa...Recognition of Facial Expressions using Local Binary Patterns of Important Fa...
Recognition of Facial Expressions using Local Binary Patterns of Important Fa...
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system ppt
 
cloud computing preservity
cloud computing preservitycloud computing preservity
cloud computing preservity
 
FACE RECOGNITION ACROSS NON-UNIFORM MOTION BLUR
FACE RECOGNITION ACROSS  NON-UNIFORM MOTION BLUR FACE RECOGNITION ACROSS  NON-UNIFORM MOTION BLUR
FACE RECOGNITION ACROSS NON-UNIFORM MOTION BLUR
 
Web Design Of Education Consultancy
Web Design Of  Education Consultancy Web Design Of  Education Consultancy
Web Design Of Education Consultancy
 
Face recognization using artificial nerual network
Face recognization using artificial nerual networkFace recognization using artificial nerual network
Face recognization using artificial nerual network
 
Human detection iccv09
Human detection iccv09Human detection iccv09
Human detection iccv09
 
Facial expression recognition based on local binary patterns final
Facial expression recognition based on local binary patterns finalFacial expression recognition based on local binary patterns final
Facial expression recognition based on local binary patterns final
 
Face recognition using neural network
Face recognition using neural networkFace recognition using neural network
Face recognition using neural network
 
Face recognition using artificial neural network
Face recognition using artificial neural networkFace recognition using artificial neural network
Face recognition using artificial neural network
 
Home Automation Using RPI
Home Automation Using  RPIHome Automation Using  RPI
Home Automation Using RPI
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
face recognition
face recognitionface recognition
face recognition
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
 
IOT Based Home Automation using Raspberry Pi-3
IOT Based Home Automation using Raspberry Pi-3IOT Based Home Automation using Raspberry Pi-3
IOT Based Home Automation using Raspberry Pi-3
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
Smart Home Automation - An Overview
Smart Home Automation - An OverviewSmart Home Automation - An Overview
Smart Home Automation - An Overview
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 

Ähnlich wie A survey on human face recognition invariant to illumination

A Face Recognition Using Linear-Diagonal Binary Graph Pattern Feature Extract...
A Face Recognition Using Linear-Diagonal Binary Graph Pattern Feature Extract...A Face Recognition Using Linear-Diagonal Binary Graph Pattern Feature Extract...
A Face Recognition Using Linear-Diagonal Binary Graph Pattern Feature Extract...ijfcstjournal
 
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...ijfcstjournal
 
Multimodality medical image fusion using improved contourlet transformation
Multimodality medical image fusion using improved contourlet transformationMultimodality medical image fusion using improved contourlet transformation
Multimodality medical image fusion using improved contourlet transformationIAEME Publication
 
Influence of local segmentation in the context of digital image processing
Influence of local segmentation in the context of digital image processingInfluence of local segmentation in the context of digital image processing
Influence of local segmentation in the context of digital image processingiaemedu
 
Fourier mellin transform based face recognition
Fourier mellin transform based face recognitionFourier mellin transform based face recognition
Fourier mellin transform based face recognitioniaemedu
 
Fourier mellin transform based face recognition
Fourier mellin transform based face recognitionFourier mellin transform based face recognition
Fourier mellin transform based face recognitionIAEME Publication
 
Fourier mellin transform based face recognition
Fourier mellin transform based face recognitionFourier mellin transform based face recognition
Fourier mellin transform based face recognitioniaemedu
 
Fourier mellin transform based face recognition
Fourier mellin transform based face recognitionFourier mellin transform based face recognition
Fourier mellin transform based face recognitionIAEME Publication
 
Comparative study on image fusion methods in spatial domain
Comparative study on image fusion methods in spatial domainComparative study on image fusion methods in spatial domain
Comparative study on image fusion methods in spatial domainIAEME Publication
 
A Novel Framework For Preprocessing Of Breast Ultra Sound Images By Combining...
A Novel Framework For Preprocessing Of Breast Ultra Sound Images By Combining...A Novel Framework For Preprocessing Of Breast Ultra Sound Images By Combining...
A Novel Framework For Preprocessing Of Breast Ultra Sound Images By Combining...IRJET Journal
 
Region wise processing of an image using multithreading in multi core environ
Region wise processing of an image using multithreading in multi core environRegion wise processing of an image using multithreading in multi core environ
Region wise processing of an image using multithreading in multi core environIAEME Publication
 
Region wise processing of an image using multithreading in multi core environ
Region wise processing of an image using multithreading in multi core environRegion wise processing of an image using multithreading in multi core environ
Region wise processing of an image using multithreading in multi core environIAEME Publication
 
Comparative performance analysis of segmentation techniques
Comparative performance analysis of segmentation techniquesComparative performance analysis of segmentation techniques
Comparative performance analysis of segmentation techniquesIAEME Publication
 
Performance and analysis of improved unsharp masking algorithm for image
Performance and analysis of improved unsharp masking algorithm for imagePerformance and analysis of improved unsharp masking algorithm for image
Performance and analysis of improved unsharp masking algorithm for imageIAEME Publication
 
Dynamic hand gesture recognition using cbir
Dynamic hand gesture recognition using cbirDynamic hand gesture recognition using cbir
Dynamic hand gesture recognition using cbirIAEME Publication
 
Appearance based face recognition by pca and lda
Appearance based face recognition by pca and ldaAppearance based face recognition by pca and lda
Appearance based face recognition by pca and ldaIAEME Publication
 
MRIIMAGE SEGMENTATION USING LEVEL SET METHOD AND IMPLEMENT AN MEDICAL DIAGNOS...
MRIIMAGE SEGMENTATION USING LEVEL SET METHOD AND IMPLEMENT AN MEDICAL DIAGNOS...MRIIMAGE SEGMENTATION USING LEVEL SET METHOD AND IMPLEMENT AN MEDICAL DIAGNOS...
MRIIMAGE SEGMENTATION USING LEVEL SET METHOD AND IMPLEMENT AN MEDICAL DIAGNOS...cseij
 
MRI Image Segmentation Using Level Set Method and Implement an Medical Diagno...
MRI Image Segmentation Using Level Set Method and Implement an Medical Diagno...MRI Image Segmentation Using Level Set Method and Implement an Medical Diagno...
MRI Image Segmentation Using Level Set Method and Implement an Medical Diagno...CSEIJJournal
 
Prediction based lossless medical image compression
Prediction based lossless medical image compressionPrediction based lossless medical image compression
Prediction based lossless medical image compressionIAEME Publication
 

Ähnlich wie A survey on human face recognition invariant to illumination (20)

A Face Recognition Using Linear-Diagonal Binary Graph Pattern Feature Extract...
A Face Recognition Using Linear-Diagonal Binary Graph Pattern Feature Extract...A Face Recognition Using Linear-Diagonal Binary Graph Pattern Feature Extract...
A Face Recognition Using Linear-Diagonal Binary Graph Pattern Feature Extract...
 
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
 
Multimodality medical image fusion using improved contourlet transformation
Multimodality medical image fusion using improved contourlet transformationMultimodality medical image fusion using improved contourlet transformation
Multimodality medical image fusion using improved contourlet transformation
 
Influence of local segmentation in the context of digital image processing
Influence of local segmentation in the context of digital image processingInfluence of local segmentation in the context of digital image processing
Influence of local segmentation in the context of digital image processing
 
Fourier mellin transform based face recognition
Fourier mellin transform based face recognitionFourier mellin transform based face recognition
Fourier mellin transform based face recognition
 
Fourier mellin transform based face recognition
Fourier mellin transform based face recognitionFourier mellin transform based face recognition
Fourier mellin transform based face recognition
 
Fourier mellin transform based face recognition
Fourier mellin transform based face recognitionFourier mellin transform based face recognition
Fourier mellin transform based face recognition
 
Fourier mellin transform based face recognition
Fourier mellin transform based face recognitionFourier mellin transform based face recognition
Fourier mellin transform based face recognition
 
Comparative study on image fusion methods in spatial domain
Comparative study on image fusion methods in spatial domainComparative study on image fusion methods in spatial domain
Comparative study on image fusion methods in spatial domain
 
A Novel Framework For Preprocessing Of Breast Ultra Sound Images By Combining...
A Novel Framework For Preprocessing Of Breast Ultra Sound Images By Combining...A Novel Framework For Preprocessing Of Breast Ultra Sound Images By Combining...
A Novel Framework For Preprocessing Of Breast Ultra Sound Images By Combining...
 
Region wise processing of an image using multithreading in multi core environ
Region wise processing of an image using multithreading in multi core environRegion wise processing of an image using multithreading in multi core environ
Region wise processing of an image using multithreading in multi core environ
 
Region wise processing of an image using multithreading in multi core environ
Region wise processing of an image using multithreading in multi core environRegion wise processing of an image using multithreading in multi core environ
Region wise processing of an image using multithreading in multi core environ
 
Comparative performance analysis of segmentation techniques
Comparative performance analysis of segmentation techniquesComparative performance analysis of segmentation techniques
Comparative performance analysis of segmentation techniques
 
Performance and analysis of improved unsharp masking algorithm for image
Performance and analysis of improved unsharp masking algorithm for imagePerformance and analysis of improved unsharp masking algorithm for image
Performance and analysis of improved unsharp masking algorithm for image
 
Dynamic hand gesture recognition using cbir
Dynamic hand gesture recognition using cbirDynamic hand gesture recognition using cbir
Dynamic hand gesture recognition using cbir
 
50620130101001
5062013010100150620130101001
50620130101001
 
Appearance based face recognition by pca and lda
Appearance based face recognition by pca and ldaAppearance based face recognition by pca and lda
Appearance based face recognition by pca and lda
 
MRIIMAGE SEGMENTATION USING LEVEL SET METHOD AND IMPLEMENT AN MEDICAL DIAGNOS...
MRIIMAGE SEGMENTATION USING LEVEL SET METHOD AND IMPLEMENT AN MEDICAL DIAGNOS...MRIIMAGE SEGMENTATION USING LEVEL SET METHOD AND IMPLEMENT AN MEDICAL DIAGNOS...
MRIIMAGE SEGMENTATION USING LEVEL SET METHOD AND IMPLEMENT AN MEDICAL DIAGNOS...
 
MRI Image Segmentation Using Level Set Method and Implement an Medical Diagno...
MRI Image Segmentation Using Level Set Method and Implement an Medical Diagno...MRI Image Segmentation Using Level Set Method and Implement an Medical Diagno...
MRI Image Segmentation Using Level Set Method and Implement an Medical Diagno...
 
Prediction based lossless medical image compression
Prediction based lossless medical image compressionPrediction based lossless medical image compression
Prediction based lossless medical image compression
 

Mehr von IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

Mehr von IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Kürzlich hochgeladen

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Kürzlich hochgeladen (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

A survey on human face recognition invariant to illumination

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 517 A SURVEY ON HUMAN FACE RECOGNITION INVARIANT TO ILLUMINATION U.K. Jaliya1 , J.M. Rathod2 1 Assistant Professor, Department of Computer Engineering, BVM Engineering College, Vallabh Vidyanagr, Anand, Gujarat, India 2 Associate Professor, Department of Electronics, BVM Engineering College, Vallabh Vidyanagr, Anand, Gujarat, India ABSTRACT Human face recognition is one of the research areas in the current era of the research. It is one the widely used biometric technique for identification and verification of the human face. There are many challenges to face recognition which degrade the performance of the algorithm. The illumination variation problem is one of the well-known problems in face recognition in uncontrolled environment. In this paper an extensive and up-to-date survey of the existing techniques to address this problem is presented. Different authors have given so many techniques for illumination reduction from the face image but still some combined survey is missing so we have tried to fill that gaps in this paper. We have collected various preprocessing techniques suggested by different authors and shown their results in a tabular form. After preprocessing we can use any of the recognition method for face recognition. There are so many online face databases available so we can use any of them. Keywords: PCA (Principle component Analysis), HE (Histogram Equalization), AHE (Adaptive Histogram Equalization), BHE (Block-based Histogram Equalization), DWT (Discrete Wavelet Transform), DCT (Discrete Cosine Transform), LBP (Local Binary Pattern), DMQI (Dynamic Morphological Quotient Image), LTP (Local Ternary Pattern), DSFQI (Different Smoothing filters Quotient Image). I. INTRODUCTION Face recognition has been an active research area over the last 30 years. It has been studied by scientists from different areas of psychophysical sciences and those from different areas of computer sciences. Psychologists and neuroscientists mainly deal with the human INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), pp. 517-525 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2013): 6.1302 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 518 perception part of the topic, whereas engineers studying on machine recognition of human faces deal with the computational aspects of face recognition. Face recognition has applications mainly in the fields of biometrics, access control, law enforcement, and security and surveillance systems. Biometrics are methods to automatically verify or identify individuals using their physiological or behavioral characteristics [1]. The necessity for personal identification in the fields of private and secure systems made face recognition one of the main fields among other biometric technologies. The importance of face recognition rises from the fact that a face recognition system does not require the cooperation of the individual while the other systems need such cooperation. Figure 1.shows the sketch for any pattern recognition technique. Figure 1 Sketch of pattern recognition architecture The topic seems to be easy for a human, where limited memory can be a main problem; whereas the problems in machine recognition are manifold. Some of possible problems for a machine face recognition system are mainly; 1) Facial expression change 2) Illumination change 3) Aging 4) Rotation: 5) Size of the image 6) Frontal vs. Profile II. ILLUMINATION PROCESSIONG Illumination variation is one the main challenging problem in any face recognition system. There are two main approaches for illumination processing: Active approach and Passive approach [2].Active approaches apply active sensing techniques to capture face images which are invariant to environment illumination. Passive approach attempt to overcome illumination variation in face images due to environment illumination change and we will focus on this approach. Figure 2 is the framework of any face recognition methods invariant to illumination.
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 519 Figure 2. Framework of face recognition methods III. PRE-PROCESSING Often images are not in the correct form to be plugged straight into a recognition algorithm. The image may contain more information than one single face, and the lighting conditions in the test image may not be the same as in the sample data for training the algorithm. This can greatly affect the effectiveness or the recognition rate of the algorithm. Therefore, to obtain the best possible results, it is necessary to pre-process an image to normalize lighting and remove noise before inserting it into a recognition algorithm. Many researchers have used so many techniques some of which are explained in following section. 1) Histogram Equalization (HE) Histogram equalization (HE) is a classic method. It is commonly used to make an image with a uniform histogram, which is considered to produce an optimal global contrast in the image. However, HE may make an image under uneven illumination turn to be more uneven [3]. Figure 3. Histogram equalization of an image 2) Adaptive Histogram Equalization (AHE) It computes the histogram of a local image region centered at a given pixel to determine the mapped value for that pixel; this can achieve a local contrast enhancement. However, the enhancement often leads to noise amplification in “flat” regions, and “ring” artifacts at strong edges. In addition, this technique is computationally intensive [4].
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 520 3) Block-based Histogram Equalization (BHE) This method is also called local histogram equalization or region based histogram equalization. The face image can be divided into several small blocks according to the positions of eyebrows, eyes, nose and mouth. Each block is processed by HE. In order to avoid the discontinuity between adjacent blocks, they are overlapped by half with each other. BHE is simple so that the computation required of BHE is much lower than that of AHE. The noise produced by BHE is also very little. 4) LogAbout Method The LogAbout method which is an improved logarithmic transformations as the following equation: cb yxf ayxg ln )1),(ln( ),( + += (1) Where g(x, y) is the output image; f(x, y) is the input image; a, b and c are parameters which control the location and shape of the logarithmic distribution. Logarithmic transformations enhance low gray levels and compress the high ones. They are useful for non-uniform illumination distribution and shadowed images. However, they are not effective for high bright images [6]. An example of what the LogAbout algorithm does can be seen in below figure 4. Figure 4. LogAbout Illumination Normalization 5) Sub-Image Homomorphic Filtering In Sub-Image Homomorphic filtering method, the original image is split vertically in two halves, generating two sub-images from the original one (see the upper part of below figure 5). Afterwards, a Homomorphic Filtering is applied in each sub-image and the resultant sub-images are combined to form the whole image. The filtering is subject to the illumination reflectance model as follows: ),(),(),( yxLyxRyxI = (2) Where I(x, y) is the intensity of the image; R(x, y) is the reflectance function, which is the intrinsic property of the face; L(x, y) is the luminance function. Based on the assumption that the illumination varies slowly across different locations of the image and the local reflectance changes quickly across different locations, a high-pass filtering can be performed on the logarithm of the image I(x, y) to reduce the luminance part, which is the low frequency component of the image, and amplify the reflectance part, which corresponds to the high frequency component [7]. Similarly, the original image can also be divided horizontally (see the lower part of below figure 5) and the same procedure is applied. But the high pass filter can be different. At last, the two resultant images are grouped together in order to obtain the output image.
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 521 Figure 5. Sub-Image Homomorphic Filtering 6) Discrete Cosine Transform (DCT) In a face image, illumination usually changes slowly compared with the reflectance except some casting shadows and secularities on the face. As a result, illumination variations mainly lie in the low-frequency band. Therefore, we can remove the low frequency part to reduce illumination variation. The low frequency DCT coefficients are set to zero to eliminate illumination variations. Figure 6 shows the images with various illumination conditions and normalized images using DCT components [8]. Figure 6. Original and DCT applied images 7) Discrete Wavelet Transform (DWT) Besides the DCT, discrete wavelet transform (DWT) is another common method in face recognition. There are several similarities between the DCT and the DWT: 1) They both transform the data into frequency domain; 2) As data dimension reduction methods, they are both independent of training data compared to the PCA. Because of these similarities, there are also several studies on illumination invariant recognition based on the DWT. Similar to the idea in (Chen et al., 2006), a method on discarding low frequency coefficients of the DWT instead of the DCT was proposed (Nie et al., 2008). Face images are transformed from spatial domain to logarithm domain and 2-dimension wavelet transform is calculated by the
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 522 algorithm. Then coefficients of low-low sub band image in n-th wavelet decomposition are discarded for face illumination compensation in logarithm domain. The experimental results prove that the proposed method outperforms the DCT and the quotient images. The kind of wavelet function and how many levels of the DWT need to carry out are the key factors for the performance of the method. Different from the method in (Nie et al., 2008), Han et al. (2008) proposed that the coefficients in low-high, high-low and high-high sub band images were also contributed to the effect of illumination variation besides the low-low sub band images in n-th level. Based on the assumption, a homomorphic filtering is applied to separate the illumination component from the low-high, high-low, and high-high sub band images in all scale levels. A high-pass Butterworth filter is used as the homomorphic filter. Figure 7 shows the wavelet decomposition of an image. Figure 7. Wavelet decomposition of an image. The novelty of the DWT method is that the light variation in an image can be modeled as multiplicative noise and additive noise, instead of only the multiplicative term in which may be instructive in modeling the face under illumination variations in future. However, by comparing the results of the DWT method and the DCT, we find the result of the DWT method is worse than that of the DCT. Hence, the DWT method is not as effective as the DCT for illumination invariant recognition. 8) Dynamic Morphological Quotient Image (DMQI) method In the framework of Lambertian model, the intensity of point (x, y) in an image I is modeled as shown in equation (1), where R and L are components of reflectance and illumination respectively. Estimating R and L only from the input image I is a well-known ill- posed problem. Therefore there are two assumptions: (1) the illumination L is smooth and (2) the reflectance R can be varied randomly [9]. According to the Lambertian reflectance theory, R depends on the albedo and surface normal and hence is the intrinsic representation of an object. It is R that represents the identity of a face. L is the illumination and is the extrinsic factor. Dynamic Morphological Quotient Image (DMQI) method in which mathematical morphology operation is employed to smooth the original image to obtain a better luminance estimate. However, in DMQI, there is some pepper noise in dark area.
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 523 9) Different Smoothing filters Quotient Image (DSFQI) Different Smoothing filters Quotient Image (DSFQI) give a new demonstration in which it is proved that the same smoothing functions with different scales also contribute to extract the illumination invariant features. Figure 8 denotes this merit. It tends to retain the remarkable face features such as edges and verges, and gains the intrinsic representation of an object [10]. Figure 8. Original, DMQI and DSFQI images 10) Local Binary Pattern (LBP) Local Binary Pattern (LBP) (Ojala et al., 2002) is a local feature which characterizes the intensity relationship between a pixel and its neighbors. The face image can be divided into some small facets from which LBP features can be extracted. These features are concatenated into a single feature histogram efficiently representing the face image. LBP is unaffected by any monotonic grayscale transformation in that the pixel intensity order is not changed after such a transformation [11]. 11) Improved Local Binary Pattern (ILBP) In order to utilize the excellent discriminative power and computational simplicity of the LBP descriptor, while abating the performance degradation due to varying illumination conditions for face recognition. We have shown an enhanced LBP-based face recognition algorithm that fuses illumination invariant DMQI with discriminative LBP descriptors. In our DMQI-LBP algorithm, illumination variations in face images are first normalized with the DMQI, then the DMQI is segmented into 7×7 sub-blocks, and uniform patterns are extracted in these sub-blocks to form the LBP feature histograms. Finally, LBP histograms from all sub-blocks are concatenated into face feature vectors, and a weighted chi-square distance metric which considers the different roles of each sub-block for face recognition, is evaluated to measure the similarity between a probe face feature and the stored subject face features [11]. 12) Local Ternary Pattern (LTP) A local ternary pattern (LTP), another important extension of original LBP is proposed. The most important difference between the LTP and LBP is that the LTP use 3- valued codes instead 2-valued codes in the LBP. Because of the extension, the LTP is more discriminant and less sensitive to noise. To apply the uniform pattern in the LTP, a coding scheme that split each ternary pattern into its positive and negative halves is also proposed in (Tan & Triggs, 2010). The resulted halves can be treated as two separated LBPs and used for further recognition task. The local directional pattern is more robust against noise and non- monotonic illumination changes [11].
  • 8. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 524 IV. COMPARISON OF DIFFERENT PRE-PROCESSING METHODS Here in this section we are comparing the performance results given by various authors in their research paper. To evaluate the performances of different methods under varying lighting conditions without other variances, there are four popular face databases, the Yale B, Extended Yale B, CMU PIE and FERET database. In the Yale Face database B, there are 64 different illumination conditions for nine poses per person. To study the performances of methods under different light directions, the images are divided into 5 subsets based on the angle between the lighting direction and the camera axis. The Extended Yale B database consist 16128 images of 28 subjects with the same condition as the Original Yale B. In the CMU PIE, there are altogether 68 subjects with pose, illumination and expression variations. The performances of several pre-processing techniques are shown in table 1.This table shows the error rate calculated by different methods by varying images in the subset from different databases. The dotted lines in the table in one row indicate the result obtained by extended Yale B database. In table ‘n/a’ indicate that author has not used that database for performance measure. In method column in table ‘+‘is used for combining preprocessing methods. Table 1 Performance Comparisons of Different Methods V. CONCLUSION The modeling approach is the fundamental way to handle illumination variations, but it always takes heavy computational burden and high requirement for the number of training samples. The LBP is an attractive area which can tackle illumination variation coupled with other variations such as pose and expression. For normalization methods, the methods on discarding low-frequency coefficients are simple but effective way to solve the illumination variation problem. However, a more accurate model needs to be studied instead of simply discarding low-frequency coefficients. However, each technique still has its own drawbacks. Methods Error Rate (%) Yale B / Yale B + Extended Yale B CMU PIE FERET Sub set3 Sub set4 Sub set5 Non 10.8 51.4 77.4 43.0 n/a RHE 17.8 71.1 79.4 14.6 n/a LogAbout 14.4 42 30.7 43.0 n/a LOG+DCT n/a n/a n/a 0 n/a 12.9 12.4 15.2 HE 9.2 54.2 41.1 47.8 n/a 62.3 78.7 89.9 DCT 0 0.18 1.71 0.36 n/a 16.4 14.5 16.2 DCT+LBP 10.12 15.33 17.29 n/a n/a DWT 0 0.19 0.53 n/a n/a LTV n/a n/a n/a 0 n/a20.6 23.9 21.7 DCT+PCA n/a 5.84 DMQI 2.98 3.98 4.93 n/a n/a DSFQI 1.22 1.62 1.76 n/a n/a
  • 9. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 525 VI. ACKNOWLEDGEMENTS We are very thankful to our principal Dr. F.S. Umrigar and Prof.P.B.Swadas, Head Computer Engineering Department, BVM Engineering College for encourages us to write this review paper. REFERENCES [1]. P. S. Huang, C. J. Harris, and M. S. Nixon, “Human Gait Recognition in Canonical Space using Temporal Templates”, IEE Proc.-Vis. Image Signal Process, Vol. 146, No. 2, April 1999. [2]. Gonzales, R.C. & Woods, R.E. (1992). Digital Image Processing, second ed., Prentice Hall, ISBN-10: 0201180758, Upper Saddle River. [3]. Pizer, S.M. & Amburn, E.P. (1990). Adaptive Histogram Equalization and Its Variations. Comput. Vision Graphics, Image Process, 39, pp. 355-368. [4]. Xie, X. & Lam, K.M. (2005). Face Recognition under Varying Illumination based on a 2D Face Shape Model, Pattern Recognition, 38(2), pp. 221-230. [5]. Liu, H.; Gao, W.; Miao, J.; Zhao, D.; Deng, G. & Li, J. (2001).Illumination Compensation and Feedback of Illumination Feature in Face Detection, Proc. IEEE International Conferences on Info-tech and Info-net, 23, pp. 444-449. [6]. Delac, K.; Grgic, M. & Kos, T. (2006). Sub-Image Homomorphic Filtering Techniques for Improving Facial Identification under Difficult Illumination Conditions. International Conference on System, Signals and Image Processing, Budapest. [7]. Shermina.J, (2011). Illumination Invariant Face Recognition Using Discrete Cosine Transform And Principal Component Analysis.IEEE Proceedings Of Icetect. [8]. X.G. He, J. Tian, L.F. Wu, Y.Y. Zhang, X. Yang l. llumaination Normalization with Morphological Quotient Image,” Journal ofSoftware, Vol.18(9) pp.2318-2325, 2007. [9]. Yu CHENG, Zhigang JIN, Cunming HAO (2010)“Illumination Normalization based on Different Smoothing Filters Quotient Image” IEEE Third International Conference on Intelligent Networks and Intelligent Systems.pp.28-31. [10]. PAN Hong, XIA Si-Yu, JIN Li-Zuo, XIA Liang-Zheng School of Automation, Southeast University, Nanjing 210096, P. R. China “Illumination Invariant Face Recognition Based on Improved Local Binary Pattern” Proceedings of the 30th Chinese Control IEEE Conference Jul y 22-24, 2011, Yantai, China. [11]. K. Ramachandra Murthy, Asish Ghosh “An Efficient Illumination Invariant Face Recognition Technique using Two DimensionalLinear Discriminant Analysis” 1st Int’l IEEE Conf. on Recent Advances in Information Technology | RAIT-2012 |. [12]. Prof. B.S Patil and Prof. A.R Yardi, “Real Time Face Recognition System using Eigen Faces”, International Jjournal of Electronics and Communication Engineering & Technology (IJECET), Volume 4, Issue 2, 2013, pp. 72 - 79, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472. [13]. Steven Lawrence Fernandes and Dr. G Josemin Bala, “Analysing Recognition Rate of LDA and LPP Based Algorithms for Face Recognition”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 2, 2012, pp. 115 - 125, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.