SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume: 3 | Issue: 3 | Mar-Apr 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 - 6470
@ IJTSRD | Unique Paper ID – IJTSRD23283 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 1286
PCA and DCT Based Approach for Face Recognition
Manish Varyani, Pallavi Narware, Lokendra Singh Banafar
Lecturer, Electronics and Communication,
Government Polytechnic College, Itarsi, Madhya Pradesh, India
How to cite this paper: Manish Varyani
| Pallavi Narware | Lokendra Singh
Banafar "PCA and DCT Based Approach
for Face Recognition" Published in
International Journal of Trend in
Scientific Research and Development
(ijtsrd), ISSN: 2456-
6470, Volume-3 |
Issue-3, April 2019,
pp.1286-1290, URL:
https://www.ijtsrd.c
om/papers/ijtsrd23
283.pdf
Copyright © 2019 by author(s) and
International Journal of Trend in
Scientific Research and Development
Journal. This is an Open Access article
distributed under
the terms of the
Creative Commons
Attribution License (CC BY 4.0)
(http://creativecommons.org/licenses/
by/4.0)
ABSTRACT
Recognizing the identity of the target. The research of face recognitionhas great
theoretical value involving subject of pattern recognition, image processing,
computer vision, machine learning, and physiology and so on, and it also has a
high correlation with other biometricsrecognitionmethods.Inrecentyears,face
recognition is one of the most active and challenging problems in the field of
pattern recognition and artificial intelligence. Face recognition has a lot of
advantages which are not involved in biometrics recognition methods such as
nonaggressive, friendly, conveniently, and so on .Therefore, face recognition has
a prospective application foreground, such as the criminal identification,
security system, file management, entrance guard system, and so on . Research
in the field of face recognition knew considerable progress during these last
years. Among the most evoked techniques we find those which employ the
optimization of the size of the data in order to get a representation whichmakes
it possible to carry out the recognition. For these methods, the images of faces
are seen like points in a space of very great dimensions.Thefacespaceisdefined
by Eigen face which are eigenvectors of the set of faces. In the DCT approach we
take transform the image into thefrequencydomain andextractthefeaturefrom
it. For feature extraction we use two approach. In the 1st approach we take the
DCT of the whole image and extract the feature from it. In the 2nd approach we
divide the image into sub-images and take DCT of each of them and then extract
the feature vector from them.
KEYWORDS: PCA, DCT, Face Recognition, Eigen Face, FrequencyDomain,MATLAB
I. INTRODUCTION
During the past two decades, Face recognition bound its
importance as the necessity of security levels increasing.
This makes the researchers to work for an efficientsystemof
face recognition. The methods of face recognition is mainly
divided into two major categories, appearance based (PCA,
LDA, IDA etc.,) and feature based, in which the former one is
more popularized.
The information age is quickly revolutionizing the way
transactions are completed. Human’s day to day actions are
increasingly being handled electronically, instead of face to
face or with pencil and paper. This type of electronic
transactions has resulted in a greater demand for fast and
accurate user identification and authentication for
establishing proper communication, access codes for
buildings, banks accounts and computer systems for more
secure transactions, PIN's for identification and security. By
stealing other’s ATM or any other smart cards, an
unauthorized user can guess the correct personal
information. Even after warnings, many people continue to
choose easily guessed PIN’s and passwords e.g. birthdays,
phone numbers and social security numbers, horoscopes.
Present cases of identity theft have heightened the need for
methods to prove that someone is truly who he/she claims
to be. Face recognition technology may solve this problem
since a face is undeniably connected to its owner expect in
the case of identical twins. It’s non-transferable. The system
can then compare scans to records stored in a central or
local database or even on a smart card.
II. PRINCIPAL COMPONENT ANALYSIS (PCA)
PCA was invented in 1901 by Karl Pearson. It is a linear
transformation based on statistical technique. It is used to
decrease the dimension of the data or to reduce the
correlation between them. It is a way of identifying patterns
present in data, and expressing the data in such a way that
their similarities and differences are highlight.Sincepatterns
present in data can be hard to find in data of high dimension,
where it cannotbe representedgraphically,PCAisapowerful
tool for face detection which is multi- dimensional. The
purpose of PCA is to reducethe largedimensionofdataspace
to a smaller intrinsic dimension of feature vector
(independent variable), which are used to describe the data
cost effectively. The first principal component is the linear
combination of the original dimension along which the
variance is maximum. The second principalcomponentisthe
linear combination of the original dimensionalongwhichthe
variance is maximum and which is orthogonal to the first
principal component. The n-th principal component is the
linear combination with highest variance, subject to being
orthogonal to n-1 principal component.
The images of the faces we have are in two dimension, let us
say of size NXN. Our aim here is to find the Principal
IJTSRD23283
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID - IJTSRD23283 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 1287
components (also known as Eigen Faces) which can
represent the faces present in the training set in a lower
dimensional space.
For all our calculations we need the input data i.e. thefaces is
a linear form so we map the NXN image into a 1XN2 vector.
Let every linear form of the image in our training set be
represented by In. Let the total no. of faces in the training set
be represented as M.
We first compute the mean of all the faces vectors
Next we subtract the mean from the image vector Ii.
We compute the covariance matrix C:
Our next step is to compute the Eigen vector of the
matrix C or BBT, let it be ui. But BBT has a very large size
and the computation of Eigen vector for it is not
practically possible.
So now we have the M best Eigen vector of C. From that
we choose N1 best Eigen vectors i.e. with largest Eigen
value.
The N1 Eigen vector that we have chosen are used as
basis to represent the faces. The Eigen vectors should be
normalized. The Eigen vectors are also referred to as
Eigen faces because when it is transformed into a N X N
matrix it appears as “ghostly faces” consisting features
of all the training faces.
III. Discrete Cosine Transform (DCT)
A transform is amathematicaloperationthatwhenappliedto
a signal that is being processed converts it into a different
domain and then can be again is converted back to the
original domain by the use of inverse transform. The
transforms gives us a set of coefficients from which we can
restore the original samples ofthesignal.Somemathematical
transforms have the ability to generate decor related
coefficients such that most of the signal energy is
concentrating in a reduced number of coefficients. The
Discrete Cosine Transform (DCT) also attempts to decor
relate the image data as other transforms. After decor
relation each transform coefficient can be encoded
independently without losing compression efficiency. It
expresses a finite sequence of data pointsintermsofasumof
cosine functions oscillating atdifferentfrequencies. TheDCT
coefficients reflect different frequency component that are
present in it. The first coefficient refers to the signal’s lowest
frequency (DCcomponent)andusuallycarriesthemajorityof
the relevant information from the original signal. The
coefficients present at the end refer to the signal’s higher
frequencies and these generally represent the finer detailed.
The rest of the coefficients carry different information levels
of the original signal.
IV. BASIC ALGORITHM FOR FACE RECOGNITION
The basic Face Recognition Algorithm is discussed below.
Both normalization and recognition are involved in it. The
system receives as input an image containing a face .The
normalized (and cropped) face is obtained andthenitcanbe
compared with other faces in the training set, under the
same normalized condition conditions like nominal size,
orientation and position. This comparison is done by
comparing the features extracted using the DCT. The basic
idea here is to compute the DCT of the normalized face and
retain a certain subset of the DCT coefficients as a feature
vector describing this face.
Figure 1 Basic flow chart of DCT
V. IMPEMENTATION
Matlab 2011a is used for coding. The face images are cropped and converted to grey scale images as grey scale images are
easier for applying computational techniques in image processing.
Figure 2 few of the images from the database.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID - IJTSRD23283 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 1288
We have conducted five sets of experiments by considering 5, 10, 20, 40 and 60 eachtime.For each personwehave takenafew
no photos with different orientations and expressions. In each experiment we have used the algorithm discussed in the
previous chapter and have found out the principal components. Then bytakingcertain noof principalcomponents atatime we
have formed the face space.
Fig. 3 shows the image of 10 person in different pose
Fig.4 mean of the above 40 faces
After the face space is formedwetake a unknownface from the data base, normalize it by subtractingthemeanfromit.Thenwe
project it on the Eigen vectors and derive its corresponding components.
Next we evaluate the Euclidian distance from the feature vector of other faces and find the face to which it has minimum
distance. WE classify the unknown image to belong to that class (provided the minimum distance is less than the defined
threshold).
Fig 5 Eigen faces
We have used Matlab 2011a is used for implementation. We use the same data base as the above case. The face images are
cropped and changed grey level. Next we convert the image to DCT domain for feature extraction. The feature vector is
dimensionallymuch less as compared totheoriginalimagebutcontainstherequiredinformationforrecognition.TheDCTofthe
image has the same size as the original image. But the coefficients with large magnitude are mainly located in the upper left
corner of the DCT matrix.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID - IJTSRD23283 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 1289
Low frequency coefficients are related to illumination variation and smooth regions (like forehead cheek etc.) of the face. High
frequency coefficients represent noise and detailed information about the eddies in the image. The mid frequency region
coefficients represent the general structure of the face in the image.
Hence we can’tignore all the low frequencycomponents for achieving illumination invariance and also we can’t truncateallthe
high frequency components for removing noise as they are responsible for edges and finer details.
We take DCT of the image. Here our image size is 480 x 480. Next we convert the DCT of the image into a one dimensional
vector by zigzag scanning. We do a zigzag scanning so that in the vector the components are arranged according to increasing
value of frequency.
Figure 6. Show the manner in which zigzag scanning is done
VI. RESULT AND DISCUSSIONS
From the plot of the vector we observe that the low- frequency components have high magnitude high frequency component
have very less magnitude (i.e. much less than 1).
Fig: 7 showing all the elements of the vector
Fig 8 showing only the 1st 200 components
Threshold value of the test face image to Eigen face space which is Euclidean distance is taken as 7.6 which classifies the face as
known or unknown. The values are compiled in a tabular form.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID - IJTSRD23283 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 1290
Table 1: Comparison between different experimental Results of PCA approach
No. of
Person
No. of Photos
Per Person
Total no. of Test
faces
Total no. of Eigen
face Taken
Success Rate
PCA Approach
5 4 20 5 71%
5 4 20 10 76%
5 4 20 15 84%
5 4 20 20 86%
10 4 40 5 69%
10 4 40 10 72%
10 4 40 15 82%
10 4 40 20 85%
Series 1: No. of Person
Series 2 No. of Photos per Person
Series 3: Total no. of Test faces
Series 4: Total no. of Eigen face Taken
Series 5: Success Rate
VII. CONCLUSION
In this thesis we implemented the face recognition system
using Principal Component Analysis and DCT based
approach. The system successfully recognized the human
faces and worked better in different conditions of face
orientation up to a tolerable limit. But in PCA, it suffers from
Background (deemphasize the outside of the face, e.g., by
multiplying the input image by a 2D Gaussian window
centered on the face), Lighting conditions (performance
degrades with light changes), Scale (performance decreases
quickly with changes to the head size), Orientation
(performance decreases but not as fast as with scale
changes).
In block DCT based approach our results are quite
satisfactory. But it suffers from its problem that all images
should align themselvesinthecenterpositionminimizingthe
skewness of the image to lower level.
REFERENCES
[1] W. Zhao , R. Chellappa , P. J. Phillips , A. Rosenfeld, “Face
Recognition: a literature survey”, ACM Computing
Surveys, Vol. 35, No. 4, pp. 399–458, December 2003.
[2] Jawad Nagi, Syed Khaleel Ahmed, Farrukh Nagi, “Pose
Invariant Face Recognition using Hybrid DWT-DCT
Frequency Features with Support Vector Machines”,
Proceedings of the 4th International Conference on
Information Technology and Multimedia at UNITEN
(ICIMU’ 2008), Malaysia , Nov. 2008.
[3] Weilong Chen, Meng Joo Er, hiqian Wu, “PCA and LDA in
DCT domain,” Pattern Recognition Letters, Volume 26,
Issue 15, Pages 2474-482, November 2005.
[4] Erum Naz, Umar Farooq, Tabbasum Naz ,” Analysis of
Principal Component Analysis-Based and Fisher
Discriminant Analysis-Based Face Recognition
Algorithms,” 2nd International Conference on Emerging
TechnologiesPeshawar,Pakistan,13-14November 2006.
[5] Breiman L, Random Forests, MachineLearning, 45, 5-32,
2001.
[6] M. Bartlett and T. Sejnowski. “Independent components
of face images: A representation for face recognition”. In
Proc. the 4th Annual Joint Symposium on Neural
Computation, Pasadena, CA, May 17, 1997.

Weitere ähnliche Inhalte

Was ist angesagt?

Formalization & data abstraction during use case modeling in object oriented ...
Formalization & data abstraction during use case modeling in object oriented ...Formalization & data abstraction during use case modeling in object oriented ...
Formalization & data abstraction during use case modeling in object oriented ...
csandit
 

Was ist angesagt? (16)

Ijatcse71852019
Ijatcse71852019Ijatcse71852019
Ijatcse71852019
 
K044065257
K044065257K044065257
K044065257
 
Enhanced ID3 algorithm based on the weightage of the Attribute
Enhanced ID3 algorithm based on the weightage of the AttributeEnhanced ID3 algorithm based on the weightage of the Attribute
Enhanced ID3 algorithm based on the weightage of the Attribute
 
Prediction of Default Customer in Banking Sector using Artificial Neural Network
Prediction of Default Customer in Banking Sector using Artificial Neural NetworkPrediction of Default Customer in Banking Sector using Artificial Neural Network
Prediction of Default Customer in Banking Sector using Artificial Neural Network
 
Ijsws14 423 (1)-paper-17-normalization of data in (1)
Ijsws14 423 (1)-paper-17-normalization of data in (1)Ijsws14 423 (1)-paper-17-normalization of data in (1)
Ijsws14 423 (1)-paper-17-normalization of data in (1)
 
IRJET-Handwritten Digit Classification using Machine Learning Models
IRJET-Handwritten Digit Classification using Machine Learning ModelsIRJET-Handwritten Digit Classification using Machine Learning Models
IRJET-Handwritten Digit Classification using Machine Learning Models
 
A018110108
A018110108A018110108
A018110108
 
PERFORMANCE EVALUATION OF FUZZY LOGIC AND BACK PROPAGATION NEURAL NETWORK FOR...
PERFORMANCE EVALUATION OF FUZZY LOGIC AND BACK PROPAGATION NEURAL NETWORK FOR...PERFORMANCE EVALUATION OF FUZZY LOGIC AND BACK PROPAGATION NEURAL NETWORK FOR...
PERFORMANCE EVALUATION OF FUZZY LOGIC AND BACK PROPAGATION NEURAL NETWORK FOR...
 
Survey paper on Big Data Imputation and Privacy Algorithms
Survey paper on Big Data Imputation and Privacy AlgorithmsSurvey paper on Big Data Imputation and Privacy Algorithms
Survey paper on Big Data Imputation and Privacy Algorithms
 
A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...
A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...
A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...
 
A Survey on Fingerprint Identification for Different Orientation Images.
A Survey on Fingerprint Identification for Different Orientation Images.A Survey on Fingerprint Identification for Different Orientation Images.
A Survey on Fingerprint Identification for Different Orientation Images.
 
2018 p 2019-ee-a2
2018 p 2019-ee-a22018 p 2019-ee-a2
2018 p 2019-ee-a2
 
Formalization & data abstraction during use case modeling in object oriented ...
Formalization & data abstraction during use case modeling in object oriented ...Formalization & data abstraction during use case modeling in object oriented ...
Formalization & data abstraction during use case modeling in object oriented ...
 
IRJET - Conversion of Unsupervised Data to Supervised Data using Topic Mo...
IRJET -  	  Conversion of Unsupervised Data to Supervised Data using Topic Mo...IRJET -  	  Conversion of Unsupervised Data to Supervised Data using Topic Mo...
IRJET - Conversion of Unsupervised Data to Supervised Data using Topic Mo...
 
Integrating Fuzzy Mde- AT Framework For Urban Traffic Simulation
Integrating Fuzzy Mde- AT Framework For Urban Traffic SimulationIntegrating Fuzzy Mde- AT Framework For Urban Traffic Simulation
Integrating Fuzzy Mde- AT Framework For Urban Traffic Simulation
 
Image investigation using higher moment statistics and edge detection for rec...
Image investigation using higher moment statistics and edge detection for rec...Image investigation using higher moment statistics and edge detection for rec...
Image investigation using higher moment statistics and edge detection for rec...
 

Ähnlich wie PCA and DCT Based Approach for Face Recognition

KPCA and Eigen Face Based Dimension Reduction Face Recognition Method
KPCA and Eigen Face Based Dimension Reduction Face Recognition MethodKPCA and Eigen Face Based Dimension Reduction Face Recognition Method
KPCA and Eigen Face Based Dimension Reduction Face Recognition Method
ijtsrd
 
Face Recognition System using Self Organizing Feature Map and Appearance Base...
Face Recognition System using Self Organizing Feature Map and Appearance Base...Face Recognition System using Self Organizing Feature Map and Appearance Base...
Face Recognition System using Self Organizing Feature Map and Appearance Base...
ijtsrd
 
Appearance based face recognition by pca and lda
Appearance based face recognition by pca and ldaAppearance based face recognition by pca and lda
Appearance based face recognition by pca and lda
IAEME Publication
 
Real time face recognition system using eigen faces
Real time face recognition system using eigen facesReal time face recognition system using eigen faces
Real time face recognition system using eigen faces
IAEME Publication
 
Face Recognition for Human Identification using BRISK Feature and Normal Dist...
Face Recognition for Human Identification using BRISK Feature and Normal Dist...Face Recognition for Human Identification using BRISK Feature and Normal Dist...
Face Recognition for Human Identification using BRISK Feature and Normal Dist...
ijtsrd
 

Ähnlich wie PCA and DCT Based Approach for Face Recognition (20)

Implementation of Face Recognition in Cloud Vision Using Eigen Faces
Implementation of Face Recognition in Cloud Vision Using Eigen FacesImplementation of Face Recognition in Cloud Vision Using Eigen Faces
Implementation of Face Recognition in Cloud Vision Using Eigen Faces
 
KPCA and Eigen Face Based Dimension Reduction Face Recognition Method
KPCA and Eigen Face Based Dimension Reduction Face Recognition MethodKPCA and Eigen Face Based Dimension Reduction Face Recognition Method
KPCA and Eigen Face Based Dimension Reduction Face Recognition Method
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Face Recognition System using Self Organizing Feature Map and Appearance Base...
Face Recognition System using Self Organizing Feature Map and Appearance Base...Face Recognition System using Self Organizing Feature Map and Appearance Base...
Face Recognition System using Self Organizing Feature Map and Appearance Base...
 
IRJET- Face Recognition of Criminals for Security using Principal Component A...
IRJET- Face Recognition of Criminals for Security using Principal Component A...IRJET- Face Recognition of Criminals for Security using Principal Component A...
IRJET- Face Recognition of Criminals for Security using Principal Component A...
 
FACE RECOGNITION USING PRINCIPAL COMPONENT ANALYSIS WITH MEDIAN FOR NORMALIZA...
FACE RECOGNITION USING PRINCIPAL COMPONENT ANALYSIS WITH MEDIAN FOR NORMALIZA...FACE RECOGNITION USING PRINCIPAL COMPONENT ANALYSIS WITH MEDIAN FOR NORMALIZA...
FACE RECOGNITION USING PRINCIPAL COMPONENT ANALYSIS WITH MEDIAN FOR NORMALIZA...
 
Real Time Implementation Of Face Recognition System
Real Time Implementation Of Face Recognition SystemReal Time Implementation Of Face Recognition System
Real Time Implementation Of Face Recognition System
 
Independent Component Analysis of Edge Information for Face Recognition
Independent Component Analysis of Edge Information for Face RecognitionIndependent Component Analysis of Edge Information for Face Recognition
Independent Component Analysis of Edge Information for Face Recognition
 
Age Invariant Face Recognition
Age Invariant Face RecognitionAge Invariant Face Recognition
Age Invariant Face Recognition
 
Appearance based face recognition by pca and lda
Appearance based face recognition by pca and ldaAppearance based face recognition by pca and lda
Appearance based face recognition by pca and lda
 
Ijebea14 276
Ijebea14 276Ijebea14 276
Ijebea14 276
 
IRJET- Analysis of Face Recognition using Docface+ Selfie Matching
IRJET-  	  Analysis of Face Recognition using Docface+ Selfie MatchingIRJET-  	  Analysis of Face Recognition using Docface+ Selfie Matching
IRJET- Analysis of Face Recognition using Docface+ Selfie Matching
 
APPLICATION OF IMAGE FUSION FOR ENHANCING THE QUALITY OF AN IMAGE
APPLICATION OF IMAGE FUSION FOR ENHANCING THE QUALITY OF AN IMAGEAPPLICATION OF IMAGE FUSION FOR ENHANCING THE QUALITY OF AN IMAGE
APPLICATION OF IMAGE FUSION FOR ENHANCING THE QUALITY OF AN IMAGE
 
National Flags Recognition Based on Principal Component Analysis
National Flags Recognition Based on Principal Component AnalysisNational Flags Recognition Based on Principal Component Analysis
National Flags Recognition Based on Principal Component Analysis
 
G1802033543
G1802033543G1802033543
G1802033543
 
Real time face recognition system using eigen faces
Real time face recognition system using eigen facesReal time face recognition system using eigen faces
Real time face recognition system using eigen faces
 
IRJET - Face Recognition in Digital Documents with Live Image
IRJET - Face Recognition in Digital Documents with Live ImageIRJET - Face Recognition in Digital Documents with Live Image
IRJET - Face Recognition in Digital Documents with Live Image
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...
 
Criminal Identification using Arm7
Criminal Identification using Arm7Criminal Identification using Arm7
Criminal Identification using Arm7
 
Face Recognition for Human Identification using BRISK Feature and Normal Dist...
Face Recognition for Human Identification using BRISK Feature and Normal Dist...Face Recognition for Human Identification using BRISK Feature and Normal Dist...
Face Recognition for Human Identification using BRISK Feature and Normal Dist...
 

Mehr von ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
ijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
ijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
ijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
ijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
ijtsrd
 

Mehr von ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Kürzlich hochgeladen

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Krashi Coaching
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Kürzlich hochgeladen (20)

Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 

PCA and DCT Based Approach for Face Recognition

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume: 3 | Issue: 3 | Mar-Apr 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 - 6470 @ IJTSRD | Unique Paper ID – IJTSRD23283 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 1286 PCA and DCT Based Approach for Face Recognition Manish Varyani, Pallavi Narware, Lokendra Singh Banafar Lecturer, Electronics and Communication, Government Polytechnic College, Itarsi, Madhya Pradesh, India How to cite this paper: Manish Varyani | Pallavi Narware | Lokendra Singh Banafar "PCA and DCT Based Approach for Face Recognition" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-3 | Issue-3, April 2019, pp.1286-1290, URL: https://www.ijtsrd.c om/papers/ijtsrd23 283.pdf Copyright © 2019 by author(s) and International Journal of Trend in Scientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/ by/4.0) ABSTRACT Recognizing the identity of the target. The research of face recognitionhas great theoretical value involving subject of pattern recognition, image processing, computer vision, machine learning, and physiology and so on, and it also has a high correlation with other biometricsrecognitionmethods.Inrecentyears,face recognition is one of the most active and challenging problems in the field of pattern recognition and artificial intelligence. Face recognition has a lot of advantages which are not involved in biometrics recognition methods such as nonaggressive, friendly, conveniently, and so on .Therefore, face recognition has a prospective application foreground, such as the criminal identification, security system, file management, entrance guard system, and so on . Research in the field of face recognition knew considerable progress during these last years. Among the most evoked techniques we find those which employ the optimization of the size of the data in order to get a representation whichmakes it possible to carry out the recognition. For these methods, the images of faces are seen like points in a space of very great dimensions.Thefacespaceisdefined by Eigen face which are eigenvectors of the set of faces. In the DCT approach we take transform the image into thefrequencydomain andextractthefeaturefrom it. For feature extraction we use two approach. In the 1st approach we take the DCT of the whole image and extract the feature from it. In the 2nd approach we divide the image into sub-images and take DCT of each of them and then extract the feature vector from them. KEYWORDS: PCA, DCT, Face Recognition, Eigen Face, FrequencyDomain,MATLAB I. INTRODUCTION During the past two decades, Face recognition bound its importance as the necessity of security levels increasing. This makes the researchers to work for an efficientsystemof face recognition. The methods of face recognition is mainly divided into two major categories, appearance based (PCA, LDA, IDA etc.,) and feature based, in which the former one is more popularized. The information age is quickly revolutionizing the way transactions are completed. Human’s day to day actions are increasingly being handled electronically, instead of face to face or with pencil and paper. This type of electronic transactions has resulted in a greater demand for fast and accurate user identification and authentication for establishing proper communication, access codes for buildings, banks accounts and computer systems for more secure transactions, PIN's for identification and security. By stealing other’s ATM or any other smart cards, an unauthorized user can guess the correct personal information. Even after warnings, many people continue to choose easily guessed PIN’s and passwords e.g. birthdays, phone numbers and social security numbers, horoscopes. Present cases of identity theft have heightened the need for methods to prove that someone is truly who he/she claims to be. Face recognition technology may solve this problem since a face is undeniably connected to its owner expect in the case of identical twins. It’s non-transferable. The system can then compare scans to records stored in a central or local database or even on a smart card. II. PRINCIPAL COMPONENT ANALYSIS (PCA) PCA was invented in 1901 by Karl Pearson. It is a linear transformation based on statistical technique. It is used to decrease the dimension of the data or to reduce the correlation between them. It is a way of identifying patterns present in data, and expressing the data in such a way that their similarities and differences are highlight.Sincepatterns present in data can be hard to find in data of high dimension, where it cannotbe representedgraphically,PCAisapowerful tool for face detection which is multi- dimensional. The purpose of PCA is to reducethe largedimensionofdataspace to a smaller intrinsic dimension of feature vector (independent variable), which are used to describe the data cost effectively. The first principal component is the linear combination of the original dimension along which the variance is maximum. The second principalcomponentisthe linear combination of the original dimensionalongwhichthe variance is maximum and which is orthogonal to the first principal component. The n-th principal component is the linear combination with highest variance, subject to being orthogonal to n-1 principal component. The images of the faces we have are in two dimension, let us say of size NXN. Our aim here is to find the Principal IJTSRD23283
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID - IJTSRD23283 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 1287 components (also known as Eigen Faces) which can represent the faces present in the training set in a lower dimensional space. For all our calculations we need the input data i.e. thefaces is a linear form so we map the NXN image into a 1XN2 vector. Let every linear form of the image in our training set be represented by In. Let the total no. of faces in the training set be represented as M. We first compute the mean of all the faces vectors Next we subtract the mean from the image vector Ii. We compute the covariance matrix C: Our next step is to compute the Eigen vector of the matrix C or BBT, let it be ui. But BBT has a very large size and the computation of Eigen vector for it is not practically possible. So now we have the M best Eigen vector of C. From that we choose N1 best Eigen vectors i.e. with largest Eigen value. The N1 Eigen vector that we have chosen are used as basis to represent the faces. The Eigen vectors should be normalized. The Eigen vectors are also referred to as Eigen faces because when it is transformed into a N X N matrix it appears as “ghostly faces” consisting features of all the training faces. III. Discrete Cosine Transform (DCT) A transform is amathematicaloperationthatwhenappliedto a signal that is being processed converts it into a different domain and then can be again is converted back to the original domain by the use of inverse transform. The transforms gives us a set of coefficients from which we can restore the original samples ofthesignal.Somemathematical transforms have the ability to generate decor related coefficients such that most of the signal energy is concentrating in a reduced number of coefficients. The Discrete Cosine Transform (DCT) also attempts to decor relate the image data as other transforms. After decor relation each transform coefficient can be encoded independently without losing compression efficiency. It expresses a finite sequence of data pointsintermsofasumof cosine functions oscillating atdifferentfrequencies. TheDCT coefficients reflect different frequency component that are present in it. The first coefficient refers to the signal’s lowest frequency (DCcomponent)andusuallycarriesthemajorityof the relevant information from the original signal. The coefficients present at the end refer to the signal’s higher frequencies and these generally represent the finer detailed. The rest of the coefficients carry different information levels of the original signal. IV. BASIC ALGORITHM FOR FACE RECOGNITION The basic Face Recognition Algorithm is discussed below. Both normalization and recognition are involved in it. The system receives as input an image containing a face .The normalized (and cropped) face is obtained andthenitcanbe compared with other faces in the training set, under the same normalized condition conditions like nominal size, orientation and position. This comparison is done by comparing the features extracted using the DCT. The basic idea here is to compute the DCT of the normalized face and retain a certain subset of the DCT coefficients as a feature vector describing this face. Figure 1 Basic flow chart of DCT V. IMPEMENTATION Matlab 2011a is used for coding. The face images are cropped and converted to grey scale images as grey scale images are easier for applying computational techniques in image processing. Figure 2 few of the images from the database.
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID - IJTSRD23283 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 1288 We have conducted five sets of experiments by considering 5, 10, 20, 40 and 60 eachtime.For each personwehave takenafew no photos with different orientations and expressions. In each experiment we have used the algorithm discussed in the previous chapter and have found out the principal components. Then bytakingcertain noof principalcomponents atatime we have formed the face space. Fig. 3 shows the image of 10 person in different pose Fig.4 mean of the above 40 faces After the face space is formedwetake a unknownface from the data base, normalize it by subtractingthemeanfromit.Thenwe project it on the Eigen vectors and derive its corresponding components. Next we evaluate the Euclidian distance from the feature vector of other faces and find the face to which it has minimum distance. WE classify the unknown image to belong to that class (provided the minimum distance is less than the defined threshold). Fig 5 Eigen faces We have used Matlab 2011a is used for implementation. We use the same data base as the above case. The face images are cropped and changed grey level. Next we convert the image to DCT domain for feature extraction. The feature vector is dimensionallymuch less as compared totheoriginalimagebutcontainstherequiredinformationforrecognition.TheDCTofthe image has the same size as the original image. But the coefficients with large magnitude are mainly located in the upper left corner of the DCT matrix.
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID - IJTSRD23283 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 1289 Low frequency coefficients are related to illumination variation and smooth regions (like forehead cheek etc.) of the face. High frequency coefficients represent noise and detailed information about the eddies in the image. The mid frequency region coefficients represent the general structure of the face in the image. Hence we can’tignore all the low frequencycomponents for achieving illumination invariance and also we can’t truncateallthe high frequency components for removing noise as they are responsible for edges and finer details. We take DCT of the image. Here our image size is 480 x 480. Next we convert the DCT of the image into a one dimensional vector by zigzag scanning. We do a zigzag scanning so that in the vector the components are arranged according to increasing value of frequency. Figure 6. Show the manner in which zigzag scanning is done VI. RESULT AND DISCUSSIONS From the plot of the vector we observe that the low- frequency components have high magnitude high frequency component have very less magnitude (i.e. much less than 1). Fig: 7 showing all the elements of the vector Fig 8 showing only the 1st 200 components Threshold value of the test face image to Eigen face space which is Euclidean distance is taken as 7.6 which classifies the face as known or unknown. The values are compiled in a tabular form.
  • 5. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID - IJTSRD23283 | Volume – 3 | Issue – 3 | Mar-Apr 2019 Page: 1290 Table 1: Comparison between different experimental Results of PCA approach No. of Person No. of Photos Per Person Total no. of Test faces Total no. of Eigen face Taken Success Rate PCA Approach 5 4 20 5 71% 5 4 20 10 76% 5 4 20 15 84% 5 4 20 20 86% 10 4 40 5 69% 10 4 40 10 72% 10 4 40 15 82% 10 4 40 20 85% Series 1: No. of Person Series 2 No. of Photos per Person Series 3: Total no. of Test faces Series 4: Total no. of Eigen face Taken Series 5: Success Rate VII. CONCLUSION In this thesis we implemented the face recognition system using Principal Component Analysis and DCT based approach. The system successfully recognized the human faces and worked better in different conditions of face orientation up to a tolerable limit. But in PCA, it suffers from Background (deemphasize the outside of the face, e.g., by multiplying the input image by a 2D Gaussian window centered on the face), Lighting conditions (performance degrades with light changes), Scale (performance decreases quickly with changes to the head size), Orientation (performance decreases but not as fast as with scale changes). In block DCT based approach our results are quite satisfactory. But it suffers from its problem that all images should align themselvesinthecenterpositionminimizingthe skewness of the image to lower level. REFERENCES [1] W. Zhao , R. Chellappa , P. J. Phillips , A. Rosenfeld, “Face Recognition: a literature survey”, ACM Computing Surveys, Vol. 35, No. 4, pp. 399–458, December 2003. [2] Jawad Nagi, Syed Khaleel Ahmed, Farrukh Nagi, “Pose Invariant Face Recognition using Hybrid DWT-DCT Frequency Features with Support Vector Machines”, Proceedings of the 4th International Conference on Information Technology and Multimedia at UNITEN (ICIMU’ 2008), Malaysia , Nov. 2008. [3] Weilong Chen, Meng Joo Er, hiqian Wu, “PCA and LDA in DCT domain,” Pattern Recognition Letters, Volume 26, Issue 15, Pages 2474-482, November 2005. [4] Erum Naz, Umar Farooq, Tabbasum Naz ,” Analysis of Principal Component Analysis-Based and Fisher Discriminant Analysis-Based Face Recognition Algorithms,” 2nd International Conference on Emerging TechnologiesPeshawar,Pakistan,13-14November 2006. [5] Breiman L, Random Forests, MachineLearning, 45, 5-32, 2001. [6] M. Bartlett and T. Sejnowski. “Independent components of face images: A representation for face recognition”. In Proc. the 4th Annual Joint Symposium on Neural Computation, Pasadena, CA, May 17, 1997.