SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
IJASCSE, Vol 1, Issue 2, 2012
Sept. 30




            A NOVAL ARTECHTURE FOR 3D MODEL IN VIRTUAL
                 COMMUNITIES FROM FACE DETECTION
           Vibekananda Dutta                 Dr. Nishtha Kesswani                  Deepti Gahalot
       Central University of Rajasthan    Central University of Rajasthan      Govt.Engineering College
             Kishangarh, India                    Kishangarh, India                   Ajmer, India



       ABSTRACT:                                           embodiment in cyberspace [1]. Virtual
                                                           worlds are also extremely attractive for the
       Towards next generation, Criminal activity          run-of the-mill criminals interested in
       in virtual worlds is becoming a major               conducting identity theft, fraud, tax
                                                           evasion, illegal gambling and other
       problem for law enforcement agencies.
                                                           traditional crimes. In the virtual world
       Virtual communities such as Second Life             increasingly populated by non-biological
       will be quickly becoming the next frontier          characters there are just no existing
       of cybercrime. Even now a day’s Forensic            techniques for identity verification of
       investigators are becoming interested in            intelligent entities other then self-
       being able to accurately and automatically          identification.
                                                                  Artimetrics, which is defined as the
       track people in virtual communities.
                                                           science of recognition, detection and
       Mostly in the multimedia context, an                verification of intelligent software agents
       avatar is the visual representation of the          and industrial robots and other non-
       self in a virtual world. In this research           biological entities aims to address this
       paper we suggest how to extract a face              problem. This future oriented sub-field of
       from an image, modify it, characterize it in        security has broad applications in this
       terms of high-level properties, and apply it        virtual world [2]. Artificially Intelligent
                                                           programs are quickly becoming a part of
       to the creation of a personalized avatar. In
                                                           our daily life. In this paper we suggest
       this research work we tested, we                    utilization of face detection systems and
       implemented the algorithm on several                development of novel face recognition
       hundred facial images, including many               algorithms for face-based avatar creation.
       taken under uncontrolled acquisition
       conditions,    and     found    to   exhibit        2. FACE RECOGNITION
       satisfactory performance for immediate
       practical use.                                      2.1 HUMAN FACE RECOGNITION PROCESS

       GENERAL TERMS: Avatar, Virtual world,               Human faces have similarities and
       Human face, Matching, Images, Criminal              differences. They have a consistent
       Activity.                                           structure    and   location   of    facial
       KEYWORDS: Virtual world; avatar; face               components (i.e. the relationship among
       recognition    algorithm;    local image            eyes, nose, etc.). In human face
       features; Artimetrics; Dataset.                     recognition where we have four stages [5]:

           1. INTRODUCTION:                                       a) Acquiring a sample: In a
                                                           complete, full implemented biometric
                                                           system, a sensor takes an observation.
                The term avatar, which refers to           The sensor might be a camera and the
       the temporary body a god inhabits while             observation is a snapshot picture. In our
       visiting earth. In virtual communities, it          system, a sensor will be ignored, and a 2D
       now     describes    the    user’s  visual

                                                                                            1|Page
IJASCSE, Vol 1, Issue 2, 2012
Sept. 30

                                                           case, the intervention of a human operator
                                                           will be required in order to select the best
       or 3D face picture “observation” will               fit from the candidate list. An illustrative
       supplied manually.                                  analogy is that of a walk-through metal
                                                           detector, where if a person causes the 7
       b) Extracting Features: For this step, the          detector to beep, a human operator steps
       relevant data is extracted from the                 in and checks the person manually or with
       predefined captured sample. This is can             a hand-held detector.
       be done by the use of software where
       many algorithms are available. The                  2.2  HUMAN         FACE      RECOGNITION
       outcome of this step is a biometric                 TECHNIQUES
       template which is a reduced set of data
       that represents the unique features of the                 All available face recognition
       enrolled user's face.                               techniques can be classified into four
        c)    Comparison        Templates:     This        categories based on the way they
       depends on the application at hand. For             represent face [7];
       identification purposes, this step will be a        1. Appearance based which uses holistic
       comparison between a given picture for              texture features.
       the subject and all the biometric templates         2. Model based which employ shape and
       stored on a database. For verification, the         texture of the face, along with 3D depth
       biometric template of the claimed identity          information.
       will be retrieved (either from a database or        3. Template based face recognition.
       a storage medium presented by the                   4. Techniques using Neural Networks.
       subject) and this will be compared to a
       given picture.
        d) Declaring a Match: The face
       recognition system will return a candidate
       match list of potential matches. In this




                   Figure 1: Classification of Face Recognition Methods



       3.AVATAR GENERATION FROM                            strong discrimination between identities
       FACE RECOGNITION SYSTEM                             (see Fig. 2).

       Avatar and human faces have similarities
       and differences. Both have a consistent
       structure   and     location   of     facial
       components (i.e. the relationship among
       eyes, nose, etc.). These similarities gives
       idea of an avatar face recognition
       framework designed in the same manner
       as human Face Recognition systems.
       Avatar faces span a wider range of colors
       than human faces, and the colors provide

                                                                                            2|Page
IJASCSE, Vol 1, Issue 2, 2012
Sept. 30

                                                              feature based extraction packaged with
                                                              OpenGL & MatLab [8].

                                                                    B. Face Representation

                                                                     In order to match two faces in
                                                              Avatar face recognition, we represent the
                                                              face in a metric space by first computing a
                                                              set of local feature descriptors across the
                                                              face region. Two separate feature
                                                              descriptors are used to describe (i) the
                                                              structure of the face, and (ii) the
                                                              appearance properties of the face. For
                                                              computing the local descriptors, the
       Figure2: Examples of the different                     normalized face image is divided into an
       subjects in the Second Life avatar                     ordered set of N overlapping square
       dataset. Each image corresponds to                     patches Pi, i = 1.... N, each of size Sp x Sp
       one of the different pose sets. In our                 ,Sp = 32. For each patch Pi two feature
       matching experiments, the frontal                      vectors are extracted: one describing the
       image from group A was used as the                     appearance (Ai € Rda), and the other
       gallery image. The remaining sets were                 describing the structure (Ai € Rds) [9, 10],
       all used as probe images                               Computing features across a set of
                                                              overlapping patches allows for salient
       We propose an algorithm for avatar                     descriptions at specific locations of the
       generation from face recognition that                  face that is robust to variations in
       follows the same procedures as standard                geometric normalization.
       face recognition systems [6], consisting of
       three stages:                                               C. Matching
       1. Face detection and image normalization
       2. Face representation                                           For a given avatar face, we have
       3. Matching and                                        two sets of vectors Si and Ai, i = 1..... N,
       In the last step which we proposed an                  where N is the number of face is patches.
       Avatar generation system which produced                To determine an avatar's identity, we first
       Avatar faces of that detected faces.                   concatenate the set of local (patch)
                                                              descriptors into a single feature vector of
                                                              length Nds and Nda, respectively for Si
            A. Face    Detection      and      Image
                                                              and Sa. The concatenated feature vectors
               Normalization
                                                              are represented as Sj and Aj for the j-th
        In a virtual world, real-time face detection          avatar subject. The distance between two
       will detect the presence of an avatar                  faces corresponding to images mp and mj
       subject with a frontal to near-frontal face in         computed      using    cosine    correlation
       the field of view [9]. Similar to traditional          similarity measure given by [11]:
       face recognition, once an
       avatar face is detected it must be pre-
                                                                                    m tp m j
                                                              cos  m p , m j  
       processed by performing both geometric
       and color normalization in order to reduce                                                       (1)
                                                                                    mp mj
       variations caused by external parameters
       such as camera location and illumination.
                                                              Similarity between two labelled graphs is
       We found a method to work with similar                 the average of this vector similarity over
       effectiveness on avatar faces. We                      corresponding nodes of the facial graph.
       explored the use of (i) a Morphable feature            This is essentially a measure of the filter
       based extraction for trained on avatar                 response amplitude at corresponding
       faces, and (ii) the default Morphable

                                                                                                3|Page
IJASCSE, Vol 1, Issue 2, 2012
Sept. 30

       spatial frequency, orientation, and position
       on the grid.                                             4.    EXPERIMENT                      AND
              D. An Avatar Generation System
                                                                DISCUSSION
        An avatar creation system which we
       consider to be desirable is the ability to                 a) Data
       embody some intelligence about the face
       being processed. An automatic semantic                         For the purpose of 3D-model of
       analysis of the face into facial categories                    facial generation, various type of
       empowers the system to generate                                virtual world and 3D-model creation
       intelligent suggestions of avatar body type                    softwer were consider based on the
       [3]. An important design feature of the                        use     of   this    research    work,
       Avatar Creation system is rapidity of uses.                    including[12].
       In a few seconds a user’s picture is                                   1. Ability to view the 3D-
       filtered, the region containing the face is                               model facial from different
       extracted from the image and registered                                   angles.
       with an adaptable grid, facial attributes are                          2. Selecting the constructing
       classified and semantic labels attached to                                facial feature in generation
       the face and finally the system suggests                                  new ages faces.
       an interesting looking avatar body to the                              3. Mutable attributes to 3D
       user.                                                                     facial features.

                                                                  b) Result
                                                                      The images of 100 persons with
                                    Image capture                     different angles makes the number
                                                                      of images near about 800-900
       Input image
                                                                      images, where we grouped those
                                                                      images in to 3 datasets each of
                                                                      which near about 300 images using
                                                                      Morphable model based template
                                                                      matching     technique   for  face
                                                                      recognition. Where we first detect
                                                                      the images then from that detected
                                                                      images we generate the 3D-model of
                                                                      facial character.

                                                                      Table: Performance comparison
                                                                      of different dataset with avatar
                                                                      generation system

       Converted to    converted to                                   Set Number 3D                  Avatar
       Reshaping Images Image Manipulation using                          of     Morphable           Generation
       Greyscale                Binary               image
       template matching for recognition                                  Images Template            from that
                                                                                 Matching            detected
                                                                                 Technique           faces
                                                                                                     using GIF
                                                                                                     animator
                                                                                                     software

       Avatar    Creation    of    that   detected    face
       Using Avatar generation system                                 A       300      80.8%         84%
                                                                      B       270      89.2%         91%
       Figure 2: Functional modules of the                            C       281      72.9%         81%
       Avatar generation system

                                                                                                  4|Page
IJASCSE, Vol 1, Issue 2, 2012
Sept. 30

                                                            worlds populated by both         human and
                                                            artificial entities [15].
       Using Morphable model based face
       recognition [14], a Rank-1 accuracy of
       97.58% was achieved. Testing the                     6. ACKNOWLWDGEMENT
       prototype avatar system proposed on this
       dataset was not warranted because: (i) A                We would like to express our appreciation to
       Morphable based face matcher already                 “CENTRAL UNIVERSITY OF RAJASTHAN”
       achieves a very high accuracy, and (ii) the          for the anonymous referees of the original
       proposed system is designed to match                 datasets for the constructive comments they
       images to avatars using less realistic               made. We would further like to express our
                                                            pleasure to Mr. KRISHNA KUMAR SHARMA
       renderings, such as those in Second Life.
                                                            for giving us such opportunity to work with him
       These results are reported because it is             in this area.
       useful to know that current face
       recognition technology appears to be
       sufficiently accurate in the 3D model
       architecture, when the 3D-model is
                                                            REFERENCES
       rendered using advanced software
       programming such as openGL.
                                                            [1] B. Damer. Avatars! Exploring and
                                                            Building Virtual Worlds on the Internet.
                                                            Peachpit Press,
           310                                              Berkeley, 1997.
                                          3D
           300                            Morphable
                                          Template          [2] O'Harrow, R., Spies' Battleground
           290                                              Turns Virtual, in The Washington Post.
                                          Matching
           280                            Technique         February      6,   2008:    Available at:
                                                            http://www.washingtonpost.com/wpdyn/
           270                            Number of         content/article/2008/02/05/AR2008020503
                                          Images
           260                                              144.html.

           250                                              [3] Yampolskiy, R. V. and V. Govindaraju
                 1     2      3                             (2008).     Behavioral   Biometrics    for
                                                            Verification and Recognition of Malicious
       Figure 3: Graphical representation                   Software      Agents.    Sensors,     and
       of comparison in different dataset                   Command, Control, Communications, and
                                                            Intelligence (C3I) Technologies for
       5 CONCLUSIONS                                        Homeland Security and Homeland
                                                            Defense VII. Orlando, Florida.
       This Research paper addressed the
       problem of generating the 3D-model faces             [4] S.Inoue, M. Ishiwaka, S. Tanaka. & J.
       from face recognition system. We have                Park. An image Expression Room. IEEE
       reported results of experiments aimed                Proceedings of
       towards the Potential directions for future          the International Conference on Virtual
       research include the investigation of other          Systems and Multimedia VSMM 97 p.181,
       visual and behavioural approaches to                 1997.
       virtual     world   security  based      on
       appearance of new characteristics and
       abilities in the 3D-model. As virtual reality        [5]      Statistics in Face Recognition:
       technology progresses day by day and                 Analyzing Probability Distributions of PCA,
       criminal activity become the major                   ICA and LDA Performance Results
       problem, so it will require new security             Kresimir Delac 1, Mislav Grgic 2 and
       solutions for identity management across             Sonja Grgic 2 1 Croatian Telecom, Savska
                                                            32, Zagreb, Croatia, e-mail:

                                                                                               5|Page
IJASCSE, Vol 1, Issue 2, 2012
Sept. 30



       kdelac@ieee.org 2 University of Zagreb,
       FER, Unska 3/XII, Zagreb, Croatia

       [6]   Lyons, M., et al., Avatar Creation
       using Automatic Face Recognition, in
       ACM Multimedia 98. Sept. 1998: Bristol,
       England. p. 427-434.

       [7]    Evaluation of Face Recognition
       Techniques for Application to Facebook,
       Brian C. Becker Carnegie Mellon Univ
       5000 Forbes Av Pittsburgh, PA 152
       briancbecker@cmu.



       [8]  Open source graphical library and
       math works library.

       [9]     Viola, P. and M.J. Jones, Robust
       real-time face detection. Int. Journal of
       Computer Vision, 2004. 57: p. 137-154.


       [10]     Ahonen, T., A. Hadid, and M.
       Pietikainen, Face description with local
       binary patterns: Application to face
       recognition. IEEE Trans. Pattern Analysis
       and Machine Intelligence, 2006. 28: p.
       2037- 2041


       [11]    Ojala, T., M. Pietikainen, and T.
       Maenpaa, Multiresolution grayscale and
       rotation invariant texture classification with
       local binary patterns. IEEE Trans. Pattern
       Analysis & Machine Intelligence, 2002. 24:
       p. 971-987.


       [12]    Oursler, J.N., M. Price, and R.V.
       Yampolskiy, Parameterized Generation of
       Avatar     Face     Dataset,    in   14th
       InternationalConference on Computer
       Games: AI, Animation, Mobile, Interactive
       Multimedia,    Educational & Serious
       Games. 2009: Louisville, KY.




                                                                           6|Page

Contenu connexe

Tendances

Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D Faces
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D FacesDepth-Image-based Facial Analysis between Age Groups and Recognition of 3D Faces
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D FacesIDES Editor
 
426 Lecture 9: Research Directions in AR
426 Lecture 9: Research Directions in AR426 Lecture 9: Research Directions in AR
426 Lecture 9: Research Directions in ARMark Billinghurst
 
MIT 6.870 - Template Matching and Histograms (Nicolas Pinto, MIT)
MIT 6.870 - Template Matching and Histograms (Nicolas Pinto, MIT)MIT 6.870 - Template Matching and Histograms (Nicolas Pinto, MIT)
MIT 6.870 - Template Matching and Histograms (Nicolas Pinto, MIT)npinto
 
3D context-aware mobile maps for tourism - ENTER2011 PhD Workshop
3D context-aware mobile maps for tourism - ENTER2011 PhD Workshop3D context-aware mobile maps for tourism - ENTER2011 PhD Workshop
3D context-aware mobile maps for tourism - ENTER2011 PhD WorkshopZornitza Yovcheva
 
Lightweight Concurrency
Lightweight ConcurrencyLightweight Concurrency
Lightweight ConcurrencyAndreas Heil
 
Intuitive dialogs powered by search (in 30 minutes)
Intuitive dialogs powered by search (in 30 minutes)Intuitive dialogs powered by search (in 30 minutes)
Intuitive dialogs powered by search (in 30 minutes)Bjørn Solnørdal Tennøe
 
A Textural Approach to Palmprint Identification
A Textural Approach to Palmprint IdentificationA Textural Approach to Palmprint Identification
A Textural Approach to Palmprint IdentificationIJASCSE
 
Appearance based static hand gesture alphabet recognition
Appearance based static hand gesture alphabet recognitionAppearance based static hand gesture alphabet recognition
Appearance based static hand gesture alphabet recognitionIAEME Publication
 
Global Futures Forum (Washington, D.C.)
Global Futures Forum (Washington, D.C.)Global Futures Forum (Washington, D.C.)
Global Futures Forum (Washington, D.C.)Michell Zappa
 
Virtual Reality Training for Upper Limb Prosthesis Patients
Virtual Reality Training for Upper Limb Prosthesis PatientsVirtual Reality Training for Upper Limb Prosthesis Patients
Virtual Reality Training for Upper Limb Prosthesis PatientsAnnette Mossel
 
Recognition of Silverleaf Whitefly and Western Flower Thrips Via Image Proces...
Recognition of Silverleaf Whitefly and Western Flower Thrips Via Image Proces...Recognition of Silverleaf Whitefly and Western Flower Thrips Via Image Proces...
Recognition of Silverleaf Whitefly and Western Flower Thrips Via Image Proces...IRJET Journal
 
Istance Designing Gaze Gestures For Gaming An Investigation Of Performance
Istance Designing Gaze Gestures For Gaming An Investigation Of PerformanceIstance Designing Gaze Gestures For Gaming An Investigation Of Performance
Istance Designing Gaze Gestures For Gaming An Investigation Of PerformanceKalle
 
Van der kamp.2011.gaze and voice controlled drawing
Van der kamp.2011.gaze and voice controlled drawingVan der kamp.2011.gaze and voice controlled drawing
Van der kamp.2011.gaze and voice controlled drawingmrgazer
 

Tendances (20)

Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D Faces
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D FacesDepth-Image-based Facial Analysis between Age Groups and Recognition of 3D Faces
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D Faces
 
426 Lecture 9: Research Directions in AR
426 Lecture 9: Research Directions in AR426 Lecture 9: Research Directions in AR
426 Lecture 9: Research Directions in AR
 
Dh24703708
Dh24703708Dh24703708
Dh24703708
 
MIT 6.870 - Template Matching and Histograms (Nicolas Pinto, MIT)
MIT 6.870 - Template Matching and Histograms (Nicolas Pinto, MIT)MIT 6.870 - Template Matching and Histograms (Nicolas Pinto, MIT)
MIT 6.870 - Template Matching and Histograms (Nicolas Pinto, MIT)
 
3D context-aware mobile maps for tourism - ENTER2011 PhD Workshop
3D context-aware mobile maps for tourism - ENTER2011 PhD Workshop3D context-aware mobile maps for tourism - ENTER2011 PhD Workshop
3D context-aware mobile maps for tourism - ENTER2011 PhD Workshop
 
Lightweight Concurrency
Lightweight ConcurrencyLightweight Concurrency
Lightweight Concurrency
 
42 128-1-pb
42 128-1-pb42 128-1-pb
42 128-1-pb
 
Intuitive dialogs powered by search (in 30 minutes)
Intuitive dialogs powered by search (in 30 minutes)Intuitive dialogs powered by search (in 30 minutes)
Intuitive dialogs powered by search (in 30 minutes)
 
A Textural Approach to Palmprint Identification
A Textural Approach to Palmprint IdentificationA Textural Approach to Palmprint Identification
A Textural Approach to Palmprint Identification
 
Augmented reality
Augmented realityAugmented reality
Augmented reality
 
Survey 1 (project overview)
Survey 1 (project overview)Survey 1 (project overview)
Survey 1 (project overview)
 
Appearance based static hand gesture alphabet recognition
Appearance based static hand gesture alphabet recognitionAppearance based static hand gesture alphabet recognition
Appearance based static hand gesture alphabet recognition
 
Global Futures Forum (Washington, D.C.)
Global Futures Forum (Washington, D.C.)Global Futures Forum (Washington, D.C.)
Global Futures Forum (Washington, D.C.)
 
Virtual Reality Training for Upper Limb Prosthesis Patients
Virtual Reality Training for Upper Limb Prosthesis PatientsVirtual Reality Training for Upper Limb Prosthesis Patients
Virtual Reality Training for Upper Limb Prosthesis Patients
 
Hl2413221328
Hl2413221328Hl2413221328
Hl2413221328
 
Tridelity
TridelityTridelity
Tridelity
 
Recognition of Silverleaf Whitefly and Western Flower Thrips Via Image Proces...
Recognition of Silverleaf Whitefly and Western Flower Thrips Via Image Proces...Recognition of Silverleaf Whitefly and Western Flower Thrips Via Image Proces...
Recognition of Silverleaf Whitefly and Western Flower Thrips Via Image Proces...
 
Istance Designing Gaze Gestures For Gaming An Investigation Of Performance
Istance Designing Gaze Gestures For Gaming An Investigation Of PerformanceIstance Designing Gaze Gestures For Gaming An Investigation Of Performance
Istance Designing Gaze Gestures For Gaming An Investigation Of Performance
 
Van der kamp.2011.gaze and voice controlled drawing
Van der kamp.2011.gaze and voice controlled drawingVan der kamp.2011.gaze and voice controlled drawing
Van der kamp.2011.gaze and voice controlled drawing
 
Slurp
SlurpSlurp
Slurp
 

En vedette

BARRIERS SURROUNDING KNOWLEDGE TRANSFER IN NON-COLLOCATED SOFTWARE ARCHITECTU...
BARRIERS SURROUNDING KNOWLEDGE TRANSFER IN NON-COLLOCATED SOFTWARE ARCHITECTU...BARRIERS SURROUNDING KNOWLEDGE TRANSFER IN NON-COLLOCATED SOFTWARE ARCHITECTU...
BARRIERS SURROUNDING KNOWLEDGE TRANSFER IN NON-COLLOCATED SOFTWARE ARCHITECTU...IJASCSE
 
Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...
Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...
Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...IJASCSE
 
Inter Time Series Sales Forecasting
Inter Time Series Sales ForecastingInter Time Series Sales Forecasting
Inter Time Series Sales ForecastingIJASCSE
 
Independent Component Analysis for Filtering Airwaves in Seabed Logging Appli...
Independent Component Analysis for Filtering Airwaves in Seabed Logging Appli...Independent Component Analysis for Filtering Airwaves in Seabed Logging Appli...
Independent Component Analysis for Filtering Airwaves in Seabed Logging Appli...IJASCSE
 

En vedette (9)

Sql
SqlSql
Sql
 
BARRIERS SURROUNDING KNOWLEDGE TRANSFER IN NON-COLLOCATED SOFTWARE ARCHITECTU...
BARRIERS SURROUNDING KNOWLEDGE TRANSFER IN NON-COLLOCATED SOFTWARE ARCHITECTU...BARRIERS SURROUNDING KNOWLEDGE TRANSFER IN NON-COLLOCATED SOFTWARE ARCHITECTU...
BARRIERS SURROUNDING KNOWLEDGE TRANSFER IN NON-COLLOCATED SOFTWARE ARCHITECTU...
 
Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...
Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...
Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...
 
Teu amor
Teu amor Teu amor
Teu amor
 
Inter Time Series Sales Forecasting
Inter Time Series Sales ForecastingInter Time Series Sales Forecasting
Inter Time Series Sales Forecasting
 
Aleluia
Aleluia   Aleluia
Aleluia
 
Discipular
DiscipularDiscipular
Discipular
 
Independent Component Analysis for Filtering Airwaves in Seabed Logging Appli...
Independent Component Analysis for Filtering Airwaves in Seabed Logging Appli...Independent Component Analysis for Filtering Airwaves in Seabed Logging Appli...
Independent Component Analysis for Filtering Airwaves in Seabed Logging Appli...
 
Rei salvador
Rei salvador Rei salvador
Rei salvador
 

Similaire à A NOVAL ARTECHTURE FOR 3D MODEL IN VIRTUAL COMMUNITIES FROM FACE DETECTION

Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...ijbuiiir1
 
An overview of face liveness detection
An overview of face liveness detectionAn overview of face liveness detection
An overview of face liveness detectionijitjournal
 
Face Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image ProcessingFace Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image Processingpaperpublications3
 
Face Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image ProcessingFace Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image Processingpaperpublications3
 
76 s201920
76 s20192076 s201920
76 s201920IJRAT
 
AI Therapist – Emotion Detection using Facial Detection and Recognition and S...
AI Therapist – Emotion Detection using Facial Detection and Recognition and S...AI Therapist – Emotion Detection using Facial Detection and Recognition and S...
AI Therapist – Emotion Detection using Facial Detection and Recognition and S...ijtsrd
 
Fake Multi Biometric Detection using Image Quality Assessment
Fake Multi Biometric Detection using Image Quality AssessmentFake Multi Biometric Detection using Image Quality Assessment
Fake Multi Biometric Detection using Image Quality Assessmentijsrd.com
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...ijceronline
 
Lecture 1, 2 - An Introduction ot Computer Vision
Lecture 1, 2 - An Introduction ot Computer VisionLecture 1, 2 - An Introduction ot Computer Vision
Lecture 1, 2 - An Introduction ot Computer VisionAksam Iftikhar
 
Review by g siminon latest 2011
Review by g siminon latest 2011Review by g siminon latest 2011
Review by g siminon latest 2011ujjwal9191
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVIRJET Journal
 
Face recognition system
Face recognition systemFace recognition system
Face recognition systemYogesh Lamture
 
Gesture Recognition Technology
Gesture Recognition TechnologyGesture Recognition Technology
Gesture Recognition TechnologyNikith Kumar Reddy
 

Similaire à A NOVAL ARTECHTURE FOR 3D MODEL IN VIRTUAL COMMUNITIES FROM FACE DETECTION (20)

Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
 
An overview of face liveness detection
An overview of face liveness detectionAn overview of face liveness detection
An overview of face liveness detection
 
Face Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image ProcessingFace Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image Processing
 
Face Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image ProcessingFace Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image Processing
 
76 s201920
76 s20192076 s201920
76 s201920
 
AI Therapist – Emotion Detection using Facial Detection and Recognition and S...
AI Therapist – Emotion Detection using Facial Detection and Recognition and S...AI Therapist – Emotion Detection using Facial Detection and Recognition and S...
AI Therapist – Emotion Detection using Facial Detection and Recognition and S...
 
Paper of Final Year Project.pdf
Paper of Final Year Project.pdfPaper of Final Year Project.pdf
Paper of Final Year Project.pdf
 
AUGMENTED REALITY
AUGMENTED REALITYAUGMENTED REALITY
AUGMENTED REALITY
 
Fake Multi Biometric Detection using Image Quality Assessment
Fake Multi Biometric Detection using Image Quality AssessmentFake Multi Biometric Detection using Image Quality Assessment
Fake Multi Biometric Detection using Image Quality Assessment
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
 
Lecture 1, 2 - An Introduction ot Computer Vision
Lecture 1, 2 - An Introduction ot Computer VisionLecture 1, 2 - An Introduction ot Computer Vision
Lecture 1, 2 - An Introduction ot Computer Vision
 
Review by g siminon latest 2011
Review by g siminon latest 2011Review by g siminon latest 2011
Review by g siminon latest 2011
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCV
 
Real time facial expression analysis using pca
Real time facial expression analysis using pcaReal time facial expression analysis using pca
Real time facial expression analysis using pca
 
S01761131137
S01761131137S01761131137
S01761131137
 
Human Face Detection And Identification Of Facial Expressions Using MATLAB
Human Face Detection And Identification Of Facial Expressions Using MATLABHuman Face Detection And Identification Of Facial Expressions Using MATLAB
Human Face Detection And Identification Of Facial Expressions Using MATLAB
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
 
G041041047
G041041047G041041047
G041041047
 
Image recognition
Image recognitionImage recognition
Image recognition
 
Gesture Recognition Technology
Gesture Recognition TechnologyGesture Recognition Technology
Gesture Recognition Technology
 

Plus de IJASCSE

Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...
Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...
Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...IJASCSE
 
Improving Utilization of Infrastructure Cloud
Improving Utilization of Infrastructure CloudImproving Utilization of Infrastructure Cloud
Improving Utilization of Infrastructure CloudIJASCSE
 
Four Side Distance: A New Fourier Shape Signature
Four Side Distance: A New Fourier Shape SignatureFour Side Distance: A New Fourier Shape Signature
Four Side Distance: A New Fourier Shape SignatureIJASCSE
 
Theoretical study of axially compressed Cold Formed Steel Sections
Theoretical study of axially compressed Cold Formed Steel SectionsTheoretical study of axially compressed Cold Formed Steel Sections
Theoretical study of axially compressed Cold Formed Steel SectionsIJASCSE
 
Improved Performance of Unsupervised Method by Renovated K-Means
Improved Performance of Unsupervised Method by Renovated K-MeansImproved Performance of Unsupervised Method by Renovated K-Means
Improved Performance of Unsupervised Method by Renovated K-MeansIJASCSE
 
A Study on the Effectiveness of Computer Games in Teaching and Learning
A Study on the Effectiveness of Computer Games in Teaching and LearningA Study on the Effectiveness of Computer Games in Teaching and Learning
A Study on the Effectiveness of Computer Games in Teaching and LearningIJASCSE
 
Design Equation for CFRP strengthened Cold Formed Steel Channel Column Sections
Design Equation for CFRP strengthened Cold Formed Steel Channel Column SectionsDesign Equation for CFRP strengthened Cold Formed Steel Channel Column Sections
Design Equation for CFRP strengthened Cold Formed Steel Channel Column SectionsIJASCSE
 
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...IJASCSE
 
A Study on Thermal behavior of Nano film as thermal interface layer
A Study on Thermal behavior of Nano film as thermal interface layerA Study on Thermal behavior of Nano film as thermal interface layer
A Study on Thermal behavior of Nano film as thermal interface layerIJASCSE
 
Performance analysis of a model predictive unified power flow controller (MPU...
Performance analysis of a model predictive unified power flow controller (MPU...Performance analysis of a model predictive unified power flow controller (MPU...
Performance analysis of a model predictive unified power flow controller (MPU...IJASCSE
 
Synthesis and structural properties of Mg (OH)2 on RF sputtered Mg thin films...
Synthesis and structural properties of Mg (OH)2 on RF sputtered Mg thin films...Synthesis and structural properties of Mg (OH)2 on RF sputtered Mg thin films...
Synthesis and structural properties of Mg (OH)2 on RF sputtered Mg thin films...IJASCSE
 
Evaluation of Exception Handling Metrics
Evaluation of Exception Handling MetricsEvaluation of Exception Handling Metrics
Evaluation of Exception Handling MetricsIJASCSE
 
Investigation of Integrated Rectangular SIW Filter and Rectangular Microstrip...
Investigation of Integrated Rectangular SIW Filter and Rectangular Microstrip...Investigation of Integrated Rectangular SIW Filter and Rectangular Microstrip...
Investigation of Integrated Rectangular SIW Filter and Rectangular Microstrip...IJASCSE
 
An effect of synthesis parameters on structural properties of AlN thin films ...
An effect of synthesis parameters on structural properties of AlN thin films ...An effect of synthesis parameters on structural properties of AlN thin films ...
An effect of synthesis parameters on structural properties of AlN thin films ...IJASCSE
 
Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor Network
Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor NetworkCluster-based Target Tracking and Recovery Algorithm in Wireless Sensor Network
Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor NetworkIJASCSE
 
Analysis and Design of Lead Salt PbSe/PbSrSe Single Quantum Well In the Infra...
Analysis and Design of Lead Salt PbSe/PbSrSe Single Quantum Well In the Infra...Analysis and Design of Lead Salt PbSe/PbSrSe Single Quantum Well In the Infra...
Analysis and Design of Lead Salt PbSe/PbSrSe Single Quantum Well In the Infra...IJASCSE
 
Portfolio Analysis in US stock market using Markowitz model
Portfolio Analysis in US stock market using Markowitz modelPortfolio Analysis in US stock market using Markowitz model
Portfolio Analysis in US stock market using Markowitz modelIJASCSE
 
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...IJASCSE
 
Study on momentum density in magnetic semiconductor MnTe by positron annihila...
Study on momentum density in magnetic semiconductor MnTe by positron annihila...Study on momentum density in magnetic semiconductor MnTe by positron annihila...
Study on momentum density in magnetic semiconductor MnTe by positron annihila...IJASCSE
 
Optimal State Assignment to Spare Cell inputs for Leakage Recovery
Optimal State Assignment to Spare Cell inputs for Leakage RecoveryOptimal State Assignment to Spare Cell inputs for Leakage Recovery
Optimal State Assignment to Spare Cell inputs for Leakage RecoveryIJASCSE
 

Plus de IJASCSE (20)

Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...
Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...
Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...
 
Improving Utilization of Infrastructure Cloud
Improving Utilization of Infrastructure CloudImproving Utilization of Infrastructure Cloud
Improving Utilization of Infrastructure Cloud
 
Four Side Distance: A New Fourier Shape Signature
Four Side Distance: A New Fourier Shape SignatureFour Side Distance: A New Fourier Shape Signature
Four Side Distance: A New Fourier Shape Signature
 
Theoretical study of axially compressed Cold Formed Steel Sections
Theoretical study of axially compressed Cold Formed Steel SectionsTheoretical study of axially compressed Cold Formed Steel Sections
Theoretical study of axially compressed Cold Formed Steel Sections
 
Improved Performance of Unsupervised Method by Renovated K-Means
Improved Performance of Unsupervised Method by Renovated K-MeansImproved Performance of Unsupervised Method by Renovated K-Means
Improved Performance of Unsupervised Method by Renovated K-Means
 
A Study on the Effectiveness of Computer Games in Teaching and Learning
A Study on the Effectiveness of Computer Games in Teaching and LearningA Study on the Effectiveness of Computer Games in Teaching and Learning
A Study on the Effectiveness of Computer Games in Teaching and Learning
 
Design Equation for CFRP strengthened Cold Formed Steel Channel Column Sections
Design Equation for CFRP strengthened Cold Formed Steel Channel Column SectionsDesign Equation for CFRP strengthened Cold Formed Steel Channel Column Sections
Design Equation for CFRP strengthened Cold Formed Steel Channel Column Sections
 
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
 
A Study on Thermal behavior of Nano film as thermal interface layer
A Study on Thermal behavior of Nano film as thermal interface layerA Study on Thermal behavior of Nano film as thermal interface layer
A Study on Thermal behavior of Nano film as thermal interface layer
 
Performance analysis of a model predictive unified power flow controller (MPU...
Performance analysis of a model predictive unified power flow controller (MPU...Performance analysis of a model predictive unified power flow controller (MPU...
Performance analysis of a model predictive unified power flow controller (MPU...
 
Synthesis and structural properties of Mg (OH)2 on RF sputtered Mg thin films...
Synthesis and structural properties of Mg (OH)2 on RF sputtered Mg thin films...Synthesis and structural properties of Mg (OH)2 on RF sputtered Mg thin films...
Synthesis and structural properties of Mg (OH)2 on RF sputtered Mg thin films...
 
Evaluation of Exception Handling Metrics
Evaluation of Exception Handling MetricsEvaluation of Exception Handling Metrics
Evaluation of Exception Handling Metrics
 
Investigation of Integrated Rectangular SIW Filter and Rectangular Microstrip...
Investigation of Integrated Rectangular SIW Filter and Rectangular Microstrip...Investigation of Integrated Rectangular SIW Filter and Rectangular Microstrip...
Investigation of Integrated Rectangular SIW Filter and Rectangular Microstrip...
 
An effect of synthesis parameters on structural properties of AlN thin films ...
An effect of synthesis parameters on structural properties of AlN thin films ...An effect of synthesis parameters on structural properties of AlN thin films ...
An effect of synthesis parameters on structural properties of AlN thin films ...
 
Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor Network
Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor NetworkCluster-based Target Tracking and Recovery Algorithm in Wireless Sensor Network
Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor Network
 
Analysis and Design of Lead Salt PbSe/PbSrSe Single Quantum Well In the Infra...
Analysis and Design of Lead Salt PbSe/PbSrSe Single Quantum Well In the Infra...Analysis and Design of Lead Salt PbSe/PbSrSe Single Quantum Well In the Infra...
Analysis and Design of Lead Salt PbSe/PbSrSe Single Quantum Well In the Infra...
 
Portfolio Analysis in US stock market using Markowitz model
Portfolio Analysis in US stock market using Markowitz modelPortfolio Analysis in US stock market using Markowitz model
Portfolio Analysis in US stock market using Markowitz model
 
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
 
Study on momentum density in magnetic semiconductor MnTe by positron annihila...
Study on momentum density in magnetic semiconductor MnTe by positron annihila...Study on momentum density in magnetic semiconductor MnTe by positron annihila...
Study on momentum density in magnetic semiconductor MnTe by positron annihila...
 
Optimal State Assignment to Spare Cell inputs for Leakage Recovery
Optimal State Assignment to Spare Cell inputs for Leakage RecoveryOptimal State Assignment to Spare Cell inputs for Leakage Recovery
Optimal State Assignment to Spare Cell inputs for Leakage Recovery
 

Dernier

Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesVijayaLaxmi84
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Developmentchesterberbo7
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseCeline George
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
CHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptxCHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptxAneriPatwari
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxAnupam32727
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfChristalin Nelson
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 

Dernier (20)

Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their uses
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Development
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
CHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptxCHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptx
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdf
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 

A NOVAL ARTECHTURE FOR 3D MODEL IN VIRTUAL COMMUNITIES FROM FACE DETECTION

  • 1. IJASCSE, Vol 1, Issue 2, 2012 Sept. 30 A NOVAL ARTECHTURE FOR 3D MODEL IN VIRTUAL COMMUNITIES FROM FACE DETECTION Vibekananda Dutta Dr. Nishtha Kesswani Deepti Gahalot Central University of Rajasthan Central University of Rajasthan Govt.Engineering College Kishangarh, India Kishangarh, India Ajmer, India ABSTRACT: embodiment in cyberspace [1]. Virtual worlds are also extremely attractive for the Towards next generation, Criminal activity run-of the-mill criminals interested in in virtual worlds is becoming a major conducting identity theft, fraud, tax evasion, illegal gambling and other problem for law enforcement agencies. traditional crimes. In the virtual world Virtual communities such as Second Life increasingly populated by non-biological will be quickly becoming the next frontier characters there are just no existing of cybercrime. Even now a day’s Forensic techniques for identity verification of investigators are becoming interested in intelligent entities other then self- being able to accurately and automatically identification. Artimetrics, which is defined as the track people in virtual communities. science of recognition, detection and Mostly in the multimedia context, an verification of intelligent software agents avatar is the visual representation of the and industrial robots and other non- self in a virtual world. In this research biological entities aims to address this paper we suggest how to extract a face problem. This future oriented sub-field of from an image, modify it, characterize it in security has broad applications in this terms of high-level properties, and apply it virtual world [2]. Artificially Intelligent programs are quickly becoming a part of to the creation of a personalized avatar. In our daily life. In this paper we suggest this research work we tested, we utilization of face detection systems and implemented the algorithm on several development of novel face recognition hundred facial images, including many algorithms for face-based avatar creation. taken under uncontrolled acquisition conditions, and found to exhibit 2. FACE RECOGNITION satisfactory performance for immediate practical use. 2.1 HUMAN FACE RECOGNITION PROCESS GENERAL TERMS: Avatar, Virtual world, Human faces have similarities and Human face, Matching, Images, Criminal differences. They have a consistent Activity. structure and location of facial KEYWORDS: Virtual world; avatar; face components (i.e. the relationship among recognition algorithm; local image eyes, nose, etc.). In human face features; Artimetrics; Dataset. recognition where we have four stages [5]: 1. INTRODUCTION: a) Acquiring a sample: In a complete, full implemented biometric system, a sensor takes an observation. The term avatar, which refers to The sensor might be a camera and the the temporary body a god inhabits while observation is a snapshot picture. In our visiting earth. In virtual communities, it system, a sensor will be ignored, and a 2D now describes the user’s visual 1|Page
  • 2. IJASCSE, Vol 1, Issue 2, 2012 Sept. 30 case, the intervention of a human operator will be required in order to select the best or 3D face picture “observation” will fit from the candidate list. An illustrative supplied manually. analogy is that of a walk-through metal detector, where if a person causes the 7 b) Extracting Features: For this step, the detector to beep, a human operator steps relevant data is extracted from the in and checks the person manually or with predefined captured sample. This is can a hand-held detector. be done by the use of software where many algorithms are available. The 2.2 HUMAN FACE RECOGNITION outcome of this step is a biometric TECHNIQUES template which is a reduced set of data that represents the unique features of the All available face recognition enrolled user's face. techniques can be classified into four c) Comparison Templates: This categories based on the way they depends on the application at hand. For represent face [7]; identification purposes, this step will be a 1. Appearance based which uses holistic comparison between a given picture for texture features. the subject and all the biometric templates 2. Model based which employ shape and stored on a database. For verification, the texture of the face, along with 3D depth biometric template of the claimed identity information. will be retrieved (either from a database or 3. Template based face recognition. a storage medium presented by the 4. Techniques using Neural Networks. subject) and this will be compared to a given picture. d) Declaring a Match: The face recognition system will return a candidate match list of potential matches. In this Figure 1: Classification of Face Recognition Methods 3.AVATAR GENERATION FROM strong discrimination between identities FACE RECOGNITION SYSTEM (see Fig. 2). Avatar and human faces have similarities and differences. Both have a consistent structure and location of facial components (i.e. the relationship among eyes, nose, etc.). These similarities gives idea of an avatar face recognition framework designed in the same manner as human Face Recognition systems. Avatar faces span a wider range of colors than human faces, and the colors provide 2|Page
  • 3. IJASCSE, Vol 1, Issue 2, 2012 Sept. 30 feature based extraction packaged with OpenGL & MatLab [8]. B. Face Representation In order to match two faces in Avatar face recognition, we represent the face in a metric space by first computing a set of local feature descriptors across the face region. Two separate feature descriptors are used to describe (i) the structure of the face, and (ii) the appearance properties of the face. For computing the local descriptors, the Figure2: Examples of the different normalized face image is divided into an subjects in the Second Life avatar ordered set of N overlapping square dataset. Each image corresponds to patches Pi, i = 1.... N, each of size Sp x Sp one of the different pose sets. In our ,Sp = 32. For each patch Pi two feature matching experiments, the frontal vectors are extracted: one describing the image from group A was used as the appearance (Ai € Rda), and the other gallery image. The remaining sets were describing the structure (Ai € Rds) [9, 10], all used as probe images Computing features across a set of overlapping patches allows for salient We propose an algorithm for avatar descriptions at specific locations of the generation from face recognition that face that is robust to variations in follows the same procedures as standard geometric normalization. face recognition systems [6], consisting of three stages: C. Matching 1. Face detection and image normalization 2. Face representation For a given avatar face, we have 3. Matching and two sets of vectors Si and Ai, i = 1..... N, In the last step which we proposed an where N is the number of face is patches. Avatar generation system which produced To determine an avatar's identity, we first Avatar faces of that detected faces. concatenate the set of local (patch) descriptors into a single feature vector of length Nds and Nda, respectively for Si A. Face Detection and Image and Sa. The concatenated feature vectors Normalization are represented as Sj and Aj for the j-th In a virtual world, real-time face detection avatar subject. The distance between two will detect the presence of an avatar faces corresponding to images mp and mj subject with a frontal to near-frontal face in computed using cosine correlation the field of view [9]. Similar to traditional similarity measure given by [11]: face recognition, once an avatar face is detected it must be pre- m tp m j cos  m p , m j   processed by performing both geometric and color normalization in order to reduce (1) mp mj variations caused by external parameters such as camera location and illumination. Similarity between two labelled graphs is We found a method to work with similar the average of this vector similarity over effectiveness on avatar faces. We corresponding nodes of the facial graph. explored the use of (i) a Morphable feature This is essentially a measure of the filter based extraction for trained on avatar response amplitude at corresponding faces, and (ii) the default Morphable 3|Page
  • 4. IJASCSE, Vol 1, Issue 2, 2012 Sept. 30 spatial frequency, orientation, and position on the grid. 4. EXPERIMENT AND D. An Avatar Generation System DISCUSSION An avatar creation system which we consider to be desirable is the ability to a) Data embody some intelligence about the face being processed. An automatic semantic For the purpose of 3D-model of analysis of the face into facial categories facial generation, various type of empowers the system to generate virtual world and 3D-model creation intelligent suggestions of avatar body type softwer were consider based on the [3]. An important design feature of the use of this research work, Avatar Creation system is rapidity of uses. including[12]. In a few seconds a user’s picture is 1. Ability to view the 3D- filtered, the region containing the face is model facial from different extracted from the image and registered angles. with an adaptable grid, facial attributes are 2. Selecting the constructing classified and semantic labels attached to facial feature in generation the face and finally the system suggests new ages faces. an interesting looking avatar body to the 3. Mutable attributes to 3D user. facial features. b) Result The images of 100 persons with Image capture different angles makes the number of images near about 800-900 Input image images, where we grouped those images in to 3 datasets each of which near about 300 images using Morphable model based template matching technique for face recognition. Where we first detect the images then from that detected images we generate the 3D-model of facial character. Table: Performance comparison of different dataset with avatar generation system Converted to converted to Set Number 3D Avatar Reshaping Images Image Manipulation using of Morphable Generation Greyscale Binary image template matching for recognition Images Template from that Matching detected Technique faces using GIF animator software Avatar Creation of that detected face Using Avatar generation system A 300 80.8% 84% B 270 89.2% 91% Figure 2: Functional modules of the C 281 72.9% 81% Avatar generation system 4|Page
  • 5. IJASCSE, Vol 1, Issue 2, 2012 Sept. 30 worlds populated by both human and artificial entities [15]. Using Morphable model based face recognition [14], a Rank-1 accuracy of 97.58% was achieved. Testing the 6. ACKNOWLWDGEMENT prototype avatar system proposed on this dataset was not warranted because: (i) A We would like to express our appreciation to Morphable based face matcher already “CENTRAL UNIVERSITY OF RAJASTHAN” achieves a very high accuracy, and (ii) the for the anonymous referees of the original proposed system is designed to match datasets for the constructive comments they images to avatars using less realistic made. We would further like to express our pleasure to Mr. KRISHNA KUMAR SHARMA renderings, such as those in Second Life. for giving us such opportunity to work with him These results are reported because it is in this area. useful to know that current face recognition technology appears to be sufficiently accurate in the 3D model architecture, when the 3D-model is REFERENCES rendered using advanced software programming such as openGL. [1] B. Damer. Avatars! Exploring and Building Virtual Worlds on the Internet. Peachpit Press, 310 Berkeley, 1997. 3D 300 Morphable Template [2] O'Harrow, R., Spies' Battleground 290 Turns Virtual, in The Washington Post. Matching 280 Technique February 6, 2008: Available at: http://www.washingtonpost.com/wpdyn/ 270 Number of content/article/2008/02/05/AR2008020503 Images 260 144.html. 250 [3] Yampolskiy, R. V. and V. Govindaraju 1 2 3 (2008). Behavioral Biometrics for Verification and Recognition of Malicious Figure 3: Graphical representation Software Agents. Sensors, and of comparison in different dataset Command, Control, Communications, and Intelligence (C3I) Technologies for 5 CONCLUSIONS Homeland Security and Homeland Defense VII. Orlando, Florida. This Research paper addressed the problem of generating the 3D-model faces [4] S.Inoue, M. Ishiwaka, S. Tanaka. & J. from face recognition system. We have Park. An image Expression Room. IEEE reported results of experiments aimed Proceedings of towards the Potential directions for future the International Conference on Virtual research include the investigation of other Systems and Multimedia VSMM 97 p.181, visual and behavioural approaches to 1997. virtual world security based on appearance of new characteristics and abilities in the 3D-model. As virtual reality [5] Statistics in Face Recognition: technology progresses day by day and Analyzing Probability Distributions of PCA, criminal activity become the major ICA and LDA Performance Results problem, so it will require new security Kresimir Delac 1, Mislav Grgic 2 and solutions for identity management across Sonja Grgic 2 1 Croatian Telecom, Savska 32, Zagreb, Croatia, e-mail: 5|Page
  • 6. IJASCSE, Vol 1, Issue 2, 2012 Sept. 30 kdelac@ieee.org 2 University of Zagreb, FER, Unska 3/XII, Zagreb, Croatia [6] Lyons, M., et al., Avatar Creation using Automatic Face Recognition, in ACM Multimedia 98. Sept. 1998: Bristol, England. p. 427-434. [7] Evaluation of Face Recognition Techniques for Application to Facebook, Brian C. Becker Carnegie Mellon Univ 5000 Forbes Av Pittsburgh, PA 152 briancbecker@cmu. [8] Open source graphical library and math works library. [9] Viola, P. and M.J. Jones, Robust real-time face detection. Int. Journal of Computer Vision, 2004. 57: p. 137-154. [10] Ahonen, T., A. Hadid, and M. Pietikainen, Face description with local binary patterns: Application to face recognition. IEEE Trans. Pattern Analysis and Machine Intelligence, 2006. 28: p. 2037- 2041 [11] Ojala, T., M. Pietikainen, and T. Maenpaa, Multiresolution grayscale and rotation invariant texture classification with local binary patterns. IEEE Trans. Pattern Analysis & Machine Intelligence, 2002. 24: p. 971-987. [12] Oursler, J.N., M. Price, and R.V. Yampolskiy, Parameterized Generation of Avatar Face Dataset, in 14th InternationalConference on Computer Games: AI, Animation, Mobile, Interactive Multimedia, Educational & Serious Games. 2009: Louisville, KY. 6|Page