SlideShare une entreprise Scribd logo
1  sur  8
Comparative Analysis of Face Recognition
Methodologies and Techniques
Farwa Abdul Hannan, Zainab Khalid, Ammar Rafiq*
Department of Computer Sciences
NFC-Institute of Engineering and Fertilizers Research Faisalabad, Pakistan
*Corresponding Author: ammar.rafiq@iefr.edu.pk
Abstract — In the field of computer sciences such as
graphics and also analyzing the image and its processing,
face recognition is the most prominent problem due to the
comprehensive variation of faces and the complexity of
noises and image backgrounds. The purpose and working
of this system is that it identifies the face of a person from
the real time video and verifies the person from the images
store in the database. This paper provides a review of the
methodologies and techniques used for face detection and
recognition. Firstly a brief introduction of Facial
Recognition is given then the review of the face
recognition’s working which has been done until now, is
briefly introduced. Then the next sections covered the
approaches, methodologies, techniques and their
comparison. Holistic, Feature based and Hybrid
approaches are basically used for face recognition
methodologies. Eigen Faces, Fisher Faces and LBP
methodologies were introduced for recognition purpose.
Eigen Faces is most frequently used because of its
efficiencies. To observe the efficient techniques of facial
recognition, there are many scenarios to measure its
performance which are based on real time.
Index Terms—Face Recognition, Automated Teller Machine,
Principal Component Analysis, Fisher’s Discriminant Analysis,
Linear Discriminant Analysis, extended Local Binary Pattern
Histograms, 3 Dimension , 2 Dimension.
I. INTRODUCTION
Human beings can easily recognize the faces of person
from eyes without any fluctuation but computers can’t do so
easily. This was the interesting problem in computer domain.
To make the computers efficient in recognizing the faces, face
recognition system introduced. There are many areas in which
we can use this system for various purposes. For example to
check the record of those who are illegal criminals. Moreover,
this system also uses for security purpose. Like by fixing the
cameras in social or public areas. The benefit of using the
camera is that we can easily find the misplaced children’s from
the images captured by the camera. Is the same way there are
many examples in which the face recognition system used. So
our computers work more efficiently than humans as they are
more than intelligent.
Human can let the computers to do intelligent work like
recognizing the images, videos and pattern recognition. Face
recognition involves the pattern recognition technique which
means it gives the ability to people to make the integrated
power into the system to make it intelligent enough that they
can do non-trivial work easily. The task of face recognition is
to “identifying or verifying one or more person in the scene
from still images or video sequences using a stored database
of facial images”. Already stored images are unknown to the
system. When the system will recognize the face it will match
with the stored input images. The system will further accepts
or rejects the claimed identity of query face [1]. This will
works automatically.
In general, manual attendance is the tradition in institutes.
They marks the attendance on the paper by hand. This takes a
lot of time to keep the records of every person manually and
also complicated to manage and confirm everyone [2]. To end
up the manual system it was necessary to mark the attendance
automatically by recognizing the faces of person. For this
purpose automatic attendance management system introduced.
This system works in various areas like in institutes for
attendance, also as a security as well as in social uses.
The technology of face recognition based on computer
system is playing a great role in the field of research. The
working of automatic attendance by recognition of face is
efficient and quick task without any time consuming.
Attendance marks automatically after recognizing the face. It
detects the face, recognize it and match it from predefined
database. It saves a lot of time and also note the time of
attendance. The working is easily understandable [3].
II. LITERATURE REVIEW
Because of the increasing security threats in daily life, the
demand of something easier to work with, for the
identification or suspects and for security purposes, is also
increasing day by day. Hence Face Detection and Recognition
is becoming more important aspect of Computer Vision in the
application of security. Therefore OpenCV was introduced as
a solution to Computer Vision’s problem of better recognition
and increased security. OpenCV is a multi-platform
framework used for image processing and face detection &
Recognition purposes. Its functionality for face recognition is
in its several modules like Machine-learning interface,
CVCam contains information about video access on 32-bit
windows platform though DirectX, CXCore namespace
containing the persistence functions, basic data type
definitions, linear algebra and statistics methods, and the error
handlers, CVaux, HighGUI. Its implementation contains
VOL. 04: DECEMBER, 2016 ISSN 2222-1247
37
multiple techniques of Haar Cascade Classifier, PCA, LDA
and LBPH for face Detection and Recognition, that can be
used separately in any algorithm from Eigen Faces, Fisher
Faces and LBP [4].
In the discipline of computer sciences, recognition of face
is the essential research problematic. There are many reasons,
one of them is that the system has large number of uses and
applications. This involves the identification of bank cards, for
observation of security, criminal records, searching of mug
shots and investigation system. These applications are
important because they help in communicating and interacting
with others [5].
The performance of recognition of face based on matching
the patterns of faces individually. The patterns involves the
mouth, eyes and also nose [6]. There were various proposed
methods for solving the problems of face recognition but it was
not solvable easily and faced many problems and obstacles
related to face matching. This obstacle was the reason of not
matching the face accurately and in comparison of finger
printing, the face recognition’s performance is much bad.
The existing face recognition system is working best as
compared to previous ones, because of the images of faces
which is to be test and then recognized is taken in the same
environment in which the training images is taken. But if the
variation occurs in between both i.e. test images and training
images, then they are not good enough to be recognized [7].
The pattern of person’s face images is difficult to
recognize. Especially in that background where there is a
complexities. This is the foremost prominent problem in this
system of automatic recognition of face. After some passage of
time a new methodologies were introduced that is based on
identification and detection of faces in complicated background
[8].
The application of mug shots is used to identify the
criminal and illegal person. It shows the clear sketch of a
person. The sketch is the image that is captured when the
person/criminal arrested. The purpose of having the images
makes it easy for the law enforcement to collect the record of
criminals who are arrested [9]. Mug shot consists of two
segments i.e. one side views image taken and other is front
view. The image background should be simple so that it will
not create any noise in the images.
The demand and approach of video surveillance is growing
day by day. It needs to observe the people at different places by
fixing the camera so that it will be able to gain information
about the people and their activities. The camera take the
images from real time videos for security purposes. The
moving analysis help out us to solve the problems of
surveillance applications. They mentioned the different
techniques related to background modelling like 2D and 3D
methods of tracking human body. This modelling is used to
detect the position of body and its activities in video
classification [10].
Face recognition system is used in different areas for
security purposes because security is becoming essential in
public areas. The areas include airports for checking the
passengers at boarding time and airline staff. The checking is
done by recognition of faces. This technology is greatly
applied at airports [11].
For the recognition of faces the algorithm which is mostly
used is PCA (Principal component Analysis). As PCA has
many restrictions that involves a load of large calculations.
For this the method that is proposed is sub-band. PCA applied
on this specific method of wavelet sub-band. Usually PCA is
useful on the full facial images for the representation of
human faces but in the proposed methodology the
transformation of wavelet is used for the decomposition of
facial images into sub-bands of frequency. The frequency that
lies in the midrange is typically used for the representation of
PCA. By comparing this approach with Principal Component
Analysis that was used before, the proposed approach has
better results of recognition rate. Moreover it decreases the
load of calculation if the database size of images will be
greater with the training images [12].
Local Binary Pattern Histogram (LBPH) is the dominant
for the description of texture images. The mechanism of
LBPH is that it marks the image pixel by entering in the area
of 3*3 of every pixel along with the middle value since the
result will be in binary number so that the histogram of
marked images can be used as a description of texture images.
The histogram has the information related to the dissemination
of designs like edges and areas on the full facial image [13].
The reason of doing this comparison is that we’ve tried to
implement the mentioned methodologies and techniques in the
development of the Auto-Attendance System. This system
works on detection and recognition of person’s face. But after
the implementation we faced some problems in recognition
based on the light variation, dataset size variation, pose
variation and distance variation and also detection problems in
some methodologies. All the techniques and methodologies
are introduced and compared in the following sections.
III. FACE RECOGNITION METHODOLOGIES
Face Recognition methodologies consists of Eigen Faces
and Fisher Faces. These methodologies are based on some
approaches that are used for facial recognition and detection
also. These approaches are further classify into three kinds i.e.
holistic, feature based and hybrid approaches [14]. These are
Holistic Approach – this approach uses whole face region
and extract features and do recognition
Feature Based Approach – this approach do not take whole
face. It just extract the main features of face that is eyes, lips,
nose [15]
Hybrid Approach – This approach deals with the
combination of two approaches one is Holistic and other is
Feature based. In this method image is caught from a 3D
environment like a real time system. Then the detection of
VOL. 04: DECEMBER, 2016 ISSN 2222-1247
38
facial features, their location or position and numerical
representation is calculated. After that, calculated data is then
compared with the pre-stored data and then detection and
recognition operations are performed [11].
1) Eigen Faces
Eigen Faces is an algorithm that is used to for recognition
purpose. It uses PCA technique for recognition. To deal with
the problem of recognition of faces, a set is generated as Eigen
vectors and the name of Eigen faces is given. In this
methodology total sample images should not be 1 they should
be more than 5 in order to get more accuracy. Greater the
sample space more will be the accuracy. It generates Eigen
Faces or low dimensional images of the total number of M
training data set shown in Figure 2.
Fig. 1. Multivariable dataset
Eigen Faces are actually images of lower dimensions that
are made by transforming original images to Eigen Faces
shown in Figure 3.
Fig. 2. Transformation to Low Dimensional Images
The Eigen faces are generated in such a way that starting
ones are dominant and useful but later ones are just noise as
shown in Figure 3.
Fig. 3. Eigen Faces
2) Fisher Faces
In fisher faces the training set of images gives the
information to build the method for decreasing the
dimensionality of space between the facial features. The
method of fisher faces usually use the linear method of specific
classes [16] and also (FLD) for the decrease in dimensionality
and decrease in the feature space of simple classifiers [17].
Fisher Faces algorithm reflects the ratio between the
difference of one person and that of another person. The strong
key point of Fisher Faces in recognition of face problem is that
it uses the method which is linear for decreases in the
dimensionality of facial feature space.
3) LBP
In the LBP-based facial representation, the images of faces
are divided to abstract the histograms of LBP. They are divided
into the sub-regions equally which cannot overlap to each
other. After the extraction of histograms the sub-regions are
concatenated into the single eLBP feature of histogram. The
main criticism of this methodology is that it divides the face
into a grid. That is in sub-regions which are not associated with
features of face. It predicts that the resulting image of face of
sub-regions suffers from the original size and position and they
are not placed accurately back on to the calculated face in
comparison to the original one.
These mentioned methodologies use some techniques for
face detection and recognition. For Face Detection, Haar
Cascade Classifier is used in all the methodologies so it will
not be compared with any face detection mechanism. For Face
A Training Set Consisting of total M images
Transformation
(Eigen Faces)
VOL. 04: DECEMBER, 2016 ISSN 2222-1247
39
Recognition Eigen Faces uses PCA, Fisher Faces uses LDA
and LBP uses LBPH technique. The introduction of Face
detection technique is given in the next section.
IV. FACE DETECTION TECHNIQUE
1) Haar Cascade Classifier
Haar Cascade is also known as Viola Jones algorithm. It
works on four categories that includes Haar features, Integral
images, Adaboost and Cascading [18]. Detection of objects
that used Haar features based is actual method of object
detection which is proposed [19]. The method of machine
learning is described for graphically detection of object that is
able to process images quickly so that it gets high rates of
object detection. There are three contributions in which this
working is described. The 1st
contribution is the integral image
which tells us about the new image. It calculates the features
quickly which is being used by the detector. The 2nd
contribution is the algorithm of learning that is based on
AdaBoost. This is used to collect features in small number
from the large one. The classification result is very efficient.
The 3rd
one is to combine the classifier which is increasing, in a
cascade classifier.
Its flow chart in Figure 4 explains the working stages of
Haar Cascade algorithm. It first take an input of an image and
extract its haar features by calculating the pixel values and then
generating the Integral values of those calculated pixel values.
After this step it eliminate redundancy using Adaboost
techniques that is it eliminate those pixel values that are not
recognized as features and select best features only.
Mathematically
Then it classify all the pixels values/ integral values in
different cascades or groups on the basis of similarity in them.
After that it compares all these values with the predefined
feature’s values and then if it is detected as face it shows faces
is detected otherwise not [20].
Fig. 4, Flow Chart of Haar Cascade Classifier Algorithm for face detection
Haar Cascade is the only technique used for face detection
improved and approved by many scholars and researchers. It is
90 – 95% accurate.
V. FACE RECOGNITION TECHNIQUES
For comparison of Face Recognition techniques we’ve
selected OpenCV’s techniques for Face Recognition that are
PCA, LDA and LBP, introduced below.
1) Principal Component Analysis (PCA):
Principal Component Analysis (PCA) is used for Face
Recognition. This technique is based on statistical method
which transforms a set of observing the connected variables in
a set of values of not connected variables linearly. This is
known as Principal Components. Their sum is equal and less
than of the original values sum. The technique of PCA is most
widely used in all the computer analysis forms. Its example is
from neuroscience to graphics of computer. The reason is that
it is a simple method which is used to extract only the related
information from the data set [21]. PCA do the analysis on the
basis of multivariable dataset that is a set of images or a
training set consisting of total of M images show in Figure 2
and each image consist of N x N dimensions that is the total of
N2
dimensions.
PCA uses the data set that is transformed into the low
dimensional images of given data set shown in Figure 3
known as the Eigen Faces. These low dimensional images are
selected as K Eigen faces shown in Figure 4 and are generated
by extracting the mean or average matching face from the
selected K Eigen faces and K is ever equal and less than that
of original value images that is M. mathematically
K <= M
Fig. 5. Selected K Eigen Faces
Because of the noise in Eigen Faces, PCA selects only those
that are dominant that is K useful Eigen Faces and discarded
the noisy ones. Then it calculates the weights of the input face
and calculates the average matching face and do the
recognition using Eigen Faces algorithm. Mathematically
weights are like
Selected K Eigen Faces to represent the Training set
VOL. 04: DECEMBER, 2016 ISSN 2222-1247
40
And weights are actually the weightage value of average
matching features extracted by calculating the means shown in
Figure 6.
Fig. 6 Weightage calculation from Mean Image
2) Linear Discriminant Analysis (LDA):
LDA is a technique that is mostly used for the classification
of data and also decrease the dimensionality of faces. LDA is
also called as FLDA (Fisher’s Linear Discriminant Analysis).
It observes the original space vectors that is good in separation
of classes. Its working is almost similar to PCA except that it
has reduced set of calculations that is it doesn’t need to do the
calculation of features within the classes but among the
classes [22]
The technique of LDA is that it analyze the set of data
linearly form classes of them. It calculates the discriminant of
features from each face and form classes of them that is
features having greater discriminancy are placed in a separate
class which means unlike PCA, LDA has an ability to separate
data into various classes on the basis of their differences. To
identify that which data belongs to which class a discriminant
function is used that takes the values of x and y axis.
Mathematically that discriminant function is represented as
In this mathematical expression X contains the value of x and
y axis. Alpha is something called as Bias and W is the
weightage of the data extracted from that facial image
calculated by LDA. If its result is greater than 0, class will be
1 other will be 2, greater than 2 class will be 3, less than 2
class will be 4 and so on. Mathematically
The value of X and Y axis is calculated by finding the
variance and mean of data along x-axis and y-axis separately.
LDA, after creating classes separates their results linearly.
Graphically their separation can be shown as
Fig. 7 Graphical view of Discriminant Function [23]
In this graphical representation each color represents a class
separated linearly by a straight line.
LDA uses a dimensionality reduction method that is during
extraction of features it keeps those features that are unique
and best extracted and discarded the others that are not best
selected as a feature. Because of this Dimensionality reduction
technique of LDA, less memory is consumed and calculation
cost is reduced. It also classifies the data in different classes
according to the discriminancy in them.
3) Local Binary Patterns Histograms (LBPH):
Local Binary Pattern Histogram (LBPH) is the one that
involves the removal of the most valuable features from facial
images that are preprocessed to implement face recognition.
LBPH can do it by dividing an image into many small areas
from which the features are removed. Principal Component
Analysis (PCA) is the one that process dimensional reduction
procedure and process the face as a whole. Face recognition is
an important application whose results are very interesting as
well as complicated because the evaluation effects at the
recognition phase.
The LBPH is introduced to image texture for the analysis of
image quality. With its operator the image amount of the LBP
program is composed into the histogram that is used as
histogram intersection [24]. The LBP has recently been used
for description of face by adopting the histogram approach.
The spatially eLBPH which was the first LBP-based face
recognition methodology that divides the complete image of
face in the small sub images. It sort out the local LBPH from
every region for face recognition and finally gathered the
histograms of local small sub- images with the histogram of
global face images.
In LBPH a textured image of the face shown in Figure 8 is
saved and then a histogram is generated against it. For
recognition the histogram values of that textured face is
compared and recognition occurred accordingly.
VOL. 04: DECEMBER, 2016 ISSN 2222-1247
41
Fig. 8. Textured Image of face
The comparison and introduction of these techniques is
discussed in next section.
VI. COMPARATIVE ANALYSIS OF FACE RECOGNITION
TECHNIQUES
1) PCA VS LDA
The major variance in between LDA and PCA is that LDA
classifies the training data into multiple classes on the basis of
their discriminancy and then it calculates the minimum
variance within the class scatter and maximum variance
between the class scatter so that the recognition can be done
efficiently.
But as PCA requires more training images’ samples for
recognition as compared to the LDA (requires only one
sample image of face as more sample images of one face
effects the recognition rate and confliction occurs in
recognition) then recognition is much accurate as compared to
LDA but in greater or lesser light variance (variation of light
on the face stored in training dataset and on the face being
recognized) both PCA and LDA doesn’t work better, their
accuracy rate effects negatively though PCA’s recognition rate
in case of normal light is much better than LDA because of the
increased sample space available for PCA as compared to
LDA.
As PCA requires larger number of sample images as
compared to LDA so the Eigen faces that were created first
will be accurate, dominant and visible but later ones will be
considered as noise by the PCA because the features of them
will not be visible accurately. Hence in case of greater
database/training set size LDA will perform better than PCA
but in smaller DB/training set size both will work accurately
or efficiently.
Because of the larger training images size of PCA, faces
will be stored in variant poses so recognition rate will be
better than LDA.
Both of the LDA and PCA will work good if the distance of
the face to be recognized and the face already stored in
training set from the camera is not greater otherwise
recognition rate will effect negatively.
2) PCA VS LBPH
The comparison of PCA and LBPH is that for face
recognition LBPH removes the valuable features from images
and separate the images into small parts while PCA is used to
extract only the related information from the data set.
The best algorithm for recognition of face images with
factors of varying illumination, variance of poses, distance and
dataset size variance is PCA (Principal Component Analysis)
because this technique is higher towards many of the
numerical techniques. Using numerical techniques recognized
face is calculated. Whereas LBP features is simpler because in
face recognition system it is enough to differentiate known
and unknown faces quickly but LBP are constant and affected
by light changes greatly.
PCA doesn’t works well in case of greater or lesser light
variation but it works well than LBPH if the light variation is
normal so that the recognition rate will be accurate. LBPH is
not best in this particular scenario because if light luminance
is greater, then the features in the textured image will be
mixed up and juggled because of which facial feature
extraction will not be accurate but if the light luminance is
normal, LBPH works good so that the features will not be
mixed up with each other and recognize the face accurately,
recognition rate will be better.
In case of lesser distance both PCA and LBPH will work
good for recognizing the face but if the distance is greater than
the LBP based facial texture can’t be visible accurately
because if distance is farther then the features will not be
prominent and it will not recognize face accurately so
recognition rate will be greatly effect negatively. Whereas
PCA performance is better than LBPH in case of greater
distance.
3) LDA VS LBPH
The technique of LDA is that it analyze the set of data
linearly. It calculates the discriminant of features from each
face and form classes of them that is features having greater
discriminancy are placed in a separate class which means LDA
has an ability to separate data into various classes on the basis
of their differences.
In LBPH a textured image of the face shown in Figure 8 is
saved and then a histogram is generated against it. For
recognition the histogram values of that textured face is
compared and recognition occurred accordingly.
Hence LDA is better than LBPH because if light luminance
is greater, then the features in the textured image will be
mixed up and juggled because of which facial feature
extraction will not be accurate. In case of greater distance LBP
based facial texture can’t be visible accurately so recognition
rate will be greatly effect negatively. While LDA works much
better than LBPH in this scenario because it doesn’t work on
textured faces whilst it consider the whole facial pattern.
The next section demonstrates the comparative analysis of
all the techniques in tabular form and also demonstrates the
reasons of their Excellent, good, ok or poor performances.
VOL. 04: DECEMBER, 2016 ISSN 2222-1247
42
VII. COMPARISON OF FACE RECOGNITION TECHNIQUES IN
TABULAR FORM
The reasons for 100% or less than 100% performance of
the compared techniques depend upon the following basic
criteria.
1. Light Variation – Recognition rate in brighter or dim
light
2. Pose Variation – Recognition rate in multiple poses i.e.
faces being recognized from different angles (left side,
right side, front side)
3. Distance Variation – Recognition rate from farther or
closer distance
4. Dataset size Variation – Recognition rate in case of
varying database size/training database size i.e. if
training database is of larger size then what will be the
recognition rate/accuracy rate in recognition.
Table 1 shows the performance analysis of all three
recognition techniques. Excellent performance means
recognition rate is always accurate, Good performance means
recognition rate varies very slightly that is there are least
chances that recognition is not done accurately, Ok
performance means sometimes it shows correct recognition and
sometimes it recognized a person’s face with someone else’s
face and poor performance means that recognition is not done
anyway.
TABLE 1: COMPARATIVE TABLE/PERFORMANCE ANALYSIS
Factors
PCA
LDA
LBPH
R
e
c
o
g
n
i
t
i
o
n
R
a
t
e
Light
Variance
Greater Ok Ok Poor
Normal Excellent Good Good
Lesser Ok Ok Ok
Pose
Variance
Greater Excellent Ok Poor
Lesser Good Good Ok
Distance
Variance
Farther Ok Poor Poor
Closer Excellent Good Good
Dataset
Size
Variance
Greater Ok Good Poor
Lesser Excellent Excellent Excellent
Considering the comparison done in the previous section if
all the above mentioned criteria are satisfied in any technique
then its performance will be 100% while other’s is calculated
on the basis of the criteria satisfied in those techniques.
TABLE 2: OVERALL PERFORMANCE ANALYSIS ON THE BASIS OF PERCENTAGE
SCALE
R
e
c
o
g
n
i
t
i
o
n
R
a
t
e
Features PCA LDA LBPH
Light Variation 85 – 90 % 83 – 88 % 70 – 75 %
Pose Variation 88 – 93 % 83 – 88 % 68 – 73 %
Distance
Variation
88 – 93 % 78 – 83 % 70 – 75 %
Dataset size
variation
85 – 90 % 87 – 92 % 80 – 85 %
The next section demonstrate our overall findings in the
comparative analysis of PCA, LDA and LBPH.
VIII. DISCUSSION
After comparing different techniques of Face Recognition
provided by OpenCV we find out that all three techniques
works efficiently in normal light variation but PCA’s
performance is much better than others in overall fashion
because LBPH needs to calculate the textured image of face
due to which the white spots in face varies in light variance and
LDA works with one sample image or training image that
effects the recognition rate in variant light factor.
PCA is very good in pose variation and distance variation
as compared to others because it takes more than 1 sample
images for training data set while others not.
In case of data size variation LDA works better than PCA
and LBPH because LDA further classify the data into classes
on the basis of variance among them and only single face
image is required for recognition which lessens the size of
dataset, though LBPH also requires one face image for
recognition but at greater distance LBPH’s generated
histogram from textured image of face to be recognize, creates
greater variation as compared to one already stored.
From the comparison we’ve found out that by using more
input images i.e by taking more photos of each person,
particularly from different angles and lighting conditions like
PCA does, performance of Recognition is effected positively
and accuracy increases but in the same context it also effects
the dataset size that creates negative impact on the
accuracy/recognition rate but if LDA’s classification technique,
PCA’s technique of using more input images and LBP’s
technique of generating histograms of the faces – as it can
VOL. 04: DECEMBER, 2016 ISSN 2222-1247
43
clearly shows the differences among the faces stored already
and to be recognized, is used in a combined way then the
accuracy can be increased.
We’ve also found that if the photos or images of a person’s
face are taken in variation of poses, lights and distances then it
will be easy for the used classifier/recognition object to
recognize one’s face more accurately but it should be kept in
mind that the poses or angles of faces doesn’t variate much
means if the angle of first captured face is 30 degree then the
next one shouldn’t variate to the angle of 90 degree because it
will create a lot of variation among the images of the same
person and it will affect the accuracy and recognition rate
negatively. It’ll add positive affect to the recognition rate if the
face’s component for one person also varies like a male face
with glasses and no glasses, mustaches and no mustaches,
beard and no beard, smiley face and laughing face etc.
IX. CONCLUSION
In the field of computer sciences such as graphics and
image processing, face recognition is the most prominent
problem due to the comprehensive difference of faces and the
complexity of noises and image backgrounds. Holistic, Feature
based and Hybrid approaches are basically used for face
recognition methodologies. Eigen Faces, Fisher Faces and LBP
methodologies were discussed for recognition purpose. Eigen
Faces is most frequently used because of its efficiencies. There
are many scenarios to measure the real time performance to
observe the efficient techniques. From the comparison we
concluded that as a whole PCA works better than LDA and
LBPH.
REFERENCE
[1] "wikipedia," [Online]. Available: https://en.wikipedia.org/wiki/
Facial_recognition_system.
[2] M. K. D. A. S. a. D. R. P. Nirmalya Kar, "Study of
Implementing Automated Attendance SystemUsing Face
Recognition Technique," International Journal of Computer and
Communication Engineering,, 02 July 2012.
[3] S. S. Jyotshana Kanti, "Automated Attendance using Face
Recognition," International Jorunal of Science and Research,
2012.
[4] S. EMAMI and V. P. SUCIU, "Facial Recognition using
OpenCV," Journal of Mobile, Embedded and Distributed
Systems, vol. IV, p. 6, 2012.
[5] A. E.-B. a. A. E.-H. A. S. Tolba, "Face Recognition: A
Literature Review," International Journal of Signal Processing,
pp. 88-103, 2006.
[6] R. B. a. T. Proggio, "Face recognition: Features versus," IEEE
Transactions on Pattern Analysis and Machine, vol. 15, p.
1042–1052, 1993.
[7] A. V. U. DARPA, "Face recognition vendor test 2002," 2000.
[8] G. a. T. S. H. Yang, "Human face detection in a complex
background," Pattern recognition, pp. 53-63, 1994.
[9] "Wikipedia Mug_Shot," [Online]. Available:
https://en.wikipedia.org/wiki/Mug_shot.
[10] R. R. M. H. C. Lakshmi Devasena, "Video Surveillance Systems
– A Survey," IJCSI International Journal of Computer Science,
vol. 8, no. 4, pp. 1694-0814, 2011.
[11] B. B. M. Divyarajsinh N. Parmar, "Face Recognition Methods &
Applications," Divyarajsinh N Parmar et al ,Int.J.Computer
Technology & Applications,, vol. 4, pp. 84-86.
[12] G.-C. P. C. Y. a. D.-Q. D. Feng, "Human face recognition using
PCA on wavelet subband.," Journal of Electronic Imaging, pp.
226-233, 2000.
[13] A. H. a. M. P. Timo Ahonen, "Face Recognition with Local
Binary Patterns," European conference on computer vision, pp.
469-481, 11 May 2004.
[14] D. Mohammad, "A Summary of Literature Review: Face
Recognition," August 2007.
[15] R. C. P. J. P. &. A. R. W. Zhao, "Face recognitions literature
survey," ACM Computing Surveys, vol. 35, pp. 399 - 458, 2003.
[16] J. P. H. a. D. J. K. P. N. Belhumeur, "Eigenfaces vs Fisherfaces
Recognition Using Class Specific Linear Projection," European
Conf. Computer Vision, pp. 45-58, 1996.
[17] R. A. Fisher, "The Use of Multiple Measures in Taxonomic," in
Ann. Eugenics 7, 1936.
[18] S. Soo, "Object detection using Haar-cascade Classifier," p. 12.
[19] P. a. M. J. Viola, ""Rapid object detection using a boosted
cascade of simple features" Computer Vision and Pattern
Recognition," Proceedings of the 2001 IEEE Computer Society
Conference , vol. 1, pp. 1-511, 2001.
[20] R. Patil, "VIOLA JONES FACE DETECTION EXPLAINED,"
2014.
[21] J. Shlens, "A TUTORIAL ON PRINCIPAL COMPONENT
ANALYSIS," vol. 1, 23 March 2003.
[22] K. A. B. D. K. B. S. S. S., "Face Recognition Using Principal
Component Analysis and Linear Discriminant Analysis on
Holistic Approach in Facial Images Database," IOSR Journal of
Engineering, vol. 2, no. 12, pp. 12-23, December 2012.
[23] V. Singh, "Pattern Recognition Chapter 2 - Fisher Linear
Discriminant Analysis FLDA," 2012.
[24] S. C. Bo Yang, "A Comparative Study on Local Binary
Pattern(LBP) based Face Recognition: LBP Histogram," pp. 1-
36, 21 October 2012.
VOL. 04: DECEMBER, 2016 ISSN 2222-1247
44

Contenu connexe

Tendances

Stock Market Analysis and Prediction
Stock Market Analysis and PredictionStock Market Analysis and Prediction
Stock Market Analysis and PredictionAnil Shrestha
 
Student information chatbot final report
Student information chatbot  final report Student information chatbot  final report
Student information chatbot final report jaysavani5
 
Heart disease prediction system
Heart disease prediction systemHeart disease prediction system
Heart disease prediction systemSWAMI06
 
Predicting Diabetes Using Machine Learning
Predicting Diabetes Using Machine LearningPredicting Diabetes Using Machine Learning
Predicting Diabetes Using Machine LearningJohn Alex
 
Classification By Back Propagation
Classification By Back PropagationClassification By Back Propagation
Classification By Back PropagationBineeshJose99
 
Loan Prediction System Using Machine Learning.pptx
Loan Prediction System Using Machine Learning.pptxLoan Prediction System Using Machine Learning.pptx
Loan Prediction System Using Machine Learning.pptxBhoirRitesh19ET5008
 
srs for railway reservation system
 srs for railway reservation system srs for railway reservation system
srs for railway reservation systemkhushi kalaria
 
Machine Learning and its types - Internship Presentation - week 8
Machine Learning and its types - Internship Presentation - week 8Machine Learning and its types - Internship Presentation - week 8
Machine Learning and its types - Internship Presentation - week 8Devang Garach
 
Diabetes prediction with r(using knn)
Diabetes prediction with r(using knn)Diabetes prediction with r(using knn)
Diabetes prediction with r(using knn)tanujoshi98
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detectionvineeta vineeta
 
Machine Learning Deep Learning AI and Data Science
Machine Learning Deep Learning AI and Data Science Machine Learning Deep Learning AI and Data Science
Machine Learning Deep Learning AI and Data Science Venkata Reddy Konasani
 
Documentation of railway reservation system
Documentation of railway reservation systemDocumentation of railway reservation system
Documentation of railway reservation systemSandip Murari
 
A Comprehensive Review of Large Language Models for.pptx
A Comprehensive Review of Large Language Models for.pptxA Comprehensive Review of Large Language Models for.pptx
A Comprehensive Review of Large Language Models for.pptxSaiPragnaKancheti
 
Credit card fraud detection using machine learning Algorithms
Credit card fraud detection using machine learning AlgorithmsCredit card fraud detection using machine learning Algorithms
Credit card fraud detection using machine learning Algorithmsankit panigrahy
 
Amazon Product Review Sentiment Analysis with Machine Learning
Amazon Product Review Sentiment Analysis with Machine LearningAmazon Product Review Sentiment Analysis with Machine Learning
Amazon Product Review Sentiment Analysis with Machine Learningijtsrd
 
15 puzzle problem using branch and bound
15 puzzle problem using branch and bound15 puzzle problem using branch and bound
15 puzzle problem using branch and boundAbhishek Singh
 
Synopsis on billing system
Synopsis on billing systemSynopsis on billing system
Synopsis on billing systemAlok Sharma
 
SPEECH BASED EMOTION RECOGNITION USING VOICE
SPEECH BASED  EMOTION RECOGNITION USING VOICESPEECH BASED  EMOTION RECOGNITION USING VOICE
SPEECH BASED EMOTION RECOGNITION USING VOICEVamshidharSingh
 

Tendances (20)

Stock Market Analysis and Prediction
Stock Market Analysis and PredictionStock Market Analysis and Prediction
Stock Market Analysis and Prediction
 
Student information chatbot final report
Student information chatbot  final report Student information chatbot  final report
Student information chatbot final report
 
Heart disease prediction system
Heart disease prediction systemHeart disease prediction system
Heart disease prediction system
 
Predicting Diabetes Using Machine Learning
Predicting Diabetes Using Machine LearningPredicting Diabetes Using Machine Learning
Predicting Diabetes Using Machine Learning
 
Classification By Back Propagation
Classification By Back PropagationClassification By Back Propagation
Classification By Back Propagation
 
Loan Prediction System Using Machine Learning.pptx
Loan Prediction System Using Machine Learning.pptxLoan Prediction System Using Machine Learning.pptx
Loan Prediction System Using Machine Learning.pptx
 
srs for railway reservation system
 srs for railway reservation system srs for railway reservation system
srs for railway reservation system
 
Machine Learning and its types - Internship Presentation - week 8
Machine Learning and its types - Internship Presentation - week 8Machine Learning and its types - Internship Presentation - week 8
Machine Learning and its types - Internship Presentation - week 8
 
IPL Anaytics
IPL AnayticsIPL Anaytics
IPL Anaytics
 
Diabetes prediction with r(using knn)
Diabetes prediction with r(using knn)Diabetes prediction with r(using knn)
Diabetes prediction with r(using knn)
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
 
Machine Learning Deep Learning AI and Data Science
Machine Learning Deep Learning AI and Data Science Machine Learning Deep Learning AI and Data Science
Machine Learning Deep Learning AI and Data Science
 
Documentation of railway reservation system
Documentation of railway reservation systemDocumentation of railway reservation system
Documentation of railway reservation system
 
FAKE NEWS DETECTION PPT
FAKE NEWS DETECTION PPT FAKE NEWS DETECTION PPT
FAKE NEWS DETECTION PPT
 
A Comprehensive Review of Large Language Models for.pptx
A Comprehensive Review of Large Language Models for.pptxA Comprehensive Review of Large Language Models for.pptx
A Comprehensive Review of Large Language Models for.pptx
 
Credit card fraud detection using machine learning Algorithms
Credit card fraud detection using machine learning AlgorithmsCredit card fraud detection using machine learning Algorithms
Credit card fraud detection using machine learning Algorithms
 
Amazon Product Review Sentiment Analysis with Machine Learning
Amazon Product Review Sentiment Analysis with Machine LearningAmazon Product Review Sentiment Analysis with Machine Learning
Amazon Product Review Sentiment Analysis with Machine Learning
 
15 puzzle problem using branch and bound
15 puzzle problem using branch and bound15 puzzle problem using branch and bound
15 puzzle problem using branch and bound
 
Synopsis on billing system
Synopsis on billing systemSynopsis on billing system
Synopsis on billing system
 
SPEECH BASED EMOTION RECOGNITION USING VOICE
SPEECH BASED  EMOTION RECOGNITION USING VOICESPEECH BASED  EMOTION RECOGNITION USING VOICE
SPEECH BASED EMOTION RECOGNITION USING VOICE
 

Similaire à Comparative Analysis of Face Recognition Methodologies and Techniques

HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKHUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKijiert bestjournal
 
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSINGAN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSINGijiert bestjournal
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face IdentificationIRJET Journal
 
Face Recognition by Sumudu Ranasinghe
Face Recognition by Sumudu RanasingheFace Recognition by Sumudu Ranasinghe
Face Recognition by Sumudu Ranasinghebiitsumudu
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Attendance management system using face recognition
Attendance management system using face recognitionAttendance management system using face recognition
Attendance management system using face recognitionIAESIJAI
 
IRJET- Autonamy of Attendence using Face Recognition
IRJET- Autonamy of Attendence using Face RecognitionIRJET- Autonamy of Attendence using Face Recognition
IRJET- Autonamy of Attendence using Face RecognitionIRJET Journal
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face RecognitionIRJET Journal
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVIRJET Journal
 
IRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using AndroidIRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using AndroidIRJET Journal
 
Face Recognition attendance System.pptx
Face Recognition  attendance System.pptxFace Recognition  attendance System.pptx
Face Recognition attendance System.pptxTejas More
 
IRJET- Vehicle Seat Vacancy Identification using Image Processing Technique
IRJET- Vehicle Seat Vacancy Identification using Image Processing TechniqueIRJET- Vehicle Seat Vacancy Identification using Image Processing Technique
IRJET- Vehicle Seat Vacancy Identification using Image Processing TechniqueIRJET Journal
 
Review of face detection systems based artificial neural networks algorithms
Review of face detection systems based artificial neural networks algorithmsReview of face detection systems based artificial neural networks algorithms
Review of face detection systems based artificial neural networks algorithmsijma
 
REVIEW OF FACE DETECTION SYSTEMS BASED ARTIFICIAL NEURAL NETWORKS ALGORITHMS
REVIEW OF FACE DETECTION SYSTEMS BASED ARTIFICIAL NEURAL NETWORKS ALGORITHMSREVIEW OF FACE DETECTION SYSTEMS BASED ARTIFICIAL NEURAL NETWORKS ALGORITHMS
REVIEW OF FACE DETECTION SYSTEMS BASED ARTIFICIAL NEURAL NETWORKS ALGORITHMSijma
 
1410482042(Farhat Tasnim) & 1621802042(K.M.H.Mubin) sec 11.pptx
1410482042(Farhat Tasnim) & 1621802042(K.M.H.Mubin) sec 11.pptx1410482042(Farhat Tasnim) & 1621802042(K.M.H.Mubin) sec 11.pptx
1410482042(Farhat Tasnim) & 1621802042(K.M.H.Mubin) sec 11.pptxpproject345
 
Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...
Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...
Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...IJERA Editor
 
Introduction Many institutes like and universities always.pdf
Introduction Many institutes like and universities always.pdfIntroduction Many institutes like and universities always.pdf
Introduction Many institutes like and universities always.pdfbkbk37
 

Similaire à Comparative Analysis of Face Recognition Methodologies and Techniques (20)

HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKHUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
 
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSINGAN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSING
 
184
184184
184
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face Identification
 
Face Recognition by Sumudu Ranasinghe
Face Recognition by Sumudu RanasingheFace Recognition by Sumudu Ranasinghe
Face Recognition by Sumudu Ranasinghe
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Attendance management system using face recognition
Attendance management system using face recognitionAttendance management system using face recognition
Attendance management system using face recognition
 
IRJET- Autonamy of Attendence using Face Recognition
IRJET- Autonamy of Attendence using Face RecognitionIRJET- Autonamy of Attendence using Face Recognition
IRJET- Autonamy of Attendence using Face Recognition
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face Recognition
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCV
 
IRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using AndroidIRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using Android
 
Face Recognition attendance System.pptx
Face Recognition  attendance System.pptxFace Recognition  attendance System.pptx
Face Recognition attendance System.pptx
 
IRJET- Vehicle Seat Vacancy Identification using Image Processing Technique
IRJET- Vehicle Seat Vacancy Identification using Image Processing TechniqueIRJET- Vehicle Seat Vacancy Identification using Image Processing Technique
IRJET- Vehicle Seat Vacancy Identification using Image Processing Technique
 
Review of face detection systems based artificial neural networks algorithms
Review of face detection systems based artificial neural networks algorithmsReview of face detection systems based artificial neural networks algorithms
Review of face detection systems based artificial neural networks algorithms
 
REVIEW OF FACE DETECTION SYSTEMS BASED ARTIFICIAL NEURAL NETWORKS ALGORITHMS
REVIEW OF FACE DETECTION SYSTEMS BASED ARTIFICIAL NEURAL NETWORKS ALGORITHMSREVIEW OF FACE DETECTION SYSTEMS BASED ARTIFICIAL NEURAL NETWORKS ALGORITHMS
REVIEW OF FACE DETECTION SYSTEMS BASED ARTIFICIAL NEURAL NETWORKS ALGORITHMS
 
1410482042(Farhat Tasnim) & 1621802042(K.M.H.Mubin) sec 11.pptx
1410482042(Farhat Tasnim) & 1621802042(K.M.H.Mubin) sec 11.pptx1410482042(Farhat Tasnim) & 1621802042(K.M.H.Mubin) sec 11.pptx
1410482042(Farhat Tasnim) & 1621802042(K.M.H.Mubin) sec 11.pptx
 
Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...
Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...
Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...
 
Introduction Many institutes like and universities always.pdf
Introduction Many institutes like and universities always.pdfIntroduction Many institutes like and universities always.pdf
Introduction Many institutes like and universities always.pdf
 
Ch 1
Ch 1Ch 1
Ch 1
 
Best biometric system in market with AI.pdf
Best biometric system in market with AI.pdfBest biometric system in market with AI.pdf
Best biometric system in market with AI.pdf
 

Plus de Farwa Ansari

Energy Harvesting Techniques in Wireless Sensor Networks – A Survey
Energy Harvesting Techniques in Wireless Sensor Networks – A SurveyEnergy Harvesting Techniques in Wireless Sensor Networks – A Survey
Energy Harvesting Techniques in Wireless Sensor Networks – A SurveyFarwa Ansari
 
Micro-services architecture
Micro-services architectureMicro-services architecture
Micro-services architectureFarwa Ansari
 
Software Design Patterns - An Overview
Software Design Patterns - An OverviewSoftware Design Patterns - An Overview
Software Design Patterns - An OverviewFarwa Ansari
 
Optimizing the memory management of a virtual machine monitor on a NUMA syste...
Optimizing the memory management of a virtual machine monitor on a NUMA syste...Optimizing the memory management of a virtual machine monitor on a NUMA syste...
Optimizing the memory management of a virtual machine monitor on a NUMA syste...Farwa Ansari
 
Fault Tolerance Typed Assembly Language - A graphical overview
Fault Tolerance Typed Assembly Language - A graphical overviewFault Tolerance Typed Assembly Language - A graphical overview
Fault Tolerance Typed Assembly Language - A graphical overviewFarwa Ansari
 
Chapter 5: Names, Bindings and Scopes (review Questions and Problem Set)
Chapter 5: Names, Bindings and Scopes (review Questions and Problem Set)Chapter 5: Names, Bindings and Scopes (review Questions and Problem Set)
Chapter 5: Names, Bindings and Scopes (review Questions and Problem Set)Farwa Ansari
 
Chapter 4: Lexical & Syntax Analysis (Programming Exercises)
Chapter 4: Lexical & Syntax Analysis (Programming Exercises)Chapter 4: Lexical & Syntax Analysis (Programming Exercises)
Chapter 4: Lexical & Syntax Analysis (Programming Exercises)Farwa Ansari
 
Business plan of a software house
Business plan of a software houseBusiness plan of a software house
Business plan of a software houseFarwa Ansari
 
Mission statement and Vision statement of 3 Different Companies
Mission statement and Vision statement of 3 Different CompaniesMission statement and Vision statement of 3 Different Companies
Mission statement and Vision statement of 3 Different CompaniesFarwa Ansari
 
Applications of Image Processing
Applications of Image ProcessingApplications of Image Processing
Applications of Image ProcessingFarwa Ansari
 
Cohen sutherland algorithm
Cohen sutherland algorithmCohen sutherland algorithm
Cohen sutherland algorithmFarwa Ansari
 
Raster images (assignment)
Raster images (assignment)Raster images (assignment)
Raster images (assignment)Farwa Ansari
 
Prefix and suffix of open gl
Prefix and suffix of open glPrefix and suffix of open gl
Prefix and suffix of open glFarwa Ansari
 
Linear combination of vector
Linear combination of vectorLinear combination of vector
Linear combination of vectorFarwa Ansari
 
Graphic display devices
Graphic display devicesGraphic display devices
Graphic display devicesFarwa Ansari
 
Implementation & Challenges of IPv6
Implementation & Challenges of IPv6Implementation & Challenges of IPv6
Implementation & Challenges of IPv6 Farwa Ansari
 
IPv6 Implementation challenges
IPv6 Implementation challengesIPv6 Implementation challenges
IPv6 Implementation challengesFarwa Ansari
 
Tomasulo Algorithm
Tomasulo AlgorithmTomasulo Algorithm
Tomasulo AlgorithmFarwa Ansari
 
Summary of Simultaneous Multithreading: Maximizing On-Chip Parallelism
Summary of Simultaneous Multithreading: Maximizing On-Chip ParallelismSummary of Simultaneous Multithreading: Maximizing On-Chip Parallelism
Summary of Simultaneous Multithreading: Maximizing On-Chip ParallelismFarwa Ansari
 

Plus de Farwa Ansari (20)

Energy Harvesting Techniques in Wireless Sensor Networks – A Survey
Energy Harvesting Techniques in Wireless Sensor Networks – A SurveyEnergy Harvesting Techniques in Wireless Sensor Networks – A Survey
Energy Harvesting Techniques in Wireless Sensor Networks – A Survey
 
Micro-services architecture
Micro-services architectureMicro-services architecture
Micro-services architecture
 
Software Design Patterns - An Overview
Software Design Patterns - An OverviewSoftware Design Patterns - An Overview
Software Design Patterns - An Overview
 
Optimizing the memory management of a virtual machine monitor on a NUMA syste...
Optimizing the memory management of a virtual machine monitor on a NUMA syste...Optimizing the memory management of a virtual machine monitor on a NUMA syste...
Optimizing the memory management of a virtual machine monitor on a NUMA syste...
 
Fault Tolerance Typed Assembly Language - A graphical overview
Fault Tolerance Typed Assembly Language - A graphical overviewFault Tolerance Typed Assembly Language - A graphical overview
Fault Tolerance Typed Assembly Language - A graphical overview
 
Chapter 5: Names, Bindings and Scopes (review Questions and Problem Set)
Chapter 5: Names, Bindings and Scopes (review Questions and Problem Set)Chapter 5: Names, Bindings and Scopes (review Questions and Problem Set)
Chapter 5: Names, Bindings and Scopes (review Questions and Problem Set)
 
Chapter 4: Lexical & Syntax Analysis (Programming Exercises)
Chapter 4: Lexical & Syntax Analysis (Programming Exercises)Chapter 4: Lexical & Syntax Analysis (Programming Exercises)
Chapter 4: Lexical & Syntax Analysis (Programming Exercises)
 
Business plan of a software house
Business plan of a software houseBusiness plan of a software house
Business plan of a software house
 
Mission statement and Vision statement of 3 Different Companies
Mission statement and Vision statement of 3 Different CompaniesMission statement and Vision statement of 3 Different Companies
Mission statement and Vision statement of 3 Different Companies
 
Applications of Image Processing
Applications of Image ProcessingApplications of Image Processing
Applications of Image Processing
 
Cohen sutherland algorithm
Cohen sutherland algorithmCohen sutherland algorithm
Cohen sutherland algorithm
 
Scaling
ScalingScaling
Scaling
 
Raster images (assignment)
Raster images (assignment)Raster images (assignment)
Raster images (assignment)
 
Prefix and suffix of open gl
Prefix and suffix of open glPrefix and suffix of open gl
Prefix and suffix of open gl
 
Linear combination of vector
Linear combination of vectorLinear combination of vector
Linear combination of vector
 
Graphic display devices
Graphic display devicesGraphic display devices
Graphic display devices
 
Implementation & Challenges of IPv6
Implementation & Challenges of IPv6Implementation & Challenges of IPv6
Implementation & Challenges of IPv6
 
IPv6 Implementation challenges
IPv6 Implementation challengesIPv6 Implementation challenges
IPv6 Implementation challenges
 
Tomasulo Algorithm
Tomasulo AlgorithmTomasulo Algorithm
Tomasulo Algorithm
 
Summary of Simultaneous Multithreading: Maximizing On-Chip Parallelism
Summary of Simultaneous Multithreading: Maximizing On-Chip ParallelismSummary of Simultaneous Multithreading: Maximizing On-Chip Parallelism
Summary of Simultaneous Multithreading: Maximizing On-Chip Parallelism
 

Dernier

Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 

Dernier (20)

Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 

Comparative Analysis of Face Recognition Methodologies and Techniques

  • 1. Comparative Analysis of Face Recognition Methodologies and Techniques Farwa Abdul Hannan, Zainab Khalid, Ammar Rafiq* Department of Computer Sciences NFC-Institute of Engineering and Fertilizers Research Faisalabad, Pakistan *Corresponding Author: ammar.rafiq@iefr.edu.pk Abstract — In the field of computer sciences such as graphics and also analyzing the image and its processing, face recognition is the most prominent problem due to the comprehensive variation of faces and the complexity of noises and image backgrounds. The purpose and working of this system is that it identifies the face of a person from the real time video and verifies the person from the images store in the database. This paper provides a review of the methodologies and techniques used for face detection and recognition. Firstly a brief introduction of Facial Recognition is given then the review of the face recognition’s working which has been done until now, is briefly introduced. Then the next sections covered the approaches, methodologies, techniques and their comparison. Holistic, Feature based and Hybrid approaches are basically used for face recognition methodologies. Eigen Faces, Fisher Faces and LBP methodologies were introduced for recognition purpose. Eigen Faces is most frequently used because of its efficiencies. To observe the efficient techniques of facial recognition, there are many scenarios to measure its performance which are based on real time. Index Terms—Face Recognition, Automated Teller Machine, Principal Component Analysis, Fisher’s Discriminant Analysis, Linear Discriminant Analysis, extended Local Binary Pattern Histograms, 3 Dimension , 2 Dimension. I. INTRODUCTION Human beings can easily recognize the faces of person from eyes without any fluctuation but computers can’t do so easily. This was the interesting problem in computer domain. To make the computers efficient in recognizing the faces, face recognition system introduced. There are many areas in which we can use this system for various purposes. For example to check the record of those who are illegal criminals. Moreover, this system also uses for security purpose. Like by fixing the cameras in social or public areas. The benefit of using the camera is that we can easily find the misplaced children’s from the images captured by the camera. Is the same way there are many examples in which the face recognition system used. So our computers work more efficiently than humans as they are more than intelligent. Human can let the computers to do intelligent work like recognizing the images, videos and pattern recognition. Face recognition involves the pattern recognition technique which means it gives the ability to people to make the integrated power into the system to make it intelligent enough that they can do non-trivial work easily. The task of face recognition is to “identifying or verifying one or more person in the scene from still images or video sequences using a stored database of facial images”. Already stored images are unknown to the system. When the system will recognize the face it will match with the stored input images. The system will further accepts or rejects the claimed identity of query face [1]. This will works automatically. In general, manual attendance is the tradition in institutes. They marks the attendance on the paper by hand. This takes a lot of time to keep the records of every person manually and also complicated to manage and confirm everyone [2]. To end up the manual system it was necessary to mark the attendance automatically by recognizing the faces of person. For this purpose automatic attendance management system introduced. This system works in various areas like in institutes for attendance, also as a security as well as in social uses. The technology of face recognition based on computer system is playing a great role in the field of research. The working of automatic attendance by recognition of face is efficient and quick task without any time consuming. Attendance marks automatically after recognizing the face. It detects the face, recognize it and match it from predefined database. It saves a lot of time and also note the time of attendance. The working is easily understandable [3]. II. LITERATURE REVIEW Because of the increasing security threats in daily life, the demand of something easier to work with, for the identification or suspects and for security purposes, is also increasing day by day. Hence Face Detection and Recognition is becoming more important aspect of Computer Vision in the application of security. Therefore OpenCV was introduced as a solution to Computer Vision’s problem of better recognition and increased security. OpenCV is a multi-platform framework used for image processing and face detection & Recognition purposes. Its functionality for face recognition is in its several modules like Machine-learning interface, CVCam contains information about video access on 32-bit windows platform though DirectX, CXCore namespace containing the persistence functions, basic data type definitions, linear algebra and statistics methods, and the error handlers, CVaux, HighGUI. Its implementation contains VOL. 04: DECEMBER, 2016 ISSN 2222-1247 37
  • 2. multiple techniques of Haar Cascade Classifier, PCA, LDA and LBPH for face Detection and Recognition, that can be used separately in any algorithm from Eigen Faces, Fisher Faces and LBP [4]. In the discipline of computer sciences, recognition of face is the essential research problematic. There are many reasons, one of them is that the system has large number of uses and applications. This involves the identification of bank cards, for observation of security, criminal records, searching of mug shots and investigation system. These applications are important because they help in communicating and interacting with others [5]. The performance of recognition of face based on matching the patterns of faces individually. The patterns involves the mouth, eyes and also nose [6]. There were various proposed methods for solving the problems of face recognition but it was not solvable easily and faced many problems and obstacles related to face matching. This obstacle was the reason of not matching the face accurately and in comparison of finger printing, the face recognition’s performance is much bad. The existing face recognition system is working best as compared to previous ones, because of the images of faces which is to be test and then recognized is taken in the same environment in which the training images is taken. But if the variation occurs in between both i.e. test images and training images, then they are not good enough to be recognized [7]. The pattern of person’s face images is difficult to recognize. Especially in that background where there is a complexities. This is the foremost prominent problem in this system of automatic recognition of face. After some passage of time a new methodologies were introduced that is based on identification and detection of faces in complicated background [8]. The application of mug shots is used to identify the criminal and illegal person. It shows the clear sketch of a person. The sketch is the image that is captured when the person/criminal arrested. The purpose of having the images makes it easy for the law enforcement to collect the record of criminals who are arrested [9]. Mug shot consists of two segments i.e. one side views image taken and other is front view. The image background should be simple so that it will not create any noise in the images. The demand and approach of video surveillance is growing day by day. It needs to observe the people at different places by fixing the camera so that it will be able to gain information about the people and their activities. The camera take the images from real time videos for security purposes. The moving analysis help out us to solve the problems of surveillance applications. They mentioned the different techniques related to background modelling like 2D and 3D methods of tracking human body. This modelling is used to detect the position of body and its activities in video classification [10]. Face recognition system is used in different areas for security purposes because security is becoming essential in public areas. The areas include airports for checking the passengers at boarding time and airline staff. The checking is done by recognition of faces. This technology is greatly applied at airports [11]. For the recognition of faces the algorithm which is mostly used is PCA (Principal component Analysis). As PCA has many restrictions that involves a load of large calculations. For this the method that is proposed is sub-band. PCA applied on this specific method of wavelet sub-band. Usually PCA is useful on the full facial images for the representation of human faces but in the proposed methodology the transformation of wavelet is used for the decomposition of facial images into sub-bands of frequency. The frequency that lies in the midrange is typically used for the representation of PCA. By comparing this approach with Principal Component Analysis that was used before, the proposed approach has better results of recognition rate. Moreover it decreases the load of calculation if the database size of images will be greater with the training images [12]. Local Binary Pattern Histogram (LBPH) is the dominant for the description of texture images. The mechanism of LBPH is that it marks the image pixel by entering in the area of 3*3 of every pixel along with the middle value since the result will be in binary number so that the histogram of marked images can be used as a description of texture images. The histogram has the information related to the dissemination of designs like edges and areas on the full facial image [13]. The reason of doing this comparison is that we’ve tried to implement the mentioned methodologies and techniques in the development of the Auto-Attendance System. This system works on detection and recognition of person’s face. But after the implementation we faced some problems in recognition based on the light variation, dataset size variation, pose variation and distance variation and also detection problems in some methodologies. All the techniques and methodologies are introduced and compared in the following sections. III. FACE RECOGNITION METHODOLOGIES Face Recognition methodologies consists of Eigen Faces and Fisher Faces. These methodologies are based on some approaches that are used for facial recognition and detection also. These approaches are further classify into three kinds i.e. holistic, feature based and hybrid approaches [14]. These are Holistic Approach – this approach uses whole face region and extract features and do recognition Feature Based Approach – this approach do not take whole face. It just extract the main features of face that is eyes, lips, nose [15] Hybrid Approach – This approach deals with the combination of two approaches one is Holistic and other is Feature based. In this method image is caught from a 3D environment like a real time system. Then the detection of VOL. 04: DECEMBER, 2016 ISSN 2222-1247 38
  • 3. facial features, their location or position and numerical representation is calculated. After that, calculated data is then compared with the pre-stored data and then detection and recognition operations are performed [11]. 1) Eigen Faces Eigen Faces is an algorithm that is used to for recognition purpose. It uses PCA technique for recognition. To deal with the problem of recognition of faces, a set is generated as Eigen vectors and the name of Eigen faces is given. In this methodology total sample images should not be 1 they should be more than 5 in order to get more accuracy. Greater the sample space more will be the accuracy. It generates Eigen Faces or low dimensional images of the total number of M training data set shown in Figure 2. Fig. 1. Multivariable dataset Eigen Faces are actually images of lower dimensions that are made by transforming original images to Eigen Faces shown in Figure 3. Fig. 2. Transformation to Low Dimensional Images The Eigen faces are generated in such a way that starting ones are dominant and useful but later ones are just noise as shown in Figure 3. Fig. 3. Eigen Faces 2) Fisher Faces In fisher faces the training set of images gives the information to build the method for decreasing the dimensionality of space between the facial features. The method of fisher faces usually use the linear method of specific classes [16] and also (FLD) for the decrease in dimensionality and decrease in the feature space of simple classifiers [17]. Fisher Faces algorithm reflects the ratio between the difference of one person and that of another person. The strong key point of Fisher Faces in recognition of face problem is that it uses the method which is linear for decreases in the dimensionality of facial feature space. 3) LBP In the LBP-based facial representation, the images of faces are divided to abstract the histograms of LBP. They are divided into the sub-regions equally which cannot overlap to each other. After the extraction of histograms the sub-regions are concatenated into the single eLBP feature of histogram. The main criticism of this methodology is that it divides the face into a grid. That is in sub-regions which are not associated with features of face. It predicts that the resulting image of face of sub-regions suffers from the original size and position and they are not placed accurately back on to the calculated face in comparison to the original one. These mentioned methodologies use some techniques for face detection and recognition. For Face Detection, Haar Cascade Classifier is used in all the methodologies so it will not be compared with any face detection mechanism. For Face A Training Set Consisting of total M images Transformation (Eigen Faces) VOL. 04: DECEMBER, 2016 ISSN 2222-1247 39
  • 4. Recognition Eigen Faces uses PCA, Fisher Faces uses LDA and LBP uses LBPH technique. The introduction of Face detection technique is given in the next section. IV. FACE DETECTION TECHNIQUE 1) Haar Cascade Classifier Haar Cascade is also known as Viola Jones algorithm. It works on four categories that includes Haar features, Integral images, Adaboost and Cascading [18]. Detection of objects that used Haar features based is actual method of object detection which is proposed [19]. The method of machine learning is described for graphically detection of object that is able to process images quickly so that it gets high rates of object detection. There are three contributions in which this working is described. The 1st contribution is the integral image which tells us about the new image. It calculates the features quickly which is being used by the detector. The 2nd contribution is the algorithm of learning that is based on AdaBoost. This is used to collect features in small number from the large one. The classification result is very efficient. The 3rd one is to combine the classifier which is increasing, in a cascade classifier. Its flow chart in Figure 4 explains the working stages of Haar Cascade algorithm. It first take an input of an image and extract its haar features by calculating the pixel values and then generating the Integral values of those calculated pixel values. After this step it eliminate redundancy using Adaboost techniques that is it eliminate those pixel values that are not recognized as features and select best features only. Mathematically Then it classify all the pixels values/ integral values in different cascades or groups on the basis of similarity in them. After that it compares all these values with the predefined feature’s values and then if it is detected as face it shows faces is detected otherwise not [20]. Fig. 4, Flow Chart of Haar Cascade Classifier Algorithm for face detection Haar Cascade is the only technique used for face detection improved and approved by many scholars and researchers. It is 90 – 95% accurate. V. FACE RECOGNITION TECHNIQUES For comparison of Face Recognition techniques we’ve selected OpenCV’s techniques for Face Recognition that are PCA, LDA and LBP, introduced below. 1) Principal Component Analysis (PCA): Principal Component Analysis (PCA) is used for Face Recognition. This technique is based on statistical method which transforms a set of observing the connected variables in a set of values of not connected variables linearly. This is known as Principal Components. Their sum is equal and less than of the original values sum. The technique of PCA is most widely used in all the computer analysis forms. Its example is from neuroscience to graphics of computer. The reason is that it is a simple method which is used to extract only the related information from the data set [21]. PCA do the analysis on the basis of multivariable dataset that is a set of images or a training set consisting of total of M images show in Figure 2 and each image consist of N x N dimensions that is the total of N2 dimensions. PCA uses the data set that is transformed into the low dimensional images of given data set shown in Figure 3 known as the Eigen Faces. These low dimensional images are selected as K Eigen faces shown in Figure 4 and are generated by extracting the mean or average matching face from the selected K Eigen faces and K is ever equal and less than that of original value images that is M. mathematically K <= M Fig. 5. Selected K Eigen Faces Because of the noise in Eigen Faces, PCA selects only those that are dominant that is K useful Eigen Faces and discarded the noisy ones. Then it calculates the weights of the input face and calculates the average matching face and do the recognition using Eigen Faces algorithm. Mathematically weights are like Selected K Eigen Faces to represent the Training set VOL. 04: DECEMBER, 2016 ISSN 2222-1247 40
  • 5. And weights are actually the weightage value of average matching features extracted by calculating the means shown in Figure 6. Fig. 6 Weightage calculation from Mean Image 2) Linear Discriminant Analysis (LDA): LDA is a technique that is mostly used for the classification of data and also decrease the dimensionality of faces. LDA is also called as FLDA (Fisher’s Linear Discriminant Analysis). It observes the original space vectors that is good in separation of classes. Its working is almost similar to PCA except that it has reduced set of calculations that is it doesn’t need to do the calculation of features within the classes but among the classes [22] The technique of LDA is that it analyze the set of data linearly form classes of them. It calculates the discriminant of features from each face and form classes of them that is features having greater discriminancy are placed in a separate class which means unlike PCA, LDA has an ability to separate data into various classes on the basis of their differences. To identify that which data belongs to which class a discriminant function is used that takes the values of x and y axis. Mathematically that discriminant function is represented as In this mathematical expression X contains the value of x and y axis. Alpha is something called as Bias and W is the weightage of the data extracted from that facial image calculated by LDA. If its result is greater than 0, class will be 1 other will be 2, greater than 2 class will be 3, less than 2 class will be 4 and so on. Mathematically The value of X and Y axis is calculated by finding the variance and mean of data along x-axis and y-axis separately. LDA, after creating classes separates their results linearly. Graphically their separation can be shown as Fig. 7 Graphical view of Discriminant Function [23] In this graphical representation each color represents a class separated linearly by a straight line. LDA uses a dimensionality reduction method that is during extraction of features it keeps those features that are unique and best extracted and discarded the others that are not best selected as a feature. Because of this Dimensionality reduction technique of LDA, less memory is consumed and calculation cost is reduced. It also classifies the data in different classes according to the discriminancy in them. 3) Local Binary Patterns Histograms (LBPH): Local Binary Pattern Histogram (LBPH) is the one that involves the removal of the most valuable features from facial images that are preprocessed to implement face recognition. LBPH can do it by dividing an image into many small areas from which the features are removed. Principal Component Analysis (PCA) is the one that process dimensional reduction procedure and process the face as a whole. Face recognition is an important application whose results are very interesting as well as complicated because the evaluation effects at the recognition phase. The LBPH is introduced to image texture for the analysis of image quality. With its operator the image amount of the LBP program is composed into the histogram that is used as histogram intersection [24]. The LBP has recently been used for description of face by adopting the histogram approach. The spatially eLBPH which was the first LBP-based face recognition methodology that divides the complete image of face in the small sub images. It sort out the local LBPH from every region for face recognition and finally gathered the histograms of local small sub- images with the histogram of global face images. In LBPH a textured image of the face shown in Figure 8 is saved and then a histogram is generated against it. For recognition the histogram values of that textured face is compared and recognition occurred accordingly. VOL. 04: DECEMBER, 2016 ISSN 2222-1247 41
  • 6. Fig. 8. Textured Image of face The comparison and introduction of these techniques is discussed in next section. VI. COMPARATIVE ANALYSIS OF FACE RECOGNITION TECHNIQUES 1) PCA VS LDA The major variance in between LDA and PCA is that LDA classifies the training data into multiple classes on the basis of their discriminancy and then it calculates the minimum variance within the class scatter and maximum variance between the class scatter so that the recognition can be done efficiently. But as PCA requires more training images’ samples for recognition as compared to the LDA (requires only one sample image of face as more sample images of one face effects the recognition rate and confliction occurs in recognition) then recognition is much accurate as compared to LDA but in greater or lesser light variance (variation of light on the face stored in training dataset and on the face being recognized) both PCA and LDA doesn’t work better, their accuracy rate effects negatively though PCA’s recognition rate in case of normal light is much better than LDA because of the increased sample space available for PCA as compared to LDA. As PCA requires larger number of sample images as compared to LDA so the Eigen faces that were created first will be accurate, dominant and visible but later ones will be considered as noise by the PCA because the features of them will not be visible accurately. Hence in case of greater database/training set size LDA will perform better than PCA but in smaller DB/training set size both will work accurately or efficiently. Because of the larger training images size of PCA, faces will be stored in variant poses so recognition rate will be better than LDA. Both of the LDA and PCA will work good if the distance of the face to be recognized and the face already stored in training set from the camera is not greater otherwise recognition rate will effect negatively. 2) PCA VS LBPH The comparison of PCA and LBPH is that for face recognition LBPH removes the valuable features from images and separate the images into small parts while PCA is used to extract only the related information from the data set. The best algorithm for recognition of face images with factors of varying illumination, variance of poses, distance and dataset size variance is PCA (Principal Component Analysis) because this technique is higher towards many of the numerical techniques. Using numerical techniques recognized face is calculated. Whereas LBP features is simpler because in face recognition system it is enough to differentiate known and unknown faces quickly but LBP are constant and affected by light changes greatly. PCA doesn’t works well in case of greater or lesser light variation but it works well than LBPH if the light variation is normal so that the recognition rate will be accurate. LBPH is not best in this particular scenario because if light luminance is greater, then the features in the textured image will be mixed up and juggled because of which facial feature extraction will not be accurate but if the light luminance is normal, LBPH works good so that the features will not be mixed up with each other and recognize the face accurately, recognition rate will be better. In case of lesser distance both PCA and LBPH will work good for recognizing the face but if the distance is greater than the LBP based facial texture can’t be visible accurately because if distance is farther then the features will not be prominent and it will not recognize face accurately so recognition rate will be greatly effect negatively. Whereas PCA performance is better than LBPH in case of greater distance. 3) LDA VS LBPH The technique of LDA is that it analyze the set of data linearly. It calculates the discriminant of features from each face and form classes of them that is features having greater discriminancy are placed in a separate class which means LDA has an ability to separate data into various classes on the basis of their differences. In LBPH a textured image of the face shown in Figure 8 is saved and then a histogram is generated against it. For recognition the histogram values of that textured face is compared and recognition occurred accordingly. Hence LDA is better than LBPH because if light luminance is greater, then the features in the textured image will be mixed up and juggled because of which facial feature extraction will not be accurate. In case of greater distance LBP based facial texture can’t be visible accurately so recognition rate will be greatly effect negatively. While LDA works much better than LBPH in this scenario because it doesn’t work on textured faces whilst it consider the whole facial pattern. The next section demonstrates the comparative analysis of all the techniques in tabular form and also demonstrates the reasons of their Excellent, good, ok or poor performances. VOL. 04: DECEMBER, 2016 ISSN 2222-1247 42
  • 7. VII. COMPARISON OF FACE RECOGNITION TECHNIQUES IN TABULAR FORM The reasons for 100% or less than 100% performance of the compared techniques depend upon the following basic criteria. 1. Light Variation – Recognition rate in brighter or dim light 2. Pose Variation – Recognition rate in multiple poses i.e. faces being recognized from different angles (left side, right side, front side) 3. Distance Variation – Recognition rate from farther or closer distance 4. Dataset size Variation – Recognition rate in case of varying database size/training database size i.e. if training database is of larger size then what will be the recognition rate/accuracy rate in recognition. Table 1 shows the performance analysis of all three recognition techniques. Excellent performance means recognition rate is always accurate, Good performance means recognition rate varies very slightly that is there are least chances that recognition is not done accurately, Ok performance means sometimes it shows correct recognition and sometimes it recognized a person’s face with someone else’s face and poor performance means that recognition is not done anyway. TABLE 1: COMPARATIVE TABLE/PERFORMANCE ANALYSIS Factors PCA LDA LBPH R e c o g n i t i o n R a t e Light Variance Greater Ok Ok Poor Normal Excellent Good Good Lesser Ok Ok Ok Pose Variance Greater Excellent Ok Poor Lesser Good Good Ok Distance Variance Farther Ok Poor Poor Closer Excellent Good Good Dataset Size Variance Greater Ok Good Poor Lesser Excellent Excellent Excellent Considering the comparison done in the previous section if all the above mentioned criteria are satisfied in any technique then its performance will be 100% while other’s is calculated on the basis of the criteria satisfied in those techniques. TABLE 2: OVERALL PERFORMANCE ANALYSIS ON THE BASIS OF PERCENTAGE SCALE R e c o g n i t i o n R a t e Features PCA LDA LBPH Light Variation 85 – 90 % 83 – 88 % 70 – 75 % Pose Variation 88 – 93 % 83 – 88 % 68 – 73 % Distance Variation 88 – 93 % 78 – 83 % 70 – 75 % Dataset size variation 85 – 90 % 87 – 92 % 80 – 85 % The next section demonstrate our overall findings in the comparative analysis of PCA, LDA and LBPH. VIII. DISCUSSION After comparing different techniques of Face Recognition provided by OpenCV we find out that all three techniques works efficiently in normal light variation but PCA’s performance is much better than others in overall fashion because LBPH needs to calculate the textured image of face due to which the white spots in face varies in light variance and LDA works with one sample image or training image that effects the recognition rate in variant light factor. PCA is very good in pose variation and distance variation as compared to others because it takes more than 1 sample images for training data set while others not. In case of data size variation LDA works better than PCA and LBPH because LDA further classify the data into classes on the basis of variance among them and only single face image is required for recognition which lessens the size of dataset, though LBPH also requires one face image for recognition but at greater distance LBPH’s generated histogram from textured image of face to be recognize, creates greater variation as compared to one already stored. From the comparison we’ve found out that by using more input images i.e by taking more photos of each person, particularly from different angles and lighting conditions like PCA does, performance of Recognition is effected positively and accuracy increases but in the same context it also effects the dataset size that creates negative impact on the accuracy/recognition rate but if LDA’s classification technique, PCA’s technique of using more input images and LBP’s technique of generating histograms of the faces – as it can VOL. 04: DECEMBER, 2016 ISSN 2222-1247 43
  • 8. clearly shows the differences among the faces stored already and to be recognized, is used in a combined way then the accuracy can be increased. We’ve also found that if the photos or images of a person’s face are taken in variation of poses, lights and distances then it will be easy for the used classifier/recognition object to recognize one’s face more accurately but it should be kept in mind that the poses or angles of faces doesn’t variate much means if the angle of first captured face is 30 degree then the next one shouldn’t variate to the angle of 90 degree because it will create a lot of variation among the images of the same person and it will affect the accuracy and recognition rate negatively. It’ll add positive affect to the recognition rate if the face’s component for one person also varies like a male face with glasses and no glasses, mustaches and no mustaches, beard and no beard, smiley face and laughing face etc. IX. CONCLUSION In the field of computer sciences such as graphics and image processing, face recognition is the most prominent problem due to the comprehensive difference of faces and the complexity of noises and image backgrounds. Holistic, Feature based and Hybrid approaches are basically used for face recognition methodologies. Eigen Faces, Fisher Faces and LBP methodologies were discussed for recognition purpose. Eigen Faces is most frequently used because of its efficiencies. There are many scenarios to measure the real time performance to observe the efficient techniques. From the comparison we concluded that as a whole PCA works better than LDA and LBPH. REFERENCE [1] "wikipedia," [Online]. Available: https://en.wikipedia.org/wiki/ Facial_recognition_system. [2] M. K. D. A. S. a. D. R. P. Nirmalya Kar, "Study of Implementing Automated Attendance SystemUsing Face Recognition Technique," International Journal of Computer and Communication Engineering,, 02 July 2012. [3] S. S. Jyotshana Kanti, "Automated Attendance using Face Recognition," International Jorunal of Science and Research, 2012. [4] S. EMAMI and V. P. SUCIU, "Facial Recognition using OpenCV," Journal of Mobile, Embedded and Distributed Systems, vol. IV, p. 6, 2012. [5] A. E.-B. a. A. E.-H. A. S. Tolba, "Face Recognition: A Literature Review," International Journal of Signal Processing, pp. 88-103, 2006. [6] R. B. a. T. Proggio, "Face recognition: Features versus," IEEE Transactions on Pattern Analysis and Machine, vol. 15, p. 1042–1052, 1993. [7] A. V. U. DARPA, "Face recognition vendor test 2002," 2000. [8] G. a. T. S. H. Yang, "Human face detection in a complex background," Pattern recognition, pp. 53-63, 1994. [9] "Wikipedia Mug_Shot," [Online]. Available: https://en.wikipedia.org/wiki/Mug_shot. [10] R. R. M. H. C. Lakshmi Devasena, "Video Surveillance Systems – A Survey," IJCSI International Journal of Computer Science, vol. 8, no. 4, pp. 1694-0814, 2011. [11] B. B. M. Divyarajsinh N. Parmar, "Face Recognition Methods & Applications," Divyarajsinh N Parmar et al ,Int.J.Computer Technology & Applications,, vol. 4, pp. 84-86. [12] G.-C. P. C. Y. a. D.-Q. D. Feng, "Human face recognition using PCA on wavelet subband.," Journal of Electronic Imaging, pp. 226-233, 2000. [13] A. H. a. M. P. Timo Ahonen, "Face Recognition with Local Binary Patterns," European conference on computer vision, pp. 469-481, 11 May 2004. [14] D. Mohammad, "A Summary of Literature Review: Face Recognition," August 2007. [15] R. C. P. J. P. &. A. R. W. Zhao, "Face recognitions literature survey," ACM Computing Surveys, vol. 35, pp. 399 - 458, 2003. [16] J. P. H. a. D. J. K. P. N. Belhumeur, "Eigenfaces vs Fisherfaces Recognition Using Class Specific Linear Projection," European Conf. Computer Vision, pp. 45-58, 1996. [17] R. A. Fisher, "The Use of Multiple Measures in Taxonomic," in Ann. Eugenics 7, 1936. [18] S. Soo, "Object detection using Haar-cascade Classifier," p. 12. [19] P. a. M. J. Viola, ""Rapid object detection using a boosted cascade of simple features" Computer Vision and Pattern Recognition," Proceedings of the 2001 IEEE Computer Society Conference , vol. 1, pp. 1-511, 2001. [20] R. Patil, "VIOLA JONES FACE DETECTION EXPLAINED," 2014. [21] J. Shlens, "A TUTORIAL ON PRINCIPAL COMPONENT ANALYSIS," vol. 1, 23 March 2003. [22] K. A. B. D. K. B. S. S. S., "Face Recognition Using Principal Component Analysis and Linear Discriminant Analysis on Holistic Approach in Facial Images Database," IOSR Journal of Engineering, vol. 2, no. 12, pp. 12-23, December 2012. [23] V. Singh, "Pattern Recognition Chapter 2 - Fisher Linear Discriminant Analysis FLDA," 2012. [24] S. C. Bo Yang, "A Comparative Study on Local Binary Pattern(LBP) based Face Recognition: LBP Histogram," pp. 1- 36, 21 October 2012. VOL. 04: DECEMBER, 2016 ISSN 2222-1247 44