SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
ACEEE Int. J. on Control System and Instrumentation, Vol. 03, No. 01, Feb 2012



              3D Face Recognition Method Using 2DPCA-
                   Euclidean Distance Classification
                    Yashar Taghizadegan1, Hassan Ghassemian2, and Mohammad Naser-Moghaddasi3
        1,3
              Department of Electrical Engineering, Science and Research Branch, Islamic Azad University, Tehran, Iran.
                             Email: 1yashar.taghizadegan@gmail.com, 3mn.moghaddasi@srbiau.ac.ir
                 2
                   Department of Electrical and Computer Engineering, Tarbiat Modares University, Tehran, Iran.
                                                 Email: ghassemi@modares.ac.ir

Abstract— In this paper, we present a 3d face recognition method        the ordered list of features according to the Fisher coefficients
that is robust to changes in facial expressions. Instead of             were used to represent faces in their face recognition
locating many feature points, we just need to locate the nose           experiments. The features offering better recognition results
tip as a reference point. After finding this reference point,
                                                                        were angles and distances measurements.
pictures are converted to a standard size. Two dimensional
principle component analysis (2DPCA) is employed to obtain
                                                                            Chang et al. [10] proposed to use the principal component
features Matrix vectors. Finally Euclidean distance method is           analysis (PCA) for extracting the 3D facial appearance
employed for classifying and comparison of the features.                features, which achieved a promising recognition
Experimental results implemented on CASIA 3D face database              performance. After that, many appearance based features are
which including 123 individuals in total, demonstrate that              applied to improve the 3D face recognition results.
our proposed method achieves up to 98% recognition accuracy                 Khalid et al. [11] presented a method using 53 features
with respect to pose variation.                                         extraction from 12 reference points. The local geometric
                                                                        features are calculated basically using Euclidean distance
Index Terms— 3D Face recognition, depth information, features
                                                                        and angle measurement.
vectors, two dimensional principle component analysis
(2DPCA), Euclidean distance                                             B. General overview of recommended method
                                                                            In this paper a novel algorithm for face recognition that is
                          I. INTRODUCTION                               robust to changes in facial expressions (such as unhappy,
    Face recognition attempts, return to last century when              wondering and…) will be presented. This method provides
Galton [2] did first research to recognise face. Face recognition       the face recognition with high level of speed and accuracy
and identification have so many applications such as in police          and deals with facial expressions. The experimental results
department and security system to identity guilty people. 2D            are performed on CASIA 3D face database. The block diagram
face recognition system has some serious issues with light              of suggested method is shown in Fig. 1. 3D sample pictures
environment sensitivity, face expressions (such as happy,               of CASIA 3D face database relates to different facial
unhappy, wondering ...) and also turning of head. To remove             expressions are shown in Fig. 2
these issues, using 3D pictures is suggested. The 3D systems
are not sensitive to transformation, turning and light condition
[3-6]. 3D pictures are the pictures that instead of light
condition level of pixels, the deep information of pixels exist.
A. Previous Works
    Researchers have employed different methods for
automatic 3D face recognition. Some methods are based on
the face curve analysis. Gordon [7] has presented a method
based on algorithm using 3D curve face features. In Gordon’s
method face is divided to three subdivision named: ridge and
valley lines and then the location of nose, mouth, eyes, and
other features which are used for recognition, specified. Lee
et al [8] presented a method based on locating features of
eight points on face and using supportive vector machine
[SVM], get the 96% accuracy in face recognition. Database
used by Lee, contains of 100 different pictures. In Lee’s method
face features points are chosen manually and this can be one            Fig. 2: normal (up-left)- Happy (up-right)- wondering (down-left)-
of the issues of this method. Moreno et al. [9] employed a set                                unhappy (down-right)
of eighty six features using a database of 420 3D range images,
7 images per each one of a set of 60 individuals. After the
feature discriminating power analysis, the first 35 features of
© 2012 ACEEE                                                        1
DOI: 01.IJCSI.03.01. 70
ACEEE Int. J. on Control System and Instrumentation, Vol. 03, No. 01, Feb 2012


                         II. OUR METHOD
A. Face detection
    As shown in Fig. 3 unprocessed information of data
contains some additional information like neck, ear, hair, and
some parts of clothes which are not usable and should be
deleted. In this paper thresholding method over the pictures
depth coordination (Z) is used.
    This method is named Otsu [12]. The Z coordination of
pictures is divided to the facial and non-facial information,
                                                                                   FiFig. 4: The Fig. 3 after elimina-   Fig. 3: The data of a picture
and then Otsu algorithm specified the best estimation of                                                                 before elimination of unused
                                                                                   tion of unused points
threshold border. All the information of threshold will be kept                                                          poi nts
and unused information will be eliminated.
                                                                                   B. Pre-processing
   Assumed p (i); i  1,2,..., I .are values of normalized
                                                                                       3D pictures are taken by laser camera, have spark noise
histogram, including I levels. Assumed the value of I
                                                                                   and also some holes in some areas of pictures. These holes
(coordination info) are divided to C1 and C2 classes. The
                                                                                   and noises reduce the recognition system accuracy. Median
value of C1 is i=1 to k and C2 is i=k+1 to I.
                                                                                   filter is used for eliminating spark noise, and interpolation is
   In this case, probabilities of happening for each class are
                                                                                   used for filling the probable holes. In accordance of Fig. 3, X
shown in Equation (1) and (2).
                                                                                   variable change from 150 to 200 and Y from 100 to 200. These
                                   k
                                                                                   limits for different pictures even for a person are not the
                 c1 ( k )       P (i ) .
                                  i 1
                                                                        (1)        same, there for it is not possible to compare the pictures. For
                                                                                   a meaningful comparison of pictures, the pictures should be
                                      I
                                                                                   normalized to a 100×100 network. The limit of Z coordinate
                c2 ( k )        P (i ) .
                                i  k 1
                                                                        (2)        as the depth of the pictures should be mapped in [0 255]. In
                                                                                   the following, the complete explanation of this method will
And also average    i   and variance  i2 of C1 and C2 classes                    be presented.
are calculated in Equation (3) through (6).                                            After face detection, the difference between max and min
                                                                                   values of X & Y has been obtained and with 1/99 steps, is
                                  k
                                                                                   sampled, the obtained pictures are mapped to a 100×100 net
                 1 ( k )   i. P ( i ) / c1 ( k ) .                    (3)
                                i 1
                                                                                   and Fig. 5 is the result. In regarding of inequality in pictures
                                                                                   depth information and different changes, it is necessary to
                                   I                                               map the pictures depth info to a space between the 0 to 255
                2 (k )         i.P(i) / c (k ) .
                               i  k 1
                                                    2                   (4)        levels. The results have been shown in Fig. 6.
                                                                                   C. Face borders and nose tip detection
                            k
              12 (k )   [i  1 (k )]2 .P(i ) / c1 (k ) .                           To obtain the face borders, minimize a 100×100 square
                                                                         (5)       such as the corners of square touch the face corners. Result
                           i 1
                                                                                   of this process has been shown in Fig.5 Final obtained
                           I                                                       100×100 square with the nose tip will be mapped in a
             2
            2 (k )      [i            2   (k )]2 .P(i ) / c2 (k ) . (6)       100×100 net. After detecting of face borders, regarding of
                         i k 1                                                   this fact that the nose tip has the highest height in the pictures,
The best value of threshold T with recursive method is                             a simple method will provide the coordination of nose tip by
specified in a way, for all K values from 1 to I the variance                      this way: pictures will be scanned with a 3×3 window and
    2                                                                              sum of all points inside and below the 3×3 window will be
of  w minimized.
                                                                                   obtained, the largest number in these data is the nose tip. For
          w (k )  c1 (k ). 12 (k )  c2 (k ). 2 (k ) .
           2                                      2
                                                                        (7)        some pictures the depth of chin is more than nose, so in this
                                                                                   kind of pictures, to prevent wrong nose info, the method will
Fig. 3 shows the data of a picture used in Cartesian                               accept just the points in the central areas of pictures. In other
coordination presentation and Fig.4 shows the final picture                        word, if an obtained point as nose centre point, is locates up
with elimination of unused points.                                                 or down of the picture, it means that this point is not the nose
                                                                                   tip and the next maximum point should be regarded as the
                                                                                   nose tip. It is necessary to continue this procedure to
                                                                                   approach as much as possible to the centre of picture. Finally
                                                                                   the nose tip should be placed in centre of picture as shown in
                                                                                   Fig.6.


© 2012 ACEEE                                                                   2
DOI: 01.IJCSI.03.01.70
ACEEE Int. J. on Control System and Instrumentation, Vol. 03, No. 01, Feb 2012


                                                                                   one person, different pictures contain same information. By
                                                                                   using Two Dimensional Principle Component Analysis
                                                                                   (2DPCA), the features of pictures have been obtained.
                                                                                   The normalized pictures are named A1 , A2 ,..., AM , the size
                                                                                   of each Ai assumed n×n. The average of pictures A1 through
                                                                                   AM is defined in Equation (9).
                                                                                                                              M
                                                                                                                      1
                                                                                                          A 
                                                                                                                      M
                                                                                                                              
                                                                                                                              i 1
                                                                                                                                     Ai .                                        (9)
Fig. 6: The final picture after               Fig. 5: The picture showing
                                              obtained borders of the face         The covariance matrix of M picture will be gotten from
pre-processing
                                                                                   Equation (10).
D. Face Smoothing                                                                                         1       M                     T


    Face smoothing converts face curves to a smooth and
                                                                                                 C 
                                                                                                          M
                                                                                                                 
                                                                                                                 i 1
                                                                                                                        ( Ai  A ) ( Ai  A ) .                                 (10)
soft surface and removes the facial expressions. By this way,                      In Equation (10), T is the transpose matrix. The covariance
before processing the information, the facial expressions will                     matrix has n Eigen value and correspond n Eigen vectors.
be eliminated. In this paper, minimum square error method is                       These n Eigen values stored descending and the numbers of
used for minimizing the errors between input pictures and                          Eigen vector (d) correspond with d as the largest Eigen value
final smoothed picture. For this case variance of input picture                    in n×d matrix. A is assumed as one of the input pictures. In
is calculated and then entire picture matrix is scanned by                         this case the features vector of picture will be define as
using a window with p×q size. Scanning of matrix is started                        Equation (11)
from up and left side and element by element. In each scan
the element of window centre will be changed by Equation                                          Y  A. X .                                 (11)
(8). For each window, local average value and variance is                          In Equation (11), X is a n×d matrix and the first column of
calculated.                                                                        this matrix relates to the biggest Eigen value, the second
                                                                                   column corresponds to the second biggest number and so
                             2 ,q   n2
                              p                                                    on. Finally the dth column corresponds to the largest Eigen
   s (i , j )   p , q                  ( I ( i , j )   p ,q ) .     (8)       value of covariance matrix. In Equation. (11) the number of d
                                2 ,q
                                   p
                                                                                   should be calculated such a way that the face picture is
In Equation (8), p,q , is average value and  p ,q is depth value
                                               2                                   recoverable from Eigen value matrix of Y. and vector of X, and
                                                                                   also d should be obtained such a way that the recognition
                                         2
variance matched with p×q size window.  n Is the variance                         rate is a desirable value. In this identification system with
                                                                                   d=14, the identification rate is maximum. Although, the d
of noise, I (i, j ) and S (i , j ) are the primary and the                         value can be from 1 to 100, it is clear that with d=14 the size
normalized pictures.                                                               of features matrix will be reduced from 100×100 to 100×14.
    The scanned window size specifies the level of                                 So small matrix creates a high processing speed and a good
smoothing. A bigger window will causes more smoothing                              combination between accuracy and speed will be approach
level, but the level of smoothing should not be in a way that                      with d=14. Improved value of d can be obtained using
the features and important information of picture be removed.                      Equation (12).
Fig. 7 shows an unsmooth picture from CASIA 3D face
                                                                                                  100     100
database and Fig. 8 shows the same picture after smoothing.                                 1                                      ~                      2
                                                                                   e 
                                                                                          1000
                                                                                                               [A(i,        j)  A d (i, j)]                
Fig. 7 shows a smiley face but in Fig. 8 the smile is removed                                      i 1   j 1


from picture.                                                                                                                    1          100    100                      .   (12)
                                                                                                            0.02          [
                                                                                                                              10000
                                                                                                                                             
                                                                                                                                            i 1   j 1
                                                                                                                                                              A(i,   j) ]

                                                                                                      ~
                                                                                   In this Equation Ad is the obtained processed picture using
                                                                                   d to Eigen values corresponding with d to the largest Eigen
                                                                                   values. The lowest value of d in Equation (12) can be a good
                                                                                   value for a low rate fault and good improved picture. Calcula-
                                                                                   tion of d for CASIA 3D face database is 14 and the processed
                                                                                   picture will be obtained from Equation (13).
                                                                                             ~
Fig. 8: The Fig. 7 after smoothing           Fig. 7: An unsmooth picture                     Ad  YxTranspose( X ) .                                                            (13)
                                             from CASIA 3D face database
                                                                                   Fig.9 shows the Eigen value of covariance matrix versus its
E. Feature extraction                                                              index for CASIA 3D face database.
                                                                                       In Fig. 7 3D facial mesh of a sample picture from CASIA
   The features should be in such a way that for two different                     3D face database is shown. Fig. 10 shows reconstructed
persons, their pictures are clarified from each other but for                      picture of Fig. 7 using some different Eigen vector. The Figs.
© 2012 ACEEE                                                                   3
DOI: 01.IJCSI.03.01.70
ACEEE Int. J. on Control System and Instrumentation, Vol. 03, No. 01, Feb 2012


10-a to 10-d show reconstructed picture using 4, 8, 12 and 14                  The dist (Yki  Yk j ) is the Euclidean distance between two
Eigen vectors respectively. It is clear that when we use 14
Eigen vectors, Fig. 7 will be reconstructed completely.                        vectors of Y ki , Y k j

                                                                               F. Experimental results
                                                                                   The Experimental results are implemented on CASIA 3D
                                                                               which including 123 individuals in total. Each individual
                                                                               contains the variations of illuminations, expressions and
                                                                               poses, which are the main problems for depth modalities.
                                                                               The Experimental results shows that 7×7 window provides
                                                                               the highest rate of identification. Fig. 11 shows identification
                                                                               rate diagram in order of pictures numbers for different windows
                                                                               sizes. As shown in this graph for windows bigger than 7×7
                                                                               the identification rate is decreased. It means that more
                                                                               smoothing removes more features and information from
                                                                               pictures. In process with 12 training pictures the rate of
                                                                               identification respect to pose variation is 98%.
                                                                                   As shown in chapter (II), the (Y1 ,..., Y d ) are the features
  Fig. 9 : The Eigen value of covariance matrix versus its index
                                                                               vectors and the graph in Fig. 9 shows that the most probable
                                                                               information can be approach using limited features vectors.
                                                                               In process with d=14 the rate of identification respect to
                                                                               pose variation is 98%. As the features of pictures have same
                                                                               type of principle component, the best classification is the
                                                                               Euclidean distance. So, for testing and training of pictures
                                                                               this method was used. The database used in this method is
                                                                               CASIA 3D face database, containing of 4674 3d pictures. In
                                                                               this data base the pictures of 123 persons exist and for each
                                                                               person 38 pictures have been taken. All of these pictures
                                                                               have been divided to two training and testing categories.
                                                                               Table I shows the accuracy of system versus different
                                                                               numbers of training pictures. We validated our proposed
                                                                               method and compared it with existing methods using the
                                                                               CASIA 3D face database [13, 14]. Table II shows the
                                                                               recognition rate of our system in comparison with other
                                                                               methods.




E. Classification
    Euclidean distance is used for classification and obtaining
the level of similarity. The Euclidean distance between two
vectors can be obtained from Equation (14).
                          n
                                                  2
          d ( X ,Y )     ( X ( i )  Y ( i ))
                          i
                                                      .             (14)
In this Equation n is the numbers of X and Y vector component.                    Fig. 9: identification rate diagram in order of training pictures
While all the pictures exist in data base convert to 100×100                                    numbers for different windows sizes
and finally approach to 100×14 matrix. Therefore the entire                       TABLE I: THE SYSTEM ACCURACY VERSUS    DIFFERENT NUMBERS OF TRAINING
features vectors have the same size and it is possible to use                                                 PICTURES

Euclidean distance method. Assume the F  (Y1 ,..., Yd ) is
the features vectors and the features matrix is F. The similarity
and matching between Fi and Fj can be gotten from Equation
(15).
                d ( F i , F j )  dist(Yki  Yk j ) .       (15)

© 2012 ACEEE                                                               4
DOI: 01.IJCSI.03.01.70
ACEEE Int. J. on Control System and Instrumentation, Vol. 03, No. 01, Feb 2012

           TABLE II: T HE RECOGNITION RATE OF   THREE METHODS                                        REFERENCES
                                                                          [1] CASIA 3D face database, National Laboratory of Pattern
                                                                          Recognition, CASIA, P. O. Box 2728, Beijing, 100190, China
                                                                          [2] S. F. Galton, Numeralizaed profiles for classification and
                                                                          recognition, Nature 83, pp. 127-130, 31 March 1910.
                                                                          [3] Chenghua Xu, Stan Li, Tieniu Tan, Long Quan, Automatic 3D
                            CONCLUSION                                    face recognition from depth and intensity Gabor features, Science
                                                                          Direct, Pattern Recognition Journal, VOL 42 , doi:10.1016/j.patcog,
    In this paper a novel method was presented for automatic              2009.01.001.
face recognition using three dimensional pictures. At the first           [4] K. W. Bowyer, K. I. Chang, and P. J. Flynn, A survey of
step, 3D pictures were pre-processed and then pre-processed               approaches to three-dimensional face recognition, International
pictures were detected. Pictures of database contained some               Conference on Pattern Recognition, 1:358361, 2004.
additional areas such as neck and cloths. These parts didn’t              [5] B. Moreno, A. Sanchez, J. F. Velez, F. J. Diaz, Face recognition
                                                                          using 3D local geometrical features PCA vs. SVM, Proceedings of
have useful information and they had to be eliminated. After
                                                                          the 4th International Symposium on Image and Signal Processing
face detection, pictures were post-processed. In this stage               and Analysis, 2005.
some effective processing that had more effects on system                 [6] Thomas David Heseltine BSc. Hons, face recognition/ Two-
identification accuracy were done. Also some processes were               dimensional and three-dimensional techniques, Ph.D. Thesis, The
done that made identification system immune against face                  University of York, Department of Computer Science, September
expressions. By using a simple method, nose tips were                     2005.
obtained and they used as references. In the next stage each              [7] G. Gordon, Face recognition based on depth maps and surface
3D pictures were normalized to a 100×100 matrix and                       curvature. Geometric Methods in Computer Vision, SPIE 1570:1–
smoothing of face picture was done. In features extraction                12, July 1991.
                                                                          [8] Y. Lee, H. Song, U. Yang, H. Shin, K. Sohn, Local feature based
section for obtaining features two dimensional principle
                                                                          3D face recognition, International Conference on Audio- and Video
component analysis (2DPCA) was used and in classification                 based Biometric Person Authentication (AVBPA 2005), LNCS, vol.
stage Euclidean distance method was used. Finally                         3546, July 2005, pp. 909–918.
experimental results implemented on CASIA 3D face database                [9] A. B. Moreno, A. Sanchez, J. F. Velez, and F. J. Diaz., Face
showed our system t had a good immunity against face                      Recognition using 3D surface-extracted descriptors, In Proceedings
expressions. In this paper the best recognition rate is obtained          of the Irish Machine Vision & Image Processing Conference 2003
98% and it is accepted rather to other similarity methods                 (IMVIP’03), Ulster, 3-5 September 2003.
implemented on CASIA 3D face database. Combination of                     [10] K. I. Chang, K.W. Bowyer, and P. J. Flynn., An evaluation of
2D and 3D systems improve efficiency and the rate of face                 multi-modal 2d+3d face biometrics, IEEE Transactions on Pattern
                                                                          Analysis and Machine Intelligence (PAMI), 27(4):619–624, 2005.
detection systems, therefore combination of these two
                                                                          [11] Fatimah Khalid, Tengku Mohd. Tengku Sembok, Khairuddin
systems can be one of the futures works. Another future                   Omar, Face Recognition Using Local Geometrical Features – PCA
works that can be continued is working over the face occlusion            with Euclidean Classifier, 978-1-4244-2328-6/08/$25.00 © 2008
concept. To be able to work and study over the face coverage              IEEE.
concept, another case for future work can be a presentation               [12] N. Otsu, A threshold selection method from gray-level
for exact and accurate estimation of face rotation angle.                 histogram, IEEE Transactions on Systems, Man and Cybernetics,
                                                                          Vol.8, No.1, pp.62-66, 1979.
                                                                          [13] Yong-An Li, Yong-Jun Shen, Gui-Dong Zhang, Taohong Yuan,
                                                                          Xiu-Ji Xiao, An Efficient 3D Face Recognition Method Using
                                                                          Geometric Features, 978-1-4244-5874-5/10/$26.00 ©2010 IEEE.
                                                                          [14] Yue Ming, Qiuqi Ruan, Xueqiao Wang, Meiru Mu, Robust 3D
                                                                          Face Recognition using Learn Correlative Features, ICSP2010
                                                                          Proceedings, 978-1-4244-5900-1/10/$26.00 ©2010 IEEE.




© 2012 ACEEE                                                          5
DOI: 01.IJCSI.03.01.70

Contenu connexe

Tendances

COMPARATIVE STUDY OF DISTANCE METRICS FOR FINDING SKIN COLOR SIMILARITY OF TW...
COMPARATIVE STUDY OF DISTANCE METRICS FOR FINDING SKIN COLOR SIMILARITY OF TW...COMPARATIVE STUDY OF DISTANCE METRICS FOR FINDING SKIN COLOR SIMILARITY OF TW...
COMPARATIVE STUDY OF DISTANCE METRICS FOR FINDING SKIN COLOR SIMILARITY OF TW...cscpconf
 
Gait using moment with gray and
Gait using moment with gray andGait using moment with gray and
Gait using moment with gray andijsc
 
3D reconstruction by photogrammetry and 4D deformation measurement
3D reconstruction by photogrammetry and 4D deformation measurement3D reconstruction by photogrammetry and 4D deformation measurement
3D reconstruction by photogrammetry and 4D deformation measurementNational Cheng Kung University
 
Frequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality AssessmentFrequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality AssessmentCSCJournals
 
Automatic dominant region segmentation for natural images
Automatic dominant region segmentation for natural imagesAutomatic dominant region segmentation for natural images
Automatic dominant region segmentation for natural imagescsandit
 
Zernike moment of invariants for effective image retrieval using gaussian fil...
Zernike moment of invariants for effective image retrieval using gaussian fil...Zernike moment of invariants for effective image retrieval using gaussian fil...
Zernike moment of invariants for effective image retrieval using gaussian fil...IAEME Publication
 
Mislaid character analysis using 2-dimensional discrete wavelet transform for...
Mislaid character analysis using 2-dimensional discrete wavelet transform for...Mislaid character analysis using 2-dimensional discrete wavelet transform for...
Mislaid character analysis using 2-dimensional discrete wavelet transform for...IJMER
 
An interactive image segmentation using multiple user input’s
An interactive image segmentation using multiple user input’sAn interactive image segmentation using multiple user input’s
An interactive image segmentation using multiple user input’seSAT Publishing House
 
Comparative Analysis of Hand Gesture Recognition Techniques
Comparative Analysis of Hand Gesture Recognition TechniquesComparative Analysis of Hand Gesture Recognition Techniques
Comparative Analysis of Hand Gesture Recognition TechniquesIJERA Editor
 
Extended Fuzzy Hyperline Segment Neural Network for Fingerprint Recognition
Extended Fuzzy Hyperline Segment Neural Network for Fingerprint RecognitionExtended Fuzzy Hyperline Segment Neural Network for Fingerprint Recognition
Extended Fuzzy Hyperline Segment Neural Network for Fingerprint RecognitionCSCJournals
 
Paper id 252014130
Paper id 252014130Paper id 252014130
Paper id 252014130IJRAT
 

Tendances (16)

COMPARATIVE STUDY OF DISTANCE METRICS FOR FINDING SKIN COLOR SIMILARITY OF TW...
COMPARATIVE STUDY OF DISTANCE METRICS FOR FINDING SKIN COLOR SIMILARITY OF TW...COMPARATIVE STUDY OF DISTANCE METRICS FOR FINDING SKIN COLOR SIMILARITY OF TW...
COMPARATIVE STUDY OF DISTANCE METRICS FOR FINDING SKIN COLOR SIMILARITY OF TW...
 
20120140502012
2012014050201220120140502012
20120140502012
 
Ed34785790
Ed34785790Ed34785790
Ed34785790
 
Gait using moment with gray and
Gait using moment with gray andGait using moment with gray and
Gait using moment with gray and
 
3D reconstruction by photogrammetry and 4D deformation measurement
3D reconstruction by photogrammetry and 4D deformation measurement3D reconstruction by photogrammetry and 4D deformation measurement
3D reconstruction by photogrammetry and 4D deformation measurement
 
Frequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality AssessmentFrequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
 
Automatic dominant region segmentation for natural images
Automatic dominant region segmentation for natural imagesAutomatic dominant region segmentation for natural images
Automatic dominant region segmentation for natural images
 
Zernike moment of invariants for effective image retrieval using gaussian fil...
Zernike moment of invariants for effective image retrieval using gaussian fil...Zernike moment of invariants for effective image retrieval using gaussian fil...
Zernike moment of invariants for effective image retrieval using gaussian fil...
 
Mislaid character analysis using 2-dimensional discrete wavelet transform for...
Mislaid character analysis using 2-dimensional discrete wavelet transform for...Mislaid character analysis using 2-dimensional discrete wavelet transform for...
Mislaid character analysis using 2-dimensional discrete wavelet transform for...
 
PPT s06-machine vision-s2
PPT s06-machine vision-s2PPT s06-machine vision-s2
PPT s06-machine vision-s2
 
C044021013
C044021013C044021013
C044021013
 
An interactive image segmentation using multiple user input’s
An interactive image segmentation using multiple user input’sAn interactive image segmentation using multiple user input’s
An interactive image segmentation using multiple user input’s
 
Comparative Analysis of Hand Gesture Recognition Techniques
Comparative Analysis of Hand Gesture Recognition TechniquesComparative Analysis of Hand Gesture Recognition Techniques
Comparative Analysis of Hand Gesture Recognition Techniques
 
Extended Fuzzy Hyperline Segment Neural Network for Fingerprint Recognition
Extended Fuzzy Hyperline Segment Neural Network for Fingerprint RecognitionExtended Fuzzy Hyperline Segment Neural Network for Fingerprint Recognition
Extended Fuzzy Hyperline Segment Neural Network for Fingerprint Recognition
 
Shadow Detection Using MatLAB
Shadow Detection Using MatLABShadow Detection Using MatLAB
Shadow Detection Using MatLAB
 
Paper id 252014130
Paper id 252014130Paper id 252014130
Paper id 252014130
 

En vedette

A Fault-tolerant Switch for Next Generation Computer Networks
A Fault-tolerant Switch for Next Generation Computer NetworksA Fault-tolerant Switch for Next Generation Computer Networks
A Fault-tolerant Switch for Next Generation Computer NetworksIDES Editor
 
An Enhanced Inherited Crossover GA for the Reliability Constrained UC Problem
An Enhanced Inherited Crossover GA for the Reliability Constrained UC ProblemAn Enhanced Inherited Crossover GA for the Reliability Constrained UC Problem
An Enhanced Inherited Crossover GA for the Reliability Constrained UC ProblemIDES Editor
 
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETsA Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETsIDES Editor
 
SIR Analysis of Overloaded CDMA System Using Orthogonal Gold Codes
SIR Analysis of Overloaded CDMA System Using Orthogonal Gold CodesSIR Analysis of Overloaded CDMA System Using Orthogonal Gold Codes
SIR Analysis of Overloaded CDMA System Using Orthogonal Gold CodesIDES Editor
 
Aspect-Oriented Instrumentation for Capturing Task- Based Event Traces
Aspect-Oriented Instrumentation for Capturing Task- Based Event TracesAspect-Oriented Instrumentation for Capturing Task- Based Event Traces
Aspect-Oriented Instrumentation for Capturing Task- Based Event TracesIDES Editor
 
Wireless Vision based Real time Object Tracking System Using Template Matching
Wireless Vision based Real time Object Tracking System Using Template MatchingWireless Vision based Real time Object Tracking System Using Template Matching
Wireless Vision based Real time Object Tracking System Using Template MatchingIDES Editor
 
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...IDES Editor
 

En vedette (7)

A Fault-tolerant Switch for Next Generation Computer Networks
A Fault-tolerant Switch for Next Generation Computer NetworksA Fault-tolerant Switch for Next Generation Computer Networks
A Fault-tolerant Switch for Next Generation Computer Networks
 
An Enhanced Inherited Crossover GA for the Reliability Constrained UC Problem
An Enhanced Inherited Crossover GA for the Reliability Constrained UC ProblemAn Enhanced Inherited Crossover GA for the Reliability Constrained UC Problem
An Enhanced Inherited Crossover GA for the Reliability Constrained UC Problem
 
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETsA Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs
 
SIR Analysis of Overloaded CDMA System Using Orthogonal Gold Codes
SIR Analysis of Overloaded CDMA System Using Orthogonal Gold CodesSIR Analysis of Overloaded CDMA System Using Orthogonal Gold Codes
SIR Analysis of Overloaded CDMA System Using Orthogonal Gold Codes
 
Aspect-Oriented Instrumentation for Capturing Task- Based Event Traces
Aspect-Oriented Instrumentation for Capturing Task- Based Event TracesAspect-Oriented Instrumentation for Capturing Task- Based Event Traces
Aspect-Oriented Instrumentation for Capturing Task- Based Event Traces
 
Wireless Vision based Real time Object Tracking System Using Template Matching
Wireless Vision based Real time Object Tracking System Using Template MatchingWireless Vision based Real time Object Tracking System Using Template Matching
Wireless Vision based Real time Object Tracking System Using Template Matching
 
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
 

Similaire à 3D Face Recognition Method Using 2DPCAEuclidean Distance Classification

Image Quality Feature Based Detection Algorithm for Forgery in Images
Image Quality Feature Based Detection Algorithm for Forgery in Images  Image Quality Feature Based Detection Algorithm for Forgery in Images
Image Quality Feature Based Detection Algorithm for Forgery in Images ijcga
 
Face skin color based recognition using local spectral and gray scale features
Face skin color based recognition using local spectral and gray scale featuresFace skin color based recognition using local spectral and gray scale features
Face skin color based recognition using local spectral and gray scale featureseSAT Journals
 
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUESA STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUEScscpconf
 
AN ILLUMINATION INVARIANT FACE RECOGNITION USING 2D DISCRETE COSINE TRANSFORM...
AN ILLUMINATION INVARIANT FACE RECOGNITION USING 2D DISCRETE COSINE TRANSFORM...AN ILLUMINATION INVARIANT FACE RECOGNITION USING 2D DISCRETE COSINE TRANSFORM...
AN ILLUMINATION INVARIANT FACE RECOGNITION USING 2D DISCRETE COSINE TRANSFORM...ijcsit
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Face Detection for identification of people in Images of Internet
Face Detection for identification of people in Images of InternetFace Detection for identification of people in Images of Internet
Face Detection for identification of people in Images of Internetijceronline
 
Model Based Emotion Detection using Point Clouds
Model Based Emotion Detection using Point CloudsModel Based Emotion Detection using Point Clouds
Model Based Emotion Detection using Point CloudsLakshmi Sarvani Videla
 
Vision based non-invasive tool for facial swelling assessment
Vision based non-invasive tool for facial swelling assessment Vision based non-invasive tool for facial swelling assessment
Vision based non-invasive tool for facial swelling assessment University of Moratuwa
 
Automatic rectification of perspective distortion from a single image using p...
Automatic rectification of perspective distortion from a single image using p...Automatic rectification of perspective distortion from a single image using p...
Automatic rectification of perspective distortion from a single image using p...ijcsa
 
Enhanced Approach to Iris Normalization Using Circular Distribution for Iris ...
Enhanced Approach to Iris Normalization Using Circular Distribution for Iris ...Enhanced Approach to Iris Normalization Using Circular Distribution for Iris ...
Enhanced Approach to Iris Normalization Using Circular Distribution for Iris ...IJCSIS Research Publications
 
Multimodal Approach for Face Recognition using 3D-2D Face Feature Fusion
Multimodal Approach for Face Recognition using 3D-2D Face Feature FusionMultimodal Approach for Face Recognition using 3D-2D Face Feature Fusion
Multimodal Approach for Face Recognition using 3D-2D Face Feature FusionCSCJournals
 
Improving Performance of Texture Based Face Recognition Systems by Segmenting...
Improving Performance of Texture Based Face Recognition Systems by Segmenting...Improving Performance of Texture Based Face Recognition Systems by Segmenting...
Improving Performance of Texture Based Face Recognition Systems by Segmenting...IDES Editor
 
A Face Recognition Using Linear-Diagonal Binary Graph Pattern Feature Extract...
A Face Recognition Using Linear-Diagonal Binary Graph Pattern Feature Extract...A Face Recognition Using Linear-Diagonal Binary Graph Pattern Feature Extract...
A Face Recognition Using Linear-Diagonal Binary Graph Pattern Feature Extract...ijfcstjournal
 
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...ijfcstjournal
 
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...ijfcstjournal
 
Developing 3D Viewing Model from 2D Stereo Pair with its Occlusion Ratio
Developing 3D Viewing Model from 2D Stereo Pair with its Occlusion RatioDeveloping 3D Viewing Model from 2D Stereo Pair with its Occlusion Ratio
Developing 3D Viewing Model from 2D Stereo Pair with its Occlusion RatioCSCJournals
 

Similaire à 3D Face Recognition Method Using 2DPCAEuclidean Distance Classification (20)

Image Quality Feature Based Detection Algorithm for Forgery in Images
Image Quality Feature Based Detection Algorithm for Forgery in Images  Image Quality Feature Based Detection Algorithm for Forgery in Images
Image Quality Feature Based Detection Algorithm for Forgery in Images
 
Face skin color based recognition using local spectral and gray scale features
Face skin color based recognition using local spectral and gray scale featuresFace skin color based recognition using local spectral and gray scale features
Face skin color based recognition using local spectral and gray scale features
 
495Poster
495Poster495Poster
495Poster
 
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUESA STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
 
AN ILLUMINATION INVARIANT FACE RECOGNITION USING 2D DISCRETE COSINE TRANSFORM...
AN ILLUMINATION INVARIANT FACE RECOGNITION USING 2D DISCRETE COSINE TRANSFORM...AN ILLUMINATION INVARIANT FACE RECOGNITION USING 2D DISCRETE COSINE TRANSFORM...
AN ILLUMINATION INVARIANT FACE RECOGNITION USING 2D DISCRETE COSINE TRANSFORM...
 
Bb32351355
Bb32351355Bb32351355
Bb32351355
 
Ijcatr04041016
Ijcatr04041016Ijcatr04041016
Ijcatr04041016
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
366 369
366 369366 369
366 369
 
Face Detection for identification of people in Images of Internet
Face Detection for identification of people in Images of InternetFace Detection for identification of people in Images of Internet
Face Detection for identification of people in Images of Internet
 
Model Based Emotion Detection using Point Clouds
Model Based Emotion Detection using Point CloudsModel Based Emotion Detection using Point Clouds
Model Based Emotion Detection using Point Clouds
 
Vision based non-invasive tool for facial swelling assessment
Vision based non-invasive tool for facial swelling assessment Vision based non-invasive tool for facial swelling assessment
Vision based non-invasive tool for facial swelling assessment
 
Automatic rectification of perspective distortion from a single image using p...
Automatic rectification of perspective distortion from a single image using p...Automatic rectification of perspective distortion from a single image using p...
Automatic rectification of perspective distortion from a single image using p...
 
Enhanced Approach to Iris Normalization Using Circular Distribution for Iris ...
Enhanced Approach to Iris Normalization Using Circular Distribution for Iris ...Enhanced Approach to Iris Normalization Using Circular Distribution for Iris ...
Enhanced Approach to Iris Normalization Using Circular Distribution for Iris ...
 
Multimodal Approach for Face Recognition using 3D-2D Face Feature Fusion
Multimodal Approach for Face Recognition using 3D-2D Face Feature FusionMultimodal Approach for Face Recognition using 3D-2D Face Feature Fusion
Multimodal Approach for Face Recognition using 3D-2D Face Feature Fusion
 
Improving Performance of Texture Based Face Recognition Systems by Segmenting...
Improving Performance of Texture Based Face Recognition Systems by Segmenting...Improving Performance of Texture Based Face Recognition Systems by Segmenting...
Improving Performance of Texture Based Face Recognition Systems by Segmenting...
 
A Face Recognition Using Linear-Diagonal Binary Graph Pattern Feature Extract...
A Face Recognition Using Linear-Diagonal Binary Graph Pattern Feature Extract...A Face Recognition Using Linear-Diagonal Binary Graph Pattern Feature Extract...
A Face Recognition Using Linear-Diagonal Binary Graph Pattern Feature Extract...
 
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
 
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
 
Developing 3D Viewing Model from 2D Stereo Pair with its Occlusion Ratio
Developing 3D Viewing Model from 2D Stereo Pair with its Occlusion RatioDeveloping 3D Viewing Model from 2D Stereo Pair with its Occlusion Ratio
Developing 3D Viewing Model from 2D Stereo Pair with its Occlusion Ratio
 

Plus de IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

Plus de IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Dernier

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 

Dernier (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 

3D Face Recognition Method Using 2DPCAEuclidean Distance Classification

  • 1. ACEEE Int. J. on Control System and Instrumentation, Vol. 03, No. 01, Feb 2012 3D Face Recognition Method Using 2DPCA- Euclidean Distance Classification Yashar Taghizadegan1, Hassan Ghassemian2, and Mohammad Naser-Moghaddasi3 1,3 Department of Electrical Engineering, Science and Research Branch, Islamic Azad University, Tehran, Iran. Email: 1yashar.taghizadegan@gmail.com, 3mn.moghaddasi@srbiau.ac.ir 2 Department of Electrical and Computer Engineering, Tarbiat Modares University, Tehran, Iran. Email: ghassemi@modares.ac.ir Abstract— In this paper, we present a 3d face recognition method the ordered list of features according to the Fisher coefficients that is robust to changes in facial expressions. Instead of were used to represent faces in their face recognition locating many feature points, we just need to locate the nose experiments. The features offering better recognition results tip as a reference point. After finding this reference point, were angles and distances measurements. pictures are converted to a standard size. Two dimensional principle component analysis (2DPCA) is employed to obtain Chang et al. [10] proposed to use the principal component features Matrix vectors. Finally Euclidean distance method is analysis (PCA) for extracting the 3D facial appearance employed for classifying and comparison of the features. features, which achieved a promising recognition Experimental results implemented on CASIA 3D face database performance. After that, many appearance based features are which including 123 individuals in total, demonstrate that applied to improve the 3D face recognition results. our proposed method achieves up to 98% recognition accuracy Khalid et al. [11] presented a method using 53 features with respect to pose variation. extraction from 12 reference points. The local geometric features are calculated basically using Euclidean distance Index Terms— 3D Face recognition, depth information, features and angle measurement. vectors, two dimensional principle component analysis (2DPCA), Euclidean distance B. General overview of recommended method In this paper a novel algorithm for face recognition that is I. INTRODUCTION robust to changes in facial expressions (such as unhappy, Face recognition attempts, return to last century when wondering and…) will be presented. This method provides Galton [2] did first research to recognise face. Face recognition the face recognition with high level of speed and accuracy and identification have so many applications such as in police and deals with facial expressions. The experimental results department and security system to identity guilty people. 2D are performed on CASIA 3D face database. The block diagram face recognition system has some serious issues with light of suggested method is shown in Fig. 1. 3D sample pictures environment sensitivity, face expressions (such as happy, of CASIA 3D face database relates to different facial unhappy, wondering ...) and also turning of head. To remove expressions are shown in Fig. 2 these issues, using 3D pictures is suggested. The 3D systems are not sensitive to transformation, turning and light condition [3-6]. 3D pictures are the pictures that instead of light condition level of pixels, the deep information of pixels exist. A. Previous Works Researchers have employed different methods for automatic 3D face recognition. Some methods are based on the face curve analysis. Gordon [7] has presented a method based on algorithm using 3D curve face features. In Gordon’s method face is divided to three subdivision named: ridge and valley lines and then the location of nose, mouth, eyes, and other features which are used for recognition, specified. Lee et al [8] presented a method based on locating features of eight points on face and using supportive vector machine [SVM], get the 96% accuracy in face recognition. Database used by Lee, contains of 100 different pictures. In Lee’s method face features points are chosen manually and this can be one Fig. 2: normal (up-left)- Happy (up-right)- wondering (down-left)- of the issues of this method. Moreno et al. [9] employed a set unhappy (down-right) of eighty six features using a database of 420 3D range images, 7 images per each one of a set of 60 individuals. After the feature discriminating power analysis, the first 35 features of © 2012 ACEEE 1 DOI: 01.IJCSI.03.01. 70
  • 2. ACEEE Int. J. on Control System and Instrumentation, Vol. 03, No. 01, Feb 2012 II. OUR METHOD A. Face detection As shown in Fig. 3 unprocessed information of data contains some additional information like neck, ear, hair, and some parts of clothes which are not usable and should be deleted. In this paper thresholding method over the pictures depth coordination (Z) is used. This method is named Otsu [12]. The Z coordination of pictures is divided to the facial and non-facial information, FiFig. 4: The Fig. 3 after elimina- Fig. 3: The data of a picture and then Otsu algorithm specified the best estimation of before elimination of unused tion of unused points threshold border. All the information of threshold will be kept poi nts and unused information will be eliminated. B. Pre-processing Assumed p (i); i  1,2,..., I .are values of normalized 3D pictures are taken by laser camera, have spark noise histogram, including I levels. Assumed the value of I and also some holes in some areas of pictures. These holes (coordination info) are divided to C1 and C2 classes. The and noises reduce the recognition system accuracy. Median value of C1 is i=1 to k and C2 is i=k+1 to I. filter is used for eliminating spark noise, and interpolation is In this case, probabilities of happening for each class are used for filling the probable holes. In accordance of Fig. 3, X shown in Equation (1) and (2). variable change from 150 to 200 and Y from 100 to 200. These k limits for different pictures even for a person are not the c1 ( k )   P (i ) . i 1 (1) same, there for it is not possible to compare the pictures. For a meaningful comparison of pictures, the pictures should be I normalized to a 100×100 network. The limit of Z coordinate c2 ( k )   P (i ) . i  k 1 (2) as the depth of the pictures should be mapped in [0 255]. In the following, the complete explanation of this method will And also average i and variance  i2 of C1 and C2 classes be presented. are calculated in Equation (3) through (6). After face detection, the difference between max and min values of X & Y has been obtained and with 1/99 steps, is k sampled, the obtained pictures are mapped to a 100×100 net  1 ( k )   i. P ( i ) / c1 ( k ) . (3) i 1 and Fig. 5 is the result. In regarding of inequality in pictures depth information and different changes, it is necessary to I map the pictures depth info to a space between the 0 to 255  2 (k )   i.P(i) / c (k ) . i  k 1 2 (4) levels. The results have been shown in Fig. 6. C. Face borders and nose tip detection k  12 (k )   [i  1 (k )]2 .P(i ) / c1 (k ) . To obtain the face borders, minimize a 100×100 square (5) such as the corners of square touch the face corners. Result i 1 of this process has been shown in Fig.5 Final obtained I 100×100 square with the nose tip will be mapped in a 2  2 (k )   [i   2 (k )]2 .P(i ) / c2 (k ) . (6) 100×100 net. After detecting of face borders, regarding of i k 1 this fact that the nose tip has the highest height in the pictures, The best value of threshold T with recursive method is a simple method will provide the coordination of nose tip by specified in a way, for all K values from 1 to I the variance this way: pictures will be scanned with a 3×3 window and 2 sum of all points inside and below the 3×3 window will be of  w minimized. obtained, the largest number in these data is the nose tip. For  w (k )  c1 (k ). 12 (k )  c2 (k ). 2 (k ) . 2 2 (7) some pictures the depth of chin is more than nose, so in this kind of pictures, to prevent wrong nose info, the method will Fig. 3 shows the data of a picture used in Cartesian accept just the points in the central areas of pictures. In other coordination presentation and Fig.4 shows the final picture word, if an obtained point as nose centre point, is locates up with elimination of unused points. or down of the picture, it means that this point is not the nose tip and the next maximum point should be regarded as the nose tip. It is necessary to continue this procedure to approach as much as possible to the centre of picture. Finally the nose tip should be placed in centre of picture as shown in Fig.6. © 2012 ACEEE 2 DOI: 01.IJCSI.03.01.70
  • 3. ACEEE Int. J. on Control System and Instrumentation, Vol. 03, No. 01, Feb 2012 one person, different pictures contain same information. By using Two Dimensional Principle Component Analysis (2DPCA), the features of pictures have been obtained. The normalized pictures are named A1 , A2 ,..., AM , the size of each Ai assumed n×n. The average of pictures A1 through AM is defined in Equation (9). M 1 A  M  i 1 Ai . (9) Fig. 6: The final picture after Fig. 5: The picture showing obtained borders of the face The covariance matrix of M picture will be gotten from pre-processing Equation (10). D. Face Smoothing 1 M T Face smoothing converts face curves to a smooth and C  M  i 1 ( Ai  A ) ( Ai  A ) . (10) soft surface and removes the facial expressions. By this way, In Equation (10), T is the transpose matrix. The covariance before processing the information, the facial expressions will matrix has n Eigen value and correspond n Eigen vectors. be eliminated. In this paper, minimum square error method is These n Eigen values stored descending and the numbers of used for minimizing the errors between input pictures and Eigen vector (d) correspond with d as the largest Eigen value final smoothed picture. For this case variance of input picture in n×d matrix. A is assumed as one of the input pictures. In is calculated and then entire picture matrix is scanned by this case the features vector of picture will be define as using a window with p×q size. Scanning of matrix is started Equation (11) from up and left side and element by element. In each scan the element of window centre will be changed by Equation Y  A. X . (11) (8). For each window, local average value and variance is In Equation (11), X is a n×d matrix and the first column of calculated. this matrix relates to the biggest Eigen value, the second column corresponds to the second biggest number and so  2 ,q   n2 p on. Finally the dth column corresponds to the largest Eigen s (i , j )   p , q  ( I ( i , j )   p ,q ) . (8) value of covariance matrix. In Equation. (11) the number of d  2 ,q p should be calculated such a way that the face picture is In Equation (8), p,q , is average value and  p ,q is depth value 2 recoverable from Eigen value matrix of Y. and vector of X, and also d should be obtained such a way that the recognition 2 variance matched with p×q size window.  n Is the variance rate is a desirable value. In this identification system with d=14, the identification rate is maximum. Although, the d of noise, I (i, j ) and S (i , j ) are the primary and the value can be from 1 to 100, it is clear that with d=14 the size normalized pictures. of features matrix will be reduced from 100×100 to 100×14. The scanned window size specifies the level of So small matrix creates a high processing speed and a good smoothing. A bigger window will causes more smoothing combination between accuracy and speed will be approach level, but the level of smoothing should not be in a way that with d=14. Improved value of d can be obtained using the features and important information of picture be removed. Equation (12). Fig. 7 shows an unsmooth picture from CASIA 3D face 100 100 database and Fig. 8 shows the same picture after smoothing. 1 ~ 2 e  1000   [A(i, j)  A d (i, j)]  Fig. 7 shows a smiley face but in Fig. 8 the smile is removed i 1 j 1 from picture. 1 100 100 . (12) 0.02 [ 10000   i 1 j 1 A(i, j) ] ~ In this Equation Ad is the obtained processed picture using d to Eigen values corresponding with d to the largest Eigen values. The lowest value of d in Equation (12) can be a good value for a low rate fault and good improved picture. Calcula- tion of d for CASIA 3D face database is 14 and the processed picture will be obtained from Equation (13). ~ Fig. 8: The Fig. 7 after smoothing Fig. 7: An unsmooth picture Ad  YxTranspose( X ) . (13) from CASIA 3D face database Fig.9 shows the Eigen value of covariance matrix versus its E. Feature extraction index for CASIA 3D face database. In Fig. 7 3D facial mesh of a sample picture from CASIA The features should be in such a way that for two different 3D face database is shown. Fig. 10 shows reconstructed persons, their pictures are clarified from each other but for picture of Fig. 7 using some different Eigen vector. The Figs. © 2012 ACEEE 3 DOI: 01.IJCSI.03.01.70
  • 4. ACEEE Int. J. on Control System and Instrumentation, Vol. 03, No. 01, Feb 2012 10-a to 10-d show reconstructed picture using 4, 8, 12 and 14 The dist (Yki  Yk j ) is the Euclidean distance between two Eigen vectors respectively. It is clear that when we use 14 Eigen vectors, Fig. 7 will be reconstructed completely. vectors of Y ki , Y k j F. Experimental results The Experimental results are implemented on CASIA 3D which including 123 individuals in total. Each individual contains the variations of illuminations, expressions and poses, which are the main problems for depth modalities. The Experimental results shows that 7×7 window provides the highest rate of identification. Fig. 11 shows identification rate diagram in order of pictures numbers for different windows sizes. As shown in this graph for windows bigger than 7×7 the identification rate is decreased. It means that more smoothing removes more features and information from pictures. In process with 12 training pictures the rate of identification respect to pose variation is 98%. As shown in chapter (II), the (Y1 ,..., Y d ) are the features Fig. 9 : The Eigen value of covariance matrix versus its index vectors and the graph in Fig. 9 shows that the most probable information can be approach using limited features vectors. In process with d=14 the rate of identification respect to pose variation is 98%. As the features of pictures have same type of principle component, the best classification is the Euclidean distance. So, for testing and training of pictures this method was used. The database used in this method is CASIA 3D face database, containing of 4674 3d pictures. In this data base the pictures of 123 persons exist and for each person 38 pictures have been taken. All of these pictures have been divided to two training and testing categories. Table I shows the accuracy of system versus different numbers of training pictures. We validated our proposed method and compared it with existing methods using the CASIA 3D face database [13, 14]. Table II shows the recognition rate of our system in comparison with other methods. E. Classification Euclidean distance is used for classification and obtaining the level of similarity. The Euclidean distance between two vectors can be obtained from Equation (14). n 2 d ( X ,Y )   ( X ( i )  Y ( i )) i . (14) In this Equation n is the numbers of X and Y vector component. Fig. 9: identification rate diagram in order of training pictures While all the pictures exist in data base convert to 100×100 numbers for different windows sizes and finally approach to 100×14 matrix. Therefore the entire TABLE I: THE SYSTEM ACCURACY VERSUS DIFFERENT NUMBERS OF TRAINING features vectors have the same size and it is possible to use PICTURES Euclidean distance method. Assume the F  (Y1 ,..., Yd ) is the features vectors and the features matrix is F. The similarity and matching between Fi and Fj can be gotten from Equation (15). d ( F i , F j )  dist(Yki  Yk j ) . (15) © 2012 ACEEE 4 DOI: 01.IJCSI.03.01.70
  • 5. ACEEE Int. J. on Control System and Instrumentation, Vol. 03, No. 01, Feb 2012 TABLE II: T HE RECOGNITION RATE OF THREE METHODS REFERENCES [1] CASIA 3D face database, National Laboratory of Pattern Recognition, CASIA, P. O. Box 2728, Beijing, 100190, China [2] S. F. Galton, Numeralizaed profiles for classification and recognition, Nature 83, pp. 127-130, 31 March 1910. [3] Chenghua Xu, Stan Li, Tieniu Tan, Long Quan, Automatic 3D CONCLUSION face recognition from depth and intensity Gabor features, Science Direct, Pattern Recognition Journal, VOL 42 , doi:10.1016/j.patcog, In this paper a novel method was presented for automatic 2009.01.001. face recognition using three dimensional pictures. At the first [4] K. W. Bowyer, K. I. Chang, and P. J. Flynn, A survey of step, 3D pictures were pre-processed and then pre-processed approaches to three-dimensional face recognition, International pictures were detected. Pictures of database contained some Conference on Pattern Recognition, 1:358361, 2004. additional areas such as neck and cloths. These parts didn’t [5] B. Moreno, A. Sanchez, J. F. Velez, F. J. Diaz, Face recognition using 3D local geometrical features PCA vs. SVM, Proceedings of have useful information and they had to be eliminated. After the 4th International Symposium on Image and Signal Processing face detection, pictures were post-processed. In this stage and Analysis, 2005. some effective processing that had more effects on system [6] Thomas David Heseltine BSc. Hons, face recognition/ Two- identification accuracy were done. Also some processes were dimensional and three-dimensional techniques, Ph.D. Thesis, The done that made identification system immune against face University of York, Department of Computer Science, September expressions. By using a simple method, nose tips were 2005. obtained and they used as references. In the next stage each [7] G. Gordon, Face recognition based on depth maps and surface 3D pictures were normalized to a 100×100 matrix and curvature. Geometric Methods in Computer Vision, SPIE 1570:1– smoothing of face picture was done. In features extraction 12, July 1991. [8] Y. Lee, H. Song, U. Yang, H. Shin, K. Sohn, Local feature based section for obtaining features two dimensional principle 3D face recognition, International Conference on Audio- and Video component analysis (2DPCA) was used and in classification based Biometric Person Authentication (AVBPA 2005), LNCS, vol. stage Euclidean distance method was used. Finally 3546, July 2005, pp. 909–918. experimental results implemented on CASIA 3D face database [9] A. B. Moreno, A. Sanchez, J. F. Velez, and F. J. Diaz., Face showed our system t had a good immunity against face Recognition using 3D surface-extracted descriptors, In Proceedings expressions. In this paper the best recognition rate is obtained of the Irish Machine Vision & Image Processing Conference 2003 98% and it is accepted rather to other similarity methods (IMVIP’03), Ulster, 3-5 September 2003. implemented on CASIA 3D face database. Combination of [10] K. I. Chang, K.W. Bowyer, and P. J. Flynn., An evaluation of 2D and 3D systems improve efficiency and the rate of face multi-modal 2d+3d face biometrics, IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI), 27(4):619–624, 2005. detection systems, therefore combination of these two [11] Fatimah Khalid, Tengku Mohd. Tengku Sembok, Khairuddin systems can be one of the futures works. Another future Omar, Face Recognition Using Local Geometrical Features – PCA works that can be continued is working over the face occlusion with Euclidean Classifier, 978-1-4244-2328-6/08/$25.00 © 2008 concept. To be able to work and study over the face coverage IEEE. concept, another case for future work can be a presentation [12] N. Otsu, A threshold selection method from gray-level for exact and accurate estimation of face rotation angle. histogram, IEEE Transactions on Systems, Man and Cybernetics, Vol.8, No.1, pp.62-66, 1979. [13] Yong-An Li, Yong-Jun Shen, Gui-Dong Zhang, Taohong Yuan, Xiu-Ji Xiao, An Efficient 3D Face Recognition Method Using Geometric Features, 978-1-4244-5874-5/10/$26.00 ©2010 IEEE. [14] Yue Ming, Qiuqi Ruan, Xueqiao Wang, Meiru Mu, Robust 3D Face Recognition using Learn Correlative Features, ICSP2010 Proceedings, 978-1-4244-5900-1/10/$26.00 ©2010 IEEE. © 2012 ACEEE 5 DOI: 01.IJCSI.03.01.70