SlideShare a Scribd company logo
International Journal of Engineering Science Invention
ISSN (Online): 2319 – 6734, ISSN (Print): 2319 – 6726
www.ijesi.org ||Volume 5 Issue 1|| January 2016 || PP.44-50
www.ijesi.org 44 | Page
Face Recognition System Using Local Ternary Pattern
and Signed Number Multiplication
Nishatbanu Nayakwadi1
, Mohammed Jameel Hashmi2
1
M.Tech student ,Mazoon University College, Muscat, Sultanate of Oman.
2
HOD CS & IT Dept. Mazoon University College, Muscat, Sultanate of Oman.
ABSTRACT: This paper presents a novel approach to face recognition. The task of face recognition is to
verify a claimed identity by comparing a claimed image of the individual with other images belonging to the
same individual/other individual in a database. The proposed method utilizes Local Ternary Pattern and signed
bit multiplication to extract local features of a face. The image is divided into small non-overlapping windows.
Processing is carried out on these windows to extract features. Test image’s features are compared with all the
training images using Euclidean's distance. The image with lowest Euclidean distance is recognized as the true
face image. If the distance between test and all training images is more than threshold then test image is
considered as unrecognised image or match not found .The face recognition rate of proposed system is
calculated by varying the number of images per person in training database.
KEYWORDS: Face Recognition, Face Recognition rate, Euclidean's distance, Local Ternary Pattern, Sign
Bit Multiplication.
I. INTRODUCTION
Face recognition is a task which human can perform effortlessly but it is extremely difficult for
machines. Over the last few decades the face recognition technology is extremely popular area of research.
Comparing with other biometrics, the most superiority of face biometric is its non-intrusive nature. One more
advantage is that image can be taken from a long distance which is not possible in other bio metric approaches.
Therefore Face Recognition (FR) Technology is one of the fastest growing biometric fields [1].
Identification and verification are two main tasks of face recognition system. In identification task the
test image (unknown face) of a person is compared with all the images in train (known faces) database. The
verification task performs acceptance or denial of claimed identity. The goal of verification is to find whether
the given two images are of same person or not. Developing a precise face recognition system is a difficult task
because faces are complex, multidimensional and susceptible to changes with time and environment. It becomes
still more challenging if a person is in disguise.
In this research paper we are proposing a naval method to recognize faces .Using Local ternary pattern,
signed number multiplication feature extraction is done. Euclidean classifier is used to recognise the test image.
This approach gives high face recognition rate. It also provides least difference between intra class and
maximum difference between inter class. Face recognition system is used in numerous applications such as bank
card identification, mug shorts searching, security monitoring and surveillance. It is also used in immigration,
election commission and counter terrorism etc.
This paper is organized as follows. Section II discusses face recognition approaches. Section III
discusses the proposed method. Section IV discusses the feature extraction. Section V discusses recognition of
face using Euclidean classifier. Section VI presents the experimental results on applying our methodology to
standard database. Section VII presents the face recognition rate of proposed system. Section VIII presents the
face recognition rate compared to other approaches. Finally section IX presents main conclusions of this work.
II. LITERATURE REVIEW
Face recognition approaches on still images is broadly grouped into two categories: Holistic and
feature based. In feature based method geometric characteristics of faces are compared like shape of eyes, nose,
chin and mouth etc [2]. In Holistic approach Global features of input facial image is extracted. The Linear
discriminant analysis (LDA), Eigen-face is examples for holistic approach. The short coming of Principal
Component Analysis (PCA) [3] and Independent Component Analysis (ICA) [4] is that they are very sensitive
Face Recognition System Using Local Ternary…
www.ijesi.org 45 | Page
to changes in illumination which yields poor recognition rate. Gabor filter method is quite expensive. The Local
Binary Pattern (LBP) [5] used for face recognition has robust performance even in uncontrolled environment. In
LBP for each window size is 3X3, the central pixel is considered as threshold the neighbouring eight pixels
gives binary code. It’s very simple to implement LBP but very sensitive to noise and illumination change and
gives wrong code.
III. PROPOSED METHOD
This paper proposes a navel method for extraction of features using Local Ternary Pattern (LTP) and
signed bit multiplication, which uses central pixel for feature computation. The extracted features are main
component of the initial set of learning images (training set).Once the features of test images are extracted, the
image is classified by comparing its feature vector with other train vectors in database using Euclidean
classifier. If the minimum Euclidean distance of test image is more than threshold that means test image is not
present in train database and displayed as match not found otherwise the train image which has minimum
Euclidean distance is displayed as recognised image. Even in the presence of occlusion, pose variation,
expression and illumination change face recognition technique should provide good recognition rate. The
advantage of this approach is over other face recognition system is its simplicity, speed and sensitivity to small
or gradual changes on face. The workflow process of face recognition system is shown in Fig. 1.
Figure 1: Workflow process of face recognition system
IV. FEATURE EXTRACTION
Local Ternary Pattern (LTP) [6] and Booth's algorithm is used to extract features of an image. Either
we can use colour images or gray scale images .We used the ORL face database. It consists of 400 images. Each
image is of size 112X92, with 40 classes and each class has 10 images. The training database contains 225
images of 25 persons (9 images per person); a test database has 30 images different persons (25 known and 5
unknown). The images were taken at different times, lighting and facial expression. The faces are in upright
position in frontal view, with slight left or right rotation. Each image is cropped to size of 90×90 before
extracting features. Now each image is divided into 3×3 non overlapping windows. So now each image has 900
windows. LTP code is applied to each window. Let the micro pattern for 3×3 window be as shown in Fig. 2
having 9 different intensities. LTP uses threshold constant to threshold pixels into 3 values. Let t be the
threshold constant. The gray values in a zone of width ±t around the central pixel are quantized to zero, the one
above is quantized to +1 and the one below are quantised to -1
Face Recognition System Using Local Ternary…
www.ijesi.org 46 | Page
𝑆 =
𝐼0 𝐼7 𝐼6
𝐼1 𝐼𝐶 𝐼5
𝐼2 𝐼3 𝐼4
Figure 2: Micro gray scale 3× 3 pattern
𝑠′
𝑖 𝑝, 𝑖 𝑐 =
+1, 𝑖 𝑝 ≥ 𝑖 𝑐 + 𝑡,
0, 𝑖 𝑝 − 𝑖 𝑐 < 𝑡,
−1 , 𝑖 𝑝 ≤ 𝑖 𝑐 − 𝑡,
(1)
Where 𝑖 𝑝 is the neighbouring pixel with P ranging from 0 to 7. 𝑖 𝑐 is the Central pixel value, 𝑡 is the threshold
value ranges from 3 to 10. We have selected the threshold value t as 0.Here we find face as a smooth structure
and choosing wrong values may lead to loss of information. So the equation 1 is modified as below
𝑠′
𝑖 𝑝, 𝑖 𝑐 =
+1, 𝑖 𝑝 > 𝑖 𝑐 ,
0, 𝑖 𝑝 = 𝑖 𝑐,
−1, 𝑖 𝑝 < 𝑖 𝑐 ,
(2)
Consider micro pattern as shown in Fig. 3
90 95 80
75 82 82
255 100 60
→
+1 +1 −1
−1 0 0
+1 +1 −1
Intensity Values in corresponding LTP
3X3 window code
Figure 3: Illustration of the basic LTP operator.
If any of the texture pattern the central pixel information is not considered, we lose some of the information.
The central pixel is 82 in the above example is taken as multiplicand. The values +1,-1, +1, +1,-1, 0,-1 and
+1are considered as recode multipliers of Booth's algorithm. After multiplication the result gives the feature
vector for one 3×3 window. In each image there are 900 windows, so the each image will result in feature vector
of size 900.
The Booth's algorithm is used for signed bit multiplication .In 1959 this coding scheme was invented
by Andrew Donald Booth. It is explained in detail with the following example [7]. Consider N-bit multiplier x.
If x is negative number represent it in 2's compliment form. In multiplier include the implicit least significant bit
i.e. x-1=0. For each bit of xi, for i running from 0 to N-1.Depending on the adjacent bits of x operations are
performed. If xi and xi-1 are equal the product (A and Q) are shifted right by one bit. If xi=0 and xi-1=1, then add
2's compliment of multiplicand to A and shift the product right by one bit. If xi=1 and xi-1=0, then add
multiplicand to A and shift product right by one bit.
Let x=10112 be multiplier representing -5 in 2's compliment form .Assume implied zero as least significant bit.
The number now becomes
1 0 1 1 0 Multiplier with implied 0
-1 +1 0 -1 Recoded multiplier bits
Let multiplicand be 6. Now 6×-5=30, x=1011, M=0110, -M=1010
10112×01102=111000102
TABLE I: Booth's Multiplication table for 6×-5=-30
Step A Q Q-1
Recoded
multiplier
M= 0110 Action
Initial 0000 1011 0
1 1010
1101
1011
0101
1
1
-1 A=A-M
shift right
2 1110 1010 1 0 shift right
3 0100
0010
1010
0101
1
0
+1 A=A+M
shift right
4 1100
1110
0101
0010
1
1
-1 A=A-M
shift right
111000102=-30, in 2's compliment form.
Local ternary pattern and Booth's algorithm together are used to extract features in face recognition. There are
225 images in train data base. We generate feature vector for all these images.
Face Recognition System Using Local Ternary…
www.ijesi.org 47 | Page
V. RECOGNITION OF FACE USING EUCLIDEAN CLASSIFIER
The last step is the classification of testing image. The testing image is converted into a vector using
LTP and Booth's algorithm .If A and B are two vectors of length N, the Euclidean distance between them
calculated using Euclidean distance as follows.
Euclidean distance:
d (A, B) = (𝑎𝑁
𝑖=1 i-bi)2
= A − B (3)
If minimum distance between test and training faces is higher than thresh hold the test face is considered as
unknown, else recognised image is displayed. It is very important to set the value threshold in program, if there
is no threshold value the unknown image is displayed as one of the known images in database. Therefore it is
necessary to set value of threshold in program. In the literature, there is no formula to set value of threshold. The
most commonly method is first calculate minimum distance of each test image from all training images place
that in a vector raster. Now threshold is taken as 0.8 times of maximum value of raster.
Threshold=0.8*max (raster) (4)
VI. EXPERIMENTAL RESULTS
The experiment is performed using ORL images of database using MATLAB. The training database
contains 25X9=225 images of 25 persons (9 images per person). A test database consists of 30 images of
persons out of which 25 are known and 5 are unknown. All the images are of dimensions of 112×92 size in jpg
form and in an upright frontal position. All the images are of Gray scale however we can use colour database
also. Some pictures from ORL data base are shown in Fig. 4
Figure 4: Some of face images from ORL system
The Test image number of a person is given as input to the program. The program will compare test image with
all the training images. The image with lowest Euclidean distance is displayed as recognised face if the
minimum Euclidean distance is less than threshold; otherwise it is displayed as unknown image.
Figure 5: GUI of face recognition system
Face Recognition System Using Local Ternary…
www.ijesi.org 48 | Page
The first test is done for image number 5 which is present in training database. The Euclidean distance between
test image and all the images in training data base is given in Fig. 6.The test image has minimum Euclidean
distance less than threshold, so it is a known image. The Euclidean distance is minimum for training image
number 43 as shown in Fig. 6.This means that test image corresponds to image number 43 from training data
base and it is displayed in Fig. 5.
Figure 6: Euclidean distance of known test image from training database
The second test image number is 8 which is also present in database but with different expression as in Fig. 7.
This also has minimum Euclidean distance less than threshold, therefore it is also a known image. The Fig. 8
shows the Euclidean distance of test image from the other images of training data base. The distance is
minimum for image number 67 in training data base and that is displayed in Fig. 7.
Figure 7: Recognised face with different expression
Figure 8: Euclidean distance of known test image from training database
Face Recognition System Using Local Ternary…
www.ijesi.org 49 | Page
The third test image is unknown image i.e. it is not present in train data base. The minimum Euclidean
distance for this image greater than threshold as shown in Fig. 10. Therefore it is unknown face as shown in
image in Fig. 9.
Figure 9: Image of unknown person
Figure 10: Euclidean distance of unknown test image from the training database.
VII. FACE RECOGNITION RATE OF PROPOSED METHOD
We have conducted experiment using ORL database of 400 images . It gives face recognition rate of
90% as shown in Fig.11. The face recognition rate shows how many test images correctly match with the
training images. It specifies the accuracy of face recognition system. In general only few images of person are
available in training database, so it is necessary to note the effect of number of images per person on face
recognition rate.
Figure 11: Face recognition rate Vs number of training images per person
Face Recognition System Using Local Ternary…
www.ijesi.org 50 | Page
If the number of images per person is 1 the face recognition rate is 50%. As the number of images in training
database increases the recognition rate increases. If the images per person in training data base are 6 or more
than that the face recognition rate is 90%
VIII. COMPARISION WITH RELATED APPROACHES
Arindam Kar et.al have used PCA and have obtained the accuracy of 80.5[8], have reported the
recognition rate on ORL database as 80.5% and with Independent Component Analysis (ICA) as 85%. Arindam
Kar et. al [9] in another work have reported the recognition rate with Principle Component Analysis as 82.86%.
Nisar et.al [10] have reported recognition rate of 63% on Locally Preserving Projection (LPP). In this approach
we can obtain face recognition rate of 90%, if the number of training images per person is more than or equal to
6.The face recognition of related works is compared with the proposed method and it is shown in Chart 1.
Chart 1: Comparison of related approaches
IX. CONCLUSION
This paper presents new local texture descriptor using Local ternary pattern and signed bit
multiplication for robust face recognition. The proposed is very efficient as it uses less number of features. The
approach is efficient even images have variation in illumination, pose and expression. Pre processing on data set
is not done which could improve performance. It is absolutely clear that compared to other work done the
proposed system has high face recognition rate and it is more efficient. The proposed approach is limited to the
images of human faces of vertical frontal views.
X. Acknowledgements
Our sincere thanks to Dr. Juma Saleh Al-Ghailani, Managing Director, Dr. Jamal Dawood Salman, Dean, and Mr. Jameel Mohamed
Hashmi, HOD of CS & IT Dept. Mazoon University College, Muscat for having provided the opportunity to carry out this article. We deem
it a great privilege to offer our sincere thanks to the Research and Development Center, Mazoon University College, Muscat for their
constant encouragement and support.
REFERENCES
[1] Pentland, Alex, and Tanzeem Choudhury. "Face recognition for smart environments." Computer 33.2 (2000): 50-55.
[2] Abdullah, M. Hanmandlu, and M. F. Azeem. "A novel LBP fuzzy feature extraction method for face recognition." India
Conference (INDICON), 2013 Annual IEEE. IEEE, 2013.
[3] Rencher, Alvin C. "Principal component analysis." Methods of Multivariate Analysis, Second Edition (2002): 380-407.
[4] Hyvärinen, Aapo, and Erkki Oja. "Independent component analysis by general nonlinear Hebbian-like learning rules." Signal
Processing 64.3 (1998): 301-313.
[5] Gubbi, Abdullah, Mohammad Fazle Azeem, and M. Sharmila Kumari. "Non Binary Local Gradient Contours for Face
Recognition." arXiv preprint arXiv: 1411.0442 (2014).
[6] Jia, Xiaofei, et al. "Multi-scale block local ternary patterns for fingerprints vitality detection." Biometrics (ICB), 2013
International Conference on. IEEE, 2013.
[7] Besli, Nurettin, and R. G. Deshmukh. "A novel redundant binary signed-digit (RBSD) Booth's encoding." Southeast on, 2002.
Proceedings IEEE. IEEE, 2002.
[8] Gubbi,Abdullah, Mohammed Fazle Azeem, and Zahid Ansari. "New Fuzzy LBP Features for Face Recognition." arXiv preprint
arXiv: 1509.06853 (2015).
[9] Kar, Arindam, et al. "A Face Recognition approach based on entropy estimate of the nonlinear DCT features in the Logarithm
Domain together with Kernel Entropy Component Analysis." arXiv preprint arXiv:1312.1520(2013).
[10] Hundewale, Nisar. "Face recognition using combined global local preserving projections and compared with various
methods." International Journal of Scientific & Engineering Research 3.3 (2012).

More Related Content

PDF
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
PDF
SYMMETRICAL WEIGHTED SUBSPACE HOLISTIC APPROACH FOR EXPRESSION RECOGNITION
PDF
Face detection using the 3 x3 block rank patterns of gradient magnitude images
PDF
Medoid based model for face recognition using eigen and fisher faces
PDF
J01116164
PDF
Face Recognition on Linear Motion-blurred Image
PDF
Facial Expression Recognition
PDF
Volume 2-issue-6-2108-2113
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
SYMMETRICAL WEIGHTED SUBSPACE HOLISTIC APPROACH FOR EXPRESSION RECOGNITION
Face detection using the 3 x3 block rank patterns of gradient magnitude images
Medoid based model for face recognition using eigen and fisher faces
J01116164
Face Recognition on Linear Motion-blurred Image
Facial Expression Recognition
Volume 2-issue-6-2108-2113

What's hot (18)

PDF
NEURAL NETWORK BASED SUPERVISED SELF ORGANIZING MAPS FOR FACE RECOGNITION
PPTX
Recognition of Partially Occluded Face Using Gradientface and Local Binary Pa...
PPTX
Predicting Emotions through Facial Expressions
PDF
Facial expression recongnition Techniques, Database and Classifiers
PDF
Happiness Expression Recognition at Different Age Conditions
PDF
Facial expression recognition
PDF
Facial expression recognition using pca and gabor with jaffe database 11748
PDF
Recognition of Facial Expressions using Local Binary Patterns of Important Fa...
PDF
Multimodal Approach for Face Recognition using 3D-2D Face Feature Fusion
PDF
A Novel Mathematical Based Method for Generating Virtual Samples from a Front...
PDF
Face Emotion Analysis Using Gabor Features In Image Database for Crime Invest...
PPTX
Face Recognition
PDF
LITERATURE SURVEY ON SPARSE REPRESENTATION FOR NEURAL NETWORK BASED FACE DETE...
PDF
OBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONS
PDF
A Study on Face Recognition Technique based on Eigenface
PDF
Hierarchical Approach for Total Variation Digital Image Inpainting
PDF
HVDLP : HORIZONTAL VERTICAL DIAGONAL LOCAL PATTERN BASED FACE RECOGNITION
PDF
A novel approach for performance parameter estimation of face recognition bas...
NEURAL NETWORK BASED SUPERVISED SELF ORGANIZING MAPS FOR FACE RECOGNITION
Recognition of Partially Occluded Face Using Gradientface and Local Binary Pa...
Predicting Emotions through Facial Expressions
Facial expression recongnition Techniques, Database and Classifiers
Happiness Expression Recognition at Different Age Conditions
Facial expression recognition
Facial expression recognition using pca and gabor with jaffe database 11748
Recognition of Facial Expressions using Local Binary Patterns of Important Fa...
Multimodal Approach for Face Recognition using 3D-2D Face Feature Fusion
A Novel Mathematical Based Method for Generating Virtual Samples from a Front...
Face Emotion Analysis Using Gabor Features In Image Database for Crime Invest...
Face Recognition
LITERATURE SURVEY ON SPARSE REPRESENTATION FOR NEURAL NETWORK BASED FACE DETE...
OBJECT SEGMENTATION USING MULTISCALE MORPHOLOGICAL OPERATIONS
A Study on Face Recognition Technique based on Eigenface
Hierarchical Approach for Total Variation Digital Image Inpainting
HVDLP : HORIZONTAL VERTICAL DIAGONAL LOCAL PATTERN BASED FACE RECOGNITION
A novel approach for performance parameter estimation of face recognition bas...
Ad

Viewers also liked (20)

PDF
E-Voting and Credible Elections in Nigeria
PDF
Middle Range Theories as Coherent Intellectual Frameworks
PDF
The Case for Developing and Introducing the M-Procurement System in Nigeria, ...
PDF
Comparison of Supercritical Fluid Extraction with Steam Distillation for the ...
PDF
Studies on Small Hydro-Power Potentials of Itapaji Dam in Ekiti State, Nigeria.
PPTX
Conocimiento de la Entidad
PDF
Approaches to Administrative Leadership
PDF
Design and Fabrication of a Recreational Human-Powered Vehicle
PDF
Multi-Mode Conceptual Clustering Algorithm Based Social Group Identification ...
PDF
New binary memristor crossbar architecture based neural networks for speech r...
PDF
Synaptic memristor bridge circuit with pulse width based programable weights ...
PDF
New classes of Adomian polynomials for the Adomian decomposition method
PDF
Certain D - Operator for Srivastava H B - Hypergeometric Functions of Three V...
PDF
Efficient Algorithm for Constructing KU-algebras from Block Codes
PDF
Bagasse based high pressure co-generation in Pakistan
PDF
An Exposition of Qualities of Leadership
PDF
Power Aware Geocast Based Geocast Region Tracking Using Mobile Node in Wirele...
PDF
Effect of Wind Direction through Double Storied Building Model Configurations...
PDF
Importance and Functions of Bills of Quantities in the Construction Industry:...
PDF
Fuzzy random variables and Kolomogrov’s important results
E-Voting and Credible Elections in Nigeria
Middle Range Theories as Coherent Intellectual Frameworks
The Case for Developing and Introducing the M-Procurement System in Nigeria, ...
Comparison of Supercritical Fluid Extraction with Steam Distillation for the ...
Studies on Small Hydro-Power Potentials of Itapaji Dam in Ekiti State, Nigeria.
Conocimiento de la Entidad
Approaches to Administrative Leadership
Design and Fabrication of a Recreational Human-Powered Vehicle
Multi-Mode Conceptual Clustering Algorithm Based Social Group Identification ...
New binary memristor crossbar architecture based neural networks for speech r...
Synaptic memristor bridge circuit with pulse width based programable weights ...
New classes of Adomian polynomials for the Adomian decomposition method
Certain D - Operator for Srivastava H B - Hypergeometric Functions of Three V...
Efficient Algorithm for Constructing KU-algebras from Block Codes
Bagasse based high pressure co-generation in Pakistan
An Exposition of Qualities of Leadership
Power Aware Geocast Based Geocast Region Tracking Using Mobile Node in Wirele...
Effect of Wind Direction through Double Storied Building Model Configurations...
Importance and Functions of Bills of Quantities in the Construction Industry:...
Fuzzy random variables and Kolomogrov’s important results
Ad

Similar to Face Recognition System Using Local Ternary Pattern and Signed Number Multiplication (20)

PDF
A Survey on Local Feature Based Face Recognition Methods
PDF
Facial recognition based on enhanced neural network
PDF
IRJET - A Review on: Face Recognition using Laplacianface
PPTX
Face recognition
PDF
Face recognition using assemble of low frequency of DCT features
DOCX
Local directional number pattern for face analysis face and expression recogn...
PDF
An Approach to Face Recognition Using Feed Forward Neural Network
PDF
Real-time Multi-object Face Recognition Using Content Based Image Retrieval (...
PDF
Hybrid Domain based Face Recognition using DWT, FFT and Compressed CLBP
PDF
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
PDF
A Face Recognition Using Linear-Diagonal Binary Graph Pattern Feature Extract...
PDF
F044045052
PPTX
Stereo matching for 2d face recognition
PDF
Criminal Detection System
PDF
IRJET-Face Recognition using LDN Code
PDF
Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters
PDF
Pose and Illumination in Face Recognition Using Enhanced Gabor LBP & PCA
PPTX
Extracting individual information using facial recognition in a smart mirror....
PDF
N348295
PDF
A017530114
A Survey on Local Feature Based Face Recognition Methods
Facial recognition based on enhanced neural network
IRJET - A Review on: Face Recognition using Laplacianface
Face recognition
Face recognition using assemble of low frequency of DCT features
Local directional number pattern for face analysis face and expression recogn...
An Approach to Face Recognition Using Feed Forward Neural Network
Real-time Multi-object Face Recognition Using Content Based Image Retrieval (...
Hybrid Domain based Face Recognition using DWT, FFT and Compressed CLBP
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
A Face Recognition Using Linear-Diagonal Binary Graph Pattern Feature Extract...
F044045052
Stereo matching for 2d face recognition
Criminal Detection System
IRJET-Face Recognition using LDN Code
Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters
Pose and Illumination in Face Recognition Using Enhanced Gabor LBP & PCA
Extracting individual information using facial recognition in a smart mirror....
N348295
A017530114

Recently uploaded (20)

PDF
Well-logging-methods_new................
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
Geodesy 1.pptx...............................................
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
PPT on Performance Review to get promotions
PPTX
Lecture Notes Electrical Wiring System Components
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
Well-logging-methods_new................
CH1 Production IntroductoryConcepts.pptx
Foundation to blockchain - A guide to Blockchain Tech
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
CYBER-CRIMES AND SECURITY A guide to understanding
Geodesy 1.pptx...............................................
Lesson 3_Tessellation.pptx finite Mathematics
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Embodied AI: Ushering in the Next Era of Intelligent Systems
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
bas. eng. economics group 4 presentation 1.pptx
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPT on Performance Review to get promotions
Lecture Notes Electrical Wiring System Components
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Strings in CPP - Strings in C++ are sequences of characters used to store and...

Face Recognition System Using Local Ternary Pattern and Signed Number Multiplication

  • 1. International Journal of Engineering Science Invention ISSN (Online): 2319 – 6734, ISSN (Print): 2319 – 6726 www.ijesi.org ||Volume 5 Issue 1|| January 2016 || PP.44-50 www.ijesi.org 44 | Page Face Recognition System Using Local Ternary Pattern and Signed Number Multiplication Nishatbanu Nayakwadi1 , Mohammed Jameel Hashmi2 1 M.Tech student ,Mazoon University College, Muscat, Sultanate of Oman. 2 HOD CS & IT Dept. Mazoon University College, Muscat, Sultanate of Oman. ABSTRACT: This paper presents a novel approach to face recognition. The task of face recognition is to verify a claimed identity by comparing a claimed image of the individual with other images belonging to the same individual/other individual in a database. The proposed method utilizes Local Ternary Pattern and signed bit multiplication to extract local features of a face. The image is divided into small non-overlapping windows. Processing is carried out on these windows to extract features. Test image’s features are compared with all the training images using Euclidean's distance. The image with lowest Euclidean distance is recognized as the true face image. If the distance between test and all training images is more than threshold then test image is considered as unrecognised image or match not found .The face recognition rate of proposed system is calculated by varying the number of images per person in training database. KEYWORDS: Face Recognition, Face Recognition rate, Euclidean's distance, Local Ternary Pattern, Sign Bit Multiplication. I. INTRODUCTION Face recognition is a task which human can perform effortlessly but it is extremely difficult for machines. Over the last few decades the face recognition technology is extremely popular area of research. Comparing with other biometrics, the most superiority of face biometric is its non-intrusive nature. One more advantage is that image can be taken from a long distance which is not possible in other bio metric approaches. Therefore Face Recognition (FR) Technology is one of the fastest growing biometric fields [1]. Identification and verification are two main tasks of face recognition system. In identification task the test image (unknown face) of a person is compared with all the images in train (known faces) database. The verification task performs acceptance or denial of claimed identity. The goal of verification is to find whether the given two images are of same person or not. Developing a precise face recognition system is a difficult task because faces are complex, multidimensional and susceptible to changes with time and environment. It becomes still more challenging if a person is in disguise. In this research paper we are proposing a naval method to recognize faces .Using Local ternary pattern, signed number multiplication feature extraction is done. Euclidean classifier is used to recognise the test image. This approach gives high face recognition rate. It also provides least difference between intra class and maximum difference between inter class. Face recognition system is used in numerous applications such as bank card identification, mug shorts searching, security monitoring and surveillance. It is also used in immigration, election commission and counter terrorism etc. This paper is organized as follows. Section II discusses face recognition approaches. Section III discusses the proposed method. Section IV discusses the feature extraction. Section V discusses recognition of face using Euclidean classifier. Section VI presents the experimental results on applying our methodology to standard database. Section VII presents the face recognition rate of proposed system. Section VIII presents the face recognition rate compared to other approaches. Finally section IX presents main conclusions of this work. II. LITERATURE REVIEW Face recognition approaches on still images is broadly grouped into two categories: Holistic and feature based. In feature based method geometric characteristics of faces are compared like shape of eyes, nose, chin and mouth etc [2]. In Holistic approach Global features of input facial image is extracted. The Linear discriminant analysis (LDA), Eigen-face is examples for holistic approach. The short coming of Principal Component Analysis (PCA) [3] and Independent Component Analysis (ICA) [4] is that they are very sensitive
  • 2. Face Recognition System Using Local Ternary… www.ijesi.org 45 | Page to changes in illumination which yields poor recognition rate. Gabor filter method is quite expensive. The Local Binary Pattern (LBP) [5] used for face recognition has robust performance even in uncontrolled environment. In LBP for each window size is 3X3, the central pixel is considered as threshold the neighbouring eight pixels gives binary code. It’s very simple to implement LBP but very sensitive to noise and illumination change and gives wrong code. III. PROPOSED METHOD This paper proposes a navel method for extraction of features using Local Ternary Pattern (LTP) and signed bit multiplication, which uses central pixel for feature computation. The extracted features are main component of the initial set of learning images (training set).Once the features of test images are extracted, the image is classified by comparing its feature vector with other train vectors in database using Euclidean classifier. If the minimum Euclidean distance of test image is more than threshold that means test image is not present in train database and displayed as match not found otherwise the train image which has minimum Euclidean distance is displayed as recognised image. Even in the presence of occlusion, pose variation, expression and illumination change face recognition technique should provide good recognition rate. The advantage of this approach is over other face recognition system is its simplicity, speed and sensitivity to small or gradual changes on face. The workflow process of face recognition system is shown in Fig. 1. Figure 1: Workflow process of face recognition system IV. FEATURE EXTRACTION Local Ternary Pattern (LTP) [6] and Booth's algorithm is used to extract features of an image. Either we can use colour images or gray scale images .We used the ORL face database. It consists of 400 images. Each image is of size 112X92, with 40 classes and each class has 10 images. The training database contains 225 images of 25 persons (9 images per person); a test database has 30 images different persons (25 known and 5 unknown). The images were taken at different times, lighting and facial expression. The faces are in upright position in frontal view, with slight left or right rotation. Each image is cropped to size of 90×90 before extracting features. Now each image is divided into 3×3 non overlapping windows. So now each image has 900 windows. LTP code is applied to each window. Let the micro pattern for 3×3 window be as shown in Fig. 2 having 9 different intensities. LTP uses threshold constant to threshold pixels into 3 values. Let t be the threshold constant. The gray values in a zone of width ±t around the central pixel are quantized to zero, the one above is quantized to +1 and the one below are quantised to -1
  • 3. Face Recognition System Using Local Ternary… www.ijesi.org 46 | Page 𝑆 = 𝐼0 𝐼7 𝐼6 𝐼1 𝐼𝐶 𝐼5 𝐼2 𝐼3 𝐼4 Figure 2: Micro gray scale 3× 3 pattern 𝑠′ 𝑖 𝑝, 𝑖 𝑐 = +1, 𝑖 𝑝 ≥ 𝑖 𝑐 + 𝑡, 0, 𝑖 𝑝 − 𝑖 𝑐 < 𝑡, −1 , 𝑖 𝑝 ≤ 𝑖 𝑐 − 𝑡, (1) Where 𝑖 𝑝 is the neighbouring pixel with P ranging from 0 to 7. 𝑖 𝑐 is the Central pixel value, 𝑡 is the threshold value ranges from 3 to 10. We have selected the threshold value t as 0.Here we find face as a smooth structure and choosing wrong values may lead to loss of information. So the equation 1 is modified as below 𝑠′ 𝑖 𝑝, 𝑖 𝑐 = +1, 𝑖 𝑝 > 𝑖 𝑐 , 0, 𝑖 𝑝 = 𝑖 𝑐, −1, 𝑖 𝑝 < 𝑖 𝑐 , (2) Consider micro pattern as shown in Fig. 3 90 95 80 75 82 82 255 100 60 → +1 +1 −1 −1 0 0 +1 +1 −1 Intensity Values in corresponding LTP 3X3 window code Figure 3: Illustration of the basic LTP operator. If any of the texture pattern the central pixel information is not considered, we lose some of the information. The central pixel is 82 in the above example is taken as multiplicand. The values +1,-1, +1, +1,-1, 0,-1 and +1are considered as recode multipliers of Booth's algorithm. After multiplication the result gives the feature vector for one 3×3 window. In each image there are 900 windows, so the each image will result in feature vector of size 900. The Booth's algorithm is used for signed bit multiplication .In 1959 this coding scheme was invented by Andrew Donald Booth. It is explained in detail with the following example [7]. Consider N-bit multiplier x. If x is negative number represent it in 2's compliment form. In multiplier include the implicit least significant bit i.e. x-1=0. For each bit of xi, for i running from 0 to N-1.Depending on the adjacent bits of x operations are performed. If xi and xi-1 are equal the product (A and Q) are shifted right by one bit. If xi=0 and xi-1=1, then add 2's compliment of multiplicand to A and shift the product right by one bit. If xi=1 and xi-1=0, then add multiplicand to A and shift product right by one bit. Let x=10112 be multiplier representing -5 in 2's compliment form .Assume implied zero as least significant bit. The number now becomes 1 0 1 1 0 Multiplier with implied 0 -1 +1 0 -1 Recoded multiplier bits Let multiplicand be 6. Now 6×-5=30, x=1011, M=0110, -M=1010 10112×01102=111000102 TABLE I: Booth's Multiplication table for 6×-5=-30 Step A Q Q-1 Recoded multiplier M= 0110 Action Initial 0000 1011 0 1 1010 1101 1011 0101 1 1 -1 A=A-M shift right 2 1110 1010 1 0 shift right 3 0100 0010 1010 0101 1 0 +1 A=A+M shift right 4 1100 1110 0101 0010 1 1 -1 A=A-M shift right 111000102=-30, in 2's compliment form. Local ternary pattern and Booth's algorithm together are used to extract features in face recognition. There are 225 images in train data base. We generate feature vector for all these images.
  • 4. Face Recognition System Using Local Ternary… www.ijesi.org 47 | Page V. RECOGNITION OF FACE USING EUCLIDEAN CLASSIFIER The last step is the classification of testing image. The testing image is converted into a vector using LTP and Booth's algorithm .If A and B are two vectors of length N, the Euclidean distance between them calculated using Euclidean distance as follows. Euclidean distance: d (A, B) = (𝑎𝑁 𝑖=1 i-bi)2 = A − B (3) If minimum distance between test and training faces is higher than thresh hold the test face is considered as unknown, else recognised image is displayed. It is very important to set the value threshold in program, if there is no threshold value the unknown image is displayed as one of the known images in database. Therefore it is necessary to set value of threshold in program. In the literature, there is no formula to set value of threshold. The most commonly method is first calculate minimum distance of each test image from all training images place that in a vector raster. Now threshold is taken as 0.8 times of maximum value of raster. Threshold=0.8*max (raster) (4) VI. EXPERIMENTAL RESULTS The experiment is performed using ORL images of database using MATLAB. The training database contains 25X9=225 images of 25 persons (9 images per person). A test database consists of 30 images of persons out of which 25 are known and 5 are unknown. All the images are of dimensions of 112×92 size in jpg form and in an upright frontal position. All the images are of Gray scale however we can use colour database also. Some pictures from ORL data base are shown in Fig. 4 Figure 4: Some of face images from ORL system The Test image number of a person is given as input to the program. The program will compare test image with all the training images. The image with lowest Euclidean distance is displayed as recognised face if the minimum Euclidean distance is less than threshold; otherwise it is displayed as unknown image. Figure 5: GUI of face recognition system
  • 5. Face Recognition System Using Local Ternary… www.ijesi.org 48 | Page The first test is done for image number 5 which is present in training database. The Euclidean distance between test image and all the images in training data base is given in Fig. 6.The test image has minimum Euclidean distance less than threshold, so it is a known image. The Euclidean distance is minimum for training image number 43 as shown in Fig. 6.This means that test image corresponds to image number 43 from training data base and it is displayed in Fig. 5. Figure 6: Euclidean distance of known test image from training database The second test image number is 8 which is also present in database but with different expression as in Fig. 7. This also has minimum Euclidean distance less than threshold, therefore it is also a known image. The Fig. 8 shows the Euclidean distance of test image from the other images of training data base. The distance is minimum for image number 67 in training data base and that is displayed in Fig. 7. Figure 7: Recognised face with different expression Figure 8: Euclidean distance of known test image from training database
  • 6. Face Recognition System Using Local Ternary… www.ijesi.org 49 | Page The third test image is unknown image i.e. it is not present in train data base. The minimum Euclidean distance for this image greater than threshold as shown in Fig. 10. Therefore it is unknown face as shown in image in Fig. 9. Figure 9: Image of unknown person Figure 10: Euclidean distance of unknown test image from the training database. VII. FACE RECOGNITION RATE OF PROPOSED METHOD We have conducted experiment using ORL database of 400 images . It gives face recognition rate of 90% as shown in Fig.11. The face recognition rate shows how many test images correctly match with the training images. It specifies the accuracy of face recognition system. In general only few images of person are available in training database, so it is necessary to note the effect of number of images per person on face recognition rate. Figure 11: Face recognition rate Vs number of training images per person
  • 7. Face Recognition System Using Local Ternary… www.ijesi.org 50 | Page If the number of images per person is 1 the face recognition rate is 50%. As the number of images in training database increases the recognition rate increases. If the images per person in training data base are 6 or more than that the face recognition rate is 90% VIII. COMPARISION WITH RELATED APPROACHES Arindam Kar et.al have used PCA and have obtained the accuracy of 80.5[8], have reported the recognition rate on ORL database as 80.5% and with Independent Component Analysis (ICA) as 85%. Arindam Kar et. al [9] in another work have reported the recognition rate with Principle Component Analysis as 82.86%. Nisar et.al [10] have reported recognition rate of 63% on Locally Preserving Projection (LPP). In this approach we can obtain face recognition rate of 90%, if the number of training images per person is more than or equal to 6.The face recognition of related works is compared with the proposed method and it is shown in Chart 1. Chart 1: Comparison of related approaches IX. CONCLUSION This paper presents new local texture descriptor using Local ternary pattern and signed bit multiplication for robust face recognition. The proposed is very efficient as it uses less number of features. The approach is efficient even images have variation in illumination, pose and expression. Pre processing on data set is not done which could improve performance. It is absolutely clear that compared to other work done the proposed system has high face recognition rate and it is more efficient. The proposed approach is limited to the images of human faces of vertical frontal views. X. Acknowledgements Our sincere thanks to Dr. Juma Saleh Al-Ghailani, Managing Director, Dr. Jamal Dawood Salman, Dean, and Mr. Jameel Mohamed Hashmi, HOD of CS & IT Dept. Mazoon University College, Muscat for having provided the opportunity to carry out this article. We deem it a great privilege to offer our sincere thanks to the Research and Development Center, Mazoon University College, Muscat for their constant encouragement and support. REFERENCES [1] Pentland, Alex, and Tanzeem Choudhury. "Face recognition for smart environments." Computer 33.2 (2000): 50-55. [2] Abdullah, M. Hanmandlu, and M. F. Azeem. "A novel LBP fuzzy feature extraction method for face recognition." India Conference (INDICON), 2013 Annual IEEE. IEEE, 2013. [3] Rencher, Alvin C. "Principal component analysis." Methods of Multivariate Analysis, Second Edition (2002): 380-407. [4] Hyvärinen, Aapo, and Erkki Oja. "Independent component analysis by general nonlinear Hebbian-like learning rules." Signal Processing 64.3 (1998): 301-313. [5] Gubbi, Abdullah, Mohammad Fazle Azeem, and M. Sharmila Kumari. "Non Binary Local Gradient Contours for Face Recognition." arXiv preprint arXiv: 1411.0442 (2014). [6] Jia, Xiaofei, et al. "Multi-scale block local ternary patterns for fingerprints vitality detection." Biometrics (ICB), 2013 International Conference on. IEEE, 2013. [7] Besli, Nurettin, and R. G. Deshmukh. "A novel redundant binary signed-digit (RBSD) Booth's encoding." Southeast on, 2002. Proceedings IEEE. IEEE, 2002. [8] Gubbi,Abdullah, Mohammed Fazle Azeem, and Zahid Ansari. "New Fuzzy LBP Features for Face Recognition." arXiv preprint arXiv: 1509.06853 (2015). [9] Kar, Arindam, et al. "A Face Recognition approach based on entropy estimate of the nonlinear DCT features in the Logarithm Domain together with Kernel Entropy Component Analysis." arXiv preprint arXiv:1312.1520(2013). [10] Hundewale, Nisar. "Face recognition using combined global local preserving projections and compared with various methods." International Journal of Scientific & Engineering Research 3.3 (2012).