SlideShare a Scribd company logo
Multi-View and Multi Band Face Recognition
Survey
Ms.L.MadhuMitha Ms. A.BhagyaLakshmi
PG Student, CSE Dept Asst.Prof, CSE Dept
Velammal Engineering College Velammal Engineering College
lmadhuviet@gmail.com kirubhagya@yahoo.com
Abstract - Face recognition is a challenging problem for security surveillance and become an active research
area during few decades. Due to the different levels of illumination conditions, variations due to lighting,
expression and aging, the recognition of such algorithms rate is considerably limited. To solve this
problem,multi-band face recognition algorithm is introduced in this paper. The multi-view and multi band face
recognition used in this paper is suitable for estimation the pose of the face from a video source. Unlike previous
eigenface or PCA approach, a small number (40 or lower) of eigenfaces are derived from a set of training face
images by using the Karhunen-Loeve transform or PCA. Instead, the similarity between feature sets from
different videos using Wavelet Transform, Entropy imaging is measured in this work. The experimental results
show that the wavelet transform takes less response time which is more suitable for feature extraction and face
matching with high accuracy, performance and accuracy in CBIR system.
Keywords: Image Processing, Face Recognition, Multi-View Videos, Wavelet Transform.
I. Introduction
A biometric system[4] provides automatic
recognition of an individual based on some sort of
unique feature or characteristic possessed by the
individual. Behavioral biometrics includes
signatures, voice recognition, gait measurement,
and keystroke recognition. Physiological
biometrics includes facial recognition,
fingerprinting, hand profiling, iris recognition,
retinal scanning, and DNA testing. Behavioral
methods tend to be less reliable than physiological
methods because they are easier to duplicate than
physical characteristics (Jain et al., 1999).
Physiological attributes are more trusted method in
biometrics among which iris recognition is gaining
much attention in accuracy and reliability. First
automatic face recognition[2][3][5] system was
Developed by Kanade 1973.
A face recognition system is expected to identify
faces present in images and videos automatically. It
can operate in either or both of two modes: Face
verification (or authentication): involves a one-to-
one match that compares a query face image
against a template face image whose Identity is
being claimed. Face identification (or
recognition)[8][9]: involves One-to-many matches
that compare a Query face image against all the
template images in the database to determine the
identity of the query face. During face recognition
major challenges is Inter-class similarity and Intra-
class similarity. Inter-class similarity means people
having identified similar faces which make their
distinction difficult. And Intra-class variations
Causes some changes in head pose, illumination
conditions, expressions, facial accessories,
expressions, aging effects. Lighting conditions
change the face appearances so approaches based
on intensity images are not sufficient for
overcoming this problem.
II. Background concepts
A. Feature Recognition: Biometric facial
recognition systems[1][7] compare images of
individuals from incoming video against specific
databases and send alerts when a positive match
occurs. The key steps in facial recognition are: face
detection, recording detected faces, Match recorded
faces with those stored in a database automatic
process to find the closest match. Applications
include: 1. VIP lists –make staff aware of important
individuals (VIP) and respond in an appropriate
manner, 2. Black lists – identify known offenders
or to register suspects to aid public safety, 3.
Banking transactions - verification of the persons
attempting a financial transaction and so on.
Image Acquisition:
The image acquisition engine enables you to
acquire frames as fast as your camera and PC can
support for high speed imaging. Image is captured
using digital camera in RGB format. The first
function performed by the imaging system is to
collect the incoming energy and focus it onto an
image plane. Digital and analog circuitry sweeps
Proceedings of International Conference on Advancements in Engineering and Technology
ISBN NO : 978 - 1502893314
www.iaetsd.in
International Association of Engineering and Technology for Skill Development
47
Fig.1 Multi-Band Face Recognition Processing
these outputs and Convert them to an analog signal,
which is then digitized by another section of the
imaging system. The output is a digital image is
formed finally.
Pre-Processing:
Image captured not used for feature Extraction and
classification, because captured face Images are
affected by various factors such as noise, lighting
variance, climatic conditions, poor resolutions of an
image, wanted background etc.
RGB Image to GRAY Scale Image:
RGB images converts to gray scale by eliminating
the hue and saturation information while retaining
the luminance. Then, add together 30% of the red
value, 59% of the green value, and 11% of the blue
value. To convert a gray intensity value to RGB,
simply set all the three primary color components
red, green and blue to the gray value, correcting to
a different gamma if necessary.
Filtering Techniques: Filtering refers to accepting
or rejecting certain frequency components. A filter
that passes low frequencies is called a lowpass
filter. The Net image produced by lowpass is to
blur (smooth) an image. Two Dimensional lowpass






0
0
),(0
),(1
),(
DvuDif
DvuDif
vuH
where D0 is specified nonnegative quantity.
A filter that passes high frequencies but reduce
amplitude Signal with frequency lower than the
sscutoff frequencies.






0
0
),(0
),(1
),(
DvuDif
DvuDif
vuH
where Do is the cutoff distance measured from the
origin Of the frequency plane.
Wavelets: Wavelets can be used to extract
information from many different kinds of data,
including – but certainly not limited to – audio
signals and images. Sets of wavelets are generally
needed to analyze data fully. A set of
"complementary" wavelets will decompose data
Camera
R-image
(600nm-700nm)
G-image
(500nm-600nm) Wavelet
Transform
Feature
ExtractionR-image
(400nm-500nm)
IR-image
(1000nm)
Database of Image Feature
Matching Face
ID
Proceedings of International Conference on Advancements in Engineering and Technology
ISBN NO : 978 - 1502893314
www.iaetsd.in
International Association of Engineering and Technology for Skill Development
48
without gaps or overlap so that the decomposition
process is mathematically reversible.
Wavelet transforms[10] are classified into discrete
wavelet transforms (DWTs) and continuous
wavelet transforms (CWTs). Both DWT and CWT
are continuous-time (analog) transforms. They can
be used to represent continuous-time (analog)
signals. CWTs operate over every possible scale
and translation where as DWTs use a specific
subset of scale and translation values or
representation grid.
A continuous wavelet transform (CWT) is used to
divide a continuous-time function into wavelets.
Unlike Fourier transform, the continuous wavelet
transform possesses the ability to construct a time-
frequency representation of a signal that offers very
good time and frequency localization.
A discrete wavelet transform (DWT) is any wavelet
transform for which the wavelets are discretely
sampled. As with other wavelet transforms, a key
advantage it has over Fourier transforms is
temporal resolution: it captures both
frequency and location information (location in
time).
Haar Wavelets
The first DWT was invented by the Hungarian
mathematician Alfréd Haar. For an input
represented by a list of n
2 numbers, the Haar
wavelet transform [10] may be considered to
simply pair up input values, storing the difference
and passing the sum. This process is repeated
recursively, pairing up the sums to provide the next
scale: finally resulting in 12 n
differences and one
final sum.
B. Feature Extraction: When the input data is too
large to be processed then the input data will be
transformed into a reduced representation set of
features. Transforming the input data into the set of
features is called feature extraction. If the features
extracted are carefully chosen it is expected that the
features set will extract the relevant information
from the input data in order to perform the desired
task using this reduced representation instead of the
full size input.
Principal Component Analysis
After feature extraction is performed feature
vectors are need to minimize. Principal component
analysis (PCA)[8] is a statistical procedure that
uses an orthogonal transformation to convert a set
of observations of possibly correlated variables into
a set of values of linearly uncorrelated variables
called principal components. The number of
principal components is less than or equal to the
number of original variables.
The steps involved in PCA can be summarized as
obtain the input matrix; calculate and subtract the
mean; calculate the covariance matrix; the
Eigenvectors; Eigen values and then forming a new
feature vector; once the new feature vector is
formed; the new dataset with low dimensions is
derived. The new feature vectors are passed to
classifier.
Database Image
To use a standard test data set for researchers to be
able to directly compare the results. While there are
many databases in use currently, the choice of an
appropriate database to be used should be made
based on the task given (aging, expressions,
lighting etc).
Another way is to choose the data set specific to the
property to be tested (e.g. how algorithm behaves
when given images with lighting changes or
images[6] with different facial expressions). If, on
the other hand, an algorithm needs to be trained
with more images per class (like LDA), Yale face
database is probably more appropriate than
FERET. Some face data sets often used by
researchers:
1.The Color FERET Database, USA: The images
were collected in a semi-controlled environment.
To maintain a degree of consistency throughout the
database, the same physical s etup was used in each
photography session. Because the equipment had to
be reassembled for each session, there was some
minor variation in images collected on different
dates.
2. SCface - Surveillance Cameras Face Database:
SCface is a database of static images of human
faces. Images were taken in uncontrolled indoor
environment using five video surveillance cameras
of various qualities.
3. Natural Visible and Infrared facial Expression
database (USTC-NVIE): The database contains
both spontaneous and posed expressions of more
than 100 subjects, recorded simultaneously by a
visible and an infrared thermal camera, with
illumination provided from three different
directions. The posed database also includes
expression images with and without glasses.
C. Feature Matching: If the template image has
strong features, a feature-based approach may be
considered; the approach may prove further useful
if the match in the search image might
be transformed in some fashion. Since this
approach does not consider the entirety of the
template image, it can be more computationally
efficient when working with source images of
Proceedings of International Conference on Advancements in Engineering and Technology
ISBN NO : 978 - 1502893314
www.iaetsd.in
International Association of Engineering and Technology for Skill Development
49
larger resolution, as the alternative approach,
template-based, may require searching potentially
large amounts of points in order to determine the
best matching location
III. Conclusion
Face recognition technology has come a long
way for recognising people. Normally the face
images are not accurate in single view videos as it
does not support pose variations, illumination
changes and so on. Hence in order to provide better
performance, this work presents the combination of
taking Multi -View videos, IR image and Wavelet
Transform[10]. Multi -View videos and IR image
provides the advantage of overcoming the
environmental constraints and providing more
accurate image in all conditions when compared
with RBG image which provides accurate image
only at normal lighting conditions. Wavelet
Transform removes redundancies and preserves the
originality of the image at multi scales and multiple
directions. Thus our approach helps in feature
extraction and face matching with high accuracy
and less response time.
IV. References
1. P. Viola and M. J. Jones, “Robust real-time face
detection,” Int. J. Comput.Vis., vol. 57, pp. 137–
154, May 2004.
2. A.C. Sankaranarayanan, A. Veeraraghavan, and
R. Chellappa, “Object detection, tracking and
recognition for multiple smart cameras,”
Proc.IEEE, vol. 96, no. 10, pp. 1606–1624, Oct.
2008.
3.A. Li, S. Shan, and W. Gao, “Coupled bias-
variance tradeoff for crosspose face recognition,”
IEEE Trans. Image Process., vol. 21, no. 1, pp.
305–315, Jan. 2012.
4. A.K. Jain, R. Bolle and S. Pankanti, “Biometrics:
Personal Identification in Network Society,”
Kluwer Academic Publishers, 1999.
5. V. Blanz and T. Vetter, “Face recognition based
on fitting a 3D morphable model,” IEEE Trans.
Pattern Anal. Mach. Intell., vol. 25,no. 9, pp. 1063–
1074, Sep. 2003.
6. P. Breuer, K.-I. Kim, W. Kienzle, B. Scholkopf,
and V. Blanz, “Automatic 3D face reconstruction
from single images or video,” in Proc. IEEE Int.
Conf. Autom. Face Gesture Recognit., Sep. 2008,
pp.
7. A. Pentland, B. Moghaddam, and T. Starner,
“View-based and modular eigenspaces for face
recognition,” in Proc. IEEE Conf. Comput. Vis.
Pattern Recognit., Jun. 1994, pp. 84–91.
8. V. Blanz and T. Vetter, “Face recognition based
on fitting a 3D morphable model,” IEEE Trans.
Pattern Anal. Mach. Intell., vol. 25,no. 9, pp. 1063–
1074, Sep. 2003.
9. P. Breuer, K.-I. Kim, W. Kienzle, B. Scholkopf,
and V. Blanz, “Automatic 3D face reconstruction
from single images or video,” in Proc. IEEE Int.
Conf. Autom. Face Gesture Recognit., Sep. 2008,
pp. 1–8.
10. A. Pentland, B. Moghaddam, and T. Starner,
“View-based and modular eigenspaces for face
recognition,” in Proc. IEEE Conf. Comput. Vis.
Pattern Recognit., Jun. 1994, pp. 84–91.
11.Z.Dezhong., C.Fayi, “Face Recognition based
on Wavelet Transform and Image Comparison,”
International Symposium on Computational
Intelligence and Design, 2008.
Proceedings of International Conference on Advancements in Engineering and Technology
ISBN NO : 978 - 1502893314
www.iaetsd.in
International Association of Engineering and Technology for Skill Development
50

More Related Content

PDF
Analysis of Various Single Frame Super Resolution Techniques for better PSNR
PDF
Mr image compression based on selection of mother wavelet and lifting based w...
PDF
Li3420552062
PDF
IRJET- Enhancement of Image using Fuzzy Inference System for Remotely Sen...
PPTX
Face Recognition: From Scratch To Hatch / Эдуард Тянтов (Mail.ru Group)
PDF
SINGLE IMAGE SUPER RESOLUTION: A COMPARATIVE STUDY
PDF
PDF
Image Steganography Using Wavelet Transform And Genetic Algorithm
Analysis of Various Single Frame Super Resolution Techniques for better PSNR
Mr image compression based on selection of mother wavelet and lifting based w...
Li3420552062
IRJET- Enhancement of Image using Fuzzy Inference System for Remotely Sen...
Face Recognition: From Scratch To Hatch / Эдуард Тянтов (Mail.ru Group)
SINGLE IMAGE SUPER RESOLUTION: A COMPARATIVE STUDY
Image Steganography Using Wavelet Transform And Genetic Algorithm

What's hot (20)

PDF
Illumination Invariant Face Recognition System using Local Directional Patter...
PDF
Performance Evaluation of Illumination Invariant Face Recognition Algorthims
PDF
J01116164
PDF
IRJET- Image De-Blurring using Blind De-Convolution Algorithm
PDF
Performance Comparison of Hybrid Haar Wavelet Transform with Various Local Tr...
PDF
IRJET - Symmetric Image Registration based on Intensity and Spatial Informati...
PDF
IRJET - Review of Various Multi-Focus Image Fusion Methods
PDF
Dd25624627
PPT
Technical Portion of PhD Research
PDF
IRJET- Analysis of Vehicle Number Plate Recognition
PDF
IRJET- Comparative Study of Artificial Neural Networks and Convolutional N...
PDF
IRJET- Efficient Face Detection from Video Sequences using KNN and PCA
PDF
IRJET- Comparative Study of PCA, KPCA, KFA and LDA Algorithms for Face Re...
PDF
The Computation Complexity Reduction of 2-D Gaussian Filter
PDF
Single Image Super-Resolution Using Analytical Solution for L2-L2 Algorithm
PDF
Near Reversible Data Hiding Scheme for images using DCT
PDF
Ik3415621565
PDF
D010332630
PDF
A survey on coding binary visual features extracted from video sequences
PDF
Q01754118128
Illumination Invariant Face Recognition System using Local Directional Patter...
Performance Evaluation of Illumination Invariant Face Recognition Algorthims
J01116164
IRJET- Image De-Blurring using Blind De-Convolution Algorithm
Performance Comparison of Hybrid Haar Wavelet Transform with Various Local Tr...
IRJET - Symmetric Image Registration based on Intensity and Spatial Informati...
IRJET - Review of Various Multi-Focus Image Fusion Methods
Dd25624627
Technical Portion of PhD Research
IRJET- Analysis of Vehicle Number Plate Recognition
IRJET- Comparative Study of Artificial Neural Networks and Convolutional N...
IRJET- Efficient Face Detection from Video Sequences using KNN and PCA
IRJET- Comparative Study of PCA, KPCA, KFA and LDA Algorithms for Face Re...
The Computation Complexity Reduction of 2-D Gaussian Filter
Single Image Super-Resolution Using Analytical Solution for L2-L2 Algorithm
Near Reversible Data Hiding Scheme for images using DCT
Ik3415621565
D010332630
A survey on coding binary visual features extracted from video sequences
Q01754118128
Ad

Viewers also liked (18)

PDF
Iaetsd the world’s smallest computer for programmers and app developers
PDF
Iaetsd secure data sharing of multi-owner groups in cloud
PDF
Iaetsd location-based services using autonomous gps
PDF
Iaetsd an efficient and accurate misbehavior detection
PDF
Iaetsd load stabilizing and energy conserving routing
PDF
Iaetsd purification of water by natural adsorption process
PDF
Iaetsd enhancing vehicle to vehicle safety message
PPTX
Sistemas
PDF
TAINET's Venus 29 Series VoIP Gateway
PDF
Iaetsd artifact facet ranking and
PDF
Iaetsd performance analysis of discrete cosine
PDF
Iaetsd mobile icu using android
PDF
Iaetsd a framework for secure data
PDF
Iaetsd a survey on one class clustering
PPTX
Presentation_NEW.PPTX
PDF
Removal of a model textile dye from effluent using fenugreek powder as an ads...
DOC
Linux dan turunanya
PDF
S c công trình formosa_slipform_collapse25mar2015
Iaetsd the world’s smallest computer for programmers and app developers
Iaetsd secure data sharing of multi-owner groups in cloud
Iaetsd location-based services using autonomous gps
Iaetsd an efficient and accurate misbehavior detection
Iaetsd load stabilizing and energy conserving routing
Iaetsd purification of water by natural adsorption process
Iaetsd enhancing vehicle to vehicle safety message
Sistemas
TAINET's Venus 29 Series VoIP Gateway
Iaetsd artifact facet ranking and
Iaetsd performance analysis of discrete cosine
Iaetsd mobile icu using android
Iaetsd a framework for secure data
Iaetsd a survey on one class clustering
Presentation_NEW.PPTX
Removal of a model textile dye from effluent using fenugreek powder as an ads...
Linux dan turunanya
S c công trình formosa_slipform_collapse25mar2015
Ad

Similar to Iaetsd multi-view and multi band face recognition (20)

PDF
IRJET- Face Recognition of Criminals for Security using Principal Component A...
PDF
COMPRESSION BASED FACE RECOGNITION USING DWT AND SVM
PDF
IRJET - A Review on Face Recognition using Deep Learning Algorithm
PDF
Research Inventy : International Journal of Engineering and Science
PDF
IRJET- Smart Classroom Attendance System: Survey
PPTX
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
PDF
Efficient 3D stereo vision stabilization for multi-camera viewpoints
PDF
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
PDF
IRJET-Analysis of Face Recognition System for Different Classifier
PDF
IRJET- Face Detection and Recognition using OpenCV
PDF
IRJET - Face Recognition based Attendance System
PDF
Automatic Attendance Management System Using Face Recognition
PDF
IRJET- Facial Expression Recognition using GPA Analysis
PDF
WCTFR : W RAPPING C URVELET T RANSFORM B ASED F ACE R ECOGNITION
PDF
Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters
PPTX
Face recognition technology
DOCX
Face recogntion using PCA algorithm
PDF
IRJET - Gender and Age Prediction using Wideresnet Architecture
PDF
Ijetcas14 329
PDF
IRJET- Design of an Automated Attendance System using Face Recognition Algorithm
IRJET- Face Recognition of Criminals for Security using Principal Component A...
COMPRESSION BASED FACE RECOGNITION USING DWT AND SVM
IRJET - A Review on Face Recognition using Deep Learning Algorithm
Research Inventy : International Journal of Engineering and Science
IRJET- Smart Classroom Attendance System: Survey
Review A DCNN APPROACH FOR REAL TIME UNCONSTRAINED FACE.pptx
Efficient 3D stereo vision stabilization for multi-camera viewpoints
Rotation Invariant Face Recognition using RLBP, LPQ and CONTOURLET Transform
IRJET-Analysis of Face Recognition System for Different Classifier
IRJET- Face Detection and Recognition using OpenCV
IRJET - Face Recognition based Attendance System
Automatic Attendance Management System Using Face Recognition
IRJET- Facial Expression Recognition using GPA Analysis
WCTFR : W RAPPING C URVELET T RANSFORM B ASED F ACE R ECOGNITION
Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters
Face recognition technology
Face recogntion using PCA algorithm
IRJET - Gender and Age Prediction using Wideresnet Architecture
Ijetcas14 329
IRJET- Design of an Automated Attendance System using Face Recognition Algorithm

More from Iaetsd Iaetsd (20)

PDF
iaetsd Survey on cooperative relay based data transmission
PDF
iaetsd Software defined am transmitter using vhdl
PDF
iaetsd Health monitoring system with wireless alarm
PDF
iaetsd Equalizing channel and power based on cognitive radio system over mult...
PDF
iaetsd Economic analysis and re design of driver’s car seat
PDF
iaetsd Design of slotted microstrip patch antenna for wlan application
PDF
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
PDF
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
PDF
Fabrication of dual power bike
PDF
Blue brain technology
PDF
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
PDF
iirdem Surveillance aided robotic bird
PDF
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
PDF
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
PDF
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
PDF
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
PDF
iaetsd Shared authority based privacy preserving protocol
PDF
iaetsd Secured multiple keyword ranked search over encrypted databases
PDF
iaetsd Robots in oil and gas refineries
PDF
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Survey on cooperative relay based data transmission
iaetsd Software defined am transmitter using vhdl
iaetsd Health monitoring system with wireless alarm
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Design of slotted microstrip patch antenna for wlan application
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
Fabrication of dual power bike
Blue brain technology
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem Surveillance aided robotic bird
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iaetsd Shared authority based privacy preserving protocol
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Robots in oil and gas refineries
iaetsd Modeling of solar steam engine system using parabolic

Recently uploaded (20)

PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
Lecture Notes Electrical Wiring System Components
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
Digital Logic Computer Design lecture notes
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
Welding lecture in detail for understanding
DOCX
573137875-Attendance-Management-System-original
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PPTX
Geodesy 1.pptx...............................................
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Arduino robotics embedded978-1-4302-3184-4.pdf
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Lecture Notes Electrical Wiring System Components
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Digital Logic Computer Design lecture notes
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Welding lecture in detail for understanding
573137875-Attendance-Management-System-original
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
UNIT 4 Total Quality Management .pptx
Foundation to blockchain - A guide to Blockchain Tech
Strings in CPP - Strings in C++ are sequences of characters used to store and...
Geodesy 1.pptx...............................................
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...

Iaetsd multi-view and multi band face recognition

  • 1. Multi-View and Multi Band Face Recognition Survey Ms.L.MadhuMitha Ms. A.BhagyaLakshmi PG Student, CSE Dept Asst.Prof, CSE Dept Velammal Engineering College Velammal Engineering College lmadhuviet@gmail.com kirubhagya@yahoo.com Abstract - Face recognition is a challenging problem for security surveillance and become an active research area during few decades. Due to the different levels of illumination conditions, variations due to lighting, expression and aging, the recognition of such algorithms rate is considerably limited. To solve this problem,multi-band face recognition algorithm is introduced in this paper. The multi-view and multi band face recognition used in this paper is suitable for estimation the pose of the face from a video source. Unlike previous eigenface or PCA approach, a small number (40 or lower) of eigenfaces are derived from a set of training face images by using the Karhunen-Loeve transform or PCA. Instead, the similarity between feature sets from different videos using Wavelet Transform, Entropy imaging is measured in this work. The experimental results show that the wavelet transform takes less response time which is more suitable for feature extraction and face matching with high accuracy, performance and accuracy in CBIR system. Keywords: Image Processing, Face Recognition, Multi-View Videos, Wavelet Transform. I. Introduction A biometric system[4] provides automatic recognition of an individual based on some sort of unique feature or characteristic possessed by the individual. Behavioral biometrics includes signatures, voice recognition, gait measurement, and keystroke recognition. Physiological biometrics includes facial recognition, fingerprinting, hand profiling, iris recognition, retinal scanning, and DNA testing. Behavioral methods tend to be less reliable than physiological methods because they are easier to duplicate than physical characteristics (Jain et al., 1999). Physiological attributes are more trusted method in biometrics among which iris recognition is gaining much attention in accuracy and reliability. First automatic face recognition[2][3][5] system was Developed by Kanade 1973. A face recognition system is expected to identify faces present in images and videos automatically. It can operate in either or both of two modes: Face verification (or authentication): involves a one-to- one match that compares a query face image against a template face image whose Identity is being claimed. Face identification (or recognition)[8][9]: involves One-to-many matches that compare a Query face image against all the template images in the database to determine the identity of the query face. During face recognition major challenges is Inter-class similarity and Intra- class similarity. Inter-class similarity means people having identified similar faces which make their distinction difficult. And Intra-class variations Causes some changes in head pose, illumination conditions, expressions, facial accessories, expressions, aging effects. Lighting conditions change the face appearances so approaches based on intensity images are not sufficient for overcoming this problem. II. Background concepts A. Feature Recognition: Biometric facial recognition systems[1][7] compare images of individuals from incoming video against specific databases and send alerts when a positive match occurs. The key steps in facial recognition are: face detection, recording detected faces, Match recorded faces with those stored in a database automatic process to find the closest match. Applications include: 1. VIP lists –make staff aware of important individuals (VIP) and respond in an appropriate manner, 2. Black lists – identify known offenders or to register suspects to aid public safety, 3. Banking transactions - verification of the persons attempting a financial transaction and so on. Image Acquisition: The image acquisition engine enables you to acquire frames as fast as your camera and PC can support for high speed imaging. Image is captured using digital camera in RGB format. The first function performed by the imaging system is to collect the incoming energy and focus it onto an image plane. Digital and analog circuitry sweeps Proceedings of International Conference on Advancements in Engineering and Technology ISBN NO : 978 - 1502893314 www.iaetsd.in International Association of Engineering and Technology for Skill Development 47
  • 2. Fig.1 Multi-Band Face Recognition Processing these outputs and Convert them to an analog signal, which is then digitized by another section of the imaging system. The output is a digital image is formed finally. Pre-Processing: Image captured not used for feature Extraction and classification, because captured face Images are affected by various factors such as noise, lighting variance, climatic conditions, poor resolutions of an image, wanted background etc. RGB Image to GRAY Scale Image: RGB images converts to gray scale by eliminating the hue and saturation information while retaining the luminance. Then, add together 30% of the red value, 59% of the green value, and 11% of the blue value. To convert a gray intensity value to RGB, simply set all the three primary color components red, green and blue to the gray value, correcting to a different gamma if necessary. Filtering Techniques: Filtering refers to accepting or rejecting certain frequency components. A filter that passes low frequencies is called a lowpass filter. The Net image produced by lowpass is to blur (smooth) an image. Two Dimensional lowpass       0 0 ),(0 ),(1 ),( DvuDif DvuDif vuH where D0 is specified nonnegative quantity. A filter that passes high frequencies but reduce amplitude Signal with frequency lower than the sscutoff frequencies.       0 0 ),(0 ),(1 ),( DvuDif DvuDif vuH where Do is the cutoff distance measured from the origin Of the frequency plane. Wavelets: Wavelets can be used to extract information from many different kinds of data, including – but certainly not limited to – audio signals and images. Sets of wavelets are generally needed to analyze data fully. A set of "complementary" wavelets will decompose data Camera R-image (600nm-700nm) G-image (500nm-600nm) Wavelet Transform Feature ExtractionR-image (400nm-500nm) IR-image (1000nm) Database of Image Feature Matching Face ID Proceedings of International Conference on Advancements in Engineering and Technology ISBN NO : 978 - 1502893314 www.iaetsd.in International Association of Engineering and Technology for Skill Development 48
  • 3. without gaps or overlap so that the decomposition process is mathematically reversible. Wavelet transforms[10] are classified into discrete wavelet transforms (DWTs) and continuous wavelet transforms (CWTs). Both DWT and CWT are continuous-time (analog) transforms. They can be used to represent continuous-time (analog) signals. CWTs operate over every possible scale and translation where as DWTs use a specific subset of scale and translation values or representation grid. A continuous wavelet transform (CWT) is used to divide a continuous-time function into wavelets. Unlike Fourier transform, the continuous wavelet transform possesses the ability to construct a time- frequency representation of a signal that offers very good time and frequency localization. A discrete wavelet transform (DWT) is any wavelet transform for which the wavelets are discretely sampled. As with other wavelet transforms, a key advantage it has over Fourier transforms is temporal resolution: it captures both frequency and location information (location in time). Haar Wavelets The first DWT was invented by the Hungarian mathematician Alfréd Haar. For an input represented by a list of n 2 numbers, the Haar wavelet transform [10] may be considered to simply pair up input values, storing the difference and passing the sum. This process is repeated recursively, pairing up the sums to provide the next scale: finally resulting in 12 n differences and one final sum. B. Feature Extraction: When the input data is too large to be processed then the input data will be transformed into a reduced representation set of features. Transforming the input data into the set of features is called feature extraction. If the features extracted are carefully chosen it is expected that the features set will extract the relevant information from the input data in order to perform the desired task using this reduced representation instead of the full size input. Principal Component Analysis After feature extraction is performed feature vectors are need to minimize. Principal component analysis (PCA)[8] is a statistical procedure that uses an orthogonal transformation to convert a set of observations of possibly correlated variables into a set of values of linearly uncorrelated variables called principal components. The number of principal components is less than or equal to the number of original variables. The steps involved in PCA can be summarized as obtain the input matrix; calculate and subtract the mean; calculate the covariance matrix; the Eigenvectors; Eigen values and then forming a new feature vector; once the new feature vector is formed; the new dataset with low dimensions is derived. The new feature vectors are passed to classifier. Database Image To use a standard test data set for researchers to be able to directly compare the results. While there are many databases in use currently, the choice of an appropriate database to be used should be made based on the task given (aging, expressions, lighting etc). Another way is to choose the data set specific to the property to be tested (e.g. how algorithm behaves when given images with lighting changes or images[6] with different facial expressions). If, on the other hand, an algorithm needs to be trained with more images per class (like LDA), Yale face database is probably more appropriate than FERET. Some face data sets often used by researchers: 1.The Color FERET Database, USA: The images were collected in a semi-controlled environment. To maintain a degree of consistency throughout the database, the same physical s etup was used in each photography session. Because the equipment had to be reassembled for each session, there was some minor variation in images collected on different dates. 2. SCface - Surveillance Cameras Face Database: SCface is a database of static images of human faces. Images were taken in uncontrolled indoor environment using five video surveillance cameras of various qualities. 3. Natural Visible and Infrared facial Expression database (USTC-NVIE): The database contains both spontaneous and posed expressions of more than 100 subjects, recorded simultaneously by a visible and an infrared thermal camera, with illumination provided from three different directions. The posed database also includes expression images with and without glasses. C. Feature Matching: If the template image has strong features, a feature-based approach may be considered; the approach may prove further useful if the match in the search image might be transformed in some fashion. Since this approach does not consider the entirety of the template image, it can be more computationally efficient when working with source images of Proceedings of International Conference on Advancements in Engineering and Technology ISBN NO : 978 - 1502893314 www.iaetsd.in International Association of Engineering and Technology for Skill Development 49
  • 4. larger resolution, as the alternative approach, template-based, may require searching potentially large amounts of points in order to determine the best matching location III. Conclusion Face recognition technology has come a long way for recognising people. Normally the face images are not accurate in single view videos as it does not support pose variations, illumination changes and so on. Hence in order to provide better performance, this work presents the combination of taking Multi -View videos, IR image and Wavelet Transform[10]. Multi -View videos and IR image provides the advantage of overcoming the environmental constraints and providing more accurate image in all conditions when compared with RBG image which provides accurate image only at normal lighting conditions. Wavelet Transform removes redundancies and preserves the originality of the image at multi scales and multiple directions. Thus our approach helps in feature extraction and face matching with high accuracy and less response time. IV. References 1. P. Viola and M. J. Jones, “Robust real-time face detection,” Int. J. Comput.Vis., vol. 57, pp. 137– 154, May 2004. 2. A.C. Sankaranarayanan, A. Veeraraghavan, and R. Chellappa, “Object detection, tracking and recognition for multiple smart cameras,” Proc.IEEE, vol. 96, no. 10, pp. 1606–1624, Oct. 2008. 3.A. Li, S. Shan, and W. Gao, “Coupled bias- variance tradeoff for crosspose face recognition,” IEEE Trans. Image Process., vol. 21, no. 1, pp. 305–315, Jan. 2012. 4. A.K. Jain, R. Bolle and S. Pankanti, “Biometrics: Personal Identification in Network Society,” Kluwer Academic Publishers, 1999. 5. V. Blanz and T. Vetter, “Face recognition based on fitting a 3D morphable model,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 25,no. 9, pp. 1063– 1074, Sep. 2003. 6. P. Breuer, K.-I. Kim, W. Kienzle, B. Scholkopf, and V. Blanz, “Automatic 3D face reconstruction from single images or video,” in Proc. IEEE Int. Conf. Autom. Face Gesture Recognit., Sep. 2008, pp. 7. A. Pentland, B. Moghaddam, and T. Starner, “View-based and modular eigenspaces for face recognition,” in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Jun. 1994, pp. 84–91. 8. V. Blanz and T. Vetter, “Face recognition based on fitting a 3D morphable model,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 25,no. 9, pp. 1063– 1074, Sep. 2003. 9. P. Breuer, K.-I. Kim, W. Kienzle, B. Scholkopf, and V. Blanz, “Automatic 3D face reconstruction from single images or video,” in Proc. IEEE Int. Conf. Autom. Face Gesture Recognit., Sep. 2008, pp. 1–8. 10. A. Pentland, B. Moghaddam, and T. Starner, “View-based and modular eigenspaces for face recognition,” in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Jun. 1994, pp. 84–91. 11.Z.Dezhong., C.Fayi, “Face Recognition based on Wavelet Transform and Image Comparison,” International Symposium on Computational Intelligence and Design, 2008. Proceedings of International Conference on Advancements in Engineering and Technology ISBN NO : 978 - 1502893314 www.iaetsd.in International Association of Engineering and Technology for Skill Development 50