A Novel Based Approach For Pose Estimation And Normalization Using Multi-Class Svm And Affine Transformation For Face Recognition
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 4
Abstract
Abstract: The goal of the paper is to estimate the pose, normalize the pose, and remove the illumination to recognize the face. The training section includes the techniques Affine Transformation and DCT. During the testing section the estimation of pose is calculated and later normalized frames of the pose variant frames and illumination variant frames of the testing person are obtained by using Affine Transformation and DCT methods respectively. Once the normalization and illumination removal methods are done, face recognition is carried out. The features are extracted using the principle component analysis; later face recognition is carried out by matching the obtained features with the database features. Once the normalization and illumination removal methods are done, face recognition is carried out. The features are extracted using the principle component analysis; later face recognition is carried out by matching the obtained features with the database features.
Authors and Affiliations
shilpa R , shreekumar T
Efficient Fpe Algorithm For Encrypting Credit Card Numbers
The more highly used Internet world contains many sensitive information. Encryption is a process to secure information. An encrypted data requires more storage space for storing. It also needs many changes in q...
Enhanced Detection Rate for Network Intrusion Detection System by Using Chaotic Firefly Algorithm
Regarding the security of computer systems, the intrusion detection systems (IDS) are essential components for the detection of attacks at the early stage. Therefore, the main goal of this thesis is to choose the differe...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Network
Wireless sensor networks are appealing to researchers due to their wide range of application in several fields such as military settings, critical infrastructure protection, target detection and tracking, envir...
An Architecture to Achieve Anonymity and Traceability
Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network services without being traced. On the...
More General Sophisticated Method of Implementation of Fiber to the Homes
Fiber to the Homes (FTTH) is one of the most important fiber optic applications, since FTTH provides huge bandwidth. The single fiber offering multi services such as :( Data, Voice, Video etc.).Comparing FTTH and c...