A Study on Similarity Computations in Template Matching Technique for Identity Verification
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 8
Abstract
This paper describes a study on the development of a human face verification system by merely using template matching (TM) as the main verification engine. In contrast to common face recognition techniques, our approach for the identity erification (face recognition) consists of matching the facial features extracted from the detected face. These facial features namely left eye, right eye and mouth regions; are detected using a system known as EMoTracker. As TM is sensitive to lighting, this study considered different type of lighting directions and similarity computation in TM. Three types of TM functions are evaluated in this paper: Sum of Squared ifference, Cross Correlation and Correlation Coefficient. In the experiments, YaleB Database is used. Based on the bservation results, using Correlation Coefficient is shown to be the most reliable similarity computation to handle different lighting conditions using TM.
Authors and Affiliations
Lam, , S. K. , , Yeong , C. Y. , , Yew , C. T. , Chai , W. S. , , Suandi , S. A.
Delayed Reservation and Differential Service For Multimedia Traffic In Optical Burst Switched Networks
The next generation internet requires a new methodology to meet the evolving techniques and economise the network traffic in optical network. Solution is obtained through Optical Burst Switched Networks.OBS needs develop...
Efficient New Design and Verification of Sign-Digit-Adder for Two Symmetric Redundant Radix-4 Numbers
The carry propagation during the addition operation limits the speed of arithmetic operation. In Digital arithmetic, several approaches were proposed to provide the best implementation for addition operation of two opera...
Genetic Algorithm Based Adaptive Learning Scheme Generation For Context Aware E-Learning
Context aware e-learning system helps to provide elearning contents which are customized according to the learner’s ontext. For generating context aware contents many adaptation parameters have to be considered. Customi...
Information and Communication Technology for Rural Development
Due to the lack of knowledge and use of ICT in rural areas, development is at a very low rate. Some improvement and advancement in the technologies provided by the government but there is no more effect in the developmen...
ENHANCED SECURITY IN SECURE SOCKET LAYER 3.0 SPECIFICATION
We address the issue network security.All the bank provides 128 bit ssl encryption in two way communication between client and server.In this paper we can tell you idea behind 256 ssl encryption.By which two way communic...