AGE CLASSIFICATION BASED ON SIMPLE LBP TRANSITIONS
Journal Title: International Journal on Computer Science and Engineering - Year 2013, Vol 5, Issue 10
Abstract
The research related to age estimation using face images has become increasingly important, due to the fact that it has a variety of potentially useful applications. An age estimation system is generally composed of aging feature extraction and feature classification; both of which are important in order to improve the performance. The present paper derived “Transition based Fuzzy LBP” (TFLBP) method for the classification of facial image into five age groups as child (0-12), young adults (13-25), middle-aged adults (26-45), senior adults (46-60) and Senior citizens (> 60) .The proposed TFLBP used the concept of Fuzzy texture unit on LBP and derived two different LBP unit values with four pixels. The first one is from four-connected pixels of cross diagonal representation of Fuzzy LBP (FLBP) and the second one is from four-non connected corner pixels of FLBP. On this distinct FLBP the transitions are counted and age classification is derived from this. Age classification performance is compared with the various fuzzy based texture classification methods. The results demonstrate that superior performance is achieved by the proposed method.
Authors and Affiliations
Gorti Satyanarayana Murty , Dr. V. Vijaya Kumar , A. Obulesu
Agile Processes and Methodologies: A Conceptual Study
This paper deals with the comparative study of agile processes. The paper will serve as guide to other software development process models. Agile processes have important applications in the areas of software project man...
Walsh Transform over Row Mean and Column Mean using Image Fragmentation and Energy Compaction for Image Retrieval
Always the thrust for better and faster image retrieval techniques has nourished the research in content based image retrieval. The paper presents 32 novel image retrieval techniques using the feature vectors obtained by...
An Investigation on Cloud data Storage and Confidentiality Techniques
Cloud computing gives an enormous measure of virtual storage to the clients. Cloud storage essentially serves to little and medium scale commercial enterprises. This will lessen their ventures and support of capacity ser...
ID-based Directed Threshold Multisignature Scheme from Bilinear Pairings
Multi signature is a signature scheme in which signers jointly generate a signature on a message. Threshold multisignature combines the traits of threshold signature and multisignature. In threshold multisignature, a gro...
Spam Classification using new kernel function in Support Vector Machine
Due to the increase in internet users, there is a rapid growth in spam e-mails. In recent years, kernel function have received major attention, particularly due to the increased popularity of Support Vector Machine. It i...