COMPARATIVE ANALYSIS OF FACE RECOGNITION BASED ON SIGNIFICANT PRINCIPAL COMPONENTS OF PCA TECHNIQUE
Journal Title: International Journal of Computer Engineering & Technology (IJCET) - Year 2019, Vol 10, Issue 1
Abstract
Face recognition systems have been emerging as acceptable approaches for human authorization. Face recognition help in searching and classifying a face database and at a higher level help in identification of possible threats to security. In face recognition problem, the objective is to search a face in the reference face database that matches a given subject. The task of face recognition involves the extraction of feature vectors of the human face from the face image for differentiating it from other persons [6]. In this work, the comparative analysis is done based on the varying number of highly significant principal components (Eigenvectors) of PCA for face recognition. Experimental results show a small number of principal components of PCA are required for matching. PCA technique is a statistical technique, it reduces the dimension of the search space that best describes the images.
Authors and Affiliations
MANZOOR AHMAD LONE
A 3-LEVEL MULTIFACTOR AUTHENTICATION SCHEME FOR CLOUD COMPUTING
The objective of this paper is to propose a secure, user friendly and economical multi-level authentication scheme that uses multiple factors for gaining access to resource on insecure platforms and for financial trans...
DATA CAPTURING AND RETRIEVAL FROM WIRELESS SENSOR NETWORKS USING SEMANTIC WEB
The Internet of Things is giving a bright future and with establishment and maturity of wireless sensor networks, it can be truly realised for the various purposes of human endeavour. The paper deals with challenge to...
MACHINE AS ONE PLAYER IN INDIAN COWRY BOARD GAME: ADVANCED PLAYING STRATEGIES
Cowry game, also known as Chowka Bhara, is an ancient board game originated in India. It is a 2-4 player strategic race game which contains an element of chance due to the throw of special dice (cowry shells). This gam...
A NEW PARADIGM OF SECURITY MODEL FOR TREASURY INFORMATION SYSTEM -- E-GOVERNANCE
The world of Computing has been completing 80 years in applying scientific methodologies to understand basic principles of Emerging Technologies. In recent times, IT has great influence on how different Indian Governme...
SECURED DATA AGGREGATION USING FIBONACCI NUMBERS AND UNICODE SYMBOLS FOR WSN
Wireless Sensor Network is a combination of one and more nodes basically used for data collection and data aggregation. The collected data is aggregated through a data aggregator and it will be sent to bases station. W...