COMPARATIVE ANALYSIS OF FACE RECOGNITION BASED ON SIGNIFICANT PRINCIPAL COMPONENTS OF PCA TECHNIQUE
Journal Title: International Journal of Computer Engineering & Technology (IJCET) - Year 2019, Vol 10, Issue 1
Abstract
Face recognition systems have been emerging as acceptable approaches for human authorization. Face recognition help in searching and classifying a face database and at a higher level help in identification of possible threats to security. In face recognition problem, the objective is to search a face in the reference face database that matches a given subject. The task of face recognition involves the extraction of feature vectors of the human face from the face image for differentiating it from other persons [6]. In this work, the comparative analysis is done based on the varying number of highly significant principal components (Eigenvectors) of PCA for face recognition. Experimental results show a small number of principal components of PCA are required for matching. PCA technique is a statistical technique, it reduces the dimension of the search space that best describes the images.
Authors and Affiliations
MANZOOR AHMAD LONE
IMAGE RESTORATION BY IMPROVED ITERATIVE SHRINKAGE THRESHOLDING ALGORITHM
The problem of restoration of digital images plays a central role in multitude important applications. A particularly challenging instance of this problem occurs in the case when the degradation phenomenon is modelled...
SECURED DATA AGGREGATION USING FIBONACCI NUMBERS AND UNICODE SYMBOLS FOR WSN
Wireless Sensor Network is a combination of one and more nodes basically used for data collection and data aggregation. The collected data is aggregated through a data aggregator and it will be sent to bases station. W...
DIABETES CLASSIFICATION AND PREDICTION USING ARTIFICIAL NEURAL NETWORK
The classification of data is an important field of data mining comes under supervised learning. In this approach classifier is trained on the pre-categorized data thereafter tested on unseen part called test data to e...
A 3-LEVEL MULTIFACTOR AUTHENTICATION SCHEME FOR CLOUD COMPUTING
The objective of this paper is to propose a secure, user friendly and economical multi-level authentication scheme that uses multiple factors for gaining access to resource on insecure platforms and for financial trans...
IoT BASED HOME AUTOMATION USING RASPBERRY PI
This paper presents the design of the low cost home automation system using the IoT(Internet of Things) technology along with the feature of speech recognition. The Internet of things (IoT) is the inter-networking of p...