COMPARATIVE ANALYSIS OF FACE RECOGNITION BASED ON SIGNIFICANT PRINCIPAL COMPONENTS OF PCA TECHNIQUE
Journal Title: International Journal of Computer Engineering & Technology (IJCET) - Year 2019, Vol 10, Issue 1
Abstract
Face recognition systems have been emerging as acceptable approaches for human authorization. Face recognition help in searching and classifying a face database and at a higher level help in identification of possible threats to security. In face recognition problem, the objective is to search a face in the reference face database that matches a given subject. The task of face recognition involves the extraction of feature vectors of the human face from the face image for differentiating it from other persons [6]. In this work, the comparative analysis is done based on the varying number of highly significant principal components (Eigenvectors) of PCA for face recognition. Experimental results show a small number of principal components of PCA are required for matching. PCA technique is a statistical technique, it reduces the dimension of the search space that best describes the images.
Authors and Affiliations
MANZOOR AHMAD LONE
MACHINE AS ONE PLAYER IN INDIAN COWRY BOARD GAME: ADVANCED PLAYING STRATEGIES
Cowry game, also known as Chowka Bhara, is an ancient board game originated in India. It is a 2-4 player strategic race game which contains an element of chance due to the throw of special dice (cowry shells). This gam...
UNDERSTANDING ADOPTION FACTORS OF OVER-THE-TOP VIDEO SERVICES AMONG MILLENNIAL CONSUMERS
With growing digitization, the challenge for marketers is to understand how consumers consuming Over-The –Top (OTT) content adopt and consume messages in this format effectively. Superimposing the theoretical framework...
STATE-OF-THE-ART REVIEW ON APPLICATIONS OF HARMONY SEARCH META HEURISTIC ALGORITHM
Harmony Search (HS) a meta heuristic algorithm inspired by music improvisation process in which the musician searches for the best harmony and continues to polish the harmony in order to improve its aesthetics. The HS...
A REVIEW ON DATA MINING AND BIGDATA
The recent years have seen an exponential growth of data generation this enormous amount of data has brought new kind of problem. The existing data mining techniques are unable to process the Big Data or they are not e...
A 3-LEVEL MULTIFACTOR AUTHENTICATION SCHEME FOR CLOUD COMPUTING
The objective of this paper is to propose a secure, user friendly and economical multi-level authentication scheme that uses multiple factors for gaining access to resource on insecure platforms and for financial trans...