Face Recognition Techniques: A Survey
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 4
Abstract
In recent days, the demand for biometric security system has risen due to a wide range of surveillance, access control and law enforcement applications. Among the various biometric security systems based on finger print, iris, voice or speech and signature, face recognition seems to be easily accessible, non-intrusive, and most universal system. It is easy to use, can be used efficiently for mass scanning which is quite difficult in case of other biometrics, and also increases user friendliness in human computer interaction. Several interesting research attempts are made in the field of face recognition. There are three main divisions of face recognitions based on the face data acquisition type: methods that deal with intensity images, those that operate on video sequences and those that are based on other sensor inputs. This paper provides an overview of few widely used methods in each of these divisions along with the advantages and disadvantages.
Authors and Affiliations
Ranganatha S, Dr. Y P Gowramma
A review of genetic algorithm for metal cutting processes and a research agenda
Quality of finished product manufactured by metal cutting process depends on various machining factors. Similarly the chemical composition of work piece material also plays important role .So before processing we must k...
Responsive web development
This paper is based on Responsive web development which is aimed to provide optimal viewing experience. A website designed with Responsive Web Development adapts the layout to the user by using fluid, proportion-based g...
A Novel Current Control Technique For A Three-Phase Statcom
This paper proposes an advanced control strategy to enhance performance of shunt active power filter (APF). The proposed control scheme requires only two current sensors at the supply side and does not need a harmonic d...
Authentication of Data Structures for Graph
Authenticated data structures provides cryptographic proofs where the answers are as accurate as the author intended, even if the data structure is maintained by a remote host. We have presented few techniques for authe...
Some Enestrom- Kakeya Type Results
In this paper we prove some Enestrom-Kakeya type results on the location of zeros of a polynomial. Mathematics Subject Classification (2010): 30C10, 30C15.