Face Recognition Using Convolution Based Dwt and CLBP Feature Vectors
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 5
Abstract
Abstract: The face recognition is an essential criteria to identify a person in recent advanced security systems. In this paper, we propose efficient Face Recognition using Convolution based DWT and CLBP Feature Vectors. Here database images are first applied with DWT then normalized and convolved with the original image toachieve sharpening of images and filtering of high frequency components. The features thus obtained are applied to CLBP which generates more unique features. The same procedure is repeated for test image to obtain unique test features which are compared with database features using Euclidean Distance. The performance parameters are calculated for standard database and it is observed that the proposed method is better in comparison with the existing methods.
Authors and Affiliations
Narayan T Deshpande , Dr. S Ravishankar
Influence of Socioeconomic Status and Expectations among Completely Edentulous Patients on Conventional Complete Denture Treatment
Objective: The purpose of this study was to determine the effect of socioeconomic status on patient expectation from the treatment through a Questionnaire based survey. Material and Method: The Present study was conducte...
Medial Axis Transformation based Skeletonzation of Image Patterns using Image Processing Techniques
he medial axis of an image pattern is the loci of all inscribed disks that touch two or more boundary points without crossing any of the boundaries. The medial axis transform (MAT) is a powerful representatio...
Embedded Fingerprint Matching Mechanism in HIS for Health Care Service
Abstract: As technologies develops, our needs can be increase and also it can be change.The invention of new medical equipment’s in health care services can help both the patients and the doctors in several ways. I...
Combating against Byzantine Attacks in MANET using Enhanced Cooperative Bait Detection Scheme (ECBDS)
Abstract: Mobile Ad-hoc(MANET) is an accumulation of versatile, decentralized, and self composed nodes. The distributive nature, base less & element structure make it a simple prey to security related dangers. Thesec...
Improving Data Storage Security in Cloud Computing UsingElliptic Curve Cryptography
Abstract: Companies tends towards more availability, less cost, managed risk, agility- all of which areproviding by cloud computing. The cloud computing is a way to deliver IT services on demand and pay perusage, and it...