Face Recognition Using Convolution Based Dwt and CLBP Feature Vectors
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 5
Abstract
Abstract: The face recognition is an essential criteria to identify a person in recent advanced security systems. In this paper, we propose efficient Face Recognition using Convolution based DWT and CLBP Feature Vectors. Here database images are first applied with DWT then normalized and convolved with the original image toachieve sharpening of images and filtering of high frequency components. The features thus obtained are applied to CLBP which generates more unique features. The same procedure is repeated for test image to obtain unique test features which are compared with database features using Euclidean Distance. The performance parameters are calculated for standard database and it is observed that the proposed method is better in comparison with the existing methods.
Authors and Affiliations
Narayan T Deshpande , Dr. S Ravishankar
Low selectivity problem using the concept of sampling
available information on social peers for improving the information needs of a user or node, this is because of the birth of online social networks. In this paper, the focus is on improvement of the performance of...
Iris recognition by using blood vessel segmentation
Abstract: Among the various biometrics technologies, iris recognition is the most reliable and accurate biometric identification system available. In this paper a novel framework for recognizing and identifying iris is b...
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
These days privacy preservation topic is based on one of the heated topics of data mining today. With the development of data mining technology, an increasing number of data can be mined out to reveal some potent...
Modern Computer Implementation on Smart Phone withAndroid Platform for Smes (UMKM) in Optimization ServicesDistrict Malang
Abstract: The use of Android in the smartphone operating system currently used by many companies. Because of its superiority as a software that uses computer code base that can be distributed openly (open source) so many...
A Secure Data Hiding Scheme In Images Using Random Generated Key
Abstract: Data hiding is the process of transmitting images in a hidden manner, where as the message should be invisible to the unauthorized users. This technique is a good way to achieve the secret delivery of dat...