Pose Invariant Face Recognition using Neuro-Fuzzy Approach
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3
Abstract
Abstract : In this paper a pose invariant face recognition using neuro-fuzzy approach is proposed. Hereadaptive neuro fuzzy interface system (ANFIS) classifier is used as neuro-fuzzy approach for pose invariant facerecognition. In the proposed approach the preprocessing of image is done by using adaptive median filter. Itremoves the salt pepper noise from the original images. From these denoised images features are extracted.Here Principal component analysis (PCA) is used for extracting the features of an image under test. ThenANFIS classifier is used for face recognition. PCA calculate the principal components and are used by ANFISfor further process. Here in this paper combination of PCA and ANFIS is represented as PCA+ANFIS. In thepaper standard ORL face database is used for experimental results. The performance PCA+ANFIS withLDA+ANFIS and ICA+ANFIS is analyzed and compared. From experimental results it is shown thatPCA+ANFIS outperforms than other two approaches. PCA+ANFIS is also compared by existing feed forwardneural network (FFBNN) approach. The results show that proposed approach gives better outputs in terms ofaccuracy, sensitivity and specificity
Authors and Affiliations
Reecha Sharma, M. S Patterh
Buffer Overflow Attack
- Exploits, vulnerabilities, and buffer-overflow techniques have been used by malicious hackers and virus writers for a long time. In order to attack and get the remote root privilege, using buffer overflow and...
Cloud Computing: A Key to It Development in West African Sub Region
Abstract: There is no gainsaying the fact that information technology (IT) development in West Africa has met a lot of challenges ranging from cyber threat to inadequate IT infrastructure. Cloud computing is a revo...
Impact of Random Waypoint Mobility on Reactive Routing Protocols of Scalable Mobile Ad hoc Network
Abstract : Mobile Ad hoc networks are the self-configuring network, in which there is no centralized access point. The mobile nodes itself act as routers for one another. MANET is basically a wireless ad hoc network with...
Effective Crypto Systemfor Achieving Security and Performance over Market Basket Data Analysis
Abstract:Nowadays Cloud computing plays a vital role in diverseareaslike Personal Health,Social applications,enterprise,Finacial and Public domains etc., Security is an important province in as far as cloudcomputing is...
DCT based Steganographic Evaluation parameter analysis inFrequency domain by using modified JPEG luminanceQuantization Table
Abstract : Steganography is the process of hiding one file inside another such that others can neither identifythe meaning of the embedded object, nor even recognize its existence. In this paper we want to increase...