Techniques for Face Detection & Recognition Systema Comprehensive Review
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 15, Issue 5
Abstract
Face detection and Facial recognition technology has emerged as a striking solution to address many contemporary prerequisites for identification and the verification of identity prerogatives. It brings together the potential of supplementary biometric systems, which attempt to link identity to individually distinctive features of the body, and the more acquainted functionality of visual surveillance systems. In current decades face recognition has experienced significant consideration from both research communities and the marketplace, conversely still remained very electrifying in real applications. The assignment of face detection and recognition has been dynamically researched in current eternities. This paper offers a conversant evaluation of foremost human face recognition research. We first present a summary of face detection, face recognition and its solicitations. Then, a literature review of the predominantly used face recognition techniques is accessible. Clarification and restrictions of the performance of these face recognition algorithms are specified. Here we present a vital assessment of the current researches concomitant with the face recognition process. In this paper, we present a broad range review of major researches on face recognition process based on various circumstances. In addition, we present a summarizing description of Face detection and recognition process and development along with the techniques connected with the various influences that affects the face recognition process.
Authors and Affiliations
Vandana S. Bhat
Enhancement of Security in DNA Based Cryptography
Abstract: DNA containing data obtained from more conventional binary storage media. Plaintext messagedata encoded in DNA strands by use of a (publicly known) Key of alphabet of short oligonucleotide sequences
Steps to System Reconfiguration in a Distributed DatabaseSystem: A Fault-tolerant Approach
Abstract: In this paper, we examine steps to system reconfiguration in a Distributed Database using some faulttolerance scheme for a distributed database system that is compatible with respect to system failure i.e...
Detection of Network Intrusion and Countermeasure Selection in Cloud Systems
Abstract: In Cloud Server Systems, The detection of zombie in virtual machine is considered as the security threat exploration attacks is extremely difficult, due to this the cloud user can able to install harmful...
ComparativeAnalysis of Automated Image-Tagging Techniques
Abstract: Smart phones with cameras having powerful built-in sensors tend to meet at a point towards theproblem of automatic image-tagging. So such an out-of-band approach is valuable, especially with increasingdev...
Fidelity Analysis of Additive and Multiplicative Watermarked Images in Integrated Domain
Abstract: The escalation of internet has increased the usage of multimedia contents for wide range of functions. The easy access of the digital contents paves way to manipulate, edit and duplicate the contents using av...