Techniques for Face Detection & Recognition Systema Comprehensive Review

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 15, Issue 5

Abstract

 Face detection and Facial recognition technology has emerged as a striking solution to address many contemporary prerequisites for identification and the verification of identity prerogatives. It brings together the potential of supplementary biometric systems, which attempt to link identity to individually distinctive features of the body, and the more acquainted functionality of visual surveillance systems. In current  decades face recognition has experienced significant consideration from both research communities and the  marketplace, conversely still remained very electrifying in real applications. The assignment of face detection  and recognition has been dynamically researched in current eternities. This paper offers a conversant  evaluation of foremost human face recognition research. We first present a summary of face detection, face  recognition and its solicitations. Then, a literature review of the predominantly used face recognition techniques  is accessible. Clarification and restrictions of the performance of these face recognition algorithms are specified.  Here we present a vital assessment of the current researches concomitant with the face recognition process. In  this paper, we present a broad range review of major researches on face recognition process based on various  circumstances. In addition, we present a summarizing description of Face detection and recognition process  and development along with the techniques connected with the various influences that affects the face  recognition process.

Authors and Affiliations

Vandana S. Bhat

Keywords

Related Articles

A Survey Report on Distributed System Using Load Balancing Approach

Abstract:A number of load balancing algorithm were developed in order to improve the execution of a distributed application in any kind of distributed architecture. Load balancing involves assigning tasks to each process...

 Study of Java Access Control Mechanism

 a class as "a collection of data and methods." One of the important object-oriented techniques is hiding the data within the class and making it available only through the methods. This technique is known as &nbs...

 Bank Locker Securty System Using Iot

Personal Security is one of the main concern when it comes to office, personal workplace in home,banketc.Soto over come this problem, this project suggest the use of Internet of Things(IoT) to provide secure access only...

 TPDS: A Heuristic Approach for Traffic Pattern Discovery System in Mobile Ad-hoc Network

Abstract : There is absence of centralized coordination among nodes in Mobile Ad-hoc Network (MANET). This makes MANET vulnerable to attacks especially passive attacks. Security is one of the major concerns inmilitary ap...

 Cloud Computing Networks with Poisson Arrival Process-Dynamic Resource Allocation

 Abstract: In this article we considered a cloud computing network model which acts as a tool for dynamic resource allocation problem in cloud computing. Every successful servicing of cloud paradigm need an optima...

Download PDF file
  • EP ID EP99276
  • DOI -
  • Views 101
  • Downloads 0

How To Cite

Vandana S. Bhat (2013).  Techniques for Face Detection & Recognition Systema Comprehensive Review. IOSR Journals (IOSR Journal of Computer Engineering), 15(5), 1-12. https://europub.co.uk/articles/-A-99276