Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2021, International Journal of Advanced Trends in Computer Science and Engineering
https://doi.org/10.30534/ijatcse/2021/341022021…
4 pages
1 file
A lot of research work and development is taking place in being carried in field of face recognition, now a days. A face recognition process has two pillars: face detection and face recognition. A number of techniques are being used these purposes. The accuracy of all those techniques vary and separate techniques for detection and recognition are in practice at present. In this paper we will give an insight to accuracies of different face detection and recognition techniques which are being widely used by researchers and developers.
International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2019
Face recognition has now become one of the interesting fields of research and has received a substantial attention of researchers from all over the world. Face recognition techniques has been mostly used in the discipline of image analysis, image processing, etc. One of the face recognition techniques is used to develop a face recognition system to detect a human face in an image. In face recognition system a digital image with a human face is given as an input which extracts the significant features of face such as (eyes, nose, chin, cheeks, etc) to recognize a face in a digital image which is an exhausting task. Security of information is very salient feature and is difficult to achieve. Security cameras are present in offices, universities, banks, ATMs, etc. All these security cameras are embedded with face recognition systems. There are various algorithms which are used to solve this problem. This paper provides an overview of various techniques which are often used for this face recognition in a face recognition system. This paper is divided into five parts, first section concludes various face detection techniques, second section describes about image processing ,third section have details about face recognition techniques, fourth section describes various classification methods and last section concludes all of these sections.
Ijca Proceedings on Emerging Trends in Computer Science and Information Technology Etcsit1001, 2012
Many Algorithms for implementation of face recognition are popular in face recognition all having respective advantages and disadvantages. Some improves the efficiency of face recognition, under varying illumination and expression conditions for face images. Feature representation and classification are two key steps for face recognition. Authors have presented novel techniques for face recognition. In this paper, we presented an overview of face recognition techniques and its applications.
Face recognition is considered as one of the emerging topics in computer vision application. Currently biometric research is mainly focused on automated face recognition in various applications such as surveillance application in various public security measures. Face recognition is a biometric system used to categorize or authenticate a person from a digital image by extracting its features and then distinguishing it, regardless external conditions. This learning version has mainly two motives: first one is the extensive assortment of profitable and regulation implementation claims, second is the convenience of possible skills. This paper is organised as three sections. The first section describes brief introduction to face recognition. The second section types of face recognition and various problems affecting the process and finally third section describes a comparative study of different face recognition methods.
The information and data gathering in plenitude, there is an essential requirement for high security. Biometrics has now gotten more consideration. Face biometrics, a valuable tool for a man\\\'s verification is a basic and non-meddlesome technique that perceives face in complex multidimensional visual model and builds up a computational model for it. This paper reveals the recognition of the face and then followed by examining the strategy and working. From the above observations, we focused our attention to the latest face recognition techniques posting their favourable circumstances and inconveniences. A few procedures determined here were additionally enhance the proficiency of face recognition under different brightening and demeanor state of face images. The goal of this paper is to present a critical survey of existing literatures on human face recognition.
2018
Face Recognition which is still one of the challenging topic in Computer Vision and Image Processing field remains an open problem as the recent advancements has not yet reached high recognition performance in real world environment. With the usage of technologies for Computer Vision and Image Processing, Face Recognition has gained more interest due to it applications and concerns on high security. Human Face can be considered as a key identifier in various fields and Computational models of face recognition can be applied to a wide variety of problems involving security system, Identification of criminals or suspects, image and film processing, and human computer interaction. This field of computer vision and image processing involves recognition of face from image or a video source. Several algorithms and methodologies for face identification have been developed having their own pros and cons. In this paper, we will provide review and survey of some famous major face recognition ...
International Conference on Communication and Electronics System Design, 2013
Face Recognition is used for real time application. So reliability is the more important matter for security. Facial Recognition is rapidly becoming area of interest. Face biometrics is useful for authentication that recognizes face. This paper represents review of face recognition methods and discusses their advantages and disadvantages. The purpose of this paper is to provide a survey of face recognition methods that appeared in the literature over the past decade which was not discussed in the previous survey and also categorize them into meaningful approaches.
International Journal of Multidisciplinary Research and Explorer (IJMRE), 2021
Department of computer science engineering Jd college of engineering and management Kalmeshwar road valni Nagpur 441501. Abstract-The most significant part of face recognition is the input representation. This refers to the transformation of the intensity map to a form of input representation that allows easy and effective extraction of highly discriminative features. The next stage is classification. Although this is an important stage, the popular techniques and their strengths are fairly similar to each other. As such, the choice of classification algorithm does not affect the recognition accuracy as much as input representation. Input representation is the major factor that differentiate face recognition algorithms. It can be approached in 2 manners: a geometrical approach that uses spatial configuration of the facial feature, and a more pictorial approach that uses image-based representation. In this paper a set of different face recognition algorithms are reviewed, and the best practices in this domain are studied and verified.
International Journal of Advanced Computer Science and Applications, 2018
With the rapid growth in multimedia contents, among such content face recognition has got much attention especially in past few years. Face as an object consists of distinct features for detection; therefore, it remains most challenging research area for scholars in the field of computer vision and image processing. In this survey paper, we have tried to address most endeavoring face features such as pose invariance, aging, illuminations and partial occlusion. They are considered to be indispensable factors in face recognition system when realized over facial images. This paper also studies state of the art face detection techniques, approaches, viz. Eigen face, Artificial Neural Networks (ANN), Support Vector Machines (SVM), Principal Component Analysis (PCA), Independent Component Analysis (ICA), Gabor Wavelets, Elastic Bunch Graph Matching, 3D morphable Model and Hidden Markov Models. In addition to the aforementioned works, we have mentioned different testing face databases which include AT & T (ORL), AR, FERET, LFW, YTF, and Yale, respectively for results analysis. However, aim of this research is to provide comprehensive literature review over face recognition along with its applications. And after in depth discussion, some of the major findings are given in conclusion.
System that relay on face recognition biometrics have gained great impact on security system since security threats are imposed weakness among the implemented security system. Other biometrics which used for security like fingerprints have some issues and they are not trust worthy. In this survey paper we discussed different types of existing face recognition techniques along with their pros and cons. Face recognition is not a simple thing its very complex system because in face recognition if the user hide their face with sunglasses or hide the face with hijab then its difficult task to recognize the face for that purpose in face recognition used different types of techniques which can recognize the faces in this survey paper we discussed these techniques.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
International Journal of Computer Applications, 2015
International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2019
NFC-IEFR Journal of Engineering and Scientific Research, 2016
International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2022
International Journal of Computer Applications, 2016
IOSR Journal of Computer Engineering, 2014