AGE CLASSIFICATIONS BASED ON SECOND ORDER IMAGE COMPRESSED AND FUZZY REDUCED GREY LEVEL (SICFRG) MODEL
Journal Title: International Journal on Computer Science and Engineering - Year 2013, Vol 5, Issue 6
Abstract
One of the most fundamental issues in image classification and recognition are how to characterize images using derived features. Many texture classification and recognition problems in the literature usually require the computation on entire image set and with large range of gray level values in order to achieve efficient and precise classification and recognition. This leads to lot of complexity in evaluating feature parameters. To address this, the present paper derives a Second Order image Compressed and Fuzzy Reduced Grey level (SICFRG) model, which reduces the image dimension and grey level range without any loss of significant feature information. The present paper derives GLCM features on the proposed SICFRG model for efficient age classification that classifies facial image into a five groups. The SICFRG image mode of age classification is derived in three stages. In the first stage the 5 x 5 matrix is compressed into a 2 x 2 second order sub matrix without loosing any significant attributes, primitives, and any other local properties. In stage 2 Fuzzy logic is applied tPo reduce the Gray level range of compressed model of the image. In stage 3 GLCM is derived on SICFRG model of the image. The experimental evidence on FG-NET and Google aging database clearly indicates the high classification rate of the proposed method over the other methods.
Authors and Affiliations
Jangala. Sasi Kiran , Dr. V. Vijaya Kumar , Dr. B. Eswara Reddy
Frequent Pattern Mining using CATSIM Tree
Efficient algorithms to discover frequent patterns are essential in data mining research. Frequent pattern mining is emerging as powerful tool for many business applications such as e-commerce, recommender systems and su...
PDPKDES ( Pre Distributed Powerful Key for Data Encryption Standard)
Data encryption standard in spite of being a great algorithm in terms of a good combination of confusion and diffusion steps, doesn’t largely used because of a weak key concept. The key used in DES is only 64 bits (or 56...
Predicted Link Expiration Time Based Connected Dominating Sets for Mobile Ad hoc Networks
We propose an algorithm to determine stable connected dominating sets (CDS), based on the predicted link expiration time (LET), for mobile ad hoc networks (MANETs). The roposed LETbased CDS algorithm is the first such al...
Identity Recognizing using Iris Scan with multiple frames of Video
The field of iris biometrics has been significant research over the last decade. At this point, iris capture has become a main stream technology with wide acceptance. A general iris recognition system works with four dif...
Frequent Item set Mining Using Global Profit Weight Algorithm
The objective of the study focused on weighted based frequent item set mining. The base paper has proposed multi criteria based frequent item set for weight calculation. Contribution towards this project is to implement...