Face Recognition Techniques: A Survey
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 4
Abstract
In recent days, the demand for biometric security system has risen due to a wide range of surveillance, access control and law enforcement applications. Among the various biometric security systems based on finger print, iris, voice or speech and signature, face recognition seems to be easily accessible, non-intrusive, and most universal system. It is easy to use, can be used efficiently for mass scanning which is quite difficult in case of other biometrics, and also increases user friendliness in human computer interaction. Several interesting research attempts are made in the field of face recognition. There are three main divisions of face recognitions based on the face data acquisition type: methods that deal with intensity images, those that operate on video sequences and those that are based on other sensor inputs. This paper provides an overview of few widely used methods in each of these divisions along with the advantages and disadvantages.
Authors and Affiliations
Ranganatha S, Dr. Y P Gowramma
Evaluating Performance of Proactive and Reactive Routing Protocols for Wireless Ad-Hoc Networks
Mobile Ad hoc network (MANET) is a rambling collection of wireless mobile nodes that dynamically form a temporary network infrastructure without any support of central coordination. All the nodes in MANET moves arbitrar...
Performance Parameters Evaluation of EnergyEfficient LEACH Routing Protocol.
Wireless sensor network (WSN) consists of a very large number of dispersed and dedicated sensors in order to sense the physical conditions or parameters of the environment like sound, temperature, humidity, pollution le...
A Survey on DNA Based Cryptography
DNA cryptography is a new era of enhanced security for the data transfer using the internet. DNA cryptography enhanced the cryptography in terms of time complexity as well as capacity. It uses the DNA strands to hide th...
Design of Deterministic Finite Automata using Pattern Matching Strategy
An automaton is an entity work for specific computation and designed for that computation. Based on the problem automaton can be designed to satisfy the given problem. Automata have finite and infinite types. Finite aut...
slugA Study of Population Density Distribution Pattern of Karachi City Using Spatial-Interaction Gravity Models (Sigms)
Administratively, before the year 2000 Karachi was distributed in five districts. Afterwards, it was divided into eighteen towns. It gave rise to a great controversy that whether the 5-district system is administrativel...