Identify the surgically altered face images using granular-PCA approach
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: Plastic surgery provide a way to enhance the facial appearance. The non-linear variations introduced by the plastic surgery has raised a challenge for face recognition algorithms. In this research we match the face image before and after the plastic surgery. First generate non-disjoint face granules at multiple levels of granularity. The feature extractors are used to extract features from the face granules. The features are then processed by using principal component analysis (PCA) algorithm. Evaluate the weighted distance and match the pre and post surgery images based on weighted distance.The proposed system yield high identification accuracy and take less time for recognition as compared to the existing system
Authors and Affiliations
Bincy Baby, M-Tech student , Nurjahan V A, Assistant professor
Performance Evaluation of Wlan by Varying Pcf, Dcf and Enhanced Dcf Slots To Improve Quality of Service
Researchers have proposed a number of co-ordination functions in literature for improving quality of service. Each one is based on different characteristics and properties. In this paper, we evaluate the perfor...
Empirical Study of 2-bit Fast Adder using Simon 2.0
Abstract : The present context of post CMOS era demands highly sophisticated low power consuming high speed novel integrated chips in nanometer region. SET (Single Electron Transistor) is eventually the highest priority...
An Effective Keyword Search over Encrypted Data In Cloudenvironment
As Cloud Computing ends up pervasive, touchy data are as a rule progressively unified into the cloud. For the insurance of information protection, delicate information must be scrambled before outsourcing, which makes co...
Reduce the False Positive and False Negative from Real Trafficwith Intrusion Detection in Zigbee Wireless Networks
Abstract: Denial-of-Service attack in particular is a threat to zigbee wireless networks. It is an attack in whichthe primary goal is to deny the legitimate users access to the resources. A node is prevented from r...
Feasibility of Laying Fiber-Optic Cables underwater along RiverNile Basin- Sudan Study Case
Abstract: Fiber optics cables offers various advantages of over regular cables when used as datatransportation medium in today’s communication networks. The River Nile basin countries such as Sudanenjoys vast dista...