Robust Video-based Face Recognition
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 5
Abstract
In recent years, multi-camera networks have become increasingly common for biometric and surveillance systems. Multi view face recognition has become an active research area in recent years. In this paper, an approach for video-based face recognition in camera networks is proposed. Traditional approaches estimate the pose of the face explicitly. A robust feature for multi-view recognition that is insensitive to pose variations is proposed in this project. The proposed feature is developed using the spherical harmonic representation of the face, texture mapped onto a sphere. The texture map for the whole face constructed by back-projecting the image intensity values from each of the views onto the surface of the spherical model. A particle filter is used to track the 3D location of the head using multi- view information. Videos provide an automatic and efficient way for feature extraction. Data redundancy renders the recognition algorithm more robust. The similarity between feature sets from different videos can be measured using the reproducing Kernel Hilbert space.
Authors and Affiliations
B. Sivaranjani, Meena Selvaraj
Hierarchical Energy Efficient Routing Protocols in Wireless Sensor Networks: Survey
Wireless sensor networks have small nodes deployed which have small batteries used for operations which consumes or dissipates more battery. As a solution for this energy efficient routing is best optimal way. An energy...
Investigattion of Cloud Computing Security Issue
This paper describes computing is to create a disciplined procedure of scattered resources with least expenditure in command to acquire great throughput and to throw a great problem with comfort. Cloud computing uses, s...
Evolution of Routing Protocols for Wireless Sensor Networks – A Survey
WSN is a set of small power energy confined sensor nodes which can dynamically forms a network without the use of an existing network or without the use of a centralized administration. In WSN, the biggest constraint is...
A Survey on Data Privacy and Security in Internet of Things
The Internet of Things (IoT) is the use of intelligently connected devices and systems to use and manage data collected by embedded sensors and actuators in devices. The internet of things allows devices to be controlle...
Copy Cat: Effective Identification and Removal of Copy Cat Nodes in WSN
In this system, wireless sensor networks are more vulnerable to the node clone, and several distributed protocols have been proposed to detect this attack. So they require too strong assumptions that are to be practical...