An Overview of Holistic Face Recognition
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 9
Abstract
Biometric is including two parts bios (life) and metrikos (measure). This word comes from Greek. A biometric system is essentially a pattern recognition system that recognizes a person based on a feature vector derived from a specific physiological or behavioral characteristic that the person possesses. Holistic face recognition utilizes global information from faces to perform face recognition. The global information from faces is fundamentally represented by a small number of features, which are directly derived from the pixel information of face images. These small numbers of features distinctly capture the variance among different individual faces and therefore are used to uniquely identify individuals. Describe two holistic approaches to face recognition called Karhunen-Lo`eve expansion and Linear Discriminate Analysis.
Authors and Affiliations
Sasan Karamizadeh, Shahidan M. Abdullah and Mazdak Zamani
A Brief Servey Of Rfid Devices And Its Security Protocols
Security plays a very important role during the transmission of information in RFID devices. RFID are the wireless devices that contain a tag and a reader. While there are many authentication protocols put into opera...
Efficient Defence System For Avoid Malware Propagation In Mobile Network
We investigate the problem of how to optimally distribute the content-based signatures of malware, which helps to detect the corresponding malware and disable further propagation, to minimize the number of infected n...
A Novel Strategy to Maximize the modulation index Under Unbalanced DC Sources
In this paper a new NVM (Neutral modulation method) technique has been proposed to achieve balanced output in the multilevel cascaded inverter (MLCI) operating under unbalanced DC conditions. In order to examine thes...
An Efficient Method for Steganography in Videos
This paper applies steganography algorithm in videos. In proposed method we are hiding the data in a compressed video by using optimal pixel adjustment process (OPAP). Secrete Message is first encrypted by using cryp...
PARTIAL UPDATE ADAPTIVE TECHNIQUES FOR WIRELESS NETWORKS
An adaptive distributed strategy is developed based on incremental techniques. Distributed wireless sensor networks finds many remote sensing applications like battle field, surveillance, target localization, environ...