Human Gait Based Gender Classification Using Various Transformation Techniques
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 11
Abstract
Gender classification such as classifying human face is only challenging for computer, but even hard for human in some cases. In our work a new novel approach is proposed to recognize gender from the face image. Continuous Wavelet Transforms, Discrete Wavelet Transforms, Radon Transforms are used for features selections for each face images of male and female. These selected features will be used to classify the face images of each Gender using Support Vector Machine with Linear Kernel. Our work use ORL database contain 100 images include both Male and Female Gender .The experimental result shows that the proposed approach (Continuous wavelet Transform and Support Vector Machine). Proposed work achieves higher performance than some other methods, and is even more accurate than human observers. We also present a numerical analysis of the contributions of different human components, which shows that head, hair and back are more discriminative than other components. All the above prove that gaitbased gender classification is feasible in controlled environments. We use both static and dynamic data sets ( images & video) for the gender classification process through SVM classifier.
Authors and Affiliations
Muthumari Paluchamy, D. Suganya, S. Ellammal
Highly Secured High Throughput Efficient VLSI Architecture for AES Implementations
The AES algorithm can be implemented in different styles at programming levels. The paper compares the hardware efficiency of different AES implementations with respect to their area, speed and power performance espec...
High Speed Implementation Of Fused Floating Point Add-Subtract Unit
Most universally useful processors (GPP) and application particular processors (ASP) utilize the coasting guide number-crunching due toward its wide and exact number framework. In any case, the coasting point operatio...
In-dependable Data hiding in an Encrypted Image using FCM-DH Algorithm
In this paper, a data mining technique, Fuzzy C Means Clustering (FCM) based data hiding algorithm (FCM-DH) is used to divide pixels into classes or clusters from the encrypted image. Clustering of pixels in an encry...
Double Compression Of JPEG Image Using DWT Over RDWT
Reconstruction of the history of an image is a difficult process with visual document analysis. Suppose, if an image undergo double compression, then the compressed image is not the exact bit stream generated by the...
Strategy And Guidelines For Sheltering Database To Database Communication Through Database Links
The majority of organizations today prefer Oracle database systems to maintain their operational and transactional data. Multiple databases will be used for different fields of operation in an organization. There aris...