Face Recognition System under Varying Lighting Conditions
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 14, Issue 3
Abstract
Making recognition more reliable under uncontrolled lighting conditions is one of the most important challenges for practical face recognition systems. Other recognition systems don’t nullify most of the lighting variations. We tackle this by combining the strengths of robust illumination normalization, local texture-based face reresentations, distance transform based matching and kernel based feature extraction and multiple feature fusion. We present a simple and efficient preprocessing chain that eliminates most of the effects of changing illumination while still preserving the essential appearance details that are needed for recognition. We introduce Local Ternary Pattern (LTP), a generalization of the Local Binary Pattern (LBP) local texture descriptor less sensitive to noise. We further increase robustness by introducing Phase Congruency. The resulting method provides a face verification rate of 88.1% at 0.1% false accept rate. Experiments show that our preprocessing method outperforms several existing preprocessors for a range of feature sets, data sets and lighting conditions. We simulate this project using MATLAB software
Authors and Affiliations
P. Kalaiselvi
Mutual Trust to Provide Data Security in Cloud Environment
Abstract: We introduce a model for provable data possession (PDP) that allows a client that has stored data at an untrusted server to verify that the server possesses the original data without retrieving it. The mo...
Real Time Monitoring Of Urban Water Systems for Developing Countries
Abstract: The safe and satisfactory provision of water related services in urban areas of developing countries remain a major challenge mainly attributed to limited resources and inability to promptly detect operat...
11 × 11 Playfair Cipher based on a Cascade of LFSRs
Playfair cipher is one of the better-known multiple letter encryption ciphers. In this method, the diagrams in the plaintext are treated as a single unit and then these units converted into ciphertext diagrams.&n...
Change-Proneness of Software Components
Abstract : In this research paper, we have done a statistical study on the factors that influence the rate of change of piece of code (class or groups of class of working together).After conducting systematic liter...
Attack Graph to Graph Database
Abstract: Databases are an integral part of almost any computing system today, and users heavily rely on the services they provide. When we interact with a computing system, we expect that any data be stored for fu...