Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Detection of Face with Face Recognition

Author : Ilavendhan A 1 Prabhat Kumar Srivastava 2

Date of Publication :9th February 2018

Abstract: The face is one of the simplest ways to differentiate one another's personality. Face recognition is an authentication system that uses a person's personal identity characteristics. The method of face recognition for humans consists basically of two steps, including facial recognition. The next stage is the identification of humans, where this process happens very rapidly, except in cases when the target is located a short distance away. Stage is replicated and developed as a standard for identification of facial expressions (facial recognition) is one of the long-studied developments of biometrics and developed by experts. There are two kinds of methods;Eigen face and Fisher face methods, which are common in developed trends for face recognition. Facial image recognition Identify the mechanism by way of Principal Component Analysis (PCA) for facial features to minimize the facial volume. The main purpose of using PCA for facial identification using Eigen faces was to identify a prophetic vector which corresponds to the largest value of the facial image. The area of this project is the image processing of face detection system with face recognition. The appropriate software is MATLAB software for this project.

Reference :

    1. F. M. Ramírez, R. M. Cichy, C. Allefeld, and J. D. Haynes, “The neural code for face orientation in the human fusiform face area,” J. Neurosci., vol. 34, no. 36, pp. 12155– 12167, 2014.
    2. K. S. Weiner and K. Grill-Spector, “The improbable simplicity of the fusiform face area,” Trends in Cognitive Sciences, vol. 16, no. 5. pp. 251–254, 2012.
    3. B. Prihasto et al., “A survey of deep face recognition in the wild,” in 2016 International Conference on Orange Technologies, ICOT 2016, 2018, vol. 2018- January, pp. 76–79.
    4. O. M. Parkhi, A. Vedaldi, and A. Zisserman, “Deep Face Recognition,” 2015, pp. 41.1- 41.12.
    5. G. M. Zafaruddin and H. S. Fadewar, “Face recognition using eigenfaces,” in Advances in Intelligent Systems and Computing, 2018.
    6. B. F. Klare et al., “Pushing the frontiers of unconstrained face detection and recognition: IARPA Janus Benchmark A,” in Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2015.
    7. Y. Sun, Y. Chen, X. Wang, and X. Tang, “Deep learning face representation by joint identification-verification,” in Advances in Neural Information Processing Systems, 2014.
    8. S. Chakraborty and D. Das, “An Overview of Face Liveness Detection,” Int. J. Inf. Theory, 2014.
    9. T. Valentine, M. B. Lewis, and P. J. Hills, “Face-space: A unifying concept in face recognition research,” Q. J. Exp. Psychol., 2016.
    10. Y. Taigman, M. Yang, M. Ranzato, and L. Wolf, “DeepFace: Closing the gap to humanlevel performance in face verification,” in Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2014.
    11. Ashutosh Gupta, Bhoopesh Bhati and Vishal Jain, "Artificial Intrusion Detection Techniques: A Survey", International Journal of Computer Network and Information Security (IJCNIS), Hongkong, Vol. 6, No. 9, September 2014, having ISSN No. 2074- 9104.
    12. Khaleel Ahmad, Muneera Fathima, Vishal Jain, Afrah Fathima, “FUZZY-Prophet: A Novel Routing Protocol for Opportunistic Network”, International Journal of Information Technology (BJIT), Vol. 9 No. 2, Issue 18, June, 2017, page no. 121-127 having ISSN No. 2511-2104.
    13. Prachi Dewal, Gagandeep Singh Narula and Vishal Jain, “A Survey of Intrusion Detection Systems and Secure Routing Protocols in Wireless Sensor Networks”, International Journal For Research in Emerging Science and Technology, Vol. 3, No. 1, January, 2016, page no. 16 - 20 having ISSN No. 2349-7610
    14.  K Deepika, N Naveen Prasad, S Balamurugan, S Charanyaa, “Survey on Security on Cloud Computing by Trusted Computer Strategy”, International Journal of Innovative Research in Computer and Communication Engineering, 2015
    15. P Durga, S Jeevitha, A Poomalai, M Sowmiya, S Balamurugan, “Aspect Oriented Strategy to model the Examination Management Systems”, International Journal of Innovative Research in Science, Engineering and Technology , Vol. 4, Issue 2, February 2015
    16. RS Venkatesh, PK Reejeesh, S Balamurugan, S Charanyaa, “Further More Investigations on Evolution of Approaches and Methodologies for Securing Computational Grids”, International Journal of Innovative Research in Science, Engineering and Technology , Vol. 4, Issue 1, January 2015

Recent Article