A comprehensive experimental comparison of the aggregation techniques for face recognition

Authors

  • A. Kiersztyn Institute of Institute of Computer Science, Lublin University of Technology, ul. Nadbystrzycka 36B, 20-618 Lublin, Poland
  • M. Dolecki Institute of Institute of Computer Science, Lublin University of Technology, ul. Nadbystrzycka 36B, 20-618 Lublin, Poland
  • P. Karczmarek Institute of Institute of Computer Science, Lublin University of Technology, ul. Nadbystrzycka 36B, 20-618 Lublin, Poland
  • W. Pedrycz Department of Electrical & Computer Engineering, University of Alberta, Edmonton T6R 2V4 AB, Canada
Abstract:

In face recognition, one of the most important problems to tackle is a large amount of data and the redundancy of information contained in facial images. There are numerous approaches attempting to reduce this redundancy. One of them is information aggregation based on the results of classifiers built on selected facial areas being the most salient regions from the point of view of classification both by humans and computers. In this study, we report on a series of experiments and offer a comprehensive comparison between various methods of aggregation of outputs of these classifiers based on essential facial features such as eyebrows, eyes, nose, and mouth areas. For each of them, we carry the recognition process utilizing the well-known Fisherfaces transformation. During the comparisons of the vectors representing the features of images (faces) after the transformations, we consider 16 similarity$/$dissimilarity measures for which we select the best aggregation operator. The set of operators to compare was selected on a basis of the comprehensive literature review regarding aggregation functions.

Download for Free

Sign up for free to access the full text

Already have an account?login

similar resources

An Experimental Comparison of Unsupervised Learning Techniques for Face Recognition

Face Recognition has always been a fascinating research area. It has drawn the attention of many researchers because of its various potential applications such as security systems, entertainment, criminal identification etc. Many supervised and unsupervised learning techniques have been reported so far. Principal Component Analysis (PCA), Self Organizing Maps (SOM) and Independent Component Ana...

full text

Comparison of Face Recognition Techniques

In [2] feature graphs based on a wavelet transform, principle component analysis (PCA), and linear discriminant analysis (LDA) are compared. They reported 88%, 85% and 56% accuracy for PCA, LDA, and Gabor Wavelets respectively with a database containing 20 and individuals varying in gender, age, pose, and race. For each individual five images were used for testing, while one images was employed...

full text

Fractal Techniques for Face Recognition

Fractals are popular because of their ability to create complex images using only several simple codes. This is possible by capturing image redundancy and presenting the image in compressed form using the self similarity feature. For many years fractals were used for image compression. In the last few years they have also been used for face recognition. In this research we present new fractal m...

full text

investigating the feasibility of a proposed model for geometric design of deployable arch structures

deployable scissor type structures are composed of the so-called scissor-like elements (sles), which are connected to each other at an intermediate point through a pivotal connection and allow them to be folded into a compact bundle for storage or transport. several sles are connected to each other in order to form units with regular polygonal plan views. the sides and radii of the polygons are...

A Survey: Face Recognition Techniques

In this paper we present a widespread and significant survey of face detection algorithms. Face detection is a necessary first-step in face recognition systems, with the idea of localizing and extracting the face region from the background. It also has numerous applications in areas such as passport-verification, video conferencing, crowd surveillance, detective agencies and military purposes. ...

full text

My Resources

Save resource for easier access later

Save to my library Already added to my library

{@ msg_add @}


Journal title

volume 16  issue 4

pages  1- 19

publication date 2019-08-20

By following a journal you will be notified via email when a new issue of this journal is published.

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023