A Three-stage Filtering Approach for Face Recognition

Publish Year: 1400
نوع سند: مقاله ژورنالی
زبان: English
View: 215

This Paper With 9 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_IJE-34-8_006

تاریخ نمایه سازی: 12 مرداد 1400

Abstract:

Face recognition has become a crucial topic in recent decades, which offers important opportunities for applications in security surveillance, human-computer interaction, and forensics. However, it poses challenges, including uncontrolled environments, large datasets, and insufficiency of training data. In this paper, a face recognition system is proposed to iron out the above problems with a new framework based on a hashing function in a three-stage filtering approach. At the first stage, candidate subjects are chosen using the Locality-Sensitive Hashing (LSH) function. We employ a voting system to select candidates via disregarding a large number of dissimilar identities considering their local features. At the second stage, a robust image hashing based on Discrete Cosine Transform (DCT) coefficients is used to further refine the candidate images in terms of global visual information. Finally, the test image is recognized among selected identities using other visual information, resulting in further accuracy gains. Extensive experiments on FERET, AR, and ORL datasets show that the proposed method outperforms with a significant improvement in accuracy over the state-of-the-art methods.

Authors

H. Hassanpour

Computer Engineering and IT Department, Shahrood University of Technology, Shahrood, Iran

M. Ghasemi

Computer Engineering and IT Department, Shahrood University of Technology, Shahrood, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Lahasan, B., Lutfi, S. L., and San-Segundo R., "A survey ...
  • Oloyede, M. O., Hancke, G. P., and Myburgh, H. C., ...
  • Adjabi, I., Ouahabi, A., Benzaoui, A., and Taleb-Ahmed, A., “Past, ...
  • Surasak, T., Takahiro, I., Cheng, C. H., Wang, C. E., ...
  • Ahonen, T., Member, S., Hadid, A., Member, S., and Pietika ...
  • Simonyan, K., Parkhi, O. M., Vedaldi, A., “Fisher vector faces ...
  • Cao, Z., Yin, Q., Tang, X., and Sun, J., “Face ...
  • Vadlamudi, L., Vaddella, R. “A Review Of Robust Hashing Methods ...
  • Datar, M., Immorlica, N., and Indyk, P., “Locality-Sensitive Hashing Scheme ...
  • Shi, Q., Li, H., and Shen, C., “Rapid face recognition ...
  • Stan, Z. Li., Anil, K. Jain., " Local Representation of ...
  • Lowe, D. G., “Distinctive image features from scale-invariant keypoints”, International ...
  • Liu, C. and Wechsler, H., “Gabor Feature Based Classification Using ...
  • Zafaruddin, G. M. and Fadewar, H. S., “Face recognition using ...
  • Belhumeur, P. N., Hespanha, J. P., and Kriegman, D. J., ...
  • Luo, Y., Yang, Y., Shen, F., Huang, Z., Zhou, P., ...
  • Shiyuan, H., Bokun, W., “Bidirectional Discrete Matrix Factorization Hashing for ...
  • Paulevé, L., Jégou, H., and Amsaleg, L., “Locality sensitive hashing: ...
  • Dos Santos, C. E., Kijak, E., Gravier, G., and Schwartz, ...
  • Dehghani, M., Moeini, A., and Kamandi, A., “Experimental Evaluation of ...
  • Dai Q., J. Li, Wang, J., Chen, Y., and Jiang, ...
  • Tang, Z., Yang, F., Huang, L., and Zhang, X., “Robust ...
  • Akhlaghi, S. and Hassanpour, H., “Frontal face modeling using morphing-based ...
  • Li, Y., Zheng, Cui, W., Z., and Zhang, T., “Face ...
  • Deng, W., Hu, J., and Guo, J., “Extended SRC: Undersampled ...
  • Chakraborti, T. and Chatterjee, A., “Engineering Applications of Artificial Intelligence ...
  • Ouyang, A., Liu, Y., Pei, S., Peng, X., He, M., ...
  • Dora, L., Agrawal, S., Panda, R., and Abraham, A., “An ...
  • Liao, M. and Gu, X., “Face recognition approach by subspace ...
  • Xie, X. and Lam, K. M., “Gabor-based kernel PCA with ...
  • Nikan, F. and Hassanpour, H., “Face recognition using non-negative matrix ...
  • Zeng, J., Zhao, X., Gan, J., Mai, C., Zhai, Y., ...
  • xue Gao, Q., Zhang, L., and Zhang, D., “Face recognition ...
  • Lu, J., Tan, Y., and Wang, G., “Discriminative Multi-Manifold Analysis ...
  • Schwartz, W. R., Guo, H., Choi, J., and Davis L. ...
  • Liu, Z., Yang, J., and Liu, C., “Extracting multiple features ...
  • Zhang, K., Zhang, Z., Li, Z., Member, S., Qiao, Y., ...
  • Ojala, D., Pietik¨ainen, T., Harwood, M., “A comparative study of ...
  • Fridrich, G. M., “Robust hash functions for digital watermarking”, International ...
  • Vapnik, V. and Corinna, C., “Support-vector networks,” Machine Learning, (۱۹۹۵), ...
  • Wright, J., Member, S., Yang, A. Y., Ganesh, A., and ...
  • Martinez, A. M. and Kak, A. C., “PCA versus LDA,” ...
  • Marian, B., Javier, R., Terrence, J., “Face Recognition by Independent ...
  • Taskiran, M., Kahraman, N., ErogluErdem, C., “Face recognition: Past, present ...
  • Shavandi, M. and Afrakoti, I. E. P., "Face Recognition in ...
  • نمایش کامل مراجع