CFP last date
22 April 2024
Reseach Article

Face Authentication using Euclidean Distance Model with PSO Algorithm

Published on July 2015 by R.senthilkumar, M.vigneshwaran, S.uma
International Conference on Innovations in Computing Techniques (ICICT 2015)
Foundation of Computer Science USA
ICICT2015 - Number 3
July 2015
Authors: R.senthilkumar, M.vigneshwaran, S.uma
67e1bf92-b92d-4281-af68-dd1dd96e87b5

R.senthilkumar, M.vigneshwaran, S.uma . Face Authentication using Euclidean Distance Model with PSO Algorithm. International Conference on Innovations in Computing Techniques (ICICT 2015). ICICT2015, 3 (July 2015), 16-19.

@article{
author = { R.senthilkumar, M.vigneshwaran, S.uma },
title = { Face Authentication using Euclidean Distance Model with PSO Algorithm },
journal = { International Conference on Innovations in Computing Techniques (ICICT 2015) },
issue_date = { July 2015 },
volume = { ICICT2015 },
number = { 3 },
month = { July },
year = { 2015 },
issn = 0975-8887,
pages = { 16-19 },
numpages = 4,
url = { /proceedings/icict2015/number3/21470-1500/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Innovations in Computing Techniques (ICICT 2015)
%A R.senthilkumar
%A M.vigneshwaran
%A S.uma
%T Face Authentication using Euclidean Distance Model with PSO Algorithm
%J International Conference on Innovations in Computing Techniques (ICICT 2015)
%@ 0975-8887
%V ICICT2015
%N 3
%P 16-19
%D 2015
%I International Journal of Computer Applications
Abstract

In recent technological world lot of devices are invented. Moreover the focused topic is on security system. Even with lot of security system like finger print based, eye-retina based, pin-code based systems are available, face recognition based security system has vital role of advanced technology. Feature based Face authentication requires feature extraction, feature selection and classification. Face recognition process performance is mainly depended on the selection of such extractor and classifier. Feature extraction process gives the feature points of the face in the image. From that important fiducial points are extracted using feature selection process. One have to reduce the feature points, in order to obtain the fast response of recognition. In this work we proposed the feature extraction process with Gabor filter where it is convenient as a biometric filter. Before going to verification process face localization is important one, then only we can reduce the unnecessary feature points. This is done by Neural network classifier. After the face image is obtained, we go for the authentication process with modified Euclidean distance of each fiducial points that made coefficient model for each person. Best optimized Euclidean distance coefficient of images are obtrained through PSO algorithm. Thus the coefficient of test and trained images are given to the classifier and the minimum mean difference profile made as the matching profile. By this work, we reduced the perception time at significant level compared to previous work and we made the recognition rate of the work as 91. 81 percent with PIE database.

References
  1. Shape-driven Gabor jets for face description and authentication,Daniel González-Jiménez And José Luis Alba-Castro, IEEE transactions on information forensics and security, vol. 2, no. 4, December 2007.
  2. Detecting faces in images: a survey, Ming-Hsuan Yang, member, IEEE, David J. Kriegman, senior member, IEEE, and Narendra Ahuja, fellow, IEEE . IEEE transactions on pattern analysis and machine intelligence, vol. 24, no. 1, January 2002.
  3. Face localization and authentication using color and depth images, Filareti Tsalakanidou, Sotiris Malassiotis, And Michael G. Strintzis, fellow, IEEE. IEEE transactions on image processing, vol. 14, no. 2, February 2005.
  4. Learning from examples in the small sample case: face expression recognition Guodong Guo And Charles R. Dyer, fellow, IEEE. IEEE transactions on systems, man, and cybernetics—part b: cybernetics, vol. 35, no. 3, June 2005 m.
  5. S. Arulampalam, S. Maskell, N. Gordon, And T. Clapp, "A tutorial on particle filters for online nonlinear/non-gaussian bayesian tracking," IEEE trans. Signal process. , vol. 50, no. 2, pp. 174–188, Feb. 2002.
  6. A. Jain, R. Bolle, and S. Pankanti, Biometrics: Personal Identification in Networked Society, Kluwer Academic Publishers, 1999.
  7. D. Zhang, Biometric Solutions For Authentication In An E-World, Kluwer Academic Publishers, 2002.
  8. K. Lee, H. Byun, "A new face authentication system for memory constrained devices," IEEE Transactions on Consumer Electronics, vol. 49, no. 4, pp. 1214-1222, Nov. 2003.
  9. B. Toth, "Biometric liveness detection," Information Security Bulletin,vol. 10, pp. 291–297, 2005.
  10. Lin Sun, Gang Pan, Zhaohui Wu, "Blinking-based live face detection using conditional random fields," LNCS 4642, pp. 252-260, 2007.
  11. J. Li, Y. Wang, T. Tan, and A. K. Jain, "Live face detection based on the analysis of fourier spectra," SPIE vol. 5404, pp. 296-303, 2004.
  12. P. J. Phillips, H. Moon, S. A. Rizvi, and P. J. Rauss, "The FERET evaluation methodology for face recognition algorithms," IEEE Trans. Pattern Anal. Mach. Intell. , vol. 22, pp. 1090–1104, 2000.
  13. P. Viola and M. J. Jones, "Robust real-time object detection," Int. J. Comput. Vis. , vol. 57, no. 2, pp. 137–154, 2004.
  14. Y. Freund and R. Schapire, "A decision theoretic generalization of on-line learning and an application to boosting," J. Comput. Syst. Sci. ,vol. 55, pp. 119–139, 1997.
  15. R. Lienhart, A . Kuranov, and V. Pisarevsky, "Empirical analysis ofdetection cascades of boosted classifiers for rapid object," in DAGM25th Pattern Recognition Symp. , 2003, pp. 297–304.
  16. H. A. Rowley, S. Baluja, and T. Kanade, "Neural network-based face detection," IEEE Trans. Pattern Anal. Mach. Intell. , vol. 20, no. 1, pp. 23–38, 1998
  17. P. J. Phillips, H. Wechsler, J. Huang, and P. Rauss, "The FERET database and evaluation procedure for face recognition algorithms," J. Image Vis. Comput. , vol. 16, no. 5, pp. 295–306, 1998.
Index Terms

Computer Science
Information Sciences

Keywords

Feature Extractor Pso-particle Swarm Optimization Fiducial Points Neural Network Classifiers.