Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

An Efficient Method for Gait Recognition

Print
PDF
IJCA Proceedings on National Conference on Innovative Paradigms in Engineering & Technology 2013
© 2013 by IJCA Journal
NCIPET2013 - Number 1
Year of Publication: 2013
Authors:
Rupali N. Patharkar
S. T. Bodkhe
A. R Mahajan

Rupali N Patharkar, S T Bodkhe and A R Mahajan. Article: An Efficient Method for Gait Recognition. IJCA Proceedings on National Conference on Innovative Paradigms in Engineering & Technology 2013 NCIPET 2013(1):37-41, December 2013. Full text available. BibTeX

@article{key:article,
	author = {Rupali N. Patharkar and S. T. Bodkhe and A. R Mahajan},
	title = {Article: An Efficient Method for Gait Recognition},
	journal = {IJCA Proceedings on National Conference on Innovative Paradigms in Engineering & Technology 2013},
	year = {2013},
	volume = {NCIPET 2013},
	number = {1},
	pages = {37-41},
	month = {December},
	note = {Full text available}
}

Abstract

Human identification by gait has created a great deal of interest in computer vision community due to its advantage of inconspicuous recognition at a relatively far distance. Biometric systems are becoming increasingly important, since they provide more reliable and efficient means of identity verification. Biometric gait Analysis (i. e. recognizing people from the way they walk) is one of the recent attractive topics in biometric research. It has been receiving wide attention in the area of Biometric. Human gait recognition works from the observation that an individual's walking style is unique and can be used for human identification. Recognize individuals walking characteristics is main part in this paper. In Gait biometric research there are various gait recognition approaches are available. In this paper, the gait recognition approaches such as using Ica".

References

  • G. Venkata Narasimhulu1, Dr. S. A. K. Jilani2, " Fuzzy Principal Component Analysis based Gait Recognition" , Ijcsit,vol3,No. 3,pp. 4015-4020, 2012.
  • Hayder Ali, Jamal Dargham, Chekima Ali, Ervin Gobin Moung, "Gait Recognition using principle Component Analysis" , ICMVpp. 539-543, 2011.
  • Vili Kellokumpu ,Guoying Zhao, Stan Z. Li and Matti Pietikainen , " Dynamic Texture Gait Recognition" , LNCS 5558,pp. 1000-1009, 2009.
  • M. Pushpa Rani and G. Arumugam, "An Efficient Gait Recognition System For Human Identification Using Modified ICA" IJCSIT,Vol. 2,No. 1,pp. 55-67, 2010.
  • C. Sasi varnan, A. Jagan, Jaspreet Kaur, Divya Jyoti, Dr. D. S. Rao, "Gait Recognition Using Extracted Feature Vectors", IJCST Vol. 2, Issue 3, September 2011.
  • Jiwen Lu a, Erhu Zhang, "Gait recognition for human identification based on ICA and fuzzy SVM through multiple views fusion" , Pattern Recognition Letters, Vol. 28, pp. 2401–2411, 2007.
  • Yi Huang, Dong Xu,Member IEEE, And Tat-Jen Cham,"Face and Human Gait Recognition Using Image-to-Class Distance" , IEEE , pp no1051-8215, 2010 .
  • Shuai Zheng, Junge Zhang, Kaiqi Huang, Ran He, Tieniu Tan, "Robust View Transformation Model For Gait Recognition",IEEE 18th conference, 2011.
  • Muzhir Sh. Al-Ani, Isra H. Al-Ani,"Gait Recognition Based Improved Histogram", VOL. 2, NO. 12, December 2011.
  • Jyoti Bharti , M. K Gupta, "Human Gait Recognition using All Pair Shortest Path" , IPCSIT vol. 9 , (2011).
  • Kailash J. Karande & Sanjay N Talbar "Independent Component Analysis of Edge Informationfor Face Recognition" , International Journal of Image Processing (IJIP) Volume (3) : Issue (3).
  • Pratibha Mishra, Shweta Ezra, "Human Gait Recognition Using Bezier Curves" , (IJCSE) Vol. 3 No. 2 Feb 2011.
  • Aapo Hyvärinen and Erkki Oja , "Independent Component Analysis: Algorithms and Applications", Neural Networks Research Centre Helsinki University of Technology, Finland Neural Networks, 13(4-5):411- 430, 2000.
  • Nitin Bhatia, Vandana "Survey of Nearest Neighbor Techniques", (IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 2, 2010.