International Journal of Engineering Technology and Management Sciences

2023, Volume 7 Issue 2

EFFECTIVE APPROACH FOR FACE RECOGNITION AND ACTIVE SHAPE 3D MODELS USING KERNEL PRINCIPAL COMPONENT ANALYSIS

AUTHOR(S)

Surya Kant Prajapati, Mrs. C.Navamani

DOI: https://doi.org/10.46647/ijetms.2023.v07i02.085

ABSTRACT
Face Recognition is a computer application that is capable of detecting, tracking, identifying or verifying human faces from an image or video captured using a digital camera. Although lot of progress has been made in domain of face detection and recognition for security, identification and surveillance purpose, but still there are issues hindering the progress to reach or surpass human level accuracy. These issues are variations in human facial appearance such as; varying lighting condition, noise in face images, scale, pose etc. Kernel principal component analysis (KPCA) as a powerful nonlinear feature extraction method has proven as a preprocessing step for classification algorithm. A face recognition approach based on KPCA and genetic algorithms (GAs) is proposed. By the use of the polynomial functions as a kernel function in KPCA, the high order relationships can be utilized and the nonlinear principal components can be obtained. After that nonlinear principal components, we use GAs to select the optimal feature set for classification.

Page No: 787 - 797

References:

[1] Ross A. An introduction to multi-biometrics. 15th European Signal Processing Conference (EUSIPCO), Poznan, Poland;2020. [2] P. Singh, S. Medida, and K. Duraisamy,
[2] . Sushma J, Sarita SB, Rakesh SJ. recognition and modelling system. Journal of Global Research in Computer Science. 2019;2(7):30-37.
[3] Bolle RM, Connell JH, Pankanti S, Ratha NK, Senior K. A guide to biometrics. European Signal Processing Conference (EUSIPCO), Poznan, Poland; 2020. [4] B. Broll, et al., “A visual programming environment for learning distributed programming,” in Proc. ACM SIGCSE Tech. Symp. Comput. Sci. Educ., 2017, pp. 81–86.
[4] Fagbola TM Olabiyisi SO, Egbetola FI, Oloyede A. Review of technical approaches to face recognition in unconstrained scenes with varying pose and illumination. FUOYE Journal of Engineering and Technology. 2019;2(1).
[5] Draper BA, Baek K, Beveridge JR. Recognizing faces with PCA and ICA. Computer Vision and Image Understanding. 2020;91(1-2):115.
[6] Adedeji OT, Omidiora EO, Olabiyisi SO, Adigun AA. Performance evaluation of optimised PCA and projection combined PCA methods in facial images. Computations & Modelling. 29., 2019.
[7] Aluko JO, Omidiora EO, Adetunji AB, Odeniyi OA. Performance evaluation of selected principal component analysis- based techniques for face image recognition. International Journal of Scientific & Technology Research. 2020; 4(01).
[8] Torres L. Is there any hope for face recognition? In Proc. of the 5th International Workshop on Image Analysis for Multi-media Interactive Services. 2019;21-23.
[9] Lu T, Hou S. A Two-Layered Malware Detection Model Based on Permission for Android," in 2018 IEEE International Conference on Computer and Communication Engineering Technology (CCET). 2019;239-243.
[10] Ageed ZS, Ahmed AM, Omar N, Kak SFIEEE International Conference on Computer and Communication Engineering Technology (CCET). 2019;239-243.
[11] Adeeq MM, Abdulkareem NM, Zeebaree SR, Ahmed DM, Sami AS, Zebari RR. IoT IEEE International Conference on Computer and Communication Engineering Technology (CCET). 2019;239-243.
[12] Zebari IM, Zeebaree SR, Yasin HM. Real Computer and Communication Engineering Technology (CCET). 2019;239-243.
[13] Liu K, Xu S, Xu G, Zhang M, Sun D, Liu H 2019;239-243.
[14] Ibrahim BR, Zeebaree SR, Hussan BK. Performance Measurement for Distributed University of Zakho. 2019;7:65-69.
[15] Zeebaree S, Yasin HM. Arduino based remote controlling for home: power saving. 2020;199-204.
[16] Sadeeq M, Abdulla AI, Abdulraheem AS, (SICN). 2019;109-114
[17] Shibija K, Joseph RV. A Machine Learning Communication and Informatics (ICCCI). 2019.
[18] Lei T, Qin Z, Wang Z, Li Q, Ye D. EveDroid: 2019;6:6668-6680.
[19] Darus FM, Salleh NAA, Ariffin AFM. Android malware detection using machine learning (ICOEI). 2019;1254-1260
[20] Ren Z, Wu H, Ning Q, Hussain I, Chen B End-to-end malware detection for android IoT devices using deep learning," Ad Hoc Networks. 2020;101:102098.
[21] Maniraj S P, Roopa shettigar, Kannadasan B, S.Prabhu,” Artificial Intelligence Application in Human Resource Development”, International Journal of Biology, Pharmacy and Allied Sciences,Vol.10, No.11,2021, pp. 1089-1100, 2021.
[22] Hussain,K., Vanathi,D., Jose,B.K., kAVITHA,S., rANE,b.y., Kaur,H., Sandhya,C., “Internet of Things - Cloud Security Automation Technology Based on Artificial Intelligence”, International Conference on Applied Artificial Intelligence and Computing, ICAAIC 2022; Salem, pp 42-47, 2022.
[23] S.Jagdeeshan, P.Jaisankar, C.Navamani, E.Padma “Steganography Techniques for Data Protection in IOT” volume 29. No 1.2023.


How to Cite This Article:
Surya Kant Prajapati, Mrs. C.Navamani . EFFECTIVE APPROACH FOR FACE RECOGNITION AND ACTIVE SHAPE 3D MODELS USING KERNEL PRINCIPAL COMPONENT ANALYSIS . ijetms;7(2):787-797. DOI: 10.46647/ijetms.2023.v07i02.085