Graph Application on Face for Personal Authentication and Recognition

被引:3
|
作者
Kisku, Dakshina Ranjan [1 ]
Rattani, Ajita [2 ]
Tistarelli, Massimo [3 ]
Gupta, Phalguni [4 ]
机构
[1] Asansol Engn Coll, Dept Comp Sci & Engn, Asansol 713304, India
[2] Univ Cagliari, Dept Elect & Elect Engn, Cagliari, Italy
[3] Univ Sassari, Dept Architecture & planning, I-07100 Sassari, Italy
[4] Indian Inst Technol Kanpur, Dept Comp Engn & Sci, Kanpur, Uttar Pradesh, India
关键词
face recognition; graph matching constraints; SIFT features; correspondence graph; gabor wavelet; EBGM; euclidean distance metric; IITK face database; BANCA face database;
D O I
10.1109/ICARCV.2008.4795683
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a novel face recognition technique with graph topology drawn on Scale Invariant Feature transform (SIFT) features and is compared with all the available well known techniques on SIFT features, and Elastic Bunch Graph Matching (EBGM) technique drawn on gabor wavelet feature. IITK face database is used for evaluation purpose. Test results show that the proposed graph matching technique will be an appropriate one for face recognition. Finally, the test results have been compared with the results found on BANCA face database following MC protocol only.
引用
收藏
页码:1150 / +
页数:2
相关论文
共 50 条
  • [1] Personal based authentication by face recognition
    Kao, Yung-Wei
    Gu, Hui-Zhen
    Yuan, Shyan-Ming
    [J]. NCM 2008: 4TH INTERNATIONAL CONFERENCE ON NETWORKED COMPUTING AND ADVANCED INFORMATION MANAGEMENT, VOL 2, PROCEEDINGS, 2008, : 581 - 585
  • [2] The Application of Graph Kernels in Face Recognition
    Jiang Qiang-rong
    Chen Huan-jun
    Liu Bo
    [J]. 2012 INTERNATIONAL CONFERENCE ON DIGITAL IMAGE COMPUTING TECHNIQUES AND APPLICATIONS (DICTA), 2012,
  • [3] Application of Face Recognition Technology in the Exam Identity Authentication System
    Yu, Li-jun
    Li, Ke-feng
    [J]. 3RD INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE AND MANAGEMENT (ICSSM 2017), 2017, : 684 - 688
  • [4] Secure authentication for face recognition
    Dabbah, M. A.
    Woo, W. L.
    Dlay, S. S.
    [J]. 2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE IN IMAGE AND SIGNAL PROCESSING, 2007, : 121 - 126
  • [5] Representation of face images for personal authentication
    Zhang, Chongyang
    [J]. OPTIK, 2013, 124 (17): : 2985 - 2992
  • [6] Reference Face Graph for Face Recognition
    Kafai, Mehran
    An, Le
    Bhanu, Bir
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (12) : 2132 - 2143
  • [7] GRAPH REGULARIZED DISCRIMINANT ANALYSIS AND ITS APPLICATION TO FACE RECOGNITION
    Zhou, Tianfei
    Lu, Yao
    Zhang, Yanan
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2015, : 2020 - 2024
  • [8] Face recognition for authentication on mobile devices
    Vazquez-Fernandez, Esteban
    Gonzalez-Jimenez, Daniel
    [J]. IMAGE AND VISION COMPUTING, 2016, 55 : 31 - 33
  • [9] Face Recognition as an Authentication Technique in Electronic Voting
    El-Sayad, Noha E.
    Abdel-Kader, Rabab Farouk
    Marie, Mahmoud Ibraheem
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2013, 4 (06) : 66 - 71
  • [10] Face Recognition and Authentication using LBP and BSIF
    Naveen, S.
    Fathima, Shihana R.
    Moni, R. S.
    [J]. PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS (COMNET), 2016, : 99 - 102