Academia.eduAcademia.edu

Unfamiliar Sides, Video, Image Enhancement in Face Recognition

2016, International Journal of Hybrid Information Technology

The majority of image-processing techniques interact treating the impression as being a two dimensional signal and applying normal signal-processing techniques to it. Within this document we offer a new standard approach to have the hidden restrictions which aren't revealed by the Sobel together Canny filters together in face-recognition environment. We've also showed the effect of the contrast and threshold around the photos. In the same manner, we have shown our techniques about the video. Thus, many beautiful contrast and the hidden data are shared.

International Journal of Hybrid Information Technology Vol. 9, No.11 (2016), pp. 255-266 http://dx.doi.org/10.14257/ijhit.2016.9.11.22 Unfamiliar Sides, Video, Image Enhancement in Face Recognition 1 Ranbeer Tyagi and 2Geetam Singh Tomar Deptt. of EC UTU, Dehradun, India THDC-IHET, Tehri-Garhwal (U.K.),India [email protected] [email protected] O m nl ad in e eV by e th rsio is n fil O e is nly IL . LE G AL . Abstract The majority of image-processing techniques interact treating the impression as being a two dimensional signal and applying normal signal-processing techniques to it. Within this document we offer a new standard approach to have the hidden restrictions which aren't revealed by the Sobel together Canny filters together in face-recognition environment. We've also showed the effect of the contrast and threshold around the photos. In the same manner, we have shown our techniques about the video. Thus, many beautiful contrast and the hidden data are shared. Keywords:Image processing, Enhancement, Edge Detection, Segmentation, Video Image-Processing, Face Recognition 1. Introduction ok In image handling we're dealing with deterministic and stochastic representations of pictures that increase the quality of pictures by eliminating deterioration offered on graphic. Along the way of the image recovery we try to restore an image from changed one so that it is as close that you can for the initial photograph. Some degradation contains arbitrary sound, interference, geometrical distortions, loss of contrast, blurring effects, etc. Modern electronic technology has made it possible to manipulate multiple- dimensional signals with programs that range from easy electronic circuits to advanced parallel computers. The aim of this treatment can be divided in to three classes [1]:  Image in  image out ; Image Processing;  Image in  Picture in measurements out; Image Analysis;  photograph in  picture in high-level explanation out; Picture Comprehension; Image Segmentation Bo Graphic segmentation refers to the major step up image processing where the inputs are images and, results are the capabilities extracted from those photos. Segmentation breaks impression into its component parts or objects [3]. The amount to which segmentation is carried out depends upon the issue being fixed i.e. segmentation must halt if the items of curiosity about a software have already been separated. Image segmentation describes the decomposition of a landscape into its parts. Like in the automatic examination of automated units, curiosity is based on the inspecting photos of the products together with the goal of deciding the presence or absence of unique anomalies, such as missing elements or damaged association paths. There's no point in carrying segmentation past the level of aspect required to determine those things. Segmentation of nontrivial images is one of many hardest responsibilities in image processing. Segmentation precision decides the eventual achievement or malfunction of ISSN: 1738-9968 IJHIT Copyright © 2016 SERSC International Journal of Hybrid Information Technology Vol. 9, No.11 (2016) computerized examination methods. Because of this extensive attention is taken to improve the likelihood of tough segmentation. In certain conditions such as industrial inspection programs, atleast some measure of control over the environment is possible occasionally. In others, as in remote-sensing, user control over image order is limited mainly to the choice of image sensors. Edge Detection O m nl ad in e eV by e th rsio is n fil O e is nly IL . LE G AL . Sides are freely thought as pixel depth discontinuities within an image. Edge detection is just a subjective task. It is an easy task to find these clear ends, or those with superior S/D ratio. Border detector is tailored to benefit from the site knowledge [8], [9]. For example, a "straightedge" alarm may be very effective in locating many structures and objects including golf courts in an aerial image. Ends characterize limits and are consequently a problem of elementary importance in image processing. There are typical prices for your various guidelines encountered in digital image processing. These values can be brought on by video expectations, by algorithmic specifications, or from the need to preserve digital circuitry straightforward. Factors Affecting the Selection of Edge Detector Side inclination: The geometry of the agent determines a characteristic way in which it's many delicate to tips. Providers can be optimized to find horizontal, vertical, or straight edges. Disturbance setting: Border discovery is hard in noisy images, since both noise and the ends contain high-frequency content. Endeavors to cut back the noise end in confused and distorted tips [4]. Operators utilized on loud photographs are typically larger in breadth, for them to average enough knowledge to discount local noisy pixels. This leads to less exact localization of the discovered edges. Edge structure: Not all ends require a step-change in strength. Effects such as refraction or inadequate concentration can result in things with limitations identified by way of a slow change in power [10]. The owner has to be selected to become tuned in to such a gradual change in these scenarios. Newer wavelet-based tactics truly define the character of the move for each side as a way to distinguish. Image Enhancement ok The basic purpose of Photograph improvement is the fact that the observed image have apparent trait that was unavailable for your original graphic. Various methods including intensity transformation histogram equalization, homomorphic filter, and have been suggested to boost photographs deteriorated by irregular light. These methods typically boost an insight graphic by reducing its dynamic-range and or raising its contrast [2], [5]. Bo Face Recognition Nowdays has been the fantastic significance of Picture Repair and face-recognition. The extremely research location has been face recognition in computer-vision in support of the final mix of ages. Face-recognition strategies are often employed for security areas apart from are slowly more finding utilized in numerous various uses [6]. It could determine a complete firm in an electronic photograph by reviewing and evaluating types that's a kind of biometric software goal. For instance, employs facial-recognition to tell apart among people within the The Kinetic movement gaming system. Experienceidentification has been analyzed carefully; nonetheless, real-world face-identification nevertheless remains a hard job. [31] Lei et-al. Research discriminant minimal aesthetic search discussed discriminant experience descriptors (DED) in an info - powerful model in its placement of the handcrafted approach which is effectiveness on together 256 Copyright © 2016 SERSC International Journal of Hybrid Information Technology Vol. 9, No.11 (2016) Bo ok O m nl ad in e eV by e th rsio is n fil O e is nly IL . LE G AL . harmonized experience recognition and varied face recognition. Additional to business in acceptance wherever substantial-dimensional skin persistence aren't chosen, [32] Chen ETAL. the hightech is realized in experientially generate noticeable that in the shape of high-dimensional LBP capability descriptors. To aim the pretense variations, existinginvariant face-recognition is attained by with Markov random meadow stay snapshot harmonizing [33]. Authors suggest a newest limited face-recognition want to identify people of awareness by their fractional activities. Eventually, the likeness of two faces is rehabilitated while the detachment among these two allied characteristic jobs [34]. This establishes the IARPA Bench Mark A (IJB-A), an overtly accessible strategy inside the untamed dataset maintaining 500 themes through truly on a somewhat spot expertise photographs. Investigators might sign up for the offering record in support of info on such chance discharges [35]. An image-correct legion normalization program, on polynomial damage, is ready to increase the resilience of expertise harmonizing below tough instances. This file mostly supplied an improved taking of discriminative legion performance joining. In variation, with “wild”, uncontrolled cohort cases allow reaching the great exhibition [36]. The suggested a purpose of misinformation construction using the number of SORTAE to realize present invariant face recognition [37]. This history available individual effectiveness prepared unconstrained nonetheless-to-still and video-to-video knowledge harmonizing conditions. They applied the facial skin archive of two kinds, LFW and YTF [38]. The minimal twin descriptors considered at this time are minimal twin layout, Nearby level quantization, and Binarized arithmetical picture skin persistence [39]. Important computer data-collection includes, an extensive assortment of troubles examining occlusions, hard poses, and modest assertion and out-of-middle activities, the necessity of experience places as oblique regions and together grayscale and shade photographs [40]. A guide expertise data set that will create simple study within the difficulty of forward to say expertise proof „in the wild‟. These records set may be called from your Celebrities Infront-Account data-set. We assessed the recital higher than several different calculations employing a limited procedure and explained how they humiliate by Front-Entrance to Front-Consideration [41]. Writer offers the techniques for unconstrained experience verification affiliated on cavernous convolutional skin consistency and determine it about the recently boundless IARPA bench mark A (IJB-A) dataset along with concerning the conventional Designated Experience in the Wild dataset. We study the effectiveness of the DCNN approach on currently unconfined complicated knowledge evidence info, IARPA Common A, which maintains encounters through whole present, light, and additional challenging situations [42]. The Designated Encounters in the Open document hasbeen completely used [43]. This investigation heart of awareness on growing a face-recognition plan stick to Main Part Evaluation and Self-Organizing Routes unverified instruction formula [44].We have novice a book statement, Designated Activities in the Open, whose key goals are; 1) offer a massive file of genuine globe knowledge photographs created for the hidden two of the sort similar trouble of knowledge identification, 2) Balanced so as interested in the acceptance-setting-reputation channel, and 3) Permit careful and easy variance of face recognition computations [45]. An indistinct picture could be assessed like a dilemma reason behind a sharpened image along with a sort significant element. Consequently in categorize to retrieve the fast photograph we need to separate the impression addicted to its smear crucial portion and fast photograph. Besides this the problem at this time will be the watch of the cloud kernel [46]. The principal purpose of enhancement will be to approach a picture so our consequence is more desirable as opposed to initial picture for a distinct application. In mainly of these crimes, inside the conventional to make use of organize techniques the illegals were intriguing advantageous asset of a primary issue: the firms do not funding right of convenience by "who we're", except by "what we've", such as for Copyright © 2016 SERSC 257 International Journal of Hybrid Information Technology Vol. 9, No.11 (2016) instance for example identification permits, strategies, balances, BANNER information‟s. No of these belongings are now essential people. Lately, capability switched accessible permitting confirmation of "proper" person character. The region of “biometrics” are called this type of executive. Enveloped in the quantity of biometric identification methods, the bodily practices (fingerprint, experience, genetics) are extra continuous than practices in-efficiency group (keystroke, voice print). Face recognition will be the unique of the several biometric methods to be able to obtain the faculties of together elevated accuracy and small intrusiveness. 2. Problem Formulation O m nl ad in e eV by e th rsio is n fil O e is nly IL . LE G AL . To get the edges we studied slope owner which can be predicated on first-order and second order kind [25]. The initial derivative agent uses some standard attributes like; the initial derivative of the grey amount is unfavorable in the top edge of the transition, positive in the trailing side, and zero within the aspects of continual dull levels. For the twodimensional event we have the outside direction, the straight direction, or an arbitrary direction which may be considered as a mix of the two. The next derivative operator meets the fundamental qualities like [18]; the second kind is negative for that lighting area of the edge, constructive for your dark aspect of the edge, and zero for pixels laying specifically on tips. Centered on this technique distinct owner suggested like: Robert, Prewitt, Sobel, and Laplacian edge detector. A few other approach like FIREWOOD (Laplacian of Gaussian), Canny edge detector and zerocrossing side detector. But these all aren't able to recognize the hidden and weak tips in any graphic therefore planned protocol is a possibility to discover the way to the invisible and weak ends in stationary picture together with shifting pictures (videos) [16]. Within the same fashion proposed protocol is useful to identification the objects that aren't in a position to see due to high-brightness and darkness. Objectives  To have the hidden and weakened sides in an image  To obtain the hidden ends in transferring graphic (video)  To boost the high brightness and night watch of an image and realize the item which are not able to imagine.  To boost the night view of the transferring picture (video). 3. Various Type of Edge Detector ok The edge detection methods collected into two groups: Gradient edge detection and Laplacian edge discovery. Bo 3.1. Gradient Edge Detection Within the traditional edge detector, the incline of picture is computed using first order change [7] [17]. If the slope is above the threshold, there is an object while in the graphic. As regarding to picture g(l, m), the incline of point (l, m) means follows: ] | ( ) [ (1) | The weight of the vector is ( Also its way as ( 258 ) ) ( ⁄ [ ) ] ⁄ (2) (3) Copyright © 2016 SERSC International Journal of Hybrid Information Technology Vol. 9, No.11 (2016) Where and would be the incline in l and m way. Gradient of each pixel of the image is determined utilising the above three equations [24]. In reality, little spot structure convolution is employed to process the photograph. Incline operators include John, Prewitt and Sobel operator. 3.2. Laplacian Edge Detector It is helpful in this case to contemplate utilizing the Laplace function. The Laplacian process searches for zero crossings in the next derivative of the graphic to locate tips [22], [30]. An edge gets the one-dimensional shape of a ramp and calculating the kind of the image could emphasize its location. O m nl ad in e eV by e th rsio is n fil O e is nly IL . LE G AL . (4) ( ( ) ( ) ( ) ( ) ) ( ) ( ( [ ) (5) ( ) (6) ) ( ) ( ) (7) ] 4. Image Enhancement Bo ok Graphic improvement strategy continues to be commonly used in several programs where the subjective quality of picture is essential [28]. The objective of graphic improvement is dependent around the program situations. Comparison is an important aspect in any individual evaluation of image-quality, it can be preventing software for documenting and presenting data collected during exam [11]. Numerous tactics such as depth modification histogram equalization, homomorphic filtering, and have been suggested to enhance photographs deteriorated by abnormal illumination. These processes generally enrich an insight graphic by decreasing its dynamic range and-or raising its comparison [12]. Picture advancement is the means of generating pictures more useful. The causes for achieving this include:  Highlighting fascinating depth in images  Removing noise from pictures  Building images more aesthetically appealing Photograph enlargement will be the firststep in image processing. The goal of photograph enhancement would be to enhance the interpretability or perception of on in photographs for human people, or even to supply `better' insight for additional computerized image processing methods [13], [27]. Picture enlargement approaches fall under two broad groups: spatial domain methods and frequency-domain approaches. The word spatial site identifies the image plane itself, and approaches in this classification are derived from primary adjustment of pixels within an impression. Frequency domain control strategies are based on altering the Fourier transform of a graphic. Copyright © 2016 SERSC 259 International Journal of Hybrid Information Technology Vol. 9, No.11 (2016) 4.1. Energy Legislation Modification The productivity image of the energy law transformation relates to its input image. [ ( )] ( ) (8) c and γ are frequent.The importance of γ decides the amount to that the intensity range increases. In an electric law change, each pixel of the original photograph is lifted to certain exponent value. By selecting exponent price correctly you can boost sometimes large or low luminance price [14], [19], [29]. 4.2. SIGMOID Function O m nl ad in e eV by e th rsio is n fil O e is nly IL . LE G AL . Sigmoid function can be a non-linear function. The title sigmoid gets from the proven fact that the function is “S” formed statisticians contact this function the logistic function using e(m) for that feedback and with g being a get [11], [21]. The sigmoid function is distributed by: (9) g is gain which handles the specific distinctionIt‟s having often non-negative and nonconstructive first derivative or just on deflection point. It maps full-range on-scene luminance also this purpose guarantees that no graphic place is condensed and distinction maybe highly condensed. 4.3. GAMMA Correction Gamma correction, gamma nonlinearity, gamma selection, or usually just gamma, could be the brand of the nonlinear operation used-to code and decode luminance prices in video or however graphic devices [23], [26]. In image processing symbol γ signifies the numerical parameter which describes the nonlinearity of strength duplication. The procedure of pre-research for that nonlinearity by research indication from an power value is known as gamma correction [15], [20]. 5. Recommended Formulas (a) Algorithm for Edge Detection [ ] Figure 1. Planned User Bo ok If we alter the Laplacian operator assistance to the evaluation, the following matrix is possible. That is shown in Figure 1 and the steps of algorithm as follows: 1. 2. 3. 4. 5. 6. 7. 260 Take unique image and convolve with the proposed driver Result of move 1 is handed although canny edge detector Today applying histogram equalization is employed on unique graphic Consequence of move 3 is handed Canny edge detector Consequence of stage 3 is approved Zerocrossing edge detector Results of stage 4 and 5 is combined with OR operation Add results of step 6 and 2. Copyright © 2016 SERSC International Journal of Hybrid Information Technology Vol. 9, No.11 (2016) (b) Simulation Model for Video Edge Detection Using proposed driver analyze the video edge discovery together with the support of Automobile thresholding block and fif.2 shows the simulation model for video edge detection. Image Video Viewer Video Viewer cat _video .bin Convert Image to double Y' I1 2-D CONV I2 Image Data Type Conversion Read Binary File 2-D Convolution I Autothreshold BW Video Viewer O m nl ad in e eV by e th rsio is n fil O e is nly IL . LE G AL . Image Autothreshold Video Viewer 2 -C- Constant I Sobel Edge Image Edge Detection Video Viewer Video Viewer 3 Figure 2. Simulink Model for Video Edge Detection (c) Algorithm for Image Development The steps of Image Enhancement Algorithm as follows: 1. Consider initial graphic and pass-through strength legislation change using [ ( ) eq. ( )] . 2. Withhold the minimal value of phase I and split with maximum of results of phase 1. . 3. Consequence of move 3 is approved through sigmoid function using eq. 4. Take the minimum price of stage 3 and split with maximum of consequence of action 3. 5. Complete caused by phase 4 through gamma correction using eq. ( ) [ ( )] . (d) Simulation Model for Video Enhancement Bo ok In this section Figure 3 represents the simulation for video enhancement. Copyright © 2016 SERSC 261 International Journal of Hybrid Information Technology Vol. 9, No.11 (2016) 0.8 1 cutoff Constant 2 vipmen .avi V: 120 x160 ,I 30 fps From Multimedia File u power y u sigmoid y Subtract e Embedded MATLAB Function Embedded MATLAB Function 1 Product u u Math Function u Add pre y gamma y z Divide Embedded Embedded MATLAB Function 2 MATLAB Function 3 Image Video Viewer Video Viewer .9 gain Video Image Viewer 1 Constant 1 1 Constant 3 Divide 1 Video Viewer 1 9 O m nl ad in e eV by e th rsio is n fil O e is nly IL . LE G AL . gamma Figure 3. Simulink Model for Video Enhancement 6. Results and Comparision (a)Result of Video Edge Detection Figure 4. Original Video Figure 5. Sobel Edge Video Figure 6. Advantage Video of Proposed Product Figure 2 displays the design for evaluating the side movie using Sobel edge sensor and proposed driver. Figure 4 demonstrates the initial video. Figure shows video using Sobel edge sensor. Figure 6 displays video using recommended operator. Bo ok (b) Result of Image Enhancement Figure 7. Initial Photograph Figure 8. Figure 9. Strength Comparison Image Impression The proposed formula for the graphic enhancement as demonstrated in section V (C) for the affirmation of our benefits we have considered the following impression as demonstrated in Figure 7. Figure 8 shows the impression when it's passed through the planned algorithm when parameter gamma is set to value 2, gain is about to benefit 3, cutoff is ready to benefit 0.8 and 2nd gamma is ready to price 0.6. This demonstrates the far end target plainly which can be not observable in original impression due to high- 262 Copyright © 2016 SERSC International Journal of Hybrid Information Technology Vol. 9, No.11 (2016) brightness. Figure 9 shows the strength image when it is approved through the proposed algorithm when parameter gamma is about to worth 2, gain is ready to benefit 5, cutoff is set to worth 0.4 and 2nd gamma is set to price 9. Within this photograph the dim part of the first impression is clearly visible. This implies the result photograph is dependent upon different benefit of guidelines. Here gain controls the real distinction. Cutoff is set for the value in a manner the grey benefit regarding which comparison is more than before or decreased. (c) Results for Video Enhancement O m nl ad in e eV by e th rsio is n fil O e is nly IL . LE G AL . The proposed model for our video enlargement as proven in section V (d) for proof of our results we have regarded these movies as revealed in Figure 10. Figure 11 shows the superior video when initial movie handed through proposed type. Figure 10. Unique Movie ok Figure 11. Enhanced Movie 7. Conclusion Bo In this report we've beautifully compared the available link between the Sobel as well as the canny filter response in face recognition. Canny edge detector is used which is one of many most powerful edge detector as the edge points decided, give rise to ridges in the slope size graphic. The canny algorithm subsequently tracks at the very top of these ridges and sets to zero all pixels that are not really around the ridgetop to be able to offer slim range as the output, an activity known as non optimum reduction. Furthermore as a result of usage of two thresholds, unlike other edge detection it's able to discover little power modifications in a impression as ends. Within our method we unearthed that the concealed limits can certainly and properly are scored, those were unseen in Sobel as well as in Canny responses along with boundary of materials is outlined. Our image enhancement and video experimental results indicate that the recommended picture Copyright © 2016 SERSC 263 International Journal of Hybrid Information Technology Vol. 9, No.11 (2016) enlargement approach could dramatically increase the functionality of face detection protocol due to its solid power to improve the graphic awareness. References [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] Bo [22] O m nl ad in e eV by e th rsio is n fil O e is nly IL . LE G AL . [3] I. T. Young Jan, J. Gerbrands and L. J. Van Vliet, “Fundamental of Image Processing”, (1995). D. H. Choi, I. H. Jang, M. H. Kim and N. C. Kim, “Color image enhancement using single-scale retinex based on an improved image formation model”, 16th European Signal Processing Conference (EUSIPCO 2008), Lausanne, Switzerland, (2008). L. Fallah Araghi and R.A. Mohammad, “An Implementation Image Edge and Feature Detection Using Neural Network” Proceedings of the International MultiConference of Engineers and Computer Scientists 2009, Vol I IMECS 2009, (2009). M. H. Asmare, V. S. Asirvadam and L. Iznita, “Color Space Selection for Color Image Enhancement Applications”, International Conference on Signal Acquisition and Processing, (2009). C. Sekhar Panda and S. Patnaik, “Filtering Corrupted Image and Edge Detection in Restored Grayscale Image Using Derivative”, International, Journal of Image Processing, (IJIP), vol. 3, issue 3, (2009). K. S. Sim, L. W. Thong, M. A. Lai and C. P. Tso, “Enhancement of Optical Images using Hybrid Edge Detection Technique”, Conference on Innovative Technologies in Intelligent Systems and Industrial Applications (CITISIA 2009) Monash University, Sunway campus, Malaysia, (2009). M. Roushdy, “Comparative Study of Edge Detection Algorithms Applying on the Grayscale Noisy Image Using Morphological Filter”, GVIP Journal, vol. 6, issue 4, (2006). S. Mahbub Hafiz, Md. N. Hasan and Md. M. Islam, “An Efficient Scanning Based Learning Free Algorithm for Face Detection”, International Conference on Infonnatics, Electronics & Vision (ICIEV), (2012), pp. 52-56. A. Punnappurath, A. Narayanan Rajagopalan, S. Taheri and R. Chellappa, “Face Recognition across Non-Uniform Motion Blur, Illumination and Pose”, IEEE Transactions on image processing, vol. 24, no. 7, (2015). R.C. Gonzalez and R. E. Woods, “Digital image processing”, third edition, (2008). N. Hassan and N. Akamatsu, “A new approach for contrast enhancement using sigmoid function”, Inernational arab journal of information technology, vol. 1, no. 2, (2004) M. Kafai, L. An and B. Bhanu, “Reference Face Graph for Face Recognition”, IEEE Transactions on information forensics and security, vol. 9, issue 12, (2014), pp. 2132 - 2143. K. Rajadnya and K.T. Talele, “Image Enhancement Techniques Pixel Operation in Spatial Domain”, Proceedings of SPIT-IEEE Colloquium and International Conference, Mumbai, India. D. M. Scott and H. Mccann, “Process imaging for automatic control”, (2005). K. Plataniotis and A.N. Venetsanopoulos, “color image processing and application”, (2000). F. Samopa and A. Asano, “Hybrid image thresholding method using edge detection”, IJCSNS International Journal of Computer Science and Network Security, vol. 9, no.4, (2009). Y. Ya and H. Ju, “A sub - pixel edge detection method based on canny operator”, Sixth International Conference on Fuzzy Systems and Knowledge Discovery, (2009). S. Rachmawati Yahya, S. N. H. Sheikh Abdullah, K. Omar, M. S. Zakaria and C. Y. Liong, “Review On Image Enhancement Methods Of Old Manuscript With The Damaged Background” International Conference on Electrical Engineering and Informatics, (2009). D. Zhao, “Image Processing and Feature Extraction”, Electrical and Computer Engineering, (2005). Tao, Li, M.-J. Seow, V. K. Asari, J. T. Astola, K. O. Egiazarian, N. M. Nasrabadi and S. A. Rizvi, “Image Processing Algorithms and Systems Neural Networks and Machine Learning”, (2006). K.S. Sim, “Enhancement of optical images using hybrid edge detection technique”, 2009 Innovative Technologies in Intelligent Systems and Industrial Applications, (2009). X. Huang, R. Netravali, H. Man, V. Lawrence, S. S. Agaian, A. P. Gotchev, J. Recker and G. Wang, “Image Processing Algorithms and Systems X and Parallel Processing for Imaging Applications II”, (2012). S. N. Dhage, A.A. Mishra and R. Patil, “International Conference on Graphic and Image Processing (ICGIP 2011)”, (2011). Joshi, S. Ram and R. Koju, “Study and comparison of edge detection algorithms”, 2012 Third Asian Himalayas International Conference on Internet, (2012). Marshnil, N. Ameena and M. C. Binish, “Image encryption based on diffusion process and multiple chaotic maps”, 2014 International Conference on Power Signals Control and Computations (EPSCICON), (2014). C. Jocelyn, A. K. C. Allen, T. Miller, N. D. Kalka and A.K. Jain, “Grouper: Optimizing Crowdsourced Face Annotations”, To appear in the CVPR Workshop on Biometrics, (2016). L. Best-Rowden, H. Han, C. Otto, B. Klare and A. K. Jain, “Unconstrained Face Recognition: Identifying a Person of Interest from a Media Collection”, To Appear in IEEE Transactions on Information Forensics and Security, (2014). ok [1] [2] [23] [24] [25] [26] [27] 264 Copyright © 2016 SERSC International Journal of Hybrid Information Technology Vol. 9, No.11 (2016) Bo ok O m nl ad in e eV by e th rsio is n fil O e is nly IL . LE G AL . [28] L. Best-Rowden and A. K. Jain, “Longitudinal Study of Automatic Face Recognition”, MSU Technical Report MSU-CSE-15-20, (2015). [29] C. Jocelyn, A. K.C. Allen, T. Miller, N. D. Kalka and A. K. Jain, “A Comparison of Humanand Automated Face Verification Accuracy on Unconstrained Image Sets”, To appear in the CVPR Workshop on Biometrics, (2016). [30] J. Cheney, B. Klein, A. K. Jain and B. F. Klare, “Unconstrained Face Detection: State of the Art Baseline and Challenges”, the 8th IAPR International Conference on Biometrics (ICB), Phuket, Thailand, (2015). [31] Z. Lei, M. Pietikainen and S. Li, “Learning discriminant face descriptor”, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 36, no. 2, (2014), pp. 289–302. [32] D. Chen, X. Cao, F. Wen and J. Sun, “Blessing of dimensionality: Highdimensional feature and its efficient compression for face verification”, in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), (2013), pp. 3025–3032. [33] S. Arashloo and J. Kittler, “Energy normalization for pose-invariant face recognition based on MRF model image matching”, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 33, no. 6, (2011), pp. 1274– 1280. [34] R. Weng, J. Lu and Y.-P. Tan, “Robust Point Set Matching for Partial Face Recognition”, IEEE transactions on image processing, vol. 25, no. 3, (2016). [35] B.F. Klare, B. Klein, E. Taborsky, A. Blanton, J. Cheney, K. Allen, P. Grother, A. Mah, M. Burge and A. K. Jain, “Pushing the Frontiers of Unconstrained Face Detection and Recognition: IARPA”, IEEE Conference on Computer Vision and Pattern Recognition (CVPR) , (2015), pp.7-12. [36] M. Tistarelli, Y. Sun and N. Poh, “On the Use of Discriminative Cohort Score Normalization for Unconstrained Face Recognition”, IEEE Transactions on information forensics and security, vol. 9, no. 12, (2014). [37] Y. Gao and H. Jong Le, “Pose Unconstrained Face Recognition based on SIFT and Alignment Error”, IEEE International Conference on Audio, Language and Image Processing (ICALIP) , (2014), pp.277281. [38] L. Best-Rowden, S. Bisht, J. C. Klontz and A.K. Jain, “Unconstrained Face Recognition: Establishing Baseline Human Performance via Crowd sourcing”, IEEE International Joint Conference on Biometrics (IJCB), (2014), pp. 1 – 8. [39] J. Ylioinas, A. Hadid, J. Kannala and M. Pietikainen, “An In-depth Examination of Local Binary Descriptors in Unconstrained Face Recognition”, 22nd International Conference on Pattern Recognition (ICPR), (2014), pp. 4471-4476. [40] V. Jain and E.Learned-Miller, “FDDB: A Benchmark for Face Detection in Unconstrained Settings”, University of Massachusetts-Amhert, (2010). [41] S. Sengupta, J.-C. Chen, C. Castillo, V. M. Patel, R. Chellappa and D. W. Jacobs, “Frontal to Profile Face Verification in the Wild”, IEEE Winter Conference on Applications of Computer Vision (WACV) , (2016), pp. 1-9. [42] J.-C. Chen, V. M. Patel and R. Chellappa, “Unconstrained Face Verification using Deep CNN Features”, IEEE Winter Conference on Applications of Computer Vision (WACV), (2016), pp.-1-9. [43] S. Liao, Z. Lei, D. Yi and S. Z. Li, “A Benchmark Study of Large-scale Unconstrained Face Recognition”, IEEE International Joint Conference on Biometrics (IJCB), (2014), pp. 1-8. [44] D. Retno Anggraini, “Face Recognition Using Principal Component Analysis and Self Organizing Maps”, Third ICT International Student Project Conference (ICT-ISPC-2014), (2014), pp.91-94. [45] S. Liao, A. K. Jain and S. Z. Li, “A Fast and Accurate Unconstrained Face Detection”, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 38, issue 2, (2016), pp.211-223. [46] C. Indhumathi, “Unconstrained Face Recognition From Blurred and Illumination with Pose Variant Face Image Using SVM”, International Journal of Innovative Research in Computer and Communication Engineering, vol.2, Special Issue 1,(2014), pp. 2564-2567. Copyright © 2016 SERSC 265 Bo ok O m nl ad in e eV by e th rsio is n fil O e is nly IL . LE G AL . International Journal of Hybrid Information Technology Vol. 9, No.11 (2016) 266 Copyright © 2016 SERSC