skip to main content
10.1145/2381716.2381733acmotherconferencesArticle/Chapter ViewAbstractPublication PagescubeConference Proceedingsconference-collections
research-article

Face recognition using DWT thresholding based feature extraction with laplacian-gradient masking as a pre-processing technique

Published:03 September 2012Publication History

ABSTRACT

Face recognition under varying occlusions and lighting conditions is challenging, and exacting occlusion and illumination invariant features is an effective approach to solve this problem. In this paper, we propose two novel techniques viz., DWT Thresholding and Laplacian-Gradient Masking, to improve the performance of a face recognition system. DWT Thresholding is used to extract the approximation coefficients along with the prominent detail coefficients of the 1-dimensional DWT of an image, thereby selecting only relevant features and enhancing face recognition. Laplacian-Gradient Masking is a pre-processing technique which combines the edge detection properties of both the Laplacian and the Gradient operators to create a masked image, containing a well-defined contour of the prominent facial features. The resulting pre-processed image contains the salient edge details of the face and prepares the ground for feature extraction. Experimental results show the promising performance of DWT Thresholding and Laplacian-Gradient Masking for face recognition on ORL, UMIST, Extended Yale B and Color FERET databases.

References

  1. Huang, T. S., Xiong, Z., and Zhang, Z. 2011. Face Recognition Applications. Handbook of Face Recognition, pages 617--638.Google ScholarGoogle Scholar
  2. Zou, X., Kittler, J., and Messer, K. 2007. Illumination Invariant Face Recognition: A Survey. 2007 First IEEE International Conference on Biometrics Theory Applications and Systems, pages 1--8.Google ScholarGoogle Scholar
  3. Zhang, X., and Gao, Y. 2009. Face recognition across pose: A review. Pattern Recognition, 42(11):2876--2896. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Zhao, W., Chellappa, R., Phillips, P. J., and Rosenfeld, A. 2003. Face Recognition: A Literature Survey. ACM Computing Surveys, 35(4):399--458. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Abate, A. F., Nappi, M., Riccio, D., and Sabatino, G. 2007. 2D and 3D face recognition: A survey. Pattern Recognition Letters, 28(14):1885--1906. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Daubechies, I. 1990. The wavelet transform, time-frequency localization and signal analysis. IEEE Transactions on Information Theory, 36(5):961--1005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Samra, A. S., Gad Allah, S. E., and Ibrahim, R. M. 2003. Face Recognition Using Wavelet Transform, Fast Fourier Transform and Discrete Cosine Transform. Proc. 46th IEEE International Midwest Symp. Circuits and Systems (MWSCAS'03), 1:272--275.Google ScholarGoogle Scholar
  8. Ramadan, R. M., and Abdel Kader, R. F. 2009. Face Recognition Using Particle Swarm Optimization-Based Selected Features. International Journal of Signal Processing, Image Processing and Pattern Recognition, 2(2).Google ScholarGoogle Scholar
  9. Kennedy, J., and Eberhart, R. 1995. Particle swarm optimization. Proc. IEEE International Conference on Neural Networks, pages 1942--1948.Google ScholarGoogle Scholar
  10. Kennedy, J., and Eberhart, R. 1997. A Discrete Binary Version of the Particle Swarm Algorithm. Proc. IEEE International Conference on Systems, Man, and Cybernetics, 5:4104--4108.Google ScholarGoogle Scholar
  11. Basu, M. 2002. Gaussian-Based Edge-Detection Method - A Survey. Proc. IEEE International Conference on Systems, Man, and Cybernetics, 32(3):252--260. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Gonzalez, R. C., and Woods, R. E. 2008. Digital Image Processing. Prentice Hall, Third Edition. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. MATLAB. "www.mathworks.com".Google ScholarGoogle Scholar
  14. ORL Database. "http://cl.cam.ac.uk/research/dtg/attarchive/facedatabase.html".Google ScholarGoogle Scholar
  15. UMIST Database. "http://sheffield.ac.uk/eee/research/iel/research/face".Google ScholarGoogle Scholar
  16. Extended Yale B Database. "http://cvc.yale.edu/projects/yalefaces/yalefaces.html".Google ScholarGoogle Scholar
  17. Deepa, G. M., Keerthi, R., Meghana, N., and Manikantan, K. 2012. Face recognition using spectrum-based feature extraction. Applied Soft Computing Journal, "http://dx.doi.org/10.1016/j.asoc.2012.04.015." (Article in press). Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Color FERET Database. "http://itl.nist.gov/iad/humanid/feret/feret_master.html".Google ScholarGoogle Scholar
  19. Abdelwahab, M. M., Aly, S. A., and Yousry, I. 2012. Efficient Web-based Facial Recognition System Employing 2DHOG. CoRR, abs/1202.2449.Google ScholarGoogle Scholar
  20. Reddy, K. R. L., Babu, G. R., and Kishore, L. 2010. Face recognition based on eigen features of multi scaled face components and an artificial neural network. Procedia Computer Science, 2:62--74.Google ScholarGoogle ScholarCross RefCross Ref
  21. Zhu, Y., Liu, J., and Chen, S. 2009. Semi-random subspace method for face recognition. Image Vision Comput., 27:1358--1370. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Gao, Q., Zhang, L., and Zhang, D. 2008. Face recognition using FLDA with single training image per person. Applied Mathematics and Computation, 205:726--734.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Face recognition using DWT thresholding based feature extraction with laplacian-gradient masking as a pre-processing technique

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      CUBE '12: Proceedings of the CUBE International Information Technology Conference
      September 2012
      879 pages
      ISBN:9781450311854
      DOI:10.1145/2381716

      Copyright © 2012 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 3 September 2012

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader