Face Recognition System Based On LBPH Algorithm
Face Recognition System Based On LBPH Algorithm
I. INTRODUCTION
II. RELATED WORK
Automatic face identification is an essential theme of Ojala et al. [10 ] initially used Local Binary Pattern (LBP).
computer vision and pattern recognition analysis. It will LBP refers unremarkably to displacement pixels with an
distinguish the personalities and different data as indicated 8-bit dual code from the neighborhood of the pixels. For a 3
by the optical highlights of face picture, having an square, the center component estimate is ablated from that of
exceptionally wide possibility for advancement. It is typically each of its eight neighboring pixels and is relegated to a bit
utilized in validation, criminal examination, police based on the indication of the subtraction result 1 or 0. The
investigation, automaton intelligence, and healthful science, created bits are then connected for all neighboring pixels and
etc. encoded into double strings. The dual strings inferred are
referred to as Local Binary Patterns or LBP codes. The
There are various techniques utilized in the face recognition
decimal estimate of the center component's LBP code (xc,
system. Each distinctive features underneath varied
yc). The LBP administrator LBP (P, R) produces 2p different
conditions like illumination, expression and posture
yield values, about 2p distinctive two-fold examples formed
amendment. Among them, for our motivation that is
by the P pixels within the varying R space. It has been shown
confront discovery in the video stream, we tend to focus on
that there is a lot of information in particular examples than
three noteworthy methods and that we looked their execution
others. It is conceivable to simply use a set of 2p double
underneath modified improvement condition to find an
examples to portray the surface of the photographs. These
honest coordinating and low process expenses.
examples were named by Ojala et al. as uniform examples.
As the time passed, almost several researchers have
developed a range of face detection and recognition All face images are viewed as the formation of small patterns
algorithms, as well as Deep Convolution Network that the LBP operator could recognize successfully. For face
algorithm[1],Histograms of Oriented Gradients (HOG) identification, Ahonen et al. [11 ] presented an LBP
algorithm[2],Sparse Coding(SC) algorithm[3],Gabor feature primarily based facial illustration. They have bifurcated
algorithm[4], Local Binary Pattern (LBP) algorithm[5], facial images into M minor non-covering areas R(0), R(1),
Linear Discriminate Analysis (LDA) algorithm[6], however ..., R(M) to compare the facial structure. The LBP histograms
additionally within the unceasing development. There are extracted from each sub-region are then combined into a
three different face identification techniques in the OpenCV single, spatially enhanced histogram feature..
library:, Fisherfaces[7], Eigenfaces[8] and Local Binary
Pattern Histogram (LBPH)[9 ]. In [12] as suggested by Ahonen et al, the texture
classification LBP approach describes the occurrence of LBP
codes in an image being collected into a histogram. The
Revised Manuscript Received on April 24, 2019 classification is then carried out by calculating the
Abhishek Pratap Singh, School of C & IT, REVA University, Bangalore,
Sunil Kumar S Manvi, School of C & IT, REVA University, Bangalore, similarities between straight-forward histograms. However,
Pratik Nimbal, School of C & IT , REVA University, Bangalore, India. a loss of spatial data results in
Gopal Krishna Shyam, School of C & IT , REVA University, Bangalore, considering the same
methodology for illustration of
Published By:
Blue Eyes Intelligence Engineering
Retrieval Number: E10060585S19/19©BEIESP 26 & Sciences Publication
Face Recognition System Based on LBPH Algorithm
Published By:
Blue Eyes Intelligence Engineering
Retrieval Number: E10060585S19/19©BEIESP 27 & Sciences Publication
International Journal of Engineering and Advanced Technology (IJEAT)
ISSN: 2249 – 8958, Volume-8, Issue-5S, May, 2019
IV. METHODOLOGY
The proposed face recognition approach has four main
steps: module for image acquisition, module for extraction of
features, module for training classifier database, and module
for classification. Initially, the face datasets are collected by
the image acquisition module. Then, a series of salient
features are extracted by applying feature extraction module.
These facial features are used to analyze face landmarks
which represent human identity information. In the next Figure 5: Face detection flow chart.
process, the classifier is trained for recognizing the face. In
the last module, the system recognize face image and fetch B. Feature Extraction
information about the person from the SQLite database. The
system flow chart is shown in Figure. 4 For extracting the facial features from image, the LBP
operation is used that compares the intensity value of every
component with the 8 nearest neighbour pixels values [17].
If the value of the neighboring pixel is greater than the value
of the centered pixel, it will assign 1 to its neighboring pixel,
otherwise it will assign 0. For each pixel, this task provides
an 8-bit string. A decimal value of an 8-bit pixel string
determines the LBP value. Fig. 6 shows this operation.
C. Dataset
Published By:
Blue Eyes Intelligence Engineering
Retrieval Number: E10060585S19/19©BEIESP 28 & Sciences Publication
Face Recognition System Based on LBPH Algorithm
It is shown in the below equation. Total Images Trained Images Training Time
500 500 10 sec
Published By:
Blue Eyes Intelligence Engineering
Retrieval Number: E10060585S19/19©BEIESP 29 & Sciences Publication
International Journal of Engineering and Advanced Technology (IJEAT)
ISSN: 2249 – 8958, Volume-8, Issue-5S, May, 2019
high and occlusion occurs, then the system will not robustly University of Visweshwariah College of Engineering, Bangalore and Ph. D.
degree in Electrical Communication Engineering, Indian Institute of Science,
recognize faces. This problem can be considered as future Bangalore, India. He has vast experience of more than 30 years in teaching in
work. This proposed system will assist security agencies in Electronics / Computer Science and Engineering. His research interests are:
identifying criminals, for attendance purpose, to search any Software Agent based Network Management, Wireless Networks, Multimedia
Networking, Underwater Networks, Wireless Network Security, Grid and
individual in a surveillance camera. Cloud computing, E-commerce, and Mobile computing. He has published
around 160 papers in national and international conferences, 115 papers in
national and international journals, and 15 publications/books/books.chapters.
REFERENCES He received best research publication award from VGST Karnataka in 2014.
1. J. Hai qiang LONG,Tai zhe TAN. Computer Simulation, 2017, 34(1):
322-325.
Pratik Nimbal has completed M.tech with specialization
2. J. HU Liqiao, QIU Runhe. Face recognition based on adaptive weighted in computer science and Technology in year 2019 at REVA
HOG. Computer Engineering and Applications, 2017, 53(3): 164-168. University.
3. J. Olshausan B A, Field D J.Emergence of simple-cell receptive field
properties by learning a sparse code for natural images. Nature, 1996,
381(6583):607-609.
4. J. WU Qi, WANG Tang-hong, LI Zhan-li. Improved face recognition Dr. Gopal Kirshna Shyam received BE and M.Tech and
algorithm based on Gabor feature and collaborative representation. Ph.D in Computer science and engineering from VTU,
Computer Engineering and Design, 2016, 37(10): 2769-2774. Belagavi. He has handled several subjects for UG/PG
Students like Algorithms, Computer Networks, Web
5. J. CHAO W L, DING J J, LIU J Z. Facial expression recognition based on
programming, Advanced Computer architecture,
improved local binary pattern and class-regularized locality preserving
Information security, Computer Concepts and C
projection. Signal Processing, 2015, 117:1-10.
Programming. His research interest includes Cloud Computing, Grid
6. J. Yu yan JIANG, Ping LI, Qing WANG. Labeled LDA model based on computing, High performance computing etc. He has published about 10 papers
shared background topic. Acta Electronica Sinica, 2015, 2013, (9): in highly reputed National/International Conferences like IEEE, Elsevier etc.
1794-1799. and 5 papers in Journals with high impact factor like Elsevier Journal on
7. J.P. Bellhumeur, J.Hespanha, D. Knegman. Eigenfaces vs fisherfaces: Network and Computer Applications and International Journal of Cloud
Recognition using class specific linear projection.IEEE Transactions on computing (INDERSCIENCE). His research articles on Cloud computing
Pattern Analysis and MachineIntelligence. Special Issue on co-authored by Dr. Sunilkumar S. Manvi have been cited by several
FaceRecognition, 1997, 17 (1) :711-720. researchers. He is a lifetime member of CSI and is actively involved in
8. J. Turk M, Pentland A. Eigenfaces for recognition. Journal of cognitive motivating students/faculties to join CSI/IEEE/ACM societies.
neuroscience, 1991, 3(1): 71-86
9. M. Joe Minichino, Joseph Howse. Learning OpenCV 3 Computer Vision
with Python. 2016 16-82
10. T. Ojala, M. Pietikäinen and D . Harwood, "A Comparative Study of
Texture Measures with Classification based on Featured Distributions,"
Pattern Recognition, vol. 29, no. 1, pp. 51-59, January 1996
11. T. Ahonen, A. Hadid, and M. Pietika ̈inen. Face recognition with local
binary patterns. In European Conference on Computer Vision (ECCV),
pages 469–481, 200..
12. Ahonen, T., Hadid, A, and Pietikäinen, M. (2006), Face Description with
Local Binary Patterns: Application to Face Recognition. IEEE Trans.
Pattern Analysis and Machine Intelligence 28(12):2037-2041
13. Viola, Paul, and Michael J. Jones. "Robust real-time face detection."
International journal of computer vision 57.2 (2004): 137-154.
14. Varun Garg, Kritika Garg, Face Recognition Using Haar Cascade
Classifier, Journal of Emerging Technologies and Innovative Research
(JETI),, December 2016
15. Zheng Xiang, Hengliang Tan, Wienling Ye. The excellent properties of
dense gird-based HOG features on face recognition compare toGaborr
and LBP, 2018
16. Md. Abdur Rahim, Md. Najmul Hossain, T. Wahid, Md. Shafiul Azam,
"Face recognition using Local Binary Patterns (LBP)", Global Journal of
Computer Science and Technology Graphics &Vision,, Global Journals
Inc. (USA), Volume 13 Issue 4 Version 1.0 Year 2013.
17. T. Chen, Y. Wotao, S. Z. Xiang, D. Comaniciu, and T. S. Huang, “Total
variation models for variable lighting face recognition” IEEE
Transactions on Pattern Analysis and Machine Intelligence, 28(9):2006
18. Zhao and R. Chellappa "Robust face recognition using
symmetricshape-from-shadingg" Technical Report, Center for
Automation Research ,University of Maryland,, 1999
AUTHORS PROFILE
Published By:
Blue Eyes Intelligence Engineering
Retrieval Number: E10060585S19/19©BEIESP 30 & Sciences Publication