FACE ALIGNMENT BASED ON SEMI-ACTIVE APPEARANCE MODE

Publications

Share / Export Citation / Email / Print / Text size:

International Journal on Smart Sensing and Intelligent Systems

Professor Subhas Chandra Mukhopadhyay

Exeley Inc. (New York)

Subject: Computational Science & Engineering , Engineering, Electrical & Electronic

GET ALERTS

eISSN: 1178-5608

DESCRIPTION

1
Reader(s)
9
Visit(s)
0
Comment(s)
0
Share(s)

VOLUME 7 , ISSUE 4 (December 2014) > List of articles

FACE ALIGNMENT BASED ON SEMI-ACTIVE APPEARANCE MODE

Shiliang Yan *

Keywords : face alignment, active appearance model, inverse compositional alignment, grey level cooccurrence matrix

Citation Information : International Journal on Smart Sensing and Intelligent Systems. Volume 7, Issue 4, Pages 1,493-1,515, DOI: https://doi.org/10.21307/ijssis-2017-717

License : (CC BY-NC-ND 4.0)

Received Date : 03-July-2014 / Accepted: 15-October-2014 / Published Online: 01-December-2014

ARTICLE

ABSTRACT

In the information era, the technology of biological character recognition has attracted more
and more attentions. In this paper, by investigating theories of active appearance model and inverse
compositional image alignment algorithm, we mainly proposed a semi-active appearance model for
face alignment based on improving the classical models in the aspects of computation complexity,
easily suffering from light, angle and expression, and so on. Firstly, the model of active appearance
and the algorithm of alignment are investigated. For the inefficiency of classic gradient descent method
in the matching process, the inverse compositional image alignment algorithm is proposed. Then,
through combining the active appearance model and Grey Level Co-occurrence Matrix, a novel semiactive
appearance model is proposed, which has a simple calculation and higher accuracy of face
alignment. Finally, experiments were designed to demonstrate the effectiveness of the proposed
algorithms.

Content not available PDF Share

FIGURES & TABLES

REFERENCES

[1] N. S. Nourabadi, K. G. Dizaji, and S. A. Seyyedsalehi. “Face pose normalization for identity
recognition using 3D information by means of neural networks,” 5th Conference on
Information and Knowledge Technology, 2013, pp. 432 – 437, doi:
10.1109/IKT.2013.6620106.
[2] C. Ching-Kun, L. Chun-Liang, L. Shyan-Lung Lin, C. Yen-Ming , and C. Cheng-Tang. “A
Chaotic Theorectical Approach to ECG-Based Identity Recognition,” IEEE Computational
Intelligence Magazine, 2014, vol. 9, pp. 53 – 63, doi: 10.1109/MCI.2013.2291691.
[3] L. Jiwen Lu, W. Gang Wang, and P. Moulin. “Human Identity and Gender Recognition From
Gait Sequences With Arbitrary Walking Directions,” IEEE Transactions on Information
Forensics and Security, 2014, vol. 9, pp. 51 – 61, doi: 10.1109/TIFS.2013.2291969.
[4] L. Feng Liu , D. Zhang and G. Zhenhua. “Distal-Interphalangeal-Crease-Based User
Authentication System,” IEEE Transactions on Information Forensics and Security, 2013, vol.
8, pp. 1446 – 1455, doi: 10.1109/TIFS.2013.2272787.
[5] M. S. Umar and M. Q. Rafiq. “Select-to-Spawn: A novel recognition-based graphical user
authentication scheme,” 2012 IEEE International Conference on Signal Processing,
Computing and Control, 2012, pp. 1 – 5, doi: 10.1109/ISPCC.2012.6224382.
[6] A. Drosou, D. Tzovaras, K. Moustakas, and M. Petrou. “Systematic Error Analysis for the
Enhancement of Biometric Systems Using Soft Biometrics,” IEEE Signal Processing Letters,
2012, vol. 19, pp. 833 – 836, doi: 10.1109/LSP.2012.2221701.
[7] P. Tsai, M. K. Khan, J. Pan, and B, Liao. “Interactive Artificial Bee Colony Supported
Passive Continuous Authentication System,” Systems Journal, 2014, pp. 395 – 405, doi:
10.1109/JSYST.2012.22 08153.
[8] N. Erdogmus, N and J. L. Dugelay. “3D Assisted Face Recognition: Dealing With Expression
Variations,” IEEE Transactions on Information Forensics and Security, 2014, vol. 9, pp. 826
– 838, doi: 10.1109/TIFS.2014.2309851.
[9] S. J. Elliott, S. A. Massie, and M. J. Sutton. “The Perception of Biometric Technology: A
Survey,” 2007 IEEE Workshop on Automatic Identification Advanced Technologies, 2007,
pp. 259 – 264, doi: 10.1109/AUTOID.2007.380630.
[10] R. A. Rashid, N. H. Mahalin, M. A. Sarijari, and A. A. Abdul. “Security system using
biometric technology: Design and implementation of Voice Recognition System (VRS),”
International Conference on Computer and Communication Engineering, 2008, pp. 898 – 902,
doi: 10.1109/ICCCE.2008.4580735.
[11] L. Simon and M. Silverman. “A practical guide to biometric security technology,” IT
Professional, 2001, vol. 3, pp. 27 – 32, doi: 10.1109 /6294.899930.
[12] D. C. Leonard, A. P. Pons, and S. S. Asfour. “Realization of a Universal Patient Identifier for
Electronic Medical Records Through Biometric Technology,” IEEE Transactions on
Information Technology in Biomedicine, 2009, vol. 13, pp. 494 – 500, doi: 10.1
109/TITB.2008.926438.
[13] M. C. Fairhurst. “Signature verification revisited: promoting practical exploitation of
biometric technology,” Electronics & Communication Engineering Journal, 1997, vol. 9, pp.
273 – 280, doi: 10.104 9/ecej:19970606.
[14] M. Zaied, O. Jemai, and C. Ben Amar. “Training of the Beta wavelet networks by the frames
theory: Application to face recognition,” Workshops on Image Processing Theory, Tools and
Applications, 2008, pp. 1 - 6, doi: 10.1109/IPTA.2008.4743756.
[15] B. Knight B and A. Johnston. “The role of movement in face recognition,” IEEE Transactions
on Pattern Analysisand Machine Intelligence, 1994, vol. 4, pp. 265 – 273.
[16] T. F. Cootes, G. J. Edwards, and C. J. Taylor. “Active Appearance Models,” Proceedings of
the European Conference on Computer Vision, 1998, vol. 2, pp. 484 – 498.
[17] I. T. tJolliffe. “Principal Component Analysis (2nd Hd.)” Springer, 2002.
[18] T. Jing Yi, Y. H. Tay, and L. Phooi Yee Lau. “One-dimensional Grey-level Co-occurrence
Matrices for texture classification,” International Symposium on Information Technology,
2008, vol. 3, pp. 1 – 6, doi: 10.1109/ITSIM.2008.4631992.
[19] A. Juraiza Ishak, M. M. Mustafa, and A. Hussain. “Gradient Field Distribution and Grey
Level Co-occurrence Matrix techniques for automatic weed classification,” International
Symposium on Mechatronics and Its Applications, 2008, pp. 1 – 5, doi: 10.1109/ISM
A.2008.4648846.
[20] S. A. Banday, A. H. Mir, and F. Khursheed. “Multi-unit iris biometric fusion using gray level
co-occurrence matrix features,” International Conference on Advanced Electronic Systems,
2013, pp. 225 – 229, doi: 10.1109/ICAES.2013.6659397.
[21] G.Sengupta, T.A.Win, C.Messom, S.Demidenko and S.C. Mukhopadhyay, “Defect analysis
of grit-blasted or spray printed surface using vision sensing technique”, Proceedings of Image
and Vision Computing NZ, Nov. 26-28, 2003, Palmerston North, pp. 18-23.
[22] Yanmin LUO, Peizhong LIU and Minghong LIAO, AN ARTIFICIAL IMMUNE
NETWORK CLUSTERING ALGORITHM FOR MANGROVES REMOTE SENSING ,
IMAGE,International Journal on Smart Sensing and Intelligent Systems, VOL. 7, NO. 1, pp.
116 – 134, 2014.
[23] G. Sen Gupta, S.C. Mukhopadhyay, S. Demidenko and C.H. Messom, “Master-slave Control
of a Teleoperated Anthropomorphic Robotic Arm with Gripping Force Sensing”, IEEE Transactions on Instrumentation and Measurement, Vol. 55, No. 6, pp. 2136-2145, December 2006.
[24] Daode Zhang et al., RESEARCH ON CHIPS’ DEFECT EXTRACTION BASED ON
IMAGE-MATCHING, International Journal on Smart Sensing and Intelligent Systems, VOL.
7, NO. 1, pp.321 – 336, 2014.

EXTRA FILES

COMMENTS