FACIAL FEATURE INDENTIFICATION AND COMPARISION UISNG KNN ALGORITHM
DOI:
https://doi.org/10.61841/bbw8s789Keywords:
Face recognition, face identification, local binary pattern (LBP), k-nearest neighbor (K-NN)Abstract
Biometrics is the statistical analysis of the user’s unique physical and behavioral characteristics. This technology is used for identification and access control, or else for identifying the individuals who are under surveillance. Some examples include palm veins, face recognition, hand geometry, iris recognition, retina, etc., physiological traits or behavioral characteristics. They are the way to measure the physical characters to verify their identity. Once measured, the information is compared and matched in the database. Features extracted from the facial images play a major role in the security system. This research paper explains how facial features are identified using the KNN algorithm. Finally, the proposed method is compared with existing methods. The comparison table represents that DLBP and RLBP with KNN classifiers provide better results in terms of accuracy than existing methods.
Downloads
References
1. Hasan Farsi & Mohammad Hasheminejad (2014), “188 Fast Automatic Face Recognition from Single Image per Person Using GAW-KNN," Journal of Information Systems and Telecommunication, Vol. 2, No. 3, pp. 188-195.
2. Prashant P Thakare & Pravin S Patil (2016), “Facial Expression Recognition Algorithm Based On KNN Classifier”, IJCSN International Journal of Computer Science and Network, Vol. 5, No. 6, ISSN: 2277-5420 , pp. 941-941-947
3. Idelette Laure Kambi Beli & Chunsheng Hangzhou (2017), “Enhanced Face Identification Using Local Binary Patterns and K-Nearest Neighbors." Vol. 5, No. 6, ISSN: 2277-5420 , pp. 941-941-947
4. Ammour, B., Bouden, T., Boubchir, L., & Biad, S. (2017), "Face identification using local and global features. 2017 40th International Conference on Telecommunications and Signal Processing (TSP)”, pp. 784–788.
5. Arulkumar, C. V., & Vivekanandan, P. (2015), "Multi-feature based automatic face identification on kernel eigenspaces (KES) under unstable lighting conditions," 2015 International Conference on Advanced Computing and Communication Systems, pp. 1-5.
6. Li, D., Zhou, H., & Lam, K.-M. (2015)."High-Resolution Face Verification Using Pore-Scale Facial Features," IEEE Transactions on Image Processing, Vol. 24, No. 8, pp. 2317–2327.
7. Yadav, P., Poonia, A., Gupta, S. K., & Agrwal, S. (2017), "Performance analysis of Gabor 2D PCA feature extraction for gender identification using face," 2017 2nd International Conference on Telecommunication and Networks (TEL-NET).
8. Gong, D., Li, Z., Huang, W., Li, X., & Tao, D. (2017), “ Heterogeneous Face Recognition: A Common Encoding Feature Discriminant Approach”, IEEE Transactions on Image Processing Vol. 5, No. 6, ISSN: 2277-5420 , pp. 941-941-947
9. Shao, M., Zhang, Y., & Fu, Y. (2018), "Collaborative Random Faces-Guided Encoders for PoseInvariant Face Representation Learning," IEEE Transactions on Neural Networks and Learning Systems, Vol. 29, No. 4, pp. 1019–1032.
10. S. Nirmala Sugirtha Rajini (2015), “Access Control in Healthcare Information Management Systems Using Biometric Authentication," International Journal of Applied Environmental Sciences, Vol. 10, No. 1.
Downloads
Published
Issue
Section
License
Copyright (c) 2020 AUTHOR

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.