Skip to main content

An Optimal Hybrid Solution to Local and Global Facial Recognition Through Machine Learning

  • Chapter
  • First Online:
A Fusion of Artificial Intelligence and Internet of Things for Emerging Cyber Systems

Part of the book series: Intelligent Systems Reference Library ((ISRL,volume 210))

Abstract

Face recognition need is fine assured as enormous industrial relevance use them to implement one or another objective. As the programmes move closer to everyday usage to hold a database of actual events, an individual’s identification primarily demanded as an instance of consistency. As facial recognition has beating advantages over other industrial applications and human eyes can quickly evaluate performance, improved algorithms and smaller computing costs are continuously improving this methodology. This research takes the conventional algorithms of recognition in the first stage and uses hybrid approaches to counter their limitations. The study starts with basic computation of global face features using Principal Component Analysis (PCA), Discrete Wavelet Transform (DWT) and Independent Component Analysis (ICA), with some standard classifiers like Neural Network (NN) and Support Vector Machine (SVM). As the learning rate is high in machine learning, then the system’s accuracy goes high, but increases the area and cost overhead. Fusion-based methods have been proposed in further work to overcome that training limitation, based on Harris corner, Speed up Robust Features (SURF) and DWT + PCA system model where only 10% training sample has been taken on Essex database, and 99.45% accuracy is achieved. Creating the Fusion rule requires some hit and trial methods that may not be Universal in every database. To overcome this limitation further an efficient Hybrid method proposed which elaborates the local features Linear Binary Pattern (LBP), Histogram Oriented Gradients (HOG), Gabor wavelet and global features (DWT, PCA) of the face. Further, this feature trained with Neural Network classifier to obtained better accuracy nearly 99.40% with single image training from each class.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jain, A.K., Kumar, A. (2012). Biometric recognition: An overview. In Second generation biometrics: The ethical, legal and social context (pp. 49–79).

    Google Scholar 

  2. Inamdar, V., Rege, P., & Arya, M. (2010). Offline handwritten signature based blind biometric watermarking and authentication technique using biorthogonal wavelet transform. International Journal of Computer Applications, 11(1), 19–27.

    Article  Google Scholar 

  3. Choi, J. Y., De Neve, W., Plataniotis, K. N., & Ro, Y. M. (2010). Collaborative face recognition for improved face annotation in personal photo collections shared on online social networks. IEEE Transactions on Multimedia, 13(1), 14–28.

    Article  Google Scholar 

  4. de Freitas Pereira, T., Komulainen, J., Anjos, A., De Martino, J. M., Hadid, A., Pietikäinen, M., & Marcel, S. (2014). Face liveness detection using dynamic texture. EURASIP Journal on Image and Video Processing, 1, 1–15.

    Google Scholar 

  5. Hu, H., Ahn, G. J., & Jorgensen, J. (2012). Multiparty access control for online social networks: model and mechanisms. IEEE Transactions on Knowledge and Data Engineering, 25(7), 1614–1627.

    Article  Google Scholar 

  6. Ding, C., & Tao, D. (2015). Robust face recognition via multimodal deep face representation. IEEE Transactions on Multimedia, 17(11), 2049–2058.

    Article  Google Scholar 

  7. Unar, J. A., Woo, C. S., & Almas, A. (2014). A review of biometric technology along with trends and prospects. Pattern Recognition, 47(8), 2673–2688.

    Article  Google Scholar 

  8. Pittman, M., & Reich, B. (2016). Social media and loneliness: Why an Instagram picture may be worth more than a thousand Twitter words. Computers in Human Behavior, 62, 155–167.

    Article  Google Scholar 

  9. Tyagi, S., & Khanna, P. (2013). Face verification and identification using DCT-NNDA and SIFT with score-level fusion. International Journal of Biomedical Engineering and Technology, 13(2), 154–176.

    Article  Google Scholar 

  10. Mohammed, A. A., Minhas, R., Wu, Q. J., & Sid-Ahmed, M. A. (2011). Human face recognition based on multidimensional PCA and extreme learning machine. Pattern Recognition, 44(10–11), 2588–2597.

    Article  Google Scholar 

  11. Luo, M., & Zhang, K. (2014). A hybrid approach combining extreme learning machine and sparse representation for image classification. Engineering Applications of Artificial Intelligence, 27, 228–235.

    Article  Google Scholar 

  12. Naik, G. R., & Kumar, D. K. (2011). An overview of independent component analysis and its applications. Informatica, 35(1).

    Google Scholar 

  13. Borgi, M. A., Labate, D., El’Arbi, M., & Amar, C. B. (2013). Shearlet network-based sparse coding augmented by facial texture features for face recognition. In International conference on image analysis and processing (pp. 611–620). Springer.

    Google Scholar 

  14. Goh, Y. Z., Teoh, A. B. J., & Goh, M. K. O. (2011). Wavelet local binary patterns fusion as illuminated facial image preprocessing for face verification. Expert Systems with Applications, 38(4), 3959–3972.

    Article  Google Scholar 

  15. Lydia, E. L., Kannan, S., Rajest, S. S., & Satyanarayana, S. (2020). Correlative study and analysis for hidden patterns in text analytics unstructured data using supervised and unsupervised learning techniques. International Journal of Cloud Computing (IJCC), 9(2/3).

    Google Scholar 

  16. De Marsico, M., Nappi, M., Riccio, D., & Wechsler, H. (2012). Robust face recognition for uncontrolled pose and illumination changes. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 43(1), 149–163.

    Article  Google Scholar 

  17. Wei, J., Jian-Qi, Z., & Xiang, Z. (2011). Face recognition method based on support vector machine and particle swarm optimisation. Expert Systems with Applications, 38(4), 4390–4393.

    Article  Google Scholar 

  18. Thai, L. H., Hai, T. S., & Thuy, N. T. (2012). Image classification using support vector machine and artificial neural network. International Journal of Information Technology and Computer Science, 4(5), 32–38.

    Article  Google Scholar 

  19. Liau, H. F., & Isa, D. (2011). Feature selection for support vector machine-based face-iris multimodal biometric system. Expert Systems with Applications, 38(9), 11105–11111.

    Article  Google Scholar 

  20. Tome, P., Fierrez, J., Vera-Rodriguez, R., & Nixon, M. S. (2014). Soft biometrics and their application in person recognition at a distance. IEEE Transactions on Information Forensics and Security, 9(3), 464–475.

    Article  Google Scholar 

  21. Rao, A. N., Vijayapriya, P., Kowsalya, M., & Rajest, S. S. (2020) Computer tools for energy systems. In International conference on communication, computing and electronics systems (pp. 475–484). Springer.

    Google Scholar 

  22. Smeets, D., Claes, P., Vandermeulen, D., & Clement, J. G. (2010). Objective 3D face recognition: Evolution, approaches and challenges. Forensic Science International, 201(1–3), 125–132.

    Article  Google Scholar 

  23. Jain, A. K., Klare, B., & Park, U. (2011). Face recognition: Some challenges in forensics. In 2011 IEEE International Conference on Automatic Face and Gesture Recognition (FG) (pp. 726–733). IEEE, (2011).

    Google Scholar 

  24. Babu, N. N., Fathima, A. A., & Vaidehi, V. (2011). An efficient face recognition system using DWT-ICA features. In 2011 International conference on digital image computing: techniques and applications (pp. 146–151). IEEE.

    Google Scholar 

  25. Kämäräinen, J. K., Hadid, A., & Pietikäinen, M. (2011). Local representation of facial features. In: Handbook of face recognition (pp. 79–108). Springer.

    Google Scholar 

  26. Wagner, A., Wright, J., Ganesh, A., Zhou, Z., Mobahi, H., & Ma, Y. (2011). Toward a practical face recognition system: Robust alignment and illumination by sparse representation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 34(2), 372–386.

    Article  Google Scholar 

  27. Satonkar Suhas, S., Kurhe Ajay, B., & Prakash Khanale, B. (2012). Face recognition using principal component analysis and linear discriminant analysis on the holistic approach in facial images database. Int Organ Sci Res, 2(12), 15–23.

    Google Scholar 

  28. Liao, S., Jain, A. K., & Li, S. Z. (2012). Partial face recognition: Alignment-free approach. IEEE Transactions on Pattern Analysis and Machine Intelligence, 35(5), 1193–1205.

    Article  Google Scholar 

  29. Han, H., Klare, B. F., Bonnen, K., & Jain, A. K. (2012). Matching composite sketches to face photos: A component-based approach. IEEE Transactions on Information Forensics and Security, 8(1), 191–204.

    Article  Google Scholar 

  30. Belhumeur, P. N., Jacobs, D. W., Kriegman, D. J., & Kumar, N. (2013). Localising parts of faces using a consensus of exemplars. IEEE Transactions on Pattern Analysis and Machine Intelligence, 35(12), 2930–2940.

    Article  Google Scholar 

  31. Datta, D., Mishra, S., & Rajest, S. S. (2020). Quantification of tolerance limits of engineering system using uncertainty modeling for sustainable energy. International Journal of Intelligent Networks, 1(2020), 1–8. https://doi.org/10.1016/j.ijin.2020.05.006

    Article  Google Scholar 

  32. Zhou, H., Mian, A., Wei, L., Creighton, D., Hossny, M., & Nahavandi, S. (2014). Recent advances on single modal and multimodal face recognition: a survey. IEEE Transactions on Human-Machine Systems, 44(6), 701–716.

    Article  Google Scholar 

  33. Li, H., Lin, Z., Brandt, J., Shen, X., & Hua, G. (2014). Efficient boosted exemplar-based face detection. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 1843–1850).

    Google Scholar 

  34. Posiyya, A., & Saikumar, K. (2020). Data management by a librarian for academic and research perceptions. International Journal of Psychosocial Rehabilitation, 24(8), 545–551.

    Google Scholar 

  35. Soumya, N., Kumar, K. S., Rao, K. R., Rooban, S., Kumar, P. S., & Kumar, G. N. S. (2019). 4-bit multiplier design using CMOS gates in electric VLSI. International Journal of Recent Technology and Engineering (IJRTE). ISSN 2277-3878.

    Google Scholar 

  36. Raju, K., Pilli, S. K., Kumar, G. S. S., Saikumar, K., & Jagan, B. O. L. (2019). Implementation of natural random forest machine learning methods on multispectral image compression. Journal of Critical Reviews, 6(5), 265–273.

    Google Scholar 

  37. Vijetha, A., Shashirekha, T., Raju, K., Rooban, S., & Saikumar, K. (2020). A robust fake currency detection model using ESVM machine learning technique. Journal of Advanced Research in Dynamical and Control Systems, 12(06), 170–179.

    Google Scholar 

  38. Saikumar, K., & Rajesh, V. (2020). Coronary blockage of the artery for heart diagnosis with DT artificial intelligence algorithm. International Journal of Research in Pharmaceutical Sciences, 11(1), 471–479.

    Article  Google Scholar 

  39. Ding, C., & Tao, D. (2016). A comprehensive survey on pose-invariant face recognition. ACM Transactions on Intelligent Systems and Technology (TIST), 7(3), 1–42.

    Article  Google Scholar 

  40. Al-asadi, T. A., & Obaid, A. J. (2016). Object Based Image Retrieval Using Enhanced SURF. Asian Journal of Information Technology, 15(16), 2756–2762.

    Google Scholar 

  41. Meshram, C., Ibrahim, R. W., Obaid, A. J., Meshram, S. G., Meshram, A., & Abd El-Latif, A. M. (2020) Fractional chaotic maps based short signature scheme under human-centered IoT environments. Journal of Advanced Research.

    Google Scholar 

  42. Obaid, A. J., Alghurabi, K. A., Albermany, S. A. K., & Sharma, S. (2021) Improving extreme learning machine accuracy utilizing genetic algorithm for intrusion detection purposes. In Advances in intelligent systems and computing (pp. 171–177). Springer.

    Google Scholar 

  43. Obaid, A.J. (2021). Critical research on the novel progressive, JOKER an opportunistic routing protocol technology for enhancing the network performance for multimedia communications. In Research in intelligent and computing in engineering. Advances in intelligent systems and computing, (vol. 1254, pp. 369–378). Springer.

    Google Scholar 

  44. Sharma, S., & Obaid, A. J. (2020). Mathematical modelling, analysis and design of fuzzy logic controller for the control of ventilation systems using MATLAB fuzzy logic toolbox. Journal of Interdisciplinary Mathematics, 23(4), 843–849.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Raju, K., Chinna Rao, B., Saikumar, K., Lakshman Pratap, N. (2022). An Optimal Hybrid Solution to Local and Global Facial Recognition Through Machine Learning. In: Kumar, P., Obaid, A.J., Cengiz, K., Khanna, A., Balas, V.E. (eds) A Fusion of Artificial Intelligence and Internet of Things for Emerging Cyber Systems. Intelligent Systems Reference Library, vol 210. Springer, Cham. https://doi.org/10.1007/978-3-030-76653-5_11

Download citation

Publish with us

Policies and ethics