• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Li Kuan, Yin Jianping, Li Yong, and Liu Fayao. Local Statistical Analysis of Gabor Coefficients and Adaptive Feature Extraction for Face Description and Recognition[J]. Journal of Computer Research and Development, 2012, 49(4): 777-784.
Citation: Li Kuan, Yin Jianping, Li Yong, and Liu Fayao. Local Statistical Analysis of Gabor Coefficients and Adaptive Feature Extraction for Face Description and Recognition[J]. Journal of Computer Research and Development, 2012, 49(4): 777-784.

Local Statistical Analysis of Gabor Coefficients and Adaptive Feature Extraction for Face Description and Recognition

More Information
  • Published Date: April 14, 2012
  • Many researches have shown that Gabor feature is robust to illumination and expression variations and has been successfully used in face recognition. However, Gabor-based methods suffer from the high dimensional problem, also known as the curse of dimensionality. A novel method for face description and recognition based on Gabor filters is proposed in this paper. The normalized face image is first decomposed by convolving with multi-scale and multi-orientation Gabor filters, and then separated into several blocks. Through statistical techniques, including mean and variance of Gabor coefficients inside each block, the block feature vector (BFV) can be obtained. The face feature vector (FFV) of the whole image is then constructed by conjugating the BFVs in row column order. Thus FFV can be used to describe the face, and the high dimensional problem is effectively solved. In the classification stage, a robust face recognition system which performs multi-class classification is built based on several two-class classifiers using voting mechanism. For each two-class classifier, a feature extraction module adaptively selects the most important features. Therefore, only the most distinguishable features in FFV are picked out, called best subset feature vector (BSFV). The results compared with the published results on Yale face database verify the validity of the proposed method.
  • Related Articles

    [1]Li Mingyue, Luo Xiangyang, Chai Lixiang, Yuan Fuxiang, GanYong. City-Level IP Geolocation Method Based on Network Node Clustering[J]. Journal of Computer Research and Development, 2019, 56(3): 467-479. DOI: 10.7544/issn1000-1239.2019.20170473
    [2]Wang Changda, Huang Lei, Liu Zhifeng. Information Hiding Algorithm of IP Covert Timing Channels and Its Performance Analysis[J]. Journal of Computer Research and Development, 2016, 53(5): 988-999. DOI: 10.7544/issn1000-1239.2016.20150063
    [3]Wang Zhiwei and Zhang Wei. ID Based Signature Scheme from Strong RSA Assumption in the Standard Model[J]. Journal of Computer Research and Development, 2013, 50(2): 302-306.
    [4]Gao Haiying. Provable Secure ID-Based Authenticated Key Agreement Protocol[J]. Journal of Computer Research and Development, 2012, 49(8): 1685-1689.
    [5]Zhou Yousheng, Sun Yanbin, Qing Sihan, Yang Yixian. An Efficient ID-Based Verifiably Encrypted Signature Scheme[J]. Journal of Computer Research and Development, 2011, 48(8): 1350-1356.
    [6]Lai Xin, Huang Xiaofang, He Dake. An ID-Based Efficient Signcryption Key Encapsulation Scheme[J]. Journal of Computer Research and Development, 2009, 46(5): 857-863.
    [7]Zhou Ling, Sun Yamin. Research on Multicast Routing Algorithm for Mobile IP Based on Bone Node Set[J]. Journal of Computer Research and Development, 2008, 45(7): 1126-1132.
    [8]Wang Li, Xu Mingwei, and Xu Ke. On the Deployment Approach of IPSec and IP Filter in Routers[J]. Journal of Computer Research and Development, 2006, 43(3): 375-380.
    [9]Qu Haipeng, Li Dequan, Su Purui, Feng Dengguo. An IP Traceback Scheme with Packet Marking in Blocks[J]. Journal of Computer Research and Development, 2005, 42(12): 2084-2092.
    [10]Wu Yichuan, Huang Kui, Zheng Jianping, Sun Limin, and Cheng Weiming. An Adaptive Robust TCP/IP Header Compression Algorithm[J]. Journal of Computer Research and Development, 2005, 42(4): 655-661.

Catalog

    Article views (803) PDF downloads (478) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return