5 research outputs found

    Heterogeneous Techniques used in Face Recognition: A Survey

    Get PDF
    Face Recognition has become one of the important areas of research in computer vision. Human Communication is a combination of both verbal and non-verbal. For interaction in the society, face serve as the primary canvas used to express distinct emotions non-verbally. The face of one person provides the most important natural means of communication. In this paper, we will discuss the various works done in the area of face recognition where focus is on intelligent approaches like PCA, LDA, DFLD, SVD, GA etc. In the current trend, combination of these existing techniques are being taken into consideration and are discussed in this paper.Keywords: Principal Component Analysis (PCA), Linear Discriminant Analysis (LDA), Genetic Algorithm (GA), Direct Fractional LDA (DFLD

    Face Recognition using R-KDA with Non-Linear SVM for Multi-View Database

    Get PDF
    AbstractThis paper develops a new Face Recognition System which combines R-KDA for selecting optimal discriminant features with non-linear SVM for Recognition. Experiment results have been conducted showing the comparison of enhanced efficiency of our proposed system over R-KDA with k-nn as the similarity distance measure

    VORSHA: A Variable-sized, One-way and Randomized Secure Hash Algorithm

    Get PDF
    In this paper, we propose a variable-sized, one-way, and randomized secure hash algorithm, VORSHA for short. We present six variants of VORSHA, which are able to generate a randomized secure hash value. VORSHA is the first secure hash algorithm to randomize the secure hash value fully. The key embodiment of our proposed algorithm is to generate a pool of pseudo-random bits using the primary hash functions and selects a few bits from the pool of bits to form the final randomized secure hash value. Each hash value of the primary hash function produces a single bit (either 0 or 1) for the pool of pseudo-random bits. Thus, VORSHA randomized the generated bit string to produce the secure hash value, and we term it as a randomized secure hash value. Moreover, the randomized secure hash value is tested using NIST-SP 800-22 statistical test suite, and the generated randomized secure hash value of VORSHA has passed all 15 statistical tests of NIST-SP 800-22. It proves that the VORSHA is able to generate a highly unpredictable yet consistent secure hash value. Moreover, VORSHA features a memory-hardness property to restrict a high degree of parallelism, which features a tiny memory footprint for legal users but massive memory requirements for adversaries. Furthermore, we demonstrate how to prevent Rainbow Table as a Service (RTaaS) attack using VORSHA. The source code is available at https://github.com/patgiri/VORSHA

    A Genetic Algorithm and Fuzzy Logic Approach for Video Shot Boundary Detection

    Get PDF
    This paper proposed a shot boundary detection approach using Genetic Algorithm and Fuzzy Logic. In this, the membership functions of the fuzzy system are calculated using Genetic Algorithm by taking preobserved actual values for shot boundaries. The classification of the types of shot transitions is done by the fuzzy system. Experimental results show that the accuracy of the shot boundary detection increases with the increase in iterations or generations of the GA optimization process. The proposed system is compared to latest techniques and yields better result in terms of F1score parameter

    A Genetic Algorithm and Fuzzy Logic Approach for Video Shot Boundary Detection

    Get PDF
    This paper proposed a shot boundary detection approach using Genetic Algorithm and Fuzzy Logic. In this, the membership functions of the fuzzy system are calculated using Genetic Algorithm by taking preobserved actual values for shot boundaries. The classification of the types of shot transitions is done by the fuzzy system. Experimental results show that the accuracy of the shot boundary detection increases with the increase in iterations or generations of the GA optimization process. The proposed system is compared to latest techniques and yields better result in terms of F1score parameter
    corecore