You are on page 1of 6

2020 4th International Conference on Advanced Systems and Emergent Technologies (IC_ASET)

Comparative Study of Face Recognition Approaches

Yassin Kortli 1,2,* Maher Jridi Mehrez Merzougui


1 AI-ED Department College of Computer Science
Electronic and Micro-electronic
Laboratory Yncrea Ouest, 20 rue du Cuirassé de King Khalid University
University of Monastir Bretagne Abha 61421, Saudi Arabia
5000 Monastir, Tunisia 29200 Brest, France Mhrez@kku.edu.sa
2
AI-ED Department maher.jridi@isen-bretagne.fr
Yncrea Ouest, 20 rue du Cuirassé de
2020 4th International Conference on Advanced Systems and Emergent Technologies (IC_ASET) | 978-1-7281-6356-7/20/$31.00 ©2020 IEEE | DOI: 10.1109/IC_ASET49463.2020.9318305

Bretagne Areej Alasiry Mohamed Atri


29200 Brest, France College of Computer Science College of Computer Science
yassin.kortli@isen-ouest.yncrea.fr King Khalid University King Khalid University
Abha 61421, Saudi Arabia Abha 61421, Saudi Arabia
areej.alasiry@kku.edu.sa matri@kku.edu.sa

Abstract— Face recognition systems have become one of the


most important and interesting research fields in recent years. Thermography

These systems are widely used in various disciplines, despite the


existence of different surveillance systems such as hand
geometry, iris scan, as well as fingerprints. Following their
simplicity and non-intrusive nature, they will be the next
generation solution expected to support security and
Hand palm Fingerprint
surveillance applications. Various approaches are being
developed including local, holistic, and hybrid approaches. The
main contribution of this survey is to review some well-known
techniques for each approach and to give the taxonomy of their
categories. After that, we are going to expose the advantages and
the disadvantages of these schemes in terms of robustness, Iris Face

accuracy, complexity, and discrimination. Finally, we will


criticize the implementation results of various mentioned
databases.

Keywords— Face recognition approaches, surveillance


systems, survey; Signature Typing
Patterns
I. INTRODUCTION Voice

The objective of developing biometric applications, such Fig.1. Biometrics applications[1][2][3][4] [5]6].
as facial recognition, has recently become important in smart
cities. The most commonly used type for recognition is the x We presented the state of the art of the existing face
password. However, by using the development of information recognition techniques classified into three
technologies and security algorithms, many systems are approaches: local, holistic and hybrid.
beginning to use many biometric factors for recognition task x The surveyed approaches are summarized and
[1-4]. These biometric factors make it possible to identify compared under different conditions.
people's identity by their physiological or behavioral x We highlighted some new promising research
characteristics. In this context, many recognition systems directions.
based on different biometric factors such as iris, fingerprints
Rapid advances in technologies such as digital cameras,
[5], voice [6], and face have deployed in the recent years, as
portable devices, and increased demand for security make the
shown in Fig. 1.
face recognition system is one of the primary biometric
They are many computer vision approaches proposed to technologies. In this paper survey, we present the general
address face detection or recognition tasks with high advantages and the different applications of the face
robustness and discrimination, such as local, subspace, and recognition system. After that, we mentioned the basic steps
hybrid approaches [7-13]. However, several issues still need and the different challenges needed to locate and discover
to be addressed due to various challenges, such as head human faces. Then, a detailed survey of critical approaches is
orientation, lighting conditions, and facial expression. The presented. In addition, we include a comparative study of the
most interesting techniques are developed to face all these different methods used for the face recognition system.
challenges and therefore develop reliable face recognition Finally, a conclusion and new promising research directions
systems. Key contributions of this paper review are: are presented.

978-1-7281-6356-7/20/$31.00 ©2020 IEEE


300

Authorized licensed use limited to: Queens University Belfast. Downloaded on May 17,2021 at 00:04:26 UTC from IEEE Xplore. Restrictions apply.
2020 4th International Conference on Advanced Systems and Emergent Technologies (IC_ASET)

II. THE BENEFITS OF USING FACE RECOGNITION SYSTEMS multimedia workstations, computer/ network
security, ATMs and border checkpoints.
Traditional identification systems such as keys, smart - Biometric Surveillance [1][17]: is widely used in the
cards, and passwords are used to recognize the identity. This surveillance domain like sports arenas retail, casinos,
may be insufficient, because keys can be forgotten or stores, and banks.
misplaced, and the passwords can be guessed or stolen. - Criminal justice systems[18]: Forensics, post-event
However, the physiological features of the individual cannot analysis, and mug-shot/booking systems.
be forgotten. For this reason, news biometric systems use the - Smart Card applications: The face-print can be
physiological features for identification such as face, voice saved in a smart card, magnetic stripe or barcode, the
[6], ear, iris, hand veins, hand geometry, finger geometry, and recognition is done by matching the stored template
fingerprints[5]. Compared to the other, face recognition and the target image.
systems offer many advantages because human faces can be - Identity Verification[19][20]: validate a claimed
taken from any distance with inexpensive cameras and the identity based on the query face image for a driving
identification is performed without any user action. However, license, passport, etc.
data acquisition challenges remain the most crucial task for
many biometric systems. For example, if skin tissue is injured, IV. ESSENTIAL STEPS OF THE FACE RECOGNITION SYSTEM
biometric systems that rely on fingers and hands can become Three basic steps are used to develop a facial recognition
useless, signatures can be modified, voice can be affected by system: (1) Face detection, (2) Feature extraction, and (3) Face
noises [11][6]. Also, identification of the retina and iris is very recognition (shown in Fig. 3) [3][21].
sensitive to movements and requires expensive equipment Verification
[14]. In contrast, the face recognition system has several and
benefits such as: Image Detection Features Face identification
Face Extraction Recognition
x Automatic: It works automatically without any user
action.
x Inexpensive: Easy to obtain with inexpensive cameras. Faces
x Non-Intrusive: There is no health risk. Database
x Short Time: Must pass by the biometric system only once.
x Success in Public Places: Improve recognition Fig. 3. Face recognition structure [3] [21].
performance.
x Face Detection: This step is used to detect and locate the
These benefits make the face recognition system widely human face image obtained by the system. Many
used in surveillance, security, and surpass other biometric techniques are used to detect and locate the human face
systems (fingers, hand, signature, eyes, and voice). image, for example, Viola-Jones detector[22],
Histogram of Oriented Gradient (HOG) [10], and
III. THE APPLICATIONS OF THE FACE RECOGNITION SYSTEM
Principal Component Analysis (PCA) [23]. Also, the
face detection step can be used for video and image
As shown in Fig. 2, face recognition can be used in many classification, object detection[24], region-of-interest
areas, such as people verification and crime prevention. As an detection[25], etc.
example, we can list the following:
x Feature Extraction: The main function of this step is
employed to extract the feature vectors for any human
face located in the first step. This step represents a face
with a set of features vector called “signature” that
describes the prominent features of the face image such
as mouth, nose, and eyes with their geometry
distribution[26]. Eigenface [27], Independent
Component Analysis (ICA), Linear discriminant
analysis (LDA)[23][28], Scale-Invariant Feature
Transform (SIFT)[21], Gabor filter, Local Phase
Quantization (LPQ) [29], Haar wavelets, Fourier
transforms [26] and Local Binary Pattern (LBP)[7][3]
techniques are widely used to extract the face features.
x Face Recognition: This step includes the features
extracted from the human face in order to compare it
with all template faces database to decide the human face
identity. Correlation filters [16], Convolutional Neural
Network (CNN) [31], and also k-Nearest Neighbor (K-
Fig. 2. The face recognition applications[16] [17] [20]. NN)[32] are known to effectively address this task.
- Security [15][16]: is a major concern in public
V. CHALLENGES OF THE FACE RECOGNITION SYSTEM
places. Many airports around the world use face
recognition system to alert the public security. In
addition, we can use the recognition system in many x Illumination Variations: The variations of illumination
security applications such as email authentication on cause radical changes in the appearance of the face.

301

Authorized licensed use limited to: Queens University Belfast. Downloaded on May 17,2021 at 00:04:26 UTC from IEEE Xplore. Restrictions apply.
2020 4th International Conference on Advanced Systems and Emergent Technologies (IC_ASET)

Therefore, a practical face recognition system must take (patches). Local appearance-based techniques focus on
into account illumination variations. critical points of the face such as the nose, mouth, and eyes
x Pose Change: In the surveillance system, the high- to generate more details. Also, take into account
rotation face is another challenge for recognition. the particularity of the face as a natural form to identify and
Mainly, the camera is installed in an area that people use a reduced number of parameters. In addition, these
cannot access, and faces are detected by a certain degree techniques describe the local features through pixel
of rotation. For example, in uncontrolled public places, orientations, histograms [10][34], geometric properties and
a face can be found in different positions that cause correlation plane[3][30][35].
rotation out of the plane.
b) Key-Points-Based Techniques: The key-points
x Facial expressions: Compared to variations in
illumination and angles, facial expressions such as based techniques are used to detect specific geometric
closing eyes, anger, and smile affect the face texture and features, according to some geometric information of the face
geometry, as well as the accuracy of recognition. surface (e.g., the distance between the eyes, the width of the
x Face Age: The shape of the face changes with age, which head, etc.). These techniques can be defined by two
poses a problem because the face image used in identity significant steps, key-point detection and feature extraction
cards and passports is generally not updated. [3][25]. The first step focuses on the performance of the
detectors of the key-point features of the face image. The
x Dynamic Background: It is also a major challenge, for second step focuses on the representation of the information
example, when the context is active or moving, carried with the key-point features of the face image.
recognition becomes more difficult. On the other hand, Although these techniques can solve the missing parts and
recognition is easier when the context is unique or fixed. occlusions, their computational time is very higher produced
x Noise: The quality and the nature of human faces make by the high dimensional features vector (i.e., a large number
this noise inevitable, which severely affects the of key-points). Many techniques that are based on key-points
recognition.
describe the features of the face image, the location of the
VI. CLASSIFICATION OF FACE RECOGNITION SYSTEMS main points or the points of interest and represent the region
pixels feature around the point of interest. Scale Invariant
Compared to other biometric systems such as the eye, iris Feature Transform (SIFT), Binary Robust Independent
or fingerprint recognition systems, the face recognition system Elementary Features (BRIEF), and Speeded-Up Robust
is not the most efficient and reliable [5]. However, the Features (SURF) techniques are widely used to describe the
advantage of this system is that it does not require any user feature of the face image.
assistance, which makes it widely used in security and
surveillance systems such as airports, public places, and B. Holistic Approaches
multiplexes. Several systems are implemented to identify a Holistic or subspace approaches are supposed to treat the
human face in 2D or 3D images. In this paper review, we will whole face, e.g., they don't require extracting face regions or
classify these systems into three approaches based on their features points (eyes, mouth, noses, etc.). The main function
detection and recognition method: (1) local approaches, (2) of these approaches is to represent the face image by a matrix
holistic (subspace) approaches and (3) hybrid approaches. of pixels, and this matrix is often converted into feature
vectors to facilitate their treatment. After that, these feature
A. Local Approaches vectors are implemented in low dimensional space. However,
In the context of face recognition, local approaches treat holistic or subspace techniques are sensitive to variations
only some facial features. They are more sensitive to facial (facial expressions, illumination, and poses), these advantages
expressions, occlusions and pose[13]. The main objective of make these approaches widely used. Moreover, these
these approaches is to discover distinctive features. Generally, approaches can be divided into categories, including linear
these approaches can be divided into two categories (Fig.4): and non-linear techniques based on the method used to
(1) Local appearance-based techniques are used to extract represent the subspace. The most commonly used linear and
local features, while the face image is divided into small non-linear subspaces techniques are illustrated in Fig. 5.
regions (patches). (2) Key-points-based techniques are used to
Holistic Techniques
detect the points of interest in the face image, after that, extract
the features localized on these points [33].
Linear Techniques Non-Linear Techniques
Local approaches

Local Appearance-Based Techniques Key-Points-Based Techniques PCA KPCA


LDA
SIFT Eigenfaces KLDA
LBP, LBPH, LPT, LPQ
HOG SURF Fisherface SVM
BRIEF Gabor Filters
Correlation filters
etc... ICA
etc...

Fig 4. Face recognition based on Local Appearance techniques. Fig. 5. Face recognition techniques regarding linear and nonlinear.
a) Local Appearance-Based Techniques: It is a a) Linear Techniques: The most popular linear
geometrical technique, also called feature or analytic techniques used for face recognition systems are Eigenfaces
technique. In this case, the face image is represented by a set (Principal Component Analysis: PCA) technique, Fisherfaces
of distinctive vectors with low dimensions or small regions

302

Authorized licensed use limited to: Queens University Belfast. Downloaded on May 17,2021 at 00:04:26 UTC from IEEE Xplore. Restrictions apply.
2020 4th International Conference on Advanced Systems and Emergent Technologies (IC_ASET)

(Linear Discriminative Analysis: LDA) technique, and Various techniques are introduced to improve the
Independent Component Analysis (ICA). performance and the accuracy of recognition systems. The
b) Nonlinear Techniques: Due to their limitations to combination between the local approaches and the subspace
manage the linearity in face recognition, the subspace or approach provides robust recognition and reduction of
holistic techniques are not appropriate to represent the exact dimensionality under different illumination conditions and
facial expressions. As well as, these technologies are
details of geometric varieties of the face images. Then, to
presented sensitive to the noise, and invariant to translations
solve this constraint, many researchers used the non-linear
and rotations.
varieties to obtain the proper representation of the geometric
varieties. Linear techniques provide offer a faithful Local-based Techniques Holistic-based Techniques
description of face images when the data structures are linear.
However, when the face images data structures are non-
linear, many types of research use a function named “kernel” Hybrid-based Techniques
to construct a large space where the problem becomes linear.
Although these techniques (linear and non-linear) allow a Fig.6. Hybrid techniques for face recognition.
better reduction in dimensionality and improve the
recognition rate, they are not invariant to translations and VII. COMPARISON BETWEEN HOLISTIC, LOCAL AND HYBRID
rotations compared to local techniques. TECHNIQUES
C. Hybrid Approaches
In this section, we present some advantages and
disadvantages of Holistic, Local and Hybrid approaches to
The hybrid approaches are based on local and subspace identify faces during the last 20 years. Table 1 presents a brief
features in order to use the benefits of both subspace and local summary of the three approaches: local, holistic and hybrid.
techniques, which have the potential to offer better
performance for face recognition systems. The flowchart of
the hybrid techniques is shown in Fig 6.
TABLE I. THE SUMMARY OF FACE RECOGNITION APPROACHES.
Approaches Advantages Disadvantages

 Easy to implement, allowing an analysis of  For large face images, these techniques produce
images in a difficult environment in real-time. long histograms (LPB and HOG) and picks
 It has compactness of facial image (correlations), which slows the speed of
representation and high-speed matching. identification.
Local Appearance
 Invariant to rotation, translation, and facial  The binary information finds by HOG and LBP
expressions. techniques are sensitive to noise.
 High performance in terms of processing time
and recognition rate.
Local  Does not require prior knowledge of the  More affected by orientation changes or the
Key-Points images. expression of the face.
 High processing time.
 Low recognition rate.
 When frontal views of faces are used, these  Sensitive to the rotation and the translation of the
techniques provide good performance. face images.
 Recognition is effective and simple.  Can only classify a face, which is “known” to the
Linear  Reduction of the dimension. database.
 Low speed in the face recognition caused by a
long feature vector.
 Reduction of the dimension.  The recognition performance depends on the
 They are due to supervised classification chosen kernel.
problems.  More difficult to implement than the local
Non-Linear  The convexity used with SVM classifiers is an technique.
Holistic interesting and important property.  Recognition rate unsatisfying.

 High recognition rate  More difficult to implement.


Hybrid  Provides faster systems and efficient  Complex and computational cost.
recognition.

Generally, existing techniques can be classified into three interest in the face image, after that, features extraction are
approaches, depending on the type of desired features. The localized based on these points including BRIEF, SURF,
local feature approaches such as HOG, LBP, Gabor filters, SIFT, etc. In the context of face recognition, local techniques
BRIEF, SURF, and SIFT are primarily proposed for face are treated only certain facial features, which make them very
recognition task and all show better performance. The main sensitive to facial expressions, and occlusions [4][14]
purpose of these techniques is to discover distinctive features, [36][37][38][39][40].
which can be divided into two parts: (1) Local appearance- Unlike the local approaches, holistic approaches are other
based techniques, which are used to extract local features methods used for face recognition, which treat the whole face
when the face image is divided into small regions (including image and does not require extracting face regions or features
HOG, LBP, Gabor filters and correlation filters). (2) Key- points (eyes, mouth, noses, etc.). In fact, holistic approaches
points-based techniques are used to detect the points of are sensitive to different variations (facial expressions,

303

Authorized licensed use limited to: Queens University Belfast. Downloaded on May 17,2021 at 00:04:26 UTC from IEEE Xplore. Restrictions apply.
2020 4th International Conference on Advanced Systems and Emergent Technologies (IC_ASET)

illumination, and different poses), which make them easy to [10] Ouerhani, Yousri, Ayman Alfalou, and Christian Brosseau.
implement. Many holistic approaches are implemented to "Road mark recognition using HOG-SVM and
represent the face such as Eigenface, Eigenfisher, PCA, LDA, correlation." Optics and Photonics for Information
etc., which can be divided into two categories: linear and non- Processing XI. Vol. 10395. International Society for Optics
linear techniques. The main advantage of holistic approaches and Photonics, 2017.
is that they do not destroy image information by focusing only [11] Liu, Weibo, et al. "A survey of deep neural network
on regions or points of interest. However, these approaches architectures and their applications." Neurocomputing 234
generally ignore local details, which makes them rarely used (2017): 11-26.
to identify faces. [12] Xi, Meng, et al. "Local binary pattern network: a deep
Hybrid approaches are based on local and global features learning approach for face recognition." 2016 IEEE
to exploit the benefits of both techniques. These approaches international conference on Image processing (ICIP).
combine the two approaches described above into a single IEEE, 2016.
system to improve the performance and accuracy of [13] Ojala, Timo, Matti Pietikäinen, and David Harwood. "A
recognition. comparative study of texture measures with classification
based on featured distributions." Pattern recognition 29.1
VIII. CONCLUSIONS (1996): 51-59.
[14] Gowda, HD Supreetha, G. Hemantha Kumar, and
Face recognition system is a popular study task in the field Mohammad Imran. "Multimodal Biometric Recognition
of image processing and computer vision, due to its potentially System Based on Nonparametric Classifiers." Data
enormous application as well as its theoretical value. This Analytics and Learning. Springer, Singapore, 2019. 269-
paper highlight the recent research on the 2D or 3D face 278.
recognition system, focusing mainly on approaches based on [15] Zhao, Chunhui, Xiaocui Li, and Yan Cang. "Bisecting k-
local, holistic (subspace), and hybrid features. A comparative means clustering based face recognition using block-based
study between these approaches in term of advantages and bag of words model." Optik-International Journal for Light
disadvantages were done. We can conclude that local feature and Electron Optics 126.19 (2015): 1761-1766.
techniques are the best choice concerning discrimination, [16] Ouerhani, Yousri, et al. "Optimized pre-processing input
rotation, translation, complexity, and accuracy. We hope that plane GPU implementation of an optical face recognition
this survey paper will further encourage researchers in this technique using a segmented phase only composite
field to participate and pay more attention to use the local filter." Optics Communications 289 (2013): 33-44.
techniques for face recognition systems. [17] Mousa Pasandi, Mohammad Esmaeel. Face, Age and
Gender Recognition using Local Descriptors. Diss.
REFERENCES Université d'Ottawa/University of Ottawa, 2014.
[1] Liao, Shengcai, Anil K. Jain, and Stan Z. Li. "Partial face [18] Khoi, Phan, Lam Huu Thien, and Vo Hoai Viet. "Face
recognition: Alignment-free approach." IEEE Retrieval Based On Local Binary Pattern and Its Variants:
Transactions on pattern analysis and machine A Comprehensive Study." International Journal of
intelligence 35.5 (2012): 1193-1205. Advanced Computer Science and Applications
(IJACSA) 7.6 (2016): 249-258.
[2] Jridi, Maher, Thibault Napoléon, and Ayman Alfalou.
"One lens optical correlation: application to face [19] Zeppelzauer, Matthias. "Automated detection of elephants
recognition." Applied optics 57.9 (2018): 2087-2095. in wildlife video." EURASIP journal on image and video
processing 2013.1 (2013): 46.
[3] Napoléon, Thibault, and Ayman Alfalou. "Pose invariant
face recognition: 3D model from single photo." Optics and [20] Parmar, Divyarajsinh N., and Brijesh B. Mehta. "Face
Lasers in Engineering 89 (2017): 150-161. recognition methods & applications." arXiv preprint
arXiv:1403.0485 (2014).
[4] Ouerhani, Yousri, Maher Jridi, and Ayman Alfalou. "Fast
face recognition approach using a graphical processing unit [21] Vinay, A., et al. "Two novel detector-descriptor based
“GPU”." 2010 IEEE International Conference on Imaging approaches for face recognition using sift and
Systems and Techniques. IEEE, 2010. surf." Procedia Computer Science 70 (2015): 185-197.
[5] Yang, Wencheng, et al. "A fingerprint and finger-vein [22] Yang, Huachun, and Xu An Wang. "Cascade classifier for
based cancelable multi-biometric system." Pattern face detection." Journal of Algorithms & Computational
Recognition 78 (2018): 242-251. Technology 10.3 (2016): 187-197.
[6] Patel, Nitesh Purushottam, and Ashwini Kale. "Optimize [23] Seo, Hae Jong, and Peyman Milanfar. "Face verification
Approach to Voice Recognition Using IoT." 2018 using the lark representation." IEEE Transactions on
International Conference On Advances in Communication Information Forensics and Security 6.4 (2011): 1275-1286.
and Computing Technology (ICACCT). IEEE, 2018. [24] Du, Geng, Fei Su, and Anni Cai. "Face recognition using
[7] Kortli, Yassin, et al. "A comparative study of CFs, LBP, SURF features." MIPPR 2009: Pattern Recognition and
HOG, SIFT, SURF, and BRIEF for security and face Computer Vision. Vol. 7496. International Society for
recognition." Optics and Photonics, 2009.
[8] HajiRassouliha, Amir, et al. "FPGA implementation of 2D [25] Calonder, Michael, et al. "BRIEF: Computing a local
cross-correlation for real-time 3D tracking of deformable binary descriptor very fast." IEEE Transactions on Pattern
surfaces." 2013 28th International Conference on Image Analysis and Machine Intelligence 34.7 (2011): 1281-
and Vision Computing New Zealand (IVCNZ 2013). IEEE, 1298.
2013. [26] Smach, Fethi, et al. "An FPGA-based accelerator for
[9] Dehai, Zhang, et al. "A pca-based face recognition method Fourier Descriptors computing for color object recognition
by applying fast fourier transform in pre-processing." 3rd using SVM." Journal of Real-Time Image Processing 2.4
International Conference on Multimedia Technology (2007): 249-258.
(ICMT-13). Atlantis Press, 2013. [27] Turk, Matthew A., and Alex P. Pentland. "Face recognition

304

Authorized licensed use limited to: Queens University Belfast. Downloaded on May 17,2021 at 00:04:26 UTC from IEEE Xplore. Restrictions apply.
2020 4th International Conference on Advanced Systems and Emergent Technologies (IC_ASET)

using eigenfaces." Proceedings. 1991 IEEE Computer [34] Rettkowski, Jens, Andrew Boutros, and Diana Göhringer.
Society Conference on Computer Vision and Pattern "HW/SW Co-Design of the HOG algorithm on a Xilinx
Recognition. IEEE, 1991 . Zynq SoC." Journal of Parallel and Distributed
[28] Jain, Amit, and Jeffrey Huang. "Integrating independent Computing 109 (2017): 50-62.
components and linear discriminant analysis for gender [35] Benarab, D., et al. "Optimized swimmer tracking system by
classification." Sixth IEEE International Conference on a dynamic fusion of correlation and color histogram
Automatic Face and Gesture Recognition, 2004. techniques." Optics Communications 356 (2015): 256-268.
Proceedings.. IEEE, 2004. [36] Alfalou, Ayman, and Christian Brosseau. Understanding
[29] Hussain, Sibt Ul, Thibault Napoléon, and Fréderic Jurie. correlation techniques for face recognition: from basics to
"Face recognition using local quantized patterns." 2012. applications. ISBN, 2010.
[30] Napoléon, Thibault, and Ayman Alfalou. "Pose invariant [37] Leonard, Isabelle, Ayman Alfalou, and Christian Brosseau.
face recognition: 3D model from single photo." Optics and "Face recognition based on composite correlation filters:
Lasers in Engineering 89 (2017): 150-161. analysis of their performances." (2012).
[31] Schroff, Florian, Dmitry Kalenichenko, and James Philbin. [38] Katz, Philippe, Michael Aron, and Ayman Alfalou. "A
"Facenet: A unified embedding for face recognition and face-tracking system to detect falls in the elderly." SPIE
clustering." Proceedings of the IEEE conference on Newsroom (2013).
computer vision and pattern recognition. 2015. [39] Alfalou, Ayman, et al. "Decision optimization for face
[32] Kambi Beli, Idelette, and Chunsheng Guo. "Enhancing face recognition based on an alternate correlation plane
identification using local binary patterns and k-nearest quantification metric." Optics letters 37.9 (2012): 1562-
neighbors." Journal of Imaging 3.3 (2017): 37. 1564.
[33] Kortli, Yassin, et al. "A novel face detection approach [40] Elbouz, Marwa, et al. "Adapted all-numerical correlator for
using local binary pattern histogram and support vector face recognition applications." Optical Pattern
machine." 2018 International Conference on Advanced Recognition XXIV. Vol. 8748. International Society for
Systems and Electric Technologies (IC_ASET). IEEE, Optics and Photonics, 2013.
2018.

305

Authorized licensed use limited to: Queens University Belfast. Downloaded on May 17,2021 at 00:04:26 UTC from IEEE Xplore. Restrictions apply.

You might also like