Utilizing Viola Jones with Haar Cascade Along with Neural Networks for Face Detection and Recognition
Journal: International Journal of Trend in Scientific Research and Development (Vol.5, No. 1)Publication Date: 2021-01-21
Authors : Karan Arora Sarthak Arora;
Page : 284-291
Keywords : haar-features; Viola Jones; Image Analysis; face detection; feature extraction; face edge detection;
Abstract
Viola– Jones object detection frameworkintroduced in 2001 by Dr. Paul Viola and Dr. Michael Jones is an object detection framework which can be trained for detecting a variety of object classes .It is primarily used for the problem of face detection.In most video recording or surveillance systems it became impossible for human beings to retrieve large image datasets and analyze them for potential results. Now a days accurate facial recognition has a great impact in our ecosystem be it face unlock or face recognition in cameras for auto adjust. Implemented in two stages our proposed methodology will first utilize one of the widely accepted methods to detect faces i.e. viola Jones which utilizes Haar Classifiers and in the second stage we will recognise the face using Principal Component Analysis PCA and Feed Forward Neural Network. Bio ID Face Database is used as a training database. Test is conducted on webcam video and image snapshots. Karan Arora | Sarthak Arora "Utilizing Viola Jones with Haar Cascade Along with Neural Networks for Face Detection and Recognition" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd35848.pdf Paper URL : https://www.ijtsrd.com/engineering/computer-engineering/35848/utilizing-viola-jones-with-haar-cascade-along-with-neural-networks-for-face-detection-and-recognition/karan-arora
Other Latest Articles
- Significance of Area of Obscuration and Derivation of General Expression by Method of Integration
- Empowering Distributed Storage Inspecting with Undeniable Re Appropriating of Key Updates
- Authentication Utilizing Prior Routing for Versatile Network
- A Study on Honeypots and Deceiving Attacker using Modern Honeypot Network
- Problems of Drawing and Construction in Year III Mathematics Lessons
Last modified: 2021-01-22 15:57:17