2012
DOI: 10.1007/s12652-012-0134-y
|View full text |Cite
|
Sign up to set email alerts
|

Face detection of ubiquitous surveillance images for biometric security from an image enhancement perspective

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 21 publications
0
5
0
Order By: Relevance
“…Works have been done to resolve the above factors by normalizing color, transformation of color spaces, multiple color channel ratios and eliminating luminance components. In addition to the above challenging factors, cameras may also result in poor visibility of images that makes the recognition of objects either difficult or impossible [3]. Since, the quality of images is very much affected by movement of objects, low resolution cameras, lighting condition environments etc.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Works have been done to resolve the above factors by normalizing color, transformation of color spaces, multiple color channel ratios and eliminating luminance components. In addition to the above challenging factors, cameras may also result in poor visibility of images that makes the recognition of objects either difficult or impossible [3]. Since, the quality of images is very much affected by movement of objects, low resolution cameras, lighting condition environments etc.…”
Section: Related Workmentioning
confidence: 99%
“…It is a linear scaling function that is applied to the image pixel values. The pixels values of an enhanced image of the corresponding original image can be obtained by using following basic equation [3]:…”
Section: ) Pre-processing Stepmentioning
confidence: 99%
See 1 more Smart Citation
“…In such case, it is difficult to segment or detect the boundaries of the abnormal structures/lesions or blood vessels presented in these poor images. Low resolution could be improved by some super-resolution technologies Wei et al 2017), and yet enhancing low contrast should be performed by image enhancement methods (Iqbal et al 2014;Tao et al 2018).…”
Section: Introductionmentioning
confidence: 99%
“…Nowadays, the development of information security is burgeoning (Li and Kim 2010;Li et al 2014;Castiglione et al 2015;Esposito et al 2013), and face recognition technology (FRT) has a variety of potential applications in information security (Iqbal et al 2014). During the past decades, principal component analysis (PCA) and linear discriminant analysis (LDA) have been two most popular subspace techniques used in the appearance-based approaches for face recognition, such as Eigenfaces (Turk and Pentland 1991) based upon PCA, Fisherfaces (Belhumeur et al 1997) and LDA-based methods have given promising results, they are linear projection methods, whereas face recognition is a highly nonlinear problem owing to image variations such as pose, illumination, and facial expression.…”
Section: Introductionmentioning
confidence: 99%