The use of hidden Markov models to verify the identity based on facial asymmetry
نویسندگان
چکیده
This work concerns the use of biometric features, resulting from the look of a face, for the verification purposes. Different methods of selection and feature analysis during face recognition are presented here. The description contains mainly analysis possibilities and also identity verification based on asymmetric facial features—in later stages. The new verification method has been introduced based on designated characteristic points. These points were designated through appropriate coded information about facial asymmetry as observation vectors and recognition using hidden Markov models. The advantage of these models is that we can use vectors of different lengths. Such vectors appear in incomplete data when all points cannot be located.
منابع مشابه
Improving Phoneme Sequence Recognition using Phoneme Duration Information in DNN-HSMM
Improving phoneme recognition has attracted the attention of many researchers due to its applications in various fields of speech processing. Recent research achievements show that using deep neural network (DNN) in speech recognition systems significantly improves the performance of these systems. There are two phases in DNN-based phoneme recognition systems including training and testing. Mos...
متن کاملIntroducing Busy Customer Portfolio Using Hidden Markov Model
Due to the effective role of Markov models in customer relationship management (CRM), there is a lack of comprehensive literature review which contains all related literatures. In this paper the focus is on academic databases to find all the articles that had been published in 2011 and earlier. One hundred articles were identified and reviewed to find direct relevance for applying Markov models...
متن کاملIntrusion Detection Using Evolutionary Hidden Markov Model
Intrusion detection systems are responsible for diagnosing and detecting any unauthorized use of the system, exploitation or destruction, which is able to prevent cyber-attacks using the network package analysis. one of the major challenges in the use of these tools is lack of educational patterns of attacks on the part of the engine analysis; engine failure that caused the complete training, ...
متن کاملSpeech enhancement based on hidden Markov model using sparse code shrinkage
This paper presents a new hidden Markov model-based (HMM-based) speech enhancement framework based on the independent component analysis (ICA). We propose analytical procedures for training clean speech and noise models by the Baum re-estimation algorithm and present a Maximum a posterior (MAP) estimator based on Laplace-Gaussian (for clean speech and noise respectively) combination in the HMM ...
متن کاملEvaluation of the Hidden Markov Model for Detection of P300 in EEG Signals
Introduction: Evoked potentials arisen by stimulating the brain can be utilized as a communication tool between humans and machines. Most brain-computer interface (BCI) systems use the P300 component, which is an evoked potential. In this paper, we evaluate the use of the hidden Markov model (HMM) for detection of P300. Materials and Methods: The wavelet transforms, wavelet-enhanced indepen...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- EURASIP J. Image and Video Processing
دوره 2017 شماره
صفحات -
تاریخ انتشار 2017