28
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Race identification from facial images using statistical techniques

, &

References

  • Timo Ahonen Abdenour Hadid, and Matti Pietikainen Face description with local binary patterns: Application to face recognition. IEEE transactions on pattern analysis and machine intelligence, 28(12):2037–2041, 2006. doi: 10.1109/TPAMI.2006.244
  • Matthew S Crouse, Robert D Nowak, and Richard G Baraniuk. Wavelet-based statistical signal processing using hidden markov models. IEEE Transactions on signal processing, 46(4):886–902, 1998. doi: 10.1109/78.668544
  • Yun Fu, Guodong Guo, and Thomas S Huang. Agesynthesis and estimation via faces: A survey. IEEEtransactions on pattern analysis and machine intelligence, 32(11):1955–1976, 2010. doi: 10.1109/TPAMI.2010.36
  • Xin Geng, Kate Smith-Miles, Liang Wang, Ming Li, and Qiang Wu. Context-aware fusion: A case study on fusion of gait and face for human identification in video. Pattern Recognition, 43(10):3660–3673, 2010. doi: 10.1016/j.patcog.2010.04.012
  • P Jonathon Phillips, Alvin Martin, Charles L Wilson, and Mark Przybocki. An introduction evaluating biometric systems. Computer, 33(2):56–63, 2000. doi: 10.1109/2.820040
  • Tasto, M. (1977). Parallel array processors for digital image processing. Journal of Modern Optics, 24(4), 391–406.
  • Chaua C Queirolo, Luciano Silva, Olga RP Bellon, and Mauricio Pamplona Segundo. 3d face recognition using simulated annealing and the surface interpenetration measure. IEEE Transactions on Pattern Analysis and Machine Intelligence, 32(2):206–219, 2010. doi: 10.1109/TPAMI.2009.14
  • Nomi, J. S., Rhodes, M. G., & Cleary, A. M. (2013). Emotional facial expressions differentially influence predictions and performance for face recognition. Cognition & emotion, 27(1), 141–149. doi: 10.1080/02699931.2012.679917
  • Dhaka, V., Poonia, R. C., & Singh, Y. V. (2013). A Novel Algorithm for Image Steganography Based on Effective Channel Selection Technique. International Journal of Advanced Research in Computer Science and Software Engineering, 3(8).
  • Pal, S. K., Saxena, P. K., & Muttoo, S. K. (2005). Steganography and watermarking of digital images using singular value decomposition. Journal of Discrete Mathematical Sciences and Cryptography, 8(3), 343–353. doi: 10.1080/09720529.2005.10698042

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.