Matlab is a registered trademark of The Mathworks, Inc.


 Advanced Source Code . Com

 
 
HOME SOURCE CODE SOFTWARE INFO SUPPORT CONTACT US
 
Source code for fingerprint recognition, face recognition and much more


Software Info    About us     
Go To Matlab Official Website

.: Click here to download :.

In the JPEG image compression algorithm, the input image is divided into 8-by-8 or 16-by-16 blocks, and the two-dimensional DCT is computed for each block. The DCT coefficients are then quantized, coded, and transmitted. The JPEG receiver (or JPEG file reader) decodes the quantized DCT coefficients, computes the inverse two-dimensional DCT of each block, and then puts the blocks back together into a single image. For typical images, many of the DCT coefficients have values close to zero; these coefficients can be discarded without seriously affecting the quality of the reconstructed image. Such algorithm results particularly robust also for face identification. Moreover the 2D DCT operator can be applied to overlapping data.

The extracted feature vectors are used as input to a simple nearest neighbor algorithm. The k-nearest neighbor algorithm is amongst the simplest of all machine learning algorithms. An object is classified by a majority vote of its neighbors, with the object being assigned to the class most common amongst its k nearest neighbors. k is a positive integer, typically small. If k = 1, then the object is simply assigned to the class of its nearest neighbor. In binary (two class) classification problems, it is helpful to choose k to be an odd number as this avoids difficulties with tied votes. The same method can be used for regression, by simply assigning the property value for the object to be the average of the values of its k nearest neighbors. It can be useful to weight the contributions of the neighbors, so that the nearer neighbors contribute more to the average than the more distant ones. The neighbors are taken from a set of objects for which the correct classification (or, in the case of regression, the value of the property) is known. This can be thought of as the training set for the algorithm, though no explicit training step is required. In order to identify neighbors, the objects are represented by position vectors in a multidimensional feature space. It is usual to use the Euclidean distance, though other distance measures, such as the Manhattan distance could in principle be used instead. The k-nearest neighbor algorithm is sensitive to the local structure of the data.

The code has been tested with AT&T database achieving an excellent recognition rate of 99.20% (40 classes, 5 training images and 5 test images for each class, hence there are 200 training images and 200 test images in total randomly selected and no overlap exists between the training and test images).

Index Terms: Matlab, source, code, face recognition, face matching, face verification, dct, k-nearest neighbor algorithm, knn, discrete cosine transform.

 

 

 

 

 

Figure 1. Example of k-NN classification



A simple and effective source code for Face Recognition.

Demo code (protected P-files) available for performance evaluation. Matlab Image Processing Toolbox is required.

Release
Date
Major features
1.0

2007.10.20



We recommend to check the secure connection to PayPal, in order to avoid any fraud.
This donation has to be considered an encouragement to improve the code itself.

Face Recognition Based On Overlapping DCT - Click here for your donation. In order to obtain the source code you have to pay a little sum of money: 250 EUROS (less than 350 U.S. Dollars).

Once you have done this, please email us luigi.rosa@tiscali.it
As soon as possible (in a few days) you will receive our new release of Face Recognition Based On Overlapping DCT.

Alternatively, you can bestow using our banking coordinates:
Name :
Luigi Rosa
Address :
Via Pozzo Strada 5 10139 Torino Italy
Bank name:
Poste Italiane
Bank address:
Viale Europa 190 00144 Roma Italy
IBAN (International Bank Account Number) :
IT-50-V-07601-03600-000058177916
BIC (Bank Identifier Code) :
BPPIITRRXXX

The authors have no relationship or partnership with The Mathworks. All the code provided is written in Matlab language (M-files and/or M-functions), with no dll or other protected parts of code (P-files or executables). The code was developed with Matlab Release 2006a. Matlab Image Processing Toolbox is required. The code provided has to be considered "as is" and it is without any kind of warranty. The authors deny any kind of warranty concerning the code as well as any kind of responsibility for problems and damages which may be caused by the use of the code itself including all parts of the source code.

New - AI Trader
 Stock Price Trend Forecasting An emerging trading market is represented by binary options. Binary options are a convenient way of investments as they donít require a trader to forecast actual quotes.
 
New - Speaker Verification System
 Text-Independent Speaker Authentication There are two major applications of speaker recognition technologies and methodologies. If the speaker claims to be of a certain identity and the voice is used to verify this claim, this is called verification or authentication.
 
New - Java Face Recognition
 Java-based Biometric Authentication System Face recognition is essential in many applications, including mugshot matching, surveillance, access control and personal identification, and forensic and law enforcement applications.
 
New - Software References
 Papers and lectures A list of papers that included Advanced Source Code .Com in the references section. If you have written a paper where our software is cited in the references list please email us and your work will be published at our web site.
 
New - White Papers
 High Capacity Wavelet Watermarking Using CDMA Multilevel Codes This paper proposes a technique based on CDMA and multilevel coding in order to achieve a high capacity watermarking scheme. The bits of watermark are grouped together and for each sequence a different modulation coefficient is used.
 
New - WebCam Face Identification
 Face Recognition Based on Fractional Gaussian Derivatives Local photometric descriptors computed for interest regions have proven to be very successful in applications such as wide baseline matching, object recognition, texture recognition, image retrieval, robot localization, video data mining, building panoramas, and recognition of object categories.
 
New - Speaker Recognition System
 Source code for speaker recognition
Speaker recognition is the process of automatically recognizing who is speaking on the basis of individual information included in speech waves.
 
New - Speech Recognition System
 Source code for isolated words recognition
Speech recognition technology is used more and more for telephone applications like travel booking and information, financial account information, customer service call routing, and directory assistance. Using constrained grammar recognition, such applications can achieve remarkably high accuracy.
 



The MathWorks, Inc. Google NeuralNetworks.It Octave Scilab The R Project for Statistical Computing Python Other available resources English Dictionary Download .Com
 
Software Info    About us