Skip to main content
Log in

Face recognition from a single image per person using deep architecture neural networks

  • Published:
Cluster Computing Aims and scope Submit manuscript

    We’re sorry, something doesn't seem to be working properly.

    Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

Abstract

Implementing an accurate face recognition system requires images in different variations, and if our database is large, we suffer from problems such as storing cost and low speed in recognition algorithms. On the other hand, in some applications there is only one image available per person for training recognition model. In this article, we propose a neural network model inspired of bidirectional analysis and synthesis brain network which can learn nonlinear mapping between image space and components space. Using a deep neural network model, we have tried to separate pose components from person ones. After setting apart these components, we can use them to synthesis virtual images of test data in different pose and lighting conditions. These virtual images are used to train neural network classifier. The results showed that training neural classifier with virtual images gives better performance than training classifier with frontal view images.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  1. Tan, X., Clien, S., Zlion, Z.-H., Zliang, F.: Face recognition from a single image per person: a survey. Pattern Recognit. 39, 1725–1745 (2006)

    Article  Google Scholar 

  2. Bengio, Y.: Learning deep architectures for AI. Found. Trends Mach. Learn. 2(l), 1–127 (2009)

    Article  MATH  Google Scholar 

  3. Hinton, G.E.: Learning multiple layers of representation. Trends Cogn. Sci. 11, 428–434 (2007)

  4. Mukhvpadhyay, S., Schurgers, C., Panigrahi, D., Dcy, S.: Model-based techniques for data reliability in wireless sensor networks. IEEE Trans. Mob. Comput. 8(4), 28–543 (2013)

    Google Scholar 

  5. Guan, Z.H., Dang, L., Kong, Z.M.: Mufti-radius geographical spatial networks: statistical characteristics and application to wireless sensor networks. Physica A 1(15), 198–204 (2010)

    Article  Google Scholar 

  6. Zhang, Y., Meratnia, N., Havinga, P.: Outlier Detection tcehniques for wireless sensor networks: a survey. IEEE Commun. Surv. Tutor. 12(2), 159–170 (2010)

    Article  Google Scholar 

  7. Slian, T., Locell, B.C., Clien, S.: Face recognition robust to liead pose from one sample image. Proc. ICPR 1, 515–518 (2006)

  8. Douglas, S.J., De, C., Daniel, A., John, B., Robert, M.A.: High-throughput path metric for multi-hop wireless routing. In: Proceedings of MOBICOM’03[C], pp. 134-146. ACM Press, San Diego (2003)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tian Zhuo.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhuo, T. Face recognition from a single image per person using deep architecture neural networks. Cluster Comput 19, 73–77 (2016). https://doi.org/10.1007/s10586-015-0513-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-015-0513-1

Keywords

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy