Open Access   Article Go Back

Face Recognition Based Security Scanner using PCA

Amrita Naik1 , Amrita Nagekar2 , Michael Monte3 , Aditya Parab4 , Ronan Revadkar5

Section:Research Paper, Product Type: Journal Paper
Volume-06 , Issue-10 , Page no. 1-4, Nov-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6si10.14

Online published on Nov 30, 2018

Copyright © Amrita Naik, Amrita Nagekar, Michael Monte, Aditya Parab, Ronan Revadkar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Amrita Naik, Amrita Nagekar, Michael Monte, Aditya Parab, Ronan Revadkar, “Face Recognition Based Security Scanner using PCA,” International Journal of Computer Sciences and Engineering, Vol.06, Issue.10, pp.1-4, 2018.

MLA Style Citation: Amrita Naik, Amrita Nagekar, Michael Monte, Aditya Parab, Ronan Revadkar "Face Recognition Based Security Scanner using PCA." International Journal of Computer Sciences and Engineering 06.10 (2018): 1-4.

APA Style Citation: Amrita Naik, Amrita Nagekar, Michael Monte, Aditya Parab, Ronan Revadkar, (2018). Face Recognition Based Security Scanner using PCA. International Journal of Computer Sciences and Engineering, 06(10), 1-4.

BibTex Style Citation:
@article{Naik_2018,
author = {Amrita Naik, Amrita Nagekar, Michael Monte, Aditya Parab, Ronan Revadkar},
title = {Face Recognition Based Security Scanner using PCA},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2018},
volume = {06},
Issue = {10},
month = {11},
year = {2018},
issn = {2347-2693},
pages = {1-4},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=516},
doi = {https://doi.org/10.26438/ijcse/v6i10.14}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i10.14}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=516
TI - Face Recognition Based Security Scanner using PCA
T2 - International Journal of Computer Sciences and Engineering
AU - Amrita Naik, Amrita Nagekar, Michael Monte, Aditya Parab, Ronan Revadkar
PY - 2018
DA - 2018/11/30
PB - IJCSE, Indore, INDIA
SP - 1-4
IS - 10
VL - 06
SN - 2347-2693
ER -

           

Abstract

Immediately This paper proposes a novel Face Recognition based Security Scanner for keeping track of people moving in and out of a workplace using Haar Cascade and Principal Component Analysis. The proposed system trains the system using images and then detects and recognises the person and gives details about the person with the date and time.

Key-Words / Index Term

Face Detection, Face Extraction, Face Recognition, Principal Component Analysis, Haar Cascade

References

[1] Santhosh Shetty, Paritosh Kelkar,K Manikantan, S Ramachandran, “Shift Invariance based Feature Extraction and Weighted BPSO based Feature Selection for Enhanced Face Recognition”, International Conference on Computational Intelligence: Modeling, Techniques and Applications(CIMTA) 2013 Procedia Technology 10(2013)822-830
[2] R. Jafri, H. R. Arabnia, “A Survey of Face Recognition Techniques”, Journal of Information Processing Systems, Vol.5, No.2, June 2009
[3] Zhao , W. chellappa , R. Phillips, P.J Rosenfeld , “Face Recognition: A Literature Survey”, ACM Computing Surverys (CSUR), V.35, Issue 4, pp.399-458 2003
[4] Chan A.B. Liang Z.S.J, Vaconcelos N.,” Privacy preserving crowd monitoring: Counting people without people models or tracking //Computer Vision and Pattern Recognition”, 2008. CVPR 2008. IEEE Conference on—IEEE,2008-C. 1-7
[5] T.Chandrasekhar, Dr.K GIRIBABU, Dr. Ch. Sumanth Kumar, “A Novel Approach of Face Recognition using Statistical Features and Neural Networks”, GITAM University, Visakhapatnam V.V.I.T Nambur, International Jouranl of Engineering and Innovative Technology (IJEIT) Volume 4, Issue11, May 2015