Next Article in Journal
Ambient Technology to Assist Elderly People in Indoor Risks
Previous Article in Journal
Array Multipliers for High Throughput in Xilinx FPGAs with 6-Input LUTs
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

A Survey of 2D Face Recognition Techniques

REGIM: Research Groups on Intelligent Machines, University of Sfax, National School of Engineers (ENIS), Sfax 3038, Tunisia
*
Author to whom correspondence should be addressed.
Computers 2016, 5(4), 21; https://doi.org/10.3390/computers5040021
Submission received: 24 June 2016 / Revised: 18 September 2016 / Accepted: 20 September 2016 / Published: 28 September 2016

Abstract

:
Despite the existence of various biometric techniques, like fingerprints, iris scan, as well as hand geometry, the most efficient and more widely-used one is face recognition. This is because it is inexpensive, non-intrusive and natural. Therefore, researchers have developed dozens of face recognition techniques over the last few years. These techniques can generally be divided into three categories, based on the face data processing methodology. There are methods that use the entire face as input data for the proposed recognition system, methods that do not consider the whole face, but only some features or areas of the face and methods that use global and local face characteristics simultaneously. In this paper, we present an overview of some well-known methods in each of these categories. First, we expose the benefits of, as well as the challenges to the use of face recognition as a biometric tool. Then, we present a detailed survey of the well-known methods by expressing each method’s principle. After that, a comparison between the three categories of face recognition techniques is provided. Furthermore, the databases used in face recognition are mentioned, and some results of the applications of these methods on face recognition databases are presented. Finally, we highlight some new promising research directions that have recently appeared.

1. Introduction

The advent of the computer and its capacity to store and visualize large amounts of information have led to the emergence of biometrics, such as face recognition, voice recognition, retinal scanning, fingerprint, etc.
Biometric technology is getting not only more and more important, but also more and more widely studied by many researchers. Thanks to its incomparable performance, it encompasses both the technologies used to measure and those applied to analyze the unique characteristics of a person. Indeed, there are two types of biometrics: behavioral and physical. The former is generally used for verification, while the latter can be used either for identification or verification.
For instance, “facial recognition” is one of the biometrics used for identification. It has been for a long time a very interesting area that has attracted the interest of several researchers for being non-intrusive, very popular and not expensive. Over the last few decades, many techniques, whose applications include video conferencing systems [1,2,3,4,5], facial reconstruction, security, etc., have been proposed to recognize a face in a 2D image.
As shown in Figure 1, a face recognition system can be divided into three stages, namely face detection, feature extraction and face recognition.
Face recognition system starts with detecting the existence of a face in an image. Generally, a face detection system can decide if an image contains a face or not. If it does, the system’s role is to locate the position of one or more faces in the image.
However, this step becomes difficult if variations in illumination, position, facial expression (smiling, surprise, etc.), orientation and morphological criteria (mustaches, glasses, etc.) occur. All of these obstacles can prevent the proper face detection and consequently decrease the rate of face detection.
After detecting a face in an image, we proceed to extract the features of the face [6,7,8]. This step is important for the recognition of facial expressions and also for their animation. This step is to extract a feature vector called the signature from the detected face. The latter is then sufficient to represent a face. It must verify the uniqueness of the face, as well as the property of discriminating between two different individuals. It should be noted that this phase can be made with the face detection step.
Finally, the face recognition involves authentication and identification. Authentication involves comparing a face with another in order to approve the requested identity. Identification, however, compares a face with several other faces given to find the identity of the face among several possibilities.
In this paper, we present the state of the art of existing works in this area by focusing on approaches that revolutionized the world of face recognition, as well as recent approaches.
Although there are many recognition tools, the most commonly-used one is fingerprints.
Nevertheless, several studies proved that the most reliable characteristic is iris texture, because it is stable throughout life. The two previously-mentioned methods (fingerprints and iris texture) have the major drawback of being intrusive. They also present constraints for users; that is why their application areas are considerably limited.
Conversely, the facial image recognition systems exhibit no constraint for users. Indeed, face recognition has several advantages, among which we can mention:
  • Short time: This is one of the fastest biometric modalities. One can talk about real-time application because you have to go through the biometric system only once.
  • High security: Let us take the example of a company that is checking the identities of people at the entry; such a biometric system allows not only employees to check presence at the time, but also any visitor can be added to the biometric system. Therefore, this system does not provide access to individuals not included in the system.
  • Automatic system: This system works automatically without being controlled by a person.
  • Easy adaptation: It can be easily used in a company. It only requires the installation of the capturing system (camera).
  • High success rate: This system has achieved high recognition rates, especially with the emergence of three-dimensional technology, which makes it very difficult to cheat. Subsequently, this gives confidence to the system users.
  • Acceptance in public places: It allows getting gigantic databases and, thus, improving the recognition performance.
Among the six biometric attributes (face, voice, eye, hand, signing, fingers) considered by [9], facial features mark a compatibility score in the MRTD system (“Machine-Readable Travel Documents”) based on several evaluation factors, like enrollment, renewal data, required materials and user perception [10]. This score is shown in Figure 2.
Like other biometrics, face recognition has its specificity and its application fields. It has become a viable technology in our modern life.
There are various areas of face recognition application that can be used in the public sector (driving license, military application, sporting event, airport, etc.) and in the private one (online service, commerce, banking, embedded application, mobile device security, etc.).
In 2012, 20% of smart phones shipped with a face recognition function.
Despite all of its previously-mentioned advantages, this biometric modality presents a few limitations caused by the non-rigid structure of the human face images of the human being. These challenges include:
  • Lighting variations: Variations due to lighting sometimes result in a greater image difference than identity change. Therefore, algorithms should consider the lighting variations.
  • Facial expression changes: The facial expressions, such as smile, anger, closing eyes and mouth, modify the face geometry and texture and, therefore, the accuracy of facial recognition. Indeed, local recognition methods, using a histogram of characteristics, have been used successfully to overcome problems related to changes in facial expression problems.
  • Age change: The texture and shape of the human being face vary with age. Indeed, the shape of the skull and the skin texture change from childhood to adolescence, which represents a problem in face recognition, because the images used in passports and identity cards are not frequently updated.
  • Change of scale/resolution: The change of scale is one of the challenges in facial recognition systems. Let us take an example of the monitoring system. This should work well on multiple scales because the subjects are at different distances from the camera. For instance, an object, located 2 m away from the camera has a 10× scale change to another located 20 m away. Indeed, face recognition algorithms usually use interpolation methods to resize images according to the standard scale.
  • Pose change: Pose variation mainly refers to the rotation out of the plane. It is a challenge in face recognition systems because of the nature of a 2D or 3D face image. The differences in images caused by the change of poses are sometimes larger than the inter-person image differences. In applications, such as passport control, the images are required to adhere to an existing database. However, in uncontrolled environments, like non-intrusive monitoring, a subject can be found up, down, left or right, causing a rotation out of plane. Indeed, local approaches, such as Elastic bunch graph matching (EBGM) and local Binary Pattern (LBP) , are more robust against variations of poses than holistic approaches. However, their tolerance to pose changes is limited to small rotations.
  • Presence of occlusions: The use of accessories (sunglasses, scarves, hats, etc.) that partially obstruct the face area and the movement of the individual itself, such as the movement of the hand, can create an occlusion during which part of the information is lost or replaced. It is worth noting that methods based on the local regions have been successfully used in the case of partial occlusion.
  • Image falsification: Some facial recognition systems can be easily fooled by face images. For example, mobile device unlocking, based on facial recognition, can easily be faked with a picture of a person’s facial image, which can be available on the Internet, as well as on social networks.
  • Noise: This noise occurs because of the camera sensor during image capturing. The nature of these cameras in the world and the quality of the sensors make this noise inevitable, badly affecting face recognition.
  • Blur effect: Movement and atmospheric blur are the main sources of blur in face images. This blurring can be caused either by peoples’ movement (such as surveillance) or by the relative motion between the camera and the captured subject, as is the case in the maritime environment.

2. 2D Face Recognition Survey

Facial recognition has since long ago been a very interesting area that attracted the attention of many researchers. Indeed, several techniques have been proposed to recognize a face in a 2D image. To understand the principle of each technique, we will classify these approaches into three categories according to the manner of treating the face image.
The first category includes the global (holistic) approaches, which use the entire face as the input data for the proposed recognition system. These data will then be projected onto a subspace of small dimension.
The second category involves local recognition approaches. They do not consider the whole face, but only some features or areas of the face that are classified according to well-defined statistics.
Hybrid approaches and methods based on statistical models represent the third category. This class includes hybrid approaches that use simultaneously global and local characteristics in order to exploit the advantages of the two above-mentioned categories to improve the 2D face recognition rate. It also includes approaches based on statistical models that formalize the relationships between variables in the form of mathematical equations that describe how one or more random variables are related to one or more random variables. The model is considered statistical when the variables are not deterministic, but stochastically related.

2.1. Global Approaches

In these approaches, also called appearance-based methods, face images are globally treated, i.e., there is no need to extract characteristic points or facial regions (mouth, eyes, etc.). Thus, a face image is represented by a matrix of pixels, and this matrix is often transformed into pixel vectors to facilitate their manipulation. Although these approaches are easy to implement, they are sensitive to variations (poses, lighting, facial expressions and orientation). Indeed, any change in the face image results in a change of pixel values. As mentioned previously, in global methods, face input data are projected later in low dimensional space. Indeed, a form of class “face” is located in a sub-space image, which often has other forms (trees, houses, etc.).
Let us consider a 2D face image sized 60 × 60 pixels. A few pixels may correspond to the face, while the remaining ones may have other shapes (background, car, etc.). Therefore, the original image can be greatly reduced by considering only the face part. Based on the technique used to model the sub-projection areas of the face input data, this category may itself be divided into linear and non-linear approaches.

2.1.1. Linear Techniques

These approaches use a linear projection of the image data input from a large space into an area of a relatively smaller size space (the face sub-space). However, such projection has two major drawbacks. First, the non-convex face variations, which allow us to distinguish different individuals, cannot be preserved. Thus, to compare the vectors of the pixels of a linear subspace, the used Euclidean distances are not very effective in classifying the face/non-face forms and individuals. Therefore, the detection and recognition rate of these methods are generally unsatisfactory. Several techniques can be classified as linear techniques:
  • Eigenface [11]: This is a very popular approach used for face recognition. It is based on the PCA technique (principal component analysis) allowing the transformation of any training image into an “eigenface”. Its principle is the following: given a set of sample faces images, it essentially aims at finding the main components of these faces. This amounts to determining the eigenvectors of the covariance matrix formed by the set of the sample images. Each example will then be described by a linear combination of these eigenvectors. Figure 3 shows the eigenfaces constructed from the ORL database.
To construct the covariance matrix, each face image is transformed into a vector. Each element of the vector corresponds to the pixel intensity. This transformation of the pixel matrix destroys the geometric structure of the image.
  • 2D PCA (two-dimensional PCA) [13]: To avoid losing information about the neighborhood during the transformation of the image into a vector, a two-dimensional PCA method (2D PCA) was proposed. This method takes as input images rather than vectors. Figure 4 shows five reconstructed images from an image of the ORL database by adding the first number of eigenvectors d (d = 2, 4, 6, 8, 10) of sub-images together at the same time.
The reconstructed images appear more clearly when the number of sub-images increases. PCA (eigenfaces) was also used to represent and reconstruct the same face image. It is not so efficient in reconstructing the image.
  • Independent Component Analysis (ICA) [14]: This is a method conceived primarily for signal processing. It consists of expressing a set of N random variables x 1 , . . . , x n as a linear combination of N statistically-independent random variables s j , such as:
    x j = a j , 1 s 1 + a j , 2 s 2 + . . . . + a j , n s n
    or in a matrix form, such as:
    x = A s
  • Multidimensional scaling (MDS) [15]: This is another well-known technique of linear dimension reduction. Instead of keeping the variance of data during projection, it strives to preserve all distances between each pair of examples d i s t ( x i , x j ) seeking a linear transformation that minimizes energy. This minimization problem can be solved by eigenvalue decomposition. Using the Euclidean distance between data, the outputs of the MDS are the same as those of PCA. They are obtained by a rotation followed by a projection.
  • Non-negative matrix factorization (NMF) [16]: The non-negative matrix factorization is another method that represents the face without using the notion of class. The algorithm of NMF, such as PCA, treats the face as a linear combination of vectors of the reduced space base. The difference is that NMF does not allow negative elements in the vectors of the base in the combination weight. In other words, certain vectors in space reduced by PCA (eigenfaces) resemble the distorted versions of the entire face, while those reduced by NMF are located objects that better reflect parts of the face.
  • Linear discriminant analysis (LDA) [17]: There are other techniques that are also constructed from linear decomposition, such as linear discriminant analysis (LDA). While PCA builds a subspace to represent, in an optimal way, “only” the object “face”, LDA constructs a discriminant subspace to distinguish, in an optimal way, the faces of different people. LDA, also called “Fisher linear discriminant” analysis, is one of the most widely-used approaches for face recognition. It uses the reduction criterion based on the concept of the separability of data per class. LDA includes two stages: the original space reduction by the PCA and the vectors of the final projection space, called “Fisher faces”. The latter are calculated on the basis of the classes’ separability criterion, but in the reduced space. This need for the input space reduction is caused by the total scattering matrix singularity criterion of the LDA approach. Comparative studies show that methods based on the LDA usually give better results than those based on PCA.
  • Improvements of PCA, LDA and ICA techniques: Many efforts have been made to improve the linear techniques of subspace analysis for face recognition. For example, the work done in [18] improved PCA to deal with pose variation. The probabilistic subspace was introduced to provide a more significant measure similarity in the probabilistic framework. Besides, the author [19] presented a combination between the D-LDA (direct LDA) and the F-LDA (fractional LDA), a variant of the LDA in which the weighted functions are used to avoid misclassification caused by too close categories’ products. Thus, the author [20] proposed an approach based on the multi-linear tensor decomposition of image sets to resolve the confusion of several factors related to the same face recognition system, such as lighting and pose.
  • Independent high intensity Gabor wavelet [21]: To improve face recognition, high intensity feature vectors are extracted from the Gabor wavelet transform of frontal facial images combined together with the ICA [14]. The characteristics of the Gabor wavelet have been recognized as one of the best face recognition representations.
  • Gabor features, LDA and ANN classifier [22]: In this work, a methodology was adopted to improve the robustness of the facial recognition system using two popular methods of statistical modeling to represent a face image: PCA and LDA. These techniques allow extracting the discriminative features of a face. A human face image pre-processing was done using Gabor wavelets that eliminate variations due to pose and lighting. PCA and LDA extract discrimination and low dimension feature vectors. The latter was used in the classification phase during which the back-propagation neural network (BPNN) was applied as a classifier. This proposed system was successfully tested on the ORL face database with 400 frontal images of 40 different subjects of variable lighting and facial expressions. Furthermore, a very large number of linear techniques was used to calculate the feature vectors. Among these techniques, we can mention:
    -
    Regularized discriminant analysis (RDA) [23].
    -
    Regression LDA (RLDA) [24].
    -
    Null-space LDA (NLDA) [25].
    -
    Dual-space LDA [26].
    -
    Generalized singular value decomposition [27].
    -
    Boosting LDA [28].
    -
    Discriminant local feature analysis [29].
    -
    Block LDA [30].
    -
    Enhanced fisher linear discriminant (FLD) [31].
    -
    Incremental LDA [32].
    -
    Discriminative common vectors (DCV) [33].
    -
    Bilinear discriminant analysis (BDA) [32].
Although these global linear methods, based on global appearance, avoid the instability of the first geometric methods that were developed, they are not specific enough to describe the subtleties of geometric varieties present in the space of the original image. This is due to their limitations to manage the non-linearity in facial recognition. In other words, their nonlinear varieties’ deformations can be smoothed, and concavities may be fulfilled, causing adverse consequences.

2.1.2. Non-Linear Techniques

When the input data structures are linear, linear approaches offer a faithful representation of sparse data. However, when the data are non-linear, the solution, adopted by several researchers, is to use a function, named the “kernel” function, to build a large space in which the problem becomes linear.
Thus, linear techniques for dimensionality reduction can be applied when the intrinsic structure of the data is not linear. These methods typically use the “kernel trick”, which proposes that any algorithm, formulated with a kernel function, can be reformulated with another kernel function.
A common process consists of expressing the method with a scalar product using a kernel function. The kernel “trick” allows working in the transformed space without having to explicitly calculate the image of each datum. In this context, several non-linear approaches were proposed:
  • Kernel principal component analysis, KPCA [34]: This is a non-linear reformulation of the classic linear technology PCA using kernel functions. KPCA calculates the main eigenvectors of the matrix of kernels rather than the covariance matrix. This reformulation of classical PCA can be seen as a realization of PCA on the large space transformed by the associated kernel function. KPCA allows, then, the construction of nonlinear mappings. First, it calculates the matrix of kernel K of points, x i , whose entries are defined by [35].
    As the KPCA technique is based on “kernels”, its performance greatly depends on the choice of the kernel function K. The typically-used kernels are linear, then they amount to performing classical PCA, the polynomial kernel or the Gaussian kernel [35]. KPCA was successfully applied in several problems, such as speech recognition [36] or the detection of new elements of a set [34], but the major weakness of KPCA is that the size of the kernel matrix is the square of the number of samples of the training set, which can quickly be prohibitive.
  • Support vector machine (SVM) [37]: This is a learning technique effectively used for “pattern” recognition with its high generalization performance without the need to add more knowledge. Intuitively, given a set of points belonging to two classes, SVM finds the hyperplane that separates the largest possible fraction of points of the same class at the same side, while maximizing the distance between two classes to a hyperplane called the optimal separating hyperplane (OSH). It reduces the risk of misclassification not only for examples of the learning set, but also for the invisible example of the test set. SVM can also be considered as a way to train polynomial neural networks or “radial basis” function classifiers. Learning techniques used here are based on the principle of structure risk minimization (SRM), which states that the best generalization capabilities are achieved by minimizing the boundary of the generalization error. The application of SVM in computer vision problem was, afterward, proposed.
    Years later, the work presented in [38] used the SVM with a binary tree recognition strategy to solve the problems of face recognition. He began by extracting the features and then the functions of discrimination between each pair learned by SVM. After that, the disjoint test sets passed to the recognition system. To construct a binary tree structure, [39] proposed to recognize the test samples.
    Other nonlinear techniques have also been used in the context of facial recognition:
    -
    KICA (kernel independent component analysis) [40].
    -
    Maximum variance unfolding (MVU) [41].
    -
    Isomap [42].
    -
    Diffusions maps dans [43].
    -
    Local linear embedding (LLE) dans [44].
    -
    Locality preserving projection (LPP) [45].
    -
    Embedded manifold [46].
    -
    Nearest manifold approach [47].
    -
    Discriminant manifold learning [48].
    -
    Laplacian eigenmaps [49,50].
    -
    Hessian LLE [51].
    -
    Local tangent space analysis (LTSA) [52].
    -
    Neuronal approaches [50], Kohonen cards [53] and convolutional neural network [54].
    -
    Exponential discriminant analysis (EDA) [55].
These methods of projecting the space of images on the feature space are nonlinear, allowing, to a certain extent, a better reduction of the image size. However, although these techniques often improve recognition rates on some given tests, they are too flexible to be robust to new data, unlike the linear methods.

2.2. Local Approaches

Local approaches treat only some facial features that are later classified according to well-defined statistics.
Local methods, also called feature-based methods, can be classified into two categories:
  • Interest-point based on face recognition methods: we first detect the points of interest. Then, we extract features localized on these points.
  • Local appearance-based face recognition methods: the face is divided into small regions (or patches) from which local characteristics are directly extracted.

2.2.1. Interest-Point-Based Face Recognition Methods

In these methods, we begin by extracting specific geometric features, such as the width of the head, the distance between the eyes, etc. Then, these data will be an entry for “classifiers” to recognize individuals.
These methods can be divided into two classes according to the point of interest. The first category focuses on the performance of the detectors of the face characteristic points; whereas the second class deals with more elaborated representations of information carried by the characteristic points of the face, rather than just the geometric characteristics.
  • Dynamic link architecture (DLA) [56]: This approach is based on the use of a deformable topological graph instead of a fixed topological graph as in [57] in order to propose a facial representation model called DLA. This approach allows varying the graph in scale and position based on the appearance change of the considered face.
    Indeed, the graph is a rectangular grid localized on the image where the nodes are labeled with the responses of Gabor filters in several directions and several spatial frequencies, called “jets”.
    However, the edges are labeled by distances, where each edge connects two nodes on the graph. The comparison between two face graphs is performed by deforming and mapping the representative graph of the test image with each of the representative graphs of the reference images.
  • Elastic bunch graph matching (EBGM) [58]: This is an extension of DLA in which the nodes of the graphs are located on a number of selected points of the face. For instance, EBGM was one of the most efficient algorithms in the FERET competition in 1996. Similarly, Wiskott et al. [58] used Gabor wavelets to extract the characteristics of the points detected because Gabor filters are robust to illumination changes, distortions and scale variations.
  • Geometric feature vector [59]: This technique uses a training set to detect the position of the eye in an image. It first calculates, for each point, the correlation coefficients between the test image and the images of the training set and then it searches the maximum values.
  • Face statistical model [60]: This approach used many detectors of specific features for each part of the face, such as eyes, nose, mouth, etc. The work presented in [61] proposed to build statistical models of facial shapes. Despite all of these research works, there are no sufficiently reliable and accurate feature points.
  • Feature extraction by Gabor filter [62]: This consists of detecting and representing facial features from Gabor wavelets. For each detected point, two types of information are stored: its position and its characteristics (the features are extracted using Gabor filter on this point). To model the relationship between the characteristic points, a topological graph is built for each face.
Years later, the success of these methods was an incentive for some recent works.
  • Gabor information on deformable graphs [63].
  • Robust visual similarity retrieval in single model face databases [64].
To conclude, many methods, based on extracting feature points, have been proposed. They can be effectively used for face recognition where only one reference picture is available. However, their performance depends on many effective algorithms for locating facial feature points. In practice, the precise characteristic point detection task is not easy and has not been completely resolved, especially in cases where the shape or appearance of a facial image can vary widely [65].

2.2.2. Local Appearance-Based Face Recognition Methods

Once local regions are defined, we continue to choose the best way to represent information about each region. This step is critical to the performance of the recognition system. The commonly-used characteristics are: Gabor coefficients [66], Haar wavelets [67], Fourier transforms, scale-invariant feature transform (SIFT) [68], the characteristics based on the local binary pattern method (LBP) [69], local phase quantization (LPQ) [70], Weber law descriptor (WLD) [71] and binarized statistical image features (BSIF) [72].
  • LBP and its recent variant [73]: The original LBP method labels the image pixels with decimal numbers. LBP encodes the local structure around each pixel compared with its eight neighbors in a (3 × 3) neighborhood by subtracting the value of the central pixel. Therefore, strictly-resultant negative values are encoded with zero and the other with one.
    For each given pixel, a binary number is obtained by concatenating all of the binary values in a clockwise direction, which starts from one of its top left neighborhoods. The corresponding decimal value of the generated binary number is then used to mark the given pixel derivative binary numbers called LBP codes [74].
The methodology of LBP has recently been developed with a great number of variations in order to improve various applications’ performance. These variations focus on different aspects of the original LBP operator:
-
Improvement of its discriminatory capacity [75].
-
Improvement of its robustness [76].
-
The selection of the neighborhoods [77].
Compared to global approaches, local methods have certain advantages. First, they can provide additional information based on the local regions. In addition, for each type of local characteristic, we can choose the most appropriate classifier.
Despite these advantages, the integration of more general structure information is required in local approaches.
In general, there are two ways to achieve this goal. The first way is to integrate global information on the algorithms using data structures, such as a graph where each node represents a local feature, while an edge between two nodes represents the spatial relationship between them.
Face recognition is therefore a problem of matching two graphs. However, the second way is to use the score fusion techniques: separated classifiers are used on each local characteristic to calculate similarity. Then, the similarities obtained are combined to provide a global score for the final decision.

2.3. Hybrid Approaches and Methods Based on Statistical Models

This third category includes hybrid approaches that use simultaneously global and local characteristics in order to exploit the advantages of both local and global methods. It also includes the techniques based on statistical models. The latter formalizes the relations between the variables in the form of mathematical equations that describe how one or more random variables are related to one or more random variables. This model is considered statistical when the variables are not deterministic, but stochastically related.
  • Hidden Markov model (HMM) [78]: The hidden Markov models began to be used in 1975 in different fields, especially in voice recognition. They were fully operated from the 1980s in speech recognition. Then, they were applied in manuscript text recognition, image processing, music and bioinformatics (DNA sequencing, etc.), as well as in cardiology (segmentation of the ECG signal).
    The hidden Markov models, also called Markov sources or “probabilistic functions of Markov”, are powerful stochastic signals modeling statistic tools. These models have been proven to be efficient since their invention by Baum and his colleagues. They were mainly used in speech processing. They can be defined by a statistical model of the Markov chain. This latter is a statistical model composed of “states” and “transitions”.
    For face images, significant facial regions (hair, forehead, eyebrows, eyes, nose, mouth and chin) are placed in a natural order from top to bottom even if the image is taken under small rotations.
    For each of these regions, a state from left to right is affected. The structure of the face model of the state and the non-zero transition probabilities are shown in Figure 5:
  • Gabor wavelet transform based on the pseudo hidden Markov model (GWT-PHMM) [21]: This is an approach that combines the multi-resolution capability of Gabor wavelet transform (GWT) with local interactions of facial structures expressed through the pseudo-hidden Markov model (HMM). Unlike the traditional “zigzag scanning” method for feature extraction, a continuous analysis method should be carried out from top left to right then from top to bottom and right to left, and so on, until the bottom right of the image, spiral scanning, which is proposed for a better selection of features. Furthermore, unlike traditional HMM, PHMM does not carry the state of conditional independence of the states of the visible observation sequence hypothesis. This result is achieved thanks to the concept of local structures introduced by the PHMM used to extract face bands and automatically select the most informative features of a facial image. Again, the use of the most informative pixels rather than the whole picture makes this proposed face recognition method reasonably quick.
  • Recognition system using PCA and discrete cosine transform (DCT) in HMM [79]: Without using DCT, PCA is directly used to reduce the dimension. First, the details of the face are taken in blocks, and the DCT is applied on these blocks. Then, without using the inverse DCT transform, the PCA method is applied directly to the reduced dimensions and, thus, makes this system faster.
  • HMM-LBP [80]: This is a hybrid approach called HMM-LBP permitting the classification of a 2D face image by using the LBP tool (local binary pattern) for feature extraction. It consists of four steps. First, [80] decomposes the face image into blocs. Then, this approach extracts image features using LBP. After that, it calculates probabilities. Finally, it selects the maximum probability.
  • Hybrid approach based on 2D wavelet decomposition SVD singular values [81]: This approach presents an effective face recognition system using the eigenvalues of the wavelet transform as feature vectors and the radial basis function neural network (RBF) as a classifier. Using the 2D wavelet transform, face images are decomposed into two levels. Then, the wavelet coefficients’ average is calculated to find the characteristic centers.
  • Multi-task learning-based discriminative Gaussian process latent variable model DGPLVM [82]: This is a different approach that relies on a single data source learning to gain more data from multiple sources/domains to improve performance in the target area. In this work, we use asymmetric multi-task learning as it focuses only on improving the performance of the target task. This constraint aims at maximizing the mutual information between the target data distributions of the domain and data from multiple sources/domains. In addition, the Gaussian face model is a reformulation based on the Gaussian process (GP), a method of the nonparametric Bayesian core. Therefore, this model can also adapt its complexity to complex data distributions in the real world without heuristics or parameters’ manual settings.
  • Discriminant analysis on Riemannian manifold of Gaussian distributions (DARG) [83]: Its objective consists of capturing the distribution of the underlying data in each set of images in order to facilitate the classification and make it more robust. To this end, [83] represents the set of images as a mixture of m Gaussian models (GMM) comprising a prior number of Gaussian components with probabilities. He sought to discriminate the various Gaussian components of different classes. Given the geometric information, Gaussian components lie on a specific Riemannian manifold. To correctly encode such a Riemannian manifold, DARG uses several distances between Gaussian components and draws a series of provably-defined positive probabilistic cores. With the latter, a weighted discriminate analysis of cores is finally developed to treat Gaussian GMM as samples and their prior probabilities as sample weights.
  • Affine local descriptors and probabilistic similarity [84]: This technique combines the affine transform of invariant features SIFT with probabilistic similarity under a great change of perspective. The affine SIFT, an extension of SIFT that detects local invariant descriptors, generates a series of different views using the affine transformation. In this context, it allows a difference of views between the face image of the “gallery”, the “probe” and the face of the probe. However, the human face is not flat because it contains important 3D depth. Obviously, this approach is not effective for large changes in pose. In addition, it combines with probabilistic similarity that obtains the similarity between the face of “probe” and “gallery” based on the sum of squared differences (SSD) distribution in an online learning process.
  • PCA and Gabor wavelets [85]: This is a new approach that uses a face recognition algorithm with two steps of recognition based on both global and local features. For the first step of the coarse recognition, the proposed algorithm applies the principal components analysis (PCA) to identify a test image. The recognition step ends at this stage if the result of the confidence level proves to be reliable. Otherwise, the algorithm uses this result to filter images of the top candidates with a high degree of similarity and transmits them to the next recognition step where Gabor filters are used. Since the recognition of a face image with Gabor filter is a heavy calculation task, the contribution of this work is to propose a more flexible and faster hybrid algorithm of face recognition carried out through two stages.
  • Manual segmentation-Gabor filter-neural network [86]: This is another feature extraction technique that has given a high recognition rate. In this approach, facial topographical features are extracted using a manual segmentation of the facial regions of the eyes, nose and mouth. Thereafter, the Gabor transform of these regions’ maximum is extracted to calculate the local representation of these regions. In the learning phase, this approach uses the method of nearest neighbor to compute the distances between the three feature vectors of these regions and the corresponding stored vectors.
  • HMM-SVM-SVD [87]: This is a combination of two classifiers: SVM and HMM. The former is used with the features of PCA, while the latter is a one-dimensional model in seven states wherein features are based on the singular value decomposition (SVD). This approach uses these combination rules for merging the outputs of SVM and HMM. It was successful with a 100% recognition rate for the ORL database.
  • Merging of local and global features based on Gabor-contourlet and PCA [88]: This is a combination of two types of features using local features, extracted by Gabor transform, and global ones, extracted via “contourlet transform”. The recognition step is finally made by the PCA classifier.
  • SIFT-2D-PCA [89]: This global approach combines the SIFT, a local feature extraction method, and 2D-PCA, which represents an improvement of PCA. Since SIFT is used to extract distinctive features that are invariant to scale changes, orientation and lighting; it will be beneficial for recognition even if the global features are not available. 2D-PCA is used for the extraction of the global features, as well as for the size reduction.
  • Multilayer perceptron-PCA-LBP [90]: This approach applies a very recent recognition method used to show the different changes (lighting, head position, facial expressions). That is why it makes the global and local feature extractions respectively using PCA and LBP. Thus, these global and local features are introduced to the network called MLP (multilayer perceptron). Finally, the classification is made by the BPMLP network (backpropagation multilayer perceptron).
  • Local directional pattern [91]: This is a method using the model of local direction. In this approach, the LDP feature to each pixel position is obtained by calculating the response values for the image in the eight different directions. Then, this image LDP is used as an input of the 2D-PCA for feature extraction and representation. However, the nearest neighbor classifier is used for face recognition. Although this method has a good recognition accuracy under various lighting environments, it works only with frontal images.
  • Wavelet transform and directional LBP [92]: This begins with the pre-treatment using the wavelet transform in order to get series of different resolutions of sub-images and the wavelet decomposition to get different scale components. Thereafter, a Directional Wavelet LBP (DW-LBP) histogram for the different weighted face image sub-regions is calculated. Chi square is used for matching sequences of the histogram. This method reduces the computational complexity and improves the recognition rate, but it cannot be applied on different poses.
Figure 6 summarizes the classification of face recognition approaches presented in this paper.

3. Comparison between Global, Local and Hybrid Approaches

In this section, we present a brief summary of the advantages and disadvantages of each category of face recognition approaches. Besides, for each facial recognition approach, we focus on some advantages and disadvantages that characterize each sub-class. This comparison is summarized in Table 1.

4. 2D Face Databases

Many face databases (public or private) are available for research purposes. These databases differ from each other according to several criteria. The most interesting ones are the following:
  • The number of images contained in each database is the most important criterion.
  • The number of images per individual class: knowing that each individual is designated by a class c, the number of images of a class represents the number of the individual’s representative images. Indeed, images are acquired under different conditions (orientation, facial expression, etc.).
  • The size of images.
  • Pose and orientations of faces.
  • The change of illumination.
  • Sex of the acquired persons.
  • The presence of artifacts (glasses, beards, etc.).
  • The presence of static images or videos.
  • The presence of a uniform background.
  • The period between shots.
It is thus recommended to choose the appropriate database during the testing of an algorithm. Indeed, some have a well-defined protocol allowing direct comparison of the results. Moreover, the choice should depend on the problem to be tested: illumination, recognition over time, facial expressions, etc. The availability of many different images per person can be a decisive argument for the proper performance of an algorithm.
Table 2 below shows the main 2D faces databases. These databases present many variations in terms of: RGB image or gray, size, number of people, number of images by person, variations of the image (illumination (i) pose (p), expression (e) occlusions (o) time delay (t)) and home page on the web.

5. Results

The emergence of face recognition in analyzing 2D face images and the enormous interest given to this research domain have led to a continuous improvement of the results obtained by testing the previously-mentioned approaches on the different 2D face databases presented in the previous section. Table 3 below shows some results presented by the inventories of these approaches. For more organization, these results are grouped according to the used database.

6. The Emergence of New Promising Research Directions

As shown in Table 3, 2D face recognition has reached a significant level of maturity and a high success rate. After over three decades of research, the face recognition state of the art continues to improve and to give more accurate results thanks to its need in different research fields, such as pattern recognition and image processing. It is unsurprising that it continues to be one of the most active research areas of computer vision. Over the last few years, new promising research directions have appeared.
  • 3D face recognition: Despite the high success rate achieved in 2D face recognition, this latter still has two major unsolved problems, which are illumination and pose variations. To overcome these two issues, 3D face recognition has emerged in order to provide more exact shape information of facial surfaces. For this reason, several recent techniques using 3D data have been proposed [143,144,145,146,147,148]. 3D face recognition has been proposed to have the potential to achieve better accuracy than the 2D field by measuring rigid feature geometry on the face.
  • Multimodal face recognition: On the other hand, some recent research works state that the fusion of multimodal 2D and 3D face recognition is more accurate and robust than the single modality [149] and that it improves the performance when compared to single modal face recognition. They investigate the potential benefit of fusing 2D and 3D features [150,151].
  • Deep learning techniques: Deep learning techniques [152] have established themselves as a dominant technique in machine learning. Deep neural networks (DNNs) have been top performers on a wide variety of tasks, including image classification, speech recognition and face recognition. In particular, convolutional neural networks (CNN) have recently achieved promising results in face recognition. These deep learning techniques often use the public database LFW (Labeled Faces in the Wild) to train CNNs.
  • Infrared imagery: Amongst the various approaches that have been proposed to overcome face recognition limitations, such as pose, facial expression, illumination changes, as well as facial disguises, which can significantly decrease recognition accuracy, infrared (IR) imaging has emerged as a novel promising research direction [153,154]. IR imagery is a modality that has attracted particular attention due to its invariance to illumination changes [155]. Indeed, data acquired using IR cameras have many advantages as compared with common cameras, which operate in the visible spectrum. For instance, Infrared images of faces can be obtained under any lighting condition, even in a completely dark environment, and there is some proof that the infrared technique may achieve a higher degree of robustness to facial expression changes [156].
Finally, researchers have gone further by combining these new areas as [157], which has benefited from multimodal face recognition and infrared, and [158], who has used both multimodal face recognition and deep learning.

7. Conclusions

In this paper, we first introduced face recognition as a biometric technique. Subsequently, we presented the state of the art of biometric approaches classified into three categories. Next, we presented face databases used by researchers in this field to test their approaches and a table summarizing the experimental findings. Finally, we highlighted some new promising research directions.

Acknowledgments

The authors would like to acknowledge the support of Research Groups on Intelligent Machines (ReGim-Lab).

Author Contributions

Mejda Chihaoui developed this project as part of his research. Akram ElKefi, Wajdi Bellil and Chokri Ben Amar supervised the research and participated in the revision processes. All authors have read and approve the final manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Aoun, N.B.; Mejdoub, M.; Amar, C.B. Graph-based approach for human action recognition using spatio-temporal features. J. Vis. Commun. Image Represent. 2014, 25, 329–338. [Google Scholar] [CrossRef]
  2. El’Arbi, M.; Amar, C.B.; Nicolas, H. Video watermarking based on neural networks. In Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, Toronto, ON, Canada, 9–12 July 2006; pp. 1577–1580.
  3. El’Arbi, M.; Koubaa, M.; Charfeddine, M.; Amar, C.B. A dynamic video watermarking algorithm in fast motion areas in the wavelet domain. Multimed. Tools Appl. 2011, 55, 579–600. [Google Scholar] [CrossRef]
  4. Wali, A.; Aoun, N.B.; Karray, H.; Amar, C.B.; Alimi, A.M. A new system for event detection from video surveillance sequences. In Advanced Concepts for Intelligent Vision Systems, Proceedings of the 12th International Conference, ACIVS 2010, Sydney, Australia, 13–16 December 2010; Blanc-Talon, J., Bone, D., Philips, W., Popescu, D., Scheunders, P., Eds.; Lecture Notes in Computer Science. Springer: Berlin/Heidelberg, Germany, 2010; Volume 6475, pp. 110–120. [Google Scholar]
  5. Koubaa, M.; Elarbi, M.; Amar, C.B.; Nicolas, H. Collusion, MPEG4 compression and frame dropping resistant video watermarking. Multimed. Tools Appl. 2012, 56, 281–301. [Google Scholar] [CrossRef]
  6. Mejdoub, M.; Amar, C.B. Classification improvement of local feature vectors over the KNN algorithm. Multimed. Tools Appl. 2013, 64, 197–218. [Google Scholar] [CrossRef]
  7. Dammak, M.; Mejdoub, M.; Zaied, M.; Amar, C.B. Feature vector approximation based on wavelet network. In Proceedings of the 4th International Conference on Agents and Artificial Intelligence, Vilamoura, Portugal, 6–8 February 2012; pp. 394–399.
  8. Borgi, M.A.; Labate, D.; El’Arbi, M.; Amar, C.B. Shearlet network-based sparse coding augmented by facial texture features for face recognition. In Image Analysis and Processing—ICIAP 2013, Proceedings of the 17th International Conference, Naples, Italy, 9–13 September 2013; Petrosino, A., Ed.; Lecture Notes in Computer Science. Springer: Berlin/Heidelberg, Germany, 2013; Volume 8157, pp. 611–620. [Google Scholar]
  9. Hietmeyer, R. Biometric identification promises fast and secure processing of airline passengers. Int. Civ. Aviat. Organ. J. 2000, 17, 10–11. [Google Scholar]
  10. Morizet, M. Reconnaissance Biométrique Par Fusion Multimodale du Visage et de lÍris. Ph.D. Thesis, ParisTech, Paris, France, 2009. [Google Scholar]
  11. Turk, A.; Pentland, A.P. Face recognition using eigenfaces. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Maui, HI, USA, 3–6 June 1991; pp. 586–591.
  12. Huang, D. Robust Face Recognition based on Three Dimensional Tata. Ph.D. Thesis, Central School of Lyon, Écully, France, 2011. [Google Scholar]
  13. Jian, Y.; Zhang, D.; Frangi, A.; Yang, J.-Y. Two-dimensional PCA : A new approach to appearance-based face representation and recognition. IEEE Trans. Pattern Anal. Mach. Intell. 2004, 26, 131–137. [Google Scholar] [CrossRef]
  14. Ans, B.; Hérault, J.; Jutten, C. Adaptive neural architectures: Detection of primitives. In Proceedings of the COGNITIVA’85, Paris, France, June 1985; pp. 593–597.
  15. Torgerson, W.S. Multidimensional scaling. Psychometrica 1952, 17, 401–419. [Google Scholar] [CrossRef]
  16. Lee, D.D.; Seung, H.S. Learning the parts of objects by non-negative matrix factorization. Nature 1999, 401, 788–791. [Google Scholar] [PubMed]
  17. Belhumeur, P.N.; Hespanha, J.P.; Kriegman, D.J. Eigenfaces vs. Fisherfaces: Recognition using class specific linear projection. IEEE Trans. Pattern Anal. Mach. Intell. 1997, 19, 711–720. [Google Scholar] [CrossRef]
  18. Pentland, A.; Moghaddamand, B.; Starner, T. View-based and modular eigenspaces for face recognition. In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, Seattle, WA, USA, 21–23 June 1994.
  19. Lu, J.; Plataniotis, K.N.; Venetsanopoulos, A.N. Face recognition using LDA-based algorithms. IEEE Trans. Neural Netw. 2003, 14, 195–200. [Google Scholar] [PubMed]
  20. Vasilescu, M.A.O.; Terzopoulos, D. Multilinear analysis of image ensembles: Tensor faces. In Proceedings of the European Conference on Computer Vision, Copenhagen, Denmark, 28–31 May 2002; pp. 447–460.
  21. Kar, A.; Bhattacharjee, D.; Nasipuri, M.; Basu, D.K.; Kundu, M. High performance human face recognition using gabor based pseudo hidden Markov model. Int. J. Appl. Evol. Comput. 2013, 4, 81–102. [Google Scholar] [CrossRef]
  22. Magesh Kumar, C.; Thiyagarajan, R.; Natarajan, S.P.; Arulselvi, S. Gabor features and LDA based face recognition with ANN classifier. In Proceedings of the 2011 International Conference on IEEE Emerging Trends in Electrical and Computer Technology (ICETECT), Nagercoil, India, 23–24 March 2011.
  23. Friedman, J.H. Regularized discriminant analysis. J. Am. Stat. Assoc. 1989, 84, 165–175. [Google Scholar] [CrossRef]
  24. Hastie, T.; Buja, A.; Tibshirani, R. Penalized discriminant analysis. Ann. Stat. 1995, 23, 73–102. [Google Scholar] [CrossRef]
  25. Liu, W.; Wang, Y.; Li, S.Z.; Tan, T. Null space approach of fisher discriminant analysis for face recognition. In Biometric Authentication, Proceedings of the ECCV 2004 International Workshop on Biometric Authentication, Prague, Czech Republic, 15 May 2004; Maltoni, D., Jain, A.K., Eds.; Lecture Notes in Computer Science. Springer: Berlin/Heidelberg, Germany, 2004; Volume 3087, pp. 32–44. [Google Scholar]
  26. Wang, X.; Tang, X. Dual-space linear discriminant analysis for face recognition. In Proceedings of the IEEE International Conference on Computer Vision and Pattern Recognition, Washington, DC, USA, 27 June–2 July 2004; pp. 564–569.
  27. Howland, P.; Park, H. Generalized discriminant analysis using the generalized singular value decomposition. IEEE Trans. Pattern Anal. Mach. Intell. 2004, 26, 995–1006. [Google Scholar] [CrossRef] [PubMed]
  28. Lu, J.W.; Plataniotis, K.N.; Venetsanopoulos, A.N. Boosting linear discriminant analysis for face recognition. In Proceedings of the IEEE International Conference on Image Processing, Barcelona, Spain, 14–18 September 2003; pp. 657–660.
  29. Yang, Q.; Ding, X.Q. Discriminant local feature analysis of facial images. In Proceedings of the IEEE International Conference on Image Processing, Barcelona, Spain, 14–18 September 2003; pp. 863–866.
  30. Nhat, V.D.M.; Lee, S. Block LDA for face recognition. In Computational Intelligence and Bioinspired Systems, Proceedings of the 8th International Work-Conference on Artificial Neural Networks, Barcelona, Spain, 8–10 June 2005; Cabestany, J., Prieto, A., Sandoval, F., Eds.; Lecture Notes in Computer Science. Springer: Berlin/Heidelberg, Germany, 2005; Volume 3512, pp. 899–905. [Google Scholar]
  31. Zhou, D.; Yang, X. Face recognition using enhanced fisher linear discriminant model with Facial combined feature. In PRICAI 2004: Trends in Artificial Intelligence, Proceedings of the 8th Pacific Rim International Conference on Artificial Intelligence, Auckland, New Zealand, 9–13 August 2004; Zhang, C., Guesgen, H.W., Yeap, W.-K., Eds.; Lecture Notes in Computer Science. Springer: Berlin/Heidelberg, Germany, 2004; Volume 3157, pp. 769–777. [Google Scholar]
  32. Cevikalp, H.; Neamtu, M.; Wilkes, M.; Barkana, A. Discriminative common vectors for face recognition. IEEE Trans. Pattern Anal. Mach. Intell. 2005, 27, 4–13. [Google Scholar] [CrossRef] [PubMed]
  33. Visani, M.; Garcia, C.; Jolion, J.M. Normalized radial basis function networks and bilinear discriminant analysis for face recognition. In Proceedings of the IEEE Conference on Advanced Video and Signal Based Surveillance, Como, Italy, 15–16 September 2005; pp. 342–347.
  34. Hoffmann, H. Kernel PCA for novelty detection. Pattern Recognit. 2007, 40, 863–874. [Google Scholar] [CrossRef]
  35. Shawe-Taylor, J.; Cristianini, N. Kernel Methods for Pattern Analysis; Cambridge University Press: New York, NY, USA, 2004. [Google Scholar]
  36. Maurer, T.; Guigonis, D.; Maslov, I.; Pesenti, B.; Tsaregorodtsev, A.; West, D.; Medioni, G. Performance of Geometrix Active IDTM 3D Face Recognition Engine on the FRGC Data. In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, San Diego, CA, USA, 21–23 September 2005; p. 154.
  37. Vapnik, V.N. The Nature of Statistical Learning Theory; Springer: New York, NY, USA, 1995. [Google Scholar]
  38. Guo, G.; Li, S.Z.; Chan, K. Face recognition by support vector machines. In Proceedings of the IEEE International Conference on Automatic Face and Gesture Recognition, Grenoble, France, 28–30 March 2000; pp. 196–201.
  39. Jian, Y.; Zhang, D.; Frangi, A.; Yang, J.Y. Two-dimensional PCA: A new approach to appearance-based face representation and recognition. IEEE Trans. Pattern Anal. Mach. Intell. 2004, 26, 131–137. [Google Scholar] [CrossRef]
  40. Bach, F.; Jordan, M. Kernel independent component analysis. J. Mach. Learn. Res. 2002, 3, 1–48. [Google Scholar]
  41. Weinberger, K.Q.; Saul, L.K. Unsupervised learning of image manifolds by semidefinite programming. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Washington, DC, USA, 27 June–2 July 2004; pp. 988–995.
  42. Yang, M.H. Face recognition using extended isomap. In Proceedings of the International Conference on Image Processing, Rochester, NY, USA, 22–25 Septemner 2002; pp. 117–120.
  43. Hagen, G.; Smith, T.; Banasuk, A.; Coifman, R.R.; Mezic, I. Validation of low-dimensional models using diffusion maps and harmonic averaging. In Proceedings of the IEEE Conference on Decision and Control, New Orleans, LA, USA, 12–14 December 2007.
  44. Socolinsky, D.A.; Selinger, A. Thermal face recognition in an operational scenario. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Washington, DC, USA, 27 June–2 July 2004; pp. 1012–1019.
  45. He, X.; Yan, S.C.; Hu, Y.X.; Zhang, H.J. Learning a locality preserving subspace for visual recognition. In Proceedings of the 9th IEEE International Conference on Computer Vision, Nice, France, 13–16 October 2003; pp. 385–392.
  46. Yan, S.C.; Zhang, H.J.; Hu, Y.X.; Zhang, B.Y.; Cheng, Q.S. Discriminant analysis on embedded manifold. In Proceedings of the European Conference on Computer Vision, Prague, Czech Republic, 11–14 May 2004; pp. 121–132.
  47. Zhang, J.; Li, S.Z.; Wang, J. Nearest manifold approach for face recognition. In Proceedings of the IEEE International Conference on Automatic Face and Gesture Recognition, Seoul, Korea, 17–19 May 2004; pp. 223–228.
  48. Wu, Y.; Chan, K.L.; Wang, L. Face recognition based on discriminative manifold learning. In Proceedings of the IEEE International Conference on Pattern Recognition, Cambridge, UK, 23–26 August 2004; pp. 171–174.
  49. He, X.; Yan, S.; Hu, Y.; Niyogi, P.; Zhang, H. Face recognition using laplacianfaces. IEEE Trans. Pattern Anal. Mach. Intell. 2005, 27, 328–340. [Google Scholar] [PubMed]
  50. Raducanu, B.; Dornaika, F. Dynamic facial expression recognition using laplacian eigenmaps-based manifold learning. In Proceedings of the International Conference on Robotics and Automation, Anchorage, AK, USA, 3–7 May 2010; pp. 156–161.
  51. Kim, H.; Park, H.; Zhang, H. Distance preserving dimension reduction for manifold learning. In Proceedings of the International Conference on Data Mining, Minneapolis, MN, USA, 26–28 April 2007.
  52. Wang, Q.; Li, J. Combining local and global information for nonlinear dimensionality reduction. Neurocomputing 2009, 72, 2235–2241. [Google Scholar] [CrossRef]
  53. Lawrence, S.; Giles, S.L.; Tsoi, A.C.; Back, A.D. Face recognition: A convolutional neural-network approach. IEEE Trans. Neural Netw. 1997, 8, 98–113. [Google Scholar] [CrossRef] [PubMed]
  54. Duffner, S.; Garcia, C. Face recognition using non-linear image reconstruction. In Proceedings of the IEEE Conference on Advanced Video and Signal Based Surveillance, London, UK, 5–7 September 2007; pp. 459–464.
  55. Zhang, T.; Fang, B.; Tang, Y.Y.; Shang, Z.W.; Xu, B. Generalized discriminant analysis: A matrix exponential approach. IEEE Trans. Pattern Anal. Mach. Intell. 2010, 40, 186–197. [Google Scholar]
  56. Lades, M.; Vorbruggen, J.C.; Buhmann, J.; Lange, J.; von der Malsburg, C.; Wurtz, R.P.; Konen, K. Distortion invariant object recognition in the dynamic link architecture. IEEE Trans. Comput. 1993, 42, 300–311. [Google Scholar] [CrossRef]
  57. Manjunath, B.S.; Chellappa, R.; von der Malsburg, C. A feature based approach to face recognition. In Proceedings of the 1992 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR), Champaign, IL, USA, 15–18 June 1992.
  58. Wiskott, L.; Fellous, J.M.; Kuiger, N.; von der Malsburg, C. Face recognition by elastic bunch graph matching. IEEE Trans. PAMI 1997, 19, 775–779. [Google Scholar] [CrossRef]
  59. Brunelli, R.; Poggio, T. Face recognition: Features versus templates. IEEE Trans. PAMI 1993, 15, 1042–1052. [Google Scholar] [CrossRef]
  60. Rowley, H.A.; Baluja, S.; Kanade, T. Neural network-based face detection. IEEE Trans. PAMI 1998, 20, 23–38. [Google Scholar] [CrossRef]
  61. Lanitis, A. Automatic face identication system using exible appearance models. Image Vis. Comput. 1995, 13, 393–401. [Google Scholar] [CrossRef]
  62. Lee, T.S. Image representation using 2-d Gabor wavelets. IEEE Trans. Pattern Anal. Mach. Intell. 1996, 18, 959–971. [Google Scholar]
  63. Duc, B.; Fischer, S.; Bigun, J. Face authentication with gabor information on deformable graphs. IEEE Trans. Image Process. 1999, 8, 504–506. [Google Scholar] [CrossRef] [PubMed]
  64. Gao, Y.; Qi, Y. Robust visual similarity retrieval in single model face databases. Pattern Recognit. 2005, 38, 1009–1020. [Google Scholar] [CrossRef]
  65. Ngoc-Son, V. Contributions à La Reconnaissance de Visages à Partir D’une Seule Image et Dans un Contexte Non-Contrôlé. Ph.D. Thesis, University of Grenoble, Grenoble, France, 2010. [Google Scholar]
  66. Brunelli, R.; Poggio, T. Face recognition: Features versus templates. IEEE Trans. PAMI 1993, 15, 1042–1052. [Google Scholar] [CrossRef]
  67. Viola, P.; Jones, M.J. Robust real-time face detection. Int. J. Comput. Vis. 2004, 57, 137–154. [Google Scholar] [CrossRef]
  68. Lowe, D.G. Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vis. 2004, 60, 91–110. [Google Scholar] [CrossRef]
  69. Ahonen, T.; Hadid, A.; Pietikainen, M. Face recognition with local binary patterns. In Computer Vision—ECCV 2004; Springer: Berlin/Heidelberg, Germany, 2004; pp. 469–481. [Google Scholar]
  70. Ojansivu, V.; Heikkila, J. Blur insensitive texture classification using local phase quantization. In Proceedings of the International Conference on Image and Signal Processing, Cherbourg-Octeville, France, 1–3 July 2008; pp. 236–243.
  71. Chen, J.; Shan, S.; He, C.; Zhao, G.; Pietikainen, M.; Chen, X.; Gao, W. WLD: A robust local image descriptor. IEEE Trans. Pattern Anal. Mach. Intell. 2010, 32, 1705–1720. [Google Scholar] [CrossRef] [PubMed]
  72. Kannala, J.; Rahtu, E. BSIF: Binarized statistical im age features. In Proceedings of the 21st International Conference on Pattern Recognition ICPR, Tsukuba Science City, Japan, 11–15 November 2012; pp. 1363–1366.
  73. Huang, D.; Shan, C.; Ardabilian, M.; Wang, Y.; Chen, L. Local binary patterns and its application to facial image analysis: A survey. IEEE Trans. Syst. 2011, 41, 765–781. [Google Scholar] [CrossRef]
  74. Ojala, T.; Pietikinen, M.; Maenpaa, T. Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Trans. Pattern Anal. Mach. Intell. 2002, 24, 971–987. [Google Scholar] [CrossRef]
  75. Jin, H.; Liu, Q.; Lu, H.; Tong, X. Face detection using improved LBP under Bayesian framework. In Proceedings of the Third International Conference on Image Graphics, Hong Kong, China, 18–20 December 2004; pp. 306–309.
  76. Tan, X.; Triggs, B. Enhanced local texture feature sets for face recognition under difficult lighting conditions. Anal. Model. Faces Gestures 2007, 4778, 168–182. [Google Scholar]
  77. Wolf, L.; Hassner, T.; Taigman, Y. Descriptor based methods in the wild. In Proceedings of the ECCV Workshop Faces ’Real-Life’ Images: Detection, Alignment, and Recognition, Marseille, France, 12–18 Octobrer 2008.
  78. Nefian, A.V.; HIII, M.H. Face detection and recognition using hidden Markov models. In Proceedings of the IEEE International Conference on Image Processing, Chicago, IL, USA, 4–7 October 1998.
  79. Jameel, S. Face recognition system using PCA and DCT in HMM. Int. J. Adv. Res. Comput. Commun. Eng. 2015, 4, 13–18. [Google Scholar] [CrossRef]
  80. Chihaoui, M.; Bellil, W.; Elkefi, A.; Amar, C.B. Face recognition using HMM-LBP. In Hybrid Intelligent Systems; Springer: Cham, Switzerland, 2015; pp. 249–258. [Google Scholar]
  81. Hashemi, V.H.; Gharahbagh, A.A. A novel hybrid method for face recognition based on 2d wavelet and singular value decomposition. Am. J. Netw. Commun. 2015, 4, 90–94. [Google Scholar] [CrossRef]
  82. Urtasun, R.; Darrell, T. Discriminative Gaussian process latent variable model for classification. In Proceedings of the 24th international conference on Machine learning, Corvallis, OR, USA, 20–24 June 2007; pp. 927–934.
  83. Wang, W.; Wang, R.; Huang, Z.; Shan, S. Discriminant analysis on riemannian manifold of gaussian distributions for face recognition with image sets. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Boston, MA, USA, 7–12 June 2015; pp. 2048–2057.
  84. Gao, Y.; Lee, H.J. Viewpoint unconstrained face recognition based on affine local descriptors and probabilistic similarity. J. Inf. Process. Syst. 2015, 11, 643–654. [Google Scholar]
  85. Cho, H.; Roberts, R.; Jung, B.; Choi, O.; Moon, S. An efficient hybrid face recognition algorithm using PCA and GABOR wavelets. Int. J. Adv. Robot. Syst. 2014, 80. [Google Scholar] [CrossRef]
  86. Qasim, A.; Prashan, P.; Peter, V. A hybrid feature extraction technique for face recognition. Int. Proc. Comput. Sci. Inf. Technol. 2014, 59, 166–170. [Google Scholar]
  87. Nebti, S.; Fadila, B. Combining classifiers for enhanced face recognition. In Advances in Information Science and Computer Engineering; Springer: Dordrecht, The Netherlands, 2015; Volume 82. [Google Scholar]
  88. Zhang, J.; Wang, Y.; Zhang, Z.; Xia, C. Comparison of wavelet, Gabor and curvelet transform for face recognition. Opt. Appl. 2011, 41, 183–193. [Google Scholar]
  89. Singha, M.; Deb, D.; Roy, S. Hybrid feature extraction method for partial face recognition. Int. J. Emerg. Technol. Adv. Eng. Website 2014, 4, 308–312. [Google Scholar]
  90. Sompura, M.; Gupta, V. An efficient face recognition with ANN using hybrid feature extraction methods. Int. J. Comput. Appl. 2015, 117, 19–23. [Google Scholar] [CrossRef]
  91. Kim, D.J.; Lee, S.H.; Shon, M.Q. Face recognition via local directional pattern. Int. J. Secur. Appl. 2013, 7, 191–200. [Google Scholar]
  92. Wu, F. Face recognition based on wavelet transform and regional directional weighted local binary pattern. J. Multimed. 2014, 9, 1017–1023. [Google Scholar] [CrossRef]
  93. The At & T Database of Faces. Available online: http://www.cl.cam.ac.uk/research/dtg/attarchive/facedatabase.html (accessed on 27 September 2016).
  94. AR Faces Databases. Available online: http://www2.ece.ohio-state.edu/~aleix/ARdatabase.html (accessed on 23 September 2016).
  95. The Oulu Physics Database. Available online: http://www.ee.oulu.fi/research/imag/color/pbfd.html (accessed on 27 September 2016).
  96. The Yale Database. Available online: http://vision.ucsd.edu/content/yale-face-database (accessed on 27 September 2016).
  97. The Yale B Database. Available online: http://vision.ucsd.edu/~leekc/ExtYaleDatabase/Yale (accessed on 27 September 2016).
  98. The XM2VTS Database. Available online: http://www.ee.surrey.ac.uk/Reseach/VSSP/xm2vtsdb/ (accessed on 23 September 2016).
  99. The CVL Database. Available online: https://www.caa.tuwien.ac.at/cvl/research/cvl-databases/an-off-line-database-for-writer-retrieval-writer-identification-and-word-spotting/ (accessed on 27 September 2016).
  100. The Bern University Face Database. Available online: http://www.fki.inf.unibe.ch/databases/iam-faces-database (accessed on 27 September 2016).
  101. The CMU-PIE Face Database. Available online: http://vasc.ri.cmu.edu/idb/html/face/ (accessed on 27 September 2016).
  102. The Stirling Online Database Face Database. Available online: http://pics.stir.ac.uk/ (accessed on 23 September 2016).
  103. The UMISTFace Database. Available online: http://www.sheffield.ac.uk/eee/research/iel/research/face (accessed on 27 September 2016).
  104. The JAFEE Face Database. Available online: http://images.ee.umist.ac.uk/danny/database.html (accessed on 27 September 2016).
  105. The FERET Face Database. Available online: http://www.it1.nist.gov/iad/humanid/feret/ (accessed on 27 September 2016).
  106. The Kuwait University Face Database. Available online: http://www.sc.kuniv.edu.kw/lessons/9503587/dina.htm (accessed on 27 September 2016).
  107. The HUMAN SCAN Face Database. Available online: http://web.mit.edu/emeyers/www/face_databases.html#humanscan (accessed on 23 September 2016).
  108. The LFW Face Database. Available online: http://vis-www.cs.umass.edu/lfw/ (accessed on 23 September 2016).
  109. The FRAV2D Face Database. Available online: http://www.frav.es/databases/FRAV2d/ (accessed on 23 September 2016).
  110. The MIT Face Database. Available online: http://cbcl.mit.edu/software-datasets/FaceData2.html (accessed on 27 September 2016).
  111. The FEI Face Database. Available online: https://data.fei.org/Default.aspx (accessed on 23 September 2016).
  112. The Extended Yale Face Database. Available online: http://vision.ucsd.edu/leekc/ExtYaleDatabase/ExtYaleB.html (accessed on 23 September 2016).
  113. Gao, Y.; Leung, M.K.H. Face recognition using line edge map. IEEE Trans. Pattern Anal. Mach. Intell. 2002, 24, 764–779. [Google Scholar]
  114. Deniz, O.; Castrillon, M.; Hernandez, M. Face recognition using independent component analysis and support vector machines. Pattern Recognit. Lett. 2003, 24, 2153–2157. [Google Scholar] [CrossRef]
  115. Samaria, F.; Harter, A.C. Parameterisation of a stochastic model for human face identification. In Proceedings of the Second IEEE Workshop Applications of Computer Vision, Sarasota, FL, USA, 5–7 December 1994.
  116. Le, T.H.; Bui, L. Face recognition based on SVM and 2DPCA. Int. J. Signal Process. Image Process. Pattern Recognit. 2011, 4, 85–94. [Google Scholar]
  117. Kohir, V.V.; Desai, U.B. Face recognition using a DCT-HMM approach. In Proceedings of the 4th IEEE Workshop on Applications of Computer Vision (WACV ’98), Princeton, NJ, USA, 19–21 October 1998; pp. 226–231.
  118. Davari, P.; Miar-Naimi, H. A new fast and efficient HMM-based face recognition system using a 7-state HMM along with SVD coefficient. Iran. J. Electr. Electron. Eng. Iran Univ. Sci. Technol. 2008, 4, 46–57. [Google Scholar]
  119. Sharif, M.; Shah, J.H.; Mohsin, S.; Razam, M. Sub-holistic hidden Markov model for face recognition research. J. Recent Sci. 2013, 2, 10–14. [Google Scholar]
  120. Rabab, R.; Abdelkader, M.; Rehab, F. Face recognition using particle swarm optimization-based selected features. Int. J. Signal Process. Image Process. Pattern Recognit. 2009, 2, 51–65. [Google Scholar]
  121. Gan, J.Y.; He, S.B. An Improved 2dpca Algorithm For Face Recognition. In Proceedings of the Eighth International Conference on Machine Learning and Cybernetics, Baoding, China, 12–15 July 2009; pp. 2380–2384.
  122. Kim, K.I.; Jung, K.; Kim, J. Face recognition using support vector machines with local correlation kernels. Int. J. Pattern Recognit. Artif. Intell. 2002, 16, 97–111. [Google Scholar] [CrossRef]
  123. Zhao, L.; Yang, C.; Pan, F.; Wang, J. Face recognition based on Gabor with 2DPCA and PCA. In Proceedings of the 24th Chinese Control and Decision Conference, Taiyuan, China, 23–25 May 2012; pp. 2632–2635.
  124. Wang, S.; Ye, J.; Ying, D. Research of 2DPCA principal component uncertainty in face recognition. In Proceedings of the Internatioanl Conference on computer Science & Education, Colombo, Sri Lanka, 26–28 April 2013; pp. 26–28.
  125. Dandpat, S.K.; Meher, S. Performance improvement for face recognition using PCA and two-dimensional PCA. In Proceedings of the International Conference on Computer Communation and Information, Coimbatore, India, 4–6 January 2013.
  126. Wang, A.; Jiang, N.A.; Feng, Y. Face recognition based on wavelet transform and improved 2DPCA. In Proceedings of the Fourth International Conference on Instrumentaion and Measurement, Computer, Communication and Control, Harbin, China, 18–20 September 2014; pp. 616–619.
  127. Wiskott, L.; Fellous, J.M.; Kruger, N.; Malsburg, C.V. Face recognition by elastic bunch graph matching. IEEE Trans. Pattern Anal. Mach. Intell. 1997, 19, 775–779. [Google Scholar] [CrossRef]
  128. Raut, S.; Patil, S.H. A review of maximum confidence hidden Markov models in face recognition. Int. J. Comput. Theory Eng. 2012, 4, 119–126. [Google Scholar] [CrossRef]
  129. Bicego, M.; Castellani, U.; Murino, V. Using hidden Markov models and wavelets for face recognition. In Proceedings of the 12th International Conference on Image Analysis and Processing, Mantova, Italy, 17–19 September 2003; pp. 52–56.
  130. Bartlett, M.S.; Movellan, J.R.; Sejnowski, T.J. Face recognition by independent component analysis. IEEE Trans. Neural Netw. 2002, 13, 1450–1464. [Google Scholar] [CrossRef] [PubMed]
  131. Liu, C.; Wechsler, H. Independent component analysis of gabor features for face recognition. IEEE Trans. Neural Netw. 2003, 14, 919–928. [Google Scholar] [PubMed]
  132. Arca, S.; Campadelli, P.; Lanzarotti, R. A face recognition system based on local feature analysis. In International Conference on Audio-and Video-based Biometric Person Authentication; Springer: Guildford, UK, 2003; pp. 182–189. [Google Scholar]
  133. Hajraoui, A.; Sabri, M.; Fakir, M. Complete architecture of a robust system of face recognition. Int. J. Comput. Appl. 2015, 122, 8975–8887. [Google Scholar] [CrossRef]
  134. Shyam, R.; Singh, Y.N. A taxonomy of 2D and 3D face recognition methods. In Proceedings of the International Conference on Signal Processing and Integrated Networks, Noida, India, 20–21 February 2014; pp. 749–754.
  135. Lin, S.H.; Kung, S.Y.; Lin, L.J. Face recognition/detection by probabilistic decision-based neural network. IEEE Trans. Neural Netw. 1997, 8, 114–132. [Google Scholar] [PubMed]
  136. Tolba, A.S. A parameter-based combined classifier for invariant face recognition. Cybern. Syst. 2000, 31, 289–302. [Google Scholar] [CrossRef]
  137. Sanguansat, P.; Asdornwised, W.; Jitapunkul, S.; Marukat, S. Class pecific subspace based two dimensional principal component analysis for face recognition. In Proceedings of the 18th international Conference on Pattern Recognition, Hong Kong, China, 20–24 August 2006; pp. 1249–1249.
  138. Ying, L.; Liang, Y. A human face recognition method by improved modular 2DPCA. In Proceedings of the International Symposium on IT in Medicine and Education, Guangzhou, China, 9–11 December 2011; pp. 7–11.
  139. Deniz, O.; Castrillon, M.; Hernandez, M. Face recognition using independent component analysis and support vector machines. Pattern Recognit. Lett. 2003, 24, 2153–2157. [Google Scholar] [CrossRef]
  140. Chihaoui, M.; Elkefi, A.; Bellil, W.; Amar, C.B. A novel face recognition recognition system using HMM-LBP. Int. J. Comput. Sci. Inf. Secur. 2016, 14, 308–316. [Google Scholar]
  141. Kepenekci, B. Face Recognition Using Gabor Wavelet Transform. Ph.D. Thesis, The Middle East Technical University, Ankara, Turkey, 2001. [Google Scholar]
  142. Han, H.; Jain, A.K. 3D face texture modeling from uncalibrated frontal and profile images. In Proceedings of the Fifth International Conference on Biometrics: Theory, Applications and Systems, Arlington, VA, USA, 23–27 September 2012; pp. 223–230.
  143. Huang, D.; Sun, J.; Yang, X.; Weng, D.; Wang, Y. 3D face analysis: Advances and perspectives. In Proceedings of the Chinese Conference on Biometric Recognition, Shenyang, China, 7–9 November 2014.
  144. Drira, H.; Amor, B.B.; Srivastava, A.; Daoudi, M.; Slama, R. 3D face recognition under expressions, occlusions, and pose variations. IEEE Trans. Pattern Anal. Mach. Intell. 2013, 35, 2270–2283. [Google Scholar] [CrossRef] [PubMed]
  145. Huang, D.; Ardabilian, M.; Wang, Y.; Chen, L. 3-D face recognition using eLBP-based facial description and local feature hybrid matching. IEEE Trans. Inf. Forensics Secur. 2012, 7, 1551–1565. [Google Scholar] [CrossRef]
  146. Said, S.; Amor, B.B.; Zaied, M.; Amar, C.B.; Daoudi, M. Fast and efficient 3D face recognition using wavelet networks. In Proceedings of the 2009 16th IEEE International Conference on Image Processing (ICIP), Cairo, Egypt, 7–10 November 2009; pp. 4153–4156.
  147. Borgi, M.A.; El’Arbi, M.; Amar, C.B. Wavelet network and geometric features fusion using belief functions for 3D face recognition. In Computer Analysis of Images and Patterns, Proceedings of the 15th International Conference, CAIP 2013, York, UK, 27–29 August 2013; Wilson, R., Hancock, E., Bors, A., Smith, W., Eds.; Lecture Notes in Computer Science. Springer: Berlin/Heidelberg, Germany, 2013; Volume 8048, pp. 307–314. [Google Scholar]
  148. Soltana, W.B.; Bellil, W.; Amar, C.B.; Alimi, A.M. Multi library wavelet neural networks for 3D face recognition using 3D facial shape representation. In Proceedings of the 2009 17th European Signal Processing Conference, Glasgow, Scotland, 24–28 August 2009; pp. 55–59.
  149. Bowyer, K.W.; Chang, K.; Flynn, P. A survey of approaches and challenges in 3D and multimodal 3D+2D face recognition. Comput. Vis. Image Understand. 2006, 101, 1–15. [Google Scholar] [CrossRef]
  150. Lakshmiprabha, N.S.; Bhattacharya, J.; Majumder, S. Face recognition using multimodal biometric features. In Proceedings of the International Conference on Image Information Processing (ICIIP), Shimla, India, 3–5 November 2011; pp. 1–6.
  151. Radhey, S.; Narain, S.Y. Identifying individuals using multimodal face recognition techniques. Procedia Comput. Sci. 2015, 48, 666–672. [Google Scholar]
  152. Stephen, B. Deep learning and face recognition: The state of the art. Proc. SPIE 2015, 9457. [Google Scholar] [CrossRef]
  153. Li, S.Z.; Chu, R.; Liao, S.; Zhang, L. Illumination invariant face recognition using near-infrared images. IEEE Trans. Pattern Anal. Mach. Intell. 2007, 29, 627–639. [Google Scholar] [CrossRef] [PubMed]
  154. Huang, D.; Wang, Y. A robust method for near infrared face recognition based on extended local binary pattern. In Proceedings of the International Symposium on Visual Computing, Lake Tahoe, NV, USA, 26–28 November 2007.
  155. Friedrich, G.; Yeshurun, Y. Seeing people in the dark: Face recognition in infrared images. In Biologically Motivated Computer Vision; Springer: Berlin/Heidelberg, Germany, 2003. [Google Scholar]
  156. Jeni, L.A.; Hashimoto, H.; Kubota, T. Robust facial expression recognition using near infrared cameras. J. Adv. Comput. Intell. Intell. Inform. 2012, 16, 341–348. [Google Scholar]
  157. Wang, R.; Liao, S.; Lei, Z.; Li, S.Z. Multimodal biometrics based on near-infrared face. In Biometrics: Theory, Methods, and Applications; Wiley-IEEE Press: Hoboken, NJ, USA, 2009; Volume 9. [Google Scholar]
  158. Ngiam, J.; Khosla, A.; Kim, M.; Nam, J.; Lee, H.; Ng, A.Y. Multimodal deep learning. In Proceedings of the 28th International Conference on Machine Learning ICML-11, Bellevue, WA, USA, 28 June–2 July 2011; pp. 689–696.
Figure 1. Face recognition process.
Figure 1. Face recognition process.
Computers 05 00021 g001
Figure 2. Compatibility score for various biometric technologies in the Machine-Readable Travel Documents (MRTD) system.
Figure 2. Compatibility score for various biometric technologies in the Machine-Readable Travel Documents (MRTD) system.
Computers 05 00021 g002
Figure 3. Eigenfaces (eigenvectors) of the 12 largest eigenvalues are presented from the AT&T division of the ORL database [12].
Figure 3. Eigenfaces (eigenvectors) of the 12 largest eigenvalues are presented from the AT&T division of the ORL database [12].
Computers 05 00021 g003
Figure 4. Image reconstruction based on 2D PCA.
Figure 4. Image reconstruction based on 2D PCA.
Computers 05 00021 g004
Figure 5. The recognition of face from the right side to the left side using HMM.
Figure 5. The recognition of face from the right side to the left side using HMM.
Computers 05 00021 g005
Figure 6. Classification of face recognition approaches.
Figure 6. Classification of face recognition approaches.
Computers 05 00021 g006
Table 1. Comparative table of 2D face recognition approaches.
Table 1. Comparative table of 2D face recognition approaches.
ApproachAdvantagesDisadvantages
-
Quick to implement
-
Calculations of medium complexity.
-
Very sensitive to variations in illumination, pose and facial expression.
-
It requires a very large memory size.
-
No preservation of non-convex face variations allowing differentiating individuals.
GLOBALLinear
-
Reduction of the dimension of the images.
-
Space of representation faithful to the data when the data structure is linear.
-
Euclidean distances used are not very effective either for classification between facial and non-facial shapes or for classification between individuals.
-
Face detection and recognition rate generally unsatisfying.
Non linear
-
The use of non-linear methods of projection of images space on the feature space remarkably reduces the images size.
-
The improvement of recognition rates on given tests.
-
They are too flexible to be efficient to new data, unlike the linear methods.
-
May provide additional information based on local parts.
-
For every type of local features, we can choose the most suitable classifier.
-
Less sensitive to lighting variations
-
The integration of global information is often required.
LOCALInterest-Point-Based
Face Recognition
methods
-
These methods can be useful and effective for face recognition where one reference picture is available.
-
Their performance depends greatly on the effectiveness of the algorithms of feature point localization.
-
The detection and the geometric feature extraction are not easy and have not been reliably resolved, especially when there are occlusions, or variations in pose and facial expressions, or when the shape of the face image can widely vary [56].
-
Only geometric characteristics are not sufficient to fully represent a face, and other useful information such as the values of the image to the grayscale are fully spread.
Local Appearance-Based Face
Recognition Methods
-
Ability to choose the best way to represent information from each region.
-
The step is critical to the system’s performance.
HYBRID
-
The Combination of both global and local analysis of a face can improve the ability of the classifier.
-
Allows one to exploit complementarities and provides more efficient systems and faster recognition.
-
More difficult to implement than the other two approaches.
Table 2. 2D face databases. The image variations are represented by (i) illumination, (p) pose, (e) facial expression, (o) occlusion and (t) delay time.
Table 2. 2D face databases. The image variations are represented by (i) illumination, (p) pose, (e) facial expression, (o) occlusion and (t) delay time.
DatabaseRGB Color/greyImages SizeNo. of PersonsNumber of Images/PersonVariationDescription
ORL [93]gray92 × 1124010i,t
-
Always with a dark background
-
A limited number of people
-
Not consistent lighting conditions from one image to another -Non-annotated images for different facial expressions head rotation and lighting
AR database [94]RGB576 × 768126 (70 men and 56 women)26i,e,o,t
-
A limited number of people
-
Facial expressions (neutral, smile, angry, screaming)
-
Various illuminations (left light on, right light on, all side lights on)
-
Partial occlusions (glasses, scarf); taken in two separate sessions during 14 days
-
No restriction on makeup, clothes, hairstyle and glasses
Oulu Physics [95]gray42 × 5612516i
-
4 lights (horizon glowing fluorescent, and daylight)
-
Images captured in dark rooms and with a gray background
-
No variation in the angle of illumination
-
All of the images are “frontal” with some variations in angle and distance to the camera
Yale [96]Gray320 × 243
100 × 80
15 (14 men and 1 woman)11i,e
-
Lighting-variations (left-light, center-light, and right-light)
-
Presence and no glasses
-
Facial-expressions (neutral, angry, happy, surprised, sleepy, wink)
-
Limited number of images
-
Position of lighting source and conditions not identified
-
No change in pose angle
Yale B [97]Gray640 × 40
60 × 50
pixels
10576P,i
-
Limited number of people
-
64 illumination angles and 9 pose angles
-
Pose 0 is frontal
-
Poses 1, 2, 3, 4, and 5 are the object taken from 5 points of a semi-circle of 12 degrees away from camera
-
6, 7 and 8 are 3 points of the semi-circles 24 degrees away from the camera
-
64 images for each pose (30 frames/s)
-
Non homogeneous background
-
Some poses angles Uncontrolled and free head orientation.
XM2VTS [98]RGB576 × 720295 P
-
Controlled database
-
1000 sequence giga bytes of video and vocals acquired during 4 sessions in 4 months
-
Significant variations (form of hair, presence and shape of glasses)
-
Rotation of head -Database designated for multimodal identification (video + audio) by vocals and facial features
-
No information on the acquisition parameters (lighting, angle, pose)
CVL [99]RGB640 × 480114 (108 men
and 6 women)
7P,e
Bern University face Database [100]Gray 3010
-
Frontal Views
-
Different change of head poses (2 frontal, 2 looking to the left, two right, two down and two up)
-
Images taken in ideal controlled conditions
PIE [101]RGB640 × 48686608b,p,i,e
-
Various lighting conditions
-
4 facial expressions
-
2 image groups (with and without ambient lighting)
-
There was visible clutter in the background
-
Pose angles not provided
-
background, pose and illumination variations
-
41,000 color images of 68 persons.
-
13 different poses
-
43 illumination conditions
The University of Stirling online database [102]Gray 300 (men and women)1591
-
Created for psycho- logical research
-
Contains images of faces, textures, natural scenes
-
No lighting information
-
Most images acquired with dark background; therefore, there is difficulty extracting the border of a black hair head
-
Limited number of people
-
Pose angles provided
-
No changes in lighting conditions
UMIST [103]RGB220 × 2202019–36p
-
No information is provided about the illumination used
-
Pose and lighting conditions not provided
-
No information about the illumination conditions
JAFEE [104]Gray256 × 256107e
FERET [105]RGB256 × 38430,000 p,i,e,t
-
No large variation in pose
-
No information on lighting conditions
KUFDB [106]Gray24 × 24
36 × 36
64 × 64
505p,i,e
-
No lighting control
-
Limited number of people
-
No information about the acquisition parameters, such as the “pose” angle
HUMAN SCAN [107]Gray384 × 2862366
LFW [108]RGB150 × 15013,233 P,i,e,o,t
-
Non controlled database
FRAV2D [109]RGB Transformed to gray92 × 11210011i,e
-
Frontal views
MIT [110]Gray480 × 512
15 × 16
1627p,i
-
Various head orientations
-
Different zoom and lighting
-
Non-extensive control and without precision
-
No Effort to protect objects against the motion between 2 images
FEI database [111]RGB 20014
-
Brazilian face image database
-
All images are taken against a white homogenous background in an upright frontal position and vary 180 degrees of rotation
Extended Yale B [112 ]RGB640× 48028576p,i
-
Variations in pose (9 poses)
-
Illumination conditions (64)
Table 3. Summary of the results of the different face recognition approaches.
Table 3. Summary of the results of the different face recognition approaches.
DatabaseApproachRecognition
Rate (%)
Details
-
Eigenface [18]
55.4
-
Line edge map (LEM) [113]
96.43
AR Database
-
SVM + PCA [114]
92.67
-
SVM + ICA [114]
94
-
2D-PCA [13]
96.1
-
Hidden Markov model (HMMs) [115]
87
-
PCA + MLP [116]
75.2
-
2D-PCA + SVM [116]
97.3
-
HMM-DCT [117]
99.5
-
HMM-SVD [118]
99
-
SHHMM [119]
99.5
-
HMM-LBP [80]
99.5
-
A pseudo 2DHMM [115]
95
-
SVM with a binary tree [120]
91.21
-
SVM for nearest center classification (NCC) [120]
84.6
-
Eigenface [11]
90
-
2D-PCA [13]
96
-
Improved 2D-PCA [121]
98.33
-
Several SVM + NN arbitrator [122]
97.9
-
PCA + 2D-PCA + Gabor [123]
ORL
-
2D-PCA principal component uncertainty [124]
97.80
-
PCA and 2D-PCA [125]
92.8
-
Wavelet transform and improved 2D-PCA [126]
92.0
-
PCA + DCT [79]
95.122
-
DCTHMM [117]
99.5
-
EBGM [127]
94.29
-
Combination of HMM and SVM [87]
100
-
1DHMM + Wavelet [128]
100
-
Pseudo 2D HMM + Wavelet [129]
100
-
SVM + PCA [114]
97
-
ICA [130]
85
-
Gabor + ICA [131]
100
-
LFA [132]
100
-
PCA [11]
80.5
-
Pose estimator [133]
99
-
Fisherfaces with BCD [134]
95.45
-
Fisherfaces + LBP [134]
99.87
ORL
-
PDBNN [135]
96
-
PDBNN face recognizing up to 200 people in approximately 1 s, and the training time is 20 min
-
Boosted parameter based on combined classifier [136]
100
-
The DB is divided into 200 images (10 for each person) for training and 200 for testing (10 for each person)
-
LEM [113]
100
Bern
-
Eigenface [11]
100
-
GWT [21]
83.25
FRAV2D
-
PHMM [21]
87.875
-
2D-PCA [13]
84.24
-
HMM-LBP [80]
99.33
-
B2D-PCA + FSS [137]
94.44
-
Improved 2D-PCA [121]
97.78
-
Augmented Local Binary Pattern and Bray Curtis Dissimilarity ALBP-BCD [134]
86.45
YALE
-
Improved Modular 2D-PCA [138]
90.7
-
SVM + PCA [139]
99.39
-
PCA [130]
88.1
-
PHMM [13]
-
SVM + ICA [108]
99.39
-
Boosted parameter based combined classifier [136]
99.5
-
The DB is divided into 75 images (5 for each person) for training and 90 for testing (6 for each person)
-
PCA and 2D-PCA [125]
92.3
-
Gabor wavelet transform (GWT) [21]
81.25
-
HMM-LBP [140]
95
-
Pseudo Hidden Markov Model PHMM [21]
84.375
FERET
-
PCA [141]
90
-
GWT-PHMM [142]
91.6
-
MLBP [116]
95.1
-
2D-PCA + SVM [116]
85.2

Share and Cite

MDPI and ACS Style

Chihaoui, M.; Elkefi, A.; Bellil, W.; Ben Amar, C. A Survey of 2D Face Recognition Techniques. Computers 2016, 5, 21. https://doi.org/10.3390/computers5040021

AMA Style

Chihaoui M, Elkefi A, Bellil W, Ben Amar C. A Survey of 2D Face Recognition Techniques. Computers. 2016; 5(4):21. https://doi.org/10.3390/computers5040021

Chicago/Turabian Style

Chihaoui, Mejda, Akram Elkefi, Wajdi Bellil, and Chokri Ben Amar. 2016. "A Survey of 2D Face Recognition Techniques" Computers 5, no. 4: 21. https://doi.org/10.3390/computers5040021

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop