Department of Computer Engineering, Razi University
Abstract
Recently, researchers have shown an increased interest in kinship verification via facial images in the field of computer vision. The matter of fact is that kinship verification is done according to similarities of parent and child faces. To this end, we need more local features extraction. All the methods reviewed so far, however, suffer the fact that they have divided images into distinct block, to extract more local features. The main problem has two aspects: aimless division and features extraction from unnecessary regions that lead to overlapping, noise and reduction of classification rate. In this paper, at first, the main parts of face such as eyes, nose and mouth are detected along with the whole face image. Then they will be used for feature extraction. In order to reduce feature vectors redundancy, new method of feature selection named as Kinship Feature Selection (KinFS), based on Random Subset Feature Selection (RSFS) algorithm is proposed. This method reduces the redundancy and improves verification rate by selecting effective features. The experiment results show that purposeful feature extraction by proposed KinFS method are efficient in improving kinship verification rate.
Alirezazadeh, P., Fathi, A., & Abdali-Mohammadi, F. (2016). Effect of Purposeful Feature Extraction in High-dimensional Kinship Verification Problem. Journal of Computing and Security, 3(3), 183-191.
MLA
Pendar Alirezazadeh; Abdolhossein Fathi; Fardin Abdali-Mohammadi. "Effect of Purposeful Feature Extraction in High-dimensional Kinship Verification Problem". Journal of Computing and Security, 3, 3, 2016, 183-191.
HARVARD
Alirezazadeh, P., Fathi, A., Abdali-Mohammadi, F. (2016). 'Effect of Purposeful Feature Extraction in High-dimensional Kinship Verification Problem', Journal of Computing and Security, 3(3), pp. 183-191.
VANCOUVER
Alirezazadeh, P., Fathi, A., Abdali-Mohammadi, F. Effect of Purposeful Feature Extraction in High-dimensional Kinship Verification Problem. Journal of Computing and Security, 2016; 3(3): 183-191.