Pouya Ghofrani, Zahra Neshat, Hassan Aghaeinia. Labeling Algorithm for Face Detection Using Skin and Hair Characteristics[J]. Journal of Electronic Science and Technology, 2012, 10(2): 135-141. DOI: 10.3969/j.issn.1674-862X.2012.02.008
Citation: Pouya Ghofrani, Zahra Neshat, Hassan Aghaeinia. Labeling Algorithm for Face Detection Using Skin and Hair Characteristics[J]. Journal of Electronic Science and Technology, 2012, 10(2): 135-141. DOI: 10.3969/j.issn.1674-862X.2012.02.008

Labeling Algorithm for Face Detection Using Skin and Hair Characteristics

doi: 10.3969/j.issn.1674-862X.2012.02.008
More Information
  • Received Date: 2012-05-07
  • Rev Recd Date: 2012-06-10
  • Publish Date: 2012-06-24
  • This research presents an algorithm for face detection based on color images using three main components:skin color characteristics, hair color characteristics, and a decision structure which converts the obtained information from skin and hair regions to labels for identifying the object dependencies and rejecting many of the incorrect decisions. Here we use face color characteristics that have a good resistance against the face rotations and expressions. This algorithm is also capable of being combined with other methods of face recognition in each stage to improve the detection.
  • Related Articles

    [1]Ariffuddin Joret, Mohammad Faiz Liew Abdullah, Muhammad Suhaimi Sulong, Asmarashid Ponniran, Siti Zuraidah Zainudin. Performance of Object Classification Using Zernike Moment[J]. Journal of Electronic Science and Technology, 2014, 12(1): 90-94. DOI: 10.3969/j.issn.1674-862X.2014.01.018
    [2]Yan-Ming He, Ya-Juan He, Yang-Ming Li, Shao-Wei Zhen, Ping Luo. Characterization of Fundamental Logics for the Sub-Threshold Digital Design[J]. Journal of Electronic Science and Technology, 2013, 11(4): 382-387. DOI: 10.3969/j.issn.1674-862X.2013.04.009
    [3]Cheng Guo, Chin-Chen Chang. Proactive Weighted Threshold Signature Based on Generalized Chinese Remainder Theorem[J]. Journal of Electronic Science and Technology, 2012, 10(3): 250-255. DOI: 10.3969/j.issn.1674-862X.2012.03.010
    [4]Xuan-Sen He, Tian-Jiao Zhao. New Wavelet Threshold Denoising Method in Noisy Blind Source Separation[J]. Journal of Electronic Science and Technology, 2010, 8(4): 356-361. DOI: 10.3969/j.issn.1674-862X.2010.04.012
    [5]Monika Rajput, Ravindra K. Sinha. Effect of Different Plasmonic Nano-Inclusion on Double Negative-Semiconductor Photonic Crystal in Visible Region: Gain Assistance and All-Angle Negative Refraction[J]. Journal of Electronic Science and Technology, 2010, 8(1): 10-15. DOI: 10.3969/j.issn.1674-862X.2010.01.002
    [6]Lin Liang, Yue-Hui Yu. Skin Effect of Reversely Switched Dynistor in Short Pulse Discharge Application[J]. Journal of Electronic Science and Technology, 2009, 7(2): 146-149.
    [7]JIANG Bo, HUANG Wei. Adaptive Threshold Median Filter for Multiple-Impulse Noise[J]. Journal of Electronic Science and Technology, 2007, 5(1): 70-74.
    [8]ZHANG Xian-feng, ZHANG Feng, QIN Zhi-guang, LIU Jin-de. ECC Based Threshold Decryption Scheme and Its Application in Web Security[J]. Journal of Electronic Science and Technology, 2004, 2(4): 41-46.
    [9]YAN Shao-hu, ZHUO Yong-ning, WU Shi-qi, GUO Wei. The Impact of RTS Threshold on Capacity of IEEE 802.11 DCF[J]. Journal of Electronic Science and Technology, 2004, 2(4): 6-11.
    [10]WATTANAAMAT Patikorn, MATSUMARU Masanobu, YAMASHITA Hiroshi. Decision Support for DCs Location and Distribute Range Planning: Case Study in Asia-Pacific Region[J]. Journal of Electronic Science and Technology, 2004, 2(3): 22-26.
  • Catalog

      Article Metrics

      Article views (376) PDF downloads (35) Cited by()
      Related
      Proportional views

      /

      DownLoad:  Full-Size Img  PowerPoint
      Return
      Return