A New Extracted Features to Recognize Faces Effected by Occlusions and Common Variations

Authors

  • Ahmad Bany Doumi Faculty of Computer Science and Information Technology, Jerash University, Jerash, Jordan
  • Feras E. Abualadas Department of Cyber Security-Faculty of Computer Science and Informatics, Amman Arab University, Amman, Jordan
  • Mohammed M. Abu Shquier Faculty of Computer Science and Information Technology, Jerash University, Jerash, Jordan
  • Mahmoud Asassfeh Department of Cyber Security- Faculty of Information Technology, Zarqa University, Zarqa, Jordan
  • Bassam Mohammad Elzaghmouri Faculty of Computer Science and Information Technology, Jerash University, Jerash, Jordan
  • Khaled M. Alhawiti Faculty of Computes and IT, University of Tabuk, Tabuk, Saudia Arabia

DOI:

https://doi.org/10.37934/araset.57.1.211239

Keywords:

EBGM, Greedy algorithm, Face graph, Jet

Abstract

Face recognition from non-identical face photos is a prominent area of research in pattern recognition and computer vision. Existing face recognition systems struggle with diverse changes like lighting conditions, expressions, and facial occlusions. This paper proposes a new Face Recognition (FR) approach that combines the Elastic Bunch Graph Matching (EBGM) approach with the greedy algorithm to automatically identify face landmarks. The proposed approach independently selects each optimal landmark of face image from different corresponding face images where the corresponding landmark of corresponding face image which achieves the best similarity is used rather than using one or at most two corresponding face images and computing the average between both. The locations of corresponding landmarks can be displaced to achieve maximum similarity with optimal landmarks. This proposed approach demonstrates improved recognition performance compared to contemporary face recognition methods. It effectively handles changing ratios of face parts and can recognize faces even with increasing occlusion sizes.

Downloads

Download data is not yet available.

Author Biographies

Ahmad Bany Doumi, Faculty of Computer Science and Information Technology, Jerash University, Jerash, Jordan

a.banydoumi@jpu.edu.jo

Feras E. Abualadas, Department of Cyber Security-Faculty of Computer Science and Informatics, Amman Arab University, Amman, Jordan

f.abualadas@aau.edu.jo

Mohammed M. Abu Shquier, Faculty of Computer Science and Information Technology, Jerash University, Jerash, Jordan

shquier@jpu.edu.jo

Mahmoud Asassfeh, Department of Cyber Security- Faculty of Information Technology, Zarqa University, Zarqa, Jordan

masassfeh@zu.edu.jo

Bassam Mohammad Elzaghmouri, Faculty of Computer Science and Information Technology, Jerash University, Jerash, Jordan

b.el-zaghmouri@jpu.edu.jo

Khaled M. Alhawiti, Faculty of Computes and IT, University of Tabuk, Tabuk, Saudia Arabia

khalhawiti@ut.edu.sa

Downloads

Published

2024-10-07

Issue

Section

Articles

Most read articles by the same author(s)