2017
DOI: 10.1063/1.5005335
|View full text |Cite
|
Sign up to set email alerts
|

Face recognition for criminal identification: An implementation of principal component analysis for face recognition

Abstract: Abstract. In practice, identification of criminal in Malaysia is done through thumbprint identification. However, this type of identification is constrained as most of criminal nowadays getting cleverer not to leave their thumbprint on the scene. With the advent of security technology, cameras especially CCTV have been installed in many public and private areas to provide surveillance activities. The footage of the CCTV can be used to identify suspects on scene. However, because of limited software developed t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 40 publications
(18 citation statements)
references
References 4 publications
0
17
0
1
Order By: Relevance
“…In a linear projection appearance-based, features are projected into a linear subspace. Example of this method is Principle Component Analysis (PCA) [11], [9], Independent Component Analysis (ICA) [12], Linear Discriminant Analysis (LDA) [13], [14], Two Dimensional PCA (2DPCA) [15], and Linear Regression Classification (LRC) [16], Fisher Linear Discriminant [17].…”
Section: A Related Workmentioning
confidence: 99%
“…In a linear projection appearance-based, features are projected into a linear subspace. Example of this method is Principle Component Analysis (PCA) [11], [9], Independent Component Analysis (ICA) [12], Linear Discriminant Analysis (LDA) [13], [14], Two Dimensional PCA (2DPCA) [15], and Linear Regression Classification (LRC) [16], Fisher Linear Discriminant [17].…”
Section: A Related Workmentioning
confidence: 99%
“…• Vehicles monitoring -Number Plate Recognition • Human monitoring -Face Recognition [22], [52], [53], [54], [55], [56], [57], [58], [59], [60], [61], [62], [63], [64], [65], [66] Smart Energy • Energy Sustainability…”
Section: Smart Cardmentioning
confidence: 99%
“…Sebagian diaplikasikan pada keamanan smart home [1][2][3][4][5], identifikasi [6][7][8][9][10][11][12], dan pemantauan [13][14][15][16][17]. Contoh penerapan pengenalan wajah dalam menguatkan sistem keamanan smart home dengan menggunakan data latih dari sosial media untuk meningkatkan ketepatan klasifikasinya [3], mengaplikasikan pengenalan wajah dalam identifikasi tindak kejahatan [6,9], dan aplikasi pengenalan wajah untuk pemantuan kehadiran siswa di kelas [16]. Aplikasi-aplikasi tersebut sangat mungkin 32 TEKNIKA, Volume 9(1), Juli 2020, pp.…”
Section: Pendahuluanunclassified