1. Introduction
Face recognition has a wide rage of potential applications such as identity verification, access control, security surveillance, and human-computer interaction. Many face recognition algorithms have been reported in the literature from the Eigenface method [1] based on Principle Component Analysis (PCA), the Fisherface method [2] based on Linear Discriminant Analysis (LDA), to Hidden Markov Models [3], and neural network approaches [4].