318,177 research outputs found

    Optimization of Three-dimensional Face Recognition Algorithms in Financial Identity Authentication

    Get PDF
    Identity authentication is one of the most basic components in the computer network world. It is the key technology of information security. It plays an important role in the protection of system and data security. Biometric recognition technology provides a reliable and convenient way for identity authentication. Compared with other biometric recognition technologies, face recognition has become a hot research topic because of its convenience, friendliness and easy acceptance. With the maturity and progress of face recognition technology, its commercial application has become more and more widespread. Internet finance, e-commerce and other asset-related areas have begun to try to use face recognition technology as a means of authentication, so people’s security needs for face recognition systems are also increasing. However, as a biometric recognition system, face recognition system still has inherent security vulnerabilities and faces security threats such as template attack and counterfeit attack. In view of this, this paper studies the application of threedimensional face recognition algorithm in the field of financial identity authentication. On the basis of feature extraction of face information using neural network algorithm, K-L transform is applied to image high-dimensional vector mapping to make face recognition clearer. Thus, the image loss can be reduced

    TV-GAN: Generative Adversarial Network Based Thermal to Visible Face Recognition

    Full text link
    This work tackles the face recognition task on images captured using thermal camera sensors which can operate in the non-light environment. While it can greatly increase the scope and benefits of the current security surveillance systems, performing such a task using thermal images is a challenging problem compared to face recognition task in the Visible Light Domain (VLD). This is partly due to the much smaller amount number of thermal imagery data collected compared to the VLD data. Unfortunately, direct application of the existing very strong face recognition models trained using VLD data into the thermal imagery data will not produce a satisfactory performance. This is due to the existence of the domain gap between the thermal and VLD images. To this end, we propose a Thermal-to-Visible Generative Adversarial Network (TV-GAN) that is able to transform thermal face images into their corresponding VLD images whilst maintaining identity information which is sufficient enough for the existing VLD face recognition models to perform recognition. Some examples are presented in Figure 1. Unlike the previous methods, our proposed TV-GAN uses an explicit closed-set face recognition loss to regularize the discriminator network training. This information will then be conveyed into the generator network in the forms of gradient loss. In the experiment, we show that by using this additional explicit regularization for the discriminator network, the TV-GAN is able to preserve more identity information when translating a thermal image of a person which is not seen before by the TV-GAN

    Application of Neural Networks with CSD Coefficients for Human Face Recognition

    Get PDF
    Face recognition is one of the most popular, reliable and widely used applications in real world. It is the main biometric used by humans in many security, law enforcement and commercial systems and high demand of this application attracts researchers from various fields such as image processing, pattern recognition, neural network and computer vision etc. In a Human Face Recognition Systems, we start with pre-processing of the data followed by feature extraction for dimensionality reduction and then classification. In this thesis, neural network classifier with CSD coefficients is used to make the area required for implementation of recognition system more efficient. The FPGA implementation of the proposed technique indicates almost 50% saving in the area required for face recognition application by using neural network classifier with CSD coefficients while the processing speed is improved in comparison to its binary counterpart. Extensive experimental results were conducted to show the utility of the proposed technique

    A Real Time Employee Attendance Monitoring System using ANN

    Get PDF
    Face recognition refers to the technology that examines and contrasts a person's face characteristics to recognise or verify their identity. Recently, this technology has drawn a lot of attention due to the potential uses it may have in security, marketing, and law enforcement. Face recognition involves studying a picture or video of a person's face to identify features like the space between their eyes, the contour of their nose, and the curve of their mouth. The person's identity is then established or verified by comparing these characteristics to a database of previously saved pictures. A series of techniques called facial recognition algorithms are used to identify and authenticate persons based on the features of their faces. These algorithms compare a person's facial attributes to those in a database of recognised faces by looking at things like the shape of their face, the distance between their eyes, and other distinctive facial features. There are many different types of face recognition algorithms, including geometric-based algorithms, appearance-based algorithms, and hybrid algorithms that combine both approaches. Geometric-based algorithms employ the geometry of face traits to identify and validate people, while appearance-based algorithms use image processing techniques to compare the patterns and textures of facial features. Recent advances in deep learning have significantly improved the accuracy of facial recognition algorithms. Artificial Neural Network (ANN) has shown to be highly effective and have been used in a range of applications, including mobile devices, security, and surveillance. Face recognition algorithms provide advantages, but there are also moral dilemmas with regard to its application, such as potential biases and privacy difficulties. As technology advances, it is imperative to address these problems and ensure that face recognition algorithms are used ethically and responsibly

    MEMBANDINGAN METODE JARINGAN SYARAF TIRUAN BACKPROPAGATION DAN LEARNING VECTOR QUANTIZATION DENGAN OPENCV PADA PENGENALAN WAJAH

    Get PDF
    Face recognition is an area that is still being researched and improved for various purposes such as attendance, population data collection, security systems and others. Two methods that are often used for face recognition applications are artificial intelligence methods, especially back-propagation neural networks (ANN) and learning vector quantization. Both of these techniques are directed learning techniques that are widely used to identify distinctive patterns, namely grouping patterns into groups of patterns, making them ideal for use in facial recognition applications. In this application, preprocessing of the input image includes the detection process of scaling, grayscale, edged with the sobel and threshold methods, carried out before the image is processed in ANN. Meanwhile, the ANN approach used to identify faces involves the Backpropagation method and the Learning Vector Quantization method. The findings of this analysis are a comparison of the backpropagation neural network method and quantization of the learning vectors of face recognition used to assess variations, limitations, strengths and optimal results of the two techniques for use in facial recognition systems.   &nbsp

    Pemanfaatan Teknik Pengenalan Wajah Berbasis Opencv untuk Sistem Informasi Pencatatan Kehadiran Dosen

    Get PDF
    Human face recognition (human face recognition) is a major branch in the field of biometric verification in addition to the introduction of eye retina, fingerprints and signature patterns and its application has been widely used in various network security system applications, door control systems, to the benefit of attendance recording system. The current study aims to utilize facial recognition techniques as data input for information systems that record the presence of lecturers at the Hamzanwadi University Faculty of Engineering. The technology base for developing the system support software is OpenCV and the Java programming language. This research was conducted with the design-science for IS research method that emphasizes the build and evaluate cycles. The build phase will be carried out using object-oriented rules while the evaluate stage is carried out by adopting the Technology Acceptance Model (TAM) framework.DOI : 10.29408/jit.v1i2.90

    Smart Home Security Menggunakan Face Recognition Dengan Metode Eigenface Berbasis Raspberry Pi

    Get PDF
    One of the biometric technologies that have been implemented in many security systems besides retinal recognition, fingerprint recognition and iris is facial recognition. On the hardware side itself, face recognition (Face Recognition) uses a camera to capture a person's face then compared to the previous face that has been stored in a particular database. There are several methods of facial recognition, namely neural networks, artificial neural networks, adaptive neuro fuzzy, and eigenface. Specifically in this study the method to be explained is the eigenface method. Specifically in this study the method that will be explained is the eigenface method, and uses a web cam to capture images in real time. The advantage of this method is that the computation is very fast and simple compared to the use of methods that require a lot of learning, such as artificial network requirements. Broadly speaking, the process of this application is the camera to capture faces, then an RGB value is obtained. Using the initial processing, resize, RGB to Grayscale, and histogram equalization for light alignment. The eigenface method functions to calculate the eigenvalue, and the eigenvector that will be used as a feature in making recognition. From the experiments and tests carried out, the tool can recognize facial images with a success rate of up to 90% at a distance of 25 cm with an average success of 72.5%. This proves this tool is quite good in face recognition

    An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor Analytics

    Full text link
    Near-sensor data analytics is a promising direction for IoT endpoints, as it minimizes energy spent on communication and reduces network load - but it also poses security concerns, as valuable data is stored or sent over the network at various stages of the analytics pipeline. Using encryption to protect sensitive data at the boundary of the on-chip analytics engine is a way to address data security issues. To cope with the combined workload of analytics and encryption in a tight power envelope, we propose Fulmine, a System-on-Chip based on a tightly-coupled multi-core cluster augmented with specialized blocks for compute-intensive data processing and encryption functions, supporting software programmability for regular computing tasks. The Fulmine SoC, fabricated in 65nm technology, consumes less than 20mW on average at 0.8V achieving an efficiency of up to 70pJ/B in encryption, 50pJ/px in convolution, or up to 25MIPS/mW in software. As a strong argument for real-life flexible application of our platform, we show experimental results for three secure analytics use cases: secure autonomous aerial surveillance with a state-of-the-art deep CNN consuming 3.16pJ per equivalent RISC op; local CNN-based face detection with secured remote recognition in 5.74pJ/op; and seizure detection with encrypted data collection from EEG within 12.7pJ/op.Comment: 15 pages, 12 figures, accepted for publication to the IEEE Transactions on Circuits and Systems - I: Regular Paper
    corecore