A Few Approaches To Face Detection In Face Recognition Systems

2002 ◽  
pp. 313-322
Author(s):  
Georgi Koukharev ◽  
Tomasz Ponikowski ◽  
Liming Chen
Complexity ◽  
2020 ◽  
Vol 2020 ◽  
pp. 1-11
Author(s):  
Xin Cheng ◽  
Hongfei Wang ◽  
Jingmei Zhou ◽  
Hui Chang ◽  
Xiangmo Zhao ◽  
...  

For face recognition systems, liveness detection can effectively avoid illegal fraud and improve the safety of face recognition systems. Common face attacks include photo printing and video replay attacks. This paper studied the differences between photos, videos, and real faces in static texture and motion information and proposed a living detection structure based on feature fusion and attention mechanism, Dynamic and Texture Fusion Attention Network (DTFA-Net). We proposed a dynamic information fusion structure of an interchannel attention block to fuse the magnitude and direction of optical flow to extract facial motion features. In addition, for the face detection failure of HOG algorithm under complex illumination, we proposed an improved Gamma image preprocessing algorithm, which effectively improved the face detection ability. We conducted experiments on the CASIA-MFSD and Replay Attack Databases. According to experiments, the DTFA-Net proposed in this paper achieved 6.9% EER on CASIA and 2.2% HTER on Replay Attack that was comparable to other methods.


2018 ◽  
Vol 18 ◽  
pp. 7381-7388
Author(s):  
Ishaan Chawla

Face recognition has become a popular topic of research recently due to increases in demand for security as well as the rapid development of mobile devices. There are many applications which face recognition can be applied to such as access control, identity verification, security systems, surveillance systems, and social media networks. Access control includes offices, computers, phones, ATMs, etc. Most of these forms currently do not use face recognition as the standard form of granting entry, but with advancing technologies in computers along with more refined algorithms, facial recognition is gaining some traction in replacing passwords and fingerprint scanners. Ever since the events of 9/11 there has been a more concerned emphasis on developing security systems to ensure the safety of innocent citizens. Namely in places such as airports and border crossings where identification verification is necessary, face recognition systems potentially have the ability to mitigate the risk and ultimately prevent future attacks from occurring. As for surveillance systems, the same point can be made if there are criminals on the loose. Surveillance cameras with face recognition abilities can aide in efforts of finding these individuals. Alternatively, these same surveillance systems can also help identify the whereabouts of missing persons, although this is dependent on robust facial recognition algorithms as well as a fully developed database of faces. And lastly, facial recognition has surfaced in social media applications on platforms such as Facebook which suggest users to tag friends who have been identified in pictures. It is clear that there are many applications the uses for facial recognition systems. In general, the steps to achieve this are the following: face detection, feature extraction, and lastly training a model.


Author(s):  
Shrey Bhagat

Abstract: Face recognition systems are used in practically every industry in this digital age. One of the most widely utilized biometrics is face recognition. It can be used for security, authentication, and identity, among other things. Despite its low accuracy relative to iris and fingerprint identification, it is extensively utilized because it is a contactless and non-invasive technique. Face recognition systems can also be used to track attendance in schools, colleges, and companies. Because the existing manual attendance system is time consuming and difficult to maintain, this system intends to create a class attendance system that employs the concept of face recognition. There’s also the possibility of proxy attendance. As a result, the demand for this system grows. Database development, face detection, face recognition, and attendance updating are the four steps of this system. The photos of the kids in class are used to generate the database. Faces are discovered and recognized from the classroom's live streaming footage. At the end of the session, the attendance will be mailed to the appropriate faculty. Keywords: Smart Attendance System, NFC, RFID, OpenCV, NumPy


2005 ◽  
Author(s):  
Eng Thiam Lim ◽  
Jiangang Wang ◽  
Wei Xie ◽  
Venkarteswarlu Ronda

2013 ◽  
Vol 753-755 ◽  
pp. 2941-2944
Author(s):  
Ming Hui Zhang ◽  
Yao Yu Zhang

Seeing that human face features are unique, an increasing number of face recognition algorithms on existing ATM are proposed. Since face detection is a primary link of face recognition, our system adopts AdaBoost algorithm which is based on face detection. Experiment results demonstrated that the computing time of face detection using this algorithm is about 70ms, and the single and multiple human faces can be effectively measured under well environment, which meets the demand of the system.


2014 ◽  
Vol 2014 ◽  
pp. 1-16 ◽  
Author(s):  
Kanokmon Rujirakul ◽  
Chakchai So-In ◽  
Banchar Arnonkijpanich

Principal component analysis or PCA has been traditionally used as one of the feature extraction techniques in face recognition systems yielding high accuracy when requiring a small number of features. However, the covariance matrix and eigenvalue decomposition stages cause high computational complexity, especially for a large database. Thus, this research presents an alternative approach utilizing an Expectation-Maximization algorithm to reduce the determinant matrix manipulation resulting in the reduction of the stages’ complexity. To improve the computational time, a novel parallel architecture was employed to utilize the benefits of parallelization of matrix computation during feature extraction and classification stages including parallel preprocessing, and their combinations, so-called a Parallel Expectation-Maximization PCA architecture. Comparing to a traditional PCA and its derivatives, the results indicate lower complexity with an insignificant difference in recognition precision leading to high speed face recognition systems, that is, the speed-up over nine and three times over PCA and Parallel PCA.


Sign in / Sign up

Export Citation Format

Share Document