Smart Surveillance System by Face Recognition and Tracking Using Machine Learning Techniques

Author(s):  
D. K. Niranjan ◽  
N. Rakesh
2020 ◽  
Vol 9 (1) ◽  
pp. 1135-1138

The smart surveillance system defines a approach to identify and recognize human faces from the surveillance videos. It is very tedious to find particular person within a video. This system gives a quick and efficient method to find the presence of a person within a surveillance video. The smart surveillance system uses various machine learning algorithms like Face Recognition and Face Detection to achieve the required results. This system can be used in many security systems to check the presence of a person in any video of the particular area.


2017 ◽  
Vol 5 ◽  
Author(s):  
Diego Montenegro Lopez ◽  
Flávio Luis de Mello ◽  
Cristina Maria Giordano Dias ◽  
Paula Almeida ◽  
Milton Araújo ◽  
...  

2012 ◽  
Vol 41 (18) ◽  
pp. 11-15 ◽  
Author(s):  
G. SuvarnaKumar ◽  
P.V.G.D. Prasad Reddy ◽  
M. Srinadh Swamy ◽  
Sumit Gupta

2018 ◽  
Vol 32 (19) ◽  
pp. 1850212 ◽  
Author(s):  
Sahil Sharma ◽  
Vijay Kumar

Face recognition is a vastly researched topic in the field of computer vision. A lot of work have been done for facial recognition in two dimensions and three dimensions. The amount of work done with face recognition invariant of image processing attacks is very limited. This paper presents a total of three classes of image processing attacks on face recognition system, namely image enhancement attacks, geometric attacks and the image noise attacks. The well-known machine learning techniques have been used to train and test the face recognition system using two different databases namely Bosphorus Database and University of Milano Bicocca three-dimensional (3D) Face Database (UMBDB). Three classes of classification models, namely discriminant analysis, support vector machine and k-nearest neighbor along with ensemble techniques have been implemented. The significance of machine learning techniques has been mentioned. The visual verification has been done with multiple image processing attacks.


Sign in / Sign up

Export Citation Format

Share Document