scholarly journals Can a spontaneous smile invalidate facial identification by photo-anthropometry?

2021 ◽  
Vol 51 ◽  
Author(s):  
Paulo Henrique Viana Pinto ◽  
Caio Henrique Pinke Rodrigues ◽  
Juliana Rodrigues Rozatto ◽  
Ana Maria Bettoni Rodrigues da Silva ◽  
Aline Thais Bruni ◽  
...  
2007 ◽  
Author(s):  
Ronald G. Driggers ◽  
Steve Moyer ◽  
Keith Krapels ◽  
Lou Larsen ◽  
Jonathan Fanning ◽  
...  

Author(s):  
Raden Andy Kurniawan ◽  
Umar Zaky

The current development of microcontroller technology can be used to build a presence system for employees. The employee attendance system uses radio frequency identification and facial identification which is designed and built to make it easier to do attendance data recording, so that the data obtained can be precise and accurate. Data collection techniques, namely by interview and observation. The application development process uses the PHP and Python programming languages ​​with Visual Studio Code software applications, Arduino Uno, MySQL software as a database server, and XAMPP as a support. The input used in this system is the employee's personal data and the results of employee face data retrieval which are stored in the .jpg format. The faces taken were taken from 4 people where each face was taken 20 face samples. The results are in the form of web and applications that will provide solutions to existing problems. The conclusion of this application makes it easy to do the recording and attendance, and minimize the fraud committed by employees. Retrieval of face data was taken as much as 20 data with the highest level of accuracy was 87% when the presence test was carried out.


Biometrics provides greater security and usability than conventional personal authentication methods. Fingerprints, facial identification systems and voice recognition systems are the features that biometric systems can use. To improve biometric authentication, the proposed method considered that the input image is iris and fingerprint; at first, pre-processing is performed through histogram equalization for all image inputs to enhance the image quality. Then the extraction process of the feature will be performed. The suggested method uses modified Local Binary Pattern (MLBP), GLCM with orientation transformation, and DWT features next to the extracted features to be combined for feature extraction. Then the optimum function is found with the Rider Optimization Algorithm (ROA) for all MLBP, GLCM and DWT. Eventually, the approach suggested is accepted. Deep Neural Network (DNN) performs the proposed authentication process. A DNN is a multilayered artificial neural network between the layers of input and output. The DNN finds the right mathematical manipulation to turn the input into the output, whether it is an acknowledged image or not. Suggested process quality is measured in terms of reliability recognition. In the MATLAB platform, the suggested approach is implemented.


2015 ◽  
pp. 323-347 ◽  
Author(s):  
Tim Valentine ◽  
Josh P. Davis

2004 ◽  
Vol 169 (3) ◽  
pp. 227-229
Author(s):  
Aysun Baransel ◽  
H. Ergin Dulger ◽  
Yıldırım A. Bayazıt

1996 ◽  
Vol 108 (4) ◽  
pp. 194-200 ◽  
Author(s):  
A. W. Shahrom ◽  
P. Vanezis ◽  
R. C. Chapman ◽  
A. Gonzales ◽  
C. Blenkinsop ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document