Preview

Jgjhghj

Good Essays
Open Document
Open Document
3198 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Jgjhghj
УДК 681.3.01+681.327.12

http://neuroface.narod.ru

ACCESS CONTROL BY FACE RECOGNITION USING NEURAL NETWORKS*
Dmitry Bryliuk and Valery Starovoitov Institute of Engineering Cybernetics, Laboratory of Image Processing and Recognition Surganov str., 6, 220012 Minsk, BELARUS E-mail: bdv78@mail.ru, valerys@newman.bas-net.by
A Multilayer Perceptron Neural Network (NN) is considered for access control based on face image recognition. We studied robustness of NN classifiers with respect to the False Acceptance and False Rejection errors. A new thresholding approach for rejection of unauthorized persons is proposed. Ensembles of NN with different architectures were studied too. Advantages of the ensembles are shown, and the best architecture parameters are given. The explored NN architectures may be used in real-time applications.

Introduction Access control by face recognition has the following advantages in comparison with other biometrics systems. There are no requirements for expensive or specialized equipment, a system may be built using a simple video camera and a personal computer. The system is passive. There is no need to touch something by fingers or palm, no need to say any word or lean eye to a detector. Any person just may walk or stay before the camera, and the system performs recognition. It is especially useful in everyday usage. Also it has advantages in different extremal or non-standard situations, when it is impossible or inconvenient to took other biometric characteristics, for example when catching criminals. The recognition performance of a simple face recognition system is not the best in comparison with other biometric-based systems, and such a system can be relatively easy deceived. But using a face thermogram or output of an infrared camera, the system can achieve very high recognition rate and robustness to deceiving. The face thermogram is strictly individual for every person, it does not change when lighting condition are changed, and



References: 1. Pan Z., Rust A. G., Bolouri H. Image Redundancy Reduction for Neural Network Classification using Discrete Cosine Transforms // Proceedings of the IJCNN. - 2000. - Vol. 3. - P. 149-154. 2. Lawrence S., Giles C. L., Tsoi A. C., Back A. D. Face Recognition: A Convolutional Neural Network Approach // IEEE Transactions on Neural Networks, Special Issue on Neural Networks and Pattern Recognition. - 1997. - P. 124. (http://www.neci.nec.com/~lawrence). 3. Eickeler S., Muller S., Rigoll G. High performance face recognition using Pseudo 2-D Hidden Markov Models. Gerhard-Mercator-University Duisburg, Germany, 1998. - 6 p. 4. Eickeler S., Jabs M., Rigoll G. Comparison of Confidence Measures for Face Recognition. Gerhard-Mercator-University Duisburg, Germany, 1999. - 6 p. 5. A.I. Wasserman Neural Computing: Theory and Practice – New York: Van Nostrand Reinhold, 1989. 6. Golovko V., Gladyschuk V. Recirculation Neural Network Training for Image Processing // Advanced Computer Systems. - 1999. - P. 73-78. 7. Bryliuk D., Starovoitov V. Application of Recirculation Neural Network and Principal Component Analysis for Face Recognition // The 2nd International Conference on Neural Networks and Artificial Intelligence. - Minsk: BSUIR, 2001. - P.136-142.

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 4577 Words
    • 19 Pages

    When converting the biometric input, the software identifies specific points of data as match points. The match points are processed using an algorithm into a value that can be compared with biometric data in the database. The biometric feature must have the following characteristics:-(a) Universality, which means that every person should have the characteristic,(b) Uniqueness, two persons should not have the same term or measurement of Characteristic.(c) Permanence, the characteristic should be invariant with time.(d) Measurability, the characteristic can be quantified that is the origin of the Cameras used in biometric systems are generally either CCD (charge couple device) or CMOS(combined metal oxide semiconductor) image sensors. CCD is comparatively more costly than…

    • 4577 Words
    • 19 Pages
    Powerful Essays
  • Powerful Essays

    As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door.…

    • 1220 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    The subject of face recognition is as old as computer vision and both because of the practical importance of the topic and theoretical interest from cognitive science. Face recognition is not the only method of recognising other people. Even humans between each other use senses in order to recognise others. Machines have a wider range for recognition purposes, which use thinks such as fingerprints, or iris scans. Despite the fact that these methods of identification can be more accurate, face recognition has always remains a major focus of research because of its non-invasive nature and because it is people's primary method of person identification.…

    • 394 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Ch. 2 Quiz

    • 746 Words
    • 6 Pages

    3. A(n) ________ is a hardware-based security control that can identify a person by a retina scan or by mapping a facial pattern.…

    • 746 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Age invariant face recognition is a challenging problem, and one of the challenges in face recognition is to achieve temporal invariance. The face recognition system has a training stage as well as a testing stage and the system checks the test image from database. If the test image matches with the image extracted from database then the result obtained is accurate. Aging face recognition has many useful real-world applications such as finding missing children, identifying criminals based on photographs and multiple enrolment detection problems.…

    • 84 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    The new technologies of future policing provide a number of invaluable uses. Facial recognition would allow law enforcement to identify criminals in real time through facial recognition matched criminal databases, wanted posters,…

    • 673 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The comparison of at least two types of specialized databases that have an advantageous effect undergoing such development are the Automated Fingerprint Identification system (AFIS) and the facial recognition in identifying a criminal. These two specialized databases are security-based computer systems that identify and locate a person in a matter of minutes providing factual information based on the summarized data. AFIS and facial recognition are essential tools that help to provide criminal justice and law enforcement agencies with fully integrated communications system with the ability to log on to a computer system to view necessary data among criminal justice professionals, while including a comprehensive range of security safeguards in order to prevent undesirable consequences from happening. Developing the ability…

    • 1152 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Facial recognition has been very popular making it accessible to more than 18,000 law enforcement agencies. But there is much concern of the unregulated use of the software and many fear that it could lead to potential misuse of the facial recognition software. In fact law enforcement agencies get calls two to three times a month from people claiming that the cops had taken pictures of them without their consent (Williams). Which is…

    • 1207 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Technology is on an up rise, as is the act of terrorism and other various crimes. Countries such as the United States are taking many precautions to prevent these heinous crimes. One prevention technique that the United States has started using is facial recognition. The freedictionary.com website defines facial recognition as: "biometric identification by scanning a person 's face and matching it against a library of known faces," (The Free Dictionary, 2012) "they used face recognition to spot known terrorists." This paper will help one understand what facial recognition is, who uses facial recognition, and when they use it. This paper will take a look into a couple of cases where facial recognition has been used. Also, it will look into the controversies that happen with the of the facial recognition software. Facial recognition may not be on the top tier of criminal investigations, but it certainly has come a long way since its inception.…

    • 2694 Words
    • 11 Pages
    Better Essays
  • Best Essays

    Information Technology can be ably used in the detection of crime. Biometrics, product protection and closed-circuit television (CCTV) are among the elements that can be utilized.…

    • 4494 Words
    • 11 Pages
    Best Essays
  • Powerful Essays

    Nieto, M., Johnston-Dodds, K. and Simmons, C. (2002) Public and Private Applications of Video Surveillance and Biometric Technologies, Sacramento: Californian Research Bureau, http://www.library.ca.gov/crb/02/06/02-006.pdf…

    • 2698 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Image Registration Methods

    • 12479 Words
    • 50 Pages

    Department of Image Processing, Institute of Information Theory and Automation, Academy of Sciences of the Czech Republic Pod vodárenskou věžı́ 4, 182 08 Prague 8, Czech Republic…

    • 12479 Words
    • 50 Pages
    Powerful Essays
  • Powerful Essays

    Multimodal Biometrics

    • 2488 Words
    • 10 Pages

    We also propose a multi-modal biometric algorithm that further reduces the equal error rate compared to individual biometric images. The proposed approach reduces the memory size, increases the recognition…

    • 2488 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    [38] S. Lawrence, C. L. Giles, A. C. Tsoi, A. D. Back, “Face recognition: A convolutional neural-network approach”, IEEE Trans. Neural Netw. 8, 98-113, 1997.…

    • 15936 Words
    • 64 Pages
    Powerful Essays
  • Better Essays

    Preliminary Biometric System

    • 2733 Words
    • 11 Pages

    Biometric commonly implemented or studied include fingerprint, face, iris, voice, signature, and hand geometry. Many other modalities are in various stages of development and assessment. There is not one biometric modality that is best for all implementations. Many factors must be taken into account when implementing a biometric device including location, security risk, task (identification or verification), expected number of users, user circumstances, existing data, etc. it is also important to note that biometric modalities are in varying stage of maturity. For example, fingerprint recognition has been used for over a century while iris recognition is a little more than a decade old. It should be noted that maturity is not related to which technology is the best, but can an indicator of which technologies have more implementation experience.…

    • 2733 Words
    • 11 Pages
    Better Essays