Preview

Jgjhghj

Good Essays
Open Document
Open Document
3198 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Jgjhghj
УДК 681.3.01+681.327.12

http://neuroface.narod.ru

ACCESS CONTROL BY FACE RECOGNITION USING NEURAL NETWORKS*
Dmitry Bryliuk and Valery Starovoitov Institute of Engineering Cybernetics, Laboratory of Image Processing and Recognition Surganov str., 6, 220012 Minsk, BELARUS E-mail: bdv78@mail.ru, valerys@newman.bas-net.by
A Multilayer Perceptron Neural Network (NN) is considered for access control based on face image recognition. We studied robustness of NN classifiers with respect to the False Acceptance and False Rejection errors. A new thresholding approach for rejection of unauthorized persons is proposed. Ensembles of NN with different architectures were studied too. Advantages of the ensembles are shown, and the best architecture parameters are given. The explored NN architectures may be used in real-time applications.

Introduction Access control by face recognition has the following advantages in comparison with other biometrics systems. There are no requirements for expensive or specialized equipment, a system may be built using a simple video camera and a personal computer. The system is passive. There is no need to touch something by fingers or palm, no need to say any word or lean eye to a detector. Any person just may walk or stay before the camera, and the system performs recognition. It is especially useful in everyday usage. Also it has advantages in different extremal or non-standard situations, when it is impossible or inconvenient to took other biometric characteristics, for example when catching criminals. The recognition performance of a simple face recognition system is not the best in comparison with other biometric-based systems, and such a system can be relatively easy deceived. But using a face thermogram or output of an infrared camera, the system can achieve very high recognition rate and robustness to deceiving. The face thermogram is strictly individual for every person, it does not change when lighting condition are changed, and



References: 1. Pan Z., Rust A. G., Bolouri H. Image Redundancy Reduction for Neural Network Classification using Discrete Cosine Transforms // Proceedings of the IJCNN. - 2000. - Vol. 3. - P. 149-154. 2. Lawrence S., Giles C. L., Tsoi A. C., Back A. D. Face Recognition: A Convolutional Neural Network Approach // IEEE Transactions on Neural Networks, Special Issue on Neural Networks and Pattern Recognition. - 1997. - P. 124. (http://www.neci.nec.com/~lawrence). 3. Eickeler S., Muller S., Rigoll G. High performance face recognition using Pseudo 2-D Hidden Markov Models. Gerhard-Mercator-University Duisburg, Germany, 1998. - 6 p. 4. Eickeler S., Jabs M., Rigoll G. Comparison of Confidence Measures for Face Recognition. Gerhard-Mercator-University Duisburg, Germany, 1999. - 6 p. 5. A.I. Wasserman Neural Computing: Theory and Practice – New York: Van Nostrand Reinhold, 1989. 6. Golovko V., Gladyschuk V. Recirculation Neural Network Training for Image Processing // Advanced Computer Systems. - 1999. - P. 73-78. 7. Bryliuk D., Starovoitov V. Application of Recirculation Neural Network and Principal Component Analysis for Face Recognition // The 2nd International Conference on Neural Networks and Artificial Intelligence. - Minsk: BSUIR, 2001. - P.136-142.

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 4577 Words
    • 19 Pages

    When converting the biometric input, the software identifies specific points of data as match points. The match points are processed using an algorithm into a value that can be compared with biometric data in the database. The biometric feature must have the following characteristics:-(a) Universality, which means that every person should have the characteristic,(b) Uniqueness, two persons should not have the same term or measurement of Characteristic.(c) Permanence, the characteristic should be invariant with time.(d) Measurability, the characteristic can be quantified that is the origin of the Cameras used in biometric systems are generally either CCD (charge couple device) or CMOS(combined metal oxide semiconductor) image sensors. CCD is comparatively more costly than…

    • 4577 Words
    • 19 Pages
    Powerful Essays
  • Powerful Essays

    As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door.…

    • 1220 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    yehudit erlbaum word 2

    • 261 Words
    • 1 Page

    A face recognition system captures a live face image and compares it with a stored image to determine if the person is a legitimate user. Some buildings use face recognition systems to secure access to rooms. Law enforcement, surveillance systems, and airports use face recognition systems to protect the public. Some mobile devices use face recognition systems to unlock the device. Face recognition systems are becoming more sophisticated and can recognize people with or without glasses, hats, facial hair, makeup, or jewelry, and with new hairstyles (Allensmith).…

    • 261 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    The subject of face recognition is as old as computer vision and both because of the practical importance of the topic and theoretical interest from cognitive science. Face recognition is not the only method of recognising other people. Even humans between each other use senses in order to recognise others. Machines have a wider range for recognition purposes, which use thinks such as fingerprints, or iris scans. Despite the fact that these methods of identification can be more accurate, face recognition has always remains a major focus of research because of its non-invasive nature and because it is people's primary method of person identification.…

    • 394 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Ch. 2 Quiz

    • 746 Words
    • 6 Pages

    3. A(n) ________ is a hardware-based security control that can identify a person by a retina scan or by mapping a facial pattern.…

    • 746 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    Biometrics technologies are becoming a revolutionary role in which we identify individuals, and protect personal and national assets. This automated process of verifying a human being based on physiological or behavioral characteristics. Biometrics is increasingly being taken into consideration in solutions to improve our Homeland Security, effectively securing the United States national borders, law enforcement, corporate offices, and congressional offices. As well as, incorporating biometrics in an effort to prevent identity when using travel document, visas and other financial transactions.…

    • 537 Words
    • 3 Pages
    Good Essays
  • Good Essays

    There is a massive disagreement in the present day concerning the biometric identification technology which is used to boost the security through travel. The research inside these technologies has been used to extend ways in how the individuals identify faces for detection and develop the similar strategy in a replicated mechanical system that will scan faces and conclude their likeness with those in a database.…

    • 990 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The new technologies of future policing provide a number of invaluable uses. Facial recognition would allow law enforcement to identify criminals in real time through facial recognition matched criminal databases, wanted posters,…

    • 673 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Age invariant face recognition is a challenging problem, and one of the challenges in face recognition is to achieve temporal invariance. The face recognition system has a training stage as well as a testing stage and the system checks the test image from database. If the test image matches with the image extracted from database then the result obtained is accurate. Aging face recognition has many useful real-world applications such as finding missing children, identifying criminals based on photographs and multiple enrolment detection problems.…

    • 84 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Facial recognition has been very popular making it accessible to more than 18,000 law enforcement agencies. But there is much concern of the unregulated use of the software and many fear that it could lead to potential misuse of the facial recognition software. In fact law enforcement agencies get calls two to three times a month from people claiming that the cops had taken pictures of them without their consent (Williams). Which is…

    • 1207 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Nieto, M., Johnston-Dodds, K. and Simmons, C. (2002) Public and Private Applications of Video Surveillance and Biometric Technologies, Sacramento: Californian Research Bureau, http://www.library.ca.gov/crb/02/06/02-006.pdf…

    • 2698 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    [15] P. Viola and M.J. Jones, “Robust Real-Time Face Detection”, International Journal of Computer Vision 57, 137-154, 2004.…

    • 15936 Words
    • 64 Pages
    Powerful Essays
  • Powerful Essays

    Multimodal Biometrics

    • 2488 Words
    • 10 Pages

    “Biometrics” means “life measurement”, but the term is usually associated with the use of unique physiological characteristics to identify an individual. One of the applications which most people associate with biometrics is security. It is an automated method of recognizing a person based on the features face, fingerprints, hand geometry, handwriting, iris, retinal, vein, voice etc. Biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions. As the level of security breaches and transaction fraud increases, the need for highly secureidentification and personal verification technologies is becoming apparent.…

    • 2488 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Image Registration Methods

    • 12479 Words
    • 50 Pages

    Department of Image Processing, Institute of Information Theory and Automation, Academy of Sciences of the Czech Republic Pod vodárenskou věžı́ 4, 182 08 Prague 8, Czech Republic…

    • 12479 Words
    • 50 Pages
    Powerful Essays
  • Better Essays

    Preliminary Biometric System

    • 2733 Words
    • 11 Pages

    Biometric commonly implemented or studied include fingerprint, face, iris, voice, signature, and hand geometry. Many other modalities are in various stages of development and assessment. There is not one biometric modality that is best for all implementations. Many factors must be taken into account when implementing a biometric device including location, security risk, task (identification or verification), expected number of users, user circumstances, existing data, etc. it is also important to note that biometric modalities are in varying stage of maturity. For example, fingerprint recognition has been used for over a century while iris recognition is a little more than a decade old. It should be noted that maturity is not related to which technology is the best, but can an indicator of which technologies have more implementation experience.…

    • 2733 Words
    • 11 Pages
    Better Essays