FACE-RECOGNITION BASED SECURITY SYSTEM USING DEEP LEARNING

Authors:

Dadi Ramesh,Yerrolla Chanti,Syed Nawaz Pasha,Mohammad Sallauddin,

DOI NO:

https://doi.org/10.26782/jmcms.2020.08.00041

Keywords:

Security,deep learning,neural network,authentication,

Abstract

Now days, Security plays an important role in day-to-day life.  The use of the internet in human life has become the day to day activity and with the internet the use of automation devices has increased. All transaction needs to secure authentication to complete. Hence, we have introduced a Face Recognition method. It can apply in many fields such as to authenticate users, security issues etc., It mainly plays a significant role in real time surveillance systems. We implemented the Convolution neuron network to automatically create dataset and recognition with the graphical user interface. Before creating a dataset the system takes permission from the user then it creates the dataset and trains the model for farther authentication.

Refference:

I E. I. Abbas, M. E. Safi And K. S. Rijab, “Face Recognition Rate Using Different Classifier Methods Based On Pca,” 2017 International Conference On Current Research In Computer Science And Information Technology (Iccit), Slemani, 2017, Pp. 37-40, Doi: 10.1109/Crcsit.2017.7965559.

II H.-W. Ng, S. Winkler. A Data-Driven Approach to Cleaning Large Face Datasets. Proc. Ieee International Conference on Image Processing (Icip), Paris, France, Oct. 27-30, 2014.

III M. R. Reshma and B. Kannan, “Approaches On Partial Face Recognition: A Literature Review,” 2019 3rd International Conference on Trends In Electronics And Informatics (Icoei), Tirunelveli, India, 2019, Pp. 538-544, Doi: 10.1109/Icoei.2019.8862783.

IV O. M. Parkhi, A.Vedaldi, A. Zisserman Deep Face Recognition British Machine Vision Conference, 2015.

V Praveen P., Rama B(2020). “An Optimized Clustering Method To Create Clusters Efficiently” Journal Of Mechanics Of Continua And Mathematical Sciences, ISSN (Online): 2454 -7190 Vol.-15, No.-1, January (2020) pp 339-348 ISSN (Print) 0973-8975,https://doi.org/10.26782/jmcms.2020.01.00027 .

VI P.Kumara Swamy, Dr.C.V.Guru Rao, Dr.V.Janaki, “Functioning Of Secure Key Authentication Scheme In” In International Journal Of Pure And Applied Mathemat, Volume 118, Issue 14, Page No(S) 27 – 32, MAR. 2018, [ISSN(Print):1314-3395].

VII R. Prema and P. Shanmugapriya, “A Review: Face Recognition Techniques For Differentiate Similar Faces and Twin Faces,” 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (Icecds), Chennai, 2017, Pp. 2899-2902, Doi: 10.1109/Icecds.2017.8389985.

VIII Sharmila, Raman Sharma, Dhanajay Kumar, Vaishali Puranik, Kritika Gautham,”Performance Analysis Of Human Face Recognition Techniques” In 2019 Ieee

IX Sharma, Sudha and Soni, Alpesh and Malviya, Vijay, Face Recognition Based On Convolution Neural Network (Cnn) Applications in Image Processing: A Survey (April 15, 2019). Proceedings of Recent Advances in Interdisciplinary Trends in Engineering & Applications (Raitea) 2019.

X Surface[3D] Measurement Through Easy-Snap Phase Shift Fringe Projection.” Springerprofessional.De,Https://Www.Springerprofessional.De/En/3d-Surface-Measurement-Through-Easy-Snap-Phase-Shift-Fringe-Proj/15447362. Accessed 26 Mar. 2020.

XI Sallauddin Md Et. “A Comprehensive Study on Traditional Ai and Ann Architecture.” International Journal of Advanced Science and Technology, Vol. 28, No. 17, Dec. 2019, Pp. 479–87.

XII Yerrolla Chanti, Kothanda Raman, K. Seenanaik, Dandugudum Mahesh, B.Bhaskar” An Enhanced On Bidirectional LI-FI Attocell Access Point Slicing and Virtualization Using Das2 Conspire” International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-8, Issue-2S3, July 2019.

XIII Yerrolla Chanti, Dr. K. Seena Naik2, Rajesh Mothe3, Nagendar Yamsani4, Swathi Balija5” A Modified Elliptic Curve Cryptography Technique For Securing Wireless Sensor Networks” International Journal Of Engineering &Technology 2018.

View Download