2020
DOI: 10.3390/app10030852
|View full text |Cite
|
Sign up to set email alerts
|

A New Face Recognition Method for Intelligent Security

Abstract: With the advent of the era of artificial intelligence and big data, intelligent security robots not only improve the efficiency of the traditional intelligent security industry but also propose higher requirements for intelligent security. Aiming to solve the problem of long recognition time and high equipment cost of intelligent security robots, we propose a new face recognition method for intelligent security in this paper. We use the Goldstein branching method for phase unwrapping, which can improve the thr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 30 publications
0
5
0
Order By: Relevance
“…Recently, many researchers have demonstrated the reliability of their face recognition models in identifying peoples' identities. These models can be applied to a range of real-world scenarios, such as security checks and monitoring, gated access control, verification of proper face-mask usage, and identification of masked faces [6][7][8][9][10]. While executing these programs on high-performance-computing (HPC) devices poses no issue, they often encounter limited computational resources.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, many researchers have demonstrated the reliability of their face recognition models in identifying peoples' identities. These models can be applied to a range of real-world scenarios, such as security checks and monitoring, gated access control, verification of proper face-mask usage, and identification of masked faces [6][7][8][9][10]. While executing these programs on high-performance-computing (HPC) devices poses no issue, they often encounter limited computational resources.…”
Section: Related Workmentioning
confidence: 99%
“…Built-in video cameras, particularly front-facing digital cameras, are now more common in mobile phones. Facial biometric authentication has become very popular compared to the optical fingerprint recognition component in cell phones, such as in the approach of [49,50]. The works related to e-wallets and their findings are shown in Table 1.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Three-dimensional (3D) face recognition is another branch of face recognition techniques for overcoming issues arising from ambient light, background, and shooting angle. Supported by auxiliary 3D face images and 3D imaging technologies, more accurate results can be obtained [21][22][23][24]. However, the requirements of computational power and equipment increase heavily and become highly dominant.…”
Section: Related Workmentioning
confidence: 99%