2020
DOI: 10.3390/s20030785
|View full text |Cite
|
Sign up to set email alerts
|

Face Recognition at a Distance for a Stand-Alone Access Control System

Abstract: Although access control based on human face recognition has become popular in consumer applications, it still has several implementation issues before it can realize a stand-alone access control system. Owing to a lack of computational resources, lightweight and computationally efficient face recognition algorithms are required. The conventional access control systems require significant active cooperation from the users despite its non-aggressive nature. The lighting/illumination change is one of the most dif… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
20
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 42 publications
(21 citation statements)
references
References 31 publications
(48 reference statements)
0
20
0
1
Order By: Relevance
“…Considering Table 4 and several aspects of each algorithm shown in Table 5, the proposal is more suitable to be used in practical applications of additional information delivery, information security tasks [15][16][17][18][19] and other related fields [20], such as is mentioned in Section 1.…”
Section: Performance Comparison and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Considering Table 4 and several aspects of each algorithm shown in Table 5, the proposal is more suitable to be used in practical applications of additional information delivery, information security tasks [15][16][17][18][19] and other related fields [20], such as is mentioned in Section 1.…”
Section: Performance Comparison and Discussionmentioning
confidence: 99%
“…In this proposal, additional information delivery to the image content refers to the application of the general scenario of the UVW algorithms in daily life; when the endusers exhibit the QR watermark, the decoded information could be a company website, information of singers, dress designer, location or another kind of information that has or does not have relation to the image content. Additionally, it is not limited to extend the applicability to information security tasks such as medical imaging [15,16], deepfake prevention [17], 3D-video protection [18], face recognition authentication [19] and other related fields [20]. However, to obtain better results in all those applications, several drawbacks of the UVW algorithms must be improved: first, the algorithms only require large image regions with low intensity [6][7][8]14] second, embedding strategies increase histogram distortion and visual degradation of the watermarked image, impacting the legibility of the visual content and the watermark imperceptibility.…”
Section: Introductionmentioning
confidence: 99%
“…7 Using the libraries Python and OpenCV, face recognition can involve deep learning convolutional neural network (CNN) model and dynamic access control. 8 When the system recognizes a person’s face, a red square mark will appear around his or her head on the mobile phone panel to indicate the specified person.…”
Section: Related Workmentioning
confidence: 99%
“…The obtained results showed a tremendous reduction in false recognition rate, and the model with liveness detection and face recognition was able to be deployed for identity authentication. Lee et al [20] constructed a lightweight and computationally efficient model to perform face recognition for a stand-alone access control system. The proposed model was based on the framework composed of the local binary pattern (LBP) and the AdaBoost classifier.…”
Section: Related Workmentioning
confidence: 99%