Visitors Authentication Using Face Recognition
Visitors Authentication Using Face Recognition
Visitors Authentication Using Face Recognition
ABSTRACT Recently, image recognition technology using deep learning has improved significantly, and
security systems and home services that use biometric information such as fingerprints, iris scans, and face
recognition are attracting attention. In particular, user authentication methods that utilize face recognition
have been studied at length. This study presents a visitor authentication technology that uses CCTV with a
Jetson Nano and webcam. In the preprocessing phase for face recognition, face data with 7 features that can
be identified as a person are collected using CCTV. The collected dataset goes through the annotation process
to classify the data, and facial features are detected using deep learning. If there are four or more detected
features, the image data is determined to be a person, and the visitor’s face is matched with stored user data
in detail using 81 feature vectors. Additionally, the security of the access control system was enhanced by
implementing logging functions such as recording the face of the visitor, the number of visitors, and the
time of the visit. This paper implements a visitor authentication system using a Jetson Nano and evaluates
performance by analyzing the accuracy and detection speed of the system. The tiny-YOLOv3 in the Jetson
Nano was effective in real-time verification for the real-time face authentication system with an average
detection speed of 6.5 FPS and 86.3% accuracy. Through this study, we designed a system based on deep
learning technology that recognizes and authenticates the face of a user during the visitor access process and
controls user access.
INDEX TERMS Face recognition, deep learning, visitor authentication, security, YOLO, Jetson nano.
I. INTRODUCTION user. So, it is often used for the purpose of crime prevention,
As the need for security spreads around the world, many facility safety, and fire detection. Currently, there has been
smart home services using CCTV (Closed-circuit Televi- researches about Fire Detection or weapon detection using
sion) are being installed and operated [1]. According to a CCTV applying deep learning technique such as CNN [2],
report by the global statistics site Statista (Fig. 1), the global [3], [4].
smart home security market is expected to increase from In particular, CCTV in smart home services has the
$9,903 million in 2017 to $35,619 million in 2024, with its additional functions of automatically applying user access
compound annual growth rate (CAGR) increasing by 20.1%. controls, automatically searching the surroundings at a deter-
CCTV can record the situation outside a building or in mined time, tracking a target, and increasing image resolu-
the absence of people and transmit this information to the tion. As artificial intelligence (AI) has developed, systems
that have introduced intelligent object recognition technology
The associate editor coordinating the review of this manuscript and have been continuously studied. However, most commercial
approving it for publication was Michele Nappi . CCTV systems are focused on simple functions, so it is
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
124604 VOLUME 10, 2022
H.-J. Mun, M.-H. Lee: Design for Visitor Authentication Based on Face Recognition Technology Using CCTV
computing power. But, the faster R-CNN model introduced eyebrows, nose, mouth, and chin can be analyzed to extract
another region proposal network (RPN) to solve the problem characteristic information. The extracted feature information
of inefficiency in learning and running time. is compared with the facial feature information stored in
the database in order to recognize the face and confirm the
2) OBJECT DETECTION TECHNOLOGY IN A REAL-TIME identity of the user.
ENVIRONMENT The video security market was able to detect objects with
The R-CNN-based deep learning model extracts and classi- motion analysis and rule-based pattern analysis by early
fies features from the proposed region. Since the detection 2010, but false positives were frequent with an error percent-
and recognition processes have to be individually trained, age of 28.2%. But with the development of deep learning
the problem exists that the computation speed is slow and technology, a breakthrough improvement was made, reducing
optimization is difficult. YOLO is a model that integrates the error rate from 18.4% in 2012 to 3.57% in 2015. Addi-
object detection and recognition into one system to improve tionally, the accuracy of face recognition increased by about
the shortcomings of the R-CNN model. The input image is 95%.
divided into a grid, and each grid cell calculates whether In general, CNN-based deep learning models are used to
the object exists within it and the confidence score for the detect faces and apply them to face recognition systems.
object’s existence. Then, the reliability of the object detection Included among these are face mask detection systems for
is calculated and the object in the area is recognized. Since preventing the spread of infectious diseases and restricting
this model is faster than the R-CNN model, it can be applied access [26], age estimation studies on face images, with
to the security and authentication system used in real-time various neural network algorithms applied, for use in intelli-
environments to detect objects quickly and easily. Beginning gent security, financial transactions, and so on [27], criminal
with YOLOv1, the YOLO model was extended to YOLOv4 to identification using MTCNN algorithm research [28], and
compensate for the low object detection accuracy compared face recognition in smart door lock systems [29]. All of these
to the fast detection speed and to detect more classes. As the are being researched to apply to various intelligent security
version number increased and performance improved, it was systems.
necessary to reduce the computational complexity by simpli-
fying the network layer for real-time detection in a low-spec C. ACCESS CONTROL SYSTEM
system environment. Accordingly, Tiny-YOLO was devised An access control system, a type of physical security, is used
as a model for low-spec real-time object detection. in many places to block unauthorized users from entering,
YOLOv3 uses Darknet-53 as the backbone network. such as buildings or offices.
By applying the Feature Pyramid Network (FPN) concept, A representative example of this is shown in the method
each object is detected by feature maps at three scales created of controlling the entrance and exit of a car to a parking lot.
in the process of passing the image through each neural net- A camera is used to recognize a car’s license plate number
work. In order to detect small objects, an object is detected by and then check whether it is registered in the system, or an
increasing the size of the feature map by upscaling it. Three RFID-based smart card system is used. This RFID-based
Anchor boxes will be generated for each scale, and a total of contactless smart card is attached to the windshield of the
nine Anchor boxes will be selected. Fig. 3 shows the structure car and used to determine whether car access is permitted.
of the YOLOv3 model [19], [20], [21]. Tiny-YOLOv3 is a Convenience is guaranteed and for easy authentication, the
model with the YOLOv3 structure that reduces computing same contactless smart card access is possible even inside the
resources and increases speed through the simplification of building when entering the office. In the case of contactless
the Convolutional and Pooling processes. Tiny-YOLOv3 is smart cards, a security algorithm is applied, so it is safe from
less accurate than the YOLOv3 model, but it is faster and can illegal copying or hacking without the encryption algorithm,
be used in a limited detection environment [22], [23], [24]. special key, and mutual authentication. Smart door locks
In order to be applied to an actual industrial field, even are widely used to control access by entering passwords in
if the accuracy of its performance is somewhat low, it is apartments or houses. But with the development of biometric
necessary to reduce the cost of processing the data with authentication technology, authentication with a user’s fin-
higher speeds and multiprocessing. Therefore, for real-time gerprint, or iris recognition with a camera, the service for
application in the proposed system, it is appropriate to use controlling access by confirming that the user is registered
Tiny-YOLO, which has a high processing speed, even if the has become commonplace. Recently, various methods have
accuracy is somewhat low [25]. also been developed to control access to prevent the spread
of infectious diseases (Fig. 4).
3) SECURITY SERVICE WITH FACE RECOGNITION Additional research is now being conducted to confirm
TECHNOLOGY APPLIED the approach of a user with the PIR proximity sensor, or to
Face recognition technology is a technology that scans recognize the user’s voice with a microphone, and identify the
and recognizes face shapes and thermograms with thermal user with additional authentication methods such as questions
infrared rays. After taking a picture of the face with a camera, and answers [30]. Face recognition technology using deep
either 68 or 81 key points on areas such as the eyes and learning is being used for user authentication by recognizing
Algorithm 1 Visitor Authentication Based on Face Recogni- and if the visitor is a family member, the door lock password
tion is pressed.
Let be PIR in operation: Recognizing visitor by PIR sensor. 2. If the visitor is a guest or family member, the system
Let be CCTV in operation: take visitor’s picture by CCTV checks the visitor. In order to check the visitor’s face, the
model finds a region of the face to recognize the face. How-
01: while System running do ever, if it cannot detect that face region, the face will not
02: if front door waiting time > Threshold then be detected, and the system will output the message ‘‘Please
03: Guest is VIsitor come closer’’ or deliver that message through the speaker.
04: else 3. If the region of the face of the visitor is found, then the
05: Guest is passer-by face image of the visitor is stored.
06: goto line 01 [Step of face recognition]
07: end if 1. Recognize a face in the CCTV image.
2. If a face is not recognized, check whether a mask is worn,
08: while Visitor’s face non-detection do and if the face is not recognized due to a mask, output the
09: Alarm(‘‘Please come closer’’) message ‘‘Please pull down your mask’’ or deliver it through
10: end while the speaker.
11: Save(photo of Visitor) 3. If a mask is not worn, move to the step of finding the
face region again and take a picture of it again.
12: if Visitor’s face recognition then 4. If the face is now recognized, check whether it is a family
13: if Visitor is Family then member stored in the database.
14: Open the Door [Steps for post-authentication process]
15: else 1. If the visitor is a registered family member, authenticate
16: Alarm(‘‘Who are you?’’) them through simple authentication and automatically open
17: end if the front door.
18: else 2. In the case of a guest, the face image of the visitor is
19: if mask wearerthen delivered to the manager. The manager may then open the
20: Alarm(‘‘Please take down your mask’’) front door after confirmation. If the system fails to recognize
21: goto line 11 a face registered in advance, the door lock password may be
22: else entered to authenticate the visitor and then open the front
23: gotoline 08 door. In the proposed system, the door lock is a device
24: end if that inputs the password through a touchpad and opens the
25: end while front door when the correct password, which was stored in
advance, is input. The front door lock system authenticates
visitors when the password entered as a number string on the
touchpad matches the password stored in advance.
door, or a courier delivering goods. Only after the visitor Fig. 11 is a chart that shows the process of checking how
is standing at the front door for a certain period of time many visitors are at the front door. In this way, it is possible
within range of the proximity sensor is the visitor recog- to confirm how many visitors there are. This function is
nized. The system then wakes up from the standby state and necessary to ensure that when a visitor enters a password into
operates. the door lock, no one is peeking from behind. The proposed
2. The system takes a picture of the visitor with the system can identify the number of visitors through CCTV
CCTV camera to recognize the visitor, and detects the face and protect against peeking, which is a social engineering
of the visitor based on the learning model trained by deep attack [31].
learning. Algorithm 2 is the pseudo-code that figures out the number
3. After the system detects the face, it takes a picture with of visitors in front of the main door in Fig. 11
the center of the face and stores it in the system. This is stored When face detection fails to authenticate a family member,
for the purpose of collecting information about suspicious the proposed method requires an additional authentication.
people. This is not a problem if there is only one visitor, but if
[Step of visitor decision] there are multiple visitors or passing people, the password
1. The visitor may be a courier who leaves a delivery at may be exposed. In other words, determining the number
the front door, or a guest coming into the house. If the visitor of visitors helps to avoid shoulder surfing. If the num-
is a family member or a guest who wants to enter the house, ber of visitors detected by video through CCTV is two
they can ring the doorbell or enter the door lock password. or more, it senses shoulder surfing from behind. It deter-
The system checks whether the visitor is a member of the mines whether or not a visitor is shoulder surfing based
business or a visitor based on how long the person waits at on his or her position, face size, and the focus of an eye
the front door. If the visitor is a guest, the doorbell is pressed, from behind. If the shoulder surfing attack is detected,
FIGURE 12. Flow charts to detect faces and authenticate family members at the front door.
TABLE 3. FAR and FRR of HoG according to decision threshold. Algorithm 3 Part of the Source Code for Visitor Authentica-
tion Using Deep Learning
Let be detector = dlib.get_frontal_face_detector()
Let be sp = dlib.shape_predictor(’face_landmarks.dat’)
recognition_v1.dat’)
02: def find_faces(img): ∼ #function definition
chin line, and eyebrows. For user authentication, the faces 03: def encode_faces(img, shapes): ∼ #function definition
of registered members or family members are stored in the 04: webcam = cv2.VideoCapture(0)
database in advance. The vector values of the feature points in ∼
the family member’s face images are stored in the familyTbl 05: while webcam.isOpened():
table in the database. This method extracts the vector values 06: rects, shapes, _ = find_faces(img)
of feature points in the visitor’s face image and compares 07: descriptors = encode_faces(img, shapes)
those with the vector values of the feature points of family 08: fig, ax = plt.subplots(1, figsize=(10, 10))
members stored in familyTbl. When the threshold value is 09: for i, desc in enumerate(descriptors):
within the authentication range, authentication is performed. 10: if min_dist < threshold: # authentication
So, if a visitor’s face is very similar to a registered family ∼
member’s face, it may be recognized as a family member. 11: ax.add_patch(rect)
That is, there is a False Acceptance Rate (FAR). In addition, ∼
despite being a family member, a False Rejection Rate (FRR) 12: plt.show()
may occur when a face is obscured by a mask, glasses,
or other facial covering and some of the vector values of
feature points are distorted. Table 3 shows the evaluation indi-
cators, FAR, FRR, and Precision according to the threshold from the family photo. It is the source code that extracts the
of similarity in the HoG algorithm using Dlib [31]. feature in the video image collected by the webcam when a
Thus, because there is FRR and FAR, additional authenti- visitor is waiting at the main door and confirms if the image
cation methods are required. is the same person by comparing the vector value of the
Algorithm 3 is part of Python code that extracts 81 facial previously saved feature of the family to the extracted vector
features. It uses the Dlib library to extract and save features value.
FIGURE 16. Screen that detected the faces of three visitors at the front
door.
TABLE 6. Performance Comparison.
that of YOLOv3 in the Jetson Nano system board, which can various algorithms that have improved and developed CNNs
stand alone due to the characteristics of the suggested system. capable of image processing have been proposed.
In this paper, we introduce various object detection algo-
B. EVALUATION OF ANALYSIS OF SECURITY FIELD
rithms including CNN. CCTV detects the face of a visitor
The requirements mentioned in the introduction are satisfied and then recognizes 81 feature points in the face to create a
as follows. set of vector values based on the features. Members of the
First, the proposed model can be used to identify the num- family are registered in advance with face images. In this
ber of visitors based on faces found with CCTV. If the number study, we designed and implemented a system that opens the
of people decreases after a certain period of time, it is judged front door after recognizing a new visitor as a member of the
to be a passerby. Otherwise, it is judged to be a visitor or an family when the difference in recognized facial feature vector
intruder. values between the CCTV image and the image stored in the
Second, if the visitor at the front touches the password for database is smaller than the threshold.
user authentication, the person behind the visitor can peek at The proposed model was applied to a microprocessor that
it. So, it is necessary to check whether the visitor standing is portable and operates various sensors and the system was
behind the front person is a family member or a companion. tested. Although the system was applied to two representative
If the companion’s face is perceived to be approaching the microprocessors, the Raspberry Pi and the Jetson Nano, it was
door, or if the CCTV recognizes that the eyes of the visitor difficult to apply in real life because the operation was very
are trying to steal the password, it outputs a message to the slow and the desired result was not obtained in the cheap and
front visitor on the display warning them of this. In other widely used Raspberry Pi. However, the desired result was
words, if the visitor standing behind is judged to be peeking, derived from the Jackson Nano with a built-in GPU.
the visitor standing in front receives a ‘‘Your password is too Specifically, in the proposed model, YOLOv3’s inference
short’’ message when entering a registered password. time was 2.4 FPS with an accuracy of 90.3%, and Tiny-
Third, family members are registered in advance. It learns YOLOv3’s inference time was 6.5 FPS with an accuracy of
from the registered photos, determines whether a face has 86.3%.
been registered in advance from the video image entered into Future studies include the development and research of a
the CCTV, and authenticates the visitor. system that recognizes faces when controlling access to shops
When authentication is performed, a probabilistically cal- or restaurants, automatically registers frequent visitors, iden-
culated result is derived by comparing the CCTV image with tifies the number of visitors, stores visiting records, and con-
a previously registered face. If the calculated result is higher trols access according to visitors. In addition, it is necessary
than the threshold, primary authentication is performed, but if to develop an access authentication system that can enable
it is not 1, secondary authentication is required because incor- easy access with face recognition rather than fingerprints or
rect authentication may occur. There are various secondary passwords, and has a low false detection rate.
authentication methods, but in this study, secondary authenti-
cation can be performed by entering a short password. When
REFERENCES
this authentication is completed, the door is opened.
[1] T.-H. Tsai, C.-C. Huang, C.-H. Chang, and M. A. Hussain, ‘‘Design of
Fourth, the image taken by CCTV in the proposed model
wireless vision sensor network for smart home,’’ IEEE Access, vol. 8,
can be transmitted to the manager’s phone through the smart pp. 60455–60467, 2020, doi: 10.1109/ACCESS.2020.2982438.
home service. The manager can detect intruders by checking [2] K. Muhammad, J. Ahmad, I. Mehmood, S. Rho, and S. W. Baik,
the image. If password authentication fails or a family mem- ‘‘Convolutional neural networks based fire detection in surveillance
videos,’’ IEEE Access, vol. 6, pp. 18174–18183, 2018, doi:
ber’s visit is not registered, the visitor cannot enter the house 10.1109/ACCESS.2018.2812835.
with authentication. [3] M. T. Bhatti, M. G. Khan, M. Aslam, and M. J. Fiaz, ‘‘Weapon detection
In this case, it checks the visitor with a smartphone and in real-time CCTV videos using deep learning,’’ IEEE Access, vol. 9,
pp. 34366–34382, 2021, doi: 10.1109/ACCESS.2021.3059170.
opens the door remotely. The result of the proposed method
[4] A. Krizhevsky, I. Sutskever, and G. E. Hinton, ‘‘ImageNet classification
is that the important image is stored on the server and the with deep convolutional neural networks,’’ in Proc. Adv. Neural Inf. Pro-
authenticated visitor’s name is stored in a log file. This log cess. Syst., 2012, pp. 1097–1105.
file can also provide additional services when family mem- [5] J. Redmon, S. Divvala, R. Girshick, and A. Farhadi, ‘‘You only look once:
Unified, real-time object detection,’’ in Proc. IEEE Conf. Comput. Vis.
bers return home, access information, access pattern analysis, Pattern Recognit. (CVPR), May 2016, pp. 779–788. [Online]. Available:
or have a long absence. https://www.cv-foundation.org/openaccess/content_cvpr_2016/papers/
Redmon_You_Only_Look_CVPR_2016_paper.pdf
VII. CONCLUSION [6] S. W. Shah and S. S. Kanhere, ‘‘Recent trends in user authentication—
Deep learning, a major technology of artificial intelligence, A survey,’’ IEEE Access, vol. 7, pp. 112505–112519, 2019, doi:
10.1109/ACCESS.2019.2932400.
is growing rapidly as it is applied to voice recognition and [7] K. M. Renuka, S. Kumari, D. Zhao, and L. Li, ‘‘Design of a secure
image recognition. In particular, deep learning technology password-based authentication scheme for M2M networks in IoT enabled
in the field of image recognition is being applied as a core cyber-physical systems,’’ IEEE Access, vol. 7, pp. 51014–51027, 2019,
doi: 10.1109/ACCESS.2019.2908499.
technology to autonomous driving and crime prevention mon-
[8] H.-J. Mun, ‘‘Biometric Information and OTP based on authentication
itoring systems, which are emerging as future industries. mechanism using blockchain,’’ J. Converg. Inf. Technol., vol. 8, no. 3,
As for deep learning models in the field of image recognition, pp. 85–90, 2018, doi: 10.22156/CS4SMB.2018.8.3.085.
[9] A. Mohammed Ali and A. Kadhim Farhan, ‘‘A novel improvement with an [26] D. R. Shenvi and K. Shet, ‘‘CNN based COVID-19 prevention system,’’ in
effective expansion to enhance the MD5 hash function for verification of Proc. Int. Conf. Artif. Intell. Smart Syst. (ICAIS), Mar. 2021, pp. 873–878,
a secure E-Document,’’ IEEE Access, vol. 8, pp. 80290–80304, 2020, doi: doi: 10.1109/ICAIS50930.2021.9396004.
10.1109/ACCESS.2020.2989050. [27] S. Han, ‘‘Age estimation from face images based on deep learning,’’ in
[10] H.-J. Mun, S. Hong, and J. Shin, ‘‘A novel secure and efficient hash func- Proc. Int. Conf. Comput. Data Sci. (CDS), Stanford, CA, USA, Aug. 2020,
tion with extra padding against rainbow table attacks,’’ Cluster Comput., pp. 288–292, doi: 10.1109/CDS49703.2020.00063.
vol. 21, no. 1, pp. 1161–1173, Mar. 2018, doi: 10.1007/s10586-017-0886- [28] Q. Guo, Z. Wang, C. Wang, and D. Cui, ‘‘Multi-face detection algo-
4. rithm suitable for video surveillance,’’ in Proc. Int. Conf. Comput. Vis.,
[11] J. Shin, Z. Liu, C. M. Kim, and H.-J. Mun, ‘‘Writer identification using Image Deep Learn. (CVIDL), Chongqing, China, Jul. 2020, pp. 27–33, doi:
intra-stroke and inter-stroke information for security enhancements in 10.1109/CVIDL51233.2020.00013.
P2P systems,’’ Peer-to-Peer Netw. Appl., vol. 11, no. 6, pp. 1166–1175, [29] M. Waseem, S. A. Khowaja, R. K. Ayyasamy, and F. Bashir, ‘‘Face
Nov. 2018, doi: 10.1007/s12083-017-0606-0. recognition for smart door lock system using hierarchical network,’’ in
[12] Science, ICT & Technology Trends. (Aug. 2019). Spreading Proc. Int. Conf. Comput. Intell. (ICCI), Seri Iskandar, Malaysia, Oct. 2020,
the Introduction of Facial Recognition and Seeking Ways to pp. 51–56, doi: 10.1109/ICCI51257.2020.9247836.
Revitalize it in Korea. [Online]. Available: http://www.itfind.or.kr/ [30] H.-J. Mun and K.-H. Han, ‘‘Design for access control system
admin/getFile.htm?identifier=02-001-190725-000007 based on voice recognition for infectious disease prevention,’’
[13] H. Li, J. Hu, J. Yu, N. Yu, and Q. Wu, ‘‘UFaceNet: Research on multi- J. Korea Converg. Soc., vol. 11, no. 7, pp. 19–24, Jul. 2020, doi:
task face recognition algorithm based on CNN,’’ Algorithms, vol. 14, no. 9, 10.15207/JKCS.2020.11.7.019.
p. 268, Sep. 2021, doi: 10.3390/a14090268. [31] M. Alsawwaf, Z. Chaczko, M. Kulbacki, and N. Sarathy, ‘‘In your face:
[14] L. L. Chambino, J. S. Silva, and A. Bernardino, ‘‘Multispectral facial Person identification through ratios and distances between facial features,’’
recognition: A review,’’ IEEE Access, vol. 8, pp. 207871–207883, 2020, Vietnam J. Comput. Sci., vol. 9, no. 2, pp. 187–202, May 2022, doi:
doi: 10.1109/ACCESS.2020.3037451. 10.1142/S2196888822500105.
[15] K. Kim, B. Lee, and J. W. Kim, ‘‘Feasibility of deep learning algorithms
for binary classification problems,’’ J. Intell. Inf. Syst., vol. 23, no. 1,
pp. 95–108, Mar. 2017, doi: 10.13088/jiis.2017.23.1.095.
[16] R. Girshick, J. Donahue, T. Darrell, and J. Malik, ‘‘Rich feature hierarchies HYUNG-JIN MUN received the B.S. and mas-
for accurate object detection and semantic segmentation,’’ in Proc. IEEE ter’s degrees in mathematics from Chungnam
Conf. Comput. Vis. Pattern Recognit., Jun. 2014, pp. 580–587. National University, South Korea, in 1996 and
[17] R. Girshick, ‘‘Fast R-CNN,’’ in Proc. IEEE Int. Conf. Comput. Vis. (ICCV), 2002, respectively, and the Ph.D. degree in com-
Dec. 2015, pp. 1440–1448.
puter science from Chungbuk National University,
[18] S. Ren, K. He, R. Girshick, and J. Sun, ‘‘Faster R-CNN: Towards real-
time object detection with region proposal networks,’’ IEEE Trans. Pattern
in 2008. He was an Assistant Professor and an
Anal. Mach. Intell., vol. 39, no. 6, pp. 1137–1149, Jun. 2016. Associate Professor at Yanbian University Sci-
[19] M. Lee, and H. Mun, ‘‘Comparison analysis and case study for deep ence and Technology, China, in 2009 and 2010,
learning-based object detection algorithm,’’ Int. J. Adv. Sci. Converg., respectively. Currently, he is an Assistant Profes-
vol. 2, no. 4, pp. 7–16, Dec. 2020, doi: 10.22662/IJASC.2020.2.4.007. sor with Sungkyul University. His research inter-
[20] H. Chen, Z. He, B. Shi, and T. Zhong, ‘‘Research on recognition method ests include personal privacy, user authentication, network security, AI, and
of electrical components based on YOLO v3,’’ IEEE Access, vol. 7, blockchain technology.
pp. 157818–157829, 2019, doi: 10.1109/ACCESS.2019.2950053.
[21] X. Jiang, T. Gao, Z. Zhu, and Y. Zhao, ‘‘Real-time face mask detection
method based on YOLOv3,’’ Electronics, vol. 10, no. 7, p. 837, Jan. 2021,
doi: 10.3390/electronics10070837. MIN-HYE LEE received the B.S. degree in
[22] M.-H. Lee, J.-Y. Kang, and S.-J. Lim, ‘‘Design of YOLO-based removable computer information engineering from Kunsan
system for pet monitoring,’’ J. Korea Inst. Inf. Commun. Eng., vol. 24, no. 1, National University, South Korea, in 2006 and
pp. 22–27, Jan. 2020, doi: 10.6109/jkiice.2020.24.1.22. 2010, and the master’s and Ph.D. degrees in elec-
[23] J. Redmon and A. Farhadi, ‘‘YOLOv3: An incremental improvement,’’
tronic engineering from Wonkwang University,
2018, arXiv:1804.02767.
[24] W. Fang, L. Wang, and P. Ren, ‘‘Tinier-YOLO: A real-time object
in 2012 and 2018, respectively. She was a Post-
detection method for constrained environments,’’ IEEE Access, vol. 8, doctoral Associate at Kunsan National University,
pp. 1935–1944, 2020, doi: 10.1109/ACCESS.2019.2961959. in 2019. Currently, she is an Assistant Professor
[25] K. M. Lee, H. Song, J. W. Kim, and C. H. Lin, ‘‘Balanced performance with Wonkwang University. Her research inter-
for efficient small object detection YOLOv3-tiny,’’ in Proc. Korean Soc. ests include image processing and AI, biomedical
Broadcast Eng. Conf. Anseong, South Korea: The Korean Institute of engineering, and healthcare.
Broadcast and Media Engineers, Nov. 2018, pp. 117–118.