A Face Recognition Security Model Using Transfer Learning Technique
A Face Recognition Security Model Using Transfer Learning Technique
G NaliniPriya R.Meenakshi
Professor , Professor , Mythili R
Department of IT , Department of Computer Science , Department of IT,
Saveetha Engineering College, Chennai Institute of Technology, Saveetha Engineering College,
Chennai, Tamil Nadu Chennai, Tamil Nadu, India Chennai, Tamil Nadu
[email protected] [email protected] [email protected]
Harini E Harini S B
Mathiyazhagi B
Department of IT, Department of IT,
Department of IT,.
Saveetha Engineering College, Saveetha Engineering College,
Saveetha Engineering College,
2022 8th International Conference on Smart Structures and Systems (ICSSS) | 978-1-6654-9761-9/22/$31.00 ©2022 IEEE | DOI: 10.1109/ICSSS54381.2022.9782238
ABSTRACT: Nowadays security plays a vital role in day-to-day Deep learning is a machine learning technique that teaches
life. Without it, so many problems will arise and it also pave way computers to learn by doing what people do naturally. Deep
for the occurrences of illegal entries and information theft, learning is a fundamental component of driverless cars,
security attacks. Due to this, confidential information gets lost allowing them to detect a stop sign or differentiate between a
and this led to many issues. To avoid this, we have created a
pedestrian and a streetlight. Deep learning is a type of
system of facial recognition which completely detects and
recognizes the face by capturing images of user, crop them and machine learning in which a computer model learns to execute
saves them in a database. If any unauthorized user enters the categorization tasks directly from images, text, or sound that
security system, then it will detect them, and prevent does not have been educated by people. Deep learning models can
allow them from entering into the security system. In this project, produce accurate findings as a result of training, and their
we have applied a transfer learning model based on Alexnet Deep functionality can occasionally outperform human
learning application to develop a real time facial recognition performance. Models are trained utilizing a huge amount of
system which has good robustness to cope with pose and lighting, labelled data and multilayer neural network topologies.
reduce dimensionality, complexity and better recognition
accuracy. This system accurately detects and compares the image One of the most widely utilized applications in deep
that are stored in the database. And accurately provides the results learning is transfer learning. You can utilize a pre-trained
at faster rates. Also, this system would be able to create and read network as a jumping off point for learning a new skill.
a database of different users. Transfer learning is typically faster and easier to set up than
training a network with randomly initialized weights from
Key words: Facial recognition, MATLAB, Transfer
zero. AlexNet has been trained on over a million photos and
learning, Alexnet, Security model.
can categories them into over many different object categories
for a wide spectrum of images, the network learned feature-
I.INTRODUCTION rich representations. The network accepts an image as input
and generates a label for each object in the image, along with
The process of identifying a person in their probabilities as result.
photos or videos by analyzing and comparing patterns.
Recognition of people's faces is known as Face Recognition.
The facial features of a person are frequently extracted using II. RELATED WORKS
algorithms compares them to the facial traits in the movie
database and finds the most appropriate match. It has evolved
into a vital component of bio-metric, security, and We had gone through many papers that use face
surveillance systems. Systems for indexing images and recognition system for various applications in real time
videos. A face recognition system is a complex image and we have found certain paper related to our paper.
processing system. In real-world applications with K. Sharma et al [1], the proposed the paper on the
complicated data, there is a difficulty light, occlusion, and study and Implementation of Face Detection Algorithm
imaging condition influences on the photos in real time. The which is done with the help of using MATLAB. C.
components of a facial recognition system are as follows: In Sanchez et al [2], the authors developed a system of
image analysis, face detection and identification methods are MATLAB Simulation of Algorithms used for Face
used. To find the location of the object, a detection process is Detection process involved in Video Surveillance. A. A.
used faces in a photograph in the meantime. Mohamed et al [3], this paper explains about Face
Recognition technique by applying Artificial Neural
Authorized licensed use limited to: Nirma University Institute of Technology. Downloaded on June 13,2024 at 13:39:12 UTC from IEEE Xplore. Restrictions apply.
2022 8th International Conference on Smart Structures and Systems (ICSSS)
Network Using MATLAB technologies and simulation used to store images of the users, and the model will be
techniques. Lazar et al [4], they proposed a model of trained to identify the face of the user. We use Alexnet
practical implementation that is used for face detection by model that checks for accuracy and can rate the people
using MATLAB technologies in cascade object detector after training the model with the images stored in the
stacks. J. Daudpoto et al [5], the authors have developed a database.
Real time face detection/monitor to detect accurate faces
for enhancing better performance using raspberry pi and
MATLAB simulations.
M. Ayi et al [6], proposed a new model based on
Interfacing of MATLAB technologies with Arduino
functionalities for face detection, recognition and
developed tracking algorithm using serial communication
in the model. N. R. Borkar et al [7], developed a Real-time
implementation of face recognition systems. L. Saad et al
[8], the authors have developed a system based on
surveillance authorization for Monitoring and
Complaining Web-based Face Recognition system using
Haar-MATLAB.N. Singh et al [9], this paper is a study of
Template matching schema that is used for detection and
recognition of frontal view of human face through
MATLAB simulation techniques. Kumar et al [10], the
authors have worked on the field of study on Comparison
of HOG methodologies and Fisherman’s faces Based Face
Recognition System for security purposes Using
MATLAB simulation. Fig. 1. Proposed System Architecture
M. Iskandar et al [11], has developed a system
In a live stream, the proposed system can detect multiple
model of Face Detection with Expression Recognition
faces and identify the exact face with face of the user that
using Artificial Neural Networks applications of deep
is stored in the database. The proposed system improves
learning concepts in brief. P. Chawla et al [12], proposed
the accuracy of the Authorized User and Non- Authorized
a system based on Authentication of Face security system
user faces.
which deals with secure and safer constraint with help of
PROPOSED ALGORITHM -FRTL ALGORITHM:
using MATLAB. M. Jridi et al [13], the authors have
worked on enhancing a new approach of Fast face
recognition system approach using a graphical processing Input: Dataset
unit GPU as a base element for the entire system module. Output: Accuracy is detected
Lazar et al [14], this paper exhibits an idea and A practical Step 1: Start
implementation of face detection methodologies by using Step 2: Datasets are taken as input (Image Capture).
MATLAB cascade object detector system. F. Sultana et al Step 3: Datasets are images of Authorized Users.
[15], the authors developed a systematic model of Face Step 4: Train the model with the images that are stored in
recognition system using PCA algorithm in CNN-based the database as resource.
method. Step 5: Images in the dataset are pre-processed and the
model id pre-trained to recognize the faces.
Step 6: Faces of the persons will be detected exactly by
III. SYSTEM ARCHITECTURE the model after training by matching with the faces in
the dataset.
Step 7: The person whose face is present in the dataset
The well-constructed system architecture for this project, will be recognized as Authorized user and the other will
a real-time face recognition security system employing be un-authorized user.
Alexnet-deep learning application of transfer learning, as Step 8: Multiple faces of the users can be stored as
well as its modules and requirements, is outlined below. different layer in the model at a time.
As shown in Figure 1, the method entails obtaining facial Step 9: The output is detected with accuracy.
images from individuals, preprocessing the images to a Step 10: Stop
standard normalization, and then directing them into pairs
of convolutions using the pretrained AlexNet Fig. 2. Proposed Algorithm for Face Recognition using
convolutional neural network transfer learning approach Transfer Learning.
for feature extraction and classification.
To detect a face of a human, the proposed system The proposed system gives an edge over the
employs Deep Learning application transfer learning and existing system by detecting multiple faces at a time and
using MATLAB. We will use the exact database that is can detect in live stream.
Authorized licensed use limited to: Nirma University Institute of Technology. Downloaded on June 13,2024 at 13:39:12 UTC from IEEE Xplore. Restrictions apply.
2022 8th International Conference on Smart Structures and Systems (ICSSS)
Datasets are loaded to detect the faces of Let us consider two images as an input (layer) and that
authorized users and non-authorized users. Figure2 needed to be analysed with the help of face recognizer
explains proposed Face Recognition using Transfer model.
Learning Algorithm. The algorithm shows that we can
detect the faces by using the datasets as inputs. After the
A. MATLAB:
datasets are loaded, the process begins to detect the faces
that are authorized users or un-authorized users. The output
will be implemented by the Face accuracy by the model MATLAB is a high-level language used for better
with respect to the dataset information. performance of technical computing. It integrates
mathematical calculation, data visualization and high-
level programming in a user-friendly environment where
problems and solutions are expressed in familiar
PROPOSED PROCESS FLOW: mathematical notation. It is commonly used in the fields
of Math and computation, for Algorithm development, in
Modeling, for simulating, and also in prototyping. And
other areas of specializations are Data analysis,
exploration, and visualization, in Scientific and
engineering graphics, Application development and also
includes Graphical User Interface building.
B. ALEXNET:
IV. IMPLEMENTATION
The concept is implemented using MATLAB and Fig.4 Input capture User image
ALEXNET. They are trained by following ways:
1. Load datasets from the user capture images. Alexnet was a deep innovative neural network introduced in
2. Training the model with the dataset information. the Visual ImageNet Visual Recognition challenge,
3. Recognize faces in the image by normalizing. where it defined a previous learning range.
4. Use a face analyser to distinguish between faces The complete process of a real-time face-lift is
of authorized users and faces of unauthorized demonstrated as following steps.
users.
Authorized licensed use limited to: Nirma University Institute of Technology. Downloaded on June 13,2024 at 13:39:12 UTC from IEEE Xplore. Restrictions apply.
2022 8th International Conference on Smart Structures and Systems (ICSSS)
Recognition Varian
S.NO Model Mean Time
Accuracy ce
Global expansion 4.58
1 91.67% 91.65 0.02
ACNN min
Global + local
2 93.30% 93.27 0.03 5.7 min
Expansion ACNN
0.46
3 CNN + SVM 97.50% 97.47 0.03
min
AlexNet +
SVM,RasNet-50 +
4 95.63% 95.6 0.03 0.087 s
SVM,Transfer
learning (AlexNet)
Transfer Learning
5 100.00% 100 0 0.10s
using Alexnet
10
0
TIME TAKEN
RECOGNITION
RELIABILITY
ACCURACY
Authorized licensed use limited to: Nirma University Institute of Technology. Downloaded on June 13,2024 at 13:39:12 UTC from IEEE Xplore. Restrictions apply.
2022 8th International Conference on Smart Structures and Systems (ICSSS)
REFERENCES
Authorized licensed use limited to: Nirma University Institute of Technology. Downloaded on June 13,2024 at 13:39:12 UTC from IEEE Xplore. Restrictions apply.
2022 8th International Conference on Smart Structures and Systems (ICSSS)
Authorized licensed use limited to: Nirma University Institute of Technology. Downloaded on June 13,2024 at 13:39:12 UTC from IEEE Xplore. Restrictions apply.