Bhavya
Bhavya
𝐊 𝐑 and 2Bhavya C
1𝐃𝐞𝐞𝐩𝐚
1,2Department of Master of Computer Applications, RajaRajeswari College of Engineering
Bangalore
Abstract
owing to its simplicity, face authentication is increasingly extensively used, particularly on mobile devices,
rather to authentication using a personal identification number or an unlock pattern. Therefore, it has
evolved into an enticing target for attackers employing a presentation assault. should be strong, making
them difficult to remember, and should be updated on a frequent basis to guarantee security. Personal
identification numbers and unlock patterns are more handy than passwords, but the user must remember
them, and others may be able to see them. Biometric authentication, which employs a biometric property
unique to the user and eliminates the need to memorise anything, is an even more easy option.
As an approach, this paper suggests utilising public-key encryption with keyword search to lessen the
computing cost of biometric identification systems while maintaining privacy. Fully homomorphic
encryption serves as template protection to ensure the long-term security of biometric data.
Indexed Terms- Master face, wolf attack, face recognition system, latent variable evolution.
I. INTRODUCTION
Credentials should be strong and difficult to remember, and they should be updated on a regular basis to
guarantee security. Personal identification numbers and unlock patterns are more handy than passwords,
but the user must remember them, and others may be able to see them. Biometric authentication, which
employs a biometric property unique to the user and eliminates the need to memorise anything, is an even
more easy option. This benefit has resulted in the widespread use of biometric identification on a variety of
portable devices, including laptops and smartphones.
The fingerprint and the face these two most widely utilised biometric attributes for authentication. Attackers
target cellphones that use this sort of authentication because they may have a digital wallet (or e-wallet) for
making e-payments. An attacker might use a presentation attack to try to unlock such a device.
Face Recognition systems are prone to presentation assaults, which include presenting an artefact or human
feature to the biometric (facial) capture subsystem in so as to interfere with the biometric (Face
Recognition) system's intended policy. A picture assault is a presentation attack in which the attacker shows
a photograph of the victim to the Face Identification system's sensor.
If not the most well-liked applications of identification of faces widely explored subjects to come up with
the demanding of the recognition problem since deep learning has radically grabbed interest in the computer
vision field. Face recognition has been utilised in a numerous applications in both the commercial and
public sectors, including surveillance systems, person authentication, and so on.
The traditional facial recognition approach tries to produce a quicker and more robust algorithm. Accurate
identification, contrasted with, requires a high resolution facial picture with no occlusion. A good face
image should be discriminative to changes in face identity while being resistant to intra-personal variation.
II. LITERATURE SURVEY
Shukdha Chokadi talked about it [1]. Sketch recognition is among those with the greatest important topics
that has emerged as a vital component used by law enforcement organisations in contemporary forensic
science trends. Matching derived sketches to photo images of faces is also a difficult assignment because
the considered sketches are produced based on the verbal explanation depicted by the eye witness of the
crime scene and may lack sensitive elements that exist in the photograph as accurately depicted due to
natural human error.
Zia Uddina expanded, saying [2] This paper presents a depth camera-based robust Mood facial expressions
analysis (FER) system for improved human-machine interaction. Although many academics have
concentrated on video-based when analysing the way people look, there still a number of issues to be
addressed, such as noise caused by lighting differences over time. Because pixel values in depth pictures
are spread based on distances from a depth camera, depth video data in the aids to develop a FER system
person-independent. Furthermore, depth photos should address certain privacy concerns because a user's
true identity can be concealed. The extraction of robust features is critical to the FER system's efficiency.
We provide a unique approach for extracting prominent characteristics from depth faces, and then deep
learning is merged for efficient training and identification. Each pixel in a depth picture receives eight
directional strengths, with signals of certain top strengths grouped to produce unique and robust facial
characteristics known as Modified Local Directional Patterns (MLDP).
• The main benefit of DBN is that it can learn attributes from raw inputs, which distinguishes it from other
deep learning frameworks such as DNN.
• One main downside of DNNs if so, who take a long time to train.
Yi Sun stated that [3] The primary difficulty of face identification is to create effective feature
representations that reduce intra-personal differences improving interpersonal interaction differences. We
show in this research that it might be done effectively utilising deep learning and both face recognition and
verification signals as supervision. Deep Identification-verification features (DeepID2) are learnt using the
construction of deep convolutional networks. Both By grouping DeepID2 features extracted from the same
identity in the face verification task while distinguishing DeepID2 has extracted from various individuals
in the identify faces task, tasks that are necessary for face recognition can boost intra-personal variations.
[4] Andra AAndrela made an idea Given recent developments in the production of Using deep
convolutional neural networks for face detection and identification tasks, this research proposes a novel
deep learning-driven visage attendance system. The process of developing a facial recognition model is
described in great depth. This model is made up of several crucial components created utilising cutting-
edge techniques, such as CNN for identification of faces and CNN cascade for face detection. embeddings.
This study's main goal was to apply state-of-the-art deep learning algorithms to facial recognition tasks.
The major issue arises from the fact that CNNs perform best on larger datasets, which is not the case in
production.
[5] According to Savath Saypadit, face recognition may be utilised in a number of applications, including
surveillance, identification in login systems, and personalised technologies. Considering the intricacy of
the calculation, recognising several faces in real-time on an embedded device is extremely difficult. We
offer a multiple face recognition framework that is implemented on an embedded GPU system in this study.
Face detection based on convolutional neural network (CNN) with face tracking is included, as is a state-
of-the-art deep CNN face recognition technique. We integrated the suggested framework into an embedded
GPU system, specifically the NVIDIA Jetson TX2 board.
III. EXISTING MODEL:
We present an extended study on Latent Variable Evolution (LVE), a method typically used to build master
faces, in the existing system. To determine the attributes of master faces and to define under what situations
strong master faces may be formed, an LVE algorithm was run under multiple scenarios and with several
databases and/or face recognition system. Based on our findings, we hypothesise that master faces emerge
in dense sections of facial recognition system embedding spaces. Finally, simulated presentation attacks
utilising created master faces typically retained the false matching ability of their original digital forms,
suggesting that the existence of master faces constitutes a real threat.
• It is inefficient for big amounts of data.
• More training time is required.
• The process is carried out without eliminating the noise.
Fig 1 shows the primary goal of our learn is to effectively identify the authorised facial image to put the
deep neural network approach into action and to improve classification algorithms' overall performance.
a) IMPLEMENTATION
1) Image Selection
• As input, the dataset, face imagedataset, is used. The dataset was obtained from the dataset repository.
• The input dataset is in the '.png, '.jpg format.
• Using the imread () method, we must read or load the input picture in this phase.
• The tkinter file dialogue box was utilised in our method to pick the input picture.
2) Image Preprocessing
• As part of our procedure, we must downsize the image and convert it to grayscale.
• To enlarge an image, use the resize () method on it, handing in a two-integer tuple parameter indicating
the resized picture's width and height.
• The function does not change the original picture; instead, it returns another picture with the altered
dimensions.
• Using the Conversion Formula and the matplotlib Library, convert an image to grayscale in Python.
• We may also use the usual RGB to grayscale conversion formula, imgGray = 0.2989 * R + 0.5870 * G +
0.1140 * B, to convert an image to grayscale.
Image Splitting
• Data are required during the machine learning process in order for learning to occur.
Additionally to the data necessary for training, test data are required to assess the algorithm's performance
and determine how effectively it performs.
• We regarded 70% of the input dataset to be training data and 30% to be testing data in our procedure.
• Part of analysing data mining models is separating data into training and testing sets.
3) Classification
• We must use a deep learning algorithm, such as neural network with convolutions, in our procedure.
• CNN In addition to time series for finance, they have applications in image and video recognition,
recommender systems, image classification, medical image analysis, natural language processing, and
interfaces between the brain and the computer. A sort of deep neural network called a convolutional neural
network (CNN, or ConvNet) is often used in deep learning to interpret visual imagery. CNNs are a type of
multilayer regularised perceptron.
b) RESULTS
Fig 2 shows Original Image which has to be selected and Fig 3 shows the conversion of original image into
Gray scale image. Fig 4 and Gig 5 shows the accuracy and authentication.
V. CONCLUSIONS
We infer that the photos of the faces were obtained from a dataset store. picture preparation methods such
as picture resizing and grayscale conversion are used here. We implemented deep learning algorithms like
CNN. The correctness is then demonstrated by the experimental outcomes. With the aid of this classification
system, we can determine if the individual the enter photo is authorised or unauthorised.
For greater performance or efficiency, we will hybridise transfer learning, integrate two separate machine
learning algorithms, or mix In upcoming work, we'll use two separate deep learning methods.
REFERENCES
"The Goode Intelligence Biometric Survey 2021." April 2021, Goode Intelligence. [Online]. Report is
available at https://www.goodeintelligence.com/report/the-goode-intelligence-biometric-survey-2021/.
[2] S. Bhattacharjee, A. Mohammadi, A. Anjos, and S. Marcel, "Recent Advances in Facial Appearance
Threat Detection," Handbook of Biometric Anti-Spoofing, pp. 121-132. Springer, Cham, Switzerland,
2019, pp. 207-228.
[3] P. Bontrager, W. Lin, J. Togelius, and S. Risi, "Deep interactive evolution," in Proc. Int. Conf. Comput.
Intell. Music Sound Art Des., 267-282, 2018.
[4] H. H. Nguyen, J. Yamagishi, I. Echizen, and S. Marcel, "Generating master faces as an aid in
performing wolf attacks on face recognition systems," in Transactions of the IJCB, 2020, pp. 1-10.
[5] U. Scherhag, C. Rathgeb, J. Merkle, R. Breithaupt, and C. Busch, "Face recognition systems under
morphing attacks: A survey," IEEE Access, vol. 7, no. 7, pp. 23012-23026, 2007.
[6] P. Bontrager, A. Roy, J. Togelius, N. Memon, and A. Ross, "DeepMasterPrints: Making MasterPrints
for Dictionary Attacks Using Latent Variable Evolution," in BTAS Proc., 2018, pp. 1-9.
[7] M. Une, A. Otsuka, and H. Imai, "Wolf attack probability: A new security measure in biometric
authentication systems," in Proceedings of the International Conference on Biometrics, 2007, pp. 396-406.
[8] S. Zafeiriou and J. Deng, "ArcFace: Additive angular margin loss for deep face recognition," in Proc.
CVPR, 2019, pp. 4690-4699.
[9] D. P. Kingma and M. Welling, "Auto-encoding variational bayes," in Proceedings of the International
Conference on Linear Regression, 2014.
[10] I. Goodfellow et al., "Generative adversarial nets," in NIPS 2014 Proceedings, pp. 2672-2680.