Proposing SVM and HOG Techniques for Effective Face Recognition in Video Surveillance
DOI:
https://doi.org/10.32628/CSEIT206392Keywords:
Face Recognition; HOG Features; Feed forward Back propagation Neural Network; Surveillance Video; Principal Component Analysis.Abstract
Face Recognition is an active topic among Machine Learning Researchers for two decades owing to its increasing demand in security monitoring applications. The present Techniques while being working has some constraints. The challenges emerge with the orientation, quality, and expression, variations in lightning, or facial occlusions, which has a direct impact on the facial captures using video-based surveillance. This results in performance and accuracy issues. The current surveillance applications require more computational complexity with less accuracy and performance. The proposed video surveillance system overcomes these limitations of existing systems and provides maximum effective security with minimum computational complexity. The proposed Video security monitoring system provides a complete face localization, detection, and recognition. The draw out facial image data is compared with facial dataset images. The facial data is obtained from the video dataset accessed from the real environment. The face image is authenticated if a match is found and is declared unauthenticated otherwise. The security alarm after the unauthenticated alerts the security personal for further action. Hence, the proposed system is more non-evasive, accurate and reliable.
References
- Divya Malik, Shaloo Bansal, “Face Recognition Based on Principal Component Analysis and Linear Discriminant Analysis”, International Journal of Research in Electronics and Communication Technology (IJRECT 2016)
- M. A. Abuzneid and A. Mahmood, "Enhanced Human Face Recognition Using LBPH Descriptor, Multi-KNN, and Back-Propagation Neural Network," IEEE Access, vol. 6, pp. 20641-20651, 2018.
- "An Intuitive Explanation Of Convolutional Neural Networks". The data science blog, 2017. Web. 10 Feb. 2017. Available: https://ujjwalkarn.me/2016/08/11/intuitive-explanation-convnets
- Grega, Michael, Andrzej Matiolanski, Piotr Guzik, and Mikolaj Leszczuk. "Automated Detection of Firearms and Knives in a CCTV Image." Sensors 16.1 (2016): 47
- Erhan, Dumitru, Christian Szegedy, Alexander Toshev, and Dragomir Anguelov. "Scalable Object Detection Using Deep Neural Networks." 2014 IEEE Conference on Computer Vision and Pattern Recognition (2014).
- S. Satari, N. A. A. Rahman, and Z. M. Z. Abidin, "Face recognition for security efficiency in managing and monitoring visitors of an organization," in 2014 International Symposium on Biometrics and Security Technologies (ISBAST), 2014, pp. 95-101.
- Z. Shao, J. Cai, and Z. Wang, "Smart Monitoring Cameras Driven Intelligent Processing to Big Surveillance Video Data," IEEE Transactions on Big Data, vol. 4, pp. 105-116, 2018.
- N. Jamil, S. Lqbal, and N. Iqbal, "Face recognition using neural networks," in Proceedings. IEEE International Multi Topic Conference, 2001. IEEE INMIC 2001. Technology for the 21st Century, 2001, pp. 277-281.
- K. Bong, S. Choi, C. Kim, D. Han, and H. Yoo, "A Low-Power Convolutional Neural Network Face Recognition Processor and a CIS Integrated With Always-on Face Detector," IEEE Journal of Solid-State Circuits, vol. 53, pp. 115-123, 2018.
- Y. Kim, H. Kim, S. Kim, H. Kim, and S. Ko, "Illumination normalization using convolutional neural network with application to face recognition," Electronics Letters, vol. 53, pp. 399-401, 2017.
- Malik and S. Bansal, "Face Recognition Based on Principal Component Analysis and Linear Discriminant Analysis” International Journal of Research in Electronics and Communication Technology (IJRECT 2016), vol. 3, pp. 7-10, June 2016.
- Meena and R. Sharan, "An approach to face detection and recognition," in 2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE), 2016, pp. 1-6.
- Bhattacharyya, Suman & Rahul, Kumar. (2013). Face recognition by linear discriminant analysis. International Journal of Communication Network Security. 2. 31-35.
- Javed, Ali. (2013). Face Recognition Based on Principal Component Analysis. International Journal of Image, Graphics and Signal Processing. 5. 38. 10.5815/ijigsp.2013.02.06.
- F. Z. Chelali, A. Djeradi, and R. Djeradi, "Linear discriminant analysis for face recognition," in 2009 International Conference on Multimedia Computing and Systems, 2009, pp. 1-10.
- J. Dhanaseely, S. Himavathi, and E. Srinivasan, "Performance comparison of cascade and feed forward neural network for face recognition system," in International Conference on Software Engineering and Mobile Application Modelling and Development (ICSEMA 2012), 2012, pp. 1-6.
- K. Vikram and S. Padmavathi, "Facial parts detection using Viola Jones algorithm," in 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS), 2017, pp. 1-4.
- R. Arroyo, J. J. Yebes, L. M. Bergasa, I. G. Daza, and J. Almazán, "Expert video-surveillance system for real-time detection of suspicious behaviors in shopping malls," Expert Systems with Applications, vol. 42, pp. 7991-8005, 2015/11/30/ 2015.
- S. C. Loke, "Astronomical Image Acquisition Using an Improved Track and Accumulate Method," IEEE Access, vol. 5, pp. 9691-9698, 2017.
- M. P. Rajath Kumar, R. Keerthi Sravan, and K. M. Aishwarya, "Artificial neural networks for face recognition using PCA and BPNN," in TENCON 2015 - 2015 IEEE Region 10 Conference, 2015, pp. 1-6.
- M. Slavković and D. Jevtić, "Face Recognition Using Eigenface Approach," Serbian Journal Of Electrical Engineering, vol. 9, pp. 1211-130, 2012.
- H. M. Desai and V. Gandhi, "A survey on Background subtraction techniques," International Journal of Scientific & Engineering Research, vol. 5, pp. 1365–1367, 2014.
- Y. Wong, S. Chen, S. Mau, C. Sanderson, and B. C. Lovell, "Patch-based Probabilistic Image Quality Assessment for Face Selection and Improved Video-based Face Recognition," in IEEE Biometrics Workshop, Computer Vision and Pattern Recognition (CVPR) Workshops, ed, June 2011, pp. 81-88.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.