scholarly journals An Identity Authentication Method Combining Liveness Detection and Face Recognition

Sensors ◽  
2019 ◽  
Vol 19 (21) ◽  
pp. 4733 ◽  
Author(s):  
Shuhua Liu ◽  
Yu Song ◽  
Mengyu Zhang ◽  
Jianwei Zhao ◽  
Shihao Yang ◽  
...  

In this study, an advanced Kinect sensor was adopted to acquire infrared radiation (IR) images for liveness detection. The proposed liveness detection method based on infrared radiation (IR) images can deal with face spoofs. Face pictures were acquired by a Kinect camera and converted into IR images. Feature extraction and classification were carried out by a deep neural network to distinguish between real individuals and face spoofs. IR images collected by the Kinect camera have depth information. Therefore, the IR pixels from live images have an evident hierarchical structure, while those from photos or videos have no evident hierarchical feature. Accordingly, two types of IR images were learned through the deep network to realize the identification of whether images were from live individuals. In comparison with other liveness detection cross-databases, our recognition accuracy was 99.8% and better than other algorithms. FaceNet is a face recognition model, and it is robust to occlusion, blur, illumination, and steering. We combined the liveness detection and FaceNet model for identity authentication. For improving the application of the authentication approach, we proposed two improved ways to run the FaceNet model. Experimental results showed that the combination of the proposed liveness detection and improved face recognition had a good recognition effect and can be used for identity authentication.

2014 ◽  
Vol 644-650 ◽  
pp. 1015-1018 ◽  
Author(s):  
Hao Lin Zhang ◽  
Xian Ye Ben ◽  
Peng Zhang ◽  
Tian Jiao Liu

Gait period detection, serving as a preprocessor for gait recognition, is commonly studied in the recent past. In this paper, we proposed a novel gait period detection method for depth gait video stream. The method introduces the concept of layered coding for depth images which decreases computational complexity. Furthermore, the extreme value of the sum of layered codes for gait sequence is utilized to judge the period endpoint, which is in accord with the naked-eye observation. In addition, gait recognition experiments on the TUM GAID database are conducted with the description of gait features of one single detected period by the proposed scheme using tensor representation. The high recognition accuracy verifies the effectiveness of the proposed depth gait period detection method.


Perception ◽  
2021 ◽  
pp. 030100662110140
Author(s):  
Xingchen Zhou ◽  
A. M. Burton ◽  
Rob Jenkins

One of the best-known phenomena in face recognition is the other-race effect, the observation that own-race faces are better remembered than other-race faces. However, previous studies have not put the magnitude of other-race effect in the context of other influences on face recognition. Here, we compared the effects of (a) a race manipulation (own-race/other-race face) and (b) a familiarity manipulation (familiar/unfamiliar face) in a 2 × 2 factorial design. We found that the familiarity effect was several times larger than the race effect in all performance measures. However, participants expected race to have a larger effect on others than it actually did. Face recognition accuracy depends much more on whether you know the person’s face than whether you share the same race.


Author(s):  
Guangyu Zhou ◽  
Aijia Ouyang ◽  
Yuming Xu

To overcome the shortcomings of the basic glowworm swarm optimization (GSO) algorithm, such as low accuracy, slow convergence speed and easy to fall into local minima, chaos algorithm and cloud model algorithm are introduced to optimize the evolution mechanism of GSO, and a chaos GSO algorithm based on cloud model (CMCGSO) is proposed in the paper. The simulation results of benchmark function of global optimization show that the CMCGSO algorithm performs better than the cuckoo search (CS), invasive weed optimization (IWO), hybrid particle swarm optimization (HPSO), and chaos glowworm swarm optimization (CGSO) algorithm, and CMCGSO has the advantages of high accuracy, fast convergence speed and strong robustness to find the global optimum. Finally, the CMCGSO algorithm is used to solve the problem of face recognition, and the results are better than the methods from literatures.


2001 ◽  
Vol 11 (16) ◽  
pp. R663-R664 ◽  
Author(s):  
Jim Stone
Keyword(s):  

Author(s):  
Prasad A. Jagdale ◽  
Sudeep D. Thepade

Nowadays the system which holds private and confidential data are being protected using biometric password such as finger recognition, voice recognition, eyries and face recognition. Face recognition match the current user face with faces present in the database of that security system and it has one major drawback that it never works better if it doesn’t have liveness detection. These face recognition system can be spoofed using various traits. Spoofing is accessing a system software or data by harming the biometric recognition security system. These biometric systems can be easily attacked by spoofs like peoples face images, masks and videos which are easily available from social media. The proposed work mainly focused on detecting the spoofing attack by training the system. Spoofing methods like photo, mask or video image can be easily identified by this method. This paper proposed a fusion technique where different features of an image are combining together so that it can give best accuracy in terms of distinguish between spoof and live face. Also a comparative study is done of machine learning classifiers to find out which classifiers gives best accuracy.


Sign in / Sign up

Export Citation Format

Share Document