مقاله انگلیسی رایگان در مورد سیستم حضور غیاب قابل حمل براساس تشخیص چهره – الزویر 2024

 

مشخصات مقاله
ترجمه عنوان مقاله سیستم حضور غیاب قابل حمل براساس تشخیص چهره سبک با تشخیص زنده
عنوان انگلیسی مقاله Lightweight face recognition-based portable attendance system with liveness detection
نشریه الزویر
انتشار مقاله سال 2024
تعداد صفحات مقاله انگلیسی 14 صفحه
هزینه دانلود مقاله انگلیسی رایگان میباشد.
نوع نگارش مقاله
مقاله پژوهشی (Research Article)
مقاله بیس این مقاله بیس نمیباشد
نمایه (index) Scopus – Master Journals List – JCR
نوع مقاله ISI
فرمت مقاله انگلیسی  PDF
ایمپکت فاکتور(IF)
8.227 در سال 2022
شاخص H_index 39 در سال 2024
شاخص SJR 1.474 در سال 2022
شناسه ISSN 2542-6605
شاخص Quartile (چارک) Q1 در سال 2022
فرضیه ندارد
مدل مفهومی ندارد
پرسشنامه ندارد
متغیر ندارد
رفرنس دارد
رشته های مرتبط کامپیوتر
گرایش های مرتبط هوش مصنوعی
نوع ارائه مقاله
ژورنال
مجله  اینترنت اشیا – Internet of Things
دانشگاه Bina Nusantara University, Indonesia
کلمات کلیدی تشخیص زنده، تشخیص چهره، سیستم حضور غیاب قابل حمل
کلمات کلیدی انگلیسی Liveness detection, Face recognition, Portable attendance system
شناسه دیجیتال – doi
https://doi.org/10.1016/j.iot.2024.101089
لینک سایت مرجع https://www.sciencedirect.com/science/article/pii/S2542660524000313
کد محصول e17679
وضعیت ترجمه مقاله  ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید.
دانلود رایگان مقاله دانلود رایگان مقاله انگلیسی
سفارش ترجمه این مقاله سفارش ترجمه این مقاله

 

فهرست مطالب مقاله:
Abstract
1 Introduction
2 Related works
3 Theory and methods
4 Model development stage
5 Prototype development stage
6 Results and discussion
7 Conclusions
CRediT authorship contribution statement
Declaration of competing interest
Data availability
References

بخشی از متن مقاله:

Abstract

Face recognition systems that do not implement liveness detection are susceptible to face spoofing attacks. This vulnerability implies that an attacker could disguise themselves as another individual and the system would falsely take the attendance of that other individual. To prevent these attacks, a liveness detection step can be implemented before recognizing subjects. Face recognition-based attendance system devices are typically installed at the entrance to an event or space, so having a portable device that can be easily relocated is practical and efficient. Hence, face recognition systems should be lightweight enough to be able to run on portable devices with limited computational power. Implementing liveness detection will increase the system’s processing time. Therefore, this study aims to develop a lightweight liveness detection method that can be run on a Raspberry Pi. To achieve this, several pre-trained models were evaluated and MobileNetV2 was chosen based on the results. The MobileNetV2 model was then trained using transfer learning method. The proposed attendance system achieved an average processing time below 0.6 s and 96 % accuracy for live subjects, 79 % accuracy for level A spoof attacks, 83.7 % accuracy for level B spoof attacks, and 70 % accuracy for level C spoof attacks.

Introduction

There are two types of attendance systems, manual attendance systems, and automated attendance systems [1]. With manual attendance system, the attendance of each individual present in an event is recorded manually by someone in charge. In an automated attendance system, the tedious process of manually recording everyone’s attendance is replaced with an automated system. One way to achieve this is by using an authentication method to verify and record individuals’ attendance. Fingerprint, palm veins, face, and iris recognition are often used due to their false rejection rate and higher acceptance rate [2]. Face recognition is preferred over other biometric authentication methods because of its inherent benefits such as non-intrusive interaction and accessibility [1].

Biometric authentication methods are robust and convenient because it verifies the identity of the subject by using their physiological and/or behavioral characteristics and not the subject’s knowledge or possession. Password-based authentication is based on knowledge, which implies that if someone knows the knowledge, they can authenticate as someone else. Ownership-based authentication is based on item possession, which means that someone who owns the object can authenticate as someone else. While password-based authentication and ownership-based authentication have their own security concerns, biometric authentication such as face recognition also has its own security concerns.

Face recognition, one of the biometric identification techniques, uses an analysis of an individual’s distinctive facial features to confirm their identity. In most cases, this involves capturing an image or a video of the person’s face, after which algorithms are used to extract and evaluate particular facial features, such the distance between the eyes, the curves of the nose, and the jawline. To see if there is a match, these features are then put in comparison with a database of recognized faces. Face recognition systems are vulnerable to face spoofing attacks, where the attacker would try to gain illegitimate access by presenting a fake face of an authorized individual [2].

Conclusions

Face recognition systems, especially those that do not implement liveness detection, are vulnerable to face spoofing attacks where attackers would try to gain access by presenting a fake face of another individual. On face recognition-based attendance systems, liveness detection is used to prevent individual attendance that is not really present to be taken. Attendance systems typically run on a portable device as it is more practical and efficient because it could be relocated to any appropriate location as needed. Having a limitation of computing power on portable devices, implementing liveness detection will be a challenge as the liveness detection method that will be implemented must be lightweight so the attendance system could still be run on portable devices. By adding a liveness detection step, the processing time of each face presented to the system will be impacted.

In this study, several pre-trained CNN models were used to perform experiments. The pre-trained models used were pre-trained models trained for face recognition and object recognition. Transfer learning with several variations of new layers was performed on MobileNetV2, FaceNet, and MobileFaceNet. From the results of the experiment, variation C obtained the best result. While MobileFaceNet has a lower average processing time, MobileNetV2 was chosen because the average processing time difference is small, has better accuracy on CelebA-Spoof dataset which has a larger range of variations and has decent accuracy on NUAA dataset.

دیدگاهتان را بنویسید

نشانی ایمیل شما منتشر نخواهد شد. بخش‌های موردنیاز علامت‌گذاری شده‌اند *

دکمه بازگشت به بالا