Regenerating vital facial keypoints for impostor identification from disguised images using CNN

被引:2
|
作者
Mehta, Jay [1 ]
Talati, Shreya [1 ]
Upadhyay, Shivani [1 ]
Valiveti, Sharada [1 ]
Raval, Gaurang [1 ]
机构
[1] Nirma Univ, Inst Technol, Dept Comp Sci & Engn, Sarkhej Gandhinagar Highway, Ahmadabad 382481, Gujarat, India
关键词
Face recognition; Anthropometry; Face regeneration; Facial keypoints; DFW; Deep learning;
D O I
10.1016/j.eswa.2023.119669
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Technical advancements in the digital era have eased up the time required to complete complex tasks by a decisive rate. These advancements introduce several threats. Hence, there is a compelling need to provide security for systems against these threats. Identity and data thefts are the major threats which require immediate, effective and responsive solutions. Face recognition systems have evolved over the last few years, providing a suitable solution for authenticating an individual. However, the system running on facial recognition can be interfered by disguise. This paper discusses the approaches used in detecting a disguise and analysing the captured face among the other non-disguised faces in the dataset. The parameters used for detection and analysis are the keypoints of the face. These keypoints may be blocked, hidden or disoriented due to the presence of props on the face. The proposed approach aims to avoid this interference by creating an estimate of the face based on fewer available keypoints. The estimated face so created, is then matched with the available set of faces to determine the probabilistic chance of the matched person's presence even though a disguise had been detected. Thus the solution provides a clear distinction if the image obtained proves to be of an impostor or an intruder with obfuscation with a said probability. The Disguised Faces in the Wild (DFW) dataset has been used.
引用
收藏
页数:11
相关论文
共 50 条
  • [11] Anomalies Identification in Images from Security Video Cameras Using Mask R-CNN
    Minari, G.
    Silva, F.
    Pereira, D.
    Almeida, L.
    Pazoti, M.
    Artero, A.
    de Albuquerque, V
    IEEE LATIN AMERICA TRANSACTIONS, 2020, 18 (03) : 530 - 536
  • [12] Oil Spill Identification from SAR Images for Low Power Embedded Systems Using CNN
    Diana, Lorenzo
    Xu, Jia
    Fanucci, Luca
    REMOTE SENSING, 2021, 13 (18)
  • [13] Deep Learning Based Person Identification Using Facial Images
    Rahman, Hamidur
    Ahmed, Mobyen Uddin
    Begum, Shahina
    INTERNET OF THINGS (IOT) TECHNOLOGIES FOR HEALTHCARE, HEALTHYIOT 2017, 2018, 225 : 115 - 119
  • [14] PERSONAL IDENTIFICATION THROUGH FACIAL IMAGES USING ISODENSITY LINES
    SAKAGUCHI, T
    NAKAMURA, O
    MINAMI, T
    VISUAL COMMUNICATIONS AND IMAGE PROCESSING IV, PTS 1-3, 1989, 1199 : 643 - 654
  • [15] Shape matching using keypoints extracted from both the foreground and the background of binary images
    Chatbri, Houssem
    Davila, Kenny
    Kameyama, Keisuke
    Zanibbi, Richard
    5TH INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, THEORY, TOOLS AND APPLICATIONS 2015, 2015, : 205 - 210
  • [16] Component-Based Ethnicity Identification from Facial Images
    Boyseens, A.
    Viriri, S.
    COMPUTER VISION AND GRAPHICS, ICCVG 2016, 2016, 9972 : 293 - 303
  • [17] Integrated person identification and expression recognition from facial images
    Pramadihanto, D
    Iwai, Y
    Yachida, M
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2001, E84D (07): : 856 - 866
  • [18] From interpretation to identification: a history of facial images in the sciences of emotion
    Watson, JM
    HISTORY OF THE HUMAN SCIENCES, 2004, 17 (01) : 29 - 51
  • [19] Airport Detection From Large IKONOS Images Using Clustered SIFT Keypoints and Region Information
    Tao, Chao
    Tan, Yihua
    Cai, Huajie
    Tian, Jinwen
    IEEE GEOSCIENCE AND REMOTE SENSING LETTERS, 2011, 8 (01) : 128 - 132
  • [20] Extraction of Recipes from Food Images by Using CNN Algorithm
    Channam, Akshay
    Swarup, Bavikati Ram
    Rao, S. Govinda
    PROCEEDINGS OF THE 2021 FIFTH INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC 2021), 2021, : 1308 - 1315