A Neuron Model of Facial Recognition and Detection of an Authorized Entity Using Machine Learning System
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32797
A Neuron Model of Facial Recognition and Detection of an Authorized Entity Using Machine Learning System

Authors: J. K. Adedeji, M. O. Oyekanmi

Abstract:

This paper has critically examined the use of Machine Learning procedures in curbing unauthorized access into valuable areas of an organization. The use of passwords, pin codes, user’s identification in recent times has been partially successful in curbing crimes involving identities, hence the need for the design of a system which incorporates biometric characteristics such as DNA and pattern recognition of variations in facial expressions. The facial model used is the OpenCV library which is based on the use of certain physiological features, the Raspberry Pi 3 module is used to compile the OpenCV library, which extracts and stores the detected faces into the datasets directory through the use of camera. The model is trained with 50 epoch run in the database and recognized by the Local Binary Pattern Histogram (LBPH) recognizer contained in the OpenCV. The training algorithm used by the neural network is back propagation coded using python algorithmic language with 200 epoch runs to identify specific resemblance in the exclusive OR (XOR) output neurons. The research however confirmed that physiological parameters are better effective measures to curb crimes relating to identities.

Keywords: Biometric characters, facial recognition, neural network, OpenCV.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1474411

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 644

References:


[1] Pulli, Kari, Baksheev, Anatoly, Kornyakov, Kirill; Eruhimov, Victor, (2012) “Realtime Computer Vision with OpenCV” (1 April, 2012), pp. 40-56.
[2] C. E. Geoffrey, (2012) “Automatic Access Control System using Face Recognition”, Unpublished Thesis Faculty of Electrical Engineering, University of Teknologi Malaysia.
[3] B. M. Stephen, E. S. Sanjay and R. W. John, (2008) “Face Recognition Technology and Applications”, Cambridge University Press.
[4] Phillips, P. J. (2000) the methodology for face-recognition algorithms. IEEE Transactions on PAMI, 22(10), 1090-1104.
[5] Rumelhart, D. E., Hinton, G. E. & Williams, R. J. (1986)."Learning internal representations by error propagation."In Rumelhart, D. E., McClelland, J. L. (Eds.), Parallel distributed processing: Explorations in the microstructure of cognition. Vol. 1. Cambridge, MA. MIT Press.
[6] Goldstein, A. J., Harmon, L.D., &Lesk, A.B (1971), “Identification of Human Faces Proceeding of the IEEE” pp. 748-760.
[7] Floyd, Thomas L. (2003) Digital fundamentals. (8th ed.).New Jersey: Prentice Hall.
[8] T. Ojala, M. Pietikanen, and D. Harwood (1996), “A Comparative Study of Texture Measures with classification based on Feature Distributions, Pattern Recognition” Vol. 29, pp. 51-59.