Skip to main content

Biometric Authentication Using Facial Recognition

  • Conference paper
  • First Online:
Security and Privacy in Communication Networks (SecureComm 2016)

Abstract

Biometric authentication has been gaining popularity for providing privacy and security in many applications including secure access control, surveillance systems, user identification and many more. This research proposes a robust scheme for biometric authentication by analyzing and interpreting facial image using a neural network. Human face has become as the key attribute for biometric authentication over the recent years due to its uniqueness and robustness. Our system focuses on efficient detection and recognition of user’s face for precise authentication. The facial features of a user are compared with a face database in order to perform matching for authentication and authorization. The proposed system estimates the face by analyzing skin color components in the facial image. The facial edge features are then extracted from the detected face skeleton. A neural network is employed and trained with the extracted edge features to recognize the user face by comparing with the facial database. Once the user is identified, authentication is granted. Experimental evaluation demonstrates that our proposed system provides better performance meeting accuracy requirements and less computation time.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jain, A.K., Ross, A., Pankanti, S.: Biometrics: a tool for information security. IEEE Trans. Inf. Forensics Secur. 1(2), 125–144 (2006)

    Article  Google Scholar 

  2. Ahmed, I.T.: Continuous Authentication Using Biometrics: Data, Models, and Metrics. IGI Global, Hershey (2012)

    Google Scholar 

  3. Park, U., Jain, A.K.: Face matching and retrieval using soft biometrics. IEEE Trans. Inf. Forensics Secur. 5(3), 406–415 (2010)

    Article  Google Scholar 

  4. Kar, B., Kartik, B., Dutta, P.K.: Speech and face biometric for person authentication. In: Proceedings of IEEE International Conference on Industrial Technology, India, pp. 391–396, December 2006

    Google Scholar 

  5. Dabbah, M.A., Woo, W.L., Dlay, S.S.: Secure authentication for face recognition. In: Proceedings of IEEE Symposium on Computational Intelligence in Image and Signal Processing, USA, pp. 121–126, April 2007

    Google Scholar 

  6. Gopalan, R., Jacobs, D.: Comparing and combining lighting insensitive approaches for face recognition. Comput. Vis. Image Underst. 114(1), 135–145 (2010)

    Article  Google Scholar 

  7. Turk, M.A., Pentland, A.P.: Face recognition using eigenfaces. In: Proceedings of the IEEE, pp. 586–591 (1991)

    Google Scholar 

  8. Ding, C., Tao, D.: A Comprehensive Survey on Pose-Invariant Face Recognition (2015) arXiv:1502.04383v2

  9. Barr, J.R., Bowyer, K.W., Flynn, P.J., Biswas, S.: Face recognition from video: a review. Int. J. Pattern Recognit. Artif. Intell. 26(5) (2012)

    Google Scholar 

  10. Zou, X., Kittler, J., Messer, K.: Illumination invariant face recognition: a survey. In: Proceedings IEEE International Conferenfce on Biometrics, Theory, Appl. Syst., pp 1–8 (2007)

    Google Scholar 

  11. Zhang, H., Zhang, Y., Huang, T.S.: Pose-robust face recognition via sparse representation. Pattern Recogn. 46(5), 1511–1521 (2013)

    Article  MATH  Google Scholar 

  12. Zhang, X., Gao, Y.: Face recognition across pose: A review. Pattern Recogn. 42(11), 2876–2896 (2009)

    Article  Google Scholar 

  13. Zhang, Y., Shao, M., Wong, E.K., Fu, Y.: Random faces guided sparse many-to-one encoder for pose-invariant face recognition. In: Proceedings IEEE International Conference on Computer Vision, pp. 2416–2423 (2013)

    Google Scholar 

  14. Beveridge, R., Zhang, H., Draper, B., et al.: Report on the fg 2015 video person recognition evaluation. In: Proceedings IEEE International Conference on Automatic Face and Gesture Recognition (2015)

    Google Scholar 

  15. Ouyang, S., Hospedales, T., Song, Y.Z., Li, X.: A survey on heterogeneous face recognition: sketch, infrared, 3D and low resolution (2014). arXiv preprint: arXiv:14095114

  16. Chen, D., Cao, X., Wen, F., Sun, J.: Blessing of dimensionality: high-dimensional feature and its efficient compression for face verification. In: Proceedings IEEE Conference on Computer Vision Pattern Recognition, pp. 3025–3032 (2013)

    Google Scholar 

  17. Chai, X., Shan, S., Chen, X., Gao, W.: Locally linear regression for pose-invariant face recognition. IEEE Trans. Image Process. 16(7), 1716–1725 (2007)

    Article  MathSciNet  Google Scholar 

  18. Ding, C., Choi, J., Tao, D., Davis, L.S.: Multi-directional multi-level dual-cross patterns for robust face recognition, August 2015. arXiv:1401.5311v2

  19. Satter, A.K.M.Z., Chowdhury, M.M.H.: A Fuzzy algorithm for de-noising of corrupted images. Int. J. Comput. Inf. Syst. (IJCSI) 6(4), 15–17 (2013). Silicon Valley Publishers (SVP), United Kingdom

    Google Scholar 

  20. Li, H., Lin, Z., Shen, X., Brandt, J., Hua, G.: A convolutional neural network cascade for face detection. In: CVPR 2015, pp. 5325–5334

    Google Scholar 

  21. Uddin, J., Mondal, A.M., Chowdhury, M.M.H., Bhuiyan, M.A.: Face detection using genetic algorithm. In: Proceedings of 6th International Conference on Computer and Information Technology, Dhaka, Bangladesh, pp. 41–46, December 2003

    Google Scholar 

  22. Shinn-Ying, H., Hui-Ling, H.: Facial modeling from an uncalibrated face image using a coarse-to-fine genetic algorithm. Pattern Recogn. 34(8), 1015–1031 (2001)

    MATH  Google Scholar 

  23. Kukenys, I., McCane, B.: Support vector machines for human face detection. In: Proceedings of the New Zealand Computer Science Research Student Conference (2008)

    Google Scholar 

  24. Viola, P., Jones, M.: Fast and robust classification using asymmetric AdaBoost and a detector cascade. Adv. Neural Inf. Process. Syst. 2, 1311–1318 (2002)

    Google Scholar 

  25. Heisele, B., Serre, T., Poggio, T.: A component-based framework for face detection and identification. Int. J. Comput. Vision 74(2), 167–181 (2007)

    Article  Google Scholar 

  26. Talele, K.T., Kadam, S., Tikare, A.: Efficient face detection using Adaboost. In: IJCA Proceedings of International Conference in Computational Intelligence (2012)

    Google Scholar 

  27. Chowdhury, M., Gao, J., Islam, R.: Human detection and localization in secure access control by analysing facial features. In: Proceedings of IEEE Conference on Industrial Electronics and Applications (ICIEA), China, June 2016

    Google Scholar 

  28. Khatun, A., Bhuiyan, M.A.: Neural network based face recognition with gabor filters. IJCSNS Int. J. Comput. Sci. Netw. Secur. 11(1), 71–76 (2011)

    Google Scholar 

  29. Face Recognition Data. University of Essex, UK, Face 94. http://cswww.essex.ac.uk/mv/allfaces/faces94.html

  30. Face Recognition Data. University of Essex, UK, Face 95. http://cswww.essex.ac.uk/mv/allfaces/faces95.html

  31. Face Recognition Data. University of Essex, UK, Face 96. http://cswww.essex.ac.uk/mv/allfaces/faces96.html

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mozammel Chowdhury .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Chowdhury, M., Gao, J., Islam, R. (2017). Biometric Authentication Using Facial Recognition. In: Deng, R., Weng, J., Ren, K., Yegneswaran, V. (eds) Security and Privacy in Communication Networks. SecureComm 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 198. Springer, Cham. https://doi.org/10.1007/978-3-319-59608-2_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-59608-2_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-59607-5

  • Online ISBN: 978-3-319-59608-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics