Abstract
Biometric authentication has been gaining popularity for providing privacy and security in many applications including secure access control, surveillance systems, user identification and many more. This research proposes a robust scheme for biometric authentication by analyzing and interpreting facial image using a neural network. Human face has become as the key attribute for biometric authentication over the recent years due to its uniqueness and robustness. Our system focuses on efficient detection and recognition of user’s face for precise authentication. The facial features of a user are compared with a face database in order to perform matching for authentication and authorization. The proposed system estimates the face by analyzing skin color components in the facial image. The facial edge features are then extracted from the detected face skeleton. A neural network is employed and trained with the extracted edge features to recognize the user face by comparing with the facial database. Once the user is identified, authentication is granted. Experimental evaluation demonstrates that our proposed system provides better performance meeting accuracy requirements and less computation time.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Jain, A.K., Ross, A., Pankanti, S.: Biometrics: a tool for information security. IEEE Trans. Inf. Forensics Secur. 1(2), 125–144 (2006)
Ahmed, I.T.: Continuous Authentication Using Biometrics: Data, Models, and Metrics. IGI Global, Hershey (2012)
Park, U., Jain, A.K.: Face matching and retrieval using soft biometrics. IEEE Trans. Inf. Forensics Secur. 5(3), 406–415 (2010)
Kar, B., Kartik, B., Dutta, P.K.: Speech and face biometric for person authentication. In: Proceedings of IEEE International Conference on Industrial Technology, India, pp. 391–396, December 2006
Dabbah, M.A., Woo, W.L., Dlay, S.S.: Secure authentication for face recognition. In: Proceedings of IEEE Symposium on Computational Intelligence in Image and Signal Processing, USA, pp. 121–126, April 2007
Gopalan, R., Jacobs, D.: Comparing and combining lighting insensitive approaches for face recognition. Comput. Vis. Image Underst. 114(1), 135–145 (2010)
Turk, M.A., Pentland, A.P.: Face recognition using eigenfaces. In: Proceedings of the IEEE, pp. 586–591 (1991)
Ding, C., Tao, D.: A Comprehensive Survey on Pose-Invariant Face Recognition (2015) arXiv:1502.04383v2
Barr, J.R., Bowyer, K.W., Flynn, P.J., Biswas, S.: Face recognition from video: a review. Int. J. Pattern Recognit. Artif. Intell. 26(5) (2012)
Zou, X., Kittler, J., Messer, K.: Illumination invariant face recognition: a survey. In: Proceedings IEEE International Conferenfce on Biometrics, Theory, Appl. Syst., pp 1–8 (2007)
Zhang, H., Zhang, Y., Huang, T.S.: Pose-robust face recognition via sparse representation. Pattern Recogn. 46(5), 1511–1521 (2013)
Zhang, X., Gao, Y.: Face recognition across pose: A review. Pattern Recogn. 42(11), 2876–2896 (2009)
Zhang, Y., Shao, M., Wong, E.K., Fu, Y.: Random faces guided sparse many-to-one encoder for pose-invariant face recognition. In: Proceedings IEEE International Conference on Computer Vision, pp. 2416–2423 (2013)
Beveridge, R., Zhang, H., Draper, B., et al.: Report on the fg 2015 video person recognition evaluation. In: Proceedings IEEE International Conference on Automatic Face and Gesture Recognition (2015)
Ouyang, S., Hospedales, T., Song, Y.Z., Li, X.: A survey on heterogeneous face recognition: sketch, infrared, 3D and low resolution (2014). arXiv preprint: arXiv:14095114
Chen, D., Cao, X., Wen, F., Sun, J.: Blessing of dimensionality: high-dimensional feature and its efficient compression for face verification. In: Proceedings IEEE Conference on Computer Vision Pattern Recognition, pp. 3025–3032 (2013)
Chai, X., Shan, S., Chen, X., Gao, W.: Locally linear regression for pose-invariant face recognition. IEEE Trans. Image Process. 16(7), 1716–1725 (2007)
Ding, C., Choi, J., Tao, D., Davis, L.S.: Multi-directional multi-level dual-cross patterns for robust face recognition, August 2015. arXiv:1401.5311v2
Satter, A.K.M.Z., Chowdhury, M.M.H.: A Fuzzy algorithm for de-noising of corrupted images. Int. J. Comput. Inf. Syst. (IJCSI) 6(4), 15–17 (2013). Silicon Valley Publishers (SVP), United Kingdom
Li, H., Lin, Z., Shen, X., Brandt, J., Hua, G.: A convolutional neural network cascade for face detection. In: CVPR 2015, pp. 5325–5334
Uddin, J., Mondal, A.M., Chowdhury, M.M.H., Bhuiyan, M.A.: Face detection using genetic algorithm. In: Proceedings of 6th International Conference on Computer and Information Technology, Dhaka, Bangladesh, pp. 41–46, December 2003
Shinn-Ying, H., Hui-Ling, H.: Facial modeling from an uncalibrated face image using a coarse-to-fine genetic algorithm. Pattern Recogn. 34(8), 1015–1031 (2001)
Kukenys, I., McCane, B.: Support vector machines for human face detection. In: Proceedings of the New Zealand Computer Science Research Student Conference (2008)
Viola, P., Jones, M.: Fast and robust classification using asymmetric AdaBoost and a detector cascade. Adv. Neural Inf. Process. Syst. 2, 1311–1318 (2002)
Heisele, B., Serre, T., Poggio, T.: A component-based framework for face detection and identification. Int. J. Comput. Vision 74(2), 167–181 (2007)
Talele, K.T., Kadam, S., Tikare, A.: Efficient face detection using Adaboost. In: IJCA Proceedings of International Conference in Computational Intelligence (2012)
Chowdhury, M., Gao, J., Islam, R.: Human detection and localization in secure access control by analysing facial features. In: Proceedings of IEEE Conference on Industrial Electronics and Applications (ICIEA), China, June 2016
Khatun, A., Bhuiyan, M.A.: Neural network based face recognition with gabor filters. IJCSNS Int. J. Comput. Sci. Netw. Secur. 11(1), 71–76 (2011)
Face Recognition Data. University of Essex, UK, Face 94. http://cswww.essex.ac.uk/mv/allfaces/faces94.html
Face Recognition Data. University of Essex, UK, Face 95. http://cswww.essex.ac.uk/mv/allfaces/faces95.html
Face Recognition Data. University of Essex, UK, Face 96. http://cswww.essex.ac.uk/mv/allfaces/faces96.html
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Chowdhury, M., Gao, J., Islam, R. (2017). Biometric Authentication Using Facial Recognition. In: Deng, R., Weng, J., Ren, K., Yegneswaran, V. (eds) Security and Privacy in Communication Networks. SecureComm 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 198. Springer, Cham. https://doi.org/10.1007/978-3-319-59608-2_16
Download citation
DOI: https://doi.org/10.1007/978-3-319-59608-2_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-59607-5
Online ISBN: 978-3-319-59608-2
eBook Packages: Computer ScienceComputer Science (R0)