Device Synchronization Using A Computerize Face Detection And Recognition System For Cybersecurity

Authors

  • Ayorinde Henry Omopintemi Computer Science Department, University of Ibadan, Oyo State, Nigeria.
  • Promise Irebami Ayansola Computer Science Department, University of Ibadan, Oyo State, Nigeria.
  • Kehinde Gbemisola Ogundijo Computer Science Department, University of Ibadan, Oyo State, Nigeria.

Keywords:

AdaBoost Algorithm, Haar, cascade, Face detection and recognition system (FRDS)

Abstract

Face recognition system is an application for identifying someone from image or videos. Face recognition is classified into three stages i.e. Face detection, Feature Extraction, Face Recognition. Face detection is an application for detecting object, analyzing the face, understanding the localization of the face and face recognition. It is used in many application for new communication interface, security etc. The face detection algorithm converts the input images from a camera to binary pattern and transverse the face location of candidates using the AdaBoost Algorithm. AdaBoost Algorithm selects the best set of Haar features and implement it in cascade to decrease the detection time. Face recognition is a pattern recognition technique and one of the most important biometrics; it is used in a broad spectrum of applications. The accuracy is not a major problem that specifies the performance of automatic face recognition system alone, the time factor is also considered a major factor in real time environments. Recent architecture of the computer system can be employed to solve the time problem, this architecture represented by multi-core CPUs and many-core GPUs that provide the possibility to perform various tasks by parallel processing.

References

Graham, and A. Pentland, (2001) Eigenfaces for Recognition, Journal of Cognitive Neuroscience, vol. 3, no. 1. 2018, pp. 71-86.

Lane, Williams and .K. Paliwal, (2004) "Fast Principal component analysis using fixed-point M. Turk, A. Pentland, Eigenfaces for Recognition, Journal of Cognitive Neuroscience, vol. 3, no 1. 2013, pp. 71-86. [CrossRef]

Siau (2003) Springer-Verlag, ICBA, Hong Kong, China (2004), pp.724-730.

French and, M.M. Ahmed, I. Taj, M. Humayun, F. Hameed, (2016) "Design of High Performance FPGA based Face Recognition System", PIERS 2008 in Cambridge, USA, 2-6 July, 2008, 2006. pp.1232-1298

Adeniji, S.D, Khatun, S, Borhan, MA,Raja, RSA , ―A design proposer on policyframework in IPV6 network‖. 2008 IEEE International Symposium on Information Technology.Vol 4,pp 1-6 (2008)

Filippas, J., Amin, S.A., Naguib, R.N.G., and Bennett, M.K. (2000) 'Parallel virtual machine implementation for the image identification of normal and cancerous colonic mucosa'. Proceedings of the World Congress on Medical Physics and Biomedical Engineering, 'World Congress on Medical Physics and Biomedical Engineering'. Held 23-28 Jul 2000 in Chicago, USA. 5044-7619

Breaker, and Hellerstein, (1998) Elementary Linear Algebra, ninth edition, Oxford University Press, 1998 pp. 138.

Logunleko K.B., Adeniji. O.D., Logunleko A.M, ―A Comparative Study of Symmetric Cryptography Mechanism on DES, AES and EB64 for Information Security‖. International Journal of Scientific Research in Computer Science and Engineering Vol.8, Issue.1, pp.45-51, 2020.

Adeniji O.d., Olatunji O.O . ―Zero Day Attack Prediction with Parameter Setting Using Bi Direction Recurrent Neural Network in Cyber Security”.International Journal of Computer Science and Information Security (IJCSIS), Vol. 18, No. 3,pp 111- 118 , 2020

Adeniji O. D , Olubukola Adigun, Omowumi O Adeyemo ― An intelligent spam-scammer filter mechanism using bayesian techniques‖International Journal of Computer Science and Information Security (IJCSIS), Vol. 10, No. 3 pp 126, 2012.

Ukam, J.J, Adeniji O.D.‖Performance Evaluation of Error Rate in Immune Inspired Concepts with Neural Network for Intrusion Detection in Cybersecurity.International Journal of Advanced Research in Computer and Communication Engineering Vol. 9, Issue 6,pp 16-22 , 2020.

Froba and Ernst(2002). “Biometrics and Face Recognition Techniques”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, No. 5, pp. 93-99, May 2013.

Guo, Connell J.H., Bolle R.M., (1990) An Analysis of Minutiae Matching Strength, Proc. 3rdAVBPA, Halmstad, Sweden, June 2001, pp. 223-228.

McCready, J. P. Hespanha, and D. J. Kriegman, (1998) "Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection", IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 19, no. 7, 1997, pp. 711-720.

Sadri etal, K.K. Paliwal (1997), "Fast Principal component analysis using fixed-point algorithm",

Wei etal (2003)., Impact of artificial “gummy” fingers on fingerprint systems, in Optical Security and Counterfeit Deterrence Techniques IV, vol. 4677 of Proceedings of SPIE, pp. 275 289

I.R. Idowu & O.D. Adeniji Performance Evaluation and Analysis of Biometric Workload Attendance Management System Journal of Digital Innovations & Contemp Res. In Sc., Eng & Tech. Vol. 6, No. 2. Pp 47-56 , 2018.

Eze Chika Victor, Adeniji Oluwashola David, ―Character Proximity For RFID Smart Certificate System: A Revolutionary Security Measure To Curb Forgery Menace‖INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH,pp. 66-70. , 2014.

Wayman (2007), J. P. Hespanha, and D. J. Kriegman, "Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection", IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. no. 7, 1997, pp. 711-720.

X. He, S. Yan, Y. Hu, P. Niyogi, and H. Zhang, "Face Recognition Using Laplacian taces", IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 27, no. 3, 2005, pp. 328-340.

P. N. Belhumeur, J. P. Hespanha, and D. J. Kriegman, "Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection", IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 19, no. 7, 1997, pp. 711-720.

Downloads

Published

2022-02-25

How to Cite

Omopintemi, A. H., Promise Irebami Ayansola, & Kehinde Gbemisola Ogundijo. (2022). Device Synchronization Using A Computerize Face Detection And Recognition System For Cybersecurity. International Journal of Computer (IJC), 42(1), 30–40. Retrieved from https://www.ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/1896

Issue

Section

Articles