DEVELOPMENT OF A COMPUTER SYSTEM FOR IDENTITY AUTHENTICATION USING ARTIFICIAL NEURAL NETWORKS
Keywords:artificial neural networks, facial recognition, fuzzy knowledge base, identity authentication, video monitoring system
AbstractThe aim of the study is to increase the effectiveness of automated face recognition to authenticate identity, considering features of change of the face parameters over time. The improvement of the recognition accuracy, as well as consideration of the features of temporal changes in a human face can be based on the methodology of artificial neural networks. Hybrid neural networks, combining the advantages of classical neural networks and fuzzy logic systems, allow using the network learnability along with the explanation of the findings. The structural scheme of intelligent system for identification based on artificial neural networks is proposed in this work. It realizes the principles of digital information processing and identity recognition taking into account the forecast of key characteristics’ changes over time (e.g., due to aging). The structural scheme has a three-tier architecture and implements preliminary processing, recognition and identification of images obtained as a result of monitoring. On the basis of expert knowledge, the fuzzy base of products is designed. It allows assessing possible changes in key characteristics, used to authenticate identity based on the image. To take this possibility into consideration, a neuro-fuzzy network of ANFIS type was used, which implements the algorithm of Tagaki-Sugeno. The conducted experiments showed high efficiency of the developed neural network and a low value of learning errors, which allows recommending this approach for practical implementation. Application of the developed system of fuzzy production rules that allow predicting changes in individuals over time, will improve the recognition accuracy, reduce the number of authentication failures and improve the efficiency of information processing and decision-making in applications, such as authentication of bank customers, users of mobile applications, or in video monitoring systems of sensitive sites.
Andersen MR, Jensen T, Lisouski P, Mortensen AK, Hansen MK, Gregersen T, et al. (2015). Kinect Depth Sensor Evaluation for Computer Vision Applications, Tech. Rep. Electron. Comput.
Chan TH, Jia K, Gao S, Lu J, Zeng Z, Ma Y (2015). PCANet: A Simple Deep Learning Baseline for Image Classification? IEEE Trans. Image Process 24:5017–32.
Didimo W, Liotta G, Montecchiani F (2014). Network visualization for financial crime detection. J. Vis. Lang. Comput 25:433–51.
Diniz FA, Reis Da Silva T, Eduardo F, Alencar S (2015). An Empirical Study Of the Behavior of a Face Recognition System Based on Eigenfaces and K- Nearest Neighbors Techniques. Int. Conf. Eng. Comput. Educ 9:22–6.
Fang H, Mac Parthaláin N, Aubrey AJ, Tam GKL, Borgo R, Rosin PL, et al. (2014). Facial expression recognition in dynamic sequences: An integrated approach. Pattern Recognit 47:1271–81.
Geman D, Geman S, Hallonquist N, Younes L (2015). Visual Turing test for computer vision systems. Proc. Natl. Acad. Sci 112(12):3618-23.
Grother P, Shevtsov D, Tabassi E, Wolf A (2015). Face Recognition Standards. Encycl. Biometrics 1:467–75.
Gui Q, Jin Z, Xu W (2014). Exploring EEG-based biometrics for user identification and authentication. Signal Process. Med. Biol 1:1–6.
Hassan MY, Khalifa OO, Talib AA, Abdulla AH (2015). Unconstrained Facial Recognition Systems. A Review, Asian J. Appl. Sci 3:346-54.
Hassanat A, Al-Awadi M, Btoush E, Al-Btoush A (2015). New mobile phone and webcam hand images databases for personal authentication and identification. Procedia Manuf 3:4060–7.
Hatkar P, Salokhe B, Malgave A (2015). Offline Handwritten Signature Verification using Neural Network. Methodology 2:1–5.
Hecht-Nielsen R (1989). Self-Organization and Associative Memory. IEEE J. Quant. Electron 25:237.
Hopfield J (1982). Neural networks and physical systems with emergent collective computational abilities. Proc. Natl. Acad 79:2554–8.
Iwama H, Muramatsu D, Makihara Y (2013). Gait verification system for criminal investigation. IPSJ Trans. Comput. Vis. Appl 5:163–75.
Jang J (1993). ANFIS: adaptive-network-based fuzzy inference system. IEEE Trans. Syst. Man 23:665–85.
Jayaram M, Fleyeh H (2013). Soft Computing in Biometrics: A Pragmatic Appraisal. Am. J. Intell. Syst 3:105–12.
Ji W, Zhao D, Cheng F, Xu B, Zhang Y, Wang J (2012). Automatic recognition vision system guided for apple harvesting robot. Comput. Electr. Eng 38:1186–95.
Khan A, Gour B (2013). Gender Classification Technique Based on Facial Features using Neural Network. Int. J. Comput. Sci. Inf. Technol 4:839–43.
Kirby M, Sirovich L (1990). Application of the Karhunen-Loeve procedure for the characterization of human faces. IEEE Trans. Pattern Anal 12:103–8.
Kotwal N, Li J, Sandy J, Plaas A, Sumner DR, Mow VC, et al. (2012). Initial application of EPIC-μCT to assess mouse articular cartilage morphology and composition: effects of aging and treadmill running. Osteoarthritis Cartilage 20:887–95.
Lanitis A, Taylor CJ, Cootes TF (1995). An Automatic Face Identification System Using Flexible Appearance Models. Image Vis. Comput 13:393–401.
Learned-Miller E, Huang GB, RoyChowdhury A, Li H, Hua G (2016). Labeled Faces in the Wild: A Survey. Adv. Face Detect. Facial Image Anal 1:189–248.
Liao S, Hu Y, Zhu X, Li SZ (2015). Person Re-Identification by Local Maximal Occurrence Representation and Metric Learning, Proc. IEEE Conf. Comput. Vis. Pattern Recognit 1:2197–206.
Lin SH (2000). An Introduction to Face Recognition Technology (PDF) - Semantic Scholar, Informing Sci. Spec. Issue Multimed. Informing Technol 3:1–7.
Lydia-Marie J, McDonald K (2016). SEM Visualization of Biological Samples using Hitachi Ionic Liquid HILEM® IL 1000: a Comparative Study. Microsc. Microanal 22:1170–1.
Matoso RI, Freire AR, Santos LSM, Daruge EJ, Rossi AC, Prado FB, , et al. (2014). Comparison of Gunshot Entrance Morphologies Caused by .40-Caliber Smith & Wesson, .380-Caliber, and 9-mm Luger Bullets: A Finite Element Analysis Study. PLoS One 9:111–92
Meruelo A, Simpson D, Veres S, Newland P (2016). Improved system identification using artificial neural networks and analysis of individual differences in responses of an identified neuron. Neural Networks 75:56–65.
Monroe DA (2009). Method for incorporating facial recognition technology in a multimedia video monitoring system US7634662 B2.
Nader J, Alsadoon A, Prasad P, Singh A (2015). Designing Touch-Based Hybrid Authentication Method for Smartphones. Procedia Comput 70:198–204.
Parmar DN, Mehta BB (2016). Face Recognition Methods & Applications. Int.J.Computer Technol. Appl 4:84–6.
Porshnev S (2010). MATLAB 7. Fundamentals of work and programming - Everything for student. Moscow: Binom-Press 151 p.
Rashmi R, Latha B (2013). Video monitoring system and facility to access Pc from remote areas using smart phone. Int. Conf. Inf. Commun. Embed. Syst. IEEE 2013:491–5.
Rautaray SS, Agrawal A (2015). Vision based hand gesture recognition for human computer interaction: a survey. Artif. Intell. Rev 43:1–54.
Razi M, Attar PJ, Vedula P (2015). Uncertainty quantification of multidimensional dynamical systems based on adaptive numerical solutions of the Liouville equation. Probabilistic Eng. Mech 42:7–20.
Revadigar G, Javali C, Hu W, Jha S (2015). DLINK: Dual link based radio frequency fingerprinting for wearable devices. 40th Conf. Local Comput. Networks IEEE 1:329–37.
Sanchez del Rio J, Moctezuma D, Conde C, Martin de Diego I, Cabello E (2016). Automated border control e-gates and facial recognition systems. Comput. Secur 62:49–72.
Saxena A, Sharma S, Chaurasiya V (2015). Neural network based human age-group estimation in curvelet domain. Procedia Comput. Sci 54:781–9.
Schroff F, Kalenichenko D, Philbin J (2015). FaceNet: A Unified Embedding for Face Recognition and Clustering 1:815–23.
Sharma N, Singh DS (2012). A Survey on Various Feature Extraction Techniques and Face Recognition Methodologies using Neural Networks. Int. J. Adv. Res. Comput. Sci 3(3):1-4.
Sinitsyna KA (2015). Principles and methods of implementation of distributed systems based on neural processors. Modern Engineering and Technologies 5:14-8.
Sun Y, Chen Y, Wang X, Tang X (2014). Deep learning face representation by joint identification-verification. Adv. Neural Inf. 1:1988–96.
Takagi T, Sugeno M (1985). Fuzzy identification of systems and its applications to modeling and control. IEEE Trans. Syst. Man 1:116–32.
Turk M, Pentland A (1991). Eigenfaces for Recognition. J. Cogn. Neurosci 3:71–86.
Vasenkov D (2007). Learning Methods for Artificial Neural Networks. Computer Tools in Education 1:20–9.
Vinay A, Shekhar V, Rituparna J, Aggrawal T (2015). Cloud based big data analytics framework for face recognition in social networks using machine learning. Procedia Comput 50:623–30.
Watanabe Y, Fujita T (2013). Toward Introduction of Immunity-based Model to Continuous Behavior-based User Authentication on Smart Phone. Procedia Comput. Sci 22:1319–27.
Xue J, Su X, Zhang Q (2015). High-speed 3D face measurement based on color speckle projection, Int. Conf. Exp. Mech 8:93022Y-93022Y.
How to Cite
Copyright (c) 2017 Image Analysis & Stereology
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.