More Realistic and Efficient Face-Based Mobile Authentication using CNNs

被引:0
|
作者
Das, Abhijit [1 ,3 ,5 ]
Sengupta, Abira [2 ]
Saqib, Muhammad [5 ]
Pal, Umapada [4 ]
Blumenstein, Michael [5 ]
机构
[1] Griffith Univ, Inst Integrated & Intelligent Syst, Nathan, Qld, Australia
[2] Kalyani Govt Engn Coll, Dept Comp Sci, Kalyani, W Bengal, India
[3] Inria Sophia Antipolis Mediterranee, Biot, France
[4] Indian Stat Inst, Comp Vis & Pattern Recognit Unit, Kolkata, India
[5] Univ Technol Sydney, Ctr Artificial Intelligence, Sch Software, Sydney, NSW, Australia
关键词
Face biometrics; CNN; Mobile biometrics; RECOGNITION;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this work, we propose a more realistic and efficient face-based mobile authentication technique using CNNs. This paper discusses and explores an inevitable problem of using face images for mobile authentication, taken from varying distances with a front/selfie camera of the mobile phone. Incidentally, once an individual comes towards a certain distance from the camera, the face images get large and appear over-sized. Simultaneously sharp features of some portions of the face, such as forehead, cheek, and chin are changed completely. As a result, the face features change and the impact increases exponentially once the individual crosses a certain distance and gradually approaches towards the front camera. This work proposes a solution (achieving better accuracy and facial features, whereby face images were cropped and aligned around its close bounding box) to mitigate the aforementioned identified gap. The work investigated different frontier face detection and recognition techniques to justify the proposed solution. Among all the employed methods evaluated, CNNs worked best. For a quantitative comparison of the proposed method, manually cropped face images/annotations of the face images along with their close boundary were prepared. In turn, we have developed a database considering the above-mentioned scenario for 40 individuals, which will be publicly available for academic research purposes. The experimental results achieved indicate a successful implementation of the proposed method and the performance of the proposed technique is also found to be superior in comparison to the existing state-of-the-art.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] FACE-BASED ACTIVE AUTHENTICATION ON MOBILE DEVICES
    Fathy, Mohammed E.
    Patel, Vishal M.
    Chellappa, Rama
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING (ICASSP), 2015, : 1687 - 1691
  • [2] Lightweight and Secure Face-Based Active Authentication for Mobile Users
    Keykhaie, Sepehr
    Pierre, Samuel
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2023, 22 (03) : 1551 - 1565
  • [3] Face-Based Multiple User Active Authentication on Mobile Devices
    Perera, Pramuditha
    Patel, Vishal M.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (05) : 1240 - 1250
  • [4] Face-Based Authentication Using Computational Secure Sketch
    Jiang, Mingming
    Liu, Shengli
    Lyu, You
    Zhou, Yu
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2023, 22 (12) : 7172 - 7187
  • [5] A Face-based Authentication System Using Correlation Filters on Videos
    de Oliveira, Jose F. L.
    da Silva, Eduardo A. B.
    Cardoso, Manuel A. P.
    Hollanda, Axel G.
    [J]. 2009 IEEE INTERNATIONAL WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING (MMSP 2009), 2009, : 529 - +
  • [6] Intelligent Face-Based Mobile Images Categorization
    Chen, Duan-Yu
    Tsai, Jeng-Tsung
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2013, 29 (02) : 347 - 360
  • [7] A Face-Based Signage Interacting System for Mobile Users Using Smartphones
    Chen, Lien-Wu
    Ho, Yu-Fan
    [J]. 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2016,
  • [8] Face-Based Mobile Target Tracking Technique in Wireless Sensor Network
    Khalid Ali
    Mohd Fadlee A. Rasid
    Aduwati Sali
    Borhanuddin Ali
    [J]. Wireless Personal Communications, 2020, 111 : 1853 - 1870
  • [9] More efficient key-hash based fingerprint remote authentication scheme using mobile device
    Khan, Muhammad Khurram
    Kumari, Saru
    Gupta, Mridul K.
    [J]. COMPUTING, 2014, 96 (09) : 793 - 816
  • [10] More efficient key-hash based fingerprint remote authentication scheme using mobile device
    Muhammad Khurram Khan
    Saru Kumari
    Mridul K. Gupta
    [J]. Computing, 2014, 96 : 793 - 816