Advertisement

In Your Face: Person Identification Through Ratios of Distances Between Facial Features

  • Mohammad AlsawwafEmail author
  • Zenon Chaczko
  • Marek Kulbacki
Conference paper
  • 273 Downloads
Part of the Lecture Notes in Computer Science book series (LNCS, volume 12034)

Abstract

These days identification of a person is an integral part of many computer-based solutions. It is a key characteristic for access control, customized services, and a proof of identity. Over the last couple of decades, many new techniques were introduced for how to identify human faces. The purpose of this paper is to introduce yet another innovative approach for face recognition. The human face consists of multiple features that when considered together produces a unique signature that identifies a single person. Building upon this premise, we are studying the identification of faces by producing ratios from the distances between the different features on the face and their locations in an explainable algorithm with the possibility of future inclusion of multiple spectrum and 3D images for data processing and analysis.

Keywords

Person identification Human face recognition Biometrics Facial features HMI 

Notes

Acknowledgements

This study was supported by the Scientific Research from Technical University of Technology Sydney, School of Electrical and Data Engineering and DIVE IN AI.

References

  1. 1.
    Bud, A.: Facing the future: the impact of apple FaceID. Biometric Technol. Today 2018(1), 5–7 (2018).  https://doi.org/10.1016/s0969-4765(18)30010-9CrossRefGoogle Scholar
  2. 2.
    Cheng, G., Han, J., Zhou, P., Xu, D.: Learning rotation-invariant and fisher discriminative convolutional neural networks for object detection. IEEE Trans. Image Process. 28(1), 265–278 (2019).  https://doi.org/10.1109/TIP.2018.2867198MathSciNetCrossRefzbMATHGoogle Scholar
  3. 3.
    Ezzini, S., Berrada, I., Ghogho, M.: Who is behind the wheel? Driver identification and fingerprinting. J. Big Data 5, 9 (2018).  https://doi.org/10.1186/s40537-018-0118-7CrossRefGoogle Scholar
  4. 4.
    Geitgey, A.: Machine learning is fun! part 4: modern face recognition with deep learning (2016). https://medium.com/@ageitgey/machine-learning-is-fun-part-4-modern-face-recognition-with-deep-learning-c3cffc121d78. Accessed 6 Oct 2019
  5. 5.
    Härkänen, M., Tiainen, M., Haatainen, K.: Wrong-patient incidents during medication administrations. J. Clin. Nurs. 27(3–4), 715–724 (2017).  https://doi.org/10.1111/jocn.14021CrossRefGoogle Scholar
  6. 6.
    Huang, G.B., Ramesh, M., Berg, T., Learned-Miller, E.: Labeled faces in the wild: a database for studying face recognition in unconstrained environments. Technical report, 07-49, University of Massachusetts, Amherst, October 2007Google Scholar
  7. 7.
    Iqbal, M., Sameem, M.S.I., Naqvi, N., Kanwal, S., Ye, Z.: A deep learning approach for face recognition based on angularly discriminative features. Pattern Recogn. Lett. 128, 414–419 (2019).  https://doi.org/10.1016/j.patrec.2019.10.002CrossRefGoogle Scholar
  8. 8.
    King, D.E.: Dlib-ml: a machine learning toolkit. J. Mach. Learn. Res. 10, 1755–1758 (2009). https://dl.acm.org/citation.cfm?id=1755843Google Scholar
  9. 9.
    Kumar, A., Kaur, A., Kumar, M.: Face detection techniques: a review. Artif. Intell. Rev. 52(2), 927–948 (2019).  https://doi.org/10.1007/s10462-018-9650-2CrossRefGoogle Scholar
  10. 10.
    Liu, J., Liu, W., Ma, S., Wang, M., Li, L., Chen, G.: Image-set based face recognition using K-SVD dictionary learning. Int. J. Mach. Learn. Cybern. 10(5), 1051–1064 (2019).  https://doi.org/10.1007/s13042-017-0782-5CrossRefGoogle Scholar
  11. 11.
    Martinelli, F., Mercaldo, F., Nardone, V., Orlando, A., Santone, A.: Who’s driving my car? A machine learning based approach to driver identification. In: Proceedings of the 4th International Conference on Information Systems Security and Privacy, ICISSP 2018, Funchal, Madeira - Portugal, 22–24 January 2018, pp. 367–372 (2018).  https://doi.org/10.5220/0006633403670372
  12. 12.
    Scherhag, U., Rathgeb, C., Merkle, J., Breithaupt, R., Busch, C.: Face recognition systems under morphing attacks: a survey. IEEE Access 7, 23012–23026 (2019).  https://doi.org/10.1109/ACCESS.2019.2899367CrossRefGoogle Scholar
  13. 13.
    Sengupta, S., Chen, J.C., Castillo, C., Patel, V.M., Chellappa, R., Jacobs, D.W.: Frontal to profile face verification in the wild. In: 2016 IEEE Winter Conference on Applications of Computer Vision (WACV), pp. 1–9. IEEE (2016)Google Scholar
  14. 14.
    Wong, T.T.: Performance evaluation of classification algorithms by k-fold and leave-one-out cross validation. Pattern Recogn. 48(9), 2839–2846 (2015)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.School of Electrical and Data EngineeringUniversity of Technology SydneyUltimoAustralia
  2. 2.DIVE IN AIWroclawPoland
  3. 3.Imam Abdulrahman Bin Faisal UniversityDammamSaudi Arabia
  4. 4.Polish-Japanese Academy of Information Technology, R&D CenterWarsawPoland

Personalised recommendations