A Review on Face Recognition-based Access Control Systems

被引:0
作者
Garcia-Gomez, Miguel [1 ]
Antonio-Cruz, Mayra [1 ]
Yosahani Castaneda-Miyamoto, Angelica [2 ]
机构
[1] Inst Politecn Nacl, SEPI UPIICSA, Mexico City, DF, Mexico
[2] Inst Politecn Nacl, UPIICSA, Mexico City, DF, Mexico
来源
PROCEEDINGS OF THE 2021 XXIII IEEE INTERNATIONAL AUTUMN MEETING ON POWER, ELECTRONICS AND COMPUTING (ROPEC 2021) | 2021年
关键词
State-of-the-art; review; face recognition; access control; artificial intelligence; NEURAL-NETWORK; PERSON AUTHENTICATION; SECURITY SYSTEM; IDENTIFICATION; FEATURES; SCALE;
D O I
10.1109/ROPEC53248.2021.9667991
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
This paper presents a review on the state-of-the-art of the access control systems based on face recognition. The review reveals the following: i) More than fifty percent of the related contributions have been published in the last five years. ii) The most used techniques to achieve the face recognition are neural networks, principal component analysis, local binary pattern, and linear discriminant analysis. These techniques have been applied mostly to improve the performance of the recognition accuracy or recognition rate and less for addressing variations in illumination, face spoofing, information security, privacy, face occlusion, computational time, classification performance, small sample size, and recognition with low-resolution images, pose variations, and expression changes. iii) Other several techniques, including Viola-Jones, hidden Markov model, and Gaussian mixture model, have been less used to deal with the aforementioned problems (except recognition with low-resolution images, pose variations, and expression changes) and recognition with retouched or rotated images. iv) New challenges in the face recognition-based control systems appeared due to the occlusion of the faces with masks by COVID-19. Also, open challenges and future work where artificial intelligence could be harnessing are given.
引用
收藏
页数:11
相关论文
共 61 条
[1]   Research on embedded access control security system and face recognition system [J].
Ai, Hong ;
Cheng, Xuebin .
MEASUREMENT, 2018, 123 :309-322
[2]  
Al-Shebani Q, 2015, J COMPUT, V10, P115, DOI 10.17706/jcp.10.2.115-129
[3]   Computational Method for Recognizing Situations and Objects in the Frames of a Continuous Video Stream Using Deep Neural Networks for Access Control Systems [J].
Amosov, O. S. ;
Amosova, S. G. ;
Zhiganov, S., V ;
Ivanov, Yu S. ;
Pashchenko, F. F. .
JOURNAL OF COMPUTER AND SYSTEMS SCIENCES INTERNATIONAL, 2020, 59 (05) :712-727
[4]   Face-based recognition techniques: proposals for the metrological characterization of global and feature-based approaches [J].
Betta, G. ;
Capriglione, D. ;
Crenna, F. ;
Rossi, G. B. ;
Gasparetto, M. ;
Zappa, E. ;
Liguori, C. ;
Paolillo, A. .
MEASUREMENT SCIENCE AND TECHNOLOGY, 2011, 22 (12)
[5]   Face Based Recognition Algorithms: A First Step Toward a Metrological Characterization [J].
Betta, Giovanni ;
Capriglione, Domenico ;
Corvino, Mariella ;
Liguori, Consolatina ;
Paolillo, Alfredo .
IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2013, 62 (05) :1008-1016
[6]  
Biesemeier R, 2003, ATW-INT Z KERNENERG, V48, P35
[7]   Fusion of local normalization and Gabor entropy weighted features for face identification [J].
Cament, Leonardo A. ;
Castillo, Luis E. ;
Perez, Juan P. ;
Galdames, Francisco J. ;
Perez, Claudio A. .
PATTERN RECOGNITION, 2014, 47 (02) :568-577
[8]   User authentication via adapted statistical models of face images [J].
Cardinaux, F ;
Sanderson, C ;
Bengio, S .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2006, 54 (01) :361-373
[9]   Trustworthy Method for Person Identification in IIoT Environments by Means of Facial Dynamics [J].
Castiglione, Aniello ;
Nappi, Michele ;
Ricciardi, Stefano .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (02) :766-774
[10]   Off-line enterprise rights management leveraging biometric key binding and secure hardware [J].
Catuogno, Luigi ;
Galdi, Clemente ;
Riccio, Daniel .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (07) :2883-2894