Application of Deep Convolutional Neural Network to Prevent ATM Fraud by Facial Disguise Identification

被引:0
作者
Tamgale, Sumit Baburao [1 ]
Kothawade, Suraj Nandkishor [1 ]
机构
[1] Shri Guru Gobind Singhji Inst Engn & Technol, Dept Comp Sci & Engn, Nanded, India
来源
2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC) | 2017年
关键词
Deep Convolutional Neural Network; Disguised Face Identification; Deep Learning; TensorFlow; Pattern Classification;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The paper proposes and demonstrates a Deep Convolutional Neural Network (DCNN) architecture to identify users with disguised face attempting a fraudulent Automated Teller Machine (ATM) transaction. The recent introduction of Disguised Face Identification (DFI) framework ill proves the applicability of deep neural networks for this very problem. All the ATMs nowadays incorporate a hidden camera in them and capture the footage of their users. However, it is impossible for the police to track down the impersonators with disguised faces from the ATM footage. The proposed DCNN model is trained to identify, in real time, whether the user in the captured image is trying to cloak his identity or not. The output of the DCNN is then reported to the ATM to take appropriate steps and prevent the swindler from completing the transaction. The network is trained using a dataset of images captured in similar situations as of an ATM. The comparatively low background clutter and less viewpoint variation in the images enable the network to demonstrate high accuracy in feature extraction and classification for all the different disguises.
引用
收藏
页码:234 / 238
页数:5
相关论文
共 15 条
[1]  
Das S., 2011, INT J INFORM COMMUNI
[2]  
Davis Josh P., 2017, EM SEC TECHN EST 201
[3]  
Dhamecha TI, 2013, INT CONF BIOMETR
[4]  
Dwivedi Shivendra, 2016, INT C ADV COMP ICAC
[5]  
Fagbolu Olutola, 2014, IJISET, V1, P584
[6]  
Haavisto M., 2013, DEEP GENERATIVE MODE
[7]  
Kibona Lusekelo, 2015, IJSRST, V1
[8]  
Kingma D., 2014, Adam: A method for stochastic optimization, DOI 10.48550/arXiv.1412.6980
[9]  
Onyesolu Moses O., 2017, IMPROVING SECURITY U
[10]   Recognizing disguised faces [J].
Righi, Giulia ;
Peissig, Jessie J. ;
Tarr, Michael J. .
VISUAL COGNITION, 2012, 20 (02) :143-169