Robust Facial Recognition With Reconfigurable Platforms
clemson.edu
Sign up for access to the world's latest research
Abstract
AI
AI
This paper addresses the challenges and potential of robust facial recognition using reconfigurable platforms, specifically focusing on architectural advancements that leverage various algorithms such as PCA, LDA, and ICA. It highlights the limitations of existing facial recognition algorithms due to variations in input data and proposes a parallel implementation of these algorithms in hardware to improve processing speed and accuracy. By combining multiple approaches and utilizing consensus algorithms for identity verification, the work aims to enhance the performance of facial recognition systems for real-world applications.
Related papers
International Journal of Scientific Research and Management (IJSRM), 2025
Facial recognition technology has emerged as a vital innovation in the field of biometric identity verification, offering benefits such as enhanced security and user convenience. This paper explores its various applications, including public safety, access control, and consumer devices. Despite the advantages, significant challenges such as algorithmic bias, lighting variations, and privacy concerns remain, requiring further research and technological advancements.
Law, technology and humans, 2023
Authored by leading experts in facial recognition in Australia, Facial Recognition presents a comprehensive account of the diversified facial recognition technology (FRT) applications in multiple scenarios. Andrejevic and Selwyn draw on interesting contemporary examples, such as FRT usage by employers seeking to analyse a job applicant's compatibility, retail stores aiming to detect clients' satisfaction and preferences, and law enforcement and intelligence agencies. The book is neatly structured, consisting of a preface, the main body (comprising seven chapters) and an epilogue. The authors helpfully address FRT's main characteristics in the first two chapters, in addition to clarifying its historical development and delineating its essential concepts. 1 The third chapter focuses on analysing FRT's global application. 2 The fourth, fifth and sixth chapters scrutinise the pros and cons of the technology, seeking to understand its potential benefits and harms. 3 The last chapter critically evaluates FRT from an individual and societal point of view. 4 Finally, in the epilogue, the writers share their perspectives concerning possible future FRT deployment and implementation paths. 5 Considering the diversity of FRT problems extensively tackled in the book and the richness of the analysis, I have decided to narrow my focus in this book review to parts of the analysis that appealed to my interest as a legal scholar working on the deployment of FRT in Brazil.
Face Recognition is the highly used method in security issues and also used in various applications. This technique highly used as the most reliable real time application for victim identification. This paper gives the study of evolution of face recognition method in each period and analyzing merit and demerit of the each evolutionary period. This paper helps to realize the importance of the face recognition technique.
2012
In recent days, the need of biometric security system is heightened for providing safety and security against terrorist attacks, robbery, etc. The demand of biometric system has risen due to its strength, efficiency and easy availability. One of the most effective, highly authenticated and easily adaptable biometric security systems is facial feature recognition. This paper h a s covered almost all the techniques for face recognition approaches. It also covers the relative analysis between all the approaches which are useful in face recognition. Consideration of merits and demerits of all techniques is done and recognition rates of all the techniques are also compared.
Concepts, Methodologies, Tools, and Applications
Face recognition technology is one of the most widely used problems in computer vision. It is widely used in applications related to security and human-computer interfaces. The two reasons for this are the wide range of commercial and law enforcement applications and the availability of feasible technologies. In this chapter the various biometric systems and the commonly used techniques of face recognition, Feature Based, eigenface based, Line Based Approach and Local Feature Analysis are explained along with the results. A performance comparison of these algorithms is also given.
As in the environment importance of security is increasing. So for organization identification and authentication is also important. The face recognition methods have become a key technology in various areas: access control in buildings; access control for computer in general or for ATMs in particular day-today affairs like withdrawing money from bank account or dealing with the post office; or in the prominent field of criminal investigation. Such requirement for reliable personal identification in computerized access control has resulted in an increased in biometrics and in the main field the face recognition. Face recognition is a biometric method of identifying a person based on a photograph of his face. The quality of the computer recognition system is dependent on the quality of the image and mathematical algorithms used to convert a picture into numbers. Important factors for the image quality are light, background, and position of the head. There are different kinds of algorithms for the face recognition. The different algorithms for the face recognition differ in their behaviours, but the analysis follows the same steps. The first step is image acquisition; once the image is captured, a head is identified. In some cases, before the feature extraction, it might be necessary to normalize the image, and then begins feature extraction using one of the algorithms. For any given computer vision problem, there are numerous algorithms designed to solve it. The design of each algorithm is based on a set of decisions and assumptions. These algorithms are able to recognise the face from small and large database. These algorithms have different features and are 2-D or 3-D based. These algorithms are divided in different categories based on the approach used for the face recognition. Also different types of databases are available for face recognition like FERET, Asian and Korean etc.
euroasiapub.org
As in the environment importance of security is increasing. So for organization identification and authentication is also important. The face recognition methods have become a key technology in various areas: access control in buildings; access control for computer in general or for ATMs in particular day-to-day affairs like withdrawing money from bank account or dealing with the post office; or in the prominent field of criminal investigation. Such requirement for reliable personal identification in computerized access control has resulted in an increased in biometrics and in the main field the face recognition. Face recognition is a biometric method of identifying a person based on a photograph of his face. The quality of the computer recognition system is dependent on the quality of the image and mathematical algorithms used to convert a picture into numbers. Important factors for the image quality are light, background, and position of the head. There are different kinds of algorithms for the face recognition. The different algorithms for the face recognition differ in their behaviours, but the analysis follows the same steps. The first step is image acquisition; once the image is captured, a head is identified. In some cases, before the feature extraction, it might be necessary to normalize the image, and then begins feature extraction using one of the algorithms. For any given computer vision problem, there are numerous algorithms designed to solve it. The design of each algorithm is based on a set of decisions and assumptions. These algorithms are able to recognise the face from small and large database. These algorithms have different features and are 2-D or 3-D based. These algorithms are divided in different categories based on the approach used for the face recognition. Also different types of databases are available for face recognition like FERET, Asian and Korean etc.
—System that relay on face recognition biometrics have gained great impact on security system since security threats are imposed weakness among the implemented security system. Other biometrics which used for security like fingerprints have some issues and they are not trust worthy. In this survey paper we discussed different types of existing face recognition techniques along with their pros and cons. Face recognition is not a simple thing its very complex system because in face recognition if the user hide their face with sunglasses or hide the face with hijab then its difficult task to recognize the face for that purpose in face recognition used different types of techniques which can recognize the faces in this survey paper we discussed these techniques.
System that relay on face recognition biometrics have gained great impact on security system since security threats are imposed weakness among the implemented security system. Other biometrics which used for security like fingerprints have some issues and they are not trust worthy. In this survey paper we discussed different types of existing face recognition techniques along with their pros and cons. Face recognition is not a simple thing its very complex system because in face recognition if the user hide their face with sunglasses or hide the face with hijab then its difficult task to recognize the face for that purpose in face recognition used different types of techniques which can recognize the faces in this survey paper we discussed these techniques.

Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
References (2)
- Cook, Diane; Das, Sajal (2004). Smart Environments: Technology, Protocols and Applications. Wiley-Interscience. ISBN 0-471-54448-5.
- K. Delac, M. Grgic, S. Grgic, Independent Comparative Study of PCA, ICA, and LDA on the FERET Data Set, International Journal of Imaging Systems and Technology, Vol. 15, Issue 5, pp. 252-260