Application of Three Convolutional Neural Network Algorithms for Occluded Face Identification and Recognition for System Security

Authors

  • Mamadou Diarra Laboratoire Mécanique et Informatique, Université Felix Houphouët-Boigny, Côte d’Ivoire
  • Ayikpa Kacoutchy Jean Unité de Recherche et d’Expertise numérique, Université Virtuelle de Côte d’Ivoire, Côte d’Ivoire
  • Ballo Abou Bakary Laboratoire Mécanique et Informatique, Université Felix Houphouët-Boigny, Côte d’Ivoire
  • Kouassi Brou Medard Laboratoire Mécanique et Informatique, Université Felix Houphouët-Boigny, Côte d’Ivoire

DOI:

https://doi.org/10.54536/ajmri.v1i5.740

Keywords:

Computer Vision, CNN Pre-Trained, Deep Learning, Face Recognition, Occlusion

Abstract

Deep Learning techniques in computer vision have become indispensable elements in biometric systems, especially face recognition. Facial recognition can be reliably used as an identification and authentication tool for premises or network access security. The masks wearing, which is one of the problems of concealment, are nowadays part of our habits for preventing COVID-19 disease, which leads to an obstruction of facial recognition. Occulted face recognition is one of the most challenging problems biometrics deals with. This paper presents convolution neural network algorithms for occluded face recognition. Our study presents a robust method using algorithms such as ResNet-50, VGG-19, and DenseNet-201 to contribute to occluded face recognition. Various parameters are used for this experiment, such as the cross-entropy used as a loss function and optimization algorithms adapted to deep learning. These include the SGD, Adam, and RMSProp optimizers. The convolution neural network algorithms were evaluated on the AR database. This experiment gave results that ranged from 94.81 to 99.81% for SGD, from 0 to 96.92 for Adam, and finally from 0 to 96.92 for RMSProp. DenseNet-201 algorithm using the SGD optimizer obtained the best score with 99.81%, and all the performance metrics used such as accuracy, MSE, F-score, recall, and MCC were used to confirm this good performance.

Downloads

Download data is not yet available.

References

Arnia, F., Saddami, K., & Munadi, K. (2021). DCNet : Noise-Robust Convolutional Neural Networks for Degradation Classification on Ancient Documents. Journal of Imaging, 7(7), 114. https://doi.org/10.3390/jimaging7070114

AR Face Database Webpage. (2022). Consulté 10 octobre 2022, à l’adresse. https://www2.ece.ohio-state.edu/~aleix/ARdatabase.html

Artificial neural networks. Pt. 3. (2010). Springer.

Bo-Gun Park, Kyoung-Mu Lee, & Sang-Uk Lee. (2005). Face recognition using face-ARG matching. IEEE Transactions on Pattern Analysis and Machine Intelligence, 27(12), 1982‑1988. https://doi.org/10.1109/TPAMI.2005.243

He, K., Zhang, X., Ren, S., & Sun, J. (2015). Deep Residual Learning for Image Recognition. https://doi.org/10.48550/ARXIV.1512.03385

Idelette Kambi Beli, & Guo, C. (2017). Enhancing Face Identification Using Local Binary Patterns and K-Nearest Neighbors. Journal of Imaging, 3(3), 37. https://doi.org/10.3390/jimaging3030037

Jiang, R., Li, C.-T., Crookes, D., Meng, W., & Rosenberger, C. (2020). Deep biometrics. Springer.

Kingma, D. P., & Ba, J. (2014). Adam : A Method for Stochastic Optimization. https://doi.org/10.48550/ARXIV.1412.6980

Mantoro, T., Ayu, M. A., & Suhendi. (2018). Multi-Faces Recognition Process Using Haar Cascades and Eigenface Methods. 2018 6th International Conference on Multimedia Computing and Systems (ICMCS), 1‑5. https://doi.org/10.1109/ICMCS.2018.8525935

Martinez, A. M. (2002). Recognizing imprecisely localized, partially occluded, and expression variant faces from a single sample per class. IEEE Transactions on Pattern Analysis and Machine Intelligence, 24(6), 748‑763. https://doi.org/10.1109/TPAMI.2002.1008382

Martinez, A. M., & Kak, A. C. (2001). PCA versus LDA. IEEE Transactions on Pattern Analysis and Machine Intelligence, 23(2), 228‑233. https://doi.org/10.1109/34.908974

Min, R., Hadid, A., & Dugelay, J.-L. (2014). Efficient Detection of Occlusion prior to Robust Face Recognition. The Scientific World Journal, 1‑10. https://doi.org/10.1155/2014/519158

Papers with Code—RMSProp Explained. (s. d.). Retrieved 10 octobre 2022, à l’adresse https://paperswithcode.com/method/rmsprop

Praseetha, V. M., Bayezeed, S., & Vadivel, S. (2019). Secure Fingerprint Authentication Using Deep Learning and Minutiae Verification. Journal of Intelligent Systems, 29(1), 1379‑1387. https://doi.org/10.1515/jisys-2018-0289

Reddy, A. S. B., & Juliet, D. S. (2019). Transfer Learning with ResNet-50 for Malaria Cell-Image Classification. 2019 International Conference on Communication and Signal Processing (ICCSP), 0945‑0949. https://doi.org/10.1109/ICCSP.2019.8697909

Siegmund, D., Fu, B., José-García, A., Salahuddin, A., & Kuijper, A. (2021). Detection of Fiber Defects Using Keypoints and Deep Learning. International Journal of Pattern Recognition and Artificial Intelligence, 35(05), 2150016. https://doi.org/10.1142/S0218001421500166

Singh, P. K., Kar, A. K., Singh, Y., Kolekar, M. H., & Tanwar, S. (Éds.). (2020). Proceedings of ICRIC 2019 : Recent innovations in computing. Springer.

Team, K. (s. d.). Keras documentation : SGD. Consulté 10 octobre 2022, à l’adresse https://keras.io/api/optimizers/sgd/

Tsai, A.-C., Ou, Y.-Y., Hsu, L.-Y.-C., & Wang, J.-F. (2018). Efficient and Effective Multi-person and Multi-angle Face Recognition based on Deep CNN Architecture. 2018 International Conference on Orange Technologies (ICOT), 1‑4. https://doi.org/10.1109/ICOT.2018.8705876

Wang, D., Wang, H., Sun, J., Xin, J., & Luo, Y. (2020). Face Recognition in Complex Unconstrained Environment with An Enhanced WWN Algorithm. Journal of Intelligent Systems, 30(1), 18‑39. https://doi.org/10.1515/jisys-2019-0114

Wu, G., Tao, J., & Xu, X. (2019). Occluded Face Recognition Based on the Deep Learning. 2019 Chinese Control And Decision Conference (CCDC), 793‑797. https://doi.org/10.1109/CCDC.2019.8832330

Zhang, Y.-D., Wang, S.-H., & Liu, S. (Éds.). (2020). Multimedia technology and enhanced learning : Second EAI international conference, ICMTEL 2020, Leicester, UK, April 10-11, 2020, proceedings. Part I. Springer.

Zhou, J., Wang, Y., Sun, Z., Jia, Z., Feng, J., Shan, S., Ubul, K., & Guo, Z. (Éds.). (2018). Biometric recognition : 13th Chinese Conference, CCBR 2018, Urumchi, China, August 11-12, 2018: proceedings. Springer.

Downloads

Published

2022-10-25

How to Cite

Mamadou, D., Ayikpa, K. J., Ballo, A. B., & Kouassi, B. M. (2022). Application of Three Convolutional Neural Network Algorithms for Occluded Face Identification and Recognition for System Security. American Journal of Multidisciplinary Research and Innovation, 1(5), 24–32. https://doi.org/10.54536/ajmri.v1i5.740