帳號:guest(18.223.213.123)          離開系統
字體大小: 字級放大   字級縮小   預設字形  

詳目顯示

以作者查詢圖書館館藏以作者查詢臺灣博碩士論文系統以作者查詢全國書目勘誤回報
作者:梅欣蕊
作者(英文):Zinhle Mavimbela
論文名稱:臉部辨識技術於居家安全之研究
論文名稱(英文):A Survey: Facial Recognition on Home Security
指導教授:羅壽之
指導教授(英文):Shou-Chih Lo
口試委員:李官陵
張耀中
口試委員(英文):Guan-Ling Lee
Yao-Chung Chang
學位類別:碩士
校院名稱:國立東華大學
系所名稱:資訊工程學系
學號:610821303
出版年(民國):110
畢業學年度:109
語文別:英文
論文頁數:97
關鍵詞:居家安全臉部辨識臉部偵測分類特徵提取
關鍵詞(英文):Home SecurityFacial RecognitionFace DetectionClassificationFeature Extraction
相關次數:
  • 推薦推薦:0
  • 點閱點閱:38
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:16
  • 收藏收藏:0
本研究的目的是解釋構建家庭安全面部識別所需的不同組件。此外,本文還解釋了人臉識別中常用的不同技術,包括識別算法、傳感器和方法論。同時,我們也會討論系統運行中無效的限制。通過對人臉識別相關論文的廣泛閱讀和整理,我們給出評價意見,為未來感興趣的研究人員提供清晰的研究背景。這篇論文的報告還表明,越來越多的深度學習技術被用於家庭安全的人臉識別的不同主題。
The objective of this paper is to compile information necessary to mark up a facial recognition-based home security by exploring the different components in it. This thesis also aims to show the different methods used for facial recognition by identifying the common techniques used such as algorithms, sensors, and methodologies. Limitations will also be discussed to show the downside of these types of systems. Because of extensive research reading facial recognition papers, we can critique the information used in these papers and synthesize this information to construct a path that other researchers will be able to use in the future. The results of this survey paper have shown that there more uses for more deep learning techniques to solve some of the issues that occur in facial recognition-based home security.
Acknowledgement i
Abstract ii
摘要 iii
Table of Contents iv
List of Figures vii
List of Tables ix
List of Abbreviations x
Glossary xi
Chapter 1: Introduction 1
1.1 Motivation 1
1.2 Development of Facial recognition-based home security systems 1
1.3 Contribution 2
1.4 Organization of the thesis 4
Chapter 2: History 5
2.1 Historical view of facial recognition 5
2.2 Historical view of Home Security 8
2.3 Integration of the two technologies 9
2.4 Benefits of Facial recognition in HS 10
2.5 Structure of FRBHS 11
Chapter 3: Core steps of Facial recognition and Algorithms used in FRBHS 16
3.1 Core step of facial recognition in HS 16
3.1.1 Motion Sensor module 17
3.1.2 Face Detection 19
3.1.2.1. Preprocessing 19
3.1.2.2 Detection 20
3.1.3 Facial feature extraction 21
3.1.3.1 Generic Methods 21
3.1.3.2 Feature based template 21
3.1.3.3 Appearance-based template 23
3.1.4 How are feature are represented? 23
3.1.5 Classifications 24
3.2 Common FR Algorithms used in HS 26
3.2.1 Haar-Cascade features 26
3.2.2 MTCNN 29
3.2.3 Face detection algorithms comparisons 31
3.2.4 Facial Recognition algorithms 32
3.2.4.1 LBPH 32
3.2.4.2 FaceNet 35
3.2.4.3 Comparison and Compatibility 38
3.3 Synopsis of all facial recognition algorithms and classifiers 39
Chapter 4. Sensors and Sensors Data 43
4.1 Image-Related Sensor data 44
4.2 Non-Image-Related Sensor data 49
4.3 Sensor conditions 51
Chapter 5. Single-boards 52
5.1 The main functions of Single-boards 52
5.1.1 Sensor processing 53
5.1.2 Face identification 55
5.1.2.1 The single board workflow 56
5.1.3 Memory and facial recognition on a single board 58
5.2 Face Verification: Training 61
5.2.1 Image collection 61
5.2.2 Initializing, face extraction, compression and training 65
Chapter 6. Current Problems, Future Solutions, Conclusion and Future works 70
6.1 Speed and USB accelerators 70
6.2 Accessories, false-motion reading, mask-oriented dataset and object detection 70
6.3 Training data and one sample training 73
6.4 Conclusion 73
6.5 Future work 75
References 77

[1] V. K. Suraj Pawar , Sagar Ahuja , Sunita Sahu, "Smart Home Security using IoT and Face Recognition " IEEE TRANSACTIONS ON COMMUNICATIONS, 2018.
[2] J. Y. Hema N. , "Secure Home Entry Using Raspberry Pi with Notification via Telegram," IEEE TRANSACTIONS ON COMMUNICATIONS, p. 213, 2020.
[3] I. Adjabi, A. Ouahabi, A. Benzaoui, and A. Taleb-Ahmed, "Past, Present, and Future of Face Recognition: A Review," Electronics, vol. 9, no. 8, 2020, doi: 10.3390/electronics9081188.
[4] S. A. K. Muhammad Waseem, Ramesh Kumar Ayyasamy and Farhan Bashir, "Face Recognition for Smart Door Lock System
using Hierarchical Network," presented at the 2020 International Conference on Computational Intelligence (ICCI), 2020.
[5] F. M. M. Shakir Fattah Kak, "Smart Home Management System Based on Face Recognition Index in Real-time," presented at the International Conference on Advanced Science and Engineering 2019.
[6] B. L. a. W. S. Trung Nguyen, "A Smart Security System with Face Recognition," 2018.
[7] Z. Xu, S. Ansari, A. M. Abdulghani, M. Ali Imran, and Q. H. Abbasi, "IoT Enabled Smart Security Framework for 3D Printed Smart Home," presented at the 2020 IEEE International Conference on Smart Internet of Things (SmartIoT), 2020.
[8] A. Kristopher, "Facial Recognition: A Survey," 2020.
[9] A. Bertillon. (1893). instructions Signaletiques.
[10] S. Shahnewas. ""Evolution of Facial Recognition Technology"." www.m2Sys.com/blog/guest-blog-posts/evolution-of-facial-recognition-Technology/ (accessed March 12, 2021, 2021).
[11] J. Siegel. "The History of Home Security—From Telegraphs to Smart Homes." https://www.frontpointsecurity.com/blog/the-history-of-home-security (accessed 2021).
[12] C. A. Hansen. I. f. C. S. U. o. Tromso. "facial recognition".
[13] B. B. M. Divyarajsinh N. Parmar, "Face Recognition Methods & Applications," International Journal of Computer Applications in Technology vol. Vol 4 (1),84-86, 2014.
[14] J. Bowen, George Orwell Nineteen Eighty-Four Oxford , United Kingdom Oxford Univeristy Press, 2021.
[15] D. I. L. a. J. H. HcGuire, "A PORTABLE FIRE DETECTOR," Institute of Water Resources/Engineering Experiment station, 1956.
[16] E. K.Smith, "Pilot Two-way CATV Systems," IEEE TRANSACTIONS ON COMMUNICATIONS, vol. VOL. COM-23,NO.1, 1975.
[17] A. H. Starkey and L. lcerman, "MONITORING; ENVIRONMENTAL AND RELATED PERFORMAMCE PARAMETERS TURBINE ELECTRIC GENERATOR UTILIZING GEOTHERMAL ENERGY FOR A RANKINE-CYCLE AT THE GILA, HOT SPRINGS," New Mexico Energy Research and Development Institute, 1984.
[18] S. Garrett, "HOME SYSTEMS OVERVIEW," p. 1, 1990.
[19] B. B. Pawan Sinha, Yuri Ostrovsky, and Richard Russell, " Face recognition by humans: Nineteen results all computer vision researchers should know about," IEEE TRANSACTIONS ON COMMUNICATIONS, vol. vol.94, 2006.
[20] B. M. Abdelmalik Ouamane, Abdelmalik taleb-ahmed, "Multimodal depth and intensity face verification approach using LBP, SLF, BSIF, and LPQ local features fusion," 2015, doi: 10.1134/S1054661815040215.
[21] N. A. O. AYDIN, "A Face Recognition Method in the Internet of Things for Security Applications in Smart Homes and Cities," presented at the 6th International Istanbul Smart Grids and Cities Congress and Fair, 2018.
[22] S. A. H. Fahim Faisal "Smart Security System Using Face Recognition on Raspberry Pi " IEEE TRANSACTIONS ON COMMUNICATIONS, 2019.
[23] P. M. Anissa Lintang Ramadhani , Eri Prasetyo Wibowo "Human Face Recognition Application Using PCA and Eigenface Approach " 2017.
[24] M. S. Ibrahim Mohammad Sayem, "Integrating Face Recognition Security System With the Internet of Things " presented at the International Conference on Machine Learning and Data Engineering, 2018.
[25] R. C. W. ZHAO, P. J. PHILLIPS, A. ROSENFELD, "Face Recognition: A Literature Survey," vol. Vol. 35, No. 4, 2003.
[26] U. Bakshi and R. S. , "A SURVEY ON FACE DETECTION METHODS AND FEATURE EXTRACTION TECHNIQUES OF FACE RECOGNITION," presented at the International Journal of Emerging Trends & Technology in Computer Science, 2014.
[27] M. J. Paul Viola, "Rapid Object Detection using a Boosted Cascade of Simple Features " IEEE TRANSACTIONS ON COMMUNICATIONS, 2001.
[28] H. W. YingGang Xie, ShaoHua Guo, "Research on MTCNN Face Recognition System in Low Computing Power Scenarios," Journal of Internet Technology, vol. vol.21, 2020, doi: 10.3966/160792642020092105020
[29] Ankit Srivastava and A. S. Suraj Mane, Nirmit Shrivastava, Prof. Bhushan Thakare, "A survey of face detection algorithms," International Conference on Inventive Systems and Control, 2017.
[30] G. M. Edwin Jose, Mithun Haridas T. P., and Supriya M. H, "Face Recognition based Surveillance System Using
FaceNet and MTCNN on Jetson TX2," presented at the 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS), 2019.
[31] D. A. Dwi Ana Ratna Wati "Design of Face Detection and Recognition System for Smart Home Security Application " presented at the 2nd International Conferences on Information Technology, Information Systems and Electrical Engineering, 2017.
[32] S. R. Prayag Bhatia, Shashank Pathak, Shivam Prasad, EMAD NABIL, IBRAHIM FARAG1 AND HALA ABDEL, "IOT based facial recognition system for home security using LBPH algorithm," presented at the Proceedings of the International Conference on Inventive Computation Technologies (ICICT-2018), 2018.
[33] I. A. Nashwan Adnan OTH, "A Face Recognition Method in the Internet of Things for Security Applications in Smart Homes and Cities," presented at the 6th International Istanbul Smart Grids and Cities Congress and Fair, 2018.
[34] S. A. Zhihan Xu, Amir M. Abdulghani,Muhammad Ali Imran and Qammer H. Abbasi "IoT Enabled Smart Security Framework for 3D Printed Smart Home " presented at the 2020 IEEE International Conference on Smart Internet of Things, 2020.
[35] K. B. S. S. a. A. V, "Image Classification For Visitors Home Security," Turkish Journal of Computer and Mathematics Education, vol. 12, 2021.
[36] M. K. a. H. M. Teddy Surya Gunawan, "Performance Evaluation of Smart Home System using Internet of Things," International Journal of Electrical and Computer Engineering, vol. Vol. 8, 2018, doi: 10.11591/ijece.v8i1.pp400-411.
[37] W. Gay, DHT11 Sensor (Advanced Raspberry Pi). 2018.
[38] H. M. B. Ibtihaj Abdulwahhab Abdulrazzak Ibtihaj Abdulwahhab Abdulrazzak, and Luma Ahmed, "Humidity and temperature monitoring," International Journal of Engineering & Technology, 2018, doi: 10.14419/ijet.v7i4.23225.
[39] A. K. M. J. Majumder and J. A. Izaguirre, "A Smart IoT Security System for Smart-Home Using Motion Detection and Facial Recognition," presented at the 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC), 2020.
[40] C. C. a. Y. Wang, "Face Detection Based on Extended Haar-Iike Features " presented at the 2nd International Conference on Mechanical and Electronics Engineering, 2010.
[41] R. Pi. "Setup." https://www.raspberrypi.org/documentation/setup/ (accessed 3 April 2021, 2021).
[42] P. S. K. Abhishek Kumar, Dr.Rashmi Agarwal, " Face Recognition Method in the IoT for Security Appliances in Smart Homes, Offices and Cities," presented at the Third International Conference on Computing Methodologies and Communication, 2019.
[43] T. H. V. Mattia Antonini, Chulhong Min, Alessandro Montanari, Akhil Mathur and Fahim Kawsar, "Resource Characterisation of Personal-Scale Sensing Models on Edge Accelerators," 2019, doi: 10.1145/3363347.3363363.
[44] W.-J. Y. a. J. S. Xin Zhang, "Home Surveillance System using Computer Vision
and Convolutional Neural Network " 2019.
[45] E. N. MOHAMED ABDELMAKSOUD , IBRAHIM FARAG AND HALA ABDEL HAMEED, "A Novel Neural Network Method for Face Recognition with a Single Sample Per Person," vol. vol.4, 2016, doi: 10.1109/ACCESS.2020.2999030.
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
* *