Top Banner
RFID ACCESS AUTHORIZATION BY FACE RECOGNITION 報報報報 報報報 1 Proceedings of the Eighth International Conference on Machine Learning and Cybernetics, Baoding, 12-15 July 2009
16

RFID ACCESS AUTHORIZATION BY FACE RECOGNITION 報告學生:翁偉傑 1 Proceedings of the Eighth International Conference on Machine Learning and Cybernetics, Baoding,

Jan 11, 2016

Download

Documents

Scott Knight
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: RFID ACCESS AUTHORIZATION BY FACE RECOGNITION 報告學生:翁偉傑 1 Proceedings of the Eighth International Conference on Machine Learning and Cybernetics, Baoding,

RFID ACCESS AUTHORIZATION BY FACE

RECOGNITION

報告學生:翁偉傑

1 Proceedings of the Eighth International Conference on Machine Learning and Cybernetics, Baoding, 12-15 July 2009

Page 2: RFID ACCESS AUTHORIZATION BY FACE RECOGNITION 報告學生:翁偉傑 1 Proceedings of the Eighth International Conference on Machine Learning and Cybernetics, Baoding,

OUTLINE

Introduction

Security System for RFID Access Control

Face Feature Extraction with SIFT

L-GEM Trained RBFNN based Face Recognizer

Experimental Results

Conclusions 2

Page 3: RFID ACCESS AUTHORIZATION BY FACE RECOGNITION 報告學生:翁偉傑 1 Proceedings of the Eighth International Conference on Machine Learning and Cybernetics, Baoding,

INTRODUCTION

Radio Frequency Identification (RFID)的主要缺點,任何人都可以得到該卡存取。

本研究提出了一種基於神經網絡的人臉識別系統,

本研究提出了一個 Localized Generalization Error Model (L-GEM)的徑向 Radial Basis Function Neural Network (RBFNN) 人臉辨識系統,以提高安全性的 RFID卡的系統。 3

Page 4: RFID ACCESS AUTHORIZATION BY FACE RECOGNITION 報告學生:翁偉傑 1 Proceedings of the Eighth International Conference on Machine Learning and Cybernetics, Baoding,

SECURITY SYSTEM FOR RFID ACCESS CONTROL (1/2)

4

The Processes of Security System Training

Page 5: RFID ACCESS AUTHORIZATION BY FACE RECOGNITION 報告學生:翁偉傑 1 Proceedings of the Eighth International Conference on Machine Learning and Cybernetics, Baoding,

SECURITY SYSTEM FOR RFID ACCESS CONTROL (2/2)

5

The Processes of the Security System

Page 6: RFID ACCESS AUTHORIZATION BY FACE RECOGNITION 報告學生:翁偉傑 1 Proceedings of the Eighth International Conference on Machine Learning and Cybernetics, Baoding,

FACE FEATURE EXTRACTION WITH SIFT (1/3)

6

範例:

SIFT 它的穩定性和精度高優於其他描述。

Page 7: RFID ACCESS AUTHORIZATION BY FACE RECOGNITION 報告學生:翁偉傑 1 Proceedings of the Eighth International Conference on Machine Learning and Cybernetics, Baoding,

FACE FEATURE EXTRACTION WITH SIFT (2/3)

7

Local Feature Descriptors of Two Images of the Same Person

Page 8: RFID ACCESS AUTHORIZATION BY FACE RECOGNITION 報告學生:翁偉傑 1 Proceedings of the Eighth International Conference on Machine Learning and Cybernetics, Baoding,

FACE FEATURE EXTRACTION WITH SIFT (3/3)

8The Local Feature Descriptors of Two Images of Two Different People

Page 9: RFID ACCESS AUTHORIZATION BY FACE RECOGNITION 報告學生:翁偉傑 1 Proceedings of the Eighth International Conference on Machine Learning and Cybernetics, Baoding,

L-GEM TRAINED RBFNN BASED FACE RECOGNIZER (1/3)

9

The RBFNN is trained as follows:

1. Store the RFID card owner information in the database and take 10 images of the owner

2. L-GEM trained RBFNN to recognize face of person.

3. The trained RBFNN is then stored in the database and associated with the card owner.

Page 10: RFID ACCESS AUTHORIZATION BY FACE RECOGNITION 報告學生:翁偉傑 1 Proceedings of the Eighth International Conference on Machine Learning and Cybernetics, Baoding,

L-GEM TRAINED RBFNN BASED FACE RECOGNIZER (2/3)

10is a general framework to estimate the localized generalization error of a classifier

where N, Remp and SM denote the number of training samples, the training mean square error and the stochastic sensitivity measure of RBFNN, respectively.

Page 11: RFID ACCESS AUTHORIZATION BY FACE RECOGNITION 報告學生:翁偉傑 1 Proceedings of the Eighth International Conference on Machine Learning and Cybernetics, Baoding,

L-GEM TRAINED RBFNN BASED FACE RECOGNIZER (3/3)

11

The procedures for the face recognition after reading the RFID card ID is as follows:

1. Fetch the card owner’s RBFNN from the database

2. Face Detection by Adaboost and output a small image with face only

3. Extract local feature descriptor from the detected face image

4. Classify the face by the RBFNN trained by the L-GEM

5. If the face owner does not match the RFID card owner, alert security, otherwise end

Page 12: RFID ACCESS AUTHORIZATION BY FACE RECOGNITION 報告學生:翁偉傑 1 Proceedings of the Eighth International Conference on Machine Learning and Cybernetics, Baoding,

EXPERIMENTAL RESULTS (1/4)

In this experiment, we assume that there are 3 users of the security system. Each of them holds an RFID card. The system is built to verify whether the card holder is the card owner. We name these 3 people as Person A, Person B and Person C for convenience.

以 10張為訓練圖像。

實驗 90次,分為 30 次 ( 個人 )和 60 次 ( 混合 ) 。12

Page 13: RFID ACCESS AUTHORIZATION BY FACE RECOGNITION 報告學生:翁偉傑 1 Proceedings of the Eighth International Conference on Machine Learning and Cybernetics, Baoding,

EXPERIMENTAL RESULTS (2/4)

13

Training Images of Person A

Page 14: RFID ACCESS AUTHORIZATION BY FACE RECOGNITION 報告學生:翁偉傑 1 Proceedings of the Eighth International Conference on Machine Learning and Cybernetics, Baoding,

EXPERIMENTAL RESULTS (3/4)

14

Moving in the entrance A face is detected

Tracing the detected face The Face leaving

Page 15: RFID ACCESS AUTHORIZATION BY FACE RECOGNITION 報告學生:翁偉傑 1 Proceedings of the Eighth International Conference on Machine Learning and Cybernetics, Baoding,

EXPERIMENTAL RESULTS (4/4)

15

Testing Results of the Security System

Page 16: RFID ACCESS AUTHORIZATION BY FACE RECOGNITION 報告學生:翁偉傑 1 Proceedings of the Eighth International Conference on Machine Learning and Cybernetics, Baoding,

CONCLUSIONS

This research proposed a security system combining RFID card access control with face recognition by RBFNN trained by the L-GEM.

enhance security of RFID card based access control systems

Can only recognize one person per access.

16