FACE VERIFICATION SYSTEM IN MOBILE DEVICES BY USING COGNITIVE SERVICES

Similar documents
3D Face Recognition System in Time Critical Security Applications

A Smart Home Design and Implementation Based on Kinect

LabVIEW based Intelligent Frontal & Non- Frontal Face Recognition System

A Proposal for Security Oversight at Automated Teller Machine System

Title Goes Here Algorithms for Biometric Authentication

EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION

Image Extraction using Image Mining Technique

Bridgemate App. Information for bridge clubs and tournament directors. Version 2. Bridge Systems BV

Participant Identification in Haptic Systems Using Hidden Markov Models

Biometrics - A Tool in Fraud Prevention

Combined Approach for Face Detection, Eye Region Detection and Eye State Analysis- Extended Paper

Specification history

Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security

Image Finder Mobile Application Based on Neural Networks

MATLAB DIGITAL IMAGE/SIGNAL PROCESSING TITLES

JAM 2015 Screenshots of filling Online Application Form

3D Face Recognition in Biometrics

Iris Recognition-based Security System with Canny Filter

ACADEMIC YEAR

An IoT Based Real-Time Environmental Monitoring System Using Arduino and Cloud Service

BIOMETRICS BY- VARTIKA PAUL 4IT55

Advanced PCA for Enhanced Illumination in Face Recognition to Control Smart Door Lock System

SMART SURVEILLANCE SYSTEM FOR FACE RECOGNITION

Office hrs: QC: Tue, 1:40pm - 2:40pm; GC: Thur: 11:15am-11:45am.or by appointment.

I. INTRODUCTION II. LITERATURE SURVEY. International Journal of Advanced Networking & Applications (IJANA) ISSN:

Computer Vision in Human-Computer Interaction

Integrated Digital System for Yarn Surface Quality Evaluation using Computer Vision and Artificial Intelligence

SPTF: Smart Photo-Tagging Framework on Smart Phones

Using Bluetooth Low Energy Beacons for Indoor Localization

Student Attendance Monitoring System Via Face Detection and Recognition System

UNIT 2 TOPICS IN COMPUTER SCIENCE. Emerging Technologies and Society

Automatic Locking Door Using Face Recognition

ELG 5121/CSI 7631 Fall Projects Overview. Projects List

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER

SCIENCE & TECHNOLOGY

Classification Experiments for Number Plate Recognition Data Set Using Weka

DEEP DIVE ON AZURE ML FOR DEVELOPERS

SMART CITY ENHANCING COMMUNICATIONS

Proposed Method for Off-line Signature Recognition and Verification using Neural Network

RKSLAM Android Demo 1.0

Live Hand Gesture Recognition using an Android Device

An Analysis of Existing Android Image Loading Libraries: Picasso, Glide, Fresco, AUIL and Volley. Yoo-jeong SONG, Soo-bin OU and Jong-woo LEE *

MSc(CompSc) List of courses offered in

Multi-Resolution Estimation of Optical Flow on Vehicle Tracking under Unpredictable Environments

USER GUIDE JOINING PLAYSIGHT SMARTCOURT

Biometric Authentication for secure e-transactions: Research Opportunities and Trends

Automatic Electricity Meter Reading Based on Image Processing

A USEABLE, ONLINE NASA-TLX TOOL. David Sharek Psychology Department, North Carolina State University, Raleigh, NC USA

INTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET)

Multimodal Face Recognition using Hybrid Correlation Filters

Face Recognition Based Attendance System with Student Monitoring Using RFID Technology

Controlling Humanoid Robot Using Head Movements

MOBILE BASED HEALTHCARE MANAGEMENT USING ARTIFICIAL INTELLIGENCE

ABSTRACT I. INTRODUCTION II. LITERATURE SURVEY

International Journal of Advance Research in Engineering, Science & Technology NEW GENERATION ATM WITH FACE AUTHENTICATION

DESIGN STYLE FOR BUILDING INTERIOR 3D OBJECTS USING MARKER BASED AUGMENTED REALITY

VIEW POINT CHANGING THE BUSINESS LANDSCAPE WITH COGNITIVE SERVICES

IRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology

A step-by-step process for attaching a photo of the park through Android Mobile Application

UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT

IRIS BIOMETRICS FROM SEGMENTATION TO TEMPLATE SECURITY ADVANCES IN INFORMATION SECURITY

AI MAGAZINE AMER ASSOC ARTIFICIAL INTELL UNITED STATES English ANNALS OF MATHEMATICS AND ARTIFICIAL

Enhancing Shipboard Maintenance with Augmented Reality

ISSN Vol.02,Issue.17, November-2013, Pages:

Face Detection System on Ada boost Algorithm Using Haar Classifiers

User Awareness of Biometrics

Introduction to Biometrics 1

VIDEO DATABASE FOR FACE RECOGNITION

Advancements in Gesture Recognition Technology

Follower Robot Using Android Programming

Design and Development of Mobile Games By Cocos2d-X Game Engine

NAIS People of Color Conference: Proposal Submission Guide

Real time verification of Offline handwritten signatures using K-means clustering

The five senses of Artificial Intelligence. Why humanizing automation is crucial to the transformation of your business

Principal Component Analysis(PCA) with Back Propogation Neural Network(BPNN) for Face Recognition System

An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression

Chapter 6 Face Recognition at a Distance: System Issues

Facial Recognition application in computer system

Indoor Location System with Wi-Fi and Alternative Cellular Network Signal

Face Detection: A Literature Review

ENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION

Authenticated Document Management System

About user acceptance in hand, face and signature biometric systems

An Un-awarely Collected Real World Face Database: The ISL-Door Face Database

The 2019 Biometric Technology Rally

An Overview of Biometrics. Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University

Near Infrared Face Image Quality Assessment System of Video Sequences

A Publicly Available RGB-D Data Set of Muslim Prayer Postures Recorded Using Microsoft Kinect for Windows

Blue Eyes Technology with Electric Imp Explorer Kit Ankita Shaily*, Saurabh Anand I.

A Test Bed for Verifying and Comparing BIM-based Energy Analysis Tools

Toward an Augmented Reality System for Violin Learning Support

THE USE OF ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING IN SPEECH RECOGNITION. A CS Approach By Uniphore Software Systems

A VIDEO CAMERA ROAD SIGN SYSTEM OF THE EARLY WARNING FROM COLLISION WITH THE WILD ANIMALS

Bridgemate App. Tournament directors features. Bridge Systems BV

FACE RECOGNITION USING NEURAL NETWORKS

Child Check In Frequently Asked Questions

Motivation and objectives of the proposed study

The five senses of Artificial Intelligence

Card IEEE Symposium Series on Computational Intelligence

Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics

Transcription:

International Journal of Intelligent Systems and Applications in Engineering Advanced Technology and Science ISSN:2147-67992147-6799 www.atscience.org/ijisae Original Research Paper FACE VERIFICATION SYSTEM IN MOBILE DEVICES BY USING COGNITIVE SERVICES Adem Alpaslan ALTUN* 1, Cagatay KOLUS 2 Accepted : 19/10/2018 Published: 31/12/2018 DOI: 10.1039/b000000x Abstract: Biometric systems enable people to distinguish between physical and behavioral characteristics. Face recognition systems, a type of biometric systems, use peoples facial features to recognize them. The aim of this study is to perform face recognition and verification system that can run on mobile devices. The developed application is based on comparing the faces in two photographs. The user uploads two photos to the system, the system identifies the faces in these photos and performs authentication between the two faces. As a result, the system gives the output that the two faces in the photo belong to the same or different persons. It provides a security measure thanks to the face identification and verification feature included in this application. This application can be integrated into various applications and used in systems such as user login. Keywords: Cognitive services, Face identification, Face verification, Image Processing, Mobile application 1. Introduction Facial recognition technology is used in many different areas today [1-3]. The use of the system as an input method, detection of criminals can be given as an example of some of these areas of use [4, 5]. According to the researchers, the face recognition method is seen as a more natural and effective biometric method than the identification methods such as iris, fingerprint [6]. Facial recognition technology provides a variety of output for the inputs that are trained as a result of the system being trained. The success of the system depends on the most effective way of learning, and on the success of various processes applied to inputs [7]. Face recognition is based on calculating the ratio of the face to be recognized to the faces in the database. This is accomplished by finding that the queried photo matches more closely with the photos in the database [8]. 2. Materials and Method Mobile applications are software programs developed for mobile devices such as smartphones and tablets [9, 10]. In this study, Android Studio application development platform and Microsoft Cognitive Services were used. Android Studio is a mobile application development environment that provides features such as code editing, debugging, and performance tracking, enabling applications to run on any Android device [11]. Microsoft Cognitive Services are collection of machine learning algorithm which helps in solving various problems in the field of artificial intelligence, like language processing, machine learning search, computer vision etc. Basically Cognitive Services are collection of APIs, SDKs and services designed for developers. These services can make the applications more intelligent and more interactive. The aim of these services is to supply interesting and well - off computing experience. The available APIs of 1 Computer Eng. Dept., Selcuk University, Konya 42002, TURKEY 2 Inst. of Natural Sciences, Selcuk University, Konya 42002, TURKEY * Corresponding Author: Email: altun@selcuk.edu.tr Microsoft Cognitive Services are Language API, Vision API, Speech API, Knowledge API, etc. Each API performs different functions such as language API identifies and discovers the requirements of the user, vision API examines the images an d videos for useful information, speech API helps in identifying the speaker and knowledge API captures research from scientific account. By using these APIs developers can add the intelligent features like understanding face detection, speech detection, vision detection and recognition, emotion detection and video detection. The characteristics which distinguish Microsoft Cognitive Services from other services are multiple face tracking in less time, more accuracy in face recognition, presence of emotions with their types and percentages, better APIs. Microsoft Cognitive Service APIs are used in various field s like enhancing the security, expressing farcical moments, engaging customers via chat, etc. [12] Microsoft Cognitive Services helps developers create intelligent applications. It provides many features for developers such as speech and image recognition, face and emotion detection [13]. This API performs functions such as detecting face attributes and recognizing the face. It basically helps in detecting, analyzing and organizing in given images. This API detects human face with high precision. It allows us to tag faces in any given photo. Alternatively, face detection allows extraction of face attributes like gender, age, facial hair, glasses, head pose etc. This API provides four face recognition func tions: face verification, finding similar faces, face grouping, and identification. This API helps in adding super cool intelligence while building the applications [14, 15]. The face validation API provided in Microsoft Cognitive Services offers the ability to control the likelihood that people identified in different photos are the same person. This API returns a confidence score about the likelihood of two faces belonging to a single person. There are a total of 30,000 process limits and a maximum of 20 process limits per minute [16]. The implementation was developed using the Microsoft Cognitive face verification API, which includes the ability to detect, identify, analyse, organize, and tag faces in photos. International Journal of Intelligent Systems and Applications in Engineering IJISAE, 2018, 6(4), 294 298 294

Genymotion is an Android emulator with a set of features for interacting with a virtual Android environment. With Genymotion, Android applications can be developed, run and tested with a wide variety of virtual devices [17]. The app was tested by creating an Android device in the Genymotion environment. In this study, Android application in Java language was developed in Android Studio 3.0.1 environment. The working principle of the developed application is described below: 1. The captured image from the camera or the selected image from the gallery is uploaded to the application as the 1st photo 2. The system detects the faces in the 1st photo after the 1st photo is uploaded. 3. The faces detected in the photo are listed on the side of the photo. 4. The captured image from the camera or the selected image from the gallery is uploaded to the application, 1st photo 5. The system detects the faces in the 2nd photo after the 2nd photo is uploaded. 6. The faces detected in the photo are listed on the side of the photo. 7. Make a selection from the recognized faces in photo 1 and photo 2 and click on the "Verify" button. 8. The system detects whether the selected two faces are the same person and notifies the user. 9. The similarity rate of the selected faces is shown as a value between 0 and 100. 3. Experimental Results The developed application consists of two parts. These sections are the section on application and about. In the application section, there is a button that directs the division, which allows the face identification and verification process to be performed. The About section contains information about the application. Fig. 1 shows a screenshot of the application area. button showing the records of the transactions made. Fig. 2. Image Selection Phase In the realization of the face recognition process, two sample photographs were used. These photographs are shown in Fig. 3. In the application, click the select image button and the 1st photo shown in Fig. 3 is selected. The system identifies the faces and lists the detected faces in thumbnail. The list contains the ability to scroll down. In addition, the number of faces detected in the first photo is given. A visual representation of this application is given in Fig. 4. Fig. 1. Application Start Page When you click on the Start button, the section that performs the face identification and verification process opens. In Fig. 2, this section has been given a screenshot. In this section, two images should be selected for identification and verification. There is a Fig. 3. Sample Photographs International Journal of Intelligent Systems and Applications in Engineering IJISAE, 2018, 6(4), 294 298 295

person. In Fig. 5, two face selections were made and the result shown in Fig. 6 is obtained when the confirm button is clicked. In Fig. 6, it is seen that there are different people because the similarity rate of the two faces selected is 17%. To show the result of the validation process being performed on the same person, the selected face from Image 0 has been replaced with a different person face from Image 1. When the validation process is applied, it is given that the faces selected in Image 0 and Image 1 belong to the same person because the similarity ratio is 71%. A screenshot of this application is shown in Fig. 7. Fig. 4. Face Identification and Verification Phase Image 0 After image selection process is done as Image 0, image selection process is done as Image 1. For this, click the Select Image button in the lower part. The second photo shown in Fig. 3 is selected and the identified faces are listed in thumbnail. The number of faces detected in the bottom section is given to the user. A visual representation of this application is given in Fig. 5. Fig. 6. Performing Verification on Faces of Different Persons Fig. 5. Face Identification and Verification Phase Image 1 After selecting images as Image 0 and Image 1, the faces to be compared are selected from the listed face images beside both images. When the Verify button is clicked, the user is informed numerically whether the selected two faces belong to the same Fig. 7. Performing Verification on Faces of Same Person International Journal of Intelligent Systems and Applications in Engineering IJISAE, 2018, 6(4), 294 298 296

Records of all transactions made are kept. A list of all the actions performed when clicking the Show Record button is visible. In this section where the records are displayed, information about resizing of two images uploaded to the system, successful detection of the images, the number of faces detected in the visuals, request for sending the faces to be verified to the server, the status of the returned response and the result of the response appear. Fig. 8 shows a screenshot of the system register with two requests. The first response was successful and the result was negative. The second response was successful and the result was positive. In practice, each process takes about 3 seconds, such as uploading photos to the system, detecting and verifying faces in uploaded photos because Microsoft Cognitive Services is used in the process of performing transactions. An information screen informing the user is developed as shown in Fig. 9. The determination of whether the system is stable or not has been done on photographs containing more than one person. As shown in Fig. 10, a test for face detection and verification of persons labelled A, B, C, D, E was performed. This test involves comparing each face in the photo with each other. (a) (b) Fig. 10. Face detection and verification of persons Fig. 8. Screenshot of the system register The result of this test is given in Table 1. The rows represent the faces on the upper photo in Fig. 10 and the columns represent the faces on the lower. Similarity ratios of 25% comparisons were obtained. When the results obtained were observed, it was seen that all persons were correctly verified. Table 1. Similarity Rates after Verification Process Faces in Fig. 10 (a) A B C D E A 87 13 46 32 31 Faces in Fig. 10 (b) B 08 87 19 35 16 C 27 24 82 39 32 D 35 38 35 80 27 E 24 13 29 38 85 Fig. 9. User Information Screens When the results obtained were observed, the highest similarity rate was obtained as 87% for persons A and B. Despite being the same person in both photographs, the similarity rate for D person was 80%. Some of the reasons for the similarity ratio being different are the effect of the person's posing position and light. International Journal of Intelligent Systems and Applications in Engineering IJISAE, 2018, 6(4), 294 298 297

4. Conclusion The Cognitive Services are very up - and - coming, assuring and sum of these services are already being used in various application areas. The dev elopers use these services to improve the applications by adding some new, rich and intelligent features. These services basically aim at providing more personal and rich computing experiences for users as well as developers. The range of application areas of these cognitive services is less but it can be expanded by using their services along with other modern services and techniques. In this work, an Android application was developed that includes face identification and authentication methods that can work on mobile devices. The developed application provides a security measure through its face identification and authentication feature. This application can be integrated into various applications and used in systems such as user login. User authentication can be performed by scanning the user's face without the need for password entry. Balasubramanya Murthya, S. Natarajanb. (2015), Cloud Based Big Data Analytics Framework for Face Recognition in Social Networks using Machine Learning, 2nd International Symposium on Big Data and Cloud Computing (ISBCC 15). [15] L. Larsen (2017), Learning Microsoft Cognitive Services - Create intelligent apps with vision, speech, language, and knowledge capabilities using Microsoft Cognitive Services, Packt Publishing Ltd. [16] Face Verification, https://azure.microsoft.com/trtr/services/cognitive-services/face [Access Date: 05.01.2018] [17] Genymotion User Guide Version 2.11 https://docs.genymotion.com/pdf/pdf_user_guide/genymotion- 2.11-User-Guide.pdf [Access Date: 06.01.2018] References [1] F. C. Elbizim, M. C. Kasapbasi, (2017) Implementation and Evaluation of Face Recognition Based Identification System, International Journal of Intelligent Systems and Applications in Engineering, pp. 17-20 [2] A. Eleyan, (2017) Simple and Novel Approach for Image Representation with Application to Face Recognition, International Journal of Intelligent Systems and Applications in Engineering, vol. 5(3), pp. 89-93. [3] S. Nikan, M. Ahmadi, (2015) Performance Evaluation of Different Feature Extractors and Classifiers for Recognition of Human Faces with Low Resolution Images, International Journal of Intelligent Systems and Applications in Engineering, vol. 3(2), pp. 72-77. [4] W. Zhao, R. Chellappa, P. J. Phillips and A. Rosenfeld, 2003, Face Recognition: A Literature Survey, ACM Computing. Surveys; 35(4): 399 458 [5] J. A. Lee, A. Szabo, Y. Li, (2013) AIR: An Agent for Robust Image Matching and Retrieval, International Journal of Intelligent Systems and Applications in Engineering, vol. 1(2), pp. 34-39. [6] H. Mliki, E. Fendri, M. Hammami, 2015, Face Recognition Through Different Facial Expressions, Journal of Signal Processing Systems, vol 81(3), pp. 433-446. [7] N. Delbiaggio, A comparison of facial recognition s algorithms, Bachelor's Degree, Haaga-Helia, 2017 [8] E. Sütçüler, 2006, Real-Time Face Localization and Recognition System by Using Video Sequences, Msc Thesis, Yıldız Technical University. [9] P. Kirci, G. Kurt, (2016) Long Term and Remote Health Monitoring with Smart Phones, International Journal of Intelligent Systems and Applications in Engineering, vol. 4(4), pp. 80-83. [10] G. Eryigit, G. Celikkaya, (2017) Use of NLP Techniques for an Enhanced Mobile Personal Assistant: The Case of Turkish, International Journal of Intelligent Systems and Applications in Engineering, vol. 5(3), pp. 94-104. [11] Beginning Android Programming with Android Studio, John Wiley & Sons, 2016, ISBN: 1118707427, 9781118707425 [12] R. Arora, J. Sharma, U. Mali, A. Sharma, p. Raina (2018), Microsoft Cognitive Services, International Journal of Engineering Science and Computing, vol. 8(4), pp. 17323-17326. [13] A. Del Sole, Introducing Microsoft Cognitive Services, In: Microsoft Computer Vision APIs Distilled. Apress, Berkeley, CA, https://doi.org/10.1007/978-1-4842-3342-9_1 [14] A.A. Vinay, S.S. Vinay, J.B. Rituparna, A. Tushar, K.N. International Journal of Intelligent Systems and Applications in Engineering IJISAE, 2018, 6(4), 294 298 298