Bulut Doğrulama Temelli Yüz Tanıma Tekniği

ÖzTek bir yüz için tanıma süreci nispeten daha kısa sürede tamamlanabilir. Bununla birlikte, birkaç yüzüntanınmasını içeren büyük ölçekli uygulama, prosedürü uzun bir hale getirecektir. Bulut bilişim hizmeti, dahafazla veri işleneceği zaman bulut bilişimin temel kaynakları artırdığı bir ölçeklenebilirlik çözümü sağlamasıiçin bu araştırmada kullanılmıştır. Geliştirilen sistemin programlanması ve eğitimi, bulut bilişim yoluyla yüzleritespit etmek ve tanımak için yapılmıştır. İntegral görüntü, basamaklı sınıflandırıcılar, beş çeşit Haar benzeriözellikler ve Adaboost öğrenme yöntemi kullanılan yüzleri tespit etmek için Viola ve Jones algoritması kullanılır.Yüz tanıma, Temel Bileşen Analizi (PCA) algoritmasına göre daha verimli olduğu için Doğrusal DiskriminantAnalizi (LDA) kullanılarak yapılmıştır. Sistemin performansını değerlendirmek için çeşitli MUCT veritabanıgörüntüleri kullanılmıştır.

Cloud Authentication Based Face Recognition Technique

Abstract

___

  • Alireza S. 2013. ” Children Detection Algorithm Based on Statistical Models and LDA in Human Face Images”, Communication Systems and Network Technologies international conference.
  • Alireza T. 2011. ” Face Detection and Recognition using Skin Color and AdaBoost Algorithm Combined with Gabor Features and SVM Classifier”, Multimedia and Signal Processing international conference.
  • Avidan S. 2006. “Blind vision”, computer vision European conference.
  • Brown, Michael PS, William Noble Grundy, David Lin, Nello Cristianini, Charles Walsh Sugnet, Terrence S. Furey, Manuel Ares, and David Haussler. 2000. “Knowledge-based analysis of microarray gene expression data by using support vector machines.” Proceedings of the National Academy of Sciences 97, no. 1: 262-267.
  • Cheng M. 2015. “Global contrast based salient region detection”, IEEE Transactions on Pattern Analysis and Machine Intelligence.
  • Dufaux F. 2006. “Scrambling for Privacy Protection in Video Surveillance Systems”, IEEE transactions for video technology.
  • Ganesh V. 2013. “STEP-2 User Authentication for Cloud Computing,” Engineering and Innovative Technology international journal.
  • Hiroyuki K. 2007. ” Face Detection with Clustering, LDA and NN”, Systems, Man and Cybernetics international conference of IEEE.
  • Ian F. 2008. “Cloud computing and grid computing 360 degree compared”, semantic scholar.
  • J. Killoran. 2018. “4 Password Authentication Risk & How to Avoid Them”, End Passwords with Swoop. [Online]. Available: https://swoopnow.com/password-authentication/. [Accessed: 18- Oct- 2018].
  • J. L. 2017. “Fingerprint Scanning: 5 Things to Know Before Implementing”, End Passwords with Swoop. [Online]. Available: https://swoopnow.com/fingerprint-scanning/. [Accessed: 18- Oct- 2018].
  • Jagadish, H. 2014. “Big data and its technical challenges”, ACM communications magazine, volume 57. Jensen O. 2008. ”Implementing the Viola-Jones face detection algorithm”, PhD thesis, Denmark technical university.
  • Jie Z. 2015. ” Real Time Face detection System Using Adaboost and Haar-like Features”, Information Science and Control Engineering international conference.
  • Jindong W. 2016. ”Recognition using class specific linear Projection”, Chinese academy of science, institute of computing technology.
  • K. Dharavath, F. Talukdar and R. Laskar. 2014. “Improving Face Recognition Rate with Image Preprocessing”, Indian Journal of Science and Technology, vol. 7, no. 8, pp. 1170–1175.
  • Kalyani M. 2013. “Soft Computing on Medical-Data (SCOM) for a Countrywide Medical System using Data Mining and Cloud Computing Features”, technology and computer science international journal.
  • Karthik K. 2010. “ Can offloading computation save energy”, Computer archive journal, Volume 43.
  • Li, Cheng, and Bingyu Wang. 2014. “Fisher Linear Discriminant Analysis.” :1-6.
  • Ming Y. 2010. ”PCA and LDA based fuzzy face recognition system”, SICE conference.
  • N. Barnouti. 2016. “Improve Face Recognition Rate Using Different Image Pre-Processing Techniques”, American Journal of Engineering Research (AJER), vol. 5, no. 4, pp. 46-53.
  • Neeti j. 2014. ” Analysis of Different Methods for Face Recognition”, Innovative Computer Science and Engineering International Journal, Vol. 1.
  • Nilesh A. 2016. ”A review of authentication methods”, scientific and technology research international journal.
  • O. Deniz, M. Castrillon, M. Hernandez. 2003. “Face recognition using independent component analysis and support vector machines”, Pattern Recognition Letters, vol. 24, pp. 2153-2157.43, 44, 45, 46, 47, 48, 49, 50.
  • Ogbu R. 2013. “Cloud Computing and its Applications in e-Library Service”, Innovation, management and technology international journal.
  • OneSpan. 2018. “Face Recognition Authentication”, Vasco.com. [Online]. Available: https://www.vasco. com/glossary/face-recognition-security.html. [Accessed: 18- Oct- 2018].
  • Paul V. 2001. ” Rapid Object Detection using a Boosted Cascade of Simple Features”, computer vision and pattern recognition conference.
  • Paula C. 2009. “Compression independent reversible encryption for privacy in video surveillance”, information security journal, Vol. 2009.
  • Peter M. 2011. “The Nist Definition of Cloud Computing,” standards and technology national institute.
  • Phillips P. 2010. “Face Recognition Vendor Test”, IEEE transactions.
  • Puja D. 2012. “Cloud computing’s and its applications in the world of networking”, Computer Science international journal, Vol. 9.
  • Rajesh P. 2012. “An Overview and Study of Security Issues & Challenges in Cloud Computing,”, Advanced Research in Computer Science and Software Engineering international journal.
  • Roger L. 2010. “Fundamentals of Digital Image Processing”, Prentice-Hall, first edition.
  • Rupali S. 2017. ” A Real Sense based multilevel security in cloud framework using Face recognition and Image processing”, Convergence in Technology international conference.
  • Scott H. 2000. “Techniques for addressing fundamental privacy and distribution tradeoffs in awareness support systems”, computer supported ACM conference.
  • Senthil P. 2012. “Improving the Security of Cloud Computing using Trusted Computing Technology,” Modern Engineering Research international journal.
  • Stan Z. 2011. “Handbook of face recognition”, Springer verlag London, second edition, ISBN 978-0-85729- 931-4.
  • Stan Z. 2011. ” Handbook of Face Recognition”, Springer, second edition, ISBN 978-0-85729-931-4.
  • Sung H. 2010. ” Face/Non-face Classification Method Based on Partial Face Classifier Using LDA and MLP”, Computer and Information Science international conference of IEEE.
  • V. Blanz and T. Vetter. 2003. “Face recognition based on fitting a 3D morphable model”, IEEE Trans. On Pattern Analysis and Machine Intelligence, vol. 25, no. 9, September.
  • Younis A. 2013. “Secure cloud computing for critical infrastructure”, Liverpool John Moore’s University, United Kingdom.
  • Zahid M. 2012. ” Automatic Player Detection and Recognition in Images Using AdaBoost”, Electrical Engineering, Mathematics & Computer Science faculty, Twente university.