Advancements and Challenges in Face Recognition Technology |
||
|
|
|
© 2024 by IJCTT Journal | ||
Volume-72 Issue-11 |
||
Year of Publication : 2024 | ||
Authors : Ashish Gupta | ||
DOI : 10.14445/22312803/IJCTT-V72I11P110 |
How to Cite?
Ashish Gupta , "Advancements and Challenges in Face Recognition Technology," International Journal of Computer Trends and Technology, vol. 72, no. 11, pp. 92-104, 2024. Crossref, https://doi.org/10.14445/22312803/IJCTT-V72I11P110
Abstract
Face recognition technology has seen rapid advancement due to improvements in algorithms, computational power, and data acquisition methods. This review provides a comprehensive analysis of key approaches in face recognition: texture based, deep learning-based, and 3D models. Texture-based methods, like Local Binary Patterns (LBP) and Gradient Orientation Based techniques, demonstrate resilience against variations in lighting and pose, while hybrid methods and advanced descriptors further enhance their performance. Deep learning has transformed face recognition, with models like DeepFace, FaceNet, and VGGFace achieving high accuracy through advanced feature extraction and matching. Nonetheless, this technology still has challenges, such as occlusions, diverse data sources, aging effects, and changes in facial expressions and poses. 3D recognition models use geometric features and morphable models, making their performance better than 2D systems. However, dataset limitations and the effects of surgical modifications continue to pose obstacles. In addition to technical challenges, privacy and ethical considerations surrounding facial recognition technology are also significant. The widespread use of face recognition raises concerns about unauthorized data collection, surveillance, and the impact on individual privacy. Ethical issues such as fairness, autonomy, and biases in facial recognition systems, particularly against marginalized groups, remain underlying challenges. Furthermore, adversarial attacks on face recognition systems pose a critical threat. Attackers exploit vulnerabilities to deceive or manipulate recognition systems, undermining their reliability and security. The review underscores ongoing research directions and future trends, highlighting the need for further advancements to develop face recognition systems that are both robust and accurate in real-world applications.
Keywords
3D facial recognition models, Deep learning, Face recognition technology, Hybrid approaches, Texture-based methods.
Reference
[1] Marcos Agenor Lazarini, Rogério Rossi, and Kechi Hirama, “Systematic Literature Review on the Accuracy of Face Recognition Algorithms,” EAI Endorsed Transactions on Internet of Things, vol. 8, no. 30, pp. 1-11, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Insaf Adjabi et al., “Past, Present, and Future of Face Recognition: A Review,” Electronics, vol. 9, no. 8, pp. 1-52, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Xukang Wang et al., “Beyond Surveillance: Privacy, Ethics, and Regulations in Face Recognition Technology,” Frontiers in Big Data, vol. 7, pp. 1-10, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Md Khaled Hasan et al., “Human Face Detection Techniques: A Comprehensive Review and Future Research Directions,” Electronics, vol. 10, no. 19, pp. 1-46, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[5] S. Vignesh Baalaji et al., “Autonomous Face Mask Detection Using Single Shot Multibox Detector, and ResNet-50 with Identity Retrieval Through Face Matching Using Deep Siamese Neural Network,” Journal of Ambient Intelligence and Humanized Computing, vol. 14, pp. 11195-11205, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Siwar Rekik, Afnan AlOtaibi, and Sarah Abanumay, “Face Identification using HOG-PCA Feature Extraction and SVM Classifier,” 2024 Seventh International Women in Data Science Conference at Prince Sultan University (WiDS PSU), Riyadh, Saudi Arabia, pp. 105-109, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Sahar Adnan, Fatima Ali, and Ashwan A. Abdulmunem, “Facial Feature Extraction for Face Recognition,” 1st International Virtual Conference on Pure Science, College of Science, University of Al-Qadisiyah, Iraq, vol. 1664, no. 1, pp. 1-12, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Constantino Álvarez Casado and Miguel Bordallo López, “Real-Time Face Alignment: Evaluation Methods, Training Strategies and Implementation Optimization,” Journal of Real-Time Image Processing, vol. 18, pp. 2239-2267, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[9] IY Anas, BO Bamgbose, and Saleh Nuhu, “A Comparison Between 2D and 3D Methods of Quantifying Facial Morphology,” Heliyon, vol. 5, no. 6, pp. 1-6, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Zhongyuan Wang et al., “Masked Face Recognition Dataset and Application,” IEEE Transactions on Biometrics, Behavior, and Identity Science, vol. 5, no. 2, pp. 298-304, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Matthew Turk, and Alex Pentland, “Eigenfaces for Recognition,” Journal of Cognitive Neuroscience, vol. 3, no. 1, pp. 71-86, 1991.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Li Zhao and Yee-Hong Yang, “Theoretical Analysis of Illumination in PCA-Based Vision Systems,” Pattern Recognition, vol. 32, no. 4, pp. 547-564, 1999.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Mohd Suhairi Md Suhaimin et al., “Real-Time Mask Detection and Face Recognition Using Eigenfaces and Local Binary Pattern Histogram for Attendance System,” Bulletin of Electrical Engineering and Informatics, vol. 10, no. 2, pp. 1105-1113, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[14] P. Jonathon Phillips et al., “The FERET Database and Evaluation Procedure for Face-Recognition Algorithms,” Image and Vision Computing, vol. 16, no. 5, pp. 295-306, 1998.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Kieron Messer et al., “XM2VTSDB: The Extended M2VTS Database,” Second International Conference on Audio and Video-Based Biometric Person Authentication (AVBPA'99), Washington D.C, vol. 964, pp. 1-6, 1999.
[Google Scholar]
[16] Enrique Bailly-Bailliére et al., “The BANCA Database and Evaluation Protocol,” International Conference on Audio- and Video-Based Biometric Person Authentication, Lecture Notes in Computer Science, vol. 2688, pp. 625-638, 2003.
[CrossRef] [Google Scholar] [Publisher Link]
[17] P.J. Phillips et al., “Overview of the Face Recognition Grand Challenge,” 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05), San Diego, CA, USA, vol. 1, pp. 947-954, 2005.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Gary B. Huang et al., “Labeled Faces in the Wild: A Database forStudying Face Recognition in Unconstrained Environments,” Workshop on Faces in'Real-Life'Images: Detection, Alignment, and Recognition, pp. 1-15, 2008.
[Google Scholar] [Publisher Link]
[19] Ralph Gross et al., “Multi-PIE,” Image and Vision Computing, vol. 28, no. 5, pp. 807-813, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Dong Yi et al., “Learning Face Representation from Scratch,” Arxiv, pp. 1-9, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Arman Savran et al., “Bosphorus Database for 3D Face Analysis,” Biometrics and Identity Management European Workshop on Biometrics and Identity Management, Lecture Notes in Computer Science, vol. 5372, pp. 47-56, 2008.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Lijun Yin et al., “A 3D Facial Expression Database for Facial Behavior Research,” 7th International Conference on Automatic Face and Gesture Recognition (FGR06), Southampton, pp. 211-216, 2006.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Chen Cao et al., “FaceWarehouse: A 3D Facial Expression Database for Visual Computing,” IEEE Transactions on Visualization and Computer Graphics, vol. 20, no. 3, pp. 413-425, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Ira Kemelmacher-Shlizerman et al., “The MegaFace Benchmark: 1 Million Faces for Recognition at Scale,” Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 4873-4882, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Qiong Cao et al., “VGGFace2: A Dataset for Recognising Faces Across Pose and Age,” 2018 13th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2018), Xi'an, China, pp. 67-74, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Parekh Payal, and Mahesh M. Goyani, “A Comprehensive Study on Face Recognition: Methods and Challenges,” The Imaging Science Journal, vol. 68, no. 2, pp. 114-127, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Yan Wang, and Qinglin Wu, “Research on Face Recognition Technology Based on PCA and SVM,” 2022 7th International Conference on Big Data Analytics (ICBDA), vol. 68, no. 2, pp. 114-127, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Shan Zeng et al., “Multiple Kernel-Based Discriminant Analysis via Support Vectors for Dimension Reduction,” IEEE Access, vol. 7, pp. 35418-35430, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Dipak Kumar et al., “Unconstrained and Constrained Face Recognition Using Dense Local Descriptor with Ensemble Framework,” Neurocomputing, vol. 408, pp. 273-284, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[30] Murat Taskiran, Nihan Kahraman, and Cigdem Eroglu Erdem, “Face Recognition: Past, Present and Future (A review),” Digital Signal Processing, vol. 106, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[31] Yi-Kang Shen, and Ching-Te Chiu, “Local Binary Pattern Orientation Based Face Recognition,” 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), South Brisbane, QLD, Australia, pp. 1091-1095, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[32] Xin Wei et al., “Minimum Margin Loss for Deep Face Recognition,” Pattern Recognition, vol. 97, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[33] Evan Silversteinand, and Michael Snyder, “Implementation of Facial Recognition with Microsoft Kinect v2 Sensor for Patient Verification,” Medical Physics, vol. 44, no. 6, pp. 2391-2399, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[34] Ian J. Goodfellow, Jonathon Shlens, and Christian Szegedy, “Explaining and Harnessing Adversarial Examples,” Arxiv, pp. 1-11, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[35] Chih-Yang Lin et al., “Invisible Adversarial Attacks on Deep Learning-Based Face Recognition Models,” IEEE Access, vol. 11, pp. 51567-51577, 2023.
[CrossRef] [Google Scholar] [Publisher Link]