Share Email Print

Proceedings Paper

Comparative study of deep learning and classical methods: smart camera implementation for face authentication
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

In this work, we investigate biometrics applied on 2D faces in order to secure areas requiring high security level. Based on emerging deep learning methods (more precisely transfer learning) as well as two classical machine learning techniques (Support Vector Machines and Random Forest), different approaches have been used to perform person authentication. Preprocessing filtering steps of input images have been included before features extraction and selection. The goal has been to compare those in terms of processing time, storage size and authentication accuracy according to the number of input images (for the learning task) and preprocessing tasks. We focus on data-related aspects to store biometric information on a low storage capacity remote card (10Ko), not only in a high security context but also in terms of privacy control. The proposed solutions guarantee users the control of their own biometrics data. The study highlights the impact of preprocessing to perform real-time computation, preserving a relevant accuracy while reducing the amount of biometric data. Considering application constraints, this study concludes with a discussion dealing with the tradeoff of the available resources against the required performances to determine the most appropriate method.

Paper Details

Date Published: 8 October 2018
PDF: 12 pages
Proc. SPIE 10802, Counterterrorism, Crime Fighting, Forensics, and Surveillance Technologies II, 108020I (8 October 2018); doi: 10.1117/12.2325697
Show Author Affiliations
Pierre Bonazza, Le2i, Univ. de Bourgogne Franche-Comte (France)
Johel Miteran, Le2i, Univ. de Bourgogne Franche-Comte (France)
Dominique Ginhac, Le2i, Univ. de Bourgogne Franche-Comte (France)
Julien Dubois, Le2i, Univ. de Bourgogne Franche-Comte (France)

Published in SPIE Proceedings Vol. 10802:
Counterterrorism, Crime Fighting, Forensics, and Surveillance Technologies II
Henri Bouma; Radhakrishna Prabhu; Robert James Stokes; Yitzhak Yitzhaky, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?