Paper
27 November 2019 Research on face recognition technology and its application in intelligent security
Haibo Chen, Lei Liu, Jing Tang
Author Affiliations +
Proceedings Volume 11321, 2019 International Conference on Image and Video Processing, and Artificial Intelligence; 1132122 (2019) https://doi.org/10.1117/12.2542772
Event: The Second International Conference on Image, Video Processing and Artifical Intelligence, 2019, Shanghai, China
Abstract
With the rapid development of artificial intelligence, face recognition, as an important part of artificial intelligence, has a tremendous impact on people's lives. This paper aims to improve the accuracy and rapidity of face recognition by using deep learning and cloud computing technology, as well as to provide face recognition service for intelligent security system. Firstly, the Convolutional Neural Network (CNN) is introduced and Large Margin Cosine Loss (LMCL)+Center Loss is proposed as the loss function of CNN to train the face feature extraction model. Then, combined with cloud computing technology, a parallel model training and face recognition implementation scheme are proposed to solve the problems of large amount of data and slow model training faced by face recognition technology. Finally, the face recognition scheme is applied to the intelligent security system of a telecommunications operators, and good results are achieved.
© (2019) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Haibo Chen, Lei Liu, and Jing Tang "Research on face recognition technology and its application in intelligent security", Proc. SPIE 11321, 2019 International Conference on Image and Video Processing, and Artificial Intelligence, 1132122 (27 November 2019); https://doi.org/10.1117/12.2542772
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Facial recognition systems

Intelligence systems

Data modeling

Feature extraction

Artificial intelligence

Clouds

Computer security

Back to Top