skip to main content
10.1145/3384544.3384567acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicscaConference Proceedingsconference-collections
research-article

Real Time Face Recognition on an Edge Computing Device

Published:17 April 2020Publication History

ABSTRACT

Face recognition systems have vast applications in surveillance systems and human-computer interactions. Different approaches such as Principal Component Analysis, Fisher linear discriminant analysis, Convolutional Neural Networks (CNN) have been commonly used for face recognition. However, in the recent times, CNN's have shown quite promising results in various face recognition systems. But, deep learning based CNNs have many limitations such as they require extensive training data, have excessively high computational and cooling requirements, and lack flexibility in deployment. Fields such as robotics and embedded systems that deploy face recognition systems have significantly less power on board and limited heat dissipation capacity. Therefore, it becomes difficult to deploy deep learning models on them but edge computing based devices like the Intel Neural Stick bridge this gap as they have certain advantages. In this paper, we review different applications of face recognition systems and various algorithms used for face recognition. We then elaborate the limitations of deep learning based face recognition systems and examine how edge-computing devices can solve these problems. We then present a flowchart to deploy a CNN based face recognition model on an edge-computing device.

References

  1. S.-H. Lin, S.-Y. Kung, and L.-J. Lin, "Face recognition/detection by probabilistic decision-based neural network," IEEE transactions on neural networks, vol. 8, no. 1, pp. 114--132, 1997.Google ScholarGoogle Scholar
  2. Y. Taigman, M. Yang, M. Ranzato, and L. Wolf, "Deepface: Closing the gap to human-level performance in face verification," in Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 1701--1708, 2014.Google ScholarGoogle Scholar
  3. Osuna, Edgar, Robert Freund, and Federico Girosit. "Training support vector machines: an application to face detection." Proceedings of IEEE computer society conference on computer vision and pattern recognition. IEEE, 1997.Google ScholarGoogle Scholar
  4. C. Liu and H. Wechsler, "Gabor feature based classification using the enhanced fisher linear discriminant model for face recognition," IEEE Transactions on Image processing, vol. 11, no. 4, pp. 467--476, 2002.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. C. Liu and H. Wechsler, "Independent component analysis of gabor features for face recognition," IEEE transactions on Neural Networks, vol. 14, no. 4, pp. 919--928, 2003.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Hochstetler, Jacob, et al. "Embedded deep learning for vehicular edge computing." 2018 IEEE/ACM Symposium on Edge Computing (SEC). IEEE, 2018.Google ScholarGoogle Scholar
  7. Announcing Amazon Elastic Compute Cloud (Amazon EC2)-- Beta, 24 August 2006. Amazon.comGoogle ScholarGoogle Scholar
  8. Abadi, Martín, et al. "Tensorflow: A system for large-scale machine learning." 12th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 16). 2016.Google ScholarGoogle Scholar
  9. Jia, Yangqing, et al. "Caffe: Convolutional architecture for fast feature embedding." Proceedings of the 22nd ACM international conference on Multimedia. ACM, 2014.Google ScholarGoogle Scholar
  10. Molchanov, Pavlo, et al. "Pruning convolutional neural networks for resource efficient transfer learning." arXiv preprint arXiv:1611.06440 3 (2016).Google ScholarGoogle Scholar
  11. S. Lawrence, C. L. Giles, Ah Chung Tsoi, and A. D. Back, "Face recognition: a convolutional neural-network approach," IEEE Trans. Neural Networks, vol. 8, no. 1, pp. 98--113, 1997.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Coşkun, Musab, et al. "Face recognition based on convolutional neural network." 2017 International Conference on Modern Electrical and Energy Systems (MEES). IEEE, 2017.Google ScholarGoogle Scholar
  13. Parkhi, Omkar M., Andrea Vedaldi, and Andrew Zisserman. "Deep face recognition." bmvc. Vol. 1. No. 3. 2015.Google ScholarGoogle Scholar
  14. G. B. Huang, M. Ramesh, T. Berg, and E. Learned-Miller. Labeled faces in the wild: A database for studying face recognition in unconstrained environments. Technical Report 07-49, University of Massachusetts, Amherst, 2007.Google ScholarGoogle Scholar
  15. L. Wolf, Tal. Hassner, and I. Maoz. Face recognition in unconstrained videos with matched background similarity. In Proc. CVPR, 2011.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Satyanarayanan, Mahadev. "The emergence of edge computing." Computer 50.1 (2017): 30--39.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Lewis, Grace, et al. "Tactical cloudlets: Moving cloud computing to the edge." 2014 IEEE Military Communications Conference. IEEE, 2014.Google ScholarGoogle Scholar
  18. Mao, Yunlong, et al. "A privacy-preserving deep learning approach for face recognition with edge computing." USENIX Workshop on Hot Topics in Edge Computing (HotEdge 18), Boston, MA. 2018.Google ScholarGoogle Scholar
  19. Ma, Xiao, et al. "Cost-efficient workload scheduling in cloud assisted mobile edge computing." 2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS). IEEE, 2017.Google ScholarGoogle Scholar
  20. Pena, Dexmont, et al. "Benchmarking of CNNs for low-cost, low-power robotics applications." RSS 2017 Workshop: New Frontier for Deep Learning in Robotics. 2017.Google ScholarGoogle Scholar
  21. Pan, Sinno Jialin, and Qiang Yang. "A survey on transfer learning." IEEE Transactions on knowledge and data engineering 22.10 (2009): 1345--1359.Google ScholarGoogle Scholar
  22. Dai, Wenyuan, et al. "Boosting for transfer learning." Proceedings of the 24th international conference on Machine learning. ACM, 2007.Google ScholarGoogle Scholar
  23. Jafri, Rabia, and Hamid R. Arabnia. "A survey of face recognition techniques." Jips 5.2 (2009): 41--68.Google ScholarGoogle ScholarCross RefCross Ref
  24. Bowyer, Kevin W., Kyong Chang, and Patrick Flynn. "A survey of approaches and challenges in 3D and multi-modal 3D+ 2D face recognition." Computer vision and image understanding 101.1 (2006): 1--15.Google ScholarGoogle Scholar
  25. Zou, Xuan, Josef Kittler, and Kieron Messer. "Illumination invariant face recognition: A survey." 2007 first IEEE international conference on biometrics: theory, applications, and systems. IEEE, 2007.Google ScholarGoogle Scholar
  26. Ding, Changxing, and Dacheng Tao. "A comprehensive survey on pose-invariant face recognition." ACM Transactions on intelligent systems and technology (TIST) 7.3 (2016): 37.Google ScholarGoogle Scholar
  27. Soyata, Tolga, et al. "Cloud-vision: Real-time face recognition using a mobile-cloudlet-cloud acceleration architecture." 2012 IEEE symposium on computers and communications (ISCC). IEEE, 2012.Google ScholarGoogle Scholar
  28. Becker, Brian C., and Enrique G. Ortiz. "Evaluation of face recognition techniques for application to facebook." 2008 8th IEEE International Conference on Automatic Face & Gesture Recognition. IEEE, 2008.Google ScholarGoogle Scholar
  29. Jain, Anil K., and Stan Z. Li. Handbook of face recognition. New York: springer, 2011.Google ScholarGoogle Scholar
  30. Shi, Weisong, and Schahram Dustdar. "The promise of edge computing." Computer 49.5 (2016): 78--81.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Issam Bouganssa, Mohamed Sbihi, and Mounia Zaim, "Laplacian Edge Detection Algorithm for Road Signal Images and FPGA Implementation," International Journal of Machine Learning and Computing vol. 9, no. 1, pp. 57--61, 2019.Google ScholarGoogle ScholarCross RefCross Ref
  32. Jaruwan Toontham, Chaiyapon Thongchaisuratkrul, "The Comparison of Object Recognition and Identification by Using Image Processing Base on the Neural Network, the Hough transform and the Harris Corner Detection," International Journal of Machine Learning and Computing vol. 1, no. 4, pp.400--404, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  33. Amany Farag and Randa Atta, "Illumination Invariant Face Recognition Using the Statistical Features of BDIP and Wavelet Transform," International Journal of Machine Learning and Computing vol. 2, no. 1, pp. 1--6, 2012Google ScholarGoogle ScholarCross RefCross Ref
  34. Sara Alipour and Afsane Fathi, "Component-Based Real Time Facial Expression Recognition in Video Streams," International Journal of Machine Learning and Computing vol.3, no. 3, pp. 309--312, 2013Google ScholarGoogle ScholarCross RefCross Ref
  35. Andras Farago, "Optimizing Massive Distance Computations in Pattern Recognition," International Journal of Machine Learning and Computing vol.4, no. 1, pp. 114--119, 2014Google ScholarGoogle ScholarCross RefCross Ref
  36. Saad M. Darwish and Ali H. Mohammed, "Interval Type-2 Fuzzy Logic to the Treatment of Uncertainty in 2D Face Recognition Systems," International Journal of Machine Learning and Computing vol.4, no. 1, pp. 24--30, 2014Google ScholarGoogle ScholarCross RefCross Ref
  37. Aniruddha Dey, Jamuna Kanta Sing, and Shiladitya Chowdhury, "Weighted Fuzzy Generalized 2DFLD: A Fuzzy-Based Feature Extraction Technique for Face Recognition," International Journal of Machine Learning and Computing vol. 7, no. 6, pp. 223--231, 2017.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Real Time Face Recognition on an Edge Computing Device

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        ICSCA '20: Proceedings of the 2020 9th International Conference on Software and Computer Applications
        February 2020
        382 pages
        ISBN:9781450376655
        DOI:10.1145/3384544

        Copyright © 2020 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 17 April 2020

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader