skip to main content
10.1145/3555962.3555971acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccbdcConference Proceedingsconference-collections
research-article

IoT and Cloud based Face detection application design for Surveillance systems using Deep Learning

Published: 18 October 2022 Publication History

Abstract

Semantic Index, Human Action Detection, and Event Detection are video surveillance packages that assist automate surveillance tasks. Video surveillance structures have entered the generation of virtual surveillance structures in which virtual video is used to traverse the course of different virtual facts. Advances in storage, telecommunications, and facts compression have enabled the increase of more than one technology in virtual surveillance structures. Using more than one video surveillance fashion in risky conditions extends the competencies of rule implementation organizations. In addition, video surveillance enables the form of a motion to carry out in one-of-a-kind conditions. In addition, spotting a particular man or woman in a video is essential for added security, multimedia, and multimedia packages, including offline, seek, and online monitoring of involved humans within the video. The proposed IoT- Cloud based Face detection application is designed to find a person from a huge size dataset and that can generate more accurate results. This application uses Deep Learning methods to find exactness when classifying the images. IoT here is used for liveness detection by comparing all the images present in cloud systems. For results comparison, we used Haar Cascade and DenseNet architectures.

References

[1]
Adjust and Exaggerate Facial Features. Adobe Photoshop, 2016. [Online]. Available: https://helpx.adobe.com/photoshop/how-to/ face-aware-liquify.html.
[2]
B. Meden, R. C. Mallı, S. Fabijan, H. K. Ekenel, V. Struc, and P. Peer, ˇ “Face Deidentification with Generative Deep Neural Networks,” IET Signal Processing, vol. 11, no. 9, pp. 1046–1054, 2017.
[3]
Darius Afchar, Vincent Nozick, Junichi Yamagishi, and Isao Echizen. 2018. Mesonet: a compact facial video forgery detection network. In 2018 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, 1–7.
[4]
Eggensperger, K., Lindauer, M., & Hutter, F. (2019). Pitfalls and best practices in algorithm configuration. Journal of Artificial Intelligence Research (JAIR), 64, 861–893.
[5]
S. W. Bailey, D. Omens, P. Dilorenzo, and J. F. O'Brien. Fast and deep facial deformations. ACM Transactions on Graphics, 39(4), July 2020.
[6]
Chaoning Zhang, ResNet or DenseNet? Introducing Dense Shortcuts to ResNet, WACV 2021, IEEE Explorer.
[7]
J. Aggarwal and M. Ryoo, “Human Activity Analysis: A Review,” ACM Comput. Surv., vol. 43, no. 3, pp. 16:1–16:43, Apr. 2011. [Online]. Available: http://doi.acm.org/10.1145/1922649.1922653.
[8]
Shreshth Tuli, EdgeLens: Deep Learning based Object Detection in Integrated IoT, Fog and Cloud Computing Environments, 2020, IEEE Explorer.
[9]
Han, Junwei, Dingwen Zhang, Gong Cheng, Nian Liu, and Dong Xu. "Advanced deep-learning techniques for salient and category-specific object detection: a survey." IEEE Signal Processing Magazine 35, no. 1 (2018): 84-100.
[10]
Yeh, C. Y., Chen, H. W., Tsai, S. L., and Wang, S. D. (2020). Disrupting image-translation-based deepfake algorithms with adversarial attacks. In Proceedings of the IEEE Winter Conference on Applications of Computer Vision Workshops (pp. 53-62).
[11]
B. Wang, Y. Lei, N. Li, and T. Yan, “Deep separable convolutional network for remaining useful life prediction of machinery,” Mechanical Systems and Signal Processing, vol. 134, p. 106330, 2019.
[12]
C. Rathgeb, C. I. Satnoianu, N. E. Haryanto, K. Bernardo, and C. Busch, “Differential Detection of Facial Retouching: A MultiBiometric Approach,” IEEE Access, vol. 8, pp. 106 373–106 385, 2020
[13]
Dzemila Sero, Arslan Zaidi, Jiarui Li, Julie D White, Tomás B González Zarzar, Mary L Marazita, Seth M Weinberg, Paul Suetens, Dirk Vandermeulen, Jennifer K Wagner, Facial recognition from DNA using face-to-DNA classifiers. Nature communications, 10(1):2557, 2019.
[14]
Shengju Qian, Kwan-Yee Lin, Wayne Wu, Yangxiaokang Liu, Quan Wang, Fumin Shen, Chen Qian, and Ran He. Make a face: Towards arbitrary high fidelity face manipulation. In Proceedings of the IEEE International Conference on Computer Vision, 2019
[15]
Sheng-Yu Wang, Oliver Wang, Richard Zhang, Andrew Owens, and Alexei A Efros, “Cnn-generated images are surprisingly easy to spot... for now,” in CVPR, 2020.
[16]
Khaled Riad, Teng Huang, and Lishan Ke. A dynamic and hierarchical access control for iot in multi-authority cloud storage. Journal of Network and Computer Applications, 160:102633, 04 2020.
[17]
A. Smith, “Deepfakes are the most dangerous crime of the future, researchers say.” https://www. independent.co.uk/lifestyle/gadgets-and-tech/news/ deepfakes-dangerous-crime-artificial-intelligence-a9655821.html, 2020. [Online; accessed 19-May-2021].
[18]
S. Meivel, K.I. Devi, S.U. Maheswari, J.V. Menaka, "Real-time data analysis of face mask detection and social distance measurement using Matlab," Materials Today: Proceedings, 2021.
[19]
Luca Bondi, Silvia Lameri, David Guera, Paolo Bestagini, ¨ Edward J. Delp, and Stefano Tubaro. Tampering Detection and Localization through Clustering of Camera-Based CNN Features. In IEEE Computer Vision and Pattern Recognition Workshops, 2017. 3.

Index Terms

  1. IoT and Cloud based Face detection application design for Surveillance systems using Deep Learning

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICCBDC '22: Proceedings of the 2022 6th International Conference on Cloud and Big Data Computing
    August 2022
    88 pages
    ISBN:9781450396578
    DOI:10.1145/3555962
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 18 October 2022

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Face detection
    2. IoT
    3. Person identification
    4. Surveillance system

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICCBDC 2022

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 64
      Total Downloads
    • Downloads (Last 12 months)13
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 19 Feb 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media