skip to main content
10.1145/3640771.3640997acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiscaiConference Proceedingsconference-collections
research-article

The Design of an Intelligent Security System with Face Recognition and Human Action Analysis

Published:29 March 2024Publication History

ABSTRACT

Security systems are extremely important in the workplaces, educational establishments and other public places. Nowadays, in a wide range of scenarios, such as offices, schools, universities, factories, can be detected various anomaly behaviors, which may lead to potential danger. It is extremely important, as it can help to reduce risk from both personal and property safety. Thus, the purpose of the current study is to improve security systems with deep learning techniques, as computational power and hardware itself recently have improved tremendously. Human-Machine Interaction also benefits in this case, as machines can help people analyze the environment and prevent danger in time, thus creating a safer environment. In order to recognize, distinguish and analyze people's behavior, a new approach of combination of Face Recognition with masks and Human-Action Recognition algorithm with deep learning techniques is introduced in this security system. Provided approach consists of algorithms, which are considered as SOTA at each specific domain, and trained for a customly collected dataset. As for the result, performance of the current method appeared to be fairly robust, which means it can be used in public places, such as offices, schools, etc.

References

  1. A. R. Syafeeza, M. K. Mohd Fitri Alif, Y. Nursyifaa Athirah, A. S. Jaafar, A. H. Norihan and M. S. Saleha: IoT based facial recognition door access control home security system using raspberry pi. International Journal of Power Electronics and Drive System, IJPEDS, vol. 11, No.1, pp. 417–424. (2020)Google ScholarGoogle ScholarCross RefCross Ref
  2. G. Senthilkumar, K. Gopalakrishnan, V. S. Kumar: Embedded image capturing system using raspberry pi system. International Journal of Emerging Trends & Technology in Computer Science, IJETTCS, vol. 3, No.2, pp. 213–215. (2014)Google ScholarGoogle Scholar
  3. Fatemeh Serpush, Mahdi Rezaei: Complex Human Action Recognition Using a Hierarchical Feature Reduction and Deep Learning-Based Method. SN Computer Science, vol. 2, pp. 94. (2021)Google ScholarGoogle Scholar
  4. Cheng-Bin Jin, Shengzhe Li, and Hakil Kim: Real-Time Action Detection in Video Surveillance using Sub-Action Descriptor with Multi-CNN. Journal of Institute of Control, Robotics and Systems, vol. 24, pp. 3. (2018)Google ScholarGoogle Scholar
  5. Suneth Ranasinghe, Fadi Al Machot, Heinrich C Mayr: A review on applications of activity recognition systems with regard to performance and evaluation. International Journal of Distributed Sensor Networks, vol. 12, pp. 8. (2016)Google ScholarGoogle Scholar
  6. Homepage, https://www.securityandsafetythings.com/insights/forget-cctv-smart-video-surveillanceGoogle ScholarGoogle Scholar
  7. Y. Kortli, M. Jridi, A. Al Falou, and M. Atri: Face Recognition Systems: A Survey. Sensors, vol. 20, No.2, pp. 342. (2020)Google ScholarGoogle Scholar
  8. N. Damer, J. H. Grebe, C. Chen, F. Boutros, F. Kirchbuchner and A. Kuijper: The Effect of Wearing a Mask on Face Recognition Performance: an Exploratory Study. 2020 International Conference of the Biometrics Special Interest Group, BIOSIG, pp. 1–6. (2020)Google ScholarGoogle Scholar
  9. Murat Taskiran, Nihan Kahraman, Cigdem Eroglu Erdem: Face recognition: Past, present and future (a review). Digital Signal Processing, vol. 106, 102809, ISSN 1051-2004 (2020)Google ScholarGoogle ScholarCross RefCross Ref
  10. Guangchun Cheng, Yiwen Wan, Abdullah N. Saudagar, Kamesh Namuduri, Bill P. Buckles: Advances in Human Action Recognition: A Survey. Computer Vision and Pattern Recognition, CVPR. (2015)Google ScholarGoogle Scholar
  11. Weinland D, Ronfard R, Boyer E: A survey of vision-based methods for action representation, segmentation and recognition. Computer vision and image understanding, vol. 115, pp. 224–241. (2011)Google ScholarGoogle Scholar
  12. Aggarwal J, Xia L: Human activity recognition from 3d data: a review. Pattern Recognition Letters, pp. 48–70. (2014)Google ScholarGoogle Scholar
  13. Akansha UA, Shailendra M, Singh N: Analytical review on video-based human activity recognition. Computing for Sustainable Global Development (INDIACom), 2016 3rd International Conference on. IEEE, pp. 3839–3844. (2016)Google ScholarGoogle Scholar
  14. Beddiar, D.R., Nini, B., Sabokrou, M.: Vision-based human activity recognition: a survey. Multimedia Tools and Applications, 79(41-42), 30509-30555. (2020)Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. S. Sen, M. Dhar and S. Banerjee: Implementation of human action recognition using image parsing techniques. Emerging Trends in Electronic Devices and Computational Techniques, EDCT, pp. 1–6. (2018)Google ScholarGoogle Scholar
  16. Grigorios G. Chrysos, Stylianos Moschoglou, Giorgos Bouritsas, Yannis Panagakis, Jiankang Deng, Stefanos Zafeiriou: Deep Polynomial Neural Networks. Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR, pp. 7325–7335. (2020)Google ScholarGoogle Scholar
  17. Homepage, https://paperswithcode.com/sota/face-recognition-on-lfwGoogle ScholarGoogle Scholar
  18. Homepage, http://vis-www.cs.umass.edu/lfw/Google ScholarGoogle Scholar
  19. Z. Cao, G. Hidalgo, T. Simon, S.-E. Wei and Y. Sheikh: OpenPose: Realtime Multi-Person 2D Pose Estimation Using Part Affinity Fields. IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.43, No.1, pp. 172-186. (2021)Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ISCAI '23: Proceedings of the 2023 2nd International Symposium on Computing and Artificial Intelligence
    October 2023
    120 pages
    ISBN:9798400708954
    DOI:10.1145/3640771

    Copyright © 2023 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 29 March 2024

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited
  • Article Metrics

    • Downloads (Last 12 months)4
    • Downloads (Last 6 weeks)4

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format