Computer Science ›› 2020, Vol. 47 ›› Issue (9): 163-168.doi: 10.11896/jsjkx.190900118

• Computer Graphics & Multimedia • Previous Articles     Next Articles

Fast Face Recognition Based on Deep Learning and Multiple Hash Similarity Weighting

DENG Liang1, XU Geng-lin1, LI Meng-jie1, CHEN Zhang-jin1,2   

  1. 1 Microelectronics Research and Development Center,Shanghai University,Shanghai 200444,China
    2 Computer Center,Shanghai University,Shanghai 200444,China
  • Received:2019-09-18 Published:2020-09-10
  • About author:DENG Liang,born in 1996,master.His main research interests include digital chip design,deep learning,and face recognition.
    CHEN Zhang-jin,born in 1969,doctor,professor.His main research interests include digital chip design,large-screen LED display research and development.
  • Supported by:
    National Natural Science Foundation of China (61674100).

Abstract: Whether using the traditional method or neural network for face recognition,there are problems of large computation and long computation time.It is difficult to detect and match the faces in the video in real time.Aiming at the above problems,lightweight neural network is used for face detection,simple hash algorithm is used to calculate the similarity of face images,and multiple hash similarity values are weighted for face matching.It is a feasible scheme to reduce computation time and realize fast face recognition.The lightweight neural network Mobilenet is used as the face feature extraction network,and the pruned SSD model is used as the detection network.The face detection is realized by cascading Mobilenet and SSD,and then the detected face image is recognized.Firstly,the mean hash similarity and the perceived hash similarity of the face images are calculated separately.Then,taking α and β as weighted coefficients of the mean hash and the perceived hash respectively,the mean hash and perceived hash similarity value of the image are weighted,and the result is taken as the final similarity of the image.When the weighted similarity value is greater than the set threshold I,it is considered to be the same person.When the weighted similarity value is less than the set threshold K,it is considered to be a different person.For images whose similarity is between thresholds I and K,they are optimally matched in order of similarity values from high to low.The face detection accuracy rate of the proposed method on WiderFace and FDDB reaches 92.5% and 94.2% respectively,and the average processing time per image is 56ms.The accuracy of face matching in the ORL standard face database reaches 96.2%.When camera is used for real-time face recognition test,the face recognition accuracy of the proposed method is 95%,and the average face recognition speed is 80ms.It has been proved by experiments that real-time face detection and matching can be realized under the premise of ensuring high accuracy.

Key words: Face detection, Deep learning, Hash algorithm, Face matching

CLC Number: 

  • TP183
[1] JIANG R D,CHU W,YAN J.Intelligent recognition system for face recognition under ARM platform[J].Computer Engineering and Design,2018,39(2):590-595.
[2] BUHMANN J,LADES M,MALSBURG C V D.Size and distortion invariant object recognition by hierarchical graph matching[C]//International Joint Conference on Neural Networks.1990:416-441.
[3] SONG J,CHEN B,CHI Z,et al.Face Recognition Based on Binary Template Matching[C]//Third International Conference on Intelligent Computing(ICIC 2007).Springer-Verlag,2007.
[4] SHAN S,GAO W,ZHAO D.Face recognition based on face-specific subspace[J].International Journal of Imaging Systems &Technology,2010,13(1):23-32.
[5] DAVE P,AGARWAL J,METTA T.Face Detection using Principal Component Analysis (PCA)[J].International Journal of Computer Applications,2014,95(17):37-40.
[6] RANGSEE P,RAJA K B,VENUGOPAL K R.Modified Local Ternary Pattern Based Face Recognition Using SVM[C]//2018 International Conference on Intelligent Informatics and Biome-dical Sciences (ICIIBMS).2018.
[7] REN S,HE K,GIRSHICK R,et al.Faster R-CNN:TowardsReal-Time Object Detection with Region Proposal Networks[C]//International Conference on Neural Information Processing Systems.2015.
[8] REDMON J,DIVVALA S,GIRSHICK R,et al.You Only Look Once:Unified,Real-Time Object Detection[J].arXiv:1506.02640,2015.
[9] LIU W,ANGUELOV D,ERHAN D,et al.SSD:Single ShotMultiBox Detector[J].arXiv:1512.02325,2015.
[10] SIMONYAN K,ZISSER,AN A.Very Deep Convolutional Networks for Large-Scale Image Recognition[J].arXiv:1409.1556v6,2014.
[11] HUANG J H,LI X W,CHEN B H,et al.Comparative Study of Image Similarity Algorithm Based on Hash[J].Journal of Dali University,2017,12(2):32-37.
[12] YIN Y M,PENG Y,QI J H.Research on the Image Similarity Retrieval Algorithm Based on Double Hash[J].Information and Communications Technologies,2019,13(1):33-38.
[13] DENG J,ZHOU B,SHI Y L.Application of Improved Image Hash Algorithm in Image Tamper Detection[C]//2018 International Conference on Intelligent Transportation,Big Data & Smart City (ICITBS).IEEE Computer Society,2018.
[14] HOWARD A G,ZHU M,CHEN B,et al.MobileNets:Efficient Convolutional Neural Networks for Mobile Vision Applications[J].arXiv:1704.04861,2017.
[15] VIOLA P,JONES M J.Robust Real-Time Face Detection[J].International Journal of Computer Vision,2004,57(2):137-154.
[16] YAN J X,YIN J X.Multi-pose face detection based on face feature and AdaBoost algorithm[J].Journal of Computer Applications,2010,30(4):967-970.
[17] AHONEN T,HADID A,PIETIKAINEN M.Face Description with Local Binary Patterns:Application to Face Recognition[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2006,28(12):2037-2041.
[18] YANG B,YAN J,LEI Z,et al.Aggregate channel features for multi-view face detection[C]//IEEE International Joint Confe-rence on Biometrics.2014:1-8.
[19] GHIASI G,FOWLKES C C.Occlusion Coherence:LocalizingOccluded Faces with a Hierarchical Deformable Part Model[C]//Computer Vision & Pattern Recognition.2014.
[20] LI Q Y,JI Q G,HONG S D.FastFace:Real-time robust face detection algorithm[J].Journal of Image and Graphics,2019,24(10):1761-1771.
[21] ZHANG K,ZHANG Z,LI Z,et al.Joint Face Detection andAlignment Using Multitask Cascaded Convolutional Networks[J].IEEE Signal Processing Letters,2016,23(10):1499-1503.
[22] YANG S,LUO P,LOY C C,et al.Faceness-Net:Face Detection through Deep Facial Part Responses[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2017,40(8):1845-1859.
[23] ZHOU X Y,WANG W,LI L Y.Overview of Target Detection Algorithm Based on Deep Learning[J].Electronic Measurement Technology,2017,40(11):89-93.
[24] MARCETIC D,HRKAC T,Slobodan Ribaric.Two-stage cascade model for unconstrained face detection[C]//2016 First International Workshop on Sensing,Processing and Learning for Intelligent Machines (SPLINE).IEEE,2016.
[25] ZHANG J L,WU X W,ZHU J K.Feature Agglomeration Networks for Single Stage Face Detection[J].arxiv:1712.00721,2017.
[26] LI E,WEN Z S,ZHANG Y L,et al.Face recognition systembased on OpenCV and mean hash algorithm[J].Industrial Design,2016(8):132-133.
[27] WANG A C,CHEN H T.Robust Perceptual Image Hashing Technique Based on Discrete Cosine Transform[J].China Safety Science Journal,2009,19(4):91.
[28] WANG C,KAO W H,HSIAO C K.Using Hamming Distance as Information for SNP-Sets Clustering and Testing in Disease Association Studies[J].Plos One,2015,10(8):e0135918.
[29] REN J J,WANG N.Study on the Loss Function in Artificial Neural Networks[J].Journal of Gansu Normal University,2018,23(2):65-67.
[30] RIBEIRO R,FEITOSA A R S,DE SOUZA R E,et al.Reconstruction of electrical impedance tomography images using genetic algorithms and non-blind search[C]//2014 IEEE 11th International Symposium on Biomedical Imaging (ISBI 2014).IEEE,2014.
[31] ZHANG W X,LIANG Y.The Mathematical Foundation of Genetic Algorithm[J].Journal of Xi’an Jiaotong University,2000,34(10):6.
[32] GAO H K,MA S N.Research on Fast Face AuthenticationTechnology Based on ORL Database[J].Science & Technology Communication,2014,16(12):89-92.
[33] NGUYEN H V,BAI L.Cosine Similarity Metric Learning for Face Verification[C]//Computer Vision-ACCV 2010-10th Asian Conference on Computer Vision.Queenstown,New Zealand,2010.
[34] RAGHAVENDRA R,VENKATESH S,RAJA K B,et al.Mutual Information Based Multispectral Image Fusion for Improved Face Recognition[C]//2016 12th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS).IEEE,2016.
[1] WANG Rui-ping, JIA Zhen, LIU Chang, CHEN Ze-wei, LI Tian-rui. Deep Interest Factorization Machine Network Based on DeepFM [J]. Computer Science, 2021, 48(1): 226-232.
[2] YU Wen-jia, DING Shi-fei. Conditional Generative Adversarial Network Based on Self-attention Mechanism [J]. Computer Science, 2021, 48(1): 241-246.
[3] TONG Xin, WANG Bin-jun, WANG Run-zheng, PAN Xiao-qin. Survey on Adversarial Sample of Deep Learning Towards Natural Language Processing [J]. Computer Science, 2021, 48(1): 258-267.
[4] DING Yu, WEI Hao, PAN Zhi-song, LIU Xin. Survey of Network Representation Learning [J]. Computer Science, 2020, 47(9): 52-59.
[5] HE Xin, XU Juan, JIN Ying-ying. Action-related Network:Towards Modeling Complete Changeable Action [J]. Computer Science, 2020, 47(9): 123-128.
[6] YE Ya-nan, CHI Jing, YU Zhi-ping, ZHAN Yu-liand ZHANG Cai-ming. Expression Animation Synthesis Based on Improved CycleGan Model and Region Segmentation [J]. Computer Science, 2020, 47(9): 142-149.
[7] BAO Yu-xuan, LU Tian-liang, DU Yan-hui. Overview of Deepfake Video Detection Technology [J]. Computer Science, 2020, 47(9): 283-292.
[8] YUAN Ye, HE Xiao-ge, ZHU Ding-kun, WANG Fu-lee, XIE Hao-ran, WANG Jun, WEI Ming-qiang, GUO Yan-wen. Survey of Visual Image Saliency Detection [J]. Computer Science, 2020, 47(7): 84-91.
[9] WANG Wen-dao, WANG Run-ze, WEI Xin-lei, QI Yun-liang, MA Yi-de. Automatic Recognition of ECG Based on Stacked Bidirectional LSTM [J]. Computer Science, 2020, 47(7): 118-124.
[10] LIU Yan, WEN Jing. Complex Scene Text Detection Based on Attention Mechanism [J]. Computer Science, 2020, 47(7): 135-140.
[11] ZHANG Zhi-yang, ZHANG Feng-li, TAN Qi, WANG Rui-jin. Review of Information Cascade Prediction Methods Based on Deep Learning [J]. Computer Science, 2020, 47(7): 141-153.
[12] JIANG Wen-bin, FU Zhi, PENG Jing, ZHU Jian. 4Bit-based Gradient Compression Method for Distributed Deep Learning System [J]. Computer Science, 2020, 47(7): 220-226.
[13] CHEN Jin-yin, ZHANG Dun-Jie, LIN Xiang, XU Xiao-dong and ZHU Zi-ling. False Message Propagation Suppression Based on Influence Maximization [J]. Computer Science, 2020, 47(6A): 17-23.
[14] CHENG Zhe, BAI Qian, ZHANG Hao, WANG Shi-pu and LIANG Yu. Improving Hi-C Data Resolution with Deep Convolutional Neural Networks [J]. Computer Science, 2020, 47(6A): 70-74.
[15] HE Lei, SHAO Zhan-peng, ZHANG Jian-hua and ZHOU Xiao-long. Review of Deep Learning-based Action Recognition Algorithms [J]. Computer Science, 2020, 47(6A): 139-147.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[3] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[4] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[5] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .
[6] HAN Kui-kui, XIE Zai-peng and LV Xin. Fog Computing Task Scheduling Strategy Based on Improved Genetic Algorithm[J]. Computer Science, 2018, 45(4): 137 -142 .
[7] ZHENG Xiu-lin, SONG Hai-yan and FU Yi-peng. Distinguishing Attack of MORUS-1280-128[J]. Computer Science, 2018, 45(4): 152 -156 .
[8] WU Shu, ZHOU An-min and ZUO Zheng. PDiOS:Private API Call Detection in iOS Applications[J]. Computer Science, 2018, 45(4): 163 -168 .
[9] ZHU Shu-qin, WANG Wen-hong and LI Jun-qing. Chosen Plaintext Attack on Chaotic Image Encryption Algorithm Based on Perceptron Model[J]. Computer Science, 2018, 45(4): 178 -181 .
[10] GUO Shuai, LIU Liang and QIN Xiao-lin. Spatial Keyword Range Query with User Preferences Constraint[J]. Computer Science, 2018, 45(4): 182 -189 .