A Face Recognition Method Based on Transfer Learning and Attention Mechanism

Authors

  • Aodi Zhang
  • Shibao Sun

DOI:

https://doi.org/10.62051/ijcsit.v2n2.02

Keywords:

Facial recognition; Transfer learning; Attention mechanism; Small sample dataset

Abstract

With the popularization of network technology and the development of informatization, the security of personal identity information is receiving increasing attention. In fields such as finance, healthcare, and security, security requirements are increasing, and more reliable and secure identity verification methods are needed to protect personal information from illegal acquisition and use. Traditional identity verification methods, such as passwords and PIN codes, face problems such as being guessed, forgotten, and stolen. Based on the understanding of the limitations and shortcomings of traditional identity verification methods, biometric recognition technology has emerged. At present, it mainly includes biometric recognition technologies such as fingerprint recognition[1], voice recognition[2], facial recognition[3], iris recognition, retinal recognition[4], and DNA recognition[5] . As an important branch, facial recognition technology has shown tremendous potential and advantages in the field of information security In order to study the performance of facial recognition in small sample scenarios, the ECANet attention mechanism was introduced into the classic ResNet50 network, and a new network model, ResNet50-ECA[6], was constructed. Firstly, a small-scale face SLFW dataset containing only 28 classifications was created on the famous LFW (Labeled Faces in the Wild) dataset[7]. When processing these facial images, an advanced image enhancement technique, namely adaptive histogram equalization with limited contrast, was adopted. Effectively enhances the contrast between light and dark in the image, making facial features clearer and more prominent. In order to expand the dataset and enhance the robustness of the model, data augmentation was also performed. This includes random rotation and horizontal inversion of images, which can generate more diverse and rich training samples. Pre trained network models on the ImageNet dataset with parameters and weights, then fine tuned these models and applied them to a small sample face dataset.

Downloads

Download data is not yet available.

References

MARASCO E, ROSS A J A C S. A survey on antispoofing schemes for fingerprint recognition systems [J]. 2014, 47(2): 1-36.

ANDICS A, MCQUEEN J M, PETERSSON K M, et al. Neural mechanisms for voice recognition [J]. 2010, 52(4): 1528-40.

KAUR P, KRISHAN K, SHARMA S K, et al. Facial-recognition algorithms: A literature review [J]. 2020, 60(2): 131-9.

BARRON U G, CORKERY G, BARRY B, et al. Assessment of retinal recognition technology as a biometric method for sheep identification [J]. 2008, 60(2): 156-66.

ROHS R, WEST S M, SOSINSKY A, et al. The role of DNA shape in protein–DNA recognition [J]. 2009, 461(7268): 1248-53.

THECKEDATH D, SEDAMKAR R J S C S. Detecting affect states using VGG16, ResNet50 and SE-ResNet50 networks [J]. 2020, 1(2): 79.

LEARNED-MILLER E, HUANG G B, ROYCHOWDHURY A, et al. Labeled faces in the wild: A survey [J]. 2016: 189-248.

DING X, ZHANG X, MA N, et al. Repvgg: Making vgg-style convnets great again; proceedings of the Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, F, 2021 [C].

AL-QIZWINI M, BARJASTEH I, AL-QASSAB H, et al. Deep learning algorithm for autonomous driving using googlenet; proceedings of the 2017 IEEE intelligent vehicles symposium (IV), F, 2017 [C]. IEEE.

WANG Q, WU B, ZHU P, et al. ECA-Net: Efficient channel attention for deep convolutional neural networks; proceedings of the Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, F, 2020 [C].

Downloads

Published

26-04-2024

Issue

Section

Articles

How to Cite

Zhang, A., & Sun, S. (2024). A Face Recognition Method Based on Transfer Learning and Attention Mechanism. International Journal of Computer Science and Information Technology, 2(2), 21-35. https://doi.org/10.62051/ijcsit.v2n2.02