A Siamese network-based Xception for Face Recognition

سال انتشار: 1405
نوع سند: مقاله ژورنالی
زبان: انگلیسی
مشاهده: 20

فایل این مقاله در 8 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

JR_JECEI-14-1_004

تاریخ نمایه سازی: 15 بهمن 1404

چکیده مقاله:

kground and Objectives: Facial recognition technology has become a reliable solution for access control, augmenting traditional biometric methods. It primarily focuses on two core tasks: face verification, which determines whether two images belong to the same individual, and face identification, which matches a face to a database. However, facial recognition still faces critical challenges such as variations in pose, illumination, facial expressions, image noise, and limited training samples per subject.Method: This study employs a Siamese network based on the Xception architecture within a transfer learning framework to perform one-shot face verification. The model is trained to compare image pairs rather than classify them individually, using deep feature extraction and Euclidean distance measurement, optimized through a contrastive loss function.Results: The proposed model achieves high verification accuracy on benchmark datasets, reaching ۹۷.۶% on the Labeled Faces in the Wild (LFW) dataset and ۹۶.۲۵% on the Olivetti Research Laboratory (ORL) dataset. These results demonstrate the model’s robustness and generalizability across datasets with diverse facial characteristics and limited training data.Conclusion: Our findings indicate that the Siamese-Xception architecture is a robust and effective approach for facial verification, particularly in low-data scenarios. This method offers a practical, scalable solution for real-world facial recognition systems, maintaining high accuracy despite data constraints.

نویسندگان

Ali Habibi

Department of Computer Engineering, Hamedan University of Technology, Hamedan, Iran.

Mahlagha Afrasiabi

Department of Computer Engineering, Hamedan University of Technology, Hamedan, Iran.

Moniba Chaparian

Department of Computer Engineering, Hamedan University of Technology, Hamedan, Iran.

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • E. Solomon, A. Woubie, E. S. Emiru, "Deep learning based ...
  • D. Bansal, B. Gupta, S. Gupta, A. Anand, Sumit, A. ...
  • J. J. Valero-Mas, A. J. Gallego, J. R. Rico-Juan, "An ...
  • G. Guo, N. Zhang, "A survey on deep learning based ...
  • R. S. C. Kavita, U. Chhillar, "Analysing face recognition system ...
  • B. Amirgaliyev, M. Mussabek, T. Rakhimzhanova, A. Zhumadillayeva, "A review ...
  • W. Rawat, Z. Wang, "Deep convolutional neural networks for image ...
  • J. Han, D. Zhang, G. Cheng, N. Liu, D. Xu, ...
  • L. Zheng, Y. Yang, Q. Tian, "SIFT meets CNN: A ...
  • A. Mumuni, F. Mumuni, "Automated data processing and feature engineering ...
  • Y. Li, C. P. Chen, T. Zhang, "A survey on ...
  • J. Maggu, E. Chouzenoux, G. Chierchia, A. Majumdar, "Convolutional transform ...
  • A. Nandy, S. Haldar, S. Banerjee, S. Mitra, "A survey ...
  • M. Wang, W. Deng, "Deep face recognition: A survey," Neurocomputing, ...
  • B. Ameur, M. Belahcene, S. Masmoudi, A. B. Hamida, "Weighted ...
  • A. Majumdar, R. Singh, M. Vatsa, "Face verification via class ...
  • C. Xiong, L. Liu, X. Zhao, S. Yan, T. K. ...
  • S. C. Chong, A. B. J. Teoh, T. S. Ong, ...
  • J. Zhang, X. Jin, Y. Liu, A. K. Sangaiah, J. ...
  • M. Heidari, K. Fouladi-Ghaleh, "Using siamese networks with transfer learning ...
  • S. Hangaragi, T. Singh, "Face detection and recognition using face ...
  • B. Desai, S. K. Satapathy, "Facial recognition using siamese neural ...
  • M. Mosadag, M. A. Mohammed, K. Bashir, A. Mubark, "A ...
  • D. Chicco, "Siamese neural networks: An overview," Artificial Neural Networks: ...
  • L. Lu, J. S. Kang, F. Meng, M. Yu, "Non-intrusive ...
  • S. Javed, M. Danelljan, F. S. Khan, M. H. Khan, ...
  • M. Iman, H. R. Arabnia, K. Rasheed, "A review of ...
  • F. Chollet, "Xception: Deep learning with depthwise separable convolutions," in ...
  • S. Li, H. Qu, X. Dong, B. Dang, H. Zang, ...
  • P. Joshi, V. Nivethitha, "Deep fake image detection using xception ...
  • G. Kaur, N. Sharma, D. Upadhyay, M. Singh, R. Gupta, ...
  • F. Wang, H. Liu, "Understanding the behaviour of contrastive loss," ...
  • G. B. Huang, M. Mattar, T. Berg, E. Learned-Miller, "Labeled ...
  • F. S. Samaria, A. C. Harter, "Parameterisation of a stochastic ...
  • S. Hashemifar, A. Marefat, J. H. Joloudari, H. Hassanpour, "Enhancing ...
  • نمایش کامل مراجع