scispace - formally typeset
Search or ask a question
Author

Xiaohui Mu

Bio: Xiaohui Mu is an academic researcher from Beijing University of Posts and Telecommunications. The author has contributed to research in topics: Biometrics & Facial recognition system. The author has an hindex of 1, co-authored 1 publications receiving 13 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: Face recognition has become the future development direction and has many potential application prospects and is introduced in the general evaluation standards and the general databases of face recognition.
Abstract: Face recognition technology is a biometric technology, which is based on the identification of facial features of a person. People collect the face images, and the recognition equipment automatically processes the images. The paper introduces the related researches of face recognition from different perspectives. The paper describes the development stages and the related technologies of face recognition. We introduce the research of face recognition for real conditions, and we introduce the general evaluation standards and the general databases of face recognition. We give a forward-looking view of face recognition. Face recognition has become the future development direction and has many potential application prospects.

114 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: A two-stage approach to detect wearing masks using hybrid machine learning techniques, based on the transfer model of Faster_RCNN and InceptionV2 structure and designed to verify the real facial masks using a broad learning system is proposed.
Abstract: In the era of Corona Virus Disease 2019 (COVID-19), wearing a mask can effectively protect people from infection risk and largely decrease the spread in public places, such as hospitals and airports. This brings a demand for the monitoring instruments that are required to detect people who are wearing masks. However, this is not the objective of existing face detection algorithms. In this article, we propose a two-stage approach to detect wearing masks using hybrid machine learning techniques. The first stage is designed to detect candidate wearing mask regions as many as possible, which is based on the transfer model of Faster_RCNN and InceptionV2 structure, while the second stage is designed to verify the real facial masks using a broad learning system. It is implemented by training a two-class model. Moreover, this article proposes a data set for wearing mask detection (WMD) that includes 7804 realistic images. The data set has 26403 wearing masks and covers multiple scenes, which is available at “ https://github.com/BingshuCV/WMD .” Experiments conducted on the data set demonstrate that the proposed approach achieves an overall accuracy of 97.32% for simple scene and an overall accuracy of 91.13% for the complex scene, outperforming the compared methods.

59 citations

Journal ArticleDOI
TL;DR: In this paper, a solution based on the authentication of different biometric technologies and an automatic proctoring system (system workflow as well as AI algorithms) is presented to solve the main concerns in the market: highly scalable, automatic, affordable, with few hardware and software requirements for the user.
Abstract: Identity verification and proctoring of online students are one of the key challenges to online learning today. Especially for online certification and accreditation, the training organizations need to verify that the online students who completed the learning process and received the academic credits are those who registered for the courses. Furthermore, they need to ensure that these students complete all the activities of online training without cheating or inappropriate behaviours. The COVID-19 pandemic has accelerated (abruptly in certain cases) the migration and implementation of online education strategies and consequently the need for safe mechanisms to authenticate and proctor online students. Nowadays, there are several technologies with different grades of automation. In this paper, we deeply describe a specific solution based on the authentication of different biometric technologies and an automatic proctoring system (system workflow as well as AI algorithms), which incorporates features to solve the main concerns in the market: highly scalable, automatic, affordable, with few hardware and software requirements for the user, reliable and passive for the student. Finally, the technological performance test of the large scale system, the usability-privacy perception survey of the user and their results are discussed in this work.

30 citations

Journal ArticleDOI
TL;DR: A new framework is proposed, called FRS-DCT-SVM, that uses GA-RBF for face detection and optimization and the discrete cosine transform (DCT) to extract features.
Abstract: Recognizing facial expressions is a major challenge and will be required in the latest fields of research such as the industrial Internet of Things. Currently, the available methods are useful for detecting singular facial images, but they are very hard to extract. The main aim of face detection is to capture an image in real-time and search for the image in the available dataset. So, by using this biometric feature, one can recognize and verify the person’s image by their facial features. Many researchers have used Principal Component Analysis (PCA), Support Vector Machine (SVM), a combination of PCA and SVM, PCA with an Artificial Neural Network, and even the traditional PCA-SVM to improve face recognition. PCA-SVM is better than PCA-ANN as PCA-ANN has the limitation of a small dataset. As far as classification and generalization are concerned, SVM requires fewer parameters and generates less generalization errors than an ANN. In this paper, we propose a new framework, called FRS-DCT-SVM, that uses GA-RBF for face detection and optimization and the discrete cosine transform (DCT) to extract features. FRS-DCT-SVM using GA-RBF gives better results in terms of clustering time. The average accuracy received by FRS-DCT-SVM using GA-RBF is 98.346, which is better than that of PCA-SVM and SVM-DCT (86.668 and 96.098, respectively). In addition, a comparison is made based on the training, testing, and classification times.

8 citations

Journal ArticleDOI
TL;DR: Current state-of-the-art privacy mechanisms provide good protection in principle but there is no compelling one-size-fits-all privacy approach, which leads to further questions regarding the practicality of these mechanisms, which are presented in the form of seven thought-provoking propositions.
Abstract: The present information age is characterized by an ever-increasing digitalization. Smart devices quantify our entire lives. These collected data provide the foundation for data-driven services called smart services. They are able to adapt to a given context and thus tailor their functionalities to the user’s needs. It is therefore not surprising that their main resource, namely data, is nowadays a valuable commodity that can also be traded. However, this trend does not only have positive sides, as the gathered data reveal a lot of information about various data subjects. To prevent uncontrolled insights into private or confidential matters, data protection laws restrict the processing of sensitive data. One key factor in this regard is user-friendly privacy mechanisms. In this paper, we therefore assess current state-of-the-art privacy mechanisms. To this end, we initially identify forms of data processing applied by smart services. We then discuss privacy mechanisms suited for these use cases. Our findings reveal that current state-of-the-art privacy mechanisms provide good protection in principle, but there is no compelling one-size-fits-all privacy approach. This leads to further questions regarding the practicality of these mechanisms, which we present in the form of seven thought-provoking propositions.

6 citations