1. Optimized Classifier Learning for Face Recognition Performance Boost in Security and Surveillance Applications
- Author
-
Jitka Poměnková and Tobiáš Malach
- Subjects
template creation ,surveillance face recognition ,classifier learning ,parameter optimization ,security application ,Chemical technology ,TP1-1185 - Abstract
Face recognition has become an integral part of modern security processes. This paper introduces an optimization approach for the quantile interval method (QIM), a promising classifier learning technique used in face recognition to create face templates and improve recognition accuracy. Our research offers a three-fold contribution to the field. Firstly, (i) we strengthened the evidence that QIM outperforms other contemporary template creation approaches. For this reason, we investigate seven template creation methods, which include four cluster description-based methods and three estimation-based methods. Further, (ii) we extended testing; we use a nearly four times larger database compared to the previous study, which includes a new set, and we report the recognition performance on this extended database. Additionally, we distinguish between open- and closed-set identification. Thirdly, (iii) we perform an evaluation of the cluster estimation-based method (specifically QIM) with an in-depth analysis of its parameter setup in order to make its implementation feasible. We provide instructions and recommendations for the correct parameter setup. Our research confirms that QIM’s application in template creation improves recognition performance. In the case of automatic application and optimization of QIM parameters, improvement recognition is about 4–10% depending on the dataset. In the case of a too general dataset, QIM also provides an improvement, but the incorporation of QIM into an automated algorithm is not possible, since QIM, in this case, requires manual setting of optimal parameters. This research contributes to the advancement of secure and accurate face recognition systems, paving the way for its adoption in various security applications.
- Published
- 2023
- Full Text
- View/download PDF