• Title/Summary/Keyword: Face identification

Search Result 304, Processing Time 0.03 seconds

Cold-Heat and Excess-Deficiency Pattern Identification Based on Questionnaire, Pulse, and Tongue in Cancer Patients: A Feasibility Study (암 환자 대상 설문지, 맥진기, 설진기 결과를 활용한 한열허실변증에 대한 예비 연구)

  • Choi, Yujin;Kim, Soo-Dam;Kwon, Ojin;Park, Hyo-Ju;Kim, JiHye;Choi, Woosu;Ko, Myung-Hyun;Ha, Su-Jeung;Song, Si-Yeon;Park, So-Jung;Yoo, Hwa-Seung;Jeong, Mi-Kyung
    • The Journal of Korean Medicine
    • /
    • v.42 no.1
    • /
    • pp.1-11
    • /
    • 2021
  • Objectives: This pilot study aimed to evaluate the agreement between traditional face-to-face Korean medicine (KM) pattern identification and non-face-to-face KM pattern identification using the data from related questionnaires, tongue image, and pulse features in patients with cancer. Methods: From January to June 2020, 16 participants with a cancer diagnosis were recruited at the one Korean medicine hospital. Three experienced Korean medicine doctors independently diagnosed the participants whether they belong to the cold pattern or not, heat pattern or not, deficiency pattern or not, and excess pattern or not. Another researcher collected KM pattern related data using questionnaires including Cold-Heat Pattern Identification (CHPI), tongue image analysis system, and pulse analyzer. Collected KM pattern related data without participants' identifier was provided for the three Korean medicine doctors in random order, and non-face-to-face KM pattern identification was carried out. The kappa value between face-to-face and non-face-to-face pattern identification was calculated. Results: From the face-to-face pattern identification, there were 13/3 cold/non-cold pattern, 4/12 heat/non-heat pattern, 14/2 deficiency/non-deficiency pattern, and 0/16 excess/non-excess pattern participants. In cold/non-cold pattern, kappa value was 0.455 (sensitivity: 0.85, specificity: 0.67, accuracy: 0.81). In heat/non-heat pattern, the kappa value was 0.429 (sensitivity: 0.75, specificity: 0.72, accuracy: 0.75). The kappa value of deficiency/non-deficiency and excess/non-excess pattern was not calculated because of the few participants of non-deficiency, and excess pattern. Conclusions: The agreement between traditional face-to-face pattern identification and non-face-to-face pattern identification seems to be moderate. The non-face-to-face pattern identification using questionnaires, tongue, and pulse features may feasible for the large clinical study.

Unattended Reception Robot using Face Identification (얼굴 인증을 이용한 무인 접수 로봇 개발)

  • Park, Se Hyun;Ryu, Jeong Tak;Moon, Byung Hyun;Cha, Kyung Ae
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.5
    • /
    • pp.33-37
    • /
    • 2014
  • As personal information is utilized as an important user authentication means, a trustable certification means is being required. The face identification technology using characteristics of the personal face among several biometrics technologies is easy in extracting features. In this paper, we implement a face identification robot for unattended reception. The robot is performed by face identification. To assess the effectiveness of the robot, it was tested and experimental results show that the proposed method is applicable for unattended reception interface.

Face Identification Method Using Face Shape Independent of Lighting Conditions

  • Takimoto, H.;Mitsukura, Y.;Akamatsu, N.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2213-2216
    • /
    • 2003
  • In this paper, we propose the face identification method which is robust for lighting based on the feature points method. First of all, the proposed method extracts an edge of facial feature. Then, by the hough transform, it determines ellipse parameters of each facial feature from the extracted edge. Finally, proposed method performs the face identification by using parameters. Even if face image is taken under various lighting condition, it is easy to extract the facial feature edge. Moreover, it is possible to extract a subject even if the object has not appeared enough because this method extracts approximately the parameters by the hough transformation. Therefore, proposed method is robust for the lighting condition compared with conventional method. In order to show the effectiveness of the proposed method, computer simulations are done by using the real images.

  • PDF

Development of Combined Architecture of Multiple Deep Convolutional Neural Networks for Improving Video Face Identification (비디오 얼굴 식별 성능개선을 위한 다중 심층합성곱신경망 결합 구조 개발)

  • Kim, Kyeong Tae;Choi, Jae Young
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.6
    • /
    • pp.655-664
    • /
    • 2019
  • In this paper, we propose a novel way of combining multiple deep convolutional neural network (DCNN) architectures which work well for accurate video face identification by adopting a serial combination of 3D and 2D DCNNs. The proposed method first divides an input video sequence (to be recognized) into a number of sub-video sequences. The resulting sub-video sequences are used as input to the 3D DCNN so as to obtain the class-confidence scores for a given input video sequence by considering both temporal and spatial face feature characteristics of input video sequence. The class-confidence scores obtained from corresponding sub-video sequences is combined by forming our proposed class-confidence matrix. The resulting class-confidence matrix is then used as an input for learning 2D DCNN learning which is serially linked to 3D DCNN. Finally, fine-tuned, serially combined DCNN framework is applied for recognizing the identity present in a given test video sequence. To verify the effectiveness of our proposed method, extensive and comparative experiments have been conducted to evaluate our method on COX face databases with their standard face identification protocols. Experimental results showed that our method can achieve better or comparable identification rate compared to other state-of-the-art video FR methods.

A Search Model Using Time Interval Variation to Identify Face Recognition Results

  • Choi, Yun-seok;Lee, Wan Yeon
    • International journal of advanced smart convergence
    • /
    • v.11 no.3
    • /
    • pp.64-71
    • /
    • 2022
  • Various types of attendance management systems are being introduced in a remote working environment and research on using face recognition is in progress. To ensure accurate worker's attendance, a face recognition-based attendance management system must analyze every frame of video, but face recognition is a heavy task, the number of the task should be minimized without affecting accuracy. In this paper, we proposed a search model using time interval variation to minimize the number of face recognition task of recorded videos for attendance management system. The proposed model performs face recognition by changing the interval of the frame identification time when there is no change in the attendance status for a certain period. When a change in the face recognition status occurs, it moves in the reverse direction and performs frame checks to more accurate attendance time checking. The implementation of proposed model performed at least 4.5 times faster than all frame identification and showed at least 97% accuracy.

Safety Improvement Methods of Personal Identification Services using the i-Pin (아이핀 기반 본인확인서비스의 안전성 강화 방안)

  • Kim, Jongbae
    • Journal of Information Technology Services
    • /
    • v.16 no.2
    • /
    • pp.97-110
    • /
    • 2017
  • Due to development of IT, various Internet services via the non-face-to-face are increasing rapidly. In the past, the resident registration numbers (RRN) was used a mean of personal identification, but the use of RRN is prohibited by the relevant laws, and the personal identification services using alternative means are activated. According to the prohibition policy of RRN, i-PIN service appeared as an alternative means to identify a person. However, the user's knowledge-based i-PIN service continues to cause fraudulent issuance, account hijacking, and fraud attempts due to hacking accidents. Due to these problems, the usage rate of i-PIN service which performs a nationwide free personal identification service, is rapidly decreasing. Therefore, this paper proposes a technical safety enhancement method for security enhancement in the i-PIN-based personal identification service. In order to strengthen the security of i-PIN, this paper analyzes the encryption key exposure, key exchange and i-PIN authentication model problems of i-PIN and suggests countermeasures. Through the proposed paper, the i-PIN can be expected to be used more effectively as a substitution of RRN by suggesting measures to enhance the safety of personal identification information. Secured personal identification services will enable safer online non-face-to-face transactions. By securing the technical, institutional, and administrative safety of the i-PIN service, the usage rate will gradually increase.

Adaptive Face Region Detection and Real-Time Face Identification Algorithm Based on Face Feature Evaluation Function (적응적 얼굴검출 및 얼굴 특징자 평가함수를 사용한 실시간 얼굴인식 알고리즘)

  • 이응주;김정훈;김지홍
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.2
    • /
    • pp.156-163
    • /
    • 2004
  • In this paper, we propose an adaptive face region detection and real-time face identification algorithm using face feature evaluation function. The proposed algorithm can detect exact face region adaptively by using skin color information for races as well as intensity and elliptical masking method. And also, it improves face recognition efficiency using geometrical face feature and geometric evaluation function between features. The proposed algorithm can be used for the development of biometric and security system areas. In the experiment, the superiority of the proposed method has been tested using real image, the proposed algorithm shows more improved recognition efficiency as well as face region detection efficiency than conventional method.

  • PDF

Performance Evaluation Method of User Identification and User Tracking for Intelligent Robots Using Face Images (얼굴영상을 이용한 지능형 로봇의 개인식별 및사용자 추적 성능평가 방법)

  • Kim, Dae-Jin;Park, Kwang-Hyun;Hong, Ji-Man;Jeong, Young-Sook;Choi, Byoung-Wook
    • The Journal of Korea Robotics Society
    • /
    • v.4 no.3
    • /
    • pp.201-209
    • /
    • 2009
  • In this paper, we deal with the performance evaluation method of user identification and user tracking for intelligent robots using face images. This paper shows general approaches for standard evaluation methods to improve intelligent robot systems as well as their algorithms. The evaluation methods proposed in this paper can be combined with the evaluation methods for detection algorithms of face region and facial components to measure the overall performance of face recognition in intelligent robots.

  • PDF

A Study on the Intention and Behavior of Sharing Information in Online World: Focusing on Moderating Effect of Information Importance (온라인상에서 정보공유 의도 및 행동에 미치는 영향에 관한 연구 - 정보 중요성의 조절효과를 중심으로 -)

  • Kim, Gu
    • Informatization Policy
    • /
    • v.20 no.1
    • /
    • pp.22-41
    • /
    • 2013
  • The purpose of this paper is to examine the effect of interpersonal face-to-face offline on identification-based trust and reciprocity norm in online world, and the effect of identification-based trust and reciprocity norm on the intention and behavior of sharing information in online world. To understand the moderating role, the importance of information was established as a moderating variable, and an empirical analysis was conducted, focusing on the undergraduate. The results of this study are as follows. It was found that interpersonal face-to-face in offline world affects identification-based trust and reciprocity norm in online positively. A reciprocity norm of identification-based trust and reciprocity norm in online world affected by interpersonal face-to-face in offline world has a positive effect on the intention and behavior of sharing information in online, but showed that identification-based trust does not affect them significantly. And reciprocity norm has significant relationship with information sharing behavior through the intention to share information. It was found to be a partial moderating effect of importance of information on the relationship among the reciprocity norm and the intention and behavior of sharing information.

  • PDF

Personal Identification Using Inner Face of Fingers from Contactless Hand Image (비접촉 손 영상에서 손가락 면을 이용한 개인 식별)

  • Kim, Min-Ki
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.8
    • /
    • pp.937-945
    • /
    • 2014
  • Multi-modal biometric system can use another biometric trait in the case of having deficiency at a biometric trait. It also has an advantage of improving the performance of personal identification by using multiple biometric traits, so studies on new biometric traits have continuously been performed. The inner face of finger is a relatively new biometric trait. It has two major features of knuckle lines and wrinkles, which can be used as discriminative features. This paper proposes a finger identification method based on displacement vector to effectively process some variation appeared in contactless hand image. At first, the proposed method produces displacement vectors, which are made by connecting corresponding points acquired by matching each pair of local block. It then recognize finger by measuring the similarity among all the detected displacement vectors. The experimental results using pubic CASIA hand image database show that the proposed method may be effectively applied to personal identification.