Skip to main content
Erschienen in: Wireless Personal Communications 4/2021

16.02.2021

Performance Evaluation of Machine Learning Based Face Recognition Techniques

verfasst von: Sahil Sharma, Vijay Kumar

Erschienen in: Wireless Personal Communications | Ausgabe 4/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The robustness of machine-learning model-based face recognition techniques to image processing attacks using the quantization of extracted features is presented. Recently developed face recognition techniques based on machine learning models have been outperformed over traditional face recognition techniques. An efficient face recognition technology should be able to resist various image processing attacks. This paper presents the simulation results by evaluating ten variants of machine-learning-based face recognition techniques on ten well-known image processing attacks. The quality of face recognition techniques has been assessed on recognition accuracy. The performance has been evaluated on two well-known face databases viz. Bosphorus and University of Milano Bicocca (UMB) face database. The experimental results reveal that the Subspace discriminant ensemble-based face recognition model has consistently performed in most image processing attacks. All image processing attacks have been visually verified and presented.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Hsu, H. J., & Chen, K. T. (2015) Face recognition on drones: Issues and limitations. In Proceedings of the First Workshop on Micro Aerial Vehicle Networks, Systems, and Applications for Civilian Use; 39-44. Hsu, H. J., & Chen, K. T. (2015) Face recognition on drones: Issues and limitations. In Proceedings of the First Workshop on Micro Aerial Vehicle Networks, Systems, and Applications for Civilian Use; 39-44.
2.
Zurück zum Zitat S. Gupta, M. K. Markey and A. C. Bovik. (2007) Advancing the state of the art in 3D human face recognition. SPIE Newsroom. S. Gupta, M. K. Markey and A. C. Bovik. (2007) Advancing the state of the art in 3D human face recognition. SPIE Newsroom.
3.
Zurück zum Zitat Sharif, M., Bhagavatula, S., Bauer, L., et al. (2016). Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition. SIGSAC Conference on Computer and Communications Security, 10(1145/2976749), 2978392. Sharif, M., Bhagavatula, S., Bauer, L., et al. (2016). Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition. SIGSAC Conference on Computer and Communications Security, 10(1145/2976749), 2978392.
5.
Zurück zum Zitat Raghavendra, R., Raja, K. B., & Busch, C. (2015). Presentation attack detection for face recognition using light field camera. IEEE Transactions on Image Processing., 24(3), 1060–1075.MathSciNetCrossRef Raghavendra, R., Raja, K. B., & Busch, C. (2015). Presentation attack detection for face recognition using light field camera. IEEE Transactions on Image Processing., 24(3), 1060–1075.MathSciNetCrossRef
6.
Zurück zum Zitat Chen, X., Liu, C., Li, B., Lu, K., & Song, D. (2017) Targeted backdoor attacks on deep learning systems using data poisoning. arXiv preprint arXiv:1712.05526 Chen, X., Liu, C., Li, B., Lu, K., & Song, D. (2017) Targeted backdoor attacks on deep learning systems using data poisoning. arXiv preprint arXiv:​1712.​05526
13.
Zurück zum Zitat Kutter, M., & Petitcolas, F. A. (1999). Fair benchmark for image watermarking systems in security and watermarking of multimedia contents. International Society for Optics and Photonics, 3657, 226–240. Kutter, M., & Petitcolas, F. A. (1999). Fair benchmark for image watermarking systems in security and watermarking of multimedia contents. International Society for Optics and Photonics, 3657, 226–240.
14.
Zurück zum Zitat Cortes, C., & Vapnik, V. (1995). Support-vector networks. Machine learning., 20(3), 273–297.MATH Cortes, C., & Vapnik, V. (1995). Support-vector networks. Machine learning., 20(3), 273–297.MATH
15.
Zurück zum Zitat Ruiz, E. V. (1986). An algorithm for finding nearest neighbours in (approximately) constant average time. Pattern Recognition Letters, 4(3), 145–157.CrossRef Ruiz, E. V. (1986). An algorithm for finding nearest neighbours in (approximately) constant average time. Pattern Recognition Letters, 4(3), 145–157.CrossRef
16.
Zurück zum Zitat Quinlan, J. R. (1987). Simplifying decision trees. International journal of man-machine studies, 27(3), 221–234.CrossRef Quinlan, J. R. (1987). Simplifying decision trees. International journal of man-machine studies, 27(3), 221–234.CrossRef
17.
Zurück zum Zitat Mika, S., Ratsch, G., Weston, J., et al. (1999) Fisher discriminant analysis with kernels. In Neural networks for signal processing IX. Proceedings of the 1999 IEEE signal processing society workshop. 41-48. IEEE. Mika, S., Ratsch, G., Weston, J., et al. (1999) Fisher discriminant analysis with kernels. In Neural networks for signal processing IX. Proceedings of the 1999 IEEE signal processing society workshop. 41-48. IEEE.
18.
Zurück zum Zitat Dietterich, T. G. (2000). An experimental comparison of three methods for constructing ensembles of decision trees: Bagging, boosting, and randomization. Machine learning, 40(2), 139–157.CrossRef Dietterich, T. G. (2000). An experimental comparison of three methods for constructing ensembles of decision trees: Bagging, boosting, and randomization. Machine learning, 40(2), 139–157.CrossRef
19.
Zurück zum Zitat Dietterich, T. G. (2000). Ensemble methods in machine learning. International workshop on multiple classifier systems (pp. 1–15). Berlin, Heidelberg: Springer. Dietterich, T. G. (2000). Ensemble methods in machine learning. International workshop on multiple classifier systems (pp. 1–15). Berlin, Heidelberg: Springer.
20.
Zurück zum Zitat Savran, A., Alyüz, N., Dibeklioğlu, H., et al. (2008). Bosphorus database for 3D face analysis. European Workshop on Biometrics and Identity Management (pp. 47–56). Berlin, Heidelberg: Springer.CrossRef Savran, A., Alyüz, N., Dibeklioğlu, H., et al. (2008). Bosphorus database for 3D face analysis. European Workshop on Biometrics and Identity Management (pp. 47–56). Berlin, Heidelberg: Springer.CrossRef
21.
Zurück zum Zitat Colombo, A., Cusano, C., & Schettini, R. (2011) UMB-DB: A database of partially occluded 3D faces. IEEE International Conference onComputer Vision Workshops (ICCV Workshops). 2113-2119. IEEE. Colombo, A., Cusano, C., & Schettini, R. (2011) UMB-DB: A database of partially occluded 3D faces. IEEE International Conference onComputer Vision Workshops (ICCV Workshops). 2113-2119. IEEE.
22.
Zurück zum Zitat Nicholson, S. W., & Bennett, T. B. (2009). Transparent practices: primary and secondary data in business ethics dissertations. Journal of business ethics, 84(3), 417–425.CrossRef Nicholson, S. W., & Bennett, T. B. (2009). Transparent practices: primary and secondary data in business ethics dissertations. Journal of business ethics, 84(3), 417–425.CrossRef
23.
Zurück zum Zitat Patil, H., Kothari, A., & Bhurchandi, K. (2015). 3-D face recognition: features, databases, algorithms and challenges. Artificial Intelligence Review, 44(3), 393–441.CrossRef Patil, H., Kothari, A., & Bhurchandi, K. (2015). 3-D face recognition: features, databases, algorithms and challenges. Artificial Intelligence Review, 44(3), 393–441.CrossRef
24.
Zurück zum Zitat Dalal, N., & Triggs, B. (2005) Histograms of oriented gradients for human detection. IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR. 1: 886-893. IEEE. Dalal, N., & Triggs, B. (2005) Histograms of oriented gradients for human detection. IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR. 1: 886-893. IEEE.
25.
Zurück zum Zitat Bay, H., Tuytelaars, T., & Gool, L. (2006). Surf: Speeded up robust features. European conference on computer vision (pp. 404–417). Berlin, Heidelberg: Springer. Bay, H., Tuytelaars, T., & Gool, L. (2006). Surf: Speeded up robust features. European conference on computer vision (pp. 404–417). Berlin, Heidelberg: Springer.
26.
Zurück zum Zitat Ahonen, T., Hadid, A., & Pietikainen, M. (2006). Face description with local binary patterns: Application to face recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence, 12, 2037–2041.CrossRef Ahonen, T., Hadid, A., & Pietikainen, M. (2006). Face description with local binary patterns: Application to face recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence, 12, 2037–2041.CrossRef
27.
Zurück zum Zitat Mita, T., Kaneko, T., & Hori, O. (2005) Joint haar-like features for face detection. Tenth IEEE International Conference on Computer Vision ICCV. 2: 1619-1626. IEEE. Mita, T., Kaneko, T., & Hori, O. (2005) Joint haar-like features for face detection. Tenth IEEE International Conference on Computer Vision ICCV. 2: 1619-1626. IEEE.
28.
Zurück zum Zitat Haralick, R. M., Shanmugam, K., & Dinstein, I. H. (1973). Textural features for image classification. IEEE Transactions on systems, man, and cybernetics, 3(6), 610–621.CrossRef Haralick, R. M., Shanmugam, K., & Dinstein, I. H. (1973). Textural features for image classification. IEEE Transactions on systems, man, and cybernetics, 3(6), 610–621.CrossRef
29.
Zurück zum Zitat Danielsson, P. E. (1980). Euclidean distance mapping. Computer Graphics and image processing, 14(3), 227–248.CrossRef Danielsson, P. E. (1980). Euclidean distance mapping. Computer Graphics and image processing, 14(3), 227–248.CrossRef
30.
Zurück zum Zitat Kruskal, J. B. (1964). Nonmetric multidimensional scaling: a numerical method. Psychometrika, 29(2), 115–129.MathSciNetCrossRef Kruskal, J. B. (1964). Nonmetric multidimensional scaling: a numerical method. Psychometrika, 29(2), 115–129.MathSciNetCrossRef
31.
Zurück zum Zitat De Maesschalck, R., Jouan-Rimbaud, D., & Massart, D. L. (2000). The mahalanobis distance. Chemometrics and intelligent laboratory systems, 50(1), 1–18.CrossRef De Maesschalck, R., Jouan-Rimbaud, D., & Massart, D. L. (2000). The mahalanobis distance. Chemometrics and intelligent laboratory systems, 50(1), 1–18.CrossRef
32.
33.
Zurück zum Zitat Patidar, P., Gupta, M., Srivastava, S., & Nagawat, A. K. (2010). Image de-noising by various filters for different noise. International journal of computer applications., 9(4), 45–50.CrossRef Patidar, P., Gupta, M., Srivastava, S., & Nagawat, A. K. (2010). Image de-noising by various filters for different noise. International journal of computer applications., 9(4), 45–50.CrossRef
35.
Zurück zum Zitat Lin, C. Y., Wu, M., Bloom, J. A., et al. (2001). Rotation, scale, and translation resilient watermarking for images. IEEE Transactions on image processing., 10(5), 767–782.CrossRef Lin, C. Y., Wu, M., Bloom, J. A., et al. (2001). Rotation, scale, and translation resilient watermarking for images. IEEE Transactions on image processing., 10(5), 767–782.CrossRef
36.
Zurück zum Zitat Gershon, R. (1985). Aspects of perception and computation in color vision. Computer vision, graphics, and image processing., 32(2), 244–277.CrossRef Gershon, R. (1985). Aspects of perception and computation in color vision. Computer vision, graphics, and image processing., 32(2), 244–277.CrossRef
37.
Zurück zum Zitat Martucci, S. A. (1995). Image resizing in the discrete cosine transform domain. Proceedings on International Conference on Image Processing. 2: 244-247. IEEE. Martucci, S. A. (1995). Image resizing in the discrete cosine transform domain. Proceedings on International Conference on Image Processing. 2: 244-247. IEEE.
38.
Zurück zum Zitat Mather, P., & Tso, B. (2016) Classification methods for remotely sensed data. CRC press. Mather, P., & Tso, B. (2016) Classification methods for remotely sensed data. CRC press.
39.
Zurück zum Zitat Benzarti, F., & Amiri, H. (2013) Speckle noise reduction in medical ultrasound images. arXiv preprint arXiv:1712.05526arXiv:1712.05526 Benzarti, F., & Amiri, H. (2013) Speckle noise reduction in medical ultrasound images. arXiv preprint arXiv:​1712.​05526arXiv:1712.05526
40.
Zurück zum Zitat Chandra, E., & Kanagalakshmi, K. (2011) Cancelable biometric template generation and protection schemes: A review. 3rd International Conference on Electronics Computer Technology (ICECT). 5: 15-20. IEEE. Chandra, E., & Kanagalakshmi, K. (2011) Cancelable biometric template generation and protection schemes: A review. 3rd International Conference on Electronics Computer Technology (ICECT). 5: 15-20. IEEE.
41.
Zurück zum Zitat Xu, Y., Zhu, Q., Fan, Z., et al. (2013). Coarse to fine K nearest neighbor classifier. Pattern Recognition Letters, 34(9), 980–986.CrossRef Xu, Y., Zhu, Q., Fan, Z., et al. (2013). Coarse to fine K nearest neighbor classifier. Pattern Recognition Letters, 34(9), 980–986.CrossRef
42.
Zurück zum Zitat Hassanat, A. B., Abbadi, M. A., Altarawneh, G. A., et al. (2014) Solving the problem of the K parameter in the KNN classifier using an ensemble learning approach. arXiv preprint arXiv:1409.0919 Hassanat, A. B., Abbadi, M. A., Altarawneh, G. A., et al. (2014) Solving the problem of the K parameter in the KNN classifier using an ensemble learning approach. arXiv preprint arXiv:​1409.​0919
43.
Zurück zum Zitat Nguyen, H. V., & Cosine Bai, L. (2010). similarity metric learning for face verification. Asian conference on computer vision (pp. 709–720). Berlin, Heidelberg: Springer. Nguyen, H. V., & Cosine Bai, L. (2010). similarity metric learning for face verification. Asian conference on computer vision (pp. 709–720). Berlin, Heidelberg: Springer.
44.
Zurück zum Zitat Goldberger, J., Hinton, G. E., Roweis, S. T., et al. (2005). Neighbourhood components analysis. Advances in neural information processing systems, 17, 513–520. Goldberger, J., Hinton, G. E., Roweis, S. T., et al. (2005). Neighbourhood components analysis. Advances in neural information processing systems, 17, 513–520.
45.
Zurück zum Zitat Jain, A. K., Murty, M. N., & Flynn, P. J. (1999). Data clustering: A review. ACM computing surveys (CSUR), 31(3), 264–323.CrossRef Jain, A. K., Murty, M. N., & Flynn, P. J. (1999). Data clustering: A review. ACM computing surveys (CSUR), 31(3), 264–323.CrossRef
46.
Zurück zum Zitat Burges, C. J. (1998). A tutorial on support vector machines for pattern recognition. Data mining and knowledge discovery, 2(2), 121–167.CrossRef Burges, C. J. (1998). A tutorial on support vector machines for pattern recognition. Data mining and knowledge discovery, 2(2), 121–167.CrossRef
47.
Zurück zum Zitat Schittkowski, K. (2005). Optimal parameter selection in support vector machines. Journal of Industrial and Management Optimization, 1(4), 465.MathSciNetCrossRef Schittkowski, K. (2005). Optimal parameter selection in support vector machines. Journal of Industrial and Management Optimization, 1(4), 465.MathSciNetCrossRef
48.
Zurück zum Zitat Souza, C. R. (2010) Kernel functions for machine learning applications. Creative Commons Attribution-Noncommercial-Share Alike.3: 29. Souza, C. R. (2010) Kernel functions for machine learning applications. Creative Commons Attribution-Noncommercial-Share Alike.3: 29.
49.
Zurück zum Zitat Friedrichs, F., & Igel, C. (2005). Evolutionary tuning of multiple SVM parameters. Neurocomputing, 64, 107–117.CrossRef Friedrichs, F., & Igel, C. (2005). Evolutionary tuning of multiple SVM parameters. Neurocomputing, 64, 107–117.CrossRef
50.
Zurück zum Zitat Huang, J., Yuen, P. C., Chen, W. S., et al. (2007). Choosing parameters of kernel subspace LDA for recognition of face images under pose and illumination variations. IEEE Transactions on Systems, Man, and Cybernetics, Part B Cybernetics, 37(4), 847–862.CrossRef Huang, J., Yuen, P. C., Chen, W. S., et al. (2007). Choosing parameters of kernel subspace LDA for recognition of face images under pose and illumination variations. IEEE Transactions on Systems, Man, and Cybernetics, Part B Cybernetics, 37(4), 847–862.CrossRef
51.
Zurück zum Zitat Binol, H., Cukur, H., & Bal, A. (2016). A supervised discriminant subspaces-based ensemble learning for binary classification. International Journal of Advanced Computer Research, 6(27), 209.CrossRef Binol, H., Cukur, H., & Bal, A. (2016). A supervised discriminant subspaces-based ensemble learning for binary classification. International Journal of Advanced Computer Research, 6(27), 209.CrossRef
52.
Zurück zum Zitat Sharma, S., & Kumar, V. (2020). Voxel-based 3D occlusion-invariant face recognition using game theory and simulated annealing. Multimedia Tools and Applications, 79(35), 26517–26547.CrossRef Sharma, S., & Kumar, V. (2020). Voxel-based 3D occlusion-invariant face recognition using game theory and simulated annealing. Multimedia Tools and Applications, 79(35), 26517–26547.CrossRef
53.
Zurück zum Zitat Sharma, S., & Kumar, V. (2020). Voxel-based 3D face reconstruction and its application to face recognition using sequential deep learning. Multimedia Tools and Applications, 79, 25–26. Sharma, S., & Kumar, V. (2020). Voxel-based 3D face reconstruction and its application to face recognition using sequential deep learning. Multimedia Tools and Applications, 79, 25–26.
54.
Zurück zum Zitat Sharma, S., & Kumar, V. (2021). 3D landmark-based face restoration for recognition using variational autoencoder and triplet loss. IET Biometrics, 10(1), 87–98.CrossRef Sharma, S., & Kumar, V. (2021). 3D landmark-based face restoration for recognition using variational autoencoder and triplet loss. IET Biometrics, 10(1), 87–98.CrossRef
55.
Zurück zum Zitat Goswami, G., Ratha, N., Agarwal, A., Singh, R. and Vatsa, M., (2018). Unravelling robustness of deep learning based face recognition against adversarial attacks. arXiv preprint arXiv:1803.00401 Goswami, G., Ratha, N., Agarwal, A., Singh, R. and Vatsa, M., (2018). Unravelling robustness of deep learning based face recognition against adversarial attacks. arXiv preprint arXiv:​1803.​00401
56.
Zurück zum Zitat Zhu, Z.A., Lu, Y.Z. and Chiang, C.K., (2019), September. Generating adversarial examples by makeup attacks on face recognition. In 2019 IEEE International Conference on Image Processing (ICIP) (pp. 2516-2520). IEEE. Zhu, Z.A., Lu, Y.Z. and Chiang, C.K., (2019), September. Generating adversarial examples by makeup attacks on face recognition. In 2019 IEEE International Conference on Image Processing (ICIP) (pp. 2516-2520). IEEE.
57.
Zurück zum Zitat Goswami, G., Agarwal, A., Ratha, N., Singh, R., & Vatsa, M. (2019). Detecting and mitigating adversarial perturbations for robust face recognition. International Journal of Computer Vision, 127(6–7), 719–742.CrossRef Goswami, G., Agarwal, A., Ratha, N., Singh, R., & Vatsa, M. (2019). Detecting and mitigating adversarial perturbations for robust face recognition. International Journal of Computer Vision, 127(6–7), 719–742.CrossRef
58.
Zurück zum Zitat Kotwal, K., Mostaani, Z., & Marcel, S. (2019). Detection of age-induced makeup attacks on face recognition systems using multi-layer deep features. IEEE Transactions on Biometrics, Behavior, and Identity Science, 2(1), 15–25.CrossRef Kotwal, K., Mostaani, Z., & Marcel, S. (2019). Detection of age-induced makeup attacks on face recognition systems using multi-layer deep features. IEEE Transactions on Biometrics, Behavior, and Identity Science, 2(1), 15–25.CrossRef
59.
Zurück zum Zitat Nguyen, D. T., Pham, T. D., Baek, N. R., & Park, K. R. (2018). Combining deep and handcrafted image features for presentation attack detection in face recognition systems using visible-light camera sensors. Sensors, 18(3), 699.CrossRef Nguyen, D. T., Pham, T. D., Baek, N. R., & Park, K. R. (2018). Combining deep and handcrafted image features for presentation attack detection in face recognition systems using visible-light camera sensors. Sensors, 18(3), 699.CrossRef
60.
Zurück zum Zitat Weitz, K., Hassan, T., Schmid, U. and Garbas, J.U., (2019) Deep-learned faces of pain and emotions Elucidating the differences of facial expressions with the help of explainable AI methods. tm-Technisches Messen, 86(7-8): 404-412. Weitz, K., Hassan, T., Schmid, U. and Garbas, J.U., (2019) Deep-learned faces of pain and emotions Elucidating the differences of facial expressions with the help of explainable AI methods. tm-Technisches Messen, 86(7-8): 404-412.
61.
Zurück zum Zitat Williford, J.R., May, B.B. and Byrne, J., (2020) August. Explainable Face Recognition. In European Conference on Computer Vision (pp. 248-263). Springer, Cham. Williford, J.R., May, B.B. and Byrne, J., (2020) August. Explainable Face Recognition. In European Conference on Computer Vision (pp. 248-263). Springer, Cham.
62.
Zurück zum Zitat Wang, M. and Deng, W., 2020. Mitigating Bias in Face Recognition Using Skewness-Aware Reinforcement Learning. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 9322-9331). Wang, M. and Deng, W., 2020. Mitigating Bias in Face Recognition Using Skewness-Aware Reinforcement Learning. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 9322-9331).
63.
Zurück zum Zitat Duong, C.N., Luu, K., Quach, K.G., Nguyen, N., Patterson, E., Bui, T.D. and Le, N., (2019). Automatic face aging in videos via deep reinforcement learning. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (pp. 10013-10022). Duong, C.N., Luu, K., Quach, K.G., Nguyen, N., Patterson, E., Bui, T.D. and Le, N., (2019). Automatic face aging in videos via deep reinforcement learning. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (pp. 10013-10022).
Metadaten
Titel
Performance Evaluation of Machine Learning Based Face Recognition Techniques
verfasst von
Sahil Sharma
Vijay Kumar
Publikationsdatum
16.02.2021
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2021
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-08186-9

Weitere Artikel der Ausgabe 4/2021

Wireless Personal Communications 4/2021 Zur Ausgabe

Neuer Inhalt