Paper
17 September 2018 An algorithm of face recognition based on generative adversarial networks
Author Affiliations +
Abstract
The problem of face recognition is the important task in the security field, closed-circuit television (CCTV), artificial intelligence, and etc. One of the most effective approaches for pattern recognition is the use of artificial neural networks. In this presentation, an algorithm using generative adversarial networks is developed for face recognition. The proposed method consists in the interaction of two neural networks. The first neural network (generative network) generates face patterns, and the second network (discriminative network) rejects false face patterns. Neural network of feed forward type (single-layer or multilayer perceptron) is used as generative network. The convolutional neural network is used as discriminative network for the purpose of pattern selection. A big database of normalized to brightness changes and standardized in scale artificial images is created for the training of neural networks. New facial images are synthesized from existing ones. Results obtained with the proposed algorithm using generative adversarial networks are presented and compared with common algorithms in terms of recognition and classification efficiency and speed of processing.
© (2018) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Sergey Leonov, Alexander Vasilyev, Artyom Makovetskii, and J. Diaz-Escobar "An algorithm of face recognition based on generative adversarial networks", Proc. SPIE 10752, Applications of Digital Image Processing XLI, 107522L (17 September 2018); https://doi.org/10.1117/12.2321039
Lens.org Logo
CITATIONS
Cited by 1 scholarly publication.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Facial recognition systems

Neural networks

Detection and tracking algorithms

Algorithm development

Artificial neural networks

Computer security

Mathematics

Back to Top