In this section, some research
papers, websites and other links are reviewed as well as the main basic and
significant points are mentioned. The upcoming projects related research
articles are reviewed especially for this purpose. The literature review is
telling that what methods are using in related works as well as best ever
techniques, researchers are going to use in the facial recognition project. The
limitations as well as the description of the database of faces which are saved
in, used for testing the system performance by using the algorithm for facial
recognition. A line edge map is used in the recent method of the face
recognition which recognize faces and shapes of the faces through the
recognition algorithm.
Some tests are performed to see
how effective the recognition system is. The results were very interesting.
Proposed facial recognition system gave results in the Bern database ninety
seven percent. Support vector machine (SVM) was used which is considered
effective method for the general recognition pattern of system’s high
performance without enhancing the knowledge. Support Vector machine (SVM)
identifies the hyperplane which distinguishes the biggest possible fraction of
possible points.
Technology Effective of
Portable Low-Cost Facial Recognition
The technology can be harmful
because for animal beings sometimes. Most of the technological equipment or the
products can harm animals. The main purpose to make sure that the proposed
technology will not be harmful for animals. If the recognition system gave
pause then consider this thing is being used in the animal world. The studies
show that the proposed approach is not harmful for the animals. The technology
can be effective on animals. For example, in the recent researches, the
biometric recognition system for the animals was introduced which used to
manage animals like drag them to cage or sort them without harming them. There
are some key things are used in the system to make system efficient and effective.
These were the related
recognition systems which were make for the animals but the project is all
about the recognition of human faces on low cost to maximize the security in
baking sector. The technology will be very effective which will be very low
cost as well as can effectively recognize. The technology which is used in the
project is very small and is not harmful for people or not harmful for the
other electric wiring systems. The first effect of this technology is that the
system will take picture or every person who will be in front of the system.
Some people are so much conscious as well as conserved and avoid showing their
identity openly, they may have some kind of issues. The proposed solution is
very effective overall which will take pictures of ever suspicious people at
the prohibited area or the sensitive area. There are some key things or
requirements of the proposed technique and project which will make the project
fully functional.
Camera of Portable Low-Cost Facial Recognition
A camera will be used in the
project to take pictures of the suspicious persons at the sensitive areas. The
camera is used because the recognition operation is not possible and cannot
match the faces. The camera is detachable and can be fixed in the Arduino chip.
This camera is used because this camera is cheaper than other cameras as well
as in case of any improvement, the camera can be changed easily. For example,
some cameras are not for night vision and they are useless in the low light.
So, the detachable camera will be used in the Raspberry pi facial recognition
project.
Electricity of Portable Low-Cost Facial Recognition
Electricity is the main and
major component of every electronic as well as the computer related or software
related projects or products because every electric device require electricity
to power up the devices. By having electric power, the device will be turned on
and usable and fully functional. Raspberry Pi project will take very low
electric power for being functional. A charger which has the mini android USB
cable is enough to power it. This low power will not be harmful for humans and
other related or engaged systems like computer or any other hardware or
additional hardware if it will be fixed or attached with the project device in
future. Furthermore, to make the wiring and connections safe, some kind of
protective coating will also be applied to the wires and the bear prominent
joints where necessary.
Wi-Fi of Portable Low-Cost Facial Recognition
Wi-Fi or internet is the very
essential part of this project because the Wi-Fi or internet is the only
factors that connect the system to other system. In the system words, Raspberry
Pi will be connected with the computer and the server with the help of Wi-Fi or
internet. It plays a role of a bridge in this project because when the camera
fixed in the board of raspberry pi, take the picture of the suspicious person
then the device will use the internet to access the server and database to
store the picture into the database. Sometimes the system can be damaged due to
the internet speed. For example sometimes the internet may be slower due to
some unexpected issues and due to this reason the system will not be able to
save the record to database. This can be more significant issue in the system.
Database of Portable Low-Cost Facial Recognition
The database will be used in the
proposed technique to save and store the record into the database. The database
is very essential part of any computerized system or application where the user
or system can easily save the record as well as retrieve the data from the
database. Sometimes one issue may occur into the database. For example, the
system is not saving the record into the database because of the accessibility.
In the failure of accessibility, the system cannot be able to retrieve any kind
of data as well as not able to save new data into the database. Sometimes, the
databases other kind of issues like server down can be faced. It is
challengeable thing and unexpected error which can cause some kind of troubles
for some times.
Security Issues with the Internet of
Things
Some problems may occur due to
the internet. Some cyber attacker or any kind of hacker always search any flaw
in the system as well as take the tires to break the security system of the
sensitive area. The professional and ethical studies says that every security
in the world is not complete. So a large number of issues may occur in the
system. Some issues like not accessible with the database or the computer.
Sometimes the user’s computer like the admin computer cannot access or handle
the things like it was handling before. A number of issues such as saving data
or retrieving data from the database may occur. The report says that facial
recognition with follow the same rules which are company for the recognition
system.
Overview of Portable Low-Cost Facial Recognition
Mostly systems are not so secure
because many online systems running through internet as well as it can damage
the whole system. The proposed technique may also be vulnerable by using
internet but we are using python language and the Linux based environment for
this purpose. The overall study tells that security and every lock of the work
is breakable. So the online hackers can attack easily as well as can damage the
system.
Some kind of scripts, viruses, additional
drivers as well as other kind of additional tools or toolkits may be harmful
for the security. So the attackers can use these things to hack or damage
system. When they succeeded in this purpose, they can easily break this the
security and as well as easily access the database which will be more harmful
for the bank, device as well as for the personal information of the persons
which are saved by the device into the system. There are some key factors which
can play a role to damage the system as well as to damage the information which
is saved in the database. The main factors are listed below with the brief
explanation.
Virus and Malware of Portable Low-Cost Facial
Recognition
The malware is the combination
of two things such as the software as well as malicious. Malware can damage the
system very easily. There are many methods to place the malicious scripts into
the system by using internet. The hacker, breaches as well as the attacker’s
leave the malicious scripts into the admin or main computer that handles the
complete system. They place the malicious scripts into the computer through
using the email or any other kind of online services. When the user open up
that email or try to open that malicious thing, the inserted scripts executed
automatically and spread into the computer. It is enough to take the control of
the computer.
SQL injection of Portable Low-Cost Facial
Recognition
The SQL injections are very
effective and damageable attacks which are used to steal the information from
the database. In the SQL injections the attacker attacks on the authentication
when the data flows and going to be saved into the database. The main work of
the SQL injection is to access data and steal information when the data will be
passed from the internet to be saved. The injection successfully makes a hole where
it can pick the data and information. This is very harmful for the data
security.
Similar Products / Solutions
of Portable Low-Cost Facial Recognition
This section
will discuss some products / solutions that have been produced, which share
definite resemblances.
The first
similar solution is a mobile phone camera. Nowadays, almost all of the smart
phones have been implementing this advanced technology, as another option from
fingerprint or PIN. However, the technique of how facial recognition works in
smart phones is still cannot consider being a secure one. The reason is due to
smartphones only rely on a 2D facial recognition system which is quite cheap
and simple to be implemented (Fathy, Patel, & Chellappa,
2015). Another
similar product is the Microsoft Services face API which offers an algorithm to
be used in detecting, recognizing, as well as analyzing the human face within
images (Maheshwari, 2017).
Since the
project features various different elements, thus, there are some hurdles to be
similar solutions associated with these many elements. For this reason, the
similar products mentioned above are the most applicable ones related to the
project.
Conclusion of Portable Low-Cost
Facial Recognition
In the conclusion, there are
many significant thing found in this chapter which is all about the literature
review. Many articles are reviewed as well as the researches on the facial
recognition are also studied. First of all a brief introduction was written in
this chapter. Which tells about the what the actual technology is, where can we
use this as well as how what the things and methods are required for this
purpose. The items like hardware, programming languages, information storing
methods are also discussed in this report. Raspberry Pi is Linux based device
is used in this project as the hardware as well as a camera is also used that
will be fixed in the Raspberry Pi device to capture the picture of the
suspicious person, process on that picture, extract and then match that picture
with those pictures that are saved in the Raspberry Pi database.
Secondly, some methods are also
used for this purpose. Some related researches on this topic are also shared in
this chapter. Proposed facial recognition system gave results in the Bern
database ninety seven percent. Support vector machine (SVM) was used which is
considered effective method for the general recognition pattern of system’s
high performance without enhance the knowledge. Support Vector machine (SVM)
identifies the hyper plane which distinguishes the biggest possible fraction of
possible points.
Some kind of basic information
which on the vulnerabilities or the system security issues are also discussed
such as the basic knowledge about the viruses, malware, SQL injections as well
as the attackers or hackers. The hacker, breaches as well as the attacker’s
leave the malicious scripts into the admin or main computer that handles the
complete system. They place the malicious scripts into the computer through
using the email or any other kind of online services. When the user open up
that email or try to open that malicious thing, the inserted scripts executed
automatically and spread into the computer. It is enough to take the control of
the computer. All of the things which are discussed here cant impactful on the
security.
Based on the review above, there
is more knowledge in specific fields such as 2D as a cheap and easy face
recognition system to be applied, and analyzing the human face within images.
Hence, the review has supported to recognize the right way to be conducted in
the project.