Recently, image recognition technology using deep learning has improved significantly, and security systems and home services that use biometric information such as fingerprints, iris scans, and face recognition are attracting attention. In particular, user authentication methods that utilize face recognition have been studied at length. This study presents a visitor authentication technology that uses CCTV with a Jetson Nano and webcam. In the preprocessing phase for face recognition, face data with 7 features that can be identified as a person are collected using CCTV. The collected dataset goes through the annotation process to classify the data, and facial features are detected using deep learning. If there are four or more detected fea...
Nowadays, security is the essential part of systematic day to day activities. By utilizing internet ...
Internet of Things (IoT) with deep learning (DL) is drastically growing and plays a significant role...
This research proposes a novel and trustworthy user authentication method that creates individualize...
Biometric data is the key for many security applications. Authentication relies on the individual’s ...
Nowadays, facial recognition is one of the widely used categories of biometric security that disting...
Home entrance is a vital entry point that should be secured at all times. A bi-level home access sys...
Home entrance is a vital entry point that should be secured at all times. A bi-level home access sys...
Nowadays, a large network of cameras is predominantly used in public places which provide enormous v...
Nowadays, a large network of cameras is predominantly used in public places which provide enormous v...
Background: Authentication is one of the major challenges of the information systems era. From Among...
Background: Authentication is one of the major challenges of the information systems era. From Among...
The ability to recognize human faces is a demonstration of incredible human intelligence. Over the l...
Nowadays, security is the essential part of systematic day to day activities. By utilizing internet ...
Identifying a person primarily relies on their facial features, which even distinguish identical twi...
Identifying a person primarily relies on their facial features, which even distinguish identical twi...
Nowadays, security is the essential part of systematic day to day activities. By utilizing internet ...
Internet of Things (IoT) with deep learning (DL) is drastically growing and plays a significant role...
This research proposes a novel and trustworthy user authentication method that creates individualize...
Biometric data is the key for many security applications. Authentication relies on the individual’s ...
Nowadays, facial recognition is one of the widely used categories of biometric security that disting...
Home entrance is a vital entry point that should be secured at all times. A bi-level home access sys...
Home entrance is a vital entry point that should be secured at all times. A bi-level home access sys...
Nowadays, a large network of cameras is predominantly used in public places which provide enormous v...
Nowadays, a large network of cameras is predominantly used in public places which provide enormous v...
Background: Authentication is one of the major challenges of the information systems era. From Among...
Background: Authentication is one of the major challenges of the information systems era. From Among...
The ability to recognize human faces is a demonstration of incredible human intelligence. Over the l...
Nowadays, security is the essential part of systematic day to day activities. By utilizing internet ...
Identifying a person primarily relies on their facial features, which even distinguish identical twi...
Identifying a person primarily relies on their facial features, which even distinguish identical twi...
Nowadays, security is the essential part of systematic day to day activities. By utilizing internet ...
Internet of Things (IoT) with deep learning (DL) is drastically growing and plays a significant role...
This research proposes a novel and trustworthy user authentication method that creates individualize...