JCHCI 2022
DOI: 10.54216/jchci.020204
|View full text |Cite
|
Sign up to set email alerts
|

Enhancement Of Cloud User Data Access Security Entrusted to AI Face Recognition Techniques

Abstract: As technology progresses, in figuring and broadcast communications, electronic images and video are playing more important roles in today's data age. The Human Face is a key component of video and audio databases utilized by observation frameworks. Recognizing and locating human features and face highlights in a photograph or series of photographs is a difficult task in unusual scenarios, such as recordings, when acoustic conditions, illumination, subject regions, and posture can vary dramatically from edge to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“… IaaS provides cloud users with on-demand physical and virtual resource services, such as servers, storage, and network services. A typical IaaS service is Amazon EC2/S3 [ 26 ]. Amazon is the first company to provide cloud computing products.…”
Section: Cloud Computingmentioning
confidence: 99%
See 1 more Smart Citation
“… IaaS provides cloud users with on-demand physical and virtual resource services, such as servers, storage, and network services. A typical IaaS service is Amazon EC2/S3 [ 26 ]. Amazon is the first company to provide cloud computing products.…”
Section: Cloud Computingmentioning
confidence: 99%
“…IaaS provides cloud users with on-demand physical and virtual resource services, such as servers, storage, and network services. A typical IaaS service is Amazon EC2/S3 [26]. e scheduling process from cloud users submitting data to returning processing results can be represented as shown in Figure 3.…”
Section: Cloud Computingmentioning
confidence: 99%
“…For the complete face recognition process, first use the ResNet network to train the local face, then use the RetinaFace algorithm to extract the face features, and then use ArcFace to compare the detected face area with the local face. [22][23][24][25] Figure 8 shows the actual effect of face recognition with or without occlusion obtained in this experiment. The English letters indicate the abbreviation of the recognized person's name, and the numbers indicate the cosine value of the test.…”
Section: Using Arcface To Recognize the Detected Facementioning
confidence: 99%
“…For the complete face recognition process, first use the ResNet network to train the local face, then use the RetinaFace algorithm to extract the face features, and then use ArcFace to compare the detected face area with the local face 22 25 …”
Section: Face Recognition Test In Classroom Environment Based On Resi...mentioning
confidence: 99%
“…e human face can be seen as a combination of skin, bones, and muscles, where the skin determines the visual appearance of the face, the bones determine the main contours of the face, and the muscles are used to connect the skin and bones to produce the main movements and expressions of the face [21,22]. erefore, if the virtual face is to produce a more realistic and natural expression, it is particularly important to complete the modeling of the muscle model.…”
Section: Virtual Face Modelingmentioning
confidence: 99%