2020
DOI: 10.1007/978-981-15-5566-4_44
|View full text |Cite
|
Sign up to set email alerts
|

Real-Time Safety and Surveillance System Using Facial Recognition Mechanism

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…Electronic bracelets are used in Hong Kong and China. In Poland and Singapore, they use specialized applications through which calls are made at random in time, (Pandey et al, 2021). In China, Spain, France, the United States, drones are used with visual surveillance systems and face recognition systems.…”
Section: Resultsmentioning
confidence: 99%
“…Electronic bracelets are used in Hong Kong and China. In Poland and Singapore, they use specialized applications through which calls are made at random in time, (Pandey et al, 2021). In China, Spain, France, the United States, drones are used with visual surveillance systems and face recognition systems.…”
Section: Resultsmentioning
confidence: 99%
“…Pandey et al combined the on-demand resource availability of cloud computing, which can store and retrieve the captured video anytime. Additionally, its surveillance mechanism involves the Viola-Jones algorithm for face detection by analyzing captured data [28]. Shanthi and Svalakshmi developed a surveillance method by using a face recognition based unmanned aerial vehicle (UAV) [29].…”
Section: Introductionmentioning
confidence: 99%
“…Biometrics is described as a pattern-recognition technique for individual identification, based on their physical, chemical, or behavioral characteristics [ 1 , 2 ]. One of the most popular biometric techniques is face recognition [ 2 ], which has abundant applications [ 3 , 4 , 5 ] in various areas, such as: (1) security, including identity verification [ 6 , 7 ], computer or mobile device unlock [ 7 , 8 ], criminal records search, and voter registration; (2) surveillance, such as cameras used on closed circuit television (CCTV) [ 9 ]; and (3) access control that could grant access to a specific place or an electronic account to a group of people [ 10 ] using their faces as a credential. As described by Das et al [ 11 ], there is a growing attention from the scientific community on mobile devices with biometric recognition.…”
Section: Introductionmentioning
confidence: 99%
“…As described by Das et al [ 11 ], there is a growing attention from the scientific community on mobile devices with biometric recognition. This attention is mainly fueled by the commercial interest in robust authentication methods for smartphones, laptops, tablets, and other mobile devices [ 7 , 8 ].…”
Section: Introductionmentioning
confidence: 99%