Optimization of Three-dimensional Face Recognition Algorithms in Financial Identity Authentication

Authors

  • Cong Luo Guizhou University of Finance and Economics, Guiyang, Guizhou, China
  • Xiangbo Fan Guizhou University of Finance and Economics, Guiyang, Guizhou, China
  • Ying Yan Guizhou University of Finance and Economics, Guiyang, Guizhou, China
  • Han Jin Guizhou University of Finance and Economics, Guiyang, Guizhou, China
  • Xuan Wang Guizhou University of Finance and Economics, Guiyang, Guizhou, China

DOI:

https://doi.org/10.15837/ijccc.2022.3.3744

Keywords:

Financial Identity Authentication, Face Recognition, Feature Extraction, Principal Component Analysis, Three-dimensional Face Recognition Algorithms, BP Neural Network, Optimization, Three-dimensional Face

Abstract

Identity authentication is one of the most basic components in the computer network world. It is the key technology of information security. It plays an important role in the protection of system and data security. Biometric recognition technology provides a reliable and convenient way for identity authentication. Compared with other biometric recognition technologies, face recognition has become a hot research topic because of its convenience, friendliness and easy acceptance. With the maturity and progress of face recognition technology, its commercial application has become more and more widespread. Internet finance, e-commerce and other asset-related areas have begun to try to use face recognition technology as a means of authentication, so people’s security needs for face recognition systems are also increasing. However, as a biometric recognition system, face recognition system still has inherent security vulnerabilities and faces security threats such as template attack and counterfeit attack. In view of this, this paper studies the application of threedimensional face recognition algorithm in the field of financial identity authentication. On the basis of feature extraction of face information using neural network algorithm, K-L transform is applied to image high-dimensional vector mapping to make face recognition clearer. Thus, the image loss can be reduced.

References

Nair K K , Helberg A , Johannes V D M . An approach to Improve the Match-on-Card Fingerprint Authentication System security[J]. 2016:119-125.

Rila L , Mitchell C J . Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards[C]// Applied Cryptography and Network Security, First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings. DBLP, 2003.

Nair S K, Dashti M T, Crispo B, et al. A Hybrid PKI-IBC Based Ephemerizer System[C]// New Approaches for Security, Privacy & Trust in Complex Environments, Ifip Tc-11 International Information Security Conference. 2008.

Shi J p. Research on fingerprint watermarking algorithm for copyright protection and identity authentication [D]. Nanjing University of Aeronautics and Astronautics, 2016.

Li Ye, Wang Yinghui, Liu Jing. 3D Face Recognition Based on Ridge Valley Feature Extraction [J]. Computer Engineering and Applications, 2011, 47 (12): 7-11.

As'Ari M A, Sheikh U U, Supriyanto E. 3D shape descriptor for object recognition based on Kinect-like depth image ☆[J]. Image & Vision Computing, 2014, 32(4):260-269.

Zhan Shu, Zhang Qixiang, Jiang Jianguo, et al. Three-dimensional face recognition based on Gabor feature kernels cooperative expression [J]. Journal of Photonics, 2013, 42 (12): 1448-1453.

Daniyal F , Nair P , Cavallaro A . Compact Signatures for 3D Face Recognition under Varying Expressions[C]// IEEE International Conference on Advanced Video & Signal Based Surveillance. IEEE, 2009.

Lu Shiwen, Da Feipeng, Deng Xing. Three-dimensional face recognition based on improved LBP [J]. Journal of Southeast University: Natural Science Edition, 2015, 45 (4): 678-682.

Karhunen J , Joutsensalo J . Representation and separation of signals using nonlinear PCA type learning[J]. Neural Networks, 1994, 7(1):113-127.

Moon H, Phillips P J. Computational and performance aspects of PCA-based face-recognition algorithms[J]. Perception, 2001, 30(3):303-21.

Bansal A, Mehta K, Arora S. Face Recognition Using PCA and LDA Algorithm[C]// Second International Conference on Advanced Computing & Communication Technologies. 2012.

Thi H A L, Nguyen M C. DCA based algorithms for feature selection in multi-class support vector machine[J]. Annals of Operations Research, 2017, 249(1-2):1-28.

Sasagawa Y. Neural network system[J]. 2014.

Bevilacqua V, Cariello L, Carro G, et al. A face recognition system based on Pseudo 2D HMM applied to neural network coefficients[J]. Soft Computing, 2008, 12(7):615-621.

Aitkenhead M J, Mcdonald A J S. A neural network face recognition system[J]. Engineering Applications of Artificial Intelligence, 2003, 16(3):167-176.

Soltanali S, Halladj R, Tayyebi S, et al. Neural network and genetic algorithm for modeling and optimization of effective parameters on synthesized ZSM-5 particle size[J]. Materials Letters, 2014, 136(136):138-140.

Wilkinson R T, El-Beheri S, Gieseking C C. Performance and arousal as a function of incentive, information load, and task novelty.[J]. Psychophysiology, 2010, 9(6):589-599.

Reed I S, Mallett J D, Brennan L E. Rapid Convergence Rate in Adaptive Arrays[J]. IEEE Transactions on Aerospace & Electronic Systems, 2007, AES-10(6):853-863.

Soudry D, Di C D, Gal A, et al. Memristor-Based Multilayer Neural Networks With Online Gradient Descent Training[J]. IEEE Transactions on Neural Networks & Learning Systems, 2017, 26(10):2408-2421.

Additional Files

Published

2022-03-21

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.