FACE RECOGNITION WITH BILINEAR CNNS: A REVIEW

Authors

  • Dikshendra Daulat Sarpate, B. Sankaraiah, B.Rani, Vemula Nikitha, Dr. Syed Umar Author

DOI:

https://doi.org/10.65009/jxhan555

Keywords:

Facial, Recognition Biometrics, Image Processing, Problem Solving, and Artificial Neural Networks are some of the terms used in the index.,,

Abstract

The identification of faces from real data, captured images, sensor photos, and database 
images is a challenging endeavor. This is because there is a wide range of facial appearances, the 
illumination effect, and the intricacy of the image backdrop.  The use of image processing and biometric 
technology for facial recognition is one of the most effective and significant applications of these 
technologies.  This research presents a discussion of face identification methods and algorithms that have 
been developed by a number of researchers using artificial neural networks (ANN). These algorithms 
have been utilized in applications that are not related to image processing and pattern recognition.  This 
article will also discuss how artificial neural networks (ANN) will be utilized for facial recognition, as 
well as how it is superior to other approaches in terms of efficiency.  In order to present an overview of 
face recognition using ANN, there are many different ways that are provided by ANN.  As a consequence 
of this, this research includes an exhaustive analysis of face recognition experiments and systems that 
make use of a wide variety of artificial neural network (ANN) methodologies and algorithms.  Through 
the course of this study effort, both the positive and negative aspects of the aforementioned literature 
studies and systems were incorporated, in addition to a performance examination of a number of different 
ANN techniques and algorithms.  During the past twenty years, the discipline of shape detection has 
emerged as the most exciting sector of the scientific community.  Object identification is the focus of our 
discussion as we provide an innovative approach to identifying shapes that are similar to one another.  The 
process of determining the correspondences between the vertices of two shapes and then using those 
correspondences to estimate an aligning transform prior to determining the degree of similarity between 
the shapes.  In this article, we will go over some of the most important aspects of face detection, which are 
useful in a wide range of applications. These applications include face recognition, image classification, 
the ability to track faces, facial feature extraction, person identification, identification number, record 
keeping and access control, grouping, biometric scientific knowledge, human computer interaction (HCI) 
system, electronic beauty products, and many more.  Prior to that, I would like to go over some 
well-known facial recognition techniques and then some image processing approaches. This is because 
we won't be able to effectively identify someone unless we remove the primary parts of their face, which 
are their eyes, nose, and mouth.  Calculating the difference between the two shapes involves determining 
the percentage of the matching mistake that exists between locations that are comparable.  As a method 
for classifying recognition, we make use of a closest neighbor classification. 

,

References

Ouyang Z., Cui G., Zhao J., and Liu Q., Image depth-of-field rendering algorithm based on

hierarchical anisotropic filtering, Optics Technology. (2018) 44, no. 4, 469–475.

Naveen Sai Bommina, Uppu Lokesh, Nandipati Sai Akash, Dr. Hussain Syed, Dr. Syed Umar,

"Optimized AI Models for Real-Time Cyberattack Detection in Smart Homes and Cities",

International Journal of Applied Engineering & Technology, Vol. 4 No.1, June, 2022.

Habeeb, M. S., & Babu, T. R. (2022). Network intrusion detection system: a survey on artificial

intelligence‐based techniques. Expert Systems, 39(9), e13066.

Liu H., Hu X., and Xu L., Research on remote real-time rendering system based on graphics cluster,

Journal of System Simulation. (2019) 31, no. 5, 886–892.

Umar, Syed, Bommina Naveen Sai, Nagineni Sai Lasya,Doppalapudi Asutosh, and LohithaRani.

"Machine Learning based Sentiment Analysis of Product Reviews Using DeepEmbedding."

Journal of Optoelectronics Laser 41, no. 6(2022): 108-113.

Habeeb, M. S., & Babu, T. R. (2024, October). Enhancing IoT Security Through Advanced Feature

Selection and Deep Learning. In International Conference on Computing and Communication

Networks (pp. 37-49). Singapore: Springer Nature Singapore.

from

Chen Y.-C., Patel V. M., Phillips P. J., and Chellappa R., Dictionary-based face and person

recognition

unconstrained

video,

Ieee

Access.

https://doi.org/10.1109/access.2015.2485400, 2-s2.0-84959857666.

(2015)

,

–1798,

Nandipati Sai Akash, Naveen Sai Bommina, Uppu Lokesh, Hussain Syed, Syed Umar, "Optimized

Block Chain-Enabled Security Mechanism for IoT Using Ant Colony Optimization", International

Journal on Recent and Innovation Trends in Computing and Communication, (2023), 11(10),

–1233.

K Sankar, Divya Rohatgi, S Balakrishna Reddy, "COX Regressive Winsorized Correlated

Convolutional Deep Belief Boltzmann Network for Covid-19 Prediction with Big Data", Grenze International Journal of Engineering & Technology (GIJET), Grenze ID: 01.GIJET.9.1.547, ©

Grenze Scientific Society, 2023.

Naveen Sai Bommina , Nandipati Sai Akash, Uppu Lokesh , Dr. Hussain Syed , Dr. Syed Umar,

"Multi-Objective Genetic Algorithms for Secure Routing and Data Privacy in IoT Networks",

International Journal of Communication Networks and Information Security (IJCNIS), (2020),

(3), 632–643.

RS Supriya Khaitan, Divya Rohatgi, Sana Nalband, Tejali Mhatre, Shweta Patil, "Enhancing

Essay Grading Efficiency and Consistency through Two-Layer LSTM Models and Attention

Mechanisms", Journal of Information Systems Engineering and Management 10 (2), 191-202.

Ahmad, Z., Khan, A. S., Aqeel, S., Julaihi, A. A., Tarmizi, S., Annuar, N., & Habeeb, M. S. (2022,

May). S-ADS: spectrogram image-based anomaly detection system for IoT networks. In 2022

Applied Informatics International Conference (AiIC) (pp. 105-110). IEEE.

Naveen Sai Bommina, Nandipati Sai Akash, Uppu Lokesh, Dr. Hussain Syed, Dr. Syed Umar, "A

Hybrid Optimization Framework for Enhancing IoT Security via AI-based Anomaly Detection",

International Journal on Recent and Innovation Trends in Computing and Communication, (2023)

ISSN: 2321-8169 Volume: 11 Issue: 3.

M. Mukhedkar, D. Rohatgi, V.A. Vuyyuru, K.V.S.S. Ramakrishna, Y.A. Baker El-Ebiary, V.A.

Asir Daniel, "Feline wolf net: A hybrid lion-grey wolf optimization deep learning model for

ovarian cancer detection", Int. J. Adv. Comput. Sci. Appl., 14 (9) (2023)

Uppu Lokesh , Naveen Sai Bommina , Nandipati Sai Akash , Dr. Hussain Syed , Dr. Syed Umar.

(2021). Deep Reinforcement Learning with Genetic Algorithm Tuning for Intrusion Detection in

IoT Systems. International Journal of Communication Networks and Information Security

(IJCNIS), 13(3), 582–595. [10] P. Grother and M. Ngan. Face recognition vendor test (FRVT):

Performance of face identification algorithms. In NIST Interagency report 8009, 2014.

D Veerendra, BN Umesh, A Khandare, D Rohatgi, K Tiwari, S Datta, "ECA-MURE algorithm

and CRB analysis for high-precision DOA estimation in coprime sensor arrays", IEEE Sensors

Letters 7 (12), 1-4.

Uppu Lokesh, Naveen Sai Bommina, Nandipati Sai Akash, Dr. Hussain Syed, Dr. Syed Umar,

"Designing Energy-Efficient and Secure IoT Architectures Using Evolutionary Optimization

Algorithms", International Journal of Applied Engineering & Technology, Vol. 4 No.2,

September, 2022.

Downloads.

Published

2025-09-01

How to Cite

FACE RECOGNITION WITH BILINEAR CNNS: A REVIEW . (2025). Phoenix: International Multidisciplinary Research Journal ( Peer Reviewed High Impact Journal ), 3(3), 122-129. https://doi.org/10.65009/jxhan555