FACE RECOGNITION WITH BILINEAR CNNS: A REVIEW
DOI:
https://doi.org/10.65009/jxhan555Keywords:
Facial, Recognition Biometrics, Image Processing, Problem Solving, and Artificial Neural Networks are some of the terms used in the index.,,Abstract
The identification of faces from real data, captured images, sensor photos, and database
images is a challenging endeavor. This is because there is a wide range of facial appearances, the
illumination effect, and the intricacy of the image backdrop. The use of image processing and biometric
technology for facial recognition is one of the most effective and significant applications of these
technologies. This research presents a discussion of face identification methods and algorithms that have
been developed by a number of researchers using artificial neural networks (ANN). These algorithms
have been utilized in applications that are not related to image processing and pattern recognition. This
article will also discuss how artificial neural networks (ANN) will be utilized for facial recognition, as
well as how it is superior to other approaches in terms of efficiency. In order to present an overview of
face recognition using ANN, there are many different ways that are provided by ANN. As a consequence
of this, this research includes an exhaustive analysis of face recognition experiments and systems that
make use of a wide variety of artificial neural network (ANN) methodologies and algorithms. Through
the course of this study effort, both the positive and negative aspects of the aforementioned literature
studies and systems were incorporated, in addition to a performance examination of a number of different
ANN techniques and algorithms. During the past twenty years, the discipline of shape detection has
emerged as the most exciting sector of the scientific community. Object identification is the focus of our
discussion as we provide an innovative approach to identifying shapes that are similar to one another. The
process of determining the correspondences between the vertices of two shapes and then using those
correspondences to estimate an aligning transform prior to determining the degree of similarity between
the shapes. In this article, we will go over some of the most important aspects of face detection, which are
useful in a wide range of applications. These applications include face recognition, image classification,
the ability to track faces, facial feature extraction, person identification, identification number, record
keeping and access control, grouping, biometric scientific knowledge, human computer interaction (HCI)
system, electronic beauty products, and many more. Prior to that, I would like to go over some
well-known facial recognition techniques and then some image processing approaches. This is because
we won't be able to effectively identify someone unless we remove the primary parts of their face, which
are their eyes, nose, and mouth. Calculating the difference between the two shapes involves determining
the percentage of the matching mistake that exists between locations that are comparable. As a method
for classifying recognition, we make use of a closest neighbor classification.
References
Ouyang Z., Cui G., Zhao J., and Liu Q., Image depth-of-field rendering algorithm based on
hierarchical anisotropic filtering, Optics Technology. (2018) 44, no. 4, 469–475.
Naveen Sai Bommina, Uppu Lokesh, Nandipati Sai Akash, Dr. Hussain Syed, Dr. Syed Umar,
"Optimized AI Models for Real-Time Cyberattack Detection in Smart Homes and Cities",
International Journal of Applied Engineering & Technology, Vol. 4 No.1, June, 2022.
Habeeb, M. S., & Babu, T. R. (2022). Network intrusion detection system: a survey on artificial
intelligence‐based techniques. Expert Systems, 39(9), e13066.
Liu H., Hu X., and Xu L., Research on remote real-time rendering system based on graphics cluster,
Journal of System Simulation. (2019) 31, no. 5, 886–892.
Umar, Syed, Bommina Naveen Sai, Nagineni Sai Lasya,Doppalapudi Asutosh, and LohithaRani.
"Machine Learning based Sentiment Analysis of Product Reviews Using DeepEmbedding."
Journal of Optoelectronics Laser 41, no. 6(2022): 108-113.
Habeeb, M. S., & Babu, T. R. (2024, October). Enhancing IoT Security Through Advanced Feature
Selection and Deep Learning. In International Conference on Computing and Communication
Networks (pp. 37-49). Singapore: Springer Nature Singapore.
from
Chen Y.-C., Patel V. M., Phillips P. J., and Chellappa R., Dictionary-based face and person
recognition
unconstrained
video,
Ieee
Access.
https://doi.org/10.1109/access.2015.2485400, 2-s2.0-84959857666.
(2015)
,
–1798,
Nandipati Sai Akash, Naveen Sai Bommina, Uppu Lokesh, Hussain Syed, Syed Umar, "Optimized
Block Chain-Enabled Security Mechanism for IoT Using Ant Colony Optimization", International
Journal on Recent and Innovation Trends in Computing and Communication, (2023), 11(10),
–1233.
K Sankar, Divya Rohatgi, S Balakrishna Reddy, "COX Regressive Winsorized Correlated
Convolutional Deep Belief Boltzmann Network for Covid-19 Prediction with Big Data", Grenze International Journal of Engineering & Technology (GIJET), Grenze ID: 01.GIJET.9.1.547, ©
Grenze Scientific Society, 2023.
Naveen Sai Bommina , Nandipati Sai Akash, Uppu Lokesh , Dr. Hussain Syed , Dr. Syed Umar,
"Multi-Objective Genetic Algorithms for Secure Routing and Data Privacy in IoT Networks",
International Journal of Communication Networks and Information Security (IJCNIS), (2020),
(3), 632–643.
RS Supriya Khaitan, Divya Rohatgi, Sana Nalband, Tejali Mhatre, Shweta Patil, "Enhancing
Essay Grading Efficiency and Consistency through Two-Layer LSTM Models and Attention
Mechanisms", Journal of Information Systems Engineering and Management 10 (2), 191-202.
Ahmad, Z., Khan, A. S., Aqeel, S., Julaihi, A. A., Tarmizi, S., Annuar, N., & Habeeb, M. S. (2022,
May). S-ADS: spectrogram image-based anomaly detection system for IoT networks. In 2022
Applied Informatics International Conference (AiIC) (pp. 105-110). IEEE.
Naveen Sai Bommina, Nandipati Sai Akash, Uppu Lokesh, Dr. Hussain Syed, Dr. Syed Umar, "A
Hybrid Optimization Framework for Enhancing IoT Security via AI-based Anomaly Detection",
International Journal on Recent and Innovation Trends in Computing and Communication, (2023)
ISSN: 2321-8169 Volume: 11 Issue: 3.
M. Mukhedkar, D. Rohatgi, V.A. Vuyyuru, K.V.S.S. Ramakrishna, Y.A. Baker El-Ebiary, V.A.
Asir Daniel, "Feline wolf net: A hybrid lion-grey wolf optimization deep learning model for
ovarian cancer detection", Int. J. Adv. Comput. Sci. Appl., 14 (9) (2023)
Uppu Lokesh , Naveen Sai Bommina , Nandipati Sai Akash , Dr. Hussain Syed , Dr. Syed Umar.
(2021). Deep Reinforcement Learning with Genetic Algorithm Tuning for Intrusion Detection in
IoT Systems. International Journal of Communication Networks and Information Security
(IJCNIS), 13(3), 582–595. [10] P. Grother and M. Ngan. Face recognition vendor test (FRVT):
Performance of face identification algorithms. In NIST Interagency report 8009, 2014.
D Veerendra, BN Umesh, A Khandare, D Rohatgi, K Tiwari, S Datta, "ECA-MURE algorithm
and CRB analysis for high-precision DOA estimation in coprime sensor arrays", IEEE Sensors
Letters 7 (12), 1-4.
Uppu Lokesh, Naveen Sai Bommina, Nandipati Sai Akash, Dr. Hussain Syed, Dr. Syed Umar,
"Designing Energy-Efficient and Secure IoT Architectures Using Evolutionary Optimization
Algorithms", International Journal of Applied Engineering & Technology, Vol. 4 No.2,
September, 2022.

