Author
Listed:
- Fadhl Mohsen Sahal Mohsen
(Faculty of Engineering, Built Environment and Information Technology, MAHSA University, 42610, Jenjarom, Selangor, Malaysia.)
- Nur Arzilawati Md Yunus
(Faculty of Business and Technology, University of Cyberjaya, 63000 Cyberjaya, Selangor, Malaysia.)
Abstract
Face recognition has recently been a popular study topic as a result of the growing demand for security. Security systems, identity verification, access control, surveillance systems, and social networks are just a few of the applications that can be expanded from facial recognition. However, as passwords and fingerprint scanners are supplanted by improved computer technology and more precise algorithms, facial recognition is becoming increasingly popular. Facial recognition technology is the simplest and most coherent of all the techniques. Face recognition does not necessitate an individual’s active participation. Face recognition systems are theoretically capable of minimizing risk and eventually avoiding future attacks in places where identity identification is necessary, such as airports and border crossings. If there are criminals on the loose, the same justification can be made as with surveillance devices. Surveillance cameras with face recognition capabilities will aid in the identification of these individuals. Alternatively, these surveillance systems can be used to track down the whereabouts of missing persons, although this is contingent on the use of powerful facial recognition algorithms and a fully built facial database. Face detection, facial feature extraction (image normalization), face identification, and results are the major operations to be conducted for face recognition.
Suggested Citation
Fadhl Mohsen Sahal Mohsen & Nur Arzilawati Md Yunus, 2022.
"Artificial Intelligence Face Recognition: Security System,"
Information Management and Computer Science (IMCS), Zibeline International Publishing, vol. 6(1), pages 05-08, December.
Handle:
RePEc:zib:zbimcs:v:6:y:2022:i:1:p:05-08
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:zib:zbimcs:v:6:y:2022:i:1:p:05-08. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Zibeline International Publishing The email address of this maintainer does not seem to be valid anymore. Please ask Zibeline International Publishing to update the entry or send us the correct address
(email available below). General contact details of provider: https://www.theimcs.org/ .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.