Sumeet Balwade, Deepak Mali, Sagar V. Mahajan, Birudev Yele, Nilesh P. Sable
{"title":"Real Time Identity Identification using Deep Learning","authors":"Sumeet Balwade, Deepak Mali, Sagar V. Mahajan, Birudev Yele, Nilesh P. Sable","doi":"10.1109/CONIT55038.2022.9848262","DOIUrl":null,"url":null,"abstract":"When it comes to recognizing someone, the most significant feature is their face. Face recognition aids in verifying any person's identification by using his particular traits because it acts as an individual identity for everyone. The whole technique for authenticating any face data is separated into two stages. Face Recognition system is used in the first step. is done rapidly unless in circumstances when the item is put relatively far away, and then the second phase begins in which the face is identified as a person. The entire process is then repeated, assisting in the development of a face recognition model, which is regarded to be one of the most meticulously planned biometric technologies. The photographs of people's faces are collected by people, and also the images are processed immediately by the identification equipment. As a result, the paper offers pertinent facial recognition research from a variety of perspectives. The study outlines the developmental stages and the technology associated with facial recognition. We offer face detection and recognition analysis research for real-world settings, as well as universal Face recognition databases and assessment criteria We take a look at face recognition in advance. Face recognition has emerged as a viable future growth path with a variety of applications.","PeriodicalId":270445,"journal":{"name":"2022 2nd International Conference on Intelligent Technologies (CONIT)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 2nd International Conference on Intelligent Technologies (CONIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CONIT55038.2022.9848262","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
When it comes to recognizing someone, the most significant feature is their face. Face recognition aids in verifying any person's identification by using his particular traits because it acts as an individual identity for everyone. The whole technique for authenticating any face data is separated into two stages. Face Recognition system is used in the first step. is done rapidly unless in circumstances when the item is put relatively far away, and then the second phase begins in which the face is identified as a person. The entire process is then repeated, assisting in the development of a face recognition model, which is regarded to be one of the most meticulously planned biometric technologies. The photographs of people's faces are collected by people, and also the images are processed immediately by the identification equipment. As a result, the paper offers pertinent facial recognition research from a variety of perspectives. The study outlines the developmental stages and the technology associated with facial recognition. We offer face detection and recognition analysis research for real-world settings, as well as universal Face recognition databases and assessment criteria We take a look at face recognition in advance. Face recognition has emerged as a viable future growth path with a variety of applications.