Lip Detection and Recognition-A Review1

Saloni Sharma, D. Malathi
{"title":"Lip Detection and Recognition-A Review1","authors":"Saloni Sharma, D. Malathi","doi":"10.1109/ICNWC57852.2023.10127483","DOIUrl":null,"url":null,"abstract":"It’s no secret that security systems rely heavily on image processing because of its versatility. Two-dimensional visuals, intricate algorithms, and instantaneous decision-making are all challenges that must be met by the system. It is possible to optimize the system at one of four stages: preprocessing, feature extraction, Lip detection, and Recognition. Using modern computing hardware and software, we can create a system that is both easy to use and exactly what we need. Unfortunately, as more characteristics are added, the complexity of implementing these algorithms grows. The process is improved through the development of novel approaches, tools, and strategies. Machine learning and AI techniques have recently been applied to image processing applications. Standard methods of authentication, such as passwords and PINs, are becoming increasingly insecure. Physical and biological characteristics that are unique to each individual provide the best level of security. It is vulnerable to guessing and theft in business and public computer networks. Plastic cards, smart cards, and computer token cards all have non-security flaws in the form of forgery, loss, corruption, and inaccessibility. Identifying techniques based on biometrics have several applications in forensics, finance, and other fields. Voluntary action from the past has the drawbacks of being difficult to implement and not adaptable for covert uses, such as in surveillance applications. Lip image audit and verification during biometrics record keeping is prone to human error. Image quality of the lips is more easily obtained than fingerprint images. Only about five percent of the population has imperfect fingerprints and cannot be verified. Reasons include but are not limited to dry skin, diseased skin, elderly skin, wounded skin, calloused finger, oriental skin, bandaged finger, narrow finger, smeared sensor on reader, etc. Varying lighting conditions are widely recognized as one of the most crucial aspects for accurate Lip recognition but also one of its greatest obstacles. Simultaneously, the same person's lip expression can look extremely different depending on the illumination.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Networking and Communications (ICNWC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICNWC57852.2023.10127483","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

It’s no secret that security systems rely heavily on image processing because of its versatility. Two-dimensional visuals, intricate algorithms, and instantaneous decision-making are all challenges that must be met by the system. It is possible to optimize the system at one of four stages: preprocessing, feature extraction, Lip detection, and Recognition. Using modern computing hardware and software, we can create a system that is both easy to use and exactly what we need. Unfortunately, as more characteristics are added, the complexity of implementing these algorithms grows. The process is improved through the development of novel approaches, tools, and strategies. Machine learning and AI techniques have recently been applied to image processing applications. Standard methods of authentication, such as passwords and PINs, are becoming increasingly insecure. Physical and biological characteristics that are unique to each individual provide the best level of security. It is vulnerable to guessing and theft in business and public computer networks. Plastic cards, smart cards, and computer token cards all have non-security flaws in the form of forgery, loss, corruption, and inaccessibility. Identifying techniques based on biometrics have several applications in forensics, finance, and other fields. Voluntary action from the past has the drawbacks of being difficult to implement and not adaptable for covert uses, such as in surveillance applications. Lip image audit and verification during biometrics record keeping is prone to human error. Image quality of the lips is more easily obtained than fingerprint images. Only about five percent of the population has imperfect fingerprints and cannot be verified. Reasons include but are not limited to dry skin, diseased skin, elderly skin, wounded skin, calloused finger, oriental skin, bandaged finger, narrow finger, smeared sensor on reader, etc. Varying lighting conditions are widely recognized as one of the most crucial aspects for accurate Lip recognition but also one of its greatest obstacles. Simultaneously, the same person's lip expression can look extremely different depending on the illumination.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
唇形检测与识别综述
众所周知,由于图像处理的多功能性,安全系统严重依赖于它。二维视觉、复杂的算法和即时决策都是系统必须面对的挑战。有可能在四个阶段之一优化系统:预处理,特征提取,唇检测和识别。使用现代计算机硬件和软件,我们可以创建一个既易于使用又完全符合我们需要的系统。不幸的是,随着特征的增加,实现这些算法的复杂性也在增加。该过程通过开发新的方法、工具和策略得到改进。机器学习和人工智能技术最近被应用于图像处理应用。标准的身份验证方法,如密码和pin,正变得越来越不安全。每个人独特的生理和生物特征提供了最佳的安全级别。在商业和公共计算机网络中,它很容易被猜测和窃取。塑料卡、智能卡和计算机令牌卡都存在伪造、丢失、损坏和不可访问等非安全缺陷。基于生物识别技术的识别技术在法医学、金融和其他领域有很多应用。过去的自愿行动具有难以实施和不适合隐蔽用途的缺点,例如在监视应用中。在生物特征记录保存过程中,唇形图像审计和验证容易出现人为错误。唇的图像质量比指纹图像更容易获得。只有大约5%的人指纹不完整,无法核实。原因包括但不限于皮肤干燥、皮肤病变、老年皮肤、皮肤受伤、手指老茧、东方皮肤、手指包扎、手指狭窄、读取器上的传感器涂抹等。不同的光照条件被广泛认为是实现准确唇形识别的最关键因素之一,但也是最大的障碍之一。同时,同一个人的嘴唇表情可能会因光照的不同而大相径庭。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
An Approach For Short Term Electricity Load Forecasting Real-time regional road sign detection and identification using Raspberry Pi ICNWC 2023 Cover Page A novel hybrid automatic intrusion detection system using machine learning technique for anomalous detection based on traffic prediction Towards Enhanced Deep CNN For Early And Precise Skin Cancer Diagnosis
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1