Analysis of Real-Time Face-Verification Methods for Surveillance Applications

Research output: Contribution to journalArticlepeer-review

1 Scopus citations

Abstract

In the last decade, face-recognition and -verification methods based on deep learning have increasingly used deeper and more complex architectures to obtain state-of-the-art (SOTA) accuracy. Hence, these architectures are limited to powerful devices that can handle heavy computational resources. Conversely, lightweight and efficient methods have recently been proposed to achieve real-time performance on limited devices and embedded systems. However, real-time face-verification methods struggle with problems usually solved by their heavy counterparts—for example, illumination changes, occlusions, face rotation, and distance to the subject. These challenges are strongly related to surveillance applications that deal with low-resolution face images under unconstrained conditions. Therefore, this paper compares three SOTA real-time face-verification methods for coping with specific problems in surveillance applications. To this end, we created an evaluation subset from two available datasets consisting of 3000 face images presenting face rotation and low-resolution problems. We defined five groups of face rotation with five levels of resolutions that can appear in common surveillance scenarios. With our evaluation subset, we methodically evaluated the face-verification accuracy of MobileFaceNet, EfficientNet-B0, and GhostNet. Furthermore, we also evaluated them with conventional datasets, such as Cross-Pose LFW and QMUL-SurvFace. When examining the experimental results of the three mentioned datasets, we found that EfficientNet-B0 could deal with both surveillance problems, but MobileFaceNet was better at handling extreme face rotation over 80 degrees.

Original languageEnglish
Article number21
JournalJournal of Imaging
Volume9
Issue number2
DOIs
StatePublished - Feb 2023

Keywords

  • EfficientNet
  • GhostNet
  • MobileFaceNet
  • face verification
  • lightweight face recognition
  • video surveillance

Fingerprint

Dive into the research topics of 'Analysis of Real-Time Face-Verification Methods for Surveillance Applications'. Together they form a unique fingerprint.

Cite this