Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3197768.3197781acmotherconferencesArticle/Chapter ViewAbstractPublication PagespetraConference Proceedingsconference-collections
research-article

PISS-IoT: Person Identification and Spotting System in an Internet-of-Things Way

Published: 26 June 2018 Publication History

Abstract

Missing persons has become one of the most serious issues in many countries around the world. It has been a fact to worry not only for those persons who lost their relatives but also for the law and order officials to search them and find them. So with this kind of problem statement in mind we have created a person identification and spotting system using the Internet-of-Things concept. Our system uses android mobile phone cameras and a server system coded with LBPH Facial recognition along with email sending functions. All these components are interconnected through Amazon AWS cloud in an Internet-of-Things fashion. This is a unique, novel, scalable and better approach, when compared to the previous works because instead of focusing on face detection and recognition in just a single device, our system involves interconnection of face detecting cameras with the face recognition and verification system which is running elsewhere. Also, our system includes the automatic email sending component interconnected with the identification system through cloud which has not been performed in any of the previous works. Experiments were conducted in real-time with real subjects at various locations around the university campus and the system worked very well where the average timings measured from the detection of face till notifying the user with the spotted location was within the range of 30 seconds to 1 minute and 40 seconds with an average value of accuracy ranging from 92 to 96 percent.

References

[1]
C. Alippi, R. Ambrosini, V. Longoni, D. Cogliati, and M. Roveri. A lightweight and energy-efficient internet-of-birds tracking system. In Pervasive Computing and Communications (PerCom), 2017 IEEE International Conference on, pages 160--169. IEEE, 2017.
[2]
W. Jiang, F. Li, D. Lin, and E. Bertino. No one can track you: Randomized authentication in vehicular ad-hoc networks. In Pervasive Computing and Communications (PerCom), 2017 IEEE International Conference on, pages 197--206. IEEE, 2017.
[3]
J. Kim, S.-S. Yun, B.-N. Kang, D. Kim, and J. Choi. Reliable multi-person identification using dcnn-based face recognition algorithm and scale-ratio method. In Ubiquitous Robots and Ambient Intelligence (URAI), 2017 14th International Conference on, pages 97--101. IEEE, 2017.
[4]
S. Kokila and B. Yogameena. Face recognition based person specific identification for video surveillance applications. In Proceedings of the Third International Symposium on Women in Computing and Informatics, pages 143--148. ACM, 2015.
[5]
R. Kushwaha, N. Nain, and S. K. Gupta. Person identification on the basis of footprint geometry. In Signal-Image Technology & Internet-Based Systems (SITIS), 2016 12th International Conference on, pages 164--171. IEEE, 2016.
[6]
R. Luhadiya and A. Khedkar. Iris detection for person identification using multiclass svm. In Advances in Electronics, Communication and Computer Technology (ICAECCT), 2016 IEEE International Conference on, pages 387--392. IEEE, 2016.
[7]
M. A. Mahler, Q. Li, and A. Li. Securehouse: A home security system based on smartphone sensors. In Pervasive Computing and Communications (PerCom), 2017 IEEE International Conference on, pages 11--20. IEEE, 2017.
[8]
E. Martinson, W. Lawson, and G. Trafton. Identifying people with soft-biometrics at fleet week. In Proceedings of the 8th A CM/IEEE international conference on Human-robot interaction, pages 49--56. IEEE Press, 2013.
[9]
M. PietikÃd'inen. Local Binary Patterns. Scholarpedia, 5(3):9775, 2010. revision #183551.
[10]
C. V. R. Reddy, K. V. K. Kishore, U. S. Reddy, and M. Suneetha. Person identification system using feature level fusion of multi-biometrics. In 2016 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), pages 1--6, Dec 2016.
[11]
D. G. Reina, S. L. Toral, F. Barrero, N. Bessis, and E. Asimakopoulou. The Role of Ad Hoc Networks in the Internet of Things: A Case Scenario for Smart Environments, pages 89--113. Springer Berlin Heidelberg, Berlin, Heidelberg, 2013.
[12]
L. Rothkrantz. Person identification by smart cameras. In Smart City Symposium Prague (SCSP), 2017, pages 1--6. IEEE, 2017.
[13]
T. Teixeira, D. Jung, and A. Savvides. Tasking networked cctv cameras and mobile phones to identify and localize multiple people. In Proceedings of the 12th ACM international conference on Ubiquitous computing, pages 213--222. ACM, 2010.
[14]
S. Verma and C. Singh. Efficient person identification from periocular region using intelligent fusion of local and global features. In 2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pages 1--5. IEEE, 2017.
[15]
Z. Xiong, Y. Chen, R. Wang, and T. S. Huang. Improved information maximization based face and facial feature detection from real-time video and application in a multi-modal person identification system. In Multimodal Interfaces, 2002. Proceedings. Fourth IEEE International Conference on, pages 511--516. IEEE, 2002.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
PETRA '18: Proceedings of the 11th PErvasive Technologies Related to Assistive Environments Conference
June 2018
591 pages
ISBN:9781450363907
DOI:10.1145/3197768
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • NSF: National Science Foundation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 June 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Android Programming
  2. Cloud Computing
  3. Face Recognition
  4. Internet-of-Things
  5. Mobile Computing

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

PETRA '18

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 126
    Total Downloads
  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Oct 2024

Other Metrics

Citations

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media