A Cross-age Face Recognition Approach Using Fog Computing Architecture for User Authentication on Mobile Devices

Wen-Hui Lin, Ping Wang*, Bao-Hua Wu, Kuo-Ming Chao, Chi-Chun Lo

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

Mobile commerce security needs quality services where mobile devices respond in real-time and traditional cloud computing approach uses a centralized architecture does not support these systems with such time dependency well. Thus, this study proposes a cross-age face-recognition model with MobileNets to determine the identity of a user in the situation of aging appearance change on a fog computing architecture. Especially, this study uses a face-recognition technique based on a distributed concept. In this concept, MobileNet-based face recognition system effectively performs cross-age face recognition for identity authentication with the enhanced facial features of the users locally. Overall, the MobileNet model reaches acceptable prediction accuracy with lower latency in face recognition process compared with that of the existing CNNs schemes.
Original languageEnglish
Title of host publication2018 IEEE 15TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE 2018)
PublisherIEEE COMPUTER SOC
Pages86-93
ISBN (Print)978-1-5386-7992-0
DOIs
StatePublished - 2018
Event IEEE 15th International Conference on E-Business Engineering (ICEBE) - Xian, China
Duration: 12 Oct 201814 Oct 2018

Publication series

Name2018 Ieee 15th International Conference On E-Business Engineering (Icebe 2018)
PublisherIEEE COMPUTER SOC

Conference

Conference IEEE 15th International Conference on E-Business Engineering (ICEBE)
CountryChina
CityXian,
Period12/10/1814/10/18

Keywords

  • cross-age face recognition; user authentication; fog computing architecture; MobileNets; convolutional neuron networks

Fingerprint Dive into the research topics of 'A Cross-age Face Recognition Approach Using Fog Computing Architecture for User Authentication on Mobile Devices'. Together they form a unique fingerprint.

Cite this