Journal of Intelligent Systems and Internet of Things

Journal DOI

https://doi.org/10.54216/JISIoT

Submit Your Paper

2690-6791ISSN (Online) 2769-786XISSN (Print)

Volume 13 , Issue 2 , PP: 231-244, 2024 | Cite this article as | XML | Html | PDF | Full Length Article

Security Implications of IoT-Enabled Mobile Net Facial Recognition System

Sumit Thakur 1 * , Nikhat Raza khan 2

  • 1 Research Scholar, Dept. Of Computer Science and Engineering, IES COLLEGE OF TECHNOLOGY, BHOPAL, India - (sumit.thk@gmail.com)
  • 2 Professor, Dept. Of Computer Science and Engineering, IES COLLEGE OF TECHNOLOGY, BHOPAL, India - (nikhat.raza@gmail.com)
  • Doi: https://doi.org/10.54216/JISIoT.130219

    Received: October 27, 2023 Revised: March 11, 2024 Accepted: July 7, 2024
    Abstract

    Face recognition technology is gaining popularity for security, access management, and user identification. A novel facial recognition method employing cutting-edge deep learning algorithms and attention processes reduces false positives in this study. This technique was designed to approach facial recognition differently. We demonstrate statistically substantial recognition gains over current approaches through extensive research and experimentation. The recommended solution uses an attention device and a complex feature extraction module. The pieces work together to highlight distinctive characteristics and facial identifiers. To optimize performance and generalization across datasets, data addition and hyper parameter adjustment are used to fine-tune the model. We do this for maximum benefit. Studies on the issue may help us understand the multiple reasons that make ablation so successful. We also discuss facial recognition technology's moral difficulties, including fairness and user privacy. We also emphasize cautious distribution. Our findings expand facial recognition technology knowledge and pave the way for future studies. This study demonstrates that better Mobile Net models and Internet of Things technologies increase the accuracy of mobile facial recognition. The project overcomes the challenge of providing powerful AI tools in resource-constrained situations by utilizing IoT infrastructures and effective, lightweight Mobile Net architectures. Extensive testing demonstrates that the technique increases identification rates and outperforms existing models, showing its suitability for real-time operations. The Internet of Things enables data mobility and cross-device model usage. This illustrates that the IoT ecosystem can enable effective and scalable security solutions.

    Keywords :

    Attention Mechanism , Data Augmentation , Deep Learning, Ethical Implications , Facial Recognition , Hyper parameter Optimization , Robustness , Security , User Privacy

    References

    [1]       Z., A. Almajed, R. "Improving Network Security using Tunicate Swarm Algorithm with Stacked Deep Learning Model on IoT Environment," Journal of International Journal of Wireless and Ad Hoc Communication, vol. 8, no. 2, pp. 67-80, 2024. DOI: https://doi.org/10.54216/IJWAC.080207

    [2]       Anita Venugopal, Mukesh Madanan, Thangadurai kadarkarai, Analysis of Fusion of Machine Learning Tools in Education, Fusion: Practice and Applications, Vol. 12, No. 2, (2023): 88-97 (Doi   :  https://doi.org/10.54216/FPA.120207).

    [3]       A. Sariga , J. Uthayakumar, Type 2 Fuzzy Logic based Unequal Clustering algorithm for multi-hop wireless sensor networks, International Journal of Wireless and Ad Hoc Communication, Vol. 1 , No. 1 , (2020) : 33-46 (Doi   :  https://doi.org/10.54216/IJWAC.010102).

    [4]       Noushini Nikeetha P. , Pavithra D. , Sivakarthiga K. , Karthika S. , Yashitha R. , Kirubasri G.V., A Survey on IoT based Wearable Sensor for Covid-19 Pandemic, International Journal of Wireless and Ad Hoc Communication, Vol. 2 , No. 2 , (2021) : 77-87 (Doi   :  https://doi.org/10.54216/IJWAC.020203)

    [5]       R. Kashyap, "Stochastic Dilated Residual Ghost Model for Breast Cancer Detection," J Digit Imaging, vol. 36, pp. 562–573, 2023. [Online]. Available: https://doi.org/10.1007/s10278-022-00739-z

    [6]       Ashok Kumar M , Abirami A , Sindhu P , Ashok Kumar V D , Rani V, Modern Medical Innovation on the Preferred Information about the Medicine using AI Technique, Journal of Cognitive Human-Computer Interaction, Vol. 1 , No. 1 , (2021) : 8-17 (Doi   :  https://doi.org/10.54216/JCHCI.010102)

    [7]       Praveen, G. Pandian, D. F., C. "IntelliCare: Integrating IoT and Machine Learning for Remote Patient Monitoring in Healthcare: A Comprehensive Framework," Journal of Journal of Cognitive Human-Computer Interaction, vol. 7, no. 2, pp. 50-59, 2024. DOI: https://doi.org/10.54216/JCHCI.070205

    [8]       W. Sun, H. Zhao, and Z. Jin, “An efficient unconstrained facial expression recognition algorithm based on stack binarized auto-encoders and binarized neural networks,” Neurocomputing, vol. 267, pp. 385–395, 2017.

    [9]       M. A. Mustafa, W. A. Taha, O. M. Shakir, and M. A. Meri, "Study of some biochemical indicators levels in the people infected by Toxoplasma gondii," in AIP Conf. Proc., vol. 5.0182763, 2023. https://doi.org/10.1063/5.0182763.

    [10]    M. A. Mustafa, S. Govindarajan, S. Kiyosov, N. D. Duong, M. N. Raju, and K. K. Gola, "RETRACTED: An optimization-based feature extraction and machine learning techniques for named entity identification," Optik, vol. 170348, 2023. https://doi.org/10.1016/j.ijleo.2022.170348.

    [11]    A. H. Yaseen, A. T. Khalaf, and M. A. Mustafa, "Lung cancer data analysis for finding gene expression," Afr. J. Biol. Sci., vol. 5, no. 3, pp. 119–130, 2023.

    [12]    J. G. Kotwal, R. Kashyap, and P. M. Shafi, "Artificial Driving based EfficientNet for Automatic Plant Leaf Disease Classification," Multimed Tools Appl, 2023. [Online]. Available: https://doi.org/10.1007/s11042-023-16882-w

    [13]    Mirzaliev, S. Sulaym, S. "Optimal Deep Learning-Based Image Classification for IoT-Enabled UAVs in Remote Sensing Applications," Journal of International Journal of Advances in Applied Computational Intelligence, vol. 6, no. 1, pp. 1-12, 2024. DOI: https://doi.org/10.54216/IJAACI.060101

    [14]    T. Sharma, R. Nair, and S. Gomathi, "Breast cancer image classification using transfer learning and convolutional neural network," International Journal of Modern Research, vol. 2, no. 1, pp. 8-16, 2022.

    [15]    F. An and Z. Liu, “Facial expression recognition algorithm based on parameter adaptive initialization of CNN and LSTM,” The Visual Computer, vol. 36, no. 3, p. 483, 2019.

    [16]    G. C. Liu, Z. B. Yu, and Q. S. Liu, “Deeper cascaded peak-piloted network for weak expression recognition,” The Visual Computer, vol. 34, no. 12, pp. 1691–1699, 2018.

    [17]    Rajit Nair, Unraveling the Decision-making Process Interpretable Deep Learning IDS for Transportation Network Security, Journal of Journal of Cybersecurity and Information Management, Vol. 12 , No. 2 , (2023) : 69-82 (Doi   :  https://doi.org/10.54216/JCIM.120205).

    [18]    D. Liang, H. Liang, Z. Yu, and Y. Zhang, “Deep convolutional BiLSTM fusion network for facial expression recognition,” The Visual Computer, vol. 36, no. 3, pp. 499–508, 2020.

    [19]    R. Nair, S. Vishwakarma, M. Soni, T. Patel, and S. Joshi, "Detection of COVID-19 cases through X-ray images using hybrid deep neural network," World Journal of Engineering, vol. 19, no. 1, pp. 33-39, 2022.

    [20]    P. Kavitha , R. Subha Shini , R. Priya, An Implementation Of Statistical Feature Algorithms For The Detection Of Brain Tumor, Journal of Cognitive Human-Computer Interaction, Vol. 1 , No. 2 , (2021) : 57 - 62 (Doi   :  DOI: https://doi.org/10.54216/JCHCI.010202)

    [21]    Alber S. Aziz,Hoda K. Mohamed,Ahmed Abdelhafeez, Unveiling the Power of Convolutional Networks: Applied Computational Intelligence for Arrhythmia Detection from ECG Signals, Journal of International Journal of Advances in Applied Computational Intelligence, Vol. 1 , No. 2 , (2022) : 63-72 (Doi   :  https://doi.org/10.54216/IJAACI.010205).

    [22]    X. Ban, Y. Li, G. Yang, and L. Yang, “Multiple features fusion for facial expression recognition based on ELM,” International Journal of Embedded Systems, vol. 10, no. 3, pp. 181–187, 2018.

    [23]    K. Venkatesh,S. Pasupathy,S. P. Raja, A Learning Model for Acute Myeloid Leukemia Prediction Using Dense Polynomial Dimensionality-Based Predictor, Fusion: Practice and Applications, Vol. 12 , No. 2 , (2023) : 145-158 (Doi   :  https://doi.org/10.54216/FPA.120212)

    Cite This Article As :
    Thakur, Sumit. , Raza, Nikhat. Security Implications of IoT-Enabled Mobile Net Facial Recognition System. Journal of Intelligent Systems and Internet of Things, vol. , no. , 2024, pp. 231-244. DOI: https://doi.org/10.54216/JISIoT.130219
    Thakur, S. Raza, N. (2024). Security Implications of IoT-Enabled Mobile Net Facial Recognition System. Journal of Intelligent Systems and Internet of Things, (), 231-244. DOI: https://doi.org/10.54216/JISIoT.130219
    Thakur, Sumit. Raza, Nikhat. Security Implications of IoT-Enabled Mobile Net Facial Recognition System. Journal of Intelligent Systems and Internet of Things , no. (2024): 231-244. DOI: https://doi.org/10.54216/JISIoT.130219
    Thakur, S. , Raza, N. (2024) . Security Implications of IoT-Enabled Mobile Net Facial Recognition System. Journal of Intelligent Systems and Internet of Things , () , 231-244 . DOI: https://doi.org/10.54216/JISIoT.130219
    Thakur S. , Raza N. [2024]. Security Implications of IoT-Enabled Mobile Net Facial Recognition System. Journal of Intelligent Systems and Internet of Things. (): 231-244. DOI: https://doi.org/10.54216/JISIoT.130219
    Thakur, S. Raza, N. "Security Implications of IoT-Enabled Mobile Net Facial Recognition System," Journal of Intelligent Systems and Internet of Things, vol. , no. , pp. 231-244, 2024. DOI: https://doi.org/10.54216/JISIoT.130219