Best Machine Learning Model For Face Recognition in Home Security Application

  • Istiqomah Telkom University
  • Faqih Alam Telkom University
  • Achmad Rizal Telkom University
Keywords: Face Recognition, Machine Learning, Home Security

Abstract

Particularly since the COVID-19 outbreak, Indonesia has seen an annual surge in criminal prosecutions. To increase home security, many technological advances have been made. Face recognition served as the main form of security for almost all of them. Face detection, face segmentation, and face recognition are the three steps in the face recognition process. To avoid misclassification and increase system dependability, accurate recognition of faces becomes crucial in security systems. The optimization tool Grid Search CV produces using a number of machine learning methods that are proposed. Each machine learning has been created using its best model and has attained accuracy levels of at least 90%. The most effective strategy is SVM, which has 100% accuracy rates. A technique for choosing the best model is an alternative. The computation time will be compared to that of more complex systems before these results are eventually communicated to the real system

Downloads

Download data is not yet available.

References

[1] Rizky Aditya Pramana and Puput Puji Lestari, “The National Police Chief Calls There An Increase In Thousands Of Crime Cases In Indonesia During 2022,” Dec. 31, 2022.
[2] A. Nurhopipah and A. Harjoko, “Motion Detection and Face Recognition for CCTV Surveillance System,” IJCCS (Indonesian Journal of Computing and Cybernetics Systems), vol. 12, no. 2, p. 107, Jul. 2018, doi: 10.22146/ijccs.18198.
[3] M. Mileva and A. M. Burton, “Face search in CCTV surveillance,” Cogn Res Princ Implic, vol. 4, no. 1, Dec. 2019, doi: 10.1186/s41235-019-0193-0.
[4] F. M. Dirgantara and D. P. Wicaksa, “Design of Face Recognition Security System on Public Spaces,” 2022.
[5] L. Nabila, W. Priharti, and Istiqomah, “Design of Home Security System Using Face Recognition with Convolutional Neural Network Method,” in 2022 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT), 2022, pp. 78–83.
[6] N. G. C, A. A. N, and N. C. S, “International Journal of Computer Science and Mobile Computing Enhancing Home Security Using SMS-based Intruder Detection System,” 2015. [Online]. Available: www.ijcsmc.com
[7] A. Y. Basuki and M. Fauzi, “Perancangan Door Lock Face Recognition Dengan Metoda Eigenfaces Menggunakan Opencv2.4.9 Dan Telegram Messenger Berbasis Raspberry Pi,” 2019.
[8] S. Yedulapuram, R. Arabelli, K. Mahender, and C. Sidhardha, “Automatic Door Lock System by Face Recognition,” in IOP Conference Series: Materials Science and Engineering, Dec. 2020, vol. 981, no. 3. doi: 10.1088/1757-899X/981/3/032036.
[9] I. Qureshi, “FACE RECOGNITION TECHNIQUES AND APPROACHES: A SURVEY Swarm Optimization View project A Systematic Review of Finger Vein Recognition Techniques View project,” 2015. [Online]. Available: https://www.researchgate.net/publication/281838833
[10] M. B. Mirza, “Face Recognition A Survey MALICIOUS SOFTWARE DETECTION View project,” BRIS Journal of Adv, vol. 2, no. 5, pp. 8–13, 2015, doi: 10.13140/RG.2.1.5020.9443.
[11] A. Géron, Hands-on Machine Learning with Scikit-Learn, Keras & TensorFlow, vol. 53, no. 9. 2017.
[12] ACM Special Interest Group on Design Automation., Actel Corporation., and Association for Computing Machinery., FPGA’09 : proceedings of the Seventeenth ACM SIGDA International Symposium on Field-Programmable Gate Arrays, Monterey, California, USA, February 22-24, 2009. Association for Computing Machinery, 2009.
[13] D. M. Belete and M. D. Huchaiah, “Grid search in hyperparameter optimization of machine learning models for prediction of HIV/AIDS test results,” International Journal of Computers and Applications, vol. 44, no. 9, pp. 875–886, 2022, doi: 10.1080/1206212X.2021.1974663.
[14] N. Kadek Ayu Wirdiani, P. Hridayami, N. Putu Ayu Widiari, K. Diva Rismawan, P. Bagus Candradinatha, and I. Putu Deva Jayantha, “Face Identification Based on K-Nearest Neighbor,” Scientific Journal of Informatics, vol. 6, no. 2, pp. 2407–7658, 2019, [Online]. Available: http://journal.unnes.ac.id/nju/index.php/sji
[15] M. Furqan, A. Embong, S. Awang, S. W. Purnami, and S. Sembiring, “Proceeding of The 5 th IMT-GT Face Recognition Using Smooth Support Vector Machine Based On Eigenfaces 1,2*,” 2009.
Published
2023-02-23
How to Cite
[1]
Istiqomah, F. Alam, and A. Rizal, “Best Machine Learning Model For Face Recognition in Home Security Application”, jtim, vol. 4, no. 4, pp. 300-307, Feb. 2023.
Section
Articles