Unauthorized Access Detection Using Real-Time Face Recognition
Abstract
References
Bradski, G., & Kaehler, A. (2008). Learning OpenCV: Computer Vision with the OpenCV Library. O’Reilly Media.
Rosebrock, A. (2021). Deep Learning for Computer Vision with Python. PyImageSearch.
OpenCV Documentation. (2024). Open Source Computer Vision Library.
Retrieved from https://docs.opencv.org
Python Software Foundation. (2024). Python Language Reference, ver- sion 3.10. Retrieved from https://www.python.org
Google Developers. (2023). Gmail SMTP Server Configuration. Re- trieved from https://developers.google.com/gmail
Singh, R., & Kaur, J. (2022). “Real-Time Intruder Detection Using Image Processing and IoT.” International Journal of Computer Appli- cations, vol. 184, no. 12, pp. 10–15.
Kumar, S., & Sharma, P. (2021). “Face Recognition-Based Security Sys- tem Using OpenCV.” Journal of Emerging Technologies and Innovative Research, vol. 8, no. 5, pp. 232–238.
Patel, N., & Mehta, A. (2020). “Email-Based Alert System for Unau- thorized Access.” International Journal of Engineering Research & Technology (IJERT), vol. 9, no. 4, pp. 45–49.
F. Schroff, D. Kalenichenko, and J. Philbin, “FaceNet: A unified embedding for face recognition and clustering,” in Proc. IEEE Conf. Comput. Vis. Pattern Recog. (CVPR), 2015, pp. 815–823.
J. Deng, J. Guo, N. Xue, and S. Zafeiriou, “ArcFace: Additive angular margin for deep face recognition,” in Proc. IEEE Conf. Comput. Vis. Pattern Recog. (CVPR), 2019, pp. 4690–4699.
Refbacks
- There are currently no refbacks.