Tarek Gaber
Robust thermal face recognition for law enforcement using optimized deep features with new rough sets-based optimizer
Gaber, Tarek; Nicho, Mathew; Ahmed, Esraa; Hamed, Ahmed
Authors
Mathew Nicho
Esraa Ahmed
Ahmed Hamed
Abstract
In the security domain, the growing need for reliable authentication methods highlights the importance of
thermal face recognition for enhancing law enforcement surveillance and safety especially in IoT applications.
Challenges like computational resources and alterations in facial appearance, e.g., plastic surgery could affect
face recognition systems. This study presents a novel, robust thermal face recognition model tailored for
law enforcement, leveraging thermal signatures from facial blood vessels using a new CNN architecture
(Max and Average Pooling- MAP-CNN). This architecture addresses expression, illumination, and surgical
invariance, providing a robust feature set critical for precise recognition in law enforcement and border control.
Additionally, the model employs the NM-PSO algorithm, integrating neighborhood multi-granulation rough set
(NMGRS) with particle swarm optimization (PSO), which efficiently handles both categorical and numerical
data from multi-granulation perspectives, leading to a 57% reduction in feature dimensions while maintaining
high classification accuracy outperforming ten contemporary models on the Charlotte-ThermalFace dataset by
about 10% across key metrics. Rigorous statistical tests confirm NM-PSO’s superiority, and further robustness
testing of the face recognition model against image ambiguity and missing data demonstrated its consistent
performance, enhancing its suitability for security-sensitive environments with 99% classification accuracy.
Citation
Gaber, T., Nicho, M., Ahmed, E., & Hamed, A. (2024). Robust thermal face recognition for law enforcement using optimized deep features with new rough sets-based optimizer. #Journal not on list, 85, Article 103838. https://doi.org/10.1016/j.jisa.2024.103838
Journal Article Type | Article |
---|---|
Acceptance Date | Jul 26, 2024 |
Online Publication Date | Jul 26, 2024 |
Publication Date | 2024-09 |
Deposit Date | Sep 6, 2024 |
Publicly Available Date | Sep 6, 2024 |
Journal | Journal of Information Security and Applications |
Electronic ISSN | 2214-2134 |
Peer Reviewed | Peer Reviewed |
Volume | 85 |
Article Number | 103838 |
DOI | https://doi.org/10.1016/j.jisa.2024.103838 |
Files
Published Version
(1.3 Mb)
PDF
Publisher Licence URL
http://creativecommons.org/licenses/by/4.0/
You might also like
Deep churn prediction method for telecommunication industry
(2023)
Journal Article
Optimized and efficient image-based IoT malware detection method
(2023)
Journal Article
Effects of COVID-19 pandemic on computational intelligence and cybersecurity: survey
(2022)
Journal Article
A Novel CNN pooling layer for breast cancer segmentation and classification from thermograms
(2022)
Journal Article
Downloadable Citations
About USIR
Administrator e-mail: library-research@salford.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search