Real-Time Streaming Image Based PP2LFA-CRNN Model for Facial Sentiment Analysis

In modern society, the real-time emotion adaptive driving system for providing safety to drivers and emotion-based services are being researched. However, in the service process have problem of personal information might get leaked. Therefore, a robust personal information protection method is required for face recognition services based on real-time images. In this study, we propose a real-time streaming image based PingPong256 (PP2) algorithm, line-segment feature analysis (LFA), convolutional recurrent neural network (CRNN) model for facial sentiment analysis. The proposed method applied the PP2 algorithm to images for encryption and decryption for the security of the real-time images collected by image devices. For transmitting images to a server, LFA, as a dimensionality reduction algorithm, is used to extract facial information. PP2 encrypts and decrypts an image through a linear feedback shift register with a different length and sets a random value other than 0 so that inferring the initial value of encryption becomes difficult, and then executes the random operations approximately 1,000 times. The LFA analyzes the line segments of an image, assigns a different unique number depending on its type, and cumulatively adds them to generate a Line-Segment map (LS-map) with a size of $16\times16$ . The LS-map is used as an input of the CRNN model designed in this study, and the facial expressions are classified. Performance evaluation compares the accuracy of face recognition by using the proposed method with the loss rate for other models. Performance evaluation renders excellence to the accuracy of face recognition and loss rate comparison.

[1]  Ji-Won Baek,et al.  PrefixSpan Based Pattern Mining Using Time Sliding Weight From Streaming Data , 2020, IEEE Access.

[2]  Hajar Mousannif,et al.  CADS: A Connected Assistant for Driving Safe , 2018 .

[3]  Bing-Fei Wu,et al.  Vision-Based Instant Measurement System for Driver Fatigue Monitoring , 2020, IEEE Access.

[4]  Darong Huang,et al.  Smart city-based e-commerce security technology with improvement of SET network protocol , 2020, Comput. Commun..

[5]  Nadia Nedjah,et al.  Efficient fingerprint matching on smart cards for high security and privacy in smart systems , 2019, Inf. Sci..

[6]  Kyung-Yong Chung,et al.  Prediction Model of User Physical Activity using Data Characteristics-based Long Short-term Memory Recurrent Neural Networks , 2019, KSII Trans. Internet Inf. Syst..

[7]  Mutasem Alsmadi,et al.  Facial recognition under expression variations , 2016, Int. Arab J. Inf. Technol..

[8]  Yuxiang Chen,et al.  IoT-based smart homes: A review of system architecture, software, communications, privacy and security , 2018, Internet Things.

[9]  Stanislav Mamonov,et al.  The impact of information security threat awareness on privacy-protective behaviors , 2018, Comput. Hum. Behav..

[10]  Philippe Bonnet,et al.  Personal Data Management Systems: The security and functionality standpoint , 2019, Inf. Syst..

[11]  Anil K. Jain,et al.  Universal 3D Wearable Fingerprint Targets: Advancing Fingerprint Reader Evaluations , 2017, IEEE Transactions on Information Forensics and Security.

[12]  Raja Muthalagu,et al.  Lane detection technique based on perspective transformation and histogram analysis for self-driving cars , 2020, Comput. Electr. Eng..

[13]  Park,et al.  Detection of Emotion Using Multi-Block Deep Learning in a Self-Management Interview App , 2019, Applied Sciences.

[14]  Tim C. Kietzmann,et al.  Deepfakes: Trick or treat? , 2020, Business Horizons.

[15]  Jorge Cordero,et al.  Recognition of the Driving Style in Vehicle Drivers , 2020, Sensors.

[16]  Xiang Bai,et al.  An End-to-End Trainable Neural Network for Image-Based Sequence Recognition and Its Application to Scene Text Recognition , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[17]  Bhaskar Krishnamachari,et al.  Exploiting IoT technologies for enhancing Health Smart Homes through patient identification and emotion recognition , 2016, Comput. Commun..

[18]  Leonard Barolli,et al.  Fuzzy-based Driver Monitoring System (FDMS): Implementation of two intelligent FDMSs and a testbed for safe driving in VANETs , 2020, Future Gener. Comput. Syst..

[19]  Kyung-Yong Chung,et al.  Deep Learning-based Evolutionary Recommendation Model for Heterogeneous Big Data Integration , 2020, KSII Trans. Internet Inf. Syst..

[20]  Joonki Paik,et al.  Camera Orientation Estimation Using Motion-Based Vanishing Point Detection for Advanced Driver-Assistance Systems , 2020 .

[21]  Khaled Salah,et al.  Combating Deepfake Videos Using Blockchain and Smart Contracts , 2019, IEEE Access.

[22]  Benbunan-FichRaquel,et al.  The impact of information security threat awareness on privacy-protective behaviors , 2018 .

[23]  S. Agaian,et al.  NPCR and UACI Randomness Tests for Image Encryption , 2011 .

[24]  Ali Saman Tosun,et al.  Investigating Security and Privacy of a Cloud-Based Wireless IP Camera: NetCam , 2015, 2015 24th International Conference on Computer Communication and Networks (ICCCN).

[25]  HoonJae Lee,et al.  Proposal of Multi-channel Operation Technique Using PingPong256 , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).

[26]  Liangpei Zhang,et al.  Pre-Trained AlexNet Architecture with Pyramid Pooling and Supervision for High Spatial Resolution Remote Sensing Image Scene Classification , 2017, Remote. Sens..

[27]  Siew Fan Wong,et al.  Impact of employees' demographic characteristics on the awareness and compliance of information security policy in organizations , 2018, Telematics Informatics.

[28]  Kyungyong Chung,et al.  Context Deep Neural Network Model for Predicting Depression Risk Using Multiple Regression , 2020, IEEE Access.

[29]  Rafik Hamza,et al.  A novel pseudo random sequence generator for image-cryptographic applications , 2017, J. Inf. Secur. Appl..

[30]  Junchul Chun,et al.  2D Human Pose Estimation based on Object Detection using RGB-D information , 2018, KSII Trans. Internet Inf. Syst..

[31]  Takeo Kanade,et al.  The Extended Cohn-Kanade Dataset (CK+): A complete dataset for action unit and emotion-specified expression , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition - Workshops.

[32]  Nenghai Yu,et al.  Anonymous authentication scheme for smart home environment with provable security , 2019, Comput. Secur..

[33]  Jun Wang,et al.  Image encryption algorithm based on chaotic system and dynamic S-boxes composed of DNA sequences , 2015, Multimedia Tools and Applications.