Embedded System for Access Control Based on Facial Biometry and RFID

被引:0
作者
Souza, Cristian Henrique M. [1 ]
Junior, Ivanilson Franca V. [1 ]
Alves, Robinson Luis S. [1 ]
Costa, Arthur Henrique C. [1 ]
Lima Junior, Melquiades P. [1 ]
机构
[1] Fed Inst Educ Sci & Technol IFRN, Natal, RN, Brazil
来源
PROCEEDINGS OF THE FUTURE TECHNOLOGIES CONFERENCE (FTC) 2018, VOL 2 | 2019年 / 881卷
关键词
Facial recognition; Access control; Deep learning;
D O I
10.1007/978-3-030-02683-7_62
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the constant technological evolution, every day human beings look for automated ways to guarantee the safety of certain places. Inevitably, the use of face recognition becomes an important mechanism for access control, since each person has practically unique face features. However, it is also necessary to develop tools together for a validation of these faces, in order to ensure that the present user is authentic, not just an image or video being transmitted. In addition, we note the high cost of such products in the market. Therefore, the proposal of this work is to develop an embedded system for access control with low cost and that meets all the requirements for a correct identification and validation of faces.
引用
收藏
页码:868 / 883
页数:16
相关论文
共 50 条
[41]   Trust-Based Access Control for Collaborative System [J].
Liu, Yichun .
2008 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL 1, PROCEEDINGS, 2008, :444-448
[42]   A Dynamic Access Control System based on Situations of Users [J].
Hasegawa, Hirokazu ;
Takakura, Hiroki .
ICISSP: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2021, :653-660
[43]   A cryptographic credential based access control mechanism for industrial control system [J].
Shi, Sha ;
Wen, Qiaoyan .
International Journal of Advancements in Computing Technology, 2012, 4 (07) :152-158
[44]   Analysis of state transition diagrams for RFID-based two-way access control [J].
Dong, Yan-Shi ;
Zuo, Bing-Ran ;
Mackenzie, Patricia D. ;
Salvo, Joseph J. .
2006 IEEE CONFERENCE ON CYBERNETICS AND INTELLIGENT SYSTEMS, VOLS 1 AND 2, 2006, :594-+
[45]   Embedded coal mine monitoring and control system based on Ethernet [J].
Li, DS ;
Kang, J .
ISTM/2005: 6TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-9, CONFERENCE PROCEEDINGS, 2005, :3921-3924
[46]   An Attribute-Based Access Control Model in RFID Systems Based on Blockchain Decentralized Applications for Healthcare Environments [J].
Figueroa, Santiago ;
Anorga, Javier ;
Arrizabalaga, Saioa .
COMPUTERS, 2019, 8 (03)
[47]   RFID-PIN Access Control System: Cost-Effective Security for Smart Home Applications [J].
Rivera, Eric ;
Statzer, Zoe ;
El-Razouk, Hayssam ;
Mouffak, Zoulikha .
2024 IEEE 5TH ANNUAL WORLD AI IOT CONGRESS, AIIOT 2024, 2024, :0292-0299
[48]   RF-Access: Barrier-Free Access Control Systems with UHF RFID [J].
Wang, Xuan ;
Wang, Xia ;
Yan, Yingli ;
Liu, Jia ;
Zhao, Zhihong .
APPLIED SCIENCES-BASEL, 2022, 12 (22)
[49]   Design and implementation of a vehicular access control using RFID. [J].
Almanza-Ojeda, D. L. ;
Hernandez-Gutierrez, A. ;
Ibarra-Manzano, M. A. .
MEP 2006: PROCEEDINGS OF MULTICONFERENCE ON ELECTRONICS AND PHOTONICS, 2006, :223-+
[50]   Voice Authentication Embedded Solution for Secured Access Control [J].
Galka, Jakub ;
Masior, Mariusz ;
Salasa, Michal .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2014, 60 (04) :653-661