Video-Based Human Authentication System for Access Control

Video-Based Human Authentication System for Access Control

Chintan M. Bhatt, Kevin R. Patel, Yashvi Nileshbhai Raythatha, Poojan S. Dharaiya, Chirag Jethva, Karan Mehul Kathiriya, Vidhya Piyushbhai Kothadia, Deep Kothadiya, Vaishali Mewada, Mayuri Jamanadas Popat
Copyright: © 2021 |Pages: 22
DOI: 10.4018/978-1-7998-5101-1.ch009
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The issue of security is paramount in any organisation. Therefore, the authors intend to aid in the security of such organisations by bringing a video based human authentication system for access control which is a type of cyber physical system (CPS). CPS is an integration of computation and physical processes; here the computation is provided by face detection and recognition algorithm and physical process is the input human face. This system aims to provide a platform that allows any authorized person to enter or leave the premise automatically by using face detection and recognition technology. The system also provides the administrator with the access to the logs, wherein he/she would be able to access the details of the people entering or leaving the organisation along with the live video streaming so that there is no sneaking of any unauthorized person with any other authorized person. The administrator can also do registration on behalf of a new person who requires access to the premises for a restricted amount of time only as specified by the administrator.
Chapter Preview
Top

Introduction

There are many methods available around us that grant access after authenticating the person. For example, many of the organizations use an RFID base id-card scanning system or password-based authentication system to grant access, but in these kinds of systems, flaws are always there because as we know ID-cards can be stolen or we can miss-place it. Passwords are not secure every time. So nowadays most popular and secure methods are used for this kind of application such as biometrics identification. Many biometric identification systems are used like eye-retina, fingerprints, voice, face, etc. but while designing the system we must consider many factors as all of these methods have some pros and cons. We must take care of measures like cost, accuracy, reliability of the system, etc. In this chapter, the authors have used a face-based authentication system because nowadays spoofing is something which is a prominent threat associated with a fingerprint-based authentication system. Also, a voice-based authentication system is not that secure as face-based as we are aware that there may be a possibility that the biometric may get confused between voices or anyone can mimic anyone's voice. So, amongst all the biometrics, the face-based authentication system seems more secure. Currently, various methods available are face detection and face recognition. Like face recognition can be classified based on appearance, feature, or a hybrid mixture of both. The authors have implemented face recognition using the DLIB library which uses convolutional neural networks (CNN), a feature-based classification for face recognition. Using Face detection algorithm human faces are detected from the surrounding environment (background). At the time of face detection, various features like eyes, nose, jaw, etc. are identified and encoded. The encodings are stored in a database for further comparisons. When a person is detected, to recognize the person the features are encoded, and the encodings are compared with those stored in the database. If the encodings are nearly the same then that person is said to be authorized and the door is unlocked for him/her else an alert is passed to the security guard whenever an unknown person is detected. The objective of making this kind of system is to protect the organization from an unauthorized person right from the entrance of the premise only. If an un-authorize person tries to break into the building the security guards are alerted by sending the notification through the system and a photo of the person is captured and stored in the database so that even if he/she breaks into the building forcefully than he/she could be traced easily through this system. This system can also manage visitors as well as the interns coming to the organization and require only temporary access to the premise. They are given permission for a specific period and after that, the system will automatically deny his/her request to enter. Though this time can also be extended or reduce as per the administrator's choice as the only administrator have the right to change the validity date. As here system automatically detects the faces from the surrounding, and identify those faces and take the decision whether to grant access or not based on the face recognition results, CPS can be useful in designing this system, as it is used to monitor the behavior of the physical process and take appropriate actuating actions.

Key Terms in this Chapter

Face Recognition: Face recognition is the method that is used to extract features from the human face in form of encodings and compare it with previously stored encodings from the memory and returns the closest match if any, which is used for identifying or verifying the person through his face from a digital image or a video.

AWS Kinesis: Amazon Kinesis is a cloud service provided by Amazon Web Services that provides easy integration and access to live video streams along with fully managed capability using API like HTTP Live Streaming API.

Accuracy: Accuracy is defined as the ratio of the total number of correct predictions to the summation of the total number of correct predictions and the total number of incorrect predictions.

Cyber-Physical System (CPS): Cyber-physical system is a computational system in which physical and software components are deeply intertwined and are monitored and controlled by different algorithms.

Face Detection: Face detection is a technology used for automatically localizing the human face from the given input scene in the form of a video or a digital image.

Complete Chapter List

Search this Book:
Reset