Design of Face Recognition Security System on Public Spaces

F. M. Dirgantara, D. P. Wicaksa

Abstract

Implementation of physical security such as recruitment of security officers, installation of CCTV, and restrictions on public access have become commonplace nowadays. Computer systems equipped with archival storage media must be properly maintained, including computer systems containing sensitive information that must be stored in a locked and secure place. This study applies a security system using facial recognition to determine who is authorized over the data in the computer system—using Haar Cascade as a face detector and LBPH as a match between faces that can access and those that are not on the list. On the other hand, if the person is unidentified, preventive measures will be performed. Based on the result, the proposed system using Raspberry Pi 4 is able to identify a face using Haar Cascade algorithm with an accuracy of 68% and average duration process of 0.392s, and able to recognize face using LBPH algorithm with accuracy between 50.74% to 100% and average duration process of 0.548s.

Full Text:

PDF

References

S. K. Choi, C. H. Yang, and J. Kwak, "System Hardening and Security Monitoring for IoT Devices to Mitigate IoT Security Vulnerabilities and Threats," KSII Transactions on Internet and Information Systems (TIIS), vol. 12, no. 2, pp. 906-918, Feb. 2018, doi: 10.3837/TIIS.2018.02.022.

Z. Lv, L. Qiao, J. Li, and H. Song, "Deep-Learning-Enabled Security Issues in the Internet of Things," IEEE Internet of Things Journal, vol. 8, no. 12, pp. 9531-9538, Jun. 2021, doi: 10.1109/JIOT.2020.3007130.

R. H. Sloan and R. Warner, Unauthorized Access: The Crisis in Online Privacy and Security. Taylor & Francis, 2017.

Z. Lv, D. Chen, R. Lou, and H. Song, "Industrial Security Solution for Virtual Reality," IEEE Internet of Things Journal, vol. 8, no. 8, pp. 6273-6281, Apr. 2021, doi: 10.1109/JIOT.2020.3004469.

S. Kumar, S. Swetha, V. T. Kiran, and P. Johri, "IoT based smart home surveillance and automation," 2018 International Conference on Computing, Power and Communication Technologies, GUCON 2018, pp. 786-790, Mar. 2019, doi: 10.1109/GUCON.2018.8674999.

N. A. Hussein and I. al Mansoori, "Smart Door System for Home Security Using Raspberry pi3," 2017 International Conference on Computer and Applications, ICCA 2017, pp. 395-399, Oct. 2017, doi: 10.1109/COMAPP.2017.8079785.

T. Sikandar and K. H. Ghazali, "A Review on Human Motion Detection Techniques for ATM-CCTV Surveillance System," International Journal of Computing, Communication and Instrumentation Engineering, vol. 3, no. 2, May 2016, doi: 10.15242/IJCCIE.IAE0516006.

A. R. Syafeeza et al., "IoT based facial recognition door access control home security system using raspberry pi," International Journal of Power Electronics and Drive System (IJPEDS), vol. 11, no. 1, pp. 417-424, 2020, doi: 10.11591/ijpeds.v11.i1.pp417-424.

M. Mathew and R. S. Divya, "Super secure door lock system for critical zones," in 2017 International Conference on Networks and Advances in Computational Technologies, NetACT 2017, Oct. 2017, pp. 242-245. doi: 10.1109/NETACT.2017.8076773.

B. Ali and A. I. Awad, "Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes," Sensors 2018, Vol. 18, Page 817, vol. 18, no. 3, p. 817, Mar. 2018, doi: 10.3390/S18030817.

F. Salahdine and N. Kaabouch, "Social Engineering Attacks: A Survey," Future Internet 2019, Vol. 11, Page 89, vol. 11, no. 4, p. 89, Apr. 2019, doi: 10.3390/FI11040089.

D. A. R. Wati and D. Abadianto, "Design of face detection and recognition system for smart home security application," in Proceedings - 2017 2nd International Conferences on Information Technology, Information Systems and Electrical Engineering, ICITISEE 2017, Feb. 2018, vol. 2018-January, pp. 342-347. doi: 10.1109/ICITISEE.2017.8285524.

R. Gusain, H. Jain, and S. Pratap, "Enhancing Bank Security System using Face Recognition, Iris Scanner and Palm Vein Technology," Nov. 2018. doi: 10.1109/IOT-SIU.2018.8519850.

T. Zhu and L. Wang, "Feasibility Study of a New Security Verification Process Based on Face Recognition Technology at Airport," 2019, p. 12025. doi: 10.1088/1742-6596/1510/1/012025.

[15] M. M. Rahman Komol, A. Kumer Podder, A. Arafat, and T. Nabeed, "Remote Sensing Global Ranged Door Lock Security System via Mobile Communication," International Journal of Wireless and Microwave Technologies, vol. 9, no. 5, pp. 25-37, Sep. 2019, doi: 10.5815/IJWMT.2019.05.03.

K. Sadiq et al., "Digitalized Smart Mobile Home Automation and Security System via Bluetooth/Wi-Fi Using Android Platform," International Journal of Information and Communication Sciences, vol. 2, no. 6, pp. 93-99, 2017, doi: 10.11648/j.ijics.20170206.11.

Z. Ahmad, T. S. Ong, T. H. Liew, and M. Norhashim, "Security monitoring and information security assurance behaviour among employees: An empirical analysis," Information and Computer Security, vol. 27, no. 2, pp. 165-188, May 2019, doi: 10.1108/ICS-10-2017-0073/FULL/PDF.

Andreas, C. R. Aldawira, H. W. Putra, N. Hanafiah, S. Surjarwo, and A. Wibisurya, "Door Security System for Home Monitoring Based on ESP32," Procedia Computer Science, vol. 157, pp. 673-682, Jan. 2019, doi: 10.1016/J.PROCS.2019.08.218.

B. Vaidya, A. Patel, A. Panchal, R. Mehta, K. Mehta, and P. Vaghasiya, "Smart home automation with a unique door monitoring system for old age people using Python, OpenCV, Android and Raspberry pi," in Proceedings of the 2017 International Conference on Intelligent Computing and Control Systems, ICICCS 2017, Jul. 2017, vol. 2018-January, pp. 82-86. doi: 10.1109/ICCONS.2017.8250582.

J. Upadhyay, D. Deb, and A. Rawat, "Design of Smart Door Closer System with Image Classification over WLAN," Wireless Personal Communications, vol. 111, no. 3, pp. 1941-1953, Apr. 2020, doi: 10.1007/S11277-019-06965-Z/FIGURES/9.

A. Ahmed, J. Guo, F. Ali, F. Deeba, and A. Ahmed, "LBPH based improved face recognition at low resolution," 2018 International Conference on Artificial Intelligence and Big Data, ICAIBD 2018, pp. 144-147, Jun. 2018, doi: 10.1109/ICAIBD.2018.8396183.

F. Deeba, A. Ahmed, H. Memon, F. A. Dharejo, and A. Ghaffar, "LBPH-based enhanced real-time face recognition," International Journal of Advanced Computer Science and Applications, vol. 10, no. 5, pp. 274-280, 2019, doi: 10.14569/IJACSA.2019.0100535.

P. Viola and M. Jones, "Rapid Object Detection Using a Boosted Cascade of Simple Features," 2004. Accessed: Dec. 02, 2021. [Online]. Available: http://www.merl.com

L. Liu et al., "Deep Learning for Generic Object Detection: A Survey," International Journal of Computer Vision, vol. 128, no. 2, pp. 261-318, Feb. 2020, doi: 10.1007/S11263-019-01247-4/TABLES/2.

Refbacks

  • There are currently no refbacks.