fbpx

Facial Recognition-Based Access Control System

By Orisys Academy on 18th January 2024

Problem statement

Traditional access control systems often rely on manual methods or card-based
systems, which can be prone to security breaches, unauthorized access, and
inconvenience. Improving security and user experience in controlled environments
remains a challenge

Abstract

The Facial Recognition-based Access Control System project aims to enhance security
and user convenience by implementing a biometric access control system. Utilizing
facial recognition technology, the system will allow or deny access based on the unique
facial features of authorized individuals, providing a more secure and seamless entry
process.

Outcome

The outcome of this project is a sophisticated access control system that enhances
security through biometric authentication. The facial recognition technology ensures
accurate identification, reducing the risk of unauthorized access. The system offers a
user-friendly experience, eliminating the need for physical access cards or PINs.
Overall, it contributes to a more robust and efficient access control paradigm in various
environments.

Reference

Face recognition is a technology that uses face image of someone to verify his identity by finding this person in a given photos database. It becomes very practical in access control systems as it does not require any physical interaction for gaining access as traditional ways with keys. Moreover, these systems only require a camera for recognition and are easy to install and use. This is why they are already in use by companies as access control to their offices, in home automation systems, etc.In this paper, different approaches to face recognition are studied. The first step of any face recognition system is face detection and cropping so we analyzed classical Viola-Jones face detection and MultiTask Convolutional Neural Networks (MTCNN) in terms of detection quality and processing time.The final classifier obtained is capable of matching face from the online camera to image from a given database. We also considered decreasing the vulnerability of standalone face recognition by adding a spoof detection method so that the system does not react to every approach to bypass the system like showing a photo of an allowed person shown on a phone’s screen.

  1. K. Zhang, Z. Zhang, Z. Li, and Y. Qiao, “Joint face detection and alignment using multitask cascaded convolutional networks,” IEEE Signal Processing Letters, vol. 23, no. 10, pp. 1499-1503, 2016.

  2. P. Viola and M. Jones, “Rapid object detection using a boosted cascade of simple features,” Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001, pp. I-I, 2001.

  3. Gary B. Huang, Manu Ramesh, Tamara Berg, and Erik Learned-Miller, “Labeled Faces in the Wild: A Database for Studying Face Recognition in Unconstrained Environments,” Amherst: University of Massachusetts, October 2007.

  4. Danai Triantafyllidou and Anastasios Tefas, “A Fast Deep Convolutional Neural Network for Face Detection in Big Visual Data,” pp. 61-70, 2017.

  5. Y. Taigman, M. Yang, M. Ranzato, and L. Wolf, “DeepFace: Closing the Gap to Human-Level Performance in Face Verification,” 2014 IEEE Conference on Computer Vision and Pattern Recognition, pp. 1701-1708, 2014. [Google Scholar]

    https://ieeexplore.ieee.org/document/9263894