Access Control System based on Voice and Facial Recognition Using Artificial Intelligence
Abstract
Keywords
Full Text:
PDFReferences
R. Blanco-Gonzalo, C. Lunerti, R. Sanchez-Reillo, and R. M. Guest, “Biometrics: Accessibility challenge or opportunity?,†PLoS One, vol. 13, no. 3, p. e0194111, Mar. 2018, doi: 10.1371/journal.pone.0194111.
E. Bertino, M. Kantarcioglu, C. G. Akcora, S. Samtani, S. Mittal, and M. Gupta, “AI for Security and Security for AI,†in CODASPY 2021 - Proceedings of the 11th ACM Conference on Data and Application Security and Privacy, Apr. 2021, pp. 333–334, doi: 10.1145/3422337.3450357.
A. De Keyser, Y. Bart, X. Gu, S. Q. Liu, S. G. Robinson, and P. K. Kannan, “Opportunities and challenges of using biometrics for business: Developing a research agenda,†J. Bus. Res., vol. 136, pp. 52–62, Nov. 2021, doi: 10.1016/j.jbusres.2021.07.028.
R. Blanco-Gonzalo et al., “Biometric Systems Interaction Assessment: The State of the Art,†IEEE Trans. Human-Machine Syst., vol. 49, no. 5, pp. 397–410, Oct. 2019, doi: 10.1109/THMS.2019.2913672.
G. C. Yang and H. Oh, “Implementation of a personal authentication system T-time,†in Proceedings - 2019 IEEE 12th Conference on Service-Oriented Computing and Applications, SOCA 2019, Nov. 2019, pp. 79–81, doi: 10.1109/SOCA.2019.00019.
A. Barros et al., “Data improvement model based on ecg biometric for user authentication and identification,†Sensors (Switzerland), vol. 20, no. 10, p. 2920, May 2020, doi: 10.3390/s20102920.
M. Gautier and D. Jaafar, “Legal issues surrounding data protection,†Soins, vol. 64, no. 838, pp. 36–39, Sep. 2019, doi: 10.1016/j.soin.2019.06.007.
R. De La Rocha Ladeira and R. Rodrigues Obelheiro, “Automatic challenge generation for teaching computer security,†in Proceedings - 2018 44th Latin American Computing Conference, CLEI 2018, Oct. 2018, pp. 774–783, doi: 10.1109/CLEI.2018.00098.
A. Das, S. K. Mohapatra, and L. P. Mishra, “Biometric detection using stroke dynamics,†in Lecture Notes in Networks and Systems, vol. 109, Springer, Singapore, 2020, pp. 458–466.
P. Kumar, R. Saini, B. Kaur, P. P. Roy, and E. Scheme, “Fusion of neuro-signals and dynamic signatures for person authentication,†Sensors (Switzerland), vol. 19, no. 21, Nov. 2019, doi: 10.3390/s19214641.
P. Panasiuk, M. Dąbrowski, and K. Saeed, “Keystroke dynamics and face image fusion as a method of identification accuracy improvement,†in Advances in Intelligent Systems and Computing, 2017, vol. 567, pp. 187–196, doi: 10.1007/978-981-10-3409-1_13.
V. Sujitha and D. Chitra, “A Novel Technique for Multi Biometric Cryptosystem Using Fuzzy Vault,†J. Med. Syst., vol. 43, no. 5, pp. 1–9, Mar. 2019, doi: 10.1007/s10916-019-1220-x.
L. Alzubaidi et al., “Review of deep learning: concepts, CNN architectures, challenges, applications, future directions,†J. Big Data, vol. 8, no. 1, pp. 1–74, Mar. 2021, doi: 10.1186/s40537-021-00444-8.
Y. Hu, M. Lu, C. Xie, and X. Lu, “FIN-GAN: Face illumination normalization via retinex-based self-supervised learning and conditional generative adversarial network,†Neurocomputing, vol. 456, pp. 109–125, Oct. 2021, doi: 10.1016/j.neucom.2021.05.063.
J. Zeng, X. Qiu, and S. Shi, “Image processing effects on the deep face recognition system,†Math. Biosci. Eng., vol. 18, no. 2, pp. 1187–1200, 2021, doi: 10.3934/MBE.2021064.
C. S. Hsiao, C. P. Fan, and Y. T. Hwang, “Iris location and recognition by deep-learning networks-based design for biometric authorization,†in LifeTech 2021 - 2021 IEEE 3rd Global Conference on Life Sciences and Technologies, Mar. 2021, pp. 144–145, doi: 10.1109/LifeTech52111.2021.9391787.
A. C. Weaver, “Biometric authentication,†Computer (Long. Beach. Calif)., vol. 39, no. 2, pp. 96–97, Feb. 2006, doi: 10.1109/MC.2006.47.
K. M. Sudar, P. Deepalakshmi, K. Ponmozhi, and P. Nagaraj, “Analysis of Security Threats and Countermeasures for various Biometric Techniques,†in 2019 International Conference on Clean Energy and Energy Efficient Electronics Circuit for Sustainable Development, INCCES 2019, Dec. 2019, doi: 10.1109/INCCES47820.2019.9167745.
K. Sundararajan and D. L. Woodard, “Deep learning for biometrics: A survey,†ACM Comput. Surv., vol. 51, no. 3, May 2018, doi: 10.1145/3190618.
H. Mehraj and A. H. Mir, “A Survey of Biometric Recognition Using Deep Learning,†EAI Endorsed Trans. Energy Web, vol. 8, no. 33, pp. 1–16, 2021, doi: 10.4108/eai.27-10-2020.166775.
T. Gwyn, K. Roy, and M. Atay, “Face recognition using popular deep net architectures: A brief comparative study,†Futur. Internet, vol. 13, no. 7, p. 164, Jun. 2021, doi: 10.3390/fi13070164.
A. N. Razzaq, R. Ghazali, and N. K. El Abbadi, “Face Recognition – Extensive Survey and Recommendations,†Jul. 2021, pp. 1–10, doi: 10.1109/icoten52080.2021.9493444.
N. Poh and J. Korczak, “Hybrid biometric person authentication using face and voice features,†in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2001, vol. 2091 LNCS, pp. 348–353, doi: 10.1007/3-540-45344-x_51.
K. K. A. Ghany and H. M. Zawbaa, “Hybrid biometrics and watermarking authentication,†in Securing Government Information and Data in Developing Countries, IGI Global, 2017, pp. 37–61.
F. Richardson, D. Reynolds, and N. Dehak, “Deep neural network approaches to speaker and language recognition,†IEEE Signal Process. Lett., vol. 22, no. 10, pp. 1671–1675, Oct. 2015, doi: 10.1109/LSP.2015.2420092.
T. H. Iwan, H. M. Fahrezy, and R. P. Merliasari, “The Design and the Implementation of Security System Office Door Using Raspberry Pi Face Detection,†Mar. 2020, pp. 307–311, doi: 10.2991/assehr.k.200303.074.
K. KumarNagwanshi and S. Dubey, “Biometric Authentication using Human Footprint,†Int. J. Appl. Inf. Syst., vol. 3, no. 7, pp. 1–6, Aug. 2012, doi: 10.5120/ijais12-450568.
R. Want, “An introduction to RFID technology,†IEEE Pervasive Computing, vol. 5, no. 1. pp. 25–33, Jan. 2006, doi: 10.1109/MPRV.2006.2.
A. Noer, Z. B. Hasanuddin, and D. Djamaluddin, “Implementation of RFID based raspberry Pi for user authentication and offline intelligent payment system,†in QiR 2017 - 2017 15th International Conference on Quality in Research (QiR): International Symposium on Electrical and Computer Engineering, Dec. 2017, vol. 2017-Decem, pp. 251–255, doi: 10.1109/QIR.2017.8168491.
X. Zhang, D. Cheng, P. Jia, Y. Dai, and X. Xu, “An Efficient Android-Based Multimodal Biometric Authentication System with Face and Voice,†IEEE Access, vol. 8, pp. 102757–102772, 2020, doi: 10.1109/ACCESS.2020.2999115.
M. A. M. El-Bendary, H. Kasban, A. Haggag, and M. A. R. El-Tokhy, “Investigating of nodes and personal authentications utilizing multimodal biometrics for medical application of WBANs security,†Multimed. Tools Appl., vol. 79, no. 33–34, pp. 24507–24535, Jun. 2020, doi: 10.1007/s11042-020-08926-2.
I. B. Venkateswarlu, J. Kakarla, and S. Prakash, “Face mask detection using MobileNet and global pooling block,†in 4th IEEE Conference on Information and Communication Technology, CICT 2020, Dec. 2020, doi: 10.1109/CICT51604.2020.9312083.
Y. Zhou, Y. Liu, G. Han, and Y. Fu, “Face Recognition Based on the Improved MobileNet,†in 2019 IEEE Symposium Series on Computational Intelligence, SSCI 2019, Dec. 2019, pp. 2776–2781, doi: 10.1109/SSCI44817.2019.9003100.
DOI: http://dx.doi.org/10.18517/ijaseit.12.6.16049
Refbacks
- There are currently no refbacks.
Published by INSIGHT - Indonesian Society for Knowledge and Human Development