Access Control System based on Voice and Facial Recognition Using Artificial Intelligence

José Capote-Leiva, Marco Villota-Rivillas, Julián Muñoz-Ordóñez

Abstract


Computer security has become a matter of great concern at the global level. Whatever the economic sector, all companies handle confidential information related to clients and personnel. These latter therefore need to be seen as sensitive assets that require protection. Appropriate, consensual handling of personal information is thus a legal and delicate requirement that demands to be treated securely in all types of business. Many companies and clients have lost sums of money in the millions due to incorrect information protection, triggering complicated, expensive proceedings that are awkward and cumbersome to resolve. To implement an authentication system based on biometric parameters, which strengthens the security of sensitive assets in areas considered critical in various organizations by attaining the highest accuracy in user classification processes. By applying a convolutional neural network: MobileNet, viewing via computer and low-cost devices (Raspberry Pi 3). The system constitutes an authentication device for voice and face with 96% and 100% accuracy, respectively. Conclusion: The system shows that deep learning (Deep Convolutional Neural Networks), in combination with devices such as the Raspberry, generate a system capable of high performance in time and cost, as well as providing companies with a robust system featuring high accuracy in the correct recognition of the biometric patterns of users registered and trained by the system.

Keywords


Artificial intelligence; computer vision; convolutional neural network; deep learning; spectrogram; biometric system.

Full Text:

PDF

References


R. Blanco-Gonzalo, C. Lunerti, R. Sanchez-Reillo, and R. M. Guest, “Biometrics: Accessibility challenge or opportunity?,†PLoS One, vol. 13, no. 3, p. e0194111, Mar. 2018, doi: 10.1371/journal.pone.0194111.

E. Bertino, M. Kantarcioglu, C. G. Akcora, S. Samtani, S. Mittal, and M. Gupta, “AI for Security and Security for AI,†in CODASPY 2021 - Proceedings of the 11th ACM Conference on Data and Application Security and Privacy, Apr. 2021, pp. 333–334, doi: 10.1145/3422337.3450357.

A. De Keyser, Y. Bart, X. Gu, S. Q. Liu, S. G. Robinson, and P. K. Kannan, “Opportunities and challenges of using biometrics for business: Developing a research agenda,†J. Bus. Res., vol. 136, pp. 52–62, Nov. 2021, doi: 10.1016/j.jbusres.2021.07.028.

R. Blanco-Gonzalo et al., “Biometric Systems Interaction Assessment: The State of the Art,†IEEE Trans. Human-Machine Syst., vol. 49, no. 5, pp. 397–410, Oct. 2019, doi: 10.1109/THMS.2019.2913672.

G. C. Yang and H. Oh, “Implementation of a personal authentication system T-time,†in Proceedings - 2019 IEEE 12th Conference on Service-Oriented Computing and Applications, SOCA 2019, Nov. 2019, pp. 79–81, doi: 10.1109/SOCA.2019.00019.

A. Barros et al., “Data improvement model based on ecg biometric for user authentication and identification,†Sensors (Switzerland), vol. 20, no. 10, p. 2920, May 2020, doi: 10.3390/s20102920.

M. Gautier and D. Jaafar, “Legal issues surrounding data protection,†Soins, vol. 64, no. 838, pp. 36–39, Sep. 2019, doi: 10.1016/j.soin.2019.06.007.

R. De La Rocha Ladeira and R. Rodrigues Obelheiro, “Automatic challenge generation for teaching computer security,†in Proceedings - 2018 44th Latin American Computing Conference, CLEI 2018, Oct. 2018, pp. 774–783, doi: 10.1109/CLEI.2018.00098.

A. Das, S. K. Mohapatra, and L. P. Mishra, “Biometric detection using stroke dynamics,†in Lecture Notes in Networks and Systems, vol. 109, Springer, Singapore, 2020, pp. 458–466.

P. Kumar, R. Saini, B. Kaur, P. P. Roy, and E. Scheme, “Fusion of neuro-signals and dynamic signatures for person authentication,†Sensors (Switzerland), vol. 19, no. 21, Nov. 2019, doi: 10.3390/s19214641.

P. Panasiuk, M. Dąbrowski, and K. Saeed, “Keystroke dynamics and face image fusion as a method of identification accuracy improvement,†in Advances in Intelligent Systems and Computing, 2017, vol. 567, pp. 187–196, doi: 10.1007/978-981-10-3409-1_13.

V. Sujitha and D. Chitra, “A Novel Technique for Multi Biometric Cryptosystem Using Fuzzy Vault,†J. Med. Syst., vol. 43, no. 5, pp. 1–9, Mar. 2019, doi: 10.1007/s10916-019-1220-x.

L. Alzubaidi et al., “Review of deep learning: concepts, CNN architectures, challenges, applications, future directions,†J. Big Data, vol. 8, no. 1, pp. 1–74, Mar. 2021, doi: 10.1186/s40537-021-00444-8.

Y. Hu, M. Lu, C. Xie, and X. Lu, “FIN-GAN: Face illumination normalization via retinex-based self-supervised learning and conditional generative adversarial network,†Neurocomputing, vol. 456, pp. 109–125, Oct. 2021, doi: 10.1016/j.neucom.2021.05.063.

J. Zeng, X. Qiu, and S. Shi, “Image processing effects on the deep face recognition system,†Math. Biosci. Eng., vol. 18, no. 2, pp. 1187–1200, 2021, doi: 10.3934/MBE.2021064.

C. S. Hsiao, C. P. Fan, and Y. T. Hwang, “Iris location and recognition by deep-learning networks-based design for biometric authorization,†in LifeTech 2021 - 2021 IEEE 3rd Global Conference on Life Sciences and Technologies, Mar. 2021, pp. 144–145, doi: 10.1109/LifeTech52111.2021.9391787.

A. C. Weaver, “Biometric authentication,†Computer (Long. Beach. Calif)., vol. 39, no. 2, pp. 96–97, Feb. 2006, doi: 10.1109/MC.2006.47.

K. M. Sudar, P. Deepalakshmi, K. Ponmozhi, and P. Nagaraj, “Analysis of Security Threats and Countermeasures for various Biometric Techniques,†in 2019 International Conference on Clean Energy and Energy Efficient Electronics Circuit for Sustainable Development, INCCES 2019, Dec. 2019, doi: 10.1109/INCCES47820.2019.9167745.

K. Sundararajan and D. L. Woodard, “Deep learning for biometrics: A survey,†ACM Comput. Surv., vol. 51, no. 3, May 2018, doi: 10.1145/3190618.

H. Mehraj and A. H. Mir, “A Survey of Biometric Recognition Using Deep Learning,†EAI Endorsed Trans. Energy Web, vol. 8, no. 33, pp. 1–16, 2021, doi: 10.4108/eai.27-10-2020.166775.

T. Gwyn, K. Roy, and M. Atay, “Face recognition using popular deep net architectures: A brief comparative study,†Futur. Internet, vol. 13, no. 7, p. 164, Jun. 2021, doi: 10.3390/fi13070164.

A. N. Razzaq, R. Ghazali, and N. K. El Abbadi, “Face Recognition – Extensive Survey and Recommendations,†Jul. 2021, pp. 1–10, doi: 10.1109/icoten52080.2021.9493444.

N. Poh and J. Korczak, “Hybrid biometric person authentication using face and voice features,†in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2001, vol. 2091 LNCS, pp. 348–353, doi: 10.1007/3-540-45344-x_51.

K. K. A. Ghany and H. M. Zawbaa, “Hybrid biometrics and watermarking authentication,†in Securing Government Information and Data in Developing Countries, IGI Global, 2017, pp. 37–61.

F. Richardson, D. Reynolds, and N. Dehak, “Deep neural network approaches to speaker and language recognition,†IEEE Signal Process. Lett., vol. 22, no. 10, pp. 1671–1675, Oct. 2015, doi: 10.1109/LSP.2015.2420092.

T. H. Iwan, H. M. Fahrezy, and R. P. Merliasari, “The Design and the Implementation of Security System Office Door Using Raspberry Pi Face Detection,†Mar. 2020, pp. 307–311, doi: 10.2991/assehr.k.200303.074.

K. KumarNagwanshi and S. Dubey, “Biometric Authentication using Human Footprint,†Int. J. Appl. Inf. Syst., vol. 3, no. 7, pp. 1–6, Aug. 2012, doi: 10.5120/ijais12-450568.

R. Want, “An introduction to RFID technology,†IEEE Pervasive Computing, vol. 5, no. 1. pp. 25–33, Jan. 2006, doi: 10.1109/MPRV.2006.2.

A. Noer, Z. B. Hasanuddin, and D. Djamaluddin, “Implementation of RFID based raspberry Pi for user authentication and offline intelligent payment system,†in QiR 2017 - 2017 15th International Conference on Quality in Research (QiR): International Symposium on Electrical and Computer Engineering, Dec. 2017, vol. 2017-Decem, pp. 251–255, doi: 10.1109/QIR.2017.8168491.

X. Zhang, D. Cheng, P. Jia, Y. Dai, and X. Xu, “An Efficient Android-Based Multimodal Biometric Authentication System with Face and Voice,†IEEE Access, vol. 8, pp. 102757–102772, 2020, doi: 10.1109/ACCESS.2020.2999115.

M. A. M. El-Bendary, H. Kasban, A. Haggag, and M. A. R. El-Tokhy, “Investigating of nodes and personal authentications utilizing multimodal biometrics for medical application of WBANs security,†Multimed. Tools Appl., vol. 79, no. 33–34, pp. 24507–24535, Jun. 2020, doi: 10.1007/s11042-020-08926-2.

I. B. Venkateswarlu, J. Kakarla, and S. Prakash, “Face mask detection using MobileNet and global pooling block,†in 4th IEEE Conference on Information and Communication Technology, CICT 2020, Dec. 2020, doi: 10.1109/CICT51604.2020.9312083.

Y. Zhou, Y. Liu, G. Han, and Y. Fu, “Face Recognition Based on the Improved MobileNet,†in 2019 IEEE Symposium Series on Computational Intelligence, SSCI 2019, Dec. 2019, pp. 2776–2781, doi: 10.1109/SSCI44817.2019.9003100.




DOI: http://dx.doi.org/10.18517/ijaseit.12.6.16049

Refbacks

  • There are currently no refbacks.



Published by INSIGHT - Indonesian Society for Knowledge and Human Development