Loading

Seamless Personnel Authentication using Facial Recognition and Identity-Based Identification on Mobile Devices
Jun-Ren Tan1, Wai-Kit Chin2, Ji-Jian Chin3, Vik-Tor Goh4

1Jun-Ren Tan, Department of Computer Engineering, Multimedia University, Cyberjaya, Malaysia.
2Wai-Kit Chin, Department of Computer Engineering, Multimedia University, Cyberjaya, Malaysia.
3Ji-Jian Chin, Department of Engineering Multimedia University, Cyberjaya, Malaysia.
4Vik-Tor Goh, Department of Computer Science Engineering, Multimedia University, Cyberjaya, Malaysia.
Manuscript received on 25 September 2019 | Revised Manuscript received on 04 October 2019 | Manuscript Published on 22 October 2019 | PP: 41-46 | Volume-8 Issue-3S October 2019 | Retrieval Number: C10091083S19/2019©BEIESP | DOI: 10.35940/ijrte.C1009.1083S19
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Security systems for buildings are no longer an uncommon thing in daily life with increasingly complex access control systems to achieve secured building security system. Achieving a hassle-free yet secure access control systems has been always a challenge for organizations especially for those managing large buildings. In this project, we develop a prototype that utilizes a combination of biometric and cryptography based security schemes to grant access control on personnel going in and out of a building. Our development achieves two-factor authentication in one single step which provides users a seamless experience for authentication. The identity-based identification (IBI) scheme that is based on number-theoretic cryptography is implemented on mobile devices to allow the identification scheme to run in the background. A face recognition system and web server is also developed which can be deployed on any PC at the market. The novelty lies in the combination of the two, with the face recognition making potential intruders difficult to forge biometric data of honest users, and the identity-based scheme preventing the adversary to learn any secrets from the authentication process, while allowing honest users to verify themselves from face to smartphone without any user intervention, thus creating a seamless authentication experience.
Keywords: Face Recognition, Identity-based Identification, Mobile Application, Door Lock, Seamless Two-Factor Authentication.
Scope of the Article: Pattern Recognition