Access Control to Security Areas Based on Facial Classification

نویسندگان

  • Aitor Moreno Fdz. de Leceta
  • Mariano Rincón
چکیده

The methods of biometric access control are currently booming due to increased security checks at business and organizational areas. Belong to this area applications based on fingerprints and iris of the eye, among others. However, although there are many papers related to facial recognition, in fact it is difficult to apply to real-world applications because of variations in lighting, position and changing expressions and appearance. In addition, systems proposed in the laboratory do not usually contain a large volume of samples, or the test variations not may be used in applications in real environments. Works include the issue of recognition of the individual, but not the access control based only on facial detect, although there are applications that combine cards with facial recognition, working more on the verification that identification. This paper proposes a robust system of classification based on a multilayer neural network, whose input will be samples of facial photographs with different variations of lighting, position and even time, with a volume of samples that simulates a real environment. Output is not the recognition of the individual, but the class to which it belongs. Through the experiments, it is demonstrated that this relatively simple structure is enough to select the main characteristics of the individuals, and, in the same process, enable the network to correctly classify individuals before entering the restricted area.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A combination of semantic and attribute-based access control model for virtual organizations

A Virtual Organization (VO) consists of some real organizations with common interests, which aims to provide inter organizational associations to reach some common goals by sharing their resources with each other. Providing security mechanisms, and especially a suitable access control mechanism, which enforces the defined security policy is a necessary requirement in VOs. Since VO is a complex ...

متن کامل

An automatic test case generator for evaluating implementation of access control policies

One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...

متن کامل

Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)

One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...

متن کامل

Security Requirements for Multimodal Biometric Systems

Biometrics systems are automated systems that recognize a person based on physical or behavioral characteristics. There are a number of primary biometric disciplines including fingerprint, facial recognition, voice recognition, iris scan, and retina scan. A multimodal biometric system refers to a combination of the above physiological and behavioral human characteristics. There are many crucial...

متن کامل

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009