Professional Documents
Culture Documents
Wireless Door Access System With Face Verification
Wireless Door Access System With Face Verification
Abstract-A traditional door access system using a keycard technology, face verification avoids physical contacts to users,
uses wired cables from many door units to the backend server for which is considered more hygienic.
authentication. The system installation is thus time consuming and This work proposes a wireless door access system with an
costly in a large floor area with many rooms. Besides, the
RFID keycard and face verification. The system is totally built
hardware and software in the system are proprietary to each
from off-the-shelf hardware components and open source
company offering the product. This prevents the user from
software. In order to bring solutions to the problems stated
extending the system or replacing door access units by using
components of another company. earlier, we explore the use of wireless technologies combined
with computer vision to improve operational flexibility and
In this work, we design and implement a wireless door access security measure of the door access system. Face verification
system where the door units communicate with the backend server prevents the fraudulent use of keycards while the keycard is
over a wireless network. To achieve better security and needed to identify a user to do face verification.
performance, the authentication is based on both a
This paper is organized as follows. Section II describes the
student/employee ID card and an image snapshot for face
design of the system architecture, where individual components
verification. The wireless implementation allows for much easier
and functions, the system operation, and the communication
installation and system extension. The system is built from custom
messages are explained. Section III provides the description of
off-the-shelf hardware components and open-source software,
which facilitate in-house implementation of the door units to the face verification method adopted in this work and how the
replace broken units or to add new units to the system. The system training is done. Section IV gives the details of system
has functioned successfully as designed. implementation based on the integration of the common off
the-shelf hardware components and open source software
Keywords-Wireless door access, RFID, Face verification, libraries, and some test results. The conclusion is offered in
Python Section V.
two different systems in parallel. o Transmit RFID data and images via the network to
Another issue of a typical door access system is that the the authentication server.
security can easily be violated. For instance, any person with a o Receive user information from the authentication
registered keycard can get pass the door even if he/she is not a server via the network.
card owner. This problem can be alleviated if the authentication
uses the face in addition to the keycard. Compared to fmgerprint
[ I
i technique together with a keycard to authenticate users. Unlike
,
Networ1<
Adapter !
! fmgerprint verification which requires a specific scanning
Hardware Modules
!
[ ,I[
hardware, face verification can easily be implemented by using
!
i
a simple USB Webcam to capture the user's face and then
Card Face
Authentication Verification verifying it with facial verification algorithm. In addition,
I hygiene matter when users have to share and use the fingerprint
Web-Based
Management
1 scanner with others.
!
, Many face verification algorithms nowaday exist to
I
Software Back-End Service , perform the task such as [3-5]. First, we detect the face of the
L_______________ J user by adopting the Haar-cascade Detection algorithm [1] due
to its widespread library implementation.
Fig. 1. System Architecture
Back-End
Receive
Authentication
Authenticate
data received
from user's
tagcad
UNLOCK
USER
YES
B. Communication Message
Facial Detection using Haar feature-based cascade
An IEEE 802.11 (Wi-Fi) network with AES encryption
classifiers is a machine learning based approach where a
is used to transfer data between the door access units and the
cascade classifier is trained with a lot of images with faces or
backend server. A simple client server protocol is sufficient for
positive examples and image without faces as negative images.
our system. From Fig. 1, two types of application messages are
After it is trained, it will then be used to detect faces in other
exchanged between each door access unit and the backend
images. A cascade classifier consists of multiple stage filters to
server over TCP - Request message and Response message.
detect the Haar-like features in the images.
( (
Take user's Train model Store trained
,-_�I p ortra��mage PortraWimage I .� for prediction �eln .
'--___ �,--_O:_�_�_S:_J � 1
____
,-----......
J Images SER R
'----_../
-----+[ Face 10
Feature Vector
Location
USER
Raspberry Pi
SPllnlerface
V. CONCLUSION
[I] Open Source Computer Vision. (2015). Face Detection using Haar
35.00 Cascades[online] Available at: http://docs.opencv. org/3.1.0/d7/
3: 30.00 Sb/tutorialJlY_face_detection.html#gsc. tab=O
.� 25.00
[2] Philipp Wagner. (2014). Facerec implements a face recognition
framework for Python. [online] Available at: http://bytefish.de/
.2 20.00 devIfacerec
"" [3] Sheng Zhang, Matthew Turk. (200S). Eigenfaces[online] Available at:
.S! 15.00 http://www.scholarpedia.org/article/Eigenfaces
;:
<l)
£ [4] Aleix Martinez (2011), Fisherfaces[online] Available at:
::> http://www.scholarpedia.org/article/Fisherfaces
..r:
[5] Harry Chao aMMAI (2010), Eigenfaces and Fisherfaces[online]
Available at: http://disp.ee.ntu.edu.tw/-pujols/Eigenfaces%20
o 10 20 30 40 50 and%20Fisherfaces. pdf
Horizontal distance from access point (m) [6] FIPS PUB 197. (2001). Advance Encryption Standard[online] Available
at: http://csrc.nist.gov/publications/fips/fipsI97/fips-197.pdf