Hostname: page-component-78c5997874-v9fdk Total loading time: 0 Render date: 2024-11-10T19:38:06.143Z Has data issue: false hasContentIssue false

Application of 3D face recognition in the access control system

Published online by Cambridge University Press:  06 December 2021

Quoc Dien Le
Affiliation:
Faculty of Mechanical Engineering, Ho Chi Minh City University of Technology, VNUHCM, Vietnam
Tran Thanh Cong Vu
Affiliation:
Faculty of Mechanical Engineering, Ho Chi Minh City University of Technology, VNUHCM, Vietnam
Tuong Quan Vo*
Affiliation:
Faculty of Mechanical Engineering, Ho Chi Minh City University of Technology, VNUHCM, Vietnam
*
*Corresponding author. E-mail: vtquan@hcmut.edu.vn

Abstract

Over the years, face recognition has been the research topic that has attracted many researchers around the world. One of the most significant applications of face recognition is the access control system. The access control system allows authorized persons to enter or exit certain or restricted areas. As a result, it will increase the security situation without over-investment in staff security. The access information can be the identification, time, and location, etc. It can be used to carry out human resource management tasks such as attendance and inspection of employees in a more fair and transparent manner. Although face recognition has been widely used in access control systems because of its better accuracy and convenience without requiring too much user cooperation, the 2D-based face recognition systems also retain many limitations due to the variations in pose and illumination. By analyzing facial geometries, 3D facial recognition systems can theoretically overcome the disadvantages of prior 2D methods and improve robustness in different working conditions. In this paper, we propose the 3D facial recognition algorithm for use in an access control system. The proposed algorithm includes the preprocessing, feature extraction, and classification stages. The application of the proposed access control system is the automatic sliding door, the controller of the system, the web-based monitoring, control, and storage of data.

Type
Research Article
Copyright
© The Author(s), 2021. Published by Cambridge University Press

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Norman, T. L., Electronics Access Control (Elsevier Inc., 2012).Google Scholar
Sharif, M., Raza, M., Shah, J. H., Yasmin, M. and Fernandes, S. L., “An Overview of Biometrics Methods,” In: Handbook of Multimedia Information Security: Techniques and Applications (2019) pp. 15–35.Google Scholar
Mittal, Y., Varshney, A., Aggarwal, P.,Matani, K. and Mittal, V. K., et al. “Fingerprint Biometric Based Access Control and Classroom Attendance Management System,” In: 2015 Annual IEEE India Conference (INDICON) (IEEE, 2015).CrossRefGoogle Scholar
Noma-Osaghae, E., Robert, O., Okereke, C., Okesola, O. J. and Okokpuji, K., “Design and Implementation of An Iris Biometric Door Access Control System,” In: 2017 International Conference on Computational Science and Computational Intelligence (CSCI) (IEEE, 2017).CrossRefGoogle Scholar
Rodrigues, R.N., Yared, G. F.C., do, C. R. Costa, N., Yabu-Uti, J. B. T., Violaro, F. and Ling, L. L.,“Biometric Access Control Through Numerical Keyboards Based on Keystroke Dynamics,” In: International Conference on Biometrics (Springer, Berlin, Heidelberg, 2006).CrossRefGoogle Scholar
Wahyudi, W., Winda, A., and Syazilawati, M., “Intelligent voice-based door access control system using adaptive-network-based fuzzy inference system (ANFIS) for building security,” J. Comput. Sci. 3(5), 274280 (2007).Google Scholar
Al-Shebani, Q., Premaratne, P., and Vial, P., “Embedded Door Access Control Systems Based on Face Recognition: A Survey,” In: 2013 , 7th International Conference on Signal Processing and Communication Systems (ICSPCS) (IEEE, 2013).CrossRefGoogle Scholar
Sahani, M., Nanda, C., Sahu, A. K. and Pattnaik, B., “Web-Based Online Embedded Door Access Control and Home Security System Based on Face Recognition,” In: International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015] (IEEE, 2015).CrossRefGoogle Scholar
Abate, A. F., Nappi, M., Riccio, D. and Sabatino, G., “2D and 3D face recognition: A survey,” Pattern Recognit. Lett. 28(14), 1885–1906 (2007).Google Scholar
Wu, Z., Wang, Y., and Pan, G., “3D Face Recognition Using Local Shape Map,” In: 2004 International Conference on Image Processing, 2004, ICIP 2004, vol. 3 (IEEE, 2004) pp. 2003–2006.Google Scholar
Mian, A., Bennamoun, M. and Owens, R., “Automatic 3D Face Detection, Normalization and Recognition,” In: Third International Symposium on 3D Data Processing, Visualization, and Transmission (3DPVT 2006) (IEEE, 2006) pp. 735742.CrossRefGoogle Scholar
Li, X. and Da, F., “Efficient 3D face recognition handling facial expression and hair occlusion,” Image Vis. Comput. 30(9), 668679 (2012).CrossRefGoogle Scholar
Spreeuwers, L., “Fast and accurate 3D face recognition,” Int. J. Comput. Vis. 93(3), 389414 (2011).CrossRefGoogle Scholar
Lei, Y., Bennamoun, M., Hayat, M. and Guo, Y., “An efficient 3d face recognition approach using local geometrical signatures,” Pattern Recognit. 46(2), 509524 (2014).CrossRefGoogle Scholar
Cai, Y., Lei, Y., Yang, M., You, Z. and Shan, S., “A fast and robust 3D face recognition approach based on depply learned face representation,” Neurocomputing 363, 375397 (2019).10.1016/j.neucom.2019.07.047CrossRefGoogle Scholar
Derpanis, K. G., “Overview of the RANSAC algorithm,” Image Rochester NY 4(1), 23 (2010).Google Scholar
Fischler, M. A. and Bolles, R. C., “Random sample consensus: A paradigm for model fitting with application to image analysis and automated cartography,” Comm. ACM 24(6), 381395 (1981).CrossRefGoogle Scholar
Arun, K. S., Huang, T. S., and Blostein, S. D., “Least-squares fitting of two 3-D point sets,” IEEE Trans. Patt. Anal. Mach. Intell. 5, 698–700 (1987).Google Scholar
Belhumeur, P. N., Hespanha, J. P. and Kriegman, D. J., “Eigenfaces vs. fisherfaces: Recognition using class specific linear projection,” IEEE Trans. Anal, Pattern. Mach. Intell. 19(7), 711–720 (1997).Google Scholar
Carfagni, M., Furferi, R., Governi, L., Santarelli, C., Servi, M., Uccheddu, F. and Volpe, Y., “Metrological and critical characterization of the Intel D415 stereo depth camera,” Sensors 19(3), 489 (2019).CrossRefGoogle ScholarPubMed