Cloud-Based Face and Speech Recognition for Access Control Applications

04/23/2020
by   Nathalie Tkauc, et al.
0

This paper describes the implementation of a system to recognize employees and visitors wanting to gain access to a physical office through face images and speech-to-text recognition. The system helps employees to unlock the entrance door via face recognition without the need of tag-keys or cards. To prevent spoofing attacks and increase security, a randomly generated code is sent to the employee, who then has to type it into the screen. On the other hand, visitors and delivery persons are provided with a speech-to-text service where they utter the name of the employee that they want to meet, and the system then sends a notification to the right employee automatically. The hardware of the system is constituted by two Raspberry Pi, a 7-inch LCD-touch display, a camera, and a sound card with a microphone and speaker. To carry out face recognition and speech-to-text conversion, the cloud-based platforms Amazon Web Services and the Google Speech-to-Text API service are used respectively. The two-step face authentication mechanism for employees provides an increased level of security and protection against spoofing attacks without the need of carrying key-tags or access cards, while disturbances by visitors or couriers are minimized by notifying their arrival to the right employee, without disturbing other co-workers by means of ring-bells.

READ FULL TEXT

page 1

page 2

page 3

page 4

page 5

page 6

research
10/26/2017

How far did we get in face spoofing detection?

The growing use of control access systems based on face recognition shed...
research
01/26/2022

Speckle-based optical cryptosystem and its application for human face recognition via deep learning

Face recognition has recently become ubiquitous in many scenes for authe...
research
02/22/2023

Enhanced Face Authentication With Separate Loss Functions

The overall objective of the main project is to propose and develop a sy...
research
03/28/2023

Towards Effective Adversarial Textured 3D Meshes on Physical Face Recognition

Face recognition is a prevailing authentication solution in numerous bio...
research
09/21/2023

Vulnerability of 3D Face Recognition Systems to Morphing Attacks

In recent years face recognition systems have been brought to the mainst...
research
08/02/2017

Combining Keystroke Dynamics and Face Recognition for User Verification

The massive explosion and ubiquity of computing devices and the outreach...

Please sign up or login with your details

Forgot password? Click here to reset