Cloud-Based Face and Speech Recognition for Access Control Applications
- URL: http://arxiv.org/abs/2004.11168v2
- Date: Fri, 8 May 2020 13:07:24 GMT
- Title: Cloud-Based Face and Speech Recognition for Access Control Applications
- Authors: Nathalie Tkauc, Thao Tran, Kevin Hernandez-Diaz, Fernando
Alonso-Fernandez
- Abstract summary: The system helps employees to unlock the entrance door via face recognition without the need of tag-keys or cards.
Visitors and delivery persons are provided with a speech-to-text service where they utter the name of the employee that they want to meet.
The hardware of the system is constituted by two Raspberry Pi, a 7-inch LCD-touch display, a camera, and a sound card with a microphone and speaker.
- Score: 55.84746218227712
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: This paper describes the implementation of a system to recognize employees
and visitors wanting to gain access to a physical office through face images
and speech-to-text recognition. The system helps employees to unlock the
entrance door via face recognition without the need of tag-keys or cards. To
prevent spoofing attacks and increase security, a randomly generated code is
sent to the employee, who then has to type it into the screen. On the other
hand, visitors and delivery persons are provided with a speech-to-text service
where they utter the name of the employee that they want to meet, and the
system then sends a notification to the right employee automatically. The
hardware of the system is constituted by two Raspberry Pi, a 7-inch LCD-touch
display, a camera, and a sound card with a microphone and speaker. To carry out
face recognition and speech-to-text conversion, the cloud-based platforms
Amazon Web Services and the Google Speech-to-Text API service are used
respectively. The two-step face authentication mechanism for employees provides
an increased level of security and protection against spoofing attacks without
the need of carrying key-tags or access cards, while disturbances by visitors
or couriers are minimized by notifying their arrival to the right employee,
without disturbing other co-workers by means of ring-bells.
Related papers
- Privacy-preserving Optics for Enhancing Protection in Face De-identification [60.110274007388135]
We propose a hardware-level face de-identification method to solve this vulnerability.
We also propose an anonymization framework that generates a new face using the privacy-preserving image, face heatmap, and a reference face image from a public dataset as input.
arXiv Detail & Related papers (2024-03-31T19:28:04Z) - Exploring Decision-based Black-box Attacks on Face Forgery Detection [53.181920529225906]
Face forgery generation technologies generate vivid faces, which have raised public concerns about security and privacy.
Although face forgery detection has successfully distinguished fake faces, recent studies have demonstrated that face forgery detectors are very vulnerable to adversarial examples.
arXiv Detail & Related papers (2023-10-18T14:49:54Z) - Diff-Privacy: Diffusion-based Face Privacy Protection [58.1021066224765]
In this paper, we propose a novel face privacy protection method based on diffusion models, dubbed Diff-Privacy.
Specifically, we train our proposed multi-scale image inversion module (MSI) to obtain a set of SDM format conditional embeddings of the original image.
Based on the conditional embeddings, we design corresponding embedding scheduling strategies and construct different energy functions during the denoising process to achieve anonymization and visual identity information hiding.
arXiv Detail & Related papers (2023-09-11T09:26:07Z) - Enhanced Face Authentication With Separate Loss Functions [0.0]
The overall objective of the main project is to propose and develop a system of facial authentication in unlocking phones or applications in phones using facial recognition.
The system will include four separate architectures: face detection, face recognition, face spoofing, and classification of closed eyes.
arXiv Detail & Related papers (2023-02-22T15:07:29Z) - Face Presentation Attack Detection [59.05779913403134]
Face recognition technology has been widely used in daily interactive applications such as checking-in and mobile payment.
However, its vulnerability to presentation attacks (PAs) limits its reliable use in ultra-secure applicational scenarios.
arXiv Detail & Related papers (2022-12-07T14:51:17Z) - Locally Authenticated Privacy-preserving Voice Input [10.82818142802482]
Service providers must authenticate their users, although individuals may wish to maintain privacy.
Preserving privacy while performing authentication is challenging, particularly where adversaries can use biometric data to train transformation tools.
We introduce a secure, flexible privacy-preserving system to capture and store an on-device fingerprint of the users' raw signals.
arXiv Detail & Related papers (2022-05-27T14:56:01Z) - An Ensemble Model for Face Liveness Detection [2.322052136673525]
We present a passive method to detect face presentation attack using an ensemble deep learning technique.
We propose an ensemble method where multiple features of the face and background regions are learned to predict whether the user is a bonafide or an attacker.
arXiv Detail & Related papers (2022-01-19T12:43:39Z) - Speaker De-identification System using Autoencoders and Adversarial
Training [58.720142291102135]
We propose a speaker de-identification system based on adversarial training and autoencoders.
Experimental results show that combining adversarial learning and autoencoders increase the equal error rate of a speaker verification system.
arXiv Detail & Related papers (2020-11-09T19:22:05Z) - Toward Building Safer Smart Homes for the People with Disabilities [1.0742675209112622]
"SafeAccess" is an end-to-end assistive solution to build a safer smart home by providing situational awareness.
We focus on building a robust model for detecting and recognizing person, generating image descriptions, and designing a prototype for the smart door.
The system notifies users with an MMS containing the name of incoming persons or as "unknown", scene image, facial description, and contextual information.
Our system identifies persons with an F-score 0.97 and recognizes items to generate image description with an average F-score 0.97.
arXiv Detail & Related papers (2020-06-10T15:50:32Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.