Two-Factor Authentication Smart Entryway Using Modified LBPH Algorithm
- URL: http://arxiv.org/abs/2508.13617v1
- Date: Tue, 19 Aug 2025 08:28:40 GMT
- Title: Two-Factor Authentication Smart Entryway Using Modified LBPH Algorithm
- Authors: Zakiah Ayop, Wan Mohamad Hariz Bin Wan Mohamad Rosdi, Looi Wei Hua, Syarulnaziah Anawar, Nur Fadzilah Othman,
- Abstract summary: This paper proposes a two-factor authentication system for smart entryway access control using facial recognition and passcode verification.<n>The system is capable of conducting face recognition and mask detection, automating the operation of the remote control to register users, locking or unlocking the door, and notifying the owner.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Face mask detection has become increasingly important recently, particularly during the COVID-19 pandemic. Many face detection models have been developed in smart entryways using IoT. However, there is a lack of IoT development on face mask detection. This paper proposes a two-factor authentication system for smart entryway access control using facial recognition and passcode verification and an automation process to alert the owner and activate the surveillance system when a stranger is detected and controls the system remotely via Telegram on a Raspberry Pi platform. The system employs the Local Binary Patterns Histograms for the full face recognition algorithm and modified LBPH algorithm for occluded face detection. On average, the system achieved an Accuracy of approximately 70%, a Precision of approximately 80%, and a Recall of approximately 83.26% across all tested users. The results indicate that the system is capable of conducting face recognition and mask detection, automating the operation of the remote control to register users, locking or unlocking the door, and notifying the owner. The sample participants highly accept it for future use in the user acceptance test.
Related papers
- Real-Time Multi-Modal Embedded Vision Framework for Object Detection Facial Emotion Recognition and Biometric Identification on Low-Power Edge Platforms [0.44219509596259216]
We present a real-time multi-modal vision framework that integrates object detection, owner-specific face recognition, and emotion detection into a unified pipeline deployed on a Raspberry Pi 5 edge platform.<n>Our work demonstrates that context-aware scheduling is the key to unlocking complex multi-modal AI on cost-effective edge hardware.
arXiv Detail & Related papers (2026-01-17T09:06:47Z) - From Detection to Correction: Backdoor-Resilient Face Recognition via Vision-Language Trigger Detection and Noise-Based Neutralization [2.661968537236039]
Backdoor attacks can subvert face recognition systems powered by deep neural networks (DNNs)<n>We propose TrueBiometric: Trustworthy Biometrics, which accurately detects poisoned images using a majority voting mechanism.<n>Our empirical results demonstrate that TrueBiometric detects and corrects poisoned images with 100% accuracy without compromising accuracy on clean images.
arXiv Detail & Related papers (2025-08-07T14:02:34Z) - Robust Deepfake Detection for Electronic Know Your Customer Systems Using Registered Images [29.349824933680956]
We present a deepfake detection algorithm specifically designed for electronic Know Your Customer (eKYC) systems.<n>Our approach evaluates the video's authenticity by detecting temporal inconsistencies in identity vectors extracted by face recognition models.<n>In addition to processing video input, the algorithm utilizes a registered image (assumed to be genuine) to calculate identity discrepancies.
arXiv Detail & Related papers (2025-07-30T12:16:27Z) - A Machine Learning-Based Secure Face Verification Scheme and Its Applications to Digital Surveillance [0.9208007322096533]
Most real-world recognition systems ignore the importance of protecting the identity-sensitive facial images that are used for verification.
We use the DeepID2 convolutional neural network to extract the features of a facial image and an EM algorithm to solve the facial verification problem.
We develop three face verification systems for surveillance (or entrance) control of a local community based on three levels of privacy concerns.
arXiv Detail & Related papers (2024-10-29T12:25:00Z) - Deep Learning based CNN Model for Classification and Detection of
Individuals Wearing Face Mask [0.0]
This project utilizes deep learning to create a model that can detect face masks in real-time streaming video as well as images.
The primary focus of this research is to enhance security, particularly in sensitive areas.
The research unfolds in three stages: image pre-processing, image cropping, and image classification.
arXiv Detail & Related papers (2023-11-17T09:24:04Z) - Exploring Decision-based Black-box Attacks on Face Forgery Detection [53.181920529225906]
Face forgery generation technologies generate vivid faces, which have raised public concerns about security and privacy.
Although face forgery detection has successfully distinguished fake faces, recent studies have demonstrated that face forgery detectors are very vulnerable to adversarial examples.
arXiv Detail & Related papers (2023-10-18T14:49:54Z) - Analysis of Recent Trends in Face Recognition Systems [0.0]
Due to inter-class similarities and intra-class variations, face recognition systems generate false match and false non-match errors respectively.
Recent research focuses on improving the robustness of extracted features and the pre-processing algorithms to enhance recognition accuracy.
arXiv Detail & Related papers (2023-04-23T18:55:45Z) - Face Presentation Attack Detection [59.05779913403134]
Face recognition technology has been widely used in daily interactive applications such as checking-in and mobile payment.
However, its vulnerability to presentation attacks (PAs) limits its reliable use in ultra-secure applicational scenarios.
arXiv Detail & Related papers (2022-12-07T14:51:17Z) - Privacy-Preserving Face Recognition with Learnable Privacy Budgets in
Frequency Domain [77.8858706250075]
This paper proposes a privacy-preserving face recognition method using differential privacy in the frequency domain.
Our method performs very well with several classical face recognition test sets.
arXiv Detail & Related papers (2022-07-15T07:15:36Z) - Harnessing Unrecognizable Faces for Face Recognition [87.80037162457427]
We propose a measure of recognizability of a face image, implemented by a deep neural network trained using mostly recognizable identities.
We show that accounting for recognizability reduces error rate of single-image face recognition by 58% at FAR=1e-5.
arXiv Detail & Related papers (2021-06-08T05:25:03Z) - Quickest Intruder Detection for Multiple User Active Authentication [74.5256211285431]
We formulate the Multiple-user Quickest Intruder Detection (MQID) algorithm.
We extend the algorithm to the data-efficient scenario where intruder detection is carried out with fewer observation samples.
We evaluate the effectiveness of the proposed method on two publicly available AA datasets on the face modality.
arXiv Detail & Related papers (2020-06-21T21:59:01Z) - Investigating the Impact of Inclusion in Face Recognition Training Data
on Individual Face Identification [93.5538147928669]
We audit ArcFace, a state-of-the-art, open source face recognition system, in a large-scale face identification experiment with more than one million distractor images.
We find a Rank-1 face identification accuracy of 79.71% for individuals present in the model's training data and an accuracy of 75.73% for those not present.
arXiv Detail & Related papers (2020-01-09T15:50:28Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.