Access Control System based on Voice and Facial Recognition Using Artificial Intelligence
How to cite (IJASEIT) :
R. Blanco-Gonzalo, C. Lunerti, R. Sanchez-Reillo, and R. M. Guest, “Biometrics: Accessibility challenge or opportunity?,” PLoS One, vol. 13, no. 3, p. e0194111, Mar. 2018, doi: 10.1371/journal.pone.0194111.
E. Bertino, M. Kantarcioglu, C. G. Akcora, S. Samtani, S. Mittal, and M. Gupta, “AI for Security and Security for AI,” in CODASPY 2021 - Proceedings of the 11th ACM Conference on Data and Application Security and Privacy, Apr. 2021, pp. 333-334, doi: 10.1145/3422337.3450357.
A. De Keyser, Y. Bart, X. Gu, S. Q. Liu, S. G. Robinson, and P. K. Kannan, “Opportunities and challenges of using biometrics for business: Developing a research agenda,” J. Bus. Res., vol. 136, pp. 52-62, Nov. 2021, doi: 10.1016/j.jbusres.2021.07.028.
R. Blanco-Gonzalo et al., “Biometric Systems Interaction Assessment: The State of the Art,” IEEE Trans. Human-Machine Syst., vol. 49, no. 5, pp. 397-410, Oct. 2019, doi: 10.1109/THMS.2019.2913672.
G. C. Yang and H. Oh, “Implementation of a personal authentication system T-time,” in Proceedings - 2019 IEEE 12th Conference on Service-Oriented Computing and Applications, SOCA 2019, Nov. 2019, pp. 79-81, doi: 10.1109/SOCA.2019.00019.
A. Barros et al., “Data improvement model based on ecg biometric for user authentication and identification,” Sensors (Switzerland), vol. 20, no. 10, p. 2920, May 2020, doi: 10.3390/s20102920.
M. Gautier and D. Jaafar, “Legal issues surrounding data protection,” Soins, vol. 64, no. 838, pp. 36-39, Sep. 2019, doi: 10.1016/j.soin.2019.06.007.
R. De La Rocha Ladeira and R. Rodrigues Obelheiro, “Automatic challenge generation for teaching computer security,” in Proceedings - 2018 44th Latin American Computing Conference, CLEI 2018, Oct. 2018, pp. 774-783, doi: 10.1109/CLEI.2018.00098.
A. Das, S. K. Mohapatra, and L. P. Mishra, “Biometric detection using stroke dynamics,” in Lecture Notes in Networks and Systems, vol. 109, Springer, Singapore, 2020, pp. 458-466.
P. Kumar, R. Saini, B. Kaur, P. P. Roy, and E. Scheme, “Fusion of neuro-signals and dynamic signatures for person authentication,” Sensors (Switzerland), vol. 19, no. 21, Nov. 2019, doi: 10.3390/s19214641.
P. Panasiuk, M. DÄ…browski, and K. Saeed, “Keystroke dynamics and face image fusion as a method of identification accuracy improvement,” in Advances in Intelligent Systems and Computing, 2017, vol. 567, pp. 187-196, doi: 10.1007/978-981-10-3409-1_13.
V. Sujitha and D. Chitra, “A Novel Technique for Multi Biometric Cryptosystem Using Fuzzy Vault,” J. Med. Syst., vol. 43, no. 5, pp. 1-9, Mar. 2019, doi: 10.1007/s10916-019-1220-x.
L. Alzubaidi et al., “Review of deep learning: concepts, CNN architectures, challenges, applications, future directions,” J. Big Data, vol. 8, no. 1, pp. 1-74, Mar. 2021, doi: 10.1186/s40537-021-00444-8.
Y. Hu, M. Lu, C. Xie, and X. Lu, “FIN-GAN: Face illumination normalization via retinex-based self-supervised learning and conditional generative adversarial network,” Neurocomputing, vol. 456, pp. 109-125, Oct. 2021, doi: 10.1016/j.neucom.2021.05.063.
J. Zeng, X. Qiu, and S. Shi, “Image processing effects on the deep face recognition system,” Math. Biosci. Eng., vol. 18, no. 2, pp. 1187-1200, 2021, doi: 10.3934/MBE.2021064.
C. S. Hsiao, C. P. Fan, and Y. T. Hwang, “Iris location and recognition by deep-learning networks-based design for biometric authorization,” in LifeTech 2021 - 2021 IEEE 3rd Global Conference on Life Sciences and Technologies, Mar. 2021, pp. 144-145, doi: 10.1109/LifeTech52111.2021.9391787.
A. C. Weaver, “Biometric authentication,” Computer (Long. Beach. Calif)., vol. 39, no. 2, pp. 96-97, Feb. 2006, doi: 10.1109/MC.2006.47.
K. M. Sudar, P. Deepalakshmi, K. Ponmozhi, and P. Nagaraj, “Analysis of Security Threats and Countermeasures for various Biometric Techniques,” in 2019 International Conference on Clean Energy and Energy Efficient Electronics Circuit for Sustainable Development, INCCES 2019, Dec. 2019, doi: 10.1109/INCCES47820.2019.9167745.
K. Sundararajan and D. L. Woodard, “Deep learning for biometrics: A survey,” ACM Comput. Surv., vol. 51, no. 3, May 2018, doi: 10.1145/3190618.
H. Mehraj and A. H. Mir, “A Survey of Biometric Recognition Using Deep Learning,” EAI Endorsed Trans. Energy Web, vol. 8, no. 33, pp. 1-16, 2021, doi: 10.4108/eai.27-10-2020.166775.
T. Gwyn, K. Roy, and M. Atay, “Face recognition using popular deep net architectures: A brief comparative study,” Futur. Internet, vol. 13, no. 7, p. 164, Jun. 2021, doi: 10.3390/fi13070164.
A. N. Razzaq, R. Ghazali, and N. K. El Abbadi, “Face Recognition - Extensive Survey and Recommendations,” Jul. 2021, pp. 1-10, doi: 10.1109/icoten52080.2021.9493444.
N. Poh and J. Korczak, “Hybrid biometric person authentication using face and voice features,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2001, vol. 2091 LNCS, pp. 348-353, doi: 10.1007/3-540-45344-x_51.
K. K. A. Ghany and H. M. Zawbaa, “Hybrid biometrics and watermarking authentication,” in Securing Government Information and Data in Developing Countries, IGI Global, 2017, pp. 37-61.
F. Richardson, D. Reynolds, and N. Dehak, “Deep neural network approaches to speaker and language recognition,” IEEE Signal Process. Lett., vol. 22, no. 10, pp. 1671-1675, Oct. 2015, doi: 10.1109/LSP.2015.2420092.
T. H. Iwan, H. M. Fahrezy, and R. P. Merliasari, “The Design and the Implementation of Security System Office Door Using Raspberry Pi Face Detection,” Mar. 2020, pp. 307-311, doi: 10.2991/assehr.k.200303.074.
K. KumarNagwanshi and S. Dubey, “Biometric Authentication using Human Footprint,” Int. J. Appl. Inf. Syst., vol. 3, no. 7, pp. 1-6, Aug. 2012, doi: 10.5120/ijais12-450568.
R. Want, “An introduction to RFID technology,” IEEE Pervasive Computing, vol. 5, no. 1. pp. 25-33, Jan. 2006, doi: 10.1109/MPRV.2006.2.
A. Noer, Z. B. Hasanuddin, and D. Djamaluddin, “Implementation of RFID based raspberry Pi for user authentication and offline intelligent payment system,” in QiR 2017 - 2017 15th International Conference on Quality in Research (QiR): International Symposium on Electrical and Computer Engineering, Dec. 2017, vol. 2017-Decem, pp. 251-255, doi: 10.1109/QIR.2017.8168491.
X. Zhang, D. Cheng, P. Jia, Y. Dai, and X. Xu, “An Efficient Android-Based Multimodal Biometric Authentication System with Face and Voice,” IEEE Access, vol. 8, pp. 102757-102772, 2020, doi: 10.1109/ACCESS.2020.2999115.
M. A. M. El-Bendary, H. Kasban, A. Haggag, and M. A. R. El-Tokhy, “Investigating of nodes and personal authentications utilizing multimodal biometrics for medical application of WBANs security,” Multimed. Tools Appl., vol. 79, no. 33-34, pp. 24507-24535, Jun. 2020, doi: 10.1007/s11042-020-08926-2.
I. B. Venkateswarlu, J. Kakarla, and S. Prakash, “Face mask detection using MobileNet and global pooling block,” in 4th IEEE Conference on Information and Communication Technology, CICT 2020, Dec. 2020, doi: 10.1109/CICT51604.2020.9312083.
Y. Zhou, Y. Liu, G. Han, and Y. Fu, “Face Recognition Based on the Improved MobileNet,” in 2019 IEEE Symposium Series on Computational Intelligence, SSCI 2019, Dec. 2019, pp. 2776-2781, doi: 10.1109/SSCI44817.2019.9003100.

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).