Access Control System based on Voice and Facial Recognition Using Artificial Intelligence

José Capote-Leiva (1), Marco Villota-Rivillas (2), Julián Muñoz-Ordóñez (3)
(1) Department of Engineering, Corporación Universitaria Comfacauca, Unicomfacauca, Popayán, 190003, Colombia
(2) Department of Engineering, Corporación Universitaria Comfacauca, Unicomfacauca, Popayán, 190003, Colombia
(3) Department of Engineering, Corporación Universitaria Comfacauca, Unicomfacauca, Popayán, 190003, Colombia
Fulltext View | Download
How to cite (IJASEIT) :
Capote-Leiva, José, et al. “Access Control System Based on Voice and Facial Recognition Using Artificial Intelligence”. International Journal on Advanced Science, Engineering and Information Technology, vol. 12, no. 6, Dec. 2022, pp. 2342-8, doi:10.18517/ijaseit.12.6.16049.
Computer security has become a matter of great concern at the global level. Whatever the economic sector, all companies handle confidential information related to clients and personnel. These latter therefore need to be seen as sensitive assets that require protection. Appropriate, consensual handling of personal information is thus a legal and delicate requirement that demands to be treated securely in all types of business. Many companies and clients have lost sums of money in the millions due to incorrect information protection, triggering complicated, expensive proceedings that are awkward and cumbersome to resolve. To implement an authentication system based on biometric parameters, which strengthens the security of sensitive assets in areas considered critical in various organizations by attaining the highest accuracy in user classification processes. By applying a convolutional neural network: MobileNet, viewing via computer and low-cost devices (Raspberry Pi 3). The system constitutes an authentication device for voice and face with 96% and 100% accuracy, respectively. Conclusion: The system shows that deep learning (Deep Convolutional Neural Networks), in combination with devices such as the Raspberry, generate a system capable of high performance in time and cost, as well as providing companies with a robust system featuring high accuracy in the correct recognition of the biometric patterns of users registered and trained by the system.

R. Blanco-Gonzalo, C. Lunerti, R. Sanchez-Reillo, and R. M. Guest, “Biometrics: Accessibility challenge or opportunity?,” PLoS One, vol. 13, no. 3, p. e0194111, Mar. 2018, doi: 10.1371/journal.pone.0194111.

E. Bertino, M. Kantarcioglu, C. G. Akcora, S. Samtani, S. Mittal, and M. Gupta, “AI for Security and Security for AI,” in CODASPY 2021 - Proceedings of the 11th ACM Conference on Data and Application Security and Privacy, Apr. 2021, pp. 333-334, doi: 10.1145/3422337.3450357.

A. De Keyser, Y. Bart, X. Gu, S. Q. Liu, S. G. Robinson, and P. K. Kannan, “Opportunities and challenges of using biometrics for business: Developing a research agenda,” J. Bus. Res., vol. 136, pp. 52-62, Nov. 2021, doi: 10.1016/j.jbusres.2021.07.028.

R. Blanco-Gonzalo et al., “Biometric Systems Interaction Assessment: The State of the Art,” IEEE Trans. Human-Machine Syst., vol. 49, no. 5, pp. 397-410, Oct. 2019, doi: 10.1109/THMS.2019.2913672.

G. C. Yang and H. Oh, “Implementation of a personal authentication system T-time,” in Proceedings - 2019 IEEE 12th Conference on Service-Oriented Computing and Applications, SOCA 2019, Nov. 2019, pp. 79-81, doi: 10.1109/SOCA.2019.00019.

A. Barros et al., “Data improvement model based on ecg biometric for user authentication and identification,” Sensors (Switzerland), vol. 20, no. 10, p. 2920, May 2020, doi: 10.3390/s20102920.

M. Gautier and D. Jaafar, “Legal issues surrounding data protection,” Soins, vol. 64, no. 838, pp. 36-39, Sep. 2019, doi: 10.1016/j.soin.2019.06.007.

R. De La Rocha Ladeira and R. Rodrigues Obelheiro, “Automatic challenge generation for teaching computer security,” in Proceedings - 2018 44th Latin American Computing Conference, CLEI 2018, Oct. 2018, pp. 774-783, doi: 10.1109/CLEI.2018.00098.

A. Das, S. K. Mohapatra, and L. P. Mishra, “Biometric detection using stroke dynamics,” in Lecture Notes in Networks and Systems, vol. 109, Springer, Singapore, 2020, pp. 458-466.

P. Kumar, R. Saini, B. Kaur, P. P. Roy, and E. Scheme, “Fusion of neuro-signals and dynamic signatures for person authentication,” Sensors (Switzerland), vol. 19, no. 21, Nov. 2019, doi: 10.3390/s19214641.

P. Panasiuk, M. DÄ…browski, and K. Saeed, “Keystroke dynamics and face image fusion as a method of identification accuracy improvement,” in Advances in Intelligent Systems and Computing, 2017, vol. 567, pp. 187-196, doi: 10.1007/978-981-10-3409-1_13.

V. Sujitha and D. Chitra, “A Novel Technique for Multi Biometric Cryptosystem Using Fuzzy Vault,” J. Med. Syst., vol. 43, no. 5, pp. 1-9, Mar. 2019, doi: 10.1007/s10916-019-1220-x.

L. Alzubaidi et al., “Review of deep learning: concepts, CNN architectures, challenges, applications, future directions,” J. Big Data, vol. 8, no. 1, pp. 1-74, Mar. 2021, doi: 10.1186/s40537-021-00444-8.

Y. Hu, M. Lu, C. Xie, and X. Lu, “FIN-GAN: Face illumination normalization via retinex-based self-supervised learning and conditional generative adversarial network,” Neurocomputing, vol. 456, pp. 109-125, Oct. 2021, doi: 10.1016/j.neucom.2021.05.063.

J. Zeng, X. Qiu, and S. Shi, “Image processing effects on the deep face recognition system,” Math. Biosci. Eng., vol. 18, no. 2, pp. 1187-1200, 2021, doi: 10.3934/MBE.2021064.

C. S. Hsiao, C. P. Fan, and Y. T. Hwang, “Iris location and recognition by deep-learning networks-based design for biometric authorization,” in LifeTech 2021 - 2021 IEEE 3rd Global Conference on Life Sciences and Technologies, Mar. 2021, pp. 144-145, doi: 10.1109/LifeTech52111.2021.9391787.

A. C. Weaver, “Biometric authentication,” Computer (Long. Beach. Calif)., vol. 39, no. 2, pp. 96-97, Feb. 2006, doi: 10.1109/MC.2006.47.

K. M. Sudar, P. Deepalakshmi, K. Ponmozhi, and P. Nagaraj, “Analysis of Security Threats and Countermeasures for various Biometric Techniques,” in 2019 International Conference on Clean Energy and Energy Efficient Electronics Circuit for Sustainable Development, INCCES 2019, Dec. 2019, doi: 10.1109/INCCES47820.2019.9167745.

K. Sundararajan and D. L. Woodard, “Deep learning for biometrics: A survey,” ACM Comput. Surv., vol. 51, no. 3, May 2018, doi: 10.1145/3190618.

H. Mehraj and A. H. Mir, “A Survey of Biometric Recognition Using Deep Learning,” EAI Endorsed Trans. Energy Web, vol. 8, no. 33, pp. 1-16, 2021, doi: 10.4108/eai.27-10-2020.166775.

T. Gwyn, K. Roy, and M. Atay, “Face recognition using popular deep net architectures: A brief comparative study,” Futur. Internet, vol. 13, no. 7, p. 164, Jun. 2021, doi: 10.3390/fi13070164.

A. N. Razzaq, R. Ghazali, and N. K. El Abbadi, “Face Recognition - Extensive Survey and Recommendations,” Jul. 2021, pp. 1-10, doi: 10.1109/icoten52080.2021.9493444.

N. Poh and J. Korczak, “Hybrid biometric person authentication using face and voice features,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2001, vol. 2091 LNCS, pp. 348-353, doi: 10.1007/3-540-45344-x_51.

K. K. A. Ghany and H. M. Zawbaa, “Hybrid biometrics and watermarking authentication,” in Securing Government Information and Data in Developing Countries, IGI Global, 2017, pp. 37-61.

F. Richardson, D. Reynolds, and N. Dehak, “Deep neural network approaches to speaker and language recognition,” IEEE Signal Process. Lett., vol. 22, no. 10, pp. 1671-1675, Oct. 2015, doi: 10.1109/LSP.2015.2420092.

T. H. Iwan, H. M. Fahrezy, and R. P. Merliasari, “The Design and the Implementation of Security System Office Door Using Raspberry Pi Face Detection,” Mar. 2020, pp. 307-311, doi: 10.2991/assehr.k.200303.074.

K. KumarNagwanshi and S. Dubey, “Biometric Authentication using Human Footprint,” Int. J. Appl. Inf. Syst., vol. 3, no. 7, pp. 1-6, Aug. 2012, doi: 10.5120/ijais12-450568.

R. Want, “An introduction to RFID technology,” IEEE Pervasive Computing, vol. 5, no. 1. pp. 25-33, Jan. 2006, doi: 10.1109/MPRV.2006.2.

A. Noer, Z. B. Hasanuddin, and D. Djamaluddin, “Implementation of RFID based raspberry Pi for user authentication and offline intelligent payment system,” in QiR 2017 - 2017 15th International Conference on Quality in Research (QiR): International Symposium on Electrical and Computer Engineering, Dec. 2017, vol. 2017-Decem, pp. 251-255, doi: 10.1109/QIR.2017.8168491.

X. Zhang, D. Cheng, P. Jia, Y. Dai, and X. Xu, “An Efficient Android-Based Multimodal Biometric Authentication System with Face and Voice,” IEEE Access, vol. 8, pp. 102757-102772, 2020, doi: 10.1109/ACCESS.2020.2999115.

M. A. M. El-Bendary, H. Kasban, A. Haggag, and M. A. R. El-Tokhy, “Investigating of nodes and personal authentications utilizing multimodal biometrics for medical application of WBANs security,” Multimed. Tools Appl., vol. 79, no. 33-34, pp. 24507-24535, Jun. 2020, doi: 10.1007/s11042-020-08926-2.

I. B. Venkateswarlu, J. Kakarla, and S. Prakash, “Face mask detection using MobileNet and global pooling block,” in 4th IEEE Conference on Information and Communication Technology, CICT 2020, Dec. 2020, doi: 10.1109/CICT51604.2020.9312083.

Y. Zhou, Y. Liu, G. Han, and Y. Fu, “Face Recognition Based on the Improved MobileNet,” in 2019 IEEE Symposium Series on Computational Intelligence, SSCI 2019, Dec. 2019, pp. 2776-2781, doi: 10.1109/SSCI44817.2019.9003100.

Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.

Authors who publish with this journal agree to the following terms:

    1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
    2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
    3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).