Seamless personnel authentication using facial recognition and identity-based identification on mobile devices

Jun Ren Tan, Wai Kit Chin, Ji Jian Chin, Vik Tor Goh

Research output: Contribution to journalArticlepeer-review

Abstract

Security systems for buildings are no longer an uncommon thing in daily life with increasingly complex access control systems to achieve secured building security system. Achieving a hassle-free yet secure access control systems has been always a challenge for organizations especially for those managing large buildings. In this project, we develop a prototype that utilizes a combination of biometric and cryptography based security schemes to grant access control on personnel going in and out of a building. Our development achieves two-factor authentication in one single step which provides users a seamless experience for authentication. The identity-based identification (IBI) scheme that is based on number-theoretic cryptography is implemented on mobile devices to allow the identification scheme to run in the background. A face recognition system and web server is also developed which can be deployed on any PC at the market. The novelty lies in the combination of the two, with the face recognition making potential intruders difficult to forge biometric data of honest users, and the identity-based scheme preventing the adversary to learn any secrets from the authentication process, while allowing honest users to verify themselves from face to smartphone without any user intervention, thus creating a seamless authentication experience.

Original languageEnglish
Pages (from-to)41-46
Number of pages6
JournalInternational Journal of Recent Technology and Engineering
Volume8
Issue number3 Special Issue
DOIs
Publication statusPublished - Oct 2019
Externally publishedYes

ASJC Scopus subject areas

  • General Engineering
  • Management of Technology and Innovation

Keywords

  • Door lock
  • Face recognition
  • Identity-based identification
  • Mobile application
  • Seamless two-factor authentication

Fingerprint

Dive into the research topics of 'Seamless personnel authentication using facial recognition and identity-based identification on mobile devices'. Together they form a unique fingerprint.

Cite this