2020
DOI: 10.20998/2079-0023.2020.02.12
|View full text |Cite
|
Sign up to set email alerts
|

Mobile Access Control System Based on Rfid Tags and Facial Information

Abstract: RFID tags see a widespread use in modern security systems, including home intercoms, access control cards, contactless credit cards, biometric passports. Here we focus on a single application, namely access control systems. Currently they have either high cost or low security guarantees. Hence, the developments focusing on improving access control security while lowering the cost is a rapidly developing field. The purpose of this work is to create an alternative access control scheme, where card scanners are r… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 3 publications
0
3
0
Order By: Relevance
“…However, up to this point we didn't specify if there is any difference in face detection quality between different resolutions. As algorithms pre- sented in this survey have been trained on different datasets, we will conduct visual quality testing targeting mobile face control system [2]. During the experiment, we will score each algorithm from 0 to 3.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…However, up to this point we didn't specify if there is any difference in face detection quality between different resolutions. As algorithms pre- sented in this survey have been trained on different datasets, we will conduct visual quality testing targeting mobile face control system [2]. During the experiment, we will score each algorithm from 0 to 3.…”
Section: Methodsmentioning
confidence: 99%
“…Low face detection inference time is crucial for mobile applications, such as driver sleepiness tracking, emotion recognition or mobile face access controls systems [1], [2]. However, many of the recent research papers focus on algorithm quality, disregarding inference time.…”
Section: Introductionmentioning
confidence: 99%
“…The Module consists of an electromagnetic reader, when the key tag or the ID card containing the RF chip is placed parallel to the electromagnetic reader (Al-Sudani et al, 2018); the reader reads the data in the chip and sends it to the module. The module after processing the data identifies the secure number embedded in the chip and provides it to the micro controller, where the microcontroller crosschecks the data from its database with the received data to know if it's an authorized member or an intruder (Khabarlak & Koriashkina, 2020).…”
Section: Rfid Em Reader Modulementioning
confidence: 99%