Hiding RFID in the image matching based access control to a smart building

Publication Type:
Conference Proceeding
Citation:
Proceedings - 2018 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovations, SmartWorld/UIC/ATC/ScalCom/CBDCom/IoP/SCI 2018, 2018, pp. 1988 - 1993
Issue Date:
2018-12-04
Filename Description Size
08560310.pdfPublished version218.29 kB
Adobe PDF
Full metadata record
© 2018 IEEE. in recent years, Radio Frequency Identification (RFID) technology gone from obscurity concept into traded applications that often use to increase the security systems. RFID has been defined as a wireless communication technology utilized to allow computers for reading the identity electronic tags from a distance. Although the many benefits and strengths of the RFID, it contains some weaknesses which led to the use of additional technology to support it. So, this paper used the face detection technique, as a method to support RFID work, to ensure that the person using RFID is the authorized user. The proposed model implements the Canny detection algorithm to identify the face user and verify the user was accepted or rejected. This model has been implemented by capture image of the user with used RFID to access the database. It contains user's image that holding the RFID hidden by LSB algorithm. after that, the model extracts the hidden RFID for matching it with the RFID used to verify its validity then identify the user is authorized or not.
Please use this identifier to cite or link to this item: