Hiding RFID in the image matching based access control to a smart building
- Publication Type:
- Conference Proceeding
- Citation:
- Proceedings - 2018 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovations, SmartWorld/UIC/ATC/ScalCom/CBDCom/IoP/SCI 2018, 2018, pp. 1988 - 1993
- Issue Date:
- 2018-12-04
Closed Access
Filename | Description | Size | |||
---|---|---|---|---|---|
08560310.pdf | Published version | 218.29 kB |
Copyright Clearance Process
- Recently Added
- In Progress
- Closed Access
This item is closed access and not available.
© 2018 IEEE. in recent years, Radio Frequency Identification (RFID) technology gone from obscurity concept into traded applications that often use to increase the security systems. RFID has been defined as a wireless communication technology utilized to allow computers for reading the identity electronic tags from a distance. Although the many benefits and strengths of the RFID, it contains some weaknesses which led to the use of additional technology to support it. So, this paper used the face detection technique, as a method to support RFID work, to ensure that the person using RFID is the authorized user. The proposed model implements the Canny detection algorithm to identify the face user and verify the user was accepted or rejected. This model has been implemented by capture image of the user with used RFID to access the database. It contains user's image that holding the RFID hidden by LSB algorithm. after that, the model extracts the hidden RFID for matching it with the RFID used to verify its validity then identify the user is authorized or not.
Please use this identifier to cite or link to this item: