Visible to the public Implementation of Two Factor Authentication based on RFID and Face Recognition using LBP Algorithm on Access Control System

TitleImplementation of Two Factor Authentication based on RFID and Face Recognition using LBP Algorithm on Access Control System
Publication TypeConference Paper
Year of Publication2020
AuthorsWahyudono, Bintang, Ogi, Dion
Conference Name2020 International Conference on ICT for Smart Society (ICISS)
Date PublishedNov. 2020
PublisherIEEE
ISBN Number978-1-6654-0422-8
KeywordsAccess Control, authentication, face recognition, Histograms, Human Behavior, human factors, LBP, photo attack, process control, Prototypes, pubcrawl, radiofrequency identification, RFID, security, spoofing detection, Two factor Authentication
AbstractStudies on two-factor authentication based on RFID and face recognition have been carried out on a large scale. However, these studies didn't discuss the way to overcome the weaknesses of face recognition authentication in the access control systems. In this study, two authentication factors, RFID and face recognition, were implemented using the LBP (Local Binary Pattern) algorithm to overcome weaknesses of face recognition authentication in the access control system. Based on the results of performance testing, the access control system has 100% RFID authentication and 80% face recognition authentication. The average time for the RFID authentication process is 0.03 seconds, the face recognition process is 6.3885 seconds and the verification of the face recognition is 0.1970 seconds. The access control system can still work properly after three days without being switched off. The results of security testing showed that the capabilities spoofing detection has 100% overcome the photo attack.
URLhttps://ieeexplore.ieee.org/document/9307564
DOI10.1109/ICISS50791.2020.9307564
Citation Keywahyudono_implementation_2020