Visible to the public Security Lock with Effective Verification Traits

TitleSecurity Lock with Effective Verification Traits
Publication TypeConference Paper
Year of Publication2019
AuthorsAhmed, Syed Umaid, Sabir, Arbaz, Ashraf, Talha, Ashraf, Usama, Sabir, Shahbaz, Qureshi, Usama
Conference Name2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE)
Keywordsauthorisation, Cameras, face recognition, facial recognition, feature extraction, Fingerprint recognition, graphical user interfaces, Human Behavior, interactive GUI, learning (artificial intelligence), Linux, machine learning, machine learning operations, multi-layer, multilevel security system, multiple layer security system, password, pattern locks, physical security, pubcrawl, Raspberry Pi microcomputers, recognition, Resiliency, Scalability, security, security lock, security locker solution, smart box, speech pattern recognition, Speech recognition, TensorFlow, vein pattern recognition, vein recognition, Veins, verification traits, Viola and Jones
AbstractTo manage and handle the issues of physical security in the modern world, there is a dire need for a multilevel security system to ensure the safety of precious belongings that could be money, military equipment or medical life-saving drugs. Security locker solution is proposed which is a multiple layer security system consisting of various levels of authentication. In most cases, only relevant persons should have access to their precious belongings. The unlocking of the box is only possible when all of the security levels are successfully cleared. The five levels of security include entering of password on interactive GUI, thumbprint, facial recognition, speech pattern recognition, and vein pattern recognition. This project is unique and effective in a sense that it incorporates five levels of security in a single prototype with the use of cost-effective equipment. Assessing our security system, it is seen that security is increased many a fold as it is near to impossible to breach all these five levels of security. The Raspberry Pi microcomputers, handling all the traits efficiently and smartly makes it easy for performing all the verification tasks. The traits used involves checking, training and verifying processes with application of machine learning operations.
DOI10.1109/ICCIKE47802.2019.9004341
Citation Keyahmed_security_2019