Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
Ambient Assisted Living environments projects arise as technological responses of the scientific community to problems associated with the populationageing phenomenon. In theory, these environments should allow de-localization of healthcare services delivery and management to the home, thus containing the economic and social costs associated with old age. The VirtualECare project is one of those environments, enhanced with proactive techniques for a better user experience, focused on elderly chronic patients, through the ability of constant learning and adaption based in user interaction and its contexts. This learning and, consequently, adaption needs, however, unequivocally user identification, especially in multi-user environments. Traditional identification techniques and methodologies are not suitable for these scenario since, usually, require user interaction and wireless identification technique (e.g. RFID, Bluetooth) are very exposed to personification. In order to obtain the expected results we needed a more advanced technology. One possible, appropriate and already fairly developed technique is Facial Recognition. In this paper we present the VirtualECare project approach to Facial Recognition authentication techniques its advantages, disadvantages and possible implementations paths.
Healthcare projects that intend to decrease the economical and social costs of the real ageing population phenomenon, through the de-localisation of healthcare services delivery and management to the home, have been arising in the scientific community. The VirtualECare project is one of those, so called, Ambient Assisted Living environments, which we have taken a step forward with the introduction of proactive techniques for better adapting to its users, namely elderly or chronic patients, once it is able to learn with their interaction based in contexts. This learning, however, causes the system need to know with whom it is interacting. Basic detection techniques based in possible devices that users carries along with them (e.g. RFID tags, mobile phones, ...) are not good enough, since they can lose/forgot/switch them. To obtain the expected results the technology used has to be more advanced and available in several platforms. One possible and already fairly developed technique is Facial Recognition, and it appears to be the most appropriate one to handle the problem.This document exposes the initial approach of the VirtualECare project to the Facial Recognition area.
2008
In this paper, a novel method of authentication based on user-performed identification of known and unknown faces is described. The target group of the method is the elderly users for which the use of traditional techniques, such as passwords, personal identification numbers (PIN), or biometrics is not without problems. The performance of this method and authentication by PIN has been compared in a two-pass usability study. Our method performed significantly better than PIN. The method is suitable for low-security applications in hospitals and senior houses.
DEVELOPMENT OF AN ACCESS CONTROL SYSTEM USING FACIAL RECOGNITION, 2022
In this age where Information and Communication Technology (ICT) has become a widely used tool in every discipline and facet of life, there is a continual progression in its use in order to make life better, easier and safer. Over the years new technologies have been invented and they have reshaped and further enhanced the efficiency and capabilities of ICT. One of such areas which new ICT technologies has reshaped is human identification and authentication. This project relies on this new technologies in identifying people, using this feature to develop a door access control system which can be employed to further strengthen security in banks and various other places where deemed necessary. This project provides a web based platform for accessing and controlling an access control system. It relies on the advantages of web based platforms to give new advantage and competitive edge against existing systems. One key framework used in the project development is the Python OpenCV module which was used for face detection and recognition.
Many western countries around the world are experiencing a shift in population toward a higher percentage of older members. The increased care requirements and rising health care costs associated with this demographic shift are a concern to elderly care planners. In response to these developing issues Marek and Rantz have proposed a model known as ageing in place; it has been shown to result in health and social benefits to the elderly as well as lowered cost to the health care system. A common problem in the elderly population is memory loss, and more specifically, face-name memory loss attributed to a condition known as mild cognitive impairment. With enabling the ageing in place model in mind, this study proposes an assistive technology designed to help elderly people deal with the safety risks of living at home with face-name memory loss. Put simply, the proposed device monitors the front door for approaching visitors, attempts identification of the individual, then notifies the occupant if the visitor is known to them. A prototype device based on existing facial detection and recognition algorithms is designed, implemented, and the results are discussed.
IRJET, 2021
It is extremely important in today's world to secure identity of a person. Traditional methods like keys badges, passwords have low efficiency to stop intrusion. The main reason for the failure of these security measures is that the authentication is done on basis of passwords and codes generated by machines like our PIN and identity cards etc which can be forgotten, replicated or stolen hence it is easy to gain access in an restricted area. These problems can be solved using face recognition as it is very difficult to gain access for an intruder as it does not require any key, badge or password rather the only requirement is the face of a person.
Proceedings of the International Conference on Bio-inspired Systems and Signal Processing, 2015
In this paper we present experimental results comparing on-line drawings for control population (left and right hand) as well as Alzheimer disease patients. The drawings have been acquired by means of a digitizing tablet, which acquires time information angles and pressures. Experimental measures based on pressure and in-air movements appear to be significantly different for both groups, even when control population performs the tasks with the non-dominant hand.
International Journal of Recent Technology and Engineering
Security is now a prime concern for any individual in modern days. Theever-increasing graph of technological advancement in the field of Internet of things and other arenas have paved way for new development of smart web-based locking system which is based on face recognition for authentication. The proposed system uses a feature similar to Haar for the purpose of face detection and also Local Binary Pattern Histogram (LBPH). The project also extends its usability by sending live image of the guest which arrives and can even send a notification on the phone to the owner. The proposed system can be embedded along with other technologies to form a smart housing. The implementation of the project is done using Arduino board, python for programming, Open CV library is also included, and the hardware component also includes camera module for face recognition.
International Journal of Wireless and Microwave Technologies
In this fast-paced technological world, individuals want to access all their electronic equipment remotely, which requires devices to connect over a network via the Internet. However, it raises quite a lot of critical security concerns. This paper presented a home automation security system that employs the Internet of Things (IoT) for remote access to one's home through an Android application, as well as Artificial Intelligence (AI) to ensure the home's security. Face recognition is utilized to control door entry in a highly efficient security system. In the event of a technical failure, an additional security PIN is set up that is only accessible by the owner. Although a home automation system may be used for various tasks, the cost is prohibitive for many customers. Hence, the objective of this paper is to provide a budget and user-friendly system, ensuring access to the application and home attributes by using multi-modal security. Using Haar Cascade and LBPH the system achieved 92.86% accuracy while recognizing face.
1995
We present a biometric access control device which is based on the identification of human faces. The system combines a console for semi-automated image acquisition with the necessary algorithms for face recognition. Facial features are stored in a relatively compact data format (1.6 kB). The system uses an extension of the Elastic Graph Matching Algorithm of [1] which has been ported here to a standard PC (Pentium 90 without any special accelerator hardware) where it performs image acquisition, face localization and identification in 3.5 seconds. The system not only allows robust identification of stored persons (despite changes in facial expression or size), but also reliable rejection of unknown persons. With an acceptance criterion which safely rejects all unknown persons we achieve an identification rate above 96% (FRR=4%) on a database of 87 persons. 1 Introduction Face recognition is a remarkable example for the ability of humans to perform with great reliability a complex vi...
Bulletin of Electrical Engineering and Informatics, 2021
Many sophisticated smart door lock systems have been made. Still, most of them required the user to use an additional device such as a smartphone, tag, smartcard, or accessing some user interfaces, which is complicated to use for inexperienced elderly. This condition creates a gap between the elderly and technology which makes it difficult for the elderly to accept and use the technology. In this paper, we proposed a smart and real-time door lock system for an elderly user based on local binary pattern histogram as a face recognition algorithm with modular system architecture design. The novelty in our proposed system design, it does not require any additional device, it does not use any user interface, and the least user participation by automating the processes. All the user needs to do just walk toward the door and stand in front of it and the door will automatically unlock and locked back after the user enters the house and close the door. The system resulted in an accuracy of 98%, with an average processing time is 1.449 seconds for the entire process. Additional advantages, the system is designed with a modular approach that makes it flexible and scalable for further development.
Journal of Ambient …
Behavioural biometrics aims at providing means of automating the recognition of a person’s behavioral traits in every-day life, derived from specific actions, attitude, expressions and general conduct. Behavioural biometrics recognition and profiling systems should incorporate reliable schemes to determine and ascertain the psychological and physical status of a person. Behavioural biometrics find a special field of application in the case of Assisted Living, in which individuals suffering from various diseases in different stages need supervision in their daily activities as they cannot function on their own or are in need of help—minor or not. By using biometrics, unobtrusive support for daily life activities can be provided to elderly people through smart interfaces incorporating emotion classification, movement detection, person identification, pattern and activity recognition techniques integrated in their personal environment. Thus, an elderly individual’s mood and activities could be determined and appropriate solutions suggested by the system, such as calls for help in case of a fall and alarms to relatives or doctors, and all this inside the framework of “what are the patient’s actions and status”.
Face Recognition, 2007
Engineering, Technology & Applied Science Research
Behavioral biometrics aim at providing algorithms for the automatic recognition of individual behavioral traits, stemming from a person’s actions, attitude, expressions and conduct. In the field of ambient assisted living, behavioral biometrics find an important niche. Individuals suffering from the early stages of neurodegenerative diseases (MCI, Alzheimer’s, dementia) need supervision in their daily activities. In this context, an unobtrusive system to monitor subjects and alert formal and informal carers providing information on both physical and emotional status is of great importance and positively affects multiple stakeholders. The primary aim of this paper is to describe a methodology for recognizing the emotional status of a subject using facial expressions and to identify its uses, in conjunction with pre-existing risk-assessment methodologies, for its integration into the context of a smart monitoring system for subjects suffering from neurodegenerative diseases. Paul Ekma...
IEEE Access
One of the challenges of mobile health is to provide a way of maintaining privacy in the access to the data. Especially when using ICT for providing access to health services and information. In these scenarios, it is essential to determine and verify the identity of users to ensure the security of the network. A way of authenticating the identity of each patient, doctor or any stakeholder involved in the process, is to use a software application that analyzes the face of them through the cams integrated in their devices. The selection of an appropriate facial authentication software application requires a fair comparison between alternatives through a common database of face images. Users usually carry out authentication with variations in their aspects while accessing to health services. This article presents both (a) a database of facial images that combines the most common variations that can happen in the participants and (b) an algorithm that establishes different levels of access to the data based on data sensitivity levels and the accuracy of the authentication.
Optical Engineering, 2001
In this paper, an improvement of a face recognition method is proposed. The goal is to develop an easy to use access control software, allowing Personal Computer or building access control with minimal constraints for the users. This approach requires a high-speed classification method (about eight images/sec), and a high global recognition rate. We obtain good results using a method derived from Principal Component Analysis, a geometric transformation of the feature space, and a fast decision algorithm.
International Journal for Research in Applied Science and Engineering Technology, 2021
Experimental results show that the recognition accuracy improves without increasing the false-positive rate even if the incremental learning proceeds. Face Recognition tasks can easily be implemented with an incremental learning approach. Many different facial recognition algorithms are freely available on the internet today, amongst all these, we selected the one giving us best accuracy (99.38%) and decided to make a meaningful system out of it, our goal is to prepare an internet-ready facial recognition system to be used to make a secure military base.
Journal of Computing Research and Innovation
Security is a major concern within companies to prevent access to information by unauthorized persons. In this work, we are interested in access control through facial recognition. To realize this access control system based on facial recognition, we used an embedded system under Arduino which gives us the possibility to assemble the performances of programming and electronics, more precisely, we programmed electronic systems for the automatic opening of doors without the action of a human being. From a sample of 100 individuals composed of 40 women and 60 men, 75 of whom were registered and 25 non-registered, our access control system obtained the results of 70 true positives, 5 false negatives, 8 false positives and 17 true negatives that constitute our confusion matrix. However, from the set of tests performed we can conclude that multi-modality fusion can be leveraged to increase the performance of the verification system as the verification performance of multimodal systems (f...
We aim at creating ease in authentication process through non-password-based au-thentication scheme for the Dementia patients. The chronic neuro-degenerative disease leaves the patients with memory recall/loss issues. With ever growing rich list of assistive technologies , that bring ease in patient's daily life i.e. remote Electrocardiography and peripheral capillary oxygen saturation monitoring, remote blood glucose level monitoring applications etc. These assistive technologies are ubiquitous, seamless, immersed in the background, often remotely monitored, and the most intimate applications that run very close to the patient's physiology. In this paper, we investigate the existing technologies and discover the trends to build Yet Another Authentication Method (YAAM). The YAAM is going to extract a distinctive image from a patient's viewfinder and securely transform it into authentication token that are supported by the Geo-location, relative proximity of surrounding smart objects etc. that we call security context. The authentication tokens are only generated on the fly when token context is right for the image stream captured by the wearable camera. The results presented in this paper not only present the pros and cons of the existing alternative authentication technologies, they also aide in the development of the YAAM prototype.
Applied Mechanics and Materials, 2015
The aim of the project is to implement a facial recognition system for access control to enter a room. The facial image captured by a webcam and then be detected/tracked using Haar face tracking algorithm. Principal Component Analysis (PCA) and Linear Discriminant Analysis (LDA) algorithm have been used for face recognition. The system was tested with 10 users from the member of a laboratory room. Each user registered 100 images for training of the PCA and LDA. The recognition rate achieved using PCA was 70% and 97% for LDA.
IJISCS (International Journal of Information System and Computer Science)
This paper investigates the decisions made on two singles modal biometric systems based on facial recognition and fingerprints for access control. In order to carry out this study on the access control system based on fingerprint and facial recognition, we made biometric recognition systems based on fingerprints and facial recognition that interacts with an embedded system under Arduino to give us the possibility to assemble the performances of programming and electronics, more precisely, we programmed electronic systems for the automatic opening of doors without the action of a human being. In a sample of one hundred individuals composed of 40 females and 60 males, 75 of whom were enrolled and 25 of whom were not, our two singles modal access control systems each obtained the following results: 70 true positives, 5 false negatives, 8 false positives and 17 true negatives for the facial recognition system, compared to 73 true positives, 2 false negatives, 4 false positives and 21 tr...
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.