Skip to main content

Checking an Authentication of Person Depends on RFID with Thermal Image

  • Conference paper
  • First Online:
Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS 2018)

Abstract

The developed cameras help researchers attempting to imitate the human brain by distinguishing between people by many techniques were mentioned in the literature. Distinguishing between the human beings is being done by the image picked up by the visible light cameras in a classical method, because of this cameras do not provide enough amount of information. Therefore, the Kinect camera is distinguished assists researchers in obtaining tangible results from cameras development which presented the normal of integrative of the depth information and RGB information. This paper presents a model for face detection and recognition by the Kinect technique to some fundamental problems in the computer vision. This model is suggested in the environment of the company: firstly, to prove the reliability of the Kinect outputs. Secondly, detection about the depth of the human face by using maps drawing to distinguish the real human face, and get rid of the fraud processes, from which technique of face detection and recognition suffer. Finally, the suggested model has used the tracking algorithm that represents one of the system stages to provide the most significant amount of security. And in the end, tests are done by using our database obtained from the RGB camera in Kinect.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mohammed, T.S., Al-Azzo, W.F., Al Mashani K.M.: Image processing development and implementation: a software simulation using Matlab®. In: Proceedings of the 6th International Conference on Information Technology (2013)

    Google Scholar 

  2. Bougrine, A., Harba, R., Canals, R., Ledee, R., Jabloun, M.: A joint snake and atlas-based segmentation of plantar foot thermal images. In: 2017 Seventh International Conference on Image Processing Theory, Tools and Applications, IPTA, pp. 1–6. IEEE (2017)

    Google Scholar 

  3. Lakshmi, K.D., Muthaiah, R., Kannan, K., Tapas, A.M.: Evaluation of local feature detectors for the comparison of thermal and visual low altitude aerial images. Defence Sci. J. 68(5) (2018)

    Google Scholar 

  4. Zhang, L., Xie, X., Feng, S., Luo, M.: Heuristic dual-tree wavelet thresholding for infrared thermal image denoising of underground visual surveillance system. Opt. Eng. 57(8), 083102 (2018)

    Google Scholar 

  5. Zhu, Y.: Research on the architecture and behavior model of high-speed channel for thermal image processing. Wirel. Pers. Commun. 102(4), 3869–3877 (2018)

    Article  Google Scholar 

  6. Si, L., Wang, Z., Liu, Y., Tan, C.: Online identification of shearer cutting state using infrared thermal images of cutting unit. Appl. Sci. 8(10), 1772 (2018)

    Article  Google Scholar 

  7. Kähm, O., Damer, N.: 2D face liveness detection: an overview. In: 2012 BIOSIG-Proceedings of the International Conference of the Bio-Metrics Special Interest Group, BIOSIG, pp. 1–12. IEEE (2012)

    Google Scholar 

  8. Fornaser, A., Tomasin, P., De Cecco, M., Tavernini, M., Zanetti, M.: Automatic graph based spatiotemporal extrinsic calibration of multiple Kinect V2 ToF cameras. Robot. Auton. Syst. 98, 105–125 (2017)

    Article  Google Scholar 

  9. Al-Sudania, A.R., Zhoub, W., Liuc, B., Almansoorid, A., Yange, M.: Detecting unauthorized RFID tag carrier for secure access control to a smart building. Int. J. Appl. Eng. Res. 13(1), 749–760 (2018)

    Google Scholar 

  10. Li, B.Y., Mian, A.S., Liu, W., Krishna, A.: Using Kinect for face recognition under varying poses, expressions, illumination and disguise. In: 2013 IEEE Workshop on Applications of Computer Vision, WACV, pp. 186–192. IEEE (2013)

    Google Scholar 

  11. Goswami, G., Bharadwaj, S., Vatsa, M., Singh, R.: On RGB-D face recognition using Kinect. In: 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems, BTAS, pp. 1–6. IEEE (2013)

    Google Scholar 

  12. Ghiass, R.S., Arandjelović, O., Bendada, A., Maldague, X.: Infrared face recognition: a comprehensive review of methodologies and databases. Pattern Recogn. 47(9), 2807–2824 (2014)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ahmed Raad Al-Sudani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Al-Sudani, A.R., Gao, S., Wen, S., Al-Khiza’ay, M. (2018). Checking an Authentication of Person Depends on RFID with Thermal Image. In: Wang, G., Chen, J., Yang, L. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2018. Lecture Notes in Computer Science(), vol 11342. Springer, Cham. https://doi.org/10.1007/978-3-030-05345-1_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-05345-1_32

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-05344-4

  • Online ISBN: 978-3-030-05345-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics