Skip to main content

Sentinel: An Enhanced Multimodal Biometric Access Control System

  • Conference paper
  • First Online:
Big Data Analytics in Astronomy, Science, and Engineering (BDA 2022)

Abstract

Every place be it a household or organization, big or small, like banks have something that needs to be secured to ensure efficient operations and management. Security is always a concern as what is being protected is valuable. Security systems based on singular or multiple biometrics such as face, voice, iris, fingerprint and palm along with things being carried in person such as RFID card or security key(s) are used along with or instead of pin, password based existing lock systems is mostly used because of the uniqueness and added layer of security provided by the aforementioned features. But the implementation of these features alone is not sufficient to thwart any malicious actions to gain access to a secure location, due to rise in technology capable of beating/bypassing said security systems. Thus, this paper proposes a robust security system that will be take care of security requirements of any location that might contain something valuable and to be retrofitted with the problems prevailing in the present systems. The proposed system is capable of detecting & recognizing a person’s face, their emotion based on facial expression, the liveliness factor of their face to determine physical presence, identifying the speaker along with a word/phrase in their speech and detecting factors in the surrounding environment that may threaten a user. The system is designed in a way such that anyone who wants to enter/access a secure location has to pass through all of these layers like password, facial recognition, facial emotion recognition, facial liveliness recognition, speaker recognition, speaker phrase detection, and environmental threat detection etc. of security working in unison, none of which can be bypassed easily. All the sensors for detecting, identifying and recognizing said biometric features are securely connected to a singular security device to ensure success of this goal.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Murugan, K.H.S., Jacintha, V., Shifani, S.A.: Security system using raspberry Pi. In: 2017 Third International Conference on Science Technology Engineering & Management (ICONSTEM), Chennai, pp. 863–864 (2017)

    Google Scholar 

  2. Wati, D.A.R., Abadianto, D.: Design of face detection and recognition system for smart home security application. In: 2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE), Yogyakarta, pp. 342–347 (2017)

    Google Scholar 

  3. Sayem, I.M., Chowdhury, M.S.: Integrating face recognition security system with the internet of things. In: 2018 International Conference on Machine Learning and Data Engineering (iCMLDE), Sydney, Australia, pp. 14–18 (2018)

    Google Scholar 

  4. Mantoro, T., Ayu, M.A., Suhendi: Multi-faces recognition process using haar cascades and eigenface methods. In: 2018 6th International Conference on Multimedia Computing and Systems (ICMCS), Rabat, pp. 1–5 (2018)

    Google Scholar 

  5. Gusain, R., Jain, H., Pratap, S.: Enhancing bank security system using face recognition, iris scanner and palm vein technology. In: 2018 3rd International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU), Bhimtal, pp. 1–5 (2018)

    Google Scholar 

  6. Gulzar, K., Sang, J., Tariq, O.: A cost effective method for automobile security based on detection and recognition of human face. In: 2017 2nd International Conference on Image, Vision and Computing (ICIVC), Chengdu, pp. 259–263 (2017)

    Google Scholar 

  7. Patoliya, J.J., Desai, M.M.: Face detection based ATM security system using embedded Linux platform. In: 2017 2nd International Conference for Convergence in Technology (I2CT), Mumbai, pp. 74–78 (2017)

    Google Scholar 

  8. Kim, M., Lee, D.G., Kim, K.-Y.: System architecture for real-time face detection on analog video camera. Int. J. Distrib. Sens. Netw. 11, 1–11 (2015)

    Google Scholar 

  9. Chen, Y., Chen, Z., Xu, L.: RFID system security using identity-based cryptography. In: 2010 Third International Symposium on Intelligent Information Technology and Security Informatics, Jinggangshan, pp. 460–464 (2010)

    Google Scholar 

  10. Shaikh, S., Raskar, R., Pande, L., Khan, Z., Guja, S.P.: Threat detection in hostile environment with deep learning based on drone’s vision. In: 2020 International Research Journal of Engineering and Technology (IRJET) (2020)

    Google Scholar 

  11. Oran Brigham, E.: The Fast Fourier Transform and Its Applications. Prentice-Hall Inc., Hoboken (1988)

    MATH  Google Scholar 

  12. Li, R., Jiang, J.Y., Liu, J., Hsieh, C.C., Wang, W.: Automatic speaker recognition with limited data. In: Proceedings of the 13th International Conference on Web Search and Data Mining (WSDM 2020), pp. 340–348. Association for Computing Machinery, New York 2020. https://doi.org/10.1145/3336191.3371802

  13. Madan, S., Bhardwaj, K., Gupta, S.: Critical analysis of big data privacy preservation techniques and challenges. In: Khanna, A., Gupta, D., Bhattacharyya, S., Hassanien, A.E., Anand, S., Jaiswal, A. (eds.) International conference on innovative computing and communications. AISC, vol. 1394, pp. 267–278. Springer, Singapore (2022). https://doi.org/10.1007/978-981-16-3071-2_23

    Chapter  Google Scholar 

  14. Madan, S., Goswami, P.: Hybrid privacy preservation model for big data publishing on cloud. Int. J. Adv. Intell. Paradigms 20(3–4), 343–355 (2021). https://doi.org/10.1504/IJAIP.2021.119022

    Article  Google Scholar 

  15. Boopalan, S., Ramkumar, K., Ananthi, N., Goswami, P., Madan, S.: Implementing ciphertext policy encryption in cloud platform for patients’ health information based on the attributes. In: Singh, V., Asari, V.K., Kumar, S., Patel, R.B. (eds.) Computational Methods and Data Engineering. AISC, vol. 1227, pp. 547–560. Springer, Singapore (2021). https://doi.org/10.1007/978-981-15-6876-3_44

    Chapter  Google Scholar 

  16. Moon, M.M.H., Ghosh, D.K., Chisty, N.A., Jeb, M.A., Islam, M.M.: Design and implementation of a vault security system. In: 1st International Conference on Advances in Science, Engineering and Robotics Technology 2019 (ICASERT 2019) (2019)

    Google Scholar 

  17. Puri, V., Kaur, P., Sachdeva, S.: Effective removal of privacy breaches in disassociated transactional datasets. Arab. J. Sci. Eng. 45, 3257–3272 (2020)

    Article  Google Scholar 

  18. Madan, J., Madan, S.: Intelligent and personalized factoid question and answer system. In: 2022 10th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), pp. 1–7 (2022). https://doi.org/10.1109/ICRITO56286.2022.9964818

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Suman Madan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Krishna Khanth, N., Jain, S., Madan, S. (2023). Sentinel: An Enhanced Multimodal Biometric Access Control System. In: Sachdeva, S., Watanobe, Y., Bhalla, S. (eds) Big Data Analytics in Astronomy, Science, and Engineering. BDA 2022. Lecture Notes in Computer Science, vol 13830. Springer, Cham. https://doi.org/10.1007/978-3-031-28350-5_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-28350-5_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-28349-9

  • Online ISBN: 978-3-031-28350-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics