Skip to main content

Machine Learning Techniques for Intelligent Access Control

  • Chapter
  • First Online:
  • 1021 Accesses

Part of the book series: Intelligent Systems Reference Library ((ISRL,volume 108))

Abstract

Access control is a set of regulations that governs access to certain areas or information. By access we mean entering a specific area, or logging on a machine. The access regulated by a set of rules that specifies who is allowed to get access and what is the restrictions on such access. Across the years several access control systems have been developed. Due to the rapid advancement in technology over the past years, older systems are now easily by passed, thus the need to have new methods of access control. Biometrics is referred to as an authentication technique that relies on a computer system to electronically validate a measurable biological characteristic that is physically unique and cannot be duplicated. Biometrics has been used for ages as access control security system. In this chapter we will present several biometric techniques their usage, advantages and disadvantages.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Biometrics History: Biometrics.gov. http://www.biometrics.gov/Documents/BioHistory.pdf (2014). Accessed 26 Apr 2014

  2. Gupta, C.N., Palaniappan, R.: Biometric paradigm using visual evoked potential. In: Encyclopedia of Information Science and Technology, vol. 1, 2nd edn, pp. 362–368 (2009)

    Google Scholar 

  3. Liu, S., Silverman, M.: A practical guide to biometric security technology. IT Prof. 3(1), 27–32 (2001)

    Article  Google Scholar 

  4. Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40(31), 614–634 (2001)

    Article  Google Scholar 

  5. Yun, Y.W.: The ‘123’ of biometric technology. In: Biometrics Working Group of Security and Privacy Standards Technical Committee, pp. 80–96 (2002)

    Google Scholar 

  6. Jafri, R., Arabnia, H.R.: A survey of face recognition techniques. J. Inf. Process. Syst. 5(2), 41–68 (2009)

    Article  Google Scholar 

  7. Wildes, R.P.: Iris recognition: an emerging biometric technology. Proc. IEEE 85(9), 1348–1363 (1997)

    Article  Google Scholar 

  8. Shen, P., Andrew, B., Jin, T., Shiang, Y.: A survey of keystroke dynamics biometrics. Sci. World J. 1–24 (2013)

    Google Scholar 

  9. Fabian, M., Aviel, R.: Keystroke dynamics as a biometric for authentication. Future Gener. Comput. Syst. 16, 351–359 (2000)

    Article  Google Scholar 

  10. Biometrics.gov. http://www.biometrics.gov/ (2014). Accessed 26 Apr 2014

  11. Arun, R., Anil, J.: Information fusion in biometrics. Pattern Recogn. Lett. 24, 2115–2125 (2003)

    Article  Google Scholar 

  12. Ross, A., Jain, A.K.: Fusion techniques in multibiometric systems. In: Face Biometrics for Personal Identification, pp. 185–212. Springer (2007)

    Google Scholar 

  13. Ross, A., Nandakumar, K., Jain, A.K.: Handbook of Multibiometrics. Springer Science + Business Media, LLC (2006)

    Google Scholar 

  14. ISO/IEC TR 24722. Information technology. In: Biometrics: Multimodal and Other Multibiometric Fusion (2007)

    Google Scholar 

  15. Riera, A., Soria-Frisch, A., Caparrini, M., Cester, I., Ruffini, G.: Multimodal physiological biometrics authentication. In: Biometrics: Theory, Methods, and Applications, pp. 461–482. Wiley Press (2010)

    Google Scholar 

  16. ENOBIO. http://www.neuroelectrics.com/enobio (2014). Accessed 26 Apr 2014

  17. Ramaswamy, P.: Multiple mental thought parametric classification: a new approach for individual identification. Proc. Int. J. Signal Process. 2, 222–226 (2006)

    Google Scholar 

  18. Cempírek, M., Šťastný, J.: The optimization of the EEG-based biometric classification. Appl. Electron. 25–28 (2007)

    Google Scholar 

  19. Forecasting with Artificial Neural Networks. http://www.neural-forecasting.com/lvq_neural_nets.htm (2014). Accessed 26 Apr 2014

  20. Sun, S.: Multitask learning for EEG-based biometrics. In: Proceeding of International Conference on Pattern Recognition, pp. 51–55 (2008)

    Google Scholar 

  21. Jain, K.A., Pankanti, S., Prabhakar, S., Uludag, U.: Issues and challenges. Proc. IEEE 92(6), 948–960 (2004)

    Article  Google Scholar 

  22. Finger Print Features. http://biometrics.derawi.com/wp-content/uploads/2011/01/fingerprint_definition.jpg (2014). Accessed 26 Apr 2014

  23. Face Recognition Features. http://www.engineersgarage.com/sites/default/files/imagecache/Original/wysiwyg_imageupload/28714/Face-Recognition.jpg (2014). Accessed 26 Apr 2014

  24. Iris Features. http://www.cl.cam.ac.uk/~jgd1000/iriscode.jpg (2014). Accessed 26 Apr 2014

  25. KeyStroke Features. http://img.zdnet.com.cn/0/702/liIVtnoGEwL5o.jpg (2014). Accessed 26 Apr 2014

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wael H. Khalifa .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Khalifa, W.H., Roushdy, M.I., Salem, AB.M. (2016). Machine Learning Techniques for Intelligent Access Control. In: Kountchev, R., Nakamatsu, K. (eds) New Approaches in Intelligent Image Analysis. Intelligent Systems Reference Library, vol 108. Springer, Cham. https://doi.org/10.1007/978-3-319-32192-9_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-32192-9_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-32190-5

  • Online ISBN: 978-3-319-32192-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics