Abstract
In this paper, the proposal system can achieve the more safety of RFID System with the 2-step authentication procedures for the enhancement about the security of general RFID systems. After authentication RFID Tag, additionally, the proposal system extract the characteristic information in the user image for acquisition of the additional authentication information of the user with the camera. In this paper, the system which was proposed more enforce the security of the automatic entrance and exit authentication system with the cognitive characters of RFID Tag and the extracted characteristic information of the user image through the camera. The RFID system which use the active tag and reader with 2.4GHz bandwidth can recognize the tag of RFID in the various output manner. Additionally, when the RFID system have errors, the characteristic information of the user image is designed to replace the RFID system as it compare with the similarity of the color, outline and input image information which was recorded to the database previously. In the result of experiment, the system can acquire more exact results as compared with the single authentication system when it using RFID Tag and the information of color characteristics.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Yang, K.-M., Sun, M.-T., Wu, L.: A family of vlsi designs for the motion compensation block-matching algorithm. IEEE Transactions on Circuits and Systems 36, 1317–1325 (1989)
Wang, J., Wang, D., Zhao, Y.: A novel anti-collision algorithm with dynamic tag number estimation for rfid systems. In: International Conference on Communication Technology, ICCT 2006, pp. 1–4 (November 2006)
Joo-Sang, P., Young-Il, K., Yong-Joon, L.: Security considerations for rfid technology adoption. In: The 7th International Conference on Advanced Communication Technology, ICACT 2005, vol. 2, pp. 797–803 (2005)
Hu, W., Farooq, O., Datta, S.: Wavelet based sub-space features for face recognition. In: Congress on Image and Signal Processing, CISP 2008, vol. 3, pp. 426–430 (May 2008)
Wan, S.-Y., Higgins, W.: Symmetric region growing. In: Proceedings of 2000 International Conference on Image Processing, 2000, vol. 2, pp. 96–99 (September 2000)
Romer, K., Schoch, T., Mattern, F., Dubendorfer, T.: Smart identification frameworks for ubiquitous computing applications. In: Proceedings of the First IEEE International Conference on Pervasive Computing and Communication (PerCom 2003), pp. 253–262 (March 2003)
Ikonomatakis, N., Plataniotis, K., Zervakis, M., Venetsanopoulos, A.: Region growing and region merging image segmentation. In: Proceedings of 13th International Conference on Digital Signal Processing, DSP 1997, vol. 1, pp. 299–302 (July 1997)
Yang, J., Waibel, A.: A real-time face tracker. In: Proceedings 3rd IEEE Workshop on Applications of Computer Vision, WACV 1996, pp. 142 –147 (December 1996)
Li, S., Tao Weng, X.: Electromagnetic environment of uhf-rfid. In: 10th Electronics Packaging Technology Conference, EPTC 2008, pp. 1034–1039 (December 2008)
Tsang, P., Yung, K., So, K., Cheung, K.: Integration of video surveillance and rfid for remote scene monitoring. In: Asia-Pacific Microwave Conference, APMC 2008, pp. 1–4 (December 2008)
Meng, X.-L., Song, Z.-W., Li, X.-Y.: Rfid-based security authentication system based on a novel face-recognition structure. In: 2010 WASE International Conference on Information Engineering (ICIE), vol. 1, pp. 97–100 (August 2010)
Revankar, S., Sher, D.: Constrained contouring in polar coordinates. In: Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition, CVPR 1993, pp. 688–689 (June 1993)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Min, DG., Kim, JW., Jun, MS. (2011). The Entrance Authentication and Tracking Systems Using Object Extraction and the RFID Tag. In: Kim, Th., Adeli, H., Robles, R.J., Balitanas, M. (eds) Ubiquitous Computing and Multimedia Applications. UCMA 2011. Communications in Computer and Information Science, vol 150. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20975-8_33
Download citation
DOI: https://doi.org/10.1007/978-3-642-20975-8_33
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-20974-1
Online ISBN: 978-3-642-20975-8
eBook Packages: Computer ScienceComputer Science (R0)