Skip to main content
Log in

Efficient access control system based on aesthetic QR code

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

With the explosive growth of smart phones in recent years, QR code is becoming more and more popular. This work presents a new electronic access control system for smart building based on QR code. The system exploits the single-key-lock mechanism to generate keys for users and locks for QR code reader on the door. After being encrypted using a symmetric-key cryptography algorithm, the keys are used to generate a QR code as its message. Then the system exploits the XOR characteristics of a Reed-Solomon code and a fusion strategy to synthesize aesthetic QR code from user’s photo and QR code. Aesthetic QR code as a carrier of user’s credential will be assigned to user. When user presents the aesthetic QR code to QR code reader, the QR code reader will decode and decrypt the key, then directly make the access decision by performing an operation between key and lock. Experimental results show that the proposed access control system has the attributes of low cost, flexibility, high security, and offline verification. Moreover, the generated aesthetic QR code is resistant to common image degradation attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Sandhu RS, Samarati P (1994) Access control: principle and practice. IEEE Commun Mag 32(9):40–48

    Article  Google Scholar 

  2. Oxer J, Blemings H (2009) RFID access control system. In: Practical Arduino. Springer, Berlin, pp 273–299

  3. Sarma SE, Weis SA, Engels DW (2002) RFID systems and security and privacy implications. In: Conference on Cryptographic Hardware and Embedded Systems. Springer, San Francisco, pp 454–469

  4. Wolfgang K, Ekkehard S-K (1995) ZN-Face: a system for access control using automated face recognition. In: Proceedings of the international workshop on automated face-and gesture-recognition. Switzerland, pp 18–23

  5. Sun Y, Wang X, Tang X (2014) Deep learning face representation from predicting 10,000 classes. In: Proceedings of the IEEE conference on computer vision and pattern recognition. Ohio, pp 1891–1898

  6. Sun Y, Chen Y, Wang X, Tang X (2014) Deep learning face representation by joint identification-verification. In: Advances in neural information processing systems. Nevada, pp 1988–1996

  7. Parkhi OM, Vedaldi A, Zisserman A (2015) Deep face recognition. In: The British Machine Vision Conference. Swansea, pp 6–17

  8. Rand S-R, Ana G-M (2000) Access control system with hand geometry verification and smart cards. IEEE Aerosp Electron Syst Mag 15(2):45–48

    Article  Google Scholar 

  9. Raul S-R, Carmen S-A (2002) Fingerprint verification using smart cards for access control systems. IEEE Aerosp Electron Syst Mag 17(9):12–15

    Article  Google Scholar 

  10. Wang J-C, Chin Y-H, Hsieh W-C, Lin C-H, Chen Y-R, Siahaan E (2015) Speaker identification with whispered speech for the access control system. IEEE Trans Autom Sci Eng 12(4):1191–1199

    Article  Google Scholar 

  11. Danso Wave Inc. (2003) QR code standardization. www.qrcode.com/en/about/standards.html. Accessed 07 Jul 2017

  12. Cox R (2012) Qart codes. http://research.swtch.com/qart. Accessed 07 Jul 2017

  13. Wu M-L, Hwang T-Y (1984) Access control with single-key-lock. IEEE Trans Softw Eng 2:185–191

    Article  Google Scholar 

  14. Li L, Qiu J, Lu J, Chang C-C (2016) An aesthetic QR code solution based on error correction mechanism. J Syst Softw 116:85–94

    Article  Google Scholar 

  15. Georghiades A, Belhumeur P, Kriegman D (1997) Yale face database. Center for computational Vision and Control at Yale University, http://cvc.yale.edu/projects/yalefaces/yalefa 2 Accessed 07 Jul 2017

Download references

Funding

This research was partially supported by the Foundation of Fujian Educational Committee of China (No. JAT160357).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chin-Chen Chang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Huang, PC., Chang, CC., Li, YH. et al. Efficient access control system based on aesthetic QR code. Pers Ubiquit Comput 22, 81–91 (2018). https://doi.org/10.1007/s00779-017-1089-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-017-1089-y

Keywords

Navigation