Hiding RFID in the Image Matching Based Access Control to a Smart Building

Published: 01 Jan 2018, Last Modified: 13 Nov 2024SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018EveryoneRevisionsBibTeXCC BY-SA 4.0
Abstract: in recent years, Radio Frequency Identification (RFID) technology gone from obscurity concept into traded applications that often use to increase the security systems. RFID has been defined as a wireless communication technology utilized to allow computers for reading the identity electronic tags from a distance. Although the many benefits and strengths of the RFID, it contains some weaknesses which led to the use of additional technology to support it. So, this paper used the face detection technique, as a method to support RFID work, to ensure that the person using RFID is the authorized user. The proposed model implements the Canny detection algorithm to identify the face user and verify the user was accepted or rejected. This model has been implemented by capture image of the user with used RFID to access the database. It contains user's image that holding the RFID hidden by LSB algorithm. after that, the model extracts the hidden RFID for matching it with the RFID used to verify its validity then identify the user is authorized or not.
Loading

OpenReview is a long-term project to advance science through improved peer review with legal nonprofit status. We gratefully acknowledge the support of the OpenReview Sponsors. © 2025 OpenReview