1 research outputs found

    Hiding RFID in the image matching based access control to a smart building

    Full text link
    © 2018 IEEE. in recent years, Radio Frequency Identification (RFID) technology gone from obscurity concept into traded applications that often use to increase the security systems. RFID has been defined as a wireless communication technology utilized to allow computers for reading the identity electronic tags from a distance. Although the many benefits and strengths of the RFID, it contains some weaknesses which led to the use of additional technology to support it. So, this paper used the face detection technique, as a method to support RFID work, to ensure that the person using RFID is the authorized user. The proposed model implements the Canny detection algorithm to identify the face user and verify the user was accepted or rejected. This model has been implemented by capture image of the user with used RFID to access the database. It contains user's image that holding the RFID hidden by LSB algorithm. after that, the model extracts the hidden RFID for matching it with the RFID used to verify its validity then identify the user is authorized or not
    corecore