Published August 6, 2022 | Version v1
Journal article Open

Computer Vision Based Authentication and Employee Monitoring System

Description

Computer vision is a recently active topic which is based on image processing. Computer vision used in variety of topics from a simple feature detection up to a sophisticated system those need animage as in modern robots. In this project, we are going to use computer vision to make an authentication system for employee of a company to have an access to the campus or for specific resource like entering to a datacenter. By using the art-of-state of CV, we develop the system which screen users by using their face which is more secured and have no doubt of repetition since facial features are unique than other methods such as password authentications, those are less secured and vulnerable to attack. Existing python built in database called SQLite is used inmanage employee information such as their ID number, full name, department within a database. We deploy Raspberry PI as a main controller/ system on board computer. We have developed an interactive GUI using python’s librarytkinter, for the admins to manage their task those are registering new employee, train the model over the new added employee’s faces, and monitoring the system overall functionality. Every employee needs to be registered via the admin’s monitoring GUI and once their faces are added and trained on the system/model, the system will process either to give permission or deny request for an entrance viaa servomotor which actuate the opening and closing of a door.Previously unregistered employee can ask a request to access the resource via guest mode which will processed and respond by the respective admins. Since CV based face detection is challenged by light intensity easily and need an advanced calibration to overcome the effect, we develop the two-factor authentication. User need to provide his/her password, then the system generates a one-time password which is time bounded and the communication will process via email. Lastly after we designed and analyze the high-level system,we implement the whole system’s prototype with available resources.

Files

IJISRT22JUL1344 (1).pdf

Files (3.4 MB)

Name Size Download all
md5:314730d8e2cb730ea1c8da3637b70493
3.4 MB Preview Download