Automatic Management and Access Control System

Authors: Gorbunov V.L., Zhdanova I.V., Thet Naing Win Published: 07.12.2018
Published in issue: #6(123)/2018  
DOI: 10.18698/0236-3933-2018-6-37-47

Category: Informatics, Computer Engineering and Control | Chapter: Automation, Control of Technological Processes, and Industrial Control  
Keywords: face recognition, access control, LBP algorithm, face features extraction

Face recognition could be used for access control when the high level of security is required. The article is devoted to the analysis of method of face recognition for access control and application of the LBP algorithm for solving the face features extracting problem. MATLAB applications were used for modeling the methods stated above. We suggested a new method for calculating the recognition threshold taking into consideration the rate of errors of various kinds. The results of this method application are presented


[1] Li W. Computer image feature extraction algorithm for robot visual equipment. The Open Automation and Control Systems Journal, 2015, vol. 7, pp. 1993–2000. DOI: 10.2174/1874444301507011993

[2] Pansare A.J., Kotak V.C., Mathew B.K. Review of SIFT and LBP algorithm for crime investigation using LFDA framework. IJESIT, 2015, vol. 4, no. 4, pp. 107–110.

[3] Rahim Md.A., Hossain Md.N., Wahid T., Azan Md.Sh. Face Recognition using Local Binary Patterns (LBP). Global Journal of Computer Science and Technology Graphics & Vision, 2013, vol. 13, no. 4-F.

[4] Kakkar P., Gill P. Real time face recognition system using LBP algorithm. Int. Conf. on Recent Innovations in Science, Agriculture, Engineering and Management. 2017.

[5] Priya M.S., Kadhar Nawaz G.M. MATLAB based feature extraction and clustering image using k-nearest neighbors algorithm. IJAICT, 2016, vol. 2, no. 11, pp. 1121–1126.

[6] Changala R., Gummadi A., Rao T.J. Statistical models in data mining: a bayesian classification. National Conf. on Convergence of Emerging Technology in Computer Science & Engineering. IJRTER, 2017, pp. 290–293.