The Entrance Authentication and Tracking Systems Using Object Extraction and the RFID Tag

In this paper, the proposal system can achieve the more safety of RFID System with the 2-step authentication procedures for the enhancement about the security of general RFID systems. After authentication RFID Tag, additionally, the proposal system extract the characteristic information in the user image for acquisition of the additional authentication information of the user with the camera. In this paper, the system which was proposed more enforce the security of the automatic entrance and exit authentication system with the cognitive characters of RFID Tag and the extracted characteristic information of the user image through the camera. The RFID system which use the active tag and reader with 2.4GHz bandwidth can recognize the tag of RFID in the various output manner. Additionally, when the RFID system have errors, the characteristic information of the user image is designed to replace the RFID system as it compare with the similarity of the color, outline and input image information which was recorded to the database previously. In the result of experiment, the system can acquire more exact results as compared with the single authentication system when it using RFID Tag and the information of color characteristics.

[1]  Zhan-Wei Song,et al.  RFID-Based Security Authentication System Based on a Novel Face-Recognition Structure , 2010, 2010 WASE International Conference on Information Engineering.

[2]  Shriram V. Revankar,et al.  Constrained contouring in polar coordinates , 1993, Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.

[3]  Alexander H. Waibel,et al.  A real-time face tracker , 1996, Proceedings Third IEEE Workshop on Applications of Computer Vision. WACV'96.

[4]  Ming-Ting Sun,et al.  A family of vlsi designs for the motion compensation block-matching algorithm , 1989 .

[5]  William E. Higgins,et al.  Symmetric region growing , 2003, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[6]  Yuping Zhao,et al.  A Novel Anti-Collision Algorithm with Dynamic Tag Number Estimation for RFID Systems , 2006, 2006 International Conference on Communication Technology.

[7]  Kim Young-Il,et al.  Security considerations for RFID technology adoption , 2005, The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005..

[8]  Konstantinos N. Plataniotis,et al.  Region growing and region merging image segmentation , 1997, Proceedings of 13th International Conference on Digital Signal Processing.

[9]  Song Li,et al.  Electromagnetic Environment of UHF-RFID , 2008, 2008 10th Electronics Packaging Technology Conference.

[10]  P.W.M. Tsang,et al.  Integration of video surveillance and RFID for remote scene monitoring , 2008, 2008 Asia-Pacific Microwave Conference.

[11]  Wen Hu,et al.  Wavelet Based Sub-space Features for Face Recognition , 2008, 2008 Congress on Image and Signal Processing.

[12]  Kay Römer,et al.  Smart Identification Frameworks for Ubiquitous Computing Applications , 2004, Wirel. Networks.