Open Access Open Access  Restricted Access Subscription Access

Unauthorized Access Detection Using Real-Time Face Recognition

Aishwarya R, Gajanan M Naik

Abstract


Protecting computer systems from unapproved en- try is a paramount necessity in today’s digital landscape. The proposed work describes a live, integrated security solution for detecting unverified access, utilizing webcam imaging, facial analysis, and automated email notifications to significantly boost login protection. The system automatically activates the webcam when a login attempt is made and captures the image of the person at the terminal. OpenCV is employed to analyze the acquired image and confirm the existence of a human face within the frame. Simultaneously, the user’s geographical location is obtained using an IP-based API. The system then validates the entered username and password with predefined credentials. Should repeated password failure occur, or if the face captured by the camera differs from the authorized user’s profile, the system flags the activity as suspicious or rogue and dispatches an immediate email warning to the system owner with the captured image, time, and location details. In case the real owner forgets the password, a password reset email is also triggered. This multi-faceted defense methodology merges computer vision capabilities with network communication for immediate monitoring and preemptive alerts concerning security breaches, thereby strengthening system access security.

Full Text:

PDF

References


Bradski, G., & Kaehler, A. (2008). Learning OpenCV: Computer Vision with the OpenCV Library. O’Reilly Media.

Rosebrock, A. (2021). Deep Learning for Computer Vision with Python. PyImageSearch.

OpenCV Documentation. (2024). Open Source Computer Vision Library.

Retrieved from https://docs.opencv.org

Python Software Foundation. (2024). Python Language Reference, ver- sion 3.10. Retrieved from https://www.python.org

Google Developers. (2023). Gmail SMTP Server Configuration. Re- trieved from https://developers.google.com/gmail

Singh, R., & Kaur, J. (2022). “Real-Time Intruder Detection Using Image Processing and IoT.” International Journal of Computer Appli- cations, vol. 184, no. 12, pp. 10–15.

Kumar, S., & Sharma, P. (2021). “Face Recognition-Based Security Sys- tem Using OpenCV.” Journal of Emerging Technologies and Innovative Research, vol. 8, no. 5, pp. 232–238.

Patel, N., & Mehta, A. (2020). “Email-Based Alert System for Unau- thorized Access.” International Journal of Engineering Research & Technology (IJERT), vol. 9, no. 4, pp. 45–49.

F. Schroff, D. Kalenichenko, and J. Philbin, “FaceNet: A unified embedding for face recognition and clustering,” in Proc. IEEE Conf. Comput. Vis. Pattern Recog. (CVPR), 2015, pp. 815–823.

J. Deng, J. Guo, N. Xue, and S. Zafeiriou, “ArcFace: Additive angular margin for deep face recognition,” in Proc. IEEE Conf. Comput. Vis. Pattern Recog. (CVPR), 2019, pp. 4690–4699.


Refbacks

  • There are currently no refbacks.