Evaluation of Face Recognition Technologies for Access Authentication in Automotive Passive Entry Systems with Near Infrared Camera

Mauricio Vianna Rezende

Resumo


The development of embedded systems technology has changed the history of automotive world, bringing new devices including modern access vehicle's control. In these systems' recent history, industry has introduced the concept of Passive Access or Passive Entry (PASE) system, allowing the user to control vehicle's doors opening and closing without the need for pressing any button. These systems are based on radio frequency devices with exchange of encrypted information with the Remote control Key (RKE), which assures user's authentication. In spite of the comfort provided by this technology, there is the possibility of attacks against PASE and RKE authentication, exploring access security flaws, thus requiring constant research and development and improvement on these devices. This work proposes and evaluate Face Recognition (FR) for user authentication integrated with PASE under unconstrained environments and illumination variation as alternative to RKE based systems. A Design Science Research (DSR) based methodology was used to support the instantiation of a FR framework, which was validated using Receiver Operating Characteristic (ROC) curves.

A vehicle prototype already mounted with PASE system was integrated with FR algorithms instantiations as artifacts: Eingenfaces, Fisherfaces, 2DFLD (2D-LDA) and VIOLA-JONES detector, supported by Near Infrared Cameras (NIR).

The results were evaluated regarding computational cost (memory and processing time) of selected Face Recognition algorithms authentication and compared with available integrative capacity of automotive embedded devices.

In summary, from the experiments and instantiations supported by DSR method and also confirmed during all test-cases executed, this work concluded it was feasible to integrate FR algorithms and Passive entry systems, confirming also VIOLA-JONES detector in conjunction with Infrared LEDs to overcome illumination variation under unconstrained environments.

Among FR algorithms, Fisherfaces has been confirmed as the best option due to its stability, low memory consumption, less training samples and adequate overall execution speed which is compatible with embedded micro-controllers.


Texto completo:

PDF (English)

Referências


AGARWAL, S.; FURUKAWA, Y. Noah snavely. Computer (Cover Feature), v. 43, n. 6,

p. 40–47, 2010. Cited on page 58.

ALAN, R. H. von et al. Design science in information systems research. MIS quarterly,

Springer, v. 28, n. 1, p. 75–105, 2004. Cited on page 63.

ALRABADY, A.; MAHMUD, S. Some attacks against vehicles’ passive entry security

systems and their solutions. Vehicular Technology, IEEE Transactions on, v. 52, n. 2, p.

–439, March 2003. ISSN 0018-9545. Cited 2 times on pages 44 and 45.

BELHUMEUR, P.; HESPANHA, J.; KRIEGMAN, D. Eigenfaces vs. fisherfaces:

recognition using class specific linear projection. Pattern Analysis and Machine

Intelligence, IEEE Transactions on, v. 19, n. 7, p. 711–720, Jul 1997. ISSN 0162-8828.

Cited 4 times on pages 45, 59, 60, and 61.

CHEN, R.; ZHANG, S. Video-based face recognition technology for automotive security.

In: Mechanic Automation and Control Engineering (MACE), 2010 International

Conference on. [S.l.: s.n.], 2010. p. 2947–2950. Cited 7 times on pages 17, 39, 41, 46, 60,

, and 105.

FACILITATING Interdisciplinary Research. The National Academies Press, 2004. Available

at: .

Cited on page 23.

FAWCETT, T. An introduction to roc analysis. Pattern recognition letters, Elsevier,

v. 27, n. 8, p. 861–874, 2006. Cited 3 times on pages 38, 47, and 48.

FRANCILLON, A.; DANEV, B.; CAPKUN, S. Relay Attacks on Passive Keyless Entry

and Start Systems in Modern Cars. In: Proceedings of the Network and Distributed

System Security Symposium (NDSS). Zürich: Eidgenössische Technische Hochschule

Zürich, Department of Computer Science, 2011. Cited 3 times on pages 17, 43, and 45.

FRANKE, U. et al. Autonomous driving goes downtown. IEEE Intelligent systems,

IEEE Computer Society, v. 13, n. 6, p. 40–48, 1998. Cited on page 22.

GIL, A. C. Como elaborar projetos de pesquisa. São Paulo, v. 5, 2002. Cited on page 63.

HAIQIANG, L.; GUOJIN, C. Research on information integration for multidisciplinary

collaborative design of complex customized product. Procedia Engineering, Elsevier,

v. 23, p. 296–302, 2011. Cited on page 23.

HEVNER, A. R. A three cycle view of design science research. Scandinavian journal of

information systems, v. 19, n. 2, p. 4, 2007. Cited 2 times on pages 63 and 64.

HUANG, G. B.; JAIN, V.; LEARNED-MILLER, E. Unsupervised joint alignment of

complex images. In: IEEE. Computer Vision, 2007. ICCV 2007. IEEE 11th International

Conference on. [S.l.], 2007. p. 1–8. Cited 2 times on pages 54 and 55.

KEELE, S. Guidelines for performing systematic literature reviews in software

engineering. [S.l.], 2007. Cited on page 25.

LACERDA, D. P. et al. Design science research: A research method to production

engineering. Gestão & Produção, SciELO Brasil, v. 20, n. 4, p. 741–761, 2013. Cited on

page 63.

LALONDE, M. et al. Real-time eye blink detection with gpu-based sift tracking. In:

IEEE. Computer and Robot Vision, 2007. CRV’07. Fourth Canadian Conference on.

[S.l.], 2007. p. 481–487. Cited on page 22.

LEARNED-MILLER, E. G. Data driven image models through continuous joint

alignment. Pattern Analysis and Machine Intelligence, IEEE Transactions on, IEEE,

v. 28, n. 2, p. 236–250, 2006. Cited on page 54.

LI, S. Z.; JAIN, A. K. Handbook of Face Recognition. [S.l.]: Springer Science & Business

Media, 2011. Cited 6 times on pages 18, 41, 47, 57, 58, and 62.

LI, S. Z.; YI, D. Face recognition, near-infrared. In: Encyclopedia of Biometrics. [S.l.]:

Springer, 2009. p. 352–355. Cited 3 times on pages 61, 62, and 73.

MARCH, S. T.; SMITH, G. F. Design and natural science research on information

technology. Decision support systems, Elsevier, v. 15, n. 4, p. 251–266, 1995. Cited 3

times on pages 63, 70, and 105.

MARKUS, M. L.; MAJCHRZAK, A.; GASSER, L. A design theory for systems that

support emergent knowledge processes. Mis Quarterly, JSTOR, p. 179–212, 2002. Cited

on page 69.

MARQUES, I.; GRANA, M. Face recognition algorithms. Proyecto Fin de Carrera,

p. 66, 2010. Cited on page 45.

MARSICO, M. D.; NAPPI, M. Face recognition in adverse conditions: A look at achieved

advancements. Face Recognition in Adverse Conditions, IGI Global, p. 388, 2014. Cited

on page 46.

MAYANK, P.; MUKHOPADHYAY, S. Temporal correlation and probabilistic prediction

based face detection framework in real time environment. In: IEEE. Intelligent Human

Computer Interaction (IHCI), 2012 4th International Conference on. [S.l.], 2012. p. 1–6.

Cited 2 times on pages 18 and 50.

OGUMA, H. et al. Passive keyless entry system for long term operation. In: World

of Wireless, Mobile and Multimedia Networks (WoWMoM), 2011 IEEE International

Symposium on a. [S.l.: s.n.], 2011. p. 1–3. Cited 3 times on pages 21, 41, and 45.

PATIL, S. A.; DEORE, P. Face recognition: A survey. Informatics Engineering, an

International Journal (IEIJ), v. 1, n. 1, 2013. Cited 2 times on pages 41 and 56.

PETERSEN, K. et al. Systematic mapping studies in software engineering. In: SN. 12th

International Conference on Evaluation and Assessment in Software Engineering. [S.l.],

v. 17, n. 1. Cited 3 times on pages 25, 30, and 31.

PETTICREW, M.; ROBERTS, H. Systematic reviews in the social sciences: A practical

guide. [S.l.]: John Wiley & Sons, 2008. Cited on page 26.

PHILLIPS, P. J. et al. The feret evaluation methodology for face-recognition algorithms.

Pattern Analysis and Machine Intelligence, IEEE Transactions on, IEEE, v. 22, n. 10,

p. 1090–1104, 2000. Cited 2 times on pages 41 and 64.

PRENEEL, B. Cryptographic algorithms. 2013. Cited on page 42.

SCHMITZ, S. New door closure concepts. Automotive Engineering, 2000. Cited 2 times

on pages 17 and 41.

SOCHMAN, J.; MATAS, J. Waldboost-learning for time constrained sequential

detection. In: IEEE. Computer Vision and Pattern Recognition, 2005. CVPR 2005.

IEEE Computer Society Conference on. [S.l.], 2005. v. 2, p. 150–156. Cited on page 53.

STEFFEN, R. et al. Near field communication (nfc) in an automotive environment. In:

International Workshop on Near Field Communication. [S.l.: s.n.], 2010. p. 15–20. Cited

on page 21.

TAGUCHI, G.; TAGUCHI, G. System of experimental design; engineering methods to

optimize quality and minimize costs. [S.l.], 1987. Cited on page 67.

TURK, M.; PENTLAND, A. Eigenfaces for recognition. Journal of cognitive

neuroscience, MIT Press, v. 3, n. 1, p. 71–86, 1991. Cited on page 45.

VERDULT, R.; GARCIA, F. D.; BALASCH, J. Gone in 360 seconds: Hijacking with

hitag2. In: USENIX ASSOCIATION. Proceedings of the 21st USENIX conference on

Security symposium. [S.l.], 2012. p. 37–37. Cited on page 42.

VIOLA, P.; JONES, M. Rapid object detection using a boosted cascade of simple

features. In: IEEE. Computer Vision and Pattern Recognition, 2001. CVPR 2001.

Proceedings of the 2001 IEEE Computer Society Conference on. [S.l.], 2001. v. 1, p.

I–511. Cited 6 times on pages 46, 49, 50, 51, 52, and 53.

WETZELS, J. Broken keys to the kingdom: Security and privacy aspects of rfid-based

car keys. arXiv preprint arXiv:1405.7424, 2014. Cited 3 times on pages 42, 43, and 44.

WIERINGA, R. et al. Requirements engineering paper classification and evaluation

criteria: a proposal and a discussion. Requirements Engineering, Springer, v. 11, n. 1, p.

–107, 2006. Cited 2 times on pages 29 and 30.

XIONG, H.; SWAMY, M.; AHMAD, M. O. Two-dimensional fld for face recognition.

Pattern Recognition, Elsevier, v. 38, n. 7, p. 1121–1124, 2005. Cited 3 times on pages

, 60, and 61.

YANG, J. et al. Two-dimensional pca: a new approach to appearance-based face

representation and recognition. Pattern Analysis and Machine Intelligence, IEEE

Transactions on, IEEE, v. 26, n. 1, p. 131–137, 2004. Cited on page 60.

YANG, M.-H.; KRIEGMAN, D.; AHUJA, N. Detecting faces in images: A survey.

Pattern Analysis and Machine Intelligence, IEEE Transactions on, IEEE, v. 24, n. 1, p.

–58, 2002. Cited on page 49.

ZHANG, B. et al. Directional binary code with application to polyu near-infrared face

database. Pattern Recognition Letters, v. 31, n. 14, p. 2337 – 2344, 2010. ISSN 0167-8655.

Available at: .

Cited on page 62.

ZHANG, C.; ZHANG, Z. A survey of recent advances in face detection. [S.l.], 2010.

Cited 3 times on pages 41, 49, and 54.

ZHENG, W.-S.; LAI, J.-H.; LI, S. Z. 1d-lda vs. 2d-lda: When is vector-based linear

discriminant analysis better than matrix-based? Pattern Recognition, Elsevier, v. 41,

n. 7, p. 2156–2172, 2008. Cited 3 times on pages 97, 98, and 105.

ZHU, J. qing; CAI, C. hui. Real-time face detection using gentle adaboost algorithm and

nesting cascade structure. In: Intelligent Signal Processing and Communications Systems

(ISPACS), 2012 International Symposium on. [S.l.: s.n.], 2012. p. 33–37. Cited 2 times

on pages 53 and 54.

ZOU, X.; KITTLER, J.; MESSER, K. Face recognition using active near-ir illumination.

In: CITESEER. BMVC. [S.l.], 2005. Cited on page 61.

ZOU, X.; KITTLER, J.; MESSER, K. Illumination invariant face recognition: A survey.

In: IEEE. Biometrics: Theory, Applications, and Systems, 2007. BTAS 2007. First IEEE

International Conference on. [S.l.], 2007. p. 1–8. Cited on page 61.


Apontamentos

  • Não há apontamentos.




Projetos, Dissertações e Teses em Sistemas de Informação e Gestão do Conhecimento
ISSN 2358-5501 (Online)