Advancing Security Measures in Governmental Institutions: Integration of Facial Recognition and Movement Monitoring Technologies in the House of Representatives

Abstract

With the aim of improving security measures in public and government buildings, this study presents a system to protect the House of Representatives using Vicon sensors and facial recognition technology to detect threats as soon as they occur and alert accordingly to take appropriate measures. A face recognition model was realized, which took advantage of a DenseNet169-based feature extractor and a dense layer-based classifier. The machine learning models and Vicon sensors used by the physical motion capture system allowed for highly accurate analysis of real-world movements. Using Decision Tree (DT) and K-Nearest Neighbors (KNN) algorithms, the system achieved optimal accuracy using a dataset that included ten categories of behaviors performed by ten employees. Thanks to the combination of motion capture and facial recognition technology, allowing for precise threat classification, the House of Representatives will have a robust security system. This research highlights the importance of technical improvements in defending public employees and facilities.

Country : Lebanon

1 Hala Wael AlFadhel

  1. Department of Computer and Communications Engineering, Faculty of Engineering & Computer Science, American University of Science & Technology, Beirut, Lebanon

IRJIET, Volume 8, Issue 5, May 2024 pp. 325-331

doi.org/10.47001/IRJIET/2024.805043

References

  1. E. James, and F. Rabbi, “Fortifying the IoT Landscape: Strategies to Counter Security Risks in Connected Systems,” Tensorgate Journal of Sustainable Technology and Infrastructure for Developing Countries, vol. 6, no. 1, pp. 32-46, 2023.
  2. S. Krishnan, M. S. Anjana, and S. N. Rao, “Security considerations for IoT in smart buildings,” In 2017 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), pp. 1-4, 2017.
  3. H. Ferraiolo, K. L. Mehta, N. Ghadiali, J. Mohler, V. Johnson, and S. Brady, “Guidelines for the use of PIV credentials in facility access,” NIST Spec. Publ, 800, 2018.
  4. G. S. D. M. A. Sreenu, and S. Durai, “Intelligent video surveillance: a review through deep learning techniques for crowd analysis,” Journal of Big Data, vol. 6, no. 1, pp. 1-27, 2019.
  5. G. Lulla, A. Kumar, G. Pole, and G. Deshmukh, “IoT based smart security and surveillance system,” In 2021 international conference on emerging smart computing and informatics (ESCI), pp. 385-390, 2021.
  6. J. Yang, T. Qian, F. Zhang, and S. U. Khan, “Real-time facial expression recognition based on edge computing,” IEEE Access, vol. 9, pp. 76178-76190, 2021.
  7. A. Kumar, S. Sharma, N. Goyal, A. Singh, X. Cheng, and P. Singh, “Secure and energy-efficient smart building architecture with emerging technology IoT,” Computer Communications, vol. 176, pp. 207-217, 2021.
  8. A. J. Majumder, and J. A. Izaguirre, “A smart IoT security system for smart-home using motion detection and facial recognition,” In 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC),pp. 1065-1071, 2020.
  9. O. Taiwo, A. E. Ezugwu, O. N. Oyelade, and M. S. Almutairi, “Enhanced intelligent smart home control and security system based on deep learning model,” Wireless communications and mobile computing, 2022,pp. 1-22, 2022.
  10. C. V. Amrutha, C. Jyotsna, and J. Amudha, “Deep learning approach for suspicious activity detection from surveillance video,” In 2020 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA),pp. 335-339, 2020.
  11. X. Zhou, X. Xu, W. Liang, Z. Zeng, and Z. Yan, “Deep-learning-enhanced multitarget detection for end–edge–cloud surveillance in smart IoT,” IEEE Internet of Things Journal, vol. 8, no. 16, pp. 12588-12596, 2021.
  12. L. Zahara, P. Musa, E. P. Wibowo, I. Karim, and S. B. Musa, “The facial emotion recognition (FER-2013) dataset for prediction system of micro-expressions face using the convolutional neural network (CNN) algorithm-based Raspberry Pi,” In 2020 Fifth international conference on informatics and computing (ICIC), pp. 1-9, 2020.
  13. I. E. Olatunji, “Human activity recognition for mobile robot,” In Journal of Physics: Conference Series, vol. 1069, no. 1, p. 012148, 2018.