Integration of biometric technology into the entrance and exit control system

11-12-2020

Integration of biometric technology into the entrance and exit control system

Biometric technology has many forms such as fingerprint, iris, face, palm, vein and DNA. Because fingerprint recognition has the advantages of low system cost and convenient use, fingerprint recognition has become the most widely used recognition technology at present, and it has almost become biological Synonymous with feature recognition. In addition, face recognition technology is also developing very rapidly at this stage. Fingerprint recognition and face recognition are mainly used in entrance and exit control systems.

1. Fingerprint recognition

  Fingerprints refer to the uneven lines on the skin on the front of a human finger. The lines are arranged regularly to form different patterns. The starting point, end point, joining point and bifurcation point of the ridge are called the minutiae feature points of the fingerprint.

  Fingerprint recognition refers to automatic recognition by comparing the minutiae feature points of different fingerprints. Since each person’s fingerprints are different, there are obvious differences between the fingerprints of the ten fingers of the same person, and the fingerprints remain unchanged for life, so the fingerprints can be used for automatic identification.

  Fingerprint recognition has the characteristics of convenient use, fast recognition speed, and low price. The miniaturization of the fingerprint collection head brings convenience to the integration of fingerprint recognition and opens up a broad application market. At the same time, fingerprint recognition also has some problems; some people or groups of people have few fingerprint features and are difficult to image; leave user fingerprints on the fingerprint collector, and these fingerprints may be used to copy fingerprints. Security issues.

   Now fingerprint recognition is mainly used for access control and corporate attendance in the entrance and exit control system. With the development of smart home construction, fingerprint locks have begun to enter household locks.

  The miniaturization of the fingerprint collection head, the fingerprint recognition technology is integrated into the door phone of the video intercom system unit of the smart community, which is convenient for the owners to use in and out.

   2. Face recognition

   Face recognition is a computer application technology that uses the analysis and comparison of the shape and location feature information of facial organs to perform identity authentication. It is a biometric recognition technology. At present, face recognition has become a research hotspot in the field of pattern recognition and artificial intelligence.

   The main process of face recognition is: face image acquisition and detection, face image preprocessing, face image feature extraction, and matching and recognition. There are many face recognition algorithms. Commonly used algorithms include: recognition methods based on geometric features of faces, recognition methods based on the entire face image, face recognition methods based on connection mechanisms, and recognition methods based on three-dimensional data.

   Compared with other identification methods, face recognition has the characteristics of non-contact, non-compulsory, and concurrency, so face recognition technology has important application value. In the intelligent building entrance and exit control system, it is mainly used in places such as access control, time attendance, airport security inspection, etc. It is generally used in combination with other identification methods, such as integrated in the door phone of the video intercom unit.

   The changes in the ambient light collected by the face, similar faces, occlusions on the human face, face aging, face shaping, etc. may affect the accuracy of recognition. Artificial intelligence compensation is used to improve the accuracy of the system. It should be noted that the face recognition system must correctly identify whether it is a real person or a picture in front of the camera. In this way, users are prevented from using photos to cheat and improve the security of the system.


Get the latest price? We'll respond as soon as possible(within 12 hours)

Privacy policy