Grunnleggende konsepter
This article presents AWSecure, a cloud-based access control system using AI facial recognition, and evaluates its performance in various real-world scenarios, highlighting its strengths, weaknesses, and areas for improvement.
Sammendrag
This article presents a research project that developed and evaluated AWSecure, a cloud-based AI access control system.
System Overview
The AWSecure Entry System utilizes a Raspberry Pi with a camera and display to capture user images and send them to the AWS cloud. AWS services like Lambda, S3, and Rekognition process the images, compare them to stored credentials, and grant or deny access.
Evaluation Methodology
The system's performance was rigorously evaluated through six structured test scenarios:
- Registered vs. Unregistered User Access: Tested the system's ability to differentiate between authorized and unauthorized individuals.
- Performance Under Different Lighting Conditions: Evaluated facial recognition accuracy in varying light conditions (bright, dim, dark).
- Facial Recognition with Face Rotations: Assessed accuracy with users at different angles to the camera (0, 45, and 90 degrees).
- Recognition with Accessories: Tested recognition capabilities on users wearing accessories like sunglasses.
- Multi-user Recognition: Evaluated the system's handling of multiple users simultaneously facing the camera.
- Spoofing Test: Tested the system's resilience against spoofing attempts using photographs.
Key Findings
- AWSecure effectively granted access to registered users and denied access to unregistered individuals.
- The system performed well in bright and dimly lit environments but failed in complete darkness.
- Facial recognition accuracy decreased with increased face rotation angles.
- The system successfully recognized users wearing accessories, though with slightly reduced accuracy.
- AWSecure accurately prioritized and granted access to the closest user in multi-user scenarios.
- A critical vulnerability was identified in the spoofing test, where the system granted access based on a photograph.
Conclusions
While AWSecure demonstrated effectiveness in most scenarios, particularly under controlled lighting and with minor facial obstructions, it exhibited weaknesses in handling extreme face angles and susceptibility to spoofing attacks.
Future Research
The research team highlights the need for further development, specifically in enhancing the system's ability to handle different face orientations and improve its resistance to spoofing attacks. Incorporating additional security layers like liveness detection and multi-angle facial recognition is recommended for real-world deployments.