A Hybrid Biometric and Password-Based Dual Security System Implemented through MATLAB Simulation

Authors

  • Vibha Sahu

Keywords:

Face Recognition, Principal Component Analysis (PCA), Password Authentication, Hybrid Security System

Abstract

In an era marked by growing concerns over security breaches and identity theft, single-layer authentication systems such as numeric passwords or biometrics alone are no longer sufficient to ensure reliable protection. This study presents the design and simulation of a hybrid dual-level security system that integrates biometric face recognition with password-based verification to achieve enhanced access control. The first level of authentication employs the Principal Component Analysis (PCA) algorithm, implemented in MATLAB, to extract Eigenfaces from a training dataset and compare them against test images. This technique enables dimensionality reduction while preserving essential facial features, ensuring efficient and accurate recognition under controlled conditions. Once a face is successfully identified, the system advances to the second level, where a password or personal identification number (PIN) is verified through an 8051 microcontroller using the Edsim51di simulator. A correct match results in the activation of a motor, simulating door unlocking, while mismatches deny access. Experimental results demonstrate that the PCA-based module achieved a recognition accuracy of approximately 75.83%, while the password verification layer maintained near-perfect reliability. Together, these two mechanisms provide a defense-in-depth model that minimizes false acceptance, reduces unauthorized access, and enhances overall system robustness. The proposed hybrid framework offers a cost-effective and practical solution suitable for high-security applications such as ATMs, airports, and smart homes.

References

Turk, M., & Pentland, A. (1991). Eigenfaces for recognition. Journal of Cognitive Neuroscience, 3(1), 71–86.

Kirby, M., & Sirovich, L. (1990). Application of the Karhunen–Loève procedure for the characterization of human faces. IEEE Transactions on Pattern Analysis and Machine Intelligence, 12(1), 103–108.

Jolliffe, I. T. (1986). Principal Component Analysis. New York: Springer-Verlag.

Chellappa, R., Wilson, C. L., & Sirohey, S. (1995). Human and machine recognition of faces: A survey. Proceedings of the IEEE, 83(5), 705–740.

Moghaddam, B., & Pentland, A. (1997). Probabilistic visual learning for object recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence, 19(7), 696–710.

Solar, J. R., & Navarreto, P. (2005). Eigen space-based face recognition: A comparative study of different approaches. IEEE Transactions on Systems, Man, and Cybernetics - Part C: Applications and Reviews, 35(3), 315–325.

Sahoolizadeh, H., & Ghassabeh, Y. A. (2008, September). Face recognition using eigenfaces, fisherfaces and neural networks. In 2008 7th IEEE International Conference on Cybernetic Intelligent Systems (pp. 1–6). IEEE.

Bartlett, M. S., Movellan, J. R., & Sejnowski, T. J. (2002). Face recognition by independent component analysis. IEEE Transactions on Neural Networks, 13(6), 1450–1464.

Liu, C., & Wechsler, H. (2000). Evolutionary pursuit and its application to face recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence, 22(6), 570–582.

Wiskott, L., Fellous, J. M., Krueger, N., & von der Malsburg, C. (1997). Face recognition by elastic bunch graph matching. IEEE Transactions on Pattern Analysis and Machine Intelligence, 19(7), 775–779.

Li, S. Z., & Jain, A. K. (2005). Handbook of Face Recognition. New York: Springer.

Agui, T., Kokubo, Y., Nagashi, H., & Nagao, T. (1992, November). Extraction of face recognition from monochromatic photographs using neural networks. In Proceedings of the 2nd International Conference on Automation, Robotics, and Computer Vision (Vol. 1, pp. 18.81–18.85).

Downloads

How to Cite

Vibha Sahu. (2018). A Hybrid Biometric and Password-Based Dual Security System Implemented through MATLAB Simulation. International Journal of Engineering, Science and Humanities, 8(2), 12–22. Retrieved from https://www.ijesh.com/index.php/j/article/view/237

Issue

Section

Original Research Articles

Similar Articles

<< < 6 7 8 9 10 11 12 > >> 

You may also start an advanced similarity search for this article.