An Effective Card Scanning Framework For User Authentication System
An Effective Card Scanning Framework For User Authentication System
Authentication System
Hania Arif Ali Javed
Department of Software Engineering Department of Software Engineering
University of Engineering and Technology University of Engineering and Technology
Taxila, Pakistan Taxila, Pakistan
[email protected] [email protected]
Abstract—Exponential growth of fake ID cards generation identification in real-time using these biometric solutions is a
leads to increased tendency of forgery with severe security and challenging task due to variation in human pose [6], facial
privacy threats. University ID cards are used to authenticate expressions [7], hair styles [8], illumination conditions [9],
actual employees and students of the university. Manual user distance from the camera [10], etc. These conditions
examination of ID cards is a laborious activity, therefore, in this
paper, we propose an effective automated method for
affect the identification process and leads to the generation of
employee/student authentication based on analyzing the cards. false alarms.
Additionally, our method also identifies the department of There is a common practice of identifying users through
concerned employee/student. For this purpose, we employ
employee card verification. Employee card verification is
different image enhancement and morphological operators to
improve the appearance of input image better suitable for largely used in various organizations in Pakistan for user
recognition. More specifically, we employ median filtering to identity verification [11]. Currently, organizations either used
remove noise from the given input image. Next, we apply the RFID card scanners [13] or manual card verification for user
histogram equalization to enhance the contrast of the image. We authentication. Manual card verification is a taxing and time-
employ Canny edge detector to detect the edges from this consuming activity and become less effective in case of large
equalized image. The resultant edge image contains the broken number of users entering in a building in short time span.
characters. To fill these gaps, we apply the dilation operator that Many educational institutions prefer the use of simple
increases the thickness of the characters. Dilation fills the identification cards without RFID that the employee or student
broken characters, however, also add extra thickness that is
has to wear as a part of their dress code in order to reduce the
then removed through applying the morphological thinning.
Finally, dilation and thinning are applied in combination to cost of user identification. However, this manual verification
Optical character recognition (OCR) to segment and recognize process is unreliable and leads to security loop holes due to
the characters including the name, ID, and department of the reliance on guards for manual verification where image
employee/student. Finally, after the OCR application on the tampering can be used to generate false cards that are hard to
morphed image, we obtain the name, ID, and department of the detect from naked eye.
employee/student. If the concerned credentials of the
employee/student are matched with his/her department, then To address these challenges, we propose an automated
access of the door is granted to that employee/student. low-cost solution to authenticate the identity of the
Experimental results illustrate the effectiveness of the proposed employees/ students. More specifically, we analyze the
method. captured frames of the card via cameras and employ OCR to
detect the department of the concerned person. We propose a
Keywords—Dilation, Image Enhancement, Morphological non-learning-based technique to reduce the computational
Thinning, Optical Character Recognition, User Authentication. complexity of our solution. We employ different enhancement
I. INTRODUCTION and morphological operators to obtain the image better suited
for OCR processing. This image is finally fed to the OCR
The advancement in modern day sophisticated image algorithm that recognize the employee’s identity and
forgery algorithms led to increased tendency of image department for authentication purposes. The main
manipulation that poses several security and privacy issues. Contributions of the proposed work are as follows:
Organizations security concerns regarding confidentiality of
their employee’s working environment led to the usage of • We propose an effective user identification system
various automated solutions to testify the entrance of through applying different morphological and image
authorized employees in relevant departments/buildings. enhancement techniques.
Organizations frequently use various devices such as
• We present an economical and efficient user
surveillance cameras [1], lock systems [1], RFIDs [2], [3], iris
authentication system where a low-cost camera is
recognition systems [3], [4], fingerprint recognition systems
required to capture the video.
[5], etc. for employees’ authentication. However, the current
state-of-the-art image processing and artificial intelligence • Our system is robust to variations in illumination
algorithms can be used to exploit the authentication systems. conditions, glare, noise, contrast, and shadows.
To address this issue, there exists a dire need to propose more
effective and secure authentication systems that are robust to II. LITERATURE REVIEW
these forged/manipulated input data (i.e. images, videos, etc.). This section provides a critical analysis of existing state-
There is a common practice of using different biometric of-the-art user authentication systems. Existing techniques
solutions [8] – [12] i.e. thumb print identification, facial have proposed either biometric systems [14] – [20] or RFID
recognition, iris recognition, etc. for user authentication. based systems [22] – [25] for user authentication.
These solutions are effectively used by organizations to Multiple biometric identification techniques make use of
authenticate the identity of their employees. However, user the waves emerging out of the human body for human
(i) A. Dataset
where Idil (x,y) represents the dilated image and SE represents
For the performance evaluation of the proposed system,
the structuring element which is set to a window of size 3 for
we created a dataset of 1000 university card images that
both horizontal and vertical dilation.
belong to different departments. We ensured to create a
Dilation operation successfully fills the broken characters; diverse dataset. Our dataset is captured in different
however, thickness of the characters is increased significantly. environmental and lighting conditions, containing glare,
Therefore, we need to reduce the extra thickness of characters shadow, and low contrast images. The resolution of each
added after dilation. image in the dataset is 3120 x 4160 pixels.
F. Density Reduction B. Experimental Results
The density reduction stage removes the extra thickness of Performance of the proposed system is evaluated in images
the edges by applying the morphological thinning operation. taken at a real-time. The effectiveness of the proposed system
Thinning operator is used to truncate the outliers. After is evaluated by the detection of correct credentials of the
applying the thinning operator on the dilated image, we obtain employee/student. Shown in Table I are the results of the
the characters with actual thickness. Morphological thinning proposed system for user identification. From the results
is applied as follows: (Table I), we can observe that our system achieves an average
accuracy of 96.4%. We captured the frames for testing in real-
(i) (i)
Ithin (x,y) = Idil (x,y) ⊗ SE () time environmental conditions with poor contrast, low
illumination, shadow over image, background distortion and
(i) glare. Despite the presence of multiple distortions in the
where Ithin (x,y) represents the thinned image. We used SE of captured images, our system provides remarkable
square shape which had the size equal to a 3x3 window. performance. It is worth mentioning that the system gives
G. Hole Filling greater than 95% accurate results for six environmental
conditions out of total 7 conditions under consideration. Tilt
After density reduction, we observed that the body of in the scanned image affects the system accuracy due to the
characters contains small holes that need to be filled. We fact that the proposed system is designed to scan images from
achieved hole filling step as follows: an anterior view with the angle of inclination of camera
(i) (i-1) (i) c
parallel to the plane of identification card.
Ifilled = (Ifilled ⊕ SE) ∩ Ithin ()
In our second experiment, we perform a confusion matrix
(i) (i) c
analysis for user authentication based on different
where Ifilled and Ithin are
the filled image and complement of departments. The results of confusion matrix analysis are
thinned image respectively. provided in Table II. From the results presented in Table II,
we can observe that the proposed system achieves 100% true
H. Optical Character Recognition
positives for seven departments out of total 11 classes. In the
To recognize the contents of the card, we apply the remaining four categories, the highest error is just 0.2 that
tesseract OCR method [35] on this filled image obtained after signify the effectiveness of our system in terms of user
applying the morphological operators. We obtain the authentication based on automated card verification. Hence,
recognized characters and use spacing detection mechanism we can argue that the proposed system is effective in terms of
to extract different words. Later, we convert the recognized classifying the employee/student as an authorized or
characters/words into computerized characters. We fed the unauthorized personnel. The results also show that the system
TABLE I. EMPLOYEE/ STUDENT UNIVERSITY CARD IDENTIFICATION RESULTS
Unauthorized (X) 0 0 0 0 0 0 0 0 0 0 1
REFERENCES
Normal Image Poor Contrast [1] M. Schiefer, “Smart home definition and security threats,” in 2015
Slight Tilt Low Illumination ninth international conference on IT security incident management &
Glare Shadow IT forensics, 2015, pp. 114–118.
Background Distortion
1 [2] S. Bauk and A. Schmeink, “RFID and PPE: Concerning workers’
safety solutions and cloud perspectives a reference to the Port of Bar
0.8 (Montenegro),” in 2016 5th Mediterranean Conference on Embedded
True Positive Rate