Application of facial recognition technologies for enhancing control in information security systems
Article Sidebar
Open full text
Issue Vol. 15 No. 3 (2025)
-
Objects features extraction by singular projections of data tensor to matrices
Yuriy Bunyak, Roman Kvуetnyy, Olga Sofina, Volodymyr Kotsiubynskyi5-9
-
A hybrid approach combining generalized normal distribution optimization algorithm and fuzzy C-means with Calinski-Harabasz index for clustering optimization
Moatasem Mahmood Ibrahim, Omar Saber Qasim, Talal Fadhil Hussein10-14
-
Method of hybrid logical classification trees based on group selection of discrete features
Igor Povkhan, Andrii Leheza, Oksana Mulesa, Olena Melnyk, Aliya Kintonova15-21
-
Optimal control of electric energy quality, based on lexicographic approach
Yurii Voitiuk, Anatolii Volotskyi, Iuliia Shullie, Maiia Kovalchuk, Laura Duissembayeva22-28
-
Implementation of energy-saving modes for electro-radiation drying of oil-containing material using automation tools
Borys Kotov, Roman Kalinichenko, Serhii Stepanenko, Vasyl Lukach, Volodymyr Hryshchenko, Alvian Kuzmych, Yurii Pantsyr, Ihor Garasymchuk, Volodymyr Vasylyuk29-32
-
Methods and means of laser layer Jones matrix mapping of polycrystalline films of biological fluids
Olexander Ushenko, Iryna Soltys, Olexander Dubolazov, Sergii Pavlov, Vasyl Garasym, Alona Kolomiiets, Bakhyt Yeraliyeva33-37
-
Alzheimer’s disease classification from MRI using vision transformer
Mohith Reddy Kandi, Sree Vijaya Lakshmi Kothapalli, Sivamsh Pavan Rajanala, Suvarna Vani Koneru, Vishnu Pramukh Vattikunta38-44
-
Enhancing early Parkinson’s disease diagnosis through handwriting analysis
Asma Ouabd, Abdelilah Jilbab, Achraf Benba, Ahmed Hammouch45-49
-
Biomechanical foundations and benefits of active orthoses in the treatment of idiopathic scoliosis
Patrycja Tymińska-Wójcik50-54
-
Application of facial recognition technologies for enhancing control in information security systems
Nurzhigit Smailov, Rashida Kadyrova, Kamila Abdulina, Fatima Uralova, Nurgul Kubanova, Akezhan Sabibolda55-58
-
IoT system with frequency converters of physical quantities on FPGA
Oleksandr V. Osadchuk, Iaroslav O. Osadchuk, Valentyn K. Skoshchuk59-66
-
Research on the possibility of reducing the error in measuring the phase shift of radio signals
Sergey Matvienko, Grygoriy Tymchyk, Konstantin Vonsevych, Nataliia Stelmakh67-72
-
Implementation of fiber-optic sensing systems in structural health monitoring of concrete
Nurzhigit Smailov, Akmaral Tolemanova, Amir Aziskhan, Beibarys Sekenov, Akezhan Sabibolda73-76
-
Modelling the working cycle of a heat pump scroll compressor
Bohdan Sydorchuk, Oleksandr Naumchuk77-80
-
Modeling of interception parking lots
Larysa Gumeniuk, Volodymyr Lotysh, Pavlo Humeniuk, Oleksandr Reshetylo, Yuriy Syrota81-86
-
Development and research of W-parameters of potentially unstable four-poles based on the mathematical model of W-parameters of field-effect transistors in the high-frequency range
Oleksandr Voznyak, Kateryna Kovalova, Yurii Polievoda, Liudmyla Kolianovska, Svitlana Ovsienko, Alla Solomon87-90
-
Detection confidential information by large language models
Oleh Deineka, Oleh Harasymchuk, Andrii Partyka, Yurii Dreis, Yuliia Khokhlachova, Yuriy Pepa91-99
-
Ethical simulation of a phishing attack
Justyna Kęczkowska, Karol Wykrota, Mirosław Płaza100-104
-
The effectiveness of machine learning in detecting phishing websites
Jacek Łukasz Wilk-Jakubowski, Aleksandra Sikora, Dawid Maciejski105-109
-
Contemporary approaches to integrating AI agents into library information processes
Mariia Sokil, Andriy Andrukhiv110-116
-
Development of a reinforcement learning-based adaptive scheduling algorithm for commercial smart kitchens
Konrad Kabala, Piotr Dziurzanski, Agnieszka Konrad117-122
-
Optimizing deep learning techniques with stacking BiLSTM and BiGRU models for gold price prediction
Iqbal Kharisudin, Nike Yustina Oktaviani123-130
-
Websites with virtual church tours in Poland – usability and accessibility analysis
Michał Mitura, Mariusz Dzieńkowski131-137
-
Study of feed granulation process based on system analysis – justification of optimization criteria
Mahil Isa Mammadov138-142
Archives
-
Vol. 15 No. 3
2025-09-30 24
-
Vol. 15 No. 2
2025-06-27 24
-
Vol. 15 No. 1
2025-03-31 26
-
Vol. 14 No. 4
2024-12-21 25
-
Vol. 14 No. 3
2024-09-30 24
-
Vol. 14 No. 2
2024-06-30 24
-
Vol. 14 No. 1
2024-03-31 23
-
Vol. 13 No. 4
2023-12-20 24
-
Vol. 13 No. 3
2023-09-30 25
-
Vol. 13 No. 2
2023-06-30 14
-
Vol. 13 No. 1
2023-03-31 12
-
Vol. 12 No. 4
2022-12-30 16
-
Vol. 12 No. 3
2022-09-30 15
-
Vol. 12 No. 2
2022-06-30 16
-
Vol. 12 No. 1
2022-03-31 9
-
Vol. 11 No. 4
2021-12-20 15
-
Vol. 11 No. 3
2021-09-30 10
-
Vol. 11 No. 2
2021-06-30 11
-
Vol. 11 No. 1
2021-03-31 14
Main Article Content
DOI
Authors
Abstract
This article investigates contemporary advancements in information security technologies, with a focus on automated access control systems and their integration with biometric solutions. Particular emphasis is placed on the potential of facial recognition technologies to strengthen security protocols and streamline access management for restricted areas. A Python-based implementation utilizing the OpenCV library is presented, demonstrating real-time recognition capabilities and dynamic visitor data handling. In contrast to earlier conceptual works, this study provides a detailed description of the applied recognition algorithm, training procedure, and evaluation methodology. The system was tested in 200 experimental trials with 20 participants under varying conditions, including changes in lighting, distance, and partial occlusions such as masks and sunglasses. Performance metrics – accuracy, precision, recall, and F1-score – were calculated based on confusion-matrix analysis. The results confirm that the proposed prototype ensures reliable operation in diverse environments, offering a scalable and cost-effective solution for enhancing access control mechanisms. By combining technical rigor with practical implementation, the study underscores the feasibility of adopting facial recognition systems to improve both security and operational efficiency.
Keywords:
References
[1] Abdykadyrov A., et al.: Optimization of distributed acoustic sensors based on fiber optic technologies. Eastern-European Journal of Enterprise Technologies 5(5)(131), 2024, 50–59 [https://doi.org/10.15587/1729-4061.2024.313455]. DOI: https://doi.org/10.15587/1729-4061.2024.313455
[2] Babu B., et al.: Biometric-Based Access Control Systems with Robust Facial Recognition in IoT Environments. Third International Conference on Intelligent Techniques in Control, Optimization and Signal Processing – INCOS, 2024, 1–6 [https://doi.org/10.1109/INCOS59338.2024.10527499]. DOI: https://doi.org/10.1109/INCOS59338.2024.10527499
[3] Deng J., et al.: ArcFace: Additive Angular Margin Loss for Deep Face Recognition. IEEE/CVF Conference on Computer Vision and Pattern Recognition – CVPR, 2019, 4690–4699 [https://doi.org/10.1109/cvpr.2019.00482]. DOI: https://doi.org/10.1109/CVPR.2019.00482
[4] Elnozahy S. S. F. A.: Raspberry Pi-Based Face Recognition Door Lock System. Electronics 6(2), 2025, 31 [https://doi.org/10.3390/2624-831X/6/2/31]. DOI: https://doi.org/10.3390/iot6020031
[5] Fu C., et al.: DVG-FACE: Dual Variational Generation for Heterogeneous Face Recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence 44(6), 2021, 2938–2952 [https://doi.org/10.1109/tpami.2021.3052549]. DOI: https://doi.org/10.1109/TPAMI.2021.3052549
[6] Huang Z., et al.: When Age-Invariant Face Recognition Meets Face Age Synthesis: A Multi-Task Learning Framework and a New Benchmark. IEEE Transactions on Pattern Analysis and Machine Intelligence 45(6), 2022, 7917–7932 [https://doi.org/10.1109/tpami.2022.3217882]. DOI: https://doi.org/10.1109/TPAMI.2022.3217882
[7] Kunwar K., et al.: Face Detection with Arduino and Computer Vision for Real-Time Automated Access Control. Das S. K., Behera S. K. (eds.): Recent Trends in Intelligent Systems and Next Generation Wireless Communication. Lecture Notes in Networks and Systems 1329, 2025, Springer, 1–12 [https://doi.org/10.1007/978-981-96-4741-5_1]. DOI: https://doi.org/10.1007/978-981-96-4741-5_1
[8] Li N., et al.: Chinese Face Dataset for Face Recognition in an Uncontrolled Classroom Environment. IEEE Access 11, 2023, 86963–86976 [https://doi.org/10.1109/access.2023.3302919]. DOI: https://doi.org/10.1109/ACCESS.2023.3302919
[9] Liu F., et al.: Joint Face Alignment and 3D Face Reconstruction with Application to Face Recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence 42(3), 2018, 664–678 [https://doi.org/10.1109/tpami.2018.2885995]. DOI: https://doi.org/10.1109/TPAMI.2018.2885995
[10] Liu Y., et al.: Corun: Concurrent Inference and Continuous Training at the Edge for Cost-Efficient AI-Based Mobile Image Sensing. Sensors 24(16), 2024, 5262 [https://doi.org/10.3390/s24165262]. DOI: https://doi.org/10.3390/s24165262
[11] Luo M., et al.: FA-GAN: Face Augmentation GAN for Deformation-Invariant Face Recognition. IEEE Transactions on Information Forensics and Security 16, 2021, 2341–2355 [https://doi.org/10.1109/tifs.2021.3053460]. DOI: https://doi.org/10.1109/TIFS.2021.3053460
[12] Mahalingam G., et al.: Investigating the Periocular-Based Face Recognition across Gender Transformation. IEEE Transactions on Information Forensics and Security 9(12), 2014, 2180–2192 [https://doi.org/10.1109/tifs.2014.2361479]. DOI: https://doi.org/10.1109/TIFS.2014.2361479
[13] Mummaneni S., et al.: Face Recognition in Dense Crowd Using Deep Learning Approaches with IP Camera. Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska – IAPGOS 15(2), 2025, 44–50 [https://doi.org/10.35784/iapgos.6818]. DOI: https://doi.org/10.35784/iapgos.6818
[14] Neto P. C. P., et al.: Beyond Masks: On the Generalization of Masked Face Recognition Models to Occluded Face Recognition. IEEE Access 10, 2022, 86222–86233 [https://doi.org/10.1109/access.2022.3199014]. DOI: https://doi.org/10.1109/ACCESS.2022.3199014
[15] Rajyalakshmi V., Lakshmanna K.: Intelligent Face Recognition Based Multi-Location Linked IoT Based Car Parking System. IEEE Access 11, 2023, 84258–84269 [https://doi.org/10.1109/ACCESS.2023.3302905]. DOI: https://doi.org/10.1109/ACCESS.2023.3302905
[16] Raghavendra R., et al.: Design and Evaluation of a Low-Cost Real-Time Face Recognition System for Smart Access Control. IEEE Access 12, 2025, 11745–11758 [https://doi.org/10.1109/ACCESS.2025.117458].
[17] Rao V., et al.: Facial Recognition Attendance System. 3rd International Conference on Smart Systems for Applications in Electrical Sciences – ICSSES, 2025, 1–6 [https://doi.org/10.1109/ICSSES64899.2025.11010075]. DOI: https://doi.org/10.1109/ICSSES64899.2025.11010075
[18] Sivaprasad R., et al.: An Astute Rescue System for Enhanced Security Using Facial Recognition. International Conference on Power, Energy, Control and Transmission Systems – ICPECTS, 2022, 1–5 [https://doi.org/10.1109/ICPECTS56089.2022.10047787]. DOI: https://doi.org/10.1109/ICPECTS56089.2022.10047787
[19] Smailov N., et al.: Monitoring of Emergency Situations Using Fiber-Optic Acoustic Sensors and Signal Processing Algorithms. International Journal of Innovative Research and Scientific Studies 8(5), 2025, 1295–1304 [https://doi.org/10.53894/ijirss.v8i5.9093]. DOI: https://doi.org/10.53894/ijirss.v8i5.9093
[20] Smailov N., et al.: Deformation and Strength Analysis in Space Structures Using Optical Strain Sensors: A Review. International Journal of Innovative Research and Scientific Studies 8(5), 2025, 1991–2009 [https://doi.org/10.53894/ijirss.v8i5.9329]. DOI: https://doi.org/10.53894/ijirss.v8i5.9329
[21] Zhu Z., et al.: WebFace260M: A Benchmark for Million-Scale Deep Face Recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence 45(2), 2022, 2627–2644 [https://doi.org/10.1109/tpami.2022.3169734]. DOI: https://doi.org/10.1109/TPAMI.2022.3169734
Article Details
Abstract views: 180

