Browse > Article
http://dx.doi.org/10.15207/JKCS.2020.11.7.019

Design for Access Control System based on Voice Recognition for Infectious Disease Prevention  

Mun, Hyung-Jin (Dept. of Information and Communication Engineering, Sungkyul University)
Han, Kun-Hee (Division of ICT, Baekseok University)
Publication Information
Journal of the Korea Convergence Society / v.11, no.7, 2020 , pp. 19-24 More about this Journal
Abstract
WHO declared a global pandemic on March 11th for Corona 19. However, there is a situation where you have to go to building for face-to-face education or seminars for economic and social activities. The first check method of COVID-19 infection is to measure body temperature, so the primary entrance and exit is blocked for near-field body temperature measurement. However, since it is troublesome to check directly, thermal camera is installed at the entrance of the building, and body temperature is measured indirectly using the infrared camera to control access. In case of middle and high schools, universities, and lifelong education center, we need a system that is possible to interoperate with attendance checks and automatically recognizes whether to wear masks and can authenticate students. We proposed the system that is to confirm whether to wear a mask with a camera that is embedded in a smart mirror, and that authenticates the user through voice recognition of the user who wants to enter the building by using voice recognition technology and determines whether to enter them or not. The proposed system can check attendance if it is linked with near-field temperature measurement and attendance check APP of student's smart phone.
Keywords
Access Control System; Infectious Diseases Prevention; Voice Recognition; Smart Mirror; User Authentication;
Citations & Related Records
Times Cited By KSCI : 9  (Citation Analysis)
연도 인용수 순위
1 K. W. Koh. (2020). Physical activity guideline for social distancing during COVID-19. Korean Journal of Health Education and Promotion, 37(1), 109-112. DOI : 10.14367/kjhep.2020.37.1.109   DOI
2 H. Ko, S. Kim & N. Kang. (2017). Design and implementation of smart-mirror supporting recommendation service based on personal usage data. KIISE transactions on computing practices, 23(1), 65-73. DOI : 10.5626/KTCP.2017.23.1.65   DOI
3 S. W. Lee, D. M. Ji, H. S. Shin, Y. B. Chae & Y. G. Kim. (2018). A Personalised Smart Mirror Based on Face Recognition. Proc. of Korea Information Science Society, 1644-1646.
4 Y. C. Hwang, H. J. Mun & J. W. Lee. (2015). Face Recognition System Technologies for Authentication System-A Survey. Journal of Convergence for Information Technology, 5(3), 9-13. DOI : 10.22156/CS4SMB.2015.5.3.009.   DOI
5 D. H. Kim & S. J. Lee. (2013). Design of Multi-Purpose Preprocessor for Keyword Spotting and Continuous Language Support in Korean. Journal of Digital Convergence, 11(1), 225-236. DOI : 10.14400/JDPM.2013.11.1.225   DOI
6 H. J Mun. (2019). A Study on the User Identification and Authentication in the Smart Mirror in Private. Journal of Convergence for Information Technology, 9(7), 100-105. DOI : 10.22156/CS4SMB.2019.9.7.100   DOI
7 S. K. Kwon, H. S. Han & J. H. Eom. (2012). A Study on The Operation Scheme of Layered Access Control for Effective Visitors's Access Control. Journal of Security Engineering, 9(3), 231-240.
8 Raspberry Pi 4 Model B, Raspberry Pi 4 on sale now from $35. https://www.raspberrypi.org/blog/raspberrypi-4-on-sale-now-from-35/
9 P. Y. Kumbhar, A. Mulla, P. Kanagi & R. Shah. (2018). Smart Mirror Using Raspberry PI. International Journal for Research in Emerging Science and Technology, 5(4), 2349-2610.
10 Raspbian. Welcome to Raspbian, https://www.raspbian.org/
11 W. Harrington. (2015). Learning Raspbian. Packt Publishing Ltd.
12 T. Kimura, T. Nose, S. Hirooka, Y. Chiba & A. Ito. (2018, November). Comparison of Speech Recognition Performance Between Kaldi and Google Cloud Speech API. In International Conference on Intelligent Information Hiding and Multimedia Signal Processing (pp. 109-115). Springer, Cham.
13 C. J. Chae, H. J. Cho & H. M. Jung. (2018). Authentication Method using Multiple Biometric Information in FIDO Environment. Journal of Digital Convergence, 16(1), 159-164. DOI : 10.14400/JDC.2018.16.1.159   DOI
14 S. J. Bu & S. B. Cho. (2018). Speaker Identification Method based on Convolutional Neural Network with STFT Sound-Map. KIISE Transactions on Computing Practices, 24(6), 289-294.   DOI
15 N. H. Kim & J. Y. Choi. (2019). A study on user authentication method using speaker authentication mechanism in login process. Korean Institute of Smart Media, 8(3), 23-30. DOI : 10.30693/smj.2019.8.3.23   DOI
16 S. V. Viraktamath, M. Katti, A. Khatawkar & P. Kulkarni. (2013). Face detection and tracking using OpenCV. The SIJ Transactions on Computer Networks & Communication Engineering (CNCE), 1(3), 45-50.
17 J. Shin, Z. Liu, C. M. Kim & H. J. Mun. (2018). Writer identification using intra-stroke and inter-stroke information for security enhancements in P2P systems. Peer-to-Peer Networking and Applications, 11(6), 1166-1175. DOI : 10.1007/s12083-017-0606-0   DOI