Objective: To develop a secure access system that offers convenient and robust protection for users without the need for lengthy passwords or 2-step verifications. This system will utilize facial recognition technology and machine learning capabilities, integrated into a Raspberry Pi-based solution. The project will involve a trial-based study conducted until the spring of 2024, aiming for ease of use and accessibility in various scenarios.
Hardware:
Raspberry Pi: A low-cost, compact computing platform.
Webcam: Costing approximately $30, this will serve as the primary image capture device.
Software:
Facial Recognition Software: Implementing machine learning algorithms for facial recognition.
Secure Access Logic: Authentication and access control functions.
Facial Recognition Implementation:
Develop and integrate machine learning algorithms for facial recognition into the Raspberry Pi system.
Train the system using a diverse dataset of facial images.
Ensure real-time processing capabilities for quick and accurate authentication.
Secure Access Logic:
Design an access control system that grants access only after a successful facial recognition test.
Implement robust security measures to prevent unauthorized access attempts.
User Experience:
Conduct usability tests to ensure an easy and intuitive initial face scan setup.
Aim for seamless user experience after the initial setup, with minimal user intervention.
Trial-Based Study:
Run the system in real-world scenarios, collecting data and user feedback.
Continuously refine the system based on trial results and user suggestions.
Accessibility:
Ensure that the system can be used in various situations and environments.
Provide user-friendly instructions and support for users.
Approximate cost of $30 for the webcam, as mentioned.
The trial-based study will extend until the spring of 2024, allowing for iterative improvements and fine-tuning of the system.
A secure access system that offers the convenience of facial recognition without sacrificing security.
Improved user experience compared to traditional password-based systems.
A cost-effective solution built on Raspberry Pi hardware, making it accessible to a wide range of users.
Note: It's important to consider privacy and data security aspects when implementing facial recognition technology and ensure compliance with relevant regulations, such as data protection laws, during the development of this system.
As computers begin to hold more and more valuable information about us it is important to protect this information. The most common form of security is a password but with the continual increase in technologies to bypass these passwords and the only solution would be have longer and more complicated passwords. Instead of this another solution should be found that still has the strong security of a long and complicated password but can be entered with ease.
Statement-Restatement Technique
The real problem is reducing the time it takes to login to a secure application vs the stated problem which is looking to simplify the login process.
Actual constraints include the level of security so it can not be brute forced very easily and the time it takes for the program to work correctly. While stated problem only gives constraints about the password length and attributes (i.e. capital letters or unique characters).
An actual meaningful goal for this problem is having a quick access that is also not easily broken. While the inferred goal is having a short password that is easy.
Relationships found in the problem would be would be the independent variable of the password type and length while the dependent would be the ease at which the password is inputted and the speed at which it is verified.
Why-Why Diagram
Present State-Desired State Strategy
The present state of the problem is passwords nowadays must fit certain requirements; for example having an uppercased letter, or having a special character. These requirements force users to remember long and complicated passwords that will often end up forgotten and not entirely secure due to computers being able to predict user inputs. The desired state is something that requires almost no effort or memorization while still having the quick computation time and secure password.
What is known about the current problem is that currently it is low level, lots of timing but can have fairly large impact. The current problem is not deemed high level because currently there is already a solution, just not an optimal one causing for the task to be done correctly but just inefficiently so. Current solutions of the problem are what is causing for a new solution to be explored because of the problems raised by them. The timing for this situation is similar to the level where there is no current rush for a new solution because an older one is already implemented and recognized. The impact of the situation is large because it safeguards much personal and private information so if the current solution were to be deemed even more vulnerable, perhaps by new brute forcing techniques or software, the situation would become much more dire and a new solution would be needed immediately.
Observing all sides of the problem there is much to unfold and realize. In addition with the multiple strategies in formulating a problem what is known is the lack of speed that comes from current password technologies. This is observed with many companies attempting to mark their solution to password handling but none are universal and widespread enough. Constraints and importance would be found within what information is being safeguarded and the level at which software the security system would be up against. It can be expected that this problem would need a solution that would not follow the current system but rather follow a new way that would be more secure than previous iterations.
This problem is currently being seen by practically every computer user. Nearly all applications have some form of login to protect private or otherwise confidential information that should not be shared with everyone. This information could be used to exploit or harm individuals therefore it would be protected. A solution to this problem would not have to occur immediately but eventually because the current realm of password management has been good at recognizing solutions against common password breakers but this cannot continue as computers begin to get better and better at cracking these codes. A solution to this problem would be most beneficial to users who would like to protect their information securely, so this can range from a normal individual who would like to safeguard their bank information or a government worker trying to prevent confidential information from becoming public information.
A solution to this would most likely be found on any system that currently uses text based password security. An issue that can arise with this is updating some systems as some do not allow for an overhaul that easily and would require adapters to welcome a new solution. This problem is genuinely important because as stated previous is applies to any individual who uses a text based password security system (which is included in nearly every electronic nowadays). The current solution works because it allows for passwords to be remembered on a personal level but this also causes issues with uses who cannot remember as well as others. This causes for even more vulnerabilities as they make their password simpler and more easily broken to remember it with less difficultly. This problem mostly relates to security which is important to most individuals that would put their information behind a password.
Establish clear and measurable design goals and specifications for the secure access system. This shall include parameters such as accuracy, speed, user-friendliness, and security levels.
Research and evaluate existing facial recognition and machine learning technologies to identify the most suitable options for integration with the Raspberry Pi platform.
Identify and analyze various user scenarios to understand the context and conditions under which the secure access system will be used. Consider factors like lighting, user mobility, and real-world usage patterns.
Develop a plan for data collection, including capturing facial images under different conditions and scenarios. Create a preprocessing pipeline to clean and prepare the collected data for training.
Train machine learning models for facial recognition, utilizing the preprocessed data. Optimize the models for accuracy and speed, while minimizing false positives.
Develop the hardware and software components necessary to integrate the machine learning models into the Raspberry Pi platform, ensuring efficient performance and resource usage.
Conduct usability testing with a diverse group of users to gather feedback and iterate on the system's design. This step should involve multiple iterations to refine the user experience.
Perform a comprehensive security assessment to identify vulnerabilities and threats associated with the access system. Implement security measures to mitigate potential risks.
Develop user training materials and support mechanisms to ensure users can effectively utilize the secure access system. This will include user guides and troubleshooting resources.
Plan and execute a trial-based study from the present until the spring of 2024. Collect user feedback, monitor system performance, and make necessary adjustments to meet the design goals and specifications.
Implement an iterative process for continuous improvement based on the insights gained from user feedback and performance data.
Throughout the project, regularly review progress and eliminate any paths that do not align with the desired design goals and specifications. Be ready to pivot or adapt as necessary. When testing various methods of fingerprinting vs facial recognition, the results of the facial recognition were most effective at achieving requirements.
Ethical Issues
Facial recognition systems can be misused for unauthorized spying, which breaches personal privacy.
If the system has bias, it could be misused, leading to unfair treatment due to race, gender, age, or other factors.
The data from facial recognition can be used for stalking or harassment, causing threat to a person's safety.
There's a risk of people gaining unauthorized access to facial data for identity theft or malicious impersonation.
The system may be used for unauthorized entry to secure locations or systems.
Solutions
Use strict rules and legal structures for the use of facial recognition tech. Clearly state its proper uses and forbid illegal activities.
Always check and tweak the face-identifying system. This will cut down on unfairness and make sure everyone is treated equally, no matter their background.
Build privacy-friendly elements into the system design. Think of data level anonymity, short timespans for data holding, and clear consent processes.
Include key privacy controls in the system’s plan. This means making data anonymous, keeping data for limited times, and giving explicit agreement tools.
Clearly tell users about what the facial recognition system can and cannot do. This will foster openness and comprehension.
We need to put strong security measures in place. Encryption of face data, safe data storage, and access rules can stop unauthorized use and protect from identity theft.
Set up strong safety measures, such as coding of facial info, secured storage, and controlled access. This can stop unapproved use and safeguard against personal info theft.
Product Liability: Potential Hazards
Tech moves fast. This quick pace can mean some parts or functions become outdated or replaced.
In the future, safety risks might pop up. These could give hackers a chance to attack, or cause user data to leak.
Rules and laws might change. If this happens, the system may not follow these new standards. This could lead to legal problems.
Users might not use the system right or try to change it without permission. This could cause it to not work as it should and potentially cause danger.
Solutions to Eliminate Hazards
Create a system with upgradeable parts. This allows us to keep up with tech changes and makes the product last longer.
We need a strong setup for regular software and firmware updates. This will fix security weaknesses and make the system work better.
Make sure we constantly watch for new security risks. Quick updates should be put out to combat these risks.
Give users easy-to-follow instructions and information. This helps them use the system right and avoids unsafe changes.
Social Impacts
Getting rid of Raspberry Pi units and related parts leads to electronic trash. This can hurt our environment.
Certain electronic parts might have harmful substances. If not tossed right, they can harm the environment and people's health.
Weak recycling systems can cause poor ways of getting rid of garbage. This can make environmental issues even worse.
How we get rid of stuff might affect poor areas more. These areas may lack good waste control centers.
Solutions
Check the design's impact on nature. Think about what materials you use and how dumping them might cause trouble.
Pick materials for your design that won't hurt our planet. These should be easy to recycle, and shouldn't use toxic stuff much.
Make your system easy to take apart. This helps separate parts for recycling and safe throw-away.
Work together with places that already recycle electronic trash or form bonds to help throw away and recycle parts correctly.
KT Decision Matrix
KT Evaluation Matrix
Process Model
System Model
Gantt Chart
Senior Design Plan
First, we are going to contact and reach out to potential customers and consumers.
We are then going to research and study how we can implement raspberry pi with facial recognition.
After that, we'll begin to prototype the pieces and place orders for the parts we need to get a general understanding of our design.
We will begin designing our actual system after we have strong support for our desired outcome.
We shall implement the actual design out and begin test trials.
Based on the outcome, we shall fix any tweaks and run maintenance updates to modify the system.
Final Public launch
Regularly run monthly updates and maintenance fixes