SAS-HRM: Secure Authentication System for Human Resource Management

Authors

  • Reem M. Abdullah Department of Computer Science, College of Science, Mustansiriyah University, 10052 Baghdad, IRAQ.
  • Sundos A. Hameed Alazawi Department of Computer Science, College of Science, Mustansiriyah University, 10052 Baghdad, IRAQ. https://orcid.org/0000-0003-1673-0211
  • Phaklen Ehkan Faculty of Electronic Engineering Technology, Universiti Malaysia Perlis (UniMAP), Perlis, Malaysia.

DOI:

https://doi.org/10.23851/mjs.v34i3.1332

Keywords:

Smart Card, HRM, Authentication, CNN

Abstract

To guarantee data confidentiality and information sensitivity, human resource management requires secure systems. In the field of authorization and dependability in recognizing and identifying persons, facial recognition has grown in importance. In this research, a secure authentication system is proposed based on biometric aspects of the user's face and identifying it using the CNN classification model is provided to give access to human resource management and update data. The system is divided into four major stages: First, set up the system environment, beginning with smart cards, card readers, Arduino, and so on. Second, after undergoing pre-treatment steps, the facial characteristics are extracted using LDA. Third, create a high-accuracy CNN model to recognize and classify the user's face among the system's users. Finally, the user is allowed to enter the system and update his information. When compared to the accuracy of classification using machine learning techniques with a CNN proposed model, the accuracy of the model with LDA was up to 100%. K-NN has 91%, while TD has 94%.

Downloads

Download data is not yet available.

References

R. J. Stone, A. Cox, and M. Gavin, Human resource management. John Wiley & Sons, 2020.

M. Sokolova and S. Matwin, "Personal privacy protection in time of big data," in Challenges in computational statistics and data mining: Springer, 2015, pp. 365-380.

CrossRef

N. Yusuf, K. A. Marafa, K. L. Shehu, H. Mamman, and M. Maidawa, "A survey of biometric approaches of authentication," International Journal of Advanced Computer Research, vol. 10, no. 47, pp. 96-104, 2020.

CrossRef

M. Bharath and K. R. Rao, "A novel multimodal hand database for biometric authentication," International Journal of Advanced Technology Engineering Exploration, vol. 9, no. 86, p. 127, 2022.

CrossRef

S. A. Alazawi, H. Abdulaaliabdulbaqi, and Y. M. Mohialden, "New authentication model for multimodal biometrics based on shape features vectors," Journal of Southwest Jiaotong University, vol. 54, no. 6, 2019.

CrossRef

B. Kumari, P. Gurjar, and A. K. Tiwari, "A Review Study on Biometric Authentication," World Journal of Research and Review, vol. 14, no. 6, pp. 10-13, 2022.

J. Liebers and S. Schneegass, "Introducing functional biometrics: Using body-reflections as a novel class of biometric authentication systems," in Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, 2020, pp. 1-7.

CrossRef

L. Li, X. Mu, S. Li, and H. Peng, "A review of face recognition technology," IEEE access, vol. 8, pp. 139110-139120, 2020.

CrossRef

C. D. Patel, S. Trivedi, and S. Patel, "Biometrics in IRIS technology: A survey," International Journal of Scientific Research Publications, vol. 2, no. 1, pp. 1-5, 2012.

A. S. Shaker and S. R. Ahmed, "Information Retrieval for Cancer Cell Detection Based on Advanced Machine Learning Techniques," Al-Mustansiriyah Journal of Science, vol. 33, no. 3, pp. 20-26, 2022.

CrossRef

H. H. Mohammed, S. A. Baker, and A. S. Nori, "Biometric identity authentication system using hand geometry measurements," in Journal of Physics: Conference Series, 2021, vol. 1804, no. 1: IOP Publishing, p. 012144.

CrossRef

S. Alwahaishi and J. Zdrálek, "Biometric authentication security: an overview," in 2020 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM), 2020: IEEE, pp. 87-91.

CrossRef

S. A. Alazawi, N. M. Shati, and A. H. Abbas, "Texture features extraction based on GLCM for face retrieval system," Periodicals of Engineering Natural Sciences, vol. 7, no. 3, pp. 1459-1467, 2019.

CrossRef

A. Sarkar and B. K. Singh, "A review on performance, security and various biometric template protection schemes for biometric authentication systems," Multimedia Tools Applications, vol. 79, pp. 27721-27776, 2020.

CrossRef

K. Dowlatshah, M. Alizadeh, M. A. Raji, and E. N. Alkhanak, "A secure and robust smart card-based remote user authentication scheme," International Journal of Internet Technology Secured Transactions, vol. 10, no. 3, pp. 255-267, 2020.

CrossRef

A. Navaz, A. Fiaz, C. Prabhadevi, V. Sangeetha, and S. Gopalakrishnan, "Human Resource Management System," arXiv preprint arXiv:. 2013.

H. Li, "Optimization of the enterprise human resource management information system based on the internet of things," Complexity, vol. 2021, pp. 1-12, 2021.

CrossRef

T. Wang, N. Li, and H. Li, "Design and development of human resource management computer system for enterprise employees," Plos one, vol. 16, no. 12, p. e0261594, 2021.

CrossRef | PubMed

H. M. Shukur, S. R. Zeebaree, R. R. Zebari, B. K. Hussan, O. H. Jader, and L. M. Haji, "Design and implementation of electronic enterprise university human resource management system," in Journal of Physics: Conference Series, 2021, vol. 1804, no. 1: IOP Publishing, p. 012058.

CrossRef

X. Yin and X. Liu, "Multi-task convolutional neural network for pose-invariant face recognition," IEEE Transactions on Image Processing, vol. 27, no. 2, pp. 964-975, 2017.

CrossRef | PubMed

H. Tu, K. Li, and Q. Zhao, "Robust Face Recognition with Assistance of Pose and expression Normalized albedo images," in Proceedings of the 2019 5th International Conference on Computing and Artificial Intelligence, 2019, pp. 93-99.

CrossRef

M. Zulfiqar, F. Syed, M. J. Khan, and K. Khurshid, "Deep face recognition for biometric authentication," in 2019 international conference on electrical, communication, and computer engineering (ICECCE), 2019: IEEE, pp. 1-6.

CrossRef

A. Abozaid, A. Haggag, H. Kasban, and M. Eltokhy, "Multimodal biometric scheme for human authentication technique based on voice and face recognition fusion," Multimedia tools applications, vol. 78, pp. 16345-16361, 2019.

CrossRef

T. Hussain et al., "Internet of things with deep learning-based face recognition approach for authentication in control medical systems," Computational Mathematical Methods in Medicine, vol. 2022, 2022.

CrossRef | PubMed

K. Vikram and S. Padmavathi, "Facial parts detection using Viola Jones algorithm," in 2017 4th international conference on advanced computing and communication systems (ICACCS), 2017: IEEE, pp. 1-4.

CrossRef

M. Karimi and E. Entezami, "Quality Assessment for Retargeted Images: A Review," in 2020 International Conference on Machine Vision and Image Processing (MVIP), 2020: IEEE, pp. 1-6.

CrossRef

H. Yu and J. Yang, "A direct LDA algorithm for high-dimensional data-with application to face recognition," Pattern recognition, vol. 34, no. 10, pp. 2067-2070, 2001.

CrossRef

R. K. Sahu, Y. P. Singh, and A. Kulshrestha, "A Comparative Study of Face Recognition System Using PCA and LDA," International Journal of IT, Engineering and Applied Sciences Research, vol. 2, no. 10, 2013.

Downloads

Key Dates

Published

30-09-2023

Issue

Section

Original Article

How to Cite

[1]
R. M. . Abdullah, S. A. H. Alazawi, and P. . Ehkan, “SAS-HRM: Secure Authentication System for Human Resource Management ”, Al-Mustansiriyah Journal of Science, vol. 34, no. 3, pp. 64–71, Sep. 2023, doi: 10.23851/mjs.v34i3.1332.

Similar Articles

1-10 of 14

You may also start an advanced similarity search for this article.