Face Mask Detection using CNN: A Fusion of Cryptography and Blockchain
Received: 13 May 2024 | Revised: 28 May 2024, 3 June 2024, and 4 June 2024 | Accepted: 12 June 2024 | Online: 9 October 2024
Corresponding author: Imen Hagui
Abstract
The global COVID-19 pandemic has led to an urgent need for government intervention to prevent its spread. Scientific evidence has confirmed the effectiveness of mask-wearing in reducing virus spread. However, enforcing mask mandates in public spaces presents notable monitoring hurdles, particularly as facial recognition technology is impeded by face coverings. With many organizations relying on facial recognition for employee authentication, security and authentication become critical, especially for IoT systems. This article uses a Convolutional Neural Network (CNN) model to accurately identify mask-wearing individuals and introduces a secure user authentication mechanism between the node and the access point. This authentication mechanism consists of three phases. (i) Identification Phase at the Access Point Level: A novel hybrid biometric pattern, merging password and image features, is employed to strengthen user authentication security through a fusion approach. (ii) Secure Communication: Utilizing blockchain technology and AES cryptography ensures the secure transmission of these patterns between the node and the access point. (iii) Matching Phase at the Node Level: A newly proposed method verifies authenticity by comparing the combined image and password features with database records during the development phase. The experimental results demonstrate its outstanding performance, achieving 99% accuracy, 99% recall, 100% precision, and 98.9% F1 score. These results suggest that the proposed approach holds promise as an effective and secure solution for identifying individuals wearing masks while ensuring reliable authentication in various environments.
Keywords:
Internet of things (IoT), Advanced Encryption Standard (AES), Convolutional Neural Networks (CNNs), blockchain, face recognitionDownloads
References
N. K. Al-Shammari, T. H. Syed, and M. B. Syed, "An Edge – IoT Framework and Prototype based on Blockchain for Smart Healthcare Applications," Engineering, Technology & Applied Science Research, vol. 11, no. 4, pp. 7326–7331, Aug. 2021.
G. Held, "Enhancing Security," in The ABCs of TCP/IP, 2nd ed., Auerbach Publications, 2003.
N. Akhtar and A. Mian, "Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey," IEEE Access, vol. 6, pp. 14410–14430, 2018.
M. Qiu, Ed., Smart Blockchain: First International Conference, SmartBlock 2018, Tokyo, Japan, December 10–12, 2018, Proceedings, vol. 11373. Cham, Switzerland: Springer International Publishing, 2018.
N. Mahalingam and P. Sharma, "An intelligent blockchain technology for securing an IoT-based agriculture monitoring system," Multimedia Tools and Applications, vol. 83, no. 4, pp. 10297–10320, Jan. 2024.
S. Ma, Y. Zhong, and Q. Huang, "Efficient Public Key Encryption With Outsourced Equality Test for Cloud-Based IoT Environments," IEEE Transactions on Information Forensics and Security, vol. 17, pp. 3758–3772, 2022.
V. Thirunavukkarasu, A. S. Kumar, P. Prakasam, and G. Suresh, "Elliptic curve cryptography based key management and flexible authentication scheme for 5G wireless networks," Multimedia Tools and Applications, vol. 82, no. 14, pp. 21131–21145, Jun. 2023.
A. Vangala, A. K. Das, A. Mitra, S. K. Das, and Y. Park, "Blockchain-Enabled Authenticated Key Agreement Scheme for Mobile Vehicles-Assisted Precision Agricultural IoT Networks," IEEE Transactions on Information Forensics and Security, vol. 18, pp. 904–919, 2023.
Y. Jiang and J. Zhang, "Distributed Detection Over Blockchain-Aided Internet of Things in the Presence of Attacks," IEEE Transactions on Information Forensics and Security, vol. 18, pp. 3445–3460, 2023.
A. Oumina, N. El Makhfi, and M. Hamdi, "Control The COVID-19 Pandemic: Face Mask Detection Using Transfer Learning," in 2020 IEEE 2nd International Conference on Electronics, Control, Optimization and Computer Science (ICECOCS), Kenitra, Morocco, Dec. 2020, pp. 1–5.
M. Loey, G. Manogaran, M. H. N. Taha, and N. E. M. Khalifa, "A hybrid deep transfer learning model with machine learning methods for face mask detection in the era of the COVID-19 pandemic," Measurement, vol. 167, Jan. 2021, Art. no. 108288.
S. Habib, M. Alsanea, M. Aloraini, H. S. Al-Rawashdeh, M. Islam, and S. Khan, "An Efficient and Effective Deep Learning-Based Model for Real-Time Face Mask Detection," Sensors, vol. 22, no. 7, Jan. 2022, Art. no. 2602.
"Covid-19-PIS Classification Dataset by PyImageSearch." Roboflow, [Online]. Available: https://universe.roboflow.com/pyimagesearch/covid-19-pis.
Downloads
How to Cite
License
Copyright (c) 2024 Imen Hagui, Amina Msolli, Abdelhamid Helali, Hassen Fredj
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.