Enhanced DeepID Network-Based Access Control for Property Management Using Transformer and Gaussian Mixture Models

Huiqi Zhang

Abstract


In recent years, property backend access control systems have faced many challenges in terms of management efficiency and security. Traditional authentication methods are difficult to cope with complex and changing access scenarios, leading to security vulnerabilities. To address this issue, a property backend access control model based on an improved DeepID network is designed. The Transformer model is introduced to optimize the feature extraction capability of the DeepID network, and the multi-head attention mechanism is applied to optimize feature expression and improve the accuracy of face feature recognition for users. Moreover, a Gaussian mixture model is introduced to accurately model user behavior patterns. The experimental study was conducted on a platform with Intel Core i9-12900K, NVIDIA RTX 3090, and 64GB RAM, using 13,233 face images from LFW dataset for training and 5,000 images from CelebA dataset for validation. According to the results, the improved DeepID network model achieved a feature recognition accuracy of 97.3%, with a loss value of only 0.15, statistically significantly outperforming traditional DeepID network (86.7%), VGG-Face (92.4%), and FaceNet (94.9%) in terms of F1-score and precision-recall metrics. The research provides an efficient and reliable technical solution for the property backend access control system, which has important practical significance for improving the intelligence and security of property management.


Full Text:

PDF

References


Pavia J, Bonilla K M J, Cordovilla W J, Pama J R, Baul C, Bermejo E. Bicol college property management system for bachelor of science in hospitality management students: Mock hotel operation. JPAIR Multidisciplinary Research, 2022, 50(1): 52-66.

Mpamugo E, Ansa G. Enhancing network security in mobile applications with role-based access control. Journal of Information Systems and Informatics, 2024, 6(3): 1872-1899.

Al-Arashi W, Almaqtobi M, Al-fahidi A Q, Ali A M, Aborujilah A. Human gender identification employing convolution neural networks for veiled face images. Journal of Science and Technology, 2025, 30(1): 29-35.

Tumpa R S, Khaliluzzaman M, Hoque M D J, Tasnim R. Revolutionizing age and gender recognition: An enhanced CNN architecture. International Journal of Systematic Innovation, 2024, 8(4): 27-45.

Westerlund A M, Manohar Koki S, Kancharla S, Tibo A, Saigiridharan L, Genheden S. Do chemformers dream of organic matter? Evaluating a transformer model for multistep retrosynthesis. Journal of Chemical Information and Modeling, 2024, 64(8): 3021-3033.

Sikder A K, Babun L, Celik Z B, Aksu H, McDaniel P, Kirda E, Uluagac A S. Who’s controlling my device? Multi-user multi-device-aware access control system for shared smart home environment. ACM Transactions on Internet of Things, 2022, 3(4): 1-39.

Iqbal U, Mir A H. Secure and practical access control mechanism for WSN with node privacy. Journal of King Saud University-Computer and Information Sciences, 2022, 34(6): 3630-3646.

Patil R Y. A secure privacy preserving and access control scheme for medical internet of things (MIoT) using attribute-based signcryption. International Journal of Information Technology, 2024, 16(1): 181-191.

Butt A U R, Mahmood T, Saba T, Bahaj S A O, Alamri F S, Iqbal M W, Khan A R. An optimized role-based access control using trust mechanism in E-health cloud environment. IEEE Access, 2023, 11(2): 138813-138826.

Sharma P, Jindal R, Borah M D. Blockchain-based cloud storage system with CP-ABE-based access control and revocation process. the Journal of Supercomputing, 2022, 78(6): 7700-7728.

Chen Y, Ye Z, Zhang Y, Xie W, Chen Q, Lan C, Zhang Z. A deep learning model for accurate diagnosis of infection using antibody repertoires. The Journal of Immunology, 2022, 208(12): 2675-2685.

Al-Arashi W, Almaqtobi M, Al-fahidi A Q, Ali A M, Aborujilah A. Human gender identification employing convolution neural networks for veiled face images. Journal of Science and Technology, 2025, 30(1): 29-35.

Nassiri K, Akhloufi M. Transformer models used for text-based question answering systems. Applied Intelligence, 2023, 53(9): 10602-10635.

Thomas J B, Chaudhari S G, Shihabudheen K V, Verma N K. CNN-based transformer model for fault detection in power system networks. IEEE Transactions on Instrumentation and Measurement, 2023, 72(3): 1-10.

Cao Z, Magar R, Wang Y, Barati Farimani A. Moformer: self-supervised transformer model for metal-organic framework property prediction. Journal of the American Chemical Society, 2023, 145(5): 2958-2967.

Anbalagan E, Rao P S V S, Vijayan P, Alluri A, Nageswari D, Kalaivani R. Improving intrusion detection using satin bowerbird optimization with deep learning model for IIoT environment. International Journal of Electrical and Electronics Research, 2024, 12(1): 219-227.

Zhe W, Batumalay M, Thinakaran R, Chan C K, Wen G K, Yu Z J, Raman J. A Research on two-stage facial occlusion recognition algorithm based on CNN. Engineering, Technology & Applied Science Research, 2024, 14(6): 18205-18212.

McIntosh T, Watters P, Kayes A S M, et al. Enforcing situation-aware access control to build malware-resilient file systems. Future Generation Computer Systems, 2021, 115(3): 568-582.

Cao J, Chen L, Hu D, Unsupervised eye blink artifact detection from EEG with Gaussian mixture model. IEEE Journal of Biomedical and Health Informatics, 2021, 25(8): 2895-2905.

Baseer N A, Samiuddin M, Imran M D, Deb A, Gowda N C. Smart surveillance system using Gaussian mixture model. International Journal of Human Computations & Intelligence, 2024, 3(3): 342-349.




DOI: https://doi.org/10.31449/inf.v49i26.8133

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.