Implementation of Real-Time Face Recognition for Secure Weapon Storage Access Control
Abstract
The security of weapon storage warehouses is a critical concern that requires an access control system with exceptionally high reliability, particularly in minimizing false acceptance, where unauthorized individuals are incorrectly granted access. In high-risk facilities, even a single false acceptance incident can lead to serious security consequences. Conventional systems based on physical keys or access cards present limitations, including risks of loss, duplication, and access forgery. Therefore, a biometric-based solution is necessary to enhance identification accuracy and strengthen overall security. This study aims to design and implement a reliable, high-security facial-recognition-based access control system for weapon storage facilities. The proposed system integrates a Multi-task Cascaded Convolutional Neural Network (MTCNN) for face detection, FaceNet for feature extraction, and a Support Vector Machine (SVM) for identity classification. The system is implemented as a standalone application on an edge computing device (mini PC) integrated with an electronic door lock. All detection and decision-making processes are performed locally without reliance on cloud services. System evaluation was conducted under various testing scenarios, including variations in lighting intensity, camera distance, facial attributes, and unregistered face testing. Experimental results show that the system achieved an accuracy of 96.25%. A precision of 100% indicates that no unauthorized access was granted. The recall reached 92.50%, reflecting a small proportion of rejected authorized users. The F1-score of 96.11% demonstrates balanced performance. The False Acceptance Rate was 0%, confirming complete prevention of illegal access. The False Rejection Rate was 7.50%, which remains acceptable in high-risk security environments. The system consistently rejected all unregistered faces and operated in real time with an average door unlocking response time of approximately 1.3 seconds. In conclusion, the proposed system provides reliable recognition performance with a strong emphasis on preventing false acceptance. These findings indicate its suitability for enhancing security in high-risk weapon storage facilities.
Downloads
References
P. Zhou and W. Zhang, “Research on Computer Network Information Security and Protection Strategy Based on Deep Learning Algorithm,” Proc. - 2020 Int. Conf. Adv. Ambient Comput. Intell. ICAACI 2020, pp. 181–184, Sep. 2020, doi: 10.1109/ICAACI50733.2020.00046.
K. Wysocki, “Protecting Critical Infrastructure: Methods and Techniques,” in Civil Protection Systems and Disaster Governance: a Cross-Regional Approach, Springer Nature, 2024, pp. 41–60. doi: 10.1007/978-3-031-60167-5_3.
H. Martinez, F. J. Rodriguez-Lozano, F. León-García, J. M. Palomares, and J. Olivares, “Distributed Fog computing system for weapon detection and face recognition,” J. Netw. Comput. Appl., vol. 232, p. 104026, Dec. 2024, doi: 10.1016/J.JNCA.2024.104026.
M. R. Alfarisi, P. Telnoni, P. Aji, G. A. Mutiara, and Periyadi, “Development of a Web-Based Weapon Rack Security System Utilizing RFID Technology and Real-Time Data Logging,” Int. J. Comput. Methods Exp. Meas., vol. 13, no. 1, pp. 157–163, Mar. 2025, doi: 10.18280/ijcmem.130117.
B. Indrawan, D. G. Alzamora, M. S. Rahmatullah, and A. Wikarta, “Facial Recognition-Based Automatic Door Security System Integrated with Internet of Things for Smart Home Actualization,” Lect. Notes Mech. Eng., pp. 360–368, 2023, doi: 10.1007/978-981-19-0867-5_43.
Y. Grover, P. Sharma, and N. Kansal, “Revolutionizing Face Recognition with IIoT: Smarter, Faster, Connected,” ICCECE 2025 - Int. Conf. Comput. Electr. Commun. Eng., 2025, doi: 10.1109/ICCECE61355.2025.10941049.
L. Chetty, A. Odowa, A. C. Avenido, I. Hussein, and Y. Elakkad, “Performing facial recognition using ensemble learning,” in Advanced Interdisciplinary Applications of Machine Learning Python Libraries for Data Science, IGI Global, 2023, pp. 89–123. doi: 10.4018/978-1-6684-8696-2.ch004.
H. M. Al-Dabbas, R. A. Azeez, and A. E. Ali, “Machine Learning Approach for Facial Image Detection System,” Iraqi J. Sci., vol. 64, no. 10, pp. 5428–5441, 2023, doi: 10.24996/ijs.2023.64.10.44.
D. Wu, L. Li, W. Tian, H. Xian, and C. Tian, “Biometric identification on the cloud: A more secure and faster construction,” Inf. Sci. (Ny)., vol. 669, p. 120553, May 2024, doi: 10.1016/J.INS.2024.120553.
M. Omara, M. Fayez, H. Khalid, and S. Ghoniemy, “A Transfer Learning Approach for Face Liveness Detection,” Proc. - 11th IEEE Int. Conf. Intell. Comput. Inf. Syst. ICICIS 2023, pp. 122–127, 2023, doi: 10.1109/ICICIS58388.2023.10391203.
P. Bhavya Sri, K. Navya, K. Saiteja, P. Keerthi, S. Hariharan, and V. Kukreja, “Harnessing Security Improvements Using FaceNet Approach for Face Recognition System,” Proc. - 2024 13th IEEE Int. Conf. Commun. Syst. Netw. Technol. CSNT 2024, pp. 306–312, 2024, doi: 10.1109/CSNT60213.2024.10545894.
P. Ahlawat, N. Kaur, C. Kaur, S. Kumar, and H. K. Sharma, “Deep Learning Based Face Recognition System for Automated Identification,” Commun. Comput. Inf. Sci., vol. 1930, pp. 60–72, 2024, doi: 10.1007/978-3-031-48781-1_6.
K. Ramalakshmi, B. J. Jingle, C. P. Shirley, V. Suvisheik, P. Joyce Beryl Princess, and K. Vidhya, “Facial Recognition System with LBPH Algorithm: Implementation in Python for Machine Learning,” 2nd Int. Conf. Intell. Cyber Phys. Syst. Internet Things, ICoICI 2024 - Proc., pp. 1681–1686, 2024, doi: 10.1109/ICoICI62503.2024.10696268.
S. E. Bakan and M. Yildirim, “An Access Control with Face Recognition Based on LBPH Algorithm,” Proc. - 2025 IEEE 7th Glob. Power, Energy Commun. Conf. GPECOM 2025, pp. 991–996, 2025, doi: 10.1109/GPECOM65896.2025.11062016.
C. Ung, P. Mantini, and S. K. Shah, “Minimizing Number of Distinct Poses for Pose-Invariant Face Recognition,” Proc. Int. Jt. Conf. Comput. Vision, Imaging Comput. Graph. Theory Appl., vol. 2, pp. 447–455, 2025, doi: 10.5220/0013186400003912.
X. Wang and W. Zhang, “Anti-occlusion face recognition algorithm based on a deep convolutional neural network,” Comput. Electr. Eng., vol. 96, Dec. 2021, doi: 10.1016/j.compeleceng.2021.107461.
M. Hao, F. Yuan, J. Li, and Y. Sun, “Facial expression recognition based on regional adaptive correlation,” IET Comput. Vis., vol. 17, no. 4, pp. 445–460, Jun. 2023, doi: 10.1049/cvi2.12179.
S. G. Aydin and H. S. Bilge, “Optimal hardware implementation for end-To-end CNN-based classification,” 2023 Int. Conf. Innov. Trends Inf. Technol. ICITIIT 2023, 2023, doi: 10.1109/ICITIIT57246.2023.10068601.
D. Santhakumar, S. Nagaraju, S. Sivamani, B. S. N. Prasad, V. Veeresh, and V. Nithianantharaj, “Facial Recognition and Image Processing in Security and Surveillance Systems Using Deep Learning Algorithms and Multi-task Cascade Deep Convolutional Neural Networks,” 3rd Int. Conf. Adv. Comput. Commun. Mater. ICACCM 2024, 2024, doi: 10.1109/ICACCM61117.2024.11059009.
M. Mohana and P. Subashini, “Analysing the performance of Viola-Jones and multi-task convolution neural networks face detection algorithms using real-time video sequences,” Int. J. Comput. Vis. Robot., vol. 15, no. 3, pp. 286–311, 2025, doi: 10.1504/IJCVR.2025.146293.
S. Jia and Y. Tian, “Face Detection Based on Improved Multi-task Cascaded Convolutional Neural Networks,” IAENG Int. J. Comput. Sci., 2024.
M. K. Roy, P. Dwibedi, A. Singh, R. P. Chakraborty, and M. K. H. Mondal, “MTCNN and FACENET-Based Face Detection and Recognition Model for Attendance Monitoring,” Smart Innov. Syst. Technol., vol. 376, pp. 525–539, 2024, doi: 10.1007/978-981-99-7711-6_42.
D. R. Ghaida, V. V. Siedharta, U. Hakim, K. Mutijarsa, A. I. Septiana, and Y. Rosmansyah, “SVM-Classified FaceNet and Eigenface Models under Lighting and Occlusion Variations for Face Recognition,” Proc. - 2024 Int. Semin. Appl. Technol. Inf. Commun. Smart Emerg. Technol. a Better Life, iSemantic 2024, pp. 415–420, 2024, doi: 10.1109/iSemantic63362.2024.10762684.
N. Raj and D. Sadhya, “Securing Biometric Data over Cloud via Shamir’s Secret Sharing,” Commun. Comput. Inf. Sci., vol. 1376 CCIS, pp. 282–292, 2021, doi: 10.1007/978-981-16-1086-8_25.
N. Santos, B. Ghita, and G. L. Masala, “Medical Systems Data Security and Biometric Authentication in Public Cloud Servers,” IEEE Trans. Emerg. Top. Comput., vol. 12, no. 2, pp. 572–582, Apr. 2024, doi: 10.1109/TETC.2023.3271957.
R. Shanker, S. P. Chouhan, S. Bhardwaj, A. Kumar, and M. Bhattacharya, “Fast and Efficient Real-Time Facial Recognition System Using Raspberry Pi and IoT,” 2024 IEEE 8th Int. Conf. Inf. Commun. Technol. CICT 2024, 2024, doi: 10.1109/CICT64037.2024.10899457.
N. Srinu, C. S. S. Kumar, M. Senthil, and D. B. Babu, “Smart Attendence Recording System Utilizing CNN and Edge Computing Techniques,” Proc. 5th Int. Conf. Soft Comput. Secur. Appl. ICSCSA 2025, pp. 551–558, 2025, doi: 10.1109/ICSCSA66339.2025.11170847.
A. K. Tiwari, A. Dwivedi, A. Dubey, A. Kushwaha, D. K. Dubey, and H. Tiwari, “Face Recognition Attendance Management System Using Python,” Proc. - IEEE 2024 1st Int. Conf. Adv. Comput. Commun. Networking, ICAC2N 2024, pp. 727–730, 2024, doi: 10.1109/ICAC2N63387.2024.10895357.
A. Potdar, P. Barbhaya, and S. Nagpure, “Face Recognition for Attendance System using CNN based Liveliness Detection,” 2022 Int. Conf. Adv. Comput. Commun. Mater. ICACCM 2022, 2022, doi: 10.1109/ICACCM56405.2022.10009024.
A. A. Nair, R. Adithyan, A. Unni, and S. Nalinakshan, “RFID Door Lock Access Control Systems: Trends, Technologies and Applications,” 3rd Int. Conf. Intell. Data Commun. Technol. Internet Things, IDCIoT 2025, pp. 906–912, 2025, doi: 10.1109/IDCIOT64235.2025.10914928.
V. Harish, D. Sam Chrisvin, and R. Thottungal, “Overview of RFID Security and its Applications,” 2021 Int. Conf. Adv. Electr. Electron. Commun. Comput. Autom. ICAECA 2021, 2021, doi: 10.1109/ICAECA52838.2021.9675754.
H. Mistareehi, J. Owen, and A. Aboualy, “Biometric Authentication in Identity and Access Management,” Int. Conf. Ubiquitous Futur. Networks, ICUFN, pp. 650–652, 2025, doi: 10.1109/ICUFN65838.2025.11169800.
S. Bajpai and D. Sharma, “Moving towards 3D-biometric,” in Digital Image Security: Techniques and Applications, CRC Press, 2024, pp. 76–92. doi: 10.1201/9781003468974-4.
S. M. Kadhim, J. K. S. Paw, Y. C. Tak, and S. T. Abd Al-Latief, “Robust Security System: A Novel Facial Recognition Optimization Using Coronavirus-Inspired Algorithm and Machine Learning,” Iraqi J. Comput. Sci. Math., vol. 6, no. 2, 2025, doi: 10.52866/2788-7421.1260.
M. H. Abul Hasanat, M. Fofana, M. Tamim, R. Basheer, and R. Singh, “Facial Recognition and Detection: Overcoming Pose Variations and Enhancing Accuracy with Machine Learning Implementation,” Lect. Notes Networks Syst., vol. 1399 LNNS, pp. 164–176, 2025, doi: 10.1007/978-3-031-91005-0_16.
T. Honcharenko, S. Dolhopolov, I. Sachenko, I. Achkasov, A. Fesan, and S. Paliy, “Automated Face Recognition System Using Convolutional Neural Network,” SIST 2025 - 2025 IEEE 5th Int. Conf. Smart Inf. Syst. Technol. Conf. Proc., 2025, doi: 10.1109/SIST61657.2025.11139261.
S. Z. Liu, S. Ma, H. Q. Chen, L. Z. Cui, and J. Ding, “Combining KNN with AutoEncoder for Outlier Detection,” J. Comput. Sci. Technol., vol. 39, no. 5, pp. 1153–1166, Sep. 2024, doi: 10.1007/s11390-023-2403-y.
N. E. I. Karabadji, A. Amara Korba, A. Assi, H. Seridi, S. Aridhi, and W. Dhifli, “Accuracy and diversity-aware multi-objective approach for random forest construction,” Expert Syst. Appl., vol. 225, Sep. 2023, doi: 10.1016/j.eswa.2023.120138.
D. Vetrithangam, S. Palit, A. Mehta, G. Saranya, D. Joseph, and A. Pathak, “Machine Fault Diagnosis Using Random Forest with Recursive Feature Elimination and Cross Validation,” J. Mach. Comput., vol. 5, no. 3, pp. 1700–1711, Jul. 2025, doi: 10.53759/7669/jmc202505134.
E. D. Handoyo, S. Santoso, and R. A. Nathasya, “Performance of Face Recognition Machine Learning Algorithms in Attendance Recording System with Limited Training Data,” J. Innov. Image Process., vol. 7, no. 3, pp. 707–724, Sep. 2025, doi: 10.36548/jiip.2025.3.008.
C. El Morr, M. Jammal, H. Ali-Hassan, and W. El-Hallak, “Support Vector Machine,” in International Series in Operations Research and Management Science, vol. 334, Springer, 2022, pp. 385–411. doi: 10.1007/978-3-031-16990-8_13.
N. Yan and Z. Xu, “Research on Image Classification of RBF Kernel SVM,” Proc. 2024 Acad. Conf. China Instrum. Control Soc. ACCIS 2024, pp. 68–71, 2024, doi: 10.1109/ACCIS62068.2024.10948583.
H. Wang, T. Cai, Y. Wei, and J. Cai, “A KNN Algorithm Based on Mixed Normalization Factors,” Commun. Comput. Inf. Sci., vol. 2146 CCIS, pp. 388–394, 2024, doi: 10.1007/978-981-97-4393-3_31.
A. Kanan and A. Taha, “Cloud-Based Reconfigurable Hardware Accelerator for the KNN Classification Algorithm,” Proc. - 2022 14th IEEE Int. Conf. Comput. Intell. Commun. Networks, CICN 2022, pp. 308–312, 2022, doi: 10.1109/CICN56167.2022.10008343.
X. Ma, T. Yang, J. Chen, and Z. Liu, “k-Nearest Neighbor algorithm based on feature subspace,” Proc. - 2021 Int. Conf. Big Data Anal. Comput. Sci. BDACS 2021, pp. 225–228, Jun. 2021, doi: 10.1109/BDACS53596.2021.00056.
W. Feng, C. Ma, G. Zhao, and R. Zhang, “FSRF:An Improved Random Forest for Classification,” Proc. 2020 IEEE Int. Conf. Adv. Electr. Eng. Comput. Appl. AEECA 2020, pp. 173–178, Aug. 2020, doi: 10.1109/AEECA49918.2020.9213456.
L. Bo and H. Chunlan, “EL-RFSVM: An Ensemble Learning Framework Based on Support Vector Machine and Random Forests for Labour Resource Allocation,” 2022 IEEE 2nd Int. Conf. Electron. Technol. Commun. Information, ICETCI 2022, pp. 536–541, 2022, doi: 10.1109/ICETCI55101.2022.9832255.
X. An et al., “Killing Two Birds with One Stone: Efficient and Robust Training of Face Recognition CNNs by Partial FC,” Proc. IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit., vol. 2022-June, pp. 4032–4041, 2022, doi: 10.1109/CVPR52688.2022.00401.
A. Khalifa and A. Al-Hamadi, “A Survey on Loss Functions for Deep Face Recognition Network,” Proc. 2021 IEEE Int. Conf. Human-Machine Syst. ICHMS 2021, Sep. 2021, doi: 10.1109/ICHMS53169.2021.9582652.
Z. Jun, “The Development and Application of Support Vector Machine,” J. Phys. Conf. Ser., vol. 1748, no. 5, Jan. 2021, doi: 10.1088/1742-6596/1748/5/052006.
W. C. Cheng, H. C. Hsiao, Y. Q. Hong, and D. Y. Wang, “Masked face recognition based on facenet and genetic algorithm,” Int. J. Appl. Sci. Eng., vol. 20, no. 3, 2023, doi: 10.6703/IJASE.202309_20(3).005.
S. Ammar, T. Bouwmans, and M. Neji, “Face Identification Using Data Augmentation Based on the Combination of DCGANs and Basic Manipulations,” Inf., vol. 13, no. 8, Aug. 2022, doi: 10.3390/info13080370.
F. N. M. Nazri, S. N. K. Kamarudin, and M. R. Shamsuddin, “PCA Method in Facial Features Extraction for Attendance Tracking Prototype,” 2022 3rd Int. Conf. Artif. Intell. Data Sci. Championing Innov. Artif. Intell. Data Sci. Sustain. Futur. AiDAS 2022 - Proc., pp. 55–59, 2022, doi: 10.1109/AiDAS56890.2022.9918685.
A. Zhalgas, B. Amirgaliyev, and A. Sovet, “Robust Face Recognition Under Challenging Conditions: A Comprehensive Review of Deep Learning Methods and Challenges,” Appl. Sci., vol. 15, no. 17, Sep. 2025, doi: 10.3390/app15179390.
A. Jayesh and N. Singh, “Implementation and Evaluation of a FaceNet Inspired Model for Facial Recognition,” 2025 Int. Conf. Cogn. Comput. Eng. Commun. Sci. Biomed. Heal. Informatics, IC3ECSBHI 2025, pp. 1428–1434, 2025, doi: 10.1109/IC3ECSBHI63591.2025.10990681.
M. Mittal, H. M. Al-Jawahry, N. Varshney, S. P. Kumar, J. Michaelson, and R. A. Reddy, “Improving Support Vector Machine Performance with Advanced Kernel Methods,” Proc. Int. Conf. Contemp. Comput. Informatics, IC3I 2024, pp. 1749–1754, 2024, doi: 10.1109/IC3I61595.2024.10828664.
Z. Nesma, B. Belkacem, and B. Ahcene, “Optimizing hyperparameters of linear SVM classifiers using the support method,” 2023 Int. Conf. Decis. Aid Sci. Appl. DASA 2023, pp. 446–449, 2023, doi: 10.1109/DASA59624.2023.10286806.
S. Gaur, N. Tiwari, S. Vyas, and M. Pandey, “Enhancing Facial Recognition Accuracy through KNN Classification with Principal Component Analysis and Local Binary Pattern,” Int. J. Electr. Electron. Res., vol. 12, no. 3, pp. 791–798, 2024, doi: 10.37391/ijeer.120309.
Y. N. Amirgaliyev, Z. A. Buribayev, Z. M. Melis, and A. S. Ataniyazova, “On one approach to recognizing fuzzy images of faces based on an ensemble,” Proc. - 25th Int. Conf. Circuits, Syst. Commun. Comput. CSCC 2021, pp. 15–20, 2021, doi: 10.1109/CSCC53858.2021.00011.
D. S. J. D. Prasanna, Ragupathi, and P. Kumar, “Enhanced Face Recognition Performance Through Convolutional Neural Networks,” 2nd IEEE Int. Conf. IoT, Commun. Autom. Technol. ICICAT 2024, pp. 220–224, 2024, doi: 10.1109/ICICAT62666.2024.10922908.
Copyright (c) 2026 Anisa Anisa, Giva Andriana Mutiara, Muhammad Rizqy Alfarisi

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlikel 4.0 International (CC BY-SA 4.0) that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).


.png)
.png)
.png)
.png)
.png)