SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 3 Issue 5, August 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD25280 | Volume – 3 | Issue – 5 | July - August 2019 Page 357
Development of a Secured Door Lock System Based on
Face Recognition using Raspberry Pi and GSM Module
Soe Sandar1, Saw Aung Nyein Oo2
1Master Student, 2Associate Professor
1,2Department of Electronic Engineering, Mandalay Technological University, Mandalay, Myanmar
How to cite this paper: Soe Sandar | Saw
Aung Nyein Oo"Developmentof aSecured
Door Lock System Based on Face
Recognition using Raspberry Pi and GSM
Module" Published
in International
Journal of Trend in
Scientific Research
and Development
(ijtsrd), ISSN: 2456-
6470, Volume-3 |
Issue-5, August
2019, pp.357-361,
https://doi.org/10.31142/ijtsrd25280
Copyright © 2019 by author(s) and
International Journalof Trendin Scientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
CommonsAttribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by
/4.0)
ABSTRACT
Security is an important part of everyday life. The main aim of the system is to
develop a secured door lock system. The system consistsofthreesections.The
first section is the face recognition system that is based on Haar-like features
detection method and Local Binary Pattern (LBP) recognition algorithm. The
second section is the password securitysystem.Andthe lastsectionisthealert
system through GSM module. The system is composed by the combination of
face recognition security system, password security system and the alert
system through the GSM module. In this system, the iteration used in face
recognition system is reduced by using Local Binary Pattern (LBP) algorithm.
In saving time, the processing time of this system, therefore,isbetterthanthat
of the normal system.
KEYWORDS: Raspberry Pi, GSM module, Webcam, Face Recognition System
I. INTRODUCTION
Today security and safety is becoming more and morepopular daybydayandit
is getting improved and used for the ease in our life. Now days, technology has
become an integrated part of people’s lives thereforethesecurityof one’shome
must also not be left behind [1]. This paper describesthe prototypeof asecured
door unlocking system. Face Recognition has been one of the hot fields in
computer vision and biometrics, since it is a challengeable work to identify a
face image with varying expression, occlusion, disguise, and illumination.Along
with fingerprint match and eye retina match, they becomeaprominentmethod
in biometrics technology [2].
The system consists of face detection, face recognition, a
password custom, a GSM module and a door lock. Face
detection is the process of detecting the region of face in an
image. The face is detected using Haar-like feature and face
recognition is implemented using Local binary pattern
histogram(LBPH). The systemcomprisesawebcam todetect
the faces and a solenoid door lock for unlocking the door.
Every users detected by the webcam will be checked for
compatibility with the database in the system. If the face is
recognized, the password box will appear. The user will
enter the password. If the password is correct, the door will
open automatically. On the other hand, GSM module will
send the notification to the owner for the unknown person.
The main control circuit on this system is Raspberry Pi. The
software used is OpenCV Library and Python.
II. System Architecture
Figure 1 shows the block diagram of “a Secured Door Lock
System based on Face Recognition using Raspberry Pi and
GSM Module”. In this system, we are using Raspberry Pi for
connecting with camera to capture images continuously
through OpenCV platform and compared with storedimages
in the database and send data to DoorLockand GSMmodule.
The working of the each component is specified as follows,
Fig. 1: General Block Diagram of a Secured Door Lock
System based on Face Recognition using Raspberry Pi and
GSM Module
A. Web Camera
According to user convince, user can use Web camera or Pi
camera. In this system, we use a Web Camera having 16 MP
interpolated resolution also plug and play USB interface
which can be configured with Raspberry Pi which is already
connected with door. The webcam is already accessory for
Raspberry Pi. It is used for capturing an image and send the
captured image to the Raspberry Pi. Figure 2 shows the web
camera.
IJTSRD25280
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD25280 | Volume – 3 | Issue – 5 | July - August 2019 Page 358
Fig. 2: Web Camera
B. Raspberry Pi
Raspberry Pi is a small board computer having the ability to
act like a controller. When image is taken by cameramodule
and send to the raspberry Pi. The raspberry pi compares it
with stored face images. At the first time, we capture the ten
type of images to create a database in the system and this
database is compared with the live captured images. After
comparing the two images, output is considered to be
positive or negative as this controller is digital and based on
the output response it gives commands to GSM module[3].
Fig. 3 shows the Raspberry Pi.
Fig. 3: Raspberry Pi
C. GSM module
GSM module is used to send a message to the authorities
after comparing the captured images with the storedimages
and based on whether output is positive or negative. If the
output is positive, the GSM module will not work in this
system. If the unknown person is tryingtoopenthedoor, the
GSM module send to the authority person otherwise send
“Unknown person is trying to unlock the door, take
action”[3]. Figure 4 shows the GSM module.
Fig. 4: GSM module
D. Relay
A relay is an electrically operated device. It has a control
system and (also called input circuit or input contactor) and
controlled system. It is frequently used in automatic control
circuit. To put it simply, it is an automatic switch to
controlling a high- current circuit with a low-current signal.
Our system will use one- channel relay module. Fig. 5 shows
the Relay.
Figure 5: Relay
E. Solenoid Door Lock
Solenoid Door locks are locks that are generally mounted
directly on or in doors / gates. Fig. 6 shows the solenoid
Door Lock.
Fig. 6: Solenoid Door Lock
F. Software
The system is largely based on Python programming from
detecting the face to recognizing the face. Python is used to
capture and process images. The capture image is then
processed using Open CVlibrarythatintegrates withPython.
The face recognition part is carried out by the Local Binary
Pattern algorithm.OpenCV (Open Computer Vision) is a
library mainly aimed at real-time computer vision. It is
written in C++. There are bindings in Python, Java and
MATLAB/OCTAVA. Here, the openCV is used for processing
the given image and for comparing the image.
III. System Flowchart
Fig. 7: Flowchart of the overall proposed system
Fig. 7 shows the flowchart of “a Secured Door Lock System
based on Face Recognition using Raspberry Pi and GSM
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD25280 | Volume – 3 | Issue – 5 | July - August 2019 Page 359
module”. Firstly, the session starts, it will work as follows -
the Web camera will first take the image and send it to the
raspberry pi. Then, It will compare the captured image with
the stored image with the database.TheLocalBinaryPattern
Histogram Algorithm comes in the action by comparing the
captured image with the stored image and based on this it
produce the results. If the result is positive, the password
box will appear. The user can enter the password. If the
password is correct , the door will be unlock automatically.
Otherwise, the password is wrong in three times, then with
the help of GSM module, an SMS will be automatically
generated to the authorized user that “Unknown person is
trying to unlock the door, take action” and the door will
remain lock itself. The captured image is not matched with
the stored image in the database, the door will remain
closed. And the system gets reset. In this way, the security
can be achieved over the Raspberry Pi and GSM module.
IV. Methodology
A. Face Detection
Face detection is one of the fundamental applications used
in face recognition technology. OpenCV provides a Haar
cascade classifier, which can be used for face detection. In
this system, Haar cascade classifiers is chosen in the face
detection process. The reason for using Haar classifier is
because of its speed , high detection accuracy and low false
positive rate. Haar classifier is an algorithm created by Paul
Viola and Michael Jones; which are trained from lots of
positive pictures (with faces) and negativepictures(without
faces).[4] The image of the value of simple features is
classified by Viola Jones. Each feature is a single value
obtained by subtracting sum of pixels under the white
rectangle from sum of pixels under the black rectangle.
The single value for Haar features are computed using the
following equation:
(1)
Where, n is the number of pixels, I(x) is the real value of
detected on an image.Figure2 shows the three types of
features.
Fig. 8: (a) Edge features (b) Line Features (c) Four-
rectangular features
B. Face Recognition
The detected faces check the data base and then compare
LPBH values and then match the present data base and face
are recognized.
In this system, we are using Local Binary Pattern Histogram
(LBPH) for face recognition. Open CV is an open source
computer vision library that has three built-in face
recognition algorithms,(i) Eigenfaces, (ii) Fisherfaces and
(iii) Local Binary Pattern Histogram (LBPH). Compared with
the two algorithms , the LBPH can not only recognize the
front face, but also recognize the side face, which is more
flexible[5]. Therefore, the face recognition algorithms used
here is Local Binary Pattern Histogram(LBPH). It is a simple
yet very efficient texture operator which labels the pixels of
an image by thresholdingthe neighborhoodof eachpixel and
considers the result as a binary number. Andthenitconverts
the binary number into a decimal number , and that decimal
number is the new value of the center pixel.
Fig.9. Conversion of grayscale image to decimal
In our case, we are using VNC viewer to run raspbian os for
detecting images from the database. At first, we have to save
images by using data sets and after that, we will train that
faces to LBPH algorithm then it stores into the database. At
first, it converts color images to gray scaleimages and thenit
coverts into pixels for detecting this will divide the image
into various pieces then it stores the values of each pixel. If
pixels are less than it will be represented as 0 and pixels
which are high will be 1 then it will be arranged in 3 × 3
matrix format for recognizing the images on screen
compared to database stored images[6]. Some different
variations of faces that captures are showed in the following
figure.
Fig.10: Some different variations of faces
V. Results And Discussions
In this system, we designed a Secured Door Lock System
with the help of Face Recognition. In this, we are using
Raspberry pi which has many features that make the user
modify use in different smart applications.
Fig. 11: A prototype of a Secured Door Lock System
Fig. 12: Monitor runs with Raspbian OS
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD25280 | Volume – 3 | Issue – 5 | July - August 2019 Page 360
The experiment was performed to implement the face
recognition using OpenCV library installed in Raspberry Pi.
We used Python in Pyton IDLE 3.6.5 and the database that
used was sqlite studio.
The face detection procedure was first implemented which
was done by the help of face detection algorithm that we
used. Firstly, we used the web camera to capture theimages.
We registered five users as authorized user andtheirimages
are stored in the database. For these users, we took 10 facial
images with different poses and expressions.
Fig. 13: Face Capturing and Saving into the database
And also in the Fig. 14, we can see the facial images in the
database.
Fig. 14: Some facial images in the database
In the experiment we trained the face images in the
database. That the facial images are successfully trained
shown in the Fig. 15
Fig. 15: Face Training Process
Based on the LBPH algorithm , the input face images are
compared with database facial images for identification.The
face recognition results are shown in below in Fig. 16.
Fig. 16: Face Recognition Process
If the face is recognized, the password box will appear. The
user will enter the password. If the password is correct, the
door will open automatically. On the other hand, The
password is wrong in three times, GSM module will sendthe
notification to the owner for the unknown person.
Fig. 17: The notification to the owner for the unknown
person
VI. Conclusion
In this paper, a Secured Door Lock System Based on Face
Recognition using Raspberry Pi and GSM module is
presented. We designed the system which provides security
locks for door, comfort, connivance security and energy
efficiency for user. This system can be used for
authentication in home, banks and other public places. In
this system, we have been implemented with a combination
of webcam, Raspberry Pi, relay, solenoid door lock and GSM
module. And we used the Haar Cascade classifier method to
detect the face and Local Binary Pattern Histogram (LBPH)
for recognize the face. I conclude that various operationsare
successfully tested and results are documented.
ACKNOWLEDGEMENT
The author would like to express her gratitude to Dr.Saw
Aung Nyein Oo, Associate Professor and to all her teachers
from Department of Electronic Engineering, Mandalay
Technological University. And , she deeply thanks to her
parents for their encouragement and support and especially
thanks to her friends for giving the chance to take their face
images utilized in this paper.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD25280 | Volume – 3 | Issue – 5 | July - August 2019 Page 361
REFERENCES
[1] Nareshkumar R. M., Apoorva Kamat, Dnyaneshvari
Shinde “Smart Door Security Control System Using
Raspberry Pi”, International Journal of Innovations &
Advancement in Computer Science, IJIACS, ISSN 2347-
8616, Volume 6, Issue 11, November 2017
[2] Najmurrokhman, Kusnandar Kusnandar, Arief
Budiman Krama, Esmeralada Contessa Djimal, and
Robbi Rahim, “Development of a secured room access
system based on face recognition using Raspberry Pi
and Android based smartphone”, MATEC Web of
Conferences 197, 11008(2018), AASEC 2018,
http://doi.org/10.1051/matecconf/201819711008
[3] Saurabh K. Patil , Dr. Narendra G. Narole, “Smart Face
Recognition Security Based On Raspberry Pi”,
International Journal of Engineering Science and
Computing, IJESC , March 2018
[4] “Face Detection using Haar Cascades”
[5] XueMei Zhao and ChenBing Wei, “A Real-time Face
Recognition System Based on the Improved KBPH
Algorithm”, 2017 IEEE 2nd InternationalConferenceon
Signal and Image Processing.
[6] Thulluri Krishma Vamsi, Kanchana Charan Sai,
Vijayalakshmi M, “Face Recognition based door
unlocking system using Raspberry Pi”, International
Journal of Advanced Research, Ideas andInnovations in
Technology, (IJARIIT), ISSN: 2454-132X, Volume 5,
Issue 2, 2019
[7] S. Z. Li, A. K. Jain, Handbook of Face Recognition 2nd,
(Springer Verlag,2011)
[8] Alexander Mordvintsev & Abid K, “OpenCV-Python
Tutorials Documentation”, Release 1, Nov 05, 2017.

More Related Content

What's hot

Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
Smart DoorBell - Make your door smart with Raspberry Pi!
Smart DoorBell - Make your door smart with Raspberry Pi!Smart DoorBell - Make your door smart with Raspberry Pi!
Smart DoorBell - Make your door smart with Raspberry Pi!Mattia Brunetti
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition SystemZara Tariq
 
Face recognition system
Face recognition systemFace recognition system
Face recognition systemshraddha mane
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShashidhar Reddy
 
Attendance Management System using Face Recognition
Attendance Management System using Face RecognitionAttendance Management System using Face Recognition
Attendance Management System using Face RecognitionNanditaDutta4
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhavVaibhav P
 
LDA presentation
LDA presentationLDA presentation
LDA presentationMohit Gupta
 
Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsHari Krishnan
 
Smart surveillance monitoring system using raspberry pi and
Smart surveillance monitoring system using raspberry pi andSmart surveillance monitoring system using raspberry pi and
Smart surveillance monitoring system using raspberry pi andJEEVA ARAVINTH
 
Face detection By Abdul Hanan
Face detection By Abdul HananFace detection By Abdul Hanan
Face detection By Abdul HananAbdul Hanan
 
Smart doorbell - Using Raspberry pi
Smart doorbell - Using Raspberry piSmart doorbell - Using Raspberry pi
Smart doorbell - Using Raspberry piAabid Ansar
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on BiometricsPathik504
 

What's hot (20)

Face Detection
Face DetectionFace Detection
Face Detection
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Smart DoorBell - Make your door smart with Raspberry Pi!
Smart DoorBell - Make your door smart with Raspberry Pi!Smart DoorBell - Make your door smart with Raspberry Pi!
Smart DoorBell - Make your door smart with Raspberry Pi!
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
 
Age and Gender Detection.docx
Age and Gender Detection.docxAge and Gender Detection.docx
Age and Gender Detection.docx
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Attendance Management System using Face Recognition
Attendance Management System using Face RecognitionAttendance Management System using Face Recognition
Attendance Management System using Face Recognition
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
LDA presentation
LDA presentationLDA presentation
LDA presentation
 
Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click points
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Smart surveillance monitoring system using raspberry pi and
Smart surveillance monitoring system using raspberry pi andSmart surveillance monitoring system using raspberry pi and
Smart surveillance monitoring system using raspberry pi and
 
Face detection By Abdul Hanan
Face detection By Abdul HananFace detection By Abdul Hanan
Face detection By Abdul Hanan
 
Smart doorbell - Using Raspberry pi
Smart doorbell - Using Raspberry piSmart doorbell - Using Raspberry pi
Smart doorbell - Using Raspberry pi
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
 
face detection
face detectionface detection
face detection
 
Iris ppt
Iris pptIris ppt
Iris ppt
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 

Similar to Development of a Secured Door Lock System Based on Face Recognition using Raspberry Pi and GSM Module

Face Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemFace Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemIRJET Journal
 
IRJET- Face Detection based on Image Processing using Raspberry Pi 4
IRJET-  	  Face Detection based on Image Processing using Raspberry Pi 4IRJET-  	  Face Detection based on Image Processing using Raspberry Pi 4
IRJET- Face Detection based on Image Processing using Raspberry Pi 4IRJET Journal
 
Classroom Attendance using Face Detection and Raspberry-Pi
Classroom Attendance using Face Detection and Raspberry-PiClassroom Attendance using Face Detection and Raspberry-Pi
Classroom Attendance using Face Detection and Raspberry-PiIRJET Journal
 
IRJET- Smart Surveillance Cam using Face Recongition Alogrithm
IRJET-  	  Smart Surveillance Cam using Face Recongition AlogrithmIRJET-  	  Smart Surveillance Cam using Face Recongition Alogrithm
IRJET- Smart Surveillance Cam using Face Recongition AlogrithmIRJET Journal
 
Bank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image ProcessingBank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image ProcessingIRJET Journal
 
AUTOMATIC DOOR UNLOCK WITH FACIAL RECOGNITION USING IoT
AUTOMATIC DOOR UNLOCK WITH FACIAL RECOGNITION USING IoTAUTOMATIC DOOR UNLOCK WITH FACIAL RECOGNITION USING IoT
AUTOMATIC DOOR UNLOCK WITH FACIAL RECOGNITION USING IoTIRJET Journal
 
IRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric AttendanceIRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric AttendanceIRJET Journal
 
Web-Based Online Embedded Security System And Alertness Via Social Media
Web-Based Online Embedded Security System And Alertness Via Social MediaWeb-Based Online Embedded Security System And Alertness Via Social Media
Web-Based Online Embedded Security System And Alertness Via Social MediaIRJET Journal
 
IRJET- Intrusion Detection through Image Processing and Getting Notified ...
IRJET-  	  Intrusion Detection through Image Processing and Getting Notified ...IRJET-  	  Intrusion Detection through Image Processing and Getting Notified ...
IRJET- Intrusion Detection through Image Processing and Getting Notified ...IRJET Journal
 
Comparative Study on Various System Based on Raspberry-Pi Technology
Comparative Study on Various System Based on Raspberry-Pi TechnologyComparative Study on Various System Based on Raspberry-Pi Technology
Comparative Study on Various System Based on Raspberry-Pi TechnologyIRJET Journal
 
IRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoTIRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoTIRJET Journal
 
Real time face recognition of video surveillance system using haar cascade c...
Real time face recognition of video surveillance system using  haar cascade c...Real time face recognition of video surveillance system using  haar cascade c...
Real time face recognition of video surveillance system using haar cascade c...nooriasukmaningtyas
 
Face Recognition Based Payment Processing System
Face Recognition Based Payment Processing SystemFace Recognition Based Payment Processing System
Face Recognition Based Payment Processing SystemIRJET Journal
 
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IRJET Journal
 
IRJET- Vehicle Seat Vacancy Identification using Image Processing Technique
IRJET- Vehicle Seat Vacancy Identification using Image Processing TechniqueIRJET- Vehicle Seat Vacancy Identification using Image Processing Technique
IRJET- Vehicle Seat Vacancy Identification using Image Processing TechniqueIRJET Journal
 
ASSISTANCE SYSTEM FOR DRIVERS USING IOT
ASSISTANCE SYSTEM FOR DRIVERS USING IOTASSISTANCE SYSTEM FOR DRIVERS USING IOT
ASSISTANCE SYSTEM FOR DRIVERS USING IOTIRJET Journal
 
Smart Home for Senior Citizens
Smart Home for Senior CitizensSmart Home for Senior Citizens
Smart Home for Senior CitizensIRJET Journal
 
IRJET- IoT and ML based Smart TV for Child Eyes Safety
IRJET-  	  IoT and ML based Smart TV for Child Eyes SafetyIRJET-  	  IoT and ML based Smart TV for Child Eyes Safety
IRJET- IoT and ML based Smart TV for Child Eyes SafetyIRJET Journal
 
IoT Based Smart Surveillance and Automation
IoT Based Smart Surveillance and AutomationIoT Based Smart Surveillance and Automation
IoT Based Smart Surveillance and AutomationIRJET Journal
 

Similar to Development of a Secured Door Lock System Based on Face Recognition using Raspberry Pi and GSM Module (20)

S0102297102
S0102297102S0102297102
S0102297102
 
Face Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemFace Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock System
 
IRJET- Face Detection based on Image Processing using Raspberry Pi 4
IRJET-  	  Face Detection based on Image Processing using Raspberry Pi 4IRJET-  	  Face Detection based on Image Processing using Raspberry Pi 4
IRJET- Face Detection based on Image Processing using Raspberry Pi 4
 
Classroom Attendance using Face Detection and Raspberry-Pi
Classroom Attendance using Face Detection and Raspberry-PiClassroom Attendance using Face Detection and Raspberry-Pi
Classroom Attendance using Face Detection and Raspberry-Pi
 
IRJET- Smart Surveillance Cam using Face Recongition Alogrithm
IRJET-  	  Smart Surveillance Cam using Face Recongition AlogrithmIRJET-  	  Smart Surveillance Cam using Face Recongition Alogrithm
IRJET- Smart Surveillance Cam using Face Recongition Alogrithm
 
Bank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image ProcessingBank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image Processing
 
AUTOMATIC DOOR UNLOCK WITH FACIAL RECOGNITION USING IoT
AUTOMATIC DOOR UNLOCK WITH FACIAL RECOGNITION USING IoTAUTOMATIC DOOR UNLOCK WITH FACIAL RECOGNITION USING IoT
AUTOMATIC DOOR UNLOCK WITH FACIAL RECOGNITION USING IoT
 
IRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric AttendanceIRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric Attendance
 
Web-Based Online Embedded Security System And Alertness Via Social Media
Web-Based Online Embedded Security System And Alertness Via Social MediaWeb-Based Online Embedded Security System And Alertness Via Social Media
Web-Based Online Embedded Security System And Alertness Via Social Media
 
IRJET- Intrusion Detection through Image Processing and Getting Notified ...
IRJET-  	  Intrusion Detection through Image Processing and Getting Notified ...IRJET-  	  Intrusion Detection through Image Processing and Getting Notified ...
IRJET- Intrusion Detection through Image Processing and Getting Notified ...
 
Comparative Study on Various System Based on Raspberry-Pi Technology
Comparative Study on Various System Based on Raspberry-Pi TechnologyComparative Study on Various System Based on Raspberry-Pi Technology
Comparative Study on Various System Based on Raspberry-Pi Technology
 
IRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoTIRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoT
 
Real time face recognition of video surveillance system using haar cascade c...
Real time face recognition of video surveillance system using  haar cascade c...Real time face recognition of video surveillance system using  haar cascade c...
Real time face recognition of video surveillance system using haar cascade c...
 
Face Recognition Based Payment Processing System
Face Recognition Based Payment Processing SystemFace Recognition Based Payment Processing System
Face Recognition Based Payment Processing System
 
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
 
IRJET- Vehicle Seat Vacancy Identification using Image Processing Technique
IRJET- Vehicle Seat Vacancy Identification using Image Processing TechniqueIRJET- Vehicle Seat Vacancy Identification using Image Processing Technique
IRJET- Vehicle Seat Vacancy Identification using Image Processing Technique
 
ASSISTANCE SYSTEM FOR DRIVERS USING IOT
ASSISTANCE SYSTEM FOR DRIVERS USING IOTASSISTANCE SYSTEM FOR DRIVERS USING IOT
ASSISTANCE SYSTEM FOR DRIVERS USING IOT
 
Smart Home for Senior Citizens
Smart Home for Senior CitizensSmart Home for Senior Citizens
Smart Home for Senior Citizens
 
IRJET- IoT and ML based Smart TV for Child Eyes Safety
IRJET-  	  IoT and ML based Smart TV for Child Eyes SafetyIRJET-  	  IoT and ML based Smart TV for Child Eyes Safety
IRJET- IoT and ML based Smart TV for Child Eyes Safety
 
IoT Based Smart Surveillance and Automation
IoT Based Smart Surveillance and AutomationIoT Based Smart Surveillance and Automation
IoT Based Smart Surveillance and Automation
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 

Recently uploaded (20)

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 

Development of a Secured Door Lock System Based on Face Recognition using Raspberry Pi and GSM Module

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 3 Issue 5, August 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD25280 | Volume – 3 | Issue – 5 | July - August 2019 Page 357 Development of a Secured Door Lock System Based on Face Recognition using Raspberry Pi and GSM Module Soe Sandar1, Saw Aung Nyein Oo2 1Master Student, 2Associate Professor 1,2Department of Electronic Engineering, Mandalay Technological University, Mandalay, Myanmar How to cite this paper: Soe Sandar | Saw Aung Nyein Oo"Developmentof aSecured Door Lock System Based on Face Recognition using Raspberry Pi and GSM Module" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-3 | Issue-5, August 2019, pp.357-361, https://doi.org/10.31142/ijtsrd25280 Copyright © 2019 by author(s) and International Journalof Trendin Scientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative CommonsAttribution License (CC BY 4.0) (http://creativecommons.org/licenses/by /4.0) ABSTRACT Security is an important part of everyday life. The main aim of the system is to develop a secured door lock system. The system consistsofthreesections.The first section is the face recognition system that is based on Haar-like features detection method and Local Binary Pattern (LBP) recognition algorithm. The second section is the password securitysystem.Andthe lastsectionisthealert system through GSM module. The system is composed by the combination of face recognition security system, password security system and the alert system through the GSM module. In this system, the iteration used in face recognition system is reduced by using Local Binary Pattern (LBP) algorithm. In saving time, the processing time of this system, therefore,isbetterthanthat of the normal system. KEYWORDS: Raspberry Pi, GSM module, Webcam, Face Recognition System I. INTRODUCTION Today security and safety is becoming more and morepopular daybydayandit is getting improved and used for the ease in our life. Now days, technology has become an integrated part of people’s lives thereforethesecurityof one’shome must also not be left behind [1]. This paper describesthe prototypeof asecured door unlocking system. Face Recognition has been one of the hot fields in computer vision and biometrics, since it is a challengeable work to identify a face image with varying expression, occlusion, disguise, and illumination.Along with fingerprint match and eye retina match, they becomeaprominentmethod in biometrics technology [2]. The system consists of face detection, face recognition, a password custom, a GSM module and a door lock. Face detection is the process of detecting the region of face in an image. The face is detected using Haar-like feature and face recognition is implemented using Local binary pattern histogram(LBPH). The systemcomprisesawebcam todetect the faces and a solenoid door lock for unlocking the door. Every users detected by the webcam will be checked for compatibility with the database in the system. If the face is recognized, the password box will appear. The user will enter the password. If the password is correct, the door will open automatically. On the other hand, GSM module will send the notification to the owner for the unknown person. The main control circuit on this system is Raspberry Pi. The software used is OpenCV Library and Python. II. System Architecture Figure 1 shows the block diagram of “a Secured Door Lock System based on Face Recognition using Raspberry Pi and GSM Module”. In this system, we are using Raspberry Pi for connecting with camera to capture images continuously through OpenCV platform and compared with storedimages in the database and send data to DoorLockand GSMmodule. The working of the each component is specified as follows, Fig. 1: General Block Diagram of a Secured Door Lock System based on Face Recognition using Raspberry Pi and GSM Module A. Web Camera According to user convince, user can use Web camera or Pi camera. In this system, we use a Web Camera having 16 MP interpolated resolution also plug and play USB interface which can be configured with Raspberry Pi which is already connected with door. The webcam is already accessory for Raspberry Pi. It is used for capturing an image and send the captured image to the Raspberry Pi. Figure 2 shows the web camera. IJTSRD25280
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD25280 | Volume – 3 | Issue – 5 | July - August 2019 Page 358 Fig. 2: Web Camera B. Raspberry Pi Raspberry Pi is a small board computer having the ability to act like a controller. When image is taken by cameramodule and send to the raspberry Pi. The raspberry pi compares it with stored face images. At the first time, we capture the ten type of images to create a database in the system and this database is compared with the live captured images. After comparing the two images, output is considered to be positive or negative as this controller is digital and based on the output response it gives commands to GSM module[3]. Fig. 3 shows the Raspberry Pi. Fig. 3: Raspberry Pi C. GSM module GSM module is used to send a message to the authorities after comparing the captured images with the storedimages and based on whether output is positive or negative. If the output is positive, the GSM module will not work in this system. If the unknown person is tryingtoopenthedoor, the GSM module send to the authority person otherwise send “Unknown person is trying to unlock the door, take action”[3]. Figure 4 shows the GSM module. Fig. 4: GSM module D. Relay A relay is an electrically operated device. It has a control system and (also called input circuit or input contactor) and controlled system. It is frequently used in automatic control circuit. To put it simply, it is an automatic switch to controlling a high- current circuit with a low-current signal. Our system will use one- channel relay module. Fig. 5 shows the Relay. Figure 5: Relay E. Solenoid Door Lock Solenoid Door locks are locks that are generally mounted directly on or in doors / gates. Fig. 6 shows the solenoid Door Lock. Fig. 6: Solenoid Door Lock F. Software The system is largely based on Python programming from detecting the face to recognizing the face. Python is used to capture and process images. The capture image is then processed using Open CVlibrarythatintegrates withPython. The face recognition part is carried out by the Local Binary Pattern algorithm.OpenCV (Open Computer Vision) is a library mainly aimed at real-time computer vision. It is written in C++. There are bindings in Python, Java and MATLAB/OCTAVA. Here, the openCV is used for processing the given image and for comparing the image. III. System Flowchart Fig. 7: Flowchart of the overall proposed system Fig. 7 shows the flowchart of “a Secured Door Lock System based on Face Recognition using Raspberry Pi and GSM
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD25280 | Volume – 3 | Issue – 5 | July - August 2019 Page 359 module”. Firstly, the session starts, it will work as follows - the Web camera will first take the image and send it to the raspberry pi. Then, It will compare the captured image with the stored image with the database.TheLocalBinaryPattern Histogram Algorithm comes in the action by comparing the captured image with the stored image and based on this it produce the results. If the result is positive, the password box will appear. The user can enter the password. If the password is correct , the door will be unlock automatically. Otherwise, the password is wrong in three times, then with the help of GSM module, an SMS will be automatically generated to the authorized user that “Unknown person is trying to unlock the door, take action” and the door will remain lock itself. The captured image is not matched with the stored image in the database, the door will remain closed. And the system gets reset. In this way, the security can be achieved over the Raspberry Pi and GSM module. IV. Methodology A. Face Detection Face detection is one of the fundamental applications used in face recognition technology. OpenCV provides a Haar cascade classifier, which can be used for face detection. In this system, Haar cascade classifiers is chosen in the face detection process. The reason for using Haar classifier is because of its speed , high detection accuracy and low false positive rate. Haar classifier is an algorithm created by Paul Viola and Michael Jones; which are trained from lots of positive pictures (with faces) and negativepictures(without faces).[4] The image of the value of simple features is classified by Viola Jones. Each feature is a single value obtained by subtracting sum of pixels under the white rectangle from sum of pixels under the black rectangle. The single value for Haar features are computed using the following equation: (1) Where, n is the number of pixels, I(x) is the real value of detected on an image.Figure2 shows the three types of features. Fig. 8: (a) Edge features (b) Line Features (c) Four- rectangular features B. Face Recognition The detected faces check the data base and then compare LPBH values and then match the present data base and face are recognized. In this system, we are using Local Binary Pattern Histogram (LBPH) for face recognition. Open CV is an open source computer vision library that has three built-in face recognition algorithms,(i) Eigenfaces, (ii) Fisherfaces and (iii) Local Binary Pattern Histogram (LBPH). Compared with the two algorithms , the LBPH can not only recognize the front face, but also recognize the side face, which is more flexible[5]. Therefore, the face recognition algorithms used here is Local Binary Pattern Histogram(LBPH). It is a simple yet very efficient texture operator which labels the pixels of an image by thresholdingthe neighborhoodof eachpixel and considers the result as a binary number. Andthenitconverts the binary number into a decimal number , and that decimal number is the new value of the center pixel. Fig.9. Conversion of grayscale image to decimal In our case, we are using VNC viewer to run raspbian os for detecting images from the database. At first, we have to save images by using data sets and after that, we will train that faces to LBPH algorithm then it stores into the database. At first, it converts color images to gray scaleimages and thenit coverts into pixels for detecting this will divide the image into various pieces then it stores the values of each pixel. If pixels are less than it will be represented as 0 and pixels which are high will be 1 then it will be arranged in 3 × 3 matrix format for recognizing the images on screen compared to database stored images[6]. Some different variations of faces that captures are showed in the following figure. Fig.10: Some different variations of faces V. Results And Discussions In this system, we designed a Secured Door Lock System with the help of Face Recognition. In this, we are using Raspberry pi which has many features that make the user modify use in different smart applications. Fig. 11: A prototype of a Secured Door Lock System Fig. 12: Monitor runs with Raspbian OS
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD25280 | Volume – 3 | Issue – 5 | July - August 2019 Page 360 The experiment was performed to implement the face recognition using OpenCV library installed in Raspberry Pi. We used Python in Pyton IDLE 3.6.5 and the database that used was sqlite studio. The face detection procedure was first implemented which was done by the help of face detection algorithm that we used. Firstly, we used the web camera to capture theimages. We registered five users as authorized user andtheirimages are stored in the database. For these users, we took 10 facial images with different poses and expressions. Fig. 13: Face Capturing and Saving into the database And also in the Fig. 14, we can see the facial images in the database. Fig. 14: Some facial images in the database In the experiment we trained the face images in the database. That the facial images are successfully trained shown in the Fig. 15 Fig. 15: Face Training Process Based on the LBPH algorithm , the input face images are compared with database facial images for identification.The face recognition results are shown in below in Fig. 16. Fig. 16: Face Recognition Process If the face is recognized, the password box will appear. The user will enter the password. If the password is correct, the door will open automatically. On the other hand, The password is wrong in three times, GSM module will sendthe notification to the owner for the unknown person. Fig. 17: The notification to the owner for the unknown person VI. Conclusion In this paper, a Secured Door Lock System Based on Face Recognition using Raspberry Pi and GSM module is presented. We designed the system which provides security locks for door, comfort, connivance security and energy efficiency for user. This system can be used for authentication in home, banks and other public places. In this system, we have been implemented with a combination of webcam, Raspberry Pi, relay, solenoid door lock and GSM module. And we used the Haar Cascade classifier method to detect the face and Local Binary Pattern Histogram (LBPH) for recognize the face. I conclude that various operationsare successfully tested and results are documented. ACKNOWLEDGEMENT The author would like to express her gratitude to Dr.Saw Aung Nyein Oo, Associate Professor and to all her teachers from Department of Electronic Engineering, Mandalay Technological University. And , she deeply thanks to her parents for their encouragement and support and especially thanks to her friends for giving the chance to take their face images utilized in this paper.
  • 5. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD25280 | Volume – 3 | Issue – 5 | July - August 2019 Page 361 REFERENCES [1] Nareshkumar R. M., Apoorva Kamat, Dnyaneshvari Shinde “Smart Door Security Control System Using Raspberry Pi”, International Journal of Innovations & Advancement in Computer Science, IJIACS, ISSN 2347- 8616, Volume 6, Issue 11, November 2017 [2] Najmurrokhman, Kusnandar Kusnandar, Arief Budiman Krama, Esmeralada Contessa Djimal, and Robbi Rahim, “Development of a secured room access system based on face recognition using Raspberry Pi and Android based smartphone”, MATEC Web of Conferences 197, 11008(2018), AASEC 2018, http://doi.org/10.1051/matecconf/201819711008 [3] Saurabh K. Patil , Dr. Narendra G. Narole, “Smart Face Recognition Security Based On Raspberry Pi”, International Journal of Engineering Science and Computing, IJESC , March 2018 [4] “Face Detection using Haar Cascades” [5] XueMei Zhao and ChenBing Wei, “A Real-time Face Recognition System Based on the Improved KBPH Algorithm”, 2017 IEEE 2nd InternationalConferenceon Signal and Image Processing. [6] Thulluri Krishma Vamsi, Kanchana Charan Sai, Vijayalakshmi M, “Face Recognition based door unlocking system using Raspberry Pi”, International Journal of Advanced Research, Ideas andInnovations in Technology, (IJARIIT), ISSN: 2454-132X, Volume 5, Issue 2, 2019 [7] S. Z. Li, A. K. Jain, Handbook of Face Recognition 2nd, (Springer Verlag,2011) [8] Alexander Mordvintsev & Abid K, “OpenCV-Python Tutorials Documentation”, Release 1, Nov 05, 2017.