SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3869
Intelligent Home Security System using Artificial Intelligence
Kunal Salvi1, Rayyan Shaikh1, Prof. Arshi Khan2
1Student, Department of Electronics Engineering, M.H. Saboo Siddik College of Engineering, Byculla, Mumbai,
Maharashtra, India
2Assistant Professor, Department of Electronics Engineering, M.H. Saboo Siddik College of Engineering, Byculla
Mumbai, Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Intelligent Home Security System usingArtificial
Intelligence is the project undertaken to replace traditional
means of security with modern IOT and A.I. based systems.
Some commercial products based on image recognition are
readily available, but such single security level systems can be
easily breached. To overcome these drawbacks, we have
implemented an A.I. based 2 level security system that can be
easily scaled and can be packed with more features without
loss in performance.
Key Words: Artificial Intelligence, Machine Learning,
Tensorflow, Image Recognition, Voice Recognition,
Spectrogram, IOT, MQTT.
1. INTRODUCTION
There are currently 7.6 billion people on Earth[1]: 3.7 billion
are connected to the internet; almost 50% of that connected
population lives in Asia, 24% of whom reside in India [2] for
which the number comes up to 440 million. Investment in
digitisation and urbanisation andfriendlyregulatorypolicies
hold key to ensuring that India continues to advance on its
path of socioeconomic progress. The market potential of all
things IOT in India alone is predicted to be $9 billion by
2020[3]. India is one of the key countries poised for large-
scale implementation of IOT projects - not only to be able to
set new standards but also as a key geography to anticipate
the emergence of a new humanism embracing people and
devices.[4] A.I. has become a thing of magic now a days and
almost every company wants to integrate a part of it in their
project. A.I. gives an edge to the devices that traditional
hard-coded logic can’t compete with.
With each passing day, overlap between IOT devices and A.I.
is increasing. The combination of both, one serving as a tool
for data acquisition and deployment while thelateracting as
a tool for computation. Applications of A.I. in IOTare endless
and one of them is it use in home security. As majority of
Indian homes still use traditional mechanical locks and
tower bolts, home breaks are inevitable. Apprehending the
culprit is sometimes impossible and important meetings are
missed if no one’s at home. To counter this, we developed
our project by implementing a two-tier security system,
which is server based, provides good enough accuracy and
provide a lot of features for commercial use.
2. Methodology
As home security is the issue of this paper, we went with a
two-tier security approach with image identification being
one and voice identification being second. The system that
we designed is a server-client model, where a Raspberry-Pi
and a NodeMCU are clients and an Acer laptop being a
server. The Raspberry Pi is a series of small single-board
computers developed in the United Kingdom by
the Raspberry Pi Foundation to promote teaching of
basic computer science in schools and in developing
countries [5]. The Raspberry Pi 3 used is this project is a
Raspberry Pi 3 Model B+ which hosts a Broadcom
BCM2837B0 SOC which has4xCortex-A53coresandrunson
1.4GHz.[6] It also has a 10/100 Mbit/s Ethernet, 802.11
b/g/n/ac dual band 2.4/5 GHzwireless, Bluetooth4.2BLE.[7]
Raspberry Pi is responsible for acquiring data from the
subject and transmit the data through TCP sockets to the
server. NodeMCU is an open source IoT platform which
includes firmware which runs on ESP8266 Wi-Fi SoC from
Espressif Systems and the hardware is based on the ESP-12
module.[8][9][10] Due to cost restraint and low speed internet
the decision of running a “server” on the laptop was made.
The server is a laptop which is connected to the same home
Wi-Fi router to which the Raspberry Pi and the NodeMCU is
connected. To make the systemcompletelywireless,the data
communication between the server and the Raspberry Pi is
done through TCP Sockets and the communication between
the server and the NodeMCU is donethroughanIoTprotocol
called MQTT. MQTT stands for Message Queuing Telemetry
Transport and is an ISO standard publish-subscribe-based
messaging protocol.[11] It works on top of the TCP/IP
protocol. It was designed for connections with remote
location where a “small code footprint” is required or the
network bandwidth is limited. The publish-subscribe
messaging pattern requires a messagebroker.Inoursystem,
the publisher is the server, the client is a NodeMCU and the
server is an open MQTT server provided my iot.eclipse.org.
Whenever the subject is in proximity of the Raspberry-Pi,
which is connected with a USB camera, the RPi take a bunch
of photos and a voice sample of the subject saying the
command “Open the door”. Theses files are then sent to the
server through TCP socket.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3870
The IP address of the server connected to the home router is
known to the RPi. After the files are transmitted, the socket
communication is closed and the RPi is out of the loop. After
the files are received, they are stored folder. Theimagefileis
read, resized and moved in the test folder. The wav file is
read, and a spectrogram is created. A spectrogram is a graph
of spectrum frequencies of a signal as itvarieswithtime. The
jpeg file of spectrogram is saved in the test folder. After
saving both the files, the imagerecognitionmodel teststhose
images and gives a confidence level which is compared
against a threshold.
Once the threshold is crossed, that means the both the
images are of the authorized personality or administrator.
After authentication, the server sends a MQTT message to
the NodeMCU on a specific topic. After receiving the
message, the NodeMCU operates the server to be moved
downwards thus opening the tower lock. If the threshold is
not crossed even by one confidencelevel,theconditionholds
false and the server sends an email alert with an image file
attached and an SMS to the administrator. Both the RPi and
the server are in infinite loop and the RPi is runs the python
script at boot.
3. System Architecture
The block diagram of the system is shown in Fig-1.
Fig-1: System Block Diagram
The RPi has Raspbian OS running on it with all the useful
python modules installed. The images are captured using a
USB camera instead of a PiCam so that both the voice and
wav files can be captured while keeping the costofmaterials
low. The images are processed with the help of on python
library called OpenCV. OpenCV (Open source computer
vision) is a libraryofprogrammingfunctions mainlyaimedat
real-time computer vision.[12]Thevoicesampleisofduration
of 4 seconds and it is recorded using Pyaudio module. The
image file is in .jpg format and the voice sample is in .wav
format. Both these files are sent to the server through TCP
sockets from where all the recognition and control
operations take place. After recognition the serversendsthe
appropriate commands to the NodeMCU
4. Face and Spectrogram Recognition
Image Recognition, in the context of machine vision, is the
ability of software to identify objects, places, people, writing
and actions in images. In this project we have used image
recognition to identify the face of the authorized personnel
and the spectrogram of the voice of the same.Toachievethis
we used Google’s Inception v3, which is a widely-usedimage
recognition model that has been shown to attain greater
than 78% accuracy on ImageNet dataset. It is based on the
original paper: “Rethinking the Inception Architecture for
Computer Vision" by Szegedy, et. al. [12] The model itself is
made up of symmetric and asymmetric building blocks,
including convolutions, average pooling, max pooling,
concats, dropouts, and fully connected layers. Batchnorm is
used extensively throughout the model and applied to
activation inputs. Loss is computed via Softmax.
Fig-2: Architecture of Inception model
The model is trained on 20,000 images of the administrator
and around 10,000 images of the second co-author of this
paper. Just like images of faces, images of spectrogram of
both, the administrator and the co-author were taken and
labelled appropriately. OpenCV was usedforacquisitionand
augmentation of the images. To spectrogram, a certain
amount of noise was added while keeping the fidelity of
audio intact. With this approach, the need for second model
is eliminated and the code size is significantly reduced. But
this results in longer augmentation and training sessions.
Inception model is based on TensorFlow library from
Google. The editors used for this project is eclipse with
Pydev plugin, Idle and Arduino. The training of model took
almost 6 hours to complete and augmentation took almost1
hour.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3871
5. Results
1] Data Acquisition:
Fig-3: Acquired Admin Faces
2] Training of images:
Fig-4: Training
3]Completion of Training:
Fig-5: After training is done
4] Image Recognition Output:
Fig-6: Image Recognition Output
5] Voice Spectrogram Output:
Fig-7: Voice Spectrogram of voice signal
Fig- 8: Confidence level of voice spectrogram
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3872
6] Email Received when the threshold is not crossed
Fig-9: Email alert from server
7] SMS Received:
Fig-10: SMS from server
8] When door is closed:
Fig-11: Servo motor at 0 degree
Fig-12: Servo at 180 degrees
6. Conclusion
The scope of the project was to implement principles of A.I.
and IoT in the security sector. We were able to implement
our face and voice recognition system efficiently and with
low bill of materials. The code canbe morerefined,andmore
features can be added in order to make it into a full-fledged
product for commercial use. Instead of an ESP8266 SoC, a
Bluetooth enabled ESP32 can be used in order to add
Bluetooth support so that the admin can still enterthehouse
even when there is a power outage.
References
1. WorldOMeters, Current World Population, January
2018,
http://www.worldometers.info/world-population/
2. Internet World Stats, Internet usage statistics,
December2017,
http://www.internetworldstats.com/stats.html
3. Deloitte, Internet of Things (IoT) to be the next big
thing for operators—TMT India Predictions 2017,
https://www2.deloitte.com/in/en/pages/technolo
gy-media-and-telecommunications/articles/tmt-
india-predictions2017-press-release.html
4. India IoT REPORT, Tata Communications,
https://www.tatacommunications.com/wp-
content/uploads/2018/02/IoT-Report.pdf
5. Cellan-Jones, Rory(5May2011)."A£15computerto
inspire young programmers". BBC News.
6. Adams, James. "Compute Module 3+ on sale now
from $25". raspberrypi.org. Retrieved 29 January
2019.
7. "Raspberry Pi 3B+ Specs and Benchmarks - The
MagPi Magazine". The MagPi Magazine. 14 March
2018. Retrieved 17 August 2018.
8. Zeroday. "A lua based firmware for wifi-soc
esp8266". Github. Retrieved 2 April 2015
9. Systems, Espressif. "Espressif Systems". Espressif-
WikiDevi. Retrieved 3 June 2017.
10. Brian Benchoff. "A DEV BOARD FOR THE ESP LUA
INTERPRETER". Hackaday. Retrieved 2 April 2015.
11. "ISO/IEC 20922:2016 Information technology --
Message Queuing Telemetry Transport (MQTT)
v3.1.1". iso.org. International Organization for
Standardization. June 15, 2016
12. Rethinking the InceptionArchitectureforComputer
Vision" by Szegedy, et. al.

More Related Content

What's hot

Maintain load balancing in wireless sensor networks using virtual grid based ...
Maintain load balancing in wireless sensor networks using virtual grid based ...Maintain load balancing in wireless sensor networks using virtual grid based ...
Maintain load balancing in wireless sensor networks using virtual grid based ...
zaidinvisible
 
Cisco Packet Tracer Overview 20 Jul09
Cisco Packet Tracer Overview 20 Jul09Cisco Packet Tracer Overview 20 Jul09
Cisco Packet Tracer Overview 20 Jul09
Tumennast Erdenebold
 
Wild fire monitoring system
Wild fire monitoring systemWild fire monitoring system
Wild fire monitoring system
John Mahlalela
 

What's hot (15)

Data Security Model Enhancement in Cloud Environment
Data Security Model Enhancement in Cloud EnvironmentData Security Model Enhancement in Cloud Environment
Data Security Model Enhancement in Cloud Environment
 
Tutorial 1 chapter 1
Tutorial 1 chapter 1Tutorial 1 chapter 1
Tutorial 1 chapter 1
 
Maintain load balancing in wireless sensor networks using virtual grid based ...
Maintain load balancing in wireless sensor networks using virtual grid based ...Maintain load balancing in wireless sensor networks using virtual grid based ...
Maintain load balancing in wireless sensor networks using virtual grid based ...
 
The pattern and realization of zigbee wi-fi
The pattern and realization of zigbee  wi-fiThe pattern and realization of zigbee  wi-fi
The pattern and realization of zigbee wi-fi
 
Data Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA AlgorithmData Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA Algorithm
 
Cisco Packet Tracer Overview 20 Jul09
Cisco Packet Tracer Overview 20 Jul09Cisco Packet Tracer Overview 20 Jul09
Cisco Packet Tracer Overview 20 Jul09
 
Development of Smart Home security system using Raspberry Pi
Development of Smart Home security system using Raspberry PiDevelopment of Smart Home security system using Raspberry Pi
Development of Smart Home security system using Raspberry Pi
 
IRJET- Wireless Sensor Network Based Internet of things for Environmental...
IRJET-  	  Wireless Sensor Network Based Internet of things for Environmental...IRJET-  	  Wireless Sensor Network Based Internet of things for Environmental...
IRJET- Wireless Sensor Network Based Internet of things for Environmental...
 
Wild fire monitoring system
Wild fire monitoring systemWild fire monitoring system
Wild fire monitoring system
 
Firewall and vpn investigation on cloud computing performance
Firewall and vpn investigation on cloud computing performanceFirewall and vpn investigation on cloud computing performance
Firewall and vpn investigation on cloud computing performance
 
Acquisition System
Acquisition SystemAcquisition System
Acquisition System
 
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
 
Smart Security and Home Automation System using Internet of things
Smart Security and Home Automation System using Internet of thingsSmart Security and Home Automation System using Internet of things
Smart Security and Home Automation System using Internet of things
 
Raspberry Pi based Wireless Sensor Network in Heating, Ventilation and Air Co...
Raspberry Pi based Wireless Sensor Network in Heating, Ventilation and Air Co...Raspberry Pi based Wireless Sensor Network in Heating, Ventilation and Air Co...
Raspberry Pi based Wireless Sensor Network in Heating, Ventilation and Air Co...
 
Remote Control of Home Appliances with Smart Energy Efficient Model using And...
Remote Control of Home Appliances with Smart Energy Efficient Model using And...Remote Control of Home Appliances with Smart Energy Efficient Model using And...
Remote Control of Home Appliances with Smart Energy Efficient Model using And...
 

Similar to IRJET- Intelligent Home Security System using Artificial Intelligence

Similar to IRJET- Intelligent Home Security System using Artificial Intelligence (20)

IRJET- Portable Camera based Assistive Text and Label Reading for Blind Persons
IRJET- Portable Camera based Assistive Text and Label Reading for Blind PersonsIRJET- Portable Camera based Assistive Text and Label Reading for Blind Persons
IRJET- Portable Camera based Assistive Text and Label Reading for Blind Persons
 
IRJET-Raspberry Pi Based Reader for Blind People
IRJET-Raspberry Pi Based Reader for Blind PeopleIRJET-Raspberry Pi Based Reader for Blind People
IRJET-Raspberry Pi Based Reader for Blind People
 
IRJET - IoT based Facial Recognition Quadcopter using Machine Learning Algorithm
IRJET - IoT based Facial Recognition Quadcopter using Machine Learning AlgorithmIRJET - IoT based Facial Recognition Quadcopter using Machine Learning Algorithm
IRJET - IoT based Facial Recognition Quadcopter using Machine Learning Algorithm
 
IRJET- A Raspberry Pi based Speaker Recognition System for Access Control
IRJET- A Raspberry Pi based Speaker Recognition System for Access ControlIRJET- A Raspberry Pi based Speaker Recognition System for Access Control
IRJET- A Raspberry Pi based Speaker Recognition System for Access Control
 
IRJET- Optimization of Surveillance Camera for Low Cost Storage Device
IRJET- Optimization of Surveillance Camera for Low Cost Storage DeviceIRJET- Optimization of Surveillance Camera for Low Cost Storage Device
IRJET- Optimization of Surveillance Camera for Low Cost Storage Device
 
Smart Storage for Home Application
Smart Storage for Home ApplicationSmart Storage for Home Application
Smart Storage for Home Application
 
IoT Based Smart Surveillance and Automation
IoT Based Smart Surveillance and AutomationIoT Based Smart Surveillance and Automation
IoT Based Smart Surveillance and Automation
 
IRJET- Raspberry Pi and NodeMCU based Home Automation System
IRJET- Raspberry Pi and NodeMCU based Home Automation SystemIRJET- Raspberry Pi and NodeMCU based Home Automation System
IRJET- Raspberry Pi and NodeMCU based Home Automation System
 
IoT Based Advertising System
IoT Based Advertising SystemIoT Based Advertising System
IoT Based Advertising System
 
IRJET - AI based Smart Mirror
IRJET -  	  AI based Smart MirrorIRJET -  	  AI based Smart Mirror
IRJET - AI based Smart Mirror
 
IRJET- Wireless Notice Board using Raspberry Pi
IRJET- Wireless Notice Board using Raspberry PiIRJET- Wireless Notice Board using Raspberry Pi
IRJET- Wireless Notice Board using Raspberry Pi
 
IRJET- Wireless Notice Board using Raspberry Pi
IRJET- Wireless Notice Board using Raspberry PiIRJET- Wireless Notice Board using Raspberry Pi
IRJET- Wireless Notice Board using Raspberry Pi
 
Object Detection Bot
Object Detection BotObject Detection Bot
Object Detection Bot
 
A Survey on Automated Waste Segregation System Using Raspberry Pi and Image P...
A Survey on Automated Waste Segregation System Using Raspberry Pi and Image P...A Survey on Automated Waste Segregation System Using Raspberry Pi and Image P...
A Survey on Automated Waste Segregation System Using Raspberry Pi and Image P...
 
IRJET- IoT based Smart Projector
IRJET-  	  IoT based Smart ProjectorIRJET-  	  IoT based Smart Projector
IRJET- IoT based Smart Projector
 
IRJET- H-Box (Connecting Homes)
IRJET- H-Box (Connecting Homes)IRJET- H-Box (Connecting Homes)
IRJET- H-Box (Connecting Homes)
 
Experimental Based Learning and Modeling of Computer Networks
Experimental Based Learning and Modeling of Computer NetworksExperimental Based Learning and Modeling of Computer Networks
Experimental Based Learning and Modeling of Computer Networks
 
IRJET- Interactive Smart Mirror
IRJET-  	  Interactive Smart MirrorIRJET-  	  Interactive Smart Mirror
IRJET- Interactive Smart Mirror
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
 
IRJET- Motion Activated Security System
IRJET-  	  Motion Activated Security SystemIRJET-  	  Motion Activated Security System
IRJET- Motion Activated Security System
 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
hublikarsn
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 

Recently uploaded (20)

Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)
 

IRJET- Intelligent Home Security System using Artificial Intelligence

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3869 Intelligent Home Security System using Artificial Intelligence Kunal Salvi1, Rayyan Shaikh1, Prof. Arshi Khan2 1Student, Department of Electronics Engineering, M.H. Saboo Siddik College of Engineering, Byculla, Mumbai, Maharashtra, India 2Assistant Professor, Department of Electronics Engineering, M.H. Saboo Siddik College of Engineering, Byculla Mumbai, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Intelligent Home Security System usingArtificial Intelligence is the project undertaken to replace traditional means of security with modern IOT and A.I. based systems. Some commercial products based on image recognition are readily available, but such single security level systems can be easily breached. To overcome these drawbacks, we have implemented an A.I. based 2 level security system that can be easily scaled and can be packed with more features without loss in performance. Key Words: Artificial Intelligence, Machine Learning, Tensorflow, Image Recognition, Voice Recognition, Spectrogram, IOT, MQTT. 1. INTRODUCTION There are currently 7.6 billion people on Earth[1]: 3.7 billion are connected to the internet; almost 50% of that connected population lives in Asia, 24% of whom reside in India [2] for which the number comes up to 440 million. Investment in digitisation and urbanisation andfriendlyregulatorypolicies hold key to ensuring that India continues to advance on its path of socioeconomic progress. The market potential of all things IOT in India alone is predicted to be $9 billion by 2020[3]. India is one of the key countries poised for large- scale implementation of IOT projects - not only to be able to set new standards but also as a key geography to anticipate the emergence of a new humanism embracing people and devices.[4] A.I. has become a thing of magic now a days and almost every company wants to integrate a part of it in their project. A.I. gives an edge to the devices that traditional hard-coded logic can’t compete with. With each passing day, overlap between IOT devices and A.I. is increasing. The combination of both, one serving as a tool for data acquisition and deployment while thelateracting as a tool for computation. Applications of A.I. in IOTare endless and one of them is it use in home security. As majority of Indian homes still use traditional mechanical locks and tower bolts, home breaks are inevitable. Apprehending the culprit is sometimes impossible and important meetings are missed if no one’s at home. To counter this, we developed our project by implementing a two-tier security system, which is server based, provides good enough accuracy and provide a lot of features for commercial use. 2. Methodology As home security is the issue of this paper, we went with a two-tier security approach with image identification being one and voice identification being second. The system that we designed is a server-client model, where a Raspberry-Pi and a NodeMCU are clients and an Acer laptop being a server. The Raspberry Pi is a series of small single-board computers developed in the United Kingdom by the Raspberry Pi Foundation to promote teaching of basic computer science in schools and in developing countries [5]. The Raspberry Pi 3 used is this project is a Raspberry Pi 3 Model B+ which hosts a Broadcom BCM2837B0 SOC which has4xCortex-A53coresandrunson 1.4GHz.[6] It also has a 10/100 Mbit/s Ethernet, 802.11 b/g/n/ac dual band 2.4/5 GHzwireless, Bluetooth4.2BLE.[7] Raspberry Pi is responsible for acquiring data from the subject and transmit the data through TCP sockets to the server. NodeMCU is an open source IoT platform which includes firmware which runs on ESP8266 Wi-Fi SoC from Espressif Systems and the hardware is based on the ESP-12 module.[8][9][10] Due to cost restraint and low speed internet the decision of running a “server” on the laptop was made. The server is a laptop which is connected to the same home Wi-Fi router to which the Raspberry Pi and the NodeMCU is connected. To make the systemcompletelywireless,the data communication between the server and the Raspberry Pi is done through TCP Sockets and the communication between the server and the NodeMCU is donethroughanIoTprotocol called MQTT. MQTT stands for Message Queuing Telemetry Transport and is an ISO standard publish-subscribe-based messaging protocol.[11] It works on top of the TCP/IP protocol. It was designed for connections with remote location where a “small code footprint” is required or the network bandwidth is limited. The publish-subscribe messaging pattern requires a messagebroker.Inoursystem, the publisher is the server, the client is a NodeMCU and the server is an open MQTT server provided my iot.eclipse.org. Whenever the subject is in proximity of the Raspberry-Pi, which is connected with a USB camera, the RPi take a bunch of photos and a voice sample of the subject saying the command “Open the door”. Theses files are then sent to the server through TCP socket.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3870 The IP address of the server connected to the home router is known to the RPi. After the files are transmitted, the socket communication is closed and the RPi is out of the loop. After the files are received, they are stored folder. Theimagefileis read, resized and moved in the test folder. The wav file is read, and a spectrogram is created. A spectrogram is a graph of spectrum frequencies of a signal as itvarieswithtime. The jpeg file of spectrogram is saved in the test folder. After saving both the files, the imagerecognitionmodel teststhose images and gives a confidence level which is compared against a threshold. Once the threshold is crossed, that means the both the images are of the authorized personality or administrator. After authentication, the server sends a MQTT message to the NodeMCU on a specific topic. After receiving the message, the NodeMCU operates the server to be moved downwards thus opening the tower lock. If the threshold is not crossed even by one confidencelevel,theconditionholds false and the server sends an email alert with an image file attached and an SMS to the administrator. Both the RPi and the server are in infinite loop and the RPi is runs the python script at boot. 3. System Architecture The block diagram of the system is shown in Fig-1. Fig-1: System Block Diagram The RPi has Raspbian OS running on it with all the useful python modules installed. The images are captured using a USB camera instead of a PiCam so that both the voice and wav files can be captured while keeping the costofmaterials low. The images are processed with the help of on python library called OpenCV. OpenCV (Open source computer vision) is a libraryofprogrammingfunctions mainlyaimedat real-time computer vision.[12]Thevoicesampleisofduration of 4 seconds and it is recorded using Pyaudio module. The image file is in .jpg format and the voice sample is in .wav format. Both these files are sent to the server through TCP sockets from where all the recognition and control operations take place. After recognition the serversendsthe appropriate commands to the NodeMCU 4. Face and Spectrogram Recognition Image Recognition, in the context of machine vision, is the ability of software to identify objects, places, people, writing and actions in images. In this project we have used image recognition to identify the face of the authorized personnel and the spectrogram of the voice of the same.Toachievethis we used Google’s Inception v3, which is a widely-usedimage recognition model that has been shown to attain greater than 78% accuracy on ImageNet dataset. It is based on the original paper: “Rethinking the Inception Architecture for Computer Vision" by Szegedy, et. al. [12] The model itself is made up of symmetric and asymmetric building blocks, including convolutions, average pooling, max pooling, concats, dropouts, and fully connected layers. Batchnorm is used extensively throughout the model and applied to activation inputs. Loss is computed via Softmax. Fig-2: Architecture of Inception model The model is trained on 20,000 images of the administrator and around 10,000 images of the second co-author of this paper. Just like images of faces, images of spectrogram of both, the administrator and the co-author were taken and labelled appropriately. OpenCV was usedforacquisitionand augmentation of the images. To spectrogram, a certain amount of noise was added while keeping the fidelity of audio intact. With this approach, the need for second model is eliminated and the code size is significantly reduced. But this results in longer augmentation and training sessions. Inception model is based on TensorFlow library from Google. The editors used for this project is eclipse with Pydev plugin, Idle and Arduino. The training of model took almost 6 hours to complete and augmentation took almost1 hour.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3871 5. Results 1] Data Acquisition: Fig-3: Acquired Admin Faces 2] Training of images: Fig-4: Training 3]Completion of Training: Fig-5: After training is done 4] Image Recognition Output: Fig-6: Image Recognition Output 5] Voice Spectrogram Output: Fig-7: Voice Spectrogram of voice signal Fig- 8: Confidence level of voice spectrogram
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3872 6] Email Received when the threshold is not crossed Fig-9: Email alert from server 7] SMS Received: Fig-10: SMS from server 8] When door is closed: Fig-11: Servo motor at 0 degree Fig-12: Servo at 180 degrees 6. Conclusion The scope of the project was to implement principles of A.I. and IoT in the security sector. We were able to implement our face and voice recognition system efficiently and with low bill of materials. The code canbe morerefined,andmore features can be added in order to make it into a full-fledged product for commercial use. Instead of an ESP8266 SoC, a Bluetooth enabled ESP32 can be used in order to add Bluetooth support so that the admin can still enterthehouse even when there is a power outage. References 1. WorldOMeters, Current World Population, January 2018, http://www.worldometers.info/world-population/ 2. Internet World Stats, Internet usage statistics, December2017, http://www.internetworldstats.com/stats.html 3. Deloitte, Internet of Things (IoT) to be the next big thing for operators—TMT India Predictions 2017, https://www2.deloitte.com/in/en/pages/technolo gy-media-and-telecommunications/articles/tmt- india-predictions2017-press-release.html 4. India IoT REPORT, Tata Communications, https://www.tatacommunications.com/wp- content/uploads/2018/02/IoT-Report.pdf 5. Cellan-Jones, Rory(5May2011)."A£15computerto inspire young programmers". BBC News. 6. Adams, James. "Compute Module 3+ on sale now from $25". raspberrypi.org. Retrieved 29 January 2019. 7. "Raspberry Pi 3B+ Specs and Benchmarks - The MagPi Magazine". The MagPi Magazine. 14 March 2018. Retrieved 17 August 2018. 8. Zeroday. "A lua based firmware for wifi-soc esp8266". Github. Retrieved 2 April 2015 9. Systems, Espressif. "Espressif Systems". Espressif- WikiDevi. Retrieved 3 June 2017. 10. Brian Benchoff. "A DEV BOARD FOR THE ESP LUA INTERPRETER". Hackaday. Retrieved 2 April 2015. 11. "ISO/IEC 20922:2016 Information technology -- Message Queuing Telemetry Transport (MQTT) v3.1.1". iso.org. International Organization for Standardization. June 15, 2016 12. Rethinking the InceptionArchitectureforComputer Vision" by Szegedy, et. al.