SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1136
IOT BASED DOOR LOCK AND UNLOCK SYSTEM USING FACE
RECOGNITION
Rajat Bhise1, Nikilesh Phadnis2, Rahul Bari3, Vijay Dhage4
1,2,3,4Former Students of K.B.C. North Maharashtra University Jalgoan
5Guided By Prof. A. C. Wani, Dept. of Electronics of Telecommunications Engineering, SSBT COET Bambhori
Jalgoan, Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract – A day to day home security level grown up to
provide security to our house IOT based face recognition can
be implemented. A standard web camera to capturetheimage
to identify the visitor. It’s a method that identifiesthevisitor. If
the face recognizes visitor, it will greet them by name and the
door will be unlocked name opened. If they are not identified
door will unlocked. The system will perform detection and
recognition rapidly in real time when face in front of camera.
This project basic utilizes the camera, and then internet
connection to create a door unlocks itself byfacialrecognition.
If the user at the door is recognized, door will be unlocked!
This project is mainly for future features: safety, monitoring,
security and control to home automation. Firstly the system
needs a face authentication for the visitor to be able to enter
the home (lock/unlocked). When an unauthenticated tries to
log into system, this face will be capture the image of visitor
And it will be sent to Gmail address to an admin person. The
system should also support the password unlocked system.
Key Words: IOT- Internet of Things, USB-UniversalSerial Bus
1. INTRODUCTION
The Face is commonly used biometric to recognize
people. Face recognition has received substantial attention
from security guard due to human activitiesfoundinvarious
applications of security like forensic, airport, face tracking,
criminal detection, etc. Compared to other biometric traits
like palm print, finger print, palm print etc. They can be
taken even without visitor knowledge and further can be
used for security based applications like criminal detection,
face tracking, airport security, and forensic etc.
Face recognition involves capturing face image from a
from a web camera. They are capture image of visitor and
compared image with the stored database. Classify them
with known classes and then they are storedinthedatabase.
Face biometrics is a challenging field for researchers with
various limitations imposed for machine face recognition
like variations in change in illumination, head poses, facial
expression, occlusion, aging etc. Various approaches were
suggested by researchers in overcoming the stated.
Automatic face recognition involves feature extraction and
face recognition, face detection. Face recognitionalgorithms
are classified into twoclassesasgeometric feature based and
image templatebased. Thetemplatebasedmethodscompute
correlation between one or more model templates and face
to find the face identity.Principal componentanalysis,kernel
methods, linear discriminate analysis etc. are used to create
face templates. The geometric feature based methods are
used to analyze explicit local features and their geometric
relations .Multi resolutiontoolssuchasridgeletswerefound
to be useful for analyzing information content of images and
found its application in pattern recognition, and computer
vision, image processing.
1.1 PROBLEM IDENTIFICATION AND PROJECT
OBJECTIVES
A) PROBLEM IDENTIFICATION:
a. POSE VARIATION:
Comparing pose is another fundamental challenge for face
recognition system. Some unavoidable problems appear in
the variety of practical applications such as the people are
not always front of the camera, so the pose problem is a big
problem for the face recognition system to be detection.The
difference between the different persons under the same
poses, it is difficult for the computer to do the face
identification when the poses of the gallery images are
different. Pose variation still presents a challenge for face
recognition.
b. OCCLUSION:
The face recognition context, occlusion involves that
some parts of the face cannot be find. For example a face
photography taken from a web camera could be partially
hidden behind column. The recognitionprocesscouldn’tfind
of a full input face. Hence, the absence of some parts of the
face may lead to not find full face. There are also objects that
can occlude facial features goggles, beards, certain haircuts,
hats etc.
c. EXPRESSION:
Comparing faces with different facial expression is
another problem for some face recognition applications.
Faces undergo large deformations under facial expressions.
Human can easily handle this variation, but the algorithms
can have problems with the expression databases. Face
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1137
recognition under extreme facial expression still remains an
unsolved problem, and temporal information can provide
significant additional information in face recognition under
expression. The performance of face recognition system
significantly decreases when there is a dramatic expression
on the face. Therefore, it’s important to automatically find
the best face of a subject from the images. Using the neutral
face during enrollment and when authenticating, so that we
can find the neutral face of the subject from the six universal
expression like Happiness, unhappiness, anger, horror ,
surprise.
d. AGING:
Face recognition across aging is most challenging in that
it has to address all other variants as well. Pose expression
and illumination changes are bound to happen for two
images of a person taken years apart. In addition to this,
textural properties of the skin can be different as well
makeup, eyeglasses, weight loss/gain, hair loss, etc. The
facial changes that occur due to aging are influenced by
numerous environmental factors like solar radiation,
smoking, drug usage, stresslevel,etc.Thedifferent biological
and environmental factors can either delay or expedite the
process of aging. Aging results in changes in both the hard
and soft facial tissue of an individual. Loss of tissue elasticity
and facial volume and alteration in skin texture are some of
the other changes with aging. Drifts in facial landmarks
appear to reasonably characterize the shape variations
associate with aging, especially in ages 2-18.
e. TRANSFORMATIONS:
The same face can be presented to the system at different
scales. This may happen due to the focal distance between
the face and the camera. As this distance gets close the face
image gets bigger. Head orientations may change due to
translations and rotations.
f. ILLUMINATION:
Comparing two faces with different illumination is one of
the fundamental problems for face recognition system. Face
images of the same person can be taken under different
illumination conditionssuchas,thepositionandthestrength
of the light source can be modified like the ones.
B) PROJECT OBJECTIVE:
There is few objectives design face detection system. The
objectives of face detection are:
1. To design real time face detection system.
2. To utilize the face detection system based on Haar
classifier.
3. To develop face detection system using open CV.
4. Users could operate on a touch screen to select entering
the house by the house by recognizing face or entering
password. For face recognition, an image will becaptured by
camera and preprocessed and converting, resizing and
cropping, then face detection andrecognitionareperformed.
2. BLOCK DIAGRAM
Fig -1: block diagram of IOT based door lock or unlock
system using face recognition.
The system will works in two different parts. The first
part is for capturing and creating a database by storing the
image. And the second one is to compare the image with the
stored images in the database .For feature extractionwe will
use Eigen faces methodology and Euclidian distances will
used for recognition of the face.
CAMERA MODULE: Camera module is pi camera interfacing
to the raspberry pi module. It is used to capture images and
send the clicked images to the raspberry pi module. Camera
contains LEDs and flashes to handle that light condition that
is not explicitly supplied by the environment and these light
conditions are known as ambient light conditions.
RASPBERRY PI MODULE: raspberry pi 3 module is a small
computer board. When an image istakenbyraspberry piitis
compared with database image. For the first time when we
capture an image to Create a database raspberry pi module
captures many images to createa databaseinthesystem and
this database is compared with the live captured images.
After comparing the two images, based on whether the
output is positive or negative it gives commands to GSM
module.
GSM MODULE: GSM module is used to senda messagetothe
authorized people based on the output. If the output is
positive “Information matched Accessgranted”message will
be sent to the authorized people, otherwise in case of
unauthorized access it will send an “Access denied. Some
unknown person is trying to unlock the door”. Message to
the certified users of the system. As with any system, the
initial stage is to visualize the core modules, inputs, outputs
and interrelations among them; this can be effectively done
using a flow chart, above is a graphical representation of the
proposed system.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1138
3. CONCLUSIONS
The arrangement of a facial recognition system using
raspberry pi can make the system littler, lighter and work
successfully utilizing lower control use, so it is more
convenient than the pc- based face recognition system. It is
open source software on Linux. Also, send a security alert
message to the authorized person utilities. We are also
providing power backup for the smooth and continuous
functioning of the system in caseofpowerfailure.Thepower
bank is used to charge the Raspberry Pi so there is less
chance to slow down the system.
This development scheme is cheap, fast, and highly reliable
and Raspberry pi takes less power and provides enough
flexibility to suit the requirement of different people.
ACKNOWLEDGEMENT
Those who walk the difficult path to success never at this
destiny they walk ahead towards greater success. I consider
myself lucky to work with guidance of such talented and
experienced people during. The preparation of Project
Report who guided me all through it.
A special mention must go to my Guide Prof. A. C. Wani who
supported me with her knowledge, experience and
suggestion. Only their inspiration has made this Project
report easy and interesting.
I am indebted to HOD Dr. S. R. Suralkar for his support at
various stages during the information of this piece of work.
I would also like to thank our Principal Dr. K. S. Wani for his
warm support and providing all necessaryfacilitiestous,the
student.
I would also like to thank our co-ordinates Prof. A. C. Wani
for his support and guidance.
Last but not list I am thankful to all Teachers and Staff
members of E&TC department for their expert guidanceand
continuous encouragement through out to see that
maximum benefit is taken out of his experience.
REFERENCES
[1] Çarıkçı M. Özen F. 2012 A Face RecognitionSystemBased
on Eigen faces Method.
[2] Jogdand S. Karanjkar M. 2015Implementation of
Automated Door Accessing System with Face Design and
Recognition.
[3] Sowmiya, U. shafiq mansoor J. 2015 Raspberry pi based
home door security through 3g dongle.
[4] Kartik J. Srimadhavan V. 2013 SMS Alert and Embedded
Network Video Monitoring Terminal.
[5] Sahani M. Nanda C. Sahu A. Pattnaik B. 2015Web Based
Online Embedded Door Access Control and Home Security
System Based on Face Recognition.

More Related Content

What's hot

Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
Vaibhav P
 
Techniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive ReviewTechniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive Review
IOSR Journals
 
Automated Face Detection and Recognition
Automated Face Detection and RecognitionAutomated Face Detection and Recognition
Automated Face Detection and Recognition
Waldir Pimenta
 
Facial powerpoint
Facial powerpointFacial powerpoint
Facial powerpoint
12202843
 

What's hot (20)

FACE RECOGNITION ACROSS NON-UNIFORM MOTION BLUR
FACE RECOGNITION ACROSS  NON-UNIFORM MOTION BLUR FACE RECOGNITION ACROSS  NON-UNIFORM MOTION BLUR
FACE RECOGNITION ACROSS NON-UNIFORM MOTION BLUR
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
 
Facial Recognition: The Science, The Technology, and Market Applications
Facial Recognition: The Science, The Technology, and Market ApplicationsFacial Recognition: The Science, The Technology, and Market Applications
Facial Recognition: The Science, The Technology, and Market Applications
 
NEC NEOFACE- Biometric Face Recognition System
NEC NEOFACE- Biometric Face Recognition SystemNEC NEOFACE- Biometric Face Recognition System
NEC NEOFACE- Biometric Face Recognition System
 
Face recognition and modeling โดย ผศ.ดร.ธนาสัย สุคนธ์พันธุ์
Face recognition and modeling โดย ผศ.ดร.ธนาสัย สุคนธ์พันธุ์Face recognition and modeling โดย ผศ.ดร.ธนาสัย สุคนธ์พันธุ์
Face recognition and modeling โดย ผศ.ดร.ธนาสัย สุคนธ์พันธุ์
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face Recognition by Sumudu Ranasinghe
Face Recognition by Sumudu RanasingheFace Recognition by Sumudu Ranasinghe
Face Recognition by Sumudu Ranasinghe
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition application
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
face recognition
face recognitionface recognition
face recognition
 
Techniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive ReviewTechniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive Review
 
Automated Face Detection and Recognition
Automated Face Detection and RecognitionAutomated Face Detection and Recognition
Automated Face Detection and Recognition
 
Face recognition Face Identification
Face recognition Face IdentificationFace recognition Face Identification
Face recognition Face Identification
 
Face Recognition Home Security System
Face Recognition Home Security SystemFace Recognition Home Security System
Face Recognition Home Security System
 
Face Recognition using C#
Face Recognition using C#Face Recognition using C#
Face Recognition using C#
 
Face recogntion
Face recogntionFace recogntion
Face recogntion
 
Facial powerpoint
Facial powerpointFacial powerpoint
Facial powerpoint
 
Face Recognition Dissertation
Face Recognition Dissertation Face Recognition Dissertation
Face Recognition Dissertation
 

Similar to IRJET- IoT based Door Lock and Unlock System using Face Recognition

Techniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive ReviewTechniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive Review
IOSR Journals
 
Human Face Identification
Human Face IdentificationHuman Face Identification
Human Face Identification
bhupesh lahare
 

Similar to IRJET- IoT based Door Lock and Unlock System using Face Recognition (20)

IRJET- IoT based Door Access Control using Face Recognition
IRJET- IoT based Door Access Control using Face RecognitionIRJET- IoT based Door Access Control using Face Recognition
IRJET- IoT based Door Access Control using Face Recognition
 
Face Recognition System and its Applications
Face Recognition System and its ApplicationsFace Recognition System and its Applications
Face Recognition System and its Applications
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face Recognition
 
Techniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive ReviewTechniques for Face Detection & Recognition Systema Comprehensive Review
Techniques for Face Detection & Recognition Systema Comprehensive Review
 
IRJET- Face Recognition using Deep Learning
IRJET-  	  Face Recognition using Deep LearningIRJET-  	  Face Recognition using Deep Learning
IRJET- Face Recognition using Deep Learning
 
Human Face Identification
Human Face IdentificationHuman Face Identification
Human Face Identification
 
3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security Applications3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security Applications
 
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric Learning
 
Face Recognition System under Varying Lighting Conditions
Face Recognition System under Varying Lighting ConditionsFace Recognition System under Varying Lighting Conditions
Face Recognition System under Varying Lighting Conditions
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCV
 
[IJET-V1I1P4]Author :Juhi Raut, Snehal Patil, Shraddha Gawade, Prof. Mamta Me...
[IJET-V1I1P4]Author :Juhi Raut, Snehal Patil, Shraddha Gawade, Prof. Mamta Me...[IJET-V1I1P4]Author :Juhi Raut, Snehal Patil, Shraddha Gawade, Prof. Mamta Me...
[IJET-V1I1P4]Author :Juhi Raut, Snehal Patil, Shraddha Gawade, Prof. Mamta Me...
 
ATTENDANCE BY FACE RECOGNITION USING AI
ATTENDANCE BY FACE RECOGNITION USING AIATTENDANCE BY FACE RECOGNITION USING AI
ATTENDANCE BY FACE RECOGNITION USING AI
 
IRJET- Persons Identification Tool for Visually Impaired - Digital Eye
IRJET-  	  Persons Identification Tool for Visually Impaired - Digital EyeIRJET-  	  Persons Identification Tool for Visually Impaired - Digital Eye
IRJET- Persons Identification Tool for Visually Impaired - Digital Eye
 
IRJET - Face Detection and Recognition System
IRJET -  	  Face Detection and Recognition SystemIRJET -  	  Face Detection and Recognition System
IRJET - Face Detection and Recognition System
 
Progression in Large Age-Gap Face Verification
Progression in Large Age-Gap Face VerificationProgression in Large Age-Gap Face Verification
Progression in Large Age-Gap Face Verification
 
Review of Face Detection Techniques
Review of Face Detection TechniquesReview of Face Detection Techniques
Review of Face Detection Techniques
 
IRJET - Facial Recognition based Attendance System with LBPH
IRJET -  	  Facial Recognition based Attendance System with LBPHIRJET -  	  Facial Recognition based Attendance System with LBPH
IRJET - Facial Recognition based Attendance System with LBPH
 
IRJET- Vision based Security System and Automation using Internet of Things
IRJET- Vision based Security System and Automation using Internet of ThingsIRJET- Vision based Security System and Automation using Internet of Things
IRJET- Vision based Security System and Automation using Internet of Things
 
IRJET- A Review on Face Recognition using Local Binary Pattern Algorithm
IRJET- A Review on Face Recognition using Local Binary Pattern AlgorithmIRJET- A Review on Face Recognition using Local Binary Pattern Algorithm
IRJET- A Review on Face Recognition using Local Binary Pattern Algorithm
 
IRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using AndroidIRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using Android
 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
pritamlangde
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 

Recently uploaded (20)

Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 

IRJET- IoT based Door Lock and Unlock System using Face Recognition

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1136 IOT BASED DOOR LOCK AND UNLOCK SYSTEM USING FACE RECOGNITION Rajat Bhise1, Nikilesh Phadnis2, Rahul Bari3, Vijay Dhage4 1,2,3,4Former Students of K.B.C. North Maharashtra University Jalgoan 5Guided By Prof. A. C. Wani, Dept. of Electronics of Telecommunications Engineering, SSBT COET Bambhori Jalgoan, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – A day to day home security level grown up to provide security to our house IOT based face recognition can be implemented. A standard web camera to capturetheimage to identify the visitor. It’s a method that identifiesthevisitor. If the face recognizes visitor, it will greet them by name and the door will be unlocked name opened. If they are not identified door will unlocked. The system will perform detection and recognition rapidly in real time when face in front of camera. This project basic utilizes the camera, and then internet connection to create a door unlocks itself byfacialrecognition. If the user at the door is recognized, door will be unlocked! This project is mainly for future features: safety, monitoring, security and control to home automation. Firstly the system needs a face authentication for the visitor to be able to enter the home (lock/unlocked). When an unauthenticated tries to log into system, this face will be capture the image of visitor And it will be sent to Gmail address to an admin person. The system should also support the password unlocked system. Key Words: IOT- Internet of Things, USB-UniversalSerial Bus 1. INTRODUCTION The Face is commonly used biometric to recognize people. Face recognition has received substantial attention from security guard due to human activitiesfoundinvarious applications of security like forensic, airport, face tracking, criminal detection, etc. Compared to other biometric traits like palm print, finger print, palm print etc. They can be taken even without visitor knowledge and further can be used for security based applications like criminal detection, face tracking, airport security, and forensic etc. Face recognition involves capturing face image from a from a web camera. They are capture image of visitor and compared image with the stored database. Classify them with known classes and then they are storedinthedatabase. Face biometrics is a challenging field for researchers with various limitations imposed for machine face recognition like variations in change in illumination, head poses, facial expression, occlusion, aging etc. Various approaches were suggested by researchers in overcoming the stated. Automatic face recognition involves feature extraction and face recognition, face detection. Face recognitionalgorithms are classified into twoclassesasgeometric feature based and image templatebased. Thetemplatebasedmethodscompute correlation between one or more model templates and face to find the face identity.Principal componentanalysis,kernel methods, linear discriminate analysis etc. are used to create face templates. The geometric feature based methods are used to analyze explicit local features and their geometric relations .Multi resolutiontoolssuchasridgeletswerefound to be useful for analyzing information content of images and found its application in pattern recognition, and computer vision, image processing. 1.1 PROBLEM IDENTIFICATION AND PROJECT OBJECTIVES A) PROBLEM IDENTIFICATION: a. POSE VARIATION: Comparing pose is another fundamental challenge for face recognition system. Some unavoidable problems appear in the variety of practical applications such as the people are not always front of the camera, so the pose problem is a big problem for the face recognition system to be detection.The difference between the different persons under the same poses, it is difficult for the computer to do the face identification when the poses of the gallery images are different. Pose variation still presents a challenge for face recognition. b. OCCLUSION: The face recognition context, occlusion involves that some parts of the face cannot be find. For example a face photography taken from a web camera could be partially hidden behind column. The recognitionprocesscouldn’tfind of a full input face. Hence, the absence of some parts of the face may lead to not find full face. There are also objects that can occlude facial features goggles, beards, certain haircuts, hats etc. c. EXPRESSION: Comparing faces with different facial expression is another problem for some face recognition applications. Faces undergo large deformations under facial expressions. Human can easily handle this variation, but the algorithms can have problems with the expression databases. Face
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1137 recognition under extreme facial expression still remains an unsolved problem, and temporal information can provide significant additional information in face recognition under expression. The performance of face recognition system significantly decreases when there is a dramatic expression on the face. Therefore, it’s important to automatically find the best face of a subject from the images. Using the neutral face during enrollment and when authenticating, so that we can find the neutral face of the subject from the six universal expression like Happiness, unhappiness, anger, horror , surprise. d. AGING: Face recognition across aging is most challenging in that it has to address all other variants as well. Pose expression and illumination changes are bound to happen for two images of a person taken years apart. In addition to this, textural properties of the skin can be different as well makeup, eyeglasses, weight loss/gain, hair loss, etc. The facial changes that occur due to aging are influenced by numerous environmental factors like solar radiation, smoking, drug usage, stresslevel,etc.Thedifferent biological and environmental factors can either delay or expedite the process of aging. Aging results in changes in both the hard and soft facial tissue of an individual. Loss of tissue elasticity and facial volume and alteration in skin texture are some of the other changes with aging. Drifts in facial landmarks appear to reasonably characterize the shape variations associate with aging, especially in ages 2-18. e. TRANSFORMATIONS: The same face can be presented to the system at different scales. This may happen due to the focal distance between the face and the camera. As this distance gets close the face image gets bigger. Head orientations may change due to translations and rotations. f. ILLUMINATION: Comparing two faces with different illumination is one of the fundamental problems for face recognition system. Face images of the same person can be taken under different illumination conditionssuchas,thepositionandthestrength of the light source can be modified like the ones. B) PROJECT OBJECTIVE: There is few objectives design face detection system. The objectives of face detection are: 1. To design real time face detection system. 2. To utilize the face detection system based on Haar classifier. 3. To develop face detection system using open CV. 4. Users could operate on a touch screen to select entering the house by the house by recognizing face or entering password. For face recognition, an image will becaptured by camera and preprocessed and converting, resizing and cropping, then face detection andrecognitionareperformed. 2. BLOCK DIAGRAM Fig -1: block diagram of IOT based door lock or unlock system using face recognition. The system will works in two different parts. The first part is for capturing and creating a database by storing the image. And the second one is to compare the image with the stored images in the database .For feature extractionwe will use Eigen faces methodology and Euclidian distances will used for recognition of the face. CAMERA MODULE: Camera module is pi camera interfacing to the raspberry pi module. It is used to capture images and send the clicked images to the raspberry pi module. Camera contains LEDs and flashes to handle that light condition that is not explicitly supplied by the environment and these light conditions are known as ambient light conditions. RASPBERRY PI MODULE: raspberry pi 3 module is a small computer board. When an image istakenbyraspberry piitis compared with database image. For the first time when we capture an image to Create a database raspberry pi module captures many images to createa databaseinthesystem and this database is compared with the live captured images. After comparing the two images, based on whether the output is positive or negative it gives commands to GSM module. GSM MODULE: GSM module is used to senda messagetothe authorized people based on the output. If the output is positive “Information matched Accessgranted”message will be sent to the authorized people, otherwise in case of unauthorized access it will send an “Access denied. Some unknown person is trying to unlock the door”. Message to the certified users of the system. As with any system, the initial stage is to visualize the core modules, inputs, outputs and interrelations among them; this can be effectively done using a flow chart, above is a graphical representation of the proposed system.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1138 3. CONCLUSIONS The arrangement of a facial recognition system using raspberry pi can make the system littler, lighter and work successfully utilizing lower control use, so it is more convenient than the pc- based face recognition system. It is open source software on Linux. Also, send a security alert message to the authorized person utilities. We are also providing power backup for the smooth and continuous functioning of the system in caseofpowerfailure.Thepower bank is used to charge the Raspberry Pi so there is less chance to slow down the system. This development scheme is cheap, fast, and highly reliable and Raspberry pi takes less power and provides enough flexibility to suit the requirement of different people. ACKNOWLEDGEMENT Those who walk the difficult path to success never at this destiny they walk ahead towards greater success. I consider myself lucky to work with guidance of such talented and experienced people during. The preparation of Project Report who guided me all through it. A special mention must go to my Guide Prof. A. C. Wani who supported me with her knowledge, experience and suggestion. Only their inspiration has made this Project report easy and interesting. I am indebted to HOD Dr. S. R. Suralkar for his support at various stages during the information of this piece of work. I would also like to thank our Principal Dr. K. S. Wani for his warm support and providing all necessaryfacilitiestous,the student. I would also like to thank our co-ordinates Prof. A. C. Wani for his support and guidance. Last but not list I am thankful to all Teachers and Staff members of E&TC department for their expert guidanceand continuous encouragement through out to see that maximum benefit is taken out of his experience. REFERENCES [1] Çarıkçı M. Özen F. 2012 A Face RecognitionSystemBased on Eigen faces Method. [2] Jogdand S. Karanjkar M. 2015Implementation of Automated Door Accessing System with Face Design and Recognition. [3] Sowmiya, U. shafiq mansoor J. 2015 Raspberry pi based home door security through 3g dongle. [4] Kartik J. Srimadhavan V. 2013 SMS Alert and Embedded Network Video Monitoring Terminal. [5] Sahani M. Nanda C. Sahu A. Pattnaik B. 2015Web Based Online Embedded Door Access Control and Home Security System Based on Face Recognition.