Submit Search
Upload
IRJET - Safety and Security Aspects of Smart Home Applications using Face Recognition
•
0 likes
•
15 views
IRJET Journal
Follow
https://irjet.net/archives/V7/i3/IRJET-V7I356.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 6
Download now
Download to read offline
Recommended
IRJET- Implementation of Smart Surveillance System Based on Bio-Metrics
IRJET- Implementation of Smart Surveillance System Based on Bio-Metrics
IRJET Journal
IRJET- An Alert System for Home Security based on Internet of Thing
IRJET- An Alert System for Home Security based on Internet of Thing
IRJET Journal
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: Review
IRJET Journal
IRJET - Raspberry Pi based Intelligent Security System
IRJET - Raspberry Pi based Intelligent Security System
IRJET Journal
IRJET- Smart Home Automation using IoT with Security Features
IRJET- Smart Home Automation using IoT with Security Features
IRJET Journal
Smart and Secure Home using IoT
Smart and Secure Home using IoT
IRJET Journal
IRJET- Automatic Door Monitoring System
IRJET- Automatic Door Monitoring System
IRJET Journal
IRJET- IoT based Home Automation and Smart Security System
IRJET- IoT based Home Automation and Smart Security System
IRJET Journal
Recommended
IRJET- Implementation of Smart Surveillance System Based on Bio-Metrics
IRJET- Implementation of Smart Surveillance System Based on Bio-Metrics
IRJET Journal
IRJET- An Alert System for Home Security based on Internet of Thing
IRJET- An Alert System for Home Security based on Internet of Thing
IRJET Journal
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: Review
IRJET Journal
IRJET - Raspberry Pi based Intelligent Security System
IRJET - Raspberry Pi based Intelligent Security System
IRJET Journal
IRJET- Smart Home Automation using IoT with Security Features
IRJET- Smart Home Automation using IoT with Security Features
IRJET Journal
Smart and Secure Home using IoT
Smart and Secure Home using IoT
IRJET Journal
IRJET- Automatic Door Monitoring System
IRJET- Automatic Door Monitoring System
IRJET Journal
IRJET- IoT based Home Automation and Smart Security System
IRJET- IoT based Home Automation and Smart Security System
IRJET Journal
Smart Home System using IOT
Smart Home System using IOT
IRJET Journal
IRJET- Design and Implementation of Smart Home Security System based on IoT
IRJET- Design and Implementation of Smart Home Security System based on IoT
IRJET Journal
Internet of Things (IoT) Based Smart Security & Home Automation System.
Internet of Things (IoT) Based Smart Security & Home Automation System.
sayed78
IRJET - Smart Classroom Automation based on IoT
IRJET - Smart Classroom Automation based on IoT
IRJET Journal
smart automation system
smart automation system
Abhishek Bhadoria
IRJET- Design and Implementation of Integrated Smart Home System (ISHS)
IRJET- Design and Implementation of Integrated Smart Home System (ISHS)
IRJET Journal
Intelligent IoT Projects In 7 Days
Intelligent IoT Projects In 7 Days
Skyline Technologies
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...
Mehraj U Din
Development of Personal Weather Report for Home Security
Development of Personal Weather Report for Home Security
IOSRJVSP
Home Automation using IOT and Mobile App
Home Automation using IOT and Mobile App
IRJET Journal
Principles of research article 23 july 2021
Principles of research article 23 july 2021
JOENEMUKWEVHO
Security in IoT
Security in IoT
SKS
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET Journal
IRJET-Smart Home Automation System using Mobile Application
IRJET-Smart Home Automation System using Mobile Application
IRJET Journal
Energy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoT
IJEACS
Security Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoT
Barcoding, Inc.
IoT based Environmental Monitoring and Control System
IoT based Environmental Monitoring and Control System
IJMREMJournal
Intelligent Image Capturing Alarm System Using Raspberry Pi
Intelligent Image Capturing Alarm System Using Raspberry Pi
TELKOMNIKA JOURNAL
IRJET- Voice Controlled Home Automation System
IRJET- Voice Controlled Home Automation System
IRJET Journal
IRJET- Theft Control using IoT
IRJET- Theft Control using IoT
IRJET Journal
IRJET - Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoT
IRJET Journal
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IRJET Journal
More Related Content
What's hot
Smart Home System using IOT
Smart Home System using IOT
IRJET Journal
IRJET- Design and Implementation of Smart Home Security System based on IoT
IRJET- Design and Implementation of Smart Home Security System based on IoT
IRJET Journal
Internet of Things (IoT) Based Smart Security & Home Automation System.
Internet of Things (IoT) Based Smart Security & Home Automation System.
sayed78
IRJET - Smart Classroom Automation based on IoT
IRJET - Smart Classroom Automation based on IoT
IRJET Journal
smart automation system
smart automation system
Abhishek Bhadoria
IRJET- Design and Implementation of Integrated Smart Home System (ISHS)
IRJET- Design and Implementation of Integrated Smart Home System (ISHS)
IRJET Journal
Intelligent IoT Projects In 7 Days
Intelligent IoT Projects In 7 Days
Skyline Technologies
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...
Mehraj U Din
Development of Personal Weather Report for Home Security
Development of Personal Weather Report for Home Security
IOSRJVSP
Home Automation using IOT and Mobile App
Home Automation using IOT and Mobile App
IRJET Journal
Principles of research article 23 july 2021
Principles of research article 23 july 2021
JOENEMUKWEVHO
Security in IoT
Security in IoT
SKS
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET Journal
IRJET-Smart Home Automation System using Mobile Application
IRJET-Smart Home Automation System using Mobile Application
IRJET Journal
Energy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoT
IJEACS
Security Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoT
Barcoding, Inc.
IoT based Environmental Monitoring and Control System
IoT based Environmental Monitoring and Control System
IJMREMJournal
Intelligent Image Capturing Alarm System Using Raspberry Pi
Intelligent Image Capturing Alarm System Using Raspberry Pi
TELKOMNIKA JOURNAL
IRJET- Voice Controlled Home Automation System
IRJET- Voice Controlled Home Automation System
IRJET Journal
IRJET- Theft Control using IoT
IRJET- Theft Control using IoT
IRJET Journal
What's hot
(20)
Smart Home System using IOT
Smart Home System using IOT
IRJET- Design and Implementation of Smart Home Security System based on IoT
IRJET- Design and Implementation of Smart Home Security System based on IoT
Internet of Things (IoT) Based Smart Security & Home Automation System.
Internet of Things (IoT) Based Smart Security & Home Automation System.
IRJET - Smart Classroom Automation based on IoT
IRJET - Smart Classroom Automation based on IoT
smart automation system
smart automation system
IRJET- Design and Implementation of Integrated Smart Home System (ISHS)
IRJET- Design and Implementation of Integrated Smart Home System (ISHS)
Intelligent IoT Projects In 7 Days
Intelligent IoT Projects In 7 Days
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...
Development of Personal Weather Report for Home Security
Development of Personal Weather Report for Home Security
Home Automation using IOT and Mobile App
Home Automation using IOT and Mobile App
Principles of research article 23 july 2021
Principles of research article 23 july 2021
Security in IoT
Security in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET-Smart Home Automation System using Mobile Application
IRJET-Smart Home Automation System using Mobile Application
Energy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoT
Security Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoT
IoT based Environmental Monitoring and Control System
IoT based Environmental Monitoring and Control System
Intelligent Image Capturing Alarm System Using Raspberry Pi
Intelligent Image Capturing Alarm System Using Raspberry Pi
IRJET- Voice Controlled Home Automation System
IRJET- Voice Controlled Home Automation System
IRJET- Theft Control using IoT
IRJET- Theft Control using IoT
Similar to IRJET - Safety and Security Aspects of Smart Home Applications using Face Recognition
IRJET - Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoT
IRJET Journal
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IRJET Journal
Home security based on Internet of things Review paper
Home security based on Internet of things Review paper
IRJET Journal
IRJET- An Intelligent Remote Controlled System for Smart Home Automation
IRJET- An Intelligent Remote Controlled System for Smart Home Automation
IRJET Journal
Home Security System using ESP32-CAM and Telegram Application
Home Security System using ESP32-CAM and Telegram Application
IRJET Journal
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IRJET Journal
IRJET - Smart Doorbell System
IRJET - Smart Doorbell System
IRJET Journal
IRJET- Smart Security System in Homes using Simple Internet of Things Ena...
IRJET- Smart Security System in Homes using Simple Internet of Things Ena...
IRJET Journal
Face Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock System
IRJET Journal
IRJET - Smart Door System
IRJET - Smart Door System
IRJET Journal
Home Security System based on IOT: A Systematic Alert System
Home Security System based on IOT: A Systematic Alert System
IRJET Journal
Integrated smart door system in apartment room based on internet
Integrated smart door system in apartment room based on internet
TELKOMNIKA JOURNAL
csc project .docx
csc project .docx
vorsv
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET Journal
Smart Security System IOT
Smart Security System IOT
ijtsrd
IRJET- IOT based Intrusion Detection and Tracking System
IRJET- IOT based Intrusion Detection and Tracking System
IRJET Journal
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET Journal
INTENSIFICATION OF HOME AUTOMATION USING IOT
INTENSIFICATION OF HOME AUTOMATION USING IOT
Journal For Research
Internet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless Hibernation
IRJET Journal
Smart Home for Senior Citizens
Smart Home for Senior Citizens
IRJET Journal
Similar to IRJET - Safety and Security Aspects of Smart Home Applications using Face Recognition
(20)
IRJET - Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoT
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
Home security based on Internet of things Review paper
Home security based on Internet of things Review paper
IRJET- An Intelligent Remote Controlled System for Smart Home Automation
IRJET- An Intelligent Remote Controlled System for Smart Home Automation
Home Security System using ESP32-CAM and Telegram Application
Home Security System using ESP32-CAM and Telegram Application
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IRJET - Smart Doorbell System
IRJET - Smart Doorbell System
IRJET- Smart Security System in Homes using Simple Internet of Things Ena...
IRJET- Smart Security System in Homes using Simple Internet of Things Ena...
Face Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock System
IRJET - Smart Door System
IRJET - Smart Door System
Home Security System based on IOT: A Systematic Alert System
Home Security System based on IOT: A Systematic Alert System
Integrated smart door system in apartment room based on internet
Integrated smart door system in apartment room based on internet
csc project .docx
csc project .docx
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
Smart Security System IOT
Smart Security System IOT
IRJET- IOT based Intrusion Detection and Tracking System
IRJET- IOT based Intrusion Detection and Tracking System
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
INTENSIFICATION OF HOME AUTOMATION USING IOT
INTENSIFICATION OF HOME AUTOMATION USING IOT
Internet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless Hibernation
Smart Home for Senior Citizens
Smart Home for Senior Citizens
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZTE
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
power system scada applications and uses
power system scada applications and uses
DevarapalliHaritha
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
microprocessor 8085 and its interfacing
microprocessor 8085 and its interfacing
jaychoudhary37
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
jennyeacort
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
eptoze12
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
VICTOR MAESTRE RAMIREZ
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
britheesh05
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
DeelipZope
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
RajaP95
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
959SahilShah
Recently uploaded
(20)
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
power system scada applications and uses
power system scada applications and uses
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
microprocessor 8085 and its interfacing
microprocessor 8085 and its interfacing
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
IRJET - Safety and Security Aspects of Smart Home Applications using Face Recognition
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 261 Safety and Security Aspects of Smart Home Applications using Face Recognition Sabarinath R K1, Sathyamurthy C2, Vishnu Sankar S3, Wajahath Rasool M4 1,2,3,4Student, Department of IT, SRM Valliammai Engineering College, Tamilnadu, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – The present scenario ensures the safety and security has become an inevitably essential. In a few decades due to the technology growth, the security for every system reaches a new peak. Security plays an integral role in today’s modern world. IOT means a many hardware can connect with the internet, today internet plays a vital role which is growing a very rapid rate and it can communicate huge number of devices such as MQTT (Message queuing telemetrytransport). Home security is a very important application in today world, many thefts happens in world. IOT can prevent from theft and can give a protection to the precious applicationsinhome. The system will intimate the owner of the house about any unauthorized activity happens or wheneverthedoor isopened by sending a notification to the user. After that notification received, owner can take a necessary action. The security system will use a microcontroller known as Arduino microcontroller to interface between the components, the vibration sensor is connected and the door vibrates intimates the authorized person using MQTT, Python to connect and communicate using the MQTT. The main advantages ofsuch a system includes the safe and security, Execution process is speed. KEYWORDS: MQTT, Arduino MCU AND IOT 1. INTRODUCTION Security plays an integral role in today’s modern world. The current scenario ensures the safety and security of the system has become an inevitably essential. In few decades due to the technology growth a securitymustneedreachesit peaks in the current world. When there is a modern home with minimum human effort and maximumsecurity,it’swell known as modern home. Since there is an advent of wireless and technological, all together it introduces an automated intelligent security system for more efficiency. The automated home security system can be designed with the surveillance camera for monitoring and protecting the appliances via cameras and multiple sensors, and the use of these sensors will be defining the features of these sensors. Data transmission quicker is taking place using the Wi-Fi to security systems which helps the user to protect and monitor the system. The innovative IOT based products and services will grow exponentially in next few decades predicted by the analysts. The IOT interface with different digital technologies and a huge range of hardware and software devices. IOT contributes open access to particular set of data. The evolution of internet, software tools and its use of computer systems has resulted in a huge electronic transformation of data quickly which experienced multiple concerns such as security, privacy and confidentiality of information. Significant activities been made in term of improving computer systems security. However, security, privacy and confidentiality of electronic systems are potentially major concerns in computer systems. In fact, currently no system is available in the world is fully secure. Recent advancements in the field of communication and information technologies have caused a rapid growth in IOT application development and thereby the smart home technologies. The smart home environmentsareintended to be able to improve home security systems and achieve goals such as increasing comfort and reducing operational costs while providing security to the users. Here Monitoring the intruders and thief activities which requiredfora purpose of protection of home appliances andreducingtheft,increasing safety. Home security made a drastic change in the past few decades and continue to advance much more in the coming years. Previously home security systems meant having an alarm that would go off when somebody would break in and motion sensor senses and send false notification to the owner but a smart secured home can give much more security than that. This paper consists of four sections. The first section shows the survey made on existing systems and the findings. The second section elaborates on the methodology or the proposed work. The third section shows the experimental setup and the results. The final section gives the conclusion and future scope of the work. 2. LITERATURE SURVEY The author proposed ”Internet of Things Based Home Security Using Raspberry Pi”. This paper [1] presents the importance of home security in today’s world. In our daily lifecycle wherever, every time, every second we need internet to fulfil our needs/search.Lookingatthehugeusage of Internet of Things (IOT) so they decided to use IOT in home security system. For IOT based home security it requires Some platform to attach the things and perform a program so, they have selected the newest version of Raspberry Pi model which is Raspberry Pi 3 Model B. This paper’s main approach is to secure home in terms of any damage and theft. For Home security system this paper represents detection of the gas, flame, vibration and magnetic sensor are used in the door. If any of the anonymous activity like fire, gas leakage, vibration will take then the buzzer alarm will ring and sends a notification to the owner. Also this paper presents the PIR sensor to detect
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 262 the moving objects and relay switches to switch ON and OFF lights in the room and Camera to capture and records the activity. Outside the door there is PIR sensor which detects the motion of intruder. Whenever any motion is detected within the range of 5 to 6 meter and 180degree the PIR sensor sends signal to Raspberry Pi and Raspberry Pi starts the bulb inside the home to alert the intruder. There is magnetic sensor at the door, if someone tries to break or open the door the magnetic sensor breaks and the signal is sent to the Raspberry Pi and withinsecondstheRaspberrypi activates Pi camera to capture image of intruder. Along with this procedure at a time the buzzer will turnonandcaptured image will be sent to the user mail. Chandra M. L. R, et.al proposed the “IOT enabled with smart security system”. This paper [2] presents security to the house and also providing a facility to the user where owner can monitor the surrounding parameters inside the house (like temperature, smoke andlightintensity)andcancontrol them by collection and exchange of data between the things for example switching on/off devices (like fan and light based on these parameters) as a globally. In recent days whenever house is locked the break-ins number has been increased enormously. So in order to provide security to the home this presented paper is helpful. When the intruders enter into the house, image of the intruder iscaptured bythe system, even if intruder escapes Police need to caught the intruder to recover the stolen things which needs as the evidence of the intruder to the police. The planned system captures the suspects and sends it to the authorized mail through internet over Simple Mail TransferProtocol (SMTP). Kumar, et.al presents presents the security for home by raspberry pi camera. The paper [3] approach the innovative headways have cleared path in private homes too. Shrewd homes are arising to be all the more a need in today and age. Control, observing and security are the vital elements of a savvy home and shrewd gadgets have a noteworthy impact in machine control. This paper focuses on the origination and execution of an inclusive continuous home security framework that is shrewd and totally deals with home security. This gadget can see any development and send warnings on the client dashboard which thus advises the checking focus. Sensors are initiated amid your nonappearance or whenyou informthearrangementofyour nonattendance at home. The Raspberry Pi, a charge card measure pc with an inbuilt camera board can transforminto a data exchange to camera security framework when the camera board is put to utilize. This framework makes utilization of Open CV.Thesensorsidentifyingdevelopments can respond to the owners at a different situation. This paper [4] presents an OSGi based security architecture for a home security system. The “digital home” refers to a home equipped with technological systems and appliances enabling centralized or remotely controllable integrated interfaces throughout the network. Withthedevelopmentof the digital home and home network appliances, different protocols, standards and transmission modes,suchasUPnP, SLP and SIP, have been proposed for interconnection or discovery with these home networked devices. Although more digital devices and home appliancescomplywiththese protocols in the development, the proposed protocols are usually unable to communicate with each other. Thus, the Open Service Gateway Initiative (OSGi) plan has been proposed to provide a way to bind several home network protocols, making the devices or services of one network discoverable to others. It can integrate networked security devices, and respond to intrusion alert or emergency alert. If intrusion activities occur, the security programs will acquire the intruder automatically The system proposed here [5] presents an in-house technology, the development of EGAT-SCADA was firstly focused on what it can do. It is developed for supervisingthe operation on electricpowertransmissionsystemthroughout the country of Thailand. It will be installed and setup on five regional control centers, several dozens of group control centers, and more than two hundred substations. Moreover, an implementation on a hydro center is given in a plan.Since the Primary phase of development was completed, the security issue has become a major concern before the implementation. General procedures on IT security are essentially enforced. Several tests were conducted. Currently, SCADA security is constant studied for shielding EGAT-SCADA from unauthorized access and abuse. This paper will describe in detail the security concerns of EGAT-SCADA. 2. PROPOSED WORK The proposed system is basedonthefacedetectionforaccess main doorcapturing a real timeimage of a personisbasedon the Harr cascade algorithm which can faster computation of the facial features and extraction. This system contains a 4 modules are listed below 2.1. IMAGE ACQUSITION AND PRE-PROCESSING The input real-time image to the system can be captured using a web cam or can be acquired from the local disk. This image undergoes image enhancement and filter, where tone mapping is applied to that real-time images with low contrast to restore the original contrast of the image. Pre- Processing stage enhances the quality of input image and locates data of interest and smoothing the image. TheImage acquisition captures a real-time image in camera and then Stack acquisition are stores image in a stacks. Image selection is the selecting best image from the stored stacks. The image alignment is aligning the face in to the corner and edges. Image segmentation is partitioningimageintoa setof pixels and pixels are extracted in to features and finally select a set of usable regions in the face.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 263 Image Acquisition and Pre-Processing 2.2 Storing of Datasets The details of the owner along with their biometrics, measurement and radius of the house, number of doors and windows in the house are stored. The House and owner details are stored. When the biometrics of the person matches with the biometric data storedinthecloud,themain door is enabled to access. The accessed main door automatically opensusingDCmotor.Insuchcaseofdetection of unauthorized access, the face of the intruder is captured and the information is sent to owner and also to the nearest police station. Storing of Datasets 2.3 SENSORS CONNECTIVITY The system is embedded with automatic door using face recognition, and a vibrator sensor also embedded with this automatic door. Message Queuing Telemetry Transport(MQTT) is a central hub which stores all the data and publish, send/receive message. Python module which sends the information received from MQTT to the ownerand also to the nearest police station. PC Camera is fixed at top of the automated doorin case to detect the unauthorized users, intruders, thieves. A buzzeralarmisalsoincludedtoalertthe neighboring house. A DC motor & sound sensor is embedded with buzzer alarm in case of alertness. An IR sensor is built within the locker in any chance of theft taken. It can be also used for bank locking purposes and security needs This module works with the sensors, Arduino Mega board and the microcontroller. The input is obtained from the user who is the owner. The owner images are already stored his image in the system it takes the Harr cascade algorithm to detect the face and the DC motor fixed at the door for automatically functioning when it recognizes the authorized the user. As in Fig-1 shows a DC motor which is embedded in door. Unauthorized user or intruder try to break the door then vibration sensor reaches a specific range and it sends a message to the owner by MQTT. As in Fig-2 Shows a Vibration sensor. As in Fig-3, the Arduino Mega is a microcontroller board based on ATMega328. Arduino ATmega328 has 14 digital input/output pins of which 6 can be used as PWM outputs, 6 analog inputs, a 16 MHz quartz crystal, a USB connection, a power jack, an ICSP header and a reset button. Fig-1: DC Motor Fig -2: Vibration Sensor
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 264 Fig-3: Arduino Mega board with ATMega328 microcontroller The intruder try to do any other activity surrounding the home when sound will reach a specific range then the sound sensor embedded in door and it sends a message to the owner and nearby Police station and buzzer alarm will rang inside the house so neighbour can intimate it. In Fig-4 Shows a sound sensor and Fig-5 shows a Buzzer alarm. Fig-4: Sound Sensor Fig-5: Buzzer Sound alarm Once the main door is broken, the thief automatically tries to search for jewels, money or any other documents. The thief automatically finds the locker where all the ornaments are kept. The thief is unaware about the IR sensor that is placed at the top of locker and tries to break it. When the thief attempts to break the locker, the IR sensor senses the Intruder’s body rays and sprays the chloroform on the thief and he is forced to faint. Fig-6 shows a IR sensor Fig-6 : IR Sensor 2.4 INFORMATION TRANSMISSION The MQTT broker transmits the information to the owner and the police station when the data doesn’t match with the data that are already stored in the cloud. The Police will arrive in the mean- time and the corresponding actions will be taken against the thief. 3. SYSTEM ARCHITECTURE The Fig-7 shows the architecture diagram of the system proposed. The architecture involves the sensor, microcontroller, Arduino Mega board, and so on. Fig -7: System Architecture 4. IMPLEMENTATION OF THE SYSTEM The Arduino Mega board embedded with AtMega328p microcontroller is used. The Vibration sensors are added to receive Vibration from the intruder. The Python, MQTT modules are received notification to the user. implementation is shown in Fig-8.
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 265 Fig -8: System Implementation The Harr Cascade algorithm implementation is carried out according to the face datasets storage. Fig-8 : Implementation of Harr cascade algorithms 5. RESULTS The output of the system shows the Recognized the authorized user with face square pixelsingreencolorshown in Fig-9 and Fig-10 shows authorized user face in the datasets. Sensors are automatically switched ON when intruder enters it shows in Fig-11. Fig -9: Authorized user Fig -10: Storage of authorized user Fig-10: Sensors Activation 6. CONCLUSION AND FUTURE WORK This system is useful for the mute House owners to control and monitoring a Home globally from anywhere and easy communication to neighbor when buzzer sensor rings. Nearby Police station can monitoritbyreceiving notification via MQTT. This helps to prevent from theft. In futurework,it can be implemented in two type of environmentssuchasthe sensor working in the house, when owner of the house is present inside and outside Environments. REFERENCES [1] A. Pawar and V. M. Umale, "Internet of Things Based Home Security Using Raspberry Pi," 2018 Fourth International Conferenceon ComputingCommunication Control and Automation (ICCUBEA), Pune, India, 2018. [2] Chandra, M. L. R., Kumar, B. V., & SureshBabu, B. (2017). IOT enabled home with smart security. 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS). [3] Kumar, K. N. K., Natraj, H., & Jacob, T. P. (2017). Motion activated security camera using raspberry Pi. 2017 International Conference on Communication and Signal Processing (ICCSP). [4] M. Chen and Y. Chuang, "Supporting Home Security System in OSGi Platform," 2010 IEEE 24th International
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 266 Conference on Advanced Information Networking and Applications Workshops, Perth, WA, 2010. [5] T. Paukatong, "SCADA Security: A NewConcerningIssue of an In-house EGAT-SCADA," 2005 IEEE/PES Transmission & Distribution Conference & Exposition: Asia and Pacific, Dalian 2005.
Download now