SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 261
Safety and Security Aspects of Smart Home Applications using Face
Recognition
Sabarinath R K1, Sathyamurthy C2, Vishnu Sankar S3, Wajahath Rasool M4
1,2,3,4Student, Department of IT, SRM Valliammai Engineering College, Tamilnadu, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract – The present scenario ensures the safety and
security has become an inevitably essential. In a few decades
due to the technology growth, the security for every system
reaches a new peak. Security plays an integral role in today’s
modern world. IOT means a many hardware can connect with
the internet, today internet plays a vital role which is growing
a very rapid rate and it can communicate huge number of
devices such as MQTT (Message queuing telemetrytransport).
Home security is a very important application in today world,
many thefts happens in world. IOT can prevent from theft and
can give a protection to the precious applicationsinhome. The
system will intimate the owner of the house about any
unauthorized activity happens or wheneverthedoor isopened
by sending a notification to the user. After that notification
received, owner can take a necessary action. The security
system will use a microcontroller known as Arduino
microcontroller to interface between the components, the
vibration sensor is connected and the door vibrates intimates
the authorized person using MQTT, Python to connect and
communicate using the MQTT. The main advantages ofsuch a
system includes the safe and security, Execution process is
speed.
KEYWORDS: MQTT, Arduino MCU AND IOT
1. INTRODUCTION
Security plays an integral role in today’s modern world. The
current scenario ensures the safety and security of the
system has become an inevitably essential. In few decades
due to the technology growth a securitymustneedreachesit
peaks in the current world. When there is a modern home
with minimum human effort and maximumsecurity,it’swell
known as modern home. Since there is an advent of wireless
and technological, all together it introduces an automated
intelligent security system for more efficiency. The
automated home security system can be designed with the
surveillance camera for monitoring and protecting the
appliances via cameras and multiple sensors, and the use of
these sensors will be defining the features of these sensors.
Data transmission quicker is taking place using the Wi-Fi to
security systems which helps the user to protect and
monitor the system. The innovative IOT based products and
services will grow exponentially in next few decades
predicted by the analysts. The IOT interface with different
digital technologies and a huge range of hardware and
software devices. IOT contributes open access to particular
set of data. The evolution of internet, software tools and its
use of computer systems has resulted in a huge electronic
transformation of data quickly which experienced multiple
concerns such as security, privacy and confidentiality of
information. Significant activities been made in term of
improving computer systems security. However, security,
privacy and confidentiality of electronic systems are
potentially major concerns in computer systems. In fact,
currently no system is available in the world is fully secure.
Recent advancements in the field of communication and
information technologies have caused a rapid growth in IOT
application development and thereby the smart home
technologies. The smart home environmentsareintended to
be able to improve home security systems and achieve goals
such as increasing comfort and reducing operational costs
while providing security to the users. Here Monitoring the
intruders and thief activities which requiredfora purpose of
protection of home appliances andreducingtheft,increasing
safety. Home security made a drastic change in the past few
decades and continue to advance much more in the coming
years. Previously home security systems meant having an
alarm that would go off when somebody would break in and
motion sensor senses and send false notification to the
owner but a smart secured home can give much more
security than that.
This paper consists of four sections. The first section shows
the survey made on existing systems and the findings. The
second section elaborates on the methodology or the
proposed work. The third section shows the experimental
setup and the results. The final section gives the conclusion
and future scope of the work.
2. LITERATURE SURVEY
The author proposed ”Internet of Things Based Home
Security Using Raspberry Pi”. This paper [1] presents the
importance of home security in today’s world. In our daily
lifecycle wherever, every time, every second we need
internet to fulfil our needs/search.Lookingatthehugeusage
of Internet of Things (IOT) so they decided to use IOT in
home security system. For IOT based home security it
requires Some platform to attach the things and perform a
program so, they have selected the newest version of
Raspberry Pi model which is Raspberry Pi 3 Model B. This
paper’s main approach is to secure home in terms of any
damage and theft. For Home security system this paper
represents detection of the gas, flame, vibration and
magnetic sensor are used in the door. If any of the
anonymous activity like fire, gas leakage, vibration will take
then the buzzer alarm will ring and sends a notification to
the owner. Also this paper presents the PIR sensor to detect
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 262
the moving objects and relay switches to switch ON and OFF
lights in the room and Camera to capture and records the
activity. Outside the door there is PIR sensor which detects
the motion of intruder. Whenever any motion is detected
within the range of 5 to 6 meter and 180degree the PIR
sensor sends signal to Raspberry Pi and Raspberry Pi starts
the bulb inside the home to alert the intruder. There is
magnetic sensor at the door, if someone tries to break or
open the door the magnetic sensor breaks and the signal is
sent to the Raspberry Pi and withinsecondstheRaspberrypi
activates Pi camera to capture image of intruder. Along with
this procedure at a time the buzzer will turnonandcaptured
image will be sent to the user mail.
Chandra M. L. R, et.al proposed the “IOT enabled with smart
security system”. This paper [2] presents security to the
house and also providing a facility to the user where owner
can monitor the surrounding parameters inside the house
(like temperature, smoke andlightintensity)andcancontrol
them by collection and exchange of data between the things
for example switching on/off devices (like fan and light
based on these parameters) as a globally. In recent days
whenever house is locked the break-ins number has been
increased enormously. So in order to provide security to the
home this presented paper is helpful. When the intruders
enter into the house, image of the intruder iscaptured bythe
system, even if intruder escapes Police need to caught the
intruder to recover the stolen things which needs as the
evidence of the intruder to the police. The planned system
captures the suspects and sends it to the authorized mail
through internet over Simple Mail TransferProtocol (SMTP).
Kumar, et.al presents presents the security for home by
raspberry pi camera. The paper [3] approach the innovative
headways have cleared path in private homes too. Shrewd
homes are arising to be all the more a need in today and age.
Control, observing and security are the vital elements of a
savvy home and shrewd gadgets have a noteworthy impact
in machine control. This paper focuses on the origination
and execution of an inclusive continuous home security
framework that is shrewd and totally deals with home
security. This gadget can see any development and send
warnings on the client dashboard which thus advises the
checking focus. Sensors are initiated amid your
nonappearance or whenyou informthearrangementofyour
nonattendance at home. The Raspberry Pi, a charge card
measure pc with an inbuilt camera board can transforminto
a data exchange to camera security framework when the
camera board is put to utilize. This framework makes
utilization of Open CV.Thesensorsidentifyingdevelopments
can respond to the owners at a different situation.
This paper [4] presents an OSGi based security architecture
for a home security system. The “digital home” refers to a
home equipped with technological systems and appliances
enabling centralized or remotely controllable integrated
interfaces throughout the network. Withthedevelopmentof
the digital home and home network appliances, different
protocols, standards and transmission modes,suchasUPnP,
SLP and SIP, have been proposed for interconnection or
discovery with these home networked devices. Although
more digital devices and home appliancescomplywiththese
protocols in the development, the proposed protocols are
usually unable to communicate with each other. Thus, the
Open Service Gateway Initiative (OSGi) plan has been
proposed to provide a way to bind several home network
protocols, making the devices or services of one network
discoverable to others. It can integrate networked security
devices, and respond to intrusion alert or emergency alert.
If intrusion activities occur, the security programs will
acquire the intruder automatically
The system proposed here [5] presents an in-house
technology, the development of EGAT-SCADA was firstly
focused on what it can do. It is developed for supervisingthe
operation on electricpowertransmissionsystemthroughout
the country of Thailand. It will be installed and setup on five
regional control centers, several dozens of group control
centers, and more than two hundred substations. Moreover,
an implementation on a hydro center is given in a plan.Since
the Primary phase of development was completed, the
security issue has become a major concern before the
implementation. General procedures on IT security are
essentially enforced. Several tests were conducted.
Currently, SCADA security is constant studied for
shielding EGAT-SCADA from unauthorized access and
abuse. This paper will describe in detail the security
concerns of EGAT-SCADA.
2. PROPOSED WORK
The proposed system is basedonthefacedetectionforaccess
main doorcapturing a real timeimage of a personisbasedon
the Harr cascade algorithm which can faster computation of
the facial features and extraction.
This system contains a 4 modules are listed below
2.1. IMAGE ACQUSITION AND PRE-PROCESSING
The input real-time image to the system can be captured
using a web cam or can be acquired from the local disk. This
image undergoes image enhancement and filter, where tone
mapping is applied to that real-time images with low
contrast to restore the original contrast of the image. Pre-
Processing stage enhances the quality of input image and
locates data of interest and smoothing the image. TheImage
acquisition captures a real-time image in camera and then
Stack acquisition are stores image in a stacks. Image
selection is the selecting best image from the stored stacks.
The image alignment is aligning the face in to the corner and
edges. Image segmentation is partitioningimageintoa setof
pixels and pixels are extracted in to features and finally
select a set of usable regions in the face.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 263
Image Acquisition and Pre-Processing
2.2 Storing of Datasets
The details of the owner along with their biometrics,
measurement and radius of the house, number of doors and
windows in the house are stored. The House and owner
details are stored. When the biometrics of the person
matches with the biometric data storedinthecloud,themain
door is enabled to access. The accessed main door
automatically opensusingDCmotor.Insuchcaseofdetection
of unauthorized access, the face of the intruder is captured
and the information is sent to owner and also to the nearest
police station.
Storing of Datasets
2.3 SENSORS CONNECTIVITY
The system is embedded with automatic door using face
recognition, and a vibrator sensor also embedded with this
automatic door. Message Queuing Telemetry
Transport(MQTT) is a central hub which stores all the data
and publish, send/receive message. Python module which
sends the information received from MQTT to the ownerand
also to the nearest police station. PC Camera is fixed at top of
the automated doorin case to detect the unauthorized users,
intruders, thieves. A buzzeralarmisalsoincludedtoalertthe
neighboring house. A DC motor & sound sensor is embedded
with buzzer alarm in case of alertness. An IR sensor is built
within the locker in any chance of theft taken. It can be also
used for bank locking purposes and security needs
This module works with the sensors, Arduino Mega board
and the microcontroller. The input is obtained from the user
who is the owner. The owner images are already stored his
image in the system it takes the Harr cascade algorithm to
detect the face and the DC motor fixed at the door for
automatically functioning when it recognizes the authorized
the user. As in Fig-1 shows a DC motor which is embedded in
door. Unauthorized user or intruder try to break the door
then vibration sensor reaches a specific range and it sends a
message to the owner by MQTT. As in Fig-2 Shows a
Vibration sensor.
As in Fig-3, the Arduino Mega is a microcontroller board
based on ATMega328. Arduino ATmega328 has 14 digital
input/output pins of which 6 can be used as PWM outputs, 6
analog inputs, a 16 MHz quartz crystal, a USB connection, a
power jack, an ICSP header and a reset button.
Fig-1: DC Motor
Fig -2: Vibration Sensor
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 264
Fig-3: Arduino Mega board with ATMega328
microcontroller
The intruder try to do any other activity surrounding the
home when sound will reach a specific range then the sound
sensor embedded in door and it sends a message to the
owner and nearby Police station and buzzer alarm will rang
inside the house so neighbour can intimate it. In Fig-4 Shows
a sound sensor and Fig-5 shows a Buzzer alarm.
Fig-4: Sound Sensor
Fig-5: Buzzer Sound alarm
Once the main door is broken, the thief automatically tries to
search for jewels, money or any other documents. The thief
automatically finds the locker where all the ornaments are
kept. The thief is unaware about the IR sensor that is placed
at the top of locker and tries to break it. When the thief
attempts to break the locker, the IR sensor senses the
Intruder’s body rays and sprays the chloroform on the thief
and he is forced to faint. Fig-6 shows a IR sensor
Fig-6 : IR Sensor
2.4 INFORMATION TRANSMISSION
The MQTT broker transmits the information to the owner
and the police station when the data doesn’t match with the
data that are already stored in the cloud. The Police will
arrive in the mean- time and the corresponding actions will
be taken against the thief.
3. SYSTEM ARCHITECTURE
The Fig-7 shows the architecture diagram of the system
proposed. The architecture involves the sensor,
microcontroller, Arduino Mega board, and so on.
Fig -7: System Architecture
4. IMPLEMENTATION OF THE SYSTEM
The Arduino Mega board embedded with AtMega328p
microcontroller is used. The Vibration sensors are added to
receive Vibration from the intruder. The Python, MQTT
modules are received notification to the user.
implementation is shown in Fig-8.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 265
Fig -8: System Implementation
The Harr Cascade algorithm implementation is carried out
according to the face datasets storage.
Fig-8 : Implementation of Harr cascade algorithms
5. RESULTS
The output of the system shows the Recognized the
authorized user with face square pixelsingreencolorshown
in Fig-9 and Fig-10 shows authorized user face in the
datasets. Sensors are automatically switched ON when
intruder enters it shows in Fig-11.
Fig -9: Authorized user
Fig -10: Storage of authorized user
Fig-10: Sensors Activation
6. CONCLUSION AND FUTURE WORK
This system is useful for the mute House owners to control
and monitoring a Home globally from anywhere and easy
communication to neighbor when buzzer sensor rings.
Nearby Police station can monitoritbyreceiving notification
via MQTT. This helps to prevent from theft. In futurework,it
can be implemented in two type of environmentssuchasthe
sensor working in the house, when owner of the house is
present inside and outside Environments.
REFERENCES
[1] A. Pawar and V. M. Umale, "Internet of Things Based
Home Security Using Raspberry Pi," 2018 Fourth
International Conferenceon ComputingCommunication
Control and Automation (ICCUBEA), Pune, India, 2018.
[2] Chandra, M. L. R., Kumar, B. V., & SureshBabu, B.
(2017). IOT enabled home with smart security. 2017
International Conference on Energy, Communication,
Data Analytics and Soft Computing (ICECDS).
[3] Kumar, K. N. K., Natraj, H., & Jacob, T. P. (2017). Motion
activated security camera using raspberry Pi. 2017
International Conference on Communication and Signal
Processing (ICCSP).
[4] M. Chen and Y. Chuang, "Supporting Home Security
System in OSGi Platform," 2010 IEEE 24th International
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 266
Conference on Advanced Information Networking and
Applications Workshops, Perth, WA, 2010.
[5] T. Paukatong, "SCADA Security: A NewConcerningIssue
of an In-house EGAT-SCADA," 2005 IEEE/PES
Transmission & Distribution Conference & Exposition:
Asia and Pacific, Dalian 2005.

More Related Content

What's hot

Smart Home System using IOT
Smart Home System using IOTSmart Home System using IOT
Smart Home System using IOTIRJET Journal
 
IRJET- Design and Implementation of Smart Home Security System based on IoT
IRJET-  	  Design and Implementation of Smart Home Security System based on IoTIRJET-  	  Design and Implementation of Smart Home Security System based on IoT
IRJET- Design and Implementation of Smart Home Security System based on IoTIRJET Journal
 
Internet of Things (IoT) Based Smart Security & Home Automation System.
Internet of Things (IoT) Based Smart Security & Home Automation System.Internet of Things (IoT) Based Smart Security & Home Automation System.
Internet of Things (IoT) Based Smart Security & Home Automation System.sayed78
 
IRJET - Smart Classroom Automation based on IoT
IRJET -  	  Smart Classroom Automation based on IoTIRJET -  	  Smart Classroom Automation based on IoT
IRJET - Smart Classroom Automation based on IoTIRJET Journal
 
IRJET- Design and Implementation of Integrated Smart Home System (ISHS)
IRJET- Design and Implementation of Integrated Smart Home System (ISHS)IRJET- Design and Implementation of Integrated Smart Home System (ISHS)
IRJET- Design and Implementation of Integrated Smart Home System (ISHS)IRJET Journal
 
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...Mehraj U Din
 
Development of Personal Weather Report for Home Security
Development of Personal Weather Report for Home SecurityDevelopment of Personal Weather Report for Home Security
Development of Personal Weather Report for Home SecurityIOSRJVSP
 
Home Automation using IOT and Mobile App
Home Automation using IOT and Mobile AppHome Automation using IOT and Mobile App
Home Automation using IOT and Mobile AppIRJET Journal
 
Principles of research article 23 july 2021
Principles of research article 23 july 2021Principles of research article 23 july 2021
Principles of research article 23 july 2021JOENEMUKWEVHO
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoTSKS
 
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET -  	  Cyber Security Threats and Vulnerabilities in IoTIRJET -  	  Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoTIRJET Journal
 
IRJET-Smart Home Automation System using Mobile Application
IRJET-Smart Home Automation System using Mobile ApplicationIRJET-Smart Home Automation System using Mobile Application
IRJET-Smart Home Automation System using Mobile ApplicationIRJET Journal
 
Energy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoTEnergy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoTIJEACS
 
Security Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoTSecurity Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoTBarcoding, Inc.
 
IoT based Environmental Monitoring and Control System
IoT based Environmental Monitoring and Control SystemIoT based Environmental Monitoring and Control System
IoT based Environmental Monitoring and Control SystemIJMREMJournal
 
Intelligent Image Capturing Alarm System Using Raspberry Pi
Intelligent Image Capturing Alarm System Using Raspberry PiIntelligent Image Capturing Alarm System Using Raspberry Pi
Intelligent Image Capturing Alarm System Using Raspberry PiTELKOMNIKA JOURNAL
 
IRJET- Voice Controlled Home Automation System
IRJET- Voice Controlled Home Automation SystemIRJET- Voice Controlled Home Automation System
IRJET- Voice Controlled Home Automation SystemIRJET Journal
 
IRJET- Theft Control using IoT
IRJET-  	  Theft Control using IoTIRJET-  	  Theft Control using IoT
IRJET- Theft Control using IoTIRJET Journal
 

What's hot (20)

Smart Home System using IOT
Smart Home System using IOTSmart Home System using IOT
Smart Home System using IOT
 
IRJET- Design and Implementation of Smart Home Security System based on IoT
IRJET-  	  Design and Implementation of Smart Home Security System based on IoTIRJET-  	  Design and Implementation of Smart Home Security System based on IoT
IRJET- Design and Implementation of Smart Home Security System based on IoT
 
Internet of Things (IoT) Based Smart Security & Home Automation System.
Internet of Things (IoT) Based Smart Security & Home Automation System.Internet of Things (IoT) Based Smart Security & Home Automation System.
Internet of Things (IoT) Based Smart Security & Home Automation System.
 
IRJET - Smart Classroom Automation based on IoT
IRJET -  	  Smart Classroom Automation based on IoTIRJET -  	  Smart Classroom Automation based on IoT
IRJET - Smart Classroom Automation based on IoT
 
smart automation system
smart automation systemsmart automation system
smart automation system
 
IRJET- Design and Implementation of Integrated Smart Home System (ISHS)
IRJET- Design and Implementation of Integrated Smart Home System (ISHS)IRJET- Design and Implementation of Integrated Smart Home System (ISHS)
IRJET- Design and Implementation of Integrated Smart Home System (ISHS)
 
Intelligent IoT Projects In 7 Days
Intelligent IoT Projects In 7 Days Intelligent IoT Projects In 7 Days
Intelligent IoT Projects In 7 Days
 
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...
 
Development of Personal Weather Report for Home Security
Development of Personal Weather Report for Home SecurityDevelopment of Personal Weather Report for Home Security
Development of Personal Weather Report for Home Security
 
Home Automation using IOT and Mobile App
Home Automation using IOT and Mobile AppHome Automation using IOT and Mobile App
Home Automation using IOT and Mobile App
 
Principles of research article 23 july 2021
Principles of research article 23 july 2021Principles of research article 23 july 2021
Principles of research article 23 july 2021
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET -  	  Cyber Security Threats and Vulnerabilities in IoTIRJET -  	  Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoT
 
IRJET-Smart Home Automation System using Mobile Application
IRJET-Smart Home Automation System using Mobile ApplicationIRJET-Smart Home Automation System using Mobile Application
IRJET-Smart Home Automation System using Mobile Application
 
Energy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoTEnergy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoT
 
Security Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoTSecurity Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoT
 
IoT based Environmental Monitoring and Control System
IoT based Environmental Monitoring and Control SystemIoT based Environmental Monitoring and Control System
IoT based Environmental Monitoring and Control System
 
Intelligent Image Capturing Alarm System Using Raspberry Pi
Intelligent Image Capturing Alarm System Using Raspberry PiIntelligent Image Capturing Alarm System Using Raspberry Pi
Intelligent Image Capturing Alarm System Using Raspberry Pi
 
IRJET- Voice Controlled Home Automation System
IRJET- Voice Controlled Home Automation SystemIRJET- Voice Controlled Home Automation System
IRJET- Voice Controlled Home Automation System
 
IRJET- Theft Control using IoT
IRJET-  	  Theft Control using IoTIRJET-  	  Theft Control using IoT
IRJET- Theft Control using IoT
 

Similar to IRJET - Safety and Security Aspects of Smart Home Applications using Face Recognition

IRJET - Android based Secure and Smart Home Application using IoT
IRJET -  	  Android based Secure and Smart Home Application using IoTIRJET -  	  Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoTIRJET Journal
 
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IRJET Journal
 
Home security based on Internet of things Review paper
Home security based on Internet of things Review paperHome security based on Internet of things Review paper
Home security based on Internet of things Review paperIRJET Journal
 
IRJET- An Intelligent Remote Controlled System for Smart Home Automation
IRJET- An Intelligent Remote Controlled System for Smart Home AutomationIRJET- An Intelligent Remote Controlled System for Smart Home Automation
IRJET- An Intelligent Remote Controlled System for Smart Home AutomationIRJET Journal
 
Home Security System using ESP32-CAM and Telegram Application
Home Security System using ESP32-CAM and Telegram ApplicationHome Security System using ESP32-CAM and Telegram Application
Home Security System using ESP32-CAM and Telegram ApplicationIRJET Journal
 
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...IRJET Journal
 
IRJET - Smart Doorbell System
 IRJET - Smart Doorbell System IRJET - Smart Doorbell System
IRJET - Smart Doorbell SystemIRJET Journal
 
IRJET- Smart Security System in Homes using Simple Internet of Things Ena...
IRJET-  	  Smart Security System in Homes using Simple Internet of Things Ena...IRJET-  	  Smart Security System in Homes using Simple Internet of Things Ena...
IRJET- Smart Security System in Homes using Simple Internet of Things Ena...IRJET Journal
 
Face Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemFace Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemIRJET Journal
 
IRJET - Smart Door System
IRJET - Smart Door SystemIRJET - Smart Door System
IRJET - Smart Door SystemIRJET Journal
 
Home Security System based on IOT: A Systematic Alert System
Home Security System based on IOT: A Systematic Alert SystemHome Security System based on IOT: A Systematic Alert System
Home Security System based on IOT: A Systematic Alert SystemIRJET Journal
 
Integrated smart door system in apartment room based on internet
Integrated smart door system in apartment room based on internetIntegrated smart door system in apartment room based on internet
Integrated smart door system in apartment room based on internetTELKOMNIKA JOURNAL
 
csc project .docx
csc project .docxcsc project .docx
csc project .docxvorsv
 
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET Journal
 
Smart Security System IOT
Smart Security System IOTSmart Security System IOT
Smart Security System IOTijtsrd
 
IRJET- IOT based Intrusion Detection and Tracking System
IRJET- IOT based Intrusion Detection and Tracking SystemIRJET- IOT based Intrusion Detection and Tracking System
IRJET- IOT based Intrusion Detection and Tracking SystemIRJET Journal
 
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...IRJET Journal
 
INTENSIFICATION OF HOME AUTOMATION USING IOT
INTENSIFICATION OF HOME AUTOMATION USING IOTINTENSIFICATION OF HOME AUTOMATION USING IOT
INTENSIFICATION OF HOME AUTOMATION USING IOTJournal For Research
 
Internet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless HibernationInternet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless HibernationIRJET Journal
 
Smart Home for Senior Citizens
Smart Home for Senior CitizensSmart Home for Senior Citizens
Smart Home for Senior CitizensIRJET Journal
 

Similar to IRJET - Safety and Security Aspects of Smart Home Applications using Face Recognition (20)

IRJET - Android based Secure and Smart Home Application using IoT
IRJET -  	  Android based Secure and Smart Home Application using IoTIRJET -  	  Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoT
 
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
 
Home security based on Internet of things Review paper
Home security based on Internet of things Review paperHome security based on Internet of things Review paper
Home security based on Internet of things Review paper
 
IRJET- An Intelligent Remote Controlled System for Smart Home Automation
IRJET- An Intelligent Remote Controlled System for Smart Home AutomationIRJET- An Intelligent Remote Controlled System for Smart Home Automation
IRJET- An Intelligent Remote Controlled System for Smart Home Automation
 
Home Security System using ESP32-CAM and Telegram Application
Home Security System using ESP32-CAM and Telegram ApplicationHome Security System using ESP32-CAM and Telegram Application
Home Security System using ESP32-CAM and Telegram Application
 
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
 
IRJET - Smart Doorbell System
 IRJET - Smart Doorbell System IRJET - Smart Doorbell System
IRJET - Smart Doorbell System
 
IRJET- Smart Security System in Homes using Simple Internet of Things Ena...
IRJET-  	  Smart Security System in Homes using Simple Internet of Things Ena...IRJET-  	  Smart Security System in Homes using Simple Internet of Things Ena...
IRJET- Smart Security System in Homes using Simple Internet of Things Ena...
 
Face Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemFace Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock System
 
IRJET - Smart Door System
IRJET - Smart Door SystemIRJET - Smart Door System
IRJET - Smart Door System
 
Home Security System based on IOT: A Systematic Alert System
Home Security System based on IOT: A Systematic Alert SystemHome Security System based on IOT: A Systematic Alert System
Home Security System based on IOT: A Systematic Alert System
 
Integrated smart door system in apartment room based on internet
Integrated smart door system in apartment room based on internetIntegrated smart door system in apartment room based on internet
Integrated smart door system in apartment room based on internet
 
csc project .docx
csc project .docxcsc project .docx
csc project .docx
 
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
 
Smart Security System IOT
Smart Security System IOTSmart Security System IOT
Smart Security System IOT
 
IRJET- IOT based Intrusion Detection and Tracking System
IRJET- IOT based Intrusion Detection and Tracking SystemIRJET- IOT based Intrusion Detection and Tracking System
IRJET- IOT based Intrusion Detection and Tracking System
 
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
 
INTENSIFICATION OF HOME AUTOMATION USING IOT
INTENSIFICATION OF HOME AUTOMATION USING IOTINTENSIFICATION OF HOME AUTOMATION USING IOT
INTENSIFICATION OF HOME AUTOMATION USING IOT
 
Internet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless HibernationInternet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless Hibernation
 
Smart Home for Senior Citizens
Smart Home for Senior CitizensSmart Home for Senior Citizens
Smart Home for Senior Citizens
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 

Recently uploaded (20)

What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 

IRJET - Safety and Security Aspects of Smart Home Applications using Face Recognition

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 261 Safety and Security Aspects of Smart Home Applications using Face Recognition Sabarinath R K1, Sathyamurthy C2, Vishnu Sankar S3, Wajahath Rasool M4 1,2,3,4Student, Department of IT, SRM Valliammai Engineering College, Tamilnadu, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – The present scenario ensures the safety and security has become an inevitably essential. In a few decades due to the technology growth, the security for every system reaches a new peak. Security plays an integral role in today’s modern world. IOT means a many hardware can connect with the internet, today internet plays a vital role which is growing a very rapid rate and it can communicate huge number of devices such as MQTT (Message queuing telemetrytransport). Home security is a very important application in today world, many thefts happens in world. IOT can prevent from theft and can give a protection to the precious applicationsinhome. The system will intimate the owner of the house about any unauthorized activity happens or wheneverthedoor isopened by sending a notification to the user. After that notification received, owner can take a necessary action. The security system will use a microcontroller known as Arduino microcontroller to interface between the components, the vibration sensor is connected and the door vibrates intimates the authorized person using MQTT, Python to connect and communicate using the MQTT. The main advantages ofsuch a system includes the safe and security, Execution process is speed. KEYWORDS: MQTT, Arduino MCU AND IOT 1. INTRODUCTION Security plays an integral role in today’s modern world. The current scenario ensures the safety and security of the system has become an inevitably essential. In few decades due to the technology growth a securitymustneedreachesit peaks in the current world. When there is a modern home with minimum human effort and maximumsecurity,it’swell known as modern home. Since there is an advent of wireless and technological, all together it introduces an automated intelligent security system for more efficiency. The automated home security system can be designed with the surveillance camera for monitoring and protecting the appliances via cameras and multiple sensors, and the use of these sensors will be defining the features of these sensors. Data transmission quicker is taking place using the Wi-Fi to security systems which helps the user to protect and monitor the system. The innovative IOT based products and services will grow exponentially in next few decades predicted by the analysts. The IOT interface with different digital technologies and a huge range of hardware and software devices. IOT contributes open access to particular set of data. The evolution of internet, software tools and its use of computer systems has resulted in a huge electronic transformation of data quickly which experienced multiple concerns such as security, privacy and confidentiality of information. Significant activities been made in term of improving computer systems security. However, security, privacy and confidentiality of electronic systems are potentially major concerns in computer systems. In fact, currently no system is available in the world is fully secure. Recent advancements in the field of communication and information technologies have caused a rapid growth in IOT application development and thereby the smart home technologies. The smart home environmentsareintended to be able to improve home security systems and achieve goals such as increasing comfort and reducing operational costs while providing security to the users. Here Monitoring the intruders and thief activities which requiredfora purpose of protection of home appliances andreducingtheft,increasing safety. Home security made a drastic change in the past few decades and continue to advance much more in the coming years. Previously home security systems meant having an alarm that would go off when somebody would break in and motion sensor senses and send false notification to the owner but a smart secured home can give much more security than that. This paper consists of four sections. The first section shows the survey made on existing systems and the findings. The second section elaborates on the methodology or the proposed work. The third section shows the experimental setup and the results. The final section gives the conclusion and future scope of the work. 2. LITERATURE SURVEY The author proposed ”Internet of Things Based Home Security Using Raspberry Pi”. This paper [1] presents the importance of home security in today’s world. In our daily lifecycle wherever, every time, every second we need internet to fulfil our needs/search.Lookingatthehugeusage of Internet of Things (IOT) so they decided to use IOT in home security system. For IOT based home security it requires Some platform to attach the things and perform a program so, they have selected the newest version of Raspberry Pi model which is Raspberry Pi 3 Model B. This paper’s main approach is to secure home in terms of any damage and theft. For Home security system this paper represents detection of the gas, flame, vibration and magnetic sensor are used in the door. If any of the anonymous activity like fire, gas leakage, vibration will take then the buzzer alarm will ring and sends a notification to the owner. Also this paper presents the PIR sensor to detect
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 262 the moving objects and relay switches to switch ON and OFF lights in the room and Camera to capture and records the activity. Outside the door there is PIR sensor which detects the motion of intruder. Whenever any motion is detected within the range of 5 to 6 meter and 180degree the PIR sensor sends signal to Raspberry Pi and Raspberry Pi starts the bulb inside the home to alert the intruder. There is magnetic sensor at the door, if someone tries to break or open the door the magnetic sensor breaks and the signal is sent to the Raspberry Pi and withinsecondstheRaspberrypi activates Pi camera to capture image of intruder. Along with this procedure at a time the buzzer will turnonandcaptured image will be sent to the user mail. Chandra M. L. R, et.al proposed the “IOT enabled with smart security system”. This paper [2] presents security to the house and also providing a facility to the user where owner can monitor the surrounding parameters inside the house (like temperature, smoke andlightintensity)andcancontrol them by collection and exchange of data between the things for example switching on/off devices (like fan and light based on these parameters) as a globally. In recent days whenever house is locked the break-ins number has been increased enormously. So in order to provide security to the home this presented paper is helpful. When the intruders enter into the house, image of the intruder iscaptured bythe system, even if intruder escapes Police need to caught the intruder to recover the stolen things which needs as the evidence of the intruder to the police. The planned system captures the suspects and sends it to the authorized mail through internet over Simple Mail TransferProtocol (SMTP). Kumar, et.al presents presents the security for home by raspberry pi camera. The paper [3] approach the innovative headways have cleared path in private homes too. Shrewd homes are arising to be all the more a need in today and age. Control, observing and security are the vital elements of a savvy home and shrewd gadgets have a noteworthy impact in machine control. This paper focuses on the origination and execution of an inclusive continuous home security framework that is shrewd and totally deals with home security. This gadget can see any development and send warnings on the client dashboard which thus advises the checking focus. Sensors are initiated amid your nonappearance or whenyou informthearrangementofyour nonattendance at home. The Raspberry Pi, a charge card measure pc with an inbuilt camera board can transforminto a data exchange to camera security framework when the camera board is put to utilize. This framework makes utilization of Open CV.Thesensorsidentifyingdevelopments can respond to the owners at a different situation. This paper [4] presents an OSGi based security architecture for a home security system. The “digital home” refers to a home equipped with technological systems and appliances enabling centralized or remotely controllable integrated interfaces throughout the network. Withthedevelopmentof the digital home and home network appliances, different protocols, standards and transmission modes,suchasUPnP, SLP and SIP, have been proposed for interconnection or discovery with these home networked devices. Although more digital devices and home appliancescomplywiththese protocols in the development, the proposed protocols are usually unable to communicate with each other. Thus, the Open Service Gateway Initiative (OSGi) plan has been proposed to provide a way to bind several home network protocols, making the devices or services of one network discoverable to others. It can integrate networked security devices, and respond to intrusion alert or emergency alert. If intrusion activities occur, the security programs will acquire the intruder automatically The system proposed here [5] presents an in-house technology, the development of EGAT-SCADA was firstly focused on what it can do. It is developed for supervisingthe operation on electricpowertransmissionsystemthroughout the country of Thailand. It will be installed and setup on five regional control centers, several dozens of group control centers, and more than two hundred substations. Moreover, an implementation on a hydro center is given in a plan.Since the Primary phase of development was completed, the security issue has become a major concern before the implementation. General procedures on IT security are essentially enforced. Several tests were conducted. Currently, SCADA security is constant studied for shielding EGAT-SCADA from unauthorized access and abuse. This paper will describe in detail the security concerns of EGAT-SCADA. 2. PROPOSED WORK The proposed system is basedonthefacedetectionforaccess main doorcapturing a real timeimage of a personisbasedon the Harr cascade algorithm which can faster computation of the facial features and extraction. This system contains a 4 modules are listed below 2.1. IMAGE ACQUSITION AND PRE-PROCESSING The input real-time image to the system can be captured using a web cam or can be acquired from the local disk. This image undergoes image enhancement and filter, where tone mapping is applied to that real-time images with low contrast to restore the original contrast of the image. Pre- Processing stage enhances the quality of input image and locates data of interest and smoothing the image. TheImage acquisition captures a real-time image in camera and then Stack acquisition are stores image in a stacks. Image selection is the selecting best image from the stored stacks. The image alignment is aligning the face in to the corner and edges. Image segmentation is partitioningimageintoa setof pixels and pixels are extracted in to features and finally select a set of usable regions in the face.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 263 Image Acquisition and Pre-Processing 2.2 Storing of Datasets The details of the owner along with their biometrics, measurement and radius of the house, number of doors and windows in the house are stored. The House and owner details are stored. When the biometrics of the person matches with the biometric data storedinthecloud,themain door is enabled to access. The accessed main door automatically opensusingDCmotor.Insuchcaseofdetection of unauthorized access, the face of the intruder is captured and the information is sent to owner and also to the nearest police station. Storing of Datasets 2.3 SENSORS CONNECTIVITY The system is embedded with automatic door using face recognition, and a vibrator sensor also embedded with this automatic door. Message Queuing Telemetry Transport(MQTT) is a central hub which stores all the data and publish, send/receive message. Python module which sends the information received from MQTT to the ownerand also to the nearest police station. PC Camera is fixed at top of the automated doorin case to detect the unauthorized users, intruders, thieves. A buzzeralarmisalsoincludedtoalertthe neighboring house. A DC motor & sound sensor is embedded with buzzer alarm in case of alertness. An IR sensor is built within the locker in any chance of theft taken. It can be also used for bank locking purposes and security needs This module works with the sensors, Arduino Mega board and the microcontroller. The input is obtained from the user who is the owner. The owner images are already stored his image in the system it takes the Harr cascade algorithm to detect the face and the DC motor fixed at the door for automatically functioning when it recognizes the authorized the user. As in Fig-1 shows a DC motor which is embedded in door. Unauthorized user or intruder try to break the door then vibration sensor reaches a specific range and it sends a message to the owner by MQTT. As in Fig-2 Shows a Vibration sensor. As in Fig-3, the Arduino Mega is a microcontroller board based on ATMega328. Arduino ATmega328 has 14 digital input/output pins of which 6 can be used as PWM outputs, 6 analog inputs, a 16 MHz quartz crystal, a USB connection, a power jack, an ICSP header and a reset button. Fig-1: DC Motor Fig -2: Vibration Sensor
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 264 Fig-3: Arduino Mega board with ATMega328 microcontroller The intruder try to do any other activity surrounding the home when sound will reach a specific range then the sound sensor embedded in door and it sends a message to the owner and nearby Police station and buzzer alarm will rang inside the house so neighbour can intimate it. In Fig-4 Shows a sound sensor and Fig-5 shows a Buzzer alarm. Fig-4: Sound Sensor Fig-5: Buzzer Sound alarm Once the main door is broken, the thief automatically tries to search for jewels, money or any other documents. The thief automatically finds the locker where all the ornaments are kept. The thief is unaware about the IR sensor that is placed at the top of locker and tries to break it. When the thief attempts to break the locker, the IR sensor senses the Intruder’s body rays and sprays the chloroform on the thief and he is forced to faint. Fig-6 shows a IR sensor Fig-6 : IR Sensor 2.4 INFORMATION TRANSMISSION The MQTT broker transmits the information to the owner and the police station when the data doesn’t match with the data that are already stored in the cloud. The Police will arrive in the mean- time and the corresponding actions will be taken against the thief. 3. SYSTEM ARCHITECTURE The Fig-7 shows the architecture diagram of the system proposed. The architecture involves the sensor, microcontroller, Arduino Mega board, and so on. Fig -7: System Architecture 4. IMPLEMENTATION OF THE SYSTEM The Arduino Mega board embedded with AtMega328p microcontroller is used. The Vibration sensors are added to receive Vibration from the intruder. The Python, MQTT modules are received notification to the user. implementation is shown in Fig-8.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 265 Fig -8: System Implementation The Harr Cascade algorithm implementation is carried out according to the face datasets storage. Fig-8 : Implementation of Harr cascade algorithms 5. RESULTS The output of the system shows the Recognized the authorized user with face square pixelsingreencolorshown in Fig-9 and Fig-10 shows authorized user face in the datasets. Sensors are automatically switched ON when intruder enters it shows in Fig-11. Fig -9: Authorized user Fig -10: Storage of authorized user Fig-10: Sensors Activation 6. CONCLUSION AND FUTURE WORK This system is useful for the mute House owners to control and monitoring a Home globally from anywhere and easy communication to neighbor when buzzer sensor rings. Nearby Police station can monitoritbyreceiving notification via MQTT. This helps to prevent from theft. In futurework,it can be implemented in two type of environmentssuchasthe sensor working in the house, when owner of the house is present inside and outside Environments. REFERENCES [1] A. Pawar and V. M. Umale, "Internet of Things Based Home Security Using Raspberry Pi," 2018 Fourth International Conferenceon ComputingCommunication Control and Automation (ICCUBEA), Pune, India, 2018. [2] Chandra, M. L. R., Kumar, B. V., & SureshBabu, B. (2017). IOT enabled home with smart security. 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS). [3] Kumar, K. N. K., Natraj, H., & Jacob, T. P. (2017). Motion activated security camera using raspberry Pi. 2017 International Conference on Communication and Signal Processing (ICCSP). [4] M. Chen and Y. Chuang, "Supporting Home Security System in OSGi Platform," 2010 IEEE 24th International
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 266 Conference on Advanced Information Networking and Applications Workshops, Perth, WA, 2010. [5] T. Paukatong, "SCADA Security: A NewConcerningIssue of an In-house EGAT-SCADA," 2005 IEEE/PES Transmission & Distribution Conference & Exposition: Asia and Pacific, Dalian 2005.