SlideShare a Scribd company logo
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 3 Issue 5, August 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD25280 | Volume – 3 | Issue – 5 | July - August 2019 Page 357
Development of a Secured Door Lock System Based on
Face Recognition using Raspberry Pi and GSM Module
Soe Sandar1, Saw Aung Nyein Oo2
1Master Student, 2Associate Professor
1,2Department of Electronic Engineering, Mandalay Technological University, Mandalay, Myanmar
How to cite this paper: Soe Sandar | Saw
Aung Nyein Oo"Developmentof aSecured
Door Lock System Based on Face
Recognition using Raspberry Pi and GSM
Module" Published
in International
Journal of Trend in
Scientific Research
and Development
(ijtsrd), ISSN: 2456-
6470, Volume-3 |
Issue-5, August
2019, pp.357-361,
https://doi.org/10.31142/ijtsrd25280
Copyright © 2019 by author(s) and
International Journalof Trendin Scientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
CommonsAttribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by
/4.0)
ABSTRACT
Security is an important part of everyday life. The main aim of the system is to
develop a secured door lock system. The system consistsofthreesections.The
first section is the face recognition system that is based on Haar-like features
detection method and Local Binary Pattern (LBP) recognition algorithm. The
second section is the password securitysystem.Andthe lastsectionisthealert
system through GSM module. The system is composed by the combination of
face recognition security system, password security system and the alert
system through the GSM module. In this system, the iteration used in face
recognition system is reduced by using Local Binary Pattern (LBP) algorithm.
In saving time, the processing time of this system, therefore,isbetterthanthat
of the normal system.
KEYWORDS: Raspberry Pi, GSM module, Webcam, Face Recognition System
I. INTRODUCTION
Today security and safety is becoming more and morepopular daybydayandit
is getting improved and used for the ease in our life. Now days, technology has
become an integrated part of people’s lives thereforethesecurityof one’shome
must also not be left behind [1]. This paper describesthe prototypeof asecured
door unlocking system. Face Recognition has been one of the hot fields in
computer vision and biometrics, since it is a challengeable work to identify a
face image with varying expression, occlusion, disguise, and illumination.Along
with fingerprint match and eye retina match, they becomeaprominentmethod
in biometrics technology [2].
The system consists of face detection, face recognition, a
password custom, a GSM module and a door lock. Face
detection is the process of detecting the region of face in an
image. The face is detected using Haar-like feature and face
recognition is implemented using Local binary pattern
histogram(LBPH). The systemcomprisesawebcam todetect
the faces and a solenoid door lock for unlocking the door.
Every users detected by the webcam will be checked for
compatibility with the database in the system. If the face is
recognized, the password box will appear. The user will
enter the password. If the password is correct, the door will
open automatically. On the other hand, GSM module will
send the notification to the owner for the unknown person.
The main control circuit on this system is Raspberry Pi. The
software used is OpenCV Library and Python.
II. System Architecture
Figure 1 shows the block diagram of “a Secured Door Lock
System based on Face Recognition using Raspberry Pi and
GSM Module”. In this system, we are using Raspberry Pi for
connecting with camera to capture images continuously
through OpenCV platform and compared with storedimages
in the database and send data to DoorLockand GSMmodule.
The working of the each component is specified as follows,
Fig. 1: General Block Diagram of a Secured Door Lock
System based on Face Recognition using Raspberry Pi and
GSM Module
A. Web Camera
According to user convince, user can use Web camera or Pi
camera. In this system, we use a Web Camera having 16 MP
interpolated resolution also plug and play USB interface
which can be configured with Raspberry Pi which is already
connected with door. The webcam is already accessory for
Raspberry Pi. It is used for capturing an image and send the
captured image to the Raspberry Pi. Figure 2 shows the web
camera.
IJTSRD25280
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD25280 | Volume – 3 | Issue – 5 | July - August 2019 Page 358
Fig. 2: Web Camera
B. Raspberry Pi
Raspberry Pi is a small board computer having the ability to
act like a controller. When image is taken by cameramodule
and send to the raspberry Pi. The raspberry pi compares it
with stored face images. At the first time, we capture the ten
type of images to create a database in the system and this
database is compared with the live captured images. After
comparing the two images, output is considered to be
positive or negative as this controller is digital and based on
the output response it gives commands to GSM module[3].
Fig. 3 shows the Raspberry Pi.
Fig. 3: Raspberry Pi
C. GSM module
GSM module is used to send a message to the authorities
after comparing the captured images with the storedimages
and based on whether output is positive or negative. If the
output is positive, the GSM module will not work in this
system. If the unknown person is tryingtoopenthedoor, the
GSM module send to the authority person otherwise send
“Unknown person is trying to unlock the door, take
action”[3]. Figure 4 shows the GSM module.
Fig. 4: GSM module
D. Relay
A relay is an electrically operated device. It has a control
system and (also called input circuit or input contactor) and
controlled system. It is frequently used in automatic control
circuit. To put it simply, it is an automatic switch to
controlling a high- current circuit with a low-current signal.
Our system will use one- channel relay module. Fig. 5 shows
the Relay.
Figure 5: Relay
E. Solenoid Door Lock
Solenoid Door locks are locks that are generally mounted
directly on or in doors / gates. Fig. 6 shows the solenoid
Door Lock.
Fig. 6: Solenoid Door Lock
F. Software
The system is largely based on Python programming from
detecting the face to recognizing the face. Python is used to
capture and process images. The capture image is then
processed using Open CVlibrarythatintegrates withPython.
The face recognition part is carried out by the Local Binary
Pattern algorithm.OpenCV (Open Computer Vision) is a
library mainly aimed at real-time computer vision. It is
written in C++. There are bindings in Python, Java and
MATLAB/OCTAVA. Here, the openCV is used for processing
the given image and for comparing the image.
III. System Flowchart
Fig. 7: Flowchart of the overall proposed system
Fig. 7 shows the flowchart of “a Secured Door Lock System
based on Face Recognition using Raspberry Pi and GSM
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD25280 | Volume – 3 | Issue – 5 | July - August 2019 Page 359
module”. Firstly, the session starts, it will work as follows -
the Web camera will first take the image and send it to the
raspberry pi. Then, It will compare the captured image with
the stored image with the database.TheLocalBinaryPattern
Histogram Algorithm comes in the action by comparing the
captured image with the stored image and based on this it
produce the results. If the result is positive, the password
box will appear. The user can enter the password. If the
password is correct , the door will be unlock automatically.
Otherwise, the password is wrong in three times, then with
the help of GSM module, an SMS will be automatically
generated to the authorized user that “Unknown person is
trying to unlock the door, take action” and the door will
remain lock itself. The captured image is not matched with
the stored image in the database, the door will remain
closed. And the system gets reset. In this way, the security
can be achieved over the Raspberry Pi and GSM module.
IV. Methodology
A. Face Detection
Face detection is one of the fundamental applications used
in face recognition technology. OpenCV provides a Haar
cascade classifier, which can be used for face detection. In
this system, Haar cascade classifiers is chosen in the face
detection process. The reason for using Haar classifier is
because of its speed , high detection accuracy and low false
positive rate. Haar classifier is an algorithm created by Paul
Viola and Michael Jones; which are trained from lots of
positive pictures (with faces) and negativepictures(without
faces).[4] The image of the value of simple features is
classified by Viola Jones. Each feature is a single value
obtained by subtracting sum of pixels under the white
rectangle from sum of pixels under the black rectangle.
The single value for Haar features are computed using the
following equation:
(1)
Where, n is the number of pixels, I(x) is the real value of
detected on an image.Figure2 shows the three types of
features.
Fig. 8: (a) Edge features (b) Line Features (c) Four-
rectangular features
B. Face Recognition
The detected faces check the data base and then compare
LPBH values and then match the present data base and face
are recognized.
In this system, we are using Local Binary Pattern Histogram
(LBPH) for face recognition. Open CV is an open source
computer vision library that has three built-in face
recognition algorithms,(i) Eigenfaces, (ii) Fisherfaces and
(iii) Local Binary Pattern Histogram (LBPH). Compared with
the two algorithms , the LBPH can not only recognize the
front face, but also recognize the side face, which is more
flexible[5]. Therefore, the face recognition algorithms used
here is Local Binary Pattern Histogram(LBPH). It is a simple
yet very efficient texture operator which labels the pixels of
an image by thresholdingthe neighborhoodof eachpixel and
considers the result as a binary number. Andthenitconverts
the binary number into a decimal number , and that decimal
number is the new value of the center pixel.
Fig.9. Conversion of grayscale image to decimal
In our case, we are using VNC viewer to run raspbian os for
detecting images from the database. At first, we have to save
images by using data sets and after that, we will train that
faces to LBPH algorithm then it stores into the database. At
first, it converts color images to gray scaleimages and thenit
coverts into pixels for detecting this will divide the image
into various pieces then it stores the values of each pixel. If
pixels are less than it will be represented as 0 and pixels
which are high will be 1 then it will be arranged in 3 × 3
matrix format for recognizing the images on screen
compared to database stored images[6]. Some different
variations of faces that captures are showed in the following
figure.
Fig.10: Some different variations of faces
V. Results And Discussions
In this system, we designed a Secured Door Lock System
with the help of Face Recognition. In this, we are using
Raspberry pi which has many features that make the user
modify use in different smart applications.
Fig. 11: A prototype of a Secured Door Lock System
Fig. 12: Monitor runs with Raspbian OS
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD25280 | Volume – 3 | Issue – 5 | July - August 2019 Page 360
The experiment was performed to implement the face
recognition using OpenCV library installed in Raspberry Pi.
We used Python in Pyton IDLE 3.6.5 and the database that
used was sqlite studio.
The face detection procedure was first implemented which
was done by the help of face detection algorithm that we
used. Firstly, we used the web camera to capture theimages.
We registered five users as authorized user andtheirimages
are stored in the database. For these users, we took 10 facial
images with different poses and expressions.
Fig. 13: Face Capturing and Saving into the database
And also in the Fig. 14, we can see the facial images in the
database.
Fig. 14: Some facial images in the database
In the experiment we trained the face images in the
database. That the facial images are successfully trained
shown in the Fig. 15
Fig. 15: Face Training Process
Based on the LBPH algorithm , the input face images are
compared with database facial images for identification.The
face recognition results are shown in below in Fig. 16.
Fig. 16: Face Recognition Process
If the face is recognized, the password box will appear. The
user will enter the password. If the password is correct, the
door will open automatically. On the other hand, The
password is wrong in three times, GSM module will sendthe
notification to the owner for the unknown person.
Fig. 17: The notification to the owner for the unknown
person
VI. Conclusion
In this paper, a Secured Door Lock System Based on Face
Recognition using Raspberry Pi and GSM module is
presented. We designed the system which provides security
locks for door, comfort, connivance security and energy
efficiency for user. This system can be used for
authentication in home, banks and other public places. In
this system, we have been implemented with a combination
of webcam, Raspberry Pi, relay, solenoid door lock and GSM
module. And we used the Haar Cascade classifier method to
detect the face and Local Binary Pattern Histogram (LBPH)
for recognize the face. I conclude that various operationsare
successfully tested and results are documented.
ACKNOWLEDGEMENT
The author would like to express her gratitude to Dr.Saw
Aung Nyein Oo, Associate Professor and to all her teachers
from Department of Electronic Engineering, Mandalay
Technological University. And , she deeply thanks to her
parents for their encouragement and support and especially
thanks to her friends for giving the chance to take their face
images utilized in this paper.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD25280 | Volume – 3 | Issue – 5 | July - August 2019 Page 361
REFERENCES
[1] Nareshkumar R. M., Apoorva Kamat, Dnyaneshvari
Shinde “Smart Door Security Control System Using
Raspberry Pi”, International Journal of Innovations &
Advancement in Computer Science, IJIACS, ISSN 2347-
8616, Volume 6, Issue 11, November 2017
[2] Najmurrokhman, Kusnandar Kusnandar, Arief
Budiman Krama, Esmeralada Contessa Djimal, and
Robbi Rahim, “Development of a secured room access
system based on face recognition using Raspberry Pi
and Android based smartphone”, MATEC Web of
Conferences 197, 11008(2018), AASEC 2018,
http://doi.org/10.1051/matecconf/201819711008
[3] Saurabh K. Patil , Dr. Narendra G. Narole, “Smart Face
Recognition Security Based On Raspberry Pi”,
International Journal of Engineering Science and
Computing, IJESC , March 2018
[4] “Face Detection using Haar Cascades”
[5] XueMei Zhao and ChenBing Wei, “A Real-time Face
Recognition System Based on the Improved KBPH
Algorithm”, 2017 IEEE 2nd InternationalConferenceon
Signal and Image Processing.
[6] Thulluri Krishma Vamsi, Kanchana Charan Sai,
Vijayalakshmi M, “Face Recognition based door
unlocking system using Raspberry Pi”, International
Journal of Advanced Research, Ideas andInnovations in
Technology, (IJARIIT), ISSN: 2454-132X, Volume 5,
Issue 2, 2019
[7] S. Z. Li, A. K. Jain, Handbook of Face Recognition 2nd,
(Springer Verlag,2011)
[8] Alexander Mordvintsev & Abid K, “OpenCV-Python
Tutorials Documentation”, Release 1, Nov 05, 2017.

More Related Content

What's hot

Tesla as io t case study brief for learning purpuses
Tesla as io t case study brief for learning purpusesTesla as io t case study brief for learning purpuses
Tesla as io t case study brief for learning purpuses
Kristina Turilova
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhavVaibhav P
 
Driver drowsiness detection
Driver drowsiness detectionDriver drowsiness detection
Driver drowsiness detection
Connecting Point
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/Technology
RahulSingh3034
 
Vehicle number plate recognition using matlab
Vehicle number plate recognition using matlabVehicle number plate recognition using matlab
Vehicle number plate recognition using matlab
Kongara Sudharshan
 
Image Processing
Image ProcessingImage Processing
Image Processing
sharmili priyadarsini
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
ShubhamLamichane
 
Traffic control using image processing
Traffic control using image processingTraffic control using image processing
Traffic control using image processing
Chirag Panchal
 
Rfid based attendance system
Rfid based attendance systemRfid based attendance system
Rfid based attendance system
eskkarthik
 
Image proceesing with matlab
Image proceesing with matlabImage proceesing with matlab
Image proceesing with matlabAshutosh Shahi
 
Face Recognition Methods based on Convolutional Neural Networks
Face Recognition Methods based on Convolutional Neural NetworksFace Recognition Methods based on Convolutional Neural Networks
Face Recognition Methods based on Convolutional Neural Networks
Elaheh Rashedi
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system ppt
Ravi Kumar
 
Rf bases door lock system
Rf bases door lock systemRf bases door lock system
Rf bases door lock systemSikander Bodh
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
Divya Sushma
 
Face detection and recognition
Face detection and recognitionFace detection and recognition
Face detection and recognition
Pankaj Thakur
 
Face detection ppt
Face detection pptFace detection ppt
Face detection ppt
Pooja R
 
Automated Number Plate Recognition
Automated Number Plate RecognitionAutomated Number Plate Recognition
Automated Number Plate Recognition
Shwetank Sharma
 
Li fi ppt
Li fi pptLi fi ppt
Li fi ppt
vishalhasnani
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
ranjit banshpal
 
ATM System by image processing
ATM System by image processingATM System by image processing
ATM System by image processing
shahab islam
 

What's hot (20)

Tesla as io t case study brief for learning purpuses
Tesla as io t case study brief for learning purpusesTesla as io t case study brief for learning purpuses
Tesla as io t case study brief for learning purpuses
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
Driver drowsiness detection
Driver drowsiness detectionDriver drowsiness detection
Driver drowsiness detection
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/Technology
 
Vehicle number plate recognition using matlab
Vehicle number plate recognition using matlabVehicle number plate recognition using matlab
Vehicle number plate recognition using matlab
 
Image Processing
Image ProcessingImage Processing
Image Processing
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Traffic control using image processing
Traffic control using image processingTraffic control using image processing
Traffic control using image processing
 
Rfid based attendance system
Rfid based attendance systemRfid based attendance system
Rfid based attendance system
 
Image proceesing with matlab
Image proceesing with matlabImage proceesing with matlab
Image proceesing with matlab
 
Face Recognition Methods based on Convolutional Neural Networks
Face Recognition Methods based on Convolutional Neural NetworksFace Recognition Methods based on Convolutional Neural Networks
Face Recognition Methods based on Convolutional Neural Networks
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system ppt
 
Rf bases door lock system
Rf bases door lock systemRf bases door lock system
Rf bases door lock system
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
 
Face detection and recognition
Face detection and recognitionFace detection and recognition
Face detection and recognition
 
Face detection ppt
Face detection pptFace detection ppt
Face detection ppt
 
Automated Number Plate Recognition
Automated Number Plate RecognitionAutomated Number Plate Recognition
Automated Number Plate Recognition
 
Li fi ppt
Li fi pptLi fi ppt
Li fi ppt
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
ATM System by image processing
ATM System by image processingATM System by image processing
ATM System by image processing
 

Similar to Development of a Secured Door Lock System Based on Face Recognition using Raspberry Pi and GSM Module

S0102297102
S0102297102S0102297102
S0102297102
IOSR Journals
 
Face Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemFace Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock System
IRJET Journal
 
IRJET- Face Detection based on Image Processing using Raspberry Pi 4
IRJET-  	  Face Detection based on Image Processing using Raspberry Pi 4IRJET-  	  Face Detection based on Image Processing using Raspberry Pi 4
IRJET- Face Detection based on Image Processing using Raspberry Pi 4
IRJET Journal
 
Classroom Attendance using Face Detection and Raspberry-Pi
Classroom Attendance using Face Detection and Raspberry-PiClassroom Attendance using Face Detection and Raspberry-Pi
Classroom Attendance using Face Detection and Raspberry-Pi
IRJET Journal
 
IRJET- Smart Surveillance Cam using Face Recongition Alogrithm
IRJET-  	  Smart Surveillance Cam using Face Recongition AlogrithmIRJET-  	  Smart Surveillance Cam using Face Recongition Alogrithm
IRJET- Smart Surveillance Cam using Face Recongition Alogrithm
IRJET Journal
 
Bank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image ProcessingBank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image Processing
IRJET Journal
 
AUTOMATIC DOOR UNLOCK WITH FACIAL RECOGNITION USING IoT
AUTOMATIC DOOR UNLOCK WITH FACIAL RECOGNITION USING IoTAUTOMATIC DOOR UNLOCK WITH FACIAL RECOGNITION USING IoT
AUTOMATIC DOOR UNLOCK WITH FACIAL RECOGNITION USING IoT
IRJET Journal
 
IRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric AttendanceIRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric Attendance
IRJET Journal
 
Web-Based Online Embedded Security System And Alertness Via Social Media
Web-Based Online Embedded Security System And Alertness Via Social MediaWeb-Based Online Embedded Security System And Alertness Via Social Media
Web-Based Online Embedded Security System And Alertness Via Social Media
IRJET Journal
 
IRJET- Intrusion Detection through Image Processing and Getting Notified ...
IRJET-  	  Intrusion Detection through Image Processing and Getting Notified ...IRJET-  	  Intrusion Detection through Image Processing and Getting Notified ...
IRJET- Intrusion Detection through Image Processing and Getting Notified ...
IRJET Journal
 
Comparative Study on Various System Based on Raspberry-Pi Technology
Comparative Study on Various System Based on Raspberry-Pi TechnologyComparative Study on Various System Based on Raspberry-Pi Technology
Comparative Study on Various System Based on Raspberry-Pi Technology
IRJET Journal
 
IRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoTIRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET Journal
 
Real time face recognition of video surveillance system using haar cascade c...
Real time face recognition of video surveillance system using  haar cascade c...Real time face recognition of video surveillance system using  haar cascade c...
Real time face recognition of video surveillance system using haar cascade c...
nooriasukmaningtyas
 
Face Recognition Based Payment Processing System
Face Recognition Based Payment Processing SystemFace Recognition Based Payment Processing System
Face Recognition Based Payment Processing System
IRJET Journal
 
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IRJET Journal
 
IRJET- Vehicle Seat Vacancy Identification using Image Processing Technique
IRJET- Vehicle Seat Vacancy Identification using Image Processing TechniqueIRJET- Vehicle Seat Vacancy Identification using Image Processing Technique
IRJET- Vehicle Seat Vacancy Identification using Image Processing Technique
IRJET Journal
 
ASSISTANCE SYSTEM FOR DRIVERS USING IOT
ASSISTANCE SYSTEM FOR DRIVERS USING IOTASSISTANCE SYSTEM FOR DRIVERS USING IOT
ASSISTANCE SYSTEM FOR DRIVERS USING IOT
IRJET Journal
 
Smart Home for Senior Citizens
Smart Home for Senior CitizensSmart Home for Senior Citizens
Smart Home for Senior Citizens
IRJET Journal
 
IRJET- IoT and ML based Smart TV for Child Eyes Safety
IRJET-  	  IoT and ML based Smart TV for Child Eyes SafetyIRJET-  	  IoT and ML based Smart TV for Child Eyes Safety
IRJET- IoT and ML based Smart TV for Child Eyes Safety
IRJET Journal
 
IoT Based Smart Surveillance and Automation
IoT Based Smart Surveillance and AutomationIoT Based Smart Surveillance and Automation
IoT Based Smart Surveillance and Automation
IRJET Journal
 

Similar to Development of a Secured Door Lock System Based on Face Recognition using Raspberry Pi and GSM Module (20)

S0102297102
S0102297102S0102297102
S0102297102
 
Face Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemFace Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock System
 
IRJET- Face Detection based on Image Processing using Raspberry Pi 4
IRJET-  	  Face Detection based on Image Processing using Raspberry Pi 4IRJET-  	  Face Detection based on Image Processing using Raspberry Pi 4
IRJET- Face Detection based on Image Processing using Raspberry Pi 4
 
Classroom Attendance using Face Detection and Raspberry-Pi
Classroom Attendance using Face Detection and Raspberry-PiClassroom Attendance using Face Detection and Raspberry-Pi
Classroom Attendance using Face Detection and Raspberry-Pi
 
IRJET- Smart Surveillance Cam using Face Recongition Alogrithm
IRJET-  	  Smart Surveillance Cam using Face Recongition AlogrithmIRJET-  	  Smart Surveillance Cam using Face Recongition Alogrithm
IRJET- Smart Surveillance Cam using Face Recongition Alogrithm
 
Bank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image ProcessingBank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image Processing
 
AUTOMATIC DOOR UNLOCK WITH FACIAL RECOGNITION USING IoT
AUTOMATIC DOOR UNLOCK WITH FACIAL RECOGNITION USING IoTAUTOMATIC DOOR UNLOCK WITH FACIAL RECOGNITION USING IoT
AUTOMATIC DOOR UNLOCK WITH FACIAL RECOGNITION USING IoT
 
IRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric AttendanceIRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric Attendance
 
Web-Based Online Embedded Security System And Alertness Via Social Media
Web-Based Online Embedded Security System And Alertness Via Social MediaWeb-Based Online Embedded Security System And Alertness Via Social Media
Web-Based Online Embedded Security System And Alertness Via Social Media
 
IRJET- Intrusion Detection through Image Processing and Getting Notified ...
IRJET-  	  Intrusion Detection through Image Processing and Getting Notified ...IRJET-  	  Intrusion Detection through Image Processing and Getting Notified ...
IRJET- Intrusion Detection through Image Processing and Getting Notified ...
 
Comparative Study on Various System Based on Raspberry-Pi Technology
Comparative Study on Various System Based on Raspberry-Pi TechnologyComparative Study on Various System Based on Raspberry-Pi Technology
Comparative Study on Various System Based on Raspberry-Pi Technology
 
IRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoTIRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoT
 
Real time face recognition of video surveillance system using haar cascade c...
Real time face recognition of video surveillance system using  haar cascade c...Real time face recognition of video surveillance system using  haar cascade c...
Real time face recognition of video surveillance system using haar cascade c...
 
Face Recognition Based Payment Processing System
Face Recognition Based Payment Processing SystemFace Recognition Based Payment Processing System
Face Recognition Based Payment Processing System
 
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
 
IRJET- Vehicle Seat Vacancy Identification using Image Processing Technique
IRJET- Vehicle Seat Vacancy Identification using Image Processing TechniqueIRJET- Vehicle Seat Vacancy Identification using Image Processing Technique
IRJET- Vehicle Seat Vacancy Identification using Image Processing Technique
 
ASSISTANCE SYSTEM FOR DRIVERS USING IOT
ASSISTANCE SYSTEM FOR DRIVERS USING IOTASSISTANCE SYSTEM FOR DRIVERS USING IOT
ASSISTANCE SYSTEM FOR DRIVERS USING IOT
 
Smart Home for Senior Citizens
Smart Home for Senior CitizensSmart Home for Senior Citizens
Smart Home for Senior Citizens
 
IRJET- IoT and ML based Smart TV for Child Eyes Safety
IRJET-  	  IoT and ML based Smart TV for Child Eyes SafetyIRJET-  	  IoT and ML based Smart TV for Child Eyes Safety
IRJET- IoT and ML based Smart TV for Child Eyes Safety
 
IoT Based Smart Surveillance and Automation
IoT Based Smart Surveillance and AutomationIoT Based Smart Surveillance and Automation
IoT Based Smart Surveillance and Automation
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
ijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
ijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
ijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
ijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
ijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
ijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
ijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 

Recently uploaded (20)

The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 

Development of a Secured Door Lock System Based on Face Recognition using Raspberry Pi and GSM Module

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 3 Issue 5, August 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD25280 | Volume – 3 | Issue – 5 | July - August 2019 Page 357 Development of a Secured Door Lock System Based on Face Recognition using Raspberry Pi and GSM Module Soe Sandar1, Saw Aung Nyein Oo2 1Master Student, 2Associate Professor 1,2Department of Electronic Engineering, Mandalay Technological University, Mandalay, Myanmar How to cite this paper: Soe Sandar | Saw Aung Nyein Oo"Developmentof aSecured Door Lock System Based on Face Recognition using Raspberry Pi and GSM Module" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-3 | Issue-5, August 2019, pp.357-361, https://doi.org/10.31142/ijtsrd25280 Copyright © 2019 by author(s) and International Journalof Trendin Scientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative CommonsAttribution License (CC BY 4.0) (http://creativecommons.org/licenses/by /4.0) ABSTRACT Security is an important part of everyday life. The main aim of the system is to develop a secured door lock system. The system consistsofthreesections.The first section is the face recognition system that is based on Haar-like features detection method and Local Binary Pattern (LBP) recognition algorithm. The second section is the password securitysystem.Andthe lastsectionisthealert system through GSM module. The system is composed by the combination of face recognition security system, password security system and the alert system through the GSM module. In this system, the iteration used in face recognition system is reduced by using Local Binary Pattern (LBP) algorithm. In saving time, the processing time of this system, therefore,isbetterthanthat of the normal system. KEYWORDS: Raspberry Pi, GSM module, Webcam, Face Recognition System I. INTRODUCTION Today security and safety is becoming more and morepopular daybydayandit is getting improved and used for the ease in our life. Now days, technology has become an integrated part of people’s lives thereforethesecurityof one’shome must also not be left behind [1]. This paper describesthe prototypeof asecured door unlocking system. Face Recognition has been one of the hot fields in computer vision and biometrics, since it is a challengeable work to identify a face image with varying expression, occlusion, disguise, and illumination.Along with fingerprint match and eye retina match, they becomeaprominentmethod in biometrics technology [2]. The system consists of face detection, face recognition, a password custom, a GSM module and a door lock. Face detection is the process of detecting the region of face in an image. The face is detected using Haar-like feature and face recognition is implemented using Local binary pattern histogram(LBPH). The systemcomprisesawebcam todetect the faces and a solenoid door lock for unlocking the door. Every users detected by the webcam will be checked for compatibility with the database in the system. If the face is recognized, the password box will appear. The user will enter the password. If the password is correct, the door will open automatically. On the other hand, GSM module will send the notification to the owner for the unknown person. The main control circuit on this system is Raspberry Pi. The software used is OpenCV Library and Python. II. System Architecture Figure 1 shows the block diagram of “a Secured Door Lock System based on Face Recognition using Raspberry Pi and GSM Module”. In this system, we are using Raspberry Pi for connecting with camera to capture images continuously through OpenCV platform and compared with storedimages in the database and send data to DoorLockand GSMmodule. The working of the each component is specified as follows, Fig. 1: General Block Diagram of a Secured Door Lock System based on Face Recognition using Raspberry Pi and GSM Module A. Web Camera According to user convince, user can use Web camera or Pi camera. In this system, we use a Web Camera having 16 MP interpolated resolution also plug and play USB interface which can be configured with Raspberry Pi which is already connected with door. The webcam is already accessory for Raspberry Pi. It is used for capturing an image and send the captured image to the Raspberry Pi. Figure 2 shows the web camera. IJTSRD25280
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD25280 | Volume – 3 | Issue – 5 | July - August 2019 Page 358 Fig. 2: Web Camera B. Raspberry Pi Raspberry Pi is a small board computer having the ability to act like a controller. When image is taken by cameramodule and send to the raspberry Pi. The raspberry pi compares it with stored face images. At the first time, we capture the ten type of images to create a database in the system and this database is compared with the live captured images. After comparing the two images, output is considered to be positive or negative as this controller is digital and based on the output response it gives commands to GSM module[3]. Fig. 3 shows the Raspberry Pi. Fig. 3: Raspberry Pi C. GSM module GSM module is used to send a message to the authorities after comparing the captured images with the storedimages and based on whether output is positive or negative. If the output is positive, the GSM module will not work in this system. If the unknown person is tryingtoopenthedoor, the GSM module send to the authority person otherwise send “Unknown person is trying to unlock the door, take action”[3]. Figure 4 shows the GSM module. Fig. 4: GSM module D. Relay A relay is an electrically operated device. It has a control system and (also called input circuit or input contactor) and controlled system. It is frequently used in automatic control circuit. To put it simply, it is an automatic switch to controlling a high- current circuit with a low-current signal. Our system will use one- channel relay module. Fig. 5 shows the Relay. Figure 5: Relay E. Solenoid Door Lock Solenoid Door locks are locks that are generally mounted directly on or in doors / gates. Fig. 6 shows the solenoid Door Lock. Fig. 6: Solenoid Door Lock F. Software The system is largely based on Python programming from detecting the face to recognizing the face. Python is used to capture and process images. The capture image is then processed using Open CVlibrarythatintegrates withPython. The face recognition part is carried out by the Local Binary Pattern algorithm.OpenCV (Open Computer Vision) is a library mainly aimed at real-time computer vision. It is written in C++. There are bindings in Python, Java and MATLAB/OCTAVA. Here, the openCV is used for processing the given image and for comparing the image. III. System Flowchart Fig. 7: Flowchart of the overall proposed system Fig. 7 shows the flowchart of “a Secured Door Lock System based on Face Recognition using Raspberry Pi and GSM
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD25280 | Volume – 3 | Issue – 5 | July - August 2019 Page 359 module”. Firstly, the session starts, it will work as follows - the Web camera will first take the image and send it to the raspberry pi. Then, It will compare the captured image with the stored image with the database.TheLocalBinaryPattern Histogram Algorithm comes in the action by comparing the captured image with the stored image and based on this it produce the results. If the result is positive, the password box will appear. The user can enter the password. If the password is correct , the door will be unlock automatically. Otherwise, the password is wrong in three times, then with the help of GSM module, an SMS will be automatically generated to the authorized user that “Unknown person is trying to unlock the door, take action” and the door will remain lock itself. The captured image is not matched with the stored image in the database, the door will remain closed. And the system gets reset. In this way, the security can be achieved over the Raspberry Pi and GSM module. IV. Methodology A. Face Detection Face detection is one of the fundamental applications used in face recognition technology. OpenCV provides a Haar cascade classifier, which can be used for face detection. In this system, Haar cascade classifiers is chosen in the face detection process. The reason for using Haar classifier is because of its speed , high detection accuracy and low false positive rate. Haar classifier is an algorithm created by Paul Viola and Michael Jones; which are trained from lots of positive pictures (with faces) and negativepictures(without faces).[4] The image of the value of simple features is classified by Viola Jones. Each feature is a single value obtained by subtracting sum of pixels under the white rectangle from sum of pixels under the black rectangle. The single value for Haar features are computed using the following equation: (1) Where, n is the number of pixels, I(x) is the real value of detected on an image.Figure2 shows the three types of features. Fig. 8: (a) Edge features (b) Line Features (c) Four- rectangular features B. Face Recognition The detected faces check the data base and then compare LPBH values and then match the present data base and face are recognized. In this system, we are using Local Binary Pattern Histogram (LBPH) for face recognition. Open CV is an open source computer vision library that has three built-in face recognition algorithms,(i) Eigenfaces, (ii) Fisherfaces and (iii) Local Binary Pattern Histogram (LBPH). Compared with the two algorithms , the LBPH can not only recognize the front face, but also recognize the side face, which is more flexible[5]. Therefore, the face recognition algorithms used here is Local Binary Pattern Histogram(LBPH). It is a simple yet very efficient texture operator which labels the pixels of an image by thresholdingthe neighborhoodof eachpixel and considers the result as a binary number. Andthenitconverts the binary number into a decimal number , and that decimal number is the new value of the center pixel. Fig.9. Conversion of grayscale image to decimal In our case, we are using VNC viewer to run raspbian os for detecting images from the database. At first, we have to save images by using data sets and after that, we will train that faces to LBPH algorithm then it stores into the database. At first, it converts color images to gray scaleimages and thenit coverts into pixels for detecting this will divide the image into various pieces then it stores the values of each pixel. If pixels are less than it will be represented as 0 and pixels which are high will be 1 then it will be arranged in 3 × 3 matrix format for recognizing the images on screen compared to database stored images[6]. Some different variations of faces that captures are showed in the following figure. Fig.10: Some different variations of faces V. Results And Discussions In this system, we designed a Secured Door Lock System with the help of Face Recognition. In this, we are using Raspberry pi which has many features that make the user modify use in different smart applications. Fig. 11: A prototype of a Secured Door Lock System Fig. 12: Monitor runs with Raspbian OS
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD25280 | Volume – 3 | Issue – 5 | July - August 2019 Page 360 The experiment was performed to implement the face recognition using OpenCV library installed in Raspberry Pi. We used Python in Pyton IDLE 3.6.5 and the database that used was sqlite studio. The face detection procedure was first implemented which was done by the help of face detection algorithm that we used. Firstly, we used the web camera to capture theimages. We registered five users as authorized user andtheirimages are stored in the database. For these users, we took 10 facial images with different poses and expressions. Fig. 13: Face Capturing and Saving into the database And also in the Fig. 14, we can see the facial images in the database. Fig. 14: Some facial images in the database In the experiment we trained the face images in the database. That the facial images are successfully trained shown in the Fig. 15 Fig. 15: Face Training Process Based on the LBPH algorithm , the input face images are compared with database facial images for identification.The face recognition results are shown in below in Fig. 16. Fig. 16: Face Recognition Process If the face is recognized, the password box will appear. The user will enter the password. If the password is correct, the door will open automatically. On the other hand, The password is wrong in three times, GSM module will sendthe notification to the owner for the unknown person. Fig. 17: The notification to the owner for the unknown person VI. Conclusion In this paper, a Secured Door Lock System Based on Face Recognition using Raspberry Pi and GSM module is presented. We designed the system which provides security locks for door, comfort, connivance security and energy efficiency for user. This system can be used for authentication in home, banks and other public places. In this system, we have been implemented with a combination of webcam, Raspberry Pi, relay, solenoid door lock and GSM module. And we used the Haar Cascade classifier method to detect the face and Local Binary Pattern Histogram (LBPH) for recognize the face. I conclude that various operationsare successfully tested and results are documented. ACKNOWLEDGEMENT The author would like to express her gratitude to Dr.Saw Aung Nyein Oo, Associate Professor and to all her teachers from Department of Electronic Engineering, Mandalay Technological University. And , she deeply thanks to her parents for their encouragement and support and especially thanks to her friends for giving the chance to take their face images utilized in this paper.
  • 5. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD25280 | Volume – 3 | Issue – 5 | July - August 2019 Page 361 REFERENCES [1] Nareshkumar R. M., Apoorva Kamat, Dnyaneshvari Shinde “Smart Door Security Control System Using Raspberry Pi”, International Journal of Innovations & Advancement in Computer Science, IJIACS, ISSN 2347- 8616, Volume 6, Issue 11, November 2017 [2] Najmurrokhman, Kusnandar Kusnandar, Arief Budiman Krama, Esmeralada Contessa Djimal, and Robbi Rahim, “Development of a secured room access system based on face recognition using Raspberry Pi and Android based smartphone”, MATEC Web of Conferences 197, 11008(2018), AASEC 2018, http://doi.org/10.1051/matecconf/201819711008 [3] Saurabh K. Patil , Dr. Narendra G. Narole, “Smart Face Recognition Security Based On Raspberry Pi”, International Journal of Engineering Science and Computing, IJESC , March 2018 [4] “Face Detection using Haar Cascades” [5] XueMei Zhao and ChenBing Wei, “A Real-time Face Recognition System Based on the Improved KBPH Algorithm”, 2017 IEEE 2nd InternationalConferenceon Signal and Image Processing. [6] Thulluri Krishma Vamsi, Kanchana Charan Sai, Vijayalakshmi M, “Face Recognition based door unlocking system using Raspberry Pi”, International Journal of Advanced Research, Ideas andInnovations in Technology, (IJARIIT), ISSN: 2454-132X, Volume 5, Issue 2, 2019 [7] S. Z. Li, A. K. Jain, Handbook of Face Recognition 2nd, (Springer Verlag,2011) [8] Alexander Mordvintsev & Abid K, “OpenCV-Python Tutorials Documentation”, Release 1, Nov 05, 2017.