1. Project Guides
Dr. Chethana Prakash M S., Ph.D.,
Prof. Supreetha S M M.Tech.,
“INTEGRATED SMART HOME SECURITY SYSTEM: A COMPREHENSIVE APPROACH WITH
FACE RECOGNITION, SENSOR TECHNOLOGY, AND REAL TIME MONITORING”
Project Associates
Aditi A 4BD20CS006
Gowri Alur 4BD20CS032
Mohith V Naik 4BD20CS058
Thashwini K S 4BD20CS106
Bapuji Institute of Engineering and Technology
2. • Abstract
• Introduction
• Literature Survey
• Existing Survey
• Problem System
• Proposed System
• Objectives
• Methodology
• System Requirements
• Conclusion
CONTENT
3. ABSTRACT
The project presents a smart home security system based on face recognition technology with liveness
detection. The primary goal is to provide a secure and convenient means of controlling home access. The
project's core functionality involves face recognition through python and OpenCV to verify the owner's
identity. Moreover, the project incorporates IOT functionality via the Blynk platform, allowing for real-time
updates data.
A flame sensor is typically used to detect the presence of a flame or fire. The MQ-5 gas sensor is designed
to detect the presence of various gases, such as LPG, natural gas, and methane
A PIR motion sensor Is used to detect motion by sensing changes in infrared radiation within its field of
view. It's often used in security systems and automatic lighting.
4. The project's primary objective is to create a secure and user-friendly home security system that allows access only to
authorised individuals while offering real-time monitoring capabilities. It achieves this by integrating multiple hardware
and software components. The project's innovative blend of hardware and software components offers a cost-effective,
secure, and user-friendly solution to modern home security needs. , ensuring only authorized individuals can access the
home while providing homeowners with real-time control and peace of mind. For further safety purpose we have sensors
installed that are Flame sensors, A PIR motion sensor, The MQ-5 gas sensor.
INTRODUCTION
5. LITERATURE SURVEY
Paper Title Author Year Key Findings LIMITATIONS
IoT BASED HOME SECURITY
AND AUTOMATION SYSTEM
• Uber Ijaz
• Usama Ameer
• Badar Islam
• Abubaker Ijaz
• Waqar Aziz
2016 • It had wide range of control
of appliances
• Its better for security of
home
Lack of Buzzer, application for
noticing the users and expensive
because of Raspberry
REAL-TIME FACE
DETECTION AND
RECOGNITION IN
COMPLEX BACKGROUND
• Xin Zhang
• Thomas Gonnot
• Jafar Saniie
2017 • Faces and eyes detection
• Facial images normalisation
and enhancement
• Facial recognition and face
sample collection
Lack of PIR, Solenoid, IR
sensor
SMART HOME SECURITY
SYSTEM USING ARDUINO
AND IoT
Megha Bhasker 2021 • Intruder detection
• Water leak/ overflow
detection
• Fire detection
• Information can be accessed
via cloud
Monitored alarm systems can be
integrated with the very latest
hi-tech gadgets and automation
facilities in order to provide
even greater levels of security
HOME SECURITY BASED ON
IoT
• Aboubacar Fadiga
• Mohith Agarwal
• Preeti Kaushik
2022 The proprietor may even have
the capacity to prevent or begin
the alarm remotely the use of
simply his clever phone.
Lack of MQ5 and Flame
detector sensor
RANKING SECURITY OF IOT-
BASED SMART HOME
CONSUMER DEVICES
• Naba Allifah
• Imran Zualkernan
2022 Provides a structured approach
for evaluating and prioritising
security risks associated with
devices like home theatres,
security cameras, smart
lighting, etc.
Lack of Solenoid, Buzzer and no
application for notification
6. Existing software-based home security systems often leverage centralised platforms or applications to manage security
components remotely.
These systems commonly include mobile applications or web interfaces that enable users to monitor security cameras,
control access points, and receive alerts for potential breaches.
They may incorporate encryption protocols for data security, employ authentication mechanisms like passwords or
biometrics, and offer regular software updates to patch vulnerabilities.
These software-centric solutions typically lack direct integration with hardware sensors or devices, focusing primarily on
remote management and monitoring functionalities for home security.
EXISTING SYSTEM
7. Traditional home security systems using conventional access methods like keys and keypads are becoming
inadequate, with vulnerabilities and limited user-friendliness.
The challenge is to develop a modern home security system that utilises advanced face recognition with
liveness detection to offer secure, user-friendly access control and real-time monitoring, addressing the
shortcomings of existing systems with sensors for further security actions.
PROBLEM STATEMENT
8. PROPOSED SYSTEM
The proposed system aims to revolutionise home security in the modern technological era by introducing an innovative
approach that utilises cutting-edge face recognition technology with liveness detection. This system will provide a seamless
and highly secure means of access control, ensuring entry only for authorised individuals.
The project's innovative blend of hardware and software components offers a cost-effective, secure, and user-friendly
solution to modern home security needs.
It balances convenience and security, ensuring only authorised individuals can access the home while providing
homeowners with real-time control
9. In the contemporary landscape of smart homes and IOT, home security has transcended traditional locks and keys. This
project underscores a pioneering approach to safeguarding our homes, focusing on the application of advanced face
recognition technology coupled with liveness detection. As technological advances surge forward, the need for
innovative security solutions becomes increasingly pronounced.
The core aim of this project is to establish a robust, intelligent, and accessible home security system that effectively
restricts access to authorised individuals while concurrently furnishing the homeowner with real-time oversight.
10. OBJECTIVES
Our project objectives encompass a comprehensive approach to home security, prioritising various facets. These goals
include achieving high accuracy in face recognition and ensuring reliable liveness detection while integrating
hardware components seamlessly and utilising IoT connectivity for remote management.
Real-time notifications, customisable access control, and robust auditing features aim to provide accountability and
user-friendly interfaces, all while considering cost-effectiveness in hardware selection and prioritising privacy
and data security.
Fail-safe mechanisms, scalability, user education, legal compliance, and seamless integration with diverse
components constitute additional focal points to create a well-rounded, efficient, and compliant home security solution
12. Web Cam
PIR Sensor
MQ5 Sensor
Flame Detector
Infrared Sensor
Solenoid
Arduino UNO
Node MCU
13. SYSTEM REQUIREMENTS
SOFTWARE REQUIREMENTS:
• OS: Windows/Linux/macOS
• Language: Python
• Backend: OpenCV
• Frontend: GUI
HARDWARE REQUIREMENTS:
• Arduino Uno
• Node-MCU ESP826
• Physical components like- Solenoid door-lock, LED and Buzzer
14. CONCLUSION
In conclusion, the development of a smart home security system based on face recognition technology with liveness
detection has opened new horizons for home security, offering an innovative and robust solution to safeguard residential
properties. This project brings together an array of hardware and software components to create a secure and user-friendly
access control system. The core objective of enhancing home security has been successfully met, with the implementation of
a face recognition system that exhibits accuracy in recognising the owner's face while maintaining a reliable liveness
detection mechanism. This has significantly raised the bar for security in the home environment. The integration of hardware
components like the Arduino Uno and Node-MCU ESP8266, along with the IoT capabilities of the Blynk platform, has
allowed for real-time monitoring and control of the system. Homeowners can now manage and monitor their home security
remotely, receiving immediate notifications and access to comprehensive access logs.