SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 437
Home Security System and Door Access Control Based on Face
Recognition
R. Manjunatha1, Dr. R. Nagaraja2
1M. Tech student, Computer Network Engineering, Dept. of ISE, Bangalore Institute of Technology, Bangalore,
Karnataka, India
2Professor and PG Coordinator, Dept. of ISE, Bangalore Institute of Technology, Bangalore, Karnataka, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Smart security system has become indispensable
in modern daily life. The proposed security system has been
developed to prevent robbery in highly secure areas like home
environment withlesserpowerconsumptionandmorereliable
standalone security device for both Intruder detection and for
door security. The door access control isimplementedby using
face recognition technology, which grants access to only
authorized people to enter that area. The facerecognitionand
detection process is implemented by principal component
analysis (PCA) approach and instead of using sensor devices
intruder detection is achieved byperformingimageprocessing
on captured video frames of data, and calculating the
difference between the previously captured frame with the
running frames in terms of pixels in the captured frames. This
is the stand alone security device has been developed by using
Raspberry Pi electronic development board and operated on
Battery power supply, wireless internet connectivity by using
USB modem. Auto Police e-Complaint registration has been
achieved by sending security breach alert mails to the nearby
police station e-mail id. This proposed is more effective,
reliable, and this system consumes very less data and power
compared to the other existing systems.
Key Words: Home security system,Doorlockaccess,Face
Recognition, Security breach alerts, Intruder detection.
1. INTRODUCTION
An efficient and accurate home security and access
control to the doors system which is based on face
recognition is very important for wide range of security
application. Security is an important aspect or feature in the
smart home applications [5]. Most of the countries are
gradually adopting smart door security system. The most
important major part of any door security systems are
identifying accurately the persons who enter through the
door. Face recognition is probably the most natural way to
performauthentication betweenhuman beings.Additionally,
it is the most popular biometric authentication trait, after
fingerprint technology. Most of the security system was
implementing a principle component analysis (PCA)
algorithm for face recognition on hardware platform for its
dimensionality reduction and simplicity. Wireless
technologies for example and ZigBee, radio frequency
identification (RFID) and etc are used in access control
systems. This proposed system also act as home security
system for both Intruder detection and provide security for
door access control by using facial recognition for home
environment.
Human body is identified as an intruder within a home
environment achieved by capturing live video from web
camera and processing will be done on captured video
frames to identify the motion detection of the intruder. The
web camera to capture the series of images as soon as the
intruder motion is detected in certain area of the home
premises and also it is having sending automatic e-Mail
alerts along with captured images and other contact details
to the nearby police station control room e-Mail id aboutthe
intruder detection to take further immediate necessary
actions.
The advantage of this system is for accessing the door is
that face detection and recognition is performed by using
face detection technique and the entire face recognition is
completed by pressing single and tiny push button switch.
Face recognition includes feature extraction from the facial
image, recognition or classification and feature reduction.
PCA is an effective feature extraction method used based on
face as a global feature. It effectively reduces the dimension
of captured images and at the same time holds the primary
information. In this project, face recognition system is
implemented based on standard PCA (Principle component
analysis) algorithm. Classification or Recognition is done by
the measure method such as Euclidean distance technique,
which is used to classify the feature of images stored in the
database and captured test images [2].
2. LITERATURE SURVEY
Hteik Htar Lwin and et al. Have proposed an door lock
access system which comprised mainly of three subsystems:
namely face detection, face recognition and automatic door
access control. Face recognition is implemented by using the
Principal Component Analysis (PCA). The door will open
automatically for the known person due to the command of
the microcontroller. On the otherhand,alarmwillringforthe
unknown person. Drawback of this system is input images
are taken through a web camera continuously until the ‘stop
camera’ button is pressed [1]. Someone is required at the
location to check unauthorized person’s images or status of
the system and take furtheraction.Personalcomputer(PC)is
connected with the microcontroller, The whole system will
not work if PC is crashed or Non-Function.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 438
Sadeque Reza Khan and et al. Have proposed a system
contains sensors to detect obstacle, touch, heat, smoke,
sound. The whole system is controlled by a PIC
microcontroller 16F76. It collects information from the
sensors, makes a decision and sends SMS to a corresponding
number by using a GSM modem. If it finds any interruption
in its sensors like if the IR is interrupted then PIC will send a
SMS to the home owner and another SMS to the Police
Station. In the same way for fire interruption a SMS will be
sent to the fire brigade and another to the home owner [2].
In this system require extra hardware components like
Sensors, GSM Modem. Alerts are sent through only SMS.
B. Udaya Kumar and et al. presents the implementation
of a low cost wireless home security system using ZigBee
protocol and remote access through internet [3]. A ZigBee
based star network with two nodes had been established
employing Xbee radio, ARM7, PIC, and MBED
microcontroller. The detection of the intruder motion, gas
leakage detection and visual surveillance of the home were
provided with the help of Passive Infrared Sensor (PIR), Gas
sensor (GH-312) and Camera (LS_Y201). Problem is here
multiple micro controllers are used, usage of ZigBee based
network to communicate with the base station is limited to
100-150 meters long distance only. Base station is
dependent on only Ethernet for internet connectivity.
J. Shankar Kartik and et al. Have proposed two systems
are proposed, one is based on GSM technology and other
uses web camera to detect the intruder. The first security
system uses a web camera, installed in house premises,
which is operated by software installed on the PC andituses
Internet for communication. The camera detects motion of
any intruder in front of the camera dimensions or camera
range. The software communicates to the intended user via
Internet network and at the same time it gives sound alert.
The second security system is SMS based and uses GSM
technology to send the SMS to the owner [9].
Mae .Y and et al. presented the system; it monitors
everything by moving cameras. The system can increase the
efficiency of monitoring and can eliminate the blind spots of
fixed cameras. In this system, a mobile manipulator is
developed which is equipped with cameras at the arm end
for purpose of monitoring [6].
Jayashri Bangali and et al. Have proposed an system
which is aimed at the security of HomeagainstIntrudersand
Fire. The proposed system is controlled by an Atmega644p
microcontroller. It collects information from the sensors,
makes a decision and sends SMS to a corresponding number
by using a GSM modem. If it finds any interruption in its
sensors (for example IR sensor) then microcontroller will
send a SMS to the home owner. In the same way if the
temperature is increased above certain point or gas sensor
sensors is ON, a SMS will be sent to the home owner ‘Fire at
home’ giving the indication of fire[4]. This system operated
by software in PC to detect the intruder that is it is not stand
alone system, dependent on the PC. Security alerts are sent
by extra GSM Modem not from the internet.
3. SYSTEM ARCHITECTURE
The Architecture of the proposed system are the design
diagram which depicts the scope of the project with the
whole system design. In architecture diagram it highlights
the modules with its various functionality as process. Itaims
to convey the internal design of the proposed system the
following Fig -1 shows the entire architecture of the
proposed system.
Processing Unit
Fig -1: System Architecture
3.1 Input Unit
In input unit the Facial images for Face Recognition and
Video frames for intruder detection are captured from the
two different camera input devices respectively i.e. from
Raspberry Pi Camera and Web camera.
3.2 Processing Unit
The data which is collected from Input unit that is
captured Image and Video frames input is fed into the
processing unit in which the processing or calculations are
performed on the proposedIntruderdetectionanddoorlock
system module, Here the processing unit is nothing but a
Raspberry Pi board [8], along with code scripts of the
implemented modules.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 439
3.3 Communication Interface
Communication interfaces which include wireless
internet connectivity devices are associated with the
Intruder detection module used to send alert messages in
the form of e-mail and SMS by using Internet connectivity.
3.4 Application Specific Unit
The Application specific unit whichconsists ofDoorlock
circuitry, it is associated with Door lock system module and
it starts functioning according to results of the module to
perform door lock open/close operation based on Face
Recognition.
4. IMPLEMENTATION
There are two parts in this section. The first is the
implementation of Door lock access by using Face
Recognition and the second is the implementation of
Intruder detection along with auto alert sending.
4.1 Implementation of Door Lock Access by using
Face Recognition
This project work proposes an idea of for face
reorganization concept for accessing the door lock system
and it implemented with the help of OpenCV [7] which is a
popular computer vision library. Face recognition is an
important application of imageprocessingowingtoitsusein
many fields. An effective face recognition system based on
OpenCV is developed in the project. Face recognition has
been a best choice after problem of biometrics and it has a
various type of applications in our present life. An efficient
face recognition system can be of great help in forensic
sciences, identification for law enforcement, authentication
for banking and security system, and giving preferential
access to authorized users i.e. access control for secured
areas etc.
A real time door lock access system by face
recognition system based on PCA is presented intheproject.
The technique used here involves generating the ‘Eigen
faces’ then projecting training data into face space and
evaluation of a projected test element by projecting it into
face space and comparing to training data. The face
recognition systems presented here can extract the features
of face and compare this with the existing facial images of
database. The faces considered here for comparison are still
faces.
4.2 Implementation of Intruder Detection along
with Auto Alert Sending.
The proposed home security system (i.e. Intruder
detection Module) builds up on the frame subtraction
approach. The main purpose of this approach is to build a
model of the static scene (i.e. without moving objects) called
background, and then compare every subsequent frame of
the sequence to this background frame in order to identify
the regions of motion, called foreground (the moving
objects). A procedural view of how this intruder detection
works is shown in Fig -2.
Fig -2: Procedural View of Intruder Detection and
Alerts Sending
The background frameorfirstframeofourvideostream
is largely static and unchanging overconsecutiveframesofa
video. Therefore, we can use the above mentioned approach
to model the background frame, and we handle it for
variations in sub sequential frames. If there is a change in
sub sequential frames, we can detect it and this change
usually considered as motion detection on video.
5. HARDWARE CONNECTION SETUP
The most important part of the project is the hardware
implementation in accurate manner. The electronics
components of the project are very easily understood and it
includes connection of various hardware devices to the
Rasperry Pi development board via GPIO pins and various
other available ports without need of soldering the wiresfor
connection. The following Wiring diagram Fig-3,showshow
to connect and integration of the required hardware
components of the proposed system like Electronic lock,
Push button switch, Relay, Raspberry Pi board, RaspberryPi
camera, Web Camera, Wi-Fi Receiver Adapter, Power bank
source with Internet data card dongle.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 440
Fig -3: Hardware connection setup
6. RESULTS AND DISCUSSIONS
Consider following Fig -4,To capturethetrainingimages
to store in the database the following commandsneedto run
on the terminal as shown in the below figure if the face is
detected it captures and stored in folder.
Fig -4: Storing captured images
The captured images are stored in folder; captured
images are look like as following images in grayscale format
as shown in Fig -5.
Fig -5: Stored positive images
Consider the following Fig -6, after the complete
configuration and deployment of the proposed security
system and when the device is powered up both the Module
1 and Module 2 are started executing on startup
automatically without manual interaction. We can see the
two windows has opened automatically one for executing
scripts and another one is “Security Feed” which is a
streaming view via the Web camera for intruder detection
module.
Fig -6: Running the device on startup
Consider the following Fig -7, As soon as the
authenticated person is identified by pointing his face
towards the door camera andpressesthepushbuttonswitch
to verify authenticity of the facial image, the system has
predicted as POSITIVE face with required rangeofthreshold
value which is enough for the authentication of the persons
face. And door lock has been unlocked successfully. When
the push button switch is pressed again door has locked
again. It has showing error message also when face has not
detected properly.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 441
Fig -7: Unlocking and locking the door lock
In the following Fig -8, the intruder detection module
has been activated started capturing continues live video
frames from the web camera as shown in Fig. we can see in
the security feed window separately. Whenever an intruder
has detected via web camera it has started capturing
intruder images, attaching these images to the mail and
sending it to the concern police department e-Mail Id, It is
also sending SMS alert as we can see in the screenshot.
Fig -8: Sending security breach alerts
In the following Fig -9 it is showing that the reception of
e-Mail alert into the inbox of the nearby police department
mail account from the security system along with the
intruder detection details like attached image and contact
details to take the immediate actions from them.
Fig -9: Mail inbox screenshot
The following Fig -10 shows the screenshot of the
reception of the SMS security alerts which has sent from
the security device via SMS sending API when an intruder
has been detected.
Fig -10: SMS Alerts
7. CONCLUSION AND FUTURE WORK
In this proposed system door access system by using
face recognition and along with the Intruder detection
system has been presented. This system has been tested
successfully with home door lock access control based on
face recognition method by verifying enrolled facial images.
The police department control room of a nearby place and
concern persons will be informed successfully about the
intruder detection via e-Mail and SMS alert generations
along with details attached.
The proposed system is completely standalone and
wireless to form a reliable, robust, easily operable, and low
price security system. The internet communicationhasbeen
achieved by connecting through USB cellular data card. The
battery power source has been provided to make this whole
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 442
system as standalone securitydevicesuccessfully.Iconclude
that various operations are successfully tested and results
are documented.
This proposed system can be enhanced by using the
infrared image scanner camera to find concealed weapon
detection under the clothes of the human body. We can also
use this security system by making required modification to
the system in an area like banking sector to provide more
security to the lockers, based on their facial authentication
and keep track of account holders record of information
when and who is accessed the lockers. In this way we can
enhance the proposed system effectively by making some
modifications according to requirements.
REFERENCES
[1] Hteik Htar Lwin, Aung Soe Khaing, Hla Myo Tun,
“Automatic DoorAccessSystemUsingFaceRecognition”,
International Journal of Scientific & Technology
Research Volume 4, Issue 06, June 2015.
[2] Sadeque Reza Khan, Ahmed Al Mansur, Alvir Kabir,
Shahid Jaman, Nahian Chowdhury, “Design and
Implementation of Low Cost Home Security System
using GSM Network”, International Journal of Scientific
& Engineering Research, Volume 3, Issue3,March2012.
[3] B. Udaya Kumar, D. S. Murty, Ch. R. Phani Kumar,
“Implementation of Low Cost Ethernet Based Home
Security Using Wireless Sensor Network”, Journal
published at Algorithms Research, March 2013.
[4] Jayashri Bangali, Arvind Shaligram, “Design and
Implementation of Security Systems for Smart Home
based on GSM technology”, International Journal of
Smart Home, Vol.7, No.6, August 2013.
[5] V. Karri and J. S. Daniel Lim, “Method and Device to
Communicate via SMS After a Security Intrusion”, 1st
International Confe-rence on Sensing Technology,
Palmerston North, New Zealand, (2005) November 21-
23.
[6] Mae .Y, Sasao .N, INNoue .K, Arai .T, “Person Detection
by Mobile Manipulator for Monitoring”, SICE 2003
Annual Conference, pages-2801-2806.
[7] http://downloads.sourceforge.net/project/opencvlibrar
y/opencv-2.4.zip
[8] https://www.raspberrypi.org/products/model-b
[9] J. Shankar Kartik, K. Ram Kumar and V.S. Srimadhavan3,
“SMS Alert and Embedded Network Video Monitoring
Terminal”, International Journal ofSecurity, Privacyand
Trust Management ( IJSPTM), Volume 2, October 2013.

More Related Content

What's hot

IRJET- Theft Control using IoT
IRJET-  	  Theft Control using IoTIRJET-  	  Theft Control using IoT
IRJET- Theft Control using IoTIRJET Journal
 
Design of a gsm based biometric access control system
Design of a gsm based biometric access control systemDesign of a gsm based biometric access control system
Design of a gsm based biometric access control systemAlexander Decker
 
IRJET- Home Automation System for Disable People using Bluetooth Technology a...
IRJET- Home Automation System for Disable People using Bluetooth Technology a...IRJET- Home Automation System for Disable People using Bluetooth Technology a...
IRJET- Home Automation System for Disable People using Bluetooth Technology a...IRJET Journal
 
IRJET- Traffic Rules Violation System using NFC Card
IRJET-  	  Traffic Rules Violation System using NFC CardIRJET-  	  Traffic Rules Violation System using NFC Card
IRJET- Traffic Rules Violation System using NFC CardIRJET Journal
 
IRJET- Near Field Communication (NFC) Based Employee Tracking System (ETS)
IRJET- Near Field Communication (NFC) Based Employee Tracking System (ETS)IRJET- Near Field Communication (NFC) Based Employee Tracking System (ETS)
IRJET- Near Field Communication (NFC) Based Employee Tracking System (ETS)IRJET Journal
 
IRJET - Smart Doorbell System
 IRJET - Smart Doorbell System IRJET - Smart Doorbell System
IRJET - Smart Doorbell SystemIRJET Journal
 
IRJET- Design and Implementation of Integrated Smart Home System (ISHS)
IRJET- Design and Implementation of Integrated Smart Home System (ISHS)IRJET- Design and Implementation of Integrated Smart Home System (ISHS)
IRJET- Design and Implementation of Integrated Smart Home System (ISHS)IRJET Journal
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerEswar Publications
 
IRJET- Securing IP Surveillance Cameras using Adaptive Security Appliance...
IRJET-  	  Securing IP Surveillance Cameras using Adaptive Security Appliance...IRJET-  	  Securing IP Surveillance Cameras using Adaptive Security Appliance...
IRJET- Securing IP Surveillance Cameras using Adaptive Security Appliance...IRJET Journal
 
Voice Recognition System for Automobile Safety.
Voice Recognition System for Automobile Safety.Voice Recognition System for Automobile Safety.
Voice Recognition System for Automobile Safety.IRJET Journal
 
Importance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal InvestigationImportance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal InvestigationIRJET Journal
 
Controlling Home Appliances by using Universal Remote Control System (IoT and...
Controlling Home Appliances by using Universal Remote Control System (IoT and...Controlling Home Appliances by using Universal Remote Control System (IoT and...
Controlling Home Appliances by using Universal Remote Control System (IoT and...IRJET Journal
 
IRJET-Managing Security of Systems by Data Collection
IRJET-Managing Security of Systems by Data CollectionIRJET-Managing Security of Systems by Data Collection
IRJET-Managing Security of Systems by Data CollectionIRJET Journal
 
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...Mehraj U Din
 
Design and implement a smart system to detect intruders and firing using IoT
Design and implement a smart system to detect intruders and firing using IoT Design and implement a smart system to detect intruders and firing using IoT
Design and implement a smart system to detect intruders and firing using IoT IJECEIAES
 
Electronic eye for security system @1000KV Technologies 9030844877
Electronic eye for security system @1000KV Technologies 9030844877Electronic eye for security system @1000KV Technologies 9030844877
Electronic eye for security system @1000KV Technologies 90308448771000kv technologies
 
Remote surveillance system for mobile application
Remote surveillance system for mobile applicationRemote surveillance system for mobile application
Remote surveillance system for mobile applicationAlexander Decker
 
IRJET - Monitoring Indoor Air Quality in Industries
IRJET - Monitoring Indoor Air Quality in IndustriesIRJET - Monitoring Indoor Air Quality in Industries
IRJET - Monitoring Indoor Air Quality in IndustriesIRJET Journal
 
IRJET- EVM Monitoring and Security over IoT
IRJET- EVM Monitoring and Security over IoTIRJET- EVM Monitoring and Security over IoT
IRJET- EVM Monitoring and Security over IoTIRJET Journal
 
IOT in security camera and door unlock system
IOT in security camera and door unlock systemIOT in security camera and door unlock system
IOT in security camera and door unlock systemSHAIK TARANNUM
 

What's hot (20)

IRJET- Theft Control using IoT
IRJET-  	  Theft Control using IoTIRJET-  	  Theft Control using IoT
IRJET- Theft Control using IoT
 
Design of a gsm based biometric access control system
Design of a gsm based biometric access control systemDesign of a gsm based biometric access control system
Design of a gsm based biometric access control system
 
IRJET- Home Automation System for Disable People using Bluetooth Technology a...
IRJET- Home Automation System for Disable People using Bluetooth Technology a...IRJET- Home Automation System for Disable People using Bluetooth Technology a...
IRJET- Home Automation System for Disable People using Bluetooth Technology a...
 
IRJET- Traffic Rules Violation System using NFC Card
IRJET-  	  Traffic Rules Violation System using NFC CardIRJET-  	  Traffic Rules Violation System using NFC Card
IRJET- Traffic Rules Violation System using NFC Card
 
IRJET- Near Field Communication (NFC) Based Employee Tracking System (ETS)
IRJET- Near Field Communication (NFC) Based Employee Tracking System (ETS)IRJET- Near Field Communication (NFC) Based Employee Tracking System (ETS)
IRJET- Near Field Communication (NFC) Based Employee Tracking System (ETS)
 
IRJET - Smart Doorbell System
 IRJET - Smart Doorbell System IRJET - Smart Doorbell System
IRJET - Smart Doorbell System
 
IRJET- Design and Implementation of Integrated Smart Home System (ISHS)
IRJET- Design and Implementation of Integrated Smart Home System (ISHS)IRJET- Design and Implementation of Integrated Smart Home System (ISHS)
IRJET- Design and Implementation of Integrated Smart Home System (ISHS)
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using Microcontroller
 
IRJET- Securing IP Surveillance Cameras using Adaptive Security Appliance...
IRJET-  	  Securing IP Surveillance Cameras using Adaptive Security Appliance...IRJET-  	  Securing IP Surveillance Cameras using Adaptive Security Appliance...
IRJET- Securing IP Surveillance Cameras using Adaptive Security Appliance...
 
Voice Recognition System for Automobile Safety.
Voice Recognition System for Automobile Safety.Voice Recognition System for Automobile Safety.
Voice Recognition System for Automobile Safety.
 
Importance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal InvestigationImportance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal Investigation
 
Controlling Home Appliances by using Universal Remote Control System (IoT and...
Controlling Home Appliances by using Universal Remote Control System (IoT and...Controlling Home Appliances by using Universal Remote Control System (IoT and...
Controlling Home Appliances by using Universal Remote Control System (IoT and...
 
IRJET-Managing Security of Systems by Data Collection
IRJET-Managing Security of Systems by Data CollectionIRJET-Managing Security of Systems by Data Collection
IRJET-Managing Security of Systems by Data Collection
 
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...
 
Design and implement a smart system to detect intruders and firing using IoT
Design and implement a smart system to detect intruders and firing using IoT Design and implement a smart system to detect intruders and firing using IoT
Design and implement a smart system to detect intruders and firing using IoT
 
Electronic eye for security system @1000KV Technologies 9030844877
Electronic eye for security system @1000KV Technologies 9030844877Electronic eye for security system @1000KV Technologies 9030844877
Electronic eye for security system @1000KV Technologies 9030844877
 
Remote surveillance system for mobile application
Remote surveillance system for mobile applicationRemote surveillance system for mobile application
Remote surveillance system for mobile application
 
IRJET - Monitoring Indoor Air Quality in Industries
IRJET - Monitoring Indoor Air Quality in IndustriesIRJET - Monitoring Indoor Air Quality in Industries
IRJET - Monitoring Indoor Air Quality in Industries
 
IRJET- EVM Monitoring and Security over IoT
IRJET- EVM Monitoring and Security over IoTIRJET- EVM Monitoring and Security over IoT
IRJET- EVM Monitoring and Security over IoT
 
IOT in security camera and door unlock system
IOT in security camera and door unlock systemIOT in security camera and door unlock system
IOT in security camera and door unlock system
 

Similar to Home Security System and Door Access Control Based on Face Recognition

Face Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemFace Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemIRJET Journal
 
Smart Surveillance System through Computer Vision
Smart Surveillance System through Computer VisionSmart Surveillance System through Computer Vision
Smart Surveillance System through Computer VisionIRJET Journal
 
Comparative Study on Various System Based on Raspberry-Pi Technology
Comparative Study on Various System Based on Raspberry-Pi TechnologyComparative Study on Various System Based on Raspberry-Pi Technology
Comparative Study on Various System Based on Raspberry-Pi TechnologyIRJET Journal
 
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IRJET Journal
 
Cloud Based intrusion Detection System
Cloud Based intrusion Detection SystemCloud Based intrusion Detection System
Cloud Based intrusion Detection SystemIJMTST Journal
 
Home Security System using ESP32-CAM and Telegram Application
Home Security System using ESP32-CAM and Telegram ApplicationHome Security System using ESP32-CAM and Telegram Application
Home Security System using ESP32-CAM and Telegram ApplicationIRJET Journal
 
Voice Assistance Based Remote Surveillance System
Voice Assistance Based Remote Surveillance SystemVoice Assistance Based Remote Surveillance System
Voice Assistance Based Remote Surveillance SystemIRJET Journal
 
Energy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoTEnergy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoTIJEACS
 
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET Journal
 
Smart and Secure Home using IoT
Smart and Secure Home using IoTSmart and Secure Home using IoT
Smart and Secure Home using IoTIRJET Journal
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET Journal
 
IRJET - Face Recognition Door Lock using IoT
IRJET - Face Recognition Door Lock using IoTIRJET - Face Recognition Door Lock using IoT
IRJET - Face Recognition Door Lock using IoTIRJET Journal
 
RAT Trap: Home Surveillance System Using IoT & AI
RAT Trap: Home Surveillance System Using IoT & AIRAT Trap: Home Surveillance System Using IoT & AI
RAT Trap: Home Surveillance System Using IoT & AIIRJET Journal
 
ADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMIRJET Journal
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTDesign and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTIJRTEMJOURNAL
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT	Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT journal ijrtem
 
IRJET - Smart Door System
IRJET - Smart Door SystemIRJET - Smart Door System
IRJET - Smart Door SystemIRJET Journal
 
IRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET Journal
 
IRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoTIRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoTIRJET Journal
 
IRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert ManagementIRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert ManagementIRJET Journal
 

Similar to Home Security System and Door Access Control Based on Face Recognition (20)

Face Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemFace Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock System
 
Smart Surveillance System through Computer Vision
Smart Surveillance System through Computer VisionSmart Surveillance System through Computer Vision
Smart Surveillance System through Computer Vision
 
Comparative Study on Various System Based on Raspberry-Pi Technology
Comparative Study on Various System Based on Raspberry-Pi TechnologyComparative Study on Various System Based on Raspberry-Pi Technology
Comparative Study on Various System Based on Raspberry-Pi Technology
 
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
 
Cloud Based intrusion Detection System
Cloud Based intrusion Detection SystemCloud Based intrusion Detection System
Cloud Based intrusion Detection System
 
Home Security System using ESP32-CAM and Telegram Application
Home Security System using ESP32-CAM and Telegram ApplicationHome Security System using ESP32-CAM and Telegram Application
Home Security System using ESP32-CAM and Telegram Application
 
Voice Assistance Based Remote Surveillance System
Voice Assistance Based Remote Surveillance SystemVoice Assistance Based Remote Surveillance System
Voice Assistance Based Remote Surveillance System
 
Energy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoTEnergy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoT
 
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: Review
 
Smart and Secure Home using IoT
Smart and Secure Home using IoTSmart and Secure Home using IoT
Smart and Secure Home using IoT
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
 
IRJET - Face Recognition Door Lock using IoT
IRJET - Face Recognition Door Lock using IoTIRJET - Face Recognition Door Lock using IoT
IRJET - Face Recognition Door Lock using IoT
 
RAT Trap: Home Surveillance System Using IoT & AI
RAT Trap: Home Surveillance System Using IoT & AIRAT Trap: Home Surveillance System Using IoT & AI
RAT Trap: Home Surveillance System Using IoT & AI
 
ADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEM
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTDesign and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT	Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
 
IRJET - Smart Door System
IRJET - Smart Door SystemIRJET - Smart Door System
IRJET - Smart Door System
 
IRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’S
 
IRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoTIRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET - Examination Forgery Avoidance System using Image Processing and IoT
 
IRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert ManagementIRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert Management
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 

Recently uploaded (20)

247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 

Home Security System and Door Access Control Based on Face Recognition

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 437 Home Security System and Door Access Control Based on Face Recognition R. Manjunatha1, Dr. R. Nagaraja2 1M. Tech student, Computer Network Engineering, Dept. of ISE, Bangalore Institute of Technology, Bangalore, Karnataka, India 2Professor and PG Coordinator, Dept. of ISE, Bangalore Institute of Technology, Bangalore, Karnataka, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Smart security system has become indispensable in modern daily life. The proposed security system has been developed to prevent robbery in highly secure areas like home environment withlesserpowerconsumptionandmorereliable standalone security device for both Intruder detection and for door security. The door access control isimplementedby using face recognition technology, which grants access to only authorized people to enter that area. The facerecognitionand detection process is implemented by principal component analysis (PCA) approach and instead of using sensor devices intruder detection is achieved byperformingimageprocessing on captured video frames of data, and calculating the difference between the previously captured frame with the running frames in terms of pixels in the captured frames. This is the stand alone security device has been developed by using Raspberry Pi electronic development board and operated on Battery power supply, wireless internet connectivity by using USB modem. Auto Police e-Complaint registration has been achieved by sending security breach alert mails to the nearby police station e-mail id. This proposed is more effective, reliable, and this system consumes very less data and power compared to the other existing systems. Key Words: Home security system,Doorlockaccess,Face Recognition, Security breach alerts, Intruder detection. 1. INTRODUCTION An efficient and accurate home security and access control to the doors system which is based on face recognition is very important for wide range of security application. Security is an important aspect or feature in the smart home applications [5]. Most of the countries are gradually adopting smart door security system. The most important major part of any door security systems are identifying accurately the persons who enter through the door. Face recognition is probably the most natural way to performauthentication betweenhuman beings.Additionally, it is the most popular biometric authentication trait, after fingerprint technology. Most of the security system was implementing a principle component analysis (PCA) algorithm for face recognition on hardware platform for its dimensionality reduction and simplicity. Wireless technologies for example and ZigBee, radio frequency identification (RFID) and etc are used in access control systems. This proposed system also act as home security system for both Intruder detection and provide security for door access control by using facial recognition for home environment. Human body is identified as an intruder within a home environment achieved by capturing live video from web camera and processing will be done on captured video frames to identify the motion detection of the intruder. The web camera to capture the series of images as soon as the intruder motion is detected in certain area of the home premises and also it is having sending automatic e-Mail alerts along with captured images and other contact details to the nearby police station control room e-Mail id aboutthe intruder detection to take further immediate necessary actions. The advantage of this system is for accessing the door is that face detection and recognition is performed by using face detection technique and the entire face recognition is completed by pressing single and tiny push button switch. Face recognition includes feature extraction from the facial image, recognition or classification and feature reduction. PCA is an effective feature extraction method used based on face as a global feature. It effectively reduces the dimension of captured images and at the same time holds the primary information. In this project, face recognition system is implemented based on standard PCA (Principle component analysis) algorithm. Classification or Recognition is done by the measure method such as Euclidean distance technique, which is used to classify the feature of images stored in the database and captured test images [2]. 2. LITERATURE SURVEY Hteik Htar Lwin and et al. Have proposed an door lock access system which comprised mainly of three subsystems: namely face detection, face recognition and automatic door access control. Face recognition is implemented by using the Principal Component Analysis (PCA). The door will open automatically for the known person due to the command of the microcontroller. On the otherhand,alarmwillringforthe unknown person. Drawback of this system is input images are taken through a web camera continuously until the ‘stop camera’ button is pressed [1]. Someone is required at the location to check unauthorized person’s images or status of the system and take furtheraction.Personalcomputer(PC)is connected with the microcontroller, The whole system will not work if PC is crashed or Non-Function.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 438 Sadeque Reza Khan and et al. Have proposed a system contains sensors to detect obstacle, touch, heat, smoke, sound. The whole system is controlled by a PIC microcontroller 16F76. It collects information from the sensors, makes a decision and sends SMS to a corresponding number by using a GSM modem. If it finds any interruption in its sensors like if the IR is interrupted then PIC will send a SMS to the home owner and another SMS to the Police Station. In the same way for fire interruption a SMS will be sent to the fire brigade and another to the home owner [2]. In this system require extra hardware components like Sensors, GSM Modem. Alerts are sent through only SMS. B. Udaya Kumar and et al. presents the implementation of a low cost wireless home security system using ZigBee protocol and remote access through internet [3]. A ZigBee based star network with two nodes had been established employing Xbee radio, ARM7, PIC, and MBED microcontroller. The detection of the intruder motion, gas leakage detection and visual surveillance of the home were provided with the help of Passive Infrared Sensor (PIR), Gas sensor (GH-312) and Camera (LS_Y201). Problem is here multiple micro controllers are used, usage of ZigBee based network to communicate with the base station is limited to 100-150 meters long distance only. Base station is dependent on only Ethernet for internet connectivity. J. Shankar Kartik and et al. Have proposed two systems are proposed, one is based on GSM technology and other uses web camera to detect the intruder. The first security system uses a web camera, installed in house premises, which is operated by software installed on the PC andituses Internet for communication. The camera detects motion of any intruder in front of the camera dimensions or camera range. The software communicates to the intended user via Internet network and at the same time it gives sound alert. The second security system is SMS based and uses GSM technology to send the SMS to the owner [9]. Mae .Y and et al. presented the system; it monitors everything by moving cameras. The system can increase the efficiency of monitoring and can eliminate the blind spots of fixed cameras. In this system, a mobile manipulator is developed which is equipped with cameras at the arm end for purpose of monitoring [6]. Jayashri Bangali and et al. Have proposed an system which is aimed at the security of HomeagainstIntrudersand Fire. The proposed system is controlled by an Atmega644p microcontroller. It collects information from the sensors, makes a decision and sends SMS to a corresponding number by using a GSM modem. If it finds any interruption in its sensors (for example IR sensor) then microcontroller will send a SMS to the home owner. In the same way if the temperature is increased above certain point or gas sensor sensors is ON, a SMS will be sent to the home owner ‘Fire at home’ giving the indication of fire[4]. This system operated by software in PC to detect the intruder that is it is not stand alone system, dependent on the PC. Security alerts are sent by extra GSM Modem not from the internet. 3. SYSTEM ARCHITECTURE The Architecture of the proposed system are the design diagram which depicts the scope of the project with the whole system design. In architecture diagram it highlights the modules with its various functionality as process. Itaims to convey the internal design of the proposed system the following Fig -1 shows the entire architecture of the proposed system. Processing Unit Fig -1: System Architecture 3.1 Input Unit In input unit the Facial images for Face Recognition and Video frames for intruder detection are captured from the two different camera input devices respectively i.e. from Raspberry Pi Camera and Web camera. 3.2 Processing Unit The data which is collected from Input unit that is captured Image and Video frames input is fed into the processing unit in which the processing or calculations are performed on the proposedIntruderdetectionanddoorlock system module, Here the processing unit is nothing but a Raspberry Pi board [8], along with code scripts of the implemented modules.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 439 3.3 Communication Interface Communication interfaces which include wireless internet connectivity devices are associated with the Intruder detection module used to send alert messages in the form of e-mail and SMS by using Internet connectivity. 3.4 Application Specific Unit The Application specific unit whichconsists ofDoorlock circuitry, it is associated with Door lock system module and it starts functioning according to results of the module to perform door lock open/close operation based on Face Recognition. 4. IMPLEMENTATION There are two parts in this section. The first is the implementation of Door lock access by using Face Recognition and the second is the implementation of Intruder detection along with auto alert sending. 4.1 Implementation of Door Lock Access by using Face Recognition This project work proposes an idea of for face reorganization concept for accessing the door lock system and it implemented with the help of OpenCV [7] which is a popular computer vision library. Face recognition is an important application of imageprocessingowingtoitsusein many fields. An effective face recognition system based on OpenCV is developed in the project. Face recognition has been a best choice after problem of biometrics and it has a various type of applications in our present life. An efficient face recognition system can be of great help in forensic sciences, identification for law enforcement, authentication for banking and security system, and giving preferential access to authorized users i.e. access control for secured areas etc. A real time door lock access system by face recognition system based on PCA is presented intheproject. The technique used here involves generating the ‘Eigen faces’ then projecting training data into face space and evaluation of a projected test element by projecting it into face space and comparing to training data. The face recognition systems presented here can extract the features of face and compare this with the existing facial images of database. The faces considered here for comparison are still faces. 4.2 Implementation of Intruder Detection along with Auto Alert Sending. The proposed home security system (i.e. Intruder detection Module) builds up on the frame subtraction approach. The main purpose of this approach is to build a model of the static scene (i.e. without moving objects) called background, and then compare every subsequent frame of the sequence to this background frame in order to identify the regions of motion, called foreground (the moving objects). A procedural view of how this intruder detection works is shown in Fig -2. Fig -2: Procedural View of Intruder Detection and Alerts Sending The background frameorfirstframeofourvideostream is largely static and unchanging overconsecutiveframesofa video. Therefore, we can use the above mentioned approach to model the background frame, and we handle it for variations in sub sequential frames. If there is a change in sub sequential frames, we can detect it and this change usually considered as motion detection on video. 5. HARDWARE CONNECTION SETUP The most important part of the project is the hardware implementation in accurate manner. The electronics components of the project are very easily understood and it includes connection of various hardware devices to the Rasperry Pi development board via GPIO pins and various other available ports without need of soldering the wiresfor connection. The following Wiring diagram Fig-3,showshow to connect and integration of the required hardware components of the proposed system like Electronic lock, Push button switch, Relay, Raspberry Pi board, RaspberryPi camera, Web Camera, Wi-Fi Receiver Adapter, Power bank source with Internet data card dongle.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 440 Fig -3: Hardware connection setup 6. RESULTS AND DISCUSSIONS Consider following Fig -4,To capturethetrainingimages to store in the database the following commandsneedto run on the terminal as shown in the below figure if the face is detected it captures and stored in folder. Fig -4: Storing captured images The captured images are stored in folder; captured images are look like as following images in grayscale format as shown in Fig -5. Fig -5: Stored positive images Consider the following Fig -6, after the complete configuration and deployment of the proposed security system and when the device is powered up both the Module 1 and Module 2 are started executing on startup automatically without manual interaction. We can see the two windows has opened automatically one for executing scripts and another one is “Security Feed” which is a streaming view via the Web camera for intruder detection module. Fig -6: Running the device on startup Consider the following Fig -7, As soon as the authenticated person is identified by pointing his face towards the door camera andpressesthepushbuttonswitch to verify authenticity of the facial image, the system has predicted as POSITIVE face with required rangeofthreshold value which is enough for the authentication of the persons face. And door lock has been unlocked successfully. When the push button switch is pressed again door has locked again. It has showing error message also when face has not detected properly.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 441 Fig -7: Unlocking and locking the door lock In the following Fig -8, the intruder detection module has been activated started capturing continues live video frames from the web camera as shown in Fig. we can see in the security feed window separately. Whenever an intruder has detected via web camera it has started capturing intruder images, attaching these images to the mail and sending it to the concern police department e-Mail Id, It is also sending SMS alert as we can see in the screenshot. Fig -8: Sending security breach alerts In the following Fig -9 it is showing that the reception of e-Mail alert into the inbox of the nearby police department mail account from the security system along with the intruder detection details like attached image and contact details to take the immediate actions from them. Fig -9: Mail inbox screenshot The following Fig -10 shows the screenshot of the reception of the SMS security alerts which has sent from the security device via SMS sending API when an intruder has been detected. Fig -10: SMS Alerts 7. CONCLUSION AND FUTURE WORK In this proposed system door access system by using face recognition and along with the Intruder detection system has been presented. This system has been tested successfully with home door lock access control based on face recognition method by verifying enrolled facial images. The police department control room of a nearby place and concern persons will be informed successfully about the intruder detection via e-Mail and SMS alert generations along with details attached. The proposed system is completely standalone and wireless to form a reliable, robust, easily operable, and low price security system. The internet communicationhasbeen achieved by connecting through USB cellular data card. The battery power source has been provided to make this whole
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 442 system as standalone securitydevicesuccessfully.Iconclude that various operations are successfully tested and results are documented. This proposed system can be enhanced by using the infrared image scanner camera to find concealed weapon detection under the clothes of the human body. We can also use this security system by making required modification to the system in an area like banking sector to provide more security to the lockers, based on their facial authentication and keep track of account holders record of information when and who is accessed the lockers. In this way we can enhance the proposed system effectively by making some modifications according to requirements. REFERENCES [1] Hteik Htar Lwin, Aung Soe Khaing, Hla Myo Tun, “Automatic DoorAccessSystemUsingFaceRecognition”, International Journal of Scientific & Technology Research Volume 4, Issue 06, June 2015. [2] Sadeque Reza Khan, Ahmed Al Mansur, Alvir Kabir, Shahid Jaman, Nahian Chowdhury, “Design and Implementation of Low Cost Home Security System using GSM Network”, International Journal of Scientific & Engineering Research, Volume 3, Issue3,March2012. [3] B. Udaya Kumar, D. S. Murty, Ch. R. Phani Kumar, “Implementation of Low Cost Ethernet Based Home Security Using Wireless Sensor Network”, Journal published at Algorithms Research, March 2013. [4] Jayashri Bangali, Arvind Shaligram, “Design and Implementation of Security Systems for Smart Home based on GSM technology”, International Journal of Smart Home, Vol.7, No.6, August 2013. [5] V. Karri and J. S. Daniel Lim, “Method and Device to Communicate via SMS After a Security Intrusion”, 1st International Confe-rence on Sensing Technology, Palmerston North, New Zealand, (2005) November 21- 23. [6] Mae .Y, Sasao .N, INNoue .K, Arai .T, “Person Detection by Mobile Manipulator for Monitoring”, SICE 2003 Annual Conference, pages-2801-2806. [7] http://downloads.sourceforge.net/project/opencvlibrar y/opencv-2.4.zip [8] https://www.raspberrypi.org/products/model-b [9] J. Shankar Kartik, K. Ram Kumar and V.S. Srimadhavan3, “SMS Alert and Embedded Network Video Monitoring Terminal”, International Journal ofSecurity, Privacyand Trust Management ( IJSPTM), Volume 2, October 2013.