SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 333
Security by user through application to lock/unlock machine by face
detection
P.S.Hanawate1, Aishwarya Patil2, Saloni Kulkarni3 Kalyani Kolte4
1 computer department
NBNSSOE
pune
poonamkumar.hanwate@sinhgad.edu
2 computer department
NBNSSOE
pune
aishwarya.patil1630@gmail.com
3 Computer department
NBNSSOE
pune
saloni.kulkarni21@gmail.com
4 Computer department
NBNSSOE
pune
kalyanikolte9196@gmail.com
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The system will be designed for security
purposes. It will work if anybody tries to unlock the laptop, it
will act as a trigger to the camera and thecamera willcapture
the image of the person standing in front of the Laptop. Then
application running on laptopwillsend notificationtoandroid
app about this event. This will help user to decide what action
he/she should take. The system is designed such that the
motion of the user will be captured from the camera and the
user will be detected and then only he will be given a key to
lock or unlock. The application was designed to allow the user
to also check the status of the door. The mobile devicerequires
a password to increase the security of the system. Security is
main concern for handling such documents in laptop mobile
devices computers. We do not have that much good security
with these devices. The security we have is making lock for
system as a password but anyone can crack the password and
harm our data to avoid this situation so many security
functions are provided like thumbprint, retinarecognition etc.
But there is no security for checking thatwho istryingtocrack
the password. That security is provided in our proposed
system.
1.INTRODUCTION
Security is main concern for handling such documents in
laptop mobile devices computers. We do not have that
much good security with these devices. The security we
have is making lock for system as a password but anyone
can crack the password and harm our data to avoid this
situation so many security functions are provided like
thumb print, retina recognition etc. But there is no
security for checking that who is trying to crack the
password. That security is provided in our proposed
system.
1.1 System overview
A. system architecture
B. Architecture flow
1. Input:
 password entered by client machine
 photograph of machine user
 actions perform by machine user

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 334
2. process:
 lock/unlock machine
 face detection
 authentication
 actions handling
3. output:
 authentication
 action execution
C. Architecture description
Machine user wants to login. He/she enter the password.
Then request will be send to GUI handler. GUI is (graphical
user interface) handler which helps to interactwithuser.GUI
handler will notify to connector. Connector helps to connect
the server. Then connector notify to parserwhichwillhelpto
parse the notification.Thenitwillcommandtodesktopclient.
Client performs action then as response action is taken.Then
at the same time client status is send to parser. After that
parser send status to GUI handler and then GUI handler to
user.
D. Scope of Project
1. The system will be designed for security purposes.
2. When we leave your laptop, all we have to do islock
your system and our application starts the
protection.
– If anybody unlock our system, our
application will takes his/her images via
laptops camera
– Send notification to laptop owner (via Wi-
Fi/Internet) along with images
– Laptop Owner will receive this as
notification on his/her Smartphone
– Laptop Owner can take following actions:
3. Lock computer again remotely
4. Retrieve critical data from the Laptop
5. Immediately log user out, change admin privileges
and password.
6. Delete or encrypt sensitive files or directories
7. Capture images from built in camera
8. Real-time Desktop Capture
9. Take screen shots .
E. Algorithms
1. Eigen vector(for face detection)
2. REST (for communication)
3. Flow of system
2.Face Detection
Face detection is a technique used to recognize human
faces in digital form of images. This is one of the computer
technology used in variety of applications in real world. In
this paper we are using this technique to know who the
person is getting the machine password. For that we are
using machine camera. Through that camera we have to
capture image of person who is in front of machine. To
capture the image of that person we need face detection. The
person can be located in any sense so we have to detect and
capture the image. There are many categories of face
detection. It depends upon eye, nose, mouth etc position or
gender classification. It can also be based on color or image.
segmentation. Following figure shows the pointsdetectedon
face and then image get captured.
user
1
GUIHandler
This model will help
to intract with user.
1
1
1
1
connector
This model will help
to connect to the
server
parser
This will help to
parse notification
Desktop client
Perform action
Perform action
Connect to the
client and take
action
Client handling status Control cammand
status
notification
notification
Client command
response
Client status
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 335
 It is computer technology which is used in various
applications for the identification of human faces in
digital images.
 There are two techniques of genetic algorithm and
eigenfaces for the face detection.
 Each possible face candidatesisnormalizedtoreduce
lightning effect caused due to uneven illumination
and the shirring effect due to head movement. The
fitness value of each candidate is measured based on
its projection on the eigen-faces. After a number of
iterations, all the face candidates with a high fitness
value are selected for further verification. At this
stage, the face symmetry is measured and the
existence of the different facial features is verifiedfor
each face candidate.
 for the analysis purpose we need to assume the
centered face image and same size as training face
and eigenfaces.
 by using motion detecting and head tracking face can
be detect easily.
 people are constantly moving, like nods ourheadand
adjust our body hence for the detectionoffacewecan
use simple motion detectionandtrackingalgorithms.
 After threshold the filtered image for production of
binary motion image, weneed to analyze the"motion
blobs" that means the person is moving and to
determine the head position”. for e.g. on the larger
blob head is smaller blob and head motion must be
reasonably slow and contiguous.
 On the basis of number of images from motion it
helps to detect the face easily.
Following figure shows process of face detection. While
we have input image the step one in process is vertical
projection by strips it detects the face by its several parts.
Then after that step two is horizontal projection of the
candidates then both the results will be combined in step
three. Then final result will be generated. In following image
two faces will be detected as a result.
1. Eigen vector
• Main idea behind eigenfaces
- Suppose is an N2x1 vector, corresponding to an NxN
face image I .
- This idea represent ( mean face) into a low-
dimensional space.
-Represented in equation form as given bellow
mean w1u1 w2u2 . . . wK uK (K<<N2)
 Calculating eigenfaces
Let face image I(x, y) 2D N by N array of 8-bit intensity
values. Image is vector dimension N2 means 65535
dimensional space ensemble of image the map collection
point in this space for example figure shows training set of
various images of faces. Principle component analysis used
to find vectors. These vectors find face space with length N2.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 336
Database
-2500 face images digitized under monitor and controlled
conditions.
-16 subject with three head orientationare digitizedandalso
with head size, scales, three lightning conditions etc.
-Gaussian pyramid of 6 level having image resolution
512x512 pixel to 16x16 pixel.
This diagram shows database position in face detection
process.
Summary of steps for eigenfaces: Collect a set of
characteristics which contain set of images
ƛk and uk are eigenvectors and eigenvalues respectively
which we have calculated in equation 1 & 2.
Equation 3 gives covariance matrix. Which calculate 40x40
matrix and find eigenvector and eigenvalues
Which ultimately gives average face Ψ.
From input images shown seven eigenfaces calculated and
from those images one average image is calculated. Combine
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 337
set of normalized training set call as uk. following equations
represents this procedure.
This image gives variation in head size, three light
conditions, and three head orientation.
Following equation shows how to classify a face image by
eigenfaces.
For each uk calculate class vector Ωk by taking average of Ω
choose threshold maximum allowable distance ϴ€. For each
new face image calculate pattern vectorΩ€k<ϴ€isminimum
distance. €<ϴ€ implies individual is from class vector Ωk
€k>ϴ€ but distance €k<ϴ€ then image may be declared as
unknown.
I
f image is known then it will get added with original set of
known faces.
Computation of the eigenfaces
Step 1: obtain face images I1, I2, ..., IM (training faces)
(very important: the face images must be centered
and of the same size)
Step 2: represent every image Ii as a vector i
Step 3: compute the average face vector
1 MMi 1 i
Step 4: subtract the mean face:
i i
Step 5: compute the covariance matrix C:
C 1MMn 1 n Tn AAT (N2xN2 matrix)
Step 6: compute the eigenvectors ui of AAT
The matrix AAT is very large --> not practical.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 338
Step 6.1: consider the matrix AT A (MxM matrix)
Step 6.2: compute the eigenvectors vi of ATA
ATA vi mi vi
What is the relationship between usi and vi?
ATA vi mi vi => AAT Avi m
i Avi =>CAvi mi Avi or Cui m
i ui where ui Avi
Thus, AAT and ATA have the same eigenvalues and
their eigenvectorsare related as follows: ui Avi !!
Note 1: AAT can have up to N2 eigenvalues and
eigenvectors.
Note 2: AT A can have up to M eigenvalues and
eigenvectors.
Note 3: The M eigenvalues of AT A (along with their
corresponding
eigenvectors) correspond to the M largest
eigenvalues of AAT (along
with their corresponding eigenvectors).
Step 6.3: compute the M best eigenvectors of AAT : ui Avi
(important: normalize ui such that ||ui|| 1)
Step 7: keep only K eigenvectors (corresponding to the K
largest eigenvalues)
Three layer linear network for eigenface calculation. The
symmetric weights ui are the eigen faces and the hidden
units reveal the projection of the input image Φ onto the
eigenfaces the output Φf is the face space projection of input
image.
2. REST (for communication)
REST stands for Representational State Transfer. (It is
sometimes spelled "ReST".) It relies on a stateless, client-
server, cacheable communicationsprotocol--andinvirtually
all cases, the HTTP protocol is used.
REST is an architecture style for designing networked
applications. The idea is that, rather than using complex
mechanisms such as CORBA, RPC or SOAP to connect
between machines, simple HTTP is used to make calls
between machines.
In many ways, the World Wide Web itself, based on HTTP,
can be viewed as a REST-based architecture.
REST full applications use HTTP requeststopostdata(create
and/or update), read data (e.g., make queries), and delete
data. Thus, REST uses HTTP for all four CRUD
(Create/Read/Update/Delete) operations.
REST is a lightweight alternative to mechanisms like RPC
(RemoteProcedureCalls)and Web Services(SOAP,WSDL,et
al.). Later, we will see how much more simple REST is.
Despite being simple, REST isfully-featured;there'sbasically
nothing you can do in Web Services that can't be done with a
RESTful architecture.
 REST is not a "standard". There will never be a W3C
recommendataion for REST, for example. And while
there are REST programming frameworks, working
with REST is so simple that you can often "roll your
own" with standard library features in languageslike
Perl, Java, or C#.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 339
.3. Flow of system:
If user is trusted then user will be authenticated
otherwise authentication failure occurs. If unlock event
happen then camera act as trigger and capture the image of
the person which is standing in front of camera. Then
application gets started at background of the machine. It will
send the captured image and notification to the user
application. Then user is able to take action from given
options like lock, restart or shutdown machine. Then action
request will be created and send to client. Now request
handled by client is executed and action gets performed.
Face Detection Using Eigenfaces
- Given an unknown image G
Step 1: computeF = G -Y
Step 2: compute Fˆ = K
i=1
Swiui (wi = uTiF)
Step 3: compute ed = ||F- ˆF||
Step 4: if ed < Td, then G is a face.
4. Literature survey
5. conclusion
Our proposed system ensures all the quality with respect to
security. The system parameters are check with feasibility.
This system is able to provide complete security for device.
With advance technology of face detection to lock/unlock
machine. So that user access security of that machine.
References
[1] [1] http://www.ijtra.com/view/smart-lock-a-locking-
system- using- bluetooth -technology-camera-
verification.pdf (2016)
[2] [2] Potts, Josh, and SomsakSukittanon. ”Exploiting
Bluetooth on Android mobile devices for
home security application.” Southeastcon, 2012
Proceedings of IEEE. IEEE, 2012.
[3] [3] Piyare, R., and M. Tazil. ”Bluetooth based home
automation system using cell phone.” Consumer
Electronics (ISCE), 2011 IEEE 15th International
Symposium on. IEEE, 2011.
[4] [4] Kaur, Inderpreet. ”Microcontroller based home
automation system with security.”International journal
of advanced computer science and applications 1.6
(2010)
[5] [5] M. Turk and A. Pentland, "Eigenfaces for
Recognition", Journal of Cognitive Neuroscience, vol.3,
no. 1, pp.
[6] 71-86, 1991, hard copy
[7] [6] http://www.face-rec.org/algorithms/PCA/jcn.pdf

More Related Content

What's hot

IRJET- Fish Recognition and Detection Based on Deep Learning
IRJET-  	  Fish Recognition and Detection Based on Deep LearningIRJET-  	  Fish Recognition and Detection Based on Deep Learning
IRJET- Fish Recognition and Detection Based on Deep Learning
IRJET Journal
 
Sc idt soft computing based intrusion detection technology in smart home secu...
Sc idt soft computing based intrusion detection technology in smart home secu...Sc idt soft computing based intrusion detection technology in smart home secu...
Sc idt soft computing based intrusion detection technology in smart home secu...
eSAT Publishing House
 
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET Journal
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET Journal
 
C6524029320
C6524029320C6524029320
C6524029320
aissmsblogs
 
IRJET - Different Data Mining Techniques for Intrusion Detection System
IRJET - Different Data Mining Techniques for Intrusion Detection SystemIRJET - Different Data Mining Techniques for Intrusion Detection System
IRJET - Different Data Mining Techniques for Intrusion Detection System
IRJET Journal
 
An embedded finger vein recognition system
An embedded finger vein recognition systemAn embedded finger vein recognition system
An embedded finger vein recognition system
eSAT Publishing House
 
Iot attendance system using fingerprint module
Iot attendance system using fingerprint module Iot attendance system using fingerprint module
Iot attendance system using fingerprint module
AjinkyaMore29
 
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...A Fusion of Statistical Distance and Signature Length Based Approach for Offl...
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...
IRJET Journal
 
IRJET- DocLock Application for Secure Document Sharing
IRJET- DocLock Application for Secure Document SharingIRJET- DocLock Application for Secure Document Sharing
IRJET- DocLock Application for Secure Document Sharing
IRJET Journal
 
IRJET- Public Garden Automation System
IRJET-  	  Public Garden Automation SystemIRJET-  	  Public Garden Automation System
IRJET- Public Garden Automation System
IRJET Journal
 
Improved authentication using arduino based voice
Improved authentication using arduino based voiceImproved authentication using arduino based voice
Improved authentication using arduino based voice
eSAT Publishing House
 
IRJET - Smart Yoga Instructor
IRJET - Smart Yoga InstructorIRJET - Smart Yoga Instructor
IRJET - Smart Yoga Instructor
IRJET Journal
 
IRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless Biometric
IRJET Journal
 
Human Data Acquisition through Biometrics using LabVIEW
Human Data Acquisition through Biometrics using LabVIEW Human Data Acquisition through Biometrics using LabVIEW
Human Data Acquisition through Biometrics using LabVIEW
Yayah Zakaria
 
Ingerprint based student attendance system with sms alert to parents
Ingerprint based student attendance system with sms alert to parentsIngerprint based student attendance system with sms alert to parents
Ingerprint based student attendance system with sms alert to parents
eSAT Journals
 
Major project report on
Major project report onMajor project report on
Major project report on
Ayesha Mubeen
 
Implementation of decision tree algorithm after clustering through weka
Implementation of decision tree algorithm after clustering through wekaImplementation of decision tree algorithm after clustering through weka
Implementation of decision tree algorithm after clustering through wekaIAEME Publication
 
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
IRJET Journal
 

What's hot (19)

IRJET- Fish Recognition and Detection Based on Deep Learning
IRJET-  	  Fish Recognition and Detection Based on Deep LearningIRJET-  	  Fish Recognition and Detection Based on Deep Learning
IRJET- Fish Recognition and Detection Based on Deep Learning
 
Sc idt soft computing based intrusion detection technology in smart home secu...
Sc idt soft computing based intrusion detection technology in smart home secu...Sc idt soft computing based intrusion detection technology in smart home secu...
Sc idt soft computing based intrusion detection technology in smart home secu...
 
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
 
C6524029320
C6524029320C6524029320
C6524029320
 
IRJET - Different Data Mining Techniques for Intrusion Detection System
IRJET - Different Data Mining Techniques for Intrusion Detection SystemIRJET - Different Data Mining Techniques for Intrusion Detection System
IRJET - Different Data Mining Techniques for Intrusion Detection System
 
An embedded finger vein recognition system
An embedded finger vein recognition systemAn embedded finger vein recognition system
An embedded finger vein recognition system
 
Iot attendance system using fingerprint module
Iot attendance system using fingerprint module Iot attendance system using fingerprint module
Iot attendance system using fingerprint module
 
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...A Fusion of Statistical Distance and Signature Length Based Approach for Offl...
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...
 
IRJET- DocLock Application for Secure Document Sharing
IRJET- DocLock Application for Secure Document SharingIRJET- DocLock Application for Secure Document Sharing
IRJET- DocLock Application for Secure Document Sharing
 
IRJET- Public Garden Automation System
IRJET-  	  Public Garden Automation SystemIRJET-  	  Public Garden Automation System
IRJET- Public Garden Automation System
 
Improved authentication using arduino based voice
Improved authentication using arduino based voiceImproved authentication using arduino based voice
Improved authentication using arduino based voice
 
IRJET - Smart Yoga Instructor
IRJET - Smart Yoga InstructorIRJET - Smart Yoga Instructor
IRJET - Smart Yoga Instructor
 
IRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless Biometric
 
Human Data Acquisition through Biometrics using LabVIEW
Human Data Acquisition through Biometrics using LabVIEW Human Data Acquisition through Biometrics using LabVIEW
Human Data Acquisition through Biometrics using LabVIEW
 
Ingerprint based student attendance system with sms alert to parents
Ingerprint based student attendance system with sms alert to parentsIngerprint based student attendance system with sms alert to parents
Ingerprint based student attendance system with sms alert to parents
 
Major project report on
Major project report onMajor project report on
Major project report on
 
Implementation of decision tree algorithm after clustering through weka
Implementation of decision tree algorithm after clustering through wekaImplementation of decision tree algorithm after clustering through weka
Implementation of decision tree algorithm after clustering through weka
 
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
 

Similar to Security by user through application to lock/unlock machine by face detection

Smart Doorbell System Based on Face Recognition
Smart Doorbell System Based on Face RecognitionSmart Doorbell System Based on Face Recognition
Smart Doorbell System Based on Face Recognition
IRJET Journal
 
IRJET- VISITX: Face Recognition Visitor Management System
IRJET-  	  VISITX: Face Recognition Visitor Management SystemIRJET-  	  VISITX: Face Recognition Visitor Management System
IRJET- VISITX: Face Recognition Visitor Management System
IRJET Journal
 
IRJET - Face Detection and Recognition System
IRJET -  	  Face Detection and Recognition SystemIRJET -  	  Face Detection and Recognition System
IRJET - Face Detection and Recognition System
IRJET Journal
 
Built-in Face Recognition for Smart Phone Devices
Built-in Face Recognition for Smart Phone DevicesBuilt-in Face Recognition for Smart Phone Devices
Built-in Face Recognition for Smart Phone Devices
IRJET Journal
 
IRJET- Smart Classroom Attendance System: Survey
IRJET- Smart Classroom Attendance System: SurveyIRJET- Smart Classroom Attendance System: Survey
IRJET- Smart Classroom Attendance System: Survey
IRJET Journal
 
IRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric AttendanceIRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric Attendance
IRJET Journal
 
Classroom Attendance using Face Detection and Raspberry-Pi
Classroom Attendance using Face Detection and Raspberry-PiClassroom Attendance using Face Detection and Raspberry-Pi
Classroom Attendance using Face Detection and Raspberry-Pi
IRJET Journal
 
IRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face Recognition
IRJET Journal
 
IRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face Recognition
IRJET Journal
 
Ladies Compartment Intruder Alert
Ladies Compartment Intruder AlertLadies Compartment Intruder Alert
Ladies Compartment Intruder Alert
IRJET Journal
 
IRJET - A Review on Face Recognition using Deep Learning Algorithm
IRJET -  	  A Review on Face Recognition using Deep Learning AlgorithmIRJET -  	  A Review on Face Recognition using Deep Learning Algorithm
IRJET - A Review on Face Recognition using Deep Learning Algorithm
IRJET Journal
 
IRJET- Face Recognition using Deep Learning
IRJET-  	  Face Recognition using Deep LearningIRJET-  	  Face Recognition using Deep Learning
IRJET- Face Recognition using Deep Learning
IRJET Journal
 
IRJET- Intrusion Detection through Image Processing and Getting Notified ...
IRJET-  	  Intrusion Detection through Image Processing and Getting Notified ...IRJET-  	  Intrusion Detection through Image Processing and Getting Notified ...
IRJET- Intrusion Detection through Image Processing and Getting Notified ...
IRJET Journal
 
Effective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID TagsEffective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID Tags
IRJET Journal
 
IRJET- Automated Criminal Identification System using Face Detection and Reco...
IRJET- Automated Criminal Identification System using Face Detection and Reco...IRJET- Automated Criminal Identification System using Face Detection and Reco...
IRJET- Automated Criminal Identification System using Face Detection and Reco...
IRJET Journal
 
Face Recognition Based Payment Processing System
Face Recognition Based Payment Processing SystemFace Recognition Based Payment Processing System
Face Recognition Based Payment Processing System
IRJET Journal
 
Note to Coin converter using Digital Image Processing
Note to Coin converter using Digital Image ProcessingNote to Coin converter using Digital Image Processing
Note to Coin converter using Digital Image Processing
IRJET Journal
 
IRJET - Smart Doorbell System
 IRJET - Smart Doorbell System IRJET - Smart Doorbell System
IRJET - Smart Doorbell System
IRJET Journal
 
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
IRJET Journal
 
Contactless Temperature Monitoring and Face Mask Detection with Alert System
Contactless Temperature Monitoring and Face Mask Detection with Alert SystemContactless Temperature Monitoring and Face Mask Detection with Alert System
Contactless Temperature Monitoring and Face Mask Detection with Alert System
IRJET Journal
 

Similar to Security by user through application to lock/unlock machine by face detection (20)

Smart Doorbell System Based on Face Recognition
Smart Doorbell System Based on Face RecognitionSmart Doorbell System Based on Face Recognition
Smart Doorbell System Based on Face Recognition
 
IRJET- VISITX: Face Recognition Visitor Management System
IRJET-  	  VISITX: Face Recognition Visitor Management SystemIRJET-  	  VISITX: Face Recognition Visitor Management System
IRJET- VISITX: Face Recognition Visitor Management System
 
IRJET - Face Detection and Recognition System
IRJET -  	  Face Detection and Recognition SystemIRJET -  	  Face Detection and Recognition System
IRJET - Face Detection and Recognition System
 
Built-in Face Recognition for Smart Phone Devices
Built-in Face Recognition for Smart Phone DevicesBuilt-in Face Recognition for Smart Phone Devices
Built-in Face Recognition for Smart Phone Devices
 
IRJET- Smart Classroom Attendance System: Survey
IRJET- Smart Classroom Attendance System: SurveyIRJET- Smart Classroom Attendance System: Survey
IRJET- Smart Classroom Attendance System: Survey
 
IRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric AttendanceIRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric Attendance
 
Classroom Attendance using Face Detection and Raspberry-Pi
Classroom Attendance using Face Detection and Raspberry-PiClassroom Attendance using Face Detection and Raspberry-Pi
Classroom Attendance using Face Detection and Raspberry-Pi
 
IRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face Recognition
 
IRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face Recognition
 
Ladies Compartment Intruder Alert
Ladies Compartment Intruder AlertLadies Compartment Intruder Alert
Ladies Compartment Intruder Alert
 
IRJET - A Review on Face Recognition using Deep Learning Algorithm
IRJET -  	  A Review on Face Recognition using Deep Learning AlgorithmIRJET -  	  A Review on Face Recognition using Deep Learning Algorithm
IRJET - A Review on Face Recognition using Deep Learning Algorithm
 
IRJET- Face Recognition using Deep Learning
IRJET-  	  Face Recognition using Deep LearningIRJET-  	  Face Recognition using Deep Learning
IRJET- Face Recognition using Deep Learning
 
IRJET- Intrusion Detection through Image Processing and Getting Notified ...
IRJET-  	  Intrusion Detection through Image Processing and Getting Notified ...IRJET-  	  Intrusion Detection through Image Processing and Getting Notified ...
IRJET- Intrusion Detection through Image Processing and Getting Notified ...
 
Effective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID TagsEffective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID Tags
 
IRJET- Automated Criminal Identification System using Face Detection and Reco...
IRJET- Automated Criminal Identification System using Face Detection and Reco...IRJET- Automated Criminal Identification System using Face Detection and Reco...
IRJET- Automated Criminal Identification System using Face Detection and Reco...
 
Face Recognition Based Payment Processing System
Face Recognition Based Payment Processing SystemFace Recognition Based Payment Processing System
Face Recognition Based Payment Processing System
 
Note to Coin converter using Digital Image Processing
Note to Coin converter using Digital Image ProcessingNote to Coin converter using Digital Image Processing
Note to Coin converter using Digital Image Processing
 
IRJET - Smart Doorbell System
 IRJET - Smart Doorbell System IRJET - Smart Doorbell System
IRJET - Smart Doorbell System
 
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
 
Contactless Temperature Monitoring and Face Mask Detection with Alert System
Contactless Temperature Monitoring and Face Mask Detection with Alert SystemContactless Temperature Monitoring and Face Mask Detection with Alert System
Contactless Temperature Monitoring and Face Mask Detection with Alert System
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 

Recently uploaded (20)

Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 

Security by user through application to lock/unlock machine by face detection

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 333 Security by user through application to lock/unlock machine by face detection P.S.Hanawate1, Aishwarya Patil2, Saloni Kulkarni3 Kalyani Kolte4 1 computer department NBNSSOE pune poonamkumar.hanwate@sinhgad.edu 2 computer department NBNSSOE pune aishwarya.patil1630@gmail.com 3 Computer department NBNSSOE pune saloni.kulkarni21@gmail.com 4 Computer department NBNSSOE pune kalyanikolte9196@gmail.com ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The system will be designed for security purposes. It will work if anybody tries to unlock the laptop, it will act as a trigger to the camera and thecamera willcapture the image of the person standing in front of the Laptop. Then application running on laptopwillsend notificationtoandroid app about this event. This will help user to decide what action he/she should take. The system is designed such that the motion of the user will be captured from the camera and the user will be detected and then only he will be given a key to lock or unlock. The application was designed to allow the user to also check the status of the door. The mobile devicerequires a password to increase the security of the system. Security is main concern for handling such documents in laptop mobile devices computers. We do not have that much good security with these devices. The security we have is making lock for system as a password but anyone can crack the password and harm our data to avoid this situation so many security functions are provided like thumbprint, retinarecognition etc. But there is no security for checking thatwho istryingtocrack the password. That security is provided in our proposed system. 1.INTRODUCTION Security is main concern for handling such documents in laptop mobile devices computers. We do not have that much good security with these devices. The security we have is making lock for system as a password but anyone can crack the password and harm our data to avoid this situation so many security functions are provided like thumb print, retina recognition etc. But there is no security for checking that who is trying to crack the password. That security is provided in our proposed system. 1.1 System overview A. system architecture B. Architecture flow 1. Input:  password entered by client machine  photograph of machine user  actions perform by machine user 
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 334 2. process:  lock/unlock machine  face detection  authentication  actions handling 3. output:  authentication  action execution C. Architecture description Machine user wants to login. He/she enter the password. Then request will be send to GUI handler. GUI is (graphical user interface) handler which helps to interactwithuser.GUI handler will notify to connector. Connector helps to connect the server. Then connector notify to parserwhichwillhelpto parse the notification.Thenitwillcommandtodesktopclient. Client performs action then as response action is taken.Then at the same time client status is send to parser. After that parser send status to GUI handler and then GUI handler to user. D. Scope of Project 1. The system will be designed for security purposes. 2. When we leave your laptop, all we have to do islock your system and our application starts the protection. – If anybody unlock our system, our application will takes his/her images via laptops camera – Send notification to laptop owner (via Wi- Fi/Internet) along with images – Laptop Owner will receive this as notification on his/her Smartphone – Laptop Owner can take following actions: 3. Lock computer again remotely 4. Retrieve critical data from the Laptop 5. Immediately log user out, change admin privileges and password. 6. Delete or encrypt sensitive files or directories 7. Capture images from built in camera 8. Real-time Desktop Capture 9. Take screen shots . E. Algorithms 1. Eigen vector(for face detection) 2. REST (for communication) 3. Flow of system 2.Face Detection Face detection is a technique used to recognize human faces in digital form of images. This is one of the computer technology used in variety of applications in real world. In this paper we are using this technique to know who the person is getting the machine password. For that we are using machine camera. Through that camera we have to capture image of person who is in front of machine. To capture the image of that person we need face detection. The person can be located in any sense so we have to detect and capture the image. There are many categories of face detection. It depends upon eye, nose, mouth etc position or gender classification. It can also be based on color or image. segmentation. Following figure shows the pointsdetectedon face and then image get captured. user 1 GUIHandler This model will help to intract with user. 1 1 1 1 connector This model will help to connect to the server parser This will help to parse notification Desktop client Perform action Perform action Connect to the client and take action Client handling status Control cammand status notification notification Client command response Client status
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 335  It is computer technology which is used in various applications for the identification of human faces in digital images.  There are two techniques of genetic algorithm and eigenfaces for the face detection.  Each possible face candidatesisnormalizedtoreduce lightning effect caused due to uneven illumination and the shirring effect due to head movement. The fitness value of each candidate is measured based on its projection on the eigen-faces. After a number of iterations, all the face candidates with a high fitness value are selected for further verification. At this stage, the face symmetry is measured and the existence of the different facial features is verifiedfor each face candidate.  for the analysis purpose we need to assume the centered face image and same size as training face and eigenfaces.  by using motion detecting and head tracking face can be detect easily.  people are constantly moving, like nods ourheadand adjust our body hence for the detectionoffacewecan use simple motion detectionandtrackingalgorithms.  After threshold the filtered image for production of binary motion image, weneed to analyze the"motion blobs" that means the person is moving and to determine the head position”. for e.g. on the larger blob head is smaller blob and head motion must be reasonably slow and contiguous.  On the basis of number of images from motion it helps to detect the face easily. Following figure shows process of face detection. While we have input image the step one in process is vertical projection by strips it detects the face by its several parts. Then after that step two is horizontal projection of the candidates then both the results will be combined in step three. Then final result will be generated. In following image two faces will be detected as a result. 1. Eigen vector • Main idea behind eigenfaces - Suppose is an N2x1 vector, corresponding to an NxN face image I . - This idea represent ( mean face) into a low- dimensional space. -Represented in equation form as given bellow mean w1u1 w2u2 . . . wK uK (K<<N2)  Calculating eigenfaces Let face image I(x, y) 2D N by N array of 8-bit intensity values. Image is vector dimension N2 means 65535 dimensional space ensemble of image the map collection point in this space for example figure shows training set of various images of faces. Principle component analysis used to find vectors. These vectors find face space with length N2.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 336 Database -2500 face images digitized under monitor and controlled conditions. -16 subject with three head orientationare digitizedandalso with head size, scales, three lightning conditions etc. -Gaussian pyramid of 6 level having image resolution 512x512 pixel to 16x16 pixel. This diagram shows database position in face detection process. Summary of steps for eigenfaces: Collect a set of characteristics which contain set of images ƛk and uk are eigenvectors and eigenvalues respectively which we have calculated in equation 1 & 2. Equation 3 gives covariance matrix. Which calculate 40x40 matrix and find eigenvector and eigenvalues Which ultimately gives average face Ψ. From input images shown seven eigenfaces calculated and from those images one average image is calculated. Combine
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 337 set of normalized training set call as uk. following equations represents this procedure. This image gives variation in head size, three light conditions, and three head orientation. Following equation shows how to classify a face image by eigenfaces. For each uk calculate class vector Ωk by taking average of Ω choose threshold maximum allowable distance ϴ€. For each new face image calculate pattern vectorΩ€k<ϴ€isminimum distance. €<ϴ€ implies individual is from class vector Ωk €k>ϴ€ but distance €k<ϴ€ then image may be declared as unknown. I f image is known then it will get added with original set of known faces. Computation of the eigenfaces Step 1: obtain face images I1, I2, ..., IM (training faces) (very important: the face images must be centered and of the same size) Step 2: represent every image Ii as a vector i Step 3: compute the average face vector 1 MMi 1 i Step 4: subtract the mean face: i i Step 5: compute the covariance matrix C: C 1MMn 1 n Tn AAT (N2xN2 matrix) Step 6: compute the eigenvectors ui of AAT The matrix AAT is very large --> not practical.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 338 Step 6.1: consider the matrix AT A (MxM matrix) Step 6.2: compute the eigenvectors vi of ATA ATA vi mi vi What is the relationship between usi and vi? ATA vi mi vi => AAT Avi m i Avi =>CAvi mi Avi or Cui m i ui where ui Avi Thus, AAT and ATA have the same eigenvalues and their eigenvectorsare related as follows: ui Avi !! Note 1: AAT can have up to N2 eigenvalues and eigenvectors. Note 2: AT A can have up to M eigenvalues and eigenvectors. Note 3: The M eigenvalues of AT A (along with their corresponding eigenvectors) correspond to the M largest eigenvalues of AAT (along with their corresponding eigenvectors). Step 6.3: compute the M best eigenvectors of AAT : ui Avi (important: normalize ui such that ||ui|| 1) Step 7: keep only K eigenvectors (corresponding to the K largest eigenvalues) Three layer linear network for eigenface calculation. The symmetric weights ui are the eigen faces and the hidden units reveal the projection of the input image Φ onto the eigenfaces the output Φf is the face space projection of input image. 2. REST (for communication) REST stands for Representational State Transfer. (It is sometimes spelled "ReST".) It relies on a stateless, client- server, cacheable communicationsprotocol--andinvirtually all cases, the HTTP protocol is used. REST is an architecture style for designing networked applications. The idea is that, rather than using complex mechanisms such as CORBA, RPC or SOAP to connect between machines, simple HTTP is used to make calls between machines. In many ways, the World Wide Web itself, based on HTTP, can be viewed as a REST-based architecture. REST full applications use HTTP requeststopostdata(create and/or update), read data (e.g., make queries), and delete data. Thus, REST uses HTTP for all four CRUD (Create/Read/Update/Delete) operations. REST is a lightweight alternative to mechanisms like RPC (RemoteProcedureCalls)and Web Services(SOAP,WSDL,et al.). Later, we will see how much more simple REST is. Despite being simple, REST isfully-featured;there'sbasically nothing you can do in Web Services that can't be done with a RESTful architecture.  REST is not a "standard". There will never be a W3C recommendataion for REST, for example. And while there are REST programming frameworks, working with REST is so simple that you can often "roll your own" with standard library features in languageslike Perl, Java, or C#.
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 339 .3. Flow of system: If user is trusted then user will be authenticated otherwise authentication failure occurs. If unlock event happen then camera act as trigger and capture the image of the person which is standing in front of camera. Then application gets started at background of the machine. It will send the captured image and notification to the user application. Then user is able to take action from given options like lock, restart or shutdown machine. Then action request will be created and send to client. Now request handled by client is executed and action gets performed. Face Detection Using Eigenfaces - Given an unknown image G Step 1: computeF = G -Y Step 2: compute Fˆ = K i=1 Swiui (wi = uTiF) Step 3: compute ed = ||F- ˆF|| Step 4: if ed < Td, then G is a face. 4. Literature survey 5. conclusion Our proposed system ensures all the quality with respect to security. The system parameters are check with feasibility. This system is able to provide complete security for device. With advance technology of face detection to lock/unlock machine. So that user access security of that machine. References [1] [1] http://www.ijtra.com/view/smart-lock-a-locking- system- using- bluetooth -technology-camera- verification.pdf (2016) [2] [2] Potts, Josh, and SomsakSukittanon. ”Exploiting Bluetooth on Android mobile devices for home security application.” Southeastcon, 2012 Proceedings of IEEE. IEEE, 2012. [3] [3] Piyare, R., and M. Tazil. ”Bluetooth based home automation system using cell phone.” Consumer Electronics (ISCE), 2011 IEEE 15th International Symposium on. IEEE, 2011. [4] [4] Kaur, Inderpreet. ”Microcontroller based home automation system with security.”International journal of advanced computer science and applications 1.6 (2010) [5] [5] M. Turk and A. Pentland, "Eigenfaces for Recognition", Journal of Cognitive Neuroscience, vol.3, no. 1, pp. [6] 71-86, 1991, hard copy [7] [6] http://www.face-rec.org/algorithms/PCA/jcn.pdf