Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Face Recognition Based Door Locking System: International Research Journal of Engineering and Technology (IRJET)

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056

Volume: 05 Issue: 07 | July 2018 www.irjet.net p-ISSN: 2395-0072

FACE RECOGNITION BASED DOOR LOCKING SYSTEM


Ketki Prasade1, Supriya Nalavade2, Devaki Pathak3
1Ketki Prasade, Electronics and Telecommunication, PES Modern College of Engineering, Maharashtra, India
2Supriya Nalavade, Electronics and Telecommunication, PES Modern College of Engineering, Maharashtra, India
3Devaki Pathak, Electronics and Telecommunication, PES Modern College of Engineering, Maharashtra, India

---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Security describes protection of life and property. moved to biometric security system to ensure better
The main purpose of this system is to provide better security security. Biometric security system includes fingerprint
by using face recognition technique. Eigen face algorithm is a based system was the first biometric locking system. Using
basis for face recognition that provides high accuracy and the fingerprints of a person for unlocking the door is main
moderate sensitivity to variations in the intensity of light. It is parameter for this system. However, like any other systems,
one of the fastest way to identify faces. This project works in they also have drawbacks. Fingerprints of a person can be
two modes: offline and online. Firstly, the PIR sensor senses the duplicated. This can lead to opening of the door for
person standing outside the door. Then camera receives unauthorized person. Finally research moved to image
instruction to capture image of person standing in front of the processing system. This system provides high security. When
door. This captured image is compared to the images stored in a person wants to access his locker, initially at the main door
the database. The person standing in front of the door will be of locker and PIR sensor will be placed. This sensor will
granted access, if his/her image is recognized. If it’s not the sense the body temperature of a person, standing near the
authorized person gets a notification via GSM. If the door. And then, his/her image will be captured by the
authorized person grants permission, only then the door will camera installed at the main gate. This image will be given to
open. Or else it will remain closed for further action. This the PC where the MATLAB software will compare this image
project makes use of Laptop as a processing unit. It uses with the authentic images stored in the PC. If authentic, then
MATLAB software to carry out the face recognition procedure. only the door will open otherwise it will remain closed and
The system takes input image by capturing a real time image the alarm will buzz for further action.
for online process. For offline process the input image is given
manually. 2. METHODOLOGY

Key Words: Security, face recognition, PIR sensor, Eigen 2.1 System Design
face algorithm, MATLAB etc.

1. INTRODUCTION

The security sector is experiencing diversification. This has


brought about the need to review the reliability of already
existing systems and look into the possibility of creating
better systems that are smarter and more secure. The old
door security systems made use of keys, locks and chains.
However, the locks can be easily broken and keys can get
stolen or can be duplicated. In order to overcome this
drawback, mechanical locking system was introduced, that
is, latches were used. Latches had better security than the
locks. Although, latches cannot be broken as easily as the
locks, they make the use of keys, which are not so reliable
and can get stolen. Further, to avoid these drawbacks,
password based system was introduced. This system used
numeric combination to permit entrance to user. But
security is entirely based on confidentiality and the strength Fig -1: System Block Diagram
of the password. Modification was made in the password
from numeric to alpha-numeric. This not only included According to above block diagram shown above, first motion
numbers in the password, but also alphabets. In order to is detected by PIR sensor then the image is captured by
increase the strength of passwords, special characters were camera which is input to the microcontroller,
also introduced further Password locks cannot ensure Microcontroller checks whether given input is saved within
proper security, since passwords can be guessed or hacked the database. If so the door will open, which is mechanical
and this can lead to theft. Further modification in the system function done by DC motor. If input image does not match

© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1253
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 07 | July 2018 www.irjet.net p-ISSN: 2395-0072

with the database then door will remain closed and Buzzer 2.3 Software Specifications
will start beeping .The result will be displayed on the LCD.
This project uses GSM system to send notification of an
unauthorized person and also to connect hardware with PC
it uses serial communication interfacing.

2.2 Hardware components

The hardware components are the physical parts of the


system. This system is made of Power Supply, Processing
Unit, GSM, PIR sensor, DC motor.

Power Supply:

The AC power supply of 230 volts, at 50Hz is converted to 5


volts DC and is regulated for the internal working of the
microcontroller by this unit.

Processing Unit:

The processing unit that is the laptop interfaced with the


other components is included in the processing unit. Its
specifications are Intel® CoreTMi3-5005U CPU with 2GHz
processing frequency, 4GB and 64-bit operating system.

Microcontroller:

A 40 pins PIC18f4520 microcontroller has been used. A


microcontroller is a programmable devices that carries out
various tasks assigned to it. Fig -2: System Block Diagram

GSM: 3. RESULTS

GSM that is, Global System for Mobile communication is a 3.1 Project Setup
cellular network that is used by mobile phones. This system
uses GSM SIM 900 to notify the authorized person of the
possible thefts or unrecognized person standing in front of
the door.

PIR Sensor:

A Passive Infrared Sensor senses the infrared radiations


emitted by the human beings. This helps the system to detect
the presence of the person standing in front of the door and
carry out the further process. The detecting angle is 120
degrees and detecting distance is 8m.

DC Motor:

A 12V, 1200 rpm DC motor is used for opening and closing


the sliding door.

Fig -3: System Hardware

© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1254
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 07 | July 2018 www.irjet.net p-ISSN: 2395-0072

3.2 Recognized Image of Computer Applications (0975 – 8887) Volume 160 – No 8,


February 2017

[4]. Md. Nasimuzzaman Chowdhury, Md. ShibleeNooman,


SrijonSarker, “Access Control of Door and Home Security by
Raspberry Pi through Internet”, International
Journal of Scientific & Engineering Research, Volume 4,
Issue11, November-2013 ISSN 2229-5518

Fig -4: Recognized image

The input image is first converted from RGB to gray to create


eigen vector. Then Eigen vector and mean image is created
and then it is compared with stored database. If the image is
recognized then the door opens, else it remains closed.

4. CONCLUSION

Face recognition based door locking has been developed to


provide better security. It is user friendly system. The use of
Eigen face recognition technique makes system more secure.
This system can be used in several places where high
security is required where confidential information and
equipment is kept. For example, research institutes, banks,
forensic Laboratories. This system can also be used for
domestic purposes. This project helps to reduce problem of
thefts and frauds. In case of unauthorized person's entry,
system alerts authorized person with SMS and at the same
time the buzzer beeps to alert people. This is a cost efficient
and reliable door locking system.

REFERENCES

[1]. Asst. Prof. T .A. More et al, “Smart Bank Locker Access
System Using Iris, Fingerprints, Face Recognition Along With
Password Authentication and Billing System”. Int. Journal of
Engineering Research and Applications ISSN: 2248-9622,
Vol. 5, Issue 3, (Part - 3) March 2015, pp.96-101

[2]. Ushie James Ogri, DonatusEnangBasseyOkwong,


AkaisoEtim, “Design and construction of door locking
security system using GSM”, International Journal Of
Engineering And Computer ScienceISSN:2319-7242 Volume
2 Issue 7 (July 2013), Page No. 2235-2257

[3]. JayantDabhade, AmirushJavare, TusharGhayal,


AnkurShelar, “Smart Door Lock System: Improving Home
Security using Bluetooth Technology”, International Journal

© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1255

You might also like