0% found this document useful (0 votes)
12 views

Face Recognition Door Lock System Using Raspberry Pi

The document presents a face recognition door lock system using Raspberry Pi, aimed at enhancing security in homes and other facilities. It captures images of individuals and compares them with stored data to unlock doors, while also notifying the owner if an unknown person is detected. The system integrates various components like PIR sensors and servo motors, allowing remote access and control through mobile devices, making it a practical and cost-effective security solution.

Uploaded by

ch.priyabharathi
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

Face Recognition Door Lock System Using Raspberry Pi

The document presents a face recognition door lock system using Raspberry Pi, aimed at enhancing security in homes and other facilities. It captures images of individuals and compares them with stored data to unlock doors, while also notifying the owner if an unknown person is detected. The system integrates various components like PIR sensors and servo motors, allowing remote access and control through mobile devices, making it a practical and cost-effective security solution.

Uploaded by

ch.priyabharathi
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC)

Face Recognition Door Lock System Using


Raspberry Pi
Talugula Ganesh Reddy Sirumandla Chethan Sai Borra Pavan Kumar
Electronics and communication Electronics and communication Electronics and communication
Engineering Engineering Engineering
Lovely Professional University, Lovely Professional University, Lovely Professional University,
Phagwara Phagwara Phagwara
Phagwara,Punjab Phagwara, Punjab Phagwara,Punjab
[email protected] [email protected] [email protected]
2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC) | 979-8-3503-0071-0/23/$31.00 ©2023 IEEE | DOI: 10.1109/ICSCCC58608.2023.10176434

Ramineni Teja Venkatesh Kakani Sathwik Kanwaljeet Singh*


Electronics and communication Electronics and communication Electronics and communication
Engineering Engineering Engineering
Lovely Professional University, Lovely Professional University, Lovely Professional University,
Phagwara Phagwara Phagwara
Phagwara, Punjab Phagwara, Punjab Phagwara, Punjab
[email protected] [email protected] [email protected]

Abstract— In our daily life we are facing so many security Nowadays for us, security and privacy had become
issues in every aspect. By using updated technology, we fundamental rights whether we are secure or not and
have to resolve these issues. In this project, implemented everything became intelligent and become digitization.
a face recognition module for security purposes.By using Because of this security has become more priority for us.
face recognition, it will capture pictures of a person by And there is also a rapid increase in interest in the Face
utilizing the camera and that image is saved in the recognition Door Lock System. This system is a practical
database of that. The picture is useful for unlocking the and affordable option for small establishments, residences,
door. he lock on the door will be released when the person and other facilities because it utilizes the Raspberry Pi as its
computer base. A low-cost, simple-to-use computer with
will stand ahead of the camera, the camera will verify the
open-source software, the Raspberry Pi is suitable for a wide
person’s face if it matches the image already stored in the range of tasks. It is now possible to create powerful face
database then only the door will be unlocked. If the recognition systems on the Raspberry Pi thanks to the
system cannot recognize the face, then that time the availability of machine learning techniques and frameworks
system will generate a warning message to the user. Face like OpenCV and TensorFlow [1]. Using this face
recognition is one of the most Secured Systems in recognition door lock system, we can lock or open the doors
biometric verification.At this time, going to implement a using our phones or similar technology. And certain facial
new technological environment, by seeing the worldwide recognition algorithms have been created. like corselet
basis, can see the increasing count of theft and fraud are transform algorithm also know that security is most
significantly going on day by day in recent years. So, in important. Many people use security to protect their
this project, implemented new technology and develop important things. one of the major securities to protect the
the Face recognition Door Lock System using Raspberry things to lock the main door in our home. there are several
pi. Raspberry Pi is smaller and lighter and it uses less ways to protect the things like fingerprint locker, voice
power than a computer or a standard- PC for face recognition lockers and using normal keys to lock the door.
recognition. So, project can be implemented with the So, our goal is to lock the door by using face recognition. In
Raspberry Pi module. Raspberry pi is a secured system addition of the project, added the things like two pir sensors
once data given, cannot modify that data. It is more and servo motors it makes the project different to others.
secure so used itin this project. This project is not only used Traditional access control methods that rely on keys or cards
for home hold purposes, it's also used for banks, are readily lost, stolen, or copied, putting security at risk.
Access control can be handled more securely and
Hospitals, MNCcompanies, military purposes and taking
conveniently with a face recognition door lock system
attendance for students and faculty in colleges. By using
powered by a Raspberry Pi [2]. And facial recognition
this system, we candecrease the security issues in our daily spread across various fields and sectors that changed them
life because it is the most securable system to get rid of completely [1]. Here the updated camera detects the image
thieves and frauds or other people around our society. of a person and sends the image to the related database, so it
checks the image to see whether it matches the admin or not.
Keywords— biometric, face recognition, raspberry pi if it does not match, the alarm turns on and sends the
message to the admin. This can be wonder how these things
Ⅰ. INTRODUCTION can be done. all these things are done in raspberry pi. usually,
raspberry pi works on Linux and is available to all users is
an open-source operating system. The Raspberry Pi will be
979-8-3503-0071-0/23/$31.00 ©2023 IEEE
218

Authorized licensed use limited to: Zhejiang University. Downloaded on August 21,2024 at 15:49:51 UTC from IEEE Xplore. Restrictions apply.
2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC)

linked to the home control system. so that it can give the


information required [3]. And, raspberry pi costs us very low,
and of course, this provides and creates a lot of IoT solutions.
The advantage here is the admin or owner controls the
functionality of the door lock from anywhere in the world
with the help of mobiles or laptops, which can improve the
security system. The lock mechanism is physically turned
by a servo motor to which the Raspberry Pi is attached.. The
system can be controlled in a variety of ways, including
through a web interface, and mobile applications [4]. For
added convenience and security, the raspberry pi can be set
up to communicate with other gadgets like security cameras
and motion detectors. Overall, it is a flexible and affordable
home security solution [5].
Ⅱ. LITERATURE REVIEW Fig 1. Block diagram of the project
For the past few years, there are so many industries working
on projects based on the Internet of Things, big data If a person comes front of the door PIR will detect and
analytics, artificial intelligence, and machine learning. camera will open and check if the person is known door
Making something simple and lovely is the basic goal of all will open and also notified to the owner when the person is
these enterprises. The main difference of this project is can unknown then raspberry pi will send the live images of the
be operating the door by using a mobile and servo motor can person to the visitor through g mail. If anyone want to do
be use or Dc motor as per requirements. Here you can any project, need to implement on software by making of
perform efficient and reliable facial recognition using a USB software project Proteus is the good thing to use.
connection and an HD Webcam [4] and store them for future In Simple words how the Components will be going to
needs via cloud computing. In this project, implemented a work
securable system for detecting thefts and fraud. A facial
recognition door lock system powered by a Raspberry Pi can ➢ BELL BUTTON: If a visitor presses the bell, then the
assist in addressing the issues with conventional access buzzer will ring and an alert notification will send to
control systems, offer a more safe and practical way to theowner.
manage access control, and possibly enhance the general ➢ SERVO MOTOR: It is used to rotate or flex the door
security of residences, workplaces, and other facilities. So, or any object.
here developed a new technology for stopping these alerts ➢ PIR SENSOR: An electronic device used to
in our daily life. The face recognition module is the most determine if something is present or not a specific
Secured System. Because nowadays finger bio-metrics also area. For the making of these projects, added two
forgery by doing some types of surgery [5]. That's why here sensors inside and outside of the home.
implementing face recognition, the face cannot be a forgery ➢ RASPBERRY PI: It will store the data of face images.
by anyone. In my survey about face recognition Door Lock Ifit matches then the door will open if not then it will
Systems using the Raspberry pi project, many people can
perform the operation.
implement this project in different ways but also it cannot
➢ CAMERA: It captures live images of the visitor after
come out for daily use. Because they are using slightly
complicated things for implementing that project. So, here a human is detected by a PIR sensor.
we can identify that and can use some cheapest materials for ➢ BUZZER: which makes some sound or noise when
helping poor people also. Facial recognition identifies who it detects any irregular activity.
the visitor is and automatically opens the door if the face is IV.REAL-TIME IMPLEMENTATION
identified in a stored database, or alerts the owner if not [4].
If any visitor comes in front of the door and presses the
III.PROPOSED SYSTEM bell switch then the raspberry pi camera will open and
Safety is the most important factor today. Technology is capture the image, check the visitor is a well-known
advancing day by day in the world. Criminal organizations individual or an unknown person. when the visitor is a
are also improving their technology to carry out their known person then the PIR sensor will detect the human
operations. So, to protect what's important, technology must motion inside the home whether any person is present
be up to date. People use doors to lock their homes and protect inside the home or not. If the visitor data was not stored in
important items in the house. There are countless ways to Raspberry pi.
lock the door, such as bar-codes, fingerprint recognition, If not, then the raspberry pi will send the live images of the
andkeys. In this project, can access the door based on face visitor to the owner through the mail. The owner will
data already stored in the Raspberry Pi. Uused a Raspberry identify whether the visitor is a known person or not. If the
Pi to make this project because it's faster, takes up less space visitor is a known person, then the owner can operate the
andhas better performance than any other computer. door using his mobile. So, this project can be implement
anywhere in the house.

219

Authorized licensed use limited to: Zhejiang University. Downloaded on August 21,2024 at 15:49:51 UTC from IEEE Xplore. Restrictions apply.
2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC)

V. CONCLUSION
Introducing face identification-based door lock system
utilizing raspberry pi and GSM Module. It has designed a
technique that provides users with reliable door locks
which can provide easy and safe and energy efficient. At
home, the, the bank and other public locations this
technology can be used to authenticate IDs. A webcam,
Raspberry Pi and relay and electromagnetic door lock
were used in tandem to make this system. For face
detection, the Haar cascade classifier approach was used
and for face recognition, LBPH (local binary histogram)
was used. Numerous operations have undergone
successful testing with the outcomes beings recorded.
ⅤI.FUTURE SCOPE
The advanced technique is economical and elements are
highly obtainable. It is movable and comfortably
expandable. By integrating the various sensors along with
Fig 2. Flow of implementation Project simulation: the advanced technique, many elegant applications such as
home automation, Eagle visual surveillance, college hostel
➢ If any visitor comes in front of the door PIR sensor entry facility, and bank door security can be created.
willdetect and LCD will display “welcome”
• Many different things can be done with face recognition
technology.
• These involve:
➢ Phones unlatch
➢ Enforcement of peace
➢ Airports control
➢ Finding lost people
➢ Security
➢ Sales and promoting
➢ Medicare
➢ Keep in a site of students or physical biometric
➢ Identifying drivers
➢ Keep an eye on gambling addictions
➢ Improving retail experience
.
Fig 3.Simulation of the project LCD displayingwelcome when
switch is in on condition. REFERENCES

[1] Swati Sahu, Prof. Vijay Sharma. Internet of Things


Approach for Face Detection & Face Recognition.
IJSRD - International Journal for Scientific Re-
search & Development| Vol. 5, Issue 10, 2017 |
ISSN (online): 2321-0613.
[2] A tutorial Swati.P, V. D. Ugale2, Vishal. P,
Aditya.P, Nikhil.P(2020), Review Paper Based on
Smart Locking System for Illegally Parked
Vehicle, IJRAR March 2020, Volume 7, Issue 1
ISSN 2348-1269, P- ISSN 2349-5138).
[3] Analysis and Recognition in Image and Videos,
Face Recognition using corselet transform, Project
Report, Rami COHEN, Technion - Israel Institute
of Technology, arXiv:1107.2781v1 [cs.CV] 14
July 2011.
[4] W. ZHAO, R. CHELLAPPA. Face Recognition: A
Fig 4. Simulation of the project switch is in on condition LCD Literature Survey. ACM Computing Surveys, Vol.
Displaying Face detection System. 35, No. 4, December 2003, pp. 399–458.
[5] Varun Garg, Kritika Garg, Face Recognition Using
Haar Cascade Classifier, Journal of Emerging
Technology and Innovative Research (JETIR),
Decem-ber 2016, Volume3, Issue 12
[6] Anjali Patel, Ashok Verma. IOT based Facial

220

Authorized licensed use limited to: Zhejiang University. Downloaded on August 21,2024 at 15:49:51 UTC from IEEE Xplore. Restrictions apply.
2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC)

Recognition Door Access Control Home Security [19] Medak Teena Ravali, Prof. Rangasai Komaragiri
System. International Journal of Computer Applica- “Image processing platform on raspberry pi for face
tions (0975 – 8887) Volume 172 – No.7, August recognition” Global Journal of Advanced
2017 Engineering Technologies, ISSN 2277-6370 Vol3,
[7] Prof. Sandeep V, Guru Prasad Hegde. Face Issue4- 2014.
Detection based Locker Security System using [20] Keun-Chang Kwak and W. Pedrycz, “Face
Raspberry Pi. International Journal of Scientific & recognition using an enhanced independent
Engineering Research, Volume 7, Issue 5, May- component analysis approach inNeural Networks,
2016. ISSN 2229- 5518. IEEE Transactions on, vol.18, no.2, pp.530–541,
[8] R. Manjunatha, Dr. R. Nagaraja. Home Security 2007.
System and Door Access Control Based on Face [21] Anoop Mishra “Embedded Image Capturing &
Recognition. International Research Journal of Engi- Digital Converting Process using Raspberry pi
neering and Technology (IRJET). Volume: 04 Issue: System interfacing and Comparison of Generation 2
03. Mar -2017.E-ISSN: 2395 -0056. verses Generation 1 models in Raspberry pi” et al,
[9] Zhao and R. Chellappa “Robust face recognition /(IJCSIT) International Journal ofComputer Science
using symmetric shape from-shading” Technical and Information Technologies, Vol. 6 (2), 2015,
Report, Center for Automation Research, Universi- 1798-1801.
ty of Maryland, 1999. [22] K. Gopalakrishnan, V. Sathish Kumar “embedded
[10] PriyankaG,Rachana J, Vijayalakshmi N, Abhisheka imagecapturing system using raspberry pi system”
G S, Vinutha D C (2019), IoT Door Lock Security international Journal of Emerging Trends &
System using Google Assistance, Interna-tional Technology in Computer Science (IJETTCS)
Journal of Innovative Technology and Exploring Volume 3, Issue2, March–April 2014.WebSite:
Engineering (IJITEE) ISSN:2278-3075, Volume-9 www.ijettcs.org
Issue-2S [23] Paola Campadelli and Raffaella Lanzarotti, “A face
[11] SMcManus, M Cook. Raspberry Pi for recognition system based on local feature
dummies.John Wiley & Sons. 2017. characterization” inAdvanced Studies in Biometrics.
[12] TSGunawan, IRH Yaldi, M Kartiwi, N Ismail, NF [24] Khalimov R., Rakhimbayeva Z., Shokayev A.,
Za'bah, H Mansor, AN Nordin. Prototype Design of Kamalov B., Md. Hazrat Ali “Development of
Smart Home System using Internet of Things. Intelligent Door Locking System Based on Face
Indonesian Journal of Electrical Engineering and Recognition Technology” 2020 11th International
Computer Science. 2017; 7: 107-115. Conference on Mechanical and Aerospace
[13] E Upton, G Halfacree. Meet the Raspberry Pi. John Engineering 978-1-7281-8322-0/20/$31.00©2020
Wiley & Sons. 2012. IEEE.
[14] Zheng Xiang, Hengliang Tan, Wienling Ye. The [25] Hema N. “Secure Home Entry Using Raspberry Pi
excellent properties of dense gird-based HOG with Notification via Telegram” 978-1-7281-5493
features on face recognition compare to gabor and 0/20/$31.00 ©2020 IEEE.
LBP, 2018 volume issue 99. [26] M.amanullah, (2013), Microsontroller based
[15] D.chen, and H Jiu-qiang “An FPGA-based face reprogrammable digital door lock security system by
recognition using combined 5/3 DWT with PCA using keypad & GSM/CDMA technology, IOSR
method”. Journal of communication and computer, Journal of Electrical and Electronics Engineering.
ISSN 848-7709, USA, \volume 6, no.10 (Serial [27] A tutorial on Principal Component Analysis,
No.59), oct.2009. Lindsay I Smith, February 26, 2002.
[16] Zheng Xiang, Hengliang Tan, Wienling Ye. The [28] Shaeez.U.A,Adnan.I,Afhal.P,Aswin.P.K.(2015),GS
excellent properties of dense gird-based HOG M based digital door lock security system,
features on face recognition compare to gabor and International Conference on Power, Instrumentation,
LBP, 2018 volume issue 99. Computing And Control, 1109/PICC.2015.7455796.
[17] E. Manjunatha, Dr. R. Nagaraja. Home Security [29] Door Lock System through Face Recognition Using
System and Door Access Control Based on Face MATLAB, Ayushi Gupta*1, EktaSharma2, Neha
Recognition. International Research Journal of Sachan3 and Neha Tiwari4 *1, 2, 3, 4 Kanpur
Engineering and Technology (IRJET). Volume: 04 institute of technology, Kanpur, India.
Issue: 03. Mar -2017. E- ISSN: 2395 -0056.
[18] Kuldeep Soni, Indian Institute of Technology
Kanpur, June 22, 2014,[email protected]

221

Authorized licensed use limited to: Zhejiang University. Downloaded on August 21,2024 at 15:49:51 UTC from IEEE Xplore. Restrictions apply.

You might also like