IoT Project End Semester Final Submit
IoT Project End Semester Final Submit
IoT Project End Semester Final Submit
Project: IoT based facial recognition door access control Home Security
System
1|Page
ABSTRACT
Context: The home security system has become very important for each house. Previously,
most doors will be open by victimization ancient ways in which, like keys, security cards,
positive identification or pattern. However, incidents like a key loss has led to a lot of worrying
cases like theft and identity fraud. This has become a major issue. To beat this drawback, face
recognition victimization deep learning technique was introduced and Internet of Things (IoT)
additionally been accustomed perform economical door access system. Raspberry Pi could be
a programmable tiny pc board and used because the main controller for face recognition, youth
system and lockup system. The camera is employed to capture pictures of the person ahead of
the door. IoT system permits the user to manage the door access.
Objective: The main objective of the article is to develop an IoT-based face recognition Model
(which is enforced following the Deep Learning algorithm) for the protection system for
creating choices to lock or unlock the door system. the most aim of the thesis would be to
realize the sting computing construct that brings the unreal Intelligence to the low power web
of Things (IoT) devices with the assistance of containerization construct.
Conclusion: Our article includes the methodology for developing the pack AI model and
deploying the pack application on the Raspberry Pi (IoT device), that consists of the ARM
processor. we tend to conclude that the pack application run with high potency, is transportable
and transferable between multiple platforms, and therefore the pack application is compatible
with multiple processors (ARM, x86, amd64).
Keywords: Deep learning, biometric identification, Home security system, Internet of things
(IoT) and Raspberry pi.
2|Page
ACKNOWLEDGEMENTS
We would like to thank Chandigarh University(CU) for giving us the opportunity to work on
such an amazing as well as interesting project from where we could also gain a lot of knowledge
and experience in the world of IoT.
We would also like to express our deepest and sincere gratitude to our supervisor Dr. Anuj
Kumar Goel for his valuable guidance, encouragement and continuous support throughout our
thesis. It would not have been possible to accomplish this work without his supervision and
support.
Finally, a huge thanks to our parents and friends for extreme love and support during
this thesis work.
“The Internet of Things is going to be a real game changer for loyalty, just like mobile has
3|Page
Table of Contents
1: Introduction ................................................................................................................ 5 – 6
2: Literature Review........................................................................................................ 7 – 9
2.1 Face recognition technology................................................................................................ 7
2.2. Method used for face recognition ....................................................................................... 8
2.3. Deep learning ..................................................................................................................... 8
2.4. Face recognition in raspberry pi .................................................................................... 9
2.5. IoT in face recognition ....................................................................................................... 9
3. METHODOLOGY .................................................................................................... 10 - 13
3.1. Overview ......................................................................................................................... 10
3.2. Face recognition ........................................................................................................ 10 - 12
3.3. Deep learning ................................................................................................................... 13
3.4. Internet of things (IoT) ..................................................................................................... 13
5. CONCLUSION ................................................................................................................. 16
6. REFERENCES .................................................................................................................. 17
4|Page
1. INTRODUCTION
Nowadays, home security system may be a crucial issue. Indeed, this method is to make sure
properties and loves one’s square measure invariably safe and guarded. For past few years, it's
become vital to own a solid security system for home, which might secure within the most ideal
and safe means. several countries square measure step by step deployed home security system.
The vital a part of any home security system is that the person identification to enter and exit
the house. Previously, folks use the normal technique for his or her home security system. the
normal security system depends on the utilization of external things like key, arcanum and ID
card to achieve access. However, because of some limitation, biometric takes place to deliver
such a promising security system. The biometric may be a distinctive and quantitative
parameter for individual recognition. Biometric system needed the used of specialised
hardware like fingerprint scanner, palm print scanner, deoxyribonucleic acid instrument and
etc. moreover, this specific machine needed the target to the touch the hardware to amass
knowledge of human distinctive options. Biometric technology is viewed as a standout among
the foremost secure verification system accessible, by giving an additional elevated quantity of
security than typical technique. Face recognition is that the most illustrious technique in
biometric technology besides fingerprint characteristics. this can be because of additional
stability as face contains additional options. Besides, it's thought of extremely secure as face
can't be taken, borrowed or forge so as to enter the house. Face recognition is probably going
the foremost natural approach to perform biometric verification between people. Face detection
is that the opening of the face recognition system.
“The internet is no longer a web that we connect to. Instead, it’s a computerized, networked,
and interconnected world that we live in. This is the future, and what we’re calling the
professional
5|Page
“As the Internet of things advances, the very notion of a clear dividing line between reality
and virtual reality becomes blurred, sometimes in creative ways.” – Geoff Mulgan, Professor
London.
Face photos may be caught at a distance with the utilization of an internet camera. The
individual may be recognized while not physical contact on any special hardware to understand
the person's identity. Face recognition mistreatment deep learning technique is employed. Deep
learning may be a piece of the additional intensive cluster of machine learning strategies
supported learning knowledge representations, as critical taskspecific algorithms. Learning
may be managed, semi-directed or unattended. With the deep learning, the system is improved
from time to time. Some pictures of authorizing user square measure used because the info of
system and therefore the system can train the face recognition mechanically. Thus, the accuracy
is enhanced. Home security is AN example of an online of Things (IoT) applications. IoT refers
to the network of associated physical objects which will act and trade info among themselves
while not the necessity of any human intervening.
IoT may be an artistic movement technology wherever devices and net is interconnected. it's
totally different from the web because of net exceed property by permitting any embedded
circuit to speak with one another mistreatment this internet infrastructure. Little question IoT
helps users to regulate one or additional devices and capabilities to change with several daily
chores. By mistreatment IoT, it will facilitate in dominant the door access and conjointly sent
notification throughout the net. during this system, Blynk apps square measure used. Blynk
apps is AN app that allows United States to regulate the door access by planning the graphical
interface within the apps in step with the precise operate to perform. It conjointly able to send
notification to pc, good phone and different smart devices.
6|Page
2. LITERATURE REVIEW
7|Page
2.2. Method used for face recognition
In this new era, face recognition plays a very important role in security and observation.
Consequently, there's a demand for an expert and cost-efficient system. Face recognition may
be a technique that's ready to determine and verify peoples. in line with face recognition, outline
as steps to spot, distinguish and processed face is compared with the pictures that hold on within
the info to verify World Health Organization the person is. This face recognition has become
a major technique for user identification. There square measure several techniques that may be
used for face recognition however the Principle Part Analysis (PCA) is one in all the foremost
fashionable techniques used for face recognition. This technique involves a mathematical
procedure to remodel variety of presumably correlate variables into variety of unrelated
variables referred to as principle part. Generally, the PCA technique for face recognition can
utilize the employment of Eigenfaces. it's the effective and economical ways that to represent
footage into Eigenfaces part because it will cut back the scale of the info of the take a look at
image. varied technique is developed and deployed so as to boost the performance of face
recognition technology.
8|Page
2.4. Face recognition in raspberry pi
The first analysis on face recognition goes means back in 1950 within the field of science. The
particular work of automatic machine recognition of faces very started in 1970. From all the
analysis done, there 2 varieties of face recognition methodology that area unit the image-based
face recognition and video-based recognition. Video-based face recognition is that the method
of finding 3D pictures from its 2nd whereas the image primarily based recognition
methodology, is that the method by that human train the machine employing a camera by
showing the camera sets of still pictures. A Face Recognition System could be a framework
that consequently acknowledges and to boot, checks the identity of an individual from digital
pictures or a video define from a video supply. several researchers favour to use embedded
device referred to as Raspberry Pi for coaching and identification purpose. the basic reasons
why they need picked this specific part as a result of its high handling limit, low cost, and its
capability adjusts in varied programming modes. By exploitation Raspberry Pi, it helps to
resolve the limitation of laptop like its weight, size and high power consumption. Raspberry Pi
could be a device which will divide the software system half into 3 elements that area unit
recording pictures, coaching and face recognition. consistent with deep learning and residential
security system as they deployed the used of Raspberry Pi for image capturing system, the
system becomes littler, lighter and has lower power utilization. thus it's additional convenient
compared to PC-based face recognition system.
9|Page
3. METHODOLOGY
3.1. Overview
This project can style face recognition for period of time use. it's integrated with IoT to perform
sensible home security system. A deep learning technique is employed during this project. So
as to confirm the expected result ar obtained, many major steps got to be conducted like
information collections, implementing, testing, and troubleshooting. These steps ar accustomed
analyze the information and output. With these steps, this project is in a position to be
evaluated.
10 | P a g e
Figure 1 (a). Numbered and labelled images
11 | P a g e
Since face recognition framework a need large number of images, existing images have been
augmented. This is done by using an algorithm. Each picture per person will augment into 100
pictures, resulting 2500 images stored in database. The images vary in brightness, colour,
intensity, and angle. This is to ensure that face recognition system can detect even in different
conditions. Figure 2 (a) shows the transformation from the original image in the database into
the processed photo. The result of each person categorized into each folder. Next, the cropping
process takes place. This process will crop the exact face from the images. This process is
carried out by using an algorithm. The pixel of each picture is reduced to 48x 48 pixels of
height and width. Figure 2(b) shows extract features by separating the face from the
background.
(a) (b)
12 | P a g e
3.3. Deep learning
Existing design was utilized in the coaching method. pictures were train victimization deep
learning methodology victimization Convolutional Neural Network (CNN) technique. the
present design used is AlexNet that contains eight layers. This design builds with many layer
and activation perform like Convolution, Maxpooling, Flatten, Dense, Activation and Dropout.
the complete neural network approach was enforced in Python language and Keras library. The
coaching involves a hundred epochs initially and perennial with twenty epochs once the testing
part. Figure three can illustrate the coaching method of the dataset.
After coaching method was done image testing is needed to see the accuracy achieved by the
system. during this stage, image that don't seem to be within the information ar used as take a
look at pictures. There ar 10 pictures tested for every tagged that ar recognized and
unrecognized person. every image tested can tagged the image with name or as an unknown.
13 | P a g e
4. RESULT AND ANALYSIS
Face recognition is tested on 2 varieties that square measure by testing image and period of
time to work out the system accuracy. For testing image, there square measure 10 pictures that
don't seem to be within the info square measure tested for every label that square measure
licensed and unknown person. The tested image can have tagged the image with names for
licensed person whereas unknown for unauthorized person. Figure four (a), (b), (c) and (d)
shows the tested image with positive and negative results for licensed and unknown. period of
time face recognition is performed victimisation internet camera. a certified person are often
recognized through the system and the other way around.
The name of the user is going to be shown below their face as shown in Figure five (a) whereas
unauthorized person is shown in Figure five (b).
(a) (b)
(c) (d)
Figure 4. (a) Positive result for authorized (b) Positive result for unknown
(c) Negative result for authorized (d) Negative result for unknown
14 | P a g e
(a) (b)
Figure 6. (a) Notification send through Blynk (b) Video streaming in Blynk
15 | P a g e
Face recognition and IoT are integrate and build in prototype. When person face can be
recognized by the system, the door will open automatically as shown in Figure 4.9. If face
cannot recognize by the system, door will remain closed as illustrated in Figure 7 (a) and (b).
Door access can also be controlled through IoT using Blynk app.
5. CONCLUSION
As a conclusion, security system by using face recognition combined with IoT is successfully
done. The face recognition is able to recognize the face and able to send notification to a user
when an unknown being has been detected through IoT. On the other hand, this project is this
project still has a big room of improvement to be done, especially in the efficiency of the image
processing part. Due to the module used which is Raspberry Pi 3, the processing time of the
coding took a long time so process the image taken and take action. By using another better
module, this project can be improved greatly.
If the person’s face matches, then the python code will pass the output to the Arduino using
serial library and the person will get access of the motorised door.
“If you think that the internet has changed your life, think again. The IoT is
about to change it all over again!” — Brendan O’Brien, Chief Architect & Co-Founder, Aria
Systems.
16 | P a g e
6. REFERENCES
A brief survey of machine learning methods and their sensor and IoT applications-
https://ieeexplore.ieee.org/document/8316459
17 | P a g e