Smart Home Authentication and Security with IoT using Face Recognition
P. Gopi Krishna1, P. Sai Phani Kumar2, K Sreenivasa Ravi3, M. Divya Sravanthi4, N. Likhitha5

1Mr P. Gopi Krishna, Assistant Professor, Department of Electronics and Computer Engineering, Koneru Lakshmaiah Education Foundation, Guntur, (Andhra Pradesh), India.
2P Sai Phani Kumar, UG Student, Department of Electronics and Computer Engineering, KoneruLakshmaiah Education Foundation, Guntur, (Andhra Pradesh), India.
3Dr. K Sreenivasa Ravi, Professor, Department of ECE, Narasaraopet, Guntur, (Andhra Pradesh), India.
4M. Divya Sravanthi, Department of ECE, Narasaraopet, Guntur, (Andhra Pradesh), India.
5N. Likhitha, Department of ECE, Narasaraopet, Guntur, (Andhra Pradesh), India.

Manuscript received on 23 March 2019 | Revised Manuscript received on 30 March 2019 | Manuscript published on 30 March 2019 | PP: 705-709 | Volume-7 Issue-6, March 2019 | Retrieval Number: F2768037619/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In presences of external intruder attack access to the system can be provided to know person through IoT by using face recognition. Identification of physical object for authenticating object’s identity controlling, providing the access. Here human face is used as input and identical for the system. And also, the devices, When the person caught to the camera it will capture the image of that person and compared in the database. if the person is not in the data base the captured image will send to the remote user(owner) through internet, the owner checks the image of the person if they know and give the authentication for allowing from the mobile application. The image is also saved in the database for future reference. The parallel matching mechanism internet dependent. framework can be efficiently resolve face image. This implementation can be mapped for the various application domains like Home automations, Security, Intensive care units etc. Raspberry pi is used as the storage and processing element in the proposed systems.
Keywords: Authentication, Security, Face Recognization, Internet of Things (IoT).
Scope of the Article: IoT