Physiological Traits (Face Recognition) Based Door Lock
Shashank Gutgutia1, Shubham Shukla2, Sardar Shubhjeet Singh3
1Shashank Gutgutia, Student, Bachelor of Technology (BTech), School of Computer Science & Engineering, Vellore Institute of Technology, Vellore, India.
2Shubham Shukla, Student, Bachelor of Technology (BTech), School of Computer Science & Engineering, Vellore Institute of Technology, Vellore, India.
3Sardar Shubhjeet Singh, Student, Bachelor of Technology (BTech), School of Computer Science & Engineering, Vellore Institute of Technology, Vellore, India.
Manuscript received on November 12, 2019. | Revised Manuscript received on November 25, 2019. | Manuscript published on 30 November, 2019. | PP: 5808-5812 | Volume-8 Issue-4, November 2019. | Retrieval Number: D8625118419/2019©BEIESP | DOI: 10.35940/ijrte.D8625.118419
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Security is now a prime concern for any individual in modern days. Theever-increasing graph of technological advancement in the field of Internet of things and other arenas have paved way for new development of smart web-based locking system which is based on face recognition for authentication. The proposed system uses a feature similar to Haar for the purpose of face detection and also Local Binary Pattern Histogram (LBPH). The project also extends its usability by sending live image of the guest which arrives and can even send a notification on the phone to the owner. The proposed system can be embedded along with other technologies to form a smart housing. The implementation of the project is done using Arduino board, python for programming, Open CV library is also included, and the hardware component also includes camera module for face recognition.
Keywords: Haar, Image, Interaction, Pattern, Security
Scope of the Article: Big Data Security.