Design And Implementation Of Face Recognition - Based Door Access Control System

Abstract

With recent dramatic development in the field of artificial intelligence (AI), smart access control has become crucial part of our modern everyday lives. This paper presents a door security system designed to prevent trespassing in a highly secure areas like home environment. The implemented system is cheaper and more reliable for intruder detection and door security. The door access is solely based on face recognition to ensure that only authorized individuals go through the door. The principle on which face recognition works is that the sysadmin defines an individual or a group of individuals who are allowed to enter the area, a room or a building, through a door, a gate, or any physical barrier. Thus, the access is limited to these individuals.

Faces of authorized individuals are captured, stored, and trained by the system, and a real-time face is captured and matched against the ones of authorized individuals to identify the individual gaining access through the door after which the access is granted if that individual is authorized and denied otherwise. Haar-based cascade classifier was used for face detection while Local Binary Pattern Histograms (LBPH) algorithm was used for face recognition. 150 faces of individual were captured and trained after which real-time faces were tested on the system to determine the accuracy. The implemented recognition system achieved a recognition or accuracy rate of 88.6%. Notification has been achieved, using Simple Mail Transfer Protocol (SMTP), by sending emails to the sysadmin in case of any successful or unsuccessful attempt to gain access through the door. Python’s Open Source Computer Vision (OpenCV) library was used for face recognition. The implemented system is cheap, user-friendly, and reliable

Chapter One

1.0 INTRODUCTION:

This chapter introduces the Design And Implementation Of Face Recognition – Based Door Access Control System and its relevance, states the research problems, research questions, and objectives, provides a background of the study, and should also include the research hypothesis [INTRO89918]…

Chapter Two: Literature Review

2.0 INTRODUCTION:

This chapter provides the background and context of the research problems, reviews the existing literature on the Design And Implementation Of Face Recognition – Based Door Access Control System, and acknowledges the contributions of scholars who have previously conducted similar research [REV89918] …

Table of Content

Contents
Chapter 1: Introduction
1.2 Background
1.3 Problem Definition
1.4 Objectives
1.5 Scope

Chapter 2: Literature Review and Related Work
2.1 Literature Review
2.2 Related Works

Chapter 2: Design and Methodology
2.1. Design Decisions
2.1.1. Microcontroller
2.1.2 Programming Language

Chapter 3: Implementation
3.1 Face Recognition Module
3.1.1 Face Detection and Data Gathering
3.1.2 Face Recognition
3.1.2.1 Local Binary Pattern Histogram (LBPH) Algorithm
3.1.2.1.1 How it works
3.1.1 Face Detection and Data Gathering
3.2 Buzzer Module
3.3 Door Lock Module
3.4 Notification Module

Chapter 4: Results and Discussion
4.1 Face Recognition
Test 1
Test 2
Test 3
4.1.1 Challenges
4.1.2 Comparison to face recognition system

Chapter 5: Conclusion and Recommendations
Conclusion
Recommendation
References

Document Information

    • Pages: 46 Pages
    • Chapters: 1 – 5 Chapters
    • Words: 8,666 Words
    • Format: DOC/PDF
    • Time: Instant Download
    • Title: Design And Implementation Of Face Recognition – Based Door Access Control System:

YOU MAY LOVE THESE (Recommended)

  • To start a project on Use Of Phonic And Word Recognition Strategies In Improving Poor Reading Skills, follow these guidelines: Education in general also focuses in assisting learners to acquire all the three main domains in life which are the Cognitive, Affective and Psychomotor domains, according to Martin et al (1994). This project investigated whether the phonic method of teaching reading would assist in improving rea…

    DOC/PDF Format Instant Download UPN80404

  • Techniques for writing the “Role Of Commercial Banks In The Face Of A Depressed Economy” Project

    To develop a project on Role Of Commercial Banks In The Face Of A Depressed Economy, follow these approaches: Section 2 of the Bills of Exchange Act 1882 provides that “In this Act, unless the context otherwise requires ‘bankers’ includes a body of person, weather incorporated or not, who carry on the business of banking”. Business of banking according to Hillsburgh’s law of England, ‘is the receipt of m…

    119 Pages 1 - 5 Chapters 14,595 Words DOC/PDF Format Instant Download UPN62227

  • To undertake a project on Problem And Difficulties Being Face By Banks As A Result Of Bank Failure With Specific Reference To Banks, follow these effective ways: The aim of writing this project is to explain the problem and difficulties being face by banks as a result of bank failure with specific reference to banks. To achieve this aim the research work has been classified under five chapters. The first chapter deals with the introduction statement of pr…

    38 Pages 1 - 5 Chapters 4,551 Words DOC/PDF Format Instant Download UPN62190

  • Steps for writing the “Effect Of Poverty And Access To Health Care” Project

    To write a project on Effect Of Poverty And Access To Health Care, follow these structure: People in poor countries tend to have less access to health services than those in better-off countries, and within countries, the poor have less access to health services. This article documents disparities in access to health services in low- and middle-income countries (LMICs), using a framewo…

    47 Pages 1 - 5 Chapters 12,451 Words DOC/PDF Format Instant Download UPN75317

  • To carry out a project on Design And Implementation Of A Smart Door Lock System Using Finger Print, follow these effective methods: Authentication plays a very critical role in security-related applications like e-commerce. There are a number of methods and techniques for accomplishing this key process. In this regard, biometrics is gaining increasing attention these days. Security systems, having realized the value of biomet…

    42 Pages 1 - 5 Chapters 5,726 Words DOC/PDF Format Instant Download UPN64799

  • To start a project on Contributions Of Women Co-Operatives To Women’s Access To Credit, follow these guidelines: This research work was undertaken to examine and analyzed the contribution of women cooperative to women’s access to credit in Nigeria in a selected women cooperative in Umuahia North L.G.A. In this work, a sample of two distinctive cooperative which involve themselves in carrying out some activi…

    62 Pages 1 - 5 Chapters 7,504 Words DOC/PDF Format Instant Download UPN63623

  • Techniques for writing the “Construction Of Two Face Gas Burner” Project

    To develop a project on Construction Of Two Face Gas Burner, follow these approaches: This project which is on the design and fabrication of a two face gas burner is a brief exploration on the various ways and means of designing, construction, operating the two face gas burner, putting cost into consideration for economic advantage. Herein are brief information and literature on g…

    34 Pages 1 - 7 Chapters 3,433 Words DOC/PDF Format Instant Download UPN63383

  • To undertake a project on Construction Of A Microcontroller Based Security Door Using Smart Card, follow these effective ways: This project shows the construction of a microcontroller based security door using smart card. It is aimed towards programming the microcontroller to control the hardware in sliding door. The system consists of a microcontroller 89S52 which sends a signal to the multiplexers on insertion of the s…

    80 Pages 1 - 5 Chapters 9,221 Words DOC/PDF Format Instant Download UPN63951

  • Steps for writing the “Cloud-Based Access Control” Project

    To write a project on Cloud-Based Access Control, follow these structure: Access control system is a system that manages access through the authorization or revocation of rights to physical or logical assets within an organization or a practice of restricting entrance to a property, building, or room to authorized persons. Cloud based security services are migrating fr…

    43 Pages 1 - 5 Chapters 6,513 Words DOC/PDF Format Instant Download UPN64459

  • To carry out a project on Biology Teacher Access And Utilization Of Virtual Laboratory In Secondary Schools, follow these effective methods: This study was carried out to to assess Biology teachers’ access and utilization of virtual laboratory in secondary schools in Okene local government area. The study was specifically carried out tofind out the perception of Biology teachers on access and utilization of virtual laboratory in secon…

    65 Pages 1 - 5 Chapters 1,389 Words DOC/PDF Format Instant Download UPN78766

Live Chat