Design And Modifications Of An Existing Automatic Door Opener Using Facial Recognition And Fingerprint

This research work on “Design And Modifications Of An Existing Automatic Door Opener Using Facial Recognition And Fingerprint” is available in PDF/DOC. Click the below button to request or download the complete material

Overview

ABSTRACT

Most doors are controlled by persons with the use of keys, security cards, password or pattern to open the door. The aim of this paper is to help users for improvement of the door security of sensitive locations by using face detection and recognition. Face is a complex multidimensional structure and needs good computing techniques for detection and recognition. This paper is comprised mainly of three subsystems: namely face detection, face recognition, fingerprint and automatic door access control. Face detection is the process of detecting the region of face in an image. The face is detected by using the viola jones method and face recognition is implemented by using the Principal Component Analysis (PCA). Face Recognition based on PCA is generally referred to as the use of Eigenfaces. If a face is recognized, it is known, else it is unknown, and it also utilizes fingerprint recognition technology to allow access. It contains all the necessary electronics to allow you to store, delete, and verify fingerprints with just the touch of a button. The door will open automatically for the known person due to the command of the microcontroller. On the other hand, alarm will ring for the unknown person. Since PCA reduces the dimensions of face images without losing important features, facial images for many persons can be stored in the database. Although many training images are used, computational efficiency cannot be decreased significantly. Therefore, face recognition using PCA can be more useful for door security system than other face recognition schemes.

TABLE OF CONTENTS

COVER PAGE

TITLE PAGE

APPROVAL PAGE

DEDICATION

ACKNOWELDGEMENT

ABSTRACT

CHAPTER ONE

  • INTRODUCTION
  • BACKGROUND OF THE PROJECT
  • PROBLEM STATEMENT
  • AIM AND OBJECTIVE OF THE PROJECT
  • SCOPE OF THE PROJECT
  • SIGNIFICANCE OF THE PROJECT
  • PROJECT JUSTIFICATION
  • APPLICATION OF THE PROJECT
  • PROBLEM OF THE PROJECT
  • LIMITATION OF THE PROJECT
  • METHODOLOGY
  • PROJECT ORGANISATION

CHAPTER TWO

LITERATURE REVIEW

  • REVIEW OF FINGER PRINT
  • THE HISTORICAL BACKGROUND OF FINGERPRINTS
  • FINGERPRINT RECOGNITION
  • PATTERNS OF FINGERPRINT
  • FACIAL RECOGNITION ACCESS CONTROL
  • COVID-19 AND FACE RECOGNITION
  • BENEFITS OF FACE RECOGNITION ACCESS CONTROL
  • FACE RECOGNITION ACCESS: HARDWARE AND EQUIPMENT
  • TYPES OF BIOMETRIC ACCESS

CHAPTER THREE

METHODOLOGY

  • SYSTEM BLOCK DIAGRAM
  • METHOD USED
  • HARDWARE DESIGN
  • IMPLEMENTATION
  • SYSTEM FLOWCHAT

CHAPTER FOUR

4.0      SIMULATION TESTS AND RESULTS

  • HARDWARE RESULTS

CHAPTER FIVE

  • DISCUSSIONS AND CONCLUSIONS
  • REFERENCES

CHAPTER ONE

1.0                                                             INTRODUCTION

1.1                                               BACKGROUND OF THE STUDY

Nowadays, automatic personal identification in access control has become popular by using biometrics data instead of using cards, passwords or pattern. Most of the biometrics data have to be collected by using special hardware such as fingerprint scanner, palm print scanner, DNA analyzer. And, the target objects have to touch with the required hardware in the stage of data collection. The advantage of this system is that face recognition does not require to be touched with any hardware. Face is detected automatically by using face detection technique and the entire face recognition is completed without touching with any hardware. Face detection is the first step of the face recognition system. The performance of the entire face recognition system is influenced by the reliability of the face detection. By using face detection, it can identify only the facial part of an image regardless of the background of this image. In this system, Viola-Jones face detection method is used. Viola-Jonesre scale the detector instead of the input image and run the detector many times through the image – each time with a different size. Viola-Jones have devised a scale invariant detector that requires the same number of calculations whatever the size. This detector is constructed using a so-called integral image and some simple rectangular features reminiscent of Haar wavelets [Paul Viola, 2014]. Face recognition commonly includes feature extraction, feature reduction and recognition or classification.PCA is an effective feature extraction method based on face as a global feature. It reduces the dimension of images effectively and holds the primary information at the same time. In this paper, face recognition system is implemented using PCA algorithm. Recognition or classification is done by the measure method such as Euclidean distance, which is used to classify the feature of images present in the database and test image. [Ayushi Gupta, 2014].

Fingerprint based security access control and time attendance systems are used for all kinds of office and service sector operations in the day today environment. Fingerprint System based access control is more secured as compared to the conventional swipe card or ID cards because of the exclusive fingerprint for every entity (according to Engert, Gerald J., 1964).

Fingerprint Security Systems have fascinated people for centuries. They have been used as a method of personal identification since ancient times. The two key aspects of most of the Fingerprint System biometric solutions are Finger Print identification and authentication. The process of identification tells you who an individual is, or in the negative sense tells you who they are not. Fingerprints Security is examined using two different sets of criteria. One way of looking at Fingerprint Security System is using their “Class Characteristics”.

Finger Print Security Systems can be used to get rid of so many issues such as Physical Access Control, Health care Biometrics, Fingerprint and Biometrics Locks, Biometric Sensors and Detectors, RFID Tags (Johnson, P. Lee 1973).

1.2                                                               PROBLEM STATEMENT

Due to higher level of spreading of diseases such as corona virus which according to world health organization (WHO) can be contacted by making contact with door knob which is the only way of opening and closing conventional door. Face recognition access control has quickly become the emerging technology in physical access due to a shift towards health-conscious solutions that also offer incredible security. Now, face recognition is creating the same secure and convenient access to our physical spaces.  It’s a secure and convenient form of access to our information.

1.3                          AIM AND OBJECTIVES OF THE PROJECT

The main aim of this project is to create a comfort in the minds of house owners when they out from their premises without much fear of intruder. The objectives of the study are:

  1. To modify an existing automatic door
  2. To have an improved way of securing our environment
  • To construct a secure access control system to control the entry of various items through a door or a passage using a face recognition and fingerprint technology
  1. To design architecture that constitutes the various components working
  2. To recognize the detected faces and fingers by the use of a suitable
  3. To reduce human labour involves in guiding our environment
  • Replace the traditional door lock system which is using mechanical lock and key mechanism with embedded system.
  • To produce a security system that will be simple in its operation, cost effective, durable and easily maintainable.
  1. To ensures maximum and adequate security in our home and offices.

1.4                                                                 SCOPE OF THE STUDY

In this system, face detection and recognition are implemented by using MATLAB installed on PC. USB to RS232 converter is used as the interface between the PC and 16F887 microcontroller. Edge sensors are used to switch off the motor if the door reaches one of its two end positions. This switching mainly works with an algorithm which is loaded in microcontroller and on the basis of serial port data which is sent by PC after verifying the face. This device also utilizes fingerprint recognition technology to allow access to only those whose fingerprints you choose. It contains all the necessary electronics to allow you to store, delete, and verify fingerprints with just the touch of a button. Stored fingerprints are retained even in the event of complete power failure or battery drain. These eliminates the need for keeping track of keys or remembering a combination password, or PIN. It can only be opened when an authorized user is present, since there are no keys or combinations to be copied or stolen, or locks that can be picked

1.5                                      SIGNIFICANCE OF THE PROJECT

This system offers its clients with simple, efficiently manageable software that provides a platform to maintain absolute security.

1.6                                                PROJECT JUSTIFICATION

This project serves to automate the prevalent traditional tedious and time wasting methods of opening and closing our doors. The use of automatic face detection and fingerprint will increase the effectiveness of door security.

Applications of face recognition are widely spreading in areas such as criminal identification, security systems, image and film processing [M. A. Turk, 2011]. The system could also find applications in all authorized access facilities.

1.7                                          APPLICATION OF THE PROJECT

Apart from using this device for home door access control, this device can also be used for places like:

  1. Organisation
  2. Offices

1.8                                              PROBLEM OF THE PROJECT

  1. It can only detect face from a limited distance.
  2. It cannot repeat live video to recognize missed faces.

   1.9                                                      LIMITATION OF THE PROJECT

As we all know that no human effort to achieve a set of goals goes without difficulties, certain constraints were encountered in the course of carrying out this project and they are as follows:-

  1. Difficulty in information collection: I found it too difficult in laying hands of useful information regarding this work and this course me to visit different libraries and internet for solution.
  2. Difficulty in parts gathering: I found it too difficult when gathering electronics parts used for the prototype.

1.10                                   PROJECT ORGANISATION

The work is organized as follows: chapter one discuses the introductory part of the work,   chapter two presents the literature review of the study,  chapter three describes the methods applied, chapter four discusses the results of the work, chapter five summarizes the research outcomes and the recommendations.