SlideShare ist ein Scribd-Unternehmen logo
1 von 13
1
Project Report
CSE 3200: System Development Project
Face Recognition Home Security System
Project Team
Sourav Mandol (Roll - 1607044)
Sumon Mia (Roll - 1607045)
Supervised by
Dr. Sk. Mohammad Masudul Ahsan
Professor
Dept. of Computer Science and Engineering
Khulna University of Engineering & Technology
2
INTRODUCTION
Background:
Face recognition is a biometric technology that goes beyond just detecting human faces in an
image or video. It goes a bit further to determine whose face it is. A face recognition system
works by taking an image of a face and predicting whether the face matches another face stored
in a dataset (or whether a face in one image matches a face in another).
Face Recognition home security system is a security system that detects a face whether the guy is
known or unknown. After detecting the person, it will open the door or unlock any security.
PURPOSE
High Accuracy Rates:
Most face recognition software being used in smart home locks can accurately determine
whether the person trying to gain access to a home matches the database of people who have
been authorized to enter. That said, some software programs are more accurate than others,
especially when it comes to detecting faces from various angles and recognizing faces of
different nationalities.
Automation:
Once you’ve set up your smart home security system and granted access to the people you want
to allow into your home, the system will automatically let those people in when it detects a
match. No need for you to answer the doorbell, or to respond to a request to enter.
Facial recognition technology is here to stay, and will only get better with time and also better
from biometric verification.
Faster processing:
The process of recognizing a face takes a second or less — and this is incredibly beneficial for
the companies. In the era of constant cyber attacks and advanced hacking tools, companies need
a technology that would be both secure and fast.
3
OBJECTIVES
i. To developing an locking system based on face recognition
ii. Security
iii. IOT based project
iv. User Friendly Interface connecting with Security
v. Detect as many faces as possible in the training images
vi. Minimum detection of non-process and Multiple detects
vii. To Digitalize Home and Office
viii. Image Acquisition
Design (Data Flow Diagram)
Fig (1:) Flow Chart of Face Detection Home Security System
4
METHODOLOGY
Fig (2): Block Diagram of Methodology of Face Recognition
In this project we need four types of files for detecting and recognizing face from our dataset
.These are the files-.
1. encode_faces.py: This file will find faces in our dataset and encode them into 128-d
vectors.
2. encodings.pickle : Our face encodings (128-d vectors, one for each face) are stored in this
pickle file.
3. haarcascade_frontalface_default.xml: In order to detect and localize faces in frames we
rely on OpenCV’s pre-trained Haar cascade file.
4. pi_face_recognition.py: This is our main execution script. We’re going to review it later
in this post so you understand the code and what’s going on under the hood.
5
Fig (3): Block diagram of computing face recognition embedding
Face detection performance is a key issue, so techniques for dealing with non‐ frontal face
detection are discussed. Subspace modeling and learning‐ based dimension reduction methods
are fundamental to many current face recognition techniques. Face recognition has merits of both
high accuracy and low intrusive, so it has drawn the attention of the researches in various fields
from psychology, image processing to computer vision.
Implementation
For implementing this project we need some equipment. These are given below:
Hardware
1. Web cam/pi camera
2. Mouse and keyboard joined with
the respected operating system
Software
1)Anaconda Environment 2)Open_CV 7)Dependencies libraries for Face_recognition
3)Pyqt5 (designer) 4)Tesnsor Flow 8)Camera module
5)python IDLE 6)Skew Learn libra
6
Dataset Training Method: we have used a deep neural network to compute a 128-d vector
that will quantify each face in the dataset. From a fixed path (for our project it is
face_data/member name) we gather images and then we’ll detect vector points and stored them
in encodings.pickle file.
After training our machine successfully we have used these points for detecting our known faces.
Face Detecting Method: In order to detect and localize faces in frames we have relied on
OpenCv’s pre trained Haar Cascade file located in our directory file.
Liveness detecting Method: First of all we will input an image or video to our project
pipeline. Then we have detected the liveness of our input from our own train CNN. If the input
image in real, then the project will try to recognize the face from our own made dataset.
Fig (4):Block diagram of detecting liveness
Summary of implementation:
We have applied haar cascade to find/detect the face object and applied face detection to
recognize face in the image after detecting the liveness of the images. Optionally, we can
compute facial landmarks, enabling us to preprocess and align the face.
Face alignment, as the name suggests, is the process of (1) identifying the geometric structure of
the faces and (2) attempting to obtain a canonical alignment of the face based on translation,
rotation, and scale.
7
While optional, face alignment has been demonstrated to increase face recognition accuracy in
some pipelines.
Fig (5): How the deep learning face recognition model computes the face embedding.
We apply here deep learning and OpenCV together:
i. Detect faces
ii. Compute 128-d face embeddings to quantify a face
iii. Train a Support Vector Machine (SVM) on top of the embeddings
iv. Detecting faces’ liveness and recognizing faces in images and video streams
v. All of these tasks will be accomplished with OpenCV, enabling us to obtain a “pure” OpenCV
face recognition pipeline.
Graphical User Interface (GUI)
The user interface has all the options needed for the administration and other debugging purpose
so that, we do not need to edit code for any management.
8
Fig (6): Home Window Fig (7): Security Window
After Clicking ‘Security or Press Ctrl+A’ from Home window, then security window will
open. Click ‘Start’ from security panel, then it will open a camera window which recognizes
faces. If the face is in dataset, then it will show his/her name, else show unknown on his/her face.
Fig(8): Recognized Faces Fig(9): Admin Panel (Login)
9
Fig (10): Admin Section (Fully Accessible for Admin) Fig (11): Add member
To entering the admin section, need a valid password .If the password is wrong, it will show
wrong password else it will go to new admin page where admin can add any member, rename
any member if the person exists in database nor it will show “Member Not Found”.
Fig (11): Remove Member Fig (12): Password Change
Admin can remove any member from database and also can change user password.
10
Fig (13): Rename Member
Fig (15): About Window Fig (16): Help Window
A user friendly graphical interface is design for this system. Any user can easily use this system
without any trouble. To make this interface, we used designer from pyqt5.A major advantage of
GUIs is that they make computer operation more intuitive, and thus easier to learn and use.
11
Key and Actions
Key Action
Ctrl+A Admin Panel
Ctrl+S Security Panel
Ctrl+P Password Change Panel
Ctrl+U Help Panel
Ctrl+E Exit
shoot Picture Capture
Q Capture Window Exit
Associative Courses:
1. CSE 1102: Computer Basics & Programming Laboratory
2. CSE 2101: Data Structures & Algorithms
3. CSE 3119: Software Engineering & Information System
4. CSE 3104: Peripheral and Interfacing Laboratory
Conclusion and Recommendation
Challenges:
The designed algorithm was effectively able to detect the different type of faces specified on this
project and recognize those faces which are known or unknown. The system is able to detect an
object in both high and low light. The system has completely user friendly graphical interface
(GUI). Every customer can able to use this system so easily even this customer don’t know how
to use computer can able to user this. The system has more efficiency because it detects a
customer within six (6) images putting on the dataset. Its accuracy is almost 90%. If an
eyeglasses person is trained in system, the system can recognize his faces.
Limitations
If bright light appears behind object, the system takes some times to detect it but when the
system detects the faces it’s easily recognize it. We also use liveness detection to make the
security more strong. But livesness detection isn’t as strong as we want. But for average security,
it works well. A person who put eyeglass in front camera but who is already trained without
eyeglass, the system is slow to recognize him.
12
Future Activities
In future, this system will be more fast and accurate. Liveness detection will be stronger and
perfectly recognize real or fake person. Also, face will easily detect doesn’t matter the person
will put eyeglasses or not in future. In every light combination, the system is able recognize
object face accurately.
References
[1] ‘Design of face detection and recognition system for smart home security application’ ,
by Dwi Ana Ratna Wati , Dika Abadianto,Department of Electrical Engineering, Universitas
Islam Indonesia, Yogyakarta, Indonesia.
[2]’ Facial recognition system’ by http://www.pyimagesearch
[3] ‘Face Recognition System and It's Application’, by Xuehong Tian Published in: 2009
First International Conference on Information Science and Engineering
[4] ‘Research on Face Recognition Based on Embedded System’, by Hong Zhao, Xi-Jun
Liang, and Peng Yang,School of Computer and Communication, Lanzhou University of
Technology, Lanzhou 730050, China
13
[5] ‘Image-based Face Detection and Recognition:“State of the Art” ’,by Faizan Ahmad,
Aaima Najam and Zeeshan Ahmed,Department of Computer Science & Engineering,
Beijing University of Aeronautics & Astronautics.

Weitere ähnliche Inhalte

Was ist angesagt?

Facial powerpoint
Facial powerpointFacial powerpoint
Facial powerpoint
12202843
 
Face recognition
Face recognitionFace recognition
Face recognition
bharath55
 
Project Face Detection
Project Face Detection Project Face Detection
Project Face Detection
Abu Saleh Musa
 

Was ist angesagt? (20)

Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/Technology
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system ppt
 
Face mask detection
Face mask detection Face mask detection
Face mask detection
 
Face Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaFace Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun Sharma
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face recognization using artificial nerual network
Face recognization using artificial nerual networkFace recognization using artificial nerual network
Face recognization using artificial nerual network
 
Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection System
 
Automated attendance system using Face recognition
Automated attendance system using Face recognitionAutomated attendance system using Face recognition
Automated attendance system using Face recognition
 
Criminal Detection System
Criminal Detection SystemCriminal Detection System
Criminal Detection System
 
Facial powerpoint
Facial powerpointFacial powerpoint
Facial powerpoint
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by Rohit
 
Computer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and PythonComputer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and Python
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
Face detection presentation slide
Face detection  presentation slideFace detection  presentation slide
Face detection presentation slide
 
IRJET- Automated Attendance System using Face Recognition
IRJET-  	  Automated Attendance System using Face RecognitionIRJET-  	  Automated Attendance System using Face Recognition
IRJET- Automated Attendance System using Face Recognition
 
Project Face Detection
Project Face Detection Project Face Detection
Project Face Detection
 

Ähnlich wie Face Recognition Home Security System

Real time face recognition of video surveillance system using haar cascade c...
Real time face recognition of video surveillance system using  haar cascade c...Real time face recognition of video surveillance system using  haar cascade c...
Real time face recognition of video surveillance system using haar cascade c...
nooriasukmaningtyas
 
Human Face Identification
Human Face IdentificationHuman Face Identification
Human Face Identification
bhupesh lahare
 

Ähnlich wie Face Recognition Home Security System (20)

Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCV
 
Face Mask Detection and Face Recognition Using Machine Learning
Face Mask Detection and Face Recognition Using Machine LearningFace Mask Detection and Face Recognition Using Machine Learning
Face Mask Detection and Face Recognition Using Machine Learning
 
A guide to Face Detection in Python.pdf
A guide to Face Detection in Python.pdfA guide to Face Detection in Python.pdf
A guide to Face Detection in Python.pdf
 
A Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face DetectionA Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face Detection
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition application
 
Real time face recognition of video surveillance system using haar cascade c...
Real time face recognition of video surveillance system using  haar cascade c...Real time face recognition of video surveillance system using  haar cascade c...
Real time face recognition of video surveillance system using haar cascade c...
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition System
 
Human Face Identification
Human Face IdentificationHuman Face Identification
Human Face Identification
 
Facial Recognition System For Access Control
Facial Recognition System For Access ControlFacial Recognition System For Access Control
Facial Recognition System For Access Control
 
Facial Recognition Door unlock using Machine Learning.
Facial Recognition Door unlock using Machine Learning.Facial Recognition Door unlock using Machine Learning.
Facial Recognition Door unlock using Machine Learning.
 
IRJET - Face Recognition Door Lock using IoT
IRJET - Face Recognition Door Lock using IoTIRJET - Face Recognition Door Lock using IoT
IRJET - Face Recognition Door Lock using IoT
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face Identification
 
best pharma journals
best pharma journals best pharma journals
best pharma journals
 
Face Scope.pptx
Face Scope.pptxFace Scope.pptx
Face Scope.pptx
 
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric Learning
 
Face Recognition Based Payment Processing System
Face Recognition Based Payment Processing SystemFace Recognition Based Payment Processing System
Face Recognition Based Payment Processing System
 
Face Recognition System using OpenCV
Face Recognition System using OpenCVFace Recognition System using OpenCV
Face Recognition System using OpenCV
 
Smart Surveillance System through Computer Vision
Smart Surveillance System through Computer VisionSmart Surveillance System through Computer Vision
Smart Surveillance System through Computer Vision
 
3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security Applications3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security Applications
 
Review on Arduino-Based Face Mask Detection System
Review on Arduino-Based Face Mask Detection SystemReview on Arduino-Based Face Mask Detection System
Review on Arduino-Based Face Mask Detection System
 

Mehr von Suman Mia

Mehr von Suman Mia (20)

Computer Network Topology By Team_Initiator (Dept . of Sociology)
Computer Network Topology By Team_Initiator (Dept . of Sociology)Computer Network Topology By Team_Initiator (Dept . of Sociology)
Computer Network Topology By Team_Initiator (Dept . of Sociology)
 
Computer Network Topology By Team_Diversity Detectives (Dept . of Sociology)
Computer Network Topology By Team_Diversity Detectives (Dept . of Sociology)Computer Network Topology By Team_Diversity Detectives (Dept . of Sociology)
Computer Network Topology By Team_Diversity Detectives (Dept . of Sociology)
 
Computer Network Topology By Team_Societal Explorers (Dept . of Sociology)
Computer Network Topology By Team_Societal Explorers (Dept . of Sociology)Computer Network Topology By Team_Societal Explorers (Dept . of Sociology)
Computer Network Topology By Team_Societal Explorers (Dept . of Sociology)
 
Computer Network Topology By Team_Social Dynamic Squad (Dept . of Sociology)
Computer Network Topology By Team_Social Dynamic Squad (Dept . of Sociology)Computer Network Topology By Team_Social Dynamic Squad (Dept . of Sociology)
Computer Network Topology By Team_Social Dynamic Squad (Dept . of Sociology)
 
Computer Network Topology By Team_Inclusion Inquiry Initiative (Dept . of Soc...
Computer Network Topology By Team_Inclusion Inquiry Initiative (Dept . of Soc...Computer Network Topology By Team_Inclusion Inquiry Initiative (Dept . of Soc...
Computer Network Topology By Team_Inclusion Inquiry Initiative (Dept . of Soc...
 
Computer Network Topology By Team_Culture Crusade (Dept . of Sociology)
Computer Network Topology By Team_Culture Crusade (Dept . of Sociology)Computer Network Topology By Team_Culture Crusade (Dept . of Sociology)
Computer Network Topology By Team_Culture Crusade (Dept . of Sociology)
 
Computer Network Topology By Team_Community Connectors (Dept . of Sociology)
Computer Network Topology By Team_Community Connectors (Dept . of Sociology)Computer Network Topology By Team_Community Connectors (Dept . of Sociology)
Computer Network Topology By Team_Community Connectors (Dept . of Sociology)
 
Computer Network Topology By Team_Empowerment Ensemble (Dept . of Sociology)
Computer Network Topology By Team_Empowerment Ensemble (Dept . of Sociology)Computer Network Topology By Team_Empowerment Ensemble (Dept . of Sociology)
Computer Network Topology By Team_Empowerment Ensemble (Dept . of Sociology)
 
Computer Network Topology By Team_Venus(Dept. English)
Computer Network Topology By Team_Venus(Dept. English)Computer Network Topology By Team_Venus(Dept. English)
Computer Network Topology By Team_Venus(Dept. English)
 
Computer Network Topology By Team_Triangle(Dept. English)
Computer Network Topology By Team_Triangle(Dept. English)Computer Network Topology By Team_Triangle(Dept. English)
Computer Network Topology By Team_Triangle(Dept. English)
 
Computer Network Topology By Team_Royal (Dept. English)
Computer Network Topology By Team_Royal (Dept. English)Computer Network Topology By Team_Royal (Dept. English)
Computer Network Topology By Team_Royal (Dept. English)
 
Computer Network Topology By Team_Sanam (Dept. English)
Computer Network Topology By Team_Sanam (Dept. English)Computer Network Topology By Team_Sanam (Dept. English)
Computer Network Topology By Team_Sanam (Dept. English)
 
Computer Network Topology By Team_Purple (Dept. English)
Computer Network Topology By Team_Purple (Dept. English)Computer Network Topology By Team_Purple (Dept. English)
Computer Network Topology By Team_Purple (Dept. English)
 
Computer Network Topology By Team_ Paramount (Dept. English)
Computer Network Topology By Team_ Paramount (Dept. English)Computer Network Topology By Team_ Paramount (Dept. English)
Computer Network Topology By Team_ Paramount (Dept. English)
 
Computer Network Topology By Team_Metrolife(Dept. English)
Computer Network Topology By Team_Metrolife(Dept. English)Computer Network Topology By Team_Metrolife(Dept. English)
Computer Network Topology By Team_Metrolife(Dept. English)
 
Computer Network Topology By Team_Meghna (Dept. English)
Computer Network Topology By Team_Meghna (Dept. English)Computer Network Topology By Team_Meghna (Dept. English)
Computer Network Topology By Team_Meghna (Dept. English)
 
Computer Network Topology By Team_Jamuna (Dept. English)
Computer Network Topology By Team_Jamuna (Dept. English)Computer Network Topology By Team_Jamuna (Dept. English)
Computer Network Topology By Team_Jamuna (Dept. English)
 
Computer Network Topology By Team_CSK (Dept. English)
Computer Network Topology By Team_CSK (Dept. English)Computer Network Topology By Team_CSK (Dept. English)
Computer Network Topology By Team_CSK (Dept. English)
 
COmputer Network Topology By Team Gemini
COmputer Network Topology By Team GeminiCOmputer Network Topology By Team Gemini
COmputer Network Topology By Team Gemini
 
Software Development Life Cycle(SDLC) By Team Hunter (Dept. of Pharmacy)
Software Development Life Cycle(SDLC) By Team Hunter (Dept. of Pharmacy)Software Development Life Cycle(SDLC) By Team Hunter (Dept. of Pharmacy)
Software Development Life Cycle(SDLC) By Team Hunter (Dept. of Pharmacy)
 

Kürzlich hochgeladen

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 

Kürzlich hochgeladen (20)

Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 

Face Recognition Home Security System

  • 1. 1 Project Report CSE 3200: System Development Project Face Recognition Home Security System Project Team Sourav Mandol (Roll - 1607044) Sumon Mia (Roll - 1607045) Supervised by Dr. Sk. Mohammad Masudul Ahsan Professor Dept. of Computer Science and Engineering Khulna University of Engineering & Technology
  • 2. 2 INTRODUCTION Background: Face recognition is a biometric technology that goes beyond just detecting human faces in an image or video. It goes a bit further to determine whose face it is. A face recognition system works by taking an image of a face and predicting whether the face matches another face stored in a dataset (or whether a face in one image matches a face in another). Face Recognition home security system is a security system that detects a face whether the guy is known or unknown. After detecting the person, it will open the door or unlock any security. PURPOSE High Accuracy Rates: Most face recognition software being used in smart home locks can accurately determine whether the person trying to gain access to a home matches the database of people who have been authorized to enter. That said, some software programs are more accurate than others, especially when it comes to detecting faces from various angles and recognizing faces of different nationalities. Automation: Once you’ve set up your smart home security system and granted access to the people you want to allow into your home, the system will automatically let those people in when it detects a match. No need for you to answer the doorbell, or to respond to a request to enter. Facial recognition technology is here to stay, and will only get better with time and also better from biometric verification. Faster processing: The process of recognizing a face takes a second or less — and this is incredibly beneficial for the companies. In the era of constant cyber attacks and advanced hacking tools, companies need a technology that would be both secure and fast.
  • 3. 3 OBJECTIVES i. To developing an locking system based on face recognition ii. Security iii. IOT based project iv. User Friendly Interface connecting with Security v. Detect as many faces as possible in the training images vi. Minimum detection of non-process and Multiple detects vii. To Digitalize Home and Office viii. Image Acquisition Design (Data Flow Diagram) Fig (1:) Flow Chart of Face Detection Home Security System
  • 4. 4 METHODOLOGY Fig (2): Block Diagram of Methodology of Face Recognition In this project we need four types of files for detecting and recognizing face from our dataset .These are the files-. 1. encode_faces.py: This file will find faces in our dataset and encode them into 128-d vectors. 2. encodings.pickle : Our face encodings (128-d vectors, one for each face) are stored in this pickle file. 3. haarcascade_frontalface_default.xml: In order to detect and localize faces in frames we rely on OpenCV’s pre-trained Haar cascade file. 4. pi_face_recognition.py: This is our main execution script. We’re going to review it later in this post so you understand the code and what’s going on under the hood.
  • 5. 5 Fig (3): Block diagram of computing face recognition embedding Face detection performance is a key issue, so techniques for dealing with non‐ frontal face detection are discussed. Subspace modeling and learning‐ based dimension reduction methods are fundamental to many current face recognition techniques. Face recognition has merits of both high accuracy and low intrusive, so it has drawn the attention of the researches in various fields from psychology, image processing to computer vision. Implementation For implementing this project we need some equipment. These are given below: Hardware 1. Web cam/pi camera 2. Mouse and keyboard joined with the respected operating system Software 1)Anaconda Environment 2)Open_CV 7)Dependencies libraries for Face_recognition 3)Pyqt5 (designer) 4)Tesnsor Flow 8)Camera module 5)python IDLE 6)Skew Learn libra
  • 6. 6 Dataset Training Method: we have used a deep neural network to compute a 128-d vector that will quantify each face in the dataset. From a fixed path (for our project it is face_data/member name) we gather images and then we’ll detect vector points and stored them in encodings.pickle file. After training our machine successfully we have used these points for detecting our known faces. Face Detecting Method: In order to detect and localize faces in frames we have relied on OpenCv’s pre trained Haar Cascade file located in our directory file. Liveness detecting Method: First of all we will input an image or video to our project pipeline. Then we have detected the liveness of our input from our own train CNN. If the input image in real, then the project will try to recognize the face from our own made dataset. Fig (4):Block diagram of detecting liveness Summary of implementation: We have applied haar cascade to find/detect the face object and applied face detection to recognize face in the image after detecting the liveness of the images. Optionally, we can compute facial landmarks, enabling us to preprocess and align the face. Face alignment, as the name suggests, is the process of (1) identifying the geometric structure of the faces and (2) attempting to obtain a canonical alignment of the face based on translation, rotation, and scale.
  • 7. 7 While optional, face alignment has been demonstrated to increase face recognition accuracy in some pipelines. Fig (5): How the deep learning face recognition model computes the face embedding. We apply here deep learning and OpenCV together: i. Detect faces ii. Compute 128-d face embeddings to quantify a face iii. Train a Support Vector Machine (SVM) on top of the embeddings iv. Detecting faces’ liveness and recognizing faces in images and video streams v. All of these tasks will be accomplished with OpenCV, enabling us to obtain a “pure” OpenCV face recognition pipeline. Graphical User Interface (GUI) The user interface has all the options needed for the administration and other debugging purpose so that, we do not need to edit code for any management.
  • 8. 8 Fig (6): Home Window Fig (7): Security Window After Clicking ‘Security or Press Ctrl+A’ from Home window, then security window will open. Click ‘Start’ from security panel, then it will open a camera window which recognizes faces. If the face is in dataset, then it will show his/her name, else show unknown on his/her face. Fig(8): Recognized Faces Fig(9): Admin Panel (Login)
  • 9. 9 Fig (10): Admin Section (Fully Accessible for Admin) Fig (11): Add member To entering the admin section, need a valid password .If the password is wrong, it will show wrong password else it will go to new admin page where admin can add any member, rename any member if the person exists in database nor it will show “Member Not Found”. Fig (11): Remove Member Fig (12): Password Change Admin can remove any member from database and also can change user password.
  • 10. 10 Fig (13): Rename Member Fig (15): About Window Fig (16): Help Window A user friendly graphical interface is design for this system. Any user can easily use this system without any trouble. To make this interface, we used designer from pyqt5.A major advantage of GUIs is that they make computer operation more intuitive, and thus easier to learn and use.
  • 11. 11 Key and Actions Key Action Ctrl+A Admin Panel Ctrl+S Security Panel Ctrl+P Password Change Panel Ctrl+U Help Panel Ctrl+E Exit shoot Picture Capture Q Capture Window Exit Associative Courses: 1. CSE 1102: Computer Basics & Programming Laboratory 2. CSE 2101: Data Structures & Algorithms 3. CSE 3119: Software Engineering & Information System 4. CSE 3104: Peripheral and Interfacing Laboratory Conclusion and Recommendation Challenges: The designed algorithm was effectively able to detect the different type of faces specified on this project and recognize those faces which are known or unknown. The system is able to detect an object in both high and low light. The system has completely user friendly graphical interface (GUI). Every customer can able to use this system so easily even this customer don’t know how to use computer can able to user this. The system has more efficiency because it detects a customer within six (6) images putting on the dataset. Its accuracy is almost 90%. If an eyeglasses person is trained in system, the system can recognize his faces. Limitations If bright light appears behind object, the system takes some times to detect it but when the system detects the faces it’s easily recognize it. We also use liveness detection to make the security more strong. But livesness detection isn’t as strong as we want. But for average security, it works well. A person who put eyeglass in front camera but who is already trained without eyeglass, the system is slow to recognize him.
  • 12. 12 Future Activities In future, this system will be more fast and accurate. Liveness detection will be stronger and perfectly recognize real or fake person. Also, face will easily detect doesn’t matter the person will put eyeglasses or not in future. In every light combination, the system is able recognize object face accurately. References [1] ‘Design of face detection and recognition system for smart home security application’ , by Dwi Ana Ratna Wati , Dika Abadianto,Department of Electrical Engineering, Universitas Islam Indonesia, Yogyakarta, Indonesia. [2]’ Facial recognition system’ by http://www.pyimagesearch [3] ‘Face Recognition System and It's Application’, by Xuehong Tian Published in: 2009 First International Conference on Information Science and Engineering [4] ‘Research on Face Recognition Based on Embedded System’, by Hong Zhao, Xi-Jun Liang, and Peng Yang,School of Computer and Communication, Lanzhou University of Technology, Lanzhou 730050, China
  • 13. 13 [5] ‘Image-based Face Detection and Recognition:“State of the Art” ’,by Faizan Ahmad, Aaima Najam and Zeeshan Ahmed,Department of Computer Science & Engineering, Beijing University of Aeronautics & Astronautics.