Chapter 1: Introduction Chapter 2: Hardware Required
Chapter 1: Introduction Chapter 2: Hardware Required
Chapter 1: Introduction Chapter 2: Hardware Required
Chapter 1: Introduction
Chapter 2: Hardware Required
A. Raspberry pi 3B+.
B. 4*4 Keypad Module.
C. LCD Display 16*2.
D. servo motor
E. Web camera
Chapter 3: Software Required
A. python IDLE 3.73
B. putty software
C. VNC viewer.
D. Advance IP scanner.
Chapter 4: Working
Chapter 5: Proposed Work
Chapter 6: Conclusion
Chapter 7: Future Scope
#References.
1. INTRODUCTION
In today’s world of connectivity and smart devices there is an urgent need to modify our
existing day to day objects and make them smart, also it is not the era when we can blindly
trust the old and conventional security measures, specifically speaking is our door locks. To
change and modernize any object we need to eliminate its existing drawbacks and add extra
functionality. Face detection is more challenging because of some unstable characteristics, for
example, glasses and beard will impact the detecting effectiveness. Moreover, different kinds
and angles of lighting will make detecting face generate uneven brightness on the face, which
will have an influence on the detection process. An intensive study of Open CV platform and
its inbuilt libraries has been conducted to generate a code, which does correct and reliable facial
recognition with new and efficient use of hardware. This proposed system also acts as a home
security system for both Person detection and provide security for door access control by using
facial recognition for the home environment. The human body is identified as an intruder within
a home environment achieved by capturing live video from web camera and processing will be
done on captured video frames. The web camera to capture the series of images as soon as the
person press switch. The advantage of this system is for accessing the door is that face detection
and recognition are performed by using face detection technique and the entire face recognition
is completed by pressing single and tiny push button switch. Face recognition includes feature
extraction from the facial image, recognition or classification and feature reduction. As the
world is progressing people are scared about the safety of their possessions, information and
themselves. With the model of Smart Door, a profound impact is expected in the security
industry and it is somewhat anticipated as the time has come to make all daily life objects
interconnected and interactive. This model will be a major contribution to the field of Home
Security
2. HARDWARE REQUIRED
A. Raspberry pi 3B+
The organisation behind the Raspberry Pi consists of two arms. The first two models were
developed by the Raspberry Pi Foundation. After the Pi Model B was released, the Foundation
set up Raspberry Pi Trading, with Eben Upton as CEO, to develop the third model, the B+.
Raspberry Pi Trading is responsible for developing the technology while the Foundation is an
educational charity to promote the teaching of basic computer science in schools and in
developing countries.
According to the Raspberry Pi Foundation, more than 5 million Raspberry Pis were sold by
February 2015, making it the best-selling British computer. By November 2016 they had sold
11 million units, and 12.5m by March 2017, making it the third best-selling "general purpose
computer". In July 2017, sales reached nearly 15 million. In March 2018, sales reached 19
million.
Most Pis are made in a Sony factory in Pencoed , Wales. Some are made in China and Japan.
Networking: Gigabit Ethernet (via USB channel), 2.4GHz and 5GHz 802.11b/g/n/ac Wi-Fi
2 02 Return home
Pin Description:
Pin
Name
No. Function
Ground (0V)
1 Ground
Contrast adjustment; the best way is to use a variable resistor such as a potentiometer.
The output of the potentiometer is connected to this pin. Rotate the potentiometer Vo / VEE
3
knob forward and backwards to adjust the LCD contrast.
RS (Register
4 Selects command register when low, and data register when high
Select )
5 Low to write to the register; High to read from the register Read/write
Sends data to data pins when a high to low pulse is given; Extra voltage push is
required to execute the instruction and EN(enable) signal is used for this purpose.
6 Enable
Usually, we make it en=0 and when we want to execute the instruction we make it
high en=1 for some milliseconds. After this we again make it ground that is, en=0.
7 DB0
8 DB1
10 DB3
11 DB4
12 DB5
13 DB6
14 DB7
RS (Register select)
A 16X2 LCD has two registers, namely, command and data. The register select is used to
switch from one register to other. RS=0 for command register, whereas RS=1 for data register.
Command Register: The command register stores the command instructions given to the
LCD. A command is an instruction given to LCD to do a predefined task like initializing it,
clearing its screen, setting the cursor position, controlling display etc. Processing for commands
happens in the command register.
Data Register: The data register stores the data to be displayed on the LCD. The data is the
ASCII value of the character to be displayed on the LCD. When we send data to LCD it goes
to the data register and is processed there. When RS=1, data register is selected.
D. servo motor
A servo motor is a rotary actuator that allows for precise control of angular position. It consists
of a motor coupled to a sensor for position feedback. It also requires a servo drive to complete
the system. The drive uses the feedback sensor to precisely control the rotary position of the
motor. This is called closed-loop operation. By running the system closed-loop, servo motors
provide a high performance alternative to stepper and AC induction motors.
Kollmorgen’s family of servo motors gives you unprecedented choice and flexibility from a
wide range of standard products so you can select the best servo motor for your application.
By pairing our servo motors with our family of plug-and-play servo drives, selecting the
right motion control products has never been easier.
Standard Kollmorgen servo motors and servo drives offer the best of both worlds – the exact
specifications of a custom solution with the faster delivery times and lower cost of a standard
catalog product. For your truly unique motion control applications, work with our engineering
team to customize a solution for your machine design. Either way, standard product or
customized, we can help you choose the motion control solution that meets your exact
requirements.
Kollmorgen offers servo motors that fit many types of environments. Whether you need a servo
motor that is designed for the washdown environments found in food and beverage,
the explosion proof environments found in oil and gas or extreme temperature environments,
Kollmorgen has you covered.
Need
For unlocking the door use servo motor when the Face data is read and the door is
unlocked
To unlock the door need a servo motor interface with the Pi where servo motor starts
rotating for a specified amount of time based on the Delay provided until the door
opens.
E. Web Camera
A webcam is an input device that captures digital images. These are transferred to the computer,
which moves them to a server. From there, they can be transmitted to the hosting page. Laptops
and desktops are often equipped with a webcam.
The features of a webcam are largely dependent on the software operating system of the
computer as well as the computer processor being used. Webcams can have additional features
such as motion sensing, image archiving, automation or even custom coding.
Webcams are mostly used in videoconferencing and for security surveillance. Other uses
include video broadcasting, social video recording and computer vision.
Web Camera
3. SOFTWARE REQUIRED
A. Python IDLE 3.73
idle.py [-c command] [-d] [-e] [-h] [-i] [-r file] [-s] [-t title] [-] [arg]...
B. Putty software
Putty is a terminal emulator application which can act as a client for the SSH, Telnet, rlogin,
and raw TCP computing protocols. The word "Putty" has no meaning,[1] though 'tty' is
sometimes used to refer to the Unix terminals, as an acronym for 'teletype'.
Putty was first written for Microsoft Windows, but it has been ported to other operating
systems including some Unix-like platforms. Mac OS and Mac OS X are still being ported,
while unofficial ports have been ported it to the Symbian and Windows Mobile operating
systems.
Putty is currently beta software. Licensed under the MIT License, and it is free and open
source software.
Unicode support.
Control over the SSH encryption key and protocol version.
Command-line SCP and SFTP clients, called "pscp" and "psftp" respectively.
Control over port forwarding with SSH (local, remote or dynamic port forwarding),
including built-in handling of X11 forwarding.
Emulates most xterm, VT102 control sequences, as well as much of ECMA-48 terminal
emulation.
IP Version 6 support.
Supports 3DES, AES, Arcfour, Blowfish, DES.
Public-key authentication support.
Support for local serial port connections.
C. VNC viewer.
The VNC server is the program on the machines that share a screen, allowing the client
to take control of it passively.
The VNC client is the program that watches, controls and interacts with the server. The
server is generally controlled by the client.
The VNC protocol uses the remote frame buffer protocol, which is based on graphic
primitives passed from the server to the client and event messages passed from the
client to the server.
D. Advance IP scanner
Advanced IP Scanner is a free, fast and powerful network scanner with a user-friendly
interface. In a few seconds, Advanced IP Scanner can locate all the computers on your wired
or wireless local network and conduct a scan of their ports. The app scans all network devices,
and gives you access to shared folders and FTP servers. It provides remote control of computers
(via RDP and Radmin) and can even remotely switch computers off.
The program provides easy access to various network resources. It also enables you to detect
all the IP addresses on your Wi-Fi network. The remote PC shutdown feature lets you shut
down any remote computer or group of computers running Windows. You can also wake these
machines up remotely using Advanced IP Scanner, if their network cards support the Wake-
On-LAN function.
Remote access.
Create favourite.
Remote Wake-On-LAN.
Advanced IP Scanner also lets you scan RDP resources and access them directly from within
the program you can also run ping, tracert, and SSH commands on a selected computer.
Advanced IP Scanner is also deeply integrated with Radmin remote control software.
Advanced IP Scanner lets you scan your network, and find all computers running Radmin
Server, and connect to any one of them in a click. The free Radmin Viewer needs to be installed
on your PC for you to access a remote machine running Radmin Server. With Radmin, you can
access the remote PC in Full Control, File Transfer, and Telnet modes.
Overall, Advanced IP Scanner is a fast, robust and easy to use IP scanner. It can locate all the
computers on your network and provides easy access to their various resources, whether HTTP,
HTTPS, FTP or shared folders. The app has been designed with a simple and intuitive interface
that can be navigated by users of all levels of expertise.
4. WORKING
It is divided into 3 parts
1. Camera module.
2. Raspberry pi module.
3. Door open with the help of servo motor.
The proposed home security system is a machine learning based approach where a
cascade function is trained from a lot of positive and negative images. It is then used to
detect objects in other images. A procedural view of how this person detection works
is shown in below flowchart.
In the above Figure, we see the procedural view person detection process. In this system first
in authentication module is having small switch button, when the person presses the switch to
start the process button then the implemented code is the call. Then by using the camera the
system capture the image sequence and compare this images with the database. If the image is
a match then that person types the password to unlock the door if password is matched then
only the door will open.
5. PROPOSED WORK
Then enter the password from keypad module, if the password is right , after then it
display the message is “ your password is recognize”.
After 13 second the Door will be open, and after 7 sec. The door is closed, with the help
of servo motor.
6. CONCLUSION
In this work, automatic door unlocking system we use face recognition, after a face recognition
is successful the Raspberry pi. The user can have a freedom to lock door from application. The
user can have a freedom if the door should open or keep it locked. This system will also provide
user to live stream the video. We utilize Local Binary Patterns Histogram algorithm for the
face recognition prepare. Additionally, Alarm will ring for unauthorized access.
7. FUTURE SCOPE
The proposed system will further extended to provide the notices from long distance by
providing the internet connectivity which will allow the system to update notices, anywhere in
the world.
Using raspberry pi the current project can be modified by an Infrared camera interfacing it
can be used in Smart Surveillance Monitoring security system which any type of public security
is using Living body detection or spying, Also it can be used in Attendance system of the class,
Also some profound applications can be implemented using interfacing of Raspberry pi and
Arduino UNO board like sensor application of smartcard swapping, finger detection, alcohol
detection, agriculture humidity sensing, Temperature sensing using web server, and many
more.
Internet of households where we can attach other devices of house with internet.
#REFERENCES
[1] Hteik Htar Lwin, Aung Soe Khaing, Hla Myo Tun, “Automatic Door Access System Using
Face Recognition”, International Journal of Scientific & Technology Research Volume 4, Issue
06, June 2015.
[2] Samuel Lukas, Aditya Rama Mitra, Ririn Ikana Desanti, Dion Krisnadi "Student Attendance
System in Classroom Using Face Recognition Technique" IEEE 2016.
[3]Ratnawati Ibrahim, "Study of Automated Face Recognition System for Office Door Access
Control Application", IEEE 2011
[4] Lerato Masupha, Tranos Zuva, Seleman Ngwira, Omobayo Esan, "Face Recognition
Techniques, their Advantages, Disadvantages and Performance Evaluation", IEEE 2015
[5] Paul Viola, Michael J. Jones, "Robust Real-Time Face Detection", International Journal of
Computer Vision 57(2), 2004.
[6] Ayushi Gupta, Ekta Sharma, Neha Sachan, and Neha Tiwari, "Door Lock System through
Face Recognition Using MATLAB", International Journal of Scientific Research in Computer
Science and Engineering, Vol-1, Issue-3, 30 June 2013.