Chapter 1: Introduction Chapter 2: Hardware Required

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 21

Contents

Chapter 1: Introduction
Chapter 2: Hardware Required
A. Raspberry pi 3B+.
B. 4*4 Keypad Module.
C. LCD Display 16*2.
D. servo motor
E. Web camera
Chapter 3: Software Required
A. python IDLE 3.73
B. putty software
C. VNC viewer.
D. Advance IP scanner.
Chapter 4: Working
Chapter 5: Proposed Work
Chapter 6: Conclusion
Chapter 7: Future Scope
#References.
1. INTRODUCTION
In today’s world of connectivity and smart devices there is an urgent need to modify our
existing day to day objects and make them smart, also it is not the era when we can blindly
trust the old and conventional security measures, specifically speaking is our door locks. To
change and modernize any object we need to eliminate its existing drawbacks and add extra
functionality. Face detection is more challenging because of some unstable characteristics, for
example, glasses and beard will impact the detecting effectiveness. Moreover, different kinds
and angles of lighting will make detecting face generate uneven brightness on the face, which
will have an influence on the detection process. An intensive study of Open CV platform and
its inbuilt libraries has been conducted to generate a code, which does correct and reliable facial
recognition with new and efficient use of hardware. This proposed system also acts as a home
security system for both Person detection and provide security for door access control by using
facial recognition for the home environment. The human body is identified as an intruder within
a home environment achieved by capturing live video from web camera and processing will be
done on captured video frames. The web camera to capture the series of images as soon as the
person press switch. The advantage of this system is for accessing the door is that face detection
and recognition are performed by using face detection technique and the entire face recognition
is completed by pressing single and tiny push button switch. Face recognition includes feature
extraction from the facial image, recognition or classification and feature reduction. As the
world is progressing people are scared about the safety of their possessions, information and
themselves. With the model of Smart Door, a profound impact is expected in the security
industry and it is somewhat anticipated as the time has come to make all daily life objects
interconnected and interactive. This model will be a major contribution to the field of Home
Security

2. HARDWARE REQUIRED
A. Raspberry pi 3B+

The Raspberry Pi is a series of small single-board computers developed in the United


Kingdom by the Raspberry Pi Foundation to promote teaching of basic computer science in
schools and in developing countries. The original model became far more popular than
anticipated, selling outside its target market for uses such as robotics. It does not include
peripherals (such as keyboards and mice) or cases. However, some accessories have been
included in several official and unofficial bundles.

The organisation behind the Raspberry Pi consists of two arms. The first two models were
developed by the Raspberry Pi Foundation. After the Pi Model B was released, the Foundation
set up Raspberry Pi Trading, with Eben Upton as CEO, to develop the third model, the B+.
Raspberry Pi Trading is responsible for developing the technology while the Foundation is an
educational charity to promote the teaching of basic computer science in schools and in
developing countries.

According to the Raspberry Pi Foundation, more than 5 million Raspberry Pis were sold by
February 2015, making it the best-selling British computer. By November 2016 they had sold
11 million units, and 12.5m by March 2017, making it the third best-selling "general purpose
computer". In July 2017, sales reached nearly 15 million. In March 2018, sales reached 19
million.

Most Pis are made in a Sony factory in Pencoed , Wales. Some are made in China and Japan.

 SoC: Broadcom BCM2837B0 quad-core A53 (ARMv8) 64-bit @ 1.4GHz

 GPU: Broadcom Videocore-IV

 RAM: 1GB LPDDR2 SDRAM

 Networking: Gigabit Ethernet (via USB channel), 2.4GHz and 5GHz 802.11b/g/n/ac Wi-Fi

 Bluetooth: Bluetooth 4.2, Bluetooth Low Energy (BLE)


 Storage: Micro-SD
 GPIO: 40-pin GPIO header, populated
 Ports: HDMI, 3.5mm analogue audio-video jack, 4x USB 2.0, Ethernet, Camera Serial Interface
(CSI), Display Serial Interface (DSI)
 Dimensions: 82mm x 56mm x 19.5mm, 50g
B. 4*4 Keypad Module
The 4*4 matrix keypad usually is used as input in a project. It has 16 keys in
total, which means the same input values.
The SunFouner 4*4 Matrix Keypad Module is a matrix non- encoded keypad
consisting of 16 keys in parallel. The keys of each row and column are
connected through the pins outside – pin Y1-Y4 as labeled beside control the
rows, when X1-X4, the columns.
First test whether any key is pressed down. Connect power to rows, so they
are High level. Then set all the rows Y1-Y4 as Low and then detect the status
of the columns. Any column of Low indicates there is key pressing and that
the key is among the 4 keys of the column. If all columns are High, it means
no key is pressed down.
Next, locate the key. Since the column in which the pressed key lies is
identified, knowing the line would finalize the testing. Thus, set the rows as
Low in turns until any is unveiled accordingly – other rows will still be High.
Now the row can be identified. Detect the status of each column in turns. The
column tested Low is the one intersecting with the line – their cross point is
just the key pressed.
The schematic diagram:
Experimental Principle
Through programming, we've set the four keys in the first row (with pins at the top as shown in
the figure below) as 1, 2, 3, 4; those in the second row as 5, 6, 7, 8; in the third as 9, A, B, C; and
in the fourth as D, *, 0, #.
Connect the row and column pins of the keypad to pin 4-11 respectively. You can know its value
whenever you press the key.
C. LCD Display 16*2

We come across LCD displays everywhere around us. Computers, calculators,


television sets, mobile phones, digital watches use some kind of display to display
the time. An LCD is an electronic display module which uses liquid crystal to
produce a visible image. The 16×2 LCD display is a very basic module commonly
used in DIYs and circuits. The 16×2 translates o a display 16 characters per line
in 2 such lines. In this LCD each character is displayed in a 5×7 pixel matrix.

16X2 LCD pinout diagram


Important command codes for LCD

Sr. No. Hex Code Command to LCD instruction Register

1 01 Clear display screen

2 02 Return home

3 04 Decrement cursor (shift cursor to left)

4 06 Increment cursor (shift cursor to right)

5 05 Shift display right

6 07 Shift display left

7 08 Display off, cursor off

8 0A Display off, cursor on

9 0C Display on, cursor off

10 0E Display on, cursor blinking

11 0F Display on, cursor blinking

12 10 Shift cursor position to left

13 14 Shift cursor position to right

14 18 Shift the entire display to the left

15 1C Shift the entire display to the right


16 80 Force cursor to beginning ( 1st line)

17 C0 Force cursor to beginning ( 2nd line)

18 38 2 lines and 5×7 matrix

Pin Description:

Pin
Name
No. Function

Ground (0V)
1 Ground

Supply voltage; 5V (4.7V – 5.3V) Vcc


2

Contrast adjustment; the best way is to use a variable resistor such as a potentiometer.
The output of the potentiometer is connected to this pin. Rotate the potentiometer Vo / VEE
3
knob forward and backwards to adjust the LCD contrast.

RS (Register
4 Selects command register when low, and data register when high
Select )

5 Low to write to the register; High to read from the register Read/write

Sends data to data pins when a high to low pulse is given; Extra voltage push is
required to execute the instruction and EN(enable) signal is used for this purpose.
6 Enable
Usually, we make it en=0 and when we want to execute the instruction we make it
high en=1 for some milliseconds. After this we again make it ground that is, en=0.

7 DB0

8 DB1

9 8-bit data pins DB2

10 DB3

11 DB4
12 DB5

13 DB6

14 DB7

15 Backlight VCC (5V) Led+

16 Backlight Ground (0V) Led-

RS (Register select)

A 16X2 LCD has two registers, namely, command and data. The register select is used to
switch from one register to other. RS=0 for command register, whereas RS=1 for data register.

Command Register: The command register stores the command instructions given to the
LCD. A command is an instruction given to LCD to do a predefined task like initializing it,
clearing its screen, setting the cursor position, controlling display etc. Processing for commands
happens in the command register.

Data Register: The data register stores the data to be displayed on the LCD. The data is the
ASCII value of the character to be displayed on the LCD. When we send data to LCD it goes
to the data register and is processed there. When RS=1, data register is selected.

D. servo motor

A servo motor is a rotary actuator that allows for precise control of angular position. It consists
of a motor coupled to a sensor for position feedback. It also requires a servo drive to complete
the system. The drive uses the feedback sensor to precisely control the rotary position of the
motor. This is called closed-loop operation. By running the system closed-loop, servo motors
provide a high performance alternative to stepper and AC induction motors.

Kollmorgen’s family of servo motors gives you unprecedented choice and flexibility from a
wide range of standard products so you can select the best servo motor for your application.
By pairing our servo motors with our family of plug-and-play servo drives, selecting the
right motion control products has never been easier.

Standard Kollmorgen servo motors and servo drives offer the best of both worlds – the exact
specifications of a custom solution with the faster delivery times and lower cost of a standard
catalog product. For your truly unique motion control applications, work with our engineering
team to customize a solution for your machine design. Either way, standard product or
customized, we can help you choose the motion control solution that meets your exact
requirements.

Kollmorgen offers servo motors that fit many types of environments. Whether you need a servo
motor that is designed for the washdown environments found in food and beverage,
the explosion proof environments found in oil and gas or extreme temperature environments,
Kollmorgen has you covered.

Need

 For unlocking the door use servo motor when the Face data is read and the door is
unlocked

 To unlock the door need a servo motor interface with the Pi where servo motor starts
rotating for a specified amount of time based on the Delay provided until the door
opens.

E. Web Camera
A webcam is an input device that captures digital images. These are transferred to the computer,
which moves them to a server. From there, they can be transmitted to the hosting page. Laptops
and desktops are often equipped with a webcam.

Webcam characteristics include:

 Compared to other models of camera, webcams are considerably lower in cost,


especially from a video telephony perspective.
 Compared to most handheld cameras, the maximum resolution of a webcam is low.

The features of a webcam are largely dependent on the software operating system of the
computer as well as the computer processor being used. Webcams can have additional features
such as motion sensing, image archiving, automation or even custom coding.

Webcams are mostly used in videoconferencing and for security surveillance. Other uses
include video broadcasting, social video recording and computer vision.

Web Camera
3. SOFTWARE REQUIRED
A. Python IDLE 3.73

IDLE is Python’s Integrated Development and Learning Environment.

IDLE has the following features:

 coded in 100% pure Python, using the tkinter GUI toolkit


 cross-platform: works mostly the same on Windows, Unix, and MacOS
 Python shell window (interactive interpreter) with colorizing of code input, output, and
error messages
 multi-window text editor with multiple undo, Python colorizing, smart indent, call tips,
auto completion, and other features
 search within any window, replace within editor windows, and search through multiple
files (grep)
 debugger with persistent breakpoints, stepping, and viewing of global and local
namespaces
 configuration, browsers, and other dialogs

Command line usage

idle.py [-c command] [-d] [-e] [-h] [-i] [-r file] [-s] [-t title] [-] [arg]...

-c command run command in the shell window


-d enable debugger and open shell window
-e open editor window
-h print help message with legal combinations and exit
-i open shell window
-r file run file in shell window
-s run $IDLESTARTUP or $PYTHONSTARTUP first, in shell window
-t title set title of shell window
- run stdin in shell (- must be last option before args)

If there are arguments:


 If -, -c, or r is used, all arguments are placed in sys.argv[1:...] and sys.argv[0] is set
to '', '-c', or '-r'. No editor window is opened, even if that is the default set in the Options
dialog.
 Otherwise, arguments are files opened for editing and sys.argv reflects the arguments
passed to IDLE itself.

B. Putty software

Putty is a terminal emulator application which can act as a client for the SSH, Telnet, rlogin,
and raw TCP computing protocols. The word "Putty" has no meaning,[1] though 'tty' is
sometimes used to refer to the Unix terminals, as an acronym for 'teletype'.

Putty was first written for Microsoft Windows, but it has been ported to other operating
systems including some Unix-like platforms. Mac OS and Mac OS X are still being ported,
while unofficial ports have been ported it to the Symbian and Windows Mobile operating
systems.

Putty is currently beta software. Licensed under the MIT License, and it is free and open
source software.

Features [change | change source]


Some features of Putty are:

 Unicode support.
 Control over the SSH encryption key and protocol version.
 Command-line SCP and SFTP clients, called "pscp" and "psftp" respectively.
 Control over port forwarding with SSH (local, remote or dynamic port forwarding),
including built-in handling of X11 forwarding.
 Emulates most xterm, VT102 control sequences, as well as much of ECMA-48 terminal
emulation.
 IP Version 6 support.
 Supports 3DES, AES, Arcfour, Blowfish, DES.
 Public-key authentication support.
 Support for local serial port connections.
C. VNC viewer.

Virtual network computing is a platform-independent remote desktop sharing application


where the desktop display of one computer is remotely viewed and controlled over a network
connection. A VNC viewer on one operating system connects to a VNC server on the same or
another operating system.

The VNC system consists of a client, server and communication protocol:

 The VNC server is the program on the machines that share a screen, allowing the client
to take control of it passively.
 The VNC client is the program that watches, controls and interacts with the server. The
server is generally controlled by the client.
 The VNC protocol uses the remote frame buffer protocol, which is based on graphic
primitives passed from the server to the client and event messages passed from the
client to the server.
D. Advance IP scanner

Advanced IP Scanner is a free, fast and powerful network scanner with a user-friendly
interface. In a few seconds, Advanced IP Scanner can locate all the computers on your wired
or wireless local network and conduct a scan of their ports. The app scans all network devices,
and gives you access to shared folders and FTP servers. It provides remote control of computers
(via RDP and Radmin) and can even remotely switch computers off.

The program provides easy access to various network resources. It also enables you to detect
all the IP addresses on your Wi-Fi network. The remote PC shutdown feature lets you shut
down any remote computer or group of computers running Windows. You can also wake these
machines up remotely using Advanced IP Scanner, if their network cards support the Wake-
On-LAN function.

Key Features include:

 Fast network scanning.

 MAC addresses detection.

 Remote access.

 Create favourite.
 Remote Wake-On-LAN.

 Easy access to shared folders and FTP servers.

 Remote control via RDP and Radmin.

Advanced IP Scanner also lets you scan RDP resources and access them directly from within
the program you can also run ping, tracert, and SSH commands on a selected computer.

Advanced IP Scanner is also deeply integrated with Radmin remote control software.
Advanced IP Scanner lets you scan your network, and find all computers running Radmin
Server, and connect to any one of them in a click. The free Radmin Viewer needs to be installed
on your PC for you to access a remote machine running Radmin Server. With Radmin, you can
access the remote PC in Full Control, File Transfer, and Telnet modes.

Overall, Advanced IP Scanner is a fast, robust and easy to use IP scanner. It can locate all the
computers on your network and provides easy access to their various resources, whether HTTP,
HTTPS, FTP or shared folders. The app has been designed with a simple and intuitive interface
that can be navigated by users of all levels of expertise.

4. WORKING
It is divided into 3 parts
1. Camera module.
2. Raspberry pi module.
3. Door open with the help of servo motor.
The proposed home security system is a machine learning based approach where a
cascade function is trained from a lot of positive and negative images. It is then used to
detect objects in other images. A procedural view of how this person detection works
is shown in below flowchart.

In the above Figure, we see the procedural view person detection process. In this system first
in authentication module is having small switch button, when the person presses the switch to
start the process button then the implemented code is the call. Then by using the camera the
system capture the image sequence and compare this images with the database. If the image is
a match then that person types the password to unlock the door if password is matched then
only the door will open.

5. PROPOSED WORK

 Interfacing of camera module to capture live face image.

 Create a database of authorised person

 Capture current faces, save it and compare with database.

 If the face is recognize then it display information on the LCD display

 Then enter the password from keypad module, if the password is right , after then it
display the message is “ your password is recognize”.
 After 13 second the Door will be open, and after 7 sec. The door is closed, with the help
of servo motor.

6. CONCLUSION

In this work, automatic door unlocking system we use face recognition, after a face recognition
is successful the Raspberry pi. The user can have a freedom to lock door from application. The
user can have a freedom if the door should open or keep it locked. This system will also provide
user to live stream the video. We utilize Local Binary Patterns Histogram algorithm for the
face recognition prepare. Additionally, Alarm will ring for unauthorized access.

7. FUTURE SCOPE

The proposed system will further extended to provide the notices from long distance by
providing the internet connectivity which will allow the system to update notices, anywhere in
the world.

 Using raspberry pi the current project can be modified by an Infrared camera interfacing it
can be used in Smart Surveillance Monitoring security system which any type of public security
is using Living body detection or spying, Also it can be used in Attendance system of the class,
Also some profound applications can be implemented using interfacing of Raspberry pi and
Arduino UNO board like sensor application of smartcard swapping, finger detection, alcohol
detection, agriculture humidity sensing, Temperature sensing using web server, and many
more.

 Internet of households where we can attach other devices of house with internet.

 Industrial automation and control through internet.

 Automated fire exit systems can be bui+ld.


 Improvement in the security issues in highly restricted areas.

 Smart surveillance monitoring security


 Attendance system.
 Criminal recognition and identification system.
 Biometric system

#REFERENCES
[1] Hteik Htar Lwin, Aung Soe Khaing, Hla Myo Tun, “Automatic Door Access System Using
Face Recognition”, International Journal of Scientific & Technology Research Volume 4, Issue
06, June 2015.
[2] Samuel Lukas, Aditya Rama Mitra, Ririn Ikana Desanti, Dion Krisnadi "Student Attendance
System in Classroom Using Face Recognition Technique" IEEE 2016.
[3]Ratnawati Ibrahim, "Study of Automated Face Recognition System for Office Door Access
Control Application", IEEE 2011
[4] Lerato Masupha, Tranos Zuva, Seleman Ngwira, Omobayo Esan, "Face Recognition
Techniques, their Advantages, Disadvantages and Performance Evaluation", IEEE 2015
[5] Paul Viola, Michael J. Jones, "Robust Real-Time Face Detection", International Journal of
Computer Vision 57(2), 2004.
[6] Ayushi Gupta, Ekta Sharma, Neha Sachan, and Neha Tiwari, "Door Lock System through
Face Recognition Using MATLAB", International Journal of Scientific Research in Computer
Science and Engineering, Vol-1, Issue-3, 30 June 2013.

You might also like