Advertisement

Biometric Access Using Image Processing Semantics

  • C. AswinEmail author
  • N. Dhilip Raja
  • N. Angel
  • K. Sudha
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 35)

Abstract

We propose a model-based approach for accessing a magnetic lock in the door using face recognition. We Implement Face Recognition by using image processing semantics. The Facial recognition uses facial landmarks such as chin, eyebrow, nose, eyes and lip to encode the user’s face. The encoded signal is sent to the lock via WIFI. We interfaced the facial recognition module through an android app and implemented the backend using python server. Our approach here is by using KNN algorithm which is one among the various machine learning algorithm. The K-nearest neighbor algorithm is used to classify the facial landmarks which is calculated by Euclidian distance formula which calculates the distance between the markers. The Face recognition module runs through python which is used for connectivity between the magnetic lock and backend. The magnetic lock is implemented using Node MC, switch, electromagnet and a power supply.

Keywords

Facial landmarks WIFI Android app Python server 

References

  1. 1.
    Bhatt, H.S., Bharadwaj, S., Vatsa, M., Singh, R., Ross, A., Noore, A.: A framework for quality-based biometric classifier selection. In: Proceedings of International Joint Conference on Biometrics, pp. 1–7 (2011)Google Scholar
  2. 2.
    Dieckmann, U., Plankensteiner, P., Wagner, T.: SESAM: a biometric person identification system using sensor fusion. Pattern Recogn. Lett. 18(9), 827–833 (1997)CrossRefGoogle Scholar
  3. 3.
    Jain, A.K., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. Spec. Issue Image Video Based Biom. 14(1), 160–170 (2004)Google Scholar
  4. 4.
    Kumar, D., Ryu, Y.: A brief introduction of biometrics technology. Int. J. Adv. Sci. Technol. 4(1), 185–192 (2009)Google Scholar
  5. 5.
    Maes, S.H., Beigi, H.S.M.: Open sesame! Speech, password or key to secure your door? In: Asian Conference on Computer Vision, Hong Kong, pp. 531–541 (1998)Google Scholar
  6. 6.
    Terzopoulos, D., Waters, K.: Analysis and synthesis of facial image sequences using physical and anatomical models. IEEE Trans. Pattern Anal. Mach. Intell. 15(6), 569–579 (1993)CrossRefGoogle Scholar
  7. 7.
    Lee, K.-C., Ho, J., Kriegman, D.: Nine points of light: acquiring subspaces for face recognition under variable lighting (2001)Google Scholar
  8. 8.
    Sim, T., Kanade, T.: Combining models and exemplars for face recognition: an illuminating example (2001)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of Computer Science EngineeringSt. Joseph’s College of EngineeringChennaiIndia

Personalised recommendations