Skip to main content

Home Automation Security System Based on Face Detection and Recognition Using IoT

  • Conference paper
  • First Online:
Intelligent Technologies and Applications (INTAP 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1198))

Included in the following conference series:

  • 938 Accesses

Abstract

In the modern world security is one of the major issues. As technology is getting advanced many security issues are arising. The existed developed security methods have some flaws and they can be hacked. The proposed system for resolving the security issue is based on face detection and recognition using Internet of Things (IoT). The face of a person is captured by the camera and compared with the acquired database. The authorized user can also utilize mobile application to give access to the premises to any unregistered person. In the case of unauthorized/unknown access, the face image of the person will be captured and notified to the concerned authorities through an email. An Alarm will be generated in the case of unauthorized access. The proposed system produced accurate results in both cases: authorized and unauthorized access. The introduced system provides a low-cost solution for monitoring and controlling the houses, different organizations like banks, universities, etc.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. United Nations Office on Drugs and Crime (2017). https://dataunodc.un.org/crime/

  2. Patel, K.K., Patel, S.M.: Internet of Things-IOT: definition, characteristics, architecture, enabling technologies, application & future challenges. Int. J. Eng. Sci. Comput. 6(5), 1–2 (2016)

    Google Scholar 

  3. Chin, H.: Face recognition based automated student attendance system. Diss. UTAR (2018)

    Google Scholar 

  4. Senthilkumar, G., Gopalakrishnan, K., Kumar, V.S.: Embedded image capturing system using raspberry pi system. Int. J. Emerg. Trends Technol. Comput. Sci. 3(2), 213–215 (2014)

    Google Scholar 

  5. Sowmiya, U., Mansoor, J.S.: Raspberry pi based home door security through 3G dongle. Int. J. Eng. Res. Gener. Sci. 3, 138–144 (2015)

    Google Scholar 

  6. Karri, V., Lim, J.D.: Method and device to communicate via SMS after a security intrusion. In: 1st International Conference on Sensing Technology, vol. 1, pp. 664–668 (2005)

    Google Scholar 

  7. Bangali, J., Shaligram, A.: Design and implementation of security systems for smart home based on GSM technology. Int. J. Smart Home 7(6), 201–208 (2013)

    Article  Google Scholar 

  8. Wati, D.A., Abadianto, D.: Design of face detection and recognition system for smart home security application. In: 2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE), pp. 342–347. IEEE (2017)

    Google Scholar 

  9. Dalal, N., Triggs, B.: Histograms of oriented gradients for human detection. In: International Conference on Computer Vision & Pattern Recognition (CVPR 2005), pp. 886–893. IEEE Computer Society (2005)

    Google Scholar 

  10. Kodali, R.K., Jain, V., Bose, S., Boppana, L.: IoT based smart security and home automation system. In: 2016 International Conference on Computing, Communication and Automation (ICCCA), pp. 1286–1289. IEEE (2016)

    Google Scholar 

  11. Ramanan, D., Zhu, X.: Face detection, pose estimation, and landmark localization in the wild. In: Proceedings of the 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 2879–2886 (2012)

    Google Scholar 

  12. Moghaddam, B., Pentland, A.P.: Face recognition using view-based and modular eigenspaces. In: Automatic Systems for the Identification and Inspection of Humans, vol. 2277, pp. 12–22 (1994)

    Google Scholar 

  13. Kartik, J.S., Kumar, K.R., Srimadhavan, V.S.: Security system with face recognition, SMS alert and embedded network video monitoring terminal. Int. J. Secur. Priv. Trust Manag. (IJSPTM) 2, 15–17 (2013)

    Article  Google Scholar 

  14. Lwin, H.H., Khaing, A.S., Tun, H.M.: Automatic door access system using face recognition. Int. J. Sci. Technol. Res. 4(6), 210–221 (2016)

    Google Scholar 

  15. WILL BERGER (2018). http://www.willberger.org/cascade-haar-explained/

  16. Open Source Computer Vision. https://docs.opencv.org/3.2.0/d7/d8b/tutorial_py_face_detection.html

  17. Ubidots (2019). http://www.ubidots.com/education/

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Sana Ghafoor , Muhammad Rizwan Tahir or Maryoum Mustafa .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ghafoor, S., Khan, K.B., Tahir, M.R., Mustafa, M. (2020). Home Automation Security System Based on Face Detection and Recognition Using IoT. In: Bajwa, I., Sibalija, T., Jawawi, D. (eds) Intelligent Technologies and Applications. INTAP 2019. Communications in Computer and Information Science, vol 1198. Springer, Singapore. https://doi.org/10.1007/978-981-15-5232-8_7

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-5232-8_7

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-5231-1

  • Online ISBN: 978-981-15-5232-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics