IoT based Face detection and recognition security system

In the modern world security is one of the major issues. As technology is getting advanced many security issues are arising. Every security method of today has flaws and they can be hacked. Privacy and security are two general rights, to guarantee that in our day by day life that we are secure, a gr

2025-06-28 16:33:25 - Adil Khan

Project Title

IoT based Face detection and recognition security system

Project Area of Specialization Internet of ThingsProject Summary

In the modern world security is one of the major issues. As technology is getting advanced many security issues are arising. Every security method of today has flaws and they can be hacked. Privacy and security are two general rights, to guarantee that in our day by day life that we are secure, a great deal of research is going on in the field of home security, and IoT is the major breakthrough for this industry. The proposed system for this problem is Face detection and recognition using IoT. Face detection and recognition is a system in which the face of a person is detected and compared with the database. When a person comes in front of the camera it recognizes the face in real time. If he is a recognized person system unlocks the door automatically. But if there is an unknown person the system will capture its image and sends it to the owner email address. Similarly, we can control the door, house lights, etc. through the internet through a mobile application. The project provides security, control, and monitoring of home to the users.

Project Objectives

The objective of our project is to design software that can detect human faces in realtime. The information age is quickly revolutionizing the way transactions are completed.
Everyday actions are increasingly being handled electronically, instead of with pencil and paper or face to face. This growth in electronic transactions has resulted in a greater demand
for fast and accurate user identification and authentication. Access codes for buildings, banks accounts and computer systems often use PIN's for identification and security clearences.
Using the proper PIN gains access, but the user of the PIN is not verified. When credit and ATM cards are lost or stolen, an unauthorized user can often come up with the correct
personal codes. Despite warning, many people continue to choose easily guessed PIN?s and passwords: birthdays, phone numbers and social security numbers. Recent cases of identity theft have highten the need for methods to prove that someone is truly who he/she claims to be. Face recognition technology can solve this problem since a face is undeniably connected to its owner expect in the case of identical twins. It is nontransferable. 

Project Implementation Method

The implementation of face recognition technology includes the following three stages:
Data acquisition:
The input can be recorded video of the speaker or a still image. A sample of 1 secduration consists of a 25 frame video sequence. More than one camera can be used to produce a 3D representation of the face and to protect against the usage of photographs to gain unauthorized access.
Input processing

Images are cropped such that the ovoid facial image remains, and color images are normally converted to black and white in order to facilitate initial comparisons based on grayscale characteristics. First the presence of faces or face in a scene must be detected. Once the face is detected, it must be localized and Normalization process may be required to bring the dimensions of the live facial sample in alignment with the one on the template.
Face image classification and decision making.

All facial-scan systems attempt to match visible facial features in a fashion similar to the way people recognize one another. The features most often utilized in facial-scan systems are those least likely to change significantly
over time: upper ridges of the eye sockets, areas around the cheekbones, sides of the mouth, nose shape, and the position of major features relative to each other. Internet of Things (IoT) is new technology which has made an enormous impact on the modern world. This project adds mainly four features: security, safety, control and monitoring of home,industries and other areas where security is major issue. When an unauthenticated try to log in, this face will be captured and the face image will be sent through an E-mail to the owner of the house. This project will be implemented in homes as well as in factories, industrial areas to protect from the people who want to harm it. The flowchart of the proposed methodology is shown in the Figure.

IoT based Face detection and recognition security system _1582917645.png

Benefits of the Project

This is an IoT based system and hence can be made automated.
By using Raspberry Pi, the system becomes scalable and flexible.
The system can be modified easily without disturbing the other components in the system.
As we will use Raspberry Pi to develop the system, the total system has become low power system.
New embedded technologies can be easily inserted into this development, due to the use of raspberry pi.

Security/Counterterrorism. Access control, comparing surveillance images to Know terrorist.
Day Care: Verify identity of individuals picking up the children.
Residential Security: Alert homeowners of approaching personnel.
Voter verification: Where eligible politicians are required to verify their identity during a voting process this is intended to stop voting where the vote may not go as expected.
Banking using ATM: The software is able to quickly verify a customer’s face.

Technical Details of Final Deliverable

The final product will be an integrated system based on hardware and software. Software will be used for simulation to detect the face and hardware will be used for physically unlocking the door.

Hardware includes:  Raspberry pi, Camera, stepper motor, relay circuit, and power supply. IoT will be used to control the door and other home appliances remotely.

The final deliverable will be:
1. Hardware and software integrated system
2. Project report
3. Publication in well reputed journal/ conference

This system is much secured then any other biometric system as face is the unque identity of every person. The security system, proposed, is low cost, low power consuming system. This system can easily provide high level of security as it combines two modern technologies together i.e. Face recognition and IoT. These are rapidly growing technologies in industries and scientists are still researching on them. Therefore these two have made a significant impact on security system development. Due to these, the security will almost double. Remote controlling and monitoring is possible because of using IoT and Face recognition has made it almost impossible to hack. 

Final Deliverable of the Project HW/SW integrated systemType of Industry Security Technologies Internet of Things (IoT)Sustainable Development Goals Sustainable Cities and Communities, Peace and Justice Strong InstitutionsRequired Resources
Item Name Type No. of Units Per Unit Cost (in Rs) Total (in Rs)
Total in (Rs) 52950
Raspberry Pi 3 B+ with Case + shipment Equipment11000010000
HD Camera Equipment2800016000
Relay Circuit Equipment1500500
SD-card Equipment115001500
SD-card convertor 3.0 Equipment1800800
Ethernet cable Equipment120002000
Ethernet to USB connector Equipment116001600
USB Hub Equipment123002300
Power bank Equipment170007000
Stepper Motor Equipment1500500
House Prototype made of wood Miscellaneous 130003000
Miscellaneous( Travelling, Printing etc) Miscellaneous 170007000
Wires Equipment1050500
LED lights Equipment550250

More Posts