Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Omica Kale, Sanika Kshirsagar, Rupali Bathe
DOI Link: https://doi.org/10.22214/ijraset.2023.56367
Certificate: View Certificate
The face is one of the easiest ways to distinguish the individual identity of each other. Face recognition is a personal identification system that uses personal characteristics of a person to identify the person\'s identity. Human face recognition procedure basically consists of two phases, namely face detection, where this process takes place very rapidly in humans, except under conditions where the object is located at a short distance away, the next is the introduction, which recognize a face as individuals. Stage is then replicated and developed as a model for facial image recognition (face recognition) is one of the much-studied biometrics technology and developed by experts. There are two kinds of methods that are currently popular in developed face recognition pattern namely, Eigenface method and Fisher face method. Facial image recognition Eigenface method is based on the reduction of face dimensional space using Principal Component Analysis (PCA) for facial features. The main purpose of the use of PCA on face recognition using Eigen faces was formed (face space) by finding the eigenvector corresponding to the largest eigenvalue of the face image. The area of this project face detection system with face recognition is Image processing. The software requirements for this project is MATLAB software.
I. INTRODUCTION
In sensitive area where generally no one is allowed So first we will detect the motion after the motion detection it automatically revoke the functions for face detection. The identification of human can be done through the face of human. So first we detect face of human after that, does that face has mask or it is naked face. If it is naked face check in our database that does that human is present in database or someone else. Real time security face recognition is part of the field of biometrics. Biometrics is the ability for a computer to recognize a human through a unique physical trait. Face recognition provides the capability for the computer to recognize a human by facial characteristics.
Real time security face recognition is part of the field of biometrics. Biometrics is the ability for a computer to recognize a human through a unique physical trait. Face recognition provides the capability for the computer to recognize a human by facial characteristics. Today, biometrics is one of the fastest growing fields in advanced technology. Predictions indicate a biometrics explosion in the next century, to authenticate identities and avoid and unauthorized access to networks, database and facilities. A facial recognition device is a device that takes an image or a video of a human face and compares it to other image faces in a database.
The structure, shape and proportions of the faces are compared during the face recognition steps. In addition, distance between the eyes, nose, mouth and jaw, upper outlines of the eye sockets, the sides of the mouth, location of the nose and eyes, and the area surrounding the check bones are also compared. When using a facial recognition program, several pictures of the person must be taken at different angles and with different facial expressions. At time of verification and identification the subject stands in front of the camera for a few seconds, and then the image is compared to those that have been previously recorded. Facial recognition is widely used because of its benefits.
The advantages of facial recognition are that it is not intrusive, can be done from a faraway distance even without the person being aware that he/she is being scanned. Such thing is needed in banks or government offices for example, and this is what makes facial recognition systems better than other biometric techniques in that they can be used for surveillance purposes like searching for wanted criminals, suspected terrorists, or missing children. Face recognition devices are most beneficial to use for facial authentication than for identification purposes, because it is easy to alter someone’s face, and because the person can disguise using a mask. Environment is also a consideration as well as subject motion and focus on the camera. Facial recognition, when used in combination with another biometric method, can improve verification and identification results dramatically.
II. EXISTING SYSTEM
III. PROPOSED SYSTEM
The proposed Intruder Detection System is a comprehensive security solution that combines multiple advanced technologies to enhance security and safety. Key features of the system include motion detection, object detection, height detection, and mask detection to accurately identify potential intruders. The system employs a network of sensors, cameras, and processing units to monitor the environment in real-time.
A. Main Features
a. User Interface: A user-friendly interface provides easy system configuration and monitoring.
b. Remote Access: Allows for remote monitoring and control for real-time response to security incidents.
c. Scalability: Suitable for small residences to large industrial complexes.
d. Privacy Protection: Adheres to privacy regulations and respects the rights of individuals.
e. Customization: Tailored to the specific needs and security requirements of the environment.
IV. ALGORITHMS
To develop an Intruder Detection System with capabilities such as motion detection, object detection, height detection, and mask detection, you can use a variety of algorithms and technologies. Here are some commonly used algorithms and techniques for these specific functionalities:
A. Motion Detection
B. Object Detection
C. Height Detection
D. Mask Detection
Use deep learning models or image processing techniques to detect whether individuals within the monitored area are wearing masks.
E. Image Preprocessing
Techniques for image enhancement, normalization, and resizing to prepare input images for object detection and analysis.
V. LITERATURE SURVEY & EXISTING SYSTEM:
[1]
Title |
An Intelligent Motion Detection Using OpenCV |
Name of Author |
Dr.Yusuf perwej |
Year of Publishing |
2022 |
Details |
One of the key reasons is that dealing with numerous restrictions such as environmental fluctuations makes the moving object detection process harder. For object detection and counting, OpenCV includes a number of useful techniques. |
[2]
Title |
Real-Time Face Mask Detection using OpenCV and DeepLearning. |
Name of Author |
H.S. Upendra |
Year of Publishing |
2021 |
Details |
In this research study, the Haar-Cascade algorithm, also known as the Voila-Jones algorithm, and OpenCV library classifiers are implemented to find whether someone is wearing a mask or not. |
[3]
Title |
Highly Accurate and Fine-grained Person Name Recognition |
Name of Author |
Rui Zhang |
Year of Publishing |
2021 |
Details |
It proposes a fine-grained annotation scheme based on anthroponymy. To take full advantage of the fine-grained annotations, we propose a Co-guided Neural Network (CogNN) for person name recognition. |
[4]
Title |
Adaptive moving object detection algorithm based on back ground subtraction and motion estimation. |
Name of Author |
Shengrong Gong |
Year of Publishing |
2018 |
Details |
use adaptive Gaussian mixture model (AGMM) to model background and get regions of moving objects by background subtraction. |
VI. PROBLEM STATEMENT
The problem is that in some sensitive area where no one is allowed, so detect the motion to identify if someone is entering in there and check if that person is present in dataset or not.
VII. OBJECTIVES
VIII. ADVANTAGES
IX. DISADVANTAGES
X. APPLICATIONS
XI. SYSTEM OVERVIEW
The Intruder Detection System is designed to monitor and secure a specified area, such as a home, office, or facility, by detecting and alerting to potential intrusions.
The system combines various sensors and technologies to achieve its objectives:
XII. BLOCK DIAGRAM
Fig.1 shows the block diagram of the proposed Unauthorized Entry Detection System. Precisely, the proposed system is to detect intruders or authorized persons and alert the security with a buzzer and vibration on positive detection.
B. Software
We are using “PYTHON “coding for our implementation. This language gave high accuracy on face detection. Thus, we have two main functions on that. First one for detecting the eye blinking and the second one is for reading the blinking. This calculation invoked into the complete set of 1programs. The camera system continuously monitors and sends the video file to the programming. The function which is for getting the data to observe it and the blinking detection function reads the file if it detects then it completely makes reading with that corresponding function and the signals are send to the alerting mechanism.
The most modern technologies used in the struggle against theft and destruction are video monitoring and surveillance. With the help of technology, it is possible to see and record every square inch and passing second of the area of interest. Face detection and identification techniques are used to achieve the aim. To discover, locate, and extract faces in obtained pictures, knowledge-based face detection techniques are applied. Based on the findings of the study presented, real-time face mask identification using OpenCV and deep learning algorithms is a remarkable solution for straightforward facemask recognition.
[1] Belhassen Akrout and Walid Mahdi, “Yawning detection by the analysis of variational descriptor for monitoring driver drowsiness”, International Image Processing, Applications and Systems (IPAS), 5-7 Nov. 2016. [2] Eugene Zilberg, Zheng Ming Xu, David Burton, Murrad Karrar and Saroj Lal, “Methodology and initial analysis results for development of non-invasive and hybrid driver drowsiness detection systems”, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007), 27-30 Aug. 2007. [3] Tianyi Hong and Huabiao Qin, “Drivers drowsiness detection in embedded system”, IEEE International Conference on Vehicular Electronics and Safety, 13-15 Dec. 2007. [4] Fouzia, R. Roopalakshmi, Jayantkumar A. Rathod, Ashwitha S. Shetty And K. Supriya, “Driver Drowsiness Detection System Based On Visual Features”, 2018 Second International Conference On Inventive Communication And Computational Technologies (ICICCT), 20 – 21 April 2018. [5] Yashika Katyal, Suhas Alur And Shipra Dwivedi, “Safe Driving By Detecting Lane Discipline And Driver Drowsiness”, Ieee International Conference On Advanced Communications, Control And Computing Technologies, 8-10 May 2014. [6] C. V Anilkumar, Mansoor Ahmed, R Sahana, R Thejashwini, P. S Anisha, “Design of Drowsiness, Heart Beat Detection System And Alertness Indicator For Driver Safety”, IEEE International Conference On Recent Trends In Electronics, Information & Communication Technology (Rteict), 20-21 May 2016. [7] Jang Woon Baek, Byung-Gil Han, Kwang-Ju Kim, Yun-Su Chung And Soo-In Lee, “Real-Time Drowsiness Detection Algorithm For Driver State Monitoring Systems”, Tenth International Conference On Ubiquitous And Future Networks (Icufn), 3-6 July 2018. [8] Gao Zhenhai, Le DinhDat, Hu Hongyu, Yu Ziwen and Wu Xinyu, “Driver Drowsiness Detection Based on Time Series Analysis of Steering Wheel Angular Velocity”, 9th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA), 14-15 Jan. 2017. [9] M. Omidyeganeh, A. Javadtalab, S. Shirmohammadi, “Intelligent Driver Drowsiness Detection Through Fusion Of Yawning And Eye Closure”, IEEE International Conference On Virtual Environments, Human-Computer Interfaces And Measurement Systems Proceedings, 19-21 Sept. 2011. [10] Brandy Warwick, Nicholas Symons, Xiao Chen and Kaiqi Xiong, “Detecting Driver Drowsiness Using Wireless Wearables”, 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems, 19-22 Oct. 2015 [11] Hyung-Tak Choi, Moon-Ki Back and Kyu-Chul Lee, “Driver Drowsiness Detection based on Multimodal using Fusion of Visual feature and Bio-signal”, 2018 International Conference on Information and Communication Technology Convergence (ICTC), 17-19 Oct. 2018. [12] Aldila Riztiane, David Habsara Hareva, Dina Stefani and Samuel Lukas, “Driver Drowsiness Detection Using Visual Information On Android Device”, International Conference on Soft Computing, Intelligent System and Information Technology (ICSIIT), 26-29 Sept. 2017. [13] Cyun-Yi Lin, Paul Chang, Alan Wang and Chih-Peng Fan, “Machine Learning and Gradient Statistics Based Real-Time Driver Drowsiness Detection”, IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW), 19-21 May 2018. [14] Omar Rigane, Karim Abbes, Chokri Abdelmoula, Mohamed Masmoudi, “A Fuzzy Based Method for Driver Drowsiness Detection”, 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA), 30 Oct.-3 Nov. 2017. [15] Abdullah Salem Baquhaizel, Mohamed El Amine Ouis, Meriem Boumehed, Abdelaziz Ouamri And Mokhtar Keche, “Driver Drowsiness Detection System”, 2013 8th International Workshop On Systems, Signal Processing And Their Applications (Wosspa), 12-15 May
Copyright © 2023 Omica Kale, Sanika Kshirsagar, Rupali Bathe. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET56367
Publish Date : 2023-10-30
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here