Authentic Gate Entry System (AuthGES) by Using LBPH for Smart Home Security<bold> </bold>

被引:0
|
作者
Bhattarai, Krishna Prasad [1 ]
Sato, Kazuhiko [2 ]
Gautam, Bishnu Prasad [3 ]
机构
[1] Muroran Inst Technol, Div Informat & Elect Engn, Muroran, Hokkaido, Japan
[2] Muroran Inst Technol, Coll Informat & Syst, Muroran, Hokkaido, Japan
[3] Wakkanai Hokusei Gauen Univ, Depeartment Integrated Media, Wakabadai 1-2290-28, Wakkanai, Hokkaido, Japan
关键词
Face Detection; LBPH Algorithm; Machine Learning; Feature Extraction; Authentic Gate Entry System<bold>; </bold>;
D O I
10.1109/NaNA2018.2018.00042
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a smart home security system by using local binary pattern histograms (LBPH) face detection algorithm is proposed to enhance the security level of entry-system. Face recognition is an interesting but challenging in machine learning field and impacts important applications in many areas such as remote sensing, machine/robot vision, pattern recognition, medical field, banking and security system access, and authentication in personal electronics gadget. In this research paper, we proposed the door lock security system using image processing instead of traditional key and digital lock system. The image processing mainly consists of three parts, namely face representation, feature extraction and identification of face. Face representation represents how to model a face with LBPH algorithms of detection and recognition. The most useful and unique features of the face image are extracted in the feature extraction phase. In the identification of face the new face image is compared with the images which are already extracted and saved on database. Face detection and recognition method was applied to allow the authorized dwellers and the guest and prevent unwanted person to enter inside the house.<bold> </bold>
引用
收藏
页码:191 / 196
页数:6
相关论文
共 50 条
  • [1] IoT-Based Smart Home Security and Automation System<bold> </bold>
    Chakraborty, Partha
    Sultana, Sajeda
    [J]. MICRO-ELECTRONICS AND TELECOMMUNICATION ENGINEERING, ICMETE 2021, 2022, 373 : 497 - 505
  • [2] <bold>Mars Science Laboratory Entry, Descent, and Landing System Overview</bold>
    Prakash, Ravi
    Burkhart, P. Dan
    Chen, Allen
    Comeaux, Keith A.
    Guernsey, Carl S.
    Kipp, Devin M.
    Lorenzoni, Leila V.
    Mendeck, Gavin F.
    Powell, Richard W.
    Rivellini, Tommaso P.
    Martin, A. Miguel San
    Sell, Steven W.
    Steltzner, Adam D.
    Way, David W.
    [J]. 2008 IEEE AEROSPACE CONFERENCE, VOLS 1-9, 2008, : 479 - +
  • [3] IOT based facial recognition system for home security using LBPH algorithm
    Bhatia, Prayag
    Rajput, Shakti
    Pathak, Shashank
    Prasad, Shivam
    [J]. PROCEEDINGS OF THE 2018 3RD INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2018), 2018, : 191 - 193
  • [4] <bold>Smart Micro Sensors with RF Transmitter for Intelligent Human Sensing System</bold>
    Kim, Jong-Wan
    Ichikawa, Takehiko
    Takao, Hidekuni
    Sawada, Kazuaki
    Ishida, Makoto
    [J]. PROCEEDINGS OF THE 2006 IEEE SENSORS APPLICATIONS SYMPOSIUM, 2006, : 78 - 81
  • [5] Preserving Security and Privacy in IoT Using Machine Learning and Trust Management<bold> </bold>
    Kumar, Avinash
    Bhowmik, Trisha
    Sharma, Rohit
    Bhardwaj, Abhishek
    [J]. MICRO-ELECTRONICS AND TELECOMMUNICATION ENGINEERING, ICMETE 2021, 2022, 373 : 349 - 361
  • [6] The Personal Security of Children Demands Bold System Reform
    Herrenkohl T.I.
    Lonne B.
    Higgins D.
    Scott D.
    [J]. International Journal on Child Maltreatment: Research, Policy and Practice, 2020, 3 (1) : 9 - 17
  • [7] A Resilient Algorithm for Power System Mode Estimation using Synchrophasors<bold> </bold>
    Rajabi, Arezoo
    Bobba, Rakesh B.
    [J]. 2ND ANNUAL INDUSTRIAL CONTROL SYSTEM SECURITY WORKSHOP, ICSS 2016, 2016, : 23 - 29
  • [8] Secure Smart Contract Based on Elliptic Curve in Property Exchange Applications Using Blockchain<bold> </bold>
    Sabah, Noor
    [J]. MICRO-ELECTRONICS AND TELECOMMUNICATION ENGINEERING, ICMETE 2021, 2022, 373 : 447 - 456
  • [9] C2S, a New Cryptographic Command Set for Smart Card Operating System<bold> </bold>
    Eldeeb, Hazem M.
    Dahshan, Hisham M.
    Shehata, Alaa El-Din R.
    [J]. 2018 14TH INTERNATIONAL COMPUTER ENGINEERING CONFERENCE (ICENCO), 2018, : 236 - 241
  • [10] <bold>Optimum Bit Allocation Using Human Visual System for Video Compression</bold>
    Gohokar, V. V.
    Gohokar, V. N.
    [J]. ICCIMA 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND MULTIMEDIA APPLICATIONS, VOL III, PROCEEDINGS, 2007, : 84 - +