REAL TIME DOOR SECURITY SYSTEM WITH THREE POINT AUTHENTICATION

Authors:

Umm-e-Laila,Faheem Ali,Syed Siraj Uddin,Muhammad Shariq Sadiq,Muhammad Shahroz Siddiqui,Muhammad Ibrar ul Haque,

DOI NO:

https://doi.org/10.26782/jmcms.spl.6/2020.01.00005

Keywords:

Biometrics,Face Recognition,Fingerprint Sensor,Voice Message Transfer,Security system authorization,

Abstract

Security plays an important role in everyday life example in offices, institutions, libraries, laboratories and others. Providing security is necessary in order to keep important data confidential so that unauthorized person could not have an access on them. RFID cards were used to provide security. These cards however were not much useful for the user due to chances of getting lost, stolen and forgotten. The purpose of this study is to provide a Real time door security system with three-point authentication by designing a smart door access system using fingerprint module, face reorganization authorization and voice message passing. Use of this system is intended to provide access only to authorized persons. The term 'home.' Security 'is becoming increasingly prevalent as a major issue in today's life challenger. Developing a home-protection device is to make it user-friendly that can reduce human effort, ensure the safety and security of people and their homes. In case, the person categorizes as known guest, the device sounds a tune but don’t open the door automatically rather people inside home can open the entrance door from anywhere of the home. As guest is known people don’t need to walk towards door to open it. And when device detects the person as unknown person, it generates a notification at that an unknown person wish to enter your home.

Refference:

I. H. Hassan, R. Bakar, and A. Thaqib Fawwaz Mokhtar, “Face recognition
based on auto-switching magnetic door lock system using
microcontroller,” (2012)
II. K. P. Bhattarai, B. P. Gautam, and K. Sato, “Authentic Gate Entry
System (AuthGES) by Using LBPH for Smart Home Security,” in 2018
International Conference on Networking and Network Applications
(NaNA), (2018)
III. R. S. Divya and M. Mathew, “Survey on various door lock access control
mechanisms,” in 2017 International Conference on Circuit ,Power and
Computing Technologies (ICCPCT), (2017)
IV. “Super secure door lock system for critical zones – IEEE Conference
Publication.” [Online]. Available:
https://ieeexplore.ieee.org/document/8076773. [Accessed: 15-Jun] (2019)
IV. P. R. Nehete, J. P. Chaudhari, S. R. Pachpande, and K. P. Rane,
“Literature Survey on Door Lock Security Systems,” Int. J. Comput.
Appl., vol. 153, no. 2, pp. 13–18, Nov. (2016)
VI. U. Laila, M. Ahmad Khan, M. Kashif Shaikh, S. Annas bin Mazhar, and
K. Mahboob, “Comparative analysis for a real time face recognition
system using raspberry Pi,” (2017)
VII. Y. Tae Park, P. Sthapit, and J.-Y. Pyun, “Smart digital door lock for the
home automation,” (2009)
VIII. A. Anitha, “Home security system using internet of things,” IOP Conf.
Ser. Mater. Sci. Eng., vol. 263, p. 042026, Nov. (2017)
IX. M. Lal, K. Kumar, R. H. Arain, A. Maitlo, S. A. Ruk, and H. Shaikh,
“Study of Face Recognition Techniques: A Survey,” Int. J. Adv. Comput.
Sci. Appl. IJACSA, vol. 9, no. 6, (2018)

View | Download