Face Recognition Based Security System Using Sift Algorithm

Tegala Balaprasad, R.V.V Krishna

Abstract


Present days most of the door lock systems are organized by humans with the application of keys, secured password & unpredictable pattern to operate the door. The purpose of this paper is to help the users to develop the security by using face detection & recognition at high sensitive locations. Face is a very complicated multidimensional structure hence it requires well recognized computing techniques for the identification of the face. This paper is encompassed into three parts: namely face recognition, automatic door access mechanism & sends SMS. Face recognition is the process of detecting the region of face in a person. This concept is implemented by using SIFT (Scale Invariant Feature Transform) Algorithm. It is established on Image features (Space, image translation, rotation, scaling, illumination and camera viewpoint), these set of significant features are used to describe the variation among face images. Face recognition is an essential part of biometrics in that basic mannerisms of human is matched to the existing data in database and depending on result of equivalent identification of a human being is extracted. The door responds automatically for the known person due to the command from the ARM7 processor. If the person is known from database sends report to the person mobile as a SMS “Welcome to the office”. On the other hand, alarm will ring for the unknown person & sends SMS to the control room as “ Unknown person is in front of the door”.


Keywords


SIFT Algorithm, SMS, GSM, ARM7.

References


F.Zuo, and P.H.N. de with, Real-time embedded face recognition for smart home, IEEE Trans. Consumer Electron, Vol.51, no. 1, pp.183-190, Feb.2005.

I.Kramberger, M.Grasic, and T.Rotovnik, Door Phone Embedded System for Voice Based User Identification and Verification Platform, IEEE Transactions On Consumer Electronics, Vol.57, No.3.pp: 1212-1217I, august 2011.

Ratnawati Ibrahim and Zalhan Mohd Zin, study of Automated Face recognition System for Office Door Access Control application, IEEE 3rd conference on communication software and Networks, pg. no: 132-136, may 2011.

M.Turk and A.Pentland, “Eigenfaces for recognition” journal of Cognitive Neuroscience, Vol.3, No.1, pp.71-86, 1991.

Peter N.Belhumeur, Joao P.Hespanha, and David J.kriegman. Eigenfaces Vs Fishersface: Recognition using class specific linear projection. IEEE Transactions on pattern analysis and machine Intelligence, 19(7): 711-720, July 1996.

Brown ,M.and Lowe, D.G 2002. Invariant Features from Inter Point groups. In British Vision conference, Cardiff, wales, pp.656-665.

Lowe, D.G.1996. Object recognition from local Scale Invariant Features. In International Conference on computer Vision, Corfu, Greece, pp.1150-115.

Yale face database. http://cvc.yale.edu

Y.K.Choi, K.M.Kim , J.W.Jung, S.Y.Chun and K.S.Park, “Acoustic Intruder Detection System for Home Security” IEEE Trans. Consumer Electron , Vol. 51,No. 1, pp: 130-138, Feb. 2005..

Y.Zao and Z. Ye, “ A Low Cost GSM/GPRs Based Wireless Home Security System”, IEEE Trans. Consumer Electron, Vol %1, No1, PP: 567-572, May.2008.

R.A.Fisher. The use of multiple measures in taxonomic problems. Ann. Eugenics, 7:179-188, 1936

David G. Lowe. Distinctive image features from scale-invariant keypoint. International journal of computer vision, 60, 2004.

F. Samaria and A. Harter. Parameterization of a stochastic model for human face identification. In 2nd IEEE workshop on applications of computer Vision, 1994.

Daniel L. Swets and John Weng. Using discriminate Eigen features for image retrivel. IEEE Transactions on pattern analysis and machine Untelligence, 18(8): 831-836, August 1996.


Full Text: PDF [FULL TEXT]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.