Professional Documents
Culture Documents
Electrical
and Electronic
Engineering
(Instrumentation
& Control)
CONFIDENTIAL
(Contains
confidential
information under
the Official Secret Act
1972)*
RESTRICTED
OPEN ACCESS
Signature
Name of Supervisor :
Date
2. The Library of Universiti Teknologi Malaysia has the right to make copies for the
purpose of research only.
3. The Library has the right to make copies of the thesis for academic exchange.
Certified by:
SIGNATURE
SIGNATURE OF SUPERVISOR
(910522-14-5470)
NOTES:
If the thesis is CONFIDENTAL or RESTRICTED, please attach with the letter from
Date: 18 JUN 2014
Date: 18 JUN 2014
the organization with period and reasons for confidentiality or restriction.
Signature
: .........
: ..
JUNE 2014
ii
I declare that this thesis entitled Face Recognition Security System for
Acceess Control is the result of my own research except as cited in the
references.
Signature
: ....
Name of Candidate
Date
iii
iv
ACKNOWLEDGMENT
First and foremost, praise be to Allah because of His love and strength that
He has given to me to complete my final year project entitled Face Recognition
Security System for Access Control. I do thank for His blessings in my daily life,
good health, healthy mind and good ideas although I have to go through some
difficulties along the way.
Thank You.
ABSTRACT
In recent years, security systems have become one of the most demanding
systems to secure our assets and protect our privacy. A more reliable security system
should be developed to avoid losses due to identity theft or fraud. Thus, a lot of
researches have been done in order to improve established security system,
especially systems that are based on human identification. Face recognition system is
widely used in human identification process due to its capability to measure and
subsequently identifies human identification especially for security purposes. The
aim of this project is to develop a real-life application of a security lock system using
a face recognition method. Principal Component Analysis (PCA) is selected for the
face recognition algorithm due to its fast response of recognition process and less
sensitive to noise and interference. A Graphical User Interface (GUI) is developed
for this system and the Arduino microcontroller is used to switch off the magnetic
door in response to positive face identification. USB serial communication is used to
interface between the GUI in MATLAB and Arduino UNO microcontroller as it
allows input data transmission from MATLAB to Arduino UNO microcontroller.
First, the image of the individual is captured using an integrated webcam. The
captured image is then transferred to the database developed in MATLAB. In this
stage, the captured image compares to the training image in the database to
determine the individual status. If the system recognizes the individual as an
authorized person, the signal will be sent to the Arduino UNO microcontroller and
used to grant access to an entry or not At the moment, the system gives 90% of
accuracy.
vi
ABSTRAK
vii
TABLE OF CONTENTS
CHAPTER
TITLE
PAGE
TITLE
DECLARATION
ii
DEDICATION
iii
ACKNOWLEDGMENT
iv
ABSTRACT
ABSTRAK
vi
TABLE OF CONTENTS
vii
LIST OF TABLES
LIST OF FIGURES
xi
LIST OF ABBREVIATIONS
xii
LIST OF APPENDICES
xiii
INTRODUCTION
1.1
Background of.Project
1.2
Problem Statement
1.3
Project Objective
1.4
Project Scope
1.5
Significance of Project
1.6
Thesis Outline
LITERATURE REVIEW
2.1
viii
2.2
2.3
Biometric Technology
11
11
Recognition
2.4
12
13
Conclusion
14
METHODOLOGY
3.1
Introduction
15
3.2
Project Planning
15
3.3
Project Overview
17
3.4
Software Development
17
18
18
19
Algorithm
3.5
3.4.4 Classification
22
22
Microcontroller
3.6
Conclusion
24
Introduction
25
4.2
Background Parameter
27
4.3
28
4.4
30
4.5
Conclusion
33
ix
Conclusion
35
5.2
Future Work
35
PROJECT MANAGEMENT
6.1
Introduction
37
6.2
Project Schedule
38
6.3
Cost Estimation
39
REFERENCES
41
APPENDICES A-B
43
LIST OF TABLES
TABLE
TITLE
PAGE
21
10
4.1
26
4.2
27
4.3
29
database
4.4
31
4.5
33
6.1
39
system
6.2
40
xi
LIST OF FIGURES
FIGURE
TITLE
PAGE
2.1
2.2
2.3
3.1
16
3.2
System overview
17
3.3
18
3.4
20
3.5
23
4.1
27
controlled background
4.2 (a)
29
4.2 (b)
29
4.3
31
4.4
32
4.5
32
4.6
34
Project schedule
38
xii
Covariance matrix
DLM
EBGM
ED
Euclidean Distance
GUI
ID
Identification
LDA
LED
MATLAB
Math Laboratory
PCA
RFID
TTL
UART
USB
xiii
LIST OF APPENDICES
APPENDIX
TITLE
PAGE
43
50
CHAPTER 1
INTRODUCTION
1.1
Background of Project
In recent years, it is very important to have a reliable security system that can
secure our assets as well as to protect our privacy. The conventional security system
requires a person to use a key, identification (ID) card or password to access an area
such as home and office. However, the existing security system has several
weaknesses where it can be easily forged and stolen. Thus, the problems lead to an
increased in interest in biometric technology to provide a higher degree of security to
replace the conventional security system.
The input of the system is a face image captured by the integrated webcam.
Once the face image is captured, it is then transferred into MATLAB programming
for the face recognition process. Next, the input face image will be compared to the
training image in the training database. The recognition process is done by using
Principal Component Analysis (PCA) algorithm.
The Arduino UNO microcontroller is used in the system to control the output
of the system which is magnetic door. If the system recognizes the subject as an
authorized person, the signal will be sent to the Arduino UNO microcontroller and
used to unlock the magnetic door. Conversely, if the subject is unrecognized, the
magnetic door will remain locked.
1.2
Problem Statement
Security is an ultimate concern in our daily life. One of the most important
fields in security system is the access control which controls the entranceways of a
building or an area such as home and office. The security for access control is very
important as a high number of burglary cases were reported every year. Based on
statistics reported by the Royal Malaysia Police, 11,586 burglary cases were reported
from January 2013 until June 2013 [1]. The huge amount of burglary cases lead to a
huge amount of losses faced by the victims. The huge amount of losses emphasized
that the security system should not be taken lightly.
The conventional security system for access control is not reliable since it can
be forged and stolen. For example, the password and ID card can be easily breached
since the password can be divulged to an unauthorized user, and the ID card can be
stolen by an impostor [2]. Apart from that, the traditional security methods like keys
and ID card can be easily lost and misplaced.
conventional security system. From [3], biometrics is the most secure and convenient
authentication tool since it cannot be borrowed, stolen, or forgotten, and forging one
is practically impossible.
The system is developed using the PCA algorithm for the recognition
process. The PCA algorithm is selected as the main algorithm in face recognition
process due to the simplicity of realization and the speed of recognition with respect
to the other method. Besides, the efficiency of the system is increased as PCA
reduced the data dimension and operate in smaller dimension.
1.3
Project Objective
The objective of this project is to design a security system for access control
using a face recognition system. The specific objectives that have to be achieved are
as follows:
1.4
i.
ii.
iii.
Project Scope
This project is divided into three main parts. The first part focus on the
research and literature review of the project. In this part, the theory, algorithm and
application of a security system based on face recognition was studied. A small
research on the previous face recognition project has been made in order to get an
idea of the working principle of the system.
The second part is based on the software programming. MATLAB has been
used to develop the database to implement face recognition system. Face recognition
system is developed in MATLAB using Computer Vision System Toolbox and
Image Processing Toolbox. PCA algorithm has been used as the main algorithm in
the process of face recognition.
The last part is based on the hardware development. The output or application
of this project is the magnetic door which is controlled by the Arduino UNO
microcontroller. The output depends on the result from recognition process. A
comparison is made between the input image and the training image in the training
database during the recognition process. The magnetic door will unlock if the system
recognizes the input image and vice versa.
1.5
Significance of Project
The main advantage of this project is a higher degree of security system for
access control system can be developed. The problem encounter with conventional
existing security system such as stolen of ID card and keys can be solved. By
implementing biometric technology based on face recognition system for access
control, the losses due to burglary cases can be reduced.
1.6
Thesis Outline
Chapter 3 discussed about the methodology and the approach used in the
project. It defines and illustrates the steps involved in developing the system. The
steps taken in software development as well as the hardware development are
discussed in details in this chapter.
In Chapter 4, it includes the results of the analysis that has been done. The
analysis is done to determine the accuracy rate of the system. The analysis is done by
adding challenging details such as background parameter, multi train image and
variation in head position.
Chapter 5 is for the discussion and the conclusion of the project. The
conclusion is made based on the objective of the project. Future recommendations
were also discussed for further improvement of the system.
CHAPTER 2
LITERATURE REVIEW
2.1
The design takes into account the concept where the current has allowed to
flow through the wire for the production of magnetic flux or magnetic power. The
door will keep locked as the produced power provides a necessary strength that keeps
the door from being opened. The magnetic flux causes the armature plate to attract to
the electromagnet. Thus, the locking action is created and securely locks the door.
The operation methods of magnetic door can be divided into three basic
operations. The first method involves the use of a keypad system such as passwords.
The system will lock and unlock with the numeric code. A smart card such as Radio
Frequency Identification (RFID) tag is used in the second operation method of
magnetic door which is typically used for business and commercial buildings. For the
last operation method, the magnetic door can be operated using biometrics
technologies such as thumb print and face recognition.
2.1.1
2.1.2
Smart card allows the card owner to access the facility. A smart card can be
programmed to allow or deny access through specified doors or facility. It stores
protected information and the persons privileges. There are two types of smart card
either contact or contactless. The contactless smart card usually used the electronic
signal to transfer data while physical contact is used for communication in contact
based card. However, it has several weaknesses as the card can be easily lost, stolen
or damage if it is exposed to high electromagnetic field.
2.1.3
2.2
Biometric Technology
Since each person has their own unique characteristics, security system based
on biometric technology is highly recommended. In [3], it is stated that biometrics
are the most secure and convenient authentication tool as it cannot be borrowed,
stolen or forgotten. Besides, by using biometric authentication method, it is easy to
check whether a person has several identities or not.
10
as being low (L), medium (M) or high (H). A higher ranking indicates a good
performance while a lower ranking indicates a poor performance.
Circumvention
Acceptability
Performance
Collectability
Permanence
Distinctiveness
Identifier
Universality
Face
Fingerprint
Signature
Voice
The face recognition method has a higher degree in universality and moderate
degree in permanence factor. Although for the distinctiveness and performance
factors of face recognition is relatively low, face recognition has higher usability and
security where less than 0.0001% failure to enroll and acquire rate [6]. Thus, based
on this point of view, face recognition method was selected in developing the
security system for access control.
11
2.2.1
Face Recognition
The face recognition process consists of four main steps which are image
acquisition, preprocessing, features extraction and classification. Feature extraction is
the key step of any face recognition process. Feature extraction extracts the feature
vector and information which represent the face in the face image. Thus, feature
extraction is the most important step in face recognition.
The selection of features that represent the face image is done in feature
extraction step. There are two basic methods in feature selection of face recognition
as discussed in [8]. The first method used global features approach or holistic
approach while the second method used local features approach. Global features use
the pixel level information from the input face image as the main features while local
features use geometric relationship among features such as the distance between two
eyes and the size of the eyes itself [9].
2.3
12
Discriminant Analysis (LDA) while Elastic Bunch Graph Matching (EBGM) and
Dynamic Link Matching (DLM) is based on local features method [10].
PCA is an overall statistical method on the face image where the objective is
to retain the most information about the original image by finding the set of most
representative projection vectors [11]. Meanwhile, LDA aims to find the subspace
that best discriminates different face classes between intra-personal classes and
extra-personal classes. Both PCA and LDA algorithms contribute in the reduction of
data.
2.3.1
Typically, two phases are included in the PCA algorithm which are the
training phase and the classification phase. In the training phase, the eigenspace was
established from training samples and the training images are mapped to eigenspace
for classification. During the classification phase, an appropriate classifier is used to
classify when input is projected to the same eigenspace.
13
2.3.2
Rather than searching for information that best describe the data, LDA
searches for vectors in underlying space that best discriminate among classes. In
other words, LDA generates a linear combination of independent features that yields
the largest mean differences between the desired classes [13]. There are two class
scatter matrix in LDA. The image within-class scatter matrix or known as intrapersonal class and the image between-class scatter matrix.
In [18], it is stated that PCA can outperform LDA if the training data set is
small. PCA is a more suitable algorithm for access control since PCA gives faster
response of recognition compared to LDA. Besides, PCA also has the advantage of
simple computerization.
14
2.4
Conclusion
As a conclusion, after reviewing several thesis and paper work from previous
research, it can be concluded that biometrics based security system offers a higher
degree of security compared to the conventional security system. Face recognition
has an advantages of easy client acceptance and universality. For features extraction
algorithm in face recognition process, PCA is chosen due to its fast response in
recognition process as well as the low sensitivity to noise. Therefore, the system will
be developed based on face recognition method by using the PCA algorithm.
15
CHAPTER 3
METHODOLOGY
3.1
Introduction
The aim of this project is to develop a security system for access control
based on face recognition. This includes the study of development on biometric
technology, face recognition system and also the magnetic door theory. The
development of this project consists of three main parts. The first part is basically on
literature review followed by the software and hardware development.
3.2
Project Planning
16
Start
Literature review
Security system for access
control
Development of database for
face recognition using PCA
No
Acceptable?
Yes
Stop
Design
improvement
17
3.3
Project Overview
Figure 3.2 shows an overview of the system. The input image which is
captured using integrated webcam is transferred to MATLAB programming for the
recognition process. The data from recognition process is used as the input for the
Arduino UNO microcontroller. If the system recognized the person or claim that the
person as an authorized person, the magnetic door will unlock. In contrast, if the
system did not recognize the person, the magnetic door will remain locked.
3.4
Software Development
18
Figure 3.3 shows the main steps of face recognition process. The face
recognition process goes under image acquisition, preprocessing, feature extraction,
and classification stages.
Image
Acquisition
Pre
Processing
Feature
Extraction
Classification
3.4.1
Image Acquisition
First, in the image acquisition process, the input face image is captured via
integrated webcam. Once the input image is captured, the features information will
be extracted. The purpose of image acquisition is to seek and extract a region which
contains only the face.
3.4.2
Preprocessing
19
3.4.3
This system used global features approached for feature selection. Global
features approach weights each pixel equally regardless it is the face pixel or the
background pixel. This approach will encode the entire face and represent face as a
code point in higher dimensional image space [9].
Feature extraction algorithm extracts features of the data and creates new
features based on the transformation or a combination of the original data. In this
system, PCA algorithm is implemented for the feature extraction algorithm. The
PCA algorithm used eigenfaces to find a vector that best distribution of face images.
PCA is used for feature extraction and data reductions. The basic working
principle of PCA is to extract the characteristic of feature on the face and represent
the face in the linear combination. The principle component of face in the training set
is then calculated.
20
Figure 3.4 shows the working principle of the PCA algorithm as discussed in
[12].
21
(3.1)
(3.2)
From Equation 3.1 and Equation 3.2 above, is the mean of whole data in
vector form while
is the image data after the mean is removed. Next, the image
data are combined into data matrix and to create covariance matrix, by multiplying to
its transpose. The equation to create a covariance matrix is shown in the Equation
3.3.
(3.3)
For the distance measure, the Euclidean Distance between the image data and
eigenfaces are calculated using Equation 3.4 where is a vector describing the face
class. An image with a minimum value of ED is recognized as the equivalent image.
||
||
(3.4)
22
The main advantages of the PCA are its low sensitivity to noise, the reduction
of the requirements of the memory and the capacity, and the increase in the
efficiency due to the operation in a space of smaller dimensions [12]. Even though
the PCA algorithm is sensitive to changes in illumination and facial expression,
however PCA algorithm has an advantage on real-time recognition.
3.4.4
Classification
The system used the Euclidean Distance (ED) method as the classifier. ED is
the nearest mean classifier which is commonly used for decision making rules. The
ED is obtained by calculating the distance between the test image and the training
image in the database. A minimum ED must be obtained in order to recognize the
expression of the input image.
The maximum value of ED between the test image and the training image is
set to 4.00 x1015. Thus, if the ED between two images is smaller than 4.00ex1015, the
system will recognize the identity of the person and gives an entry permission which
means the magnetic door will unlock. However, if the ED is higher than the value
that we have set earlier, the identity of the person will not recognize by the system
and the magnetic door will remain locked. Refer to Appendix A for the source code
of the project in software development.
3.5
23
24
3.6
Conclusion
25
CHAPTER 4
4.1 Introduction
(4.1)
The Euclidean Distance is set to 4.00x1015 as the highest value of distance for
the system to recognize the image. If two images of the same person have the
smallest distance, it is assumed as a successful recognition. The total number of the
recognition in this analysis has been fixed at 20 times.
Based on previous works, there are three main parameters that have been
considered in order to determine the rate of accuracy of the system. Three main
parameters that were analyzed are the background of the face image, the effect of
using multi train image in training database and the variation in head position. The
parameters were varied between uncontrolled condition and controlled conditions to
26
determine the effect on the accuracy rate of the system. The analysis is done using an
offline approach where the face image is used from available digital images.
Initially, the system is set up without controlling any parameter. The result of
the initial analysis is used as a reference. The objective is to determine the accuracy
rate of the system at the most uncontrolled condition. The result of the analysis is
tabulated in Table 4.1 and will be used as a reference.
Euclidean Distance
4.8553 x1015
Status
Unmatched
3.7300 x1014
Matched
4.9989 x1015
Unmatched
6.1992 x1015
Unmatched
15
1.5455 x10
Matched
2.6281 x1015
Matched
6.3466 x1015
Unmatched
1.3194 x1014
Matched
4.9207 x1015
Unmatched
10
7.7431 x1015
Unmatched
11
5.4063 x1015
Unmatched
12
7.6222 x1013
Matched
13
6.9572 x1015
Unmatched
14
5.5884 x1015
Unmatched
15
14
1.1219 x10
Matched
16
8.8637 x1014
Matched
17
4.3427 x1015
Unmatched
18
6.3084 x1015
Unmatched
19
7.1160 x1014
Matched
20
5.4079 x1015
Unmatched
27
From the analysis, the system gives 40% of accuracy. The accuracy rate of
the system with uncontrolled parameters is not suitable for the application of access
control. The application of access control needs high rate of accuracy as the system
need to differentiate between authorized and unauthorized person to grant the access.
Thus, further analysis should be made to improve the accuracy rate of the system.
4.2.
Background parameters
Euclidean Distance
4.7896 x1014
Status
Matched
2.7727 x1014
Matched
28
4.3043 x1015
Unmatched
6.6339 x1015
Unmatched
9.5630 x1015
Unmatched
1.7423 x1014
Matched
5.9310 x1015
Unmatched
4.3694 x1015
Unmatched
1.8985 x1015
Matched
10
1.9417 x1014
Matched
11
1.3298 x1015
Matched
12
1.1746 x1016
Unmatched
13
8.9135 x1015
Unmatched
14
2.3241 x1015
Matched
15
1.2424 x1014
Matched
16
1.3245 x1016
Unmatched
17
1.1746 x1016
Unmatched
18
2.2039 x1014
Matched
19
14
3.1594 x10
Matched
20
7.0347 x1013
Matched
Next, the number of training image per person is increased from a single
image per person to 5 images per person in order to increase the accuracy rate of the
29
Table 4.3: The result of using multi train image in training database
Test Image
Euclidean Distance
Status
4.2801 x1015
Unmatched
30
7.9862 x1013
Matched
4.7789 x1013
Matched
8.1918 x1013
Matched
1.0360 x1014
Matched
2.4710 x1014
Matched
3.2824 x1013
Matched
2.1673 x1014
Matched
2.5106 x1016
Unmatched
10
2.3328 x1014
Matched
11
8.7543 x1013
Matched
12
1.8824 x1013
Matched
13
5.2020 x1013
Matched
14
6.5377 x1015
Unmatched
15
1.3242 x1015
Unmatched
16
7.8020 x1012
Matched
17
1.1324 x1013
Matched
18
13
5.5738 x10
Matched
19
2.0821 x1013
Matched
20
4.7807 x1014
Unmatched
The system shows an increased in the rate of accuracy from 55% to 75%.
Thus, it is proven that the rate of accuracy of the system is proportional to the
number of training image per person in train database. The accuracy rate of the
system increased as the number of training image increased. Higher number of
training image provides more basis vector in the feature space and produce less
reconstruction errors.
4.4
In order to increase the accuracy rate, the variation in position of the subject
should be minimized. For uncontrolled position, the head position of the subjects is
31
Euclidean Distance
Status
13
1.5234 x10
Matched
7.5828 x1013
Matched
1.7044 x1013
Matched
1.1007 x1014
Matched
3.0640 x1014
Matched
4.4032 x1015
Unmatched
4.4783 x1013
Matched
2.7927 x1013
Matched
1.1624 x1013
Matched
10
1.0612 x1013
Matched
11
13
2.3825 x10
Matched
12
2.3596 x1013
Matched
13
8.2604 x1012
Matched
14
2.9802 x1014
Matched
15
5.2091 x1015
Unmatched
16
3.8850 x1013
Matched
32
17
9.5354 x1013
Matched
18
1.8897 x1013
Matched
19
7.3886 x1013
Matched
20
1.3150 x1013
Matched
The accuracy rate of the system improved from 75% to 90% based on the
analysis. With a minor tolerance of side movement of the head position, the system
successfully recognized 18 identities. It shows that the head position of the subject is
one of the challenges in face recognition.
33
4.5
Conclusion
For the conclusion, the system gives the lowest accuracy rate when all the
three parameters are in uncontrolled condition. By controlling the background
parameters, the accuracy rate increased from 40% to 55%. Besides, the rate of
accuracy of the system with the use of multi train image. Lastly, by reducing the
variation in head position also increased the accuracy rate of the system. The system
gives the highest accuracy which is 90% with all the parameters in controlled
conditions. The summary of the analysis is tabulated in Table 4.5.
Parameter
Background
Multi Train
Accuracy Rate
Head Position
(%)
Image
1
Uncontrolled
Uncontrolled
Uncontrolled
40
Controlled
Uncontrolled
Uncontrolled
55
Controlled
Controlled
Uncontrolled
75
Controlled
Controlled
Controlled
90
Based on Table 4.5, the graph of the relationship between the accuracy rate of
the system and the condition of the parameters is plotted. The graph of the
relationship between the accuracy rate of the system and the condition of the
parameters is plotted in Figure 4.6.
34
40
20
0
1
Figure 4.6: Relationship between the accuracy rate of the system and the condition
of parameter
35
CHAPTER 5
CONCLUSION
5.1
Conclusion
The analysis shows that the system gives a higher accuracy rate with
controlled background parameter compared to the uncontrolled background
parameter. Besides, the accuracy rate of the system is directly proportional to the
number of training image and as the variation in head position decrease, the accuracy
rate increase. Therefore, in order to get maximum accuracy rate of the system, all
parameters should be set in controlled conditions. The system gives the highest
accuracy rate with all parameters is in controlled condition which is 90%.
5.2
Future Work
There are several problems occurs during the development of the system. The
main problem is the serial connection between MATLAB and Arduino UNO
microcontroller. Based on previous reading, the communication error is a common
36
37
CHAPTER 6
PROJECT MANAGEMENT
6.1
Introduction
38
6.2
Project Schedule
Two semesters are given for the development of the project, including the
analysis and testing of the system. A Gantt chart on the details of work contribution
June
May
April
March
February
January
December
November
October
Activities
September
Progress
Evaluation
Literature Review
Software
Development
Hardware
Development
Model Building
Analysis and
Troubleshooting
Thesis Write-up
Thesis submission
Figure 6.1: Project Schedule
Figure 6.1 shows that the progress discussion and literature review are done
throughout the two semesters. The literature review is very important as it justifies
the proposed methodology and the progress discussion is important to track the
project development so that it can be done within the prescribed time. Software
development is done from October to March while hardware development is done
from January to March. Next, it is followed by the building of the model, analysis
and troubleshooting of the system, writing the thesis as well as the thesis submission.
39
6.3
Cost Estimation
Table 6.1 shows the cost estimation for the hardware development of the
system. As the system requires a simple circuit for the hardware, thus the system is
developed within the budget given. Since only the prototype of the system is being
developed, cheaper components are used in this project without neglecting the
functions and criteria needed.
Quantity
Unit Price
Total
Arduino Uno-R3
RM58.00
RM58.00
RM70.00
RM70.00
RM2.50
RM2.50
Green
RM0.20
RM0.20
RM0.20
RM0.20
Transistor 2N3904
RM0.40
RM0.40
RM0.05
RM0.10
RM0.05
RM0.05
RM0.40
RM0.80
RM1.60
RM1.60
TOTAL
RM133.85
40
The cost estimation of a system that are based on RFID technology is shown
in Table 6.2.
Quantity
Unit Price
Total
RFID Card
RM3.50
RM3.50
RM135.00
RM135.00
Arduino Uno-R3
RM58.00
RM58.00
RM70.00
RM70.00
RM2.50
RM2.50
Green
RM0.20
RM0.20
RM0.20
RM0.20
Transistor 2N3904
RM0.40
RM0.40
RM0.05
RM0.10
RM0.05
RM0.05
RM0.40
RM0.80
RM1.60
RM1.60
TOTAL
RM272.35
41
REFERENCES
1. Official Portal of Royal Malaysia Police, Statistik Jenayah Pecah Rumah JanJun 2013, Retrieved November 20, 2013 from www.rmp.gov.my
2. Nazeer, S.A., Omar, N., and Khalid, M. (2007). Face Recognition System using
Artificial Neural Networks Approach. International Conference on Signal
Processing, Communications and Networking. 22-24 February 2007. ICSCN.
2007. 420-425,
3. Liu, S., and Silverman, M. A Practical Guide to Biometric Security Technology,
IT Professional, (2001). 3(1): 27-32.
4. Jain, A. K., Ross, A., and Prabhakar, S. An Introduction to Biometric
Recognition. IEEE Transaction on Circuits and System for Video Technology.
(2004) 14(1): 4-20.
5. Faundez-Zanuy, M., Biometric Security Technology. IEEE Transaction on
Aerospace and Electronic System. (2006) 21(6): 15-26.
6. Committee of Hanvon. (n.d.). Face ID :FAQ. Retrieved October 27, 2013, from
http://www.hanvon.com/en/products/FaceID/downloads/FAQ.html
7. Kar, S., Hiremath, S., Joshi, D.G., Chadda, V.K, and Bajpai, A. A MultiAlgorithmic Face Recognition System. International Conference on Advanced
Computing and Communication. December 20-23, 2006 ADCOM 2006. 321326.
8. Agarwal, M., Agarwal, H., Jain, N., and Kumar, M., Face Recognition Using
Principle Component Analysis, Eigenface and Neural Network. International
Conference on Signal Acquisition and Processing. February 9-10, 2010. ICSAP
2010. 310-314.
9. Riddhi, C., and Neha, P., Details Study On 2D Face Recognition Technique
Using Local And Global Features. Indian Streams Research Journal. 2013.
3(2):1-17.
42
10. Juwei, L., Plataniotis, K.N, and Venetsanopoulos, A.N. Regularization Studies of
Linear Discriminant Analysis in Small Sample Size Scenarion with Application
to Face Recognition. Pattern Recognition Letter. 2005. 26(2): 181-191.
11. Xueguang, W., and Xiaowei, D. Study on Algorithm of Access Control System
Based on Face Recognition. International Colloquium on Control and
Management. August 8-9, 2009. ISECS. 2009. 336-338.
12. ark, M., and zen, F., A Face Recognition System Based on Eigenfaces
Method, Procedia Technology. 118-123; 2012
13. Chaoyang, Z., Zhaoxian, Z., Hua, S., and Fan, D. Comparison of Three Face
Recognition Algorithms. International Conference on Systems and Informatics.
May 19-20, 2012. ICSAI. 2012. 1896-1900.
14. Kirby, M., and Sirovich, L. Application of The Karhunen-Loeve Procedure for
The Characterization of Human Faces. IEEE Transaction on Pattern Analysis
and Machine Intelligence. 1990. 12(1): 103-108.
15. Sirovich, L. & Kirby, M. Low-Dimensional Procedure for the Characterization
of Human Faces, Journal of the Optical Society of America A. (1987). 4(3): 519524.
16. Lih-Heng, C., Aslleh, S.H., and Chee-Ming, T., PCA,LDA and Neural Network
for Face Identification IEEE Conference on Industrial Electronics and
Applications. May 25-27, 2009. ICIEA 2009. 1256-1259
17. Eleyan, A., and Demirel, H. PCA and LDA based Neural Networks for Human
Face Recognition. In: Delac, K., and Grgic, M. Face Recognition System.
Austria: I-Tech Education and Publishing. 93-106;2007Martinez, Aleix M.; Kak,
A.C., PCA versus LDA. IEEE Transactions on Pattern Analysis and Machine
Intelligence. 2001. 23(2): 228-233.
18. Martinez, Aleix M.; Kak, A.C., PCA versus LDA. IEEE Transactions on Pattern
Analysis and Machine Intelligence. 2001. 23(2): 228-233.
19. Kim K (2003) Face recognition using principal component analysis. Department
of Computer Science, University of Maryland,College Park
20. Arduino,
Arduino
UNO
Board,
Retrieved
http://arduino.cc/en/Main/arduinoBoardUno.
Disember
21,
2013
from
43
APPENDIX A
clear all;
close all;
clc;
a=arduino('com19');
a.pinMode(10,'output'); %% LED for positive recognition
a.pinMode(12,'output'); %% LED for negative recognition
a.pinMode(8,'output'); %% magnetic door lock
a.digitalWrite (10,0);
a.digitalWrite (11,0);
a.digitalWrite (12,0);
a.digitalWrite (8,1); % HIGH (1) = lock, LOW(0)=unlock
while (1==1)
choice=menu('FACE RECOGNITION FOR ACCESS CONTROL',.
'Recognize from Webcam',...
'Exit');
44
%%% (a)
%%% (b)
'Exit
%%% (c)
');
Image = [];
if (choice1 == 1) % 'Capture' option from (a)
Image = getsnapshot(vid);
try
Image = imresize(Image,[200,180]);
testimage=fullfile('C:\Users\MissDidie\Desktop\complete\test
database\','1.jpg');
imwrite(Image,testimage);
for i = 1:size(TrainFiles,1)
45
if
not(strcmp(TrainFiles(i).name,'.')|strcmp(TrainFiles(i).name,'..')|strcmp(TrainFiles(i).
name,'Thumbs.db'))
Train_Number = Train_Number + 1; % Nol images in the training database
end
end
T = [];
for i = 1 : Train_Number
str = int2str(i);
str = strcat('\',str,'.jpg');
str = strcat(TrainDatabasePath,str);
img = imread(str);
img = rgb2gray(img);
A = [];
for i = 1 : Train_Number
temp = double(T(:,i)) - m;
A = [A temp]; % Merging all centered images
end
46
[V D] = eig(L);
L_eig_vec = [];
for i = 1 : size(V,2)
if( D(i,i)>1 )
L_eig_vec = [L_eig_vec V(:,i)];
end
end
Eigenfaces = A * L_eig_vec; % A: centered image vectors
ProjectedImages = [];
Train_Number = size(Eigenfaces,2);
for i = 1 : Train_Number
temp = Eigenfaces'*A(:,i); % Projection of centered images
ProjectedImages = [ProjectedImages temp];
end
InputImage = imread(TestImage);
temp = InputImage(:,:,1);
Euc_dist = []; % ED
for i = 1 : Train_Number
47
q = ProjectedImages(:,i);
temp = ( norm( ProjectedTestImage - q ) )^2;
Euc_dist = [Euc_dist temp];
end
min(Euc_dist)
if(min(Euc_dist) <= 4.0000e+015)
face = 1; % match
a.digitalWrite (10,1);
a.digitalWrite (11,1);
a.digitalWrite (12,0);
a.digitalWrite (8,0);
pause(5);
a.digitalWrite (8,1);
end
face = 2; % unmatch
a.digitalWrite (10,0);
a.digitalWrite (11,0);
a.digitalWrite (12,1);
a.digitalWrite (8,1);
end
face
[Euc_dist_min , Recognized_index] = min(Euc_dist);
OutputName = strcat(int2str(Recognized_index),'.jpg');
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
SelectedImage = strcat(TrainDatabasePath,'\',OutputName);
SelectedImage = imread(SelectedImage);
48
CaptureImage = strcat(TestDatabasePath,'\','1.jpg');
ia = imread(CaptureImage);
figure,imshow(ia);
title('Capture Image');
imshow(im);
title('Test Image');
figure,imshow(SelectedImage);
title('Equivalent Image');
end
end
closepreview(vid);
testimage1=fullfile('C:\Users\MissDidie\Desktop\analysis\train
database\','1.jpg');
imwrite(Image1,testimage1);
end
closepreview(vid);
49
end
end
if (choice == 2)
clear choice
return;
end;
end
50
APPENDIX B