Professional Documents
Culture Documents
Sriram .V Malishwaran .M
Computer Science Engineering Computer Science Engineering
Chettinad College of Engineering and Technology Chettinad College of Engineering and Technology
Karur, India Karur, India
sriiiram321@gmail.com mmalishwaran2002@gmail.com
Hariharan .T
Computer Science Engineering
Chettinad College of Engineering and Technology Eliza John .A
Karur, India Computer Science Engineering
hariharantamilselvan009@gmail.com Chettinad College of Engineering and Technology
Karur, India
johnkrp31@gmail.com
Abstract— The visitor management is a modern world member, while an alarm notification is displayed to the user in
problem with its application a numerous fraud, privacy issues, case of an outsider. Then the user wear face mask means,
etc. can be quickly identified and avoided. The visitor specify the alarm to remove the mask to recognize the facial
management system using face recognition is one of the most features. We can implement the framework using deep learning
secure systems even better than CCTV cameras and wake algorithm named as Convolutional neural network and
through gate methods. The primary decision that needs to be experiment this system in real time environments.
made in the project is whether the system's cost is consistent
with its scope. The size of operations and the security needs
Index Terms — Face recognition, security, deep learning, visitor
vary depending on the location, for example, household use
management, facial features.
versus industrial use. The majority of organizations, schools,
and colleges now employ visitor management systems, but I. Introduction
thanks to remarkable improvements, this can be expanded to
include railway stations, airports, toll stations, etc. Most Visitor management has become a critical concern in the
companies with large facilities integrate visitor management modern world due to the increasing instances of fraud and
systems into their total security, which is continually expanding privacy issues. One of the most secure and efficient solutions
at a constant rate. It is suggested that the face recognition to this problem is the implementation of a face recognition
visitors' management system (FRVMS) improve home security visitor management system (FRVMS). This system utilizes
by automatically identifying strangers. Having a centralized deep learning algorithms, such as Convolutional Neural
system will make managing and monitoring processes more
effective. Cost of development is also taking into consideration
Networks (CNNs), to automatically identify and verify
as this system is not requiring any extra devices. Face visitors based on their facial features. Unlike traditional
recognition is performed utilizing the computer's built-in web methods such as CCTV cameras and wake-through gate
camera. The family of face data contained in the monitoring methods, FRVMS eliminates the need for additional devices
system's database is compared with the detailed features that and can be implemented using a computer's built-in web
have been detected and security is cancelled in case of a camera. The system can be used in various settings, ranging
`
International Conference on Latest Trends in Science, Engineering and Technology (ICLTSET’23) on May 5&6, 2023 orga-
nized by Karpagam Institute of Technology, Coimbatore
from households to industrial facilities, schools, colleges, based on facial features, even in challenging situations,
railway stations, airports, toll stations, and other large FRVMS can significantly enhance security and streamline
organizations. With a centralized database of face data,
FRVMS offers a more effective and efficient approach to visitor management processes. As technology continues to
managing and monitoring visitors, improving overall security. advance, FRVMS has the potential for widespread adoption
In this paper, we will discuss the benefits and applications of and can greatly contribute to addressing the modern world
FRVMS, including its potential to enhance home security and problem of visitor management in a more efficient and
its scalability to different environments. We will also secure manner.
highlight the cost-effective nature of the system and its
potential for real-time implementation using deep learning II. RELATED WORKS
algorithms making it suitable for a diverse range of security The importance of face recognition systems for managing
needs. visitors for tackling security issues has been highlighted by
prior research and related publications. Compared to other
Furthermore, FRVMS offers enhanced security by techniques like surveillance footage and gate wake
automatically identifying strangers and triggering alarms to mechanisms, face recognition offers a superior level of
notify users in case of an outsider. Even if a visitor is wearing security. The system is affordable, adaptable for broad
a face mask, the system can prompt them to remove the mask operational and safety needs, and has the ability to be
for facial recognition, ensuring accurate identification. The expanded to other sites. Through the use of built-in web
use of deep learning algorithms, such as CNNs, allows for cameras, centralization improves management and monitoring
robust and reliable face recognition, even in complex and procedures while obviating the need for extra hardware.
dynamic environments. Quick verification is made possible by face detection and
database comparison, with security being cancelled for
recognized members and alert notifications for outsiders. For
enhancing the system's accuracy, face masks and the
application of deep learning techniques like Convolutional
Neural Networks, have been suggested. Additional
investigation and experimenting may be helpful.
`
International Conference on Latest Trends in Science, Engineering and Technology (ICLTSET’23) on May 5&6, 2023 orga-
nized by Karpagam Institute of Technology, Coimbatore
are checked against the pre-registered answers in the system
to verify the user's identity at the time of initial setup. To
confirm a user's identification, the responses to III. DESIGN FOR PROPOSED SYSTEM & DEEP
LEARNING
A. SYSTEM STRUCTURE
these safety concerns are compared to the pre-registered re- The overall structure of the system proposed in this paper
sponses in the system. is shown in a block diagram as shown in Fig.5. The
composition of the system is largely divided into parts in
charge of registration and processing. In detail, it consists of
2) OWNERSHIP-BASED AUTHENTICATION
(1) deep learning model training, (2) visitor face detection, (3)
Ownership-based authentication in AI-powered smart home
face recognition and access verification, and (4) monitoring.
security uses ownership-based credentials to verify users' au-
thenticity and authorization. It involves unique ownership- 1) DESCRIPTION OF EACH COMPONENT
based attributes associated with users or smart home devices, (1) Part of a deep learning model used for training (derived
verified using AI-powered techniques. from a deep learning training model): Desktop - Save pictures
of loved ones and acquaintances in a dataset beforehand and
3) OBJECT CHARECTERISTIC BASED use the Tiny-YOLOv3 deep learning model to learn them.
AUTHENTICATION (2) Component for collecting video data: Uses a webcam
Object characteristic-based authentication is a type of authentic- CCTV to gather visitor video.
ation that verifies users by their attributes. A representative ob- (3) A database that stores and processes the gathered video
ject characteristic-based authentication technique is biometrics. pictures serves as the control and processing component.
Biometrics separate physical and behavioural characteristics. (4) Monitoring and post-processing: The
Physical characteristics include fingerprints, iris, vein, and vein manager's smartphone receives the processing result and
recognition, as well as other techniques like retina and hand processes it there.
form, which are used to recognize faces using facial shapes and
thermal images of each individual. Speech recognition, gait re- 2) HARDWARE CONFIGURATION DIAGRAM
cognition, and signature recognition are examples of behavi- The operation of the entire system for face detection, using
hardware specifications
oural traits. Recently, businesses have started utilizing behavi-
Processor : Intel / Ryzen processor
oural characteristics like voice, gait, and signature recognition
RAM : 4 GB
to improve biometric accuracy [12], [13], [14]. Compared to
Keyboard : standard keyboard
voice, vein, iris, and fingerprint recognition, face recognition is
Monitor : 14 / 15.6 inch monitor
more practical. The accuracy of iris recognition is higher than
that of other biometrics, and installation costs are lower than
those of speech recognition systems.
Recently, a permanent and inexpensive fingerprint re-
cognition system or a Face ID system based on the user's face
have been implemented and used nearly universally to identify
the phone's owner and enable smartphone use and access.
4) MULTI-FACTOR AUTHENTICATION
knowledge-based, or password-based, authentication is vulner-
able Because it permits using short, insecure passwords that are
frequently never changed from the password that was used to
register, knowledge-based or password-based authentication is
weak. To circumvent the weakness of passwords, extra authen-
tication measures are therefore required. By first verifying us-
ing their ID and password and then utilizing a different addi-
tional authentication method, users of multi-factor authentica-
tion can increase security. Ownership-based authentication and
object characteristic-based authentication are further multifactor
authentication strategies. With capabilities like fingerprint, face,
OTP, and random number input through SMS, cell phones in
particular are being utilized as a way of authentication.
`
International Conference on Latest Trends in Science, Engineering and Technology (ICLTSET’23) on May 5&6, 2023 orga-
nized by Karpagam Institute of Technology, Coimbatore
IV. STRUCTURE AND PROTOCOL OF THE 3. If the visitor's facial region is discovered, the visitor's
PROPOSED SYSTEM face image is saved.
A. PROTOCOL:
An artificial intelligence algorithm known as Algorithm 1 [Step of face recognition]:
uses the CCTV camera that is mounted on the front door to 1. Recognize a face in the CCTV image.
identify visitors. It will notify the user to inspect the visitor's 2. Check whether a mask is being worn if a face is not
face if it cannot recognize them after a great distance or while being recognized, and if it is because of a mask, output the
they are wearing a mask. It takes a picture of the visitor message "Please pull down your mask" or say it aloud.
during this process to record their visit. When it recognizes a 3. If a mask is not being worn, go back to finding the face
visitor's face and determines that they are a family member, it area and taking another photo of it.
unlocks the door. It asks for additional identification if the 4. If the face is now recognized, see if a family member
initial identification is unsuccessful. who is stored in the database is present.
`
International Conference on Latest Trends in Science, Engineering and Technology (ICLTSET’23) on May 5&6, 2023 orga-
nized by Karpagam Institute of Technology, Coimbatore
or not to unlock the door lock. Users can, for instance, be
verified using pictures of their relatives. As a result, the
`
International Conference on Latest Trends in Science, Engineering and Technology (ICLTSET’23) on May 5&6, 2023 orga-
nized by Karpagam Institute of Technology, Coimbatore
many proposed algorithms that have enhanced and developed [2] L. L. Chambino, J. S. Silva, and A. Bernardino,
CNNs that can process images. ‘‘Multispectral facial recognition: A review,’’ IEEE Access,
We introduce several object detection algorithms, vol. 8, pp. 207871–207883, 2020
including CNN, in this study. A visitor's face is detected by