Advanced PCA for Enhanced Illumination in Face Recognition to Control Smart Door Lock System

Similar documents
A Proposal for Security Oversight at Automated Teller Machine System

EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION

Challenging areas:- Hand gesture recognition is a growing very fast and it is I. INTRODUCTION

LabVIEW based Intelligent Frontal & Non- Frontal Face Recognition System

Student Attendance Monitoring System Via Face Detection and Recognition System

Automatic Locking Door Using Face Recognition

3D Face Recognition System in Time Critical Security Applications

ISSN Vol.02,Issue.17, November-2013, Pages:

FACE VERIFICATION SYSTEM IN MOBILE DEVICES BY USING COGNITIVE SERVICES

Gesture Based Smart Home Automation System Using Real Time Inputs

Content Based Image Retrieval Using Color Histogram

Chapter 4 SPEECH ENHANCEMENT

A Real Time Static & Dynamic Hand Gesture Recognition System

Combined Approach for Face Detection, Eye Region Detection and Eye State Analysis- Extended Paper

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Controlling Humanoid Robot Using Head Movements

A SURVEY ON HAND GESTURE RECOGNITION

A New Fake Iris Detection Method

COMPARATIVE PERFORMANCE ANALYSIS OF HAND GESTURE RECOGNITION TECHNIQUES

Visual Search using Principal Component Analysis

A MODIFIED ALGORITHM FOR ATTENDANCE MANAGEMENT SYSTEM USING FACE RECOGNITION

Gesticulation Based Smart Surface with Enhanced Biometric Security Using Raspberry Pi

FACE RECOGNITION USING NEURAL NETWORKS

OPEN CV BASED AUTONOMOUS RC-CAR

Authenticated Document Management System

Mel Spectrum Analysis of Speech Recognition using Single Microphone

Face Detection: A Literature Review

An Un-awarely Collected Real World Face Database: The ISL-Door Face Database

Wireless Monitoring of Agricultural Environment and Greenhouse Gases and Control of Water flow through Fuzzy Logic

License Plate Localisation based on Morphological Operations

Facial Image Recognition Model (The Latest trend)

SCIENCE & TECHNOLOGY

Multimodal Face Recognition using Hybrid Correlation Filters

Real-Time Face Detection and Tracking for High Resolution Smart Camera System

AUTOMATED WATER METER READING

An Evaluation of Automatic License Plate Recognition Vikas Kotagyale, Prof.S.D.Joshi

Face Detection System on Ada boost Algorithm Using Haar Classifiers

Iris Recognition-based Security System with Canny Filter

International Journal of Advance Research in Engineering, Science & Technology NEW GENERATION ATM WITH FACE AUTHENTICATION

Accident prevention and detection using internet of Things (IOT)

Online Signature Verification by Using FPGA

Face Recognition Based Attendance System with Student Monitoring Using RFID Technology

A Smart Home Design and Implementation Based on Kinect

INTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET)

Direct gaze based environmental controls

Matlab Based Vehicle Number Plate Recognition

Comparative Analysis of Lossless Image Compression techniques SPHIT, JPEG-LS and Data Folding

RASPBERRY PI PROJECT LIST

Intelligent Face Detection And Recognition Mohd Danish 1 Dr Mohd Amjad 2

Enhancement of Speech Signal Based on Improved Minima Controlled Recursive Averaging and Independent Component Analysis

DORSAL PALM VEIN PATTERN BASED RECOGNITION SYSTEM

Face Recognition System Based on Infrared Image

[Kumar, 5(12): December2018] ISSN DOI /zenodo Impact Factor

Iris Recognition using Hamming Distance and Fragile Bit Distance

Smart Security System using Arduino and Wireless Communication

Real Time Face Recognition using Raspberry Pi II

Development of a Real Time Trains Monitoring System:Case Study of Tanzania Zambia Railway Authority

New Windowing Technique Detection of Sags and Swells Based on Continuous S-Transform (CST)

The total manufacturing cost is estimated to be around INR. 12

Design and Development of Pre-paid electricity billing using Raspberry Pi2

Design of WSN for Environmental Monitoring Using IoT Application

An IoT Based Real-Time Environmental Monitoring System Using Arduino and Cloud Service

Mandeep Singh Associate Professor, Chandigarh University,Gharuan, Punjab, India

Introductory Lesson 2 Internet of Things

Real Time Indoor Tracking System using Smartphones and Wi-Fi Technology

Keyword: Morphological operation, template matching, license plate localization, character recognition.

Automatic Controlling of Electrical Appliances in Classroom Using Image Processing

SMS Based Kids Tracking and Safety System by Using RFID and GSM

Automatic Licenses Plate Recognition System

AN IMPROVED NEURAL NETWORK-BASED DECODER SCHEME FOR SYSTEMATIC CONVOLUTIONAL CODE. A Thesis by. Andrew J. Zerngast

Environmental control by remote eye tracking

Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security

Detection of Rail Fastener Based on Wavelet Decomposition and PCA Ben-yu XIAO 1, Yong-zhi MIN 1,* and Hong-feng MA 2

Image Processing and Artificial Neural Network techniques in Identifying Defects of Textile Products

Smart Classroom Attendance System

Image Processing Based Vehicle Detection And Tracking System

RF(433Mhz) BASED PROJECTS

Thesis: Bio-Inspired Vision Model Implementation In Compressed Surveillance Videos by. Saman Poursoltan. Thesis submitted for the degree of

Automobile Independent Fault Detection based on Acoustic Emission Using FFT

Title Goes Here Algorithms for Biometric Authentication

Intelligent Identification System Research

Object Recognition System using Template Matching Based on Signature and Principal Component Analysis

Image Recognition for PCB Soldering Platform Controlled by Embedded Microchip Based on Hopfield Neural Network

FPGA implementation of DWT for Audio Watermarking Application

Smart Parking System for Locating Vacant Parking Slots

IJSRD - International Journal for Scientific Research & Development Vol. 4, Issue 01, 2016 ISSN (online):

Multiresolution Analysis of Connectivity

Research Article Special Issue

Automatics Vehicle License Plate Recognition using MATLAB

Different Approaches of Spectral Subtraction Method for Speech Enhancement

IoT BASED ENERGY METER

SPTF: Smart Photo-Tagging Framework on Smart Phones

Biometric Authentication for secure e-transactions: Research Opportunities and Trends

Hardware implementation of Zero-force Precoded MIMO OFDM system to reduce BER

An Improved Bernsen Algorithm Approaches For License Plate Recognition

Application of Artificial Intelligence in Mechanical Engineering. Qi Huang

Biometrics - A Tool in Fraud Prevention

ELECTRICITY THEFT MONITORING AND ITS CONSUMPTION SAVINGS

SLIC based Hand Gesture Recognition with Artificial Neural Network

AUTOMATIC NUMBER PLATE DETECTION USING IMAGE PROCESSING AND PAYMENT AT TOLL PLAZA

Transcription:

International Journal of Internet of Things 2017, 6(2): 34-39 DOI: 10.5923/j.ijit.20170602.05 Advanced PCA for Enhanced Illumination in Face Recognition to Control Smart Door Lock System Nishmitha R. Shetty *, Prathviraj N. Department of Computer Science and Engineering, St. Joseph Engineering College, Mangaluru, India Abstract Face recognition is a commonly used biometric strategy in various field because of its accuracy and security. However, any feasible system will have its drawbacks. Some of the drawbacks of the face recognition system include, pose change, aging, light variation and many more. By focusing on these, illumination effect is taken into account and an advanced face recognition technique is developed. The technique that is used here is Principle Component Analysis (PCA) and Fast Fourier Transform (FFT-2). This solution is applied to a smart door lock system which allows the authorized people to access the door of the house by using face recognition technique. Keywords PCA, Face Recognition, Illumination Effect, Smart Door Lock 1. Introduction Biometric strategies are very important in recognizing humans because it has the capacity to uniquely identify a person based on his body parts. It can be face, fingerprint, iris, retina, voice etc. Among these techniques, face recognition method is commonly used for identification of the human because, it has the ability to recognize a person without his participation in the recognition technique. This has a prominent role to play in security purposes. Face recognition is used to criminal identification and many more because of its feasible characteristic. Studying the essence of high dimension training data in a low dimension form has become very common in the recent years. The study of reducing the dimension of the training data is known to Dimensionality Reduction. One of the important concepts in Dimensionality reduction is the subspace method. There are 2 types of subspace methods. The first one is a Linear Subspace method. The other one is a Nonlinear Subspace method. The method that is ued in the proposed system is based on Linear subspace method. Principal component analysis (PCA) is one of the basic linear subspace method used for recognition of face. It is a mathematical procedure which makes use of orthogonal conversion for changing the data to a set of linearly uncorrelated data called as principal components. PCA is one of the common techniques which finds the application in the fields like face recognition, image compression and is commonly used for determining the * Corresponding author: nishushetty3@gmail.com (Nishmitha R. Shetty) Published online at http://journal.sapub.org/ijit Copyright 2017 Scientific & Academic Publishing. All Rights Reserved patterns in data of high dimension. Figure 1 shows the image for PCA in 2D. This image is reduced to one dimensional subspace and the orthogonal diagonal element is obtained. This transformation is shown in the Figure 2. Figure 1. PCA basis (2D) Figure 2. PCA reduced to 1D subspace There are several disadvantages of face recognition. Some of them include pose changes, blur or foggy image, illumination or light variation and face changes. Several methods and approaches were proposed to overcome these problems. In the proposed system, focus is put on the illumination effect of face recognition. Therefore, PCA algorithm is combined with FFT2. PCA algorithm is commonly used for face recognition. And FFT2 or 2-D fast Fourier transform is employed to process the 2-D data like images. The normalization of the image for illumination is shown in the Figure 3. The proposed solution is applied to a home environment for controlling the door lock. When there are many people living in house, it is required that all the people should have the key to open or close the door. Or, they should wait for the person who has key to access the door. Other than the charges which cost for keeping the duplicated keys, there are also security concerns if the key is lost. There are chances of stealing the key as well which is another security issue for a house or any building. In the recent years, several door lock

International Journal of Internet of Things 2017, 6(2): 34-39 35 systems were developed to overcome these issues. With the advancement in internet technology and the traditional door system, a new technique can be presented. Such a variation in the prototype is based on the fact that using the emerging technologies with the old systems will yield a smart and secure system. The proposed system is a door lock system which makes use of face recognition rather than the mechanical key to access the door. Figure 3. Image Normalization using FFT2 This paper proceeds with the literature survey about the existing face recognition system and the door lock system followed by the implementation of the proposed system. Then, the test results and finally the conclusion. 2. Related Work Paul Viola, Michael J. Jones, n et all [1] says recognition of face is a method for face detection in an image. There are several methods for face detection and one of the commonly used method is viola jones. Once the detection of the face is done, the author explains the process for face recognition. This is accomplished using the Principal Component Analysis (PCA) algorithm. In PCA, the recognition is based on the Euclidean Distance and hence the face can be recognized. PCA is one of the common and basic method employed for face recognition. Even after commonly using this technique, there are several drawbacks associated with it J.Y. Yang, Kilic N, n et al [2, 3] speaks about the disadvantages associated with the traditional PCA. PCA extracts the feature of the face in an input image and converts it into a one dimensional matrix of vectors. Once the feature extraction process is done, then K-L transformation is applied to this one dimensional vector which yields in the image vector that is enormous and computationally complex. This will be a problem to compute the covariance matrix. Zhao and Yang [4] speaks about the illumination effect on PCA. They generated a formula for the covariance matric for the environment with the various light condition and then speculated an equation for approximate illumination. But, Wiskott et al. [5] mentioned that PCA cannot be used to identify the simple inference until this data is mentioned in the training data. This lead to presenting a technique called as Elastic bunch graph matching to overthrow the drawback of light variation on PCA. With the improvement in internet and technology, several door locks have been proposed. Several methods were presented to develop the door lock system for the physically disabled. The physically disabled people have limited capacity to access the electronic devices such as turning on/ off fan, light etc. because to control these devices, either the person has to move to the switch board or ask someone to do for them. However, with the help of internet, technologies can be developed to operate the electrical devices remotely. Kuang-Yow Lian, Sung-Jung Hsiao and Wen-Tsai Sunghave, n et al [6] mentioned ways to operate the devices through technologies such as hand writing recognition and blue tooth using smart phones. When the disabled person using mobile phone captures the handwriting in his phone, the control will be passed to the door lock system to validate the user. If the user s hand writing is recognized, the door will be automatically locked or unlocked by the access system within the small specified range. Other door lock system was presented by Ushie et al. [7], GSM enabled phone is used to control the door lock system for enhancing the security of the house. This setup requires 2 mobile devices with GSM enabled in it. This operation can be done through a distant area in which the phone with GSM acts as a transmitter. The receiver part for the system is setup using another mobile device. This phone is connected to the door through tone multi frequency (DTMF), a controller. As an addition, SMS along with GSM/GPRS was used to access the door where the locking and unlocking mechanism for the door is done based on the SMS from a particular user. When the device receives a particular message, the control passes to the door lock system and the locking and unlocking mechanism takes place. Using this concept, a PIC system was proposed which provide security with the password. This system makes use of GSM for alerting on the intervention. Wi-Fi is another technique through which the door lock can be accessed. When the controller is operated by the Wi-Fi by the user who has smart phone results in a secure system. The user will have a mobile phone in which the application for managing the door lock will be installed. The door locks can also be accessed by the user through the application with the automated key. Chih-Chung Lu and Shau-Yin Tseng SLS, et al in [8] says people lose their keys easily than the phones. Therefore, the security concern for the door locks of the house can be improved. The authors also speak of encrypting the automated keys using various encryption algorithm for providing additional security. The standard AES encryption algorithm is the one used by the author to encrypt the automated key or the password. Authors Wan Mohd Nor Izudeen bin Wan Ahmad, n et all [9] present a technique for door lock using face recognition. The authors say that providing security to building, homes and other places have become very concerning in recent years. There are many methods of identification have been continuously used to provide security for the system. Some of the identical methods that are used include fingerprint recognition, face recognition, iris and retina identification etc. Among these, face recognition is proven to be the prominent one and it is least intrusive. Therefore, for this reason, the

36 Nishmitha R. Shetty et al.: Advanced PCA for Enhanced Illumination in Face Recognition to Control Smart Door Lock System authors propose the door lock system using the face recognition. This approach works by attaching a web camera near the door. Whenever the authorized person arrive, the web camera captures the image and control is passed to the door lock system for controlling the door. The system works by creating the templates of the user s face and storing the information in the database. This template is verified with the templates captured through the web camera. Access will be provided to the user only if there is a match between the two templates. Internet of things is a popular technique which is used in most of the system in the recent decade. It is commonly employed in home automation for automatically controlling the devices of the home such as fan, TV, light, door and many more. Nagender Kumar Suryadevara, and Subhas Chandra Mukhopadhyay, n et al [10] say that the IoT-based system is very secure and robust for communication. Using IoT, controlling the appliances is done using smartphone. The user with the smart phone will be able to control the appliances through the applications installed in the mobile. The user interface can be accessed using the login details like user name and the password or any other recognition technique. Figure 4. Flowchart showing the implementation of PCA with FFT-2

International Journal of Internet of Things 2017, 6(2): 34-39 37 3. Methodology In the proposed system, the drawbacks of Face recognition system was identified and focus was provided in overcoming illumination effect. When there is change in the light condition, the face recognition system fails to identify the user even though the user is a valid one. Therefore, the proposed system normalises the images before recognition so that the validation takes place accurately without failure. Also, the propose system compares the traditional PCA with the advanced PCA to verify the changes. This solution is applied to a real time problem of providing security to the house. The door lock will be attached to the controller which controls the access to the door if the face is recognized. Initially, the database will be containing the details and images of privileged users that are being updated by the owner of the house. When any of the members of the house wants to lock/unlock the door, he/she needs to use the front camera of their smartphone which captures an image. The captured image is then compared with the images stored in the database. If the face is recognized and matched, then the access to that person is granted. The implementation of the smart door lock system is as follows: Figure 5. Use Case Diagram within the images which is stored in the database with the Test image. The advances PCA overcomes the problem of illumination by implementing FFT2 along with PCA. FFT2 is a normalizing technique which is usually implemented to process signals and data such as images. This normalizes the image to a certain level and helps the recognition algorithm to recognize the images accurately. The flowchart showing the implementation of the algorithm is shown in the Figure 4. 3.2. User Interface The android application is installed in the user s phone which acts as an interface between the user and the door. The android application allows the admin to add and manage the user profiles and receive notification about the user whenever he/ she enters or leaves the house along with the time. The application allows the user to capture the image and authorize notifications. This function of the android application is depicted in the Figure 5. 3.1. Implementation of the Algorithm for Face Recognition The technique for face recognition has the following steps. Initially the feature extraction of the face takes place using PCA. It is one of the common linear subspace methods which converts the 2 dimensional input data into 1 dimension, thus employing dimensionality reduction. Therefore, the second step of face recognition after extracting the features will be the feature reduction. The final step of face recognition is the validation or classification. This method is implemented using Euclidean distance. This method classifies the attributes of the face Figure 6. User Interface of the Android Application

38 Nishmitha R. Shetty et al.: Advanced PCA for Enhanced Illumination in Face Recognition to Control Smart Door Lock System The user interface of the system which is shown in the android application of the user is depicted in the Figure 6. The button Admin allows for the registration of the admin. The button User Profile allows to add the users and the button Access Smart System allows the users to capture the image. This image is sent to the local system for recognition. 3.3. Communication of the Client and the Server The image clicked by the user from the smartphone is sent to the server. Since the door can be remotely controlled by the user, the image has to be stored in the server. Once the recognition is done, the control is passed to the smart access system which is controlled by the microcontroller. The controller used in the proposed system is the Aurdino microcontroller. When the microcontroller receives the command from the local system, locking/ unlocking mechanism takes place. Figure 7 shows the Aurdino Microcontroller board to which the door lock will be attached. Figure 7. Aurdino-Uno Microcontroller with LED For the purpose of simulation, a LED light is attached to Aurdino board instead of the door lock. 4. Evaluation The smart access system with enhanced face recognition is compared with the traditional PCA. The system is tested with 2 users and changed light condition. Among the 2 users, the illumination enhanced PCA was able to recognize the users without any issue thus proving to be accurate. However, the traditional PCA failed to recognize the users. Based on this evaluation, a graph was plotted for Accuracy vs. Algorithm and it is shown in the Figure 8. 5. Conclusions There are several drawbacks in a face recognition system such as pose change, aging, light variation and many more. By considering the drawback of the illumination effect, an advanced PCA is proposed by combining the PCA algorithm with FFT2. The advanced algorithm recognizes the human under different light condition with a greater accuracy when compared to the traditional PCA. Since security is a main concern in our daily life, the proposed algorithm is applied to a smart access system. This provides security because of using human face for recognition. The solution is cost effective since the camera of smart phone is used to capture the human face instead of a separate web camera. The system can be generalised to offices, buildings, cars etc. Figure 8. Graph- Accuracy vs. Algorithm

International Journal of Internet of Things 2017, 6(2): 34-39 39 REFERENCES [1] Paul Viola, Michael J. Jones, Robust Real-Time Face Detection, International Journal of Cumputer Vision 57(2), 2004. [2] J. Yang, J.Y. Yang, From Image Vector to Matrix: A Straightforward Image Projection Technique IMPCA vs. PCA, Pattern Recognition, vol. 35, no. 9, 2002, pp. 1997-1999. [3] Gumus E., Kilic N., Sertbas A., and Ucan O., Evaluation of Face Recognition Techniques using PCA, Wavelets and SVM, Expert System with Application, vol. 37, no. 9, 2010, pp.6404-6408. [4] L. Zhao and Y. Yang "Theoretical Analysis of Illumination in PCA-Based Vision Systems" Pattern Recognition vol. 32 no. 4 pp. 547-564 1999. [5] L. Wiskott J.M. Fellous N. Kru "ger and C. von der Malsburg "Face Recognition by Elastic Bunch Graph Matching" IEEE Trans. Pattern Analysis and Machine Intelligence vol. 19 no. 7 pp. 775-779 July 1997. [6] Kuang-Yow Lian, Sung-Jung Hsiao and Wen-Tsai Sung, "Home Safety Handwriting Pattern Recognition System" in Proc. of IEEE 1ph International Conf on Cognitive Informatics and Cognitive Computing, pp. 477-483, 2012. [7] Ushie James Ogri, Donatus Enang Bassey Okwong, Akaiso Etim, Design and construction of Door Locking Security System Using GSM, International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 7, Page No. 2235-2257, July 2013. [8] Chih-Chung Lu and Shau-Yin Tseng, "Integrated design of AES (Advanced Encryption Standard) encrypter and decrypter," Application Specific Systems, Architectures and Processors, 2002. Proceedings. The IEEE International Conference on, pp. 277-285, 2002. [9] Wan Mohd Nor Izudeen bin Wan Ahmad, Face Recognition System Based on Eigenfaces using Matlab, Thesis, Faculty of Electrical Engineering, Universtisti Teknology Mara, 2007. [10] Tebje, Nagender Kumar Suryadevara, and Subhas Chandra Mukhopadhyay. "Towards the implementation of IoT for environmental condition monitoring in homes."sensors Journal, IEEE 13.10 (2013): 3846-3853.