SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1
Smart Authentication System for Airport
Prof. A.B.Ingole1, Tejashree Gurav2, Karishma Attar3, Shital Pardeshi4, Yogita Bhapkar5.
1HOD & Assistant Professor, Electronics and Telecommunication Dept., Sinhgad Academy of Engineering,
Kondhwa-bk,Pune
Savitribai Phule Pune University, Pune, India
2,3,4Students, Electronics and Telecommunication Dept., Sinhgad Academy of Engineering, Kondhwa-bk, Pune
Savitribai Phule Pune University, Pune, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract:-
As an essential constituent of many associations’ security
and safety precedence, Image Processing has established its
importance and benefits numerous times by providing
immediate supervising of possessions, people, environment
and property. This project deals with the design approach of
an embedded real-time surveillance system based on P.I.R
sensor for intruder detection that reinforces surveillance
technology to provide essential security to people life and
associated control and alert operations.
Keywords:- P.I.R, Camera, Computer system, Image
processing.
1. INTRODUCTION
The security system to be designed in this project can
be used extensively to monitor facilities by owners. The
owner shall be able to monitortheirpropertyfrom wherever
they are in the world. It will not replace the use of CCTV and
camera surveillance systems but reduce the cost of
implementation of a basic security system. This thus will
enable owners to secure their facility at a cheaper cost. The
images captured are compared with images in the dataset
using the LBPH (Local Binary Pattern Histogram) algorithm.
The LBPH algorithm is combined with HOG (Histogram of
the Oriented Gradient) algorithm to improve detection
performance. The face recognitionconsistsoftwophases viz.
includes extraction and classification. Feature extraction is
the process of dividing the image into small regions called
cells and extract LBP histogram for eachcell.Inclassification
phase all the histograms are concatenated to form a single
histogram representing the image. The benefit of LBPH is
that it does not look at the image as a whole, but instead its
local structure by comparing each pixel to its neighboring
pixel, hence, it is not much affected by light. This project will
design and implement a security system based on passive
infrared sensor (PIR).
The system should be able to detect motion (intruder),
activate a camera to capture image after motion is sensed
and then compare the captured image with images present
in the dataset stored in computer system. If image is
matched send the information (stored in dataset) related to
image to the owner through E-mail. Otherwise send only
image and Date Timestamp.
1.1 System Overview:-
• The whole working of the system starts with PIR
sensor and camera .
• The proposed system architecture shown in block
diagram is a security system based on the ethics of
image recognition. The system consists of a P.I.R
sensor, camera, computer system along with
internet connectivity connected to the computer
system.
• As the human body low level infrared radiation
comes in contact with PIR sensor then sensorsends
signals to the computer system to activate the
camera, this feature of the sensor allows us to
implement a power efficient system.
1.2 Hardware resource required
 Computer system
1. SoC: 64 bit Windows 10 Operating System.
2. CPU: Intel Core i5 Processor (7th Gen.)
3. GPU: NVidia GeForce 940MX.
4. RAM: 8 GB DDR4 RAM.
5. Networking: 10/100 Ethernet, 2.4GHz 802.11n
wireless.
6. Storage:1 TB HD
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2
 Software resource required
1. Operating system : Windows 10.
2. Coding Language : Python and Java.
3. Framework used :Django version 1.10.
4. Packages used : Open CV 2, Numpy, SMTP, MEME.
1.3 Input Resources
We are using PIR sensor and camera as a input device.
 P.I.R. Sensor
PIR sensors allow you to sense motion, almost
always used to detect whether a human has moved in or
out of the sensors range. They are small, inexpensive,
low-power, easy to use and don't wear out. For that
reason they are commonly found in appliances and
gadgets used in homes or businesses. They are often
referred to as PIR, "Passive Infrared", "Pyro electric", or
"IR motion" sensors.
Specifications:-
 Infrared Sensor with Control Circuit Board
 The Sensitivity and Holding Time Can be
adjusted
 Sensitive Setting: Turn to Right,Distance
Increases(about 7M);Turn to Left,Distance
Reduce(About 3M)
 Blockade time: 2.5s(Default)
 Camera
Camera is used to capture the image. As the human body
low level infrared radiationcomesincontactwithPIRsensor
then sensor sends signals to the computersystemtoactivate
the camera.5MP Camera module is connected to the
Raspberry pi module.
Specifications:-
 Connection Type:- USB
 USB Type:- USB 2.0
 Optical Resolution:- True 640x480
 Focal length:- 2.3mm
 Image Capture:- 640x480, 1.3MP, 3Mp,5MP.
 Frame Rate(Max):- 640x480@30
 Raspberry Pi 3 B+
The Raspberry Pi 3 Model B+ is the latest product in the
Raspberry Pi 3 range, boasting a 64-bit quad core processor
running at 1.4GHz, dual-band 2.4GHz and 5GHz wireless
LAN, Bluetooth 4.2/BLE, faster Ethernet, and Poe capability
via a separate Poe HAT. The dual-band wireless LAN comes
with modular compliance certification,allowingtheboardto
be designed into end products with significantly reduced
wireless LAN compliance testing, improving both cost and
time to market. The Raspberry Pi 3 Model B+ maintains the
same mechanical footprint as both the Raspberry Pi2Model
B and the Raspberry Pi 3 Model B.
Specification:-
 Processor:-Broadcom BCM2837B0, Cortex-A53
64-bit SoC @ 1.4GHz
 Memory:-1GB LPDDR2 SDRAM
 Connectivity:- 1-2.4GHz and 5GHz IEEE
802.11.b/g/n/ac wireless LAN, Bluetooth 4.2,
BLE 2-Gigabit Ethernet over USB 2.0 (maximum
throughput 300Mbps), 3-4 × USB 2.0 ports
 Access:-Extended 40-pin GPIO header
 Video & Sound:- 1 × full size HDMI
MIPI DSI display port
MIPI CSI camera port
4 pole stereo output and
compositevideo port
 Multimedia:-H.264, MPEG-4 decode (1080p30);
H.264 encode (1080p30); OpenGL ES 1.1, 2.0
graphics
 SD Card Support:-Micro SD format for loading
operating system and data storage
 Input Power:-5V/2.5A DC via micro USB
connector 5V DC via GPIO header Power over
Ethernet (PoE)–enabled (requires separate PoE
HAT)
 Environment:-Operating temperature, 0–50°C
1 Vcc Input voltage is +5V
for typical
applications. Can
range from 4.5V-
12V
2 High/Low
Ouput
(Dout)
Digital pulse high
(3.3V) when
triggered (motion
detected) digital
low(0V) when
idle(no motion
detected
3 Ground Connected to
ground of circuit
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3
 DataBase
As in our computer system we have a dataset of images,
those are the images Of authorized person from each view
such as front view, right side view, leftside view with their
black and white format, those image set are faces of various
person.
We are using MySQL database to store the details of the
persons.
MySQL is the world’s most popular open source database,
enabling the cost-effective delivery of reliable, high-
performance and scalable Web-based and embedded
database applications.
The data flow diagram provides a view of all the data that
is exchanged by the security system's module.
2 Result- Test Cases
Test Case Based on 20 Database.
1) By Camera-
Efficiency = 97+95+95+94+89/5 = 94%
2) By Image-
Efficiency=100+100+99+99+99/5
=99.4%
3) New Image capture(New Face)-
Efficiency = 100+100+100+100+100/5
=100%
4) Total Efficiency = 94+99.4+100/3 = 97.8%
Chart 1:- Test Cases of Database.
Above Chart shows the result of 20 Database By using
Camera, Image and find New face.
The data has been collected by Real time evaluation by
using the system.
Chart 2:-System Efficiency Chart.
Above Chart shows the Efficiency of Five Test cases based
on three condition. This helps us monitor the performance
of the System Efficiency.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4
3 Conclusion:-
In the proposed system PIR sensor is used which
consumes less power and it is cost effective as well. It has a
wide focal point extend and is easy to interface with the
system. The affectability scope of the sensor is 3 to4feet, yet
it can be expanded up to 20 feet.
In the proposed system camera module is used and
the specifications of this camera may change according to
user or application. The images captured are comparedwith
images in the dataset using the LBPH (Local Binary Pattern
Histogram) algorithm.TheLBPHalgorithmiscombined with
HOG (Histogram of the Oriented Gradient) algorithm to
improve detection performance. The face recognition
consists of two phases viz. includes ‘extraction’ and
‘classification’. Feature extraction is the process of dividing
the image into small regions called cells and extract LBP
histogram for each cell. In classification phase all the
histograms are Concatenated to form a single histogram
representing the image. The benefit of LBPH is that it does
not look at the image as a whole, but instead finds its local
structure by comparing each pixel to its neighboring pixel,
hence, it is not much affected by light.
In the proposed system we haveutilizedPIRsensor,
a camera module and a face recognition algorithm which is
capable of capturing images of the intruder and sending the
image and information of intruder (if intruders image
matches with the image in the dataset) to the owner or
administrator via an e-mail. The constant reconnaissance of
workplace can be made conceivable with the assistance of
the proposed system.
Future Scope
As per the future implementation of the project , If
microwave and laser sensors instead of PIR sensor as it may
show irregularities in high temperature. Instead of using
basic web camera, If use of high resolution cameras areused
of more sensitive sensors that can helpful in low lighting
environment. For better authentication we can use Aadhar
database.
Application
• Other than Airport this system is used in
Organization,large Commercial spaces,universities,
hospitals.
• By implementing some changes in base module it
can be use in defense.
References
1) IlhanAydin, Nashwan Adnan Othman, A New IoT
Combined Face Detection of Peopleby Using
Computer Vision for Security Application, IDAP,
IEEE 2017.
2) Rekha Dr. Ramaprasad.P, An Efficient Automated
Attendance Management System Based on Eigen
face Recognition, IEEE 2017.
3) Shrutika V. Deshmukh, Prof. Dr. U. A. Kshirsagar,
Human Face Detection System for Door Security,
IJSRST 2017.
4) IshaanSathe, Chiman Patel, Prasad Mahajan,
Tanmay Telang, Sejal Shah, Automatic Locking
Door Using Face recognition, IJETSR 2017.
5) Narayan T. Deshpande, Dr. S. Ravishankar, Face
Detection and Recognition using Viola-Jones al-
gorithm and Fusion of PCA and ANN, ACST, IEEE
2017.
6) Simarjit Singh Saini, Hemant Bhatia, Vatanjeet
Singh, EkambirSidhu, Rochelle salt integrated PIR
sensor Arduino based intruder detection
system(ABIDS), ICCCCM, IEEE 2016.
7) Anshika Chaturvedi, Praveen Kumar, Seema Rawat,
Proposed Noval Security System based on Pssive
Infrared Sensor, InCITe, IEEE 2016.
8) Priya B. Patel, Viraj M. Choksi, Swapna Jadhav, M. B.
Potdar, Smart Motion Detection System using
Raspberry Pi, IJAIS 2016.

More Related Content

PDF
Comparative Study on Various System Based on Raspberry-Pi Technology
PDF
Secured Spy for Highly Secured Areas
PDF
IRJET- Real Time Analysis of Patient Health Monitoring and Home Automation us...
PDF
Zigbee Based Parameters Monitoring and Controlling System for Induction Motor
PDF
IRJET- Development of Surveillance System for Indian Military
PDF
IRJET- IOT based Intrusion Detection and Tracking System
PDF
IRJET- Low Cost IoT based Remote Health Monitoring System
PDF
Real time approach of piezo actuated beam for wireless
Comparative Study on Various System Based on Raspberry-Pi Technology
Secured Spy for Highly Secured Areas
IRJET- Real Time Analysis of Patient Health Monitoring and Home Automation us...
Zigbee Based Parameters Monitoring and Controlling System for Induction Motor
IRJET- Development of Surveillance System for Indian Military
IRJET- IOT based Intrusion Detection and Tracking System
IRJET- Low Cost IoT based Remote Health Monitoring System
Real time approach of piezo actuated beam for wireless

What's hot (20)

PDF
IRJET- Optimization of Surveillance Camera for Low Cost Storage Device
PDF
IRJET-An Automatic Fire Detection and Warning System under Home Video Surveil...
PDF
IRJET - A Cyber-Physical System for Environmental Monitoring Based on IOT
PDF
IRJET - Gesture based Robot with Victim Detection using Audio
PDF
IRJET- A Review Paper on IoT based Cognitive Robot for Military Surveillance
PDF
Industrial Safety Measurement using Sensors and Voice Announcement
PDF
IRJET- Indoor Positioning System
PDF
IRJET - IoT based Motor Monitoring System
PDF
IRJET- An Intelligent Remote Controlled System for Smart Home Automation
PDF
IRJET- Collision Avoidance based on Obstacle Detection using OpenCV
PDF
IRJET- IoT based Classroom Automation System
PDF
IRJET- Design and Implementation of Smart City using IoT
PDF
H041035154
PDF
IRJET- Monitoring and Control of PLC based Automation System Parameters using...
PDF
IRJET - Bridge Monitoring System using IoT
PDF
IRJET- Iot Based Home Visitor Monitoring System using Raspberry Pi
PDF
IRJET - Examination Forgery Avoidance System using Image Processing and IoT
PDF
IRJET- Survey on EEG Based Brainwave Controlled Home Automation
PDF
Design and implementation smart home alarm system with zigbee transceiver
PDF
IRJET- Motion Activated Security System
IRJET- Optimization of Surveillance Camera for Low Cost Storage Device
IRJET-An Automatic Fire Detection and Warning System under Home Video Surveil...
IRJET - A Cyber-Physical System for Environmental Monitoring Based on IOT
IRJET - Gesture based Robot with Victim Detection using Audio
IRJET- A Review Paper on IoT based Cognitive Robot for Military Surveillance
Industrial Safety Measurement using Sensors and Voice Announcement
IRJET- Indoor Positioning System
IRJET - IoT based Motor Monitoring System
IRJET- An Intelligent Remote Controlled System for Smart Home Automation
IRJET- Collision Avoidance based on Obstacle Detection using OpenCV
IRJET- IoT based Classroom Automation System
IRJET- Design and Implementation of Smart City using IoT
H041035154
IRJET- Monitoring and Control of PLC based Automation System Parameters using...
IRJET - Bridge Monitoring System using IoT
IRJET- Iot Based Home Visitor Monitoring System using Raspberry Pi
IRJET - Examination Forgery Avoidance System using Image Processing and IoT
IRJET- Survey on EEG Based Brainwave Controlled Home Automation
Design and implementation smart home alarm system with zigbee transceiver
IRJET- Motion Activated Security System
Ad

Similar to IRJET- Smart Authentication System for Airport (20)

PDF
IoT Based Smart Surveillance and Automation
PDF
Voice Assistance Based Remote Surveillance System
PDF
IRJET- Body Sensor Network using Raspberry Pi3: IoT
PDF
Face Recognition using Raspberry PI for Door Lock System
PDF
IRJET- EVM Monitoring and Security over IoT
PDF
IRJET - IoT based Anti Theft Detection and Alerting System using Raspberry Pi
PDF
IRJET- Intrusion Detection through Image Processing and Getting Notified ...
PDF
IRJET- ROI based Automated Meter Reading System using Python
PDF
IRJET - IoT based Portable Attendance System
PDF
IRJET- Embedded System for Automatic Door Access using Face Recognition Te...
PDF
IRJET- Portable Camera based Assistive Text and Label Reading for Blind Persons
PDF
S.W.A.T – Motion Based Intrusion Detection System
PDF
IRJET-5G Mobile Technology
PDF
IRJET- Sensors implementation in AGV & IoT based data visualization over clie...
PDF
A Survey on Automated Waste Segregation System Using Raspberry Pi and Image P...
PDF
IRJET- IoT based Facial Recognition Biometric Attendance
PDF
IRJET- IoT and ML based Smart TV for Child Eyes Safety
PDF
IRJET- Polyhouse Technique using Raspberry PI Implemented in IOT
PDF
IRJET- Autonomous Underwater Vehicle: Electronics and Software Implementation...
PDF
IRJET - Gesture Controlled Home Automation using CNN
IoT Based Smart Surveillance and Automation
Voice Assistance Based Remote Surveillance System
IRJET- Body Sensor Network using Raspberry Pi3: IoT
Face Recognition using Raspberry PI for Door Lock System
IRJET- EVM Monitoring and Security over IoT
IRJET - IoT based Anti Theft Detection and Alerting System using Raspberry Pi
IRJET- Intrusion Detection through Image Processing and Getting Notified ...
IRJET- ROI based Automated Meter Reading System using Python
IRJET - IoT based Portable Attendance System
IRJET- Embedded System for Automatic Door Access using Face Recognition Te...
IRJET- Portable Camera based Assistive Text and Label Reading for Blind Persons
S.W.A.T – Motion Based Intrusion Detection System
IRJET-5G Mobile Technology
IRJET- Sensors implementation in AGV & IoT based data visualization over clie...
A Survey on Automated Waste Segregation System Using Raspberry Pi and Image P...
IRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT and ML based Smart TV for Child Eyes Safety
IRJET- Polyhouse Technique using Raspberry PI Implemented in IOT
IRJET- Autonomous Underwater Vehicle: Electronics and Software Implementation...
IRJET - Gesture Controlled Home Automation using CNN
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
PPT on Performance Review to get promotions
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
Fundamentals of Mechanical Engineering.pptx
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
Current and future trends in Computer Vision.pptx
PPT
Project quality management in manufacturing
PPTX
Artificial Intelligence
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PDF
III.4.1.2_The_Space_Environment.p pdffdf
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
Fundamentals of safety and accident prevention -final (1).pptx
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
Embodied AI: Ushering in the Next Era of Intelligent Systems
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPT on Performance Review to get promotions
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Fundamentals of Mechanical Engineering.pptx
R24 SURVEYING LAB MANUAL for civil enggi
Current and future trends in Computer Vision.pptx
Project quality management in manufacturing
Artificial Intelligence
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
III.4.1.2_The_Space_Environment.p pdffdf

IRJET- Smart Authentication System for Airport

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1 Smart Authentication System for Airport Prof. A.B.Ingole1, Tejashree Gurav2, Karishma Attar3, Shital Pardeshi4, Yogita Bhapkar5. 1HOD & Assistant Professor, Electronics and Telecommunication Dept., Sinhgad Academy of Engineering, Kondhwa-bk,Pune Savitribai Phule Pune University, Pune, India 2,3,4Students, Electronics and Telecommunication Dept., Sinhgad Academy of Engineering, Kondhwa-bk, Pune Savitribai Phule Pune University, Pune, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract:- As an essential constituent of many associations’ security and safety precedence, Image Processing has established its importance and benefits numerous times by providing immediate supervising of possessions, people, environment and property. This project deals with the design approach of an embedded real-time surveillance system based on P.I.R sensor for intruder detection that reinforces surveillance technology to provide essential security to people life and associated control and alert operations. Keywords:- P.I.R, Camera, Computer system, Image processing. 1. INTRODUCTION The security system to be designed in this project can be used extensively to monitor facilities by owners. The owner shall be able to monitortheirpropertyfrom wherever they are in the world. It will not replace the use of CCTV and camera surveillance systems but reduce the cost of implementation of a basic security system. This thus will enable owners to secure their facility at a cheaper cost. The images captured are compared with images in the dataset using the LBPH (Local Binary Pattern Histogram) algorithm. The LBPH algorithm is combined with HOG (Histogram of the Oriented Gradient) algorithm to improve detection performance. The face recognitionconsistsoftwophases viz. includes extraction and classification. Feature extraction is the process of dividing the image into small regions called cells and extract LBP histogram for eachcell.Inclassification phase all the histograms are concatenated to form a single histogram representing the image. The benefit of LBPH is that it does not look at the image as a whole, but instead its local structure by comparing each pixel to its neighboring pixel, hence, it is not much affected by light. This project will design and implement a security system based on passive infrared sensor (PIR). The system should be able to detect motion (intruder), activate a camera to capture image after motion is sensed and then compare the captured image with images present in the dataset stored in computer system. If image is matched send the information (stored in dataset) related to image to the owner through E-mail. Otherwise send only image and Date Timestamp. 1.1 System Overview:- • The whole working of the system starts with PIR sensor and camera . • The proposed system architecture shown in block diagram is a security system based on the ethics of image recognition. The system consists of a P.I.R sensor, camera, computer system along with internet connectivity connected to the computer system. • As the human body low level infrared radiation comes in contact with PIR sensor then sensorsends signals to the computer system to activate the camera, this feature of the sensor allows us to implement a power efficient system. 1.2 Hardware resource required  Computer system 1. SoC: 64 bit Windows 10 Operating System. 2. CPU: Intel Core i5 Processor (7th Gen.) 3. GPU: NVidia GeForce 940MX. 4. RAM: 8 GB DDR4 RAM. 5. Networking: 10/100 Ethernet, 2.4GHz 802.11n wireless. 6. Storage:1 TB HD
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2  Software resource required 1. Operating system : Windows 10. 2. Coding Language : Python and Java. 3. Framework used :Django version 1.10. 4. Packages used : Open CV 2, Numpy, SMTP, MEME. 1.3 Input Resources We are using PIR sensor and camera as a input device.  P.I.R. Sensor PIR sensors allow you to sense motion, almost always used to detect whether a human has moved in or out of the sensors range. They are small, inexpensive, low-power, easy to use and don't wear out. For that reason they are commonly found in appliances and gadgets used in homes or businesses. They are often referred to as PIR, "Passive Infrared", "Pyro electric", or "IR motion" sensors. Specifications:-  Infrared Sensor with Control Circuit Board  The Sensitivity and Holding Time Can be adjusted  Sensitive Setting: Turn to Right,Distance Increases(about 7M);Turn to Left,Distance Reduce(About 3M)  Blockade time: 2.5s(Default)  Camera Camera is used to capture the image. As the human body low level infrared radiationcomesincontactwithPIRsensor then sensor sends signals to the computersystemtoactivate the camera.5MP Camera module is connected to the Raspberry pi module. Specifications:-  Connection Type:- USB  USB Type:- USB 2.0  Optical Resolution:- True 640x480  Focal length:- 2.3mm  Image Capture:- 640x480, 1.3MP, 3Mp,5MP.  Frame Rate(Max):- 640x480@30  Raspberry Pi 3 B+ The Raspberry Pi 3 Model B+ is the latest product in the Raspberry Pi 3 range, boasting a 64-bit quad core processor running at 1.4GHz, dual-band 2.4GHz and 5GHz wireless LAN, Bluetooth 4.2/BLE, faster Ethernet, and Poe capability via a separate Poe HAT. The dual-band wireless LAN comes with modular compliance certification,allowingtheboardto be designed into end products with significantly reduced wireless LAN compliance testing, improving both cost and time to market. The Raspberry Pi 3 Model B+ maintains the same mechanical footprint as both the Raspberry Pi2Model B and the Raspberry Pi 3 Model B. Specification:-  Processor:-Broadcom BCM2837B0, Cortex-A53 64-bit SoC @ 1.4GHz  Memory:-1GB LPDDR2 SDRAM  Connectivity:- 1-2.4GHz and 5GHz IEEE 802.11.b/g/n/ac wireless LAN, Bluetooth 4.2, BLE 2-Gigabit Ethernet over USB 2.0 (maximum throughput 300Mbps), 3-4 × USB 2.0 ports  Access:-Extended 40-pin GPIO header  Video & Sound:- 1 × full size HDMI MIPI DSI display port MIPI CSI camera port 4 pole stereo output and compositevideo port  Multimedia:-H.264, MPEG-4 decode (1080p30); H.264 encode (1080p30); OpenGL ES 1.1, 2.0 graphics  SD Card Support:-Micro SD format for loading operating system and data storage  Input Power:-5V/2.5A DC via micro USB connector 5V DC via GPIO header Power over Ethernet (PoE)–enabled (requires separate PoE HAT)  Environment:-Operating temperature, 0–50°C 1 Vcc Input voltage is +5V for typical applications. Can range from 4.5V- 12V 2 High/Low Ouput (Dout) Digital pulse high (3.3V) when triggered (motion detected) digital low(0V) when idle(no motion detected 3 Ground Connected to ground of circuit
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3  DataBase As in our computer system we have a dataset of images, those are the images Of authorized person from each view such as front view, right side view, leftside view with their black and white format, those image set are faces of various person. We are using MySQL database to store the details of the persons. MySQL is the world’s most popular open source database, enabling the cost-effective delivery of reliable, high- performance and scalable Web-based and embedded database applications. The data flow diagram provides a view of all the data that is exchanged by the security system's module. 2 Result- Test Cases Test Case Based on 20 Database. 1) By Camera- Efficiency = 97+95+95+94+89/5 = 94% 2) By Image- Efficiency=100+100+99+99+99/5 =99.4% 3) New Image capture(New Face)- Efficiency = 100+100+100+100+100/5 =100% 4) Total Efficiency = 94+99.4+100/3 = 97.8% Chart 1:- Test Cases of Database. Above Chart shows the result of 20 Database By using Camera, Image and find New face. The data has been collected by Real time evaluation by using the system. Chart 2:-System Efficiency Chart. Above Chart shows the Efficiency of Five Test cases based on three condition. This helps us monitor the performance of the System Efficiency.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4 3 Conclusion:- In the proposed system PIR sensor is used which consumes less power and it is cost effective as well. It has a wide focal point extend and is easy to interface with the system. The affectability scope of the sensor is 3 to4feet, yet it can be expanded up to 20 feet. In the proposed system camera module is used and the specifications of this camera may change according to user or application. The images captured are comparedwith images in the dataset using the LBPH (Local Binary Pattern Histogram) algorithm.TheLBPHalgorithmiscombined with HOG (Histogram of the Oriented Gradient) algorithm to improve detection performance. The face recognition consists of two phases viz. includes ‘extraction’ and ‘classification’. Feature extraction is the process of dividing the image into small regions called cells and extract LBP histogram for each cell. In classification phase all the histograms are Concatenated to form a single histogram representing the image. The benefit of LBPH is that it does not look at the image as a whole, but instead finds its local structure by comparing each pixel to its neighboring pixel, hence, it is not much affected by light. In the proposed system we haveutilizedPIRsensor, a camera module and a face recognition algorithm which is capable of capturing images of the intruder and sending the image and information of intruder (if intruders image matches with the image in the dataset) to the owner or administrator via an e-mail. The constant reconnaissance of workplace can be made conceivable with the assistance of the proposed system. Future Scope As per the future implementation of the project , If microwave and laser sensors instead of PIR sensor as it may show irregularities in high temperature. Instead of using basic web camera, If use of high resolution cameras areused of more sensitive sensors that can helpful in low lighting environment. For better authentication we can use Aadhar database. Application • Other than Airport this system is used in Organization,large Commercial spaces,universities, hospitals. • By implementing some changes in base module it can be use in defense. References 1) IlhanAydin, Nashwan Adnan Othman, A New IoT Combined Face Detection of Peopleby Using Computer Vision for Security Application, IDAP, IEEE 2017. 2) Rekha Dr. Ramaprasad.P, An Efficient Automated Attendance Management System Based on Eigen face Recognition, IEEE 2017. 3) Shrutika V. Deshmukh, Prof. Dr. U. A. Kshirsagar, Human Face Detection System for Door Security, IJSRST 2017. 4) IshaanSathe, Chiman Patel, Prasad Mahajan, Tanmay Telang, Sejal Shah, Automatic Locking Door Using Face recognition, IJETSR 2017. 5) Narayan T. Deshpande, Dr. S. Ravishankar, Face Detection and Recognition using Viola-Jones al- gorithm and Fusion of PCA and ANN, ACST, IEEE 2017. 6) Simarjit Singh Saini, Hemant Bhatia, Vatanjeet Singh, EkambirSidhu, Rochelle salt integrated PIR sensor Arduino based intruder detection system(ABIDS), ICCCCM, IEEE 2016. 7) Anshika Chaturvedi, Praveen Kumar, Seema Rawat, Proposed Noval Security System based on Pssive Infrared Sensor, InCITe, IEEE 2016. 8) Priya B. Patel, Viraj M. Choksi, Swapna Jadhav, M. B. Potdar, Smart Motion Detection System using Raspberry Pi, IJAIS 2016.