Facial Recognition Enabled Smart Security Lock System Using Machine Learning Approach

Authors

  • M. Marimuthu Vellore Institute of Technology University image/svg+xml
  • G. Mohanraj Vellore Institute of Technology University image/svg+xml
  • J. Akilandeswari Sona College of Technology image/svg+xml
  • V. Sathiyapriya Knowledge Institute of Technology

DOI:

https://doi.org/10.4108/eetiot.5657

Keywords:

Face recognition, Dlib, SVM algorithm, OpenCV, Raspberry Pi

Abstract

INTRODUCTION: In today's modern world of networking and intelligent devices, there is an imperative need to upgrade everyday things and make them intelligent; additionally, this is not the era to unquestioningly trust old and traditional security measures, particularly when it comes to smart door lock systems. Mostly, every smart door lock system has a security access code or fingerprint access outside the door that makes it vulnerable. The password in a classic security system can be readily hacked with advanced technology and, therefore, is no longer suitable for today's real-time environment.

OBJECTIVES: As a result, this paper intends to provide enhanced security for the user through facial recognition using a machine-learning approach with high accuracy and remote access via an Android application. Automated solutions leveraging machine learning have shown to be quite effective in security.

METHODS: Machine Learning (ML) algorithms are used to train different sets of images to identify and classify various sorts of faces. The specific algorithm that is to be used is Dlib and Support Vector Machine (SVM); Dlib is utilized for face recognition along with HOG (Histogram of Oriented Gradients), whereas SVM is used for image classification, which is used to authorize the personnel.

RESULTS: When compared to other cutting-edge methodologies, empirical results reveal that the proposed approach achieves 96% accuracy rate, with a recognition speed of 0.5 seconds per face in facia recognition which is more effective, reliable, and utilizes fewer resources.

CONCLUSION: Real-time face recognition enables quick and secure identification, supporting multi-factor authentication and monitoring. The proposed smart lock system uses the HOG+SVM approach, achieving higher accuracy and faster face detection.

Downloads

<br data-mce-bogus="1"> <br data-mce-bogus="1">

References

[1] Arshi, O., and Chaudhary, A., “Fortifying the Internet of Things: A Comprehensive Security Review,” EAI Endorsed Transactions on Internet of Things, 9(4), e1-e1, October 2023.

[2] Jiawei, Z. H. A. O., Mengyao, K. A. N. G., and Zheng, H. A. N, “Robustness of Classification Algorithm in the Face of Label Noise,” EAI Endorsed Transactions on Internet of Things, 9(1), June 2023.

[3] Karthik A Patil, Niteen Vittalkar, Pavan Hiremath, and Manoj A Murthy, “Smart Door Locking System using IoT,” International Research Journal of Engineering and Technology (IRJET), Volume: 07, Issue: 05, May 2020.

[4] M Shanthini, G Vidya, and R Arun, “IoT Enhanced Smart Door Locking System,” 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT), October 2020.

[5] A. R. Syafeeza, M. K. Mohd Fitri Alif, Y. Nursyifaa Athirah, A. S. Jaafar, A. H. Norihan, and M. S. Saleha, “IoT based facial recognition door access control home security system using raspberry pi,” International Journal of Power Electronics and Drive System (IJPEDS) Vol. 11, No. 1, March 2020, pp. 417-424.

[6] D. Cindori, I. Tomičić and P. Grd, "Security Hardening of Facial Recognition Systems," 2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO), Opatija, Croatia, 2021, pp. 1015-1019, doi: 10.23919/MIPRO52101.2021.9596961.

[7] Caballero-Gil, C., Álvarez, R., Hernández-Goya, C. et al. Research on smart-locks cybersecurity and vulnerabilities. Wireless Netw 30, 5905–5917 (2024). https://doi.org/10.1007/s11276-023-03376-8

[8] M.R.Sanghavi, Srujal Sancheti, Bhakti Patel, Sanjana Shinde, and Neha Lunkad, “Smart Door Unlock System Using Face Recognition And Voice Commands,” International Research Journal of Engineering and Technology (IRJET), Volume: 07, Issue: 06, June 2020.

[9] Soe Sandar and Saw Aung Nyein Oo, “Development of a Secured Door Lock System Based on Face Recognition using Raspberry Pi and GSM Module,” International Journal of Trend in Scientific Research and Development (IJTSRD), Volume 3 Issue 5, August 2019.

[10] Pooshkar Rajiv, Rohit Raj, and Mahesh Chandra, “Email based remote access and surveillance system for smart home infrastructure," Engineering and Material Sciences, February 2016.

[11] T. Mantoro, M. Ayu, Suhendi, “Multi-Faces Recognition Process Using Haar Cascades and Eigenface Methods,” 6th International Conference on Multimedia Computing and Systems (ICMCS), 2018.

[12] A.AdityaShankar, P.R.K.Sastry, A. L.Vishnu Ram, A.Vamsidhar, “Fingerprint Based Door Locking System”, International Journal Of Engineering And Computer Science, ISSN:2319-7242 , Volume 4 Issue 3 March 2015, Page No. 10810-10814.

[13] Liton Chandra Paul, Abdulla Al Sumam, "Face Recognition Using Principal Component Analysis Method," International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Volume 1, Issue 9, November 2012.

[14] N. Boyko, O. Basystiuk and N. Shakhovska, "Performance Evaluation and Comparison of Software for Face Recognition, Based on Dlib and Opencv Library," 2018 IEEE Second International Conference on Data Stream Mining & Processing (DSMP), Lviv, 2018, pp. 478-482.

[15] K. M. Rajesh and M. Naveenkumar, "A robust method for face recognition and face emotion detection system using support vector machines," 2016 International Conference on Electrical, Electronics, Communication, Computer and Optimization Techniques (ICEECCOT), Mysuru, 2016, pp. 1-5.

[16] K. P. Bhattarai, B. P. Gautam and K. Sato, "Authentic Gate Entry System (AuthGES) by Using LBPH for Smart Home Security," 2018 International Conference on Networking and Network Applications (NaNA), Xi'an, China, 2018, pp. 191-196.

[17] Karan Maheshwari and, Nalini N, “Facial Recognition Enabled Smart Door Using Microsoft Face API,” International Journal of Engineering Trends and Applications (IJETA) – Volume 4 Issue 3, May-Jun 2017.

[18] H. Bharathi, U. Srivani, M. D. Azharudhin, M. Srikanth and M. Sukumarline, "Home automation by using raspberry Pi and android application," 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA), Coimbatore, 2017, pp. 687-689.

[19] P. S. Nagendra Reddy, K. T. Kumar Reddy, P. A. Kumar Reddy, G. N. Kodanda Ramaiah and S. N. Kishor, "An IoT based home automation using android application," 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES), Paralakhemundi, 2016, pp. 285-290.

[20] Lihua Zhao and Richard Tsai, “Locking and unlocking a mobile device using facial recognition,” United States Patent, March 2015.

[21] Niketha Mohan Jamakhandi, Harshith M, Jagriti, and Priyanka Bharti, “Smart Door Lock using Face Recognition,” International Journal of Computer Sciences and Engineering, Vol.-7, Special Issue-14, May 2019.

[22] Marimuthu, M., Akilandeswari, J., & Chelliah, P. R. (2022). Identification of trustworthy cloud services: solution approaches and research directions to build an automated cloud broker. Computing, 104(1), 43-72. https://doi.org/10.1007/s00607-021-01015-8

[23] Nourman S. Irjanto, and Nico Surantha, “Home Security System with Face Recognition based on Convolutional Neural Network,” International Journal of Advanced Computer Science and Applications, Vol. 11, No. 11, 2020.

[24] Marimuthu, M., Mohanraj, G., Karthikeyan, D., & Vidyabharathi, D., (2023). Safeguard Confidential Web Information from Malicious Browser Extension Using Encryption and Isolation Techniques. Journal of Intelligent & Fuzzy Systems, pp. 1 – 16. DOI: 10.3233/JIFS-233122

[25] M. Nandhini, M.Mohamed Rabik, Kiran Kumar, Ashish Brahma, “Iot Based Smart Home Security System with Face Recognition and Weapon Detection Using Computer Vision,” International Journal of Innovative Technology and Exploring Engineering (IJITEE), Volume-10 Issue-1, November 2020.

[26] Muhammad Zeeshan Khan, Saad Harous, Saleet Ul Hassan, Muhammad Usman Ghani Khan, Razi Iqbal, and Shahid Mumtaz, “Deep Unified Model For Face Recognition Based on Convolution Neural Network and Edge Computing,” Special Section On Data Mining For Internet Of Things, Volume 7, 2019

[27] ElAraby, M. E., and M. Y. Shams. "Face retrieval system based on elastic web crawler over cloud computing." Multimedia Tools and Applications 80, no. 8, 2021, pp. 11723-11738.

[28] Shams, M.Y., Sarhan, S.H. and Tolba, A.S, “Adaptive Deep Learning Vector Quantisation for Multimodal Authentication”. J. Inf. Hiding Multim. Signal Process, 8(3), 2017, pp.702-722.

[29] Sarhan, Shahenda, Aida A. Nasr, and Mahmoud Y. Shams, "Multipose Face Recognition-Based Combined Adaptive Deep Learning Vector Quantization", Computational Intelligence and Neuroscience 2020 (2020).

[30] V. Albiero, K. Zhang, and K. W. Bowyer, "How does gender balance in training data affect face recognition accuracy?" 2021.

[31] A. Krishnan, A. Almadan, A. Rattani, Understand-ing fairness of gender classification algorithms across gender-race groups, in: IEEE International Conference on Machine Learning and Applications (ICMLA), 2020, pp. 1028-1035.

[32] Krishnan A, Almadan A, Rattani A (2021) Probing Fairness of Mobile Ocular Biometrics Methods Across Gender on VISOB 2.0 Dataset. In: International Conference on Pattern Recognition (ICPR), pp. 229-243.

[33] Mahsa Merikhipour, Shayan Khanmohammadidoustani, and, Mohammadamin Abbasi, “Transportation mode detection through spatial attention-based transductive long short-term memory and off-policy feature selection.,” Expert Systems with Applications, 267(1), April 2025.

[34] M. Nasri, M. Kosa, L. Chukoskie, M. Moghaddam and C. Harteveld, "Exploring Eye Tracking to Detect Cognitive Load in Complex Virtual Reality Training," 2024 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct), Bellevue, WA, USA, 2024, pp. 51-54.

[35] M. Bodaghi, M. Hosseini and R. Gottumukkala, "A Multimodal Intermediate Fusion Network with Manifold Learning for Stress Detection," 2024 IEEE 3rd International Conference on Computing and Machine Intelligence (ICMI), Mt Pleasant, MI, USA, 2024, pp. 1-8.

[36] Seyedmohammad Nouraniboosjin, Melika Yousefi, Sadaf Meisami, Melina Yousefi, and Sajad Meisami, “Empowering healthcare: a blockchain-based secure and decentralized data sharing scheme with searchable encryption.,” International Journal on Cybernetics & Informatics, 13(4), August 2024.

[37] Ali Pourramezan Fard, Mohammad Mehdi Hosseini, Timothy D. Sweeny, and, Mohammad H. Mahoor, “AffectNet+: A database for enhancing facial expression recognition with soft-labels.,” Computer Vision and Pattern Recognition, arXiv:2410.22506, Oct 2024.

[38] https://github.com/MarimuthuSCTSA/Face-Detection-Dataset-and-Implementation-code.

Downloads

Published

05-06-2025

How to Cite

[1]
M. Marimuthu, G. Mohanraj, J. Akilandeswari, and V. Sathiyapriya, “Facial Recognition Enabled Smart Security Lock System Using Machine Learning Approach ”, EAI Endorsed Trans IoT, vol. 11, Jun. 2025.

Issue

Section

Advances in Internet of Things and its cybersecurity applications