This paper is published in Volume-4, Issue-5, 2018
Area
Computer Science
Author
R. Keerthana, S. Govardhini
Org/Univ
Sri Krishna Arts and Science College, Coimbatore, Tamil Nadu, India
Keywords
RaspberryPi, Access control, Eigenface
Citations
IEEE
R. Keerthana, S. Govardhini. A survey on door access security control system via Raspberry Pi, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
R. Keerthana, S. Govardhini (2018). A survey on door access security control system via Raspberry Pi. International Journal of Advance Research, Ideas and Innovations in Technology, 4(5) www.IJARIIT.com.
MLA
R. Keerthana, S. Govardhini. "A survey on door access security control system via Raspberry Pi." International Journal of Advance Research, Ideas and Innovations in Technology 4.5 (2018). www.IJARIIT.com.
R. Keerthana, S. Govardhini. A survey on door access security control system via Raspberry Pi, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
R. Keerthana, S. Govardhini (2018). A survey on door access security control system via Raspberry Pi. International Journal of Advance Research, Ideas and Innovations in Technology, 4(5) www.IJARIIT.com.
MLA
R. Keerthana, S. Govardhini. "A survey on door access security control system via Raspberry Pi." International Journal of Advance Research, Ideas and Innovations in Technology 4.5 (2018). www.IJARIIT.com.
Abstract
In this paper, a control system for the door is being developed. A drastic growth and an increasing trend have been seen in the field of home automation control system. The person identification system is used as the basic design for the door control system. This technology is mostly preferred because of its enhanced security and the accuracy in the recognition of the individual. The main advantage of this system is that it can be accessed or controlled from any location in the world. At first, the images of the authorized individuals, for example, a particular family consisting of 7 or 8 members are being captured and made to store in the database. If the authorized person is not available at home and in case a third person or a visitor wants to visit his/her house, the system first captures the image of the visitor and compares it with the image stored in the database. If the match is found, then the person will be given access inside a house with door unlock. If the match is not found the access is denied and the alert notification is sent to the owner’s registered mail with the image captured. Then the owner decides to either provide access or deny it.