3
Most read
5
Most read
6
Most read
TITLE:
Face Recognized Door Locking
System using Arduino and FPS
Objective
• The objective is to develop a face recognition door
locking system using a laptop and NodeMCU.
• This involves implementing face recognition algorithms
on the laptop, interfacing with NodeMCU for door
control, and integrating hardware components like a
webcam and electronic lock for secure access control.
Introduction
• Introducing a sophisticated door locking system utilizing
face recognition technology.
• This innovative setup integrates a laptop for image
processing, a NodeMCU microcontroller for door
control, and a webcam for face capture.
• Seamlessly combining hardware and software, it
promises advanced security with convenient access
control
Existing System
• In the existing system, you can describe how a basic
password-based door locking system using Arduino
works.
• Vulnerable to password theft if the password is easy to
guess or intercept.
• Limited security, as someone could watch the user enter
the password and gain unauthorized access.
• No user identification beyond the password.
Block Diagram
Node
MCU
Power Supply Adaptor
LCD Display
Laptop
(Inbuilt Camera)
Relay
Buzzer
Lock
Hardware:
• NodeMCU
• LCD Display
• Relay
• E-Lock
• Buzzer
• Power Supply Adaptor
Software:
• Arduino IDE
• Embedded C Programming Language
Equipment's
Proposed System
• In the proposed system, upon a face match, data
is sent to NodeMCU to control the door via relay.
• Users receive a "Someone entered into the
home" alert.
• In case of no match, a "Someone trying to enter
the home" alert is sent.
• NodeMCU facilitates door control based on facial
recognition results, enhancing home security.
• Capture images of the authorized users' faces using
the Laptop camera.
Proposed System
Real-time Face Recognition:
• Continuously capture frames from the camera.
• Detect faces in the captured frames using face
detection algorithms.
• Use the same face recognition library to generate
embeddings for the detected faces.
• Compare the generated embeddings with the
stored embeddings of authorized users.
• If a match is found within a certain similarity
threshold, grant access.
Proposed System
• Once authentication factors are validated, the
NodeMCU sends a signal to control the lock
mechanism.
• The solenoid lock is activated to unlock the door.
• After a set period of time, the lock is re-engaged
to secure the door.
Advantages
• Enhanced Security
• No Need for Physical Keys or Cards
• Quick Authentication
• Cost-Effective
Application
• Home
• Offices
• Bank lockers
References
• Shilpashree P.S, Abhishek Kumar Tiwari, Ashutosh
Prakash Saurabh Kumar Singh, “Cloud Based
Secured Locker” International Journal of Scientific
Research & Engineering Trends Volume 5, Issue,
Mar-Apr-2019, ISSN (Online): 2395-566X
• Piash Paul, Md. Abdullah Al Achib, Hazrat Sauda
Hossain, Md. Kaviul Hossain “Smart Door
LockUsing Fingerprint Sensor” BRAC University,
October 2019.
THANKING YOU..!
Name:
Roll no:

More Related Content

PPTX
Internet terminologies
PPT
Web Security
PPTX
communication-protocols
PPTX
PPTX
Internet and its uses
PPTX
robotics and embedded system ppt
PPTX
Cyber crime and security ppt
PPT
Information security and other issues
Internet terminologies
Web Security
communication-protocols
Internet and its uses
robotics and embedded system ppt
Cyber crime and security ppt
Information security and other issues

What's hot (20)

PDF
Cyber security awareness for students
PPT
Basic Concepts Of Information Technology (It)
PPSX
Cyber security & Data Protection
PPTX
Cyber Security and Data Privacy in Information Systems.pptx
PPTX
Internet & Email & collaborative Computing & Social Networking by Abeer Ali 👍...
PPTX
Computer ethics
PPTX
FAKE NEWS DETECTION PPT
PPT
Firewall & its configurations
PPT
ICT / IT Law (Cyberlaw)
PPTX
Uniform Resource Locator (URL)
PPTX
Communication devices
PPTX
The impact of information technology on society
PPT
Digital Communication ppt
PPT
Browser Security
PPTX
Viruses, worms, and trojan horses
PPT
URL
PPTX
Cyber law in India: Its need & importance
PDF
Chapter 11 laws and ethic information security
PPTX
File Transfer Protocol
PPTX
cyber security
Cyber security awareness for students
Basic Concepts Of Information Technology (It)
Cyber security & Data Protection
Cyber Security and Data Privacy in Information Systems.pptx
Internet & Email & collaborative Computing & Social Networking by Abeer Ali 👍...
Computer ethics
FAKE NEWS DETECTION PPT
Firewall & its configurations
ICT / IT Law (Cyberlaw)
Uniform Resource Locator (URL)
Communication devices
The impact of information technology on society
Digital Communication ppt
Browser Security
Viruses, worms, and trojan horses
URL
Cyber law in India: Its need & importance
Chapter 11 laws and ethic information security
File Transfer Protocol
cyber security
Ad

Similar to Face Lock.ppt (20)

PDF
VisiLock: A Smart IoT-Based Face Recognition Door Lock System
PPTX
aziz.pptx ehjdvbhokkdghhhnndjjjjjjjjsbhhhs
DOCX
SMART HOME VISITOR MANAGEMENT AND ENTRY SYSTEM USING FACE RECOGNITION AND AUT...
PPTX
LoginCat from TekMonks
PPTX
Smart Door locking system using arduino
PPT
Design and Construction of Digital Locking System
PPTX
LoginCat - Zero Trust Integrated Cybersecurity
PPTX
Final copy HS11.pptxgfhehrdjrdjytdjysjrtrs
PPTX
Anonymous Individual Integration for IoT
PPTX
iGUARD: An Intelligent Way To Secure - Presentation
PPT
Home automation in client server using NodeMcu approach along with user notif...
PDF
Android Application Security
PDF
Android N Security Overview - Mobile Security Saturday at Ciklum
PPTX
eye.ppt[1].pptx whwueyyywueeyeryeurerrrrrrrrrrrrr
PPTX
Securing embedded systems
PPTX
Bank locker system
PPTX
iot based home security using image processing algorithms
PPTX
Information Technology Strategy by Group 3
PPTX
OTP_Wireless_Locking_System_Presentation.pptx
PPTX
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
VisiLock: A Smart IoT-Based Face Recognition Door Lock System
aziz.pptx ehjdvbhokkdghhhnndjjjjjjjjsbhhhs
SMART HOME VISITOR MANAGEMENT AND ENTRY SYSTEM USING FACE RECOGNITION AND AUT...
LoginCat from TekMonks
Smart Door locking system using arduino
Design and Construction of Digital Locking System
LoginCat - Zero Trust Integrated Cybersecurity
Final copy HS11.pptxgfhehrdjrdjytdjysjrtrs
Anonymous Individual Integration for IoT
iGUARD: An Intelligent Way To Secure - Presentation
Home automation in client server using NodeMcu approach along with user notif...
Android Application Security
Android N Security Overview - Mobile Security Saturday at Ciklum
eye.ppt[1].pptx whwueyyywueeyeryeurerrrrrrrrrrrrr
Securing embedded systems
Bank locker system
iot based home security using image processing algorithms
Information Technology Strategy by Group 3
OTP_Wireless_Locking_System_Presentation.pptx
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Ad

More from SruthiReddy112 (11)

PPT
Printed Circuit Board Workshop Board Workshop
PPTX
IoT Based Flood Monitoring and Alerting System for Smart Cities
PPTX
transmission baed gate based sr cell major
PPTX
Denosing speech signan using fast independent component
PPT
IOT Smart Helmet for Underground Mines using ESP32
PPTX
Image Security System using Image Processing
PPT
IOT Design: An Embedded System & its Applications
PPTX
Embedded-Web-Technology.pptx
PPT
task_sched2.ppt
PPTX
minippt.pptx
DOC
Naik Titles.doc
Printed Circuit Board Workshop Board Workshop
IoT Based Flood Monitoring and Alerting System for Smart Cities
transmission baed gate based sr cell major
Denosing speech signan using fast independent component
IOT Smart Helmet for Underground Mines using ESP32
Image Security System using Image Processing
IOT Design: An Embedded System & its Applications
Embedded-Web-Technology.pptx
task_sched2.ppt
minippt.pptx
Naik Titles.doc

Recently uploaded (20)

PPTX
mechattonicsand iotwith sensor and actuator
PPTX
Management Information system : MIS-e-Business Systems.pptx
PPTX
Building constraction Conveyance of water.pptx
PPTX
wireless networks, mobile computing.pptx
PPTX
Module 8- Technological and Communication Skills.pptx
PDF
August -2025_Top10 Read_Articles_ijait.pdf
PPTX
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
PPTX
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
PPTX
Information Storage and Retrieval Techniques Unit III
PPTX
ai_satellite_crop_management_20250815030350.pptx
PDF
distributed database system" (DDBS) is often used to refer to both the distri...
PPTX
CN_Unite_1 AI&DS ENGGERING SPPU PUNE UNIVERSITY
PPTX
Measurement Uncertainty and Measurement System analysis
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PDF
UEFA_Carbon_Footprint_Calculator_Methology_2.0.pdf
PDF
Abrasive, erosive and cavitation wear.pdf
PDF
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
PPTX
Software Engineering and software moduleing
PDF
Prof. Dr. KAYIHURA A. SILAS MUNYANEZA, PhD..pdf
PPTX
"Array and Linked List in Data Structures with Types, Operations, Implementat...
mechattonicsand iotwith sensor and actuator
Management Information system : MIS-e-Business Systems.pptx
Building constraction Conveyance of water.pptx
wireless networks, mobile computing.pptx
Module 8- Technological and Communication Skills.pptx
August -2025_Top10 Read_Articles_ijait.pdf
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
Information Storage and Retrieval Techniques Unit III
ai_satellite_crop_management_20250815030350.pptx
distributed database system" (DDBS) is often used to refer to both the distri...
CN_Unite_1 AI&DS ENGGERING SPPU PUNE UNIVERSITY
Measurement Uncertainty and Measurement System analysis
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
UEFA_Carbon_Footprint_Calculator_Methology_2.0.pdf
Abrasive, erosive and cavitation wear.pdf
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
Software Engineering and software moduleing
Prof. Dr. KAYIHURA A. SILAS MUNYANEZA, PhD..pdf
"Array and Linked List in Data Structures with Types, Operations, Implementat...

Face Lock.ppt

  • 2. Face Recognized Door Locking System using Arduino and FPS
  • 3. Objective • The objective is to develop a face recognition door locking system using a laptop and NodeMCU. • This involves implementing face recognition algorithms on the laptop, interfacing with NodeMCU for door control, and integrating hardware components like a webcam and electronic lock for secure access control.
  • 4. Introduction • Introducing a sophisticated door locking system utilizing face recognition technology. • This innovative setup integrates a laptop for image processing, a NodeMCU microcontroller for door control, and a webcam for face capture. • Seamlessly combining hardware and software, it promises advanced security with convenient access control
  • 5. Existing System • In the existing system, you can describe how a basic password-based door locking system using Arduino works. • Vulnerable to password theft if the password is easy to guess or intercept. • Limited security, as someone could watch the user enter the password and gain unauthorized access. • No user identification beyond the password.
  • 6. Block Diagram Node MCU Power Supply Adaptor LCD Display Laptop (Inbuilt Camera) Relay Buzzer Lock
  • 7. Hardware: • NodeMCU • LCD Display • Relay • E-Lock • Buzzer • Power Supply Adaptor Software: • Arduino IDE • Embedded C Programming Language Equipment's
  • 8. Proposed System • In the proposed system, upon a face match, data is sent to NodeMCU to control the door via relay. • Users receive a "Someone entered into the home" alert. • In case of no match, a "Someone trying to enter the home" alert is sent. • NodeMCU facilitates door control based on facial recognition results, enhancing home security. • Capture images of the authorized users' faces using the Laptop camera.
  • 9. Proposed System Real-time Face Recognition: • Continuously capture frames from the camera. • Detect faces in the captured frames using face detection algorithms. • Use the same face recognition library to generate embeddings for the detected faces. • Compare the generated embeddings with the stored embeddings of authorized users. • If a match is found within a certain similarity threshold, grant access.
  • 10. Proposed System • Once authentication factors are validated, the NodeMCU sends a signal to control the lock mechanism. • The solenoid lock is activated to unlock the door. • After a set period of time, the lock is re-engaged to secure the door.
  • 11. Advantages • Enhanced Security • No Need for Physical Keys or Cards • Quick Authentication • Cost-Effective
  • 13. References • Shilpashree P.S, Abhishek Kumar Tiwari, Ashutosh Prakash Saurabh Kumar Singh, “Cloud Based Secured Locker” International Journal of Scientific Research & Engineering Trends Volume 5, Issue, Mar-Apr-2019, ISSN (Online): 2395-566X • Piash Paul, Md. Abdullah Al Achib, Hazrat Sauda Hossain, Md. Kaviul Hossain “Smart Door LockUsing Fingerprint Sensor” BRAC University, October 2019.