Final Year Project Literature Review - Old
Final Year Project Literature Review - Old
Final Year Project Literature Review - Old
access control. This is because facial recognition has shown great performance
pattern recognition in the last few decades. Facial recognition stands as one of the
most popular biometric system in existence today, greatly used in unlocking phones,
Fingerprint, palm vein and eye iris recognition are other biometric method
mentioned in this project but facial recognition was most preferred because it does not
require any physical contact, non-invasive and secure. Below, a table is given,
facial recognition:
many approaches have been proposed (Okumura & Hoshino et. al., 2017; Schroff &
Kalenichenko et. al., 2015; Deng & Guo et. al., 2018; Amos & Ludwiczuk et. al.,
2016):
- Training the model on very huge dataset, e.g. more than 200M image of 8M
- Loss function that distinguish two face images (Contrastive loss, triplet loss, center
loss, large margin softmax, angular softmax, and large margin cosine loss, and cosine
loss).
An illustration of how facial recognition is implemented in access control systems is
shown below:
Working Principles
features a camera which collect a snapshot of the user’s face, crops it and compares it
Distance which computes the similarity between the facial dataset and a numerical
value. If the numerical value is greater than a threshold, the datasets are regarded as
dissimilar otherwise, similar. The system also keeps log of entry and exit time of users
Conclusion
This project makes use of facial recognition for access control. The
automatically register a new face and recognize the face on next appearance.
2. IOT BASED DOOR ACCESS CONTROL USING FACE
have been used to enforce privacy. This traditional security methods which includes
the use of keys, identification card or passwords have been used to restrict access to
certain resources or information but regarding their flaws, they became less popular.
This literature proposed an access control system using face detection and
recognition. The system consists of image capture, face detection and recognition,
email notification and automatic door access management. OpenCV was used in the
loosing vital facial properties. The facial templates can be stored in a database to be
retrieved afterwards.
The system also features a GSM module which allows the door to be
The Pi Camera used captures images to be used by the facial recognition system.
The project also states major areas of commercial interest for the development
of facial recognition technology, which includes bio science, law enforcement and
criminal investigations, access control management. This high demand has invented
cheaper and flexible designs for facial recognition, making it a popular choice.
Also, like any other technology, facial recognition has some difficulties in its
use such as angle or orientation of face, lighting, and facial features like beards or
even glasses. This made the researcher choose OpenCV based facial recognition
system using Haar’s face classifier. The micro-controller used here is the Raspberry
Pi micro-controller. A PIR Sensor was also used to detect human based on their heat
radiation.
- Pose variation
- Occlusion
- Expression
- Aging
- Transformation
- Illumination
4. Users could operate on a touch screen to select entering the house by recognizing
camera.
Block Diagram
The block diagram of the proposed IoT based door access control system
(Harsha, 2019).
Conclusion
developed system’s efficiency was calculated in terms of facial recognition rate and
this analysis revealed that the system has high performance efficiency.
process and analyze data from the surrounding and communicates with one another
via the internet. This concept is termed Internet of Things (IoT). It also mentions that
age of the person passing by. The areas of application of facial recognition technology
This aim of this project is to develop an access control system which detects
faces and processes those faces for recognition. The result of these recognitions
easier to extract vital information from the image and disregarding the unnecessary.
Histogram of direction of gradients are used to define important features of the image.
A research conducted by Hafiz et al. (2018) utilized HOG and CNN (Convolutional
Viola and Michael Jones in a literature they published. Haar Classifiers use the
contrast between adjacent pixels instead of pixel intensity. A test was carried out with
Haar Classifiers and other weak classifiers and an accuracy of approximately 80%
was recorded.
Other methods for face detection and recognition mentioned are: Support
camera. The camera captures a face and the Raspberry Pi micro-controller analyzes
the face and calculated the Euclidean distance between the stored face templates and
the face before the camera. Face detection was executed using an HOG algorithm.
Based on the result of the Euclidean distance between the two face templates,
The result of test made using the developed system is given in the table below:
Conclusion
The system presented an high detection rate of 90.61% facial recognition rate
of 95.83%. Also, positive results have been realized from different distance from the
camera, with different angle, lighting, and multiple test subjects at the same time.
4. AN INTELLIGENT AUTOMATED DOOR CONTROL SYSTEM
This project starts by discussing the Automatic Entrance/Exit Door, stating its
manual door opening and closing needs to be removed. It mentions the existing
into active and passive sensors. In active sensors, the sensor radiates a signal and
based on the signal reflected back to it, it can determine position of objects and even
their respective speeds. Passive sensors don’t radiate any signal but have the
capability to receive signal that bounce off object and calculate their position and
even speed from the received signal. Passive sensor are cheaper and hence better
The researchers noted that although, the sensor-based automatic doors are able
to detect object, they are not capable of predicting the intention of users, giving rise
the frequent false actions, which may be annoying and wastes power as stated by the
researchers.
In this literature, a door access control system was developed to work based on
person wants to pass through the door. Also, an infrared component has been
The design of the door access control system is based on the human detection
and trajectory analysis. It involves face detection, trajectory tracking and statistical
analysis for intention estimation. Below is the flowchart of the control procedures:
The operation of the system is divided into 3 processes: state transition, human
State transition process involves the opening and closing of the door. The door
opening action depends on the detection of a human face and probability of the human
walking through the door which is calculated using trajectory analysis. The door
closing action uses infrared to detect any object passing through the door and close
the door only when the doorway is clear. The state transition diagram is given below:
State Transition Diagram (Yang & Lai et al., 2013).
In this project face and contour detection are used in correctly identifying
human. The face detection is used primarily but the contour detection of the head and
2010).
accessing the door the predict is the user indeed wishes to go through the door or is
just passing by. The face of the user is constantly tracked as he/she approaches the
Detection and false rate are used the measure the performance of the system.
Face detection used the Viola method (Viola & Jones, 2004), by creating a 10-layer
cascade boosting structure. The face detection rate is pegged at 90% while the false
rate (FR) is calculated as the sum of false acceptance rate (FAR) and false rejection
rate (FRR). The false rate is pegged at less than two in one million times.
Conclusion and Future Works
It is noted that the system has advantages of low false rate (near 0%), high
correct activating rate (99.6%), and short response time (within 2s) from detecting the
target, confirming his intention, to activate the door opening. Moreover, via statistical
analysis on detected face in consecutive time sequence, case of passing persons with
missing face can still be confirmed within 4 s thus to activate the door correctly.
The developed system can also be used as a watch dog since it has a higher CP
rate than existing system. The researchers also noted that the developed system can
also be used as an emergency system for fire detection, only needing a replacement
for a faster DSP micro-controller module. The authors of this literature declared no
conflict of interest.
REFERENCES
- J. Deng, J. Guo, and S. Zafeiriou, “ArcFace: Additive angular margin loss for deep
- Hafiz, A., Ishraq, A., Manirul, I.: "HOGCNN Based Real Time Face Recognition",
(ICAEEE), 2018.
- Viola, P., Jones, M.: "Rapid Object Detection Using a Boosted Cascade of Simple
Viola, P.; Jones, M.J.: Robust real-time face detection. Int. J. Comput. Vis. 2004, 57,
137–154