

Deep Learning Based Detecting Security System
Abstract
With the growing demand for intelligent and contactless security solutions, deep learning technologies have become central to modern authentication systems. This project presents a deep learning-based security system designed for securing lockers through face recognition. The system captures the facial image of a passenger and locks the allotted locker. Only the registered passenger is allowed to unlock it. If any unauthorized individual attempts to access the locker, the system identifies the mismatch, denies access, triggers a buzzer alarm, and sends an instant alert to security personnel. By leveraging convolutional neural networks (CNN) for accurate facial verification, the system provides a highly secure, efficient, and automated solution suited for sensitive environments like airports, railway stations, and corporate offices
References
K. Salunkhe, P. Rajaram, S. Raut, and S. Kurle. “Real-time Activity Detection & Recognition in Video.” International Journal of Future Generation Communication and Networking, Vol. 13, pp. 76- 83, May. 2020.
J. Wolfendale. “Terrorism, security, and the threat of counterterrorism.” Studies in Conflict & Terrorism, vol. 30, pp. 75–92, Dec 2006.
E. L. Piza, B. C. Welsh, D. P. Farrington, and A. L. Thomas. “CCTV surveillance for crime prevention: A 40-year systematic review with meta-analysis.” Criminol. Public Policy, vol. 18, no. 1, pp. 135–159, 2019.
G. Alexandrie. “Surveillance cameras and crime: a review of randomized and natural experiments. Journal of Scandinavian Studies in Criminology and Crime Prevention, vol. 18, no. 2, pp. 210–222, 2017.
N. N. Swathi, K. Alekhya, D. Pavithra and D. Kalyan Babu. "Implementation of Vision Based Intelligent Home Security System Using ARM7."International Research Journal of Engineering and Technology, vol. 4, no. 02, pp. 2395-0056, 2017.
M. Dinesh and K. Sudhaman. “Real time intelligent image processing system with high speed secured Internet of Things: Image processor with IOT.” International Conference on Information Communication and Embedded System (ICICE2016), Chennai, 2016, pp. 1-5.
A. B. Dorothy, S. B. R. Kumar, and J. J. Sharmila. “IoT Based Home Security through
Digital Image Processing Algorithms.” 2017 World Congress on Computing and Communication Technologies (WCCCT), Tiruchirappalli, 2017, pp. 20-23.
Morbale, J. S., A. Kumari, H. Mishra, K. Sachan. "GSM Based Home Automation, Safety and Security System Using Android Mobile Phone," Internation Journal of Current Research, vol. 8, no. 03, pp. 28239-28243, 2016.
N. Ullah, M. S. Akram, H. U. Buzdar, A. U. Rehman, M. A. Khan, and S. Khan. “ZigBeebased Parameter Monitoring and Controlling Scheme for Multiple DC Motors,” Indian Journal of Science and Technology, vol. 13, no. 6, pp. 725–734, 2020.
H. Yetis and M. Karakose. "Image processing-based anomaly detection approach for synchronous movements in cyber-physical systems." 2018 23rd International ScientificProfessional Conference on Information Technology (IT), Zabljak, 2018, pp. 1-4
Refbacks
- There are currently no refbacks.