Performance Analysis of Facial Image Feature Extraction Algorithm for Smart Home Security System Detection
DOI:
https://doi.org/10.21108/ijoict.v9i2.825Keywords:
Internet of Things, Smart Home Security, Arduino UNO, 2 Relay Module, Solenoid Lock, WaveletAbstract
Alongside the development of technology to facilitate multi-family security, security tools are also being developed. Smart home security is one of the very popular security tools in Indonesian home construction. The tool works automatically in real time and has no restrictions on environmental conditions. However, currently available tools still lack consistent accuracy and consistent performance. To solve this problem, the author proposes a smart home security system with an Arduino UNO-connected camera, two relay modules, a magnetic lock, and connecting to a home Internet of Things system. The methods used in the research for this thesis project were: 1. Literature review of ongoing Smart Home Security using facial image feature extraction algorithm research; 2. Deployment of Arduino UNO, 2 Relay Module, and Solenoid Lock; 3. The feature extraction algorithm used is Wavelet. The proposed method is expected to achieve an accuracy of 80% or more. The experimental results showed that the proposed prototype of this experiment achieved the accuracy of 85.7%. In addition to accuracy, there is also precision rate at 87.94%, recall rate at 87.56%, and f1-score rate at 87.28%
Downloads
References
[2] N. Saxena and D. Varshney, “Smart Home Security Solutions using Facial Authentication and Speaker Recognition through Artificial Neural Networks,” International Journal of Cognitive Computing in Engineering, vol. 2, pp. 154–164, Jun. 2021, doi: 10.1016/j.ijcce.2021.10.001.
[3] A. R. Syafeeza, M. K. Mohd Fitri Alif, Y. Nursyifaa Athirah, A. S. Jaafar, A. H. Norihan, and M. S. Saleha, “IoT based facial recognition door access control home security system using raspberry pi,” International Journal of Power Electronics and Drive Systems, vol. 11, no. 1, pp. 417–424, Mar. 2020, doi: 10.11591/ijpeds.v11.i1.pp417-424.
[4] S. Phawinee, J. F. Cai, Z. Y. Guo, H. Z. Zheng, and G. C. Chen, “Face recognition in an intelligent door lock with ResNet model based on deep learning,” in Journal of Intelligent and Fuzzy Systems, IOS Press BV, 2021, pp. 8021–8031. doi: 10.3233/JIFS-189624.
[5] P. K. Sharma, J. H. Park, Y. S. Jeong, and J. H. Park, “SHSec: SDN based Secure Smart Home Network Architecture for Internet of Things,” Mobile Networks and Applications, vol. 24, no. 3, pp. 913–924, Jun. 2019, doi: 10.1007/s11036-018-1147-3.
[6] X. Ning, W. Li, B. Tang, and H. He, “BULDP: Biomimetic Uncorrelated Locality Discriminant Projection for Feature Extraction in Face Recognition,” IEEE Transactions on Image Processing, vol. 27, no. 5, pp. 2575–2586, May 2018, doi: 10.1109/TIP.2018.2806229.
[7] G. Y. Chen, T. D. Bui, and A. Krzyzak, “Illumination invariant face recognition using dual-tree complex wavelet transform in logarithm domain,” Journal of Electrical Engineering, vol. 70, no. 2, pp. 113–121, Apr. 2019, doi: 10.2478/jee-2019-0017.
[8] O. Taiwo and A. E. Ezugwu, “Internet of Things-Based Intelligent Smart Home Control System,” Security and Communication Networks, vol. 2021, 2021, doi: 10.1155/2021/9928254.
[9] J. Pierce, “Smart home security cameras and shifting lines of creepiness a design-led inquiry,” in Conference on Human Factors in Computing Systems - Proceedings, Association for Computing Machinery, May 2019. doi: 10.1145/3290605.3300275.
[10] M. Sajjad et al., “Raspberry Pi assisted face recognition framework for enhanced law-enforcement services in smart cities,” Future Generation Computer Systems, vol. 108, pp. 995–1007, Jul. 2020, doi: 10.1016/j.future.2017.11.013.
[11] S. Nagarkar and V. Prasad, “Evaluating Privacy and Security Threats in IoT-based Smart Home Environment,” Maharashtra, 2019. [Online]. Available: http://www.ripublication.com
[12] A. S. Shitole and M. H. Devare, “TPR, PPV and ROC based performance measurement and optimization of human face recognition of IoT enabled physical location monitoring,” International Journal of Recent Technology and Engineering, vol. 8, no. 2, pp. 3582–3590, Jul. 2019, doi: 10.35940/ijrte.B3186.078219.
[13] J. Kommineni, S. Mandala, M. S. Sunar, and P. M. Chakravarthy, “Advances in computer–human interaction for detecting facial expression using dual tree multi band wavelet transform and Gaussian mixture model,” Neural Comput Appl, vol. 34, no. 18, pp. 15397–15408, Sep. 2022, doi: 10.1007/s00521-020-05037-9.
[14] T. V, Vellore Institute of Technology, Institute of Electrical and Electronics Engineers. Madras Section, IEEE Communications Society., and Institute of Electrical and Electronics Engineers, Conference proceedings, International Conference on Vision Towards Emerging Trends In Communication and Networking (ViTECoN 2019)?: 30-31, March 2019, Vellore, Tamilnadu, India. 2019.
[15] J. Kommineni, S. Mandala, M. S. Sunar, and P. M. Chakravarthy, “Accurate computing of facial expression recognition using a hybrid feature extraction technique,” Journal of Supercomputing, vol. 77, no. 5, pp. 5019–5044, May 2021, doi: 10.1007/s11227-020-03468-8.
[16] Z. Balogh, M. Magdin, and G. Molnár, “Motion Detection and Face Recognition using Raspberry Pi, as a Part of, the Internet of Things,” 2019.
[17] W. Mellouk and W. Handouzi, “Facial emotion recognition using deep learning: Review and insights,” in Procedia Computer Science, Elsevier B.V., 2020, pp. 689–694. doi: 10.1016/j.procs.2020.07.101.
[18] G. Katare, G. Padihar, and Z. Qureshi, “Challenges in the Integration of Artificial Intelligence and Internet of Things 11,” Indore, Dec. 2018.
[19] M. Awais et al., “Real-time surveillance through face recognition using HOG and feedforward neural networks,” IEEE Access, vol. 7, pp. 121236–121244, 2019, doi: 10.1109/ACCESS.2019.2937810.
[20] L. Li, H. Ge, Y. Tong, and Y. Zhang, “Face Recognition Using Gabor-Based Feature Extraction and Feature Space Transformation Fusion Method for Single Image per Person Problem,” Neural Process Lett, vol. 47, no. 3, pp. 1197–1217, Jun. 2018, doi: 10.1007/s11063-017-9693-4.
[21] M. Henderson, S. Shakya, S. Pradhan, and T. Cook, “Quanvolutional neural networks: powering image recognition with quantum circuits,” Quantum Mach Intell, vol. 2, no. 1, Jun. 2020, doi: 10.1007/s42484-020-00012-y.
Downloads
Published
How to Cite
Issue
Section
License
Manuscript submitted to IJoICT has to be an original work of the author(s), contains no element of plagiarism, and has never been published or is not being considered for publication in other journals. Author(s) shall agree to assign all copyright of published article to IJoICT. Requests related to future re-use and re-publication of major or substantial parts of the article must be consulted with the editors of IJoICT.