2021
DOI: 10.3233/jifs-189624
|View full text |Cite
|
Sign up to set email alerts
|

Face recognition in an intelligent door lock with ResNet model based on deep learning

Abstract: Internet of Things is considerably increasing the levels of convenience at homes. The smart door lock is an entry product for smart homes. This work used Raspberry Pi, because of its low cost, as the main control board to apply face recognition technology to a door lock. The installation of the control sensing module with the GPIO expansion function of Raspberry Pi also improved the antitheft mechanism of the door lock. For ease of use, a mobile application (hereafter, app) was developed for users to upload th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 1 publication
0
4
0
Order By: Relevance
“…This paper proposes a dynamic security authentication protocol based on the above extracted staff biometric information data, which is bound to the staff identity ID. In this security protocol, the authentication key [10] is established in the form of symmetric polynomial by assigning and managing the key and updating it dynamically. And the generated results are stored in different heterogeneous identification information databases, and the mapping of identification information between the two databases is matched to ensure that the key can effectively protect the transmission path between the staff and the device, and the specific parameters of the entire security protocol are described in Table 1.…”
Section: Power System Operation and Maintenance Scenario Security Aut...mentioning
confidence: 99%
“…This paper proposes a dynamic security authentication protocol based on the above extracted staff biometric information data, which is bound to the staff identity ID. In this security protocol, the authentication key [10] is established in the form of symmetric polynomial by assigning and managing the key and updating it dynamically. And the generated results are stored in different heterogeneous identification information databases, and the mapping of identification information between the two databases is matched to ensure that the key can effectively protect the transmission path between the staff and the device, and the specific parameters of the entire security protocol are described in Table 1.…”
Section: Power System Operation and Maintenance Scenario Security Aut...mentioning
confidence: 99%
“…The system performs real-time face recognition and quickly detects when a face is in front of a camera. The face recognition system was developed based on machine learning, with a Haar graphics recognition program built into OpenCV in [ 10 ]. Also, the system used deep learning methods such as VGG-16, VGG-19, and ResNet50.…”
Section: Introductionmentioning
confidence: 99%
“…The traditional way of returning books in university libraries is that the returner puts his valid borrowing certificate in the designated sensing area to identify his identity, returns the book, and takes it away [1][2]. The whole process of returning books in the library is cumbersome, and book returners often forget to carry valid borrowing certificates, which lead to the failure of book return and wastes the time and energy of book returners [3].…”
Section: Introductionmentioning
confidence: 99%