Journal article Open Access
E. Ramkumar; T. Guna; S.M. Dharshan; V.S. Ashok Ramanan
Facial recognition has become one of the recent trends in attracting abundant attention within the society of social media network. The face is flat and therefore needs plenty of mathematical computations. Facial knowledge has become one in every of the foremost necessary biometric, we tend to witness it from the day-to-day gadgets like mobile phones. Every transportable electronic device currently being discharged includes a camera embedded in it. Network access management via face recognition not solely makes hackers just about not possible to steal one's "password", however conjointly will increase the user-friendliness in human-computer interaction. For the applications of videophone and conference, the help of face recognition conjointly provides an additional economical secret writing theme. Face detection technologies are employed in an oversized kind of applications like advertising, diversion, video secret writing, digital cameras, CCTV police investigation, and even in military use. Totally different algorithms are used for biometric authentication. The Kanade-Lucas-Tomasi rule makes use of abstraction common intensity transformation to direct the deep explore for the position that shows the simplest match. Another common face detection rule is that the Viola-Jones rule that's the foremost wide used face detection rule. It's employed in most digital cameras and mobile phones to notice faces. It uses cascades to notice edges just like the nose, the ears, etc. Hence, during this paper, we've got planned the Viola-Jones rule because the best one supported our application. The rule is employed within the biometric authentication of individuals and also the pictures are kept during processing. The kept information is employed for recognizing the faces and if the information matches, an impression signal is given to the controller. The MATLAB software is employed to relinquish control signals to the motor, which is employed for gap and shutting the door. The input image is fed by a digital camera and also the image is processed within MATLAB. The output is given to the external controller interfaced with MATLAB. The image process field has several sub-fields, biometric authentication is one in each of them because it gains additional quality for security functions these days. The planned system can be employed in residential buildings, malls, and industrial sectors. Thus, this technique is helpful for homemakers to be safer in their homes.