Journal article Open Access

Implementing Facial Recognition by Interfacing MATLAB Along with Arduino

E. Ramkumar; T. Guna; S.M. Dharshan; V.S. Ashok Ramanan

MARC21 XML Export

<?xml version='1.0' encoding='UTF-8'?>
<record xmlns="">
  <datafield tag="041" ind1=" " ind2=" ">
    <subfield code="a">eng</subfield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">Mobile phones, biometric authentication, monitoring, biometrics, controller, MATLAB, homemakers.</subfield>
  <controlfield tag="005">20220110134851.0</controlfield>
  <controlfield tag="001">5833113</controlfield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Electronics and Communication Engineering Department, Sri  Ramakrishna Institute of Technology, India</subfield>
    <subfield code="a">T. Guna</subfield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Mechanical Engineering Department, Sri Ramakrishna  Institute of Technology, India</subfield>
    <subfield code="a">S.M. Dharshan</subfield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Mechanical Engineering Department, Sri Ramakrishna  Institute of Technology, India</subfield>
    <subfield code="a">V.S. Ashok Ramanan</subfield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Publisher</subfield>
    <subfield code="4">spn</subfield>
    <subfield code="a">Blue Eyes Intelligence Engineering and Sciences Publication(BEIESP)</subfield>
  <datafield tag="856" ind1="4" ind2=" ">
    <subfield code="s">590513</subfield>
    <subfield code="z">md5:c8a152844bd5fea3495f394d0201451c</subfield>
    <subfield code="u"></subfield>
  <datafield tag="542" ind1=" " ind2=" ">
    <subfield code="l">open</subfield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="c">2021-02-28</subfield>
  <datafield tag="909" ind1="C" ind2="O">
    <subfield code="p">openaire</subfield>
    <subfield code="o"></subfield>
  <datafield tag="909" ind1="C" ind2="4">
    <subfield code="c">66-71</subfield>
    <subfield code="n">4</subfield>
    <subfield code="p">International Journal of Innovative Technology and Exploring Engineering (IJITEE)</subfield>
    <subfield code="v">10</subfield>
  <datafield tag="100" ind1=" " ind2=" ">
    <subfield code="u">Electrical and Electronics Engineering Department, Sri  Ramakrishna Institute of Technology, India</subfield>
    <subfield code="a">E. Ramkumar</subfield>
  <datafield tag="245" ind1=" " ind2=" ">
    <subfield code="a">Implementing Facial Recognition by Interfacing  MATLAB Along with Arduino</subfield>
  <datafield tag="540" ind1=" " ind2=" ">
    <subfield code="u"></subfield>
    <subfield code="a">Creative Commons Attribution 4.0 International</subfield>
  <datafield tag="650" ind1="1" ind2="7">
    <subfield code="a">cc-by</subfield>
    <subfield code="2"></subfield>
  <datafield tag="650" ind1="1" ind2=" ">
    <subfield code="a">ISSN</subfield>
    <subfield code="0">(issn)2278-3075</subfield>
  <datafield tag="650" ind1="1" ind2=" ">
    <subfield code="a">Retrieval Number</subfield>
    <subfield code="0">(handle)100.1/ijitee.D84780210421</subfield>
  <datafield tag="520" ind1=" " ind2=" ">
    <subfield code="a">&lt;p&gt;Facial recognition has become one of the recent trends in attracting abundant attention within the society of social media network. The face is flat and therefore needs plenty of mathematical computations. Facial knowledge has become one in every of the foremost necessary biometric, we tend to witness it from the day-to-day gadgets like mobile phones. Every transportable electronic device currently being discharged includes a camera embedded in it. Network access management via face recognition not solely makes hackers just about not possible to steal one&amp;#39;s &amp;quot;password&amp;quot;, however conjointly will increase the user-friendliness in human-computer interaction. For the applications of videophone and conference, the help of face recognition conjointly provides an additional economical secret writing theme. Face detection technologies are employed in an oversized kind of applications like advertising, diversion, video secret writing, digital cameras, CCTV police investigation, and even in military use. Totally different algorithms are used for biometric authentication. The Kanade-Lucas-Tomasi rule makes use of abstraction common intensity transformation to direct the deep explore for the position that shows the simplest match. Another common face detection rule is that the Viola-Jones rule that&amp;#39;s the foremost wide used face detection rule. It&amp;#39;s employed in most digital cameras and mobile phones to notice faces. It uses cascades to notice edges just like the nose, the ears, etc. Hence, during this paper, we&amp;#39;ve got planned the Viola-Jones rule because the best one supported our application. The rule is employed within the biometric authentication of individuals and also the pictures are kept during processing. The kept information is employed for recognizing the faces and if the information matches, an impression signal is given to the controller. The MATLAB software is employed to relinquish control signals to the motor, which is employed for gap and shutting the door. The input image is fed by a digital camera and also the image is processed within MATLAB. The output is given to the external controller interfaced with MATLAB. The image process field has several sub-fields, biometric authentication is one in each of them because it gains additional quality for security functions these days. The planned system can be employed in residential buildings, malls, and industrial sectors. Thus, this technique is helpful for homemakers to be safer in their homes.&lt;/p&gt;</subfield>
  <datafield tag="773" ind1=" " ind2=" ">
    <subfield code="n">issn</subfield>
    <subfield code="i">isCitedBy</subfield>
    <subfield code="a">2278-3075</subfield>
  <datafield tag="024" ind1=" " ind2=" ">
    <subfield code="a">10.35940/ijitee.D8478.0210421</subfield>
    <subfield code="2">doi</subfield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">publication</subfield>
    <subfield code="b">article</subfield>
Views 46
Downloads 25
Data volume 14.8 MB
Unique views 39
Unique downloads 25


Cite as