Smart Doorbell Security System Using IoT

Authors

  • Udit Chaudhari  AISSMS's Institute of Information Technology, Pune, Maharashtra, India
  • Nishigandha Chavan  AISSMS's Institute of Information Technology, Pune, Maharashtra, India
  • Sushmita Gilbile  AISSMS's Institute of Information Technology, Pune, Maharashtra, India
  • Gayatri Bhosale  AISSMS's Institute of Information Technology, Pune, Maharashtra, India
  • Prashant Wakhare  Assistant Professor, AISSMS's Institute of Information Technology, Pune, Maharashtra, India

DOI:

https://doi.org//10.32628/IJSRST2182111

Keywords:

Terms-Face Detection, Home Security, Voice Recogni- Tion, Fingerprint.

Abstract

Security has always been an important issue in the home or office. A remote home security system offers many more benefits apart from keeping home owners, and their property, safe from intruders. The system is composed of the Doorbell interfaced with Raspberry pi, whoever press the doorbell, the camera gets triggered and capture their face and it checking for their face with its database which already has registered faces, if it is an authorized person door will open, otherwise it sends an OTP with their photograph of the intruder to server mail. Only when non authorized person entered that OTP, that face gets added to the authorized person’s database to open the door. Smart doorbells allow home owners to receive alerts when a visitor is at the door, see who the guest is, and communicate with the visitor from a smart device. They greatly improve people’s life quality and contribute to the evolution of smart homes.

References

  1. Alvarez et al., “The AXIOM software layers,” ELSEVIER Micropro- cessors and Microsys., vol. 47, Part B, pp. 262–277, 2016.
  2. R. Giorgi, “Exploring dataflow-based thread level parallelism in cyber- physical systems,” in Proc. ACM Int.l Conf. on Computing Frontiers, ser. CF ’16. New York, NY, USA: ACM, 2016, pp. 295–300.Rizzo, F. Montefoschi, M. Caporal, A. Gisondi, G. Burresi, and R. Giorgi, “Rapid prototyping iot solutions based on machine learning,” in Proceedings of the European Conference on Cognitive Ergonomics 2017, ser. ECCE 2017. New York, NY, USA: ACM, 2017, pp. 184–187.
  3. R. Giorgi, F. Khalili, and M. Procaccini, “Axiom: A scalable, efficient and reconfigurable embedded platform,” in IEEE Proceedings of Design, Automation and Test in Europe (DATE), Florence, Italy, mar 2019, pp. 1–6
  4. R.L. Hyoung, H.L. Chi, “Development of an IOT based visitor detection system,” IEEE Trans. 2016.
  5. S.N. Jyothi, V. Vijaya, “Design and Implementation of real Time security Surveillance system using IOT,” IEEE Trans. 2016.
  6. Alessandro Sforzin, Mouryo Conti, Felix Gomez Marmol and Jens Matthaias Bohli, International IEEE conferences on Ubiquities Intel- ligence and Computing, Advanced and trusted computing, Internet of people, and smart world congress, IEEE 2016.
  7. M. Virginia, P. Vamsrikrishna, “Surveillance and monitoring System using Raspberry-Pi and simple CV”, IEEE 2016.
  8. Chao-Huang Wei and Shin-An Chen. “Video Door Phone Surveillance System Using power line Communication Channel”, International Jour- nal of Computer and Electrical Engineering, Vol. 5, No. 4, August 2013.
  9. B.P. Priya, M.C. Viraj, “Smart Motion Detection System using Raspberry-PI,” International Journal of Applied Information System (IJAIS) 2016; 10:37-40
  10. C.Y. Jie, L.L. Chin, “An Automated Door control system based on a smart camera,” Sensors 2013; 13:5923-5936.
  11. R.L. Hyoung, H.L. Chi, “Development of an IOT based visitor detection system,” IEEE Trans. 2016. S.N. Jyothi, V. Vijaya, “Design and Imple- mentation of real Time security Surveillance system using IOT,” IEEE Trans. 2016.

Downloads

Published

2021-04-30

Issue

Section

Research Articles

How to Cite

[1]
Udit Chaudhari, Nishigandha Chavan, Sushmita Gilbile, Gayatri Bhosale, Prashant Wakhare, " Smart Doorbell Security System Using IoT, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 4, Issue 10, pp.421-428, September-October-2018. Available at doi : https://doi.org/10.32628/IJSRST2182111