INTERNET OF THINGS PROVEN SECURITY MECHANISM USING PERSON IDENTIFICATION

Welcome to DSpace BU Repository

Welcome to the Bahria University DSpace digital repository. DSpace is a digital service that collects, preserves, and distributes digital material. Repositories are important tools for preserving an organization's legacy; they facilitate digital preservation and scholarly communication.

Show simple item record

dc.contributor.author Saleem, Muhammad Zeeshan Reg # 41228
dc.contributor.author Aamir, Sarosh Reg # 41232
dc.contributor.author Shahid, Faraz Reg # 41213
dc.contributor.author Munawar, Hafsa Reg # 41214
dc.contributor.author Maaz, Muhammad Reg # 41225
dc.date.accessioned 2019-08-08T05:02:53Z
dc.date.available 2019-08-08T05:02:53Z
dc.date.issued 2019
dc.identifier.uri http://hdl.handle.net/123456789/8905
dc.description Supervised by Dr. Ghulam Muhammad Shaikh en_US
dc.description.abstract The project’s objective is to develop a theft detection system based recognition. The system would detect faces though a camera, process the faces and decide whether the face belongs to an authorized entity or not. If the person i authorized to enter the room/area, the system would send an SMS to the authorized on facial is not person through GSM module, and the authorized person would be able to surveillance the area using an Android application in real time though internet an internet connection. Different techniques that are used for recognition of faces are explored in this report. All of the different stages that are involved in the entire image processing stage will be studied and discussed. Finally the algorithm coded implemented in the Raspberry Pie module. in python The report discusses the methods used for the completion of the project and the flow of the system. The report goes into detail about various stages in image processing about what methodology is used for facial detection, and then recognition. The report discusses how Har Cascade Classifiers are used for facial detection and LBPH for recognition with details of their working. And how SMS are sent using AT commands in python and how all the different applications are created for surveillance. The report focuses on details on how the different modules brought together and integrated are for the completion of the project. en_US
dc.language.iso en_US en_US
dc.publisher Bahria University Karachi Campus en_US
dc.relation.ispartofseries BS (IT);MFN 09
dc.title INTERNET OF THINGS PROVEN SECURITY MECHANISM USING PERSON IDENTIFICATION en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account