IOT based Bank Locker Security System with FaceRecognition
IOT based Bank Locker Security System with FaceRecognition
Abstract—This project will be focused on effective recognizing and controlling system for Bank
locker room which is fully self- determining. In cases of robberies, it commonly happens that
the banned entrance in locker room area which can be detected by our security system. If the
robbery take place the banks are not capable to recognize the robber due to absence of the
proof by using the current human security operated system. The system will be designed in
effective way by recognizing and controlling the illegal person to access the locker for the safety
of bank locker room. In this, we proposed a three-phase conformation of procedure for smart
locker using some registered pattern knocks, camera and SMS which check out the user. As we
compare to any other previous approaches our system uses the web App which send an OTP to
user’s mobile which has to be opened using android app which highlights the smart security.
The designed system is highly proficient and consistent because of three security stages and not
capable to break the combination of this, three stages.
I. INTRODUCTION
Security systems plays a very important role in today’s modernized industrialized era. Throughout our life, the
hard- earned assets and valuables things are expected to be safeguarded under certain security. It is basically
designed in order to avoid the risk of vulnerabilities to our valuable items. In this technological world, the
system includes biometrics along with digital code lock which response in the way for matching or mismatching
the code. Any mismatch to the series of authentication during verification is done raises an alert sound. To
overcome the security issues faced with the locker system now-a-days, the locker security system is proposed
using IoT (Internet of Things), face recognition and OTP (One Time Password).
For this we shall be using Raspberry Pi for capturing image, processing it and then sending it through message
and Internet to the user. The Raspberry Pi captures the image of a person who tries to access the bank locker and
then process it and sends it to the user’s as picture message. This can also be used in places such as personal
workplaces, office locations such asrecords, server, document storage places and any other places where security
is the major concern.so in order to a have highly secured locker so we are using this proposed method.
In this proposal, we have raspberry pi camera fit behind the locker if a person tries to access the locker he/she
needs to on the camera, knock the door with the registered knock pattern unit activating the complete circuit and
it will be sending the OTP to the authenticated user in the encrypted form which has to be opened in the android
to see it’s decrypted form.
The major issue of present locker systems in today’s world is security. Traditional locker system uses key based
Admin can add the details of the user only then the user can access the locker. As explained in the above we use
three stages of authentication as shown in the diagram. Once the admin adds the details of the user he has
permission to open the locker after the three stages.
The first stage is face recognition using raspberry Pi camera, the input image is compared with the database
image so that authentic person is being facilitated or allowed to access.
2447
When the face recognition is done, you will get the display message to knock the locker by using your knocking
pattern.
If the face recognition process and knocking pattern is successful, server generates the OTP using random
function and encrypts it using AES encryption.
we use SVM(support vector machine) algorithms for face recognition. It is a supervised machine learning
algorithm which can be used for both classification or regression challenges.
C. Knocking Pattern
When the face recognition is done, you will get the display message to knock the locker by using your knocking
pattern. Once Knocking pattern is done, the server will check the details in the database and conforms the user is
there or notand then if the user is present he/she will get an OTP to his/her registered phone number.
2448
D. OTP Generation
If the face recognition process is successful, server generates the OTP using random function and encrypts it
using AES encryption. The encrypted OTP is sent to the customer’s mobile number as a SMS. Once the
customer receives the encrypted OTP, opens the android app, and verifies himself by opening the correct
password. If verified, the app decrypt the received OTP and displays on the app.
We use AES(Advanced Encryption Standard) for encryption and decryption of generated OTP. It is a symmetric
block cipher chosen for encrypting texts which can be decrypted with the original encryption key.
The popular and widely adopted symmetric encryption algorithm is known as the Advanced Encryption
Standard (AES). It is found at least six time faster than the triple DES.
A replacement for a DES was needed as its key size was too small. With the increasing computing power, it was
considered vulnerable against exhaustive key search attack. Triple DES was designed to overcome this drawback
but it was found slow.
The features of AES are as follows −
Symmetric key symmetric block cipher
128-bit data, 128/192/256-bit keys
Stronger and faster than Triple-DES
Provide full specification and design details
Software implementable in C and Java
E. Operation of AES
AES is an iterative rather than a Feistel cipher. It is based on ‘substitution–permutation network’. It comprises
of a series of linked operations, some of which involves the replacing inputs by specific outputs (substitutions)
and others involves the shuffling bits around (permutations).
AES performs all its computations on bytes rather than the bits. Hence, AES treats 128 bits of a plaintext block
as 16 bytes. These 16 bytes are arranged in four columns and four rows for processing as a matrix −
DES, the number of rounds in AES is a variable and depends on the length of the key. AES uses the 10 rounds
for 128-bit keys, 12 rounds for the 192-bit keys and 14 rounds for 256- bit keys. Each of these rounds uses
different 128-bit round key, which is calculated from the original AES key.
The schematic the of AES structure is given in the following illustration –
F. Encryption Process
Here, we restrict to description of typical round of AES encryption. Each round comprises of four sub-processes.
2449
Thefirst round process is depicted below –
2450
Server varies the OTP and the corresponding locker box number and if successful send signal to the locker box.
Once locker box receives the signal, opens the door.
V. CONCLUSION
In this paper a design framework of Locker system is proposed. The locker system is installed with face
recognition, knocking patter and OTP service as security purpose. SVM is used to recognize the human face. The
technique of face recognition phase is performed accurately. Then OTP is generated and send to the owner by
means of SMS. The proposed system is more secured compared to the previous techniques where the user was
only able to access the locker either using OTP and knocking pattern. This method can also be used as the home
passage security framework with sensors and actuators.
In this proposal, we have raspberry pi camera fit behind the locker if a person tries to access the locker he/she
needs to on the camera, knock the door with the registered knock pattern unit activating the complete circuit and
it will be sending the SMS to the authenticated user in the encrypted form which has to be opened in the android
to see it’s decrypted form. Hence the robberies, thefts will be reduced by implementing this. It can be used in
homes, offices and also in workstations.
REFERENCES
[1] P. J. Phillips, H. Moon, S. A. Rizvi, and P. J. Rauss, ‘‘The FERET evaluation methodology for face-recognition
algorithms,’’ IEEE Trans. Pattern Anal. Machine Intell., vol. 22, no. 10, pp. 1090---1104, 2000.
[2] A. Pentland and T. Choudhury, ‘‘Face recognition for smart environments,’’ Computer, vol. 33, no. 2, pp. 50---55, 2000.
[3] J. Goldstein, L. D. Harmon, and A. B. Lesk, “Identification of Human Faces,” Proc. IEEE, May 1971, Vol. 59, No. 5,
748- 760.
[4] M. A. Turk and A.P. Pentland, Face recognition using eigenfaces, ‘‘Proceedings of the IEEE’’, 586-591, 1991.
[5] A. Johnston, H. Hill, and N.Carman, ‘‘Recognizing Faces: Effects of lighting Direction, Inversion and Brightness
Reversal,’’ Cognition, Vol.40, PP. 1-19, 1992.
[6] Matthew Turk and Alex Paul Pentland,1991. Eigenfaces for Recognition, Journal of Cognitive Neuroscience, vol.3,
no.1, pp.7186.
[7] Bhawna chouhan, shailja shukla." Iris Recognition System using canny edge detection for Biometric Identification",
Interrnational Journal of engineering Sciences and Technology (IJEST), ISSN: 0975-5462 Vol. 3 No. I Jan 2011.
[8] Wildes, R.P, ‘‘Iris Recognition: An Emerging Biometric Technology’’, Proceedings of the IEEE, VOL. 85, NO. 9,
September 1997, pp. 1348-1363.
[9] Himanshu Rai , Anamika Yadav, “Iris recognition using combined support vector machine and Hamming distance
approach”, Expert Systems with Applications Volume 41, Issue 2, 1 February 2014.
[10] J. Daugman, ‘‘Uncertainty relation for resolution in space, spatial frequency, and orientation optimized by two-
dimensional visual cortical filters,’’ J. Opt. Soc. Amer. A, vol. 2, no. 7, pp. 1160-1169, 1985.
[11] Li Ma; Tieniu Tan; Yunhong Wang; Dexin Zhang, "Personal identification based on iris texture analysis," Pattern
Analysis and Machine Intelligence, IEEE Transactions on, vol.25, no.12, pp.1519,1533, Dec. 2003 doi:
10.1109/TPAMI.2003.1251145.
[12] Junichi Hashimoto, “Finger Vein Authentication Technology and its Future, “2006 Symposium on VLSI Circuits Digest
of Technical Papers, 2006, pp. 5-8. [Jain, 04] Anil K. Jain, Arun Ross and SalilPrabhakar, “An Introduction to Biometric
Recognition”, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 14, No. 1, January 2004, pp. 4-
20.
2451
[13] Toshiyuki Tanaka, Naohiko Kubo, “Biometric Authentication by Hand Vein Patterns”, SICE Annual Conference,
Sapporo, August 46, 2004, pp. 249-253.
[14] Shi Zhao, Yiding Wang and Yunhong Wang, “Extracting Hand Vein Patterns from Low-Quality Images: A New
Biometric Technique Using Low-Cost Devices”, Fourth International Conference on Image and Graphics, 2007, pp.
667-671.
[15] Ding, Yuhang Ding, Dayan Zhuang and Kejun Wang, “A Study of Hand Vein Recognition Method”, The IEEE
International Conference on Mechatronics & Automation Niagara Falls, Canada, July 2005, pp. 2106-2110.
[16] Fujustu “Palm Vein Pattern Authentication Technology” White paper printed in the U.S.A. Qty. 3M WP10800306.
[17] Debnath Bhattacharyya, Poulami Das, Tai-hoon Kim, Samir Kumar Bandyopadhyay (2009). ‘Vascular Pattern Analysis
towards Pervasive Palm Vein Authentication’ Journal of Universal Computer Science, vol. 15.
[18] Mona A. Ahmed, Hala M. Ebied, El-Sayed M. El Horbaty, Abdel-Badeeh M. Salem (2013)‘Analysis of Palm Vein
Pattern Recognition Algorithms and Systems’ International Journal of BioMedical Informatics and e-Health Volume 1,
No.1.
[19] Yi-Bo Zhang, Qin Li, Jane You, and Prabir Bhattacharya (2007)’ Palm Vein Extraction and Matching for
PersonalAuthentication’ Springer-Verlag Berlin Heidelberg pp. 154– 164. 978-1-5090-6785-5/18/$31.00 © 2018 by
IEEE
[20] Xin Ma, Xiaojunjing, Hai Huang, Yuanhao Cui, “Palm Vein Recognition Scheme based on an adaptive gabor filter” IET
Biometrics Vol.6, Issue 5, PP. 325 – 333, 2017.
[21] A. Mallikarjuna, S. Madhavi, “Palm Vein Tech.
2452