Smart Home Security Using Facial Authentication
Smart home security enhances security by allowing only authenticated individuals to enter the home. The technology uses advanced algorithms to recognize faces, making them safer and easier to access. The main objective is to improve privacy and security by using facial recognition based on the LB...
| Main Authors: | Rakshitha, M.V., Chitra, K. |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
INTI International University
2024
|
| Subjects: | |
| Online Access: | http://eprints.intimal.edu.my/2092/ http://eprints.intimal.edu.my/2092/2/631 http://eprints.intimal.edu.my/2092/3/joit2024_42b.pdf |
Similar Items
Smart home security
by: Mohammad Syafi Azim, Mohd Razam
Published: (2019)
by: Mohammad Syafi Azim, Mohd Razam
Published: (2019)
Secure login authentication system
by: Chow, Wen Chai
Published: (2018)
by: Chow, Wen Chai
Published: (2018)
Modular smart home using WiFi technology
by: Yus Kamalrul, Mohamed Yunus
Published: (2019)
by: Yus Kamalrul, Mohamed Yunus
Published: (2019)
SmartEye - vehicle security system using facial recognition
by: Ritikos, Alfred
Published: (2007)
by: Ritikos, Alfred
Published: (2007)
Smart Home Simulation / Ahmad Jazzri Jamaludin
by: Ahmad Jazzri , Jamaludin
Published: (2003)
by: Ahmad Jazzri , Jamaludin
Published: (2003)
Smart Lighting System for Library Using IoT Technology
by: Chitra, Batumalai, et al.
Published: (2019)
by: Chitra, Batumalai, et al.
Published: (2019)
VAP Code: A Secure Graphical Password for Smart Devices
by: Azad, Saiful, et al.
Published: (2017)
by: Azad, Saiful, et al.
Published: (2017)
Securing password authentication using MD5 algorithm
by: Siti Nabilah , Mohammad Zain
Published: (2014)
by: Siti Nabilah , Mohammad Zain
Published: (2014)
An implementation of natural language user interface in smart home system / Ngoi Se Keng
by: Ngoi , Se Keng
Published: (2010)
by: Ngoi , Se Keng
Published: (2010)
Reducing Risks and Enhancing Security and Privacy in IoT-based Health Monitoring Application using Blockchain Technology
by: Chitra, Batumalai, et al.
Published: (2022)
by: Chitra, Batumalai, et al.
Published: (2022)
A secure authentication scheme using locimetric and press touch code techniques
by: Noor Elya Afiqah, Che Nordin
Published: (2019)
by: Noor Elya Afiqah, Che Nordin
Published: (2019)
A hybrid screen size independent authentication scheme for smart devices
by: Ahmad Faizuwan, Welhendri, et al.
Published: (2020)
by: Ahmad Faizuwan, Welhendri, et al.
Published: (2020)
A Study on Non-Fungible Tokens Marketplace for Secure Management
by: Rishabh, Singh, et al.
Published: (2024)
by: Rishabh, Singh, et al.
Published: (2024)
Facial recognition-based attendance monitoring system for educational institution
by: Tan, Shu Jing
Published: (2018)
by: Tan, Shu Jing
Published: (2018)
Authentication Model Based on Reformation Mapping Method
by: Safdar, S., et al.
Published: (2010)
by: Safdar, S., et al.
Published: (2010)
A secure HEVC video watermarking scheme for authentication and copyright purposes
by: Elrowayati, Ali Abdulhafid
Published: (2020)
by: Elrowayati, Ali Abdulhafid
Published: (2020)
Dynamic reciprocal authentication protocol for mobile cloud computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
Android based smart security systems using internet of things (IoT) and firebase
by: Harvent Rau, Mogana Ravu
Published: (2019)
by: Harvent Rau, Mogana Ravu
Published: (2019)
Virtual On-Premise Shopping System with Face Recognition Authentication
by: Yap, Choi Sen, et al.
Published: (2022)
by: Yap, Choi Sen, et al.
Published: (2022)
An efficient IoT-based smart water meter system of smart city environment
by: Al-Madhrahi, R., et al.
Published: (2021)
by: Al-Madhrahi, R., et al.
Published: (2021)
SMART (Smart mathematic with augmented reality technology) application for preschool
by: Kartika Idayu, Tajul Arifin
Published: (2019)
by: Kartika Idayu, Tajul Arifin
Published: (2019)
Face Recognition For Home Security System Using Hybrid Fisher Linear Discriminant Algorithm
by: Zhi, Chua Min Zhi
Published: (2009)
by: Zhi, Chua Min Zhi
Published: (2009)
Stegano-image as a digital signature to improve security authentication system in mobile computing
by: Mantoro, Teddy, et al.
Published: (2016)
by: Mantoro, Teddy, et al.
Published: (2016)
A new fast local laplacian completed local ternary count (FLL-CLTC) for facial image classification
by: Alalayah, Khaled M., et al.
Published: (2020)
by: Alalayah, Khaled M., et al.
Published: (2020)
Recognize Hate Speech On Twitter Using Machine Learning
by: Yashaswini, Kini, et al.
Published: (2024)
by: Yashaswini, Kini, et al.
Published: (2024)
Control home automation with voice command using Arduino
by: Nur Atikah, Muhamad Ayob
Published: (2018)
by: Nur Atikah, Muhamad Ayob
Published: (2018)
Smart home microcontroller: Telephone interfacing
by: Leong, , CS, et al.
Published: (2006)
by: Leong, , CS, et al.
Published: (2006)
Enhancing user authentication for cloud web-based application / Detar Beqo
by: Detar , Beqo
Published: (2018)
by: Detar , Beqo
Published: (2018)
Home Fitness Mobile Application
by: Koh, Qing Zhe
Published: (2022)
by: Koh, Qing Zhe
Published: (2022)
VR Smart Science Maze
by: Mohammad Amirul Shah, Mohamad Nasir
Published: (2023)
by: Mohammad Amirul Shah, Mohamad Nasir
Published: (2023)
Smart garbage monitoring system
by: Amalia Witra, Jailani
Published: (2019)
by: Amalia Witra, Jailani
Published: (2019)
Facial Recognition Using Convolutional Neural Network Using Real-Time
Data
by: Bharath, Kumara J, et al.
Published: (2024)
by: Bharath, Kumara J, et al.
Published: (2024)
Secure Cloud Storage with a Sanitizable Access Control System Again Malicious Data Publisher
by: Alfiya Khanum, R.M., et al.
Published: (2024)
by: Alfiya Khanum, R.M., et al.
Published: (2024)
In-building facial recognition check-in system
by: Yong, Li Jonn
Published: (2023)
by: Yong, Li Jonn
Published: (2023)
Secured email using steganography / Syaiful Annuar Omar
by: Syaiful Annuar, Omar
Published: (2005)
by: Syaiful Annuar, Omar
Published: (2005)
A Novel Protocol For Enhancing The Security Of Electronic Transaction Using Gsm Authentication
by: Abu Bakar, Kamalrulnizam, et al.
Published: (2006)
by: Abu Bakar, Kamalrulnizam, et al.
Published: (2006)
Monitoring Unusual Activity Using Remote-Controlled Computer and Android Based Application
by: Chitra, Batumalai, et al.
Published: (2019)
by: Chitra, Batumalai, et al.
Published: (2019)
Fingerprint Authentication System using a low-priced Webcam
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
Internet Of Things (Iot) In Smart Recycle Bin Application Using AI Technology
by: Liong, Woei Chi
Published: (2023)
by: Liong, Woei Chi
Published: (2023)
Healthy Smart Baking Recipes Mobile Application
by: Tan, Yi Tiang
Published: (2023)
by: Tan, Yi Tiang
Published: (2023)
Similar Items
-
Smart home security
by: Mohammad Syafi Azim, Mohd Razam
Published: (2019) -
Secure login authentication system
by: Chow, Wen Chai
Published: (2018) -
Modular smart home using WiFi technology
by: Yus Kamalrul, Mohamed Yunus
Published: (2019) -
SmartEye - vehicle security system using facial recognition
by: Ritikos, Alfred
Published: (2007) -
Smart Home Simulation / Ahmad Jazzri Jamaludin
by: Ahmad Jazzri , Jamaludin
Published: (2003)