Proposal

Team: E2

Members: Sazedul Haque, Lauren Heng, Bernard Ko, Tasmia Sultana

Facial Recognition Engineering Proposal

From early security systems of intrusion alarms to today’s systems which can all be monitored, managed, and captured through a phone in your pocket. Axis Communication is a company that manufactures network cameras for physical security and video surveillance industries. Axis Communications’ facial recognition doors is a product that does a small range of scanning and can only do people within a specific height range. In addition to these defects, the person’s face must be face to face with the camera. Meanwhile, our technological innovation can scan people’s face at any angle. Our technology fixes the defects of Axis Communications’ facial recognition doors. Our technology can recognize people in a wider range and the height of the person is neglectable. Facial recognition technology is a growing innovation that can provide near perfect security in the market. In addition, facial recognition doors provide disabled people with an easier way to access their buildings. Americans should add a facial recognition security door to their houses because it not only guarantees optimum security but also convenient for those with disabilities.

History of Security Systems

For ages, people have cared for the safety of their family including themselves. This led to many people creating different ways to protect themselves and their possessions in their home. Many past innovators have inspired the idea of facial recognition to be used in home security. During 1964 and 1965, Bledsoe, along with Helen Chan and Charles Bisson, worked on using the computer to recognize human faces (de Leeuw, 2007) Bledsoe moved his work at Stanford with the help of Peter Hart. Facial recognition started to gain momentum in the tech world. Soon everyone started to invest in the innovation as they saw a safer and profitable future in it. Researchers in Germany and America worked with the US. Army Laboratory to create a facial recognition system.  “The software was sold as ZN-Face and used by customers such as Deutsche Bank and operators of airports and other busy locations. The software was “robust enough to make identifications from less-than-perfect face views.” (Adams, 1997) The most recent advancement to facial recognition was in 2006 with the performance of the latest face recognition algorithms. “High-resolution face images, 3-D face scans, and iris images were used in the tests. The results indicated that the new algorithms are 10 times more accurate than the face recognition algorithms of 2002 and 100 times more accurate than those of 1995.” (Williams, 2008) Some of the algorithms were able to outperform human participants in recognizing faces and could uniquely identify identical twins. We use these same algorithms for our innovation as well.

Facial Recognition is Convenient

People don’t like typing PINs into their door lock. People want a system that just recognizes them and authenticates them into their home and facial recognition door does that perfectly. Security is a balancing act between convenience and safety. The facial recognition door fulfills both convenience and safety. The facial recognition door is user-friendly for the disabled. It’s a huge hassle for the disabled to take out keys or open the door with a fingerprint or enter a PIN. The facial recognition is simple to look into the camera lens and have your door opened for you. The facial recognition door requires no physical interaction on behalf of the user. It is also accurate. The door comes with an App which convenient for the user. The door includes a fingerprint scanner and PINs for those who feel comfortable with it. The facial recognition doorway will 36 inches wide to accommodate a wheelchair.

Technical Description

180° Rotational Facial Recognition Scanner (RFRS) scan the person nearby. The person being scanned must in the system beforehand. RFRS also work as a camera for the user to observe using the app. The Emergency Ultimate Lock activates when intense pressure of damage or if the system is being hacked. Additional Security System includes anti-theft plate and wire system. The door also has the place to enter a PIN and Fingerprint Scanner for an additional option. The door is also water and bulletproof and is fully-sealed anti-flood.

App features:

  • Alert you of any unwanted intruders and other activities.
  • Lock and unlock the door.    
  • Observe for any activities through the camera.   
  • May choose to alert the police.                                                                                                                                                                             

Facial Recognition On Security

Facial recognition can heighten public security. In 2014, the Chicago police department made an arrest of a criminal with their facial recognition technology, NeoFace. The criminal, Pierre D. Martin had committed an armed robbery against a transit authority vehicle and because of his past actions of burglary and assault, the police department could match Martin’s face to his previous felony and arrest Martin for the crimes (“Facial Recognition Technology Helps Chicago Police”, 2014). This is a great way to use facial recognition technology to help public safety. Our facial recognition doors scan passersby and will ping nearby police departments on the criminal that was recognized near the door. With facial recognition doors, criminals on the loose can be prevented from further felonies. Lastly, it will decrease the likelihood of unsolved crimes because of uncaptured criminals.

The Functionality of Facial Recognition Doors

(Saravanan)

Facial recognition doors work relatively the same as any facial recognition featured technology. Facial recognition works similarly to the way humans can recognize people and their facial features but on a large algorithmic scale.

Facial recognition software is able to capture an image of your face and read the geometry of it. Key factors include the distance between your eyes and the distance from forehead to chin. The software identifies any facial landmarks that are key to distinguishing your face. In order to perform this function, facial recognition technology must practice reading and recognizing multiple examples, which is a very human-like function. After the software is able to distinguish your face, your face becomes a facial signature, that is, a mathematical formula. This gets compared to a database of known faces and gets matched to an image in a facial recognition system database (Symanovich).

Benefits of Facial Recognition Doors:

Despite the cost of these doors, there are many beneficial factors to consider:

  • Better Security: Once processed into the facial recognition system, the door will be able to disable a switch that prevents any unfamiliar faces from entering your home.
  • Convenient and frictionless: Facial recognition technology can be used passively without a user’s knowledge. We usually want things done in ways that are convenient for us.
  • Smarter Integration: Face recognition tools are generally easy to integrate with existing security infrastructures, saving time and cost on software development.
  • Automation: Automatic and accurate security eliminates the need for security checks.

Process of the Innovation

One of the newest security systems is the facial recognition system. A technology that is capable of identifying homeowners by their facial structure eliminating the use of a key to access your home. Home security has evolved a great deal with technological advances and public demand for enhancements.

Although, the facial recognition system is very well made it does come with a high price. The cost of a facial recognition system can be up to $7500 for a complete system that includes the biometric scanner, a specialized locking system, software integration, and installation. There are many different companies that specialize in facial recognition technology making it more accessible to home and business owners. With such high price comes with high efficiency in keeping your family, yourself, and your valuables safe. The system can be easily programmed in your home computer. Also, it fully automated which allows the convenience and the overall improvement in security level.

Cost

With a big idea for innovation comes a big price. To create a high-quality product you need the best minds to develop and build it to the customer’s satisfaction.

  1. Rotation Facial Recognition Scanner
  1. Module that projects scanner ($100)
  2. Module that reads the pattern ($50)
  3. Camera ($100)

2. Emergency Ultimate Lock

  1. Screws ($10)
  2. Knob ($15)
  3. Flip Guard ($20)

3. Interior Wire System

  1. Wires ($8)
  2. Connectors ($5)
  3. Resistors ($5)
  4. Wire Cutters ($15)

4. Fingerprint Scanner

  1. Optical Scanner ($70)

Time

The amount of time it will take to build the whole door will be 3 months. You will have to order the supplies and materials needed for the project. Find a space and team to build and assemble to facial recognition door. Finally, you will have a customer order one of your doors and then you will deliver and install it.

Materials

The facial recognition door will be using raw stainless steel to build the door. Utilizing stainless steel will allow longevity for the door and We will be using deadbolts and screws to put together the parts into one whole door. The door will be coated in a finishing paint that will make it weather proof. It will need the camera to detect and see who is outside the door. Other materials include wiring to help connect the fingerprint scanner to the camera. Another material is the ultimate lock for additional security to the door.

Labor and Power

The Axis Communication’s team is a tight-knit group that comprises of a mechanical, electrical and computer engineer. They all contribute to different parts of the project using their own expertise. There is a research team that worked alongside the engineers that provided them extensive details to the door. Details that will help them make decisions such as taking away or adding any new parts to better the innovation. Another part of the team is our communications sector. They help spread our product to our desired customers and answer any questions that need to be answered. Overall, the company does not just rely on engineers to make the facial recognition door. There are multiple people that make our innovation come to life.

Why Our Facial Recognition Product?

Our products fixes the defects of Axis Communications’ facial recognition security system. Our facial recognition products does not have a height limitation like Axis Communications’ product. There’s less delay in recognizing people compared to other products.  Like Apple and Galaxys’ phones, our products can recognize people regardless of having glasses, makeup or other accessories. There’s an alarm system which rings instantly when a problem occurs such as being hacked or lockpicked. Lastly, our product are cheaper than other conventional products.

Works Cited

Leeuw, K. D., & Bergstra, J. A. (2007). The History of information security: A comprehensive handbook. Amsterdam: Elsevier.

“Mugspot” Can Find A Face In The Crowd — Face-Recognition Software Prepares To Go To Work In The Streets. (1997, November 12). Retrieved from https://www.sciencedaily.com/releases/1997/11/971112070100.htm

Pontin, M. W., & Pontin, M. W. (2012, October 22). Better Face-Recognition Software. Retrieved from https://www.technologyreview.com/s/407976/better-face-recognition-software/

Facial Recognition Technology Helps Chicago PD. (june 2014). American City & County  Exclusive Insight, 0-4. Retrieved April 3, 2019, from ccny-proxy1.libr.ccny.cuny.edu/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=96539584&site=ehost-live.

Harris, T. (2002, September 24). How Fingerprint Scanners Work. Retrieved from https://computer.howstuffworks.com/fingerprint-scanner1.htm

StoneLock Pro – Product. (n.d.). Retrieved from https://www.stonelock.com/stonelockpro/

How does facial recognition work? (n.d.). Retrieved from https://us.norton.com/internetsecurity-iot-how-facial-recognition-software-works.html