View Article

  • A Low-Cost, Real-Time Home Security System with Robust Facial Recognition and IoT Alerting

  • Sardar Beant Singh State University

Abstract

The rapid adoption of smart residential technologies has increased the demand for affordable, intelligent security solutions. Conventional monitoring systems, often reliant on passive infrared (PIR) sensors or standard CCTV, suffer from high false-alarm rates and require constant human supervision. This paper presents a cost-effective, real-time home security system that integrates facial recognition with edge computing to address these limitations. During a localized training phase, the system generates high-dimensional facial embedding’s of authorized users under varying poses and lighting conditions. A distance-based similarity metric enables real-time differentiation between enrolled residents and unauthorized intruders. When an anomaly is detected, an IoT-enabled notification system dispatches time-stamped visual alerts via email. Experimental evaluations demonstrate that the system achieves high accuracy and sub-second latency, even under challenging conditions such as partial occlusion and low-light environments. This study highlights the feasibility of localized, low-cost computer vision for widespread residential adoption.

Keywords

Home Security; Facial Recognition; Real-Time Surveillance; IoT; Edge Computing; Computer Vision

Introduction

As digital ecosystems become integral to modern living, residential security remains a critical concern. Traditional security solutions—ranging from motion detectors to cloud-based CCTV—often struggle with environmental noise, where pets or shifting shadows trigger false alarms. Additionally, cloud-dependent systems introduce latency and raise privacy concerns over the storage of sensitive biometric data.

Advances in Artificial Intelligence (AI) and Computer Vision (CV) offer more precise surveillance options. Facial recognition enables autonomous differentiation between residents and intruders. However, current solutions are often either expensive proprietary systems or high-latency cloud-based services. This study addresses this gap by proposing a robust, local-first security system optimized for low-cost hardware. The primary contributions are:

  1. An optimized facial recognition pipeline designed for edge computing.
  2. Comprehensive evaluation of recognition accuracy under diverse environmental conditions.
  3. Demonstration that high-level security performance is achievable without premium hardware.

RELATED WORK

Facial recognition has evolved from high-security government applications to consumer-grade IoT systems. Early research by Huang et al. (2010) demonstrated its superiority over basic motion detection in wireless networks. Many modern systems rely on cloud processing, but Zhao et al. (2019) highlighted the trade-offs between computational overhead and real-time performance.

Recent studies (Pang, 2022; Gentile et al., 2022) emphasize the ethical and privacy risks associated with biometric data. By employing edge computing—processing data locally on the device—this research aligns with the "Privacy by Design" paradigm, providing a secure alternative to cloud-reliant systems while maintaining environmental robustness.

METHODOLOGY

1. Biometric Enrollment

During enrollment, the system captures a multi-angle dataset of authorized users. Images are converted to grayscale and normalized using histogram equalization. Facial features are then mapped to a 128-dimensional vector space (embedding), where the Euclidean distance between vectors indicates identity similarity.

2. Real-Time Monitoring and Inference

The live video feed is processed through a multi-stage pipeline:

  • Detection: Identifies facial regions within each frame.
  • Alignment: Adjusts faces to a canonical pose.
  • Recognition: Compares the live embedding to the authorized database using a distance threshold ($d \le \tau$).

3. IoT Notification Layer

If an unrecognized face persists beyond a temporal threshold, the system triggers an alert. A high-resolution snapshot is captured, timestamped, and sent via an encrypted email protocol.

4. System Architecture

The system follows a four-phase modular approach:

Phase 1: Data Acquisition and Pre-processing

  • Collection: Images of authorized residents are stored in a local "Trusted Database."
  • Encoding: Facial landmarks are extracted using the dlib-based Face Recognition library, producing 128-dimensional encodings for efficient comparison.

Phase 2: Real-Time Detection and Recognition

  • Video Capture: Frames are captured at 30 FPS using OpenCV.
  • Face Localization: HOG (Histogram of Oriented Gradients) detects faces.
  • Feature Matching: Live encodings are compared to the trusted database using a Euclidean distance threshold (typically 0.6).

Phase 3: Automated Decision Logic

  • Authorized Entry: Recognized users trigger a greeting and maintain a "Disarmed" state.
  • Unauthorized Entry: Unrecognized faces trigger an "Intruder Detected" status.

Phase 4: Integrated Response Mechanism

Upon detecting an unauthorized individual, the system executes three actions:

  1. Visual Evidence: Captures a high-resolution snapshot with timestamp.
  2. Notification: Sends an urgent email alert with the image attached via SMTP.
  3. Physical Intervention: Activates a simulated "Lock Down" state; in hardware implementations, a GPIO-controlled relay can lock doors using a 12V solenoid bolt.

Figure 1. Architecture of the proposed low-cost, real-time home security system integrating facial recognition and IoT alerting.

Reference

  1. Gentile, M., et al. (2022). The ethics of facial recognition technologies, surveillance, and accountability in an age of artificial intelligence: A comparative analysis of US, EU, and UK regulatory frameworks. Journal of Business Ethics, 1-22 https://doi.org/10.1007/s10551-021-04903-w
  2. Huang, Y., et al. (2010). Face recognition systems: A survey. Sensors (Basel, Switzerland), 10(1), 1-15.
  3. Pang, J. (2022). Facial recognition and personal autonomy: Ethical dilemmas of surveillance in the AI age. Frontiers in Big Data, 5, 874. https://doi.org/10.3389/fdata.2022.999638
  4. Zhao, W., Chellappa, R., Phillips, P. J., & Rosenfeld, A. (2003). Face recognition: A literature survey. ACM Computing Surveys (CSUR), 35(4), 399-458.
  5. Zhao, J., et al. (2019). A survey on techniques to handle face recognition challenges: Occlusion, single sample per subject and expression. Artificial Intelligence Review, 52(14). https://doi.org/10.1007/s10462-017-9544-y

Photo
Gurpreet kaur
Corresponding author

assistant professor ,cse department,sardar beant singh state university

Gurpreet Kaur, A Low-Cost, Real-Time Home Security System with Robust Facial Recognition and IoT Alerting, Int. J. Sci. R. Tech., 2026, 3 (4), 148-151. https://doi.org/10.5281/zenodo.19398178

More related articles
A Comprehensive Review on Herbal Sunscreen Lotions...
Mrunali Patil, Krunal Sabale, Sahil Prajapati, Prathamesh Salunkh...
A Comprehensive Review on Oral Disintegrating Tabl...
Bhagyashri Randhawan, Shruti Deshpande, Gayatri Gadve, Shubhangi ...
Quality by Design in HPTLC: A Review of Method Dev...
L. P. Jain, M. S. Charde, S. J. Momin, S. V. Potdar, N. D. Kulkar...
Related Articles
Formulation And Evaluation of Ayurvedic Shampoo Tablet by Using Herbal Ingredien...
Durgesh S. Pagar, Nishigandha A. Tapkire, Nikita S. Jadhav, Varsha N. Kamble, Bhairavi B. Raut, ...
Effect of Entrepreneurship Education on Entrepreneurial Motivation Among Student...
Danlami Dauda, Nuradeen Abdullahi Yusuf, Saudat Bello Adamu, ...
A Comprehensive Review on Herbal Sunscreen Lotions: Formulation Approaches, Eval...
Mrunali Patil, Krunal Sabale, Sahil Prajapati, Prathamesh Salunkhe, Shital Jadhav, Dr. Bhagyesh U Ja...
More related articles
A Comprehensive Review on Herbal Sunscreen Lotions: Formulation Approaches, Eval...
Mrunali Patil, Krunal Sabale, Sahil Prajapati, Prathamesh Salunkhe, Shital Jadhav, Dr. Bhagyesh U Ja...
A Comprehensive Review on Oral Disintegrating Tablets...
Bhagyashri Randhawan, Shruti Deshpande, Gayatri Gadve, Shubhangi Shete, Monika Waghmode, ...
Quality by Design in HPTLC: A Review of Method Development Approaches...
L. P. Jain, M. S. Charde, S. J. Momin, S. V. Potdar, N. D. Kulkarni, ...
A Comprehensive Review on Herbal Sunscreen Lotions: Formulation Approaches, Eval...
Mrunali Patil, Krunal Sabale, Sahil Prajapati, Prathamesh Salunkhe, Shital Jadhav, Dr. Bhagyesh U Ja...
A Comprehensive Review on Oral Disintegrating Tablets...
Bhagyashri Randhawan, Shruti Deshpande, Gayatri Gadve, Shubhangi Shete, Monika Waghmode, ...
Quality by Design in HPTLC: A Review of Method Development Approaches...
L. P. Jain, M. S. Charde, S. J. Momin, S. V. Potdar, N. D. Kulkarni, ...