Dual-Factor Indoor Identity Verification System Using Face Recognition and Height Detection with Raspberry Pi

International Journal of Electrical and Electronics Engineering |
© 2025 by SSRG - IJEEE Journal |
Volume 12 Issue 4 |
Year of Publication : 2025 |
Authors : Keeradit Saiapattalung, Sarawut Puttaraksa, Ittikorn Punnoy |
How to Cite?
Keeradit Saiapattalung, Sarawut Puttaraksa, Ittikorn Punnoy, "Dual-Factor Indoor Identity Verification System Using Face Recognition and Height Detection with Raspberry Pi," SSRG International Journal of Electrical and Electronics Engineering, vol. 12, no. 4, pp. 121-131, 2025. Crossref, https://doi.org/10.14445/23488379/IJEEE-V12I4P108
Abstract:
The purpose of this system was to verify identities and positions indoors by using image processing technology that detects a person’s facial characteristics and height to increase identity verification accuracy. Data on people registered to use the system were stored in the Firebase database connected to Raspberry Pi boards, where cameras were installed at various positions of the test area for real-time monitoring and detection. Six cameras were installed, with three cameras being installed on two levels with an area of 746 square meters per level. Cameras were installed 0.40 meters from the ceiling or 2.1 meters from the floor. The system’s main components consisted of Raspberry Pi4 boards, pocket WiFi, webcams, the Firebase database, and API linking data collection, detection, and warnings. Height was tested and determined by determining width compared to the reference size, and face testing was done using a 67-position model via processing with the MediaPipe library. System test results had a likeness of face verification from six cameras at a mean of 58.15-61.28%, while the mean height from measurements had a mean error of 0.14%-1.53%, which did not exceed 2% and was acceptable. In addition, the system was able to detect faces at a range of 0.5-4 meters when installed at heights of 1-2.5 meters, with the time of 8:30 am - 4:30 pm being the optimal time for facial recognition in the test area. Two-level identity verification was shown to be able to identify individuals effectively.
Keywords:
Real-time identity verification, Image processing, Face recognition, Height detection, Indoor tracking system.
References:
[1] Thaddeus L. Johnson et al., “police Facial Recognition Applications and Violent Crime Control in U.S. Cities,” Cities, vol. 155, pp. 1-14, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Mirror Foundation Reveals 2022 Data: 'Missing Children' Increase in 4 Years, more than Half Voluntarily Run Away from Home, Featured Online, 2023. [Online]. Available: https://www.khaosod.co.th/special-stories/news_7456882
[3] P. Karthika, J. Harriet Rathna Priya, and A.Rathinavel Pandian, “Indoor Location Tracking System Using RFID Technology,” International Journal of Engineering Research and Reviews, vol. 3, no. 1, pp. 73-80, 2015.
[Google Scholar] [Publisher Link]
[4] Marcin Uradzinski et al., “Advanced Indoor Positioning Using Zigbee Wireless Technology,” Wireless Personal Communications, vol. 97, no. 4, pp. 6509-6518, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Ahmet Ibrahim, and Dogan Ibrahim, “Real-Time Gps Based Outdoor Wifi Localization System with Map Display,” Advances in Engineering Software, vol. 41, no. 9, pp. 1080-1086, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[6] S. Sathiyamoorthy, “Industrial Application of Machine Vision,” International Journal of Research in Engineering and Technology, vol. 3, SI no. 7, pp. 678-682, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[7] P.M. Lerones et al., “Total Quality Control for Automotive Raw Foundry Brake Disks,” International Journal of Advanced Manufacturing and Technology, vol. 27, no. 3-4, pp. 359-371, 2005.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Aekkarat Suksukont et al., “Fruits Ripening Analysis System using Image Processing Technology,” Journal of Information Science and Technology, vol. 12, no. 1, pp. 61-66, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Mayur P. Raj, and Priya R. Swaminarayan, “Applications of Image Processing for Grading Agriculture products,” International Journal on Recent and Innovation Trends in Computing and Communication, vol. 3, no. 3, pp. 1194 -1201, 2015.
[Google Scholar] [Publisher Link]
[10] Mohammad Amin Kashiha et al., “Performance of an Image Analysis Processing System for Hen Tracking in an Environmental Preference Chamber,” Poultry Science, vol. 93, no. 10, pp. 2439-2448, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Nataliia Obukhova, Alexandr Motyko, and Alexandr Pozdeev, “Personalized Approach to Developing Image Processing and Analysis Methods for Medical Video Systems,” Procedia Computer Science, vol. 176, pp. 2030-2039, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Hagen Borstell, Jan Nonnen, and Elke Glistau, “Image Processing in Logistics - Considerations on the Role of Intelligence,” European Conference on Smart Objects, Systems and Technologies, Munich, Germany, 2019.
[Google Scholar] [Publisher Link]
[13] Guifeng Wu et al., “Mobile Robot Location Algorithm Based on Image Processing Technology,” EURASIP Journal on Image and Video Processing, vol. 107, pp. 1-8, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Mei Wang, and Weihong Deng, “Deep Face Recognition: A Survey,” Neurocomputing, vol. 429, pp. 215-244, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Florian Schroff, Dmitry Kalenichenko, and James Philbin, “A Unified Embedding for Face Recognition and Clustering,” Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 815-823, 2015.
Google Scholar] [Publisher Link]
[16] Nong Vee Adao, Boonchai Saesiu, and Suphachartchai Worarat, “Employee Timekeeping System Using Facial Recognition,” Journal of Technology Management Rajabhat Maha Sarakham University, vol. 8, no. 1, pp. 99-113, 2021.
[Publisher Link]
[17] Suwat Banlue, and Khanittha Inthasaeng Inthasaeng, “The Efficiency of a Class Attendance Monitoring System with Face Recognition by Using LBP Technique,” Journal of Roi Et Rajabhat University, vol. 14, no. 1, pp. 147-158, 2020.
[Publisher Link]
[18] Sikender Mohsienuddin Mohammad, “Facial Recognition Technology,” SSRN Electronic Journal, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Chidi Ukamaka Betrand et al., “Authentication System Using Biometric Data for Face Recognition,” International Journal of Sustainable Development Research, vol. 9, no. 4, pp. 68-78, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Muhammad Farhan Siddiqui et al., “Face Detection and Recognition System for Enhancing Security Measures using Artificial Intelligence System,” Indian Journal of Science and Technology, vol. 13, no. 9, pp. 1057-1064, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Anandhi R.J. et al., “Generative AI-Based Real-Time Face Aging Simulation for Biometric Systems,” E3S Web of Conferences, vol. 619, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Ida Mulyadi et al., “Intelligent Security System Based on Biometric Face Recognition,” Journal of Theoretical and Applied Information Technology, vol. 101, no. 17, pp. 6953-6956, 2023.
[Publisher Link]
[23] Kalpana Dhindegave et al., “Missing Person Identification using Machine Learning Algorithms,” International Journal for Research in Applied Science & Engineering Technology, vol. 10, no. 12, pp. 428-430, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Paola Barra et al., “Fast QuadTree-Based Pose Estimation for Security Applications Using Face Biometrics,” International Conference on Network and System Security, pp. 160-173, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Paola Barra et al., “Fast QuadTree-Based Pose Estimation for Security Applications Using Face Biometrics,” International Conference on Network and System Security, Hong Kong, China, pp 160-173, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Kaipeng Zhang et al., “Joint Face Detection and Alignment using Multitask Cascaded Convolutional Networks,” IEEE Signal Processing Letter, vol. 23, no. 10, pp. 1499-1503, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Hussain Shah, Jamal et al., “Robust Face Recognition Technique under Varying Illumination,” Journal of Applied Research and Technology, vol. 13, no. 1, pp. 97-105, 2015.
[Google Scholar] [Publisher Link]
[28] Sandeep Singh Sengar, Abhishek Kumar, and Owen Singh, “Efficient Human Pose Estimation: Leveraging Advanced Techniques with MediaPipe,” arXiv Preprint, 2024.
[Google Scholar] [Publisher Link]