IntrudeX an intrusion detection system using facial recognition

Final Year Project Intrusion detection system using Facial Recognition (Software Approach)   The purpose of this project is to design an intrusion detection system which recognized the faces of the employees of an organization and if some unknown person appears in the vi

2025-06-28 16:33:21 - Adil Khan

Project Title

IntrudeX an intrusion detection system using facial recognition

Project Area of Specialization Artificial IntelligenceProject Summary

Final Year Project

Intrusion detection system using Facial Recognition (Software Approach)

The purpose of this project is to design an intrusion detection system which recognized the faces of the employees of an organization and if some unknown person appears in the video/camera/Image then it detects the unknown person and informs the concern authorities.

Project is divided into two phases.

In the first phase, students understand the process of face detection and face recognition and find out the relevant algorithms such as Eigenfaces, Local Binary Patterns Histograms (LBPH), Scale Invariant Feature Transform (SIFT) and Speed Up Robust Features (SURF), Support Vector Machine (SVM), Hidden Markov Models (HMM) etc.

In the second phase, after comparison and understanding of these algorithms, students will select one algorithm and implement it using available programming tools.

Deliverables:

  1. Report (Part A, Part B)
  2. Working Software / Simulator with source code

Student Names:

  1. 20162-19747 / Muhammad Habib Siddiqui
  2. 20162-19834 / Mohammad Ahmad
  3. 20151-18708 / Usama Yaseen
  4. 20162-19868 / Asim Muhammad Khawaja

Project Supervisor:

Engr. M. Asghar Khan

Project Objectives

Final Year Project

Intrusion detection system using Facial Recognition (Software Approach)

The purpose of this project is to design an intrusion detection system which recognized the faces of the employees of an organization and if some unknown person appears in the video/camera/Image then it detects the unknown person and informs the concern authorities.

Project is divided into two phases.

In the first phase, students understand the process of face detection and face recognition and find out the relevant algorithms such as Eigenfaces, Local Binary Patterns Histograms (LBPH), Scale Invariant Feature Transform (SIFT) and Speed Up Robust Features (SURF), Support Vector Machine (SVM), Hidden Markov Models (HMM) etc.

In the second phase, after comparison and understanding of these algorithms, students will select one algorithm and implement it using available programming tools.

Deliverables:

  1. Report (Part A, Part B)
  2. Working Software / Simulator with source code

Student Names:

  1. 20162-19747 / Muhammad Habib Siddiqui
  2. 20162-19834 / Mohammad Ahmad
  3. 20151-18708 / Usama Yaseen
  4. 20162-19868 / Asim Muhammad Khawaja

Project Supervisor:

Engr. M. Asghar Khan

Project Implementation Method

Final Year Project

Intrusion detection system using Facial Recognition (Software Approach)

The purpose of this project is to design an intrusion detection system which recognized the faces of the employees of an organization and if some unknown person appears in the video/camera/Image then it detects the unknown person and informs the concern authorities.

Project is divided into two phases.

In the first phase, students understand the process of face detection and face recognition and find out the relevant algorithms such as Eigenfaces, Local Binary Patterns Histograms (LBPH), Scale Invariant Feature Transform (SIFT) and Speed Up Robust Features (SURF), Support Vector Machine (SVM), Hidden Markov Models (HMM) etc.

In the second phase, after comparison and understanding of these algorithms, students will select one algorithm and implement it using available programming tools.

Deliverables:

  1. Report (Part A, Part B)
  2. Working Software / Simulator with source code

Student Names:

  1. 20162-19747 / Muhammad Habib Siddiqui
  2. 20162-19834 / Mohammad Ahmad
  3. 20151-18708 / Usama Yaseen
  4. 20162-19868 / Asim Muhammad Khawaja

Project Supervisor:

Engr. M. Asghar Khan

Benefits of the Project

Final Year Project

Intrusion detection system using Facial Recognition (Software Approach)

The purpose of this project is to design an intrusion detection system which recognized the faces of the employees of an organization and if some unknown person appears in the video/camera/Image then it detects the unknown person and informs the concern authorities.

Project is divided into two phases.

In the first phase, students understand the process of face detection and face recognition and find out the relevant algorithms such as Eigenfaces, Local Binary Patterns Histograms (LBPH), Scale Invariant Feature Transform (SIFT) and Speed Up Robust Features (SURF), Support Vector Machine (SVM), Hidden Markov Models (HMM) etc.

In the second phase, after comparison and understanding of these algorithms, students will select one algorithm and implement it using available programming tools.

Deliverables:

  1. Report (Part A, Part B)
  2. Working Software / Simulator with source code

Student Names:

  1. 20162-19747 / Muhammad Habib Siddiqui
  2. 20162-19834 / Mohammad Ahmad
  3. 20151-18708 / Usama Yaseen
  4. 20162-19868 / Asim Muhammad Khawaja

Project Supervisor:

Engr. M. Asghar Khan

Technical Details of Final Deliverable

Final Year Project

Intrusion detection system using Facial Recognition (Software Approach)

The purpose of this project is to design an intrusion detection system which recognized the faces of the employees of an organization and if some unknown person appears in the video/camera/Image then it detects the unknown person and informs the concern authorities.

Project is divided into two phases.

In the first phase, students understand the process of face detection and face recognition and find out the relevant algorithms such as Eigenfaces, Local Binary Patterns Histograms (LBPH), Scale Invariant Feature Transform (SIFT) and Speed Up Robust Features (SURF), Support Vector Machine (SVM), Hidden Markov Models (HMM) etc.

In the second phase, after comparison and understanding of these algorithms, students will select one algorithm and implement it using available programming tools.

Deliverables:

  1. Report (Part A, Part B)
  2. Working Software / Simulator with source code

Student Names:

  1. 20162-19747 / Muhammad Habib Siddiqui
  2. 20162-19834 / Mohammad Ahmad
  3. 20151-18708 / Usama Yaseen
  4. 20162-19868 / Asim Muhammad Khawaja

Project Supervisor:

Engr. M. Asghar Khan

Final Deliverable of the Project Software SystemCore Industry SecurityOther Industries Education Core Technology Artificial Intelligence(AI)Other TechnologiesSustainable Development Goals Quality EducationRequired Resources
Item Name Type No. of Units Per Unit Cost (in Rs) Total (in Rs)
Total in (Rs) 0
no item Equipment000

More Posts