Smart Keyless Locker Design Using Face Recognition Technology Based on the Internet of Things Jakarta Global University Classroom

Authors

  • Arizki Rahman Department of Electrical Engineering, Faculty of Engineering and Computer Science, Jakarta Global University, 16412, Indonesia
  • Legenda Prameswono Pratama Jurusan Teknik Elektro, Universitas Global Jakarta
  • Hamzah Department of Electrical Engineering, Faculty of Engineering and Computer Science, Jakarta Global University, 16412, Indonesia
  • Brainvendra Widi Dianova Department of Electrical Engineering, Faculty of Engineering and Computer Science, Jakarta Global University, 16412, Indonesia
  • Arisa Olivia Putri Department of Electrical Engineering, Faculty of Engineering and Computer Science, Jakarta Global University, 16412, Indonesia
  • Sinka Wilyanti Department of Electrical Engineering, Faculty of Engineering and Computer Science, Jakarta Global University, 16412, Indonesia
  • Safa N Saud Faculty of Information Sciences and Engineering, Management and Science University, Malaysia, 40100

DOI:

https://doi.org/10.56904/j-gers.v4i2.162

Keywords:

Smart Keyless Locker, Face Recognition, Internet of Things (IoT), Biometric authentication, OpenCV

Abstract

This research presents the design and implementation of an Internet of Things (IoT)-based Smart Keyless Locker integrated with face recognition technology to enhance security and efficiency in classroom locker management at Jakarta Global University. The system replaces conventional mechanical keys with biometric authentication to minimize risks associated with key loss, duplication, and unauthorized access. The hardware architecture consists of a Raspberry Pi as the primary processing unit for facial recognition, an Arduino Mega for actuator control, a camera module for image acquisition, solenoid door locks as locking mechanisms, load cell sensors for locker status detection, and an IoT-based notification system integrated with WhatsApp for real-time monitoring. The facial recognition process utilizes the Haar Cascade Classifier for face detection and the Local Binary Patterns Histograms (LBPH) algorithm for feature extraction and matching. System performance was evaluated under various conditions, including differences in lighting intensity, facial orientation, distance, and face coverings. Experimental results indicate that the system achieved a recognition success rate of 50% under the tested conditions, particularly within a distance range of 40–70 cm and adequate lighting. The average verification time ranged from 1.4 to 2.1 seconds depending on facial angle, while the WhatsApp notification system demonstrated reliable message delivery with an average delay of 4.75 seconds. Although recognition performance decreases when facial features are partially obstructed or when lighting is insufficient, the proposed system demonstrates the feasibility of integrating biometric authentication with IoT technology for modern classroom locker management applications.

References

[1] C. M. Shruthi, S. K. Bandari, C. K. Reddy Ala, and M. Reddy, “Locker Security System using Internet of Things,” E3S Web Conf., vol. 391, p. 01153, Jun. 2023, doi: 10.1051/e3sconf/202339101153.

[2] C. Bharatiraja, P. K. Chittoor, and Y. V. Bhargava, “An IoT based centralized smart locker using RFID technology,” 2023, p. 020098. doi: 10.1063/5.0101139.

[3] A. A. Alzhrani, M. Balfaqih, F. Alsenani, M. Alharthi, A. Alshehri, and Z. Balfagih, “Design and Implementation of an IoT-Integrated Smart Locker System utilizing Facial Recognition Technology,” Eng. Technol. Appl. Sci. Res., vol. 14, no. 4, pp. 16000–16010, Aug. 2024, doi: 10.48084/etasr.7737.

[4] R. Sudrajad, Achmad Fauzi, and Milli Alfhi Syari, “Development of a Dual Biometric Authentication System Based on IoT with Facial Recognition and Fingerprint for Safe Security,” J. Artif. Intell. Eng. Appl., vol. 5, no. 1, pp. 1529–1544, Oct. 2025, doi: 10.59934/jaiea.v5i1.1663.

[5] A. Lacava, V. Zottola, A. Bonaldo, F. Cuomo, and S. Basagni, “Securing Bluetooth Low Energy networking: An overview of security procedures and threats,” Comput. Networks, vol. 211, p. 108953, Jul. 2022, doi: 10.1016/j.comnet.2022.108953.

[6] Nurhikma, Abdul Wahid, and Jumadi M Parenreng, “E-Presence and Monitoring System Based on Face Image Recognition with Local Binnary Pattern Histogram (LBPH) Algorithm,” J. Embed. Syst. Secur. Intell. Syst., pp. 68–75, Mar. 2024, doi: 10.59562/jessi.v5i1.556.

[7] N. Habumugisha, J. Ngugi, and D. Sumbiri, “A Multi-Camera Automated Attendance System Using LBPH-Based Face Recognition,” J. Inf. Technol., vol. 5, no. 12, pp. 18–29, Nov. 2025, doi: 10.70619/vol5iss12pp18-29-694.

[8] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of Things (IoT): A vision, architectural elements, and future directions,” Futur. Gener. Comput. Syst., vol. 29, no. 7, pp. 1645–1660, Sep. 2013, doi: 10.1016/j.future.2013.01.010.

[9] P. K. Prayogo, L. P. Pratama, and D. Junesco, “Home Security System Based on Raspberry Pi and PIR Sensor Using WhatsApp Messenger,” J. Glob. Eng. Res. Sci., vol. 4, no. 1, pp. 1–10, Jun. 2025, doi: 10.56904/j-gers.v4i1.134.

[10] J. Krawiec et al., “Energy Footprint and Reliability of IoT Communication Protocols for Remote Sensor Networks,” Sensors, vol. 25, no. 19, p. 6042, Oct. 2025, doi: 10.3390/s25196042.

[11] H. Kaur and A. Mirza, “Face Detection Using Haar Cascades Classifier,” in Proceedings of the 2nd International Conference on ICT for Digital, Smart, and Sustainable Development, ICIDSSD 2020, 27-28 February 2020, Jamia Hamdard, New Delhi, India, EAI, 2021. doi: 10.4108/eai.27-2-2020.2303218.

Downloads

Published

2025-12-23

How to Cite

Rahman, A., Pratama, L. P., Hamzah, Dianova, B. W., Olivia Putri, A., Wilyanti, S., & Saud, S. N. (2025). Smart Keyless Locker Design Using Face Recognition Technology Based on the Internet of Things Jakarta Global University Classroom. Journal of Global Engineering Research and Science, 4(2), 56–66. https://doi.org/10.56904/j-gers.v4i2.162
Views
  • Abstract 3
  • PDF (English) 0