0% found this document useful (0 votes)
26 views4 pages

Biometric Facial Recognition Attendance System

The document presents an innovative biometric authorization system using facial recognition for attendance management, employing Haar Cascade Classifiers. It outlines the limitations of existing recognition systems and proposes a more efficient solution that automates attendance tracking and reporting. The system is designed to enhance accuracy and user convenience while integrating seamlessly with existing technologies.

Uploaded by

farhaanmf7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views4 pages

Biometric Facial Recognition Attendance System

The document presents an innovative biometric authorization system using facial recognition for attendance management, employing Haar Cascade Classifiers. It outlines the limitations of existing recognition systems and proposes a more efficient solution that automates attendance tracking and reporting. The system is designed to enhance accuracy and user convenience while integrating seamlessly with existing technologies.

Uploaded by

farhaanmf7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

INNOVATIVE BIOMETRIC AUTHORIZATION

Via
FACIAL RECOGNITION

M Farhaan Md Abidullah Shareef Md Adnan


Dept of CS & AI Dept of CS & AI Dept of CS & AI
MJCET MJCET MJCET
Hyderabad,India Hyderabad,India Hyderabad,India
farhaanmf7@[Link] abidshareef007@[Link] adnan@[Link]

Abstract— A Real-time Face Recognition encompassing advanced mathematical representations and


AttendanceSystem is used to monitor Attendance System of intricate matching processes.
an organization Without using manual power by using Haar Significant progress and proactive initiatives have propelled
Cascade Classifiers . This can be described as face recognition technology to the forefront of the spot
comprehensive solution that helps to overcome current light. Face recognition technology has found extensive
limitations such as Face Recognition of human facial applications across diverse domains. Computers equipped
features like the mouth, nose and eyes in a full frontal face with the ability to detect and identify faces have practical
image. We will be adapting a multi-step process in order to implications in various areas, such as criminal
achieve the goal. To detect the face region we will be using identification. Additionally, face detection and recognition
a skin-color segmentation method. Morphological are employed in numerous contemporary settings, including
techniques will be adapted to fill the holes that would be the verification of online platform hosting images and social
created after the segmentation process. From the networking platforms. The field of computer science
skeletonization process, a skeleton of the face will be encompasses the technologies necessary for achieving facial
obtained from which face contour points could be extracted. recognition and detection. By extracting features from a
Facial features can be located in the interior of the face face and comparing them to faces that have undergone
contour. We will use several different facial-images to test similar processing stored in a database, the system can
our method. In addition, the system should provide the determine if a face is recognized, indicating familiarity, or
capability to automation of the configuration of reports and display a face that bears resemblance from the existing
emails to be forwarded to the Head of the department to database.
assess the monthly attendance report, hence this eliminates
the involvement of the concerned authority for that
particular class to maintain an attendance report. I. LITERATURE REVIEW
A literature survey or literature review is an essential
component of a project report, as it offers a comprehensive
Introduction
view of the existing knowledge and research pertinent to the
Human beings have recognition capabilities that are project topic. It includes an examination of the existing
unparalleled in the modern computing era. These are mainly theories, books, and research in the field, often organized
because of the significant level of interconnectivity, chronologically from the earliest to the latest. Additionally,
adaptive nature, learning skills and generalization it may highlight any challenges or ongoing work related to
capabilities of the nervous system. The human brain has the topic. By reviewing the literature, readers can gain a
numerous highly interconnected biological neurons which, deeper understanding of the problem and potential
on some specific tasks, can outperform super computers. A solutions, alongside/additionally identify gaps in within the
child can accurately identify a face, but for a computer This present/current knowledge.
can be characterized as cumbersome task. Therefore, The
primary concept revolves around engineer a system which
II. EXISTING SYSTEM
can emulate what a child can do. Advancements in
computing capability over Advancements over the past few Currently, We are using other Recognition Systems like
decades have facilitated comparable recognition capabilities Fingerprint, Palm print,etc., which has their own limitations
from such engineered systems quite successfully. In the to give accurate results. And present Face recognition
past, face recognition algorithms relied on basic geometric Systems are not capable of identifying human face at all
models. However, in recent times, the recognition process scenarios due to their low mechanism. Hence there is a need
has evolved significantly, transforming into a scientific field of updated Face Recognition System which would be able
to identify human faces at all scenarios and gives more
provides more precise results in contrast to the current applications cases that outline the way users will interact
systems. with the software. The SRS serves as a formal agreement
between customers and contractors or suppliers regarding
A. Disadvanatges in Existing System
how the software should function. By establishing clear
requirements early on during the development process, the
SRS helps to reduce the need for costly redesigns later. It
• Fingerprint - Time Consuming.
also enables developers to estimate project costs, risks, and
• Palm Print – wet hands cannot get recognized. schedules more accurately. Effective use of the SRS can
• Bluetooth or Wi-Fi Based – anyone can make proxy by help to prevent software project failures. To create a
comprehensive SRS, developers must have a deep
keeping others devices.
understanding of the products being developed and engage
• Various problems like light intensity. in ongoing communication with the project team and
• Detection is difficult in beard faces. customers throughout the development process.

• It is difficult to identify number of faces present in a


single frame. A. Software Requirements
 Operating System: Windows 8,8.1,10 .
 Programming Language: Python is a commonly
used language for facial recognition projects.
III. PROPOSED SYSTEM  Facial Recognition Library or API: Consider
using OpenCV, Dlib, or other Windows-compatible
This project comprises of Face recognition-based libraries for facial recognition.
attendance management system using Haas-Cascade Face
detection was tested on verity of images with different face B. Hardware Requirements
positions and lighting conditions and then was applied to
detect faces in real time video. After the detection of faces  Camera: A basic webcam with a 720p resolution
from the images next step is cropping of each detected face. sufficient for facial recognition tasks.
Each cropped image is assigned to a separate for the  Processor: A dual-core processor or higher for
recognition purposes. Camera is installed in a classroom to basic facial recognition tasks. A quad-core or
capture the face of the student. The camera has to be places higher processor is recommended for real-time
such that it captures the face of all the students effectively. processing.
This camera has to be interfaced to computer system for  Memory (RAM): 4 GB of RAM or more for
further processing either through a wired or a wireless efficient processing.
network. In our prototype we use the external USB camera.  Storage: A minimum of 10 GB of free storage for
Facial recognition algorithm is applied on the captured the operating system, software, and data storage.
image. The image is cropped and stored for processing. The
module recognizes the images of the students face which V. SYSTEM DESIGN
have been registered manually with their names and ID
codes in the database. We use Open CV for all the image
processing and acquisition operations. The design phase of software development involves creating
a logical system that meets the specified requirements. The
A. Advantages of Proposed System design process typically involves two steps. The first step
involves creating black boxes derived from the analysis
• It saves their time and efforts. conducted in the problem identification phase. These black
boxes are designed to perform different functions, and
• The software stores the faces that are detected and efforts are made to minimize the flow of information
automatically marks attendance. between them. Tasks that necessitate greater interaction are
grouped together in a single block for easier management.
• The system is convenient and secure for the user. Subsystems offer several benefits in system design. They
can be utilized for to break down the system into smaller
• The software can be used for security purposes in units that can be ordered, configured, and delivered
organization and secured zones. independently. Each subsystem can be utilized for be
developed independently as long as the interfaces remain
• The Software can be used in Crowded Places for consistent. This enables more convenient implementation
Tracing an individual. across distributed computational nodes and independent
changes without disrupting other parts of the system.
Subsystems are particularly valuable for modelling larger
IV. SYSTEM REQUIREMENTS components in component-based development that are of a
The System Requirements Specification (SRS) is a detailed more complex nature than a single design class.
description of the software system that needs to be In addition, subsystems can also help with partitioning the
developed. It is based on the Business Requirements system into units that provide restricted security over key
Specification and contains both functional and resources. They can also represent existing products or
nonfunctional requirements, along with a variety of external systems in the design, providing a way to integrate
these components seamlessly into the overall system. class then message is sent to the student as he his absent for
the specific class.

VI. RESULTS AND DISCUSSION

The proposed software mainly deals marking the attendance


of the individuals/students inside the class.
VII. CONCLUSION
The camera needs to be tested for its proper functioning.
The output of the camera is a series of frames The project was initiated because of a need for automating
utilized/employed as an input for the haar cascade classifier. the attendance monitoring system to ease the work of
The detection process is followed by recognition and finally teachers in marking the attendance of the
the result is updated within the database on the server for individuals/students for their respective classes. These
everyone to access it. requirements were translated to a smart An automated
The webcam captures the images of the individuals/students attendance monitoring system employing video surveillance
and keeps those into the temporary file, consisting of sub-modules each having their respective
functionalities. The modules are object detection, object
Once after the Faculty face is recognized the attendance is recognition and the transmission of mail to the concerned
marked if images match found. If the images match not authority by generating a report. The modules when
found then that will display as Unknown for that integrated work seamlessly, simultaneously and for multiple
unrecognized face. The attendance will be written into the users at once.
Database as text file. That Attendance report will be sent to
the Head of the Department. If the Student is absent for the
The accuracy of detection and recognition module was
dependent on the value of threshold given for storing the
frames for each person. Higher the threshold value higher
the accuracy of the system. A security key was provided for
each lecturer using which the they could access the
attendance status of each student who have attended their
respective classes. Thus, the system is efficient, reliable,
consistent, flexible and user friendly.

[Link]
[1] Viola, P., & Jones, M. (2001). Rapid object detection
using a boosted cascade of simple features. In
Computer Vision and Pattern Recognition, 2001.
CVPR 2001. Proceedings of the 2001 IEEE
Computer Society Conference on (Vol. 1, pp. I-511).
IEEE.
[2] Rohit, C., Baburao, P., Vinayak, F., &Sankalp, S.
(2015). Attendance management system using face
recognition. International Journal for Innovative
Research in Science and Technology, 1(11), 55-58.
[3] NirmalyaKar, MrinalKantiDebbarma, AshimSaha,
and DwijenRudra Pal, “Implementation of
Automated Attendance System using Face
Recognition”, International Journal of Computer and
Communication [4] Engineering, Vol. 1, No. 2, July
2012.
[5] BenfanoSoewito, Ford Lumban Gaol,” Attendance
System on Android Smartphone”, 2015 International
Conference on Control, Electronics, Renewable
Energy and Communications (ICCEREC).
[6] AparnaBehara, [Link], “Real Time Face
Recognition System for time and attendance
applications”, International Journal of Electrical,
Electronic and Data Communication, ISSN 2320-
2084, Volume-1, Issue-4.
[7] KAWAGUCHI, Y., SHOJI, T., Weijane, L. I. N.,
KAKUSHO, K., & MINOH, M. (2005). Face
recognition-based lecture attendance system. In the
3rd AEARU Workshop on Network Education (pp.
70-75).
[8] Viola P. & Jones J...Robust Real-Time Face
Detection. International Journal of Computer Vision
57(2), 137– 154, 2004.
[9] M. A. Turk and A. P. Pentland, “Face Recognition
Using Eigenfaces,”in Proc. IEEE Conference on
Computer Vision and Pattern Recognition, pp. 586–
591. 1991.
[10] M. H. Yang, N. Ahuja, and D. Kriegmao, “Face
recognition using kernel eigenfaces,” IEEE
International Conference on Image Processing, vol. 1,
pp. 10-13, Sept. 2000.

You might also like