Professional Documents
Culture Documents
Face Recognition Attendence System Vishal Singh
Face Recognition Attendence System Vishal Singh
Face Recognition Attendence System Vishal Singh
Vishal Singh, Atharv Vanjari, Priti Patil, Tejas Shinde, Harshada Giri
Abstract — Face recognition, fingerprint recognition, and other the Haar Cascade algorithm is used for face detecting,
biometric authentication methods are gradually becoming the attendance-based systems can be used by teachers for their
most promising means for identifying a person's face. We can use convenience.
them in our phones, laptops, offices, and other devices. However,
pupils' attendance is still taken manually, which takes a long time I. LITERATURE REVIEW
and is extremely inefficient. To preserve that valuable time, we
needed an automated operating attendance system that
eliminated all of the drawbacks of collecting attendance on
R. C. Damale and B. V. Pathak [1]paper, computer vision
paper. We're putting together a system that's both efficient and and ML based face recognition system is proposed. They
dependable. have trained a module with a lot of images. For helping in
face recognition SVM, MLP and CNN are used as a
Using OpenCV, we created a face recognition-based attendance classifier. The SVM, MLP and CNN nearly achieve the
system. We can apply our attendance system anywhere, not just testing accuracy of about eighty seven percent, eighty six
for students. For face detection and recognition, the Haar percent and ninety eight percent respectively.
Cascade algorithm is utilized.
Second paper is written by 4 authors. They have [2]
Keywords — OpenCV ,Face Recognition, Face Detection, proposed a system for face recognition using the LBPH
Attendance, LBPH algorithm, Haar Cascade algorithm. First, a database is created by enrolling students.
They are taking several images of students using cameras.
INTRODUCTION Then the images are converted into grayscale by using the
LBP algorithm and after that a histogram is generated. A
The face is the most significant component of the human video stream is given to the system by which the LBPH
body for identifying a person. Face recognition is another algorithm matches the live image taken by camera streams
type of biometric recognition that maintains all of a person's with the images present in database. When a face is detected
facial traits as distinct faces prints in order to uniquely successfully, attendance is marked.
identify them. Biometric face recognition has received a lot
of traction among researchers due to its versatility and S. Dev and T. Patnaik [3] proposed a system which the
usefulness. Also its contact free procedure, that is why it requirements i.e is required for the face recognition.The
outsmarts all other recognitions like fingerprint, iris print addition of Gabor filters considerably increases the system's
and palm print. Face recognition technology is also able to accuracy.. Three algorithms are used for face recognition:
detect a person from far away, without coming in physical KNN, CNN, and support vector machines. KNN algorithm
contact with anyone. (of 99.27%)has proved to have the highest accuracy by using
CNN has low computational complexity and algorithm name
The photo that has been captured will be stored in the SVM is used to prove to be less efficient.
database. After that we can use this project in many ways
like face recognition systems will be used in crime related S. S. Pawaskar and A. M. Chavan [4] proposed a system of
reports. To identify the persons in all scenarios such as using different algorithms like haar cascade and LBPH
change of the illumination, pose, age, and so on, we need a which is mostly used for the object and the image detection
very huge dataset and complicated attributes.In recent years, along with the record of the attendance through this system.
Significant progress has been made in the fields of Biometric
like face recognition systems till yet. There has been M. N. Adji And R. Hartanto [5] proposed an attendance
enormous progress in the field of facial recognition during system by face recognition using the Haar cascade
the last decade. algorithm. Face images are captured using a camera. To
determine the location of the face it is performed by a haar
Many facial recognition algorithms today work well even algorithm for image detection.It basically draws a box
with a limited number of faces in pictures.Although, these around the faces of the person to whom we want to detect
types of methodologies had been test under very limited and his face .Using different types of the algorithms they have
very controll lightined conditioning, very proper faces pose done it . After that they have stored the data in the cloud.
and usually non-blurred images. Face recognition-based
attendance systems will be based on the technology of face
recognition and it will be very useful for teachers as it will
provide a very convenient way of marking attendance of the
students for teachers. Face recognition is done by LBPH and
2
II. METHODOLOGY/EXPERIMENTAL
A. Materials/Components/Flowchart/Block
Diagram/Theory
3
3. Create Dataset
80 5. Face Recognition
70
The LBPH algorithm is used for face recognition.
60 The Local Binary Pattern (LBP) textured operator
50 identifies pixels in an image by thresholding the
neighborhood of each pixel and using the output as a
40
binary integer. The
30 face image can be described by a simple data vector
20 that uses LBP in combination with the histogram. This
is also known as the LBPH method.
10
0 LBPH has four parameters:
Test 1 Test 2 Test 3 Test 4
Radius: The radius is used to determine the radius
Number of images (*10) Time taken(in s) around the center pixel and create a circular LBP.
Confidence Normally set to 1.
4. Training Model Neighbor: Create CLBP. The higher the cost, the more
points you get. It is basically set to 8.
The next step of this process is to use the photographs we've
acquired to train our model. The model will be trained using (Raster X): Number of cells in the horizontal direction.
the LBPH approach. The histogram formed by training on The more cells in the grid and the finer the grid, the
those 200 photos is stored in the 'yml' file. higher the dimension of the resulting feature vector.
Normally set to 8.
is set to 1 if its value is greater than or equal to the value of a large number of grids from a single image, each region's
the center pixel; otherwise, it is set to 0; otherwise, we histogram may now be retrieved.
compare a pixel to its 8 closest pixels using the median pixel Because we're working with a grayscale image, each
value as a threshold value. histogram will have approximately 256 places to record the
occurrences of each pixel intensity. To train an algorithm,
the following data is used. Each image from the training
dataset will be represented by its own histogram. As a result,
we'll repeat the processes to generate a histogram that
reflects an input image. For computation, the LBP
histograms from each sub-region are combined into a single
histogram with additional features such as:
After that, the binary value will be translated to a decimal So, all we have to do to identify the picture that precisely
integer and assigned to the centre value of the matrix, which matches the input image is compare the histograms and
is a pixel from the original picture.. return the image with the most similar histogram.
The programme merely outputs the id and name of the Fig. Attendance record
student with the closest histogram if the face is found. The
computed distance will also be returned by the algorithm, IV. LIMITATIONS
which may be used as a 'confidence' evaluation. Face recognition-based systems have a key flaw: their
Then, using a threshold and 'confidence,' we can see if the accuracy isn't 100 percent. There is always the possibility of
algorithm correctly recognised the image. We may deduce making a mistake. The system's data processing may take
that the algorithm has properly recognised if the confidence some time, which will become a problem throughout the
is higher than the provided threshold because we are lesson. The system would require a certain amount of
subtracting the result from 100 for better comprehension. If storage depending on the quality of the input data. If the data
the confidence level is too low, the image will be labeled as obtained is of extremely high quality and requires a huge
unknown and stored in the Unknown Images folder. quantity of storage space, this might be highly troublesome,
especially for events with a big estimated audience. If the
image quality isn't good enough, the cameras may be fooled
Person Confidence level (%) into thinking the person being scanned isn't the same as the
one in the photo.
Tejas 75%
V. FUTURE SCOPE
Atharv 77% The future scope of the project might involve taking a large
number of detailed photographs of kids and storing them in
Pritti 72% the cloud. The technology might be created and used in
ATM machines to detect fraud.
Vishal 71% Using facial recognition technology, the approach might
potentially be used to identify voters during elections.
The system can work in conditions such as low light and can
also detect and recognize the face. Here is the table in which VI. CONCLUSION
some features of the system are mentioned:
This system provides a very effective form of attendance
management in the classroom that may fully replace
Features Results previous manual techniques. This method is incredibly safe,
trustworthy, precise, and effective. It is not necessary to
Detection of single face Yes employ specialized hardware to set up the system in the
classroom. It is quite simple to make using a camera and a
Low light face Yes computer. Some of the algorithms that can recognise faces in
recognition the veil must be employed to improve the system's
Detection of Multiple Yes performance. The solution will also save time, minimize
faces administrative workload, and replace traditional stationery
Recognition in mask/veil No with electronic equipment, reducing the number of human
resources required for the task. As a result, a system with
Recognition in Bright Yes predetermined results will be developed, but there will be
Light room for development.
VII. ACKNOWLEDGMENT
6. Attendance Record
As soon as we stop the face recognition process, an We would like to express our gratitude to the college
attendance file will be automatically generated by the system teachers for providing us with the chance to work on a
which will contain the id, name, date, and time at which project about facial recognition. It was a fantastic experience
each and every student was detected. For students whose from which we gained a lot of knowledge. It allowed us to
faces were successfully matched with the current database, test our abilities and piqued our curiosity in the subject of
attendance is recorded in the csv file. facial recognition. Thanks especially to Deepali Joshi mam
for her patience and understanding. She is really
encouraging and supports subjects that we are interested in.
She was a great source of inspiration for us, and we owe her
a debt of gratitude. This group had a great atmosphere, and
we all tried our hardest.
8
[3] S. Dev and T. Patnaik, "Student Attendance System [14] Changxing Ding, Dacheng Tao, “Trunk-Branch
using Face Recognition," 2020 International Conference on Ensemble Convolutional Neural Networks for Video-Based
Smart Electronics and Communication (ICOSEC), 2020, pp. Face Recognition”, IEEE transactions on pattern analysis
90-96, doi: 10.1109/ICOSEC49089.2020.9215441. and machine intelligence, 2018.
[4] S. S. Pawaskar and A. M. Chavan, "Face Recognition [15] Aziza Ahmedi, Dr Suvarna Nandyal, “An Automatic
based Class Management and Attendance System," 2020 Attendance System Using Image processing”, The
IEEE Bombay Section Signature Conference (IBSSC), 2020, International Journal of Engineering and Science, 2015.
pp. 180-185, doi: 10.1109/IBSSC51096.2020.9332212.
[16]Yohei Kawaguchi, Tetsuo Shoji, “Face Recognition-
[5] R. Hartanto and M. N. Adji, "Face Recognition for based Lecture Attendance System”, “3rd AER”, 2005.
Attendance System Detection," 2018 10th International
Conference on Information Technology and Electrical [17] B. Kavinmathi, S.Hemalatha, “Attendance System for
Engineering (ICITEE), 2018, pp. 376-381, doi: Face Recognition using GSM module”, 4th International
10.1109/ICITEED.2018.8534942. Conference on Signal Processing and Integrated Networks”,
2018.
[6] T. A. Kiran, N. D. K. Reddy, A. I. Ninan, P. Krishnan,
D. J. Aravindhar and A. Geetha, "PCA based Facial [18] Ketan N. Mahajan, Nagaraj V. Dharwadkar,”
Recognition for Attendance System," 2020 International Classroom attendance system using surveillance camera”,
Conference on Smart Electronics and Communication International Conference on Computer Systems, Electronics
(ICOSEC), 2020, pp. 248-252, doi: and Control”,2017.
10.1109/ICOSEC49089.2020.9215326.
[19] Shubhobrata Bhattacharya, Gowtham Sandeep Nainala,
[7] O. A. R. Salim, R. F. Olanrewaju and W. A. Balogun, Prosenjit Das, Aurobinda Routray “Smart Attendance
"Class Attendance Management System Using Face Monitoring System (SAMS): A Face Recognition based
Recognition," 2018 7th International Conference on Attendance System for Classroom Environment”, IEEE 18th
Computer and Communication Engineering (ICCCE), 2018, International Conference on Advanced Learning
pp. 93-98, doi: 10.1109/ICCCE.2018.8539274. Technologies, 2018.
[8] R. Mehta, S. Satam, M. Ansari and S. Samantaray, [20] E.Varadharajan, R.Dharani, S.Jeevitha,., “Automatic
"Real-Time Image Processing: Face Recognition based attendance management system using face detection”, 2017.
Automated Attendance System in-built with “Two-Tier
Authentication” Method," 2020 International Conference on
Data Science and Engineering (ICDSE), 2020, pp. 1-6, doi:
10.1109/ICDSE50459.2020.9310090.