You are on page 1of 26

FACE RECONITION BASED CLASS

ATTENDANCE AND GATE OPEN SYSTEM


(MACHINE LEARNING)

A PROJECT REPORT

Submitted in partial fulfillment for the award of the degree of

B.TECH

in

Information Technology

by

PRINCE KADIWAR 14BIT0089

Under the Guidance of


Prof. SWARNAPRIYA.

School of Information Technology & Engineering (SITE)

JANUARY 2018
ABSTRACT

Most doors are controlled by persons with the use of keys, security cards,
password or pattern to open the door. The aim of this project is to help users for
improvement of the door security of sensitive locations by using face detection and
recognition. Face is a complex multidimensional structure and needs good
computing techniques for detection and recognition. This project is comprised
mainly of three subsystems: namely face detection, face recognition and automatic
door access control with attendance. Face detection is the process of detecting the
region of face in an image. The face is detected by using the viola jones method and
face recognition is implemented by using the Principal Component Analysis (PCA).
Face Recognition based on PCA is generally referred to as the use of Eigen faces. If
a face is recognized, it is known, else it is unknown.

The door will open automatically for the known person due to the command
of the microcontroller. On the other hand, alarm will ring for the unknown person.
Since PCA reduces the dimensions of face images without losing important
features, facial images for many persons can be stored in the database. Although
many training images are used, computational efficiency cannot be decreased
significantly. Therefore, face recognition using PCA can be more useful for door
security system than other face recognition schemes.

2
INTRODUCTION

Deep learning (also known as deep structured learning or hierarchical learning) is


part of a broader family of machine learning methods based on learning data
representations, as opposed to task-specific algorithms. Learning can be supervised
semi-supervised or unsupervised. Deep learning architectures such as deep neural
networks, deep belief networks and recurrent neural networks have been applied to
fields including computer vision, speech recognition, natural language processing,
audio recognition, social network filtering, machine
translation, bioinformatics and drug design, where they have produced results
comparable to and in some cases superior to human experts.
Image processing and recognition is carried out on the actual image transformation
and transformation so as to achieve the aim of identification. Because of the
characteristic of the image information is that it is a two-dimensional space, so the
amount of information it contains is very large. Neural network image recognition
technology is the modern computer technology, image processing, artificial
intelligence, pattern recognition theory developed a new kind of image recognition
technology. Before the image recognition need to use digital image processing
techniques for image preprocessing and feature extraction. With the theory of
artificial intelligence research and the development of computer technology, the
application of neural network in image pattern recognition research is increasingly
active.
Nowadays, automatic personal identification in access control has become popular
by using biometrics data instead of using cards, passwords or pattern. Most of the
biometrics data have to be collected by using special hardware such as fingerprint
scanner, palm print scanner, DNA analyzer. And, the target objects have to touch
with the required hardware in the stage of data collection. The advantage of this

3
system is that face recognition does not require to be touched with any hardware.
Face is detected automatically by using face detection technique and the entire face
recognition is completed without touching with any hardware. Face detection is the
first step of the face recognition system. The performance of the entire face
recognition system is influenced by the reliability of the face detection. By using
face detection, it can identify only the facial part of an image regardless of the
background of this image. In this system, Viola-Jones face detection method is
used. Viola-Jonesrescale the detector instead of the input image and run the detector
many times through the image – each time with a different size. Viola-Jones have
devised a scale invariant detector that requires the same number of calculations
whatever the size.
This detector is constructed using a so-called integral image and some simple
rectangular features reminiscent of Haar wavelets. Face recognition commonly
includes feature extraction, feature reduction and recognition or classification. PCA
is an effective feature extraction method based on face as a global feature. It
reduces the dimension of images effectively and holds the primary information at
the same time. In this paper, face recognition system is implemented using PCA
algorithm. Recognition or classification is done by the measure method such as
Euclidean distance, which is used to classify the feature of images present in the
database and test image.

In this system, face detection and recognition are implemented by using MATLAB
installed on PC. USB to RS232 converter is used as the interface between the PC
and 16F887 microcontroller. Edge sensors are used to switch off the motor if the
door reaches one of its two end positions. This switching mainly works with an
algorithm which is loaded in microcontroller and on the basis of serial port data
which is sent by PC after verifying the face.

4
LITERATURE SURVEY

Title: Automated Attendance Management System Based On Face Recognition


Algorithms
Year: 2013
Author: Shireesha Chintalapati, M.V. Raghunadh,
Authors have proposed a Automated Attendance Management System based On
Face Recognition Algorithm. This system, which is based on face detection and
recognition algorithm, automatically detects the student when he enters the class
room and mark the attendance by recognition him. This technique is to be use in
order to handle the treats like spoofing. The problem with this approach is that it
capture only one student image at a time when he enter the classroom thus it is time
consuming and may distract the attention of the student.

Title: Design of Face Detection and Tracking System


Year: 2010
Author: Ruian Liu Mimi Zhang Shengtao Ma
Automatic Control of Students Attendance in Classroom Using RFID. In this
system in which students carry a RFID tag type ID card and they need to place that
on the card reader to record his attendance. RS232 is used to connect the system
with computer and stored the recorded attendance from the database. This system
may give rise to the problem of fraudulent approach. An unauthorized students may
make use of RFID card and enter into the organization.

Title: Encara:real-time detection of frontal faces


Year: 2011
Author: M.C. Santana, M.H. Tejera, J.C. Gámez

5
Wireless Fingerprint Attendance Management System. This system uses iris
recognition system that does capturing the image of iris recognition, extraction,
storing and matching. But the difficulty occurs to lay the transmission lines in the
places where the quality of topography is poor. In [4] authors have consider a
system based on real time face recognition which is reliable, secure and fast which
needs improvement in different lighting conditions.

Title: Attendance System Using Face Recognition and Class Monitoring System
Year: 2014
Author: Prof. Arun Katara, Mr. Sudesh V. Kolhe , Mr. Amar P. Zilpe , Mr. Nikhil
D. Bhele4 , Mr. Chetan J. Bele
In this paper, we propose a system that takes the attendance of students in the
lecture. This system takes the attendance automatically using face recognition.
However, it is difficult to estimate the attendance exactly using each result of face
recognition independently because the face detection rate is not sufficiently high. In
our paper, we propose a method for estimating the attendance exactly using all the
results of face recognition obtained by continuous observation. Continuous
observation improves the performance for the estimation of the attendance. We
constructed the attendance system based on face recognition, and applied the
system to classroom lecture. In our system, we are using raspberry pi. we use
OpenCv library which is installed in pi for face detection and recognition. The
camera is connected to raspberry pi and student database is stored in the pi. With
the help of this system time will reduce and attendance will be marked. In this paper
first review similar works in the field of attendance system and recognition of face.
Then, it showing our system structure and plan. At the last, experiments are
implemented to provide as manifest to support our plan. The result shows that

6
uninterrupted observation improved the performance for the approximation of the
attendance.

Title: Automatic Door Access System Using Face Recognition


Year: 2015
Author: Hteik Htar Lwin, Aung Soe Khaing, Hla Myo Tun
Most doors are controlled by persons with the use of keys, security cards, password
or pattern to open the door. Theaim of this paper is to help users forimprovement of
the door security of sensitive locations by using face detection and recognition.
Face is a complex multidimensional structure and needs good computing techniques
for detection and recognition. This paper is comprised mainly of three subsystems:
namely face detection, face recognition and automatic door access control. Face
detection is the process of detecting the region of face in an image. The face is
detected by using the viola jones method and face recognition is implemented by
using the Principal Component Analysis (PCA). Face Recognition based on PCA is
generally referred to as the use of Eigenfaces.If a face is recognized, it is known,
else it is unknown. The door will open automatically for the known person due to
the command of the microcontroller. On the other hand, alarm will ring for the
unknown person. Since PCA reduces the dimensions of face images without losing
important features, facial images for many persons can be stored in the database.
Although many training images are used, computational efficiency cannot be
decreased significantly. Therefore, face recognition using PCA can be more useful
for door security system than other face recognition schemes.

7
IMAGE PROCESSING FUNDAMENTALS

2.1 INTRODUCTION
Digital image processing refers processing of the image in digital form. Modern cameras
may directly take the image in digital form but generally images are originated in optical form.
They are captured by video cameras and digitalized. The digitalization process includes
sampling, quantization. Then these images are processed by the five fundamental processes, at
least any one of them, not necessarily all of them.

2.2 IMAGE PROCESSING TECHNIQUES


This section gives various image processing techniques.

Image Enhancement

Image Restoration

Image Analysis
IP

Image Compression

Image Synthesis

2.2.1 IMAGE ENHANCEMENT


Image enhancement operations improve the qualities of an image like improving the
image’s contrast and brightness characteristics, reducing its noise content, or sharpen the details.
This just enhances the image and reveals the same information in more understandable image. It
does not add any information to it.
2.2.2 IMAGE RESTORATION
Image restoration like enhancement improves the qualities of image but all the operations
are mainly based on known, measured, or degradations of the original image. Image restorations
8
are used to restore images with problems such as geometric distortion, improper focus, repetitive
noise, and camera motion. It is used to correct images for known degradations.
2.2.3 IMAGE ANALYSIS
Image analysis operations produce numerical or graphical information based on
characteristics of the original image. They break into objects and then classify them. They depend
on the image statistics. Common operations are extraction and description of scene and image
features, automated measurements, and object classification. Image analyze are mainly used in
machine vision applications.
2.2.4 IMAGE COMPRESSION
Image compression and decompression reduce the data content necessary to describe the
image. Most of the images contain lot of redundant information, compression removes all the
redundancies. Because of the compression the size is reduced, so efficiently stored or transported.
The compressed image is decompressed when displayed. Lossless compression preserves the
exact data in the original image, but Lossy compression does not represent the original image but
provide excellent compression.
2.2.5 IMAGE SYNTHESIS
Image synthesis operations create images from other images or non-image data. Image
synthesis operations generally create images that are either physically impossible or impractical to
acquire.

2.3 APPLICATIONS OF DIGITAL IMAGE PROCESSING


Digital image processing has a broad spectrum of applications, such as remote sensing via
satellites and other spacecrafts, image transmission and storage for business applications, medical
processing, radar, sonar and acoustic image processing, robotics and automated inspection of
industrial parts.
2.3.1 MEDICAL APPLICATIONS
In medical applications, one is concerned with processing of chest X-rays,
cineangiograms, projection images of transsexual tomography and other medical images that
occur in radiology, nuclear magnetic resonance (NMR) and ultrasonic scanning. These images
may be used for patient screening and monitoring or for detection of tumors or other disease in
patients.
9
2.3.2 SATELLITE IMAGING
Images acquired by satellites are useful in tracking of earth resources; geographical
mapping; prediction of agricultural crops, urban growth and weather; flood and fire control; and
many other environmental applications. Space image applications include recognition and
analysis of objects contained in image obtained from deep space-probe missions.
2.3.3 COMMUNICATION
Image transmission and storage applications occur in broadcast television,
teleconferencing, and transmission of facsimile images for office automation, communication of
computer networks, closed-circuit television based security monitoring systems and in military
communications.
2.3.4 RADAR IMAGING SYSTEMS
Radar and sonar images are used for detection and recognition of various types of targets
or in guidance and maneuvering of aircraft or missile systems.
2.3.5 DOCUMENT PROCESSING
It is used in scanning, and transmission for converting paper documents to a digital image
form, compressing the image, and storing it on magnetic tape. It is also used in document reading
for automatically detecting and recognizing printed characteristics.
2.3.6 DEFENSE/INTELLIGENCE
It is used in reconnaissance photo-interpretation for automatic interpretation of earth
satellite imagery to look for sensitive targets or military threats and target acquisition and
guidance for recognizing and tracking targets in real-time smart-bomb and missile-guidance
systems.

10
DETAILED DESIGN

SYSTEM ARCHITECTURE:

LCD

MATLAB
BUZZER
IMAGE PIC
PROCESSING MICRO
CONTROLLER

RELAY
PC

GATE (DC MOTOR)

SYSTEM REQUIREMENTS:

HARDWARE REQUIRED:

 PIC MICRO CONTROLLER


 LCD DISPLAY
 BUZZER
 RELAY BOARD
 DC MOTOR

SOFTWARE REQUIRED:

 MATLAB 2015
 PIC CCS

11
UML DIAGRAMS

USE CASE DIAGRAM:

12
CLASS DIAGRAM:

SEQUENCE DIAGRAM:

13
ACTIVITY DIAGRAM:

DATA FLOW DIAGRAM:

14
MODULE DESCRIPTION

1. FACE RECOGNITION
A facial recognition system is a computer application capable
of identifying or verifying a person from a digital image or a video
frame from a video source. One of the ways to do this is by comparing
selected facial features from the image and a face database.
It is typically used in security systems and can be compared to
other biometrics such as fingerprint or eye iris
recognition systems.[1] Recently, it has also become popular as a
commercial identification and marketing tool.

2. PC-MICRO CONTROLLER INTERFACING


A pc-micro controller interface which allows to displays the status of
the microcontroller and the connected IOT.

3. MICROCONTROLLER WITH GATE CONTROL


Control the relay attached to the gate to control the opening of the gate
and allow the matching faces to enter.

4. ALARM INTERFACING
A buzzer is blown when there is a mismatch in the face recognition
system.

15
DETAILED DATABASE DESIGN

16
SOURCE CODE

function varargout = Main_Face(varargin)


% MAIN_FACE MATLAB code for Main_Face.fig
% MAIN_FACE, by itself, creates a new MAIN_FACE or raises the existing
% singleton*.
%
% H = MAIN_FACE returns the handle to a new MAIN_FACE or the handle to
% the existing singleton*.
%
% MAIN_FACE('CALLBACK',hObject,eventData,handles,...) calls the local
% function named CALLBACK in MAIN_FACE.M with the given input arguments.
%
% MAIN_FACE('Property','Value',...) creates a new MAIN_FACE or raises the
% existing singleton*. Starting from the left, property value pairs are
% applied to the GUI before Main_Face_OpeningFcn gets called. An
% unrecognized property name or invalid value makes property application
% stop. All inputs are passed to Main_Face_OpeningFcn via varargin.
%
% *See GUI Options on GUIDE's Tools menu. Choose "GUI allows only one
% instance to run (singleton)".
%
% See also: GUIDE, GUIDATA, GUIHANDLES

% Edit the above text to modify the response to help Main_Face

% Last Modified by GUIDE v2.5 24-Jan-2018 12:15:03

% Begin initialization code - DO NOT EDIT


gui_Singleton = 1;
gui_State = struct('gui_Name', mfilename, ...
'gui_Singleton', gui_Singleton, ...
'gui_OpeningFcn', @Main_Face_OpeningFcn, ...
'gui_OutputFcn', @Main_Face_OutputFcn, ...
'gui_LayoutFcn', [] , ...
'gui_Callback', []);
if nargin && ischar(varargin{1})
gui_State.gui_Callback = str2func(varargin{1});
end

if nargout
[varargout{1:nargout}] = gui_mainfcn(gui_State, varargin{:});
else
gui_mainfcn(gui_State, varargin{:});
end
% End initialization code - DO NOT EDIT

17
% --- Executes just before Main_Face is made visible.
function Main_Face_OpeningFcn(hObject, eventdata, handles, varargin)
% This function has no output args, see OutputFcn.
% hObject handle to figure
% eventdata reserved - to be defined in a future version of MATLAB
% handles structure with handles and user data (see GUIDATA)
% varargin command line arguments to Main_Face (see VARARGIN)

% Choose default command line output for Main_Face


handles.output = hObject;

% Update handles structure


guidata(hObject, handles);

% UIWAIT makes Main_Face wait for user response (see UIRESUME)


% uiwait(handles.figure1);

% --- Outputs from this function are returned to the command line.
function varargout = Main_Face_OutputFcn(hObject, eventdata, handles)
% varargout cell array for returning output args (see VARARGOUT);
% hObject handle to figure
% eventdata reserved - to be defined in a future version of MATLAB
% handles structure with handles and user data (see GUIDATA)

% Get default command line output from handles structure


varargout{1} = handles.output;

% --- Executes on button press in pushbutton1.a


function pushbutton1_Callback(hObject, eventdata, handles)
% hObject handle to pushbutton1 (see GCBO)
% eventdata reserved - to be defined in a future version of MATLAB
% handles structure with handles and user data (see GUIDATA)

datapath = uigetdir('C:\Users\prince kadiwar\Desktop\New folder (3)\Face recognition real


time\Database\.jpg');
testpath = uigetdir('C:\Users\prince kadiwar\Desktop\New folder (3)\Face recognition real
time\Dataset\.jpg');

prompt = {'Enter test image name (a number between 1 to 5):'};


dlg_title = 'Input of PCA-Based Face Recognition System';
num_lines= 1;
def = {' '};
TestImage = inputdlg(prompt,dlg_title,num_lines,def);
TestImage = strcat(testpath,'\',char(TestImage),'.jpg');

18
recog_img = facerecog(datapath,TestImage);
selected_img = strcat(datapath,'\',recog_img);
test_img = imread(TestImage);
axes(handles.axes1);
imshow(test_img);
title('Test Image');

select_img = imread(selected_img);
axes(handles.axes2)
imshow(select_img); title('Recognized Image');

INP1=im2bw(test_img);
INPUT1=im2bw(select_img)
S=corr2(INPUT1,INP1);
S
if S>0.5
uiwait(msgbox('Matched'));
else
uiwait(msgbox('Notmatched'));
end

% --- Executes on button press in pushbutton2.


function pushbutton2_Callback(hObject, eventdata, handles)
% hObject handle to pushbutton2 (see GCBO)
% eventdata reserved - to be defined in a future version of MATLAB
% handles structure with handles and user data (see GUIDATA)

global img

n=2;
interval=3;
photosave = inputdlg(' Do you want to save the files(y/n): ','Registration Form');
photosave = str2num(photosave{:});

outputFolder = fullfile('C:\Users\prince kadiwar\Desktop\New folder (3)\Face recognition real


time\Dataset');

if ~exist(outputFolder, 'dir')
end
obj = videoinput('winvideo', 1);
set(obj, 'ReturnedColorSpace', 'RGB');
disp('First shot will taken after 1 second');
pause(1);

19
for i=1:n
preview(obj)
img=getsnapshot(obj);
closepreview(obj);
if(photosave == 'y')
outputBaseFileName = sprintf('%d.jpg',i);
outputFullFileName = fullfile(outputFolder, outputBaseFileName);
imwrite(img,outputFullFileName,'jpg');
end
pause(interval);
end

n= 5;
outputFolder = fullfile('C:\Users\prince kadiwar\Desktop\New folder (3)\Face recognition real
time\Dataset');
if ~exist(outputFolder, 'dir')
end
for i=1:n
outputBaseFileName= sprintf('%d.jpg',i);
outputFullFileName = fullfile(outputFolder, outputBaseFileName);
imwrite(img,outputFullFileName,'jpg');
axes(handles.axes1);
imshow(img),title('Login Image')
end

% --- Executes on button press in pushbutton3.


function pushbutton3_Callback(hObject, eventdata, handles)
% hObject handle to pushbutton3 (see GCBO)
% eventdata reserved - to be defined in a future version of MATLAB
% handles structure with handles and user data (see GUIDATA)

global img1

n=2;
interval=3;
photosave = inputdlg(' Do you want to save the files(y/n): ','Registration Form');
photosave = str2num(photosave{:});

outputFolder = fullfile('C:\Users\prince kadiwar\Desktop\New folder (3)\Face recognition real


time\Database');

if ~exist(outputFolder, 'dir')
end
obj = videoinput('winvideo', 1);
set(obj, 'ReturnedColorSpace', 'RGB');

20
disp('First shot will taken after 1 second');
pause(1);
for i=1:n
preview(obj)
img1=getsnapshot(obj);
closepreview(obj);
if(photosave == 'y')
outputBaseFileName = sprintf('%d.jpg',i);
outputFullFileName = fullfile(outputFolder, outputBaseFileName);
imwrite(img1,outputFullFileName,'jpg');
end
pause(interval);
end

n= 5;
outputFolder = fullfile('C:\Users\prince kadiwar\Desktop\New folder (3)\Face recognition real
time\Database');
if ~exist(outputFolder, 'dir')
end
for i=1:n
outputBaseFileName = sprintf('%d.jpg',i);
outputFullFileName = fullfile(outputFolder, outputBaseFileName);
imwrite(img1,outputFullFileName,'jpg');
axes(handles.axes1);
imshow(img1),title('Registered Image')
end

21
TESTING STRATEGY

SYSTEM TESTING
The purpose of testing is to discover errors. Testing is the process of trying to discover
every conceivable fault or weakness in a work product. It provides a way to check the
functionality of components, sub assemblies, assemblies and/or a finished product It is the process
of exercising software with the intent of ensuring that the
Software system meets its requirements and user expectations and does not fail in an unacceptable
manner. There are various types of test. Each test type addresses a specific testing requirement.

TYPES OF TESTS
Unit testing
Unit testing involves the design of test cases that validate that the internal program
logic is functioning properly, and that program inputs produce valid outputs. All decision
branches and internal code flow should be validated. It is the testing of individual software units
of the application .it is done after the completion of an individual unit before integration. This is a
structural testing, that relies on knowledge of its construction and is invasive. Unit tests perform
basic tests at component level and test a specific business process, application, and/or system
configuration. Unit tests ensure that each unique path of a business process performs accurately to
the documented specifications and contains clearly defined inputs and expected results.

Integration testing

Integration tests are designed to test integrated software components to determine if they
actually run as one program. Testing is event driven and is more concerned with the basic
outcome of screens or fields. Integration tests demonstrate that although the components were
individually satisfaction, as shown by successfully unit testing, the combination of components is
correct and consistent. Integration testing is specifically aimed at exposing the problems that
arise from the combination of components.

22
Functional test

Functional tests provide a systematic demonstration that functions tested are available as
specified by the business and technical requirements, system documentation, and user manuals.
Functional testing is centered on the following items:
Valid Input : identified classes of valid input must be accepted.
Invalid Input : identified classes of invalid input must be rejected.
Functions : identified functions must be exercised.
Output : identified classes of application outputs must be exercised.
Systems/Procedures: interfacing systems or procedures must be invoked.
Organization and preparation of functional tests is focused on requirements, key functions,
or special test cases. In addition, systematic coverage pertaining to identify
Business process flows; data fields, predefined processes, and successive processes must
be considered for testing. Before functional testing is complete, additional tests are identified and
the effective value of current tests is determined.
System Test
System testing ensures that the entire integrated software system meets requirements. It
tests a configuration to ensure known and predictable results. An example of system testing is the
configuration oriented system integration test. System testing is based on process descriptions and
flows, emphasizing pre-driven process links and integration points.
White Box Testing
White Box Testing is a testing in which in which the software tester has knowledge of the
inner workings, structure and language of the software, or at least its purpose. It is purpose. It is
used to test areas that cannot be reached from a black box level.

Black Box Testing


Black Box Testing is testing the software without any knowledge of the inner workings,
structure or language of the module being tested. Black box tests, as most other kinds of tests,
must be written from a definitive source document, such as specification or requirements
document, such as specification or requirements document. It is a testing in which the software
under test is treated, as a black box .you cannot “see” into it. The test provides inputs and
responds to outputs without considering how the software works.
23
Unit Testing:
Unit testing is usually conducted as part of a combined code and unit test phase of the
software lifecycle, although it is not uncommon for coding and unit testing to be conducted as two
distinct phases.

Test Strategy and Approach


Field testing will be performed manually and functional tests will be written in detail.

Test objectives
 All field entries must work properly.
 Pages must be activated from the identified link.
 The entry screen, messages and responses must not be delayed.

Features to be tested
 Verify that the entries are of the correct format
 No duplicate entries should be allowed
 All links should take the user to the correct page.

Integration Testing
Software integration testing is the incremental integration testing of two or more
integrated software components on a single platform to produce failures caused by interface
defects.
The task of the integration test is to check that components or software applications, e.g.
components in a software system or – one step up – software applications at the company level –
interact without error.
Test Results: All the test cases mentioned above passed successfully. No defects encountered.

24
Acceptance Testing

User Acceptance Testing is a critical phase of any project and requires significant
participation by the end user. It also ensures that the system meets the functional requirements.
Test Results: All the test cases mentioned above passed successfully. No defects encountered.

25
REFERENCES

[1] Paul Viola, Michael J. Jones, Robust Real-Time Face Detection, International
Journal of Cumputer Vision 57(2), 2004.
[2] Ayushi Gupta, Ekta Sharma, NehaSachan and Neha Tiwari. Door Lock System
through Face Recognition Using MATLAB. International Journal of Scientific
Research in Computer Science and Engineering, Vol1, Issue-3, 30 June 2013.
[3] Daniel Georgescu, A Real-Time Face Recognition System Using Eigenfaces,
Journal of Mobile, Embedded and Distributed Systems, vol. III, no. 4, 2011.
[4] Ole Helvig Jensen, Implementing the Viola-Jones Face Detection Algorithm,
2008.
[5] M. A. Turk and A. P. Pentland. Eigenfaces for Recognition. Journal of
Cognitive Neuroscience, 3(1):71 - 86, 1991.
[6] M. A. Turk and A. P. Pentland. Face recognition using eigenfaces. IEEE
Computer SocietyConference on Computer Vision and Pattern Recognition, CVPR
91, pages 586 - 591, 1991.
[7] I.Yugashini, S. Vidhyasri, K.Gayathri Devi, Design And Implementation Of
Automated Door Accsessing System With Face Recognition, International Journal
of Science and Modern Engineering(IJISME), Volume-1, Issue-12, November
2013.
[8] Liton Chandra Paul, Abdulla Al Sumam. Face Recognition Using Principal
Component Analysis Method. International Journal of Advanced Research in
Computer Engineering & Technology (IJARCET),Volume 1, Issue 9, November
2012.

26

You might also like