You are on page 1of 9

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/316091971

Real-time face recognition for attendance monitoring system

Article · January 2017

CITATIONS READS
8 5,185

6 authors, including:

Shohel Sayeed Jakir Hossen


Multimedia University Multimedia University
83 PUBLICATIONS   676 CITATIONS    54 PUBLICATIONS   227 CITATIONS   

SEE PROFILE SEE PROFILE

Jayakumar Vaithiyashankar Ibrahim Yusof

5 PUBLICATIONS   12 CITATIONS   
Multimedia University
10 PUBLICATIONS   39 CITATIONS   
SEE PROFILE
SEE PROFILE

Some of the authors of this publication are also working on these related projects:

AI and Robotics View project

Design and implementation of a sustainable micro-grid system with high penetration of renewable energy which has interaction with PHEVs View project

All content following this page was uploaded by Shohel Sayeed on 01 January 2019.

The user has requested enhancement of the downloaded file.


Journal of Theoretical and Applied Information Technology
st
XX Month 201x. Vol. x No.x
© 2005 - 2016 JATIT & LLS. All rights reserved.

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195

REAL-TIME FACE RECOGNITION FOR ATTENDANCE


MONITORING SYSTEM

1
S. SAYEED, 2J. HOSSEN, 3S.M.A. KALAIARASI, 4V. JAYAKUMAR, 5I. YUSOF, 6A. SAMRAJ

1,3,4,5
Faculty of Information Science and Technology (FIST), Multimedia University (MMU), Malaysia
2
Faculty of Engineering and Technology (FET), Multimedia University (MMU), Malaysia,
6
Department of Information Technology, Mahendra Engineering College, India,
E-mail: 1shohel.sayeed@mmu.edu.my, 2jakir.hossen@mmu.edu.my, 3kalaiarasi@mmu.edu.my,
4
jayakumarksrit@gmail.com , 5ibrahim.yusof@mmu.edu.my, 6andrewsmalacca@gmail.com

ABSTRACT

Authentication is a momentous issue in controlling system in computer based globally. Human face
recognition has been widely used to be an important branch of biometrics verifications in many
applications such as door control, video monitoring system, networks security and also human
computer interactions. This paper presented an automated attendance monitoring system with face
recognition in a real-time background world for with a database of student’s information by using
Personal Component Analysis (PCA) algorithm. This task is very difficult as the real-time background
subtraction in an image is still a challenge. Addition to that, managing a database with multiple of
student information’s is also an extra challenge to this system. The proposed biometric system is a
real time attendance system based on the human face recognition with simple and fast algorithms
and most important is gaining a high accuracy rate.

Keywords: Automatic attendance, face recognition, authentication, biometric, Principal Component Analysis (PCA).

1. INTRODUCTION Recognition satisfies the following


characteristics, which qualify it for biometric
Face recognition has been the motivation
authentication (Jain, Ross, & Prabhkar, 2004).
for research around the globe. The interest and
Universality (have characteristic)
time frame of studies in this field is indicative of
1. Distinctiveness (have different
its value and complexity, and has become an
characteristic)
increasingly important form of biometric
2. Permanence (characteristic is will not
authentication. With the vast advancements in
be change in periods)
face recognition, more research should be done
3. Collectability (Threat measuring)
to improve the efficiency, practically and
accuracy of the many method produced. Face recognition started at after the
A genetic algorithm is chosen to be machine became more intelligent and had the
applied into face recognition for this project. advance to improve the abilities and sense of
Genetic algorithms are categorized as universal human (Hossein Sahoolizadeh, 2008). Reasons
search heuristics. Genetic algorithm is used in for attention on facial recognition technology:
computing as a technique for researches to find Applicability in various applications including in
the true or estimated solutions to enhance and content-based video processing system, law
explore problems. It uses techniques inspired by enforcement system and in security systems.
evolutionary biology such as mutation, The system is contactless so it does not require
inheritance, crossover and selection. Facial any user input. A contributing factors that

1
Journal of Theoretical and Applied Information Technology
st
XX Month 201x. Vol. x No.x
© 2005 - 2016 JATIT & LLS. All rights reserved.

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195


strongly appearance of face recognition these features do not contain enough unique
technology includes maturity of the digital data to represent an adult face. Another
camera technology with competitive price. approach is the Connectionist approach (Abibi,
Biometrics is mainly used for authentication 2000), which seeks to classify the human face
purposes and also refers to automatic using a combination of both range of gestures
recognition of an individual, “providing a right and a set of identifying markers. This is usually
person with the right privileges, and the right implemented using 2-dimensional pattern
access at the right time”. Examples of particular recognition and neural net principles. Most of
applications include accessing to constructions, the time this approach requires a huge number
workstation systems, computer and cellular of training faces to achieve decent accuracy; for
phones. that reason it has yet to be implemented on a
By that, securities could authorize an large scale. The first fully automated system (Y.
individual’s identity depending on “who she is”, Cui, 1992) to be developed utilized very general
and not “what she has” and “what she could pattern recognition. It compared faces to a
remember”. Depending on application generic face model of expected features and
framework, biometrics system is operates under created a series of patters for an image relative
two modes, verification and identification mode to this model. This approach is mainly statistical
(Laha, 2008). and relies on histograms and the gray scale
This research mainly encompassed of value.
implementation of real-time face recognition for More elaborately, biometrics is “any
attendance monitoring system. As more propel automatically measurable, robust and distinctive
advancements are received by institutions or physical characteristic or personal trait that can
universities, they are as yet confronting the issue be used to identify an individual or verify the
of monitoring student attendance. claimed identity of an individual” (Jain, Ross, &
Most of the universities including MMU is Prabhkar, 2004).Facial recognition is a type of
so far grasping the ordinary procedures for biometrics. Iris scan, retinal scan, voice and
passing the attendance sheet around the class fingerprint recognition are other methods of
for participation recording. To overcome that biometric recognition. Two main classes can be
issue, this research exhibited a system in which found in biometrics:
participation administration can be made Physiological – It is associated with the body
mechanised by face recognition. Automated face shape, includes all physical traits, iris, palm
recognition attendance monitoring is extremely print, facial features etc. Fingerprints are the
useful in sparing profitable time of the students oldest biometrics which is used in ages of years
and lecturers. before.
Behavioural – Related to the behavioural
2. BACKGROUND OF THE RESEARCH characteristics of a person. A characteristic
widely used till today is signatures. Modern
The first attempts to use face recognition
methods of behavioural studies are emerging
began in the 1960’s with a semi-automated
such as keystroke dynamics and voice analysis.
system. Marks were made on photographs to
locate the major features; it used features such
2.1 Fingerprint
as eyes, ears, noses, and mouths. Then distances
The accuracy of matching for fingerprints
and ratios were computed from these marks to a
has proven for its effectiveness, and is
common reference point and compared to
considered to be the fastest method for
reference data.In the early 1970’s Goldstein,
biometric identification (Jain, Ross, & Prabhkar,
Harmon and Lesk (A.J Goldstein, L.D Harmon,
2004). Fingerprints are secure, unique and are
and A.B Lesk, May 1971)created a system of 21
not interchangeable. Systems that use
subjective markers such as hair colour and lip
fingerprint recognition are known to be cheap,
thickness. This proved even harder to automate
easy to use and achieve acceptable levels of
due to the subjective nature of many of the
accuracy. Forensic applications uses fingerprint
measurements still made completely by hand.
recognition broadly. Fingerprint-based has
Fisher and Elschlagerb (M.A Fischler and R.A
proven the biometrics most and it widely shares
Elschlager, 1973) approaches to measure
in the market. Not only is it faster than other
different pieces of the face and mapped them all
techniques but also requires less energy to
onto a global template, which was found that

2
Journal of Theoretical and Applied Information Technology
st
XX Month 201x. Vol. x No.x
© 2005 - 2016 JATIT & LLS. All rights reserved.

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195


operate. Ridges and valleys which appeared on 2006)which are keystroke duration and
the surface of the fingertip formed the keystroke latency. The best result was found
fingerprint pattern. A minutia is formed by the when combined those two characteristics
endpoints and the crossing points of ridge. together.
Minutiae pattern of each person is unique and it
remains the same for one’s life. 2.5 Odour
Every human carries an order that is an
2.2 Voice
individual of its biological composition. Altered
Physiological and behavioural biometrics
odour is used to differentiate between several
is combined to formed voice biometrics.
people. An aroma of surrounding of a person
Different shape and sizes of the appendages such
that flew over an array of biological sensors
as mouth, lips and nasal cavities give an
could detect an individual. The element odour
individual voice to human. Individual’s
produced by a person or a creature’s body is a
physiological characteristic of human voice
characteristic of an individual. Various biological
remain the same for life. However, behavioural
compositions of the surrounding and the
aspects of the speech of a person change due to
deodorant smells of an individual could affect
age. For huge database identification for voice
the results of odour biometrics.
recognition, it is not reliable and also not
applicable. Based on the repetition of an
2.6 Facial, hand, vein infrared thermo
encoded phrase, text- dependent voice
gram
recognition system is formed (Jain, Ross, &
Every human body has an individual
Prabhkar, 2004). This system does recognize
pattern of heat radiate. An infrared camera can
independent speaker speech. A difficulty level to
function much likely a regular photograph that
form a text-independent system is higher
can sense the heat of individuals. A them gram-
depending to design a text-dependent system
based system is contactless and is non-invasive.
but it provides more security against scam.
When heats are presented nearby the body,
image acquisition became a challenge (Jain, Ross,
2.3 Signatures
& Prabhkar, 2004). A technology with near
The characteristic of an individual’s
infrared imaging is used to scan the back of
signature is defined in the way the name is
clenched to determine the hand vein structure.
signed. Signatures is a biometrics that is
The value of the infrared sensors has inhibits the
accepted as a method of verification by
global use of thermo grams.
government and commercial transactions
although it is require to be contact with writing
2.7 Palm Print
instrument. A professional imitator can easily
Humans palm are much likely the
replicate signatures to login any system.
fingerprints which contain the pattern of valleys
Signatures are affected by behaviour that change
and ridges. The palm has a larger area than a
over a period of time and are influenced by
finger. In consequence, palm prints are more
physical and emotional conditions of the
distinctive than the fingerprints. Palm print
signatories. Signature biometrics has some of
scanner is slightly larger and expensive than a
the advantages, such as imitator could easily
fingerprint sensor since it is needed to capture a
forge a signature, but it is very challenging to
larger area. A lower resolution scanner will not
imitate an exact behaviour of signing (Jain, Ross,
be able to scan the additional characters such as
& Prabhkar, 2004). Moreover, it has a Low False
wrinkles so it would be cheaper. However when
Acceptance Rates (FAR).
a high-resolution palm print scanner is used, to
construct an accurate biometric data template,
2.4 Keystroke
features including ridge and valley, hand
Keystroke patterns are believed to vary
geometry, and wrinkles could be combine (Goh,
from individuals. Keystroke do offers necessary
Connie, & Teoh, 2010b).
discriminatory information to permit identity
verifications. When a user is keying in the 2.8 Hand and Finger Geometry
information, keystrokes of the user will be Hand geometry recognition systems used
monitored unobtrusively. Two characteristics of the measurements of the human hands,
keystroke dynamics were tested in recent including the width, length, thickness and
experiments, (Boechat, Ferreira, & Carvalho, curvature of the fingers and palm. This system

3
Journal of Theoretical and Applied Information Technology
st
XX Month 201x. Vol. x No.x
© 2005 - 2016 JATIT & LLS. All rights reserved.

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195


uses a digital camera and light to measures hand  Detect the presents of a face in the image
and finger geometry. The technique is simple,  Automatic in locating the face
relatively user friendly and inexpensive. This  Face could be recognize in any view point
system is installed globally, for example, Disney  Capture good quality images under any
theme park use finger geometry readers to grant environment.
ticket holder admittance. Different Nevertheless, the most attractive feature
environmental factor such as dry skins will not of face recognition system is the systems could
affect the accuracy of verification in this system. still operate with or without the knowledge of
Hand geometry recognition system has a the subject. Face recognition system can
negative review for verifications identity of a typically use with combinations of tasks includes
large population. Furthermore, personal verification, identification and watch list. Each of
jewelleries may lead to be the challenge of that represents distinctive challenges to the
extracting accurate hand geometry information. implementation of face recognition as well as
Hand geometry system may not be installed in other biometrics.
devices such as laptop, as the physical size the
system is huge. In recent studies, a new 3. PROPOSED METHODOLOGY
verification system is implemented. The system By implementing the real-time face
measures only a few fingers but not the entire recognition attendance monitoring system, the
palm and the size of the devices is smaller attendance can be recorded more efficiently. The
comparing with hand geometry devices. proposed system updates the attendance
automatically once the student face is match
2.9 Face Recognition for Student with the template database.
Attendance Monitoring System: The proposed system is able to identify
Facial recognition system is widely used the user and reject the student if they try to
for identifying and verifying an individual by enter the wrong class or not in the correct time.
using digital camera or a video camera from a Face recognition for attendance monitoring
video source (Bhattacharyya, R, Alisherov, & system is developed by extraction image from
Choi, 2009). Reasons of implementing face the webcam.
recognition biometrics in attendance monitoring Implementing real-time face recognition
system, includes it use legacy database, for monitoring student attendance involving
integrating with surveillance system and capture three phases, which include face region
images of people in a public area. The facial detection, template extraction and face
recognition applications range from a recognition using genetic algorithms. In the first
motionless, “mug-shot” verification into the phase, face region detection itself is divided into
uncontrolled face identification in a disorder four sub-phases, including image acquisition,
environment such as airport (Jain, Ross, & face detection, straightening of face and
Prabhkar, 2004). Face recognition is cropping of face.
characterized as a system that functions This system is using Principle Component
accurately under stabilize condition. Famous Analysis approach to recognize face
approaches for face recognition including: The characteristic. PCA is used because of its
formations of the face attributes such as the simplicity. The system generates eigenface and
ears, eyebrows, eye, lips, nose and chin, and does matching process by comparing the
their three-dimensional relationships. Analysis eigenface from the captured image with the
of facial images that can represent a face as a image from the template database.
weighted combination of a number of recognised
faces. Recognizing a face mages captured of two 3.1 PCA (Principal Component Analysis
images under a different environment such as PCA method has been widely used in
with or without sunlight, is the difficulties of face applications such as face recognition and image
recognition system. It is a doubt; when an compression. PCA is a common technique for
insufficient basis together with some unrelated finding patterns in data, and expressing the data
information is obtain to recognize an individual as eigenvector to highlight the similarities and
from a group of people with a high level of differences between different data (Liu, 2000).
confidence. For a perfectly practice facial The following steps summarize the PCA process.
recognition system, it should automatically:

4
Journal of Theoretical and Applied Information Technology
st
XX Month 201x. Vol. x No.x
© 2005 - 2016 JATIT & LLS. All rights reserved.

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195


1. Let {D1,D2,…DM} be the training data tiles and not the whole images is main the
reason CLAHE was chosen as the contrast
set. The average Avg is defined by:
enhancement technique.
The contrast of every tile’s is improved
separately and the neighbouring tiles are jointed
using bilinear interpolation to abolish artificially
induced boundaries. Contrast is controlled to
prevent amplifying noises that represents in the
image, especially the homogenous areas (Aswini
2. Each element in the training data set kumar mohanty, 2011). Face image will then be
differs from Avg by the vector Yi=Di- cropped by the system and do histogram
Avg. The covariance matrix Cov is equalization.
obtained as:
3.3 Feature Extraction
For feature extraction phases, the
proposed system used the Principal Component
Analysis (PCA). The image matrix have to be set
as a starting point for the PCA analysis.
3. Choose M’ significant eigenvectors of After the image matrixes are set, the mean
Cov as EK’s, and compute the weight of each data dimensions is subtracted. The
vectors Wik for each element in the subtracted mean are the average from each
training data set, where k varies from 1 dimensions. Formula below shows how mean is
to M’. calculated.

3.2 Image Acquisition


Face recognition for student attendance
monitoring system obtained images by
Calculating the covariance will be the next step.
interfacing a web camera where image is
The Covariance formula is:
capture with an automated light sensor. Thus it
is efficient enough to use a webcam for face
recognition system. Webcam is connected with
MATLAB build-in function “Video input” during After calculating the covariance, system
image acquisition. will calculate the eigenvectors of the covariance
Pre-processing matrix. Then choose the eigenvector of the
After of capturing the images, the
components and form a feature vector. Finally, a
proposed system proceed to the image pre-
result from the product of row featuring vector
processing phase. The detected face is then pre- and row data adjust is be the final data.
processed by removing undesirable noise and
contrast is enhanced. The middle pixel of the
mask will then replace by median filter with the
median value of all other pixels in the mask Row feature vector from the formula is
because median filter is an effective the matrix with the eigenvectors in the columns
neighbourhood averaging method. transposed and Row data adjust will be the
Besides, the median filter is also an adjust data transpose. Final data be the final data
effective method that can suppress isolated set, which include the data items in columns and
noise with sharp edges (Brunelli, 1993). dimensions in rows.
Precisely, all pixels in the neighbourhood are
replaced by a pixel with the median filter. 3.4 Matching Process
To enhance the contrast, method Contrast In this process, the extracted image is
Limited Adaptive Histogram Equalization compared with the image in the template
(CLAHE) is needed. CLAHE is ordinary database. This process uses Euclidian Distance
histogram equalization and a generalization of to calculate the distance between 2 vectors of n
robust histogram equalization (Shivram, 2010). elements.
Operating of a small areas in the image, named

5
Journal of Theoretical and Applied Information Technology
st
XX Month 201x. Vol. x No.x
© 2005 - 2016 JATIT & LLS. All rights reserved.

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195


attendance monitoring system. The testing
results have been tested and taken from few
different environment backgrounds. Basically is
during the day and night time with lights either
A matching score is produced after the
on or off. A testing table 1 is created below to
matching process. Matching score would be
collect all the testing results. There are several
concluded depending on the threshold score that
student photos tested in the table.
have been set before.
By generating this table, the researchers
sets the threshold for the proposed system
3.5 Decision
based on the different type of environments.
After the overall process, the proposed
Based on the table 1, the researchers
system shows a result either accepted or
choose the lowest and the highest threshold
rejected based on the threshold. Student’s
score from all the different tested photos. Table
attendance is recorded if the result is matched
2 below shows the range of the threshold tested
during the matching notifications. The system
and an average successful rate is concluded.
shows the matching notification and record the
student attendance if the result is matched. Table 2: Environments Testing Threshold
Otherwise, the system rejects the student by (Euclidian Distance)
showing the error message.
Average
4. EXPERIMENTS AND RESULTS Time / Lights Lights Successful
Environments On Off Rate
Table 1: Euclidian Distance from System Testing Day 1.25 1.67
Based on Different Environments to to 2.43
Several tests are conducted to check the 3.17 3.64
performance of the real-time face recognition for Night 1.48 1.50
to to 2.81
Student Day Day Night Night Lowest &
3.27 6.00
Tested Light Light Light Light Highest
Photos On Off On Off Rate
1.25 The researchers set the threshold for the
& proposed face recognition system based on the
1.25 1.28 1.49 1.50 output threshold of the results obtained. Since
1.50
the highest threshold in this system tested is
4.9968, the threshold in this system is set not to
1.48
be more than 6.00. The system only accepts the
1.77 2.10 1.48 1.65 &
2.10 user below the threshold set and stated the user
as an imposter when the threshold is more than
the threshold set.
1.87 Update the students attendances: During
2.02 1.87 2.15 2.39 & the decision making, a threshold known as the
2.39 minimum value is set. The user is
acknowledged as an authorized person when
the matching score is same or less than the
2.85
3.16 3.30 2.85 2.95 & threshold. On the other side, when the
3.30 matching score is more than the threshold, the
user will be acknowledged as an unauthorized
person.
2.40 After that, the system checks whether the
2.40 2.45 3.27 3.58 & person is belongs to that selected subject or
3.58 not right after the system recognized the face.
If the selected subject is correct, the system
automatically updates the student’s attendance
1.26
&
to the database
1.26 1.46 1.66 1.52
1.66

6
Journal of Theoretical and Applied Information Technology
st
XX Month 201x. Vol. x No.x
© 2005 - 2016 JATIT & LLS. All rights reserved.

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195


5. CONCLUSION achieved the minimum matching score of the
This research mainly comprised of threshold value, the student is recognized as a
implementation of real-time face recognition for legitimate user. The system automatically
attendance monitoring system. As more and updates the attendance into the database when a
more advanced technologies are adopted by legitimate user is assured.
institutions or universities, they are still facing Moreover, the attendance rate of the
the problem of monitoring student attendance. student is monitored and analyse after the time
Most of the universities including MMU are still period of attendance taking is over. If the
adopting the traditional methods of passing the student’s attendance rate falls below eighty
attendance sheet around the class for attendance percent, a reminder message is generated by the
recording. To overcome that problem, this system to warn the students. An Short Message
research presented a framework which Services (SMS) is also be sent to students phone
attendance management can be made as an extra point of reminding to the students.
automated by face recognition. Automated face
recognition attendance monitoring is very 6. REFERENCES
helpful in saving valuable time of the student
and lecturers, paper and generating report at [1] Andrea F. Abate, M. N. (2007). 2D and 3D
required time. face recognition.
Implementing this real-time face [2] Aswini kumar mohanty, S. k. (2011). IJCSI
recognition system basically involving three International Journal of Computer Science
main phases, which include face region Issues, Vol. 8, Issue 5, No 3,.
detection, template extraction, and face [3] Bauer, J. O. (2006). The Basics of MATLAB.
recognition. By the way, this system is proposed Bhattacharyya, D., R, R., Alisherov, F., &
to be implemented with the low attendance rate Choi, M. (2009). Biometric Authentication: A
mobile alert, which sends an SMS to particular Review. International Journal of u- and e-
parents when the attendance rate of students Service, Science and Technology.
are below the enforced rate. [4] Boechat, G. S., Ferreira, J. C., & Carvalho, E.
Up to this point, Principal Common (2006). Using the Keystroke Dynamic for
Analysis is used in this system as a method of System of Personal Security. World Academy
extracting the feature of images. PCA is used of Science, Engineering and Technology.
because of simplicity and its high accuracy. [5] Brunelli, R. (1993). Face recognition: features
Moreover, the matching rate of face recognition versus templates. Pattern Analysis and
using PCA is good based on the past research. Machine Intelligence, IEEE Transactions on,
1042-1052.
Before the feature extraction process, all input
[6] Cheng, J.-M. (2004). A method of estimating
images are extracted and converted from RGB
the equal error rate for automatic speaker
into grayscale images. Then, the system starts
verification.
the histogram equalization in order to enhance
[7] Diane Teng, S. L. (2009). Automated
the image and the picture is resized so that all
Students Attendance System. EngD thesis,
images will have the same size.
Universiti Teknologi PETRONAS.
In the proposed system, students have to
[8] Goh, M., Connie, T., & Teoh, A. (2010b).
proceed to the enrolment process in order for
Locating Geometrical Descriptors for Hand
the system to monitor their attendance. During Biometrics in a Contactless Environment.
the enrolment process, students have to input International Symposium on Information
their information and also provide three face Technology. Kuala Lumpur, Malaysia.
images as a template. After that, the system is [9] Hossein Sahoolizadeh, M. R. (2008). Face
able to recognize the student and differentiate Recognition Using Morphological . World
the student with legitimate user or an imposter Academy of Science, Engineering and
results. System will make the decisions Technology.
depending on the threshold value set before. [10] Hsuan Wang, C., Chuan Wei, C., & Hao Li,
During the recognition process, test C. (2010). ICCCI'10 Proceedings of the
images is compared with the image stored with Second international conference on
student information from the database. Computational collective intelligence:
Euclidian distance is used to calculate the technologies and applications - Volume Part
distance between the two images. If the student II. 232-238.

7
Journal of Theoretical and Applied Information Technology
st
XX Month 201x. Vol. x No.x
© 2005 - 2016 JATIT & LLS. All rights reserved.

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195


[11] Jain, A. K., Ross, A., & Prabhkar, S. (2004).
An Introduction to Biometric Recognition.
Appeared in IEEE Transactions on Circuits
and Systems for Video Technology, Special
Issue on Image- and Video-Based Biometrics,
Vol 14, No.1.
[12] Laha, J. (2008). Biometric Techniques -
Enhancing Security Standards In High
Performance Enterprise. Retrieved from
ezinearticles:
http://ezinearticles.com/?Biometric-
Techniques---Enhancing-Security-Standards-
In-High-Performance-
Enterprise&id=1224599
[13] Shivram, J. (2010). Computer and
Automation Engineering (ICCAE). The 2nd
International Conference, (pp. 220-224).
Bangalore, India.

View publication stats

You might also like