You are on page 1of 21

II Year Industrial Training Report 2023-24

A PROJECT REPORT
ON
FACE DETECTION SYSTEM
Submitted in Partial fulfillment for the award of degree of Bachelor of Technology
in (Data Science)

SESSION 2023-24

Mentor Submitted By
Mr. Praveen Kumar Yadav DISHANK JAIN
Assistant Professor, CSE, SKIT 22ESKCA031

Coordinator: Head of Department:


Neha Mathur Dr. Mukesh Kumar Gupta
Assistant Professor, CSE, SKIT Professor & Head, CSE, SKIT

DEPARTMENT OF COOMPUTER SCIENCE & ENGINEERING


SWAMI KESHVANAND INSTITUTE OF TECHNOLOGY, MANAGEMENT AND
GRAMOTHAN

RAMNAGARIA (JAGATPURA), JAIPUR-302017

October, 2023

Designed By : Dishank Jain , 22ESKCA031 1


II Year Industrial Training Report 2023-24

ACKNOWLEDGEMENT
It is my pleasure to be indebted to various people, who directly or indirectly contributed in the
development of proposed work and who influenced my thinking, behavior, and acts during the course
of study.

I express my sincere gratitude to Dr. Mukesh Kumar Gupta, Professor and Head, Department of
Computer Science and Engineering for providing me an opportunity to undergo In-house Internship
programme at SKIT, Jaipur. I am thankful to Neha Mathur, Coordinator (II year In-house internship
2022-23), for his support, cooperation and motivation provided during the internship for constant
inspiration, presence and blessings.

I also extend my sincere appreciation to Mr. Praveen Kumar Yadav who flourished and helped me
in lab sessions conducted during internship and helped me in learning Machine Learning.

I also extend my sincere appreciation to Mr. Pawan Kumar Patidar who provided his valuable
suggestions and precious time in accomplishing my report.

At last I must express my sincere heartfelt gratitude to all the staff members of Department of
Computer Science and Engineering , who helped me directly or indirectly during this course of
work.

Shreyansh Sharma

22ESKCX105

Designed By : Dishank Jain , 22ESKCA031 2


II Year Industrial Training Report 2023-24

TABLE OF CONTENTS
1 Introduction

1.1 Problem Identification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1.2 Project Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1.3 Intended Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1.4 Tools and Technologies to be used . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1.4.1 1. Data Collection: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1.4.2 2. Data Preprocessing: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1.4.3 3. Model Development: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1.4.4 4. Model Evaluation: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1.4.5 5. Model Deployment: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1.4.6 6. Data Management and Storage: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1.4.7 7. Monitoring and Maintenance: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

1.4.8 8. Documentation and Reporting: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

2 Methodology for Machine Learning :

2.1 1. Software model used: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

2.2 2. Product Features: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

2.3 3. Product User Interfaces: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

2.4 4. Design and Implementation Constraints: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

3 Dependencies

3.1 1. Data Dependencies: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

3.2 2. Software Dependencies: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

3.3 3. Hardware Dependencies: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Designed By : Dishank Jain , 22ESKCA031 3


II Year Industrial Training Report 2023-24

3.4 4. Domain Expertise Dependencies: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . .

3.5 5. Project Management Dependencies: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

3.6 6. Ethical and Legal Dependencies: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

3.7 7. Stakeholder Engagement: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . .

4 Functional Requirements

4.0.1 1. Data Collection: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

4.0.2 2. Data Preprocessing: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

4.0.3 3. Model Development: . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . .. . . . .

4.0.4 4. Model Training: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . .. . . .. . . .. .

5 Nonfunctional Requirements

5.1 1. Performance: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

5.2 2. Accuracy: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

5.3 3. Data Quality: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . .

5.4 4. Interpretability: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

5.5 5. Compliance and Ethics: . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . .

6 Implementation and Testing

6.1 Code Snippets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

7 Conclusion and Future Scope

References

Designed By : Dishank Jain , 22ESKCA031 4


II Year Industrial Training Report 2023-24

CHAPTER 1

INTRODUCTION

1.1 Problem Identification


In this project we aim to make a facial recognition system. Face recognition systems rely on a large
amount of labeled training data to accurately recognize faces. However, collecting a representative
dataset with diverse faces can be challenging, leading to biased or inaccurate results.

1.2 Project Scope


The project scope of the face recognition system using machine learning (ML) involves developing a
system that can accurately identify and verify individuals based on their facial features. The ML
algorithms will be trained on a dataset of facial images to learn and recognize unique facial patterns
and characteristics. The system will have the capability to detect faces in images or video streams, and
then extract relevant facial features such as eyes, nose, and mouth.

1. Project Overview: Facial recognition systems have been widely deployed for various purposes,
including access control, law enforcement, surveillance, and personal device authentication. These
systems offer advantages such as speed, convenience, and accuracy in identifying individuals.
However, there are concerns regarding privacy, security, and potential bias, which have prompted
discussions around ethical and legal frameworks for their use.

2. Data Collection: Collect data from various faces, including data of faces from every angle to get
more precision and online listings. Ensure data quality and consistency, and validate data sources for
accuracy.

3. Data Preprocessing: Handle missing data by applying appropriate imputation techniques. Address
outliers and anomalies to improve data quality. Feature engineering to create relevant features for the
model. Data scaling and normalization for model compatibility.

Designed By : Dishank Jain , 22ESKCA031 5


II Year Industrial Training Report 2023-24

4. Model Selection: Explore a variety of machine learning algorithms suitable for regression tasks.
Experiment with algorithms like linear regression, decision trees, random forests, gradient boosting,
and neural networks. Select the most suitable model based on performance metrics, interpretability,
and scalability.

5. Model Training and Evaluation: Split the dataset into training, validation, and test sets. Train the
selected model using the training dataset. Perform hyperparameter tuning to optimize model
performance. Evaluate the model using appropriate regression metrics (e.g., RMSE, MAE, R-squared)
on the validation and test sets. Address overfitting and underfitting issues.

6. Model Deployment: Deploy the final model in a production environment, making it available for
predictions. Create a user-friendly interface for consumers and car dealerships to input car details and
receive price estimates.

7. Ongoing Monitoring and Maintenance: Implement regular model retraining to adapt to changing
market dynamics and data updates. Continuously monitor model performance and re-evaluate its
accuracy. Address data drift and model degradation over time.

8. Documentation and Reporting: Maintain detailed documentation of the project, including data
sources, preprocessing steps, model selection, and training processes. Generate regular reports on
model performance and insights derived from the model.

9. Timeline and Milestones: Define a project timeline with clear milestones, including data
collection, preprocessing, model development, testing, and deployment. Regular progress updates and
milestone reviews.

10. Resources and Team: Specify the team members responsible for data collection, preprocessing,
model development, and deployment. Identify the required hardware and software resources.

11. Compliance and Ethics: Ensure compliance with data protection and privacy regulations.
Maintain ethical practices in data collection and usage.

Designed By : Dishank Jain , 22ESKCA031 6


II Year Industrial Training Report 2023-24

1.3 Intended Users


The intended users for a facial recognition system can vary depending on the specific application or
use case. Here are some examples:

Law enforcement agencies: Facial recognition systems can help identify suspects, track individuals of
interest, and enhance public safety.

Border control and airport security: Facial recognition systems can verify the identity of travelers,
detect fraudulent passports, and expedite the immigration process.

Government agencies: Facial recognition systems can be used for identity verification in issuing
government IDs, voter registration, or welfare distribution.

Banks and financial institutions: Facial recognition systems can enhance security by providing
biometric authentication for accessing accounts or making transactions.

Mobile device manufacturers: Facial recognition systems can enable biometric unlock features and
secure user authentication on smartphones and tablets.

Entertainment venues: Facial recognition systems can enhance the visitor experience by recognizing
VIP guests, personalizing interactions, or providing targeted promotions.

Retailers: Facial recognition systems can be used to track customer demographic data, monitor foot
traffic, prevent shoplifting, or offer personalized shopping experiences.

Smart home manufacturers: Facial recognition systems can enable personalized automation, security
control, or access management within smart homes.

Event organizers: Facial recognition systems can be used for attendee check-in, crowd management,
identifying VIP guests, or enhancing the overall event experience.

Educational institutions: Facial recognition systems can perform attendance tracking, enhance campus
security, or provide access control to restricted areas.

1.4

Designed By : Dishank Jain , 22ESKCA031 7


II Year Industrial Training Report 2023-24

1.4 Tools and Technologies to be used


A machine learning project on face recognition system involves various stages, from data collection to
model deployment. Here are the tools and technologies commonly used in each stage of the project.

1. Data Collection:
Web Scraping Tools: Tools like Scrapy, Beautiful Soup, or Selenium for extracting data from websites
and online car listings.

APIs: To access and collect data from automotive databases and platforms. Database Management
Systems: Such as MySQL, PostgreSQL, or NoSQL databases like MongoDB for storing and managing
collected data. Data Integration Tools: Like Apache Nifi for processing and integrating data from
multiple sources.

2. Data Preprocessing:
Python Libraries: Pandas for data manipulation, cleaning, and transformation. Data Visualization
Tools: Matplotlib, Seaborn, or Plotly for data exploration.

Data Cleaning Tools: OpenRefine or Trifacta for data cleaning and handling missing values. Feature
Engineering Tools: Scikit-learn for creating new features or encoding categorical data.

3. Model Development:
Machine Learning Frameworks: Scikit-learn for traditional machine learning models (e.g., regression,
decision trees). TensorFlow and PyTorch for deep learning models, such as neural networks.

AutoML Tools: Auto-sklearn, H2O.ai, or TPOT for automated machine learning pipeline generation
and model selection. Hyperparameter Tuning grid search, random search, or Bayesian optimization
libraries like Optuna.

Model Interpretability Libraries: SHAP, LIME, or InterpretML for understanding model predictions.

4. Model Evaluation:
Performance Metrics: Scikit-learn for calculating metrics like Mean Absolute Error (MAE), Root Mean
Squared Error (RMSE), and R-squared (R2).

Designed By : Dishank Jain , 22ESKCA031 8


II Year Industrial Training Report 2023-24

Cross-Validation Tools: K-fold cross-validation for assessing model generalization. Model Selection
Tools: Grid search and cross-validated performance evaluation to choose the best model.

5. Model Deployment:
Web Development Frameworks: Flask, Django, or FastAPI for creating web applications to deploy the
model.

Cloud Services: Platforms like AWS, Google Cloud, or Azure for scalable model deployment.

Containerization Tools: Docker for packaging the application and model into containers.

API Development Tools: Tools like Swagger or FastAPI for creating RESTful APIs. DevOps and CI/CD:
Jenkins, Travis CI, or GitLab CI for continuous integration and deployment.

6. Data Management and Storage:


Data Warehousing: Tools like Amazon Redshift, Google BigQuery, or Snowflake for large-scale data
storage and analytics.

Data Version Control: Git or tools like DVC (Data Version Control) for tracking changes in data.

Data Lake Solutions: AWS S3, Azure Data Lake Storage, or Google Cloud Storage for managing large
datasets.

7. Monitoring and Maintenance:


Logging and Monitoring Tools: ELK Stack (Elasticsearch, Logstash, Kibana), Prometheus, Grafana for
tracking model performance and system health.

Alerting Systems: Tools like Nagios or Prometheus Alert manager for real-time alerts on anomalies.

Model Retraining: Automate model retraining pipelines using platforms like Kubeflow or Airflow.

Interpreted Language: Python is an interpreted language, which means you can write and execute
code line by line, making it suitable for rapid development and debugging.

Designed By : Dishank Jain , 22ESKCA031 9


II Year Industrial Training Report 2023-24

8. Documentation and Reporting:

Documentation Tools: Jupyter Notebooks, Markdown, or tools like Sphinx for creating project
documentation.

Reporting Tools: Jupyter Notebooks, tools like Jupyter Dashboards, or business intelligence platforms
like Tableau or Power BI for generating reports. The specific tools and technologies chosen for a car
price prediction project can vary depending on project requirements, team expertise, and
infrastructure. It’s essential to select the most suitable tools for each stage to ensure the project’s
success.

Designed By : Dishank Jain , 22ESKCA031 10


II Year Industrial Training Report 2023-24

CHAPTER 2

METHADOLOGY FOR MACHINE LEARNING

1. Software model used :

One commonly used software model for facial recognition systems using machine learning is a
convolutional neural network (CNN). CNNs are effectively applied in facial recognition because they
can autonomously learn and extract relevant features from face images.

2. Product Features :

a. Face detection: The facial recognition system using machine learning should be capable of
accurately detecting human faces in images or video streams.

b. Face alignment: It should be able to align detected faces to a standardized format for better
recognition accuracy.

c. Feature extraction: The system should utilize machine learning algorithms to extract important
facial features, such as the positions of eyes, nose, and mouth, from the detected faces.

d. Face representation: It should convert the extracted features into a unique representation, often
referred to as a face template or face embedding, which can be used for comparison and
identity matching.

e. Enrollment: The system should allow the enrollment of individuals by capturing their facial
images and storing their face templates securely in a database.

f. Identity verification: It should be able to compare an input face against the enrolled face
templates in the database to determine if the two faces belong to the same person or not.

g. Identity recognition: The system should also have the capability to recognize individuals from
a large database or a live video stream, by matching the input face to the stored face templates.

h. Liveness detection: To prevent spoofing or fraudulent attempts, the system can include liveness
detection mechanisms to validate if the presented face is from a live person and not a photo or
video.

Designed By : Dishank Jain , 22ESKCA031 11


II Year Industrial Training Report 2023-24

i. Performance optimization: Machine learning techniques can be utilized to optimize the


performance of the facial recognition system, such as reducing false positives, increasing
accuracy, and improving speed.

j. Privacy protection: The system should incorporate privacy protection measures, such as secure
data storage and compliance with privacy regulations, to ensure the confidentiality and safety
of user information.

3. Product User Interfaces :


Enrollment Interface: This interface allows users to enroll their facial features into the facial
recognition system. It captures multiple images of the user's face from different angles and
registers them in the system for future reference.

4. Design And Implementation Constraints :

One of the primary constraints is data availability. Collecting a large dataset of labeled facial images is
essential to train the ML model effectively. However, obtaining a diverse and representative dataset
can be challenging and time-consuming. It requires careful consideration of factors such as ethnicity,
age, gender, and pose variations to ensure the system can accurately recognize faces from different
demographics.

Another constraint is computational resources. ML algorithms often involve computationally intensive


operations, especially when dealing with large datasets or complex models. Designing an efficient and
scalable system requires optimizing the algorithms and utilizing appropriate hardware resources, such
as GPUs or dedicated ML accelerators.

Designed By : Dishank Jain , 22ESKCA031 12


II Year Industrial Training Report 2023-24

CHAPTER 3

DEPENDENCIES

1. Data Dependencies :
Data Quality: Ensuring that the collected data is accurate, complete, and free from errors or
inconsistencies. Data Privacy: Compliance with data protection regulations and obtaining
necessary permissions to use the data.

2. Software Dependencies :
Machine Learning Libraries: Tools like Scikit-learn, TensorFlow, or PyTorch for model
development. Web Development Frameworks: If creating a user interface, frameworks like
Flask, Django, or FastAPI for web application development. Database Management Systems: If
data storage is involved, databases like MySQL, PostgreSQL, or NoSQL databases like
MongoDB. Data Preprocessing Tools: Libraries like Pandas and Numpy for data cleaning and
transformation. Deployment and Scaling Tools: Platforms like AWS, Google Cloud, or Azure
for deploying and scaling the model.

3. Hardware Dependencies :
Compute Resources: Sufficient computational power, which may include CPU and GPU
resources for model training and deployment. Storage: Adequate storage capacity for data
storage and model artifacts.

4. Domain Expertise Dependencies :


Automotive Knowledge: A team with domain knowledge in the automotive industry to
understand the significance of car features, market dynamics, and trends. Data Science

Designed By : Dishank Jain , 22ESKCA031 13


II Year Industrial Training Report 2023-24

Expertise: Data scientists and machine learning experts who can build, train, and evaluate
machine learning models effectively.

5. Project Management Dependencies :


Project Team: A dedicated and skilled project team with clear roles and responsibilities. Project
Plan: A well-defined project plan outlining tasks, timelines, and milestones. Budget: Adequate
budget for data acquisition, software licenses, hardware resources, and personnel.

6. Ethical and Legal Dependencies :


Data Privacy Regulations: Compliance with data protection regulations, ensuring user data
privacy and consent where applicable. Ethical Considerations: Adherence to ethical practices in
data collection and model deployment.

7. Stakeholder Engagement :
Feedback and Validation: Involvement of stakeholders, including consumers, car dealerships,
and industry experts, for feedback and validation of the model’s accuracy and utility.

Designed By : Dishank Jain , 22ESKCA031 14


II Year Industrial Training Report 2023-24

CHAPTER 4

FUNCTIONAL REQUIREMENTS
Functional requirements are specific features and capabilities that a machine learning project on
facial recognition system should possess to fulfill its objectives. Here are some function
requirements for such a project.

1. Data Collection:
The data collection process in a face recognition system using machine learning (ML)
involves capturing and storing different aspects of individuals' faces for training and
improving the system algorithm.

2. Data Preprocessing:
Data preprocessing is essential to clean, transform, and prepare the dataset for model
training. This includes handling missing values, outliers, and encoding categorical
variables.

3. Model Development:
The project should involve the development of a machine learning model specifically
designed for car price prediction. Consider the use of regression models, ensemble
methods, or deep learning approaches based on performance requirements.

4. Model Training:
The system should include a training phase where the model learns from historical car price
data. Hyperparameter tuning and cross-validation should be part of the training process to
optimize model performance.

Designed By : Dishank Jain , 22ESKCA031 15


II Year Industrial Training Report 2023-24

CHAPTER 5

NONFUNTIONAL REQUIREMENTS
Non-functional requirements define the qualities or attributes that a machine learning project on car
price prediction should possess to meet performance, reliability, and user experience standards. Here
are some non-functional requirements for such a project:

1. Performance:
Response Time: The system should provide quick responses to user queries with minimal
latency, ensuring a smooth user experience. Scalability: The system should scale horizontally
to accommodate increasing data volume and user load.

2. Accuracy:
The model should provide highly accurate car price predictions, with a low margin of error.
Continuous monitoring and improvements should maintain high accuracy levels.

3. Data Quality:
Data quality should be consistently maintained, with regular checks for data errors or
inconsistencies. Data updates and cleaning processes should be in place to prevent data
degradation.

4. Interpretability:
The model should provide interpretable results to enhance user trust and understanding.
Techniques like SHAP values or LIME can be used to explain model predictions.

5. Compliance and Ethics:


The system must comply with data privacy and protection regulations, including obtaining
necessary permissions for data usage. Ethical practices in data collection and model
deployment should be followed.

Designed By : Dishank Jain , 22ESKCA031 16


II Year Industrial Training Report 2023-24

CHAPTER 6

IMPLEMENTATION AND TESTING

1. Code Snippets

Designed By : Dishank Jain , 22ESKCA031 17


II Year Industrial Training Report 2023-24

2. Output

Designed By : Dishank Jain , 22ESKCA031 18


II Year Industrial Training Report 2023-24

CHAPTER 7

CONCLUSION AND FUTURE SCOPE

In conclusion, facial recognition systems using machine learning (ML) have shown tremendous
potential and have already proven their effectiveness in various applications. These systems have the
ability to accurately identify and verify individuals based on their facial features, which can greatly
enhance security measures and improve user experience.

The future scope of facial recognition systems using ML is broad and promising. Here are some
potential areas of future development:

Enhanced Security: ML-based facial recognition systems can be further enhanced to improve accuracy
and reliability. Advanced algorithms and techniques can be developed to handle more challenging
scenarios such as occlusions, disguises, or variations in lighting conditions.

Personalized User Experiences: ML algorithms can be trained to interpret facial expressions,


emotions, and biometric data, allowing the systems to provide personalized experiences tailored to
each individual. For example, a facial recognition system in a retail store can identify a customer's
preferences and offer customized product recommendations.

Augmented Reality: Facial recognition systems integrated with augmented reality (AR) technology
can enable virtual makeup try-on or virtual fashion fitting. ML algorithms can analyze facial features
and morphology to provide realistic and accurate virtual representations.

Surveillance and Law Enforcement: Facial recognition systems can play a crucial role in law
enforcement by identifying and tracking criminals. ML algorithms can be trained to recognize specific
characteristics and aid in identifying suspects more efficiently.

Healthcare Applications: Facial recognition systems can be used in healthcare settings for
identification and verification purposes, ensuring patient safety and privacy. ML algorithms can also
be used to detect early signs of medical conditions by analyzing facial features.

Access Control Systems: ML-based facial recognition can be used as a biometric authentication
method in access control systems, replacing traditional methods like passwords or ID cards. This can

Designed By : Dishank Jain , 22ESKCA031 19


II Year Industrial Training Report 2023-24

enhance security and convenience in various domains such as workplaces, transportation systems, and
residential areas.

However, it is crucial to address ethical and privacy concerns associated with facial recognition
systems. Adequate regulations and policies must be in place to ensure the responsible use of such
technology and protect individuals' privacy rights.

Overall, the future of facial recognition systems using ML is promising, with advancements in
accuracy, personalization, and integration with other technologies. These systems have the potential to
revolutionize various industries and improve security measures while ensuring privacy

Designed By : Dishank Jain , 22ESKCA031 20


II Year Industrial Training Report 2023-24

REFERENCES

1. https://www.w3schools.com//

2. https://stackoverflow.com/

3. https://www.geeksforgeeks.org/

4. https://developer.mozilla.org/

Designed By : Dishank Jain , 22ESKCA031 21

You might also like