You are on page 1of 30

A Project Report

on
FACE RECOGNITION ATTENDANCE SYSTEM
Submitted for partial fulfillment of award of the degree of

BACHELOR OF TECHNOLOGY
In
COMPUTER SCIENCE & ENGINEERING

2022-23

Under the Guidance of Submitted By


Mr.Tarun Chugh Pranaw Kumar Singh (1902220100109)
Asst. Professor Pranav Jha (1902220100108)
Ritesh Ranjan (1902220100126)
Shubham Pratap Singh (1902220100154)

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING


I.T.S ENGINEERING COLLEGE
46, KNOWLEDGE PARK-III, GREATER NOIDA

Affiliated from Dr. A.P.J Abdul Kalam Technical University, Lucknow


May 2023
ABSTRACT
The main purpose of this project is to build a face recognition-based attendance monitoring
system for educational institution to enhance and upgrade the current attendance system into
more efficient and effective as compared to before. The current old system has a lot of
ambiguity that caused inaccurate and inefficient of attendance taking. Many problems arise
when the authority is unable to enforce the regulation that exist in the old system. The
technology working behind will be the face recognition system. The human face is one of the
natural traits that can uniquely identify an individual. Therefore, it is used to trace identity as
the possibilities for a face to deviate or being duplicated is low. In this project, face
databases will be created to pump data into the recognizer algorithm. Then, during the
attendance taking session, faces will be compared against the database to seek for identity.
When an individual is identified, its attendance will be taken down automatically saving
necessary information into a excel sheet. At the end of the day, the excel sheet containing
attendance information regarding all individuals are mailed to the respective faculty.
TABLE CONTENT
1.Introduction…………………………………………………7
1.1 Purpose…………………………………………………………………………………….7
1..2 Exiting Attendance System………………………………………………………..……...7
1.2.1 Basic Attendance System……………………………………………………………...…7
1.2.2 Moderate Attendance System………………………………………………………..…..8
1.2.3 Advanced Attendance System………………………………………………………..….9
2.Literature……………………………………………….….10
2.1 Automated Attendance System………………………………………………………..….11
2.2 Face Recognition Based on CNN…………………………………………………….......11
3.History……………………………………………………..12
3.1 What is Face Recognition Attendance System…………………………………………...12
3.2 Need of face Recognition Attendance System………………………………………........12
3.3 Benefits of Face Recognition Attendance System……………………….,……………....13
3.4 Challenges of Facial Recognition System…………………………………………….......13
4.Methodology……………………………………………….14
4.1 Image Acquisition and Pre-processing procedures………………………………………..14
4.2 Hierarchy manner of the face database…………………………………………………….15
4.3 Structure of the content in the csv file……………………………………………………..15
4.4 Diagrams…………………………………………………………………………………...16
5.System Design…………………………………………..….19
5.1 Hardware Development……………………………………………………………………19
5.2 Libraries Development…………………………………………………………………….19
5.2.1 OpenCV…………………………………………………………………………………..19
5.2.2 NumPy…………………………………………………………………………………...20
6.Requirement Analysis and Feasibility Study……………….21
6.1 Requirement Analysis………………………………………………………………………21
6.1.1 Functional Requirements…………………………………………………………………21
6.1.2 Non-Functional Requirements……………………………………………………………23
6.2 Feasibility Analysis………………………………………………………………………...23
6.2.1 Operational Feasibility……………………………………………………………………23
6.2.2 Economical Feasibility……………………………………………………………………23
6.2.3 Technical Feasibility……………………………………………………………………...24
7.Software
Development……………………………………...25
7.1 The creation of the face database…………………………………………………………...25
7.2 The process of attendance taking…………………………………………………………...25
8.Flowchart……………………………………………...……26
9.
Overview…………………………………………………...27
10.Code and Result…………………………………………...28
11.Future Scope………………………………………………33
12.Conclusion………………………………………………...34
13.References………………………………………………...35
1. INTRODUCTION

This is a project about Facial Recognition-Based Attendance System for Educational


Institutions. In this chapter, the problem and motivation, research objectives, project
scope, project contributions and the background information of the project will be
discussed in detail.

1.1 Purpose:- According to the previous attendance management system, the


accuracy of the data collected is the biggest issue. This is because the attendance
might not be recorded personally by the original person, in another word, the
attendance of a particular person can be taken by a third party without the
realization of the institution which violates the accuracy of the data. Supposing
the institution establish an enforcement, it might need to waste a lot of human
resource and time which in turn will not be practical at all. Thus, all the recorded
attendance in the previous system is not reliable for analysis usage. The second
problem of the previous system is where it is too time consuming. Assuming the
time taken for a student to sign their attendance on a 3-4 paged name list is
approximately 1 minute. In 1 hour, only approximately 60 students can sign their
attendance which is obviously inefficient and time consuming. The third issue is
with the accessibility of those information by the legitimate concerned party. For
an example, most of the parents are very concerned to track their child’s actual
whereabouts to ensure their kid really attend the classes in college/school.
However, In the previous system, there are no ways for the parents to access
such information. Therefore, evolution is needed to be done to the previous
system to improve efficiency, data accuracy and provides accessibility to the
information for those legitimate party.

1.2 Existing Attendance System:

Attendance is prime important for both the teacher and student of an educational organization.
So, it is very important to keep record of the attendance. There are various attendance
management systems that vary in complexity and feasibility. We have divided them into three
categories namely, basic, moderate, and advanced.

1.2.1Basic Attendance System:

a. Manual Attendance System: The Manual Attendance System involves


the process of the faculty calling out the roll calls. If the student is present in
the class, the student physically acknowledges the roll call and says that he/she is
present. In all other cases, the faculty marks the student absent.

b. Paper Based Attendance System: The Paper Based Attendance


System is a part of the manual attendance system or could be used for any other
attendance system as well. Attendance is taken in any form, and it's recorded on a
paper by writing either the absentees, or the presented only. Usually, faculties write
the roll numbers of the students that are absent or present as per convenience.
c. Time Attendance System: The Timesheet Attendance System involves
recording attendance into a timesheet. A timesheet is a physical or virtual tool that
allows you to record and keep track of your worked time, in this case it's number
hours the student attends.

d. Token Based Attendance System: The Token based attendance


involves displaying of a security token when demanded in order to secure
attendance. A security token (sometimes called an authentication token) is a small
hardware device that the owner carries to authorize access to a network service. The
device may be in the form of a smart card or may be embedded in a commonly used
object such as a key fob. In the context of students, the token is usually their identity
card.

1.2.2 Moderate Attendance System:

a. Biometric Attendance System: The biometric attendance system


works on two basic principles. First, it takes an image of a finger. Then finger
scanner saves c characteristics of every unique finger and saved in the form of
biometric key. Fingerprint scanner never saves images of a finger only series of
binary code for verification purpose. Secondly, the biometric attendance system
determines whether the pattern of ridges and valleys in this image matches the
pattern of ridges and valleys in pre-scanned images.

b. Badge Monitoring Attendance System: The Badge Monitoring


Attendance System [3] is most commonly used in places where people work with
radioactive materials such as in a X-ray lab, nuclear centers, etc. The radioactive
badge is worn by the person somewhere between the neck and the waist such that
the front faces the source of radiation.

c. Swipe Card Attendance: The Swipe Card Attendance System works by


the person swiping its card on entry and exit of the gate, and the attendance is
recorded. A swipe card must encounter the corresponding card reader before any
transaction can take place. The transaction becomes active when the magnetic stripe
on a card is moved through a console at a gate.

d. Access Card Punching Attendance System: A punch card is a


flat and stiff paper with notches cut in it and contains digital information. In punch
card attendance system, students use this punch or proximity card for in and/or out.
To use a punch card, students just need to wave the card near a reader, which then
ensures whether the correct person is logging in and/or out.

1.2.3 Advanced Attendance System:

a. Retina Scan Based Attendance System: The Retinal Scan-based


Attendance System makes uses of retinal features and marks attendance on retinal
recognition. Eye scan or retinal scan is a biometric system that identifies a person by
using unique patterns of the retina. Human retina contains a complex blood vessel
(retinal vein) pattern through which an eye scanner device can easily identify a
person and can even differentiate identical twins. To scan human retina, retinal
scanner uses the reflection of light that is absorbed by retinal vein.

b. Gait Recognition Attendance System: The Gait Recognition


Attendance System records and recognizes an individual by examining the way an
individual walks, saunters, swaggers, or sashays — with up to 90-percent accuracy.

c. Facial Recognition Attendance System: The Facial Recognition


Attendance System [5] makes use of facial features such as distance between the
eyes, width of the nose, depth of the eye sockets, the shape of the cheekbones, the
length of the jaw line, etc. to recognize and mark attendance.

d. Sensor Detection Attendance System: The Sensor Detection


Attendance System uses RFID (Radio Frequency Identification) [4] to identify
individuals. A radio frequency identification reader (RFID reader) is a device used
to gather information from an RFID tag, which is used to track individual objects.
Radio waves are used to transfer data from the tag to a reader. RFID is a technology
similar in theory to bar codes.
2. LITERATURE

According to research journal “Attendance System Using NFC (Near Field


Communication) Technology with Embedded Camera on Mobile Device” (Bhise,
Khichi, Korde,Lokare, 2015). The attendance system is improved by using NFC
technology and mobile application. According to the research paper, each student is
given a NFC tag that has a unique ID during their enrolment into the college.
Attendance of each class will then be taken by touching or moving these tags on the
lecturer mobile phone. The embedded camera on the phone will then capture the
student’s face to send all the data to the college server to do validation and
verification. The advantage of this method is where the NFC is simple to use, and the
speed of connection establishment is very high. It indeed speeds up the attendance
taking process a lot. However, this system couldn’t automatically spot the violation
when the NFC tag is not personally tagged by the original owner. Apart from that,
the convenience of the system which uses the mobile phone as the NFC reader was
actually an inconvenience to the lecturer

The second research journals “Face Recognition Based Attendance Marking System”
(Senthamil Selvi, Chitrakala, Antony Janita, 2014) is based on the identification of
face recognition to solve the previous attendance system’s issues. This system uses
camera to capture the images of the employee to do face detection and recognition.
The captured image is compared one by one with the face database to search for the
worker’s face where attendance will be marked when a result is found in the face
database. The main advantage of this system is where attendance is marked on the
server which is highly secure where no one can mark the attendance of other.
Moreover, in this proposed system, the face detection algorithm is improved by
using the skin classification technique to increase the accuracy of the detection
process. Although more efforts are invested in the accuracy of the face detection
algorithm, the system is yet not portable.

The third research journal “Fingerprint Based Attendance System Using


Microcontroller and LabView” (Kumar Yadav, Singh, Pujari, Mishra, 2015) proposed
a solution of using fingerprint to mark the attendance. This system is using 2
microcontrollers to deal with the fingerprint recognition process. Firstly, the
fingerprint pattern will be obtained through a fingerprint sensor, then the information
will be transmitted to microcontroller 1. Next microcontroller 1 will pass the
information to microcontroller 2 to do the checking with the database that resides in
it. After finding a student’s match, the details are sent to the PC through serial
communication to be displayed. This design is good as it accelerates development
while maintaining design flexibility and simplifies testing. But again, this system is
attached to a PC which make it not portable. Other than that, the database information
cannot be accessible easily. Meaning that, for the parents who are interested in
knowing their child’s attendance cannot easily or conveniently access the
information.
2.1 AUTOMATED ATTENDANCE SYSTEM USING
HAARCASCADE: A FACE RECOGNITION APPROACH
A face recognition system is computer application capable of identifying a person from a digital
image. One of the ways to do so is by comparing selected facial features from image and a
facial database. Face recognition is used in different areas, to name a few, The Australian and
New Zealand customs services have an automated border processing system called
SMARTGATE that 11 uses facial recognition. The system compares the face of the individual
with image in the ePassport microchip to verify that the holder of passport is rightful owner.
Properly designed systems installed in airports, multiplexes and other public places can identify
individuals among crowd, without passers-by even being aware of the system. Other biometrics
like fingerprints, iris scans and speech recognition cannot perform this kind of mass
recognition. Another area includes ATM and check cashing security. The software can quickly
verify a customer’s face. After a customer consents, the ATM captures a digital image of him.
The facet software then generates a face print of the photograph to protect customers against
identity theft and fraudulent transactions. Thus, by face recognition software there is no need
for a picture ID, bankcard or personal identification number (PIN)To verify customers identity.
But it is good enough to be already implemented in different vertical markets such as
commercial sectors, healthcare, and hospitality. However, effectiveness of facial recognition
software in cases of railway and airport security is questionable as it struggles to perform under
certain conditions such as lightning, sunglasses, long hair, and other objects partially covering
the subjects face. Also, if the face is pointing the camera at an angle.

2.2 FACE RECOGNITION BASED ON CONVOLUTION


NEURAL NETWORK
In this paper, a face recognition method based on Convolution Neural Network (CNN) is
presented. This network consists of three convolution layers, two pooling layers, two full
connected layers and one SoftMax regression layer. Stochastic gradient descent algorithm is
used to train the feature extractor and the classifier, which can extract the facial features and
classify them automatically. The Dropout method is used to solve the over-fitting problem. The
Convolution Architecture for Feature Extraction framework (Caffe) is used during the training
and testing process. The face recognition rate of the ORL face database and AR face database
based on this network is 99.82% and 99.78%.
3.HISTORY OF FACE RECOGNISTION
ATTENDANCE SYSTEM

Back in the years, Attendance management system in school/colleges was done by manual
reporting where the student’s attendance was recorded by placing a mark or signature beside
their name in a name list to indicate their presence in a particular class. While the staff in the
institution will report their attendance through the punch card machine which also have to be
done manually. Later, some of those attendance systems had evolved into using smart cards to
replace signature markings where each students/staff will be required to report their
attendance using a smart card embedded with a unique identification chip.
Automated facial recognition was pioneered in the 1960s. Woody Bledsoe, Helen
Chan Wolf, and Charles Bisson worked on using the computer to recognize human faces.
Their early facial recognition project was dubbed "man-machine" because the coordinates of
the facial features in a photograph had to be established by a human before they could be
used by the computer for recognition. On a graphics tablet a human had to pinpoint the
coordinates of facial features such as the pupil centers, the inside and outside corner of eyes,
and the widows peak in the hairline. The coordinates were used to calculate 20 distances,
including the width of the mouth and of the eyes. A human could process about 40 pictures
an hour in this manner and so build a database of the computed distances. A computer would
then automatically compare the distances for each photograph, calculate the difference
between the distances and return the closed records as a possible match.
In 1970, Takeo Kaneda publicly demonstrated a face matching system that located
anatomical features such as the chin and calculated the distance ratio between facial features
without human intervention. Later tests revealed that the system could not always reliably
identify facial features. Nonetheless, interest in the subject grew and in 1977. Kaneda
published the first detailed book on facial recognition technology.

3.1 What is Face Recognition Attendance System? -


The face recognition procedure simply requires any device that has digital photographic
technology to generate and obtain the images and data necessary to create and record the
biometric facial pattern of the person that needs to be identified.
Unlike other identification solutions such as passwords, verification by email, selfies or
images, or fingerprint identification, Biometric facial recognition uses unique mathematical
and dynamic patterns that make this system one of the safest and most effective ones.

3.2 Needs of Face Recognition Attendance System: -


Our product is designed for less time consumption and there is no need of any physical
presence of a person to monitor the object identified by our software. In this fast-moving
world, people have less time to manage the attendance record physically of a large number
of people. It can be very lengthy and time consuming and can cost a lot in a long run, Thus
Our software provides cheap and quite accurate solution for maintaining the record.

3.3 Benefits of Face Recognition Attendance System: -


we are building a product for the users to keep record of their attendance using face
recognition. This software first captures an image of all the authorized persons and store the
information into database.
 Our product an institution can record the attendance of their employee and pay
accordingly.
 It can be used as a security system in buildings and apartments.
 It can reduce the time and effort of a person with zero human error we are building a
product for the users to keep record of their attendance using face recognition. This
software first captures an image of all the authorized persons and store the
information into database.

3.4 Challenges of facial Recognition System

A facial recognition system can revolutionize how businesses and governments interact
with people. However, if not used properly, there are potential pitfalls with this
technology. Potential misuse of personal and sensitive information is very real.
Businesses and Organizations need to make sure that there are proper checks and
balances and proper security before implementing this technology. Every time this
technology scans someone’s face, the distinct biometrics of the person is stored in a
database. Depending on who owns the database and security in place to protect the
database, the information can be leaked, stolen, or misused without the consent of the
person. Facial recognition systems are not perfect. Data collected by humans are used to
train the algorithms. If there are a lack of data and a diverse array of data to train the
algorithms, the system can misidentify the person. There have been many instances
where the system incorrectly identified the gender or identity of people with darker skin
tones. This happened because of a lack of data representing a diverse array of people.
With the advancement of new technology comes a new type of crime. Criminals could
access the facial recognition data by hacking the database and track people’s movement,
location, and information without their consent. Criminals can cause significant damage
with the aid of a facial recognition system. They can steal sensitive personal information
or the identity of a person to commit a crime. The application of facial recognition
technology holds many promises. However, it needs to be handled carefully. Businesses
that want to implement this technology need to implement the proper framework and
facial data protection 7 measures. If successfully managed to implement this technology,
they can reap the benefits of this technology.
Face Detection

Face detection is the ability to identify the person’s faces within the digital images. This system
identifies the human face present in an image or video. We need to define a general structure of
a face to determine certain picture or video contains a face (or several). Human faces have the
same features such as eyes, nose, forehead, mouth, and chin. Therefore, the objective of face
detection is to find the location and size of the face in an image. The located face is then used
by the facial recognition algorithm.

Face Extraction
In this phase, we are extracting the features from the detected face. In LBPH, the first local
binary pattern images are computed, and a histogram is created for facial recognition. This
generates a template. A template is a set of data that represents the unique and distinctive
features of the detected face.

Face Recognition

Face Recognition is being able to uniquely identify and verify a person’s face by comparing
and analyzing a biometrics person’s face. A face recognition system is an application that is
used for identifying or verifying a person from a digital image.
4. METHODOLOGY

Before the attendance management system can work, there are a set of data needed to
be inputted into the system which essentially consist of the individual’s basic
information which is their ID and their faces. The first procedure of portrait
acquisition can be done by using the Camera to capture the faces of the individual. In
this process the system will first detect the presence of a face in the captured image, if
there are no face detected, the system will prompt the user to capture their face again
until it meets certain number of portraits which will be 10 required portraits in this
project for each student. The decision of storing only 10 portrait per student is due to
the consideration of the limited storage space in the raspberry pi because the total
amount of students in the university is considered heavy. Then, the images will
undergo several pre- processing procedures to obtain a grayscale image and cropped
faces of equal sized images because those are the prerequisite of using the Eigen
Faces Recognizer. Both of the processes mentioned above can be represented in the
diagram below.

4.1 Image Acquisition and Pre-processing procedures:


Image Acquisition and Pre-processing procedures After the images are being
processed, they are stored into a file in a hierarchy manner. In this project, all the
faces will be stored in a hierarchy manner under the „database‟ folder. When
expanding through the database folder, there will consist of many sub-folders which
each of them will represent an individual where a series of face portrait belonging to
the same individual will be stored in that sub-folder. The subfolders that represent
everyone will be named upon the ID no. of that individual which is unique for every
single individual in the institution. The whole process of image retrieval, pre-
processing, storing mechanism is done by the script named create_database.py.
4.2 Hierarchy manner of the face database:-
After a successful retrieval of facial images into the respective folder, a CSV files
created to aid the next process of pumping the faces into the recognizer for the
training process. The creation of the CSV file will be done based on a script named
create_csv.py. In this project, the content of CSV file will look like the following
format:

4.3 Structure of the content in the csv file: -


After having sufficient images in the database, those images will then be inserted into
a training mechanism. There are generally 3 different types of training mechanism
provided in OpenCV which are Eigenfaces, Fisher Faces, and Local Binary Patterns
Histograms (LBPH). The recognizer that will be focused on this project will be the
Eigenfaces recognizer. The concept behind Eigenfaces is simple – it recognizes a
particular face by catching the maximum deviation in a face and then turning those
identified variations into information to be compared when a new face arrives. In the
training process, the csv file will be read to provide the path to all of the images where
those images and labels will be loaded into a list variable. Then, the list will be passed
into the training function where the training process will take a measurable time to
run. The larger the face database, the longer the time will be needed to train those
images.
Figure 4.1 State chart Diagram
Use Case Diagram
Figure 4.2 Activity Diagram
5.System Design

The design part of the attendance monitoring system is divided into two sections
which consist of the hardware and the software part. Before the software the design
part can be developed, the hardware part is first completed to provide a platform for
the software to work. Before the software part we need to install some libraries for
effective working of the application. We install OpenCV and NumPy through Python.

5.1 Hardware Development: -


 Camera Module with good mega pixels.
 Power supply cable
 16 Gb Micro SD Card Class 10

5.2 Libraries Development


5.2.1 OpenCV: - OpenCV (Open-source computer vision) is a library
of programming functions mainly aimed at real-time computer vision.
The OpenCV project was initially an Intel Research initiative to
advance CPU-intensive applications, part of a series of projects
including real-time raytracing and 3Ddisplay walls. The main
contributors to the project included several optimization experts in
Intel Russia, as well as Intel's Performance Library Team.

In the early days of OpenCV, the goals of the project


were described as:
 Advance vision research by providing not only open but also optimized code for basic
vision infrastructure. No more reinventing the wheel.
 Disseminate vision knowledge by providing a common infrastructure that developers
could build on, so that code would be more readily readable and transferable.
 Advance vision-based commercial applications by making portable, performance-
optimized code available for free – with a license that did not require code to be open or
free itself.

OpenCV’s application areas include:


 2D and 3D feature toolkits
 Ego motion estimation
 Facial recognition system
 Gesture recognition
 Human–computer interaction (HCI)
 Mobile robotics
 Motion understanding
 Object identification
 Segmentation and recognition
 Stereopsis stereo vision: depth perception from 2 cameras
 Structure from motion (SFM)
 Motion tracking
 Augmented reality

To support some of the above areas, OpenCV


includes a statistical machine learning library that
contains:
 Boosting
 Decision tree learning
 Gradient boosting trees
 Expectation-maximization algorithm
 k-nearest neighbor algorithm
 Naive Bayes classifier
 Artificial neural networks
 Random forest
 SVM

5.2.2 NumPy: - NumPy is a package that defines a multi-dimensional array


object and associated fast math functions that operate on it. It also provides simple routines
for linear algebra and sophisticated random-number generation. NumPy replaces both
Numeric and Numerary.
6.Requirement Analysis and Feasibility Study

This section of the thesis describes the requirements necessary for the project and its
feasibility.

6.1 Requirement Analysis


In this section, the functionalities need to run the system are described.

6.1.1 Functional Requirements


The system has different functionalities for an admin and teachers. Admin has higher privileges
than teachers. Their functionalities are described below.

Admin Module
Admin has the highest privileges among all as admin is responsible to design the system.
Admin register teacher and provide unique id to the teacher. They are responsible to take
images of the students and add them to the database. Admin can view and update the details of
both students and teachers. They can also view the attendance report. Figure 1 shows the use
case for admin.

Figure 6.1 Use Case Admin Module


Teachers Module

Teachers can log in to the system. They can open the application and the images of the students
for attendance. They can also view the attendance report. Figure 2 shows the use case for the
teacher.

Figure 6.2 Use Case Teachers Module


6.1.2 Non-Functional Requirements

Non-Functional Requirements are the characteristics or attributes of the system


that are necessary for the smooth operation of the system. Those requirements
are listed below.
● The system should perform the process accurately and precisely to avoid
problems.
● The system should be easy to modify for any updates. Any errors or
bugs that are identified should be easy to mend.
● The system should be secure and maintain the privacy of the students.
● The system should be easy to understand and use.
● Execution of the operation should be fast.

6.2 Feasibility Analysis

A feasibility study evaluates the project's potential for success; therefore,


perceived objectivity is an important factor in the credibility of the study for
potential investors and lending institutions. It must, therefore, be conducted
with an objective, unbiased approach to provide information upon which
decisions can be based. Here, we discuss 3 major feasibility studies required
for our project.

6.2.1 Operational Feasibility

Operational feasibility is the measure of how well a proposed system solves the problems with
the users. Operational feasibility is dependent on human resources available for the project and
involves projecting whether the system will be used if it is developed and implemented. The
project is operationally feasible for the users as nowadays almost all the teachers/staffs are
familiar with digital technology.

6.2.2 Economic Feasibility

Economic feasibility defines whether the expected benefit equals or exceeds the expected costs.
It is also commonly referred to as cost/benefit analysis. The procedure is to determine the
benefits and the savings expected from the system and compare them with the costs. A
proposed system is expected to outweigh the costs. This is a small project with no cost for
development. The system is easy to understand and use. Therefore, there is no need to spend on
training to use the system. This system has the potential to grow by adding functionalities for
students as well as teachers. This can Hence, the project could have economic benefits in the
future.

6.2.3 Technical Feasibility

Technical feasibility is carried out to determine whether the project is feasible in terms of
software, hardware, personnel, and expertise, to handle the completion of the project. It
considers determining resources for the proposed system. As the system is developed using
python, it is platform independent. Therefore, the users of the system can have average
processing capabilities, running on any platform. The technology is one of the latest hence the
system is also technically feasible.
7.Software Development

There are two major system flows in the software development section as shown below:
 The creation of the face database
 The process of attendance taking
Both processes mentioned above are essential because they made up the backbone of the
attendance management system. In this section, the process of both flows will be briefly
described. Meanwhile, their full functionality, specific requirements and also the
methods/approach to accomplish such objectives will be discussed in the upcoming chapter.

7.1The creation of the face database:

7.2The process of attendance taking:


8.Flowchart

The development of the face database is an important phase before any facial
recognizing process can be carried out. It acts as a library to compare against with
whenever the system wanted to identify a person. In the image retrieval process, the
system will first prompt for an input from the user to enter their ID number. The
system will then validate the entered input and then check for duplication in the
system. To proceed, the entered input must contain only 12 digits of number. Apart
from that, the ID inputted must be a non-registered ID to ensure no duplication. After
that, a directory is created for each individual where their portraits will be stored
inside of it. It is a compulsory to store 10 - 30 portraits per person in the file. After the
acquisition of image is done, the images undergo a pre-processing before storing it
into the respective folder.
9.Overview

The proposed system is a software system which will mark attendance using facial
recognition. In this project we used OpenCV module integrated with Python which
will helps the institution to make the attendance process easy and efficient. The
system comprises of Computer, HD Video Camera and Wi-Fi module or Internet.
Steps of Working: -
Initiate the firstpage.py python script.
- Create a DATASET of the student by entering his ID Number.
- Train the dataset, a yml file is created.
- A picture of the class is taken, and the RECOGNIZER python file is initiated.
- Attendance is taken by cropping the faces in the picture and comparing with the
faces in the database.
- If a face is matched, the responding name with PRESENT status is marked in a
EXCEL file with the current date and time.
- The EXCEL file can be mailed by entering the email after initiating the MAIL
python script
10. Code and Result
After successfully compilation of the code our project module view as:
Web Cam Access code Snippet
11.Future Scope

Over the years, movies have fixed a futuristic fantasy in our minds that a time will come
when software would be used to recognize people by their faces. A time when our faces
will be our ID cards. With advent of facial recognition technology, that time is already
here.
The future of facial recognition technology is bright. Forecasters opine that this
technology is expected to grow at a formidable rate and will generate huge revenues in
the coming years. Security and surveillances are the major segments which will be
deeply influenced. Other areas that are now welcoming it with open arms are private
industries, public buildings, and schools. It is estimated that it will also be adopted by
retailers and banking systems in coming years to keep fraud in debit/credit card purchases
and payment especially the ones that are online. This technology would fill in the
loopholes of largely prevalent inadequate password system. In the long run, robots using
facial recognition technology may also come to foray. They can be helpful in
completing the tasks that are impractical or difficult for human beings to complete.
12.Conclusion
Before the development of this project. There are many loopholes in the
process of taking attendance using the old method which caused many troubles to
most of the institutions. Therefore, the facial recognition feature embedded in the
attendance monitoring system can not only ensure attendance to be taken accurately
and also eliminated the flaws in the previous system. By using technology to
conquer the defects cannot merely save resources but also reduces human
intervention in the whole process by handling all the complicated task to the
machine. The only cost to this solution is to have sufficient space in to store all the
faces into the database storage. Fortunately, there is such existence of micro-SD
that can compensate with the volume of the data. In this project, the face database is
successfully built. Apart from that, the face recognizing system is also working
well.
At the end, the system not only resolve troubles that exist in the old model
but also provide convenience to the user to access the information collected by
mailing the attendance sheet to the respected faculty.
13.References

[1]. “Attendance System Using NFC Technology with Embedded Camera


on Mobile Device” (Bhise, Khichi, Korde Lokare, 2020)

[2]. K.SenthamilSelvi, P.Chitrakala, A.AntonyJenitha, "Face Recognition


Based Attendance Marking System", IJCSMC, Vol. 3, Issue. 2, February
2021.

[3]. “Fingerprint Based Attendance System Using Microcontroller and


LabView” (Kumar Yadav, Singh, Pujari, Mishra, 2022)

[4]. “RFID based Student Attendance System” (Hussain, Duggar, Deka,


Hannan, 2023)

[5]. OpenCV Documentation

-https://opencv.org [6]. NumPy -

https://numpy.org

You might also like