Professional Documents
Culture Documents
on
FACE RECOGNITION ATTENDANCE SYSTEM
Submitted for partial fulfillment of award of the degree of
BACHELOR OF TECHNOLOGY
In
COMPUTER SCIENCE & ENGINEERING
2022-23
Attendance is prime important for both the teacher and student of an educational organization.
So, it is very important to keep record of the attendance. There are various attendance
management systems that vary in complexity and feasibility. We have divided them into three
categories namely, basic, moderate, and advanced.
The second research journals “Face Recognition Based Attendance Marking System”
(Senthamil Selvi, Chitrakala, Antony Janita, 2014) is based on the identification of
face recognition to solve the previous attendance system’s issues. This system uses
camera to capture the images of the employee to do face detection and recognition.
The captured image is compared one by one with the face database to search for the
worker’s face where attendance will be marked when a result is found in the face
database. The main advantage of this system is where attendance is marked on the
server which is highly secure where no one can mark the attendance of other.
Moreover, in this proposed system, the face detection algorithm is improved by
using the skin classification technique to increase the accuracy of the detection
process. Although more efforts are invested in the accuracy of the face detection
algorithm, the system is yet not portable.
Back in the years, Attendance management system in school/colleges was done by manual
reporting where the student’s attendance was recorded by placing a mark or signature beside
their name in a name list to indicate their presence in a particular class. While the staff in the
institution will report their attendance through the punch card machine which also have to be
done manually. Later, some of those attendance systems had evolved into using smart cards to
replace signature markings where each students/staff will be required to report their
attendance using a smart card embedded with a unique identification chip.
Automated facial recognition was pioneered in the 1960s. Woody Bledsoe, Helen
Chan Wolf, and Charles Bisson worked on using the computer to recognize human faces.
Their early facial recognition project was dubbed "man-machine" because the coordinates of
the facial features in a photograph had to be established by a human before they could be
used by the computer for recognition. On a graphics tablet a human had to pinpoint the
coordinates of facial features such as the pupil centers, the inside and outside corner of eyes,
and the widows peak in the hairline. The coordinates were used to calculate 20 distances,
including the width of the mouth and of the eyes. A human could process about 40 pictures
an hour in this manner and so build a database of the computed distances. A computer would
then automatically compare the distances for each photograph, calculate the difference
between the distances and return the closed records as a possible match.
In 1970, Takeo Kaneda publicly demonstrated a face matching system that located
anatomical features such as the chin and calculated the distance ratio between facial features
without human intervention. Later tests revealed that the system could not always reliably
identify facial features. Nonetheless, interest in the subject grew and in 1977. Kaneda
published the first detailed book on facial recognition technology.
A facial recognition system can revolutionize how businesses and governments interact
with people. However, if not used properly, there are potential pitfalls with this
technology. Potential misuse of personal and sensitive information is very real.
Businesses and Organizations need to make sure that there are proper checks and
balances and proper security before implementing this technology. Every time this
technology scans someone’s face, the distinct biometrics of the person is stored in a
database. Depending on who owns the database and security in place to protect the
database, the information can be leaked, stolen, or misused without the consent of the
person. Facial recognition systems are not perfect. Data collected by humans are used to
train the algorithms. If there are a lack of data and a diverse array of data to train the
algorithms, the system can misidentify the person. There have been many instances
where the system incorrectly identified the gender or identity of people with darker skin
tones. This happened because of a lack of data representing a diverse array of people.
With the advancement of new technology comes a new type of crime. Criminals could
access the facial recognition data by hacking the database and track people’s movement,
location, and information without their consent. Criminals can cause significant damage
with the aid of a facial recognition system. They can steal sensitive personal information
or the identity of a person to commit a crime. The application of facial recognition
technology holds many promises. However, it needs to be handled carefully. Businesses
that want to implement this technology need to implement the proper framework and
facial data protection 7 measures. If successfully managed to implement this technology,
they can reap the benefits of this technology.
Face Detection
Face detection is the ability to identify the person’s faces within the digital images. This system
identifies the human face present in an image or video. We need to define a general structure of
a face to determine certain picture or video contains a face (or several). Human faces have the
same features such as eyes, nose, forehead, mouth, and chin. Therefore, the objective of face
detection is to find the location and size of the face in an image. The located face is then used
by the facial recognition algorithm.
Face Extraction
In this phase, we are extracting the features from the detected face. In LBPH, the first local
binary pattern images are computed, and a histogram is created for facial recognition. This
generates a template. A template is a set of data that represents the unique and distinctive
features of the detected face.
Face Recognition
Face Recognition is being able to uniquely identify and verify a person’s face by comparing
and analyzing a biometrics person’s face. A face recognition system is an application that is
used for identifying or verifying a person from a digital image.
4. METHODOLOGY
Before the attendance management system can work, there are a set of data needed to
be inputted into the system which essentially consist of the individual’s basic
information which is their ID and their faces. The first procedure of portrait
acquisition can be done by using the Camera to capture the faces of the individual. In
this process the system will first detect the presence of a face in the captured image, if
there are no face detected, the system will prompt the user to capture their face again
until it meets certain number of portraits which will be 10 required portraits in this
project for each student. The decision of storing only 10 portrait per student is due to
the consideration of the limited storage space in the raspberry pi because the total
amount of students in the university is considered heavy. Then, the images will
undergo several pre- processing procedures to obtain a grayscale image and cropped
faces of equal sized images because those are the prerequisite of using the Eigen
Faces Recognizer. Both of the processes mentioned above can be represented in the
diagram below.
The design part of the attendance monitoring system is divided into two sections
which consist of the hardware and the software part. Before the software the design
part can be developed, the hardware part is first completed to provide a platform for
the software to work. Before the software part we need to install some libraries for
effective working of the application. We install OpenCV and NumPy through Python.
This section of the thesis describes the requirements necessary for the project and its
feasibility.
Admin Module
Admin has the highest privileges among all as admin is responsible to design the system.
Admin register teacher and provide unique id to the teacher. They are responsible to take
images of the students and add them to the database. Admin can view and update the details of
both students and teachers. They can also view the attendance report. Figure 1 shows the use
case for admin.
Teachers can log in to the system. They can open the application and the images of the students
for attendance. They can also view the attendance report. Figure 2 shows the use case for the
teacher.
Operational feasibility is the measure of how well a proposed system solves the problems with
the users. Operational feasibility is dependent on human resources available for the project and
involves projecting whether the system will be used if it is developed and implemented. The
project is operationally feasible for the users as nowadays almost all the teachers/staffs are
familiar with digital technology.
Economic feasibility defines whether the expected benefit equals or exceeds the expected costs.
It is also commonly referred to as cost/benefit analysis. The procedure is to determine the
benefits and the savings expected from the system and compare them with the costs. A
proposed system is expected to outweigh the costs. This is a small project with no cost for
development. The system is easy to understand and use. Therefore, there is no need to spend on
training to use the system. This system has the potential to grow by adding functionalities for
students as well as teachers. This can Hence, the project could have economic benefits in the
future.
Technical feasibility is carried out to determine whether the project is feasible in terms of
software, hardware, personnel, and expertise, to handle the completion of the project. It
considers determining resources for the proposed system. As the system is developed using
python, it is platform independent. Therefore, the users of the system can have average
processing capabilities, running on any platform. The technology is one of the latest hence the
system is also technically feasible.
7.Software Development
There are two major system flows in the software development section as shown below:
The creation of the face database
The process of attendance taking
Both processes mentioned above are essential because they made up the backbone of the
attendance management system. In this section, the process of both flows will be briefly
described. Meanwhile, their full functionality, specific requirements and also the
methods/approach to accomplish such objectives will be discussed in the upcoming chapter.
The development of the face database is an important phase before any facial
recognizing process can be carried out. It acts as a library to compare against with
whenever the system wanted to identify a person. In the image retrieval process, the
system will first prompt for an input from the user to enter their ID number. The
system will then validate the entered input and then check for duplication in the
system. To proceed, the entered input must contain only 12 digits of number. Apart
from that, the ID inputted must be a non-registered ID to ensure no duplication. After
that, a directory is created for each individual where their portraits will be stored
inside of it. It is a compulsory to store 10 - 30 portraits per person in the file. After the
acquisition of image is done, the images undergo a pre-processing before storing it
into the respective folder.
9.Overview
The proposed system is a software system which will mark attendance using facial
recognition. In this project we used OpenCV module integrated with Python which
will helps the institution to make the attendance process easy and efficient. The
system comprises of Computer, HD Video Camera and Wi-Fi module or Internet.
Steps of Working: -
Initiate the firstpage.py python script.
- Create a DATASET of the student by entering his ID Number.
- Train the dataset, a yml file is created.
- A picture of the class is taken, and the RECOGNIZER python file is initiated.
- Attendance is taken by cropping the faces in the picture and comparing with the
faces in the database.
- If a face is matched, the responding name with PRESENT status is marked in a
EXCEL file with the current date and time.
- The EXCEL file can be mailed by entering the email after initiating the MAIL
python script
10. Code and Result
After successfully compilation of the code our project module view as:
Web Cam Access code Snippet
11.Future Scope
Over the years, movies have fixed a futuristic fantasy in our minds that a time will come
when software would be used to recognize people by their faces. A time when our faces
will be our ID cards. With advent of facial recognition technology, that time is already
here.
The future of facial recognition technology is bright. Forecasters opine that this
technology is expected to grow at a formidable rate and will generate huge revenues in
the coming years. Security and surveillances are the major segments which will be
deeply influenced. Other areas that are now welcoming it with open arms are private
industries, public buildings, and schools. It is estimated that it will also be adopted by
retailers and banking systems in coming years to keep fraud in debit/credit card purchases
and payment especially the ones that are online. This technology would fill in the
loopholes of largely prevalent inadequate password system. In the long run, robots using
facial recognition technology may also come to foray. They can be helpful in
completing the tasks that are impractical or difficult for human beings to complete.
12.Conclusion
Before the development of this project. There are many loopholes in the
process of taking attendance using the old method which caused many troubles to
most of the institutions. Therefore, the facial recognition feature embedded in the
attendance monitoring system can not only ensure attendance to be taken accurately
and also eliminated the flaws in the previous system. By using technology to
conquer the defects cannot merely save resources but also reduces human
intervention in the whole process by handling all the complicated task to the
machine. The only cost to this solution is to have sufficient space in to store all the
faces into the database storage. Fortunately, there is such existence of micro-SD
that can compensate with the volume of the data. In this project, the face database is
successfully built. Apart from that, the face recognizing system is also working
well.
At the end, the system not only resolve troubles that exist in the old model
but also provide convenience to the user to access the information collected by
mailing the attendance sheet to the respected faculty.
13.References
https://numpy.org