Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Aashay Bongulwar, Aayush Jadhav, Rishikesh Ahire, Amogh Dumbre, Sumaan Ali, Amruta Mankawade
DOI Link: https://doi.org/10.22214/ijraset.2022.45075
Certificate: View Certificate
Attendance management is critical for every institution; it can determine whether or not an institution, such as educational institutions, public or commercial sectors, will be successful in the future. To maximise their performance, institutions will need to keep track of people within the organisation, such as employees and pupils. Real-Time Face Recognition is a useful way for dealing with the daily attendance of a vast number of pupils. To increase face detection and recognition performance, several algorithms and strategies have been developed, however, our suggested model uses the LBPH (Local binary pattern histogram) methodology, which is implemented in Python using the OpenCV organization and employs the tinker GUI interface for user interface needs.
I. INTRODUCTION
Faculty staff should have a proper method in place to keep accurate and correct student attendance records in a typical face-to-face (F2F) class environment. On a regular basis, they must verify and maintain or monitor that attendance record. They have challenges, particularly in classrooms with a big number of students. The manual technique also takes longer to report each enrolled student's average attendance. Using an automated attendance system, on the other hand, may lessen the administrative strain on the company's employees. As a result, this paper explains how we might use a facial recognition technique to automatically control student attendance in class using digital photographs collected in a classroom scenario. In comparison to traditional approaches, the system saves time and may easily be customised. This also helps to avoid erroneous participation. Other biometric approaches can also be utilised to computerise the attendance process, such as those listed below:
All of the approaches listed above are distinctive, efficient, exact, and cost-effective, but facial recognition is the most unique, efficient, precise, and cost-effective. The scheme has multiple subproblems, which are addressed in more detail below.
a. Take a photo and name everyone in it.
b. Focus on a particular face to recall it. Even though it is a different individual, it is still the same person. It’s skewed in one way or has poor illumination.
c. Make a mental note of the distinguishing traits of the face that will help you distinguish it from other images. Characteristics include the nose, the depth of the eyes, the proportions of the face, the colour of the skin, and so on.
Face recognition is a skill that the human brain possesses. Computers can be trained to recognise the individuality of faces, thus we must teach or train the machine to recognise faces based on their distinguishing traits. Facial recognition can be divided into two types, as shown below:
Verification/Validation is a process of one-on-one matching (match or no match). The system, phone, and other electronic devices can all be locked and unlocked with the tool. Identification is a technique for identifying a single person among a group of many, such as one out of N.
II. PROBLEM STATEMENT
When an organisation has a large number of pupils, marking attendance for each one becomes more complex and time-consuming. Any institute's current system is a manual input system for students. This system has a problem with wasting time, and it becomes more sophisticated as the strength increases. Keeping track of attendance through log books and maintaining records is a time-consuming task. In computer vision, face identification is a difficult problem. Lighting concerns, posing issues, scale variations, low picture capture accuracy, and partially obscured faces are just a few of the issues that need to be solved. Face recognition algorithms must, as a result, be robust to changes in the above parameters. When the illumination, background, or rotation changes, existing techniques don't work as well. As a result, the aforementioned disadvantages must be addressed. The project's purpose is to create a system that is less light-sensitive, rotates invariantly, scales invariantly, and is robust enough to be deployed in real-world circumstances.
III. LITERATURE REVIEW
A fingerprint-based attendance system was suggested by the authors of [1]. Students can utilize a portable fingerprint gadget that has been designed to place their fingers on a sensor during class without the instructor's help. The accuracy of the attendance record is ensured by this method. This approach has the drawback of potentially distracting students by passing the device during class. The literature is filled with articles on RFID-based Attendance Systems.
[2] The system suggests an RFID-based system in which students carry an ID card resembling an RFID tag that must be inserted into a card reader in order to record their attendance. The database containing the recorded attendance is saved by the system, which is connected to the computer through RS232. Unauthorised access could become a concern with this system.
An authorised ID card can be used by unauthorised people to enter the organisation. The iris is another biometric that can be applied to attendance systems. A Doughman-based Iris recognition system is suggested by the authors of [3]. This system uses an iris recognition management system to acquire, extract, store, and match iris recognition images. On the other side, it is challenging to lay transmission lines in places with poor typography.
[4] To perform the Face detection part, they utilised OpenCV. The entire technique is separated into three primary components: face detection, facial feature extraction, and picture categorization. The Face detection procedure describes a person's face in an input image. In the feature extraction step, face characteristics are identified and used to create an LBPH histogram that produces a fully unique outcome, and then in the identification process, the histogram of the input picture is compared to the database histogram utilising the classifier. Though they have mentioned some shortcomings of their system, that includes the system's lack of robustness in detecting faces due to occlusion caused if the rate of change in the frame is very high.
[5] RFID card systems, fingerprint systems, and iris recognition systems were all identified as having drawbacks by Arun Katara et al. (2017). Because of its simplicity, the RFID card system is used. However, as long as a student has their friend's ID card, he or she will assist their pals in checking in. The fingerprint method is effective, but not efficient because the verification procedure takes time, and the user must line up and do the verification individually. However, when it comes to face identification, the person's face is constantly visible and contains less information than the iris. A more detailed iris recognition system may intrude on the user's privacy. Although voice recognition is accessible, it is less accurate than other approaches.
[6] FACIAL Identification Using OpenCV-The author of this research has proposed a system that, when user authentication is necessary, uses facial detection and recognition to give a more straightforward human-machine interaction process. With the aid of a standard web camera, a computer can identify and recognise a person's face; a custom login page with the ability to restrict user access depending on the users' facial characteristics will be created. With Intel's open-source framework known as OpenCV, face recognition in this system may be done rather easily and reliably. For facial feature extraction, or 68 dotted features across the face, a face detector known as a Haar Cascade classifier is used to identify faces.
[7] CREATING databases using MySQL - This research focused on MySQL, the most popular open-source social data set management system, which was developed in Sweden in 1995 and is now owned by Oracle Corporation. Two information base plan learning instances are illustrated in this study. An information model was converted into a real data set using the first forward-designing arrangements. The instance that follows illustrates the ideal method for converting a present knowledge base into an information model. [8] Face Recognition based Attendance Management System - This system entails four steps: database building, face detection, face recognition, and attendance updating. Images of the students in class are used to develop databases. The Haar-Cascade classifier and the Local Binary Pattern Histogram technique are used, respectively, for face detection and recognition. From the classroom's live streaming video, faces are identified and recognized. At the conclusion of the session, attendance will be mailed to the relevant professors.
[9] Face-recognition-based student attendance system Both the current biometric methods and the conventional method of keeping attendance are susceptible to proxies. Therefore, it is suggested that this article address each of these issues. The suggested system uses Gabor filters, KNN, CNN, SVM, and generative adversarial networks in addition to Haar classifiers. Attendance reports will be generated and maintained in excel format following face recognition. The system is tested under a variety of circumstances, including lighting, head movements, and changes in the pupil's distance from the cameras. The total complexity and accuracy are determined after rigorous testing. The proposed system was demonstrated to be a reliable and effective tool for taking attendance in a classroom without taking up any time or requiring manual labour. The technology created is affordable and requires little installation.
[10] Face Recognition Attendance System-The four processes of this system are database creation, face detection, face recognition, and attendance updating. The database is created using images of the students in the class. The live streaming video from the classroom reveals and identifies faces. The attendance will be mailed to the appropriate faculty at the conclusion of the session.
[12] SQL is a powerful query language that can be used to query a wide range of database systems, from traditional relational databases to modern Big Data systems. The paper also discussed the description of the new database landscape and the identification of broad types of Big Data systems where SQL can be effectively used and a detailed description of class resources for each unit to enable a hands-on experience with SQL across a broad set of modern database systems. These resources include virtual machines, data generators, sample programs, projects, and in-class exercises.
[13] Python GUI for Image Processing Library: The objective of this work was to create an extensible graphical user interface (GUI) using Python and Tkinter for an image processing library, IPL98, which is written in C/C++. The decision was taken to use Python in order to gain the advantages of rapid development associated with using a scripting language.
IV. PROPOSED SYSTEM
The architecture of the proposed system has been designed to be basic and easy to understand. The steps that must be followed in order for the system to achieve its ultimate aim, which is to ensure that the student's attendance is updated correctly and on time. The system is open to anyone, and instructors can use it to easily check and maintain student attendance as needed. The System Camera will make capturing live video feeds from the classroom as well as student recognition simple. To access the LBPH algorithms and libraries needed for picture training, 3.As part of future work, we'd like to create an application that allows the user to update image samples of the student in the training dataset. Instead of being limited to a predetermined collection on the server, users will be able to build their own user groups. In order to enhance the number of pupils who are identified and recognized, we'd like to look into better face detection and face recognition algorithms.
V. METHODOLOGY
Local Binary Pattern Histogram (LBPH) Face Recognition:
The first phase in the LBPH procedure is to develop an intermediate image that best mimics the source image's face features. The method does this by employing the concept of a sliding window, which is influenced by the radius and neighbours’ parameters. The graphic below depicts this technique:
Let's split it down into little techniques that rely on the diagram above to make it easier to understand: Let's pretend we have a grayscale image of a face.
[11] Image 1.1 : Grayscale - Matrix
The Histograms are extracted in the following manner: We may now divide the map into numerous grids using the Grid X and Grid Y parameters and the diagram obtained in the previous phase, as shown in the following image:
[11] Image 1.2: LBP
Using the image above, we can extract the histogram of each area as follows:
The final histogram for an 8x8 grid would have 8x8x256=16.384 locations. The resulting histogram represents the properties of the original image.
For the LBPH algorithm, that's pretty much it.
VI. RESULT AND DISCUSSION
We have a faculty authentication mechanism in the suggested system. The teacher must register the student with their information and special ID following authentication.
The faculty takes 100-200 images of each student during the registration procedure. To prevent complication and achieve the desired outcomes, we are transforming the coloured image to grayscale in this. Webcam image samples are gathered. We adjusted the frame to effectively capture the face region in order to capture the image samples.
VII. FUTURE SCOPE
a. For any student whose attendance falls below 75% after a predetermined amount of time has passed, create a self-generating defaulter list.
b. The system must be able to discriminate between faces that have been identified and those that have not; unrecognised faces can be kept in a separate database. For the suggested work to be robust, a large number of detailed pictures of the kids may need to be taken and stored in the cloud.
2. The device can be set up and used in ATMs to look for fraud. We intend to develop an application that will enable users to update image samples of the student in the training dataset as part of our ongoing research. Users will have the ability to create their own user groups rather than being constrained to a predetermined collection on the server.
Automated Attendance Systems based on face recognition have so shown to be efficient and safe. This method can be used to identify a stranger. In real-time situations, LBPH performs better than other algorithms thanks to a higher recognition rate and a lower false positive rate. SVM and Bayesian are also superior classifiers when compared to distance classifiers. Future research aims to improve algorithm recognition rates when people unintentionally modify their look, for as by getting a tonsure, donning a scarf, or shaving their beard. The developed method still needs to be improved because it can only recognise face angle variations of up to 30 degrees. Systems for facial and gait recognition can be coupled to increase system performance.
[1] Scholars Journal of Engineering and Technology (SJET) ISSN 2347-9523 (Print) Abbreviated Key Title: Sch. J. Eng. Tech. ISSN 2321-435X (Online) ©Scholars Academic and Scientific Publisher A Unit of Scholars Academic and Scientific Society, India www.saspublisher.com Student Attendance Management System Karwan Jacksi1* , Falah Ibrahim2 , Shahab Ali3 University of Zakho, Iraq Duhok Polytechnic University, Iraq University of Zakho, Iraq [2] International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Published by, www.ijert.org NCIECC - 2017 Conference Proceedings - Online Attendance System 1Dr. A. Babu Karuppiah, 1Associate Professor R. Raja Raja, Assistant professor 2M. Jeyalakshmi, L. Johnsilin Shiny, B. Sri Devi 2Department of Electronics and Communication Engineering, Velammal College of Engineering and Technology, Madurai. [3] Automated Attendance Management System Based On Face Recognition Algorithms Shireesha Chintalapati, M.V. Raghunadh Department of E and CE NIT Warangal,INDIA 506004 Email: cshireesha102@gmail.com, raghunadhmv@gmail.com [4] Abhishek Pratap Singh, SunilKumar S Manvi, Pratik Nimbal, Gopal Krishna Shyam,Face Recognition System Based on LBPH Algorithm,International Journal of Engineering and Advanced Technology (IJEAT)-ISSN: 2249 – 8958, Volume-8, Issue-5S, May, 2019. [5] “Attendance System Using Face Recognition and Class Monitoring System”. International Journal on Recent and Innovation Trends in Computing and Communication, vol. 5, no. 2, Feb. 2017, pp. 273-6, doi:10.17762/ijritcc.v5i2.214. [6] Emami, Shervin & Suciu, Valentin. (2012). Facial Recognition using OpenCV. Journal of Mobile, Embedded and Distributed Systems. [7] Letkowski, Jerzy. (2015). Doing database design with MySQL. Journal of Technology Research. Volume 6. [8] https://www.researchgate.net/publication/341876647_Face_Recognition_based_Attendance_Management_System. [9] https://ieeexplore.ieee.org/document/9215441. [10] https://www.ijraset.com/research-paper/face-recognition-attendance-system. [11] STUDENT ATTENDANCE MONITORING SYSTEM USING FACE RECOGNITION - E CHARAN SAI Computer Science & Engineering Faculty of Engineering & Technology Bengaluru, India charanroyal39@gmail.com SHAIK ALTHAF HUSSAIN Computer Science & Engineering Faculty of Engineering & Technology Bengaluru, India charanroyal39@gmail.com SYED KHAJA Computer Science & Engineering Faculty of Engineering & Technology Bengaluru, India charanroyal39@gmail.com AMARA SHYAM Computer Science & Engineering Faculty of Engineering & Technology Bengaluru, India charanroyal39@gmail.com [12] Silva, Yasin & Almeida, Isadora & Queiroz, Michell. (2016). SQL: From Traditional Databases to Big Data. 413-418. 10.1145/2839509.2844560. [13] J. Singh, C. Taluja, V. Choudhary, K. Chand and P. Guha, \"Design and Development of Graphical User Interfaces for Detection of Forest Fires at early stages using Open-Source Technologies,\" 2021 6th International Conference on Signal Processing, Computing and Control (ISPCC), 2021, pp. 218-222, doi: 10.1109/ISPCC53510.2021.9609515.
Copyright © 2022 Aashay Bongulwar, Aayush Jadhav, Rishikesh Ahire, Amogh Dumbre, Sumaan Ali, Amruta Mankawade. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET45075
Publish Date : 2022-06-29
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here