As the world is shifting towards digitalization, most of the exams and assessments are being conducted online. These exams must be proctored. Several students are accessing the test at the same time. It is very difficult to manually look if a student is committing malpractice. This project aims to use face detection and recognition for proctoring exams. Face detection is the process of detecting faces in a video or image while face recognition is identifying or verifying a face from images or videos. There are several research studies done on the detection and recognition of faces owing to the requirement for security for economic transactions, authorization, national safety and security, and other important factors. Exam proctoring platforms should be capable of detecting cheating and malpractices like face is not on the screen, gaze estimation, mobile phone detection, multiple face detection, etc. This project uses face identification using HAAR Cascades Algorithm and face recognition using the Local Binary Pattern Histogram algorithm. This system can be used in the future in corporate offices, schools, and universities.
Introduction
I. INTRODUCTION
Most of the schools and universities are now shifting towards conducting exams online as it is a tedious task to conduct the exams offline and evaluate the students. It requires manual work. However, conducting the exams online is not a simple task. As several students are accessing the test at the same time, it is difficult to keep a watch on everyone. And the ways students commit malpractices can’t be noticed manually. So, this project aims to eliminate maximum possibilities that a candidate may use to cheat in exams. This includes impersonation, use of external devices, tab switching, face spoofing, etc. The objective of this platform is to proctor exams and prevent any student misconduct. There are numerous approaches to achieve it. This project is mainly focusing on continual webcam proctoring. The goal is to provide a regulated environment for exam proctoring using face detection and facial recognition algorithms. There are several researches done on face detection and face recognition can be executed. This model uses Haar Cascades algorithm for face detection and Local Binary Pattern Histogram algorithm for face recognition. These are Machine Learning algorithms widely used and easier to execute. Although, several other models are studied before deciding the final system architec- ture.
II. LITERATURE REVIEW
In [1], the availability of annotated datasets and computa- tions has led to an impressive improvement in the performance of CNNs, but domain adaptation and dataset bias are a problem, and training CNNs is very time-consuming. Sun, W.
[4] proposed a method called Fully Convolutional Network with Domain Adaptation and Lossless Size Adaptation (FCN- DA-LSA). An embedded domain adaptation layer is embedded in the lossless size adaptation preprocessor, followed by a pixel-level FCN classifier. In this method, the domain must be known in advance. In [10], extensive experiments are con- ducted on four popular face recognition benchmarks, including AFW, PASCAL face, FDDB and WIDER FACE, showing that the method is comparable, but a large dataset certainly affects the performance. Wu, W. [9] proposed a multiscale face detector (DSFD) based on Faster R-CNN.In [8], two typical structures called Centralised Attention Feature (CAF) and Distributed Attention Feature (DAF) are proposed for face recognition, which are in-place and end-to-end train- able.Recognition of small faces using this proposed method is inefficient.Liang J [7] designed and implemented a method for face recognition from low-light images. Low-light images are challenging due to the limited number of photons and the inevitable noise, and to make the task even more difficult, they are often spatially unevenly distributed. Liang J [7] proposed a novel recurrent exposure generation module (REG) and coupled it seamlessly with a multiple exposure detection mod- ule (MED) module, thus greatly improving face recognition performance by effectively suppressing uneven illumination and noise problems. Nevertheless, the proposed model shows lower performance because S3FD has much fewer parame- ters and consequently much lower model capacity compared to DSFD and PyramidBox, resulting in insufficient guiding effects for the generation modules.11],The proposed model uses a dual-vision face detection method for preprocessing and uses 3WPCA (Three Level Wavelet Decomposition - Principal Component Analysis) as the feature extraction Component Analysis) as the model for feature extraction.
In dual-vision face recognition, we use the half-join method to combine half of the left image and half of the right image into one image, which can then be extracted using 3WPCA. The use of stereo vision cameras is not yet very cost effective for academia.
III. METHODOLOGY
A. Face Detection using Haar Cascades
Face Detection is a popular subject with much research and studies and has a wide range of applications. Face detection is used in biometrics, video surveillance, human computer interface and image database management. It is also used in emotional inference, photography, marketing, lipreading, etc. Although face detection is extensively used, it is a tedious task. Therefore a proper and efficient approach needs to be used for face detection. Haar Cascades is an object detection algorithm that can be used for detecting faces in image or real time videos. It uses the cascading window, and computes features in every window and classifies whether it could be an object. The algorithm can be explained in four stages:
Calculating Haar Features:In a recognition window, a haar feature is practically the result of calculations on adjacent rectangular sections. To calculate the difference between the sums, the pixel intensities in each region must first be added.
Creating Integral Images:Essentially, integral images speed up the calculation of these haar features. Sub- rectangles and array references are constructed for each of these rectangles, rather than performing the computation for each pixel. The Haar features are then calculated based on these.
Using Adaboost:Essentially, Adaboost selects the best features and trains the classifiers to use them. The algo- rithm can recognise objects by using a ”strong classifier” consisting of the combination of several ”weak classi- fiers”
Implementing Cascading Classifiers:The cascade clas- sifier consists of several stages, each formed by a group of weak learners. From the mean of the predictions of all weak learners, a highly accurate classifier can be created by boosting during the training of the weak learners, which either decides on the following region or signals that an object has been identified based on this prediction (positive) (negative). The stages are created so that negative samples can be discarded as quickly as possible, since the majority of the windows contain nothing of interest.
B. Face Recognition using Local Binary Pattern Histogram
Face recognition has wide-range of applications. Although it sounds like a simple task, it is a complex process for a computer, as many features and variables need to be identified and extracted. Light intensity, image or video quality, face direction, face size, gaze are some of the factors affecting effective face recognition.
The LBPH algorithm works by recognizing a person’s face based on their local binary pattern histogram. Both the front and the side faces of a person can be recognized by its performance.Matrix formats consist of rows and columns, which represent all images.Images are composed of pixels.Pixels are the building blocks of an image.These are all small squares.It is possible to form the complete image by putting them side by side.The smallest possible amount of information can be found in a single pixel.Each image has pixels with values ranging from 0 to 255. The basic colours red, green, and blue are represented by the three values R, G, and B. A single pixel has three channels, one channel for each of the three basic colors, because the combination of these three colours will produce all the colours in the image. With the aid of the Grid parameters X and Y, the picture acquired in Step is split into several grids. This picture is in grayscale, and each grid’s histogram is meant to reflect the intensity of each pixel’s occurrences. A new histogram that accurately captures the characteristics of the original image is then produced by combining each histogram. For a picture from the training data set, each person created a histogram.
IV. ACKNOWLEDGMENT
It gives us great pleasure in presenting the preliminary research survey on Face Detection and Recognition. We would like to take this opportunity to thank our guide Prof.Archana S. Kadam for giving us all the help and guidance we needed. We are really grateful to her for her kind support. We are also thank- ful to our reviewers Prof.Amit Kadam and Prof.Shreesudha T. Kembhavi for their valuable sug- gestions.We are grateful to Dr.Archana S. Ghotkar, Head of Department of Information Technology, Pune Institute of Computer Technology for her indispensable support and sug- gestions.
References
[1] Ranjan, R., Bansal, A., Zheng, J., Xu, H., Gleason, J., Lu, B., Nanduri, A., Chen,J.-C., Castillo, C., Chellappa, R.(2019). A Fast and Accurate System for Face Detec-tion, Identification, and Verification. In IEEE Transactions on Biometrics, Behavior,and Identity Science (Vol. 1, Issue 2, pp. 82–96). Institute of Electrical and Electronics Engineers (IEEE).
[2] Quansheng Guan, F.richard Yu, Shengming Jian Victo, C. M. Leung, ”Topology control in Mobile Ad networks with cooperative communi- cations”, IEEE conference on wireless wireless communication, April 2012.
[3] Miguel A.Labrader, Pedro M. Wightman, ”Topology Control in Wireless Sensor Net- works”,Springer link Publication.
[4] Sun, W., Song, Y., Zhao, H., Jin, Z. (2020). A Face Spoofing Detection Method Based on Domain Adaptation and Lossless Size Adaptation. In IEEE Access (Vol. 8,pp. 66553–66563). Institute of Electrical and Electronics Engineers (IEEE).
[5] Arashloo, S. R. (2021). Unseen Face Presentation Attack Detection Using Sparse Multiple Kernel Fisher Null-Space. In IEEE Transactions on Circuits and Systems for Video Technology (Vol. 31, Issue 10, pp. 4084–4095). Institute of Electrical and Electronics Engineers (IEEE).
[6] Li, J., Liu, L., Li, J., Feng, J., Yan, S., Sim, T. (2019). Toward a Comprehensive Face Detector in the Wild. In IEEE Transactions on Circuits and Systems for Video Technology (Vol. 29, Issue 1, pp. 104–114). Institute of Electrical and Electronics Engineers (IEEE).
[7] Liang, J., Wang, J., Quan, Y., Chen, T., Liu, J., Ling, H., Xu, Y. (2022). Recurrent Exposure Generation for Low-Light Face Detection. In IEEE Transactions on Mul-timedia (Vol. 24, pp. 1609–1621). Institute of Electrical and Electronics Engineers (IEEE).
[8] Li, Z., Tang, X., Wu, X., Liu, J., He, R. (2020). Progressively Refined Face Detec-tion Through Semantics-Enriched Representation Learning. In IEEE Transactions on Information Forensics and Security (Vol. 15, pp. 1394–1406). Institute of Electrical and Electronics Engineers (IEEE)
[9] Wu, W., Yin, Y., Wang, X., Xu, D. (2019). Face Detection With Different Scales Based on Faster R-CNN. In IEEE Transactions on Cybernetics (Vol. 49, Issue 11, pp. 4017–4028). Institute of Electrical and Electronics Engineers (IEEE).
[10] Li, X., Lai, S., Qian, X. (2022). DBCFace: Towards Pure Convolutional Neural Network Face Detection. In IEEE Transactions on Circuits and Systems for Video Technology (Vol. 32, Issue 4, pp. 1792–1804). Institute of Electrical and Electronics Engineers (IEEE).
[11] Winarno, E., Hadikurniawati, W., Al Amin, I. H., and Sukur, M. (2017). Anti-cheating presence system based on 3WPCA-dual vision face recognition. In 2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI). 2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI). IEEE.