Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Mayur Komar, Vinod Kolhe, Preeti Gajul, Rohan Bhukan
DOI Link: https://doi.org/10.22214/ijraset.2022.42628
Certificate: View Certificate
Mainly there are two conventional methods of marking attendance which are calling out the roll call or by taking student sign on paper. They both were more time consuming and difficult. Hence, there is a requirement of computer-based student attendance management system which will assist the faculty for maintaining attendance record automatically. In this project we have implemented the automated attendance system using MATLAB. We have projected our ideas to implement “Automated Attendance System Based on Facial Recognition”, in which it imbibes large applications.
I. INTRODUCTION
Human face plays an important role in our day to day life mostly for identification of a person. Face recognition is a part of bio metric identification that extracts the facial features of a face, and then stores it as a unique face print to uniquely recognize a person. Bio metric face recognition technology has gained the attention of many researchers because of its wide application. Face recognition technology is better than other bio metric based recognition techniques like finger-print, palm-print, iris because of its non-contact process. Recognition techniques using face recognition can also recognize a person from a distance, without any contact or interaction with person. The face recognition techniques are currently implemented in social media websites like Facebook, at the airports, railway stations. The, at crime investigations. Face recognition technique can also be used in crime reports, the captured photo can be stored in a database, and can be used to identify a person. Facebook uses the facial recognition technique for automating the process of tagging people. For face recognition we require large data set and complex features to identify a person in all conditions like change of illumination, age, pose, etc. Recent researches show there is a betterment in facial recognition systems. In the last ten years there is huge development in recognition techniques.
But currently most of the facial recognition techniques is able to work fine only if the number of people in one frame is very few and under controlled illumination, proper position of faces and clear images. For face recognition purpose, there is a need for large data sets and complex features to uniquely identify the different subjects by manipulating different obstacles like illumination, pose and aging. During the recent few years, a good improvement has been made in facial recognition systems. In comparison to the last decade, one can observe an enormous development in the world of face recognition. Currently, most of the facial recognition systems perform well with limited faces in the frame. Moreover, these methodologies have been tested under controlled lighting conditions, proper face poses and non- blurry images. The system that is proposed for face recognition in this paper for attendance system is able to recognize multiple faces in a frame without any control on illumination, position of face.
II. PROBLEM DEFINITION
Attendances of every student are being maintained by every school, college and university. Empirical evidences have shown that there is a significant correlation between students’ attendances and their academic performances. There was also a claim stated that the students who have poor attendance records will generally link to poor retention. Therefore, faculty has to maintain proper record for the attendance. The manual attendance record system is not efficient and requires more time to arrange record and to calculate the average attendance of each student. Hence there is a requirement of a system that will solve the problem of student record arrangement and student average attendance calculation. One alternative to make student attendance system automatic is provided by facial recognition. Challenges for Social Cognitive Models of the CRE. As reviewed above, the social-cognitive approach to face recognition biases such as the CRE has produced novel and provocative findings that have advanced the study of face memory.
For example, the demonstration of Cross Race-like biases across various ingroup/outgroup distinctions underscores the utility of considering generalized inter group effects when explaining face recognition biases. However, social cognitive models of the CRE have difficulty explaining some findings in the literature.
These theoretical and empirical limitations are discussed below. Mixed Evidence Regarding Race Accessibility, Face Perception and Memory. One prediction of social-cognitive models is that the salience or accessibility of the racial group categorization will influence the CRE. Thus, the more accessible the racial outgroup category, the more it will reduce CR recognition. Notably, recent evidence indicates that manipulations intended to increase the accessibility of race-categorization (Rhodes et al., 2009) or designed to lead to outgroup categorization of racially ambiguous faces (Rhodes, Li, Ewing, Evangelista, & Tanaka, 2010) do not always affect face memory, contrary to social cognitive predictions.
III. METHODOLOGY
A. Image Training
Automated Attendance System based on Facial Recognition Department of ECE, SMVITM, Bantakal. The image of the person we want to find in the training set is transformed into a vector, reduced by the mean value and projected with the matrix of the Eigen vector. Classification is done by determining the Euclidean distance between the two vectors of the images of the training data set and the test image. If the minimum distance between the test face and training face is less than the threshold. It is considered to be known and belong to the person in the database otherwise it is considered to be unknown. Whenever a person is successfully recognized the system automatically marks his or her attendance in the database which is in the MS Excel. This is explained in the following section.
B. Store Recognized Files
Whenever the algorithm finds a match, we update the corresponding field of the person in the excel sheet with a ‘1’ on that particular date. Else by default it is marked as ‘0’ which says that the person is absent. MS Excel provides a very efficient way of storing the data. This is explained in the next section.
C. Update the Attendance Sheet in Excel
The MATLAB IDE and the MS Excel sheet is linked using the toolbox Spreadsheet Link Ex. Whenever a detected face matches with a person in the database, the value is updated in that particular Excel sheet. This is carried out through the function xlswrite(). The candidate’s identity is determined through the index of the image with which the detected face matches with. A spreadsheet of the desired format has to be drafted beforehand (attendance.xls in our system) Using the index values corresponding cell in the sheet is updated with one along with the time and date of the classroom. The system designed is part of an in-house built learning management suite (Libri) . It is constructed in many modules: The system designed is part of an in-house built learning management suite (Libri). It is constructed in many modules:
The required infrastructure in classroom is a camera positioned centrally in the front of the classroom. Using this setup, the camera is capable to capture frontal images from students. A different approach would be to use a camera at the entrance of the classroom, which would individually detect faces for everyone entering the classroom. This way, the face detector would have much less work to do, but there would be only one chance to capture a good frame. A frontal camera in the middle of the classroom can take as many pictures as necessary. Physically the system is integrated on the existing South East European Universities infrastructure. To function, attendance will be taken and stored in Microsoft excel sheet.
D. Image Capturing
Images are captured using a module that is a digital camera whose link is integrated to the application that is developed using the proposed idea. After the camera has started the software captures images of all the recognized students and marks their attendance in a excel sheet. The camera keeps on taking the images until the system is told to stop.
E. Face Detection
Detecting a face is in essence an object detection task, where the object of interest in this case is the face. However, many factors can interfere with the face detection algorithms, factors such as face pose, scale, position, rotation, light, image colors, etc. The same problems arise when one wants to identify (recognize) a face, with addition to some other obstacles which is discussed shortly. The process of detecting faces from still pictures containing multiple faces can be separated in few steps.
There are plenty face detection algorithms which can effectively detect a face (or any other specific object) in a picture. In the system presented here, most students face the camera frontally hence we chose to use the HAAR classifier for face detection. This classifier is implemented on Intel’s Open CV library. The classifier works by training a model using positive face images and negative face images. A positive image is an image that contains the desired object to be detected, in our case this object is a face. A negative image is an image that does not contain the desired object. After the model is trained, it is able to identify face features, which is later, stored on a XML file. A problem faced during this process was the large number of false-positives: objects mistakenly detected as faces. This was not such a big issue for us, since a false-positive does not result in a positive identification during the recognition phase. Because of this, we lowered the detection threshold, so all faces could be detected. After a face has been detected, the rectangle enclosing this face is cropped and processed later by the face recognition module. This rectangle represents a single face, and after being cropped as an image is stored to the data-set with the name and id associated with the face. Each file transferred is renamed to have a unique ID.
F. Face Recognition
Recognizing a face means to identify that particular face from a list of faces on a database. Our university, upon enrolment takes pictures from every student, and those images are stored in a database. Same as in face detection, there are many existing algorithms used to identify a face. Our system is programmed in Python which takes benefit of eigen faces to identify a face. This algorithm has many drawbacks: it depends on scale, pose and the color of the compared images. However the algorithm is very fast, and can compare only to images, thus we do not NEED to have multiple images of a person to train our system. Since our system is setup to capture only frontal images the pose of the face in not an issue. When a face is captured during the face detection phase, it is converted into gray scale. The same conversion is applied to faces on our student image database. We also do background subtraction on our images so other objects do not interfere during the process. Another issue is that faces are subject of change during time (facial hair, eyeglasses etc). Of course, a drastic change on a student’s look causes the system to not identify that particular student. To solve this issue, we have included a module, which lists all unidentified faces and the teacher is able to manually connect a captured face with a student from the list. This image is also stored on our database, as an updated picture of this particular student. This manual recognition process is performed only once. In a subsequent scan, this student is identified automatically by our system. To speed up the face recognition process we only compare images captured in a classroom, with the database of students enrolled for that course only. This ensures that we process only a small subset of images available on our central data base.
IV. PROPOSED SYSTEM
All the students of the class must register themselves by entering the required details and then their images will be captured and stored in the data-set. During each session, faces will be detected from live streaming video of classroom. The faces detected will be compared with images present in the data-set. If match found, attendance will be marked for the respective student. At the end of each session, list of absentees will be mailed to the respective faculty handling the session. The system architecture of the proposed system is given below,
V. RESULTS AND DISCUSSIONS
The users can interact with the system using a GUI. Here users will be mainly provided with three different options such as, student registration, faculty registration, and mark attendance. The students are supposed to enter all the required details in the student registration form. After clicking on register button, the web cam starts automatically and window as shown in Fig.2. pops up and starts detecting the faces in the frame. Then it automatically starts clicking photos until 60 samples are collected or CRTL+Q is pressed. These images then will be pre-processed and stored in training images folder. The faculties are supposed to register with the respective course codes along with their email-id in the faculty registration form provided. This is important because the list of absentees will be ultimately mailed to the respective faculties.
In every session, respective faculty must enter their course code. Then after submitting the course code, the camera will start automatically. The Fig.3. shows the face recognition window where two registered students are recognized and if in case they were not registered it would have shown ‘unknown’. By pressing CTRL+Q, the window will be closed and attendance will be updated in the excel sheet and names of absentees will be mailed to the respective faculty.
The Fig 4. shows the attendance of the present students with date and time.
Face recognition is a challenging problem in the field of computer vision, which has received a great deal of attention over the past years because of its several applications in various domains. Although research efforts have been conducted vigorously in this area, achieving mature face recognition systems for operating under constrained conditions, they are far from achieving the ideal of being able to perform adequately in all various situations that are commonly encountered by applications in the real world. This paper on face recognition serves as a reference point towards an objective evaluation of the community’s progress on face recognition research and to better address the challenges of face recognition in the real-world scenarios.
[1] Anil, K., Arun, A., Karthik, N.: ‘Introduction to biometrics’ (Springer, New York, USA, 2011) [2] Zhao, W., Chellappa, R., Rosenfeld, A., Phillips, J.: ‘Face recognition: a literature survey’, ACM Compute. Surv., 2003, 35, (4), pp.s 399–458 [3] Pentland, A.: ‘Looking at people: sensing for ubiquitous and wearable computing’, IEEE Trans. Pattern Anal. Mach. Intell., 2000, 22, (1), pp. 107–119 [4] Wright, J., Yang, A., Ganesh, A., Sastry, S., Ma, Y.: ‘Robust face recognition via sparse representation’, IEEE Trans. Pattern Anal. Mach. Intell., 2009, 31, (2), pp. 210–227 [5] Biswas, S., Bowyer, K., Flynn, P.: ‘Multidimensional scaling for matching low-resolution face images’, IEEE Trans. Pattern Anal. Mach. Intell., 2012, 34, (10), pp. 2019–2030 [6] Stan, Z.L., Jain, A.: ‘Handbook of face recognition’ (Springer, New York, USA, 2005) [7] Jain, A.K., Klare, B., Park, U.: ‘Face recognition: some challenges in forensics’. IEEE Int. Conf. on Automatic Face Gesture Recognition and Workshops (FG 2011), Santa Barbara, CA, USA, 2011, pp. 726–733 [8] Klare, B., Jain, A.: ‘Heterogeneous face recognition: matching NIR to visible light images’. Int. Conf. on Pattern Recognition (ICPR), Istanbul, Turkey, 2010, pp. 1513–1516 [9] Lei, Z., Liao, S., Jain, A., Li, S.: ‘Coupled discriminant analysis for heterogeneous face recognition’, IEEE Trans. Inf. Forensics Sec., 2012, 7, (6), pp. 1707–1716 [10] Klare, B., Jain, A.: ‘Heterogeneous face recognition using kernel prototype similarities’, IEEE Trans. Pattern Anal. Mach. Intell., 2013, 35, (6), pp. 1410–1422 [11] Kumar, R., Banerjee, A., Vemuri, B., Pfister, H.: ‘Trainable convolution filters and their application to face recognition’, IEEE Trans. Pattern Anal. Mach. Intell., 2012, 34, (7), pp. 1423–1436 [12] Zhen, L., Pietikäinen, M., Stan, Z.L.: ‘Learning discriminant face descriptor’, IEEE Trans. Pattern Anal. Mach. Intell., 2014, 36, (2), pp. 289–302 [13] Liao, S., Shen, D., Chung, A.: ‘A Markov random field groupwise registration framework for face recognition’, IEEE Trans. Pattern Anal. Mach. Intell., 2014, 36, (4), pp. 657–669. [14] Ho, H., Gopalan, R.: ‘Model-driven domain adaptation on product manifolds for unconstrained face recognition’, Int. J. Comput. Vis., 2014, 109, (1–2), pp. 110–125 [15] Phillips, P., Beveridge, J., Draper, B., et al.: ‘The good, the bad, and the ugly face challenge problem’, Image Vis. Comput., 2012, 30, (3), pp. 177–185 [16] Yi, D., Lei, Z., Li, S.Z.: ‘Towards pose robust face recognition’. IEEE Int. Conf. on Computer Vision and Pattern Recognition (CVPR’13), Portland, Oregon, USA, 2013, pp. 3539–3545 [17] Hua, G., Yang, M., Learned-Miller, E., et al.: ‘Introduction to the special section on real-world face recognition’, IEEE Trans. Pattern Anal. Mach. Intell., 2011, 33, (10), pp. 1921–1924 [18] Ho, H., Chellappa, R.: ‘Pose-invariant face recognition using Markov random fields’, IEEE Trans. Image Process., 2013, 22, (4), pp. 1573–1584 [19] Wenyi, Z., Rama, C.: ‘Face processing: advanced modeling and methods’ (Academic Press, New York, USA, 2005) [20] Grother, P., Quinn, G., Phillips, J.: ‘Report on the evaluation of 2D still-image face recognition algorithms’. Technical Report, NIST Interagency Report 7709, National Institute of Standards and Technology, 2010 [21] Phillips, P., Scruggs, W., OToole, A., et al.: ‘FRVT 2006 and ICE 2006 large-scale experimental results’, IEEE Trans. Pattern Anal. Mach. Intell., 2010, 32, (5), pp. 831–846 [22] Best-Rowden, L., Han, H., Otto, C., Klare, B., Jain, A.: ‘Unconstrained face recognition: identifying a person of interest from a media collection’. Technical Report, Technical Report MSU-CSE-14-1, Michigan State University, 2014 [23] An, L., Kafai, M., Bhanu, B.: ‘Dynamic Bayesian network for unconstrained face recognition in surveillance camera networks’, IEEE J. Emerg. Sel. Top. Circuits Syst., 2013, 3, (2), pp. 155–164 [24] Phillips, P.J., Flynn, P.J., Scruggs, T., et al.: ‘Overview of the face recognition grand challenge’. IEEE Conf. Computer Vision and Pattern Recognition, San Diego, CA, USA, 2005, pp. 947–954 [25] Kamgar-Parsi, B., Lawson, W., Kamgar-Parsi, B.: ‘Toward development of a face recognition system for watchlist surveillance’, IEEE Trans. Pattern Anal. Mach. Intell., 2011, 33, (10), pp. 1925–1937. [26] Ozkana, D., Duygulu, P.: ‘Interesting faces: a graph-based approach for finding people in news’, Pattern Recognit., 2010, 43, (5), pp. 1717–1735 [27] Ortiz, E., Becker, B.: ‘Face recognition for web-scale datasets’, Comput. Vis. Image Underst., 2013, 108, pp. 153–170 [28] 28 Pinto, N., Stone, Z., Zickler, T., Cox, D.: ‘Scaling up biologically-inspired computer vision: a case study in unconstrained face recognition on Facebook’. IEEE Computer Vision and Pattern Recognition, Workshop on Biologically Consistent Vision, Colorado Springs, USA, 2011, pp. 35–42 [29] Introna, L., Wood, D.: ‘Picturing algorithmic surveillance: the politics of facial recognition systems’, Surveillance Soc., 2004, 2, (2/3), pp. 177–198 [30] Han, H., Klare, B., Bonnen, K., Jain, A.: ‘Matching composite sketches to face photos: a component-based approach’, IEEE Trans. Inf. Forensics Sec., 2013, 8, (1), pp. 191–204 [31] Tang, X., Wang, X.: ‘Face sketch recognition’, IEEE Trans. Circuits Syst. Video Technol., 2004, 14, (1), pp. 50–57 [32] Gao, X., Zhong, J., Tian, C.: ‘Sketch synthesis algorithm based on E-Hmm and selective ensemble’, IEEE Trans. Circuits Syst. Video Technol., 2008, 18, (4), pp. 487–496 [33] Tang, X., Wang, X.: ‘Face photo-sketch synthesis and recognition’, IEEE Trans. Pattern Anal. Mach. Intell., 2009, 31, (11), pp. 1955–1967 [34] Brendan, F.K., Zhifeng, L., Anil, K.J.: ‘Matching forensic sketches to mug shot photos’, IEEE Trans. Pattern Anal. Mach. Intell., 2011, 33, (3), pp. 639–646 [35] Klum, S., Han, H., Jain, A., Klare, B.: ‘Sketch based face recognition: forensic vs. composite sketches’. Sixth IAPR Int. Conf. Biometrics (ICB’13), Madrid, Spain, 2013, pp. 1–8 [36] Jain, A., Klare, B., Park, U.: ‘Face matching and retrieval in forensics applications’, IEEE Multimedia, 2012, 19, (1), pp. 20–28 [37] Erdogmus, N., Marcel, S.: ‘Spoofing in 2D face recognition with 3D masks and anti-spoofing with kinect’. The IEEE Sixth Int. Conf. Biometrics: Theory, Applications and Systems (BTAS 2013), Washington, DC, USA, 2013, pp. 1–6.
Copyright © 2022 Mayur Komar, Vinod Kolhe, Preeti Gajul, Rohan Bhukan. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET42628
Publish Date : 2022-05-13
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here