Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Face Detection Attendance System By Arjun Sharma

6,757 views

Published on

Face Detection Attendance System

Published in: Software
  • Sex in your area is here: ❶❶❶ http://bit.ly/2F7hN3u ❶❶❶
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Dating direct: ♥♥♥ http://bit.ly/2F7hN3u ♥♥♥
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here

Face Detection Attendance System By Arjun Sharma

  1. 1. FACE DETECTION ATTENDANCE SYSTEM
  2. 2. Group Members:- Arjun.M.Sharma (1524) Mayur.R.Singh (1529)
  3. 3. INTRODUCTION •Everyday actions are increasingly being handled electronically, instead of pencil and paper or face to face. •This growth in electronic transactions results in great demand for fast and accurate user identification and authentication.
  4. 4. •In this paper, we propose a system that takes the attendance of students for classroom lecture. Our system takes the attendance automatically using face recognition. •Here a face is undeniably connected to its owner expect in the case of identical twins.
  5. 5. Biometrics  A biometric is a unique, measurable characteristic of a human being that can be used to automatically recognize an individual or verify an individual’s identity.  Biometrics can measure both physiological and behavioral characteristics.  Physiological biometrics:- This biometrics is based on measurements and a derived from direct measurement of a part of the human body.  Behavioral biometrics:- this biometrics is based on measurements and data derived from an action.
  6. 6. Types PHYSIOLOGICAL a. Finger-scan b. Facial Recognition c. Iris-scan d. Retina-scan e. Hand-scan BEHAVIORAL a. Voice-scan b. Signature-scan c. Keystroke-scan
  7. 7. Facial Recognition ???  It requires no physical interaction on behalf of the user.  It is accurate and allows for high enrolment and verification rates.  It can use your existing hardware infrastructure, existing camaras and image capture Devices will work with no problems
  8. 8. Facial Recognition In Facial recognition there are two types of comparisons:-  VERIFICATION- The system compares the given individual with who they say they are and gives a yes or no decision.  IDENTIFICATION- The system compares the given individual to all the Other individuals in the database and gives a ranked list of matches.
  9. 9. Image processing and comparison module Database Recognise the faces Compares with Database and fills up the attendance
  10. 10. CLASS DIAGRAM
  11. 11.  Capture: A physical or behavioural sample is captured by the system during Enrollment and also in identification or verification process.  Extraction: unique data is extracted from the sample and a template is created.  Comparison: the template is then compared with a new sample.  Match/non-match: the system decides if the features extracted from the new Samples are a match or a non match. All identification on authentication technologies operate using the following four stages:-
  12. 12. Image Processing •Images are cropped such that the avoid facial image remains, and color images are normally converted to black and white in order to facilitate initial comparisons based on grayscale characteristics. • First the presence of faces or face in a scene must be detected. •Once the face is detected, it must be localized and Normalization process may be required to bring the dimensions of the live facial sample in alignment with the one on the template.
  13. 13. Behavioural changes such as alteration of hairstyle, changes in makeup, growing or shaving facial hair, adding or removing eyeglasses are behaviours that impact the ability of facial-scan systems to locate distinctive features, facial-scan systems are not yet developed to the point where they can overcome such variables.
  14. 14. • Facial recognition software is based on the ability to first recognize faces, which is a technological feat in itself. If you look at the mirror, you can see that your face has certain distinguishable landmarks. These are the peaks and valleys that make up the different facial features. • VISIONICS defines these landmarks as nodal points. There are about 80 nodal points on a human face. HOW IT WORKS?
  15. 15. Here are few nodal points that are measured by the software. 1. Distance between the eyes 2. Width of the nose 3. Depth of the eye socket 4. Cheekbones 5. Jaw line 6. Chin
  16. 16.  The system maps the face and creates a faceprint, a unique numerical code for that face. Once the system has stored a faceprint, it can compare it to the thousands or millions of faceprints stored in a database.  Each faceprint is stored as an 84-byte file.
  17. 17. MERITS:- •It can search against static images such as driver’s license photographs. •It is the only biometric able to operate without user cooperation. •Get Rid of Pen & Paper System •Do not have to remember! •Data is collected and stored automatically
  18. 18. DEMERITS:- •Difficult to maintain and repair • System is ineffective if there is no power supply • 30-40% Perfection
  19. 19. CONCLUSION In this paper, in order to obtain the attendance, positions and face images in classroom lecture, we proposed the attendance management system based on face recognition in the classroom lecture. The system estimates the attendance and the position of each student by continuous observation and recording. The result of our preliminary experiment shows continuous observation improved the performance for estimation of the attendance. Current work is focused on the method to obtain the different weights of each focused seat
  20. 20. FUTURE SCOPE We also need to discuss the approach of camera planning based on the result of the position estimation in order to improve face detection effectiveness. In further work, we intend to improve face detection effectiveness by using the interaction among our system, the students and the teacher. On the other hand, our system can be improved by integrating video-streaming service and lecture archiving system, to provide more profound applications in the field of distance education, course management system (CMS) and support for faculty development (FD)

×