SlideShare a Scribd company logo
1 of 8
Download to read offline
Computer Science & Engineering: An International Journal (CSEIJ), Vol. 3, No. 5, October 2013

SMART APPLICATION FOR AMS USING
FACE RECOGNITION
MuthuKalyani.K, VeeraMuthu.A
M-Tech Information Technology, Sathyabama University, Chennai.
Professor, M-Tech IT, Sathyabama University, Chennai

ABSTRACT
Attendance Management System (AMS) can be made into smarter way by using face recognition technique,
where we use a CCTV camera to be fixed at the entry point of a classroom, which automatically captures
the image of the person and checks the observed image with the face database using android enhanced
smart phone.
It is typically used for two purposes. Firstly, marking attendance for student by comparing the face images
produced recently and secondly, recognition of human who are strange to the environment i.e. an
unauthorized person
For verification of image, a newly emerging trend 3D Face Recognition is used which claims to provide
more accuracy in matching the image databases and has an ability to recognize a subject at different view
angles.

KEYWORDS
CCTV camera, Face recognition, 3D Model, Face database.

1. INTRODUCTION
Attendance systems of old practises are not quite efficient today for keeping track on student’s
attendance. Due to the availability of large resources over the internet today, it is very hard to
motivate the students to attend lectures without fail have become more challenging. In order to
drag the attention of students and make them interactive in observing technologies we move on to
latest upcoming trends on developing attendance systems. This is the strong reason for college
attendance management system has to come up with an approach that ensures strong contribution
of students in classrooms.
To track attendance of the students, many attendance management systems are introduced in the
market. With the introduction of this variety of attendance system, skipping classes without the
staff’s knowledge have become difficult for the students. For few view of college attendance
systems that were used earlier in the market are based on RFID systems, punch card systems,
swipe card systems, biometric systems that includes fingerprint analysis, iris analysis etc.
Although these systems all are lagged in their own respective so which lead to the new way
practise on AMS.
In smart AMS we are going to mark the attendance of the student by capturing the image of the
person for identifying correctly.
DOI : 10.5121/cseij.2013.3502

13
Computer Science & Engineering: An International Journal (CSEIJ), Vol. 3, No. 5, October 2013

Attendance of students in the college is one of the essential day to day activities. Additional
Operations within this smart system includes the software that provides
1. Marking of daily students’ attendance.
2. Daily provision to check in personal attendance by employee of the college (teaching and
certain non-teaching staff).
3. The software is installed to produce the attendance statistics which can be viewed by
HOD, directors and staff on daily, monthly and yearly basis.

2. PROBLEM STATEMENT
In the standalone application [1], face was captured by the webcam cameras and the detected
faces are stored in desktop webcam folder.
For matching the captured images with the database, Eigen faces methodology was used.
Observance of Eigen faces method [7] was explained as,
a)
b)
c)
d)

Single structure of face pattern only allowed.
Gallery images must be of same size.
Requires full frontal face to be presented for each time.
Does not endure to the variations of brightness effect, pose and different expressions of
face.
e) Effective only for low dimensional structure of face patterns.
The image which doesn’t match with database is given by error message on desktop. Where the
instructor has to take the attendance to those unmatched student images manually.

3. PROPOSED SYSTEM
The smart applications for AMS are designed as shown in the architecture diagram [Figure 1].
The CCTV camera is fixed at the entry of the class room and used to observe the face of the
students. The observed image of the person is sent to the android mobile which is connected to
the CCTV camera.
Android mobiles are enriched with the face recognition software technique which actually
produces the possibilities of the human expression variations. The use of 3D face technology
enables the work of identifying, verifying and detecting the match images in the face database.
The diagram illustrates how the phases of the system are carried out. The smart AMS consists of
six modules which are explained detailed below.

14
Computer Science & Engineering: An International Journal (CSEIJ), Vol. 3, No. 5, October 2013

[Figure 1] Architecture diagram for smart application for AMS using Face Recognition.

i) REGISTRATION
First phase of the system, actually deals with registering the information of the student in a
particular classroom. The information includes
(1)
(2)
(3)

Name of the student
Register or Roll number
Image of the student (taken by camera).

These details are placed in the student database from which the actual comparison will be done.
ii) IMAGE CAPTURING
The CCTV cameras are used for capturing the images [27] of the student which will be in active
mode during the hours of college. The camera will be placed at the entry point of the classroom
when the student enters it automatically captures the image and send to the android mobile to
which it has been connected with.
The use of CCTV camera is that it is capable of capture the image of high quality and also at
different angles view.

iii) IDENTIFICATION
To identify the student image, smart phone which holds the image database of the student, checks
for the match using 3D face recognition software technique.
In 3D face recognition technique [11] [15] 3D sensors are used to capture information about the
outline of a face surface. The obtained information is then used to identify the distinct features on
the face surface, such as the axis of the eye sockets, nose, and Chin. [Figure 2]
15
Computer Science & Engineering: An International Journal (CSEIJ), Vol. 3, No. 5, October 2013

[FIGURE 2] Illustrates 3D sensors used for capturing information on the surface of a face.

Steps followed in 3D face recognition technique are:
1. Obtained image is cropped.
2. To the cropped image a 3DFace algorithm of canonical face matching is applied to get
different face reactions of the particular image.

iv) VERIFICATION
By the time of verification, dual process is done. One, the images of the students that are captured
recently is compared for the match in student database [24] [28]. In two of the probabilities the
images are checked. If the captured image matches with the image that has been registered before
are processed for attendance management.
Second, if it is observed to be unmatched with student database then the image of the person will
be consider as new and saved in the separate database called stranger database. The separation of
the database will provide some information about the stranger who is new to the environment
and gives the information about the person who has been entered. It not only ensure security but
also make some fear to the people who needed to be entered without any authority.

v) MARKING ATTENDANCE
The image of the student which is obtained, matched with student database and the attendance
will be marked and the information is sent to the server which controls the overall database of the
student. The software is installed in the smart phone that would have much additional
functionality that would improve the AMS features and helps in finding the report of each student
either in the percentage [Figure 3] or pie chart form as shown below in the [Figure 4]. The figure
shows the overall percentage of attendance by considering the total number of working days and
number of days the student attend the college.

[Figure 4] Pie-chart representation of student attendance month wise.
16
Computer Science & Engineering: An International Journal (CSEIJ), Vol. 3, No. 5, October 2013

[Figure 3] Shows the percentage of the student attended the college.

When the server receives the message of student who are absent on that particular day will send a
SMS to the parent of that particular student.

vi) SECURITY
In respect with the smart application doesn’t work for AMS, it is also useful for identifying any
new stranger who comes inside the classroom.
Avoids a proxy attendance of the student and ensures that the students of other class are not
entering. The stranger can be the people who are not allowed to the particular environment. By
which security is enhanced.
This enhanced technology development can be used in various departments of government for
taking attendance for their working employees and ensure security over there.

4. ALGORITHM
3D Face Algorithm is a canonical face matching, which a simple and efficient surface is matching
method based on high-order moments [19] [23].
The main idea is to represent the surface by its moment’s µ pqr up to some degree say P. which is
smaller and equal to p+q+r. Compare the moments as vectors in the Euclidean space.
Given two face surfaces S1 and S2 with their corresponding canonical forms X’1 and X’2. We
can define the moments-based distance between them faces as dmom (S1,S2) = ∑ (µpqr (X’1)µpqr(X’2))2
In practice, the vectors of moments are stored in the face database and compared to those at
verification.
Example:

[Figure 5] Illustrates how the 3d Face Technology Applies Canonical Face matching to get different faces
expressions.
17
Computer Science & Engineering: An International Journal (CSEIJ), Vol. 3, No. 5, October 2013

The possibilities of face reactions are stored in the database called student database.
Main advantages of 3D face recognition are that it is not affected by any changes related to
brightness of the face surface unlike other techniques practised earlier. It can also identify a face
from a range of viewing away in the obtuse angled; this also includes a profile view of faces [22].
Canonical analysis [16] is a multivariate technique which is concerned with determining the
relationships between the groups of variables in a data set. The data set is divided into two
groups; let's call these groups as P and Q, based on some common characteristics defined.
The purpose of Canonical analysis is then to find the relationship between P and Q, i.e. can some
form of P represent Q. It works by finding the linear combination of P variables, i.e. P1, P2 etc.,
and linear combination of Q variables, i.e. Q1, Q2 etc., which are most highly correlated. This
combination of highly correlated variables is known as the "first canonical variants" which are
usually denoted S1 and T1, with the pair of S1 and T1 being called a "canonical function". The
next canonical functions, S2 and T2 are then restricted so that they are uncorrelated with S1 and
T1. Everything is scaled so that the variance equals to one. The relationships between the
functions are constructed which are made to agree with constraint restrictions arising from theory
or to agree with common sense/experiment. These models are called as “maximum correlation
models”.
Mathematically, canonical analysis maximize S'P'QT subject to S'P'PS=1 and T'Q'QT=1, where P
and Q are the data matrices (row for instance and column for feature).

5. CONCLUSION AND FUTURE ENHANCEMENT
Over last couple of years, face recognition researchers have been developing new techniques.
These developments are being fuelled by advances in computer science vision techniques,
computer-aided design, sensory design, and interest in the field of face recognition systems. Such
advances in the various fields of interests hold the promise of reducing the error rate in face
recognition systems by an order of magnitude over Face Recognition Vendor Test (FRVT).
The face recognition is grand challenges (FRGC) which are designed to achieve the performance
of the goal by presenting the results to the researchers who may experiment the data produced
with six-experiment challenge problem of 50,000 images. The data consists of 3D scans and high
resolution still imagery taken under controlled and uncontrolled conditions.
Recognition of faces from still images is a difficult problem, because the illumination, pose and
expression changes in the images create great statistical differences and the identity of the face
itself becomes shadowed by these factors where the 3D face recognition has the potential to
overcome feature localization, pose and illumination problems, and it can be used in conjunction
with 2D systems.
Advances of the smart application plays important role in AMS and it still suffers from little
deviations like the image captured using CCTV are more expensive in installing around each and
every classroom of the universities and connection to android also cost less more. In case of
security it does not supported for person who enters the classroom by mask the face.
1. The future work can be done on server-client application which could hold more number
of images in both sides. If the server system fails the same image database can be
recovered from the client side.
2. Any alternative algorithm can be used in face recognition to identify the variations of
face still more clearly.
18
Computer Science & Engineering: An International Journal (CSEIJ), Vol. 3, No. 5, October 2013

3. An effective way of analysing has to implement in identifying the people who enters the
environment with masked face.
4. In all government and private offices this system can be deployed for identification,
verification and attendance.

REFERENCES
[1]

[2]
[3]

[4]

[5]
[6]

[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]

[17]
[18]
[19]

[20]
[21]

[22]

Harshit Srivastava, Department of Computer Engineering, VelTech Dr.RR & Dr.SR Technical
University, Chennai, India, “Standalone Application Using Face Recognition” International Journal
of Engineering Research & Technology (IJERT) Vol. 2 Issue 4, April – 2013 ISSN: 2278-0181 by
Guillaume Dave, Xing Chao, Kishore Sriadibhatla, “Face Recognition in Mobile Phones”.
L. Spreeuwers. Fast and accurate 3D face recognition using registration to an intrinsic coordinate
system and fusion of multiple region classifiers. International Journal of Computer Vision, 93(3):389–
414, 2011.
IEEE Std 1622™-2011, “IEEE Standard for Electronic Distribution of Blank Ballots for Voting
Systems “ Sponsored Voting Equipment Electronic Data Interchange Committee of the IEEE
Computer Society Approved 7 December 2011 IEEE-SA Standards Board.
A. Srivastava, E. Klassen, S. H. Joshi, and I. H. Jermyn. Shape analysis of elastic curves in euclidean
spaces. IEEE Transactions on Pattern Analysis and Machine Intelligence, 33(7):1415–1428, 2011.
Dr.S.B.Thorat Director, Institute of Technology and Mgmt Nanded, S.K.Nayak Head, Dept. of
Computer Science, Miss.Jyoti P Dandale Lecturer Institute of Technology and Mgmt Nanded,
“Facial Recognition Technology: An analysis with scope in India” (IJCSIS) International Journal of
Computer Science and Information Security, Vol. 8, No. 1, 2010.
Tomasz ORCZYK1, Piotr PORWIK1 Journal of Medical Informatics & Technologies vol. 16/2010,
ISSN 1642-6037,” An Attempt to improve Eigen faces Algorithm efficiency for colour images”
Y. Wang, J. Liu, and X. Tang. Robust 3D face recognition by local shape difference boosting. IEEE
Transactions on Pattern Analysis and Machine Intelligence, 32:1858–1870, 2010.
Ramesha, K and Raja “Feature extraction based face recognition, gender and age classification”
,(IJCSE) International Journal on Computer Science and Engineering, Vol. 02, No.01S, 2010.
F. ter Haar and R. C. Velkamp. Expression modeling for expression-invariant face recognition.
Computers and Graphics, 34(3):231–241, 2010.
Beumier, C. and M. P. Acheroy:“Automatic face authentication from 3D Surface” In: Proc. British
Machine Vision Conf.
Bronstein, A. M., M. M. Bronstein, and R. Kimmel: 2003, “Expression-invariant 3D face
recognition”. In: Proc. Audio and Video-based Biometric Person Authentication.
KOVAC J, PEER P, SOLINA F,” Human Skin Colour Clustering for Face Detection”, Computer as a
Tool. The IEEE Region 8 Vol. 2, Issue, 22-24, pp. 144–148.
The Georgia Tech Face Database, http://www.anefian.com/research/face_reco.html
Hazim Kemal Ekenel, Bu¨lent Sankur, “Multiresolution face recognition” Image and Vision
Computing 23- 469–477 Elsevier.
Mohamed Rizon, Muhammad Firdaus Hashim, Mohd Rozailan Mamat, “Face Recognition using
Eigen-faces and Neural Networks”, American Journal of Applied Sciences 2 (6): 1872- 1875, ISSN
1546-9239.
“Coherent Image-Based Rendering of Real-World Objects” Stefan Hauswiesner,Matthias Strakay,
Gerhard Reitmayrz, Graz University of Technology.
Petit, B., Lesage, J.-D., Clment, M., Allard, J., Franco, J.-S., Raf-fin, B., Boyer, E., and Faure, F.
2010. “Multicamera real-time 3d modeling for telepresence and remote collaboration”.
R. McKeon and T. Russ. “Employing region ensembles in a statistical learning framework for robust
3D facial recognition”. In Fourth IEEE International Conference on Biometrics: Theory Applications
and Systems (BTAS), pages 1–7, 2010.
Smit, F. A., van Liere, R., Beck, S., and Fr¨ohlich, B. 2009.” An image-warping architecture for VR:
Low latency versus image quality”. In VR, IEEE, 27–34.
Waizenegger, W., Feldmann, I., Eisert, P., and Kauff, P. 2009. “Parallel high resolution real-time
visual hull on GPU”. In ICIP’09: Proceedings of the 16th IEEE international conference on Image
processing, IEEE Press, Piscataway, NJ, USA, 4245–4248.
M. H. Mahoor and M. Abdel-Mottaleb. “Face recognition based on 3D ridge images obtained from
range data”. “Pattern Recognition”, 42(3):445–451, 2009.
19
Computer Science & Engineering: An International Journal (CSEIJ), Vol. 3, No. 5, October 2013
[23] M. H. Mousavi, K. Faez, and A. Asghari. “Three dimensional face recognition using SVM classifier”.
In ICIS ’08: Proceedings of the Seventh IEEE/ACIS International Conference on Computer and
Information Science, pages 208–213, Washington, DC, USA, 2008.
[24] De Aguiar, E., Stoll, C., Theobalt, C., Ahmed, N., Seidel, H.-P. and Thrun, S. 2008. “Performance
capture from sparse multiview video”. In SIGGRAPH ’08: ACM SIGGRAPH 2008 papers, ACM,
New York, NY, USA, 1–10.
[25] Eisemann, M., De Decker, B.,Magnor, M., Bekaert, P., de Aguiar, E., Ahmed, N., Theobalt, C., and
Sellent, A. 2008. “Floating textures”. Computer Graphics Forum 27, 2 (April), 409–418.
[26] Willing, Richard (2003-09-02). "Airport anti-terror systems flub tests; Face-recognition technology
fails
to
flag
'suspects"
(Abstract).
USA
Today.http://pqasb.pqarchiver.com/USAToday/access/391952771.html?dids=391952771:391952771
&FMT=ABS&FMTS=ABS:FT&date=Sep+2%2C+2003&author=Richard+Willing&pub=USA+TO
DAY&edition=&startpage=A.03&desc=Airport+antiterror+systems+flub+tests+%3B+Facerecognitio
n+technology+fails+to+flag+%27suspects%27.Retrieved 2007-09-17.
[27] "Birmingham City Centre CCTV Installs Visionics' FaceIt". Business Wire. 2008-06-02.
http://www.allbusiness.com/government/governmentbodies-offices-regional/6111139-1.html.
[28] "Mexican Government Adopts FaceIt Face Recognition Technology to Eliminate Duplicate Voter
Registrations
in
Upcoming
Presidential
Election".BusinessWire.http://findarticles.com/p/articles/mi_m0EIN/is_2000_May_11/ai_62019954.
Retrieved 2008-06-02.

20

More Related Content

What's hot

Online Attendance System
Online Attendance SystemOnline Attendance System
Online Attendance SystemAkash Kr Sinha
 
Ppt of online Attendance system
Ppt of online Attendance system Ppt of online Attendance system
Ppt of online Attendance system Shyam Sundar Pandey
 
School management System
School management SystemSchool management System
School management SystemHATIM Bhagat
 
Attendance Using Facial Recognition
Attendance Using Facial RecognitionAttendance Using Facial Recognition
Attendance Using Facial RecognitionVikramaditya Tarai
 
Face recognition attendance system
Face recognition attendance systemFace recognition attendance system
Face recognition attendance systemmohanaprasad_v
 
Automated attendance system using Face recognition
Automated attendance system using Face recognitionAutomated attendance system using Face recognition
Automated attendance system using Face recognitionIRJET Journal
 
Hostel management system project report
Hostel management system project reportHostel management system project report
Hostel management system project reportSoftroniics india
 
Bus Management System
Bus Management SystemBus Management System
Bus Management SystemAl Mamun
 
15.project attendence managemnt system
15.project attendence managemnt system15.project attendence managemnt system
15.project attendence managemnt systemHaseeb Nasir
 
Student portal system application -Project Book
Student portal system application -Project BookStudent portal system application -Project Book
Student portal system application -Project BookS.M. Fazla Rabbi
 
Attendance Management Report 2016
Attendance Management Report 2016Attendance Management Report 2016
Attendance Management Report 2016Pooja Maan
 
Student Attendance Management System using Barcode
Student Attendance Management System using BarcodeStudent Attendance Management System using Barcode
Student Attendance Management System using BarcodeDharmesh
 
Student Management System Project Abstract
Student Management System Project AbstractStudent Management System Project Abstract
Student Management System Project AbstractUdhayyagethan Mano
 
Student information system
Student information systemStudent information system
Student information systemSaqib Nadeem
 
Student Management System Presentation Slide
Student Management System Presentation  SlideStudent Management System Presentation  Slide
Student Management System Presentation SlideRiajul islam Leon
 
Face recognition attendance system using Local Binary Pattern (LBP)
Face recognition attendance system using Local Binary Pattern (LBP)Face recognition attendance system using Local Binary Pattern (LBP)
Face recognition attendance system using Local Binary Pattern (LBP)journalBEEI
 
Face Recognition Based Attendance System using Machine Learning
Face Recognition Based Attendance System using Machine LearningFace Recognition Based Attendance System using Machine Learning
Face Recognition Based Attendance System using Machine LearningYogeshIJTSRD
 
Student information system project report
Student information system project reportStudent information system project report
Student information system project reportSuman Chandra
 
Resume and CV Summarization using NLP Report
Resume and CV Summarization using NLP ReportResume and CV Summarization using NLP Report
Resume and CV Summarization using NLP Reportsneha indulkar
 

What's hot (20)

Online Attendance System
Online Attendance SystemOnline Attendance System
Online Attendance System
 
Ppt of online Attendance system
Ppt of online Attendance system Ppt of online Attendance system
Ppt of online Attendance system
 
School management System
School management SystemSchool management System
School management System
 
Online attendance management system
Online attendance management systemOnline attendance management system
Online attendance management system
 
Attendance Using Facial Recognition
Attendance Using Facial RecognitionAttendance Using Facial Recognition
Attendance Using Facial Recognition
 
Face recognition attendance system
Face recognition attendance systemFace recognition attendance system
Face recognition attendance system
 
Automated attendance system using Face recognition
Automated attendance system using Face recognitionAutomated attendance system using Face recognition
Automated attendance system using Face recognition
 
Hostel management system project report
Hostel management system project reportHostel management system project report
Hostel management system project report
 
Bus Management System
Bus Management SystemBus Management System
Bus Management System
 
15.project attendence managemnt system
15.project attendence managemnt system15.project attendence managemnt system
15.project attendence managemnt system
 
Student portal system application -Project Book
Student portal system application -Project BookStudent portal system application -Project Book
Student portal system application -Project Book
 
Attendance Management Report 2016
Attendance Management Report 2016Attendance Management Report 2016
Attendance Management Report 2016
 
Student Attendance Management System using Barcode
Student Attendance Management System using BarcodeStudent Attendance Management System using Barcode
Student Attendance Management System using Barcode
 
Student Management System Project Abstract
Student Management System Project AbstractStudent Management System Project Abstract
Student Management System Project Abstract
 
Student information system
Student information systemStudent information system
Student information system
 
Student Management System Presentation Slide
Student Management System Presentation  SlideStudent Management System Presentation  Slide
Student Management System Presentation Slide
 
Face recognition attendance system using Local Binary Pattern (LBP)
Face recognition attendance system using Local Binary Pattern (LBP)Face recognition attendance system using Local Binary Pattern (LBP)
Face recognition attendance system using Local Binary Pattern (LBP)
 
Face Recognition Based Attendance System using Machine Learning
Face Recognition Based Attendance System using Machine LearningFace Recognition Based Attendance System using Machine Learning
Face Recognition Based Attendance System using Machine Learning
 
Student information system project report
Student information system project reportStudent information system project report
Student information system project report
 
Resume and CV Summarization using NLP Report
Resume and CV Summarization using NLP ReportResume and CV Summarization using NLP Report
Resume and CV Summarization using NLP Report
 

Similar to Smart application for ams using face recognition

IRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using AndroidIRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using AndroidIRJET Journal
 
IRJET- Attendance Monitoring System using Face Detection &Face Recognition
IRJET-  	  Attendance Monitoring System using Face Detection &Face RecognitionIRJET-  	  Attendance Monitoring System using Face Detection &Face Recognition
IRJET- Attendance Monitoring System using Face Detection &Face RecognitionIRJET Journal
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face RecognitionIRJET Journal
 
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...IJAEMSJORNAL
 
Paper id 28201415
Paper id 28201415Paper id 28201415
Paper id 28201415IJRAT
 
Student Attendance Management Automation Using Face Recognition Algorithm
Student Attendance Management Automation Using Face Recognition AlgorithmStudent Attendance Management Automation Using Face Recognition Algorithm
Student Attendance Management Automation Using Face Recognition AlgorithmIRJET Journal
 
Deep hypersphere embedding for real-time face recognition
Deep hypersphere embedding for real-time face recognitionDeep hypersphere embedding for real-time face recognition
Deep hypersphere embedding for real-time face recognitionTELKOMNIKA JOURNAL
 
IRJET- Automation Software for Student Monitoring System
IRJET-  	  Automation Software for Student Monitoring SystemIRJET-  	  Automation Software for Student Monitoring System
IRJET- Automation Software for Student Monitoring SystemIRJET Journal
 
Person Acquisition and Identification Tool
Person Acquisition and Identification ToolPerson Acquisition and Identification Tool
Person Acquisition and Identification ToolIRJET Journal
 
METandance: A Smart Classroom Management And Analysis
METandance: A Smart Classroom Management And AnalysisMETandance: A Smart Classroom Management And Analysis
METandance: A Smart Classroom Management And AnalysisIRJET Journal
 
A Real Time Advance Automated Attendance System using Face-Net Algorithm
A Real Time Advance Automated Attendance System using Face-Net AlgorithmA Real Time Advance Automated Attendance System using Face-Net Algorithm
A Real Time Advance Automated Attendance System using Face-Net AlgorithmIRJET Journal
 
PBL_Face Recognize Attendance System.pptx
PBL_Face Recognize Attendance System.pptxPBL_Face Recognize Attendance System.pptx
PBL_Face Recognize Attendance System.pptxTusarBhootra
 
IRJET- Student Attendance System by Face Detection
IRJET- Student Attendance System by Face DetectionIRJET- Student Attendance System by Face Detection
IRJET- Student Attendance System by Face DetectionIRJET Journal
 
MTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITION
MTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITIONMTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITION
MTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITIONIRJET Journal
 
IRJET - Automated Identification System using Discrete Wavelet Transform
IRJET -  	  Automated Identification System using Discrete Wavelet TransformIRJET -  	  Automated Identification System using Discrete Wavelet Transform
IRJET - Automated Identification System using Discrete Wavelet TransformIRJET Journal
 
Face Mask Detection and Face Recognition Using Machine Learning
Face Mask Detection and Face Recognition Using Machine LearningFace Mask Detection and Face Recognition Using Machine Learning
Face Mask Detection and Face Recognition Using Machine LearningIRJET Journal
 
FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...
FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...
FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...IRJET Journal
 
Attendance management system using face recognition
Attendance management system using face recognitionAttendance management system using face recognition
Attendance management system using face recognitionIAESIJAI
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVIRJET Journal
 
Implementation of Automatic Attendance Management System Using Harcascade and...
Implementation of Automatic Attendance Management System Using Harcascade and...Implementation of Automatic Attendance Management System Using Harcascade and...
Implementation of Automatic Attendance Management System Using Harcascade and...IRJET Journal
 

Similar to Smart application for ams using face recognition (20)

IRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using AndroidIRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using Android
 
IRJET- Attendance Monitoring System using Face Detection &Face Recognition
IRJET-  	  Attendance Monitoring System using Face Detection &Face RecognitionIRJET-  	  Attendance Monitoring System using Face Detection &Face Recognition
IRJET- Attendance Monitoring System using Face Detection &Face Recognition
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face Recognition
 
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...
 
Paper id 28201415
Paper id 28201415Paper id 28201415
Paper id 28201415
 
Student Attendance Management Automation Using Face Recognition Algorithm
Student Attendance Management Automation Using Face Recognition AlgorithmStudent Attendance Management Automation Using Face Recognition Algorithm
Student Attendance Management Automation Using Face Recognition Algorithm
 
Deep hypersphere embedding for real-time face recognition
Deep hypersphere embedding for real-time face recognitionDeep hypersphere embedding for real-time face recognition
Deep hypersphere embedding for real-time face recognition
 
IRJET- Automation Software for Student Monitoring System
IRJET-  	  Automation Software for Student Monitoring SystemIRJET-  	  Automation Software for Student Monitoring System
IRJET- Automation Software for Student Monitoring System
 
Person Acquisition and Identification Tool
Person Acquisition and Identification ToolPerson Acquisition and Identification Tool
Person Acquisition and Identification Tool
 
METandance: A Smart Classroom Management And Analysis
METandance: A Smart Classroom Management And AnalysisMETandance: A Smart Classroom Management And Analysis
METandance: A Smart Classroom Management And Analysis
 
A Real Time Advance Automated Attendance System using Face-Net Algorithm
A Real Time Advance Automated Attendance System using Face-Net AlgorithmA Real Time Advance Automated Attendance System using Face-Net Algorithm
A Real Time Advance Automated Attendance System using Face-Net Algorithm
 
PBL_Face Recognize Attendance System.pptx
PBL_Face Recognize Attendance System.pptxPBL_Face Recognize Attendance System.pptx
PBL_Face Recognize Attendance System.pptx
 
IRJET- Student Attendance System by Face Detection
IRJET- Student Attendance System by Face DetectionIRJET- Student Attendance System by Face Detection
IRJET- Student Attendance System by Face Detection
 
MTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITION
MTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITIONMTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITION
MTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITION
 
IRJET - Automated Identification System using Discrete Wavelet Transform
IRJET -  	  Automated Identification System using Discrete Wavelet TransformIRJET -  	  Automated Identification System using Discrete Wavelet Transform
IRJET - Automated Identification System using Discrete Wavelet Transform
 
Face Mask Detection and Face Recognition Using Machine Learning
Face Mask Detection and Face Recognition Using Machine LearningFace Mask Detection and Face Recognition Using Machine Learning
Face Mask Detection and Face Recognition Using Machine Learning
 
FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...
FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...
FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...
 
Attendance management system using face recognition
Attendance management system using face recognitionAttendance management system using face recognition
Attendance management system using face recognition
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCV
 
Implementation of Automatic Attendance Management System Using Harcascade and...
Implementation of Automatic Attendance Management System Using Harcascade and...Implementation of Automatic Attendance Management System Using Harcascade and...
Implementation of Automatic Attendance Management System Using Harcascade and...
 

Recently uploaded

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

Smart application for ams using face recognition

  • 1. Computer Science & Engineering: An International Journal (CSEIJ), Vol. 3, No. 5, October 2013 SMART APPLICATION FOR AMS USING FACE RECOGNITION MuthuKalyani.K, VeeraMuthu.A M-Tech Information Technology, Sathyabama University, Chennai. Professor, M-Tech IT, Sathyabama University, Chennai ABSTRACT Attendance Management System (AMS) can be made into smarter way by using face recognition technique, where we use a CCTV camera to be fixed at the entry point of a classroom, which automatically captures the image of the person and checks the observed image with the face database using android enhanced smart phone. It is typically used for two purposes. Firstly, marking attendance for student by comparing the face images produced recently and secondly, recognition of human who are strange to the environment i.e. an unauthorized person For verification of image, a newly emerging trend 3D Face Recognition is used which claims to provide more accuracy in matching the image databases and has an ability to recognize a subject at different view angles. KEYWORDS CCTV camera, Face recognition, 3D Model, Face database. 1. INTRODUCTION Attendance systems of old practises are not quite efficient today for keeping track on student’s attendance. Due to the availability of large resources over the internet today, it is very hard to motivate the students to attend lectures without fail have become more challenging. In order to drag the attention of students and make them interactive in observing technologies we move on to latest upcoming trends on developing attendance systems. This is the strong reason for college attendance management system has to come up with an approach that ensures strong contribution of students in classrooms. To track attendance of the students, many attendance management systems are introduced in the market. With the introduction of this variety of attendance system, skipping classes without the staff’s knowledge have become difficult for the students. For few view of college attendance systems that were used earlier in the market are based on RFID systems, punch card systems, swipe card systems, biometric systems that includes fingerprint analysis, iris analysis etc. Although these systems all are lagged in their own respective so which lead to the new way practise on AMS. In smart AMS we are going to mark the attendance of the student by capturing the image of the person for identifying correctly. DOI : 10.5121/cseij.2013.3502 13
  • 2. Computer Science & Engineering: An International Journal (CSEIJ), Vol. 3, No. 5, October 2013 Attendance of students in the college is one of the essential day to day activities. Additional Operations within this smart system includes the software that provides 1. Marking of daily students’ attendance. 2. Daily provision to check in personal attendance by employee of the college (teaching and certain non-teaching staff). 3. The software is installed to produce the attendance statistics which can be viewed by HOD, directors and staff on daily, monthly and yearly basis. 2. PROBLEM STATEMENT In the standalone application [1], face was captured by the webcam cameras and the detected faces are stored in desktop webcam folder. For matching the captured images with the database, Eigen faces methodology was used. Observance of Eigen faces method [7] was explained as, a) b) c) d) Single structure of face pattern only allowed. Gallery images must be of same size. Requires full frontal face to be presented for each time. Does not endure to the variations of brightness effect, pose and different expressions of face. e) Effective only for low dimensional structure of face patterns. The image which doesn’t match with database is given by error message on desktop. Where the instructor has to take the attendance to those unmatched student images manually. 3. PROPOSED SYSTEM The smart applications for AMS are designed as shown in the architecture diagram [Figure 1]. The CCTV camera is fixed at the entry of the class room and used to observe the face of the students. The observed image of the person is sent to the android mobile which is connected to the CCTV camera. Android mobiles are enriched with the face recognition software technique which actually produces the possibilities of the human expression variations. The use of 3D face technology enables the work of identifying, verifying and detecting the match images in the face database. The diagram illustrates how the phases of the system are carried out. The smart AMS consists of six modules which are explained detailed below. 14
  • 3. Computer Science & Engineering: An International Journal (CSEIJ), Vol. 3, No. 5, October 2013 [Figure 1] Architecture diagram for smart application for AMS using Face Recognition. i) REGISTRATION First phase of the system, actually deals with registering the information of the student in a particular classroom. The information includes (1) (2) (3) Name of the student Register or Roll number Image of the student (taken by camera). These details are placed in the student database from which the actual comparison will be done. ii) IMAGE CAPTURING The CCTV cameras are used for capturing the images [27] of the student which will be in active mode during the hours of college. The camera will be placed at the entry point of the classroom when the student enters it automatically captures the image and send to the android mobile to which it has been connected with. The use of CCTV camera is that it is capable of capture the image of high quality and also at different angles view. iii) IDENTIFICATION To identify the student image, smart phone which holds the image database of the student, checks for the match using 3D face recognition software technique. In 3D face recognition technique [11] [15] 3D sensors are used to capture information about the outline of a face surface. The obtained information is then used to identify the distinct features on the face surface, such as the axis of the eye sockets, nose, and Chin. [Figure 2] 15
  • 4. Computer Science & Engineering: An International Journal (CSEIJ), Vol. 3, No. 5, October 2013 [FIGURE 2] Illustrates 3D sensors used for capturing information on the surface of a face. Steps followed in 3D face recognition technique are: 1. Obtained image is cropped. 2. To the cropped image a 3DFace algorithm of canonical face matching is applied to get different face reactions of the particular image. iv) VERIFICATION By the time of verification, dual process is done. One, the images of the students that are captured recently is compared for the match in student database [24] [28]. In two of the probabilities the images are checked. If the captured image matches with the image that has been registered before are processed for attendance management. Second, if it is observed to be unmatched with student database then the image of the person will be consider as new and saved in the separate database called stranger database. The separation of the database will provide some information about the stranger who is new to the environment and gives the information about the person who has been entered. It not only ensure security but also make some fear to the people who needed to be entered without any authority. v) MARKING ATTENDANCE The image of the student which is obtained, matched with student database and the attendance will be marked and the information is sent to the server which controls the overall database of the student. The software is installed in the smart phone that would have much additional functionality that would improve the AMS features and helps in finding the report of each student either in the percentage [Figure 3] or pie chart form as shown below in the [Figure 4]. The figure shows the overall percentage of attendance by considering the total number of working days and number of days the student attend the college. [Figure 4] Pie-chart representation of student attendance month wise. 16
  • 5. Computer Science & Engineering: An International Journal (CSEIJ), Vol. 3, No. 5, October 2013 [Figure 3] Shows the percentage of the student attended the college. When the server receives the message of student who are absent on that particular day will send a SMS to the parent of that particular student. vi) SECURITY In respect with the smart application doesn’t work for AMS, it is also useful for identifying any new stranger who comes inside the classroom. Avoids a proxy attendance of the student and ensures that the students of other class are not entering. The stranger can be the people who are not allowed to the particular environment. By which security is enhanced. This enhanced technology development can be used in various departments of government for taking attendance for their working employees and ensure security over there. 4. ALGORITHM 3D Face Algorithm is a canonical face matching, which a simple and efficient surface is matching method based on high-order moments [19] [23]. The main idea is to represent the surface by its moment’s µ pqr up to some degree say P. which is smaller and equal to p+q+r. Compare the moments as vectors in the Euclidean space. Given two face surfaces S1 and S2 with their corresponding canonical forms X’1 and X’2. We can define the moments-based distance between them faces as dmom (S1,S2) = ∑ (µpqr (X’1)µpqr(X’2))2 In practice, the vectors of moments are stored in the face database and compared to those at verification. Example: [Figure 5] Illustrates how the 3d Face Technology Applies Canonical Face matching to get different faces expressions. 17
  • 6. Computer Science & Engineering: An International Journal (CSEIJ), Vol. 3, No. 5, October 2013 The possibilities of face reactions are stored in the database called student database. Main advantages of 3D face recognition are that it is not affected by any changes related to brightness of the face surface unlike other techniques practised earlier. It can also identify a face from a range of viewing away in the obtuse angled; this also includes a profile view of faces [22]. Canonical analysis [16] is a multivariate technique which is concerned with determining the relationships between the groups of variables in a data set. The data set is divided into two groups; let's call these groups as P and Q, based on some common characteristics defined. The purpose of Canonical analysis is then to find the relationship between P and Q, i.e. can some form of P represent Q. It works by finding the linear combination of P variables, i.e. P1, P2 etc., and linear combination of Q variables, i.e. Q1, Q2 etc., which are most highly correlated. This combination of highly correlated variables is known as the "first canonical variants" which are usually denoted S1 and T1, with the pair of S1 and T1 being called a "canonical function". The next canonical functions, S2 and T2 are then restricted so that they are uncorrelated with S1 and T1. Everything is scaled so that the variance equals to one. The relationships between the functions are constructed which are made to agree with constraint restrictions arising from theory or to agree with common sense/experiment. These models are called as “maximum correlation models”. Mathematically, canonical analysis maximize S'P'QT subject to S'P'PS=1 and T'Q'QT=1, where P and Q are the data matrices (row for instance and column for feature). 5. CONCLUSION AND FUTURE ENHANCEMENT Over last couple of years, face recognition researchers have been developing new techniques. These developments are being fuelled by advances in computer science vision techniques, computer-aided design, sensory design, and interest in the field of face recognition systems. Such advances in the various fields of interests hold the promise of reducing the error rate in face recognition systems by an order of magnitude over Face Recognition Vendor Test (FRVT). The face recognition is grand challenges (FRGC) which are designed to achieve the performance of the goal by presenting the results to the researchers who may experiment the data produced with six-experiment challenge problem of 50,000 images. The data consists of 3D scans and high resolution still imagery taken under controlled and uncontrolled conditions. Recognition of faces from still images is a difficult problem, because the illumination, pose and expression changes in the images create great statistical differences and the identity of the face itself becomes shadowed by these factors where the 3D face recognition has the potential to overcome feature localization, pose and illumination problems, and it can be used in conjunction with 2D systems. Advances of the smart application plays important role in AMS and it still suffers from little deviations like the image captured using CCTV are more expensive in installing around each and every classroom of the universities and connection to android also cost less more. In case of security it does not supported for person who enters the classroom by mask the face. 1. The future work can be done on server-client application which could hold more number of images in both sides. If the server system fails the same image database can be recovered from the client side. 2. Any alternative algorithm can be used in face recognition to identify the variations of face still more clearly. 18
  • 7. Computer Science & Engineering: An International Journal (CSEIJ), Vol. 3, No. 5, October 2013 3. An effective way of analysing has to implement in identifying the people who enters the environment with masked face. 4. In all government and private offices this system can be deployed for identification, verification and attendance. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] Harshit Srivastava, Department of Computer Engineering, VelTech Dr.RR & Dr.SR Technical University, Chennai, India, “Standalone Application Using Face Recognition” International Journal of Engineering Research & Technology (IJERT) Vol. 2 Issue 4, April – 2013 ISSN: 2278-0181 by Guillaume Dave, Xing Chao, Kishore Sriadibhatla, “Face Recognition in Mobile Phones”. L. Spreeuwers. Fast and accurate 3D face recognition using registration to an intrinsic coordinate system and fusion of multiple region classifiers. International Journal of Computer Vision, 93(3):389– 414, 2011. IEEE Std 1622™-2011, “IEEE Standard for Electronic Distribution of Blank Ballots for Voting Systems “ Sponsored Voting Equipment Electronic Data Interchange Committee of the IEEE Computer Society Approved 7 December 2011 IEEE-SA Standards Board. A. Srivastava, E. Klassen, S. H. Joshi, and I. H. Jermyn. Shape analysis of elastic curves in euclidean spaces. IEEE Transactions on Pattern Analysis and Machine Intelligence, 33(7):1415–1428, 2011. Dr.S.B.Thorat Director, Institute of Technology and Mgmt Nanded, S.K.Nayak Head, Dept. of Computer Science, Miss.Jyoti P Dandale Lecturer Institute of Technology and Mgmt Nanded, “Facial Recognition Technology: An analysis with scope in India” (IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 1, 2010. Tomasz ORCZYK1, Piotr PORWIK1 Journal of Medical Informatics & Technologies vol. 16/2010, ISSN 1642-6037,” An Attempt to improve Eigen faces Algorithm efficiency for colour images” Y. Wang, J. Liu, and X. Tang. Robust 3D face recognition by local shape difference boosting. IEEE Transactions on Pattern Analysis and Machine Intelligence, 32:1858–1870, 2010. Ramesha, K and Raja “Feature extraction based face recognition, gender and age classification” ,(IJCSE) International Journal on Computer Science and Engineering, Vol. 02, No.01S, 2010. F. ter Haar and R. C. Velkamp. Expression modeling for expression-invariant face recognition. Computers and Graphics, 34(3):231–241, 2010. Beumier, C. and M. P. Acheroy:“Automatic face authentication from 3D Surface” In: Proc. British Machine Vision Conf. Bronstein, A. M., M. M. Bronstein, and R. Kimmel: 2003, “Expression-invariant 3D face recognition”. In: Proc. Audio and Video-based Biometric Person Authentication. KOVAC J, PEER P, SOLINA F,” Human Skin Colour Clustering for Face Detection”, Computer as a Tool. The IEEE Region 8 Vol. 2, Issue, 22-24, pp. 144–148. The Georgia Tech Face Database, http://www.anefian.com/research/face_reco.html Hazim Kemal Ekenel, Bu¨lent Sankur, “Multiresolution face recognition” Image and Vision Computing 23- 469–477 Elsevier. Mohamed Rizon, Muhammad Firdaus Hashim, Mohd Rozailan Mamat, “Face Recognition using Eigen-faces and Neural Networks”, American Journal of Applied Sciences 2 (6): 1872- 1875, ISSN 1546-9239. “Coherent Image-Based Rendering of Real-World Objects” Stefan Hauswiesner,Matthias Strakay, Gerhard Reitmayrz, Graz University of Technology. Petit, B., Lesage, J.-D., Clment, M., Allard, J., Franco, J.-S., Raf-fin, B., Boyer, E., and Faure, F. 2010. “Multicamera real-time 3d modeling for telepresence and remote collaboration”. R. McKeon and T. Russ. “Employing region ensembles in a statistical learning framework for robust 3D facial recognition”. In Fourth IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS), pages 1–7, 2010. Smit, F. A., van Liere, R., Beck, S., and Fr¨ohlich, B. 2009.” An image-warping architecture for VR: Low latency versus image quality”. In VR, IEEE, 27–34. Waizenegger, W., Feldmann, I., Eisert, P., and Kauff, P. 2009. “Parallel high resolution real-time visual hull on GPU”. In ICIP’09: Proceedings of the 16th IEEE international conference on Image processing, IEEE Press, Piscataway, NJ, USA, 4245–4248. M. H. Mahoor and M. Abdel-Mottaleb. “Face recognition based on 3D ridge images obtained from range data”. “Pattern Recognition”, 42(3):445–451, 2009. 19
  • 8. Computer Science & Engineering: An International Journal (CSEIJ), Vol. 3, No. 5, October 2013 [23] M. H. Mousavi, K. Faez, and A. Asghari. “Three dimensional face recognition using SVM classifier”. In ICIS ’08: Proceedings of the Seventh IEEE/ACIS International Conference on Computer and Information Science, pages 208–213, Washington, DC, USA, 2008. [24] De Aguiar, E., Stoll, C., Theobalt, C., Ahmed, N., Seidel, H.-P. and Thrun, S. 2008. “Performance capture from sparse multiview video”. In SIGGRAPH ’08: ACM SIGGRAPH 2008 papers, ACM, New York, NY, USA, 1–10. [25] Eisemann, M., De Decker, B.,Magnor, M., Bekaert, P., de Aguiar, E., Ahmed, N., Theobalt, C., and Sellent, A. 2008. “Floating textures”. Computer Graphics Forum 27, 2 (April), 409–418. [26] Willing, Richard (2003-09-02). "Airport anti-terror systems flub tests; Face-recognition technology fails to flag 'suspects" (Abstract). USA Today.http://pqasb.pqarchiver.com/USAToday/access/391952771.html?dids=391952771:391952771 &FMT=ABS&FMTS=ABS:FT&date=Sep+2%2C+2003&author=Richard+Willing&pub=USA+TO DAY&edition=&startpage=A.03&desc=Airport+antiterror+systems+flub+tests+%3B+Facerecognitio n+technology+fails+to+flag+%27suspects%27.Retrieved 2007-09-17. [27] "Birmingham City Centre CCTV Installs Visionics' FaceIt". Business Wire. 2008-06-02. http://www.allbusiness.com/government/governmentbodies-offices-regional/6111139-1.html. [28] "Mexican Government Adopts FaceIt Face Recognition Technology to Eliminate Duplicate Voter Registrations in Upcoming Presidential Election".BusinessWire.http://findarticles.com/p/articles/mi_m0EIN/is_2000_May_11/ai_62019954. Retrieved 2008-06-02. 20