SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 08 | Aug 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 128
Face Recognition System using OpenCV
Arun Binoy1, Acsahmol Edwin 2, Jayakrishnan K3 , Pranav S4
1-4BTECH UG Students, Department of Computer Science and Engineering, TOMS college of Engineering
APJ Abdul Kalam Technological University, Kerala, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The face recognition system using OpenCV is a
system which recognizes know faces and store it with time
stamp. Then recognize the unknown faces and store it in
another dataset with time stamp. The versatile face
recognition system utilizing OpenCV, designed to streamline
attendance tracking in online classes, meetings, and
residential security applications. Leveraging advanced image
processing techniques, the system identifies and verifies
participants' faces in real-time. Its adaptable nature allows
easy customization of recognized individuals, facilitating
efficient management of attendance lists. This technology
proves beneficial for remote learning scenarios, virtual
meetings, and enhancing security protocols in residential
settings. By seamlessly integrating withexistingplatforms, the
system offers a user-friendlyandefficientsolutiontoautomate
attendance management, thereby improving overall
convenience and security in various contexts.
Key Words: face recognition, OpenCV, dataset, time stamp,
real time recognition.
1.INTRODUCTION
Face recognition is importantbecauseit notonlyallowsusto
use our faces as keys, but it also allows face recognition
systems to read our expressions in real time. Face
recognition is rapidly improving as the Internet of Things
grows and new gadgets are developed. Everyone's first
concern in the current world is security.Peopleareharassed
at home, and the antiquated security mechanisms designed
to keep people safe have failed. Various electronic devices,
such as mobile phones, laptops, and ATMs, use biometric
authentication or passcodes, however these can be easily
accessed by thieves through any methods, making them
insecure. Every face is unique because it can be recognised,
which is essential for determining a person's identity. Facial
recognition is a novel biometric technology for criminal
identification that offers high accuracy with low intrusion.It
is a technique that uses facial recognition to automatically
identify and validate people in video or image frames. This
study describes a face recognition system that incorporates
the best face detection, feature extraction, and classification
approaches currently in use. MTCNN and Face Net are two
advanced deep learning systems that have received
widespread acclaim for their sophistication and modernity.
Our video streaming layer provides a continuous and stable
experience with no abrupt transitions between consecutive
frames.
1.1 SCOPE
The suggested system aims to create and deploy a
reliable and effective system for facial recognition
technology-based automatedattendancetracking.Inorderto
effectively detect and identify people in photos or videos, the
project will use facial recognition algorithmsandtechniques,
which will replace the need for manual attendance
procedures. The scope most likely includes activities like
image preprocessing and enhancement, face detection and
recognition techniques implementation, facial feature
extraction, and creation and management of a face database.
Creating an intuitive user interface, connecting the system
with current attendancemanagementsystems,andassessing
the system's performance in terms of accuracy, speed,
scalability, and usability are all potential components of the
project.
1.2 FACE DETECTION
Changes in an object's position in respect to its
surroundings are monitored using face detection. One ofthe
most important security elements in recent years is face
detection software. It is used to enhance securityequipment
that has already been installed, such as the motion sensor
illumination on indoor and outdoor security cameras. An
advanced facial identification system like this might be
automated to detect criminals by using CCTV cameras
positioned at numerous locations. The goal of the project is
to create an automated system that effectively and reliably
tracks attendance using facial recognition technology.
Fig -1: Face detection
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 08 | Aug 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 129
The goal of the project is to recognise people in pictures or
videos, extract their face traits, and compare them to a
database already in existence. The main goal is to substitute
a dependable and practical solution for manual attendance
methods in order to lighten the administrative burden and
increase accuracy. The project's overall goal is to provide a
seamless, user-friendly system that enhances attendance
management and provides a dependable, effective, and
secure way to record and track attendance.
1.3 LITERATURE REVIEW
Despite notable recent developments in the field of face
recognition [DeepFace, DeepId2],scaling up face verification
and recognition effectively poses substantial obstacles to
existing methodologies.
1) The [1] FaceNet system, which we introduce in this
study, directly learnsa mapping from face imagesto
a condensed Euclidean space where distances
directly correlate to a measure of face similarity.[5]
Eigenfaces: This method captures major facial
changes for recognition by using primary
Component Analysis (PCA) to represent faces as a
collection of primary components.
2) Local Binary Patterns (LBP): A texture-based
method for encoding local pixel patterns, LBP
capturesspatial relationshipsandadaptstochanges
in lighting.
3) Fisherfaces: Also referred to as Linear Discriminant
Analysis (LDA), this method derives distinguishing
characteristics from the faces of various people.
4) Deep Convolutional Neural Networks (CNN): By
extracting intricate patternsandfeaturesfromfacial
photos, CNNs, a subset of deep learning techniques,
have achieved astounding success in face
recognition.
5) 3D Face Recognition: This method uses depth data
from 3D face scans or specialized sensors to enable
accurateidentification even when position, lighting,
and expression variations are present.
2. METHODOLOGY
The suggested method seeks to create a reliable face
recognition attendance system that can detect and subtract
unknown faces while reliably identifying recognized faces.
Unknown faces will be found in the collectedphotosorvideo
frames using objectdetectionmethods.Unknownpeople will
have their faces and a timestamp recorded by the system,
which will serve as a record of their existence. The system
would require input from photos and videos in order to
distinguish faces and compare them to a database of
recognizable individuals. CCTV cameras, mobile cameras,
and other sources could all provide this data. To precisely
identify registered users,thesystemwill usefacerecognition
algorithms. Here, faces are found and recognized using the
Haar Cascade method.
Fig -2: motion detection window
The technique of identifying and recognizing faces of people
who are not yet known or registered in a database is known
as "unknown face detection." It entails examining the
patterns and features of the face to identify whether a face
resembles any recognized individuals or if it is completely
unidentified. The use of object detection algorithms will be
used to identify and remove unidentified faces from
attendance records. Applying various algorithms and
approaches to analyses, alter, and extract valuable
information from visual data is the process of processing
images and videos. The suggested systemwill analysesfacial
features, conduct face recognition, and find unidentified
faces using image and video processing techniques. The
practice of monitoring and documenting people's presence
or absence in a certain setting is known as attendance
management. The suggested system's attendance
management process includes organizing the attendance
records, storing timestamped photos of unidentified faces,
and maintaining a database of recognized people.
Attendance management is the process of keeping track of
and recording people's presence or absence in a certain
location. A database of recognized people is kept,
timestamped photographs of unidentifiablefacesarestored,
and attendance records are organized as part of the
suggested system's attendance management procedure.
2.1 DATASET
We'll build a database of every person, their unique ID, and
the quantity of grayscale photos needed for face recognition.
A dataset is created using the photographs of the specific
person, and the images are then stored in an XML file. For
each person's ID, we used 1000 samples because this
increased the accuracy of the image of the individual. The
authorized individuals' created dataset is kept in a YML file.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 08 | Aug 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 130
The images are trained using the Local Binary Pattern
Histogram (LBPH) approach.
Chi-Square: This formula is used to characterizes a person's
expression. In our project, it is employed to assess the
character of a certain individual whose database is recorded
in an XML file.
Euclidean Distance: To calculatetheseparationbetweentwo
straight lines, use this equation. It is employed to calculate
the dimensions of images that are stored in datasets.
Normalized Euclidean Distance: The length of the line
segment connecting points hist1 and hist2 (hist1, hist2)
equals the Euclidean distance between them. A Euclidean
vector is a representation of a point's location in Euclidean
n-space. This formula scaledtheimage'slengthandcreateda
square box around it.
Absolute Value: After being acquired by the camera, the
image is trained using both positive and negative images
using the Haar Cascade Classifier. It is employed to change
grayscale photographs into colored ones.
2.2 DESIGN
The technology uses a camera or webcam to record facial
photos or video frames. These images are used as raw
material for later processing. Preprocessing techniques are
applied to the collected images or frames to improve quality
and lower noise. This might entail filters, normalization,and
resizing actions.
The Haar Cascade algorithm employs a series of classifiers
that are staged in a cascade. Each stage consists of a number
of weak classifiers that analyses various areas of the image
in turn. In order to lessen computing effort, the cascade is
made to swiftly dismiss regions that are unlikely to contain
faces. A region is processed further for face recognition or
additional analysis if it successfully navigates through every
stage of the cascade and is deemed to have made a positive
detection. After face detection, further methods for face
recognition can be applied. In order to identify the person,
these algorithms examine the identified face region, extract
facial characteristics like landmarks or descriptors, and
contrast them with a database of recognized faces.
Fig -3: Block diagram of face recognition system
Due of its effectiveness and precision, the Haar Cascade
method is frequently used for face detection tasks. It is
appropriate for use in real-world applications due to its
capacity to manage changes in lighting conditions, facial
angles,and partial occlusions.Incomplexcircumstanceswith
extreme position fluctuations or low-resolution photos, it
might, nevertheless, be limited. However, for face detection
and recognitionincomputervision,theHaarCascademethod
continues to be a key tool.
Fig -4: Flow chart of face recognition system
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 08 | Aug 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 131
2.3 IMPLEMENTATION
The software configuration is the setting where the
project was developed. It is important to choose a language
that is suited forthe project. Additionally, the right operating
system forthe project needs tobechosen.Thesechoiceshave
a significant impact on how well the created tool works.
Therefore, these should only be chosen after a thorough
examination.
The experiment was conducted on a computer running
Windows 11 thatfeaturedanInteli7 4 GHzprocessor,8GBof
memory, and a webcam (HPTrueVisionHDcamerawith0.31
MP and 640x480 resolution).
2.4 RESULT
Numerous strengths and shortcomings of the project
system were discovered during the development and testing
phase. In order to increase the usability of the system, other
enhancements and requirements were also listed. Here is an
overview: System Strengths: a) High Accuracy: The project
system's facial recognition algorithm often displays high
accuracy. This shows that the system does a good job of
accurately recognizing faces. b) No Prior Training Is
Necessary: The facial recognition algorithm employedinthis
project system does not require pre-training, in contrast to
several others. This suggests that the system doesn't require
substantial training to quickly adjust to new faces. Systems'
shortcomings a) Camera orientation Dependency: Aspects
like camera orientation have an impact on face recognition
accuracy.
Fig -5: Records automatically when an unknown
person is detected
However, particular information abouttheseelementsisnot
given. Future Needs and Improvements: a) Improved
Accuracy from Different Camera orientations: Future
research should concentrate on improvingfacial recognition
accuracy, particularlyfromvariouscamera orientations.This
would strengthen the system andenableitto recognizefaces
taken from different perspectives. b) GPS Location
Recording: By including GPS location recording as a feature,
the system's actions would be given more context and
information, which could be valuable for tracking and
monitoring. c) other Features: The report refers to the need
for other features, but it does not list them. To make the
system more usable, additional requirements and desirable
functionalities should be determined.
Fig -6: face detection of an known person
We want to create a reliable and effective system to identify
faces in pictures and videos with this face detection project.
Modern deeplearningtechniques,particularlyConvolutional
Neural Networks (CNNs), which have demonstrated
outstanding performance in image identification tests, will
be used. A variety of photos with faces in various stances,
lighting settings, and backgrounds will make up the dataset
for training and validation.
Fig -7: attendance details
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 08 | Aug 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 132
To improve the data's generalizability, we will preprocess it
by shrinking, normalizing, and augmenting it. The dataset
will be used to fine-tune the CNN architecture we have
chosen, such as the well-known Faster R-CNN or Single Shot
MultiBox Detector (SSD). For implementation, Python and
deep learning frameworks like TensorFlow or PyTorch will
be used. Metrics will be used for evaluation.
3. CONCLUSIONS
The results of the face detection and face recognition
systems show that they are both quite successful and
precise. Many different difficulties in daily life can be solved
using techniques comparable to facerecognitiontechnology,
which has many applications. Inthesystemwe'vesuggested,
accuracy is roughly85%.Highaccuracyinrecognizingpeople
is one of the main benefits of a face recognition attendance
system. The method enables accurate identification by
examining distinctive facial patterns and traits,whichleaves
no room for fraudulent activities like proxy attendance. A
fair and open environment is fostered by this, which
encourages accountability and integrity in attendance
tracking. This method involves locating and detecting faces
in live videos or still photos. In order to ensurethat,thiscalls
for the adoption of technology and speedier algorithms. To
ensure that the system can handle the data quickly, quicker
algorithms and technology must be implemented. For use in
the future, every single database entry is updated. Any
advancement can be implemented into this system because
it has a modular architecture. The system may also include
changes to the environment. This system efficiently
completes daily chores using contemporary, in-demand
technology. To sum up, a face recognitionattendancesystem
has the power to revolutionise attendance monitoring by
offering precise, secure, and effective solutions. Adopting it
can improve security, expedite administrative procedures,
and foster an environment of openness and accountability.
This technology can considerably improve attendance
management in numerous sectors with careful
implementation and privacy controls in place, leading to
overall operational efficiency and productivity
ACKNOWLEDGEMENT
The task has been successfully completed, and I am very
appreciative to God Almighty for his grace and blessings,
without which this study would not have been possible.
REFERENCES
[1] FaceNet: A unified embedding forfaceidentificationand
clustering, F. Schroff, D. Kalenichenko, and J. Philbin,
2015 IEEE Conference on Computer Vision and Pattern
Recognition (CVPR), pp. 815-823.M. Young, The
Technical Writer’s Handbook. Mill Valley,CA:University
Science, 1989.
[2] Security enhancement utilizing motiondetection,Signal
Processing,Communication, ComputingandNetworking
Technologies (ICSCCN), 2011 International Conference
on, T huckalay, 2011, pp. 552–557. T homas, Ashraf, Lal,
Mathew, Jayashree.
[3] Moghaddam, B., Pentland, A.P.: Face recognition using
view-based and modular eigenspaces. In: Automatic
Systems for the Identification and Inspection of
Hu mans, vol. 2277, pp. 12–22 (1994),Sawhney, S.,
Kacker, K., Jain, S., Singh, S. N., Garg, R. (2o19, January).
Real-time smart attendance system using face
recognition techniques. In 2o19 9th international
conference on cloud computing, data science
engineering (Confluence) (pp. 522-525). IEEE
[4] Kodali, R.K., Jain, V., Bose, S., Boppana, L.: IoT based
smart security and home automation system. In: 2016
International Conferenceon Computing,Communication
and Automation (ICCCA), pp. 1286–1289. IEEE (2016)
[5] M. Turk and A. Pentland, “Eigenfacesfor Recognition,”in
Journal of cognitive neuroscience, vol 3, pp. 71-86, Jan
1991.
[6] Roqueiro, Petrushin, Counting people using video
cameras, DepartmentofComputerScience,Universityof
Illinois at Chicago, Chicago, IL 60607, USA, 2006.
[7] ] Kartik, J.S., Kumar, K.R., Srimadhavan, V.S.: Security
system with face recognition, SMS alert and embedded
network video monitoring terminal. Int. J. Secur. Priv.
Trust Manag. (IJSPTM) 2, 15–17 (2013)
[8] ] Chin, H.: Face recognition based automated student
attendance system. Diss. UTAR (2018)
[9] Ramanan, D., Zhu, X.: Face detection, pose estimation,
and landmark localization in the wild. In:Proceedingsof
the 2012 IEEE Conference on Computer Vision and
Pattern Recognition (CVPR), pp. 2879–2886 (2012)
[10] Yue, Wei, and Li. A Video Sequence Segmentation
Algorithm for Fore ground Back ground. China’s
Jiangnan University.2015.
[11] Chu Y, Ahmad T, Bebis G, Zhao L (2017) Low-resolution
face recognition with single sample per person. Signal
Process 141:144–15.
[12] Joint face detection and alignment using multi-task
cascaded convolutional net works,K.Zhang,Z.Zhang,Z.
Li, and Y. Qiao

More Related Content

Similar to Face Recognition System using OpenCV

Person Acquisition and Identification Tool
Person Acquisition and Identification ToolPerson Acquisition and Identification Tool
Person Acquisition and Identification ToolIRJET Journal
 
IRJET - Biometric Identification using Gait Analyis by Deep Learning
IRJET -  	  Biometric Identification using Gait Analyis by Deep LearningIRJET -  	  Biometric Identification using Gait Analyis by Deep Learning
IRJET - Biometric Identification using Gait Analyis by Deep LearningIRJET Journal
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition SystemStudentRocks
 
Smart Surveillance System through Computer Vision
Smart Surveillance System through Computer VisionSmart Surveillance System through Computer Vision
Smart Surveillance System through Computer VisionIRJET Journal
 
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...IRJET Journal
 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABMaria Perkins
 
Self-X: Geo Fencing and Face Recognition based Smart Attendance Management Ap...
Self-X: Geo Fencing and Face Recognition based Smart Attendance Management Ap...Self-X: Geo Fencing and Face Recognition based Smart Attendance Management Ap...
Self-X: Geo Fencing and Face Recognition based Smart Attendance Management Ap...IRJET Journal
 
IRJET- A Deep Learning based Approach for Automatic Detection of Bike Rid...
IRJET-  	  A Deep Learning based Approach for Automatic Detection of Bike Rid...IRJET-  	  A Deep Learning based Approach for Automatic Detection of Bike Rid...
IRJET- A Deep Learning based Approach for Automatic Detection of Bike Rid...IRJET Journal
 
Biometric Ear Recognition System
Biometric Ear Recognition SystemBiometric Ear Recognition System
Biometric Ear Recognition SystemIRJET Journal
 
IRJET- VISITX: Face Recognition Visitor Management System
IRJET-  	  VISITX: Face Recognition Visitor Management SystemIRJET-  	  VISITX: Face Recognition Visitor Management System
IRJET- VISITX: Face Recognition Visitor Management SystemIRJET Journal
 
FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...
FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...
FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...IRJET Journal
 
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET Journal
 
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMSMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMIRJET Journal
 
IRJET - Using Convolutional Neural Network in Surveillance Videos for Recogni...
IRJET - Using Convolutional Neural Network in Surveillance Videos for Recogni...IRJET - Using Convolutional Neural Network in Surveillance Videos for Recogni...
IRJET - Using Convolutional Neural Network in Surveillance Videos for Recogni...IRJET Journal
 
Face Mask Detection System Using Artificial Intelligence
Face Mask Detection System Using Artificial IntelligenceFace Mask Detection System Using Artificial Intelligence
Face Mask Detection System Using Artificial IntelligenceIRJET Journal
 
ATM Security System Based on the Video Surveillance Using Neural Networks
ATM Security System Based on the Video Surveillance Using Neural NetworksATM Security System Based on the Video Surveillance Using Neural Networks
ATM Security System Based on the Video Surveillance Using Neural NetworksIRJET Journal
 
Real time face recognition of video surveillance system using haar cascade c...
Real time face recognition of video surveillance system using  haar cascade c...Real time face recognition of video surveillance system using  haar cascade c...
Real time face recognition of video surveillance system using haar cascade c...nooriasukmaningtyas
 
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...IRJET Journal
 
Mouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep LearningMouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep LearningIRJET Journal
 

Similar to Face Recognition System using OpenCV (20)

Person Acquisition and Identification Tool
Person Acquisition and Identification ToolPerson Acquisition and Identification Tool
Person Acquisition and Identification Tool
 
IRJET - Biometric Identification using Gait Analyis by Deep Learning
IRJET -  	  Biometric Identification using Gait Analyis by Deep LearningIRJET -  	  Biometric Identification using Gait Analyis by Deep Learning
IRJET - Biometric Identification using Gait Analyis by Deep Learning
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition System
 
Smart Surveillance System through Computer Vision
Smart Surveillance System through Computer VisionSmart Surveillance System through Computer Vision
Smart Surveillance System through Computer Vision
 
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
 
april201629
april201629april201629
april201629
 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
 
Self-X: Geo Fencing and Face Recognition based Smart Attendance Management Ap...
Self-X: Geo Fencing and Face Recognition based Smart Attendance Management Ap...Self-X: Geo Fencing and Face Recognition based Smart Attendance Management Ap...
Self-X: Geo Fencing and Face Recognition based Smart Attendance Management Ap...
 
IRJET- A Deep Learning based Approach for Automatic Detection of Bike Rid...
IRJET-  	  A Deep Learning based Approach for Automatic Detection of Bike Rid...IRJET-  	  A Deep Learning based Approach for Automatic Detection of Bike Rid...
IRJET- A Deep Learning based Approach for Automatic Detection of Bike Rid...
 
Biometric Ear Recognition System
Biometric Ear Recognition SystemBiometric Ear Recognition System
Biometric Ear Recognition System
 
IRJET- VISITX: Face Recognition Visitor Management System
IRJET-  	  VISITX: Face Recognition Visitor Management SystemIRJET-  	  VISITX: Face Recognition Visitor Management System
IRJET- VISITX: Face Recognition Visitor Management System
 
FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...
FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...
FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...
 
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric Learning
 
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMSMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
 
IRJET - Using Convolutional Neural Network in Surveillance Videos for Recogni...
IRJET - Using Convolutional Neural Network in Surveillance Videos for Recogni...IRJET - Using Convolutional Neural Network in Surveillance Videos for Recogni...
IRJET - Using Convolutional Neural Network in Surveillance Videos for Recogni...
 
Face Mask Detection System Using Artificial Intelligence
Face Mask Detection System Using Artificial IntelligenceFace Mask Detection System Using Artificial Intelligence
Face Mask Detection System Using Artificial Intelligence
 
ATM Security System Based on the Video Surveillance Using Neural Networks
ATM Security System Based on the Video Surveillance Using Neural NetworksATM Security System Based on the Video Surveillance Using Neural Networks
ATM Security System Based on the Video Surveillance Using Neural Networks
 
Real time face recognition of video surveillance system using haar cascade c...
Real time face recognition of video surveillance system using  haar cascade c...Real time face recognition of video surveillance system using  haar cascade c...
Real time face recognition of video surveillance system using haar cascade c...
 
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
 
Mouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep LearningMouse Cursor Control Hands Free Using Deep Learning
Mouse Cursor Control Hands Free Using Deep Learning
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

Face Recognition System using OpenCV

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 08 | Aug 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 128 Face Recognition System using OpenCV Arun Binoy1, Acsahmol Edwin 2, Jayakrishnan K3 , Pranav S4 1-4BTECH UG Students, Department of Computer Science and Engineering, TOMS college of Engineering APJ Abdul Kalam Technological University, Kerala, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The face recognition system using OpenCV is a system which recognizes know faces and store it with time stamp. Then recognize the unknown faces and store it in another dataset with time stamp. The versatile face recognition system utilizing OpenCV, designed to streamline attendance tracking in online classes, meetings, and residential security applications. Leveraging advanced image processing techniques, the system identifies and verifies participants' faces in real-time. Its adaptable nature allows easy customization of recognized individuals, facilitating efficient management of attendance lists. This technology proves beneficial for remote learning scenarios, virtual meetings, and enhancing security protocols in residential settings. By seamlessly integrating withexistingplatforms, the system offers a user-friendlyandefficientsolutiontoautomate attendance management, thereby improving overall convenience and security in various contexts. Key Words: face recognition, OpenCV, dataset, time stamp, real time recognition. 1.INTRODUCTION Face recognition is importantbecauseit notonlyallowsusto use our faces as keys, but it also allows face recognition systems to read our expressions in real time. Face recognition is rapidly improving as the Internet of Things grows and new gadgets are developed. Everyone's first concern in the current world is security.Peopleareharassed at home, and the antiquated security mechanisms designed to keep people safe have failed. Various electronic devices, such as mobile phones, laptops, and ATMs, use biometric authentication or passcodes, however these can be easily accessed by thieves through any methods, making them insecure. Every face is unique because it can be recognised, which is essential for determining a person's identity. Facial recognition is a novel biometric technology for criminal identification that offers high accuracy with low intrusion.It is a technique that uses facial recognition to automatically identify and validate people in video or image frames. This study describes a face recognition system that incorporates the best face detection, feature extraction, and classification approaches currently in use. MTCNN and Face Net are two advanced deep learning systems that have received widespread acclaim for their sophistication and modernity. Our video streaming layer provides a continuous and stable experience with no abrupt transitions between consecutive frames. 1.1 SCOPE The suggested system aims to create and deploy a reliable and effective system for facial recognition technology-based automatedattendancetracking.Inorderto effectively detect and identify people in photos or videos, the project will use facial recognition algorithmsandtechniques, which will replace the need for manual attendance procedures. The scope most likely includes activities like image preprocessing and enhancement, face detection and recognition techniques implementation, facial feature extraction, and creation and management of a face database. Creating an intuitive user interface, connecting the system with current attendancemanagementsystems,andassessing the system's performance in terms of accuracy, speed, scalability, and usability are all potential components of the project. 1.2 FACE DETECTION Changes in an object's position in respect to its surroundings are monitored using face detection. One ofthe most important security elements in recent years is face detection software. It is used to enhance securityequipment that has already been installed, such as the motion sensor illumination on indoor and outdoor security cameras. An advanced facial identification system like this might be automated to detect criminals by using CCTV cameras positioned at numerous locations. The goal of the project is to create an automated system that effectively and reliably tracks attendance using facial recognition technology. Fig -1: Face detection
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 08 | Aug 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 129 The goal of the project is to recognise people in pictures or videos, extract their face traits, and compare them to a database already in existence. The main goal is to substitute a dependable and practical solution for manual attendance methods in order to lighten the administrative burden and increase accuracy. The project's overall goal is to provide a seamless, user-friendly system that enhances attendance management and provides a dependable, effective, and secure way to record and track attendance. 1.3 LITERATURE REVIEW Despite notable recent developments in the field of face recognition [DeepFace, DeepId2],scaling up face verification and recognition effectively poses substantial obstacles to existing methodologies. 1) The [1] FaceNet system, which we introduce in this study, directly learnsa mapping from face imagesto a condensed Euclidean space where distances directly correlate to a measure of face similarity.[5] Eigenfaces: This method captures major facial changes for recognition by using primary Component Analysis (PCA) to represent faces as a collection of primary components. 2) Local Binary Patterns (LBP): A texture-based method for encoding local pixel patterns, LBP capturesspatial relationshipsandadaptstochanges in lighting. 3) Fisherfaces: Also referred to as Linear Discriminant Analysis (LDA), this method derives distinguishing characteristics from the faces of various people. 4) Deep Convolutional Neural Networks (CNN): By extracting intricate patternsandfeaturesfromfacial photos, CNNs, a subset of deep learning techniques, have achieved astounding success in face recognition. 5) 3D Face Recognition: This method uses depth data from 3D face scans or specialized sensors to enable accurateidentification even when position, lighting, and expression variations are present. 2. METHODOLOGY The suggested method seeks to create a reliable face recognition attendance system that can detect and subtract unknown faces while reliably identifying recognized faces. Unknown faces will be found in the collectedphotosorvideo frames using objectdetectionmethods.Unknownpeople will have their faces and a timestamp recorded by the system, which will serve as a record of their existence. The system would require input from photos and videos in order to distinguish faces and compare them to a database of recognizable individuals. CCTV cameras, mobile cameras, and other sources could all provide this data. To precisely identify registered users,thesystemwill usefacerecognition algorithms. Here, faces are found and recognized using the Haar Cascade method. Fig -2: motion detection window The technique of identifying and recognizing faces of people who are not yet known or registered in a database is known as "unknown face detection." It entails examining the patterns and features of the face to identify whether a face resembles any recognized individuals or if it is completely unidentified. The use of object detection algorithms will be used to identify and remove unidentified faces from attendance records. Applying various algorithms and approaches to analyses, alter, and extract valuable information from visual data is the process of processing images and videos. The suggested systemwill analysesfacial features, conduct face recognition, and find unidentified faces using image and video processing techniques. The practice of monitoring and documenting people's presence or absence in a certain setting is known as attendance management. The suggested system's attendance management process includes organizing the attendance records, storing timestamped photos of unidentified faces, and maintaining a database of recognized people. Attendance management is the process of keeping track of and recording people's presence or absence in a certain location. A database of recognized people is kept, timestamped photographs of unidentifiablefacesarestored, and attendance records are organized as part of the suggested system's attendance management procedure. 2.1 DATASET We'll build a database of every person, their unique ID, and the quantity of grayscale photos needed for face recognition. A dataset is created using the photographs of the specific person, and the images are then stored in an XML file. For each person's ID, we used 1000 samples because this increased the accuracy of the image of the individual. The authorized individuals' created dataset is kept in a YML file.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 08 | Aug 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 130 The images are trained using the Local Binary Pattern Histogram (LBPH) approach. Chi-Square: This formula is used to characterizes a person's expression. In our project, it is employed to assess the character of a certain individual whose database is recorded in an XML file. Euclidean Distance: To calculatetheseparationbetweentwo straight lines, use this equation. It is employed to calculate the dimensions of images that are stored in datasets. Normalized Euclidean Distance: The length of the line segment connecting points hist1 and hist2 (hist1, hist2) equals the Euclidean distance between them. A Euclidean vector is a representation of a point's location in Euclidean n-space. This formula scaledtheimage'slengthandcreateda square box around it. Absolute Value: After being acquired by the camera, the image is trained using both positive and negative images using the Haar Cascade Classifier. It is employed to change grayscale photographs into colored ones. 2.2 DESIGN The technology uses a camera or webcam to record facial photos or video frames. These images are used as raw material for later processing. Preprocessing techniques are applied to the collected images or frames to improve quality and lower noise. This might entail filters, normalization,and resizing actions. The Haar Cascade algorithm employs a series of classifiers that are staged in a cascade. Each stage consists of a number of weak classifiers that analyses various areas of the image in turn. In order to lessen computing effort, the cascade is made to swiftly dismiss regions that are unlikely to contain faces. A region is processed further for face recognition or additional analysis if it successfully navigates through every stage of the cascade and is deemed to have made a positive detection. After face detection, further methods for face recognition can be applied. In order to identify the person, these algorithms examine the identified face region, extract facial characteristics like landmarks or descriptors, and contrast them with a database of recognized faces. Fig -3: Block diagram of face recognition system Due of its effectiveness and precision, the Haar Cascade method is frequently used for face detection tasks. It is appropriate for use in real-world applications due to its capacity to manage changes in lighting conditions, facial angles,and partial occlusions.Incomplexcircumstanceswith extreme position fluctuations or low-resolution photos, it might, nevertheless, be limited. However, for face detection and recognitionincomputervision,theHaarCascademethod continues to be a key tool. Fig -4: Flow chart of face recognition system
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 08 | Aug 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 131 2.3 IMPLEMENTATION The software configuration is the setting where the project was developed. It is important to choose a language that is suited forthe project. Additionally, the right operating system forthe project needs tobechosen.Thesechoiceshave a significant impact on how well the created tool works. Therefore, these should only be chosen after a thorough examination. The experiment was conducted on a computer running Windows 11 thatfeaturedanInteli7 4 GHzprocessor,8GBof memory, and a webcam (HPTrueVisionHDcamerawith0.31 MP and 640x480 resolution). 2.4 RESULT Numerous strengths and shortcomings of the project system were discovered during the development and testing phase. In order to increase the usability of the system, other enhancements and requirements were also listed. Here is an overview: System Strengths: a) High Accuracy: The project system's facial recognition algorithm often displays high accuracy. This shows that the system does a good job of accurately recognizing faces. b) No Prior Training Is Necessary: The facial recognition algorithm employedinthis project system does not require pre-training, in contrast to several others. This suggests that the system doesn't require substantial training to quickly adjust to new faces. Systems' shortcomings a) Camera orientation Dependency: Aspects like camera orientation have an impact on face recognition accuracy. Fig -5: Records automatically when an unknown person is detected However, particular information abouttheseelementsisnot given. Future Needs and Improvements: a) Improved Accuracy from Different Camera orientations: Future research should concentrate on improvingfacial recognition accuracy, particularlyfromvariouscamera orientations.This would strengthen the system andenableitto recognizefaces taken from different perspectives. b) GPS Location Recording: By including GPS location recording as a feature, the system's actions would be given more context and information, which could be valuable for tracking and monitoring. c) other Features: The report refers to the need for other features, but it does not list them. To make the system more usable, additional requirements and desirable functionalities should be determined. Fig -6: face detection of an known person We want to create a reliable and effective system to identify faces in pictures and videos with this face detection project. Modern deeplearningtechniques,particularlyConvolutional Neural Networks (CNNs), which have demonstrated outstanding performance in image identification tests, will be used. A variety of photos with faces in various stances, lighting settings, and backgrounds will make up the dataset for training and validation. Fig -7: attendance details
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 08 | Aug 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 132 To improve the data's generalizability, we will preprocess it by shrinking, normalizing, and augmenting it. The dataset will be used to fine-tune the CNN architecture we have chosen, such as the well-known Faster R-CNN or Single Shot MultiBox Detector (SSD). For implementation, Python and deep learning frameworks like TensorFlow or PyTorch will be used. Metrics will be used for evaluation. 3. CONCLUSIONS The results of the face detection and face recognition systems show that they are both quite successful and precise. Many different difficulties in daily life can be solved using techniques comparable to facerecognitiontechnology, which has many applications. Inthesystemwe'vesuggested, accuracy is roughly85%.Highaccuracyinrecognizingpeople is one of the main benefits of a face recognition attendance system. The method enables accurate identification by examining distinctive facial patterns and traits,whichleaves no room for fraudulent activities like proxy attendance. A fair and open environment is fostered by this, which encourages accountability and integrity in attendance tracking. This method involves locating and detecting faces in live videos or still photos. In order to ensurethat,thiscalls for the adoption of technology and speedier algorithms. To ensure that the system can handle the data quickly, quicker algorithms and technology must be implemented. For use in the future, every single database entry is updated. Any advancement can be implemented into this system because it has a modular architecture. The system may also include changes to the environment. This system efficiently completes daily chores using contemporary, in-demand technology. To sum up, a face recognitionattendancesystem has the power to revolutionise attendance monitoring by offering precise, secure, and effective solutions. Adopting it can improve security, expedite administrative procedures, and foster an environment of openness and accountability. This technology can considerably improve attendance management in numerous sectors with careful implementation and privacy controls in place, leading to overall operational efficiency and productivity ACKNOWLEDGEMENT The task has been successfully completed, and I am very appreciative to God Almighty for his grace and blessings, without which this study would not have been possible. REFERENCES [1] FaceNet: A unified embedding forfaceidentificationand clustering, F. Schroff, D. Kalenichenko, and J. Philbin, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 815-823.M. Young, The Technical Writer’s Handbook. Mill Valley,CA:University Science, 1989. [2] Security enhancement utilizing motiondetection,Signal Processing,Communication, ComputingandNetworking Technologies (ICSCCN), 2011 International Conference on, T huckalay, 2011, pp. 552–557. T homas, Ashraf, Lal, Mathew, Jayashree. [3] Moghaddam, B., Pentland, A.P.: Face recognition using view-based and modular eigenspaces. In: Automatic Systems for the Identification and Inspection of Hu mans, vol. 2277, pp. 12–22 (1994),Sawhney, S., Kacker, K., Jain, S., Singh, S. N., Garg, R. (2o19, January). Real-time smart attendance system using face recognition techniques. In 2o19 9th international conference on cloud computing, data science engineering (Confluence) (pp. 522-525). IEEE [4] Kodali, R.K., Jain, V., Bose, S., Boppana, L.: IoT based smart security and home automation system. In: 2016 International Conferenceon Computing,Communication and Automation (ICCCA), pp. 1286–1289. IEEE (2016) [5] M. Turk and A. Pentland, “Eigenfacesfor Recognition,”in Journal of cognitive neuroscience, vol 3, pp. 71-86, Jan 1991. [6] Roqueiro, Petrushin, Counting people using video cameras, DepartmentofComputerScience,Universityof Illinois at Chicago, Chicago, IL 60607, USA, 2006. [7] ] Kartik, J.S., Kumar, K.R., Srimadhavan, V.S.: Security system with face recognition, SMS alert and embedded network video monitoring terminal. Int. J. Secur. Priv. Trust Manag. (IJSPTM) 2, 15–17 (2013) [8] ] Chin, H.: Face recognition based automated student attendance system. Diss. UTAR (2018) [9] Ramanan, D., Zhu, X.: Face detection, pose estimation, and landmark localization in the wild. In:Proceedingsof the 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 2879–2886 (2012) [10] Yue, Wei, and Li. A Video Sequence Segmentation Algorithm for Fore ground Back ground. China’s Jiangnan University.2015. [11] Chu Y, Ahmad T, Bebis G, Zhao L (2017) Low-resolution face recognition with single sample per person. Signal Process 141:144–15. [12] Joint face detection and alignment using multi-task cascaded convolutional net works,K.Zhang,Z.Zhang,Z. Li, and Y. Qiao