SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7216
DIGIYATHRA
Professor Annamma S Joseph1, Meera Krishna C2, Shahala Basheer3, Shadiya Basheer4,
Vishnu Sabu5
1-5 Dept. Electronics and Communication, Mar Athanasius College of Engineering, Kerala ,India
------------------------------------------------------------------------***-------------------------------------------------------------------------
Abstract:- The aim of the project is to provide a seamless experience for the air travellers at every touch point of the journey.
Walk-through the security scanners swiftly owing to advanced biometric security solutions is the main idea behind this
project. With this initiative, the airport entry and boarding pass security check-in would be made digital. During online ticket
booking, the passenger will be required to provide a passport picture. This would be added under the database of the specific
flight. Thereafter, the passenger can access various services like bag-drop, security check-in and boarding using the biometric.
Face recognition will make faster airport entry and automated check-in without requiring any paper based interventions.
Apart from this, the process will accelerate throughput of passengers at airports, reduce cost as less manpower deployment
will be required for verifying paper-ids and tickets at various points. Hence, it ensures flyers complete the airport process
quickly.
Key Words: Facial recognition, LBPH recognizer, RFID Baggage tracker, airport security systems, microcontroller
1. INTRODUCTION
Facial recognition is the fastest biometric technology that has one and only purpose – to identify human faces.
Forget about fingerprints readers and eye scanners, current face recognition systems analyze the characteristics of a
person’s face images that were taken with a digital video camera. It’s the least intrusive method that provides no delays
and leaves the subjects entirely unaware of the process.
A facial recognition system is a technology capable of identifying or verifying a person from a digital image or a
video frame from a videosource. There are multiple methods in which facial recognition systems work, but in general, they
work by comparing selectedfacial features from given image with faces within adatabase.It is also described as a Biometric
Artificial Intelligence based application that can uniquely identify a person by analysing patterns based on the person's
facial textures and shape.
Here, we include pictures in a database and the input face is compared with all the images in the database. The
confirmed picture is selected from the database and the name is given back. Along with this, an added feature of tracking
the bags by using a bag-tag tracker system is also implemented.
1.1 Facial recognition
Face Detection has been one of the hottest topics of computer vision for the past few years. This technology has
been available for some years now and is being used all over the place. From cameras that make sure faces are focused
before you take a picture, to Facebook when it tags people automatically once you upload a picture. Or some shows like CSI
used them to identify “bad guys” from security footage or even unlocking your phone by looking at it! Lets understand the
processes working behind this.
As a biometric, facial recognition is a form of computer vision that uses faces to attempt to identify a person or
verify a person’s claimed identity. Regardless of specific method used, facial recognition is accomplished in
a five step process. First, an image of the face is acquired. This acquisition can be accomplished by digitally scanning an
existing photograph or by using an electro-optical camera to acquire a live picture of a subject. As video is a rapid sequence
of individual still images, it can also be used as a source of facial images.
Second, software is employed to detect the location of any faces in the acquired image. This task is difficult, and
often generalized patterns of what a face “looks like” (two eyes and a mouth set in an oval shape) are employed to pick out
the faces
Once the facial detection software has targeted a face, it can be analyzed. Facial recognition analyzes the spatial
geometry of distinguishing features of the face. Different vendors use different methods to extract the identifying features
of a face. Thus, specific details on the methods are proprietary. The most popular method is called Principle Components
Analysis (PCA), which is commonly referred to as the eigen face method. PCA has also been combined with neural
networks and local feature analysis in efforts to enhance its performance. Template generation is the result of the feature
extraction process. A template is a reduced set of data that represents the unique features of an enrollee’s face. It is
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7217
important to note that because the systems use spatial geometry of distinguishing facial features, they do not use hairstyle,
facial hair, or other similar factors.
The fourth step is to compare the template generated in step three with those in a database of known faces. In an
identification application, this process yields scores that indicate how closely the generated template matches each of
those in the database. In a verification application, the generated template is only compared with one template in the
database – that of the claimed identity.
The final step is determining whether any scores produced in step four are high enough to declare a match. The
rules governing the declaration of a match are often configurable by the end user, so that he or she can determine how the
facial recognition system should behave based on security and operational considerations
Fig 1:Block diagram of facial recognition
2. FACE RECOGNITION USING LBPH FACE RECOGNIZER
Local binary patterns Histogram is a type of visual descriptor used for classification in computer vision. LBP is the
particular case of the Texture Spectrum model proposed i n 1990.LBPH was first described in 1994. It has since been found
to be a powerful feature for texture classification; it has further been determined that when LBP is combined with the
Histogram of oriented gradients (HOG) descriptor, it improves the detection performance considerably on some datasets.
Fig 2:Block diagram of digiyathra
Now that we know a little more about face recognition and the LBPH, let’s go further and see the steps of the algorithm:
2.1 Parameters
The LBPH uses 4 parameters:
 Radius: the radius is used to build the circular local binary pattern and represents the radius around the central
pixel. It is usually set to 1.
 Neighbors: the number of sample points to build the circular local binary pattern. Keep in mind: the more sample
points you include, the higher the computational cost. It is usually set to 8.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7218
 Grid X: the number of cells in the horizontal direction. The more cells, the finer the grid, the higher the
dimensionality of the resulting feature vector. It is usually set to 8.
 Grid Y: The number of cells in the vertical direction. The more cells, the finer the grid, the higher the
dimensionality of the resulting feature vector. It is usually set to 8.
2.2 Training the Algorithm
First, we need to train the algorithm. To do so, we need to use a dataset with the facial images of the people we
want to recognize. We need to also set an ID (it may be a number or the name of the person) for each image, so the
algorithm will use this information to recognize an input image and give you an output. Images of the same person must
have the same ID. With the training set already constructed, let’s see the LBPH computational steps.
2.3 Applying the LBP operation
The first computational step of the LBPH is to create an intermediate image that describes the original image in a
better way, by highlighting the facial characteristics. To do so, the algorithm uses a concept of a sliding window, based on
the parameters radius and neighbors.
The image below shows this procedure:
Figure 3: Applying LBP
Based on the image above, let’s break it into several small steps :
Suppose we have a facial image in grayscale.
 We can get part of this image as a window of 3x3 pixels.
 It can also be represented as a 3x3 matrix containing the intensity of each pixel (0~255).
 Then, we need to take the central value of the matrix to be used as the threshold.
 This value will be used to define the new values from the 8 neighbors.
 For each neighbor of the central value (threshold), we set a new binary value. We set 1 for values equal or higher
than the threshold and 0 for values lower than the threshold.
 Now, the matrix will contain only binary values (ignoring the central value). We need to concatenate each binary
value from each position from the matrix line by line into a new binary value (e.g. 10001101). Then, we convert
this binary value to a decimal value and set it to the central value of the matrix, which is actually a pixel from the
original image. At the end of this procedure (LBP procedure), we have a new image which represents better the
characteristics of the original image.
2.4 Extracting the Histograms
Now, using the image generated in the last step, we can use the Grid X and Grid Y parameters to divide the image
into multiple grids, as can be seen in the following image:
Figure 4: Extracting the histograms
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7219
Based on the image above, we can extract the histogram of each region as follows:
 As we have an image in grayscale, each histogram (from each grid) will contain only 256 positions (0~255)
representing the occurrences of each pixel intensity.
 Then, we need to concatenate each histogram to create a new and bigger histogram. Supposing we have 8x8 grids,
we will have 8x8x256=16.384 positions in the final histogram. The final histogram represents the characteristics
of the image original image.
The LBPH algorithm is pretty much it.
2.5. Performing the face recognition
In this step, the algorithm is already trained. Each histogram created is used to represent each image from the training
dataset. So, given an input image, we perform the steps again for this new image and creates a histogram which represents
the image.
 So to find the image that matches the input image we just need to compare two histograms and return the image
with the closest histogram.
 We can use various approaches to compare the histograms (calculate the distance between two histograms), for
example: euclidean distance, chi-square, absolute value, etc. In this example, we can use the Euclidean distance
(which is quite known) based on the following formula:
 So the algorithm output is the ID from the image with the closest histogram. The algorithm should also return the
calculated distance, which can be used as a ‘confidence’ measurement. Note: don’t be fooled about the ‘confidence’
name, as lower confidences are better because it means the distance between the two histograms is closer.
 We can then use a threshold and the ‘confidence’ to automatically estimate if the algorithm has correctly
recognized the image. We can assume that the algorithm has successfully recognized if the confidence is lower
than the threshold defined.
4. CIRCUIT DIAGRAM
Fig 4: Circuit diagram
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7220
4.1 PIC CONTROLLER (PIC16F877A)
PIC is a family of microcontrollers made by Microchip Technology, derived from the PIC1650 originally developed by
General Instrument's Microelectronics Division. The name PIC initially referred to Peripheral Interface Controller, then it
was corrected as Programmable Intelligent Computer. The first parts of the family were available in 19576; by 2013 the
company had shipped more than twelve billion individual parts, used in a wide variety of embedded systems.
This powerful (200 nanosecond instruction execution) yet easy-to-program (only 35 single word instructions) CMOS
FLASH-based 8-bit microcontroller packs Microchip's powerful PIC® architecture into an 40- or 44-pin package and is
upwards compatible with the PIC16C5X, PIC12CXXX and PIC16C7X devices. The PIC16F877A features 256 bytes of
EEPROM data memory, self programming, an ICD, 2 Comparators, 8 channels of 10-bit Analog-to-Digital (A/D) converter, 2
capture/compare/PWM functions, the synchronous serial port can be configured as either 3-wire Serial Peripheral
Interface (SPI™) or the 2-wire Inter-Integrated Circuit (I²C™) bus and a Universal Asynchronous Receiver Transmitter
(USART). All of these features make it ideal for more advanced level A/D applications in automotive, industrial, appliances
and consumer applications.
4.2 MERITS
Face recognition technology has always been a concept that lived in fictional worlds, whether it was a tool to solve a crime
or open doors.Below are the major advantages.
1. Greater Accuracy:With today’s technology, face ID technology is becoming more and more reliable. The success rate is
currently at a high due to the developments of 3D facial recognition technologies and infrared cameras. The combination of
these technologies make it very hard to trick the system. With such accuracy, you can have confidence that the premise is
more secure and safe for you and your peers.3D mapping, deep learning and other advances make FRT more reliable and
harder to trick
2. Better Security: Research shows a 1-in-50,000 chance of a phone with touch ID being unlocked with the wrong
fingerprint. With 3D facial modeling, the probability drops to nearly 1-in-1,000,000.A facial biometric security system can
drastically improve your security because every individual who enters your premise will be accounted for. Any trespassers
will be quickly captured by the recognition system and you would be alerted promptly. With a facial recognition security
system, you can potentially reduce costs of hiring a security staff.
3. Convenient and Frictionless: FRT is easy. It can be used passively without a user’s knowledge; or actively, such as
having a person “smile for the camera.”
4. Smarter Integration: Face recognition tools are generally easy to integrate with existing security infrastructures,
saving time and cost on software redevelopment.
5. Automation: Automated and accurate 24/7 security eliminates the need for security guards to visually monitor entry
points, perform security checks and view security cameras.
5. CONCLUSIONS
Face recognition technology has come a long way in the last twenty years. Today, machines are able to automatically verify
identity information for secure transactions, for surveillance and security tasks, and for access control to buildings etc.
These applications usually work in controlled environments and recognition algorithms can take advantage of the
environmental constraints to obtain high recognition accuracy. However, next generation face recognition systems are
going to have widespread application in smart environments -- wherecomputers and machines are more like
helpful assistants.
To achieve this goal computers must be able to reliably identify nearby people in a manner that fits naturally within the
pattern of normal human interactions. They must not require special interactions and must conform to human intuitions
about when recognition is likely. This implies that future smart environments should use the same modalities as
humans, and have approximately the same limitations. These goals now appear in reach -- however, substantial research
remains to be done in making person recognition technology work reliably, in widely varying conditions using information
from single or multiple modalities.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7221
This system was tested under very robust conditions in this experimental study and it is envisaged that real-world
performance will be far more accurate
REFERENCES
[1] Face recognition : a literature review by Ahmed Tolba
[2] Facial recognition system: wikipedia
[3] https://www.upwork.com/hiring/for-clients/pro s-cons-facial-recognition-technology-business/
[4] https://www.google.co.in/url?sa=t&rct=j&q=&esr
c=s&source=web&cd=18&cad=rja&uact=8&ved=2
ahUKEwiH3vqb8K7iAhVCeysKHZxqCUEQFjAReg
QICBAB&url=https%3A%2F%2Fwww.techopedia
.com%2Fdefinition%2F32071%2Ffacial-recogniti on&usg=AOvVaw0LXnygcdTvC1uzGq5PvDWi

More Related Content

What's hot

FACE RECOGNITION USING NEURAL NETWORK
FACE RECOGNITION USING NEURAL NETWORKFACE RECOGNITION USING NEURAL NETWORK
FACE RECOGNITION USING NEURAL NETWORKTITHI DAN
 
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionIJCI JOURNAL
 
A novel approach for performance parameter estimation of face recognition bas...
A novel approach for performance parameter estimation of face recognition bas...A novel approach for performance parameter estimation of face recognition bas...
A novel approach for performance parameter estimation of face recognition bas...IJMER
 
IRJET- Face Recognition of Criminals for Security using Principal Component A...
IRJET- Face Recognition of Criminals for Security using Principal Component A...IRJET- Face Recognition of Criminals for Security using Principal Component A...
IRJET- Face Recognition of Criminals for Security using Principal Component A...IRJET Journal
 
M phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projectsM phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projectsVijay Karan
 
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...ijfcstjournal
 
Gender Classification using SVM With Flask
Gender Classification using SVM With FlaskGender Classification using SVM With Flask
Gender Classification using SVM With FlaskAI Publications
 
Criminal Identification using Arm7
Criminal Identification using Arm7Criminal Identification using Arm7
Criminal Identification using Arm7IRJET Journal
 
Face Detection techniques
Face Detection techniquesFace Detection techniques
Face Detection techniquesAbhineet Bhamra
 
Face Detection Using MATLAB (SUD)
Face Detection Using MATLAB (SUD)Face Detection Using MATLAB (SUD)
Face Detection Using MATLAB (SUD)Sudhanshu Saxena
 
Explaining Aluminous Ascientification Of Significance Examples Of Personal St...
Explaining Aluminous Ascientification Of Significance Examples Of Personal St...Explaining Aluminous Ascientification Of Significance Examples Of Personal St...
Explaining Aluminous Ascientification Of Significance Examples Of Personal St...SubmissionResearchpa
 
IRJET- Spot Me - A Smart Attendance System based on Face Recognition
IRJET- Spot Me - A Smart Attendance System based on Face RecognitionIRJET- Spot Me - A Smart Attendance System based on Face Recognition
IRJET- Spot Me - A Smart Attendance System based on Face RecognitionIRJET Journal
 
Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Herman Kurnadi
 
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...cscpconf
 
IRJET- A Study on Face Recognition based on Local Binary Pattern
IRJET- A Study on Face Recognition based on Local Binary PatternIRJET- A Study on Face Recognition based on Local Binary Pattern
IRJET- A Study on Face Recognition based on Local Binary PatternIRJET Journal
 
Progression in Large Age-Gap Face Verification
Progression in Large Age-Gap Face VerificationProgression in Large Age-Gap Face Verification
Progression in Large Age-Gap Face VerificationIRJET Journal
 
FACE RECOGNITION USING NEURAL NETWORK
FACE RECOGNITION USING NEURAL NETWORKFACE RECOGNITION USING NEURAL NETWORK
FACE RECOGNITION USING NEURAL NETWORKcodebangla
 

What's hot (19)

FACE RECOGNITION USING NEURAL NETWORK
FACE RECOGNITION USING NEURAL NETWORKFACE RECOGNITION USING NEURAL NETWORK
FACE RECOGNITION USING NEURAL NETWORK
 
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print Recognition
 
A novel approach for performance parameter estimation of face recognition bas...
A novel approach for performance parameter estimation of face recognition bas...A novel approach for performance parameter estimation of face recognition bas...
A novel approach for performance parameter estimation of face recognition bas...
 
IRJET- Face Recognition of Criminals for Security using Principal Component A...
IRJET- Face Recognition of Criminals for Security using Principal Component A...IRJET- Face Recognition of Criminals for Security using Principal Component A...
IRJET- Face Recognition of Criminals for Security using Principal Component A...
 
M phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projectsM phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projects
 
Ck36515520
Ck36515520Ck36515520
Ck36515520
 
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
A FACE RECOGNITION USING LINEAR-DIAGONAL BINARY GRAPH PATTERN FEATURE EXTRACT...
 
Gender Classification using SVM With Flask
Gender Classification using SVM With FlaskGender Classification using SVM With Flask
Gender Classification using SVM With Flask
 
Criminal Identification using Arm7
Criminal Identification using Arm7Criminal Identification using Arm7
Criminal Identification using Arm7
 
Face Detection techniques
Face Detection techniquesFace Detection techniques
Face Detection techniques
 
Face Detection Using MATLAB (SUD)
Face Detection Using MATLAB (SUD)Face Detection Using MATLAB (SUD)
Face Detection Using MATLAB (SUD)
 
Explaining Aluminous Ascientification Of Significance Examples Of Personal St...
Explaining Aluminous Ascientification Of Significance Examples Of Personal St...Explaining Aluminous Ascientification Of Significance Examples Of Personal St...
Explaining Aluminous Ascientification Of Significance Examples Of Personal St...
 
IRJET- Spot Me - A Smart Attendance System based on Face Recognition
IRJET- Spot Me - A Smart Attendance System based on Face RecognitionIRJET- Spot Me - A Smart Attendance System based on Face Recognition
IRJET- Spot Me - A Smart Attendance System based on Face Recognition
 
Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)
 
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
 
IRJET- A Study on Face Recognition based on Local Binary Pattern
IRJET- A Study on Face Recognition based on Local Binary PatternIRJET- A Study on Face Recognition based on Local Binary Pattern
IRJET- A Study on Face Recognition based on Local Binary Pattern
 
Progression in Large Age-Gap Face Verification
Progression in Large Age-Gap Face VerificationProgression in Large Age-Gap Face Verification
Progression in Large Age-Gap Face Verification
 
FACE RECOGNITION USING NEURAL NETWORK
FACE RECOGNITION USING NEURAL NETWORKFACE RECOGNITION USING NEURAL NETWORK
FACE RECOGNITION USING NEURAL NETWORK
 
184
184184
184
 

Similar to IRJET- Digiyathra

IRJET- Survey on Face Recognition using Biometrics
IRJET-  	  Survey on Face Recognition using BiometricsIRJET-  	  Survey on Face Recognition using Biometrics
IRJET- Survey on Face Recognition using BiometricsIRJET Journal
 
IRJET- Face Recognition using Deep Learning
IRJET-  	  Face Recognition using Deep LearningIRJET-  	  Face Recognition using Deep Learning
IRJET- Face Recognition using Deep LearningIRJET Journal
 
IRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric AttendanceIRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric AttendanceIRJET Journal
 
IRJET- Autonamy of Attendence using Face Recognition
IRJET- Autonamy of Attendence using Face RecognitionIRJET- Autonamy of Attendence using Face Recognition
IRJET- Autonamy of Attendence using Face RecognitionIRJET Journal
 
IRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET Journal
 
IRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET Journal
 
IRJET- A Review on Face Recognition using Local Binary Pattern Algorithm
IRJET- A Review on Face Recognition using Local Binary Pattern AlgorithmIRJET- A Review on Face Recognition using Local Binary Pattern Algorithm
IRJET- A Review on Face Recognition using Local Binary Pattern AlgorithmIRJET Journal
 
Smart Doorbell System Based on Face Recognition
Smart Doorbell System Based on Face RecognitionSmart Doorbell System Based on Face Recognition
Smart Doorbell System Based on Face RecognitionIRJET Journal
 
IRJET- Student Attendance System by Face Detection
IRJET- Student Attendance System by Face DetectionIRJET- Student Attendance System by Face Detection
IRJET- Student Attendance System by Face DetectionIRJET Journal
 
Virtual Contact Discovery using Facial Recognition
Virtual Contact Discovery using Facial RecognitionVirtual Contact Discovery using Facial Recognition
Virtual Contact Discovery using Facial RecognitionIRJET Journal
 
A Real Time Advance Automated Attendance System using Face-Net Algorithm
A Real Time Advance Automated Attendance System using Face-Net AlgorithmA Real Time Advance Automated Attendance System using Face-Net Algorithm
A Real Time Advance Automated Attendance System using Face-Net AlgorithmIRJET Journal
 
IRJET - Gender and Age Prediction using Wideresnet Architecture
IRJET - Gender and Age Prediction using Wideresnet ArchitectureIRJET - Gender and Age Prediction using Wideresnet Architecture
IRJET - Gender and Age Prediction using Wideresnet ArchitectureIRJET Journal
 
IRJET- Smart Classroom Attendance System: Survey
IRJET- Smart Classroom Attendance System: SurveyIRJET- Smart Classroom Attendance System: Survey
IRJET- Smart Classroom Attendance System: SurveyIRJET Journal
 
IRJET - Augmented Reality: Social Profile Detection by Face Recognition
IRJET - Augmented Reality: Social Profile Detection by Face RecognitionIRJET - Augmented Reality: Social Profile Detection by Face Recognition
IRJET - Augmented Reality: Social Profile Detection by Face RecognitionIRJET Journal
 
IRJET- Facial Expression Recognition using GPA Analysis
IRJET-  	  Facial Expression Recognition using GPA AnalysisIRJET-  	  Facial Expression Recognition using GPA Analysis
IRJET- Facial Expression Recognition using GPA AnalysisIRJET Journal
 
IRJET- Credit Card Authentication using Facial Recognition
IRJET-  	  Credit Card Authentication using Facial RecognitionIRJET-  	  Credit Card Authentication using Facial Recognition
IRJET- Credit Card Authentication using Facial RecognitionIRJET Journal
 
Face Recognition Technique using ICA and LBPH
Face Recognition Technique using ICA and LBPHFace Recognition Technique using ICA and LBPH
Face Recognition Technique using ICA and LBPHIRJET Journal
 
IRJET- Facial Emotion Detection using Convolutional Neural Network
IRJET- Facial Emotion Detection using Convolutional Neural NetworkIRJET- Facial Emotion Detection using Convolutional Neural Network
IRJET- Facial Emotion Detection using Convolutional Neural NetworkIRJET Journal
 
IRJET- A Plant Identification and Recommendation System
IRJET- A Plant Identification and Recommendation SystemIRJET- A Plant Identification and Recommendation System
IRJET- A Plant Identification and Recommendation SystemIRJET Journal
 
IRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using AndroidIRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using AndroidIRJET Journal
 

Similar to IRJET- Digiyathra (20)

IRJET- Survey on Face Recognition using Biometrics
IRJET-  	  Survey on Face Recognition using BiometricsIRJET-  	  Survey on Face Recognition using Biometrics
IRJET- Survey on Face Recognition using Biometrics
 
IRJET- Face Recognition using Deep Learning
IRJET-  	  Face Recognition using Deep LearningIRJET-  	  Face Recognition using Deep Learning
IRJET- Face Recognition using Deep Learning
 
IRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric AttendanceIRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric Attendance
 
IRJET- Autonamy of Attendence using Face Recognition
IRJET- Autonamy of Attendence using Face RecognitionIRJET- Autonamy of Attendence using Face Recognition
IRJET- Autonamy of Attendence using Face Recognition
 
IRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face Recognition
 
IRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face Recognition
 
IRJET- A Review on Face Recognition using Local Binary Pattern Algorithm
IRJET- A Review on Face Recognition using Local Binary Pattern AlgorithmIRJET- A Review on Face Recognition using Local Binary Pattern Algorithm
IRJET- A Review on Face Recognition using Local Binary Pattern Algorithm
 
Smart Doorbell System Based on Face Recognition
Smart Doorbell System Based on Face RecognitionSmart Doorbell System Based on Face Recognition
Smart Doorbell System Based on Face Recognition
 
IRJET- Student Attendance System by Face Detection
IRJET- Student Attendance System by Face DetectionIRJET- Student Attendance System by Face Detection
IRJET- Student Attendance System by Face Detection
 
Virtual Contact Discovery using Facial Recognition
Virtual Contact Discovery using Facial RecognitionVirtual Contact Discovery using Facial Recognition
Virtual Contact Discovery using Facial Recognition
 
A Real Time Advance Automated Attendance System using Face-Net Algorithm
A Real Time Advance Automated Attendance System using Face-Net AlgorithmA Real Time Advance Automated Attendance System using Face-Net Algorithm
A Real Time Advance Automated Attendance System using Face-Net Algorithm
 
IRJET - Gender and Age Prediction using Wideresnet Architecture
IRJET - Gender and Age Prediction using Wideresnet ArchitectureIRJET - Gender and Age Prediction using Wideresnet Architecture
IRJET - Gender and Age Prediction using Wideresnet Architecture
 
IRJET- Smart Classroom Attendance System: Survey
IRJET- Smart Classroom Attendance System: SurveyIRJET- Smart Classroom Attendance System: Survey
IRJET- Smart Classroom Attendance System: Survey
 
IRJET - Augmented Reality: Social Profile Detection by Face Recognition
IRJET - Augmented Reality: Social Profile Detection by Face RecognitionIRJET - Augmented Reality: Social Profile Detection by Face Recognition
IRJET - Augmented Reality: Social Profile Detection by Face Recognition
 
IRJET- Facial Expression Recognition using GPA Analysis
IRJET-  	  Facial Expression Recognition using GPA AnalysisIRJET-  	  Facial Expression Recognition using GPA Analysis
IRJET- Facial Expression Recognition using GPA Analysis
 
IRJET- Credit Card Authentication using Facial Recognition
IRJET-  	  Credit Card Authentication using Facial RecognitionIRJET-  	  Credit Card Authentication using Facial Recognition
IRJET- Credit Card Authentication using Facial Recognition
 
Face Recognition Technique using ICA and LBPH
Face Recognition Technique using ICA and LBPHFace Recognition Technique using ICA and LBPH
Face Recognition Technique using ICA and LBPH
 
IRJET- Facial Emotion Detection using Convolutional Neural Network
IRJET- Facial Emotion Detection using Convolutional Neural NetworkIRJET- Facial Emotion Detection using Convolutional Neural Network
IRJET- Facial Emotion Detection using Convolutional Neural Network
 
IRJET- A Plant Identification and Recommendation System
IRJET- A Plant Identification and Recommendation SystemIRJET- A Plant Identification and Recommendation System
IRJET- A Plant Identification and Recommendation System
 
IRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using AndroidIRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using Android
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 

Recently uploaded (20)

Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 

IRJET- Digiyathra

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7216 DIGIYATHRA Professor Annamma S Joseph1, Meera Krishna C2, Shahala Basheer3, Shadiya Basheer4, Vishnu Sabu5 1-5 Dept. Electronics and Communication, Mar Athanasius College of Engineering, Kerala ,India ------------------------------------------------------------------------***------------------------------------------------------------------------- Abstract:- The aim of the project is to provide a seamless experience for the air travellers at every touch point of the journey. Walk-through the security scanners swiftly owing to advanced biometric security solutions is the main idea behind this project. With this initiative, the airport entry and boarding pass security check-in would be made digital. During online ticket booking, the passenger will be required to provide a passport picture. This would be added under the database of the specific flight. Thereafter, the passenger can access various services like bag-drop, security check-in and boarding using the biometric. Face recognition will make faster airport entry and automated check-in without requiring any paper based interventions. Apart from this, the process will accelerate throughput of passengers at airports, reduce cost as less manpower deployment will be required for verifying paper-ids and tickets at various points. Hence, it ensures flyers complete the airport process quickly. Key Words: Facial recognition, LBPH recognizer, RFID Baggage tracker, airport security systems, microcontroller 1. INTRODUCTION Facial recognition is the fastest biometric technology that has one and only purpose – to identify human faces. Forget about fingerprints readers and eye scanners, current face recognition systems analyze the characteristics of a person’s face images that were taken with a digital video camera. It’s the least intrusive method that provides no delays and leaves the subjects entirely unaware of the process. A facial recognition system is a technology capable of identifying or verifying a person from a digital image or a video frame from a videosource. There are multiple methods in which facial recognition systems work, but in general, they work by comparing selectedfacial features from given image with faces within adatabase.It is also described as a Biometric Artificial Intelligence based application that can uniquely identify a person by analysing patterns based on the person's facial textures and shape. Here, we include pictures in a database and the input face is compared with all the images in the database. The confirmed picture is selected from the database and the name is given back. Along with this, an added feature of tracking the bags by using a bag-tag tracker system is also implemented. 1.1 Facial recognition Face Detection has been one of the hottest topics of computer vision for the past few years. This technology has been available for some years now and is being used all over the place. From cameras that make sure faces are focused before you take a picture, to Facebook when it tags people automatically once you upload a picture. Or some shows like CSI used them to identify “bad guys” from security footage or even unlocking your phone by looking at it! Lets understand the processes working behind this. As a biometric, facial recognition is a form of computer vision that uses faces to attempt to identify a person or verify a person’s claimed identity. Regardless of specific method used, facial recognition is accomplished in a five step process. First, an image of the face is acquired. This acquisition can be accomplished by digitally scanning an existing photograph or by using an electro-optical camera to acquire a live picture of a subject. As video is a rapid sequence of individual still images, it can also be used as a source of facial images. Second, software is employed to detect the location of any faces in the acquired image. This task is difficult, and often generalized patterns of what a face “looks like” (two eyes and a mouth set in an oval shape) are employed to pick out the faces Once the facial detection software has targeted a face, it can be analyzed. Facial recognition analyzes the spatial geometry of distinguishing features of the face. Different vendors use different methods to extract the identifying features of a face. Thus, specific details on the methods are proprietary. The most popular method is called Principle Components Analysis (PCA), which is commonly referred to as the eigen face method. PCA has also been combined with neural networks and local feature analysis in efforts to enhance its performance. Template generation is the result of the feature extraction process. A template is a reduced set of data that represents the unique features of an enrollee’s face. It is
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7217 important to note that because the systems use spatial geometry of distinguishing facial features, they do not use hairstyle, facial hair, or other similar factors. The fourth step is to compare the template generated in step three with those in a database of known faces. In an identification application, this process yields scores that indicate how closely the generated template matches each of those in the database. In a verification application, the generated template is only compared with one template in the database – that of the claimed identity. The final step is determining whether any scores produced in step four are high enough to declare a match. The rules governing the declaration of a match are often configurable by the end user, so that he or she can determine how the facial recognition system should behave based on security and operational considerations Fig 1:Block diagram of facial recognition 2. FACE RECOGNITION USING LBPH FACE RECOGNIZER Local binary patterns Histogram is a type of visual descriptor used for classification in computer vision. LBP is the particular case of the Texture Spectrum model proposed i n 1990.LBPH was first described in 1994. It has since been found to be a powerful feature for texture classification; it has further been determined that when LBP is combined with the Histogram of oriented gradients (HOG) descriptor, it improves the detection performance considerably on some datasets. Fig 2:Block diagram of digiyathra Now that we know a little more about face recognition and the LBPH, let’s go further and see the steps of the algorithm: 2.1 Parameters The LBPH uses 4 parameters:  Radius: the radius is used to build the circular local binary pattern and represents the radius around the central pixel. It is usually set to 1.  Neighbors: the number of sample points to build the circular local binary pattern. Keep in mind: the more sample points you include, the higher the computational cost. It is usually set to 8.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7218  Grid X: the number of cells in the horizontal direction. The more cells, the finer the grid, the higher the dimensionality of the resulting feature vector. It is usually set to 8.  Grid Y: The number of cells in the vertical direction. The more cells, the finer the grid, the higher the dimensionality of the resulting feature vector. It is usually set to 8. 2.2 Training the Algorithm First, we need to train the algorithm. To do so, we need to use a dataset with the facial images of the people we want to recognize. We need to also set an ID (it may be a number or the name of the person) for each image, so the algorithm will use this information to recognize an input image and give you an output. Images of the same person must have the same ID. With the training set already constructed, let’s see the LBPH computational steps. 2.3 Applying the LBP operation The first computational step of the LBPH is to create an intermediate image that describes the original image in a better way, by highlighting the facial characteristics. To do so, the algorithm uses a concept of a sliding window, based on the parameters radius and neighbors. The image below shows this procedure: Figure 3: Applying LBP Based on the image above, let’s break it into several small steps : Suppose we have a facial image in grayscale.  We can get part of this image as a window of 3x3 pixels.  It can also be represented as a 3x3 matrix containing the intensity of each pixel (0~255).  Then, we need to take the central value of the matrix to be used as the threshold.  This value will be used to define the new values from the 8 neighbors.  For each neighbor of the central value (threshold), we set a new binary value. We set 1 for values equal or higher than the threshold and 0 for values lower than the threshold.  Now, the matrix will contain only binary values (ignoring the central value). We need to concatenate each binary value from each position from the matrix line by line into a new binary value (e.g. 10001101). Then, we convert this binary value to a decimal value and set it to the central value of the matrix, which is actually a pixel from the original image. At the end of this procedure (LBP procedure), we have a new image which represents better the characteristics of the original image. 2.4 Extracting the Histograms Now, using the image generated in the last step, we can use the Grid X and Grid Y parameters to divide the image into multiple grids, as can be seen in the following image: Figure 4: Extracting the histograms
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7219 Based on the image above, we can extract the histogram of each region as follows:  As we have an image in grayscale, each histogram (from each grid) will contain only 256 positions (0~255) representing the occurrences of each pixel intensity.  Then, we need to concatenate each histogram to create a new and bigger histogram. Supposing we have 8x8 grids, we will have 8x8x256=16.384 positions in the final histogram. The final histogram represents the characteristics of the image original image. The LBPH algorithm is pretty much it. 2.5. Performing the face recognition In this step, the algorithm is already trained. Each histogram created is used to represent each image from the training dataset. So, given an input image, we perform the steps again for this new image and creates a histogram which represents the image.  So to find the image that matches the input image we just need to compare two histograms and return the image with the closest histogram.  We can use various approaches to compare the histograms (calculate the distance between two histograms), for example: euclidean distance, chi-square, absolute value, etc. In this example, we can use the Euclidean distance (which is quite known) based on the following formula:  So the algorithm output is the ID from the image with the closest histogram. The algorithm should also return the calculated distance, which can be used as a ‘confidence’ measurement. Note: don’t be fooled about the ‘confidence’ name, as lower confidences are better because it means the distance between the two histograms is closer.  We can then use a threshold and the ‘confidence’ to automatically estimate if the algorithm has correctly recognized the image. We can assume that the algorithm has successfully recognized if the confidence is lower than the threshold defined. 4. CIRCUIT DIAGRAM Fig 4: Circuit diagram
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7220 4.1 PIC CONTROLLER (PIC16F877A) PIC is a family of microcontrollers made by Microchip Technology, derived from the PIC1650 originally developed by General Instrument's Microelectronics Division. The name PIC initially referred to Peripheral Interface Controller, then it was corrected as Programmable Intelligent Computer. The first parts of the family were available in 19576; by 2013 the company had shipped more than twelve billion individual parts, used in a wide variety of embedded systems. This powerful (200 nanosecond instruction execution) yet easy-to-program (only 35 single word instructions) CMOS FLASH-based 8-bit microcontroller packs Microchip's powerful PIC® architecture into an 40- or 44-pin package and is upwards compatible with the PIC16C5X, PIC12CXXX and PIC16C7X devices. The PIC16F877A features 256 bytes of EEPROM data memory, self programming, an ICD, 2 Comparators, 8 channels of 10-bit Analog-to-Digital (A/D) converter, 2 capture/compare/PWM functions, the synchronous serial port can be configured as either 3-wire Serial Peripheral Interface (SPI™) or the 2-wire Inter-Integrated Circuit (I²C™) bus and a Universal Asynchronous Receiver Transmitter (USART). All of these features make it ideal for more advanced level A/D applications in automotive, industrial, appliances and consumer applications. 4.2 MERITS Face recognition technology has always been a concept that lived in fictional worlds, whether it was a tool to solve a crime or open doors.Below are the major advantages. 1. Greater Accuracy:With today’s technology, face ID technology is becoming more and more reliable. The success rate is currently at a high due to the developments of 3D facial recognition technologies and infrared cameras. The combination of these technologies make it very hard to trick the system. With such accuracy, you can have confidence that the premise is more secure and safe for you and your peers.3D mapping, deep learning and other advances make FRT more reliable and harder to trick 2. Better Security: Research shows a 1-in-50,000 chance of a phone with touch ID being unlocked with the wrong fingerprint. With 3D facial modeling, the probability drops to nearly 1-in-1,000,000.A facial biometric security system can drastically improve your security because every individual who enters your premise will be accounted for. Any trespassers will be quickly captured by the recognition system and you would be alerted promptly. With a facial recognition security system, you can potentially reduce costs of hiring a security staff. 3. Convenient and Frictionless: FRT is easy. It can be used passively without a user’s knowledge; or actively, such as having a person “smile for the camera.” 4. Smarter Integration: Face recognition tools are generally easy to integrate with existing security infrastructures, saving time and cost on software redevelopment. 5. Automation: Automated and accurate 24/7 security eliminates the need for security guards to visually monitor entry points, perform security checks and view security cameras. 5. CONCLUSIONS Face recognition technology has come a long way in the last twenty years. Today, machines are able to automatically verify identity information for secure transactions, for surveillance and security tasks, and for access control to buildings etc. These applications usually work in controlled environments and recognition algorithms can take advantage of the environmental constraints to obtain high recognition accuracy. However, next generation face recognition systems are going to have widespread application in smart environments -- wherecomputers and machines are more like helpful assistants. To achieve this goal computers must be able to reliably identify nearby people in a manner that fits naturally within the pattern of normal human interactions. They must not require special interactions and must conform to human intuitions about when recognition is likely. This implies that future smart environments should use the same modalities as humans, and have approximately the same limitations. These goals now appear in reach -- however, substantial research remains to be done in making person recognition technology work reliably, in widely varying conditions using information from single or multiple modalities.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7221 This system was tested under very robust conditions in this experimental study and it is envisaged that real-world performance will be far more accurate REFERENCES [1] Face recognition : a literature review by Ahmed Tolba [2] Facial recognition system: wikipedia [3] https://www.upwork.com/hiring/for-clients/pro s-cons-facial-recognition-technology-business/ [4] https://www.google.co.in/url?sa=t&rct=j&q=&esr c=s&source=web&cd=18&cad=rja&uact=8&ved=2 ahUKEwiH3vqb8K7iAhVCeysKHZxqCUEQFjAReg QICBAB&url=https%3A%2F%2Fwww.techopedia .com%2Fdefinition%2F32071%2Ffacial-recogniti on&usg=AOvVaw0LXnygcdTvC1uzGq5PvDWi