SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2179
Face Detection and Recognition System
Aryan Narayan1, Maaz Modak2, Kunal Lele3, Yoshik Karnawat4
1,2,3,4Student, Dept. of Computer Engineering, MAEER’s MIT Polytechnic Pune, Maharashtra, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - A facial recognition system is one which tracks
and analyzes facial structures. It then compares the distinct
characteristics created by making a model of the face to a
dataset of models and compares particular tracking points to
find a match. This system utilizes a machine learning
algorithm to “learn” the various changes in facial structures,
which may occur due to external factors, such as lighting,
angles, clothing or other factors which may distort it. The
machine learning algorithm allows for these discrepancies to
pass and produce a positive result. The software can
accommodate an additional functionality. The system can be
configured to raise a flag or alert the user when a match isnot
found between the face and any facial model from thedataset.
This is a form of contact-less biometric security, andallowsfor
a high level and efficient way of security. It reduces time taken
to verify a visitor with a fairly accurate scan using the data
points generated by the system. Multiple cameras can also be
implemented to provide as much coverage to generate
multiple angles of the face making the system more efficient
and accurate, while ensuring security.
Key Words: Security, face detection, face recognition,
biometric, alert, machine learning
1. INTRODUCTION
Security is becoming an ever-increasing concern in today’s
world, and the need for quick, accurate and convenient
security is paramount. In a fast-paced society, manually
entering a password or PIN hampers productivity and
wastes time. This project aims to develop a reliable, quick
and efficient face detection and recognition system. The
software utilizes OpenCV and Python, andisaccommodative
of other features that canimprovetheoverall functionalityof
the system. While the current version of the project is
capable of detecting and identifying faces from a video
stream, additional features such as an alert system could be
implemented, which gets triggered when an unrecognized
person is detected. This project has a vast range of
applications due to its discrete and contact-less system. A
person could simply walk past a camera and the system
would verify whether the person is registered with the
database and is not an intruder. This system need not be
implemented for security reasons, it could also serve for
domestic purposes, say, an attendance system in colleges.
1.1 Background
In this project, we have improved upon previous
advancements made in the field of face recognition and
detection technology. While the concept of face recognition
and its use in security is not relatively new, this project aims
to implement both the concepts into a cohesive and efficient
application. The application was created with a vision to
make the process of contact-less, biometric security as
simplified and user-friendly as possible, while also not
compromising on accuracy of intruder detection. We have
even implemented an interface with a simple face training
module, which can be used to train the machine to recognize
changes in facial structure (for example, if a person gets a
scar or grows a beard). These subsequent changes to the
person's face will be added to the dataset, to makethewhole
model an evolving and adaptive one, leading to minimal
error.
1.2 Need of the project
As stated before, the need for quick and reliable security is
quintessential. The low-cost and accurate nature of this
project makes it perfect for implementation in a range of
fields. Institutions and small establishments that cannot
accommodatelarge equipment,orconductmanual recording
of people are need of a compact system that can accurately
distinguish registered people from intruders. Also, places
that observe large crowds(suchasclassroomsoroffices)can
benefit from a contact-less system which does not require
the person to halt at a place to perform some security check.
This system only requires a video camera connected to a
computer, hence making it the most suited choice for such
applications.
2. LITERATURE SURVEY
Paper 1: Background Subtraction Techniques: A
review. [1]
Published by Piccardi, M. (n.d.). in the 2004 IEEE
International Conference on Systems, Man and
Cybernetics (IEEE Cat. No.04CH37583).
doi:10.1109/icsmc.2004.1400815
Background Subtraction is a technique used to differentiate
the foreground from the background of an image or frame of
a video. The paper weighs the benefit to costs of various
methods and algorithms used to conduct background
subtraction. It deftly reviews methods such as the running
Gaussian average and median filter, and rates their
functionality based on certain parameters. The parameters
are formulated keepinginmindreal-lifeusageofthemethods
on computer systems, and are categorized based on speed,
memory requirements and accuracy.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2180
Paper 2: An efficient illumination compensation
scheme for face recognition. [2]
Published by Xudong Xie, & Kin-Man Lam. (n.d.) in
ICARCV 2004 8th Control, Automation, Robotics
and Vision Conference, 2004.
This paper focuses on the critical problem of uneven
illumination of the face, which is a hindrance to facial
recognition systems thatrely onalpha channelstocategorize
facial features. The lack of proper lighting often leads to
capture of data which deviates greatly from that stored in
the dataset, leading to incorrect and inconsistent outputs
from the system. The paper suggests the usage of a local
contrast enhancement methodcalledblock-basedhistogram
equalization (BHE). This method is used to process images
and then compared with the same image processed using
histogram equalization (HE). Experimental results showed
an increase in recognition rate and addressestheproblemof
face reconstruction and recognition under varying
illuminations.
3. PROPOSED METHODOLOGY
3.1 Motion Detection
First step is to detect the human motion at the entrance of
sensitive area. We cannot verify a face if we do not know
what to recognize. Background subtraction (BGS) technique
is adopted to detect the human’s face. The reason this is
important is to distinguish between the background and
foreground. Background subtraction is a commonly used
scheme which takes the difference of the current frame and
the background frame to detect the motion region. The
background image serves as a reference frame and any
significant changes in its composition essentially means a
change in the foreground, hence necessitating the detection
of a face. Moreover, the background needs to be updatedina
real-time environment to adapt the light variations so as to
allow the accurate segmentation of a moving person. This
ultimately makes the security provided by the system more
accurate, and the protection of a sensitive area more reliable
and trust worthy.
3.2 Face Detection
Automatic face detection and recognition using a camera is a
challenging task because of the large differences between
images of the same person due to variation in illumination
variation, pose and expression. It mostly depends on the
position of the camera, and the quality of the video stream it
provides. Most importantly, illumination variation due to
light sourceatabsolutepositionandintensitymaysometimes
give rise to large variability. To cope with this situation, the
image is normalized by employing the lightingcompensation
technique which uses white as a reference to normalize the
colour's appearance.
3.3 Face Recognition
Face recognition is themostimportantmoduleofthesecurity
system. It decides whether the person is authorized to enter
the sensitive area or not. After face localization, pre-
processing is done to extract the region of interest. Here we
crop face part from theimagetostarttherecognitionprocess.
The test images of all the authorized persons are stored in
training database, while the cropped image after face
detection is used to place in testdatabase.WethenuseaHaar
Cascadeclassifier which is trained using facesandothernon-
faces to detect faces in real-time. The classifier uses
categories of features such as line and edge features to
delineatethe various facial features, such as the bridgeof the
nose, edge of the lips/eyes etc.
3.4 Tracking
Once a face has been detected and recognized, its associated
details can be cross-referenced from the dataset. In our
system, we’ve created a basic square box that encompasses
the person’s face being detected. If the face is recognized, the
person’s name is also shown below the box in the output.
This output is completely dynamic and the box moves in
accordance with the face, disappearing if the face moves too
quickly or no face is detected.
Fig -1: System Architecture
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2181
Fig -2: Use Case diagrams illustrating the user and system side of things.
Fig -3: Activity Diagram
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2182
Fig -4: Data Flow Diagram
3. OUTPUTS
Fig -6: Project Interface
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2183
Fig -7: Capture face
Fig -8: Recognize face
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2184
4. CONCLUSIONS
The project created as a result of in-depth understanding of
the various methods employed for face detection and
recognition has culminated to a highly efficient and reliable
system, as envisioned at the start. This systemisveryeasy to
adapt to and modify, hence allowing for otherfunctionalities
to be added on without much effort required.
Acknowledgement
We are extremely thankful to our guide Mrs. Rupali
Chaudhari, whose expertise greatly assisted the research.
REFERENCES
[1] Piccardi, M. (n.d.). Backgroundsubtractiontechniques:a
review. 2004 IEEE International ConferenceonSystems,
Man and Cybernetics (IEEE Cat. No.04CH37583).
doi:10.1109/icsmc.2004.1400815
[2] Xudong Xie, & Kin-Man Lam. (n.d.). An efficient
illumination compensation scheme for face recognition.
ICARCV 2004 8th Control, Automation, Robotics and
Vision Conference, 2004.

More Related Content

What's hot

IRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET Journal
 
An embedded finger vein recognition system
An embedded finger vein recognition systemAn embedded finger vein recognition system
An embedded finger vein recognition systemeSAT Publishing House
 
Face Recognition Home Security System
Face Recognition Home Security SystemFace Recognition Home Security System
Face Recognition Home Security SystemSuman Mia
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterNIDHI SHARMA
 
Face Recognition Home Security System(Slide)
Face Recognition Home Security System(Slide)Face Recognition Home Security System(Slide)
Face Recognition Home Security System(Slide)Suman Mia
 
Seminar Report face recognition_technology
Seminar Report face recognition_technologySeminar Report face recognition_technology
Seminar Report face recognition_technologyVivek Soni
 
Face Recognition Based Automated Student Attendance System
Face Recognition Based Automated Student Attendance SystemFace Recognition Based Automated Student Attendance System
Face Recognition Based Automated Student Attendance Systemijtsrd
 
Improved authentication using arduino based voice
Improved authentication using arduino based voiceImproved authentication using arduino based voice
Improved authentication using arduino based voiceeSAT Publishing House
 
IRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image ProcessingIRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image ProcessingIRJET Journal
 
IRJET- Skin Disease Detection using Neural Network
IRJET- Skin Disease Detection using Neural NetworkIRJET- Skin Disease Detection using Neural Network
IRJET- Skin Disease Detection using Neural NetworkIRJET Journal
 
3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security Applications3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security ApplicationsIRJET Journal
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methodsIRJET Journal
 
IRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost MobileIRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost MobileIRJET Journal
 
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET Journal
 
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET Journal
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShravan Halankar
 
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET Journal
 
Face Recognition report
Face Recognition reportFace Recognition report
Face Recognition reportlavanya693
 

What's hot (19)

IRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless Biometric
 
An embedded finger vein recognition system
An embedded finger vein recognition systemAn embedded finger vein recognition system
An embedded finger vein recognition system
 
Face Recognition Home Security System
Face Recognition Home Security SystemFace Recognition Home Security System
Face Recognition Home Security System
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median Filter
 
Face Recognition Home Security System(Slide)
Face Recognition Home Security System(Slide)Face Recognition Home Security System(Slide)
Face Recognition Home Security System(Slide)
 
Seminar Report face recognition_technology
Seminar Report face recognition_technologySeminar Report face recognition_technology
Seminar Report face recognition_technology
 
Face Recognition Based Automated Student Attendance System
Face Recognition Based Automated Student Attendance SystemFace Recognition Based Automated Student Attendance System
Face Recognition Based Automated Student Attendance System
 
Improved authentication using arduino based voice
Improved authentication using arduino based voiceImproved authentication using arduino based voice
Improved authentication using arduino based voice
 
IRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image ProcessingIRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image Processing
 
IRJET- Skin Disease Detection using Neural Network
IRJET- Skin Disease Detection using Neural NetworkIRJET- Skin Disease Detection using Neural Network
IRJET- Skin Disease Detection using Neural Network
 
Implementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting SystemImplementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting System
 
3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security Applications3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security Applications
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methods
 
IRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost MobileIRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost Mobile
 
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine Learning
 
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
 
Face Recognition report
Face Recognition reportFace Recognition report
Face Recognition report
 

Similar to Face Detection and Recognition System

Face Recognition System using OpenCV
Face Recognition System using OpenCVFace Recognition System using OpenCV
Face Recognition System using OpenCVIRJET Journal
 
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITIONA VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITIONIRJET Journal
 
FACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEMFACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEMIRJET Journal
 
FACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEMFACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEMIRJET Journal
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face RecognitionIRJET Journal
 
Automated attendance system using Face recognition
Automated attendance system using Face recognitionAutomated attendance system using Face recognition
Automated attendance system using Face recognitionIRJET Journal
 
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...IRJET Journal
 
FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...
FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...
FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...IRJET Journal
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face RecognitionIRJET Journal
 
IRJET- VISITX: Face Recognition Visitor Management System
IRJET-  	  VISITX: Face Recognition Visitor Management SystemIRJET-  	  VISITX: Face Recognition Visitor Management System
IRJET- VISITX: Face Recognition Visitor Management SystemIRJET Journal
 
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONESAN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONESAM Publications
 
IRJET - Face Detection based ATM Safety System for Secured Transaction
IRJET - Face Detection based ATM Safety System for Secured TransactionIRJET - Face Detection based ATM Safety System for Secured Transaction
IRJET - Face Detection based ATM Safety System for Secured TransactionIRJET Journal
 
IRJET - Biometric Identification using Gait Analyis by Deep Learning
IRJET -  	  Biometric Identification using Gait Analyis by Deep LearningIRJET -  	  Biometric Identification using Gait Analyis by Deep Learning
IRJET - Biometric Identification using Gait Analyis by Deep LearningIRJET Journal
 
Deep Learning Assisted Tool for Face Mask Detection
Deep Learning Assisted Tool for Face Mask DetectionDeep Learning Assisted Tool for Face Mask Detection
Deep Learning Assisted Tool for Face Mask DetectionIRJET Journal
 
IRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET Journal
 
IRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET Journal
 
IRJET - Design and Development of Android Application for Face Detection and ...
IRJET - Design and Development of Android Application for Face Detection and ...IRJET - Design and Development of Android Application for Face Detection and ...
IRJET - Design and Development of Android Application for Face Detection and ...IRJET Journal
 
MTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITION
MTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITIONMTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITION
MTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITIONIRJET Journal
 
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET-  	  Secure Online Payment with Facial Recognition using CNNIRJET-  	  Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNNIRJET Journal
 
PERSONAL PROTECTIVE EQUIPMENT DETECTION AND MACHINE POWER CONTROL USING IMAGE...
PERSONAL PROTECTIVE EQUIPMENT DETECTION AND MACHINE POWER CONTROL USING IMAGE...PERSONAL PROTECTIVE EQUIPMENT DETECTION AND MACHINE POWER CONTROL USING IMAGE...
PERSONAL PROTECTIVE EQUIPMENT DETECTION AND MACHINE POWER CONTROL USING IMAGE...IRJET Journal
 

Similar to Face Detection and Recognition System (20)

Face Recognition System using OpenCV
Face Recognition System using OpenCVFace Recognition System using OpenCV
Face Recognition System using OpenCV
 
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITIONA VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
 
FACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEMFACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEM
 
FACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEMFACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEM
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face Recognition
 
Automated attendance system using Face recognition
Automated attendance system using Face recognitionAutomated attendance system using Face recognition
Automated attendance system using Face recognition
 
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
 
FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...
FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...
FACE MASK DETECTION AND COUNTER IN THINGSPEAK WITH EMAIL ALERT SYSTEM FOR COV...
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face Recognition
 
IRJET- VISITX: Face Recognition Visitor Management System
IRJET-  	  VISITX: Face Recognition Visitor Management SystemIRJET-  	  VISITX: Face Recognition Visitor Management System
IRJET- VISITX: Face Recognition Visitor Management System
 
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONESAN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
 
IRJET - Face Detection based ATM Safety System for Secured Transaction
IRJET - Face Detection based ATM Safety System for Secured TransactionIRJET - Face Detection based ATM Safety System for Secured Transaction
IRJET - Face Detection based ATM Safety System for Secured Transaction
 
IRJET - Biometric Identification using Gait Analyis by Deep Learning
IRJET -  	  Biometric Identification using Gait Analyis by Deep LearningIRJET -  	  Biometric Identification using Gait Analyis by Deep Learning
IRJET - Biometric Identification using Gait Analyis by Deep Learning
 
Deep Learning Assisted Tool for Face Mask Detection
Deep Learning Assisted Tool for Face Mask DetectionDeep Learning Assisted Tool for Face Mask Detection
Deep Learning Assisted Tool for Face Mask Detection
 
IRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face Recognition
 
IRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face Recognition
 
IRJET - Design and Development of Android Application for Face Detection and ...
IRJET - Design and Development of Android Application for Face Detection and ...IRJET - Design and Development of Android Application for Face Detection and ...
IRJET - Design and Development of Android Application for Face Detection and ...
 
MTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITION
MTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITIONMTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITION
MTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITION
 
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET-  	  Secure Online Payment with Facial Recognition using CNNIRJET-  	  Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
 
PERSONAL PROTECTIVE EQUIPMENT DETECTION AND MACHINE POWER CONTROL USING IMAGE...
PERSONAL PROTECTIVE EQUIPMENT DETECTION AND MACHINE POWER CONTROL USING IMAGE...PERSONAL PROTECTIVE EQUIPMENT DETECTION AND MACHINE POWER CONTROL USING IMAGE...
PERSONAL PROTECTIVE EQUIPMENT DETECTION AND MACHINE POWER CONTROL USING IMAGE...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

Face Detection and Recognition System

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2179 Face Detection and Recognition System Aryan Narayan1, Maaz Modak2, Kunal Lele3, Yoshik Karnawat4 1,2,3,4Student, Dept. of Computer Engineering, MAEER’s MIT Polytechnic Pune, Maharashtra, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - A facial recognition system is one which tracks and analyzes facial structures. It then compares the distinct characteristics created by making a model of the face to a dataset of models and compares particular tracking points to find a match. This system utilizes a machine learning algorithm to “learn” the various changes in facial structures, which may occur due to external factors, such as lighting, angles, clothing or other factors which may distort it. The machine learning algorithm allows for these discrepancies to pass and produce a positive result. The software can accommodate an additional functionality. The system can be configured to raise a flag or alert the user when a match isnot found between the face and any facial model from thedataset. This is a form of contact-less biometric security, andallowsfor a high level and efficient way of security. It reduces time taken to verify a visitor with a fairly accurate scan using the data points generated by the system. Multiple cameras can also be implemented to provide as much coverage to generate multiple angles of the face making the system more efficient and accurate, while ensuring security. Key Words: Security, face detection, face recognition, biometric, alert, machine learning 1. INTRODUCTION Security is becoming an ever-increasing concern in today’s world, and the need for quick, accurate and convenient security is paramount. In a fast-paced society, manually entering a password or PIN hampers productivity and wastes time. This project aims to develop a reliable, quick and efficient face detection and recognition system. The software utilizes OpenCV and Python, andisaccommodative of other features that canimprovetheoverall functionalityof the system. While the current version of the project is capable of detecting and identifying faces from a video stream, additional features such as an alert system could be implemented, which gets triggered when an unrecognized person is detected. This project has a vast range of applications due to its discrete and contact-less system. A person could simply walk past a camera and the system would verify whether the person is registered with the database and is not an intruder. This system need not be implemented for security reasons, it could also serve for domestic purposes, say, an attendance system in colleges. 1.1 Background In this project, we have improved upon previous advancements made in the field of face recognition and detection technology. While the concept of face recognition and its use in security is not relatively new, this project aims to implement both the concepts into a cohesive and efficient application. The application was created with a vision to make the process of contact-less, biometric security as simplified and user-friendly as possible, while also not compromising on accuracy of intruder detection. We have even implemented an interface with a simple face training module, which can be used to train the machine to recognize changes in facial structure (for example, if a person gets a scar or grows a beard). These subsequent changes to the person's face will be added to the dataset, to makethewhole model an evolving and adaptive one, leading to minimal error. 1.2 Need of the project As stated before, the need for quick and reliable security is quintessential. The low-cost and accurate nature of this project makes it perfect for implementation in a range of fields. Institutions and small establishments that cannot accommodatelarge equipment,orconductmanual recording of people are need of a compact system that can accurately distinguish registered people from intruders. Also, places that observe large crowds(suchasclassroomsoroffices)can benefit from a contact-less system which does not require the person to halt at a place to perform some security check. This system only requires a video camera connected to a computer, hence making it the most suited choice for such applications. 2. LITERATURE SURVEY Paper 1: Background Subtraction Techniques: A review. [1] Published by Piccardi, M. (n.d.). in the 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583). doi:10.1109/icsmc.2004.1400815 Background Subtraction is a technique used to differentiate the foreground from the background of an image or frame of a video. The paper weighs the benefit to costs of various methods and algorithms used to conduct background subtraction. It deftly reviews methods such as the running Gaussian average and median filter, and rates their functionality based on certain parameters. The parameters are formulated keepinginmindreal-lifeusageofthemethods on computer systems, and are categorized based on speed, memory requirements and accuracy.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2180 Paper 2: An efficient illumination compensation scheme for face recognition. [2] Published by Xudong Xie, & Kin-Man Lam. (n.d.) in ICARCV 2004 8th Control, Automation, Robotics and Vision Conference, 2004. This paper focuses on the critical problem of uneven illumination of the face, which is a hindrance to facial recognition systems thatrely onalpha channelstocategorize facial features. The lack of proper lighting often leads to capture of data which deviates greatly from that stored in the dataset, leading to incorrect and inconsistent outputs from the system. The paper suggests the usage of a local contrast enhancement methodcalledblock-basedhistogram equalization (BHE). This method is used to process images and then compared with the same image processed using histogram equalization (HE). Experimental results showed an increase in recognition rate and addressestheproblemof face reconstruction and recognition under varying illuminations. 3. PROPOSED METHODOLOGY 3.1 Motion Detection First step is to detect the human motion at the entrance of sensitive area. We cannot verify a face if we do not know what to recognize. Background subtraction (BGS) technique is adopted to detect the human’s face. The reason this is important is to distinguish between the background and foreground. Background subtraction is a commonly used scheme which takes the difference of the current frame and the background frame to detect the motion region. The background image serves as a reference frame and any significant changes in its composition essentially means a change in the foreground, hence necessitating the detection of a face. Moreover, the background needs to be updatedina real-time environment to adapt the light variations so as to allow the accurate segmentation of a moving person. This ultimately makes the security provided by the system more accurate, and the protection of a sensitive area more reliable and trust worthy. 3.2 Face Detection Automatic face detection and recognition using a camera is a challenging task because of the large differences between images of the same person due to variation in illumination variation, pose and expression. It mostly depends on the position of the camera, and the quality of the video stream it provides. Most importantly, illumination variation due to light sourceatabsolutepositionandintensitymaysometimes give rise to large variability. To cope with this situation, the image is normalized by employing the lightingcompensation technique which uses white as a reference to normalize the colour's appearance. 3.3 Face Recognition Face recognition is themostimportantmoduleofthesecurity system. It decides whether the person is authorized to enter the sensitive area or not. After face localization, pre- processing is done to extract the region of interest. Here we crop face part from theimagetostarttherecognitionprocess. The test images of all the authorized persons are stored in training database, while the cropped image after face detection is used to place in testdatabase.WethenuseaHaar Cascadeclassifier which is trained using facesandothernon- faces to detect faces in real-time. The classifier uses categories of features such as line and edge features to delineatethe various facial features, such as the bridgeof the nose, edge of the lips/eyes etc. 3.4 Tracking Once a face has been detected and recognized, its associated details can be cross-referenced from the dataset. In our system, we’ve created a basic square box that encompasses the person’s face being detected. If the face is recognized, the person’s name is also shown below the box in the output. This output is completely dynamic and the box moves in accordance with the face, disappearing if the face moves too quickly or no face is detected. Fig -1: System Architecture
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2181 Fig -2: Use Case diagrams illustrating the user and system side of things. Fig -3: Activity Diagram
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2182 Fig -4: Data Flow Diagram 3. OUTPUTS Fig -6: Project Interface
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2183 Fig -7: Capture face Fig -8: Recognize face
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2184 4. CONCLUSIONS The project created as a result of in-depth understanding of the various methods employed for face detection and recognition has culminated to a highly efficient and reliable system, as envisioned at the start. This systemisveryeasy to adapt to and modify, hence allowing for otherfunctionalities to be added on without much effort required. Acknowledgement We are extremely thankful to our guide Mrs. Rupali Chaudhari, whose expertise greatly assisted the research. REFERENCES [1] Piccardi, M. (n.d.). Backgroundsubtractiontechniques:a review. 2004 IEEE International ConferenceonSystems, Man and Cybernetics (IEEE Cat. No.04CH37583). doi:10.1109/icsmc.2004.1400815 [2] Xudong Xie, & Kin-Man Lam. (n.d.). An efficient illumination compensation scheme for face recognition. ICARCV 2004 8th Control, Automation, Robotics and Vision Conference, 2004.