SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3239
Library Management System with Facial Biometric Authentication
Kalavakonda Vijaya, P. Revathi, M. Sarveena and K.Thoshini
Department of Information Technology, R.M.K. Engineering College
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract— In this paper we propose a system that
uses the biometric authentication for the users of the
Library. It is expected to reduce the time taken to gain
access into the Library. The system will help in
automating the user ledger by automaticallyrecording
the in and out time of the users. Thesystemwillenable
the user to pick up the book and leave the library
without having to wait in the queue for making the
entry in the system.
Keywords—Featureextraction,ImageProcessingand
Library Management
Introduction
Biometric authentication system is considered to
provide better security when compared to other
categories of authentication systems. Biometricaccess
control uses a method to identify unique human
characteristics as a means of authenticating individual
users. Biometric authentication systems can be
implemented in two phases where the first one is to
record the biometrics of the users who can gainaccess.
During this phase the keyfeaturesthatcouldbeusedto
identify the user will be extracted and stored as the
template of the user. Second phase is the actual
authentication phase during which the system will
compare the biometric features of the user trying to
gain access with that of the stored data. If there is a
match it will allow the user to gain access otherwise it
will alert about the unauthorised person trying to gain
access.
Some of the biometrics that could be used for
authenticating the user are iris, fingerprint,face,voice,
DNA, retina, hand geometry. Of all the biometrics face
has started gaining popularity as facial recognition is
considered to be relatively inexpensive. Facial
recognition is popularly used in various fields like
healthcare, access control, security and criminal
identification. Facial recognition can be performed
either in 2D or 3D manner, each of which have their
own advantages and disadvantages.
Generally a facial recognition system has a camera
capture the image extract the distinctive features like
the position, shape, size of eyes, lips, nose etc.
Computer vision for faces can approximate the human
approach of identifying the individual users. Face
detection identifies the facial region in the input image
(locating the face part in image). Face recognition
refers to identifying the user corresponding to the
image. Face detection can be primarily based on two
approaches namely local and global approaches. Local
approach uses facial features such as nose, eye and
mouth to associate a face with the person. Face
recognition can be done previously using geometric
models. Several face recognition algorithms have been
developed and used, each has its own advantages and
efficiency rates. There are several approaches for face
recognition namely fisher faces approach, eigen faces
approach and there exists several variations in the
methods and algorithms for face recognition.
Here we are proposing a face recognition system built
using opencv tool(open source computer vision) for
biometric authentication.opencv is an open source
computer vision and machine learning library. It
consists of nearly 2500 optimized algorithms.These
algorithms are used for detecting and recognizing the
faces and also used to identify objects and tracking
moving objects. This system includes two phases
namely dataset generation phase(enrollingtheimages
of valid users in the database) and its second phase
includes the process of identifying whether the user is
authenticatedtoaccessthelibraryornot.Inverification
phase the input images are compared with the set of
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3240
images stored in dataset.Reports about the usage of
library resources by the users can be generated. .This
system aims to avoid the need for recording the in/out
time of the users manually and also reducesthechance
of misuse of a person's identity.
Literature Review
Anil Jain et. al.[1], in their paper have discussed in
detail about the various biometrics that could be used
for implementing authentication systems. They have
made a comparative studyabout the variousbiometric
systems by considering seven factors. They have also
discussed about the advantages and disadvantages of
the unimodal and multimodal biometric systems.
Khem Puthea et. al.[2], have reviewed the works done
for marking attendance using the facial recognition.
Their review reveals that Principal Component
Analysis (PCA) could be used to reduce the
dimensionality of the features that are extracted from
the face images.
Hemant Makawana and Taranpreet Singh have
discussed aboutalgorithmsthatcouldbeusedforfacial
recognition. Accordingtothemthealgorithmscouldbe
categorised as Geometry based and appearance based.
In their paper they have discussed about the
appearance based techniques that too global feature
based. They have concluded that PCA occupies more
space whencompared to Linear Discriminant Analysis
(LDA). According to their results, false rejection ratio
for LDA increases as the number of samples increases.
The false rejection ratio for PCA decreases as the
number of samples is increased. However the number
of samples considered b y them is too low to arrive at
any concrete decision.
Kavitha and Manjeet Kaur done a survey about the
facialrecognitionalgorithms. Theyhavediscussedthat
generally facial recognition systems could either be
template based or geometric based. Their review
indicate that many researchers has worked in this
domain. Based on their review it could be inferred that
many researchers have worked using template based
approaches whencompared to thatofgeometricbased
approach. Theyhavelistedsomeoftheissuesthatneed
to be addressed while developing a facial biometric
system. The issues are expression change, change in
pose, variation in lighting, angle of image capture,
presence or absence of accessories andextensionsand
size of image.
Rakesh Saini et.al.,intheirpaper,havedoneananalysis
of five algorithms that could be used facial recognition.
In their work they have made a comparative analysis
on memory usage and rate of recognition for five
algorithms, along with their merits and demerits.
Based on their data it could be concluded that PCA in
combinationofLDAorArtificialNeuralNetwork(ANN)
is better when compared to using PCA alone.
Shakir F. Kak et. al., in their paper, have discussed
about the fields in which facial recognition playsavital
role. They have highlighted that the facial feature
extraction methods could be broadly classified as
Model-based, Appearance-based and hybrid of model
and appearance. According to their study many
researchers have tried varied techniques using
appearance-based facial recognition, whereas few
works have been carried out using the model-based
techniques. They have stated that model-based
techniques can overcome the problem of variation in
lighting, sizeandalignment.Theyalsostatethatmodel-
based techniques are faster in matching and represent
the images in compact manner, however relatively
slow in detecting a face. They also concluded that
better models need to be proposed so that the
problems of expression, occlusion, pose variation and
illumination issues could be addressed.
Sushma Jaiswal et. al., they have compared features of
these algorithms and mentioned their
advantages,disadvantages.They have suggested that
eigen face approach is easy to implement and its main
idea is to get the features in mathematical sense
instead of physical face feature by using mathematical
transform for recognition.It primarily involves two
phases phases. And added that fisher face approach is
better than eigenface approach with improved
classification of different classes of images.Theystated
that elastic bunch graph matching makes use of gabor
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3241
feature, which is sensitive to lighting variation and
allows for position and facial expression variation.
III.PROPOSED WORK
The proposed system for face recognition includes the
following stages :
1.Image Acquisition
2. Pre-processing
3.Feature Extraction
4.Comparison and verification.
This system includes two phases namely data
generation phase and recognition phase. Data
generation phase means enrolling the images of the
valid users in the database.
1.Image Acquisition:
First step of face recognition is to capture the face
image of users by using camera having appropriate
resolution (4MP camera) and it should be placed at a
distance sufficient to capture the images o the users
properly.And these images are used to create dataset
for training the images. system. The collected face
images should have the pose, expression variation in
order to check the performance of the face recognition
system under these conditions.
2.Pre-processing:
Pre-processing involves rgb tograyscaleconversionof
the images, Histogram equalization also done in this
stage.It can be performed to adjust the brightness
levels of the images.Pre-processing reduces the time
taken to process the images.
Dimensionality reduction can be achieved by PCA
algorithm.LDA also be used for feature extraction in
some applications.
3.Feature Extraction:
Extracting the characteristic features of the images
which are used to identify the faces uniquely.These
features extracted are based on the nodal points
located on the face.It includes eye socket depth,nose
width,jaw lines,cheek bones(around 80 points are
locatedinhumanfaceimage).Theextractednodalpoint
data are stored as numeric codes(face print)fortheset
of images,for each set of images unique id will be
assigned.Face prints are used for comparison of the
images. For more efficiency surface deviation features
are also compared ,if required.
The above mentioned three stages are common for
both data generation phase and recognition phase.
4.Comparison and verification:
This stage involves comparison of input images with
set of images stored in the database(images in
dataset).Template matching module is used for
comparing these images.Face images of the individual
users are assigned with unique id.
The architecture for the proposed system is asfollows:
LBPH:
LBPH(Local BinaryPattern Histogram) is a popular
face recognition algorithm. It is a simple yet very
efficient texture operator which labels the pixels of an
image by the use of threshold values, the
neighbourhood of each pixel and considers the result
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3242
as a binary number .It uses four parameters namely
:radius, neighbours,grid x, grid y for performing the
face recognition task.The computational part of this
algorithm is to get a part of the image that describes
the original image by locating the facial
characteristics.The obtained image is divided into
multiple and then histogram for the images are
extracted.
2.SIFT:
Scale-Invariant Feature Transformation is a feature
detection algorithm used to detect and describe local
features in images. SIFT keypoints of objects are first
extracted from a set of images andstoredinadatabase.
An object is recognized in a new image by individually
comparing each feature from the new image to this
database and finding candidate matching features
based on Euclidean distance of their feature vectors.
3. LDA:
Linear discriminant analysis is used in pattern
recognitionandstatisticstofindthelinearcombination
of features that characterizes orseparatestwoormore
classes of objects.The resulting combination may be
used for dimensionality reduction. LDA is also quite
related to principal component analysis , in that they
both look for linear combinations of variables which
describes the data . LDA explicitly attempts to model
the difference between the classes of data. LDA works
when the measurements made on independent
variables for each observation are continuous
quantities.
4.PCA:
Principal component analysis is used for
dimensionality reduction . It transforms the original
coordinates of a dataset into a set of principal
components.First component in the set of principal
components has the largest possible varianceandeach
succeeding component has the highest possible
variance with a condition that it is orthogonal to the
components preceding to it .Considering only the first
m components(m<n) from the original set of images
reduces the dimensionality of the data.PCA stillretains
most of the information aboutvarianceofthedata.And
it is known that PCA doesn'tprovideinterpretabilityof
the dataset.
IV.Conclusion
This system offers better results in providing
authenticated entry to the users of a library .It shows
better recognition rates for various posing angles.And
provides efficient false acceptace and false rejection
rates.It automates the process of recording the time of
users.However the system works under certain
constraints such as lighting conditions and posing
angles.
References
1."An Introduction to biometric Recognition" Anil.K
Jain,Arun Ross and Salil Prabakar. IEEE Transactions
on circuit and systems for video Technology, Vol. 14,
No. 1, January 2004.
2.“A Review Paper on Attendance Marking System
based On Face " Khem Puthea. 5th International
Conference on Image Processing, Communication,
Engineering and Technology (IPCET-17) Oct. 2017.
3."Comparison of different algorithms for face
recognition" Hemant makawana and taranpreet singh
GlobalJournalofComputerScienceandTechnology
Graphics & Vision Volume 13 Issue 9 Version 1 Year
2013.
4."A survey paper for face recognition technologies"
Kavita ,Manjeet Kaur.Iternational journal of scientific
and research publications,Volume6,issue7,july2016.
5."Analysis of different face recognition algorithms"
Rakesh Saini ,Abhishek saini and Deepak Agarwal.
International Journal of Engineering Research &
Technology (IJERT) Vol. 3 Issue 11, November-2014
6."A Review on Person Recognition based on Face
model" Shakir F. Kak, Firas Mahmood Mustafa , Pedro
Valente
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3243
4th International Engineering Conference on
Developments in Civil & Computer Engineering
Applications 2018
7.“Comparison between face recognition algortithm-
Eigen faces,fisher faces and elastic bunch graph
matching." by Sushma Jaiswal , singh Bahadauria and
Dr.K.Rakesh singh jadon
8."Face recognition using fisherface method".
Mustamin Anggo and La Arapu. 2nd International
Conference on Statistics, Mathematics, Teaching, and
Research IOP Publishing.
9."Automated attendance Management system using
Face recognition". Akshara Jadhav, Akshay Jadhav
Tushar Ladhe, Krishna Yeolekar .International
Research Journal of Engineering and Technology
(IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue:01|Jan-
2017

More Related Content

What's hot

Face Recognition Based Automated Student Attendance System
Face Recognition Based Automated Student Attendance SystemFace Recognition Based Automated Student Attendance System
Face Recognition Based Automated Student Attendance Systemijtsrd
 
Internation Journal Conference
Internation Journal ConferenceInternation Journal Conference
Internation Journal ConferenceHemanth Kumar
 
(2005) Implementation of Hand Geometry at Purdue University's Recreational Ce...
(2005) Implementation of Hand Geometry at Purdue University's Recreational Ce...(2005) Implementation of Hand Geometry at Purdue University's Recreational Ce...
(2005) Implementation of Hand Geometry at Purdue University's Recreational Ce...International Center for Biometric Research
 
Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...
Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...
Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...ijtsrd
 
Face Recognition Based Attendance System using Machine Learning
Face Recognition Based Attendance System using Machine LearningFace Recognition Based Attendance System using Machine Learning
Face Recognition Based Attendance System using Machine LearningYogeshIJTSRD
 
IJSRED-V2I1P12
IJSRED-V2I1P12IJSRED-V2I1P12
IJSRED-V2I1P12IJSRED
 
IRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET Journal
 
Facial Recognition and Detection Technical Review
Facial Recognition and Detection Technical ReviewFacial Recognition and Detection Technical Review
Facial Recognition and Detection Technical ReviewTkeyah Anderson
 
Automated attendance system using Face recognition
Automated attendance system using Face recognitionAutomated attendance system using Face recognition
Automated attendance system using Face recognitionIRJET Journal
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...ijceronline
 
A Hybrid Approach to Face Detection And Feature Extraction
A Hybrid Approach to Face Detection And Feature ExtractionA Hybrid Approach to Face Detection And Feature Extraction
A Hybrid Approach to Face Detection And Feature Extractioniosrjce
 
ADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCA
ADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCAADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCA
ADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCAIAEME Publication
 
IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...
IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...
IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...IRJET Journal
 
Facial Expression Identification System
Facial Expression Identification SystemFacial Expression Identification System
Facial Expression Identification SystemIRJET Journal
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterNIDHI SHARMA
 
IRJET- Automated Attendance System using Face Recognition
IRJET-  	  Automated Attendance System using Face RecognitionIRJET-  	  Automated Attendance System using Face Recognition
IRJET- Automated Attendance System using Face RecognitionIRJET Journal
 
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...aciijournal
 

What's hot (18)

Face Recognition Based Automated Student Attendance System
Face Recognition Based Automated Student Attendance SystemFace Recognition Based Automated Student Attendance System
Face Recognition Based Automated Student Attendance System
 
Internation Journal Conference
Internation Journal ConferenceInternation Journal Conference
Internation Journal Conference
 
(2005) Implementation of Hand Geometry at Purdue University's Recreational Ce...
(2005) Implementation of Hand Geometry at Purdue University's Recreational Ce...(2005) Implementation of Hand Geometry at Purdue University's Recreational Ce...
(2005) Implementation of Hand Geometry at Purdue University's Recreational Ce...
 
Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...
Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...
Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...
 
Face Recognition Based Attendance System using Machine Learning
Face Recognition Based Attendance System using Machine LearningFace Recognition Based Attendance System using Machine Learning
Face Recognition Based Attendance System using Machine Learning
 
IJSRED-V2I1P12
IJSRED-V2I1P12IJSRED-V2I1P12
IJSRED-V2I1P12
 
IRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face Recognition
 
Facial Recognition and Detection Technical Review
Facial Recognition and Detection Technical ReviewFacial Recognition and Detection Technical Review
Facial Recognition and Detection Technical Review
 
Automated attendance system using Face recognition
Automated attendance system using Face recognitionAutomated attendance system using Face recognition
Automated attendance system using Face recognition
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
 
A Hybrid Approach to Face Detection And Feature Extraction
A Hybrid Approach to Face Detection And Feature ExtractionA Hybrid Approach to Face Detection And Feature Extraction
A Hybrid Approach to Face Detection And Feature Extraction
 
ADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCA
ADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCAADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCA
ADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCA
 
IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...
IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...
IRJET- A Comprehensive Survey and Detailed Study on Various Face Recognition ...
 
Facial Expression Identification System
Facial Expression Identification SystemFacial Expression Identification System
Facial Expression Identification System
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median Filter
 
IRJET- Automated Attendance System using Face Recognition
IRJET-  	  Automated Attendance System using Face RecognitionIRJET-  	  Automated Attendance System using Face Recognition
IRJET- Automated Attendance System using Face Recognition
 
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
A Novel Biometric Approach for Authentication In Pervasive Computing Environm...
 
Overview of the Biometrics Lab at Purdue
Overview of the Biometrics Lab at PurdueOverview of the Biometrics Lab at Purdue
Overview of the Biometrics Lab at Purdue
 

Similar to IRJET- Library Management System with Facial Biometric Authentication

ATTENDANCE BY FACE RECOGNITION USING AI
ATTENDANCE BY FACE RECOGNITION USING AIATTENDANCE BY FACE RECOGNITION USING AI
ATTENDANCE BY FACE RECOGNITION USING AIIRJET Journal
 
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITIONA VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITIONIRJET Journal
 
IRJET- Implementation of Attendance System using Face Recognition
IRJET- Implementation of Attendance System using Face RecognitionIRJET- Implementation of Attendance System using Face Recognition
IRJET- Implementation of Attendance System using Face RecognitionIRJET Journal
 
FACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEMFACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEMIRJET Journal
 
FACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEMFACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEMIRJET Journal
 
IRJET- Student Attendance System by Face Detection
IRJET- Student Attendance System by Face DetectionIRJET- Student Attendance System by Face Detection
IRJET- Student Attendance System by Face DetectionIRJET Journal
 
Progression in Large Age-Gap Face Verification
Progression in Large Age-Gap Face VerificationProgression in Large Age-Gap Face Verification
Progression in Large Age-Gap Face VerificationIRJET Journal
 
Face and facial expressions recognition for blind people
Face and facial expressions recognition for blind peopleFace and facial expressions recognition for blind people
Face and facial expressions recognition for blind peopleIRJET Journal
 
IRJET - Design and Development of Android Application for Face Detection and ...
IRJET - Design and Development of Android Application for Face Detection and ...IRJET - Design and Development of Android Application for Face Detection and ...
IRJET - Design and Development of Android Application for Face Detection and ...IRJET Journal
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face RecognitionIRJET Journal
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face IdentificationIRJET Journal
 
MTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITION
MTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITIONMTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITION
MTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITIONIRJET Journal
 
AI-based Mechanism to Authorise Beneficiaries at Covid Vaccination Camps usin...
AI-based Mechanism to Authorise Beneficiaries at Covid Vaccination Camps usin...AI-based Mechanism to Authorise Beneficiaries at Covid Vaccination Camps usin...
AI-based Mechanism to Authorise Beneficiaries at Covid Vaccination Camps usin...IRJET Journal
 
IRJET- Persons Identification Tool for Visually Impaired - Digital Eye
IRJET-  	  Persons Identification Tool for Visually Impaired - Digital EyeIRJET-  	  Persons Identification Tool for Visually Impaired - Digital Eye
IRJET- Persons Identification Tool for Visually Impaired - Digital EyeIRJET Journal
 
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET Journal
 
IRJET- Biometric Attendance Management System using Raspberry Pi
IRJET- Biometric Attendance Management System using Raspberry PiIRJET- Biometric Attendance Management System using Raspberry Pi
IRJET- Biometric Attendance Management System using Raspberry PiIRJET Journal
 
IRJET - Facial Recognition based Attendance Management System
IRJET - Facial Recognition based Attendance Management SystemIRJET - Facial Recognition based Attendance Management System
IRJET - Facial Recognition based Attendance Management SystemIRJET Journal
 
Survey of ‘Nivritti’: survey of face recognition technologies/methods
Survey of ‘Nivritti’: survey of face recognition technologies/methodsSurvey of ‘Nivritti’: survey of face recognition technologies/methods
Survey of ‘Nivritti’: survey of face recognition technologies/methodsIRJET Journal
 
Assessment and Improvement of Image Quality using Biometric Techniques for Fa...
Assessment and Improvement of Image Quality using Biometric Techniques for Fa...Assessment and Improvement of Image Quality using Biometric Techniques for Fa...
Assessment and Improvement of Image Quality using Biometric Techniques for Fa...ijceronline
 
Biometric Ear Recognition System
Biometric Ear Recognition SystemBiometric Ear Recognition System
Biometric Ear Recognition SystemIRJET Journal
 

Similar to IRJET- Library Management System with Facial Biometric Authentication (20)

ATTENDANCE BY FACE RECOGNITION USING AI
ATTENDANCE BY FACE RECOGNITION USING AIATTENDANCE BY FACE RECOGNITION USING AI
ATTENDANCE BY FACE RECOGNITION USING AI
 
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITIONA VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
 
IRJET- Implementation of Attendance System using Face Recognition
IRJET- Implementation of Attendance System using Face RecognitionIRJET- Implementation of Attendance System using Face Recognition
IRJET- Implementation of Attendance System using Face Recognition
 
FACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEMFACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEM
 
FACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEMFACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEM
 
IRJET- Student Attendance System by Face Detection
IRJET- Student Attendance System by Face DetectionIRJET- Student Attendance System by Face Detection
IRJET- Student Attendance System by Face Detection
 
Progression in Large Age-Gap Face Verification
Progression in Large Age-Gap Face VerificationProgression in Large Age-Gap Face Verification
Progression in Large Age-Gap Face Verification
 
Face and facial expressions recognition for blind people
Face and facial expressions recognition for blind peopleFace and facial expressions recognition for blind people
Face and facial expressions recognition for blind people
 
IRJET - Design and Development of Android Application for Face Detection and ...
IRJET - Design and Development of Android Application for Face Detection and ...IRJET - Design and Development of Android Application for Face Detection and ...
IRJET - Design and Development of Android Application for Face Detection and ...
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face Recognition
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face Identification
 
MTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITION
MTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITIONMTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITION
MTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITION
 
AI-based Mechanism to Authorise Beneficiaries at Covid Vaccination Camps usin...
AI-based Mechanism to Authorise Beneficiaries at Covid Vaccination Camps usin...AI-based Mechanism to Authorise Beneficiaries at Covid Vaccination Camps usin...
AI-based Mechanism to Authorise Beneficiaries at Covid Vaccination Camps usin...
 
IRJET- Persons Identification Tool for Visually Impaired - Digital Eye
IRJET-  	  Persons Identification Tool for Visually Impaired - Digital EyeIRJET-  	  Persons Identification Tool for Visually Impaired - Digital Eye
IRJET- Persons Identification Tool for Visually Impaired - Digital Eye
 
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric Learning
 
IRJET- Biometric Attendance Management System using Raspberry Pi
IRJET- Biometric Attendance Management System using Raspberry PiIRJET- Biometric Attendance Management System using Raspberry Pi
IRJET- Biometric Attendance Management System using Raspberry Pi
 
IRJET - Facial Recognition based Attendance Management System
IRJET - Facial Recognition based Attendance Management SystemIRJET - Facial Recognition based Attendance Management System
IRJET - Facial Recognition based Attendance Management System
 
Survey of ‘Nivritti’: survey of face recognition technologies/methods
Survey of ‘Nivritti’: survey of face recognition technologies/methodsSurvey of ‘Nivritti’: survey of face recognition technologies/methods
Survey of ‘Nivritti’: survey of face recognition technologies/methods
 
Assessment and Improvement of Image Quality using Biometric Techniques for Fa...
Assessment and Improvement of Image Quality using Biometric Techniques for Fa...Assessment and Improvement of Image Quality using Biometric Techniques for Fa...
Assessment and Improvement of Image Quality using Biometric Techniques for Fa...
 
Biometric Ear Recognition System
Biometric Ear Recognition SystemBiometric Ear Recognition System
Biometric Ear Recognition System
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 

Recently uploaded (20)

Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 

IRJET- Library Management System with Facial Biometric Authentication

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3239 Library Management System with Facial Biometric Authentication Kalavakonda Vijaya, P. Revathi, M. Sarveena and K.Thoshini Department of Information Technology, R.M.K. Engineering College ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract— In this paper we propose a system that uses the biometric authentication for the users of the Library. It is expected to reduce the time taken to gain access into the Library. The system will help in automating the user ledger by automaticallyrecording the in and out time of the users. Thesystemwillenable the user to pick up the book and leave the library without having to wait in the queue for making the entry in the system. Keywords—Featureextraction,ImageProcessingand Library Management Introduction Biometric authentication system is considered to provide better security when compared to other categories of authentication systems. Biometricaccess control uses a method to identify unique human characteristics as a means of authenticating individual users. Biometric authentication systems can be implemented in two phases where the first one is to record the biometrics of the users who can gainaccess. During this phase the keyfeaturesthatcouldbeusedto identify the user will be extracted and stored as the template of the user. Second phase is the actual authentication phase during which the system will compare the biometric features of the user trying to gain access with that of the stored data. If there is a match it will allow the user to gain access otherwise it will alert about the unauthorised person trying to gain access. Some of the biometrics that could be used for authenticating the user are iris, fingerprint,face,voice, DNA, retina, hand geometry. Of all the biometrics face has started gaining popularity as facial recognition is considered to be relatively inexpensive. Facial recognition is popularly used in various fields like healthcare, access control, security and criminal identification. Facial recognition can be performed either in 2D or 3D manner, each of which have their own advantages and disadvantages. Generally a facial recognition system has a camera capture the image extract the distinctive features like the position, shape, size of eyes, lips, nose etc. Computer vision for faces can approximate the human approach of identifying the individual users. Face detection identifies the facial region in the input image (locating the face part in image). Face recognition refers to identifying the user corresponding to the image. Face detection can be primarily based on two approaches namely local and global approaches. Local approach uses facial features such as nose, eye and mouth to associate a face with the person. Face recognition can be done previously using geometric models. Several face recognition algorithms have been developed and used, each has its own advantages and efficiency rates. There are several approaches for face recognition namely fisher faces approach, eigen faces approach and there exists several variations in the methods and algorithms for face recognition. Here we are proposing a face recognition system built using opencv tool(open source computer vision) for biometric authentication.opencv is an open source computer vision and machine learning library. It consists of nearly 2500 optimized algorithms.These algorithms are used for detecting and recognizing the faces and also used to identify objects and tracking moving objects. This system includes two phases namely dataset generation phase(enrollingtheimages of valid users in the database) and its second phase includes the process of identifying whether the user is authenticatedtoaccessthelibraryornot.Inverification phase the input images are compared with the set of
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3240 images stored in dataset.Reports about the usage of library resources by the users can be generated. .This system aims to avoid the need for recording the in/out time of the users manually and also reducesthechance of misuse of a person's identity. Literature Review Anil Jain et. al.[1], in their paper have discussed in detail about the various biometrics that could be used for implementing authentication systems. They have made a comparative studyabout the variousbiometric systems by considering seven factors. They have also discussed about the advantages and disadvantages of the unimodal and multimodal biometric systems. Khem Puthea et. al.[2], have reviewed the works done for marking attendance using the facial recognition. Their review reveals that Principal Component Analysis (PCA) could be used to reduce the dimensionality of the features that are extracted from the face images. Hemant Makawana and Taranpreet Singh have discussed aboutalgorithmsthatcouldbeusedforfacial recognition. Accordingtothemthealgorithmscouldbe categorised as Geometry based and appearance based. In their paper they have discussed about the appearance based techniques that too global feature based. They have concluded that PCA occupies more space whencompared to Linear Discriminant Analysis (LDA). According to their results, false rejection ratio for LDA increases as the number of samples increases. The false rejection ratio for PCA decreases as the number of samples is increased. However the number of samples considered b y them is too low to arrive at any concrete decision. Kavitha and Manjeet Kaur done a survey about the facialrecognitionalgorithms. Theyhavediscussedthat generally facial recognition systems could either be template based or geometric based. Their review indicate that many researchers has worked in this domain. Based on their review it could be inferred that many researchers have worked using template based approaches whencompared to thatofgeometricbased approach. Theyhavelistedsomeoftheissuesthatneed to be addressed while developing a facial biometric system. The issues are expression change, change in pose, variation in lighting, angle of image capture, presence or absence of accessories andextensionsand size of image. Rakesh Saini et.al.,intheirpaper,havedoneananalysis of five algorithms that could be used facial recognition. In their work they have made a comparative analysis on memory usage and rate of recognition for five algorithms, along with their merits and demerits. Based on their data it could be concluded that PCA in combinationofLDAorArtificialNeuralNetwork(ANN) is better when compared to using PCA alone. Shakir F. Kak et. al., in their paper, have discussed about the fields in which facial recognition playsavital role. They have highlighted that the facial feature extraction methods could be broadly classified as Model-based, Appearance-based and hybrid of model and appearance. According to their study many researchers have tried varied techniques using appearance-based facial recognition, whereas few works have been carried out using the model-based techniques. They have stated that model-based techniques can overcome the problem of variation in lighting, sizeandalignment.Theyalsostatethatmodel- based techniques are faster in matching and represent the images in compact manner, however relatively slow in detecting a face. They also concluded that better models need to be proposed so that the problems of expression, occlusion, pose variation and illumination issues could be addressed. Sushma Jaiswal et. al., they have compared features of these algorithms and mentioned their advantages,disadvantages.They have suggested that eigen face approach is easy to implement and its main idea is to get the features in mathematical sense instead of physical face feature by using mathematical transform for recognition.It primarily involves two phases phases. And added that fisher face approach is better than eigenface approach with improved classification of different classes of images.Theystated that elastic bunch graph matching makes use of gabor
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3241 feature, which is sensitive to lighting variation and allows for position and facial expression variation. III.PROPOSED WORK The proposed system for face recognition includes the following stages : 1.Image Acquisition 2. Pre-processing 3.Feature Extraction 4.Comparison and verification. This system includes two phases namely data generation phase and recognition phase. Data generation phase means enrolling the images of the valid users in the database. 1.Image Acquisition: First step of face recognition is to capture the face image of users by using camera having appropriate resolution (4MP camera) and it should be placed at a distance sufficient to capture the images o the users properly.And these images are used to create dataset for training the images. system. The collected face images should have the pose, expression variation in order to check the performance of the face recognition system under these conditions. 2.Pre-processing: Pre-processing involves rgb tograyscaleconversionof the images, Histogram equalization also done in this stage.It can be performed to adjust the brightness levels of the images.Pre-processing reduces the time taken to process the images. Dimensionality reduction can be achieved by PCA algorithm.LDA also be used for feature extraction in some applications. 3.Feature Extraction: Extracting the characteristic features of the images which are used to identify the faces uniquely.These features extracted are based on the nodal points located on the face.It includes eye socket depth,nose width,jaw lines,cheek bones(around 80 points are locatedinhumanfaceimage).Theextractednodalpoint data are stored as numeric codes(face print)fortheset of images,for each set of images unique id will be assigned.Face prints are used for comparison of the images. For more efficiency surface deviation features are also compared ,if required. The above mentioned three stages are common for both data generation phase and recognition phase. 4.Comparison and verification: This stage involves comparison of input images with set of images stored in the database(images in dataset).Template matching module is used for comparing these images.Face images of the individual users are assigned with unique id. The architecture for the proposed system is asfollows: LBPH: LBPH(Local BinaryPattern Histogram) is a popular face recognition algorithm. It is a simple yet very efficient texture operator which labels the pixels of an image by the use of threshold values, the neighbourhood of each pixel and considers the result
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3242 as a binary number .It uses four parameters namely :radius, neighbours,grid x, grid y for performing the face recognition task.The computational part of this algorithm is to get a part of the image that describes the original image by locating the facial characteristics.The obtained image is divided into multiple and then histogram for the images are extracted. 2.SIFT: Scale-Invariant Feature Transformation is a feature detection algorithm used to detect and describe local features in images. SIFT keypoints of objects are first extracted from a set of images andstoredinadatabase. An object is recognized in a new image by individually comparing each feature from the new image to this database and finding candidate matching features based on Euclidean distance of their feature vectors. 3. LDA: Linear discriminant analysis is used in pattern recognitionandstatisticstofindthelinearcombination of features that characterizes orseparatestwoormore classes of objects.The resulting combination may be used for dimensionality reduction. LDA is also quite related to principal component analysis , in that they both look for linear combinations of variables which describes the data . LDA explicitly attempts to model the difference between the classes of data. LDA works when the measurements made on independent variables for each observation are continuous quantities. 4.PCA: Principal component analysis is used for dimensionality reduction . It transforms the original coordinates of a dataset into a set of principal components.First component in the set of principal components has the largest possible varianceandeach succeeding component has the highest possible variance with a condition that it is orthogonal to the components preceding to it .Considering only the first m components(m<n) from the original set of images reduces the dimensionality of the data.PCA stillretains most of the information aboutvarianceofthedata.And it is known that PCA doesn'tprovideinterpretabilityof the dataset. IV.Conclusion This system offers better results in providing authenticated entry to the users of a library .It shows better recognition rates for various posing angles.And provides efficient false acceptace and false rejection rates.It automates the process of recording the time of users.However the system works under certain constraints such as lighting conditions and posing angles. References 1."An Introduction to biometric Recognition" Anil.K Jain,Arun Ross and Salil Prabakar. IEEE Transactions on circuit and systems for video Technology, Vol. 14, No. 1, January 2004. 2.“A Review Paper on Attendance Marking System based On Face " Khem Puthea. 5th International Conference on Image Processing, Communication, Engineering and Technology (IPCET-17) Oct. 2017. 3."Comparison of different algorithms for face recognition" Hemant makawana and taranpreet singh GlobalJournalofComputerScienceandTechnology Graphics & Vision Volume 13 Issue 9 Version 1 Year 2013. 4."A survey paper for face recognition technologies" Kavita ,Manjeet Kaur.Iternational journal of scientific and research publications,Volume6,issue7,july2016. 5."Analysis of different face recognition algorithms" Rakesh Saini ,Abhishek saini and Deepak Agarwal. International Journal of Engineering Research & Technology (IJERT) Vol. 3 Issue 11, November-2014 6."A Review on Person Recognition based on Face model" Shakir F. Kak, Firas Mahmood Mustafa , Pedro Valente
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3243 4th International Engineering Conference on Developments in Civil & Computer Engineering Applications 2018 7.“Comparison between face recognition algortithm- Eigen faces,fisher faces and elastic bunch graph matching." by Sushma Jaiswal , singh Bahadauria and Dr.K.Rakesh singh jadon 8."Face recognition using fisherface method". Mustamin Anggo and La Arapu. 2nd International Conference on Statistics, Mathematics, Teaching, and Research IOP Publishing. 9."Automated attendance Management system using Face recognition". Akshara Jadhav, Akshay Jadhav Tushar Ladhe, Krishna Yeolekar .International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue:01|Jan- 2017