SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1030
VISITX: Face Recognition Visitor Management System
Mr. Rikshit Makwana1, Mr. Romil Nandwana2, Mr. Jayshil Jain3, Mr. Tejas Laxmeshwar4,
Mr. Shirish Sabnis5
1,2,3,4BE, Information Technology, Rajiv Gandhi Institute of Technology, Affiliated to Mumbai University, Mumbai,
India
5Assistant Professor, Rajiv Gandhi Institute of Technology, Mumbai, India
-------------------------------------------------------------------------***------------------------------------------------------------------------
Abstract - The current office management systems are too intrusive which createsissuesinthecorporateoffices.This
paper presents a hassle-free way of managing the office premises with the help of biometric security systems which
involves a high-end face recognition system to identify people in office and to recognize strangers i.e. visitors and
make appointments for them. In the case of Unknown face recognition, a token-based authentication method is used
via mail. We also show that augmenting the memory base with additional, synthetic face image results in further
improvement in performance. Results of extensive empirical testing on two standard face recognition data sets are
presented, and direct comparison with published work shows that the algorithm archives comparable results. The
face recognition mechanics works on the Python Algorithm Facial landmark detector with dlib. The face recognition
software will provide an accuracy ranging from 50% to 70%. We are presenting a review on the most successful
existing algorithms or methods for facial recognition technology to encourage researchers to embark on this topic.
Keywords — Dlib algorithm, Image Processing, Face Landmark detector algoritm.
I. INTRODUCTION
The visitor management is a modern world problem with its application a numerous frauds, privacy issues, etc. can be easily
detected and avoided. The visitor management system using face recognitionisoneof themostsecuresystemeven better than
CCTV cameras and wake through gate methods. The main focus that has to made in project is whether the cost of the system
compiles with the extent of the project. The scale of operations and the security requirements differ from place to place for
instance domestic usage and industrial usage. Visitor Management System is mostly used by corporate, schools, colleges now
but with great advancements can extent its scope to railway stations,airports,toll stations,etc.Almostall businesses withhuge
facilities are incorporating Visitor Management Systems in their overall security and is constantly growing a constant pace.
Global Visitor Management Software MarkettoReachUSD6300.0million by2025(ReportsbyZionMarketResearchpublished
on 01-Feb-2018). The current Visitor Management Systemsareverytraditional inapproachlikebarcodesystem,tokensystem,
etc. which can be easily manipulated and disrupted. Thus there is a need of a smart system that can be both secure and user
friendly.
Fig 1: Stages of face recognition
II. EXISTING SYSTEM
The current existing systems in the domain of visitor management system are:
1. Traditional Paper and Pen method that involves the usageofregistersmanual entry andexittime whichthevisitorenters
himself. There is a lot of scope for breach in the entry system and the details written down cannot always be reliable.
2. Barcode System here, the user gets a barcode tag that is scanned by the system and gives the person accesstothegatebut
this system falls into trap if there is a leak of the barcode code.
3. Fingerprint Scanning System here, the user isauthenticatedvia usageoffingerprints andifthefingerprintdoes notwork a
traditional manual entry is taken which again brings security concerns for the system as no photograph of the visitor is
recorded.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1031
Because of the numerous limitations in the above systems, a facial recognition system is the one best suited.
III. DESIGN DETAIL A. Recognition:
An important phase of face recognition system is the extraction of features that uniquely identifies the faces given as
input. It is important to identify the appropriate language in order toavoiderrorsindetectionofthefaces.Analyzingtheregion
used for feature extraction is one of the main issue. Therefore, some prefer dividing the images into small intervals, called
pixels, from each which a local feature vector is extracted and some prefers to extract global statics from the whole face.
B. Face Recognition Using CNN:
For classification, CNN uses the following steps:
Step I: Initially it extracts low-level features like edges and corners.
Step II: After the extraction of edges and corners, high-level layers extract high-level featuresfortheprocessof3Dconvolution
in CNNs.
Step III: It starts from the top-left corner of input wherein each kernel is moved from left to right.
Step IV: After reaching the top right corner, kernel is moved one element downward, and then again kernel is moved from left
to right, considering one element at a time.
Step V: This process is repeatedly done until the process reaches the bottom-right corner.
Fig 2: DLIB Algorithm vector points.
C. Training Phase
• On obtaining the input, individual image is pre-processed.
• Pre-processing filters are used to assure that there is no unwanted information.
• Using CNN, the processed images that are extracted are stored in the database associated with that sign.
• Same procedure is followed for all the signs which are given as input and the set of output is prepared.
D. Test Phase
• The workflow of testing sequence can be outlined as below:
• The input image is extracted.
• The images are pre-processed in order to get the Processed image as similar to that in training sequence.
• After obtaining the Processed image in testing, the images are matched with the previously maintained database.
The difference between them is measured depending feature. On finding the nearest match, the image is recognized as that
particular sign and corresponding output is flashed on the screen.
IV.PROCEDURE
Step I: Camera is used to detect the face gesture which will be input to the system.
Step II: HSV (Hue, saturation, Value) colour scheme is used to detect the skin color and skin pixels.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1032
By setting upper and lower bound values
H min < = H < = H max {Hmin 0o
Hmax 20o}...(1)
S min < = S <= S max {S min 45
Smax 255}..,(2)
Step III: Contour extraction is used to extract the information about the shape of input. Correct extraction of the contour will
produce more accurate features which will increase the chances of correctly classifying the given pattern.
Step IV: Digital images are prone to various types of noise. For the removal of noise we will be using different types of filtering
process such as Linear Filtering, Median Filtering and Average Filtering. After using suchfilteringtechniquesourimagewill be
noise and error free.
Convexity Defects find Holes in difference Between convex hull & hand.
STEP V: Face will be recognized from dataset and final output will be displayed to the user.
V. PROPOSED METHODOLODY
Visitor entry with Visitor’s Details, Official Details & photograph. Authorized users can access the application. Retrieval of the
past visitor’s data based on different criteria. Online scheduled appointments list. Centralized database Management
System. Confirmation option for unscheduled / scheduled visitors through Application. Authentication for employee in the
organization.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1033
PHASE 1:
The camera setup will detect a human face of the person standing in front of the system and will start the process by clicking a
photograph of the person.
PHASE 2:
The image captured will be processed with a face detection algorithm that will help in generating a set of binary code which
will then be checked with the stored database details for match to be found.
PHASE 3:
If a perfect match is found, then the person is verified and approvedbythesystemanddetailsliketime, picture,date,etc. would
be stored at the database for records.
PHASE 4:
If the records do not match a visitor option initiated that will help the visitor in scheduling an appointment with the desired
person in the office.
1. Image Acquisition
Image acquisition process starts with capturing an image during runtime through camera andwhiledoingtheseprocessitwill
store these images in directory. The captured image will get compared with the existing image stored in directory using DLIB
algorithm and then it will provide the required face image which we needed. The images are captured using web cam through
JavaScript and then capturing these image through framespersecond,Theseimagewill bestoredinanotherdirectoryandthen
comparison is made between recently captured image and images already stored in directory.
2. Feature Extraction
An extracted object can have many features, these features provide description of the object. In a similarwayDLIBgivesusset
of features of an object which are not affected by various complications that are faced in other methods, such as object scaling
and rotation. DLIB approach, generates features of image by taking a picture and transforming it into a “big collection of local
feature vectors”. Hence, with the help of DLIB, feature vectors never changes to any of the transformations of the image.
3. Orientation Detection
In this, we will take the input of face in any of the form or any orientation, the face will be detected by the desired section of
feature extraction as the DLIB algorithm also has a unique feature which includes detection of only single face.
4. Face Recognition
When the whole process is completed, the input will be then converted into its recognized points fromthefacewhichmightbe
helpful to understand.
Face detection framework is a combination of integral image and cascadingclassifiers.Facesaretrainedforfivedifferent poses
(left, left+45deg, front, right+45deg and right) and face detectorsareobtainedforall posesthesetechniquesyieldsgoodresults
for face detection.
VI. FUTURE SCOPE
The different areas where we can use this application are:
Any institutions can make use of it for providing information, content and registration of the visitor. It can be used in offices
and modifications can be easily done according to requirements. Helps in creating personal records of employees in the
company and also keeps a track of unknown visitors in the office premise. VisitX will also allow a person or a visitor schedule
appointment with people that they want to meet. It can also be used at schools and other areas where maintaining records is
important. Used at Railway Stations, Airports, Toll Stations, etc to maintain record of the people entering and exiting a city.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1034
VII. CONCLUSION
Thus our proposed system will help and reduce the amounts of security breaches going on in the industry as well as help and
manage meetings that will go smoother without any human intervention. This will reduce human efforts and the existing
systems cost burden.
VIII. REFERENCES
1) Norizan Anwar, Noorman Masrek, “Visitor Management System by applying UTAUT”, IEEE,
2) Subha Rajam, P. and Balakrishnan, G.,‘Recognition of Face using Image Processing to aid’, International
3) Conference on Communication Technology and System Design, Elsevier, pp: 861-868,2011.
4) Subha Rajam, P. and Balakrishnan, G., ‘Real time face recognition System to aid People’, IEEE, pp: 737- 742,2011.
5) M Turk and A. Pentland, “Eigenfaces for recognition,” Cognitive Neuroscience, vol. 3, January 2000
6) R. Lienhart and J. Maydt, “An extended set of haar-like features for rapid object detection,” in Proc. 2002 IEEE Image
Processing, pp.1522-4880.
7) P. N. Belhumeur, J.P. Hespanha, and D. Kriegman, “Eigenfaces vs. fisherfaces. recognition using class specific linear
projection,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 19, no. pp. 711–720, July 1997.
8) R. Gottumukkal and V.K. Asari, “An Improved Face Recognition Technique Based on Modular PCA Approach,”
Pattern Recognition Letters, vol. 25, pp. 429-436.
9) S. Ghotkar, R. Khatal, S. Khupase, S. Asati, and M. Hadap, “Visitor system using face Recognition”, IEEE International
Conference on Computer Communication and Informatics (ICCCI), Jan. 10-12, 2012, Coimbatore, India.

More Related Content

What's hot

Currency Recognition System for Visually Impaired: Egyptian Banknote as a Stu...
Currency Recognition System for Visually Impaired: Egyptian Banknote as a Stu...Currency Recognition System for Visually Impaired: Egyptian Banknote as a Stu...
Currency Recognition System for Visually Impaired: Egyptian Banknote as a Stu...DrNoura Semary
 
IRJET- Credit Card Authentication using Facial Recognition
IRJET-  	  Credit Card Authentication using Facial RecognitionIRJET-  	  Credit Card Authentication using Facial Recognition
IRJET- Credit Card Authentication using Facial RecognitionIRJET Journal
 
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...IJAEMSJORNAL
 
Project Synopsis
Project SynopsisProject Synopsis
Project SynopsisParas Garg
 
Review of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note AuthenticationReview of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note AuthenticationIJCERT
 
Recent developments in paper currency recognition
Recent developments in paper currency recognitionRecent developments in paper currency recognition
Recent developments in paper currency recognitioneSAT Publishing House
 
Built-in Face Recognition for Smart Phone Devices
Built-in Face Recognition for Smart Phone DevicesBuilt-in Face Recognition for Smart Phone Devices
Built-in Face Recognition for Smart Phone DevicesIRJET Journal
 
IRJET- Random Keypad and Face Recognition Authentication Mechanism
IRJET- Random Keypad and Face Recognition Authentication MechanismIRJET- Random Keypad and Face Recognition Authentication Mechanism
IRJET- Random Keypad and Face Recognition Authentication MechanismIRJET Journal
 
IRJET - A Survey on Biometric Voting System using Iris Recognition
IRJET - A Survey on Biometric Voting System using Iris RecognitionIRJET - A Survey on Biometric Voting System using Iris Recognition
IRJET - A Survey on Biometric Voting System using Iris RecognitionIRJET Journal
 
7 multi biometric fake detection system using image quality based liveness de...
7 multi biometric fake detection system using image quality based liveness de...7 multi biometric fake detection system using image quality based liveness de...
7 multi biometric fake detection system using image quality based liveness de...INFOGAIN PUBLICATION
 
A Study on Fingerprint (biometrics) Recognition
A Study on Fingerprint (biometrics) RecognitionA Study on Fingerprint (biometrics) Recognition
A Study on Fingerprint (biometrics) Recognitioneditor1knowledgecuddle
 
Dissertation final report
Dissertation final reportDissertation final report
Dissertation final reportSmriti Tikoo
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterNIDHI SHARMA
 
Advanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric SchemeAdvanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric SchemeEditor IJCATR
 
Attendance Using Facial Recognition
Attendance Using Facial RecognitionAttendance Using Facial Recognition
Attendance Using Facial RecognitionVikramaditya Tarai
 
IRJET-ATM Security using GSM Technology
IRJET-ATM Security using GSM TechnologyIRJET-ATM Security using GSM Technology
IRJET-ATM Security using GSM TechnologyIRJET Journal
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVIRJET Journal
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
 
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...A Fusion of Statistical Distance and Signature Length Based Approach for Offl...
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...IRJET Journal
 

What's hot (19)

Currency Recognition System for Visually Impaired: Egyptian Banknote as a Stu...
Currency Recognition System for Visually Impaired: Egyptian Banknote as a Stu...Currency Recognition System for Visually Impaired: Egyptian Banknote as a Stu...
Currency Recognition System for Visually Impaired: Egyptian Banknote as a Stu...
 
IRJET- Credit Card Authentication using Facial Recognition
IRJET-  	  Credit Card Authentication using Facial RecognitionIRJET-  	  Credit Card Authentication using Facial Recognition
IRJET- Credit Card Authentication using Facial Recognition
 
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...
 
Project Synopsis
Project SynopsisProject Synopsis
Project Synopsis
 
Review of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note AuthenticationReview of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note Authentication
 
Recent developments in paper currency recognition
Recent developments in paper currency recognitionRecent developments in paper currency recognition
Recent developments in paper currency recognition
 
Built-in Face Recognition for Smart Phone Devices
Built-in Face Recognition for Smart Phone DevicesBuilt-in Face Recognition for Smart Phone Devices
Built-in Face Recognition for Smart Phone Devices
 
IRJET- Random Keypad and Face Recognition Authentication Mechanism
IRJET- Random Keypad and Face Recognition Authentication MechanismIRJET- Random Keypad and Face Recognition Authentication Mechanism
IRJET- Random Keypad and Face Recognition Authentication Mechanism
 
IRJET - A Survey on Biometric Voting System using Iris Recognition
IRJET - A Survey on Biometric Voting System using Iris RecognitionIRJET - A Survey on Biometric Voting System using Iris Recognition
IRJET - A Survey on Biometric Voting System using Iris Recognition
 
7 multi biometric fake detection system using image quality based liveness de...
7 multi biometric fake detection system using image quality based liveness de...7 multi biometric fake detection system using image quality based liveness de...
7 multi biometric fake detection system using image quality based liveness de...
 
A Study on Fingerprint (biometrics) Recognition
A Study on Fingerprint (biometrics) RecognitionA Study on Fingerprint (biometrics) Recognition
A Study on Fingerprint (biometrics) Recognition
 
Dissertation final report
Dissertation final reportDissertation final report
Dissertation final report
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median Filter
 
Advanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric SchemeAdvanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric Scheme
 
Attendance Using Facial Recognition
Attendance Using Facial RecognitionAttendance Using Facial Recognition
Attendance Using Facial Recognition
 
IRJET-ATM Security using GSM Technology
IRJET-ATM Security using GSM TechnologyIRJET-ATM Security using GSM Technology
IRJET-ATM Security using GSM Technology
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCV
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
 
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...A Fusion of Statistical Distance and Signature Length Based Approach for Offl...
A Fusion of Statistical Distance and Signature Length Based Approach for Offl...
 

Similar to IRJET- VISITX: Face Recognition Visitor Management System

IRJET - Face Detection and Recognition System
IRJET -  	  Face Detection and Recognition SystemIRJET -  	  Face Detection and Recognition System
IRJET - Face Detection and Recognition SystemIRJET Journal
 
IRJET- Intrusion Detection through Image Processing and Getting Notified ...
IRJET-  	  Intrusion Detection through Image Processing and Getting Notified ...IRJET-  	  Intrusion Detection through Image Processing and Getting Notified ...
IRJET- Intrusion Detection through Image Processing and Getting Notified ...IRJET Journal
 
Face Recognition System using OpenCV
Face Recognition System using OpenCVFace Recognition System using OpenCV
Face Recognition System using OpenCVIRJET Journal
 
Security by user through application to lock/unlock machine by face detection
Security by user through application to lock/unlock machine by face detectionSecurity by user through application to lock/unlock machine by face detection
Security by user through application to lock/unlock machine by face detectionIRJET Journal
 
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONESAN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONESAM Publications
 
IRJET- A Deep Learning based Approach for Automatic Detection of Bike Rid...
IRJET-  	  A Deep Learning based Approach for Automatic Detection of Bike Rid...IRJET-  	  A Deep Learning based Approach for Automatic Detection of Bike Rid...
IRJET- A Deep Learning based Approach for Automatic Detection of Bike Rid...IRJET Journal
 
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET-  	  Secure Online Payment with Facial Recognition using CNNIRJET-  	  Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNNIRJET Journal
 
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...IRJET Journal
 
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITIONA VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITIONIRJET Journal
 
IRJET- Automated Criminal Identification System using Face Detection and Reco...
IRJET- Automated Criminal Identification System using Face Detection and Reco...IRJET- Automated Criminal Identification System using Face Detection and Reco...
IRJET- Automated Criminal Identification System using Face Detection and Reco...IRJET Journal
 
IRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET Journal
 
IRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET Journal
 
Smart Doorbell System Based on Face Recognition
Smart Doorbell System Based on Face RecognitionSmart Doorbell System Based on Face Recognition
Smart Doorbell System Based on Face RecognitionIRJET Journal
 
IRJET- Autonamy of Attendence using Face Recognition
IRJET- Autonamy of Attendence using Face RecognitionIRJET- Autonamy of Attendence using Face Recognition
IRJET- Autonamy of Attendence using Face RecognitionIRJET Journal
 
Face Recognition Based Payment Processing System
Face Recognition Based Payment Processing SystemFace Recognition Based Payment Processing System
Face Recognition Based Payment Processing SystemIRJET Journal
 
IRJET- Smart Classroom Attendance System: Survey
IRJET- Smart Classroom Attendance System: SurveyIRJET- Smart Classroom Attendance System: Survey
IRJET- Smart Classroom Attendance System: SurveyIRJET Journal
 
Survey of ‘Nivritti’: survey of face recognition technologies/methods
Survey of ‘Nivritti’: survey of face recognition technologies/methodsSurvey of ‘Nivritti’: survey of face recognition technologies/methods
Survey of ‘Nivritti’: survey of face recognition technologies/methodsIRJET Journal
 
IRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric AttendanceIRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric AttendanceIRJET Journal
 
IRJET- Face Recognition using Deep Learning
IRJET-  	  Face Recognition using Deep LearningIRJET-  	  Face Recognition using Deep Learning
IRJET- Face Recognition using Deep LearningIRJET Journal
 
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET Journal
 

Similar to IRJET- VISITX: Face Recognition Visitor Management System (20)

IRJET - Face Detection and Recognition System
IRJET -  	  Face Detection and Recognition SystemIRJET -  	  Face Detection and Recognition System
IRJET - Face Detection and Recognition System
 
IRJET- Intrusion Detection through Image Processing and Getting Notified ...
IRJET-  	  Intrusion Detection through Image Processing and Getting Notified ...IRJET-  	  Intrusion Detection through Image Processing and Getting Notified ...
IRJET- Intrusion Detection through Image Processing and Getting Notified ...
 
Face Recognition System using OpenCV
Face Recognition System using OpenCVFace Recognition System using OpenCV
Face Recognition System using OpenCV
 
Security by user through application to lock/unlock machine by face detection
Security by user through application to lock/unlock machine by face detectionSecurity by user through application to lock/unlock machine by face detection
Security by user through application to lock/unlock machine by face detection
 
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONESAN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
 
IRJET- A Deep Learning based Approach for Automatic Detection of Bike Rid...
IRJET-  	  A Deep Learning based Approach for Automatic Detection of Bike Rid...IRJET-  	  A Deep Learning based Approach for Automatic Detection of Bike Rid...
IRJET- A Deep Learning based Approach for Automatic Detection of Bike Rid...
 
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET-  	  Secure Online Payment with Facial Recognition using CNNIRJET-  	  Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
 
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
 
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITIONA VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
A VISUAL ATTENDANCE SYSTEM USING FACE RECOGNITION
 
IRJET- Automated Criminal Identification System using Face Detection and Reco...
IRJET- Automated Criminal Identification System using Face Detection and Reco...IRJET- Automated Criminal Identification System using Face Detection and Reco...
IRJET- Automated Criminal Identification System using Face Detection and Reco...
 
IRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face Recognition
 
IRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face Recognition
 
Smart Doorbell System Based on Face Recognition
Smart Doorbell System Based on Face RecognitionSmart Doorbell System Based on Face Recognition
Smart Doorbell System Based on Face Recognition
 
IRJET- Autonamy of Attendence using Face Recognition
IRJET- Autonamy of Attendence using Face RecognitionIRJET- Autonamy of Attendence using Face Recognition
IRJET- Autonamy of Attendence using Face Recognition
 
Face Recognition Based Payment Processing System
Face Recognition Based Payment Processing SystemFace Recognition Based Payment Processing System
Face Recognition Based Payment Processing System
 
IRJET- Smart Classroom Attendance System: Survey
IRJET- Smart Classroom Attendance System: SurveyIRJET- Smart Classroom Attendance System: Survey
IRJET- Smart Classroom Attendance System: Survey
 
Survey of ‘Nivritti’: survey of face recognition technologies/methods
Survey of ‘Nivritti’: survey of face recognition technologies/methodsSurvey of ‘Nivritti’: survey of face recognition technologies/methods
Survey of ‘Nivritti’: survey of face recognition technologies/methods
 
IRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric AttendanceIRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric Attendance
 
IRJET- Face Recognition using Deep Learning
IRJET-  	  Face Recognition using Deep LearningIRJET-  	  Face Recognition using Deep Learning
IRJET- Face Recognition using Deep Learning
 
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesRashidFaridChishti
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxMuhammadAsimMuhammad6
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...vershagrag
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...gragchanchal546
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...jabtakhaidam7
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxpritamlangde
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesChandrakantDivate1
 

Recently uploaded (20)

AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 

IRJET- VISITX: Face Recognition Visitor Management System

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1030 VISITX: Face Recognition Visitor Management System Mr. Rikshit Makwana1, Mr. Romil Nandwana2, Mr. Jayshil Jain3, Mr. Tejas Laxmeshwar4, Mr. Shirish Sabnis5 1,2,3,4BE, Information Technology, Rajiv Gandhi Institute of Technology, Affiliated to Mumbai University, Mumbai, India 5Assistant Professor, Rajiv Gandhi Institute of Technology, Mumbai, India -------------------------------------------------------------------------***------------------------------------------------------------------------ Abstract - The current office management systems are too intrusive which createsissuesinthecorporateoffices.This paper presents a hassle-free way of managing the office premises with the help of biometric security systems which involves a high-end face recognition system to identify people in office and to recognize strangers i.e. visitors and make appointments for them. In the case of Unknown face recognition, a token-based authentication method is used via mail. We also show that augmenting the memory base with additional, synthetic face image results in further improvement in performance. Results of extensive empirical testing on two standard face recognition data sets are presented, and direct comparison with published work shows that the algorithm archives comparable results. The face recognition mechanics works on the Python Algorithm Facial landmark detector with dlib. The face recognition software will provide an accuracy ranging from 50% to 70%. We are presenting a review on the most successful existing algorithms or methods for facial recognition technology to encourage researchers to embark on this topic. Keywords — Dlib algorithm, Image Processing, Face Landmark detector algoritm. I. INTRODUCTION The visitor management is a modern world problem with its application a numerous frauds, privacy issues, etc. can be easily detected and avoided. The visitor management system using face recognitionisoneof themostsecuresystemeven better than CCTV cameras and wake through gate methods. The main focus that has to made in project is whether the cost of the system compiles with the extent of the project. The scale of operations and the security requirements differ from place to place for instance domestic usage and industrial usage. Visitor Management System is mostly used by corporate, schools, colleges now but with great advancements can extent its scope to railway stations,airports,toll stations,etc.Almostall businesses withhuge facilities are incorporating Visitor Management Systems in their overall security and is constantly growing a constant pace. Global Visitor Management Software MarkettoReachUSD6300.0million by2025(ReportsbyZionMarketResearchpublished on 01-Feb-2018). The current Visitor Management Systemsareverytraditional inapproachlikebarcodesystem,tokensystem, etc. which can be easily manipulated and disrupted. Thus there is a need of a smart system that can be both secure and user friendly. Fig 1: Stages of face recognition II. EXISTING SYSTEM The current existing systems in the domain of visitor management system are: 1. Traditional Paper and Pen method that involves the usageofregistersmanual entry andexittime whichthevisitorenters himself. There is a lot of scope for breach in the entry system and the details written down cannot always be reliable. 2. Barcode System here, the user gets a barcode tag that is scanned by the system and gives the person accesstothegatebut this system falls into trap if there is a leak of the barcode code. 3. Fingerprint Scanning System here, the user isauthenticatedvia usageoffingerprints andifthefingerprintdoes notwork a traditional manual entry is taken which again brings security concerns for the system as no photograph of the visitor is recorded.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1031 Because of the numerous limitations in the above systems, a facial recognition system is the one best suited. III. DESIGN DETAIL A. Recognition: An important phase of face recognition system is the extraction of features that uniquely identifies the faces given as input. It is important to identify the appropriate language in order toavoiderrorsindetectionofthefaces.Analyzingtheregion used for feature extraction is one of the main issue. Therefore, some prefer dividing the images into small intervals, called pixels, from each which a local feature vector is extracted and some prefers to extract global statics from the whole face. B. Face Recognition Using CNN: For classification, CNN uses the following steps: Step I: Initially it extracts low-level features like edges and corners. Step II: After the extraction of edges and corners, high-level layers extract high-level featuresfortheprocessof3Dconvolution in CNNs. Step III: It starts from the top-left corner of input wherein each kernel is moved from left to right. Step IV: After reaching the top right corner, kernel is moved one element downward, and then again kernel is moved from left to right, considering one element at a time. Step V: This process is repeatedly done until the process reaches the bottom-right corner. Fig 2: DLIB Algorithm vector points. C. Training Phase • On obtaining the input, individual image is pre-processed. • Pre-processing filters are used to assure that there is no unwanted information. • Using CNN, the processed images that are extracted are stored in the database associated with that sign. • Same procedure is followed for all the signs which are given as input and the set of output is prepared. D. Test Phase • The workflow of testing sequence can be outlined as below: • The input image is extracted. • The images are pre-processed in order to get the Processed image as similar to that in training sequence. • After obtaining the Processed image in testing, the images are matched with the previously maintained database. The difference between them is measured depending feature. On finding the nearest match, the image is recognized as that particular sign and corresponding output is flashed on the screen. IV.PROCEDURE Step I: Camera is used to detect the face gesture which will be input to the system. Step II: HSV (Hue, saturation, Value) colour scheme is used to detect the skin color and skin pixels.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1032 By setting upper and lower bound values H min < = H < = H max {Hmin 0o Hmax 20o}...(1) S min < = S <= S max {S min 45 Smax 255}..,(2) Step III: Contour extraction is used to extract the information about the shape of input. Correct extraction of the contour will produce more accurate features which will increase the chances of correctly classifying the given pattern. Step IV: Digital images are prone to various types of noise. For the removal of noise we will be using different types of filtering process such as Linear Filtering, Median Filtering and Average Filtering. After using suchfilteringtechniquesourimagewill be noise and error free. Convexity Defects find Holes in difference Between convex hull & hand. STEP V: Face will be recognized from dataset and final output will be displayed to the user. V. PROPOSED METHODOLODY Visitor entry with Visitor’s Details, Official Details & photograph. Authorized users can access the application. Retrieval of the past visitor’s data based on different criteria. Online scheduled appointments list. Centralized database Management System. Confirmation option for unscheduled / scheduled visitors through Application. Authentication for employee in the organization.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1033 PHASE 1: The camera setup will detect a human face of the person standing in front of the system and will start the process by clicking a photograph of the person. PHASE 2: The image captured will be processed with a face detection algorithm that will help in generating a set of binary code which will then be checked with the stored database details for match to be found. PHASE 3: If a perfect match is found, then the person is verified and approvedbythesystemanddetailsliketime, picture,date,etc. would be stored at the database for records. PHASE 4: If the records do not match a visitor option initiated that will help the visitor in scheduling an appointment with the desired person in the office. 1. Image Acquisition Image acquisition process starts with capturing an image during runtime through camera andwhiledoingtheseprocessitwill store these images in directory. The captured image will get compared with the existing image stored in directory using DLIB algorithm and then it will provide the required face image which we needed. The images are captured using web cam through JavaScript and then capturing these image through framespersecond,Theseimagewill bestoredinanotherdirectoryandthen comparison is made between recently captured image and images already stored in directory. 2. Feature Extraction An extracted object can have many features, these features provide description of the object. In a similarwayDLIBgivesusset of features of an object which are not affected by various complications that are faced in other methods, such as object scaling and rotation. DLIB approach, generates features of image by taking a picture and transforming it into a “big collection of local feature vectors”. Hence, with the help of DLIB, feature vectors never changes to any of the transformations of the image. 3. Orientation Detection In this, we will take the input of face in any of the form or any orientation, the face will be detected by the desired section of feature extraction as the DLIB algorithm also has a unique feature which includes detection of only single face. 4. Face Recognition When the whole process is completed, the input will be then converted into its recognized points fromthefacewhichmightbe helpful to understand. Face detection framework is a combination of integral image and cascadingclassifiers.Facesaretrainedforfivedifferent poses (left, left+45deg, front, right+45deg and right) and face detectorsareobtainedforall posesthesetechniquesyieldsgoodresults for face detection. VI. FUTURE SCOPE The different areas where we can use this application are: Any institutions can make use of it for providing information, content and registration of the visitor. It can be used in offices and modifications can be easily done according to requirements. Helps in creating personal records of employees in the company and also keeps a track of unknown visitors in the office premise. VisitX will also allow a person or a visitor schedule appointment with people that they want to meet. It can also be used at schools and other areas where maintaining records is important. Used at Railway Stations, Airports, Toll Stations, etc to maintain record of the people entering and exiting a city.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1034 VII. CONCLUSION Thus our proposed system will help and reduce the amounts of security breaches going on in the industry as well as help and manage meetings that will go smoother without any human intervention. This will reduce human efforts and the existing systems cost burden. VIII. REFERENCES 1) Norizan Anwar, Noorman Masrek, “Visitor Management System by applying UTAUT”, IEEE, 2) Subha Rajam, P. and Balakrishnan, G.,‘Recognition of Face using Image Processing to aid’, International 3) Conference on Communication Technology and System Design, Elsevier, pp: 861-868,2011. 4) Subha Rajam, P. and Balakrishnan, G., ‘Real time face recognition System to aid People’, IEEE, pp: 737- 742,2011. 5) M Turk and A. Pentland, “Eigenfaces for recognition,” Cognitive Neuroscience, vol. 3, January 2000 6) R. Lienhart and J. Maydt, “An extended set of haar-like features for rapid object detection,” in Proc. 2002 IEEE Image Processing, pp.1522-4880. 7) P. N. Belhumeur, J.P. Hespanha, and D. Kriegman, “Eigenfaces vs. fisherfaces. recognition using class specific linear projection,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 19, no. pp. 711–720, July 1997. 8) R. Gottumukkal and V.K. Asari, “An Improved Face Recognition Technique Based on Modular PCA Approach,” Pattern Recognition Letters, vol. 25, pp. 429-436. 9) S. Ghotkar, R. Khatal, S. Khupase, S. Asati, and M. Hadap, “Visitor system using face Recognition”, IEEE International Conference on Computer Communication and Informatics (ICCCI), Jan. 10-12, 2012, Coimbatore, India.