SlideShare a Scribd company logo
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 5 Issue 3, March-April 2021 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD39856 | Volume – 5 | Issue – 3 | March-April 2021 Page 364
Face Recognition Based Attendance
System using Machine Learning
Benazir Begum A1, Sreeyuktha R2, Haritha M P2, Vishnuprasad2
1Assistant Professor, 2B Tech Student-CSE,
1,2Department of Computer Science and Engineering,
Hindusthan Institute of Technology, Coimbatore, Tamil Nadu, India
ABSTRACT
In the era of modern technologies emerging at rapid pace there is no reason
why a crucial event in education sector such as attendance should be done in
the old boring traditional way. Attendance monitoringsystemwill savea lotof
time and energy for the both parties teaching staff as well as the students.
Attendance will be monitoredbytheface recognitionalgorithm byrecognizing
only the face of the students from the rest of the objects and then marking the
students as present. The system will be pre feed with the images of all the
students enrolled in the class and with the help of this pre feed data the
algorithm will detect the students who are present and match the features
with the already saved images of the students in the database.
KEYWORDS: Face Detection, Face Recognition, Viola-Jones, LBPH
How to cite this paper: Benazir Begum A
| Sreeyuktha R | Haritha M P |
Vishnuprasad "Face Recognition Based
Attendance System using Machine
Learning" Published
in International
Journal of Trend in
Scientific Research
and Development
(ijtsrd), ISSN: 2456-
6470, Volume-5 |
Issue-3, April 2021,
pp.364-368, URL:
www.ijtsrd.com/papers/ijtsrd39856.pdf
Copyright © 2021 by author(s) and
International Journal ofTrendinScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
CommonsAttribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by/4.0)
I. INTRODUCTION
Over the latest couple of decades, facial recognitionhasbeen
considered the champion among the mostbasicapplications
contrasted with other biometric-based frameworks. The
facial recognition procedure can be expressed as pursues:
given a database comprising of many face pictures of known
individuals, one sources of info a face picture, and the
procedure intends to check or decide the character of the
individual in the information picture. Biometric-based
systems have been created as the mostableoptionforseeing
individuals generally, as opposed to affirming people and
yielding them access to physical and virtual spaces
dependent on passwords, PINs, sharp cards, plastic cards,
tokens, keys and so on.,. These techniques break down an
individual's physiological just as conduct properties with a
particular ultimate objective to choose and additionally
discover his/her personality. Passwords and PINs are hard
to recall and can be taken or estimated; cards, tokens,
scratches, etc can be lost, disregarded, purloined or
duplicated; appealing cards can twist up discernibly
corrupted and confused. Notwithstanding,thecharacteristic
science of individuals can't be lost, disregarded, taken, or
made. A few models incorporate physiological qualitiesof an
individual, for example, facial pictures, fingerprints, finger
geometry, hand geometry, hand veins, palm, iris, retina, ear
and voice and conduct characteristics, for example, gait,
signature, and keystroke elements, which are utilized in
biometric techniques for individual check or distinguishing
proof particularly for security frameworks. Security
applications have seen a colossal improvement during the
most recent couple of decades, which is a characteristic
aftereffect of the mechanical upheaval in all fields,
particularly in savvy condition divisions. Face includes in
face recognition for singular ID are viewed as a significant
technique for the biometric region. These days, if an
individual shows up in a video or computerized picture,they
can be consequently distinguished by Facial Recognition
System (FRS), which is a noteworthy procedure to improve
security issues. As of late, numerous scientists concentrated
on face recognition techniques. Face recognition is a
significant piece of the capacity of human discernment
framework and is a standard assignment for people, while
building a comparative computational model of face
recognition. The computational model add to hypothetical
bits of knowledge as well as to numerous commonsense
applications like mechanized group observation, get to
control, plan of human PC interface (HCI), content based
picture database the executives,criminal recognizableproof,
etc. Face recognition is an activity that people perform
routinely and easily in our day by day lives. The individual
recognizable proof for the face that shows up in the info
information is the face recognition process.Facerecognition
process is appeared in Fig1.1
IJTSRD39856
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD39856 | Volume – 5 | Issue – 3 | March-April 2021 Page 365
Fig1.1 In the above fig shows the flowchart of the
project.
II. METHODS
2(i) Django
Django is a python-based free and open-source web
framework that follows the model-template-views (MTV)
architectural pattern. It is maintained by the Django
Software Foundation (DSF), an American independent
organization established.
Django's primary goal is to ease the creation of complex,
database-driven websites. The framework emphasizes
reusability and "pluggability" of components, less code, low
coupling, rapid development, and the principle of don't
repeat yourself. Python isusedthroughout, evenforsettings,
files, and data models. Django also provides an optional
administrative create, read, update and delete interfacethat
is generated dynamically through introspection and
configured via admin models.
3(ii)SQL
SQL is a domain-specific language used inprogrammingand
designed for managing data held in a relational database
management system (RDBMS), or for stream processing in
a relational data stream management system (RDSMS). It is
particularly useful in handling structured data, that is data
incorporating relations among entities and variables.SQL
offers two main advantages over older read–write APIs such
as ISAM or VSAM. Firstly, it introduced the concept of
accessing many records with one singlecommand.Secondly,
it eliminates the need to specify how to reach a record, e.g.
with or without an index.
3(iii) React (JavaScript library)
React (also known as React.js or ReactJS) is an open-
source, front end, JavaScript library for building user
interfaces or UI components. It is maintained by Facebook
and a community of individual developers and companies.
React can be used as a base in the development of single-
page or mobile applications. However, React is only
concerned with state management and rendering that state
to the DOM, so creating React applications usually requires
the use of additional libraries for routing. React Router is an
example of such a library.
3(iv) System implementation
The proposed system has beenimplementedwiththehelpof
three basic steps: A. detect and extract face image and save
the face information in an xml file for future references. B.
Learn and train the face image and calculate eigen value and
eigen vector of that image. C. Recognise and match face
images with existing face images information stored in xml
file .
3(v). Python
Python is an interpreted, high-level and general-purpose
programming language. Python's design philosophy
emphasizes code readability with its notable use
of significantindentation.Its languageconstructs and object-
oriented approach aim to help programmers write clear,
logical code for small and large-scale projects. Python
is dynamically-typed and garbage-collected. It supports
multiple programming paradigms, including structured
(particularly, procedural), object-oriented and functional
programming. Python is often described as a "batteries
included" language due to its comprehensive standard
library.
III. PROPOSED SYSTEM
Fig 1: Block Diagram for Attendance Monitoring
System Using Face Recognition
For the training data collection, multiple photographs of
students are taken. This dataset isusedtocompare real-time
photos recorded in the classroom with matched data and to
mark attendance. Preprocessing is applied to the captured
images. The aim of image preprocessing is to improveimage
data by suppressing unwanted distortions or enhancing
certain image features that are important for further
processing .Image pre-processing includes background
subtraction and conversion of image into grayscale.
Generally the background of an image does not move i.e. it
remains static. Hence the backgroundissubtractedina setof
image. Before subtracting the background, image is
converted into grayscale. Thisisdonetogetgoodaccuracyin
detecting faces. Features are extracted from detected faces
and cropped images of faces are stored for comparison.
Feature extraction is a type of dimensionality reductionthat
efficiently represents interesting parts of an image as a
compact feature vector. This approach is useful when image
sizes are large and a reduced feature representation is
required to quickly complete tasks such as image matching
and retrieval. After that images of students in classroom are
captured to mark attendance of students present in the
classroom. These images also goesthroughpreprocessingas
well as face detection process. Faces detected in classroom
images are compared with the images in original dataset. If
the match is found then that students roll number and name
will be added in lit of present students. Face recognition
technique is used for matching purpose.
Face Detection: Face detection is a computer technology
being used in a variety of applications that identifies human
faces in digital images. Face detection step will detect faces
in captured images so that these faces can be used for
comparison. For facedetectionViola-Jonesalgorithmisused.
Viola-Jones Algorithm: The Viola-Jones algorithm is a
widely used mechanism for object detection. The main
property of this algorithm is that training is slow, but
detection is fast. This algorithm uses Haar basis feature
filters. The efficiency of the Viola-Jones algorithm can be
significantly increased by first generatingtheintegral image.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD39856 | Volume – 5 | Issue – 3 | March-April 2021 Page 366
There are four main contributions of object detection
framework which are listed below
1. Haar features
2. Integral Image
3. Adaboost algorithm
4. Cascading
Face Recognition: With the facial images alreadyextracted,
cropped, resized and usually converted tograyscale,theface
recognition algorithm is responsible for finding
characteristics which best describe the image. ▪ There are
different types of face recognition algorithms, for example:
Eigen faces, LBPH (Local binary patternshistograms),Fisher
faces. Out of these algorithms LBPH is most suitable for the
proposed system.
Local Binary Pattern (LBP) is a simple yet very efficient
texture operator which labels the pixels of an image by
thresholding the neighbourhood of each pixel and considers
the result as a binary number.
Steps involved in LBPH:
1. Parameters: Radius, Neighbour, Grid X, Grid Y.
2. Training the algorithm
3. Applying the LBP operation
4. Extracting the histograms
5. Performing the face recognition
IV. USES AND POTENTIAL RISKS OF FACIAL
RECOGNITION ALGORITHMS
Fields of application of facial recognition for machine
learning and AI are plenty. The most common ones are
related to security and surveillance (law enforcement
agencies or airports), social media (selling data,
personalization), banking and payments, smart homes and
for providing personalizedmarketingexperiences.Although,
it is not the whole picture. There are more subtle ways in
which face recognition algorithms are changing our
everyday life in meaningful ways too, proving that this
technology is still far from infallible.
A famous deep fakes software, which swaps faces of
individuals in videos, has alreadybeenused bya politicianof
India's ruling party to gain favor in elections. In China, facial
recognition system mistook a famous businesswoman'sface
printed on the bus for a jaywalker and automatically wrote
her a fine. Numerous studies in the USA and UK proved that
facial recognition AI has significant troubles recognizing
non-white faces, is often biased on gender and identifies
"false positives" the majority of time, increasing probability
of grievous consequences.
V. FLOWCHART
A flowchart is a diagram that depicts a process, system or
computer algorithm. They are widely used in multiple fields
to document, study, plan, improve and communicate often
complex processes in clear, easy-to-understand diagrams.
Flowcharts, sometimesspelledasflowcharts,userectangles,
ovals, diamonds and potentially numerous other shapes to
define the type of step, along with connecting arrows to
define flow and sequence.Theycanrangefromsimple,hand-
drawn charts to comprehensive computer-drawn diagrams
depicting multiple steps and routes. If we consider all the
various forms of flowcharts, they are one of the most
common diagrams on the planet, used by both technical and
non-technical people in numerous fields.
In the fig 7.1 is the brief flowchart for the face recognization.
A. Face Detection and Extract
B. Learn and Train Face Images
C. Recognise and Identification
Flow Chart
Fig 7.1
VI. EXPERIMENT AND RESULT
For face recognition implementation, the following results
were obtained –
6.1. User Interface
It contains list of menu items which can be accessed to have
the complete view of the system. The system takes the input
such as Id and name of the students for registrationpurpose.
The ‘Take Images’ button is used to capturetheimagesofthe
students. ‘Train System’ button is used to train the captured
images. ‘Take Attendance’ button is used to store the
attendance results in an excel sheet. Fig 2 shows the
registration page
Fig 2 User Interface
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD39856 | Volume – 5 | Issue – 3 | March-April 2021 Page 367
6.2. Face Detection
Multiple images of the students are captured and the images are pre-processed for detecting onlythefacesofthestudents.Fig
3 shows Face Detection.
Fig 3 Face Detecction
6.3. Training
The captured images of the students are stored in a local database. The stored images are trained and are assigned
corresponding labels such as Id and name. Fig 4 shows multiple images stored in a database.
Fig 4 Dataset of Images
6.4. Face Recognition
On carrying out the recognition process, feature comparisontakesplacewithrespecttothefeaturesstoredinthedatabase.The
face is displayed along with corresponding roll no and the name of the student and used for marking the attendance. Fig 5
shows the Face Recognition.
Fig 5 Face Recognition
6.5. Attendance Results stored in an excel sheet
The corresponding attendance of the students is stored in an excel sheet. Fig 6 shows the Attendance Results.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD39856 | Volume – 5 | Issue – 3 | March-April 2021 Page 368
The step of the experiments process are given below:
1. Face Detection: Start capturing images through web
camera of the client side:
Begin:
//Pre-process the captured image and extract face image
//calculate the eigen value of the captured face image and
compared with eigen values of existing facesinthedatabase.
//If eigen value does not matched with existing ones, save
the new face image information to the face database (xml
file).
//If eigen value matched with existing one then recognition
step will done. End;
2. Face Recognition:
Using PCA algorithm the following steps would be followed
in for face recognition:
Begin:
// Find the face information of matched face image in from
the database.
// update the log table with corresponding face image and
system time that makes completion of attendance for an
individual students.
end;
VII. FUTURE SCOPE
Almost all academic institutions require attendance record
of students and maintaining attendance manually can be
hectic as well as time consuming task. Hence maintaining
attendance automatically with the help of face recognition
will be very helpful and less prone to errors as compared to
manual process. This will also reduce manipulation of
attendance record done by students and it will save time as
well. The future scope of the proposed work can be,
capturing multiple detailed images of the studentsandusing
any cloud technology to store these images. The system can
be configured and used in Atm machines to detect frauds.
Also, the system can be used at the time of elections where
the voter can be identified by recognizing the face.
VIII. CONCLUSION
This paper introduces the efficient method of attendance
management system in the classroom environment that can
replace the old manual methods. This method is secure
enough, reliable, accurate and efficient. There is no need for
specialized hardware for installing the system in the
classroom. It can be constructed using a camera and
computer. There is a need to use some algorithms that can
recognize the faces in veil to improve the system
performance.
REFERENCES
[1] ShireeshaChintalapati, M. V. Raghunadh, Automated
Attendance Management System Based on Face
Recognition Algorithms, 2013 IEEE International
Conference on Computational Intelligence and
ComputingResearch,978-1-4799-1597-2/13/$31.00
©2013 IEEE.
[2] Aftabahmed, Jiandongguo, Fayazali, Farhadeeba,
Awaisahmed,LBPHBasedImprovedFaceRecognition
At Low Resolution, International Conference on
Artificial IntelligenceandBig Data,978-1-5386-6987-
7/18/$31.00 ©2018 IEEE
[3] HajarFilali Jamal RiffiAdnane Mohamed Mahraz
Hamid Tairi, Multiple face detection based on
machine learning, 978-1-5386-4396-9/18/$31.00 c
2018 IEEE
[4] Automatic Face Recognition System using Pattern
Recognition Techniques:ASurveyNingthoujamSunita
Devi ProfK.hemachandran Department of Computer
Science Department of Computer Science Assam
University, Silchar-788011AssamUniversity, Silchar-
788011
[5] Shubhobrata Bhattacharya,GowthamSandeepNainala,
Prosenjit Das and AurobindaRoutray, Smart
Attendance Monitoring System (SAMS): A Face
Recognition based Attendance System for Classroom
Environment, 2018 IEEE 18th International
Conference on Advanced Learning Technologies,
2161- 377X/18/$31.00 ©2018 IEEE DOI
10.1109/ICALT.2018.00090
[6] HariharaSantoshDadi, Gopala Krishna Mohan Pillutla
Improved Face Recognition Rate Using HOG Features
and SVM Classifier. IOSR Journal of Electronics and
Communications Engineering, Vol. 11, Issue 4, pp 34-
44, July 2019.
[7] NavneetDalal and Bill Triggs Histograms of Oriented
Gradients for Human Detection. Proceedings of the
2019 IEEE Computer Society Conference on
Computer Vision and Pattern Recognition. 2019.
[8] O. Deniz, G. Bueno, J. Salido, F. De La Torre Face
recognition using Histogram of Oriented Gradients.
Pattern Recognition Letters. 2011.
[9] Jacky Efendi, MuhammadIhsanZul, WawanYunanto,
Real Time Face Recognition using Eigenface and
Viola-Jones Face Detector, INTERNATIONAL
JOURNAL ON INFORMATICS VISUALIZATION ,Vol 1
(2017) NO 1,e-ISSN : 2549- 9904,ISSN : 2549-9610
[10] HemantkumarRathod, Yudhisthir Ware, Snehal Sane,
Suresh Raulo, Vishal Pakhare and Imdad A. Rizvi,
Automated Attendance System using Machine
Learning Approach, 2017 InternationalConferenceon
NascentTechnologiesintheEngineeringField(ICNTE-
2017), 978-1-5090-2794- 1/17/$31.00 ©2017 IEEE

More Related Content

What's hot

Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemKarmesh Maheshwari
 
IRJET- Automated Attendance System using Face Recognition
IRJET-  	  Automated Attendance System using Face RecognitionIRJET-  	  Automated Attendance System using Face Recognition
IRJET- Automated Attendance System using Face Recognition
IRJET Journal
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
Nikyaa7
 
Automatic Attendance System using Deep Learning
Automatic Attendance System using Deep LearningAutomatic Attendance System using Deep Learning
Automatic Attendance System using Deep Learning
Sunil Aryal
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
raihansikdar
 
Asistencia | Live Face Recognition | Python
Asistencia | Live Face Recognition | Python Asistencia | Live Face Recognition | Python
Asistencia | Live Face Recognition | Python
Naomi Kulkarni
 
A Real-time Classroom Attendance System Utilizing Viola–Jones for Face Detect...
A Real-time Classroom Attendance System Utilizing Viola–Jones for Face Detect...A Real-time Classroom Attendance System Utilizing Viola–Jones for Face Detect...
A Real-time Classroom Attendance System Utilizing Viola–Jones for Face Detect...
Nischal Lal Shrestha
 
Automatic Attendance Using Face Recognition
Automatic Attendance Using Face RecognitionAutomatic Attendance Using Face Recognition
Automatic Attendance Using Face Recognition
rahulmonikasharma
 
Face recognition attendance system
Face recognition attendance systemFace recognition attendance system
Face recognition attendance system
Naomi Kulkarni
 
Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection System
Abhiroop Ghatak
 
Face recognisation system
Face recognisation systemFace recognisation system
Face recognisation system
Saumya Ranjan Behura
 
Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)
Herman Kurnadi
 
Face recognition attendance system
Face recognition attendance systemFace recognition attendance system
Face recognition attendance system
JigarPatel597
 
Project presentation by Debendra Adhikari
Project presentation by Debendra AdhikariProject presentation by Debendra Adhikari
Project presentation by Debendra Adhikari
DEBENDRA ADHIKARI
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
Zara Tariq
 
Artificial Intelligence Face recognition attendance system using MATLAB
Artificial Intelligence Face recognition attendance system using MATLABArtificial Intelligence Face recognition attendance system using MATLAB
Artificial Intelligence Face recognition attendance system using MATLAB
Naomi Kulkarni
 
FACE RECOGNITION ATTENDANCE SYSTEM (1) (1).pptx
FACE RECOGNITION ATTENDANCE SYSTEM (1) (1).pptxFACE RECOGNITION ATTENDANCE SYSTEM (1) (1).pptx
FACE RECOGNITION ATTENDANCE SYSTEM (1) (1).pptx
khushiGond2
 
Student Database Management System
Student Database Management SystemStudent Database Management System
Student Database Management System
Ajay Bidyarthy
 
Face detection presentation slide
Face detection  presentation slideFace detection  presentation slide
Face detection presentation slide
Sanjoy Dutta
 
Face recognition
Face recognitionFace recognition
Face recognition
Avinash Prakash
 

What's hot (20)

Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance System
 
IRJET- Automated Attendance System using Face Recognition
IRJET-  	  Automated Attendance System using Face RecognitionIRJET-  	  Automated Attendance System using Face Recognition
IRJET- Automated Attendance System using Face Recognition
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
 
Automatic Attendance System using Deep Learning
Automatic Attendance System using Deep LearningAutomatic Attendance System using Deep Learning
Automatic Attendance System using Deep Learning
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
Asistencia | Live Face Recognition | Python
Asistencia | Live Face Recognition | Python Asistencia | Live Face Recognition | Python
Asistencia | Live Face Recognition | Python
 
A Real-time Classroom Attendance System Utilizing Viola–Jones for Face Detect...
A Real-time Classroom Attendance System Utilizing Viola–Jones for Face Detect...A Real-time Classroom Attendance System Utilizing Viola–Jones for Face Detect...
A Real-time Classroom Attendance System Utilizing Viola–Jones for Face Detect...
 
Automatic Attendance Using Face Recognition
Automatic Attendance Using Face RecognitionAutomatic Attendance Using Face Recognition
Automatic Attendance Using Face Recognition
 
Face recognition attendance system
Face recognition attendance systemFace recognition attendance system
Face recognition attendance system
 
Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection System
 
Face recognisation system
Face recognisation systemFace recognisation system
Face recognisation system
 
Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)
 
Face recognition attendance system
Face recognition attendance systemFace recognition attendance system
Face recognition attendance system
 
Project presentation by Debendra Adhikari
Project presentation by Debendra AdhikariProject presentation by Debendra Adhikari
Project presentation by Debendra Adhikari
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
 
Artificial Intelligence Face recognition attendance system using MATLAB
Artificial Intelligence Face recognition attendance system using MATLABArtificial Intelligence Face recognition attendance system using MATLAB
Artificial Intelligence Face recognition attendance system using MATLAB
 
FACE RECOGNITION ATTENDANCE SYSTEM (1) (1).pptx
FACE RECOGNITION ATTENDANCE SYSTEM (1) (1).pptxFACE RECOGNITION ATTENDANCE SYSTEM (1) (1).pptx
FACE RECOGNITION ATTENDANCE SYSTEM (1) (1).pptx
 
Student Database Management System
Student Database Management SystemStudent Database Management System
Student Database Management System
 
Face detection presentation slide
Face detection  presentation slideFace detection  presentation slide
Face detection presentation slide
 
Face recognition
Face recognitionFace recognition
Face recognition
 

Similar to Face Recognition Based Attendance System using Machine Learning

Attendance management system using face recognition
Attendance management system using face recognitionAttendance management system using face recognition
Attendance management system using face recognition
IAESIJAI
 
Face Recognition based Smart Attendance System Using IoT
Face Recognition based Smart Attendance System Using IoTFace Recognition based Smart Attendance System Using IoT
Face Recognition based Smart Attendance System Using IoT
IRJET Journal
 
Profile Identification through Face Recognition
Profile Identification through Face RecognitionProfile Identification through Face Recognition
Profile Identification through Face Recognition
ijtsrd
 
FACE EXPRESSION IDENTIFICATION USING IMAGE FEATURE CLUSTRING AND QUERY SCHEME...
FACE EXPRESSION IDENTIFICATION USING IMAGE FEATURE CLUSTRING AND QUERY SCHEME...FACE EXPRESSION IDENTIFICATION USING IMAGE FEATURE CLUSTRING AND QUERY SCHEME...
FACE EXPRESSION IDENTIFICATION USING IMAGE FEATURE CLUSTRING AND QUERY SCHEME...
Editor IJMTER
 
ADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCA
ADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCAADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCA
ADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCA
IAEME Publication
 
MTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITION
MTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITIONMTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITION
MTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITION
IRJET Journal
 
AUTOMATION OF ATTENDANCE USING DEEP LEARNING
AUTOMATION OF ATTENDANCE USING DEEP LEARNINGAUTOMATION OF ATTENDANCE USING DEEP LEARNING
AUTOMATION OF ATTENDANCE USING DEEP LEARNING
IRJET Journal
 
Implementation of Automatic Attendance Management System Using Harcascade and...
Implementation of Automatic Attendance Management System Using Harcascade and...Implementation of Automatic Attendance Management System Using Harcascade and...
Implementation of Automatic Attendance Management System Using Harcascade and...
IRJET Journal
 
IRJET - Real Time Facial Analysis using Tensorflowand OpenCV
IRJET -  	  Real Time Facial Analysis using Tensorflowand OpenCVIRJET -  	  Real Time Facial Analysis using Tensorflowand OpenCV
IRJET - Real Time Facial Analysis using Tensorflowand OpenCV
IRJET Journal
 
Image recognition
Image recognitionImage recognition
Image recognition
Joel Jose
 
Comparative Study of Enchancement of Automated Student Attendance System Usin...
Comparative Study of Enchancement of Automated Student Attendance System Usin...Comparative Study of Enchancement of Automated Student Attendance System Usin...
Comparative Study of Enchancement of Automated Student Attendance System Usin...
IRJET Journal
 
Utilization of Machine Learning in Computer Vision
Utilization of Machine Learning in Computer VisionUtilization of Machine Learning in Computer Vision
Utilization of Machine Learning in Computer Vision
IRJET Journal
 
IRJET - Facial Recognition based Attendance Management System
IRJET - Facial Recognition based Attendance Management SystemIRJET - Facial Recognition based Attendance Management System
IRJET - Facial Recognition based Attendance Management System
IRJET Journal
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
ijceronline
 
Next-Generation Attendance Management
Next-Generation Attendance ManagementNext-Generation Attendance Management
Next-Generation Attendance Management
IRJET Journal
 
Adversarial Multi Scale Features Learning for Person Re Identification
Adversarial Multi Scale Features Learning for Person Re IdentificationAdversarial Multi Scale Features Learning for Person Re Identification
Adversarial Multi Scale Features Learning for Person Re Identification
ijtsrd
 
Smart Door Access using Facial Recognition
Smart Door Access using Facial RecognitionSmart Door Access using Facial Recognition
Smart Door Access using Facial Recognition
ijtsrd
 
Face Annotation using Co-Relation based Matching for Improving Image Mining ...
Face Annotation using Co-Relation based Matching  for Improving Image Mining ...Face Annotation using Co-Relation based Matching  for Improving Image Mining ...
Face Annotation using Co-Relation based Matching for Improving Image Mining ...
IRJET Journal
 
Public Figure Recognition Using SVM and Computer Vision Techniques
Public Figure Recognition Using SVM and Computer Vision TechniquesPublic Figure Recognition Using SVM and Computer Vision Techniques
Public Figure Recognition Using SVM and Computer Vision Techniques
IRJET Journal
 

Similar to Face Recognition Based Attendance System using Machine Learning (20)

Attendance management system using face recognition
Attendance management system using face recognitionAttendance management system using face recognition
Attendance management system using face recognition
 
Face Recognition based Smart Attendance System Using IoT
Face Recognition based Smart Attendance System Using IoTFace Recognition based Smart Attendance System Using IoT
Face Recognition based Smart Attendance System Using IoT
 
Profile Identification through Face Recognition
Profile Identification through Face RecognitionProfile Identification through Face Recognition
Profile Identification through Face Recognition
 
FACE EXPRESSION IDENTIFICATION USING IMAGE FEATURE CLUSTRING AND QUERY SCHEME...
FACE EXPRESSION IDENTIFICATION USING IMAGE FEATURE CLUSTRING AND QUERY SCHEME...FACE EXPRESSION IDENTIFICATION USING IMAGE FEATURE CLUSTRING AND QUERY SCHEME...
FACE EXPRESSION IDENTIFICATION USING IMAGE FEATURE CLUSTRING AND QUERY SCHEME...
 
ADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCA
ADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCAADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCA
ADVANCED FACE RECOGNITION FOR CONTROLLING CRIME USING PCA
 
MTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITION
MTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITIONMTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITION
MTCNN BASED AUTOMATIC ATTENDANCE SYSTEM USING FACE RECOGNITION
 
AUTOMATION OF ATTENDANCE USING DEEP LEARNING
AUTOMATION OF ATTENDANCE USING DEEP LEARNINGAUTOMATION OF ATTENDANCE USING DEEP LEARNING
AUTOMATION OF ATTENDANCE USING DEEP LEARNING
 
Implementation of Automatic Attendance Management System Using Harcascade and...
Implementation of Automatic Attendance Management System Using Harcascade and...Implementation of Automatic Attendance Management System Using Harcascade and...
Implementation of Automatic Attendance Management System Using Harcascade and...
 
IRJET - Real Time Facial Analysis using Tensorflowand OpenCV
IRJET -  	  Real Time Facial Analysis using Tensorflowand OpenCVIRJET -  	  Real Time Facial Analysis using Tensorflowand OpenCV
IRJET - Real Time Facial Analysis using Tensorflowand OpenCV
 
Image recognition
Image recognitionImage recognition
Image recognition
 
Comparative Study of Enchancement of Automated Student Attendance System Usin...
Comparative Study of Enchancement of Automated Student Attendance System Usin...Comparative Study of Enchancement of Automated Student Attendance System Usin...
Comparative Study of Enchancement of Automated Student Attendance System Usin...
 
G041041047
G041041047G041041047
G041041047
 
Utilization of Machine Learning in Computer Vision
Utilization of Machine Learning in Computer VisionUtilization of Machine Learning in Computer Vision
Utilization of Machine Learning in Computer Vision
 
IRJET - Facial Recognition based Attendance Management System
IRJET - Facial Recognition based Attendance Management SystemIRJET - Facial Recognition based Attendance Management System
IRJET - Facial Recognition based Attendance Management System
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
 
Next-Generation Attendance Management
Next-Generation Attendance ManagementNext-Generation Attendance Management
Next-Generation Attendance Management
 
Adversarial Multi Scale Features Learning for Person Re Identification
Adversarial Multi Scale Features Learning for Person Re IdentificationAdversarial Multi Scale Features Learning for Person Re Identification
Adversarial Multi Scale Features Learning for Person Re Identification
 
Smart Door Access using Facial Recognition
Smart Door Access using Facial RecognitionSmart Door Access using Facial Recognition
Smart Door Access using Facial Recognition
 
Face Annotation using Co-Relation based Matching for Improving Image Mining ...
Face Annotation using Co-Relation based Matching  for Improving Image Mining ...Face Annotation using Co-Relation based Matching  for Improving Image Mining ...
Face Annotation using Co-Relation based Matching for Improving Image Mining ...
 
Public Figure Recognition Using SVM and Computer Vision Techniques
Public Figure Recognition Using SVM and Computer Vision TechniquesPublic Figure Recognition Using SVM and Computer Vision Techniques
Public Figure Recognition Using SVM and Computer Vision Techniques
 

More from YogeshIJTSRD

Cosmetic Science An Overview
Cosmetic Science An OverviewCosmetic Science An Overview
Cosmetic Science An Overview
YogeshIJTSRD
 
Standardization and Formulations of Calotropis Procera
Standardization and Formulations of Calotropis ProceraStandardization and Formulations of Calotropis Procera
Standardization and Formulations of Calotropis Procera
YogeshIJTSRD
 
Review of the Diagnosis and Treatment of Paralysis
Review of the Diagnosis and Treatment of ParalysisReview of the Diagnosis and Treatment of Paralysis
Review of the Diagnosis and Treatment of Paralysis
YogeshIJTSRD
 
Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...
Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...
Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...
YogeshIJTSRD
 
Criminology Educators Triumphs and Struggles
Criminology Educators Triumphs and StrugglesCriminology Educators Triumphs and Struggles
Criminology Educators Triumphs and Struggles
YogeshIJTSRD
 
A Review Herbal Drugs Used in Skin Disorder
A Review Herbal Drugs Used in Skin DisorderA Review Herbal Drugs Used in Skin Disorder
A Review Herbal Drugs Used in Skin Disorder
YogeshIJTSRD
 
Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...
Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...
Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...
YogeshIJTSRD
 
A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...
A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...
A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...
YogeshIJTSRD
 
Data Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption StandardData Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption Standard
YogeshIJTSRD
 
Antimicrobial and Phytochemical Screening of Phyllantus Niruri
Antimicrobial and Phytochemical Screening of Phyllantus NiruriAntimicrobial and Phytochemical Screening of Phyllantus Niruri
Antimicrobial and Phytochemical Screening of Phyllantus Niruri
YogeshIJTSRD
 
Heat Sink for Underground Pipe Line
Heat Sink for Underground Pipe LineHeat Sink for Underground Pipe Line
Heat Sink for Underground Pipe Line
YogeshIJTSRD
 
Newly Proposed Multi Channel Fiber Optic Cable Core
Newly Proposed Multi Channel Fiber Optic Cable CoreNewly Proposed Multi Channel Fiber Optic Cable Core
Newly Proposed Multi Channel Fiber Optic Cable Core
YogeshIJTSRD
 
Security Sector Reform toward Professionalism of Military and Police
Security Sector Reform toward Professionalism of Military and PoliceSecurity Sector Reform toward Professionalism of Military and Police
Security Sector Reform toward Professionalism of Military and Police
YogeshIJTSRD
 
Stress An Undetachable Condition of Life
Stress An Undetachable Condition of LifeStress An Undetachable Condition of Life
Stress An Undetachable Condition of Life
YogeshIJTSRD
 
Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...
Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...
Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...
YogeshIJTSRD
 
To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...
To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...
To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...
YogeshIJTSRD
 
Novel Drug Delivery System An Overview
Novel Drug Delivery System An OverviewNovel Drug Delivery System An Overview
Novel Drug Delivery System An Overview
YogeshIJTSRD
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
YogeshIJTSRD
 
Comparative Analysis of Different Numerical Methods for the Solution of Initi...
Comparative Analysis of Different Numerical Methods for the Solution of Initi...Comparative Analysis of Different Numerical Methods for the Solution of Initi...
Comparative Analysis of Different Numerical Methods for the Solution of Initi...
YogeshIJTSRD
 
Evaluation of Different Paving Mixes Using Optimum Stabilizing Content
Evaluation of Different Paving Mixes Using Optimum Stabilizing ContentEvaluation of Different Paving Mixes Using Optimum Stabilizing Content
Evaluation of Different Paving Mixes Using Optimum Stabilizing Content
YogeshIJTSRD
 

More from YogeshIJTSRD (20)

Cosmetic Science An Overview
Cosmetic Science An OverviewCosmetic Science An Overview
Cosmetic Science An Overview
 
Standardization and Formulations of Calotropis Procera
Standardization and Formulations of Calotropis ProceraStandardization and Formulations of Calotropis Procera
Standardization and Formulations of Calotropis Procera
 
Review of the Diagnosis and Treatment of Paralysis
Review of the Diagnosis and Treatment of ParalysisReview of the Diagnosis and Treatment of Paralysis
Review of the Diagnosis and Treatment of Paralysis
 
Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...
Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...
Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...
 
Criminology Educators Triumphs and Struggles
Criminology Educators Triumphs and StrugglesCriminology Educators Triumphs and Struggles
Criminology Educators Triumphs and Struggles
 
A Review Herbal Drugs Used in Skin Disorder
A Review Herbal Drugs Used in Skin DisorderA Review Herbal Drugs Used in Skin Disorder
A Review Herbal Drugs Used in Skin Disorder
 
Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...
Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...
Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...
 
A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...
A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...
A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...
 
Data Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption StandardData Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption Standard
 
Antimicrobial and Phytochemical Screening of Phyllantus Niruri
Antimicrobial and Phytochemical Screening of Phyllantus NiruriAntimicrobial and Phytochemical Screening of Phyllantus Niruri
Antimicrobial and Phytochemical Screening of Phyllantus Niruri
 
Heat Sink for Underground Pipe Line
Heat Sink for Underground Pipe LineHeat Sink for Underground Pipe Line
Heat Sink for Underground Pipe Line
 
Newly Proposed Multi Channel Fiber Optic Cable Core
Newly Proposed Multi Channel Fiber Optic Cable CoreNewly Proposed Multi Channel Fiber Optic Cable Core
Newly Proposed Multi Channel Fiber Optic Cable Core
 
Security Sector Reform toward Professionalism of Military and Police
Security Sector Reform toward Professionalism of Military and PoliceSecurity Sector Reform toward Professionalism of Military and Police
Security Sector Reform toward Professionalism of Military and Police
 
Stress An Undetachable Condition of Life
Stress An Undetachable Condition of LifeStress An Undetachable Condition of Life
Stress An Undetachable Condition of Life
 
Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...
Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...
Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...
 
To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...
To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...
To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...
 
Novel Drug Delivery System An Overview
Novel Drug Delivery System An OverviewNovel Drug Delivery System An Overview
Novel Drug Delivery System An Overview
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
Comparative Analysis of Different Numerical Methods for the Solution of Initi...
Comparative Analysis of Different Numerical Methods for the Solution of Initi...Comparative Analysis of Different Numerical Methods for the Solution of Initi...
Comparative Analysis of Different Numerical Methods for the Solution of Initi...
 
Evaluation of Different Paving Mixes Using Optimum Stabilizing Content
Evaluation of Different Paving Mixes Using Optimum Stabilizing ContentEvaluation of Different Paving Mixes Using Optimum Stabilizing Content
Evaluation of Different Paving Mixes Using Optimum Stabilizing Content
 

Recently uploaded

Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 

Recently uploaded (20)

Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 

Face Recognition Based Attendance System using Machine Learning

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 5 Issue 3, March-April 2021 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD39856 | Volume – 5 | Issue – 3 | March-April 2021 Page 364 Face Recognition Based Attendance System using Machine Learning Benazir Begum A1, Sreeyuktha R2, Haritha M P2, Vishnuprasad2 1Assistant Professor, 2B Tech Student-CSE, 1,2Department of Computer Science and Engineering, Hindusthan Institute of Technology, Coimbatore, Tamil Nadu, India ABSTRACT In the era of modern technologies emerging at rapid pace there is no reason why a crucial event in education sector such as attendance should be done in the old boring traditional way. Attendance monitoringsystemwill savea lotof time and energy for the both parties teaching staff as well as the students. Attendance will be monitoredbytheface recognitionalgorithm byrecognizing only the face of the students from the rest of the objects and then marking the students as present. The system will be pre feed with the images of all the students enrolled in the class and with the help of this pre feed data the algorithm will detect the students who are present and match the features with the already saved images of the students in the database. KEYWORDS: Face Detection, Face Recognition, Viola-Jones, LBPH How to cite this paper: Benazir Begum A | Sreeyuktha R | Haritha M P | Vishnuprasad "Face Recognition Based Attendance System using Machine Learning" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-5 | Issue-3, April 2021, pp.364-368, URL: www.ijtsrd.com/papers/ijtsrd39856.pdf Copyright © 2021 by author(s) and International Journal ofTrendinScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative CommonsAttribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0) I. INTRODUCTION Over the latest couple of decades, facial recognitionhasbeen considered the champion among the mostbasicapplications contrasted with other biometric-based frameworks. The facial recognition procedure can be expressed as pursues: given a database comprising of many face pictures of known individuals, one sources of info a face picture, and the procedure intends to check or decide the character of the individual in the information picture. Biometric-based systems have been created as the mostableoptionforseeing individuals generally, as opposed to affirming people and yielding them access to physical and virtual spaces dependent on passwords, PINs, sharp cards, plastic cards, tokens, keys and so on.,. These techniques break down an individual's physiological just as conduct properties with a particular ultimate objective to choose and additionally discover his/her personality. Passwords and PINs are hard to recall and can be taken or estimated; cards, tokens, scratches, etc can be lost, disregarded, purloined or duplicated; appealing cards can twist up discernibly corrupted and confused. Notwithstanding,thecharacteristic science of individuals can't be lost, disregarded, taken, or made. A few models incorporate physiological qualitiesof an individual, for example, facial pictures, fingerprints, finger geometry, hand geometry, hand veins, palm, iris, retina, ear and voice and conduct characteristics, for example, gait, signature, and keystroke elements, which are utilized in biometric techniques for individual check or distinguishing proof particularly for security frameworks. Security applications have seen a colossal improvement during the most recent couple of decades, which is a characteristic aftereffect of the mechanical upheaval in all fields, particularly in savvy condition divisions. Face includes in face recognition for singular ID are viewed as a significant technique for the biometric region. These days, if an individual shows up in a video or computerized picture,they can be consequently distinguished by Facial Recognition System (FRS), which is a noteworthy procedure to improve security issues. As of late, numerous scientists concentrated on face recognition techniques. Face recognition is a significant piece of the capacity of human discernment framework and is a standard assignment for people, while building a comparative computational model of face recognition. The computational model add to hypothetical bits of knowledge as well as to numerous commonsense applications like mechanized group observation, get to control, plan of human PC interface (HCI), content based picture database the executives,criminal recognizableproof, etc. Face recognition is an activity that people perform routinely and easily in our day by day lives. The individual recognizable proof for the face that shows up in the info information is the face recognition process.Facerecognition process is appeared in Fig1.1 IJTSRD39856
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD39856 | Volume – 5 | Issue – 3 | March-April 2021 Page 365 Fig1.1 In the above fig shows the flowchart of the project. II. METHODS 2(i) Django Django is a python-based free and open-source web framework that follows the model-template-views (MTV) architectural pattern. It is maintained by the Django Software Foundation (DSF), an American independent organization established. Django's primary goal is to ease the creation of complex, database-driven websites. The framework emphasizes reusability and "pluggability" of components, less code, low coupling, rapid development, and the principle of don't repeat yourself. Python isusedthroughout, evenforsettings, files, and data models. Django also provides an optional administrative create, read, update and delete interfacethat is generated dynamically through introspection and configured via admin models. 3(ii)SQL SQL is a domain-specific language used inprogrammingand designed for managing data held in a relational database management system (RDBMS), or for stream processing in a relational data stream management system (RDSMS). It is particularly useful in handling structured data, that is data incorporating relations among entities and variables.SQL offers two main advantages over older read–write APIs such as ISAM or VSAM. Firstly, it introduced the concept of accessing many records with one singlecommand.Secondly, it eliminates the need to specify how to reach a record, e.g. with or without an index. 3(iii) React (JavaScript library) React (also known as React.js or ReactJS) is an open- source, front end, JavaScript library for building user interfaces or UI components. It is maintained by Facebook and a community of individual developers and companies. React can be used as a base in the development of single- page or mobile applications. However, React is only concerned with state management and rendering that state to the DOM, so creating React applications usually requires the use of additional libraries for routing. React Router is an example of such a library. 3(iv) System implementation The proposed system has beenimplementedwiththehelpof three basic steps: A. detect and extract face image and save the face information in an xml file for future references. B. Learn and train the face image and calculate eigen value and eigen vector of that image. C. Recognise and match face images with existing face images information stored in xml file . 3(v). Python Python is an interpreted, high-level and general-purpose programming language. Python's design philosophy emphasizes code readability with its notable use of significantindentation.Its languageconstructs and object- oriented approach aim to help programmers write clear, logical code for small and large-scale projects. Python is dynamically-typed and garbage-collected. It supports multiple programming paradigms, including structured (particularly, procedural), object-oriented and functional programming. Python is often described as a "batteries included" language due to its comprehensive standard library. III. PROPOSED SYSTEM Fig 1: Block Diagram for Attendance Monitoring System Using Face Recognition For the training data collection, multiple photographs of students are taken. This dataset isusedtocompare real-time photos recorded in the classroom with matched data and to mark attendance. Preprocessing is applied to the captured images. The aim of image preprocessing is to improveimage data by suppressing unwanted distortions or enhancing certain image features that are important for further processing .Image pre-processing includes background subtraction and conversion of image into grayscale. Generally the background of an image does not move i.e. it remains static. Hence the backgroundissubtractedina setof image. Before subtracting the background, image is converted into grayscale. Thisisdonetogetgoodaccuracyin detecting faces. Features are extracted from detected faces and cropped images of faces are stored for comparison. Feature extraction is a type of dimensionality reductionthat efficiently represents interesting parts of an image as a compact feature vector. This approach is useful when image sizes are large and a reduced feature representation is required to quickly complete tasks such as image matching and retrieval. After that images of students in classroom are captured to mark attendance of students present in the classroom. These images also goesthroughpreprocessingas well as face detection process. Faces detected in classroom images are compared with the images in original dataset. If the match is found then that students roll number and name will be added in lit of present students. Face recognition technique is used for matching purpose. Face Detection: Face detection is a computer technology being used in a variety of applications that identifies human faces in digital images. Face detection step will detect faces in captured images so that these faces can be used for comparison. For facedetectionViola-Jonesalgorithmisused. Viola-Jones Algorithm: The Viola-Jones algorithm is a widely used mechanism for object detection. The main property of this algorithm is that training is slow, but detection is fast. This algorithm uses Haar basis feature filters. The efficiency of the Viola-Jones algorithm can be significantly increased by first generatingtheintegral image.
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD39856 | Volume – 5 | Issue – 3 | March-April 2021 Page 366 There are four main contributions of object detection framework which are listed below 1. Haar features 2. Integral Image 3. Adaboost algorithm 4. Cascading Face Recognition: With the facial images alreadyextracted, cropped, resized and usually converted tograyscale,theface recognition algorithm is responsible for finding characteristics which best describe the image. ▪ There are different types of face recognition algorithms, for example: Eigen faces, LBPH (Local binary patternshistograms),Fisher faces. Out of these algorithms LBPH is most suitable for the proposed system. Local Binary Pattern (LBP) is a simple yet very efficient texture operator which labels the pixels of an image by thresholding the neighbourhood of each pixel and considers the result as a binary number. Steps involved in LBPH: 1. Parameters: Radius, Neighbour, Grid X, Grid Y. 2. Training the algorithm 3. Applying the LBP operation 4. Extracting the histograms 5. Performing the face recognition IV. USES AND POTENTIAL RISKS OF FACIAL RECOGNITION ALGORITHMS Fields of application of facial recognition for machine learning and AI are plenty. The most common ones are related to security and surveillance (law enforcement agencies or airports), social media (selling data, personalization), banking and payments, smart homes and for providing personalizedmarketingexperiences.Although, it is not the whole picture. There are more subtle ways in which face recognition algorithms are changing our everyday life in meaningful ways too, proving that this technology is still far from infallible. A famous deep fakes software, which swaps faces of individuals in videos, has alreadybeenused bya politicianof India's ruling party to gain favor in elections. In China, facial recognition system mistook a famous businesswoman'sface printed on the bus for a jaywalker and automatically wrote her a fine. Numerous studies in the USA and UK proved that facial recognition AI has significant troubles recognizing non-white faces, is often biased on gender and identifies "false positives" the majority of time, increasing probability of grievous consequences. V. FLOWCHART A flowchart is a diagram that depicts a process, system or computer algorithm. They are widely used in multiple fields to document, study, plan, improve and communicate often complex processes in clear, easy-to-understand diagrams. Flowcharts, sometimesspelledasflowcharts,userectangles, ovals, diamonds and potentially numerous other shapes to define the type of step, along with connecting arrows to define flow and sequence.Theycanrangefromsimple,hand- drawn charts to comprehensive computer-drawn diagrams depicting multiple steps and routes. If we consider all the various forms of flowcharts, they are one of the most common diagrams on the planet, used by both technical and non-technical people in numerous fields. In the fig 7.1 is the brief flowchart for the face recognization. A. Face Detection and Extract B. Learn and Train Face Images C. Recognise and Identification Flow Chart Fig 7.1 VI. EXPERIMENT AND RESULT For face recognition implementation, the following results were obtained – 6.1. User Interface It contains list of menu items which can be accessed to have the complete view of the system. The system takes the input such as Id and name of the students for registrationpurpose. The ‘Take Images’ button is used to capturetheimagesofthe students. ‘Train System’ button is used to train the captured images. ‘Take Attendance’ button is used to store the attendance results in an excel sheet. Fig 2 shows the registration page Fig 2 User Interface
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD39856 | Volume – 5 | Issue – 3 | March-April 2021 Page 367 6.2. Face Detection Multiple images of the students are captured and the images are pre-processed for detecting onlythefacesofthestudents.Fig 3 shows Face Detection. Fig 3 Face Detecction 6.3. Training The captured images of the students are stored in a local database. The stored images are trained and are assigned corresponding labels such as Id and name. Fig 4 shows multiple images stored in a database. Fig 4 Dataset of Images 6.4. Face Recognition On carrying out the recognition process, feature comparisontakesplacewithrespecttothefeaturesstoredinthedatabase.The face is displayed along with corresponding roll no and the name of the student and used for marking the attendance. Fig 5 shows the Face Recognition. Fig 5 Face Recognition 6.5. Attendance Results stored in an excel sheet The corresponding attendance of the students is stored in an excel sheet. Fig 6 shows the Attendance Results.
  • 5. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD39856 | Volume – 5 | Issue – 3 | March-April 2021 Page 368 The step of the experiments process are given below: 1. Face Detection: Start capturing images through web camera of the client side: Begin: //Pre-process the captured image and extract face image //calculate the eigen value of the captured face image and compared with eigen values of existing facesinthedatabase. //If eigen value does not matched with existing ones, save the new face image information to the face database (xml file). //If eigen value matched with existing one then recognition step will done. End; 2. Face Recognition: Using PCA algorithm the following steps would be followed in for face recognition: Begin: // Find the face information of matched face image in from the database. // update the log table with corresponding face image and system time that makes completion of attendance for an individual students. end; VII. FUTURE SCOPE Almost all academic institutions require attendance record of students and maintaining attendance manually can be hectic as well as time consuming task. Hence maintaining attendance automatically with the help of face recognition will be very helpful and less prone to errors as compared to manual process. This will also reduce manipulation of attendance record done by students and it will save time as well. The future scope of the proposed work can be, capturing multiple detailed images of the studentsandusing any cloud technology to store these images. The system can be configured and used in Atm machines to detect frauds. Also, the system can be used at the time of elections where the voter can be identified by recognizing the face. VIII. CONCLUSION This paper introduces the efficient method of attendance management system in the classroom environment that can replace the old manual methods. This method is secure enough, reliable, accurate and efficient. There is no need for specialized hardware for installing the system in the classroom. It can be constructed using a camera and computer. There is a need to use some algorithms that can recognize the faces in veil to improve the system performance. REFERENCES [1] ShireeshaChintalapati, M. V. Raghunadh, Automated Attendance Management System Based on Face Recognition Algorithms, 2013 IEEE International Conference on Computational Intelligence and ComputingResearch,978-1-4799-1597-2/13/$31.00 ©2013 IEEE. [2] Aftabahmed, Jiandongguo, Fayazali, Farhadeeba, Awaisahmed,LBPHBasedImprovedFaceRecognition At Low Resolution, International Conference on Artificial IntelligenceandBig Data,978-1-5386-6987- 7/18/$31.00 ©2018 IEEE [3] HajarFilali Jamal RiffiAdnane Mohamed Mahraz Hamid Tairi, Multiple face detection based on machine learning, 978-1-5386-4396-9/18/$31.00 c 2018 IEEE [4] Automatic Face Recognition System using Pattern Recognition Techniques:ASurveyNingthoujamSunita Devi ProfK.hemachandran Department of Computer Science Department of Computer Science Assam University, Silchar-788011AssamUniversity, Silchar- 788011 [5] Shubhobrata Bhattacharya,GowthamSandeepNainala, Prosenjit Das and AurobindaRoutray, Smart Attendance Monitoring System (SAMS): A Face Recognition based Attendance System for Classroom Environment, 2018 IEEE 18th International Conference on Advanced Learning Technologies, 2161- 377X/18/$31.00 ©2018 IEEE DOI 10.1109/ICALT.2018.00090 [6] HariharaSantoshDadi, Gopala Krishna Mohan Pillutla Improved Face Recognition Rate Using HOG Features and SVM Classifier. IOSR Journal of Electronics and Communications Engineering, Vol. 11, Issue 4, pp 34- 44, July 2019. [7] NavneetDalal and Bill Triggs Histograms of Oriented Gradients for Human Detection. Proceedings of the 2019 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. 2019. [8] O. Deniz, G. Bueno, J. Salido, F. De La Torre Face recognition using Histogram of Oriented Gradients. Pattern Recognition Letters. 2011. [9] Jacky Efendi, MuhammadIhsanZul, WawanYunanto, Real Time Face Recognition using Eigenface and Viola-Jones Face Detector, INTERNATIONAL JOURNAL ON INFORMATICS VISUALIZATION ,Vol 1 (2017) NO 1,e-ISSN : 2549- 9904,ISSN : 2549-9610 [10] HemantkumarRathod, Yudhisthir Ware, Snehal Sane, Suresh Raulo, Vishal Pakhare and Imdad A. Rizvi, Automated Attendance System using Machine Learning Approach, 2017 InternationalConferenceon NascentTechnologiesintheEngineeringField(ICNTE- 2017), 978-1-5090-2794- 1/17/$31.00 ©2017 IEEE