SlideShare a Scribd company logo
“REAL TIME FACE RECOGNITION IMPLEMENTATION
ON ATTENDANCE SYSTEM”
(RESEARCH BASED MACHINE LEARNING PROJECT)
Debendra Adhikari
Supervisor: Manoj Shrestha
Committee Members: Som Prasad Shrestha
Prakash Ranabhat
Pradeep Acharya
IT PROJECT I : PROPOSAL DEFENSE
Department of Computer Science (BCS)
Infrastructure University Kuala Lumpur
August 22,2018
Overview
 Introduction to Face Recognition System
 Literature Review
 Statement of Problem
 Functional and Non Functional Requirements
 Objective
 Method of Development/Methodology- Design
 Work Plan
 Conclusion
 Simulation View
 References
Introduction
 Face detection is the base for face tracking and face
recognition.
Related to the Biometrics and Computer Vision
Programming.
One of the challenging task in pattern recognition
research.
In face recognition there are 2 types of
comparisons:
Continued…
Verification and Identification.
Four steps involved during identification and
authentication:
 Capture
 Extraction
 Comparison
 Checking Match
Facial Recognition…?
It requires no physical interaction on behalf of the user.
It is accurate and allows for high enrolment and
verification rates.
It can use existing hardware infrastructure, existing
cameras.
How Facial Recognition Systems
work.??
The Software/Model measures:
Distance between the eyes
Width of the nose
Depth of eye sockets
The shape of the cheekbones
The length of jaw line
These creates a numerical code, called a face print
representing the face in database.
Literature Review
In the 1960s, scientists began work on using the computer to recognize
human faces.
 Since then, facial recognition software has come a long way.
 Facial recognition software is based on the ability to recognize a face and
then measure the various features of the face.
 Every face has numerous, distinguishable landmarks, the different peaks
and valleys .
 The proposed system is based on the Python using various modules and
library like NumPy ,OpenCV during the initial prototype test and using
CNN(Deep Learning).
Literature Review : History
 In 1960s, the first semi-automated system for facial
recognition to locate the features(such as eyes, ears, nose and
mouth) on the photographs.
 In 1970s, Goldstein and Harmon used 21 specific subjective
markers such as hair color and lip thickness to automate the
recognition.
 In 1988, Kirby and Sirovich used standard linear algebra
technique, to the face recognition.
Literature Review : Face Recognition
Features
Face RecognitionFace Recognition
Global FeaturesLocal Features
LDAGaborLBP PCA
Literature Review : Face Recognition
Features
Global Features:
 Focus on whole Entire Image
 Less Accuracy
Local Features:
 Focus on the local features of the face, which help to
identify and verify the person
 More Accuracy
Proposed Solution : LBP Analysis
LBP Analysis :
Getting each
pixel of an
image as a
block in matrix
Result in
Decimal
number format
Result in
Binary number
format
Threshold each
matrix pixels
with the center
pixel of the
image
Figure : LPB Threshold
Working Process
Input Image
Face
Detection
Database Face
Recognition
Match/not-
match
Compare
Figure :Working Process of the Proposed Model
Statement of Problem
Face recognition is not an easy task for computers as we human .
The accompanying problem have existed for computer vision and
the project is based on research to solve the problems:
 Pose variation (outward appearance and facial position)
 Illumination conditions
 Scale changeability
 Images taken years apart
 Glasses, Moustaches, Beards
 Low quality image acquisition
 Partially occluded faces.
.
Continued…
 Invariant Pose of Face induce very large changes in face
appearance.
 Recognition rates fall drastically when images from two
different poses of same person are matched.
 Almost all the face databases have frontal faces. So for non-
frontal faces features we require many train sets of data.
 Here our proposed system is initially based on LBP Classifier for
prototype which is faster and more accurate.
Continued…
 LBP is a visual/texture descriptor, and our faces are also
composed of micro visual patterns.
 LBP features are extracted to form a feature vector that classifies
a face from a non-face.
Functional Requirements
 User (Lecturer) should be able to create their own account
with their respective course name, course code and
designation.
 User (Lecturer) should be able to set the calendar date of
the particular day and open the webcam.
 User (Administration) should be able to download/extract
the excel sheet of the present student.
Non -Functional
Requirements
 Usability
 Accuracy
 Reliability
 Supportability
Objective
The main objectives of this project are enlisted below:
 To gain deeper understanding of OpenCV, Python, NumPy and
Machine Learning Models.
 To gain insights of Supervised and Unsupervised Learning.
 To create a model to detect the face of Student and recognize
them with their name.
 To learn the various tools and modern technologies of Computer
Vision Application.
Continued…
 To learn the time management skills necessary to perform during
the Project days that will help us to gain the necessary
organizational skills.
 To establish a platform for other to create and work on machine
learning projects or share the related knowledge's.
Methodology
For the project ,Prototyping Model will be used based on Testing
the initial model using Python and OpenCV.
Figure : Prototyping Model
System Model
Use case Model
Identifying Actors
Proposed Face Recognition Implementation on Attendance
system consists of the following Actors.
User (Lecturer)
The end user that will use the system for taking attendance.
System Admin
Administrator of the overall system who can train the model with training
images and perform the necessary maintenance and operation.
Figure: Use Case Diagram
Activity Diagram
Figure : Activity Diagram
Sequence Diagram
Figure : Sequence Diagram I
Sequence Diagram
Figure : Sequence Diagram II
Class Diagram
Figure : Class Diagram
Work Plan
Project plan Using Gantt Chart.
Work Plan
Revised Project Plan .
Required Tools and Technologies
Here, is a list of minimum hardware requirements:
 Intel Pentium Processor, or other of 1GHz or greater
(64bit system configuration recommended).
 Minimum 128MB of RAM capacity or more.
 Minimum 32MB Graphic Card RAM capacities or more.
 Recommended Hard disk space of 500GB or more.
Continue…
Here is a list of software requirements:
 Windows 7 or above, Linux, Mac OS X.
 Python 2.5 or Python 3.3
 Jupyter Notebook
 OpenCV 3
Application
 Security/Counterterrorism. Access control, comparing
surveillance images to know terrorist.
 Day Care: Verify identity of individuals picking up the
children.
 Residential Security: Alert homeowners of approaching
personnel.
 Voter verification: Where eligible citizens are required to
verify their identity during a voting process.
 Banking using ATM: The software is able to quickly verify a
customer’s face.
Current Status
 Completed all Analysis and Requirement
Collection.
 Completed the Design and Simulation for
Initial Prototype.
 Collecting Data and around 5GB of facial data
has been collected from various sources.
 Working on creating the database for training
images.
Simulation
Let see the first initial simulation………….
Future Plan
 Smart Email Notifications to the Parents.
Conclusion
 LBP(Local Binary Pattern) is used to extract
the local features in the face and match it
with the most similar face in the image
database.
 Based on Research on Various Classifier of
OpenCV and Implement the best one on the
attendance system for maximum accuracy.
References
 S. Kherchaoui and A. Houacine, 2010, “Face Detection Based On A
Model Of The Skin Color With Constraints And Template Matching”,
Proc. 2010 International Conference on Machine and Web
Intelligence, pp. 469 - 472, Algiers, Algeria.
 http://ecomputernotes.com/software-engineering/explain-
prototyping-model Prototyping model in Software Engineering.
 History- www.biometrics.gov
 Brian C. Becker, Enrique G.Ortiz, “Evaluation of Face
Recognition Techniques for Application to Facebook ” IEEE,
2008.
 Solem, J. E. (2012). “Programming Computer Vision”.
Any
Questi
ons
Any
Questions….?
Project presentation by Debendra Adhikari

More Related Content

What's hot

Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection System
Abhiroop Ghatak
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1leenak770
 
Face detection ppt
Face detection pptFace detection ppt
Face detection ppt
Pooja R
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
Shravan Halankar
 
Face recognization
Face recognizationFace recognization
Face recognization
leenak770
 
Face recognition
Face recognitionFace recognition
Face recognition
sandeepsharma1193
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemKarmesh Maheshwari
 
Face recognisation system
Face recognisation systemFace recognisation system
Face recognisation system
Saumya Ranjan Behura
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
raihansikdar
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
Zara Tariq
 
Facial Expression Recognition System using Deep Convolutional Neural Networks.
Facial Expression Recognition  System using Deep Convolutional Neural Networks.Facial Expression Recognition  System using Deep Convolutional Neural Networks.
Facial Expression Recognition System using Deep Convolutional Neural Networks.
Sandeep Wakchaure
 
Face recognition Face Identification
Face recognition Face IdentificationFace recognition Face Identification
Face recognition Face Identification
Kalyan Acharjya
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
Yogesh Lamture
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
ranjit banshpal
 
Attendance Using Facial Recognition
Attendance Using Facial RecognitionAttendance Using Facial Recognition
Attendance Using Facial Recognition
Vikramaditya Tarai
 
Face recognition attendance system using Local Binary Pattern (LBP)
Face recognition attendance system using Local Binary Pattern (LBP)Face recognition attendance system using Local Binary Pattern (LBP)
Face recognition attendance system using Local Binary Pattern (LBP)
journalBEEI
 
Facial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptxFacial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptx
kakimetu
 
Face recognition
Face recognition Face recognition
Face recognition
Chandan A V
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
Mazin Alwaaly
 

What's hot (20)

Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection System
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1
 
Face detection ppt
Face detection pptFace detection ppt
Face detection ppt
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face recognization
Face recognizationFace recognization
Face recognization
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance System
 
Face recognisation system
Face recognisation systemFace recognisation system
Face recognisation system
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
 
Facial Expression Recognition System using Deep Convolutional Neural Networks.
Facial Expression Recognition  System using Deep Convolutional Neural Networks.Facial Expression Recognition  System using Deep Convolutional Neural Networks.
Facial Expression Recognition System using Deep Convolutional Neural Networks.
 
Face recognition Face Identification
Face recognition Face IdentificationFace recognition Face Identification
Face recognition Face Identification
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Attendance Using Facial Recognition
Attendance Using Facial RecognitionAttendance Using Facial Recognition
Attendance Using Facial Recognition
 
Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
 
Face recognition attendance system using Local Binary Pattern (LBP)
Face recognition attendance system using Local Binary Pattern (LBP)Face recognition attendance system using Local Binary Pattern (LBP)
Face recognition attendance system using Local Binary Pattern (LBP)
 
Facial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptxFacial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptx
 
Face recognition
Face recognition Face recognition
Face recognition
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
 

Similar to Project presentation by Debendra Adhikari

Face Scope.pptx
Face Scope.pptxFace Scope.pptx
Face Scope.pptx
AymanRedabelal
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face Identification
IRJET Journal
 
Comparative Analysis of Face Recognition Methodologies and Techniques
Comparative Analysis of Face Recognition Methodologies and TechniquesComparative Analysis of Face Recognition Methodologies and Techniques
Comparative Analysis of Face Recognition Methodologies and Techniques
Farwa Ansari
 
Face Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image ProcessingFace Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image Processing
paperpublications3
 
IRJET- Digiyathra
IRJET-  	  DigiyathraIRJET-  	  Digiyathra
IRJET- Digiyathra
IRJET Journal
 
CS201.Lect02.ComputerVision and its function.ppt
CS201.Lect02.ComputerVision and its function.pptCS201.Lect02.ComputerVision and its function.ppt
CS201.Lect02.ComputerVision and its function.ppt
rajmannapronoy
 
184
184184
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face Recognition
IRJET Journal
 
Face Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image ProcessingFace Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image Processing
paperpublications3
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition application
awadhesh kumar
 
Human Face Detection And Identification Of Facial Expressions Using MATLAB
Human Face Detection And Identification Of Facial Expressions Using MATLABHuman Face Detection And Identification Of Facial Expressions Using MATLAB
Human Face Detection And Identification Of Facial Expressions Using MATLAB
NIET Journal of Engineering & Technology (NIETJET)
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCV
IRJET Journal
 
1410482042(Farhat Tasnim) & 1621802042(K.M.H.Mubin) sec 11.pptx
1410482042(Farhat Tasnim) & 1621802042(K.M.H.Mubin) sec 11.pptx1410482042(Farhat Tasnim) & 1621802042(K.M.H.Mubin) sec 11.pptx
1410482042(Farhat Tasnim) & 1621802042(K.M.H.Mubin) sec 11.pptx
pproject345
 
Photograph Database management report
Photograph Database management reportPhotograph Database management report
Photograph Database management report
Amrit Ranjan
 
Lecture 1 computer vision introduction
Lecture 1 computer vision introductionLecture 1 computer vision introduction
Lecture 1 computer vision introduction
cairo university
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition System
StudentRocks
 
Paper of Final Year Project.pdf
Paper of Final Year Project.pdfPaper of Final Year Project.pdf
Paper of Final Year Project.pdf
MuhammadAsfandyarJan1
 
Face Recognition Human Computer Interaction
Face Recognition Human Computer InteractionFace Recognition Human Computer Interaction
Face Recognition Human Computer Interaction
ines beltaief
 
Python Project.pptx
Python Project.pptxPython Project.pptx
Python Project.pptx
TimePass720676
 
Pattern recognition
Pattern recognitionPattern recognition
Pattern recognition
Shailesh Thakur
 

Similar to Project presentation by Debendra Adhikari (20)

Face Scope.pptx
Face Scope.pptxFace Scope.pptx
Face Scope.pptx
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face Identification
 
Comparative Analysis of Face Recognition Methodologies and Techniques
Comparative Analysis of Face Recognition Methodologies and TechniquesComparative Analysis of Face Recognition Methodologies and Techniques
Comparative Analysis of Face Recognition Methodologies and Techniques
 
Face Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image ProcessingFace Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image Processing
 
IRJET- Digiyathra
IRJET-  	  DigiyathraIRJET-  	  Digiyathra
IRJET- Digiyathra
 
CS201.Lect02.ComputerVision and its function.ppt
CS201.Lect02.ComputerVision and its function.pptCS201.Lect02.ComputerVision and its function.ppt
CS201.Lect02.ComputerVision and its function.ppt
 
184
184184
184
 
Attendance System using Face Recognition
Attendance System using Face RecognitionAttendance System using Face Recognition
Attendance System using Face Recognition
 
Face Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image ProcessingFace Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image Processing
 
Face recognition application
Face recognition applicationFace recognition application
Face recognition application
 
Human Face Detection And Identification Of Facial Expressions Using MATLAB
Human Face Detection And Identification Of Facial Expressions Using MATLABHuman Face Detection And Identification Of Facial Expressions Using MATLAB
Human Face Detection And Identification Of Facial Expressions Using MATLAB
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCV
 
1410482042(Farhat Tasnim) & 1621802042(K.M.H.Mubin) sec 11.pptx
1410482042(Farhat Tasnim) & 1621802042(K.M.H.Mubin) sec 11.pptx1410482042(Farhat Tasnim) & 1621802042(K.M.H.Mubin) sec 11.pptx
1410482042(Farhat Tasnim) & 1621802042(K.M.H.Mubin) sec 11.pptx
 
Photograph Database management report
Photograph Database management reportPhotograph Database management report
Photograph Database management report
 
Lecture 1 computer vision introduction
Lecture 1 computer vision introductionLecture 1 computer vision introduction
Lecture 1 computer vision introduction
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition System
 
Paper of Final Year Project.pdf
Paper of Final Year Project.pdfPaper of Final Year Project.pdf
Paper of Final Year Project.pdf
 
Face Recognition Human Computer Interaction
Face Recognition Human Computer InteractionFace Recognition Human Computer Interaction
Face Recognition Human Computer Interaction
 
Python Project.pptx
Python Project.pptxPython Project.pptx
Python Project.pptx
 
Pattern recognition
Pattern recognitionPattern recognition
Pattern recognition
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 

Project presentation by Debendra Adhikari

  • 1. “REAL TIME FACE RECOGNITION IMPLEMENTATION ON ATTENDANCE SYSTEM” (RESEARCH BASED MACHINE LEARNING PROJECT) Debendra Adhikari Supervisor: Manoj Shrestha Committee Members: Som Prasad Shrestha Prakash Ranabhat Pradeep Acharya IT PROJECT I : PROPOSAL DEFENSE Department of Computer Science (BCS) Infrastructure University Kuala Lumpur August 22,2018
  • 2. Overview  Introduction to Face Recognition System  Literature Review  Statement of Problem  Functional and Non Functional Requirements  Objective  Method of Development/Methodology- Design  Work Plan  Conclusion  Simulation View  References
  • 3. Introduction  Face detection is the base for face tracking and face recognition. Related to the Biometrics and Computer Vision Programming. One of the challenging task in pattern recognition research. In face recognition there are 2 types of comparisons:
  • 4. Continued… Verification and Identification. Four steps involved during identification and authentication:  Capture  Extraction  Comparison  Checking Match
  • 5. Facial Recognition…? It requires no physical interaction on behalf of the user. It is accurate and allows for high enrolment and verification rates. It can use existing hardware infrastructure, existing cameras.
  • 6. How Facial Recognition Systems work.?? The Software/Model measures: Distance between the eyes Width of the nose Depth of eye sockets The shape of the cheekbones The length of jaw line These creates a numerical code, called a face print representing the face in database.
  • 7. Literature Review In the 1960s, scientists began work on using the computer to recognize human faces.  Since then, facial recognition software has come a long way.  Facial recognition software is based on the ability to recognize a face and then measure the various features of the face.  Every face has numerous, distinguishable landmarks, the different peaks and valleys .  The proposed system is based on the Python using various modules and library like NumPy ,OpenCV during the initial prototype test and using CNN(Deep Learning).
  • 8. Literature Review : History  In 1960s, the first semi-automated system for facial recognition to locate the features(such as eyes, ears, nose and mouth) on the photographs.  In 1970s, Goldstein and Harmon used 21 specific subjective markers such as hair color and lip thickness to automate the recognition.  In 1988, Kirby and Sirovich used standard linear algebra technique, to the face recognition.
  • 9. Literature Review : Face Recognition Features Face RecognitionFace Recognition Global FeaturesLocal Features LDAGaborLBP PCA
  • 10. Literature Review : Face Recognition Features Global Features:  Focus on whole Entire Image  Less Accuracy Local Features:  Focus on the local features of the face, which help to identify and verify the person  More Accuracy
  • 11. Proposed Solution : LBP Analysis LBP Analysis : Getting each pixel of an image as a block in matrix Result in Decimal number format Result in Binary number format Threshold each matrix pixels with the center pixel of the image Figure : LPB Threshold
  • 12. Working Process Input Image Face Detection Database Face Recognition Match/not- match Compare Figure :Working Process of the Proposed Model
  • 13. Statement of Problem Face recognition is not an easy task for computers as we human . The accompanying problem have existed for computer vision and the project is based on research to solve the problems:  Pose variation (outward appearance and facial position)  Illumination conditions  Scale changeability  Images taken years apart  Glasses, Moustaches, Beards  Low quality image acquisition  Partially occluded faces. .
  • 14. Continued…  Invariant Pose of Face induce very large changes in face appearance.  Recognition rates fall drastically when images from two different poses of same person are matched.  Almost all the face databases have frontal faces. So for non- frontal faces features we require many train sets of data.  Here our proposed system is initially based on LBP Classifier for prototype which is faster and more accurate.
  • 15. Continued…  LBP is a visual/texture descriptor, and our faces are also composed of micro visual patterns.  LBP features are extracted to form a feature vector that classifies a face from a non-face.
  • 16. Functional Requirements  User (Lecturer) should be able to create their own account with their respective course name, course code and designation.  User (Lecturer) should be able to set the calendar date of the particular day and open the webcam.  User (Administration) should be able to download/extract the excel sheet of the present student.
  • 17. Non -Functional Requirements  Usability  Accuracy  Reliability  Supportability
  • 18. Objective The main objectives of this project are enlisted below:  To gain deeper understanding of OpenCV, Python, NumPy and Machine Learning Models.  To gain insights of Supervised and Unsupervised Learning.  To create a model to detect the face of Student and recognize them with their name.  To learn the various tools and modern technologies of Computer Vision Application.
  • 19. Continued…  To learn the time management skills necessary to perform during the Project days that will help us to gain the necessary organizational skills.  To establish a platform for other to create and work on machine learning projects or share the related knowledge's.
  • 20. Methodology For the project ,Prototyping Model will be used based on Testing the initial model using Python and OpenCV. Figure : Prototyping Model
  • 21. System Model Use case Model Identifying Actors Proposed Face Recognition Implementation on Attendance system consists of the following Actors. User (Lecturer) The end user that will use the system for taking attendance. System Admin Administrator of the overall system who can train the model with training images and perform the necessary maintenance and operation.
  • 22. Figure: Use Case Diagram
  • 23. Activity Diagram Figure : Activity Diagram
  • 24. Sequence Diagram Figure : Sequence Diagram I
  • 25. Sequence Diagram Figure : Sequence Diagram II
  • 26. Class Diagram Figure : Class Diagram
  • 27. Work Plan Project plan Using Gantt Chart.
  • 30. Required Tools and Technologies Here, is a list of minimum hardware requirements:  Intel Pentium Processor, or other of 1GHz or greater (64bit system configuration recommended).  Minimum 128MB of RAM capacity or more.  Minimum 32MB Graphic Card RAM capacities or more.  Recommended Hard disk space of 500GB or more.
  • 31. Continue… Here is a list of software requirements:  Windows 7 or above, Linux, Mac OS X.  Python 2.5 or Python 3.3  Jupyter Notebook  OpenCV 3
  • 32. Application  Security/Counterterrorism. Access control, comparing surveillance images to know terrorist.  Day Care: Verify identity of individuals picking up the children.  Residential Security: Alert homeowners of approaching personnel.  Voter verification: Where eligible citizens are required to verify their identity during a voting process.  Banking using ATM: The software is able to quickly verify a customer’s face.
  • 33. Current Status  Completed all Analysis and Requirement Collection.  Completed the Design and Simulation for Initial Prototype.  Collecting Data and around 5GB of facial data has been collected from various sources.  Working on creating the database for training images.
  • 34. Simulation Let see the first initial simulation………….
  • 35. Future Plan  Smart Email Notifications to the Parents.
  • 36. Conclusion  LBP(Local Binary Pattern) is used to extract the local features in the face and match it with the most similar face in the image database.  Based on Research on Various Classifier of OpenCV and Implement the best one on the attendance system for maximum accuracy.
  • 37. References  S. Kherchaoui and A. Houacine, 2010, “Face Detection Based On A Model Of The Skin Color With Constraints And Template Matching”, Proc. 2010 International Conference on Machine and Web Intelligence, pp. 469 - 472, Algiers, Algeria.  http://ecomputernotes.com/software-engineering/explain- prototyping-model Prototyping model in Software Engineering.  History- www.biometrics.gov  Brian C. Becker, Enrique G.Ortiz, “Evaluation of Face Recognition Techniques for Application to Facebook ” IEEE, 2008.  Solem, J. E. (2012). “Programming Computer Vision”.