Secure and Efficient Facial Identification Based Attendance System For Institution
Secure and Efficient Facial Identification Based Attendance System For Institution
Secure and Efficient Facial Identification Based Attendance System For Institution
Attendance is a major part of any institution in the whole world. Since older
times, Attendance are taken with the help of roll call manually and marked in the
register and vice versa. It is a tedious task to do given the modern age we are in
right now. Since, every task is automated so why not taking attendance!. Moreover,
manual task involves human error which is unavoidable. In a mission to automate
and modernize the attendance marking system, We created a digital attendance
which marks present or absent with the help of Scanning in camera and
maintaining a database in backend. This system recognize face with the help of
LBPH algorithm and Haar cascading algorithms which in turn generates a facial
map. The algorithm used above gives better results compared all other similar
algorithms available Defining whole requirement and management is defined as a
necessary step in the developing the successful software projects and systems
v
TABLE OF CONTENTS
ABSTRACT v
LIST OF FIGURES viii
LIST OF ABBREVIATIONS ix
1.1 INTRODUCTION 1
1.2 TECHNOLOGIES USED 3
1.3 ALGORITHM USED 9
2. LITERATURE SURVEY 16
ANALYSIS
vi
REFERENCES 41
APPENDIX
A. SOURCE CODE 43
B. PLAGIARISM REPORT 47
vii
LIST OF FIGURES
viii
LIST OF ABBREVIATIONS
ix
CHAPTER 1 INTRODUCTION
1.1 INTRODUCTION
The human face plays an important role in our social interaction, conveying
people‟s identity. Using the human face as a key to security, biometric face
recognition technology has received significant attention in the past several years
due to its potential for a wide variety of applications in both law enforcement and
non-law enforcement.
As compared with other biometrics systems using fingerprint/palmprint and iris,
face recognition has distinct advantages because of its non-contact process.
Face images can be captured from a distance without touching the person being
identified, and the identification does not require interacting with the person.
In addition, face recognition serves the crime deterrent purpose because face
images that have been recorded and archived can later help identify a person.
After quitting it, attendance of person will be stored in report table in the databases
with name, id, date and time and status.
This attendance system can be readily used by non-programming personal
avoiding human handled chance of error. In this project apart from marking
attendance by face recognition, one can register new user, update details of user
and delete details. Train dataset, extract embedding's, change password, and view
the attendance report.
In this project, to recognize their face and marking their attendance, the
individual had to register their details in employee management system. Then
extract embedding for every new individual and then train the machine according to
the sample photos taken. After that the individual is free to mark their attendance.
The person can also check their attendance status, update details, delete details,
check sample photos and also change the password credentials. The database is
updated automatically, no need to update manually.
Pros
1. Automated Time Tracking System
Entry and exit time monitoring done manually or with other biometric systems can be
1
0
fully automated with facial recognition attendance systems. There is no need for human
intervention or physical validation as the system‟s advanced algorithms can locate and
identify faces autonomously. It is effortless to track time for employees with facial
recognition
2. Cost Effective
The cost savings are even higher as data received from the face
recognition-based employee attendance system is in real-time and valid.
Pandemic like Covid 19 can be better managed by minimizing physical contact in public
places and work environments. Post pandemic there has been a significant increase in
demand and adoption of contactless technologies. The industry has recognized the
benefits of facial recognition and the adoption of attendance systems like Truein.
Workplaces and multi-tenant environments can greatly reduce the frequency of contact
between individuals, thus minimizing the risk of virus transmission.
Cons
1. Threatens individual and societal privacy
1
2
All layers in between are called Hidden Layers. The word deep means the
network join neurons in more than two layers.
The network consumes large amounts of input data and operates them
through multiple layers; the network can learn increasingly complex features of the
data at each layer.
1
4
1.3 Algorithm Used:
For determination of disease and for prediction purposes, there are five important
type of algorithms are used. These algorithms have all the type of prediction
accuracy and have all the precision control. These are:-:
Local Binary Pattern Histogram (LBPH)
Viola-Jones Face Detection Technique(Haar Cascades)
Local Binary Pattern (LBP) is a simple yet very efficient texture operator which
labels the pixels of an image by thresholding the neighborhood of each pixel and
considers the result as a binary number.
It was first described in 1994 (LBP) and has since been found to be a powerful
feature for texture classification. It has further been determined that when LBP is
combined with histograms of oriented gradients (HOG) descriptor, it improves the
detection performance considerably on some datasets.
Using the LBP combined with histograms we can represent the face images with a
simple data vector.
As LBP is a visual descriptor it can also be used for face recognition tasks,
as can be seen in the following step-by-step explanation.
Radius: the radius is used to build the circular local binary pattern and represents the
radius around the central pixel. It is usually set to 1.
Neighbors: the number of sample points to build the circular local binary pattern.
Keep in mind: the more sample points you include, the higher the computational
cost. It is usually set to 8.
9