Face Recognition Based Attendance System with Student Monitoring Using RFID Technology

Similar documents
Student Attendance Monitoring System Via Face Detection and Recognition System

EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION

A MODIFIED ALGORITHM FOR ATTENDANCE MANAGEMENT SYSTEM USING FACE RECOGNITION

Real Time Face Recognition using Raspberry Pi II

APPENDIX 1 TEXTURE IMAGE DATABASES

Feature Extraction Technique Based On Circular Strip for Palmprint Recognition

ENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION

Iris Recognition using Histogram Analysis

ZKTECO COLLEGE- FUNDAMENTAL OF FINGER VEIN RECOGNITION

An Efficient Approach to Face Recognition Using a Modified Center-Symmetric Local Binary Pattern (MCS-LBP)

AUTOMATIC NUMBER PLATE DETECTION USING IMAGE PROCESSING AND PAYMENT AT TOLL PLAZA

Image Forgery Detection Using Svm Classifier

A Proposal for Security Oversight at Automated Teller Machine System

IRIS Recognition Using Cumulative Sum Based Change Analysis

Vein and Fingerprint Identification Multi Biometric System: A Novel Approach

Biometrics - A Tool in Fraud Prevention

Follower Robot Using Android Programming

International Journal of Modern Trends in Engineering and Research e-issn No.: , Date: 2-4 July, 2015

An Evaluation of Automatic License Plate Recognition Vikas Kotagyale, Prof.S.D.Joshi

COMBINING FINGERPRINTS FOR SECURITY PURPOSE: ENROLLMENT PROCESS MISS.RATHOD LEENA ANIL

Region Based Satellite Image Segmentation Using JSEG Algorithm

International Journal for Research in Applied Science & Engineering Technology (IJRASET) DTMF Based Robot for Security Applications

Accident prevention and detection using internet of Things (IOT)

MATLAB: Basics to Advanced

Sketch Matching for Crime Investigation using LFDA Framework

A SURVEY ON HAND GESTURE RECOGNITION

A NOVEL ARCHITECTURE FOR 3D MODEL IN VIRTUAL COMMUNITIES FROM DETECTED FACE

Intelligent Identification System Research

SMART OFFICE SURVEILLANCE ROBOT USING FACE RECOGNITION. Amity University, Mumbai, India. Amity University, Mumbai, India

Wireless Keyboard Without Need For Battery

BULLET SPOT DIMENSION ANALYZER USING IMAGE PROCESSING

Image Processing: Capturing Student Attendance Data

Background. Computer Vision & Digital Image Processing. Improved Bartlane transmitted image. Example Bartlane transmitted image

Online Signature Verification by Using FPGA

On-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor

Fraud Detection in Examination using LBP method

Challenging areas:- Hand gesture recognition is a growing very fast and it is I. INTRODUCTION

Keyword: Morphological operation, template matching, license plate localization, character recognition.

Technical Explanation for RFID Systems

A Proficient Matching For Iris Segmentation and Recognition Using Filtering Technique

Segmentation of Microscopic Bone Images

PHOTOGRAPH RETRIEVAL BASED ON FACE SKETCH USING SIFT WITH PCA

Fingerprint Recognition using Minutiae Extraction

Finger rotation detection using a Color Pattern Mask

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER

BIOMETRICS BY- VARTIKA PAUL 4IT55

Bare PCB Inspection and Sorting System

COMPARATIVE PERFORMANCE ANALYSIS OF HAND GESTURE RECOGNITION TECHNIQUES

FACE RECOGNITION USING NEURAL NETWORKS

Introduction to DSP ECE-S352 Fall Quarter 2000 Matlab Project 1

Automatics Vehicle License Plate Recognition using MATLAB

Intelligent and passive RFID tag for Identification and Sensing

Brain Tumor Segmentation of MRI Images Using SVM Classifier Abstract: Keywords: INTRODUCTION RELATED WORK A UGC Recommended Journal

IRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology

Automatic Locking Door Using Face Recognition

RFID Enabled Arms and Ammunition Depot Management System with Human Tracking Capacity

RFID- GSM- GPS Imparted School Bus Transportation Management System

Introduction to Biometrics 1

Face Detection System on Ada boost Algorithm Using Haar Classifiers

Object Motion MITes. Emmanuel Munguia Tapia Changing Places/House_n Massachusetts Institute of Technology

Automatic License Plate Recognition System using Histogram Graph Algorithm

Portable Facial Recognition Jukebox Using Fisherfaces (Frj)

Note to Coin Exchanger

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

Finger print Recognization. By M R Rahul Raj K Muralidhar A Papi Reddy

PRODUCT RECOGNITION USING LABEL AND BARCODES

RFID Based Toll Gate Access

Development of Indian Coin based automatic shoe Polishing Machine using Raspberry pi with Open CV

Original and Counterfeit Money Detection Based on Edge Detection

VISUAL FINGER INPUT SENSING ROBOT MOTION

Efficient Car License Plate Detection and Recognition by Using Vertical Edge Based Method

Matlab Based Vehicle Number Plate Recognition

SMART SURVEILLANCE SYSTEM FOR FACE RECOGNITION

Controlling Humanoid Robot Using Head Movements

A Comparison of Histogram and Template Matching for Face Verification

Computer Vision in Human-Computer Interaction

BE Scholars, Department of Computer Technology, Rajiv Gandhi College of Engineering and Research, Nagpur, Maharashtra, India

3D Face Recognition System in Time Critical Security Applications

Edge Histogram Descriptor for Finger Vein Recognition

[Kumar, 5(12): December2018] ISSN DOI /zenodo Impact Factor

RFID Integrated Teacher Monitoring

Detecting Intra-Room Mobility with Signal Strength Descriptors

International Journal of Scientific & Engineering Research Volume 8, Issue 7, July-2017 ISSN

Politecnico di Milano Advanced Network Technologies Laboratory. Radio Frequency Identification

LabVIEW based Intelligent Frontal & Non- Frontal Face Recognition System

Extraction and Recognition of Text From Digital English Comic Image Using Median Filter

Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

AUTOMATED WATER METER READING

ROBOT VISION. Dr.M.Madhavi, MED, MVSREC

Bloodhound RMS Product Overview

IMPLEMENTATION OF EMBEDDED SYSTEM FOR INDUSTRIAL AUTOMATION

Wavelet-based Image Splicing Forgery Detection

Automatic Morphological Segmentation and Region Growing Method of Diagnosing Medical Images

NOTE TO COIN EXCHANGER WITH FAKE NOTE DETECTION

On The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems

Design of Adaptive RFID Reader based on DDS and RC522 Li Yang, Dong Zhi-Hong, Cong Dong-Sheng

Differentiation of Malignant and Benign Masses on Mammograms Using Radial Local Ternary Pattern

Feature Extraction Techniques for Dorsal Hand Vein Pattern

Human Computer Interaction by Gesture Recognition

Transcription:

Face Recognition Based Attendance System with Student Monitoring Using RFID Technology Abhishek N1, Mamatha B R2, Ranjitha M3, Shilpa Bai B4 1,2,3,4 Dept of ECE, SJBIT, Bangalore, Karnataka, India Abstract: In an every institute, maintaining the attendance of a student in the classroom will play a major role. If we take manually it requires a lot of time. There are several automatic methods are available in this aspect they are biometric attendance, RFID attendance, Iris recognition and so on. All these methods also take a lot of time, because students have to make a queue to scan the student identity cards for marking the attendance. This paper describes one of the effective algorithms for face recognition that automatically marks the attendance without human involvement. This system consists of four phases those are face database, detection, and face recognition and marking attendance.in this paper, we are using a local binary pattern algorithm for face detection and face recognition. Local binary pattern as name suggests its works on local features that uses LBP operator which summarizes the local special structure of a face image This paper also helps to track or monitor the student within the campus and also monitor faculties work, all these can be achieved with the help of RFID technology and also the information about internal marks can be sent to a registered number through SMS using GSM module. Keywords: LBP, RFID, GSM, LCD, ARM7, PC I. INTRODUCTION Now a days, attendance will be maintained in the institutes for checking the students performance. Some colleges or schools are taking the attendance manually by calling a name or by using the old paper or file based approach. But in these methods students have to make a line for marking an attendance it wastes a lot of time. Many biometric systems are available but using these method students has to make line to touch their thumb or finger on the device. This process compares the biometric feature of a person with previously stored template captured at the time of enrolment. Our system uses the face recognition methodology for the automatic attendance of students in the classroom atmosphere without human involvement. Face recognition is a fundamental part of biometrics. Facial features are extracted through algorithms and some modifications are done to improve the existing algorithm models. In this paper, we have used a local binary pattern algorithm for face recognition. LBP is one of most efficient method for face texture descriptor, which is extracts the local features of face. The LBP has a high recognition rate compare to other algorithms. In this paper we have used Mat lab Simulink for recognition and verification of face stored in the database. The hardware used in this method is ARM7 which is of 32bit microcontroller. The microcontroller is controls the operation of entire systems. Power supply provides a power to the microcontroller. Basically GSM stands for global system mobile telecommunication which is operates in 900 MHz to 1800 MHz.Here we are using RFID technology for tracking or monitoring the student inside the college. II. PROPOSED METHODOLOGY In the starting stage, the image of all the students is captured at once by a webcam connected to a laptop and sends it to the image enhancement module for further processing. In the image enhancement module the image will be converted into a grayscale image, images are enhanced so that matching can be performed easily. For every individual students database will be created and that will be stored in PC. Once face is detected, the System initiates detection process. Detected face images are cropped. IJRASET: All Rights are Reserved 1324

Figure 1: Block diagram In the Face recognition process the detected images are compare it with database which contains collection of face images and extracted features at the time of enrolment process. If the face image is matched with stored image then the face is recognized. LCD is initialized and GSM searching for a signal once it got the signal it is initialized. Students faces are recognized one by one with stored face database using local binary pattern method and attendance will be marked automatically. Face detection process separates the facial area from the rest of the background image. Feature extraction is done for distinguishing faces of different students. Feature extraction is helpful in face detection and recognition. The attendance status will be updated through microcontroller and that will be displayed on LCD. RFID basically defined as radio frequency identification. It uses a radio waves to identification of an object. RFID tags are the one which is used for identification of an object. RFID reader will gather the information from the RFID tags. RFID reader is incorporated within the campus, if the student is pass through that reader it will identify the student then, the information about the student location will be displayed on LCD. A message will be sent to absentees through SMS and also does the information of internal marks through SMS using GSM module. III. LOCAL BINARY PATTERN Local Binary Pattern is the most effective texture descriptor method among the existing method in this aspect. There are several existing methods for feature extraction. But the most useful method for extracting features from (preprocessed) face images is local binary pattern for face recognition. The LBP approach was introduced by Ojala et al in1996. With the help of local binary pattern it is possible to extract the texture features from the face. The extracted features will contain a binary pattern to define the surrounding of pixels in the regions. The obtained features are combined into a one single feature called histogram, which forms the image representation. According to several studies [1,2,3] face recognition using the LBP method provides very good results, both in terms of speed and discrimination performance. Because of the way the texture and shape of images is described, the method seems to be quite robust against face images with different facial expressions, different lightening conditions, image rotation and aging of persons. Figure 2: Operational principle of LBP IJRASET: All Rights are Reserved 1325

The above figure shows the operational principle of LBP. The image will be divided into several blocks, each blocks will have a different intensities levels. In figure2 the image will be divided with 8 neighbors of a pixel. Center pixel value will be used as a threshold to neighbors pixels. If the neighbor pixel is greater than or equal to the threshold value then one is assigned to that pixel. If the value is less than the threshold value zero is assigned to that pixel, binary pattern is created that will be converted into decimal value. In this paper we mainly used feature called SURF features it is kind of robust features. Histogram will be calculated for each pixels based on the edge direction occurrence. The surf features will detects the different edges directions. At the time of registration of each faces HOG features will be calculated and that will be saved, HOG defines as histogram of orientations gradients this features will requires at the stage of face recognition because it will compare the query image and test image or it finds the similarity in two images. Once values are matched the face will be recognized. In this paper, we have used a new method for face recognition which gives both shape and texture information to represents the face images.the LBP operator is a powerful texture descriptor. In terms of accuracy and computational complexity ist shows the positive results. It can be seen as a unifying way of the traditionally divergent statistical and structural models of texture analysis classifications [4][5]. By combining these micro patterns, a global description of the face image is obtained. A. Working of LBP algorithm 1) Step1: Face image will be captured by camera. 2) Step2: The captured image will be divided into several blocks. 3) Step3: For each block histogram will be calculated. 4) Step4: The gained features from the regions are concatenated into a single feature histogram, which forms a demonstration of the image. IV. RFID TECHNOLOGY Radio-frequency identification (RFID) is the wireless technology which is used as reader. Basically this technology uses of electromagnetic fields for transferring of data. For the identification and tracking purpose tags are attached to objects. The information will be stored in tags. The tags are energies by electromagnetic induction from magnetic fields produced near the reader. The primary purpose of an RFID system in this application area is to detect the presence and absence of the student data to be transmitted wirelessly by mobile device, called a tag, which is read by an RFID reader and processed according to the programmed instructions on the personal computer (PC). The ease with which RFID can be integrated into current operations depends on the openness and flexibility of the technology infrastructure especially the PC that will be used to collect and collate RFID data. The proposed system provides solution to lecture attendance problem through coordinated hardware and software design handshaking data communications between RFID tag and RFID reader serially interfaced to the digital computer system.[6]in RFID technology, it consist of RFID reader and RFID tags. There are two types of RFID tags 1.Active tags 2.passive tags. Active tag requires an external battery but a passive tag does not require an external battery. A. How RFID Works 1) Step1: The reader will broadcast the signal through an antenna.\ 2) Step2: The signal will be received by the tag and it gets charged. 3) Step3: The reader will receive the identifying response from the charged tag. 4) Step4: The data will be read by an antenna and it sends to the reader. 5) Step5: After receiving the data from an antenna the reader will sends the information to the PC for further processing. 6) Step6: Computer will send the processed signal that has to stored on the RFID tags. V. RESULT A. Database Creation Students database will be created. Database is nothing but a collection of pieces of information or set of images. IJRASET: All Rights are Reserved 1326

Figure 3: Database Creation B. Face Detection And Cropping Once face is captured, the system starts face detection process. Detected face images are cropped. Figure 4: Cropping of an image IJRASET: All Rights are Reserved 1327

C. Face Recognition If the detected face image is matched with stored image then the face is recognized. Figure 5: Recognized image D. Updating in Excel sheet The attendance of the student which has been recognized and verified using database is updated in excel sheet. IJRASET: All Rights are Reserved 1328

Figure 6: Excel sheet VI. CONCLUSION In this paper, we used face recognition based approach for marking an attendance this will reduces a manual effort. This s highly securing process, proxy will be avoided. We obtain the results that we can reduce a lot of time. In this paper, it will also help to monitor the student in the campus very easily by using RFID technology. The main purpose of this paper is to discover a way to certify safety of students and also controlling the disobedience of the students. As per our research we found out that this process is suitable for the purpose of tracing the students in college campus. Every movement of the student can be arbitrated and hence action can be taken. REFERENCES [1] T. Ahonen, A. Hadid and M. Pietikainen, Face description with Local Binary Patterns, Application to Face Recognition. Machine Vision Group, University of Oulu, Finland, 2006 [2] T. Ahonen, A. Hadid and M. Pietikainen, Face description with Local Binary Patterns, Application to Face Recognition. Machine Vision Group, University of Oulu, Finland, 2006 [3] R. Gottumukkal and V.K. Asari, An Improved Face Recognition Technique Based on Modular PCA Approach Pattern Recognition Letters, vol. 25, pp.429-436, Mar. 2004. [4] Md. Abdur Rahim, Md. Najmul Hossain, Tanzillah Wahid & Md. Shafiul Azam: Face Recognition using Local Binary Patterns (LBP), Global Journal of Computer Science and Technology Graphics & Vision, Volume 13 Issue 4 Version 1.0 Year 2013. [5] Bo Yang, SongcanChen, A comparative study on local binary pattern (LBP) based face recognition: LBP histogram versus LBP image: Neurocomputing120(2013)365 379. [6] Hybrid of Student Attendance Tracking System Using RFID Device and Fingerprint Sensors. Subashchandraboss et al,international Journal of Computer Science and Mobile Computing, Vol.4 Issue.3, March-2015, pg. 271-278. IJRASET: All Rights are Reserved 1329