Automatic Student Attendance System Using Face Recognition
Automatic Student Attendance System Using Face Recognition
Published By:
Retrieval Number: B4207129219/2020©BEIESP
Blue Eyes Intelligence Engineering
DOI: 10.35940/ijeat.B4207.029320
Journal Website: www.ijeat.org
93 & Sciences Publication
Automatic Student Attendance System using Face Recognition
Train face dataset. Next when we sense a face, we collection consists of M images. Where each image size is
calculate Eigenface for that face. The system then compares N/N
the current face's eigenvectors and the face picture stored Step 1: Convert the images to face vectors in the training
decides whether or not the face is detected. The final step set. The pictures are translated to vectors of the board. Let a
(optional) is that the system learns to recognize faces if the face image be an 8-bit intensity two-dimensional N by N
unknown face is found repeatedly. array. An image can also be regarded as a squared dimension
N vector. So a standard 50 by 50 size images becomes a 2500
II. RELATED WORK dimensional space vector. A set of images, then, maps this
huge space to a selection of points.
The main reason behind the system is to analyze and find
Step 2: Standardize face vectors, i.e. remove all common
solutions from other writers and recognize their suggested
features. This is done by measuring and subtracting from all
system imperfection and provide the best solutions.
the facial vectors the average facial vector.
Kawaguchi developed a classroom attendance system with a
Step 3: Calculate ownership of the covariance matrix. As
new method called continual monitoring, and student
the main components are obtained from the covariance
attendance reported dynamically by the camera capturing the
matrix in the PCA-based Eigenfaces method, we now
image of a student in the classroom [1]. The design of the
calculate the own vectors from the covariance matrix. It
network is simple as the class wall is fitted with two cameras.
would take a lot of time to find K own vectors from M=2500
The first is a camera that captures the image of students in the
own vectors with K<M due to the many calculations that
classroom; the other is a sensor camera to capture the chair of
need to be done and therefore the need for Step 3
a student. The program compares the image taken from a
Dimensionality reduction.
camera that records photographs and faces in the database
Step 4: Increasing the training set's dimensionality. To
that made a lot of time to make the attendance great. Another
each these calculations on the required individual faces, we
paper proposed by [2] implemented in the automated
calculate them from a reduced dimensionality covariance
attendance management system a real-time computer vision
matrix.
algorithm. The system installed the non-intrusive camera
Step 5: Choose K's best individual vectors so that K < M
capable of snapping images in the classroom and comparing
can represent the entire training set. The yellow bars show the
the captured face with faces within the system from the
selected vectors of K Eigen which are adequate to represent
camera's image. The approach often uses techniques that are
the entire training set.
often used in computer vision for machine learning. Haar
Step 6: Transform lower-dimensional K own vectors to the
classifiers were used in camera capture images to train. The
dimensionality of the original face.
camera's face snap converts to grayscale and retracts the files,
Step 7: Each image is represented as a linear combination
which is then forwarded for later saving and processing on
of all K own vectors plus the mean / average face.
the server in 2012Used two libraries including OpenCV is a
Step 8: Calculate and store the corresponding weight
computer vision library and FLTK to implement the program.
vectors for each image in the training set.
Both of these libraries contributed to the development of the
interface, such as the OpenCV support algorithm [4] and B. General Overview
FLTK. An integrated attendance management system was In this model, many similar components have been
implemented by Kar [3] using face recognition techniques. clustered to form sub-systems which then combine to form
The system provides matching requests and adding new the whole system. Breaking the system into modules and
information to the database. Request Matching's first move is sub-systems reveals the practical essence of the class
to open the shutter and snap the picture after removing the attendance system. Fig. 1 flow diagram shows the operation
front face. The next step is to classify the face with the of the processes.
training data and to paper the extracted face onto the main
feature visualization. A smart attendance marking system
that involves two differentiating algorithms such as Principal
Component Analysis and Artificial Neural Network ase
suggested by Jyotshana Kanti [5]. Zacharia proposed using
face recognition [6] an advanced attendance management
system in which only PCA was used. J.G. in their inquiry.
Roshan Tharanga et al proposed an intelligent way of
marking the attendance [7]. K. Senthamil Selvi et al
discussed recent developments in the topic in their paper[8].
Shireesha Chintalapati et al, in their report, discussed face
recognition uisng PCA, LDA, and LBPH [9].
III. METHODLOGY
From Fig. 1, we can see that most of the components used are F. Functions of the two Sub –Systems
identical only to be used at different stages of the face The functionality of the components is shown in Figure 3
recognition process. block diagrams. The face recognizer system consists of two
main components, i.e. the manager of the training set and the
C. Training Set Manager Sub System face recognizer.
Those two modules must share the Faces database, the Face
The training set management sub-system's conceptual
Detector system image acquisition; as they are similar in their
architecture should consist of a component of image features. Therefore, we must partition the machine into two
acquisition, a face detection feature, and a component of subsystems and have to enforce their comprehensive
training set management. Together, to control the training conceptual designs.
collection, these elements work with the faces database.
These will be developed in an application form for Windows.
D. Face Recognizer Sub System
The Face Recognizer's conceptual architecture would
consist of the component of image processing, face
recognizer, and face detection system all operating with the
database of faces. Here, the portion of image acquisition and
face detection is the same as those in the Training Set
Manager sub-system as the same features. The only
difference is the face recognizer component and its user
interface controls. This will reload the training set on the
added faces to train the recognizer and show the calculated
Eigen-faces and average face. It should then display the Fig. 3. A block diagram showing functions of the
recognized picture in a photo box components
E. System Architecture G. Full Systems Logical Design
The system consists of a camera recording the student’s The logical design of the full system are composed several
photographs and submitting them to the server for image components. The system first takes an image sample of
enhancement. The picture will appear in the Face Detection student from input devices such as camera. Then we enhance
and Recognition modules after enhancement and then the the image using some image enhancement process for better
presence will be identified on the server of the database. This face detection and recognition. After successfully identifying
is shown in Figure 2 of the experimental setup. Templates of the face by comparing with face database the system can give
individual student’s face photos are stored in the Face attendance to the identified students and save it to attendance
database at the time of enrollment. The input image identifies sheet.
all the faces here, and the algorithm compares them one by
one with the face database. It saves a lot of time and this is a
highly secure procedure that no one can mark someone else's
attendance. Face database is the collection of face images and
extracted features during the registration process and the
second attendance inventory includes student information as
well as uses to identify attendance. The figure below
illustrates the three application subsystems ' conceptual
design and implementation.
Published By:
Retrieval Number: B4207129219/2020©BEIESP
Blue Eyes Intelligence Engineering
DOI: 10.35940/ijeat.B4207.029320
Journal Website: www.ijeat.org
95 & Sciences Publication
Automatic Student Attendance System using Face Recognition
IV. RESULT compared to the database. After a good match, the name
associated with the face will be shown on the top edge of the
A. User Interface of the System rectangular box. Now shown in the highlighted box number 2
The attendance system adds faces to the training set for are the numbers of faces in the scene with their names. To
extracting feature. The image is taken from the marked red connect faces to the database, use face press.
box as can be seen in Fig. 5 and displayed in the yellow box
on a picture box. The Areas of Interest (AOI) i.e. face (es) in
the drawing would be automatically identified by drawing a
light yellow rectangular box. Then we assign a face mark to
the blue rectal to the extracted gray scale.
Fig. 7. Face recognizer with multiple students Fig. 10. Attendance register
Step 1 is for the marker to be qualified to recognize a face as The returned input face I d number was then used to fill the
known or unknown. Step 2 selects the recognizable face of records in the database of the attendance registry. Clicking
the image source. This could be complemented by a live the Attendance sheet button will reveal the sheet as shown in
camera recorded images. The face input image will then be figure 11. The images are identified, monitored and
shown in the recognizer picture box 2 as shown in Figure 6. recognized automatically in the video feed. Photos can also
The input face ID of the image will then be shown as shown be transferred from the live to the database.
in Figure 7, Step 5.
The outlined box 1 shows the camera's present view / scene
from Figure 8. The faces and eyes in the pictures are
automatically marked as shown by the rectangular boxes
around them. The face detected is extracted from and
Veiled
10 10 7 70
Faces
Bearded
10 10 8 80
Faces
Unveiled
20 20 17 85
A
Unveiled
30 30 25 83.3
B
Left
15 15 11 73.3
light
Right
15 15 12 80
light
Published By:
Retrieval Number: B4207129219/2020©BEIESP
Blue Eyes Intelligence Engineering
DOI: 10.35940/ijeat.B4207.029320
Journal Website: www.ijeat.org
97 & Sciences Publication
Automatic Student Attendance System using Face Recognition
REFERENCES
1. Y. Kawaguchi and T. Shoji, “Face recognition-based lecture
attendance system,” Academic Center for Computing and Media
Studie, 2005.
2. K. S. Kumar, S. Prasad, V. BhaskarSemwal, and R. C. Tripathi, “Real
time face recognition using adaboost improved fast pca algorithm,” Int.
J. Artif. Intell.Appl, p. 45–58, 2011.
3. N. Kar and D. M. K. D. Barma, “Study of implementing automated
at-tendance system using face recognition technique,” International
Journal of Computer and Communication Engineering, 2012.
4. T. Bradski and A. Kaehle, “Opencv ml algorithms,” in Learning
OpenCV. O’Reilly Media, Inc, 2008, p. 580.
5. J. Kanti and J. Papola, “Smart attendance using face recognition with
percentage analyzer,” International Journal of Advanced Research in
Computer and Communication Engineering, vol. 3, 2014. [Online].
Fig. 14. The average face Available:
Interestingly, the key component analysis can be used for https://ijarcce.com/wp-content/uploads/2012/03/IJARCCE10A-a-Jyot
compression of images from the Eigenfaces obtained in the shana-smart-attendance.pdf.
face recognition stage, as shown by the dominant numbers of
6. J. Joseph and K. Zacharia, “Automated attendance management system
Eigen faces that can comfortably represent all images in the using face recognition,” International Journal of Science and research,
trainings package. Just 195 faces are required for the 247 vol. 2, 2013.
pictures of the training set to completely re-create all the 247 7. R. Tharanga, Samarakoon, Karunarathne, Liyanage, and D. Parer,
faces. “Smart Attendance using real time face recognition (smart-fr),”
Semantic Scholar, 2013.
8. K. Selvi, P.Chitrakala, and A. Jenitha, “Face recognition based
V. CONCLUSION attendance marking system,” IJCSMC, no. 3, p. 337 –342, 2014.
9. S. Chintalapati and M. Raghunad, “Automated attendance
A program has been suggested to ensure attendance. This management system based on face recognition algorithms,”
replaces the manual system with a simple, reliable, International Conference on Computational Intelligence and
cost-effective, time-saving automated system as it eliminates Computing Research, 2013.
the stationary material and paper work. It is therefore
predicted that this method would produce desired results and AUTHORS PROFILE
could be applied for logout in the future. In the near future,
other strategies could also improve efficiency. We can say Partha Chakraborty is a member of the faculty at the
that a safe, stable, rapid and efficient class attendance Department of Computer Science and Engineering,
Comilla University, Bangladesh is currently working as
management system was developed to replace a manual and an assistant professor. He received a M.Sc. from the
inefficient system. The face recognition program saves time, Jahangirnagar University, a renowned Bangladesh Public
reduces administration work and replaces obsolete electronic University, and a B.Sc. in the field of computer science
equipment for the currently in use stationery content. The and engineering. He also has an interest in computer vision, robotics, image
processing and artificial intelligence for his work. To various international
device must not be mounted by specialized equipment, journals, he presented his research articles. He is actively involved in the
because it requires only a computer and a camera. The picture fields of education and learing.
quality and performance must be tested in the real time
scenario, particularly when the systems are operated from a Chowdhury Shahriar Muzammel a faculty member
of Comilla University, Bangladesh, Faculty of
live camera supply, and thus the camera plays a decisive role Engineering, is currently working as a lecturer in the
in the system's work. The mechanism can also be used for Department of Computer Science and Engineering. He
permission-based access control systems and for safe access was awarded M.Sc. (Engineering) Bachelor's degree
authentication (restricted installations). The greatest threat to and B.Sc. (Technology) Comilla University degree in
Computer Science and Engineering, a renowned Bangladesh public
the system is spoofing. Anti-spotting techniques like eye university. Signal processing, Bangla Natural Language Processing, Image
twitch detection can be used in the event that the face Processing, and Artificial Neural Network are his current research interests.
recognition is provided by grabbed images for possible In various international journals, he presented his research articles.
improvements to separate live from static images. A feature
can therefore be added that lists all unidentified faces and can
be manually checked by the user. Automatic attendance
Published By:
Retrieval Number: B4207129219/2020©BEIESP
Blue Eyes Intelligence Engineering
DOI: 10.35940/ijeat.B4207.029320
Journal Website: www.ijeat.org
99 & Sciences Publication