Sie sind auf Seite 1von 6

SLIDE 1*

Good afternoon, My name is Fahrun. Im a student from Surya


University. I would like to thank you for giving me this opportunity. Our
research is about designing own improved face recognition based
attendance system for our university. weve added some feature that
will improve the system.
SLIDE 2*
To our prior knowledge, there are two kind of attendance system,
which are conventional based and digital based attendance system.
Most university, especially in Indonesia, still implement conventional
based attendance system.

Slide 3* & Slide 4*


There are several problems we got for conventional based attendance,
1. Easy to Cheat
2. Data Management Process mostly still manual
3. No notification from administrator
In order to solve this problem, we proposed an alternative way, which
is face recognition based attendance system. As I said before, we
improved it, we add some extra things to make the system even better.

Slide 5*

First, we add face anti-spoofing. This is because face recognition its self
can be deceived by a spoof face, whether from printed-photograph,
digital photo from devices, mask based, et cetera. This is the main
problem for face recognition based attendance system.

Slide 6*
Second, we add notification system in order to let the student parents
know the information of student attendance status in certain course.
We choose to notify it through SMS Gateway. The reason is because
the only way to communicate to remote area is through SMS Method.
One of most known and most widely used provider in Indonesia,
already cover almost 95% area of Indonesia.

Slide 7*
But we want to limit the scope of our research. For face-anti spoofing
module, we only focus on developing, implementing, and testing our
face-anti spoofing. We would not go deep into face recognition
explanation.
Also, so far, we only achieve face anti-spoofing to overcome spoofing
attack for digital device media like smartphone or tablet. We havent
done it for another media.
For SMS notification module, we design, implement and test the each
of system module.

Slide 8*
This is the main component of our system. We use Raspberry Pi 3
Model B as a core or a computer that will manages the system like
software and databases. We connect all of the other component there.
Then, a Logitech 270C USB Camera acts as a programmed camera that
will capture the identity of the user through their face.
LM2596 Stepdown Converter, we use it to stabilize the voltage of
SIM800l module.
And the SIM800l, acts as SMS gateway.
Slide 9*
In order to test system, there a scenario for each of component. For
face-anti spoofing, we test it by experiment. For notification system, we
test by black box testing
Slide 10* -> 11*
So this is our system flowchart, as I stated before, we only focus on
face-anti spoofing step here.
Slide 12*
To test Face anti-spoofing module, weve design two experiments. First
observing 10 different face with its spoof face in order to find the
threshold that distinguish between real face and spoof face. We use V
Channel of HSV color distribution only. After we find the right
threshold, next we do experiment II. We test it at different time, which
are in the day and night in order to examine right lighting condition for
our system.
Slide 13*
This is the histogram of v channel distribution of HSV Color for a real
face. It can be seen that most of the value are tend to evenly
distributed
Slide 14*
But for spoof face, most of its value are piled up at bin 255. Lets go
deep into the table.
Slide 15*
We take 10 most v channels value in the histogram. It counts by images
pixel in OpenCV. we clearly can see that theres huge difference here.
The value for real face is evenly distributed at 307 356. But for spoof
face, almost all of the pixels value are piled up at bin 255. So this is our
cue for determining the right threshold to distinguish between real face
and spoof face.
Slide 16*
This is how we determine the threshold, we take that 10 most v
channels value. Then we multiply it by its bin position in histogram,
later we sum it all. There we got the value. Next we need to set right
threshold to limit the minimal detection value for spoof detection. So
we do the experiment I
Slide 17* & Slide 18*
From this line charts we can see that for a real face, sum of 10 its
highest v value ranged between 15000 32000 pixel. Meanwhile for
spoof face, its value ranged between 110000 and 240000 pixels. From
here, we can set the threshold between 32000 110000. For example,
for our project, we set the threshold at 60000, so whenever the value
above 60000, it will be detected as spoof face and vice versa.
Slide 19*

Now the result of second experiment. First , we compare it for spoof


face. We test it with different brightness level from smartphone,
namely 0%, 25%, 50%, 75%, and 100% of the devices brightness. Blue
line for day and the orange one for night. It can be seen that higher
brightness level of device, then sum of the pixels tent to be higher and
vice versa.
Slide 20*
For a real face, the sum of 10 highest pixels average only at 25000 at
day time and 35000 at night time. That means lighting condition
doesnt really affect real face, but for spoof face, its really matter
because of the huge difference.

Slide 21*

So, what we got from experiments II are


The average pixel value at night is higher than the average pixel during
the day
The brightness level of the device greatly affects the sum of high-low of
the average pixel value.
Other factor, namely environment and type of camera.

Slide 22* & Slide 23*

Now we go into the sms notification system. This is sms delivery


process. First, system get time information. After that, it looks for the
data to the entire table according to the recent time. It will check
whether the data is available or not. If the data available, then it will
send it according to the target phone number.
Slide 24*

This is the hardware design for SMS notification. We have stated it


earlier.
Slide 25*
This is what students parent got when the system sends the
information about the student attendance status. Variable x is the
name of the student that is taken from the student table by its NIM in
the attendance table. Variable y is the name of the course. The variable
z represents the presence status in the recent course
Slide 26*
From Table I, it can be seen that SMS sending works well. Although the
last SMS is not sent due wrong number inputted.
Slide 27*

So, Thats All and thanks for your attention.

Das könnte Ihnen auch gefallen