Beruflich Dokumente
Kultur Dokumente
On
Dr T.A. CHAVAN
2018-2019
Date:
CERTIFICATE
of class B.E IT; have successfully completed their project work on “ SMART ATTENDANCE USING FACE
RECOGNITION” at Smt. Kashibai Navale College of Engineering, Pune in the partial fulfillment of the
Graduate Degree course in B.E at the Department of Information Technology, in the academic Year 2018-2019
as prescribed by the Savitribai Phule Pune University, Pune.
ACKNOWLEDGEMENT
Department of Information Technology, SKNCOE, Pune
SMART ATTENDANCE USING FACE RECOGNITION
I take this opportunity to thank my internal guide Dr T.A Chavan, for giving me guidance and support
throughout the Seminar. His valuable guidelines and suggestions were very helpful.
I wish to express my thanks to Prof. R. H. Borhade, Head of Information Technology Department, Smt.
Kashibai Navale College of Engineering, Vadgaon for giving me all the help and important suggestions
all over the Seminar Work. I thank all the teaching and non-teaching staff members, for their
indispensable support and priceless suggestions.
I also thank my friends and family for their help in collecting data without which this Seminar report
not have been Completed. At the end my special thanks to Dr. K. R. Borole , Vice-Principal and
Dr. A.V.Deshpande, Principal, Smt. Kashibai Navale College of Engineering, Vadgaon for providing
ambience in the college, which motivate us to work.
SACHIN SHITOLE
SURYANSH TIWARY
GANESH PATIL
RISHAB MISHRA
3
CONTENTS
1.1)Motivation
1.2)Problem Statement
1.3)Objectives
2 Literature Survey 9
2.2)Related Work
2.2)Existing System
4 System Design 12
4.1) Basic Architecture
4.2) DFD0
4.3) DFD1
4.4) DFD2
4.5) Sequence Diagram
4.6) Use Case Diagram
4.7) Activity Diagram
4.8) Activity by Faculty
6 System Testing 18
7 Testing Screenshots 18
4 8 Conclusion 32
9 References 33
Figure table
Figure Name Page No.
Basic Architecture 24
DFD0 25
DFD1 25
DFD2 25
Sequence Diagram 26
Activity Diagram 28
Activity by Faculty 29
Class Diagram 30
5
Abstract
The conventional method of taking attendance is done manually by the teacher or the administrator
which requires considerable amount of time and efforts also involving errors and proxy attendance. As
the number of students is increasing day by day, it is a challenging task for universities or colleges to
monitor and maintain the record of the students. Automated systems involving use of biometrics like
fingerprint and iris recognition are well developed in the recent years however, it is intrusive and cost
required for deployment on large scale gets increased substantially. To overcome these issues,
biometric feature like facial recognition can be used which involves the phases such as image
acquisition, face detection, feature extraction, face classification, face recognition and eventually
marking the attendance. The algorithms like Viola- Jones and HOG features along with SVM classifier
are used to acquire the desired result.
Chapter 1
Introduction
In this report, we focus on automatically annotating faces in images based on the ambiguous supervision from
the associated captions given. Some pre-processing steps need to be conducted before performing face naming.
Specifically, faces in the images are automatically detected using face detectors and names in the captions are
automatically extracted using a name entity detector. Here, the list of names appearing in a caption is denoted as
the candidate name set. Even after successfully performing these pre-processing steps, automatic face naming is
still a challenging task. Checking the performance of students and maintaining the attendance is a tedious
process for institute. Each institute has adopted their own method of taking attendance i.e. calling the names or
by passing the sheets. Several very popular automatic attendance systems currently in use are RFID, IRIS,
FINGERPRINT etc. However, making queue is essential in these cases thus requires more time and it is
intrusive in nature. Any damage to RFID card can make inappropriate attendance.
Apart from this deploying these systems on large scale is not cost efficient. In order to have a system both time
and cost efficient with no human intervention, facial recognition is the suitable solution also face is people's
preliminary scheme of person identification. With the rapid development in the fields of image processing such
as pattern recognition, facial recognition and signature recognition the efficiency of this system is keep on
increasing.
This system is attempting to provide an automated attendance system that carries out the face recognition task
through an image/video stream to record the attendance in lectures or sections and keeping the database of
attendance. After creating the database of the students/ candidates, it requires almost zero efforts from the user
side. Thus intrusive nature is absent in this system and makes the system effective.
1.1 Motivation
We get motivated of existing system.we have to match user object with database image using Scale invariant
feature transform. In that system first we have pre-processing on that video then select feature extraction and
compare object with database and get the result
-To overcome all these problems, our SMART ATTENDANCE USING FACE RECOGNITION can be useful.
1.3 Objectives
To save the time.
To completely eliminate proxy attendance.
To provide a weekly survey of student
To identify the odd person in the class.
Chapter 2
LITERATURE SURVEY
1 RFID (Radio 2006 Samuel King System A number of works . This system may give
Frequency Opoku related to Radio Frequency rise to the problem of
fraudulent access.
Identification)- Identification (RFID) based
Unauthorized person
based Attendance Attendance Systems exist in may make use of
System the literature. In the authors authorized ID card and
enter into the
have proposed RFID based
organization
system in which students
carry a RFID tag type ID
card and they need to place
that on the card reader to
record their attendance.
RS232 is used to connect the
system to the computer and
save the recorded attendance
from the database
2 . Fingerprint based 2009 D. Ozkan and A portable fingerprint device The problem with this
Attendance System P. Duygulu has been developed which approach is that
passing of the device
can be passed among the
during the lecture time
students to place their finger may distract the
on the sensor during the attention of the
students.
lecture time without the
instructor’s intervention. This
system guarantees a
foolproof method for
marking the attendance.
3 Iris-Recognition 2010 G. Liu, Z. Iris is the bio-metric that can This system uses iris
Based Attendance Lin, and Y. be used for Attendance recognition
management system
System Yu Systems. In [2] the authors
that does capturing the
have proposed Daugmans image of iris
algorithm based Iris recognition, extraction,
storing and matching.
recognition system.
But the difficulty
occurs to lay the
transmission lines in
the places where the
topography is bad. In
authors have proposed
a system based on real
time face recognition
which is reliable,
secure and fast which
needs improvement in
different lighting
conditions.
1
0
5 Bluetooth based 2007 Arulogun O. This system has high Bluetooth do not allow
System T., usability and proxy removal more than 8
Olatunbosun methods can be included to connections at a time
A., Fakolujo make the system perfect. this is due to a master
O. A., and However, the system is not and slave concept. This
Olaniyi O. M scalable and requires 8 redundancy makes it a
connections active at a time. feasible resource for a
limited population
1
1
The automated systems like IRIS, FINGERPRINT, and RFID provide better percentage of accuracy but have
some limitations like intrusive nature and time inefficient. First step in automatic face recognition is face
detection. In 2001, Paul Viola and Michael Jones proposed a real time object detection with very high image
processing rate. It is capable of detecting a variety of object classes and was greatly inspired by the problem of
face detection. Computer vision is the field that makes computer to gain high level of understanding from
digital images or videos. It includes schemes of acquiring, processing, analyzing and understanding digital
images and extracts high dimensional data to produce symbolic information. Machine learning is another
important area that evolved from the study of pattern recognition and computational learning theory in artificial
intelligence. Computer vision and machine learning together provides excellent tool in the process of
recognition. The overall configuration can be described by a vector which representing the position and size of
the main facial features like eyes and eyebrows, nose, mouth, and an outline of face.
1
2
Chapter 3
System Requirement and Specification
The system consists of a camera that captures the images of the employee and sends it to the image
enhancement module. After enhancement the image comes in the Face Detection and Recognition modules and
then the attendance is marked on the database server. This is shown in the experimental setup. At the time of
enrolment, templates of face images of individual employees are stored in the Face database. Here all the faces
are detected from the input image and the algorithm compares them one by one with the face database. If any
1
4 face is recognized the attendance is marked on the server from where anyone can access and use it for different
purposes. Fig. 1 Experimental Setup In this way a lot of time is saved and this is highly secure process no one
can mark the attendance of other. Attendance is maintained on the server so anyone can access it for purposes
like administration, employees themselves. In order to avoid the false detectionProject planning is a procedural
step in project management, where required documentation is created to ensure successful project completion.
Documentation includes all actions required to define, prepare, integrate and coordinate additional plans. The
project plan clearly defines how the project is executed, monitored, controlled and closed.
Scheduling
In project management, a schedule is a listing of a project's milestones, activities, and deliverables, usually with
intended start and finish dates. Those items are often estimated by other information included in the project
schedule of resource allocation, budget, task duration, and linkages of dependencies and scheduled events. A
schedule is commonly used in the project planning and project portfolio management parts of project
management
1
5
Chapter 4
System Design
4.1.1
1
6
1
7
4.2.2
DFD LEVEL 1
DFD LEVEL 2
1
8
DFD LEVEL 3
1
9
SEQUENCE DIAGRAM
2
0
2
1
ACTIVITY DIAGRAM
2
2
2
3
Class diagram
2
4
Chapter 4
Theory and System Design
4.3Feature Extraction
After the face detection step, human-face patches are extracted from images. Directly using these patches for
face recognition have some disadvantages, first, each patch usually contains over 1000 pixels, which are too
2 large to build a robust recognition system. Second, face patches may be taken from different camera alignments,
5
with different face expressions, illuminations, and may suffer from occlusion and clutter. To overcome these
drawbacks, feature extractions are performed to do information packing, dimension reduction, salience
Department of Information Technology, SKNCOE, Pune
SMART ATTENDANCE USING FACE RECOGNITION
extraction, and noise cleaning. After this step, a face patch is usually transformed into a vector with fixed
dimension or a set of fiducially points and their corresponding locations. In some literatures, feature extraction
is either included in face detection or face recognition.
2
6
The system consists of a camera, installed in the classroom capturing the photo frames followed by the
detection of multiple faces.
These faces are cropped and converted to gray scale causing reduction in the number of bits to be
processed. These faces are then compared with the database faces and display the result and mark the
2
7 attendance.
We perform a detailed security analysis and performance evaluation of the proposed data
2
8
Chapter 5
System Testing
5.1 Testing
Software testing is defined as an activity to check whether the actual results match the expected results and to
ensure that the software system is Defect free. It involves execution of a so of component or system component
to evaluate one or more properties of interest.Software testing also helps to identify errors, gaps or missing
requirements in contrary to the actual requirements. It can be either done manually or using automated tools.
Some prefer saying Software testing as a White Box and Black Box Testing .In simple terms, Software Testing
means Verification of Application Under Test (AUT).This tutorial introduces testing software to the audience
and justifies it's importance. Testing is important because software bugs could be expensive or even dangerous.
Software bugs can potentially cause monetary and human loss, and history is full of such examples.
GOAL:
The goal of interface the correct name and body are recognised then it will check the database, the user is
normal or criminal .
OBJECTIVE:
2
9
after the functionality is developed, but before it is shipped to the customer. This practice often results in the
testing phase being used as a project buffer to compensate for project delays, thereby compromising the
time devoted to testing.
at the same moment the development project starts, as a continuous process until the project finishes.
However, even in the waterfall development model, unit testing is often done by the software development team
even when further
In contrast, some emerging software disciplines such as extreme programming and the agile software
development movement, adhere to a "test-driven software development" model. In this process, unit tests are
written first, by the software engineers (often with pair programming in the extreme programming
methodology). The tests are expected to fail initially. Each failing test is followed by writing just enough code
to make it pass.[63] This means the test suites are continuously updated as new failure conditions and corner
cases are discovered, and they are integrated with any regression tests that are developed. Unit tests are
maintained along with the rest of the software source code and generally integrated into the build process (with
inherently interactive tests being
Black box testing is defined as a testing technique in which functionality of the Application Under Test (AUT)
is tested without looking at the internal code structure, implementation details and knowledge of internal paths
of the software. This type of testing is based entirely on software requirements and specifications.
3
0
White-box testing (also known as clear box testing, glass box testing, transparent box testing, and structural
testing) is a method of testing software that tests internal structures or workings of an application, as opposed to
its functionality (i.e. black-box testing). In white-box testing an internal perspective of the system, as well as
programming skills, are used to design test cases. The tester chooses inputs to exercise paths through the code
and determine the expected outputs. This is analogous to testing nodes in a circuit, e.g. in-circuit testing (ICT).
White-box testing can be applied at the unit, integration and system levels of the software testing process.
"Results-Based Testing" (RBT) is an alternative pricing system for software testing which allows companies to
pay for the bugs which are detected, instead of for time spent on a project. This was adopted in response to
dissatisfaction which clients expressed toward the pricing structure employed by most testing companies, and
has led to higher customer satisfaction and better accuracy in bug detection.
1. A Scope of work
2. A contractual SLA
3. A pricing mechanism
RBT is normally utilized when part or all of the software testing process is outsourced to a third party and a
core contractual SLA together with a pricing mechanism sets the exact payment made at each SLA level. The
pricing mechanism may be a flexible rate for each SLA level or a Penalty/Reward mechanism, all with the goal
of creating an incentive for the Testing Supplier to meet the business targets (results) set forth. However, RBT
may (and should) also be used for internal testing teams even though in such cases a penalty/reward mechanism
is harder to implement. Another good use of RBT is for establishing the necessary framework for measured
continuous improvement in which results from previous periods can serve as a baseline for following period’s
3
targets.
1
Chapter 6
Testing Screenshots
3
2
3
3
3
4
3
5
3
6
Chapter 7
Conclusion
The attendance management system estimates the attendance of each student by continuous clicking of images
for some time period and finds the best localized image for processing. The system allows the teacher to check
student’s attendance automatically without any extra cost and effort whereas the proposed system needs very
elementary things such as; camera, laptop or personal computer and local network. This method is secure,
reliable and easy to use. Automated Attendance Systems based on face recognition techniques thus proved to be
time saving and secured. This system can also be used to identify an unknown person. An automatic attendance
management system is a necessary tool for any organization. Most of the existing systems are time consuming
and require for a semi manual work from the teacher or students. This approach aims to solve the issues by
integrating face recognition in the process.
3
7
Chapter 8
References
[1] S. Kadry and K. Smaili, “A design and implementation of a wireless iris recognition attendance
management system”, Information Technology and control, vol. 36, no. 3, pp. 323–329, 2007
[2] B. Bhanu, X. Tan, “Learned templates for feature extraction in fingerprint images”, Proceedings of the IEEE
Conference on Computer Vision and Pettern recognition, vol.2, 2001, pp.591-596.
[3] T. Lim, S. Sim, and M. Mansor, “Rfid based attendance system”, in Industrial Electronics & Applications,
2009. ISIEA 2009. IEEE Symposium on, vol. 2. IEEE, 2009, pp. 778–782
[4] P. Viola and M. J. Jones, “Robust real-time face detection”, International journal of computer vision, vol.
57, no. 2, pp. 137– 154, 2004
[5] P.N. Belhumeour, J.P. Hespanha, and D.J. Kriegman, “Eigenfaces vsFisherfaces: Recognition using class
specific linear projection”, IEEE
Transactions on Pattern Analysis and Machine Intelligence, 19(7):711–720, 1997
[6] Z. Hafed, “Face Recognition Using DCT”, International Journal of Computer Vision, 2001, pp. 167-188.
[7] Face recognition by linear discriminant analysis suman kumar bhattacharyya1, kumar
rahul2”(FISHERFACES)
[8] C. Olson “A General Method for Geometric Feature Matching and Model Extraction”, International Journal
of Computer Vision 45(1), 39–54, 2001
[13] B. Boser, I. Guyon and V. Vapnik, ”A training algorithm for optimal margin classifiers”, In Proceedings of
the Fifth Annual Workshop on
Computational Learning Theory, pages. 144 -152. ACM International Conference on Computer Graphics,
Image and Visualization (CGIV04), 2004 IEEE.
3
9