Site Loader

Abstract: Authentication is a vital issue in framework control in PC based communication. Human face recognition is an imperative branch of verification in biometric

and has been broadly utilized as a part of numerous applications, for example, human-PC interaction, door control framework, system security and video screen

This paper portrays a technique for Student’s Attendance System which will coordinate with the face recognition technology utilizing Personal Component Analysis (PCA)

algorithm. The framework will record the participation of the students in classroom consequently and it will give the facilities to the faculty to get to the data of

the students effortlessly by keeping up a log for check in and check out time.
Key Words: Face recognition system, automatic attendance, authentication, bio-metric, PCA.


Face recognition has been the inspiration for research all over the world. The time period and interest of studies in this field is characterized of its esteem and

unpredictability, and has turned into an increasingly imperative type of biometric authentication. With the huge progressions in face recognition, more research ought

to be done to enhance the proficiency, basically and exactness of the numerous strategy created.

A genetic algorithm is been selected into face recognition for this project. Genetic algorithms are arranged as widespread inquiry heuristics. Genetic algorithm is

utilized as a part of computing as a technique for researches to locate the genuine or evaluated solutions for upgrade and investigate issues. It utilizes systems

roused by evolutionary biology for example mutation, inheritance, crossover and choice. Facial Recognition fulfills the accompanying attributes, which certified it for

biometric authentication (Jain, Ross, and Prabhkar, 2004). Universality (have trademark)

1. Distinctiveness (have diverse trademark)

2. Permanence (trademark won’t be change in periods)

3. Collectability (Threat estimating)

Face recognition began at after the machine turned out to be more clever and had the progress to enhance the capacities and sense of human (Hossein Sahoolizadeh,

2008). Purposes behind consideration on facial recognition technology: Applicability in different applications incorporating into law enforcement framework, security

frameworks and in content-based video processing framework. The framework is contactless and it does not require any client input. A contributing elements that

emphatically appearance of face recognition technology incorporates development of the advanced camera technology with competitive cost.

Biometrics is mostly utilized for authentication purposes and furthermore alludes to automatic recognition of an individual, “furnishing a right person with the

correct benefits, and the correct access at the perfect time”. Cases of specific applications include getting to developments, workstation frameworks, PC and PDAs.

By that, securities could approve a person’s identity relying upon “who she is”, and not “what she has” and “what she could recollect”. Determined by application

structure, biometrics framework works on two modes, verification and identification mode (Laha, 2008).

This research predominantly include performance of real-time face recognition for attendance monitoring framework. As more impel progressions are gotten by

organizations or universities, they are so far standing up to the issue of observing student attendance.

Many universities including CIU is so far getting a handle on the ordinary techniques for passing the attendance sheet around the class for recording. To conquer that

issue, this research showed a framework in which participation organization can be made automated by face recognition. Automated face recognition attendance monitoring

is to a great degree helpful in saving gainful time of the students and instructors.


By executing the real-time face recognition attendance monitoring framework, the attendance can be more effectively recorded. The proposed framework updates the

attendance immediately the student face corresponds with the database template.

The proposed framework can recognize the client and reject the student in the event that they enter the wrong class or not in the right time. Face recognition for

attendance monitoring framework is produced by extracting captured image from the webcam.

Actualizing real-time face recognition for monitoring student attendance includes three stages, which incorporate face region detection, template extraction and face

recognition utilizing genetic algorithms. In the first stage, face detection region itself is grouped into four sub-stages, including image acquisition, face

detection, adjusting and cropping of face.

This framework is utilizing Principle Component Analysis method to deal with perceive face characteristic. PCA is utilized on account of its clarity. The framework

produces eigenface and does matching procedure by looking at the eigenface from the image captured with the image from the database template.

3.1 PCA (Principal Component Analysis PCA technique has been generally utilized in applications for example, face recognition and image reduction in volume. PCA is a

typical technique for discovering patterns in data, and expressing the data as eigenvector to feature the correspondence and contrasts between various data (Liu,

2000). The

following advances outline the PCA procedure.

1. Let {D1,D2,… DM} be the training data set. The normal Avg is characterized by:

2. Each component in the training data set contrasts from Avg by the vector Yi=Di-Avg. The covariance framework Cov is gotten as:

3. Choose M’ significant eigenvectors of Cov as EK’s, and process the weight vectors Wik for every component in the training data set, where k varies from 1 to


3.2 Image Acquisition

Face recognition for student attendance monitoring framework achieve images by interfacing a web camera where image is caputred with a computerized light sensor. Hence

it is sufficiently productive to utilize a webcam for face recognition framework. Webcam is associated with MATLAB build-in function “Video input” amid image

acquisition. After catching the images, the proposed framework continue to the picture pre-preparing stage.

The identified face is then pre-prepared by evacuating unwanted clamor and contrast is improved. The center pixel of the mask will then replace by median filter with

the middle estimation of every other pixel in the mask since median filter is a successful neighborhood averaging strategy.

Moreover, the median filter is likewise a successful strategy that can suppress disconnected clamor with sharp edges (Brunelli, 1993). Exactly, all pixels in the area

are replaced by a pixel with the median filter.

To upgrade the complexity, technique Contrast Limited Adaptive Histogram Equalization (CLAHE) is required. CLAHE is standard histogram adjustment and a speculation of

vigorous histogram adjustment (Shivram, 2010). Working of a small areas in the image, named tiles and not the entire images is primary the reason CLAHE was picked as

the contrast enhancement technique.

The contrast of each tile’s is enhanced independently and the neighboring tiles are jointed utilizing bilinear introduction to annul artificially induced boundaries.

Contrast is controlled to anticipate increasing commotions that represents in the image, particularly the homogenous territories (Aswini kumar mohanty, 2011). Face

image will then be cropped by the framework and do histogram equalization.

3.3 Feature Extraction

For feature extraction stages, the proposed framework utilized the Principal Component Analysis (PCA). The image matrix must be set as a beginning point for the PCA.

After the image matrixes are set, the mean of every data measurements is subtracted. The subtracted mean are the average from every measurement. Formula underneath

indicates how to calculate mean.

Figuring the covariance will be the subsequent stage. The Covariance formula is:

In the wake of ascertaining the covariance, framework will figure the eigenvectors of the covariance matrix. Then pick the eigenvector of the segments form a feature

vector. lastly, an outcome from the product of row featuring vector and row data adjust will be the final data.

Row feature vector from the formula is the matrix with the eigenvectors in the transposed of columns and Row data change will be the adjust data transpose. Final data

be the final data set, which incorporate the the measurements in rows and data items in columns.

3.4 Matching Process

In this procedure, the extracted image is compared with the image in the database template. This procedure utilizes Euclidian Distance to figure the separation between

2 vectors of n components.

A coordinating score is created after the coordinating procedure. Coordinating score would be finished up contingent upon the limit score that have been set


3.5 Decision

After the general procedure, the proposed system demonstrates an outcome either acknowledged or dismissed based on the threshold. Student’s attendance is recorded if

the outcome coordinate amid the coordinating notifications. The system demonstrates the coordinating notification and record the ustudent attendance if the outcome is

coordinated. else, the system rejects the student by displaying the error message.


Table 1: Euclidian Distance From System Testing Based On Different Environments

Time / Lights Lights Successful Rate
Environments On Off

Day 1.25 1.67
to to 2.43
3.17 3.64

Night 1.48 1.50
to to 2.81
3.27 6.00
A few tests are directed to check the execution of the real-time face recognition for attendance monitoring system. The testing outcomes about have been tried and

taken from couple of various environment backgrounds. Fundamentally is amid the day and evening with lights either on or off. A testing table 1 is made underneath to

gather all the testing outcomes. There are a few student photographs tried in the table.

By creating this table, the researchers set the threshold for the proposed system based on the distinctive kind of environments.
In view of the table 1, the researchers pick the most reduced and the most astounding threshold score from all the diverse tried photographs. Table 2 underneath

demonstrates the scope of the threshold tested and a normal effective rate is concluded.

Table 2: Environments Testing Threshold (Euclidian Distance)

Student Day Day Night Night Lowest &
Tested Light Light Light Light Highest
Photos On Off On Off Rate
1.25 1.28 1.49 1.50 &

1.77 2.10 1.48 1.65 &

2.02 1.87 2.15 2.39 &

3.16 3.30 2.85 2.95 &

2.40 2.45 3.27 3.58 &

1.26 1.46 1.66 1.52 &

The researchers set the limit for the proposed face recognition system based on the output limit of the outcomes collected. Since the most elevated threshold in this

system tested is 4.9968, the limit in this framework is set not to be more than 6.00. The system only acknowledges the client beneath the threshold set and expressed

the client as a faker when the limit is more than the limit set.

Update the students’ attendances: Throughout the decision making, a threshold known as the minimum value is set. The client is recognized as an approved individual

when the coordinating score is same or less than the limit. On the opposite side, when the coordinating score is more than the limit, the client will be recognized as

an unapproved individual. Futhermore, the system verifies whether the individual is associated with that chose subject or not directly after the system perceived the

face. In the event that the chose subject corresponds, the system will automatically updates the attendace of the student’s in the database


This framework has been proposed for maintaining the attendance record. The aim behind building up this system is to dispose of the considerable number of

disadvantages which were related with manual participation framework. The downsides running from wastage of time and paper, till the intermediary issues emerging in a

class, will totally be dispensed with.

Consequently, desired outcomes with easy to understand interface is expected in the future, from the system. The effectiveness of the system could be expanded by

coordinating different advances and procedures later on creating phases of the system

Post Author: admin