International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-8 Issue-4, November 2019 11652 Published By: Blue Eyes Intelligence Engineering & Sciences Publication Retrieval Number: D9450118419/2019©BEIESP DOI:10.35940/ijrte.D9450.118419 Abstract: Now a day’s face detection technology is widely used technique. It attracted attention for much valuable application in the market such as face recognition system. Biometric authentication is most important method in security system. Universally used Biometric fingerprint scanner can be bypassed quite easily. It can be broke easily. Biometric face recognition has been introduced to improve the security of a system. Methods such as Motion based and texture based are used for biometric face recognition. But these methods have less robustness and poor generalization ability. But apart from further security issues, this paper presents a new approach to make attendance of the student in class by the face recognition. Now a day’s attendance system is usually done manually or by the biometric fingerprint. Those are mistaken and tedious techniques. So this technique records the student’s participation in classroom consequently and provide facility for teachers for obtaining the data of the student effectively using log to check in and out time Index Terms :Human Computer Interaction, Biometric Authentication, Motion Based Method. I INTRODUCTION The various recognition systems such as e.g. signature acknowledgment, facial acknowledgment, emerge as one of the greatest development in the face recognition system[1][2][3]. These situation arise because these intellectual techniques is used widely in many the big -administration for making decision that helps to improve the execution and effectiveness of system[4][5][6]. Then again, for an association to be effective, fast and extraction method for recognition of the human being who comes under these association system[7][8][9] . Biometric recognition can possibly turned into an essential piece of numerous identification frameworks utilized for assessing the execution of those individuals working inside the association. In spite of the fact that biometric advances are so high that the field is has developed its network for in various technical field but still lack in providing accurate result for automated human recognition[10][11][12]. II. FACE RECOGNITION SYSTEM FLOW Revised Manuscript Received on November 14, 2019 M. Angulakshmi (Corresponding Author), School of Information Technology and Engineering,, Vellore Institute of Technology, Vellore, India. M. Deepa School of Information Technology and Engineering, Vellore Institute of Technology, Vellore, India. S.Sudha, School of Information Technology and Engineering, Vellore Institute of Technology, Vellore, India. K.Brindha , School of Information Technology and Engineering, Vellore Institute of Technology, Vellore, India. R.Rathi , School of Information Technology and Engineering, Vellore Institute of Technology, Vellore, India Fig 1. A .Face Detection This process is use for detecting the face and removes area of face from the remaining image background[13][14][15]. A. Face Alignment The proposed procedure concentrate on searching for good area and face standardization ; Generally identification step does not consider face position The step plots the various parts of face for example, layout, eyeborrows, lips, etc [17][18] Thereafter standardization as for geometrical changes with photometrical possessions, for example, enhancing and depressing scale occur. B. Image Removal Later the historical binary phases, climax withdrawal is done consequential near operative data which is supportive for knowing amid expressions of dissimilar persons and steady by reverence to the vayrious verities. C. Face Similar The detached gears are equated thru those kept in the record, and picks are ended giving to faith in the equal score D. Human-ComputerInteraction: Various human computer interation games are available E. Smooth Cards and Expression ID: Client confirmation put away esteem security, identifications, voters' enrollment.terminals, restorative records, web and intranet security, terrorist alarm. III. PROBLEM DEFINITION- Each day an address, segment or research center begins the instructor or showing Assistant defers the address to record understudies' participation. This is an broad process and involves a parcel of time and effort, particularly in the case that it is an address with an Attendance Posting Through Face Recognition Angulakshmi M, Deepa M, Sudha S, Brindha K, Rathi R