International Journal of Recent Technology and Engineering (IJRTE)
ISSN: 2277-3878, Volume-8 Issue-4, November 2019
11652
Published By:
Blue Eyes Intelligence Engineering
& Sciences Publication
Retrieval Number: D9450118419/2019©BEIESP
DOI:10.35940/ijrte.D9450.118419
Abstract: Now a day’s face detection technology is widely
used technique. It attracted attention for much valuable
application in the market such as face recognition system.
Biometric authentication is most important method in security
system. Universally used Biometric fingerprint scanner can be
bypassed quite easily. It can be broke easily. Biometric face
recognition has been introduced to improve the security of a
system. Methods such as Motion based and texture based are used
for biometric face recognition. But these methods have less
robustness and poor generalization ability. But apart from further
security issues, this paper presents a new approach to make
attendance of the student in class by the face recognition. Now a
day’s attendance system is usually done manually or by the
biometric fingerprint. Those are mistaken and tedious techniques.
So this technique records the student’s participation in classroom
consequently and provide facility for teachers for obtaining the
data of the student effectively using log to check in and out time
Index Terms :Human Computer Interaction, Biometric
Authentication, Motion Based Method.
I INTRODUCTION
The various recognition systems such as e.g. signature
acknowledgment, facial acknowledgment, emerge as one of
the greatest development in the face recognition
system[1][2][3]. These situation arise because these
intellectual techniques is used widely in many the big
-administration for making decision that helps to improve the
execution and effectiveness of system[4][5][6]. Then again,
for an association to be effective, fast and extraction method
for recognition of the human being who comes under these
association system[7][8][9] . Biometric recognition can
possibly turned into an essential piece of numerous
identification frameworks utilized for assessing the execution
of those individuals working inside the association. In spite
of the fact that biometric advances are so high that the field is
has developed its network for in various technical field but
still lack in providing accurate result for automated human
recognition[10][11][12].
II. FACE RECOGNITION SYSTEM FLOW
Revised Manuscript Received on November 14, 2019
M. Angulakshmi (Corresponding Author), School of Information
Technology and Engineering,, Vellore Institute of Technology, Vellore,
India.
M. Deepa School of Information Technology and Engineering, Vellore
Institute of Technology, Vellore, India.
S.Sudha, School of Information Technology and Engineering, Vellore
Institute of Technology, Vellore, India.
K.Brindha , School of Information Technology and Engineering,
Vellore Institute of Technology, Vellore, India.
R.Rathi , School of Information Technology and Engineering, Vellore
Institute of Technology, Vellore, India
Fig 1. A .Face Detection
This process is use for detecting the face and removes area
of face from the remaining image background[13][14][15].
A. Face Alignment
The proposed procedure concentrate on searching for good
area and face standardization ; Generally identification
step does not consider face position The step plots the
various parts of face for example, layout, eyeborrows,
lips, etc [17][18]
Thereafter standardization as for geometrical changes with
photometrical possessions, for example, enhancing and
depressing scale occur.
B. Image Removal
Later the historical binary phases, climax withdrawal is
done consequential near operative data which is supportive
for knowing amid expressions of dissimilar persons and
steady by reverence to the vayrious verities.
C. Face Similar
The detached gears are equated thru those kept in the
record, and picks are ended giving to faith in the equal score
D. Human-ComputerInteraction:
Various human computer interation games are available
E. Smooth Cards and Expression ID:
Client confirmation put away esteem security,
identifications, voters' enrollment.terminals, restorative
records, web and intranet security, terrorist alarm.
III. PROBLEM DEFINITION-
Each day an address, segment or research center begins the
instructor or showing Assistant defers the address to record
understudies' participation. This is an broad process and
involves a parcel of time and
effort, particularly in the case
that it is an address with an
Attendance Posting Through Face Recognition
Angulakshmi M, Deepa M, Sudha S, Brindha K, Rathi R