SlideShare uma empresa Scribd logo
1 de 32
Team
Members
Raihan Sikdar
ID-17181103133
Kazi Sarwar Uddin
ID-17181103127
Zarin Tasnim
ID-17181103042
Topic Cover
 Introduction.
 What are Biometrics ?
 What is Face Recognition?
 Why we choose Face Recognition?
 Classification of Face Recognition.
 Implementation of face Recognition Technology.
 How Face Recognition System work?
 Face Bunch graph.
 Face Recognition Attendance System.
 Advantage of Automatic Attendance System
with Face Recognition
Introduction
The information age is quickly revolutionizing the way transactions are
completed. Everyday actions are increasingly being handled
electronically, instead of with pencil and paper or face to face. This
growth in electronic transactions has resulted in a greater demand for
fast and accurate user identification and authentication. Access codes
for buildings, banks accounts and computer systems often use PIN's
for identification and security clearances.
Using the proper PIN gains access, but the user of the PIN is not
verified. When credit and ATM cards are lost or stolen, an unauthorized
user can often come up with the correct personal codes. Despite
warning, many people continue to choose easily guessed PIN‟s and
passwords: birthdays, phone numbers and social security numbers.
Recent cases of identity theft have heighten the need for methods to
prove that someone is truly who he/she claims to be.
Face recognition technology may solve this problem since a face is
undeniably connected to its owner expect in the case of identical twins.
Its nontransferable. The system can then compare scans to records
stored in a central or local database or even on a smart card.
A biometric is a unique, measurable characteristic of a human being
that can be used to automatically recognize an individual or verify
an individual‟ s identity. Biometrics can measure both physiological
and behavioral characteristics. Physiological biometrics (based on
measurements and data derived from direct measurement of a part
of the human body) include:
a. Finger-scan
b. Facial Recognition
c. Iris-scan
d. Retina-scan
e. Hand-scan
What are
Biometrics ?
Modern Portfolio
Presentation
Face recognition is a method
of identifying or verifying the
identity of an individual using
their face. Face recognition
systems can be used to
identify people in photos,
video, or in real-time.
What is
Face Recognition?
?
It can use your existing
hardware infrastructure,
existing camaras and image
capture.
It is the only biometric that
allow you to perform passive
identification in a one to. Many
environments
Overall it is the most efficient
system to collect automatic
student attendance of Online
class in Corona Pandemic
It requires no physical
interaction on behalf of
the user.
It is accurate and allows
for high enrolment and
verification rates.
It does not require an
expert to interpret the
comparison result.
For face recognition there are two
types of comparisons.
Classification of
FACE
RECOGNITION
1. Verification: This is where the system
compares the given individual with who that
individual says they are and gives a yes or no
decision.
2. Identification: This is where the system
compares the given individual to all the Other
individuals in the database and gives a ranked
list of matches.
All identification or authentication technologies operate
using the following four stages:
1) Capture: A physical or behavioural sample is
captured by the system during Enrollment and
also in identification or verification process.
2) Extraction: Unique data is extracted from the
sample and a template is created.
3) Comparison: The template is then compared
with a new sample.
4) Match/non match: The system decides if the
features extracted from the new Samples are a
match or a non match
A pre-processing module locates the eye position
and takes care of the surrounding lighting condition
and color variance. First the presence of faces or
face in a scene must be detected. Once the face is
detected, it must be localized.
Some facial recognition approaches use the whole
face while others concentrate on facial components
and/ or regions (such as lips, eyes etc). The
appearance of the face can change considerably
during speech and due to facial expressions.
The input can be recorded video of the speaker
or a still image. A sample of 1 sec duration
consists of a 25 frame video sequence. More
than one camera can be used to produce a 3D
representation of the face and to protect
against the usage of photographs to gain
unauthorized access.
Synergetic computer are used to
classify optical and audio
features, respectively. A
synergetic computer is a set of
algorithm that simulate
synergetic phenomena. In training
phase the BIOID creates a
prototype called face print for
each person. A newly recorded
pattern is pre-processed and
compared with each face print
stored in the database. As
comparisons are made, the
system assigns a value to the
comparison using a scale of one
to ten. If a score is above a
predetermined threshold, a match
is declared.
Three
Stages
Implementation of Face Recognition Technology
How Face Recognition Systems
Work
If we look at the mirror, we can see that our face has
certain distinguishable landmarks. These are the peaks
and valleys that make up the different facial features.
Software defines these landmarks as nodal points.
There are about “80 nodal points” on a human face.
Here are few nodal points that are measured by the
software.
• distance between the eyes
• width of the nose
• depth of the eye socket
• cheekbones
• jaw line
• chin
How Face Recognition Systems
Work
Face Bunch Graph
 A Face bunch graph is created from “70 nodal
points” to obtain a general representation of face.
 Given an image the face is matched to the Face
bunch graph to find the same point.
 These nodal points are measured to create a
numerical code, a string of numbers that represents
a face in the database. This code is called face
print.
 Only 14 to 22 nodal points are needed for face it
software to complete the recognition process.
Face Recognition Attendance System
 The modern face recognition attendance system is
much efficient and safer than the conventional
counterparts. There are a few attendance systems
that are based on the face recognition technology
and each of them has extremely varying features for
the best suitability in different environments.
 It provides a facility for the central data
management system.
 A very cost effective method of recording the
attendance.
Easy to manage
Increased security
Cost-effective.
Automated time tracking
system
Advantage of Automatic Attendance System with Face Recognition
Physical
Description
Test
Same
Person’s
Images
128
Measurements
Generated
From
Image
Input Image
Test
Same
Person’s
Images
Test
Same
Person’s
Images
Test
Different
Persons
Images
Test
Different
Persons
Images
Test
Different
Persons
Images
Recognize
Real
Student
Recognize
Real
Student
Recognize
Real
Student
Recognize
who
is
not
Student
Recognize
who
is
not
Student
Attendance
File
Attendance
in
Excel
File
THANK YOU !

Mais conteúdo relacionado

Mais procurados

Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection SystemAbhiroop Ghatak
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition SystemZara Tariq
 
Automatic Attendance System using Deep Learning
Automatic Attendance System using Deep LearningAutomatic Attendance System using Deep Learning
Automatic Attendance System using Deep LearningSunil Aryal
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShashidhar Reddy
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/TechnologyRahulSingh3034
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
Automated attendance system using Face recognition
Automated attendance system using Face recognitionAutomated attendance system using Face recognition
Automated attendance system using Face recognitionIRJET Journal
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyranjit banshpal
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemKarmesh Maheshwari
 
FACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTFACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTSaghir Hussain
 
Facial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptxFacial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptxkakimetu
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationAsim Kumar Pathak
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition systemDivya Sushma
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyShubhamLamichane
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShravan Halankar
 

Mais procurados (20)

Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection System
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
 
Automatic Attendance System using Deep Learning
Automatic Attendance System using Deep LearningAutomatic Attendance System using Deep Learning
Automatic Attendance System using Deep Learning
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/Technology
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Automated attendance system using Face recognition
Automated attendance system using Face recognitionAutomated attendance system using Face recognition
Automated attendance system using Face recognition
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Face recognisation system
Face recognisation systemFace recognisation system
Face recognisation system
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance System
 
FACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTFACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPT
 
Facial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptxFacial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptx
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Final year ppt
Final year pptFinal year ppt
Final year ppt
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
face detection
face detectionface detection
face detection
 

Semelhante a Attendance system based on face recognition using python by Raihan Sikdar

face-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxface-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxBHARATHGOWDAHA
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhavVaibhav P
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONLisa Cain
 
face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxface-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxTanayChakraborty11
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdfPoooi2
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by RohitRohit Shrivastava
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By RohitRohit Shrivastava
 
Face recognition
Face recognition Face recognition
Face recognition Chandan A V
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
biometric technology
biometric technologybiometric technology
biometric technologyAnmol Bagga
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognitionMazin Alwaaly
 
Face Recognition
Face Recognition Face Recognition
Face Recognition nialler27
 
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET Journal
 

Semelhante a Attendance system based on face recognition using python by Raihan Sikdar (20)

face-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxface-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptx
 
Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
 
Biometrics
BiometricsBiometrics
Biometrics
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITION
 
face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxface-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptx
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by Rohit
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By Rohit
 
Face recognition
Face recognition Face recognition
Face recognition
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
 
Face Recognition
Face Recognition Face Recognition
Face Recognition
 
Biometric
BiometricBiometric
Biometric
 
Biometric
BiometricBiometric
Biometric
 
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric LearningIRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric Learning
 

Mais de raihansikdar

Violence-Detection-using-Transder-Learning.pptx
Violence-Detection-using-Transder-Learning.pptxViolence-Detection-using-Transder-Learning.pptx
Violence-Detection-using-Transder-Learning.pptxraihansikdar
 
Efficient-Job-Recommendation-System-Using-Voting-Classifier-PPTX-converted.pptx
Efficient-Job-Recommendation-System-Using-Voting-Classifier-PPTX-converted.pptxEfficient-Job-Recommendation-System-Using-Voting-Classifier-PPTX-converted.pptx
Efficient-Job-Recommendation-System-Using-Voting-Classifier-PPTX-converted.pptxraihansikdar
 
Prognosis of cardiovascular disease using machine learning procedures
Prognosis of cardiovascular disease using machine learning proceduresPrognosis of cardiovascular disease using machine learning procedures
Prognosis of cardiovascular disease using machine learning proceduresraihansikdar
 
Seven wonders of world
Seven wonders of worldSeven wonders of world
Seven wonders of worldraihansikdar
 
Quizz app By Raihan Sikdar
Quizz app By Raihan SikdarQuizz app By Raihan Sikdar
Quizz app By Raihan Sikdarraihansikdar
 
Trend analysis-of-time-series-data-using-data-mining-techniques By Raihan Sikdar
Trend analysis-of-time-series-data-using-data-mining-techniques By Raihan SikdarTrend analysis-of-time-series-data-using-data-mining-techniques By Raihan Sikdar
Trend analysis-of-time-series-data-using-data-mining-techniques By Raihan Sikdarraihansikdar
 
Data mining-implementation-to-predict-sales-using-time-series-method By Raiha...
Data mining-implementation-to-predict-sales-using-time-series-method By Raiha...Data mining-implementation-to-predict-sales-using-time-series-method By Raiha...
Data mining-implementation-to-predict-sales-using-time-series-method By Raiha...raihansikdar
 
Deep-learning-or-health-informatics-recent-trends-and-future-directions By Ra...
Deep-learning-or-health-informatics-recent-trends-and-future-directions By Ra...Deep-learning-or-health-informatics-recent-trends-and-future-directions By Ra...
Deep-learning-or-health-informatics-recent-trends-and-future-directions By Ra...raihansikdar
 

Mais de raihansikdar (8)

Violence-Detection-using-Transder-Learning.pptx
Violence-Detection-using-Transder-Learning.pptxViolence-Detection-using-Transder-Learning.pptx
Violence-Detection-using-Transder-Learning.pptx
 
Efficient-Job-Recommendation-System-Using-Voting-Classifier-PPTX-converted.pptx
Efficient-Job-Recommendation-System-Using-Voting-Classifier-PPTX-converted.pptxEfficient-Job-Recommendation-System-Using-Voting-Classifier-PPTX-converted.pptx
Efficient-Job-Recommendation-System-Using-Voting-Classifier-PPTX-converted.pptx
 
Prognosis of cardiovascular disease using machine learning procedures
Prognosis of cardiovascular disease using machine learning proceduresPrognosis of cardiovascular disease using machine learning procedures
Prognosis of cardiovascular disease using machine learning procedures
 
Seven wonders of world
Seven wonders of worldSeven wonders of world
Seven wonders of world
 
Quizz app By Raihan Sikdar
Quizz app By Raihan SikdarQuizz app By Raihan Sikdar
Quizz app By Raihan Sikdar
 
Trend analysis-of-time-series-data-using-data-mining-techniques By Raihan Sikdar
Trend analysis-of-time-series-data-using-data-mining-techniques By Raihan SikdarTrend analysis-of-time-series-data-using-data-mining-techniques By Raihan Sikdar
Trend analysis-of-time-series-data-using-data-mining-techniques By Raihan Sikdar
 
Data mining-implementation-to-predict-sales-using-time-series-method By Raiha...
Data mining-implementation-to-predict-sales-using-time-series-method By Raiha...Data mining-implementation-to-predict-sales-using-time-series-method By Raiha...
Data mining-implementation-to-predict-sales-using-time-series-method By Raiha...
 
Deep-learning-or-health-informatics-recent-trends-and-future-directions By Ra...
Deep-learning-or-health-informatics-recent-trends-and-future-directions By Ra...Deep-learning-or-health-informatics-recent-trends-and-future-directions By Ra...
Deep-learning-or-health-informatics-recent-trends-and-future-directions By Ra...
 

Último

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Último (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

Attendance system based on face recognition using python by Raihan Sikdar

  • 1.
  • 2. Team Members Raihan Sikdar ID-17181103133 Kazi Sarwar Uddin ID-17181103127 Zarin Tasnim ID-17181103042
  • 3. Topic Cover  Introduction.  What are Biometrics ?  What is Face Recognition?  Why we choose Face Recognition?  Classification of Face Recognition.  Implementation of face Recognition Technology.  How Face Recognition System work?  Face Bunch graph.  Face Recognition Attendance System.  Advantage of Automatic Attendance System with Face Recognition
  • 4. Introduction The information age is quickly revolutionizing the way transactions are completed. Everyday actions are increasingly being handled electronically, instead of with pencil and paper or face to face. This growth in electronic transactions has resulted in a greater demand for fast and accurate user identification and authentication. Access codes for buildings, banks accounts and computer systems often use PIN's for identification and security clearances. Using the proper PIN gains access, but the user of the PIN is not verified. When credit and ATM cards are lost or stolen, an unauthorized user can often come up with the correct personal codes. Despite warning, many people continue to choose easily guessed PIN‟s and passwords: birthdays, phone numbers and social security numbers. Recent cases of identity theft have heighten the need for methods to prove that someone is truly who he/she claims to be. Face recognition technology may solve this problem since a face is undeniably connected to its owner expect in the case of identical twins. Its nontransferable. The system can then compare scans to records stored in a central or local database or even on a smart card.
  • 5. A biometric is a unique, measurable characteristic of a human being that can be used to automatically recognize an individual or verify an individual‟ s identity. Biometrics can measure both physiological and behavioral characteristics. Physiological biometrics (based on measurements and data derived from direct measurement of a part of the human body) include: a. Finger-scan b. Facial Recognition c. Iris-scan d. Retina-scan e. Hand-scan What are Biometrics ?
  • 6. Modern Portfolio Presentation Face recognition is a method of identifying or verifying the identity of an individual using their face. Face recognition systems can be used to identify people in photos, video, or in real-time. What is Face Recognition?
  • 7. ? It can use your existing hardware infrastructure, existing camaras and image capture. It is the only biometric that allow you to perform passive identification in a one to. Many environments Overall it is the most efficient system to collect automatic student attendance of Online class in Corona Pandemic It requires no physical interaction on behalf of the user. It is accurate and allows for high enrolment and verification rates. It does not require an expert to interpret the comparison result.
  • 8. For face recognition there are two types of comparisons. Classification of FACE RECOGNITION 1. Verification: This is where the system compares the given individual with who that individual says they are and gives a yes or no decision. 2. Identification: This is where the system compares the given individual to all the Other individuals in the database and gives a ranked list of matches.
  • 9. All identification or authentication technologies operate using the following four stages: 1) Capture: A physical or behavioural sample is captured by the system during Enrollment and also in identification or verification process. 2) Extraction: Unique data is extracted from the sample and a template is created. 3) Comparison: The template is then compared with a new sample. 4) Match/non match: The system decides if the features extracted from the new Samples are a match or a non match
  • 10. A pre-processing module locates the eye position and takes care of the surrounding lighting condition and color variance. First the presence of faces or face in a scene must be detected. Once the face is detected, it must be localized. Some facial recognition approaches use the whole face while others concentrate on facial components and/ or regions (such as lips, eyes etc). The appearance of the face can change considerably during speech and due to facial expressions. The input can be recorded video of the speaker or a still image. A sample of 1 sec duration consists of a 25 frame video sequence. More than one camera can be used to produce a 3D representation of the face and to protect against the usage of photographs to gain unauthorized access. Synergetic computer are used to classify optical and audio features, respectively. A synergetic computer is a set of algorithm that simulate synergetic phenomena. In training phase the BIOID creates a prototype called face print for each person. A newly recorded pattern is pre-processed and compared with each face print stored in the database. As comparisons are made, the system assigns a value to the comparison using a scale of one to ten. If a score is above a predetermined threshold, a match is declared. Three Stages Implementation of Face Recognition Technology
  • 11. How Face Recognition Systems Work If we look at the mirror, we can see that our face has certain distinguishable landmarks. These are the peaks and valleys that make up the different facial features. Software defines these landmarks as nodal points. There are about “80 nodal points” on a human face. Here are few nodal points that are measured by the software. • distance between the eyes • width of the nose • depth of the eye socket • cheekbones • jaw line • chin
  • 12. How Face Recognition Systems Work
  • 13. Face Bunch Graph  A Face bunch graph is created from “70 nodal points” to obtain a general representation of face.  Given an image the face is matched to the Face bunch graph to find the same point.  These nodal points are measured to create a numerical code, a string of numbers that represents a face in the database. This code is called face print.  Only 14 to 22 nodal points are needed for face it software to complete the recognition process.
  • 14. Face Recognition Attendance System  The modern face recognition attendance system is much efficient and safer than the conventional counterparts. There are a few attendance systems that are based on the face recognition technology and each of them has extremely varying features for the best suitability in different environments.  It provides a facility for the central data management system.  A very cost effective method of recording the attendance.
  • 15. Easy to manage Increased security Cost-effective. Automated time tracking system Advantage of Automatic Attendance System with Face Recognition
  • 31.