scispace - formally typeset
Open accessJournal ArticleDOI: 10.1088/1757-899X/263/4/042022

Automated facial attendance logger for students

01 Oct 2017-Vol. 263, Iss: 4, pp 042022
Abstract: From the past two decades, various spheres of activity are in the aspect of 'Face recognition' as an essential tool. The complete series of actions of face recognition is composed of 3 stages: Face Detection, Feature Extraction and Recognition. In this paper, we make an effort to put forth a new application of face recognition and detection in education. The proposed system scans the classroom and detects the face of the students in class and matches the scanned face with the templates that is available in the database and updates the attendance of the respective students.

...read more

Citations
  More

Proceedings ArticleDOI: 10.5220/0006976506620666
Haiyun Wu1, Yunxi Ye1, Yuan Liu1, Huang Wuji1Institutions (1)
01 Jan 2018-
Abstract: As a sign arrival system of work, fingerprint attendance system aims to automate the attendance procedure of an educational institution using fingerprint technology. A hand-held device is designed to mark the attendance without the intervention of teacher. After students made to place their fingers over the sensor before the class, the corresponding names are shown in green. Student attendance would be recorded to the SD card storage module. The absence name of student would not only be updated to computer using a micro usb-cable, but also be sent to the teacher in charge or sent to the corresponding parents or both in mobile phone by SMS Module if the faculty pressed the button. Therefore, the intelligent fingerprint attendance instrument in the classroom greatly improves the efficiency of the teacher's class registration.

...read more

Topics: Fingerprint (computing) (59%), Attendance (53%)
References
  More

Open accessJournal ArticleDOI: 10.3745/JIPS.2009.5.2.041
Abstract: Face recognition presents a challenging problem in the field of image analysis and computer vision, and as such has received a great deal of attention over the last few years because of its many applications in various domains. Face recognition techniques can be broadly divided into three categories based on the face data acquisition methodology: methods that operate on intensity images; those that deal with video sequences; and those that require other sensory data such as 3D information or infra-red imagery. In this paper, an overview of some of the well-known methods in each of these categories is provided and some of the benefits and drawbacks of the schemes mentioned therein are examined. Furthermore, a discussion outlining the incentive for using face recognition, the applications of this technology, and some of the difficulties plaguing current systems with regard to this task has also been provided. This paper also mentions some of the most recent algorithms developed for this purpose and attempts to give an idea of the state of the art of face recognition technology.

...read more

Topics: Face Recognition Grand Challenge (67%), Face detection (60%), Object-class detection (59%) ...read more

695 Citations


Open accessJournal ArticleDOI: 10.5201/IPOL.2014.104
Yi-Qing Wang1Institutions (1)
Abstract: In this article, we decipher the Viola-Jones algorithm, the first ever real-time face detection system. There are three ingredients working in concert to enable a fast and accurate detection: the integral image for feature computation, Adaboost for feature selection and an attentional cascade for efficient computational resource allocation. Here we propose a complete algorithmic description, a learning code and a learned face detector that can be applied to any color image. Since the Viola-Jones algorithm typically gives multiple detections, a post-processing step is also proposed to reduce detection redundancy using a robustness argument. Source Code The source code and the online demo are accessible at the IPOL web page of this article 1 .

...read more

209 Citations


Open accessJournal Article
Abstract: Systems that rely on Face Recognition (FR) biometric have gained great importance ever since terrorist threats imposed weakness among the implemented security systems. Other biometrics i.e., fingerprints or iris recognition is not trustworthy in such situations whereas FR is considered as a fine compromise. This survey illustrates different FR practices that laid foundations on the issue of partial occlusion dilemma where faces are disguised to cheat the security system. Occlusion refers to facade of the face image which can be due to sunglasses, hair or wrapping of facial image by scarf or other accessories. Efforts on FR in controlled settings have been in the picture for past several years; however identification under uncontrolled conditions like illumination, expression and partial occlusion is quite a matter of concern. Based on literature a classification is made in this paper to solve the recognition of face in the presence of partial occlusion. These methods are named as part based methods that make use of Principal Component Analysis (PCA), Linear Discriminate Analysis (LDA), Non-negative Matrix Factorization (NMF), Local Non-negative Matrix Factorization (LNMF), Independent Component Analysis (ICA) and other variations. Feature based and fractal based methods consider features around eyes, nose or mouth region to be used in the recognition phase of algorithms. Furthermore the paper details the experiments and databases used by an assortment of authors to handle the problem of occlusion and the results obtained after performing diverse set of analysis. Lastly, a comparison of various techniques is shown in tabular format to give a precise overview of what different authors have already projected in this particular field.

...read more

83 Citations


Open accessJournal Article
Abstract: The goal of this paper is to present a critical survey of existing lite- ratures on human face recognition over the last 4-5 years Interest and research activities in face recognition have increased significantly over the past few years, especially after the American airliner tragedy on September 11 in 2001 While this growth largely is driven by growing application demands, such as static matching of controlled photographs as in mug shots matching, credit card verification to surveillance video images, identification for law enforcement and authentication for banking and security system access, advances in signal analysis techniques, such as wavelets and neural networks, are also important catalysts As the number of proposed techniques increases, survey and evaluation becomes important

...read more

65 Citations


Open accessJournal ArticleDOI: 10.5121/IJCSES.2014.5203
Abstract: Automatic recognition of facial expressions is an important component for human-machine interfaces. It has lot of attraction in research area since 1990's.Although humans recognize face without effort or delay, recognition by a machine is still a challenge. Some of its challenges are highly dynamic in their orientation, lightening, scale, facial expression and occlusion. Applications are in the fields like user authentication, person identification, video surveillance, information security, data privacy etc. The various approaches for facial recognition are categorized into two namely holistic based facial recognition and feature based facial recognition. Holistic based treat the image data as one entity without isolating different region in the face where as feature based methods identify certain points on the face such as eyes, nose and mouth etc. In this paper, facial expression recognition is analyzed with various methods of facial detection,facial feature extraction and classification.

...read more

50 Citations


Performance
Metrics
No. of citations received by the Paper in previous years
YearCitations
20181
Network Information