尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
Team
Members
Raihan Sikdar
ID-17181103133
Kazi Sarwar Uddin
ID-17181103127
Zarin Tasnim
ID-17181103042
Topic Cover
 Introduction.
 What are Biometrics ?
 What is Face Recognition?
 Why we choose Face Recognition?
 Classification of Face Recognition.
 Implementation of face Recognition Technology.
 How Face Recognition System work?
 Face Bunch graph.
 Face Recognition Attendance System.
 Advantage of Automatic Attendance System
with Face Recognition
Introduction
The information age is quickly revolutionizing the way transactions are
completed. Everyday actions are increasingly being handled
electronically, instead of with pencil and paper or face to face. This
growth in electronic transactions has resulted in a greater demand for
fast and accurate user identification and authentication. Access codes
for buildings, banks accounts and computer systems often use PIN's
for identification and security clearances.
Using the proper PIN gains access, but the user of the PIN is not
verified. When credit and ATM cards are lost or stolen, an unauthorized
user can often come up with the correct personal codes. Despite
warning, many people continue to choose easily guessed PIN‟s and
passwords: birthdays, phone numbers and social security numbers.
Recent cases of identity theft have heighten the need for methods to
prove that someone is truly who he/she claims to be.
Face recognition technology may solve this problem since a face is
undeniably connected to its owner expect in the case of identical twins.
Its nontransferable. The system can then compare scans to records
stored in a central or local database or even on a smart card.
A biometric is a unique, measurable characteristic of a human being
that can be used to automatically recognize an individual or verify
an individual‟ s identity. Biometrics can measure both physiological
and behavioral characteristics. Physiological biometrics (based on
measurements and data derived from direct measurement of a part
of the human body) include:
a. Finger-scan
b. Facial Recognition
c. Iris-scan
d. Retina-scan
e. Hand-scan
What are
Biometrics ?
Modern Portfolio
Presentation
Face recognition is a method
of identifying or verifying the
identity of an individual using
their face. Face recognition
systems can be used to
identify people in photos,
video, or in real-time.
What is
Face Recognition?
?
It can use your existing
hardware infrastructure,
existing camaras and image
capture.
It is the only biometric that
allow you to perform passive
identification in a one to. Many
environments
Overall it is the most efficient
system to collect automatic
student attendance of Online
class in Corona Pandemic
It requires no physical
interaction on behalf of
the user.
It is accurate and allows
for high enrolment and
verification rates.
It does not require an
expert to interpret the
comparison result.
For face recognition there are two
types of comparisons.
Classification of
FACE
RECOGNITION
1. Verification: This is where the system
compares the given individual with who that
individual says they are and gives a yes or no
decision.
2. Identification: This is where the system
compares the given individual to all the Other
individuals in the database and gives a ranked
list of matches.
All identification or authentication technologies operate
using the following four stages:
1) Capture: A physical or behavioural sample is
captured by the system during Enrollment and
also in identification or verification process.
2) Extraction: Unique data is extracted from the
sample and a template is created.
3) Comparison: The template is then compared
with a new sample.
4) Match/non match: The system decides if the
features extracted from the new Samples are a
match or a non match
A pre-processing module locates the eye position
and takes care of the surrounding lighting condition
and color variance. First the presence of faces or
face in a scene must be detected. Once the face is
detected, it must be localized.
Some facial recognition approaches use the whole
face while others concentrate on facial components
and/ or regions (such as lips, eyes etc). The
appearance of the face can change considerably
during speech and due to facial expressions.
The input can be recorded video of the speaker
or a still image. A sample of 1 sec duration
consists of a 25 frame video sequence. More
than one camera can be used to produce a 3D
representation of the face and to protect
against the usage of photographs to gain
unauthorized access.
Synergetic computer are used to
classify optical and audio
features, respectively. A
synergetic computer is a set of
algorithm that simulate
synergetic phenomena. In training
phase the BIOID creates a
prototype called face print for
each person. A newly recorded
pattern is pre-processed and
compared with each face print
stored in the database. As
comparisons are made, the
system assigns a value to the
comparison using a scale of one
to ten. If a score is above a
predetermined threshold, a match
is declared.
Three
Stages
Implementation of Face Recognition Technology
How Face Recognition Systems
Work
If we look at the mirror, we can see that our face has
certain distinguishable landmarks. These are the peaks
and valleys that make up the different facial features.
Software defines these landmarks as nodal points.
There are about “80 nodal points” on a human face.
Here are few nodal points that are measured by the
software.
• distance between the eyes
• width of the nose
• depth of the eye socket
• cheekbones
• jaw line
• chin
How Face Recognition Systems
Work
Face Bunch Graph
 A Face bunch graph is created from “70 nodal
points” to obtain a general representation of face.
 Given an image the face is matched to the Face
bunch graph to find the same point.
 These nodal points are measured to create a
numerical code, a string of numbers that represents
a face in the database. This code is called face
print.
 Only 14 to 22 nodal points are needed for face it
software to complete the recognition process.
Face Recognition Attendance System
 The modern face recognition attendance system is
much efficient and safer than the conventional
counterparts. There are a few attendance systems
that are based on the face recognition technology
and each of them has extremely varying features for
the best suitability in different environments.
 It provides a facility for the central data
management system.
 A very cost effective method of recording the
attendance.
Easy to manage
Increased security
Cost-effective.
Automated time tracking
system
Advantage of Automatic Attendance System with Face Recognition
Physical
Description
Test
Same
Person’s
Images
128
Measurements
Generated
From
Image
Input Image
Test
Same
Person’s
Images
Test
Same
Person’s
Images
Test
Different
Persons
Images
Test
Different
Persons
Images
Test
Different
Persons
Images
Recognize
Real
Student
Recognize
Real
Student
Recognize
Real
Student
Recognize
who
is
not
Student
Recognize
who
is
not
Student
Attendance
File
Attendance
in
Excel
File
THANK YOU !

More Related Content

What's hot

Face recognisation system
Face recognisation systemFace recognisation system
Face recognisation system
Saumya Ranjan Behura
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
Divya Sushma
 
Face recognization
Face recognizationFace recognization
Face recognization
leenak770
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
Nikyaa7
 
Automatic Attendance System using Deep Learning
Automatic Attendance System using Deep LearningAutomatic Attendance System using Deep Learning
Automatic Attendance System using Deep Learning
Sunil Aryal
 
face recognition
face recognitionface recognition
face recognition
vipin varghese
 
Face Recognition Attendance System
Face Recognition Attendance System Face Recognition Attendance System
Face Recognition Attendance System
Shreya Dandavate
 
Project synopsis on face recognition in e attendance
Project synopsis on face recognition in e attendanceProject synopsis on face recognition in e attendance
Project synopsis on face recognition in e attendance
Nitesh Dubey
 
Face recognition
Face recognitionFace recognition
Face recognition
sandeepsharma1193
 
Face detection and recognition
Face detection and recognitionFace detection and recognition
Face detection and recognition
Pankaj Thakur
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
arvind carpenter
 
Face detection presentation slide
Face detection  presentation slideFace detection  presentation slide
Face detection presentation slide
Sanjoy Dutta
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
JASHU JASWANTH
 
Facial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptxFacial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptx
kakimetu
 
Project Face Detection
Project Face Detection Project Face Detection
Project Face Detection
Abu Saleh Musa
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
Asif Muhammad
 
Face Detection
Face DetectionFace Detection
Face Detection
Reber Novanta
 
Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
IBNC India - India's Biggest Networking Championship
 
Face recognition attendance system
Face recognition attendance systemFace recognition attendance system
Face recognition attendance system
mohanaprasad_v
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
SYED HOZAIFA ALI
 

What's hot (20)

Face recognisation system
Face recognisation systemFace recognisation system
Face recognisation system
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
 
Face recognization
Face recognizationFace recognization
Face recognization
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
 
Automatic Attendance System using Deep Learning
Automatic Attendance System using Deep LearningAutomatic Attendance System using Deep Learning
Automatic Attendance System using Deep Learning
 
face recognition
face recognitionface recognition
face recognition
 
Face Recognition Attendance System
Face Recognition Attendance System Face Recognition Attendance System
Face Recognition Attendance System
 
Project synopsis on face recognition in e attendance
Project synopsis on face recognition in e attendanceProject synopsis on face recognition in e attendance
Project synopsis on face recognition in e attendance
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face detection and recognition
Face detection and recognitionFace detection and recognition
Face detection and recognition
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Face detection presentation slide
Face detection  presentation slideFace detection  presentation slide
Face detection presentation slide
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
Facial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptxFacial Recognition Attendance System (Synopsis).pptx
Facial Recognition Attendance System (Synopsis).pptx
 
Project Face Detection
Project Face Detection Project Face Detection
Project Face Detection
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Face Detection
Face DetectionFace Detection
Face Detection
 
Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
 
Face recognition attendance system
Face recognition attendance systemFace recognition attendance system
Face recognition attendance system
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 

Similar to Attendance system based on face recognition using python by Raihan Sikdar

face-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxface-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptx
BHARATHGOWDAHA
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
Shashidhar Reddy
 
Biometrics
BiometricsBiometrics
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
Vaibhav P
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
priyabratamansingh1
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITION
Lisa Cain
 
face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxface-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptx
TanayChakraborty11
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
Poooi2
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
Shravan Halankar
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by Rohit
Rohit Shrivastava
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By Rohit
Rohit Shrivastava
 
Face recognition
Face recognition Face recognition
Face recognition
Chandan A V
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
Siddharth Modi
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
Murlidhar Sarda
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/Technology
RahulSingh3034
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
biometric technology
biometric technologybiometric technology
biometric technology
Anmol Bagga
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
Mazin Alwaaly
 
Face Recognition
Face Recognition Face Recognition
Face Recognition
nialler27
 
Biometric
BiometricBiometric
Biometric
NUPUR TIWARY
 

Similar to Attendance system based on face recognition using python by Raihan Sikdar (20)

face-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxface-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptx
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITION
 
face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxface-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptx
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by Rohit
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By Rohit
 
Face recognition
Face recognition Face recognition
Face recognition
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/Technology
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
 
Face Recognition
Face Recognition Face Recognition
Face Recognition
 
Biometric
BiometricBiometric
Biometric
 

More from raihansikdar

Violence-Detection-using-Transder-Learning.pptx
Violence-Detection-using-Transder-Learning.pptxViolence-Detection-using-Transder-Learning.pptx
Violence-Detection-using-Transder-Learning.pptx
raihansikdar
 
Efficient-Job-Recommendation-System-Using-Voting-Classifier-PPTX-converted.pptx
Efficient-Job-Recommendation-System-Using-Voting-Classifier-PPTX-converted.pptxEfficient-Job-Recommendation-System-Using-Voting-Classifier-PPTX-converted.pptx
Efficient-Job-Recommendation-System-Using-Voting-Classifier-PPTX-converted.pptx
raihansikdar
 
Prognosis of cardiovascular disease using machine learning procedures
Prognosis of cardiovascular disease using machine learning proceduresPrognosis of cardiovascular disease using machine learning procedures
Prognosis of cardiovascular disease using machine learning procedures
raihansikdar
 
Seven wonders of world
Seven wonders of worldSeven wonders of world
Seven wonders of world
raihansikdar
 
Quizz app By Raihan Sikdar
Quizz app By Raihan SikdarQuizz app By Raihan Sikdar
Quizz app By Raihan Sikdar
raihansikdar
 
Trend analysis-of-time-series-data-using-data-mining-techniques By Raihan Sikdar
Trend analysis-of-time-series-data-using-data-mining-techniques By Raihan SikdarTrend analysis-of-time-series-data-using-data-mining-techniques By Raihan Sikdar
Trend analysis-of-time-series-data-using-data-mining-techniques By Raihan Sikdar
raihansikdar
 
Data mining-implementation-to-predict-sales-using-time-series-method By Raiha...
Data mining-implementation-to-predict-sales-using-time-series-method By Raiha...Data mining-implementation-to-predict-sales-using-time-series-method By Raiha...
Data mining-implementation-to-predict-sales-using-time-series-method By Raiha...
raihansikdar
 
Deep-learning-or-health-informatics-recent-trends-and-future-directions By Ra...
Deep-learning-or-health-informatics-recent-trends-and-future-directions By Ra...Deep-learning-or-health-informatics-recent-trends-and-future-directions By Ra...
Deep-learning-or-health-informatics-recent-trends-and-future-directions By Ra...
raihansikdar
 

More from raihansikdar (8)

Violence-Detection-using-Transder-Learning.pptx
Violence-Detection-using-Transder-Learning.pptxViolence-Detection-using-Transder-Learning.pptx
Violence-Detection-using-Transder-Learning.pptx
 
Efficient-Job-Recommendation-System-Using-Voting-Classifier-PPTX-converted.pptx
Efficient-Job-Recommendation-System-Using-Voting-Classifier-PPTX-converted.pptxEfficient-Job-Recommendation-System-Using-Voting-Classifier-PPTX-converted.pptx
Efficient-Job-Recommendation-System-Using-Voting-Classifier-PPTX-converted.pptx
 
Prognosis of cardiovascular disease using machine learning procedures
Prognosis of cardiovascular disease using machine learning proceduresPrognosis of cardiovascular disease using machine learning procedures
Prognosis of cardiovascular disease using machine learning procedures
 
Seven wonders of world
Seven wonders of worldSeven wonders of world
Seven wonders of world
 
Quizz app By Raihan Sikdar
Quizz app By Raihan SikdarQuizz app By Raihan Sikdar
Quizz app By Raihan Sikdar
 
Trend analysis-of-time-series-data-using-data-mining-techniques By Raihan Sikdar
Trend analysis-of-time-series-data-using-data-mining-techniques By Raihan SikdarTrend analysis-of-time-series-data-using-data-mining-techniques By Raihan Sikdar
Trend analysis-of-time-series-data-using-data-mining-techniques By Raihan Sikdar
 
Data mining-implementation-to-predict-sales-using-time-series-method By Raiha...
Data mining-implementation-to-predict-sales-using-time-series-method By Raiha...Data mining-implementation-to-predict-sales-using-time-series-method By Raiha...
Data mining-implementation-to-predict-sales-using-time-series-method By Raiha...
 
Deep-learning-or-health-informatics-recent-trends-and-future-directions By Ra...
Deep-learning-or-health-informatics-recent-trends-and-future-directions By Ra...Deep-learning-or-health-informatics-recent-trends-and-future-directions By Ra...
Deep-learning-or-health-informatics-recent-trends-and-future-directions By Ra...
 

Recently uploaded

So You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental DowntimeSo You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental Downtime
ScyllaDB
 
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDCScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
From NCSA to the National Research Platform
From NCSA to the National Research PlatformFrom NCSA to the National Research Platform
From NCSA to the National Research Platform
Larry Smarr
 
intra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_Enintra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_En
NTTDATA INTRAMART
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to SuccessDynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
ScyllaDB
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
leebarnesutopia
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
ScyllaDB
 
Day 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data ManipulationDay 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data Manipulation
UiPathCommunity
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
AlexanderRichford
 
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State StoreElasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
ScyllaDB
 
Automation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI AutomationAutomation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI Automation
UiPathCommunity
 
Facilitation Skills - When to Use and Why.pptx
Facilitation Skills - When to Use and Why.pptxFacilitation Skills - When to Use and Why.pptx
Facilitation Skills - When to Use and Why.pptx
Knoldus Inc.
 
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
anilsa9823
 
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc
 
Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0
Neeraj Kumar Singh
 
Building a Semantic Layer of your Data Platform
Building a Semantic Layer of your Data PlatformBuilding a Semantic Layer of your Data Platform
Building a Semantic Layer of your Data Platform
Enterprise Knowledge
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
manji sharman06
 

Recently uploaded (20)

So You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental DowntimeSo You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental Downtime
 
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDCScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDC
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
From NCSA to the National Research Platform
From NCSA to the National Research PlatformFrom NCSA to the National Research Platform
From NCSA to the National Research Platform
 
intra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_Enintra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_En
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to SuccessDynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
 
Day 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data ManipulationDay 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data Manipulation
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
 
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State StoreElasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
 
Automation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI AutomationAutomation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI Automation
 
Facilitation Skills - When to Use and Why.pptx
Facilitation Skills - When to Use and Why.pptxFacilitation Skills - When to Use and Why.pptx
Facilitation Skills - When to Use and Why.pptx
 
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
 
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
 
Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0
 
Building a Semantic Layer of your Data Platform
Building a Semantic Layer of your Data PlatformBuilding a Semantic Layer of your Data Platform
Building a Semantic Layer of your Data Platform
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
 

Attendance system based on face recognition using python by Raihan Sikdar

  • 1.
  • 2. Team Members Raihan Sikdar ID-17181103133 Kazi Sarwar Uddin ID-17181103127 Zarin Tasnim ID-17181103042
  • 3. Topic Cover  Introduction.  What are Biometrics ?  What is Face Recognition?  Why we choose Face Recognition?  Classification of Face Recognition.  Implementation of face Recognition Technology.  How Face Recognition System work?  Face Bunch graph.  Face Recognition Attendance System.  Advantage of Automatic Attendance System with Face Recognition
  • 4. Introduction The information age is quickly revolutionizing the way transactions are completed. Everyday actions are increasingly being handled electronically, instead of with pencil and paper or face to face. This growth in electronic transactions has resulted in a greater demand for fast and accurate user identification and authentication. Access codes for buildings, banks accounts and computer systems often use PIN's for identification and security clearances. Using the proper PIN gains access, but the user of the PIN is not verified. When credit and ATM cards are lost or stolen, an unauthorized user can often come up with the correct personal codes. Despite warning, many people continue to choose easily guessed PIN‟s and passwords: birthdays, phone numbers and social security numbers. Recent cases of identity theft have heighten the need for methods to prove that someone is truly who he/she claims to be. Face recognition technology may solve this problem since a face is undeniably connected to its owner expect in the case of identical twins. Its nontransferable. The system can then compare scans to records stored in a central or local database or even on a smart card.
  • 5. A biometric is a unique, measurable characteristic of a human being that can be used to automatically recognize an individual or verify an individual‟ s identity. Biometrics can measure both physiological and behavioral characteristics. Physiological biometrics (based on measurements and data derived from direct measurement of a part of the human body) include: a. Finger-scan b. Facial Recognition c. Iris-scan d. Retina-scan e. Hand-scan What are Biometrics ?
  • 6. Modern Portfolio Presentation Face recognition is a method of identifying or verifying the identity of an individual using their face. Face recognition systems can be used to identify people in photos, video, or in real-time. What is Face Recognition?
  • 7. ? It can use your existing hardware infrastructure, existing camaras and image capture. It is the only biometric that allow you to perform passive identification in a one to. Many environments Overall it is the most efficient system to collect automatic student attendance of Online class in Corona Pandemic It requires no physical interaction on behalf of the user. It is accurate and allows for high enrolment and verification rates. It does not require an expert to interpret the comparison result.
  • 8. For face recognition there are two types of comparisons. Classification of FACE RECOGNITION 1. Verification: This is where the system compares the given individual with who that individual says they are and gives a yes or no decision. 2. Identification: This is where the system compares the given individual to all the Other individuals in the database and gives a ranked list of matches.
  • 9. All identification or authentication technologies operate using the following four stages: 1) Capture: A physical or behavioural sample is captured by the system during Enrollment and also in identification or verification process. 2) Extraction: Unique data is extracted from the sample and a template is created. 3) Comparison: The template is then compared with a new sample. 4) Match/non match: The system decides if the features extracted from the new Samples are a match or a non match
  • 10. A pre-processing module locates the eye position and takes care of the surrounding lighting condition and color variance. First the presence of faces or face in a scene must be detected. Once the face is detected, it must be localized. Some facial recognition approaches use the whole face while others concentrate on facial components and/ or regions (such as lips, eyes etc). The appearance of the face can change considerably during speech and due to facial expressions. The input can be recorded video of the speaker or a still image. A sample of 1 sec duration consists of a 25 frame video sequence. More than one camera can be used to produce a 3D representation of the face and to protect against the usage of photographs to gain unauthorized access. Synergetic computer are used to classify optical and audio features, respectively. A synergetic computer is a set of algorithm that simulate synergetic phenomena. In training phase the BIOID creates a prototype called face print for each person. A newly recorded pattern is pre-processed and compared with each face print stored in the database. As comparisons are made, the system assigns a value to the comparison using a scale of one to ten. If a score is above a predetermined threshold, a match is declared. Three Stages Implementation of Face Recognition Technology
  • 11. How Face Recognition Systems Work If we look at the mirror, we can see that our face has certain distinguishable landmarks. These are the peaks and valleys that make up the different facial features. Software defines these landmarks as nodal points. There are about “80 nodal points” on a human face. Here are few nodal points that are measured by the software. • distance between the eyes • width of the nose • depth of the eye socket • cheekbones • jaw line • chin
  • 12. How Face Recognition Systems Work
  • 13. Face Bunch Graph  A Face bunch graph is created from “70 nodal points” to obtain a general representation of face.  Given an image the face is matched to the Face bunch graph to find the same point.  These nodal points are measured to create a numerical code, a string of numbers that represents a face in the database. This code is called face print.  Only 14 to 22 nodal points are needed for face it software to complete the recognition process.
  • 14. Face Recognition Attendance System  The modern face recognition attendance system is much efficient and safer than the conventional counterparts. There are a few attendance systems that are based on the face recognition technology and each of them has extremely varying features for the best suitability in different environments.  It provides a facility for the central data management system.  A very cost effective method of recording the attendance.
  • 15. Easy to manage Increased security Cost-effective. Automated time tracking system Advantage of Automatic Attendance System with Face Recognition
  • 31.
  翻译: