Synp Face
Synp Face
Synp Face
The above mentioned students shall be working under the supervision of the undersigned on
the “Facial Recognition System”
Signature Signature
Associate Head of the Department
In the following sections, a brief introduction and the problem statement for the work has
been included.
1.1 Introduction
In today's fast-paced world, the demand for reliable and efficient security systems has never been
greater. Traditional methods of identity verification and access control are often time-consuming and
prone to human error, prompting the need for more advanced technological solutions. Among these
innovative advancements, facial recognition technology has emerged as a highly promising tool for
enhancing security measures. With its ability to accurately identify and authenticate individuals based
on their unique facial features, a facial recognition logging system holds immense potential to
revolutionize various industries, ranging from law enforcement and airports to corporate offices and
public spaces.
Facial recognition technology employs sophisticated algorithms and deep learning techniques to
analyze and compare facial patterns from images or video feeds. By capturing and processing facial
data, the system can verify an individual's identity against a pre-existing database, granting or denying
access accordingly. The widespread adoption of this technology has been fueled by its numerous
advantages, including its speed, accuracy, and versatility.
Face recognition is a biometric technology that involves identifying or verifying a person's identity by
comparing their facial features with those stored in a database. This process is achieved through
pattern recognition algorithms that analyze and match various facial features, such as the eyes, nose,
mouth, and jawline.
The task of face recognition can be divided into two main categories: verification and identification.
In verification, the system compares a person's face to a single reference image to confirm their
identity. This is commonly used for tasks such as unlocking smartphones or accessing secure
facilities.
In identification, the system compares a person's face to a database of known individuals to determine
their identity. This is commonly used in law enforcement and security applications to identify
suspects or persons of interest.
Face recognition systems are designed to learn and adapt to new faces over time, using machine
learning algorithms to continually improve their accuracy and performance. This involves analyzing
new faces and comparing them to existing data to identify patterns and features that can be used to
improve the accuracy of the system.
In addition to its use in law enforcement and security, face recognition is increasingly being used in
commercial applications, such as marketing and advertising. For example, some retailers are using
face recognition technology to identify and analyze customer demographics, preferences, and
behaviors, in order to provide more personalized and targeted advertising.
The advent of facial recognition systems represents a significant leap forward in security and
identification technology. By harnessing the power of advanced algorithms and deep learning, these
systems offer unparalleled speed, accuracy, and versatility in verifying individuals' identities. From
law enforcement and access control to personalized customer experiences, the potential applications
of facial recognition technology are vast and diverse. However, it is imperative to implement these
systems responsibly, addressing privacy concerns and ethical considerations, to ensure that they
contribute positively to society. With ongoing research, development, and public engagement, facial
recognition technology can be harnessed as a powerful tool for enhancing security and efficiency
across various sectors.
Figure 1.1 Basic functioning of a face recognition system
To design and develop a facial recognition attendance system that accurately and efficiently tracks the
attendance of students/employees using their facial features. The system should be user-friendly, cost-
effective, and capable of handling large volumes of data in real-time. The system should also be
secure, protecting the privacy of individuals' biometric data while ensuring that only authorized
individuals can access the data. Finally, the system should be able to handle various environmental
conditions such as different lighting conditions, occlusion, and pose variations to provide reliable
attendance tracking.
Chapter 2
Facial recognition technology has seen a surge in development and implementation in recent
years due to its ability to provide a fast, secure, and reliable way of identifying individuals. A
significant number of research studies and publications have been conducted in this area to
It has become increasingly important in various applications such as security systems, credit
card verification, and criminal identification. Much of the work in computer recognition of
faces has focused on detecting individual features like the eyes, mouth, and head outline and
defining the face model by the position, size, and relationships among these features.
Although there are three different approaches to face recognition, two basic methods give rise
to these approaches. The first method is based on information theory concepts and principal
component analysis, where the most relevant information that describes a face is derived
from the entire face image. The second method extracts feature vectors from the basic parts
of a face such as eyes, nose, mouth, and chin with the help of deformable templates and
extensive mathematics.
Face recognition is done in two steps: feature extraction and face matching. The ability to
model a particular face and distinguish it from a large number of stored face models is
Moreover, several studies have been conducted to address the challenges of facial recognition
systems in terms of privacy and security. For instance, Jain et al. (2016) discussed the privacy
concerns associated with the use of facial recognition systems and proposed a framework for
enhancing privacy in these systems. The authors suggested the use of secure multi-party
Additionally, a study by Yang et al. (2018) proposed a secure facial recognition system based
on block chain technology. The authors suggested the use of a block chain-based
Facial recognition algorithms often use landmarks or features on the face, such as the eyes,
nose, cheekbones, and jaw, to identify individuals in images. In a study by Klare et al. (2015),
the authors evaluated the performance of facial recognition systems in the unconstrained
environment. They analyzed the performance of several facial recognition algorithms and
found that the accuracy of facial recognition systems can be improved by using large datasets
In another study by Bhattacharyya et al. (2019), the authors developed a facial recognition
system using a combination of machine learning techniques and computer vision algorithms.
They evaluated the system's accuracy and efficiency in different lighting conditions and
normalization
There are two main approaches to facial recognition: the geometric approach and the
photometric approach.
1. Geometric approach
The geometric approach uses the segments, perimeters, and areas of figures formed by the
facial points to compare images. However, this approach can be problematic if the image is
templates, taking into account light and geometric angles. This approach requires multiple
registered images of the same person and cannot handle new images of a different person not
Objectives
attendance tracking methods. The system can quickly and easily identify
attendance or fraud.
liberties.
Chapter 4
System Requirements
● Ram : 4 GB
This algorithm is a popular approach to face recognition, where it uses the Eigenvectors of
the image dataset to recognize new faces. Eigenfaces are created by taking the most
important facial features from a set of images and converting them into a set of vectors that
can be used for analysis. The algorithm works by projecting an image onto this Eigenface
space and finding the best match between the projected image and a set of training images.
This method is computationally efficient and works well with large datasets.
This approach is also known as Fisherfaces, where it aims to find the optimal projection that
separates different classes of images by maximizing the between-class distance and
minimizing the within-class distance. The algorithm works by first computing the mean face
for each class, and then finding the directions in the Eigenspace that maximize the ratio of the
between-class variance to the within-class variance. It is commonly used for face recognition,
and it works well when there is a significant difference between different classes.
This algorithm is a statistical model that is commonly used for speech recognition, but it can
also be used for face recognition. The model uses a sequence of observations to estimate the
probability of a hidden state. In the case of face recognition, the hidden state could represent
the identity of the person in the image. The algorithm can work with partial observations,
making it robust to occlusions and variations in lighting conditions.
This algorithm uses a multilinear subspace learning approach to learn a tensor representation
of the image data. The algorithm works by representing each image as a high-dimensional
tensor and then finding a low-dimensional subspace that captures the most important features
of the images. The algorithm can work with images that have missing or incomplete data,
making it robust to occlusions and partial observations.
This algorithm is inspired by the structure and function of the human brain. It uses a dynamic
link matching technique to match the input image with a set of training images. The
algorithm works by first creating a set of neurons that represent the facial features, and then
linking these neurons together in a dynamic network. The network learns to recognize faces
by adjusting the weights of the links between the neurons, making it robust to variations in
the facial features.
Begin
1. def fisherfaces (X ,y , num_components =0) :
2. y = np . asarray (y)
3. [n , d] = X . shape
4. c = len ( np . unique (y ))
5. [ eigenvalues_pca , eigenvectors_pca , mu_pca ] = pca (X , y , (n -c ))
6. [ eigenvalues_lda , eigenvectors_lda ] = lda ( project ( eigenvectors_pca , X ,
mu_pca ) , y ,
7. num_components )
8. eigenvectors = np . dot ( eigenvectors_pca , eigenvectors_lda )
9. return [ eigenvalues_lda
End
[1] Introna LD, Nissenbaum H. “Facial recognition technology: a survey of policy and
implementation issues”. Report of the Center for Catastrophe Preparedness and Response. New
York: New York University, 2009.
[2] Agrawal AK, Singh YN. “Evaluation of face recognition methods in unconstrained
environments.” Procedia Comput Sci 2015
[3] Fontaine X, Achanta R, Süsstrunk S. “Face recognition in real-world images”. IEEE
International Conference on Acoustics, Speech and Signal Processing (ICASSP), New Orleans,
LA, 5–9 March 2017, pp.1482–1486. Piscataway, NJ: IEEE.
[4] Matthew T, Pentland A. “Eigenfaces for recognition”. J Cogn Neurosci 1991; 3: 71–89.
Website
[1] www.hindawi.com/journals/js/2021/
[2] https://recfaces.com/articles/facial-recognition-algorithms