SlideShare a Scribd company logo
1 of 7
Download to read offline
Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022
DOI:10.5121/cseij.2022.12602 11
DETECTION OF FACE MASK AND GLASS USING
DEEP LEARNING ALGORITHM
Kavin Bharathi1
and Savithadevi M2
1
Vellore Institute of Technology, Chennai
2
National Institute of Technology, Tiruchirappalli
ABSTRACT
The rapid spread of the coronavirus has been a major health concern for the entire world. Direct human
contact is one of the key factors contributing to the virus's rapid transmission. Wearing face masks in
public areas is one of the numerous precautions that may be taken to stop the spread of this infection. To
reduce the chance of the virus spreading, it is important to find ways to detect face masks in public
locations. An automated system for face mask detection utilizing deep learning algorithm has been
presented to address these issues and effectively stop the spread of this contagious disease. The proposed
method combines a face mask identification model and a glass detection model using an algorithm to
assess the results using deep learning models.
KEYWORDS
Face Mask Detection, Glass Detection, Convolution Neural Network
1. INTRODUCTION
For practically everyone, the COVID-19 pandemic had introduced a new way of life. To avoid
contacting the virus, the World Health Organization (WHO) advised keeping a safe distance
from others and wearing a mask when going out. Nevertheless, a lot of people are still seen in
public spaces without face masks, which increases the spread rate of COVID-19. According to a
report by Economic Times India, "90% of Indians are aware, but only 44% are wearing a
mask."[13]
According to this survey, people are aware of the consequences of not wearing a mask
but yet choose to disregard it. This carelessness causes COVID19 to spread quickly.
It is very challenging to identify persons who are not wearing a mask and advise them to do so in
densely crowded areas, as is the situation with big cities in India. As a result, image processing
methods and methodologies has been used in this project to determine whether or not people are
wearing face masks. To determine whether someone is wearing a face mask or not, real-time
photos from a camera feed are gathered and put up for comparison with a trained dataset. People
wearing and not wearing face masks will be detected by the algorithm developed using a training
dataset. It can also be used for security purposes as forgery and thefts. The algorithm can identify
if customers entering a bank are wearing a mask and remove it.
The immigration section of airports is always very slow to respond to people. There is always a
huge crowd at the immigration. The process seemed simple, take a photo of the person. This was
the step that usually took very long. There are few automated airports where there wouldn't be an
officer interacting with the person. But security would inform us to remove the face mask and
any other accessories on the face like glass or hat.
Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022
12
The automated camera would proceed to take pictures even if the passenger has accessories on
their face. For mitigating this issue, this paper has tried to add a filter that would inform the
passenger to remove masks or glasses accordingly.
The method to make the detector is by first detecting the faces in real time. Afterward, a
classifier is applied after saving the frames that include the faces that were identified from the
webcam stream. The next section has a discussion of the many classification algorithms that can
be utilized.
2. LITERATURE REVIEW
The researchers focused on development of mask detection models to prevent the spread and
prevent the pandemic. With the ease of deep learning algorithms to classify the image and
detect the face or specific objects.
Joseph Redmon put forth the "You Only Look Once" (YOLO) method of real-time object
detection. It is one of the fastest algorithms. The primary benefit of YOLO is its ability to
process frames at a pace of 45 frames per second (larger networks) to 150 frames per second
(smaller networks), which is faster than real-time and improves the network's ability to
generalize the image. However, in comparison to Faster Recurrence Convolution Neural
Network (R-CNN), it has a lower recall and higher localization error, and fails to recognize
nearby or small objects because each grid can only suggest two bounding boxes.
Sanzidul Islam developed a classification system for COVID- 19 Face Masks based on a
Raspberry Pi 3. This method was able to integrate a mask detection model to a machine which
was extremely lightweight in terms of raw power. It was well optimized, but since raspberry pi
3 itself isn’t very powerful,it can’t get around that. The author made an app for mobile phones
name Blynk that would vibrate and alert anyone nearby if it detects anyone who are not wearing
masks.
Velantina developed a COVID-19 facemask detection using a Caffe model. The models are not
actively developed. But they are able to provide remarkable accuracy.
Senthil Kumar compared the Support Vector Machine (SVM) and K-Nearest Neighbor (KNN)
algorithms and proposed a speedier approach for facial identification. It is the quickest way for
detecting an image's edge. The SVM-KNN approach makes more accurate predictions than the
other methods do on average. This method shows promise as a practicable future forecasting
model. Despite the photographs' poor clarity and resolution, Hai Huanga offered a method for
finding sea species that works quite well. This model was able to clearly find a portion of the
image such as animals or plastic underwater. This helps to get a clear idea of what’s happening
underwater. He simulated underwater conditions and obtained dataset for his work and also got
a few pictures from the National Natural Science Foundation of China.
Alberto Fernandez Villian had developed an algorithm based on the alignment method to detect
glasses on photos. The main localization works satisfying, but it also shows a few main problems
because of the large differences of the input data (skin color, eyeglasses shape and color, shape
of face, etc.). There are still examples of eyeglasses which cannot be detected correctly at all
(e.g., frameless eyeglasses).
Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022
13
3. PROPOSED METHOD
Officers find it exceedingly challenging to manually observe people to determine whether or not
they are wearing masks. Therefore, in this method, a webcam is used to identify faces and stop
the spread of viruses. Preprocessing and classification activities are included in the proposed
face mask and glass detection model. Fig.1 shows the architecture of the proposed systems.
Preprocessing The real time video input is captured and processed to detect the face, mask,and
glass. The Video is extracted to image format in rreal-timeand then scaled to athe ppropriate
size by resizing them. The image is enhanced using MobileNetV2, InceptionResnetV2 and
Xception preprocessing. Canny segmentation technique is used to highlight the foreground
components for easier identification. (Figure 1).
Figure 1 Architecture of the overall proposed system Figure 2 Face Mask Architecture
Classification: The preprocessed input is fed to the detector to detect face, mask and glass using
different deep neural network architecture.
i) Mask detector
Firstly, the face mask dataset is loaded and split it into half for training purposes. The next step is
to train the model using this dataset with the help of TensorFlow and Keras. The model is then
compiled and saved to the disk. For detecting if a person is wearing mask, the mask from disk is
loaded and used to detect for mask in the given input (in this case being input from webcam. The
model then classifies if the input has mask worn or not and display it on screen with an overlay.
ii) Glass detector
Figure 3 Glass detection Architecture
Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022
14
The Model training: A folder containing "with masks" and "without mask" photographs is
used to train the model to identify between people wearing "masks" and those who aren't.
Similarly, a folder named "glass" and "without glass" is utilized to identify those who are
wearing eyeglasses. The model is evaluated for its capacity to recognize and categorize masks
and no-masks, glass and no-glass that were present in the original photographs using the test
folder. Finally, the code for detecting mask or glass from a camera feed is given that integrates
both the models together. It has fast and high accuracy.
4. EXPERIMENTAL RESULTS & ANALYSIS
The proposed model is implemented and executed using an Intel Core i7 processor, an Nvidia
Geforce GTX 1660 Ti graphics card running on Windows 11 Operating System.
Dataset collection: A dataset is created from images from multiple sources. Applying data
improvement techniques can increase the size of datasets. A variety of techniques are used to
build bounding boxes, also referred to as "data annotations," around a region of interest. Pictures
are labelled as "mask" or "No mask" and "glass" or "No Glass."
The results of the proposed method are shown in the Fig 7,8,9 and 5. It is noted that the program
can effectively categorize between people wearing a mask and a glass. It is able to produce such
results with remarkable accuracy.
The Glass detection model had very weak confidence level of 45% on only using MobileNetV2.
On repeating the process using Xception and InceptionResNetV2, the results were similar. The
three layers were densened and the average of the layers were considered. This gave 91%
confidence for detection of mask and glasses. The architecture of all the 3 modules is given
below. (Fig – 4,5,6). The image detection has been improved by using canny filter as
demonstrated in figure 10.
Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022
15
Figure 5 Architecture of Xception Figure 6 Architecture of Inception ResNet V2
Figure 7 Results when wearing only glass Figure 9 Results when wearing both Mask and Glass
Figure 8 Results when wearing only mask Figure 10 Canny Filter applied on face
4.1. Failure Case
The application may sometimes difficulties when it detects unconventional shaped glasses or
when frameless transparent glasses are used in an angle that the camera couldn’t capture the
edges of the glass.
5. ANALYSIS
It was found out that the Face Mask detection model is around 99 percent accurate in
determining whether or not a person is wearing a mask. (Figure 11)
Figure 12 concludes that the glass detection model is about 91% efficient in detecting if a person
has spectacles worn on their face.
Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022
16
Figure 11 Face Mask Detection results Figure 12 Glass detection results
6. CONCLUSION
In this study on mask and eyewear detection, firstly, it is necessary to identify mask and glasses
wearers and non-wearers. The camera performs remarkably well in terms of photos. The
detection outcomes were also quite impressive
7. FUTURE WORKS
With very little modification, this detection can likewise be applied to video stream or camera-
fed inputs. The concept is expected to involve identifying someone who is using headphones or
earbuds. By using student photographs to train the database and facial recognition technology,
this can be utilized in online examination scenarios. The invigilator is informed about the
person's identification using a method that is efficient for taking any necessary action against
malpractice.
REFERENCES
[1] Ariyanto, Mochammad & Haryanto, Ismoyo & Setiawan, Joga & Muna, Munadi & Radityo, M..
(2019). Real-Time Image Processing Method Using Raspberry Pi for a Car Model. 46-51.
[2] V. K. Bhanse and M. D. Jaybhaye,(2018) "Face Detection and Tracking Using Image Processing
on Raspberry Pi," 2018 International Conference on Inventive Research in Computing Applications
(ICIRCA), Coimbatore, India, pp. 1099-1103.
[3] A. Das, M. Wasif Ansari and R. Basak, (2020) "Covid-19 Face Mask Detection Using TensorFlow,
Keras and OpenCV," 2020 IEEE 17th India Council International Conference (INDICON), New
Delhi, India, pp. 1-5.
[4] M. S. Islam, E. Haque Moon, M. A. Shaikat and M. Jahangir Alam, (2020) "A Novel Approach to
Detect Face Mask using CNN," 2020 3rd International Conference on Intelligent Sustainable
Systems (ICISS), Thoothukudi, India, pp. 800-806.
[5] Joseph Redmon, S. D. (2016) “You Only Look Once(YOLO) Unified, Real Time Object
Detection” IEEE.
[6] A. Lodh, U. Saxena, A. khan, A. Motwani, L. Shakkeera and V. Y. Sharmasth, (2020) "Prototype
for Integration of Face Mask Detection and Person Identification Model – COVID-19," 2020 4th
International Conference on Electronics, Communication and Aerospace Technology (ICECA),
Coimbatore, India, pp. 1361 -1367.
[7] Luigi Atzori, Antonio iera and Giacomo Morabito. (2010) ‘The Internet of Things: A Survey’,
Journal of Computer Networks Vol.54 , No.15,pp.2787-2805.
[8] Lu Tan and Neng Wang. (2010) ‘Future internet: The Internet of Things’, IEEE Xplore Proc., 3rd
IEEE Int.Conf. Adv. Comp. Theory. Engg. (ICACTE), pp:1-9.
Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022
17
[9] J. Marot and S. Bourennane, (2017)"Raspberry Pi for image processing education,"25th European
Signal Processing Conference (EUSIPCO), Kos, Greece, 2017, pp. 2364-2366
[10] S. A. Sanjaya and S. Adi Rakhmawan, (2020) "Face Mask Detection Using MobileNetV2 in The
Era of COVID-19 Pandemic," 2020 International Conference on Data Analytics for Business and
Industry: Way Towards a Sustainable Economy (ICDABI), Sakheer, Bahrain, pp. 1-5.
[11] Senthilkumar.R and Gnanamurthy.R.K. (2016) ‘A Comparative Study of 2D PCA Face
Recognition Method with Other Statistically Based Face Recognition Methods’, Journal of the
Institution of Engineers India Series B (Springer Journal), Vol.97, pp.425-430.
[12] Senthilkumar.R and Gnanamurthy.R.K. (2017) ‘Performance improvement in classification rate of
appearance based statistical face recognition methods using SVM Classifier
[13] Survey says 90% Indians aware, but only 44% wearing a mask; discomfort key reason for non-
compliance
[14] Senthilkumar.R and Gnanamurthy.R.K. (2018) ‘HANFIS: A New Fast and Robust Approach for
Face Recognition and Facial Image Classification’, Advances in Intelligent Systems and
Computing Smart Innovations in Communication and Computational Sciences, Chapter 8, pp:81-
99.
[15] S. Susanto, F. A. Putra, R. Analia and I. K. L. N. Suciningtyas, (2020) "The Face Mask Detection
For Preventing the Spread of COVID-19 at Politeknik Negeri Batam," 2020 3rd International
Conference on Applied Engineering (ICAE), Batam, Indonesia, pp.
[16] S. S. Walam, S. P. Teli, B. S. Thakur, R. R. Nevarekar and S. M. Patil, (2018) "Object Detection
and seperation Using Raspberry PI," 2018 Second International Conference on Inventive
Communication and Computational Technologies (ICICCT), Coimbatore, India, pp. 214 - 217.
[17] Yair Meidan, Michael Bohadana, Asaf Shabatai, Juan David Guarnizo and NilsOle Tippenhauer
and Yuval Elovici. (2017) ‘ProfilloT: a machine learning approach for IoT device identification of
network traffic analysis’, proc.Sym. App. Comp., SAC, pp: 506 -509.
[18] A comparative study of feature extraction techniques for identifying COVID-19 patients using
chest X-rays image
[19] Deep Convolutional Neural Network Model for COVID-19 Detection

More Related Content

Similar to DETECTION OF FACE MASK AND GLASS USING DEEP LEARNING ALGORITHM

FACE MASK DETECTION USING MACHINE LEARNING AND IMAGE PROCESSING
FACE MASK DETECTION USING MACHINE LEARNING AND IMAGE PROCESSINGFACE MASK DETECTION USING MACHINE LEARNING AND IMAGE PROCESSING
FACE MASK DETECTION USING MACHINE LEARNING AND IMAGE PROCESSINGIRJET Journal
 
Social distance and face mask detector system exploiting transfer learning
Social distance and face mask detector system exploiting  transfer learningSocial distance and face mask detector system exploiting  transfer learning
Social distance and face mask detector system exploiting transfer learningIJECEIAES
 
Real-time eyeglass detection using transfer learning for non-standard facial...
Real-time eyeglass detection using transfer learning for  non-standard facial...Real-time eyeglass detection using transfer learning for  non-standard facial...
Real-time eyeglass detection using transfer learning for non-standard facial...IJECEIAES
 
Face Mask Detection and Face Recognition Using Machine Learning
Face Mask Detection and Face Recognition Using Machine LearningFace Mask Detection and Face Recognition Using Machine Learning
Face Mask Detection and Face Recognition Using Machine LearningIRJET Journal
 
Face and liveness detection with criminal identification using machine learni...
Face and liveness detection with criminal identification using machine learni...Face and liveness detection with criminal identification using machine learni...
Face and liveness detection with criminal identification using machine learni...IAESIJAI
 
People Monitoring and Mask Detection using Real-time video analyzing
People Monitoring and Mask Detection using Real-time video analyzingPeople Monitoring and Mask Detection using Real-time video analyzing
People Monitoring and Mask Detection using Real-time video analyzingvivatechijri
 
Face Mask Detection using CNN and OpenCV
Face Mask Detection using CNN and OpenCVFace Mask Detection using CNN and OpenCV
Face Mask Detection using CNN and OpenCVIRJET Journal
 
face mask detection ppt66 (1)M M.pptx
face mask detection ppt66 (1)M M.pptxface mask detection ppt66 (1)M M.pptx
face mask detection ppt66 (1)M M.pptxShreyaMishra883730
 
Facemask_project (1).pptx
Facemask_project (1).pptxFacemask_project (1).pptx
Facemask_project (1).pptxJosh Josh
 
FACE MASK DETECTION MODEL USING CONVOLUTIONAL NEURAL NETWORK
FACE MASK DETECTION MODEL USING CONVOLUTIONAL NEURAL NETWORKFACE MASK DETECTION MODEL USING CONVOLUTIONAL NEURAL NETWORK
FACE MASK DETECTION MODEL USING CONVOLUTIONAL NEURAL NETWORKmlaij
 
Detecting anomalies in security cameras with 3D-convolutional neural network ...
Detecting anomalies in security cameras with 3D-convolutional neural network ...Detecting anomalies in security cameras with 3D-convolutional neural network ...
Detecting anomalies in security cameras with 3D-convolutional neural network ...IJECEIAES
 
Real-time face detection in digital video-based on Viola-Jones supported by c...
Real-time face detection in digital video-based on Viola-Jones supported by c...Real-time face detection in digital video-based on Viola-Jones supported by c...
Real-time face detection in digital video-based on Viola-Jones supported by c...IJECEIAES
 
Face mask detection using deep learning on NVIDIA Jetson Nano
Face mask detection using deep learning on NVIDIA Jetson  NanoFace mask detection using deep learning on NVIDIA Jetson  Nano
Face mask detection using deep learning on NVIDIA Jetson NanoIJECEIAES
 
Face Mask Detection System Using Artificial Intelligence
Face Mask Detection System Using Artificial IntelligenceFace Mask Detection System Using Artificial Intelligence
Face Mask Detection System Using Artificial IntelligenceIRJET Journal
 
Deep learning based masked face recognition in the era of the COVID-19 pandemic
Deep learning based masked face recognition in the era of the COVID-19 pandemicDeep learning based masked face recognition in the era of the COVID-19 pandemic
Deep learning based masked face recognition in the era of the COVID-19 pandemicIJECEIAES
 
Review of Pose Recognition Systems
Review of Pose Recognition SystemsReview of Pose Recognition Systems
Review of Pose Recognition Systemsvivatechijri
 
Facial Emotion Recognition: A Survey
Facial Emotion Recognition: A SurveyFacial Emotion Recognition: A Survey
Facial Emotion Recognition: A SurveyIRJET Journal
 
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCE
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCECRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCE
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCEvivatechijri
 
YOLOv4: A Face Mask Detection System
YOLOv4: A Face Mask Detection SystemYOLOv4: A Face Mask Detection System
YOLOv4: A Face Mask Detection SystemIRJET Journal
 

Similar to DETECTION OF FACE MASK AND GLASS USING DEEP LEARNING ALGORITHM (20)

FACE MASK DETECTION USING MACHINE LEARNING AND IMAGE PROCESSING
FACE MASK DETECTION USING MACHINE LEARNING AND IMAGE PROCESSINGFACE MASK DETECTION USING MACHINE LEARNING AND IMAGE PROCESSING
FACE MASK DETECTION USING MACHINE LEARNING AND IMAGE PROCESSING
 
Social distance and face mask detector system exploiting transfer learning
Social distance and face mask detector system exploiting  transfer learningSocial distance and face mask detector system exploiting  transfer learning
Social distance and face mask detector system exploiting transfer learning
 
Real-time eyeglass detection using transfer learning for non-standard facial...
Real-time eyeglass detection using transfer learning for  non-standard facial...Real-time eyeglass detection using transfer learning for  non-standard facial...
Real-time eyeglass detection using transfer learning for non-standard facial...
 
Face Mask Detection and Face Recognition Using Machine Learning
Face Mask Detection and Face Recognition Using Machine LearningFace Mask Detection and Face Recognition Using Machine Learning
Face Mask Detection and Face Recognition Using Machine Learning
 
Face and liveness detection with criminal identification using machine learni...
Face and liveness detection with criminal identification using machine learni...Face and liveness detection with criminal identification using machine learni...
Face and liveness detection with criminal identification using machine learni...
 
People Monitoring and Mask Detection using Real-time video analyzing
People Monitoring and Mask Detection using Real-time video analyzingPeople Monitoring and Mask Detection using Real-time video analyzing
People Monitoring and Mask Detection using Real-time video analyzing
 
Face Mask Detection using CNN and OpenCV
Face Mask Detection using CNN and OpenCVFace Mask Detection using CNN and OpenCV
Face Mask Detection using CNN and OpenCV
 
face mask detection ppt66 (1)M M.pptx
face mask detection ppt66 (1)M M.pptxface mask detection ppt66 (1)M M.pptx
face mask detection ppt66 (1)M M.pptx
 
Facemask_project (1).pptx
Facemask_project (1).pptxFacemask_project (1).pptx
Facemask_project (1).pptx
 
FACE MASK DETECTION MODEL USING CONVOLUTIONAL NEURAL NETWORK
FACE MASK DETECTION MODEL USING CONVOLUTIONAL NEURAL NETWORKFACE MASK DETECTION MODEL USING CONVOLUTIONAL NEURAL NETWORK
FACE MASK DETECTION MODEL USING CONVOLUTIONAL NEURAL NETWORK
 
Detecting anomalies in security cameras with 3D-convolutional neural network ...
Detecting anomalies in security cameras with 3D-convolutional neural network ...Detecting anomalies in security cameras with 3D-convolutional neural network ...
Detecting anomalies in security cameras with 3D-convolutional neural network ...
 
Real-time face detection in digital video-based on Viola-Jones supported by c...
Real-time face detection in digital video-based on Viola-Jones supported by c...Real-time face detection in digital video-based on Viola-Jones supported by c...
Real-time face detection in digital video-based on Viola-Jones supported by c...
 
Face mask detection using deep learning on NVIDIA Jetson Nano
Face mask detection using deep learning on NVIDIA Jetson  NanoFace mask detection using deep learning on NVIDIA Jetson  Nano
Face mask detection using deep learning on NVIDIA Jetson Nano
 
Face Mask Detection System Using Artificial Intelligence
Face Mask Detection System Using Artificial IntelligenceFace Mask Detection System Using Artificial Intelligence
Face Mask Detection System Using Artificial Intelligence
 
Deep learning based masked face recognition in the era of the COVID-19 pandemic
Deep learning based masked face recognition in the era of the COVID-19 pandemicDeep learning based masked face recognition in the era of the COVID-19 pandemic
Deep learning based masked face recognition in the era of the COVID-19 pandemic
 
Paper of Final Year Project.pdf
Paper of Final Year Project.pdfPaper of Final Year Project.pdf
Paper of Final Year Project.pdf
 
Review of Pose Recognition Systems
Review of Pose Recognition SystemsReview of Pose Recognition Systems
Review of Pose Recognition Systems
 
Facial Emotion Recognition: A Survey
Facial Emotion Recognition: A SurveyFacial Emotion Recognition: A Survey
Facial Emotion Recognition: A Survey
 
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCE
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCECRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCE
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCE
 
YOLOv4: A Face Mask Detection System
YOLOv4: A Face Mask Detection SystemYOLOv4: A Face Mask Detection System
YOLOv4: A Face Mask Detection System
 

More from CSEIJJournal

Reliability Improvement with PSP of Web-Based Software Applications
Reliability Improvement with PSP of Web-Based Software ApplicationsReliability Improvement with PSP of Web-Based Software Applications
Reliability Improvement with PSP of Web-Based Software ApplicationsCSEIJJournal
 
DATA MINING FOR STUDENTS’ EMPLOYABILITY PREDICTION
DATA MINING FOR STUDENTS’ EMPLOYABILITY PREDICTIONDATA MINING FOR STUDENTS’ EMPLOYABILITY PREDICTION
DATA MINING FOR STUDENTS’ EMPLOYABILITY PREDICTIONCSEIJJournal
 
Call for Articles - Computer Science & Engineering: An International Journal ...
Call for Articles - Computer Science & Engineering: An International Journal ...Call for Articles - Computer Science & Engineering: An International Journal ...
Call for Articles - Computer Science & Engineering: An International Journal ...CSEIJJournal
 
A Complexity Based Regression Test Selection Strategy
A Complexity Based Regression Test Selection StrategyA Complexity Based Regression Test Selection Strategy
A Complexity Based Regression Test Selection StrategyCSEIJJournal
 
XML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web ServicesXML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web ServicesCSEIJJournal
 
Performance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image Retrieval
Performance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image RetrievalPerformance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image Retrieval
Performance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image RetrievalCSEIJJournal
 
Call for Papers - Computer Science & Engineering: An International Journal (C...
Call for Papers - Computer Science & Engineering: An International Journal (C...Call for Papers - Computer Science & Engineering: An International Journal (C...
Call for Papers - Computer Science & Engineering: An International Journal (C...CSEIJJournal
 
Paper Submission - Computer Science & Engineering: An International Journal (...
Paper Submission - Computer Science & Engineering: An International Journal (...Paper Submission - Computer Science & Engineering: An International Journal (...
Paper Submission - Computer Science & Engineering: An International Journal (...CSEIJJournal
 
Performance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image Retrieval
Performance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image RetrievalPerformance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image Retrieval
Performance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image RetrievalCSEIJJournal
 
Call for Papers - Computer Science & Engineering: An International Journal (C...
Call for Papers - Computer Science & Engineering: An International Journal (C...Call for Papers - Computer Science & Engineering: An International Journal (C...
Call for Papers - Computer Science & Engineering: An International Journal (C...CSEIJJournal
 
Lightweight Certificateless Authenticated Key Agreement Protocoln
Lightweight Certificateless Authenticated Key Agreement ProtocolnLightweight Certificateless Authenticated Key Agreement Protocoln
Lightweight Certificateless Authenticated Key Agreement ProtocolnCSEIJJournal
 
Call for Papers - Computer Science & Engineering: An International Journal (C...
Call for Papers - Computer Science & Engineering: An International Journal (C...Call for Papers - Computer Science & Engineering: An International Journal (C...
Call for Papers - Computer Science & Engineering: An International Journal (C...CSEIJJournal
 
Recommendation System for Information Services Adapted, Over Terrestrial Digi...
Recommendation System for Information Services Adapted, Over Terrestrial Digi...Recommendation System for Information Services Adapted, Over Terrestrial Digi...
Recommendation System for Information Services Adapted, Over Terrestrial Digi...CSEIJJournal
 
Reconfiguration Strategies for Online Hardware Multitasking in Embedded Systems
Reconfiguration Strategies for Online Hardware Multitasking in Embedded SystemsReconfiguration Strategies for Online Hardware Multitasking in Embedded Systems
Reconfiguration Strategies for Online Hardware Multitasking in Embedded SystemsCSEIJJournal
 
Performance Comparison and Analysis of Mobile Ad Hoc Routing Protocols
Performance Comparison and Analysis of Mobile Ad Hoc Routing ProtocolsPerformance Comparison and Analysis of Mobile Ad Hoc Routing Protocols
Performance Comparison and Analysis of Mobile Ad Hoc Routing ProtocolsCSEIJJournal
 
Adaptive Stabilization and Synchronization of Hyperchaotic QI System
Adaptive Stabilization and Synchronization of Hyperchaotic QI SystemAdaptive Stabilization and Synchronization of Hyperchaotic QI System
Adaptive Stabilization and Synchronization of Hyperchaotic QI SystemCSEIJJournal
 
An Energy Efficient Data Secrecy Scheme For Wireless Body Sensor Networks
An Energy Efficient Data Secrecy Scheme For Wireless Body Sensor NetworksAn Energy Efficient Data Secrecy Scheme For Wireless Body Sensor Networks
An Energy Efficient Data Secrecy Scheme For Wireless Body Sensor NetworksCSEIJJournal
 
To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...CSEIJJournal
 
Topic Tracking for Punjabi Language
Topic Tracking for Punjabi LanguageTopic Tracking for Punjabi Language
Topic Tracking for Punjabi LanguageCSEIJJournal
 
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...CSEIJJournal
 

More from CSEIJJournal (20)

Reliability Improvement with PSP of Web-Based Software Applications
Reliability Improvement with PSP of Web-Based Software ApplicationsReliability Improvement with PSP of Web-Based Software Applications
Reliability Improvement with PSP of Web-Based Software Applications
 
DATA MINING FOR STUDENTS’ EMPLOYABILITY PREDICTION
DATA MINING FOR STUDENTS’ EMPLOYABILITY PREDICTIONDATA MINING FOR STUDENTS’ EMPLOYABILITY PREDICTION
DATA MINING FOR STUDENTS’ EMPLOYABILITY PREDICTION
 
Call for Articles - Computer Science & Engineering: An International Journal ...
Call for Articles - Computer Science & Engineering: An International Journal ...Call for Articles - Computer Science & Engineering: An International Journal ...
Call for Articles - Computer Science & Engineering: An International Journal ...
 
A Complexity Based Regression Test Selection Strategy
A Complexity Based Regression Test Selection StrategyA Complexity Based Regression Test Selection Strategy
A Complexity Based Regression Test Selection Strategy
 
XML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web ServicesXML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web Services
 
Performance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image Retrieval
Performance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image RetrievalPerformance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image Retrieval
Performance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image Retrieval
 
Call for Papers - Computer Science & Engineering: An International Journal (C...
Call for Papers - Computer Science & Engineering: An International Journal (C...Call for Papers - Computer Science & Engineering: An International Journal (C...
Call for Papers - Computer Science & Engineering: An International Journal (C...
 
Paper Submission - Computer Science & Engineering: An International Journal (...
Paper Submission - Computer Science & Engineering: An International Journal (...Paper Submission - Computer Science & Engineering: An International Journal (...
Paper Submission - Computer Science & Engineering: An International Journal (...
 
Performance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image Retrieval
Performance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image RetrievalPerformance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image Retrieval
Performance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image Retrieval
 
Call for Papers - Computer Science & Engineering: An International Journal (C...
Call for Papers - Computer Science & Engineering: An International Journal (C...Call for Papers - Computer Science & Engineering: An International Journal (C...
Call for Papers - Computer Science & Engineering: An International Journal (C...
 
Lightweight Certificateless Authenticated Key Agreement Protocoln
Lightweight Certificateless Authenticated Key Agreement ProtocolnLightweight Certificateless Authenticated Key Agreement Protocoln
Lightweight Certificateless Authenticated Key Agreement Protocoln
 
Call for Papers - Computer Science & Engineering: An International Journal (C...
Call for Papers - Computer Science & Engineering: An International Journal (C...Call for Papers - Computer Science & Engineering: An International Journal (C...
Call for Papers - Computer Science & Engineering: An International Journal (C...
 
Recommendation System for Information Services Adapted, Over Terrestrial Digi...
Recommendation System for Information Services Adapted, Over Terrestrial Digi...Recommendation System for Information Services Adapted, Over Terrestrial Digi...
Recommendation System for Information Services Adapted, Over Terrestrial Digi...
 
Reconfiguration Strategies for Online Hardware Multitasking in Embedded Systems
Reconfiguration Strategies for Online Hardware Multitasking in Embedded SystemsReconfiguration Strategies for Online Hardware Multitasking in Embedded Systems
Reconfiguration Strategies for Online Hardware Multitasking in Embedded Systems
 
Performance Comparison and Analysis of Mobile Ad Hoc Routing Protocols
Performance Comparison and Analysis of Mobile Ad Hoc Routing ProtocolsPerformance Comparison and Analysis of Mobile Ad Hoc Routing Protocols
Performance Comparison and Analysis of Mobile Ad Hoc Routing Protocols
 
Adaptive Stabilization and Synchronization of Hyperchaotic QI System
Adaptive Stabilization and Synchronization of Hyperchaotic QI SystemAdaptive Stabilization and Synchronization of Hyperchaotic QI System
Adaptive Stabilization and Synchronization of Hyperchaotic QI System
 
An Energy Efficient Data Secrecy Scheme For Wireless Body Sensor Networks
An Energy Efficient Data Secrecy Scheme For Wireless Body Sensor NetworksAn Energy Efficient Data Secrecy Scheme For Wireless Body Sensor Networks
An Energy Efficient Data Secrecy Scheme For Wireless Body Sensor Networks
 
To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...
 
Topic Tracking for Punjabi Language
Topic Tracking for Punjabi LanguageTopic Tracking for Punjabi Language
Topic Tracking for Punjabi Language
 
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
 

Recently uploaded

The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 

Recently uploaded (20)

The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 

DETECTION OF FACE MASK AND GLASS USING DEEP LEARNING ALGORITHM

  • 1. Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022 DOI:10.5121/cseij.2022.12602 11 DETECTION OF FACE MASK AND GLASS USING DEEP LEARNING ALGORITHM Kavin Bharathi1 and Savithadevi M2 1 Vellore Institute of Technology, Chennai 2 National Institute of Technology, Tiruchirappalli ABSTRACT The rapid spread of the coronavirus has been a major health concern for the entire world. Direct human contact is one of the key factors contributing to the virus's rapid transmission. Wearing face masks in public areas is one of the numerous precautions that may be taken to stop the spread of this infection. To reduce the chance of the virus spreading, it is important to find ways to detect face masks in public locations. An automated system for face mask detection utilizing deep learning algorithm has been presented to address these issues and effectively stop the spread of this contagious disease. The proposed method combines a face mask identification model and a glass detection model using an algorithm to assess the results using deep learning models. KEYWORDS Face Mask Detection, Glass Detection, Convolution Neural Network 1. INTRODUCTION For practically everyone, the COVID-19 pandemic had introduced a new way of life. To avoid contacting the virus, the World Health Organization (WHO) advised keeping a safe distance from others and wearing a mask when going out. Nevertheless, a lot of people are still seen in public spaces without face masks, which increases the spread rate of COVID-19. According to a report by Economic Times India, "90% of Indians are aware, but only 44% are wearing a mask."[13] According to this survey, people are aware of the consequences of not wearing a mask but yet choose to disregard it. This carelessness causes COVID19 to spread quickly. It is very challenging to identify persons who are not wearing a mask and advise them to do so in densely crowded areas, as is the situation with big cities in India. As a result, image processing methods and methodologies has been used in this project to determine whether or not people are wearing face masks. To determine whether someone is wearing a face mask or not, real-time photos from a camera feed are gathered and put up for comparison with a trained dataset. People wearing and not wearing face masks will be detected by the algorithm developed using a training dataset. It can also be used for security purposes as forgery and thefts. The algorithm can identify if customers entering a bank are wearing a mask and remove it. The immigration section of airports is always very slow to respond to people. There is always a huge crowd at the immigration. The process seemed simple, take a photo of the person. This was the step that usually took very long. There are few automated airports where there wouldn't be an officer interacting with the person. But security would inform us to remove the face mask and any other accessories on the face like glass or hat.
  • 2. Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022 12 The automated camera would proceed to take pictures even if the passenger has accessories on their face. For mitigating this issue, this paper has tried to add a filter that would inform the passenger to remove masks or glasses accordingly. The method to make the detector is by first detecting the faces in real time. Afterward, a classifier is applied after saving the frames that include the faces that were identified from the webcam stream. The next section has a discussion of the many classification algorithms that can be utilized. 2. LITERATURE REVIEW The researchers focused on development of mask detection models to prevent the spread and prevent the pandemic. With the ease of deep learning algorithms to classify the image and detect the face or specific objects. Joseph Redmon put forth the "You Only Look Once" (YOLO) method of real-time object detection. It is one of the fastest algorithms. The primary benefit of YOLO is its ability to process frames at a pace of 45 frames per second (larger networks) to 150 frames per second (smaller networks), which is faster than real-time and improves the network's ability to generalize the image. However, in comparison to Faster Recurrence Convolution Neural Network (R-CNN), it has a lower recall and higher localization error, and fails to recognize nearby or small objects because each grid can only suggest two bounding boxes. Sanzidul Islam developed a classification system for COVID- 19 Face Masks based on a Raspberry Pi 3. This method was able to integrate a mask detection model to a machine which was extremely lightweight in terms of raw power. It was well optimized, but since raspberry pi 3 itself isn’t very powerful,it can’t get around that. The author made an app for mobile phones name Blynk that would vibrate and alert anyone nearby if it detects anyone who are not wearing masks. Velantina developed a COVID-19 facemask detection using a Caffe model. The models are not actively developed. But they are able to provide remarkable accuracy. Senthil Kumar compared the Support Vector Machine (SVM) and K-Nearest Neighbor (KNN) algorithms and proposed a speedier approach for facial identification. It is the quickest way for detecting an image's edge. The SVM-KNN approach makes more accurate predictions than the other methods do on average. This method shows promise as a practicable future forecasting model. Despite the photographs' poor clarity and resolution, Hai Huanga offered a method for finding sea species that works quite well. This model was able to clearly find a portion of the image such as animals or plastic underwater. This helps to get a clear idea of what’s happening underwater. He simulated underwater conditions and obtained dataset for his work and also got a few pictures from the National Natural Science Foundation of China. Alberto Fernandez Villian had developed an algorithm based on the alignment method to detect glasses on photos. The main localization works satisfying, but it also shows a few main problems because of the large differences of the input data (skin color, eyeglasses shape and color, shape of face, etc.). There are still examples of eyeglasses which cannot be detected correctly at all (e.g., frameless eyeglasses).
  • 3. Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022 13 3. PROPOSED METHOD Officers find it exceedingly challenging to manually observe people to determine whether or not they are wearing masks. Therefore, in this method, a webcam is used to identify faces and stop the spread of viruses. Preprocessing and classification activities are included in the proposed face mask and glass detection model. Fig.1 shows the architecture of the proposed systems. Preprocessing The real time video input is captured and processed to detect the face, mask,and glass. The Video is extracted to image format in rreal-timeand then scaled to athe ppropriate size by resizing them. The image is enhanced using MobileNetV2, InceptionResnetV2 and Xception preprocessing. Canny segmentation technique is used to highlight the foreground components for easier identification. (Figure 1). Figure 1 Architecture of the overall proposed system Figure 2 Face Mask Architecture Classification: The preprocessed input is fed to the detector to detect face, mask and glass using different deep neural network architecture. i) Mask detector Firstly, the face mask dataset is loaded and split it into half for training purposes. The next step is to train the model using this dataset with the help of TensorFlow and Keras. The model is then compiled and saved to the disk. For detecting if a person is wearing mask, the mask from disk is loaded and used to detect for mask in the given input (in this case being input from webcam. The model then classifies if the input has mask worn or not and display it on screen with an overlay. ii) Glass detector Figure 3 Glass detection Architecture
  • 4. Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022 14 The Model training: A folder containing "with masks" and "without mask" photographs is used to train the model to identify between people wearing "masks" and those who aren't. Similarly, a folder named "glass" and "without glass" is utilized to identify those who are wearing eyeglasses. The model is evaluated for its capacity to recognize and categorize masks and no-masks, glass and no-glass that were present in the original photographs using the test folder. Finally, the code for detecting mask or glass from a camera feed is given that integrates both the models together. It has fast and high accuracy. 4. EXPERIMENTAL RESULTS & ANALYSIS The proposed model is implemented and executed using an Intel Core i7 processor, an Nvidia Geforce GTX 1660 Ti graphics card running on Windows 11 Operating System. Dataset collection: A dataset is created from images from multiple sources. Applying data improvement techniques can increase the size of datasets. A variety of techniques are used to build bounding boxes, also referred to as "data annotations," around a region of interest. Pictures are labelled as "mask" or "No mask" and "glass" or "No Glass." The results of the proposed method are shown in the Fig 7,8,9 and 5. It is noted that the program can effectively categorize between people wearing a mask and a glass. It is able to produce such results with remarkable accuracy. The Glass detection model had very weak confidence level of 45% on only using MobileNetV2. On repeating the process using Xception and InceptionResNetV2, the results were similar. The three layers were densened and the average of the layers were considered. This gave 91% confidence for detection of mask and glasses. The architecture of all the 3 modules is given below. (Fig – 4,5,6). The image detection has been improved by using canny filter as demonstrated in figure 10.
  • 5. Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022 15 Figure 5 Architecture of Xception Figure 6 Architecture of Inception ResNet V2 Figure 7 Results when wearing only glass Figure 9 Results when wearing both Mask and Glass Figure 8 Results when wearing only mask Figure 10 Canny Filter applied on face 4.1. Failure Case The application may sometimes difficulties when it detects unconventional shaped glasses or when frameless transparent glasses are used in an angle that the camera couldn’t capture the edges of the glass. 5. ANALYSIS It was found out that the Face Mask detection model is around 99 percent accurate in determining whether or not a person is wearing a mask. (Figure 11) Figure 12 concludes that the glass detection model is about 91% efficient in detecting if a person has spectacles worn on their face.
  • 6. Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022 16 Figure 11 Face Mask Detection results Figure 12 Glass detection results 6. CONCLUSION In this study on mask and eyewear detection, firstly, it is necessary to identify mask and glasses wearers and non-wearers. The camera performs remarkably well in terms of photos. The detection outcomes were also quite impressive 7. FUTURE WORKS With very little modification, this detection can likewise be applied to video stream or camera- fed inputs. The concept is expected to involve identifying someone who is using headphones or earbuds. By using student photographs to train the database and facial recognition technology, this can be utilized in online examination scenarios. The invigilator is informed about the person's identification using a method that is efficient for taking any necessary action against malpractice. REFERENCES [1] Ariyanto, Mochammad & Haryanto, Ismoyo & Setiawan, Joga & Muna, Munadi & Radityo, M.. (2019). Real-Time Image Processing Method Using Raspberry Pi for a Car Model. 46-51. [2] V. K. Bhanse and M. D. Jaybhaye,(2018) "Face Detection and Tracking Using Image Processing on Raspberry Pi," 2018 International Conference on Inventive Research in Computing Applications (ICIRCA), Coimbatore, India, pp. 1099-1103. [3] A. Das, M. Wasif Ansari and R. Basak, (2020) "Covid-19 Face Mask Detection Using TensorFlow, Keras and OpenCV," 2020 IEEE 17th India Council International Conference (INDICON), New Delhi, India, pp. 1-5. [4] M. S. Islam, E. Haque Moon, M. A. Shaikat and M. Jahangir Alam, (2020) "A Novel Approach to Detect Face Mask using CNN," 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS), Thoothukudi, India, pp. 800-806. [5] Joseph Redmon, S. D. (2016) “You Only Look Once(YOLO) Unified, Real Time Object Detection” IEEE. [6] A. Lodh, U. Saxena, A. khan, A. Motwani, L. Shakkeera and V. Y. Sharmasth, (2020) "Prototype for Integration of Face Mask Detection and Person Identification Model – COVID-19," 2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA), Coimbatore, India, pp. 1361 -1367. [7] Luigi Atzori, Antonio iera and Giacomo Morabito. (2010) ‘The Internet of Things: A Survey’, Journal of Computer Networks Vol.54 , No.15,pp.2787-2805. [8] Lu Tan and Neng Wang. (2010) ‘Future internet: The Internet of Things’, IEEE Xplore Proc., 3rd IEEE Int.Conf. Adv. Comp. Theory. Engg. (ICACTE), pp:1-9.
  • 7. Computer Science & Engineering: An International Journal (CSEIJ), Vol 12, No 6, December 2022 17 [9] J. Marot and S. Bourennane, (2017)"Raspberry Pi for image processing education,"25th European Signal Processing Conference (EUSIPCO), Kos, Greece, 2017, pp. 2364-2366 [10] S. A. Sanjaya and S. Adi Rakhmawan, (2020) "Face Mask Detection Using MobileNetV2 in The Era of COVID-19 Pandemic," 2020 International Conference on Data Analytics for Business and Industry: Way Towards a Sustainable Economy (ICDABI), Sakheer, Bahrain, pp. 1-5. [11] Senthilkumar.R and Gnanamurthy.R.K. (2016) ‘A Comparative Study of 2D PCA Face Recognition Method with Other Statistically Based Face Recognition Methods’, Journal of the Institution of Engineers India Series B (Springer Journal), Vol.97, pp.425-430. [12] Senthilkumar.R and Gnanamurthy.R.K. (2017) ‘Performance improvement in classification rate of appearance based statistical face recognition methods using SVM Classifier [13] Survey says 90% Indians aware, but only 44% wearing a mask; discomfort key reason for non- compliance [14] Senthilkumar.R and Gnanamurthy.R.K. (2018) ‘HANFIS: A New Fast and Robust Approach for Face Recognition and Facial Image Classification’, Advances in Intelligent Systems and Computing Smart Innovations in Communication and Computational Sciences, Chapter 8, pp:81- 99. [15] S. Susanto, F. A. Putra, R. Analia and I. K. L. N. Suciningtyas, (2020) "The Face Mask Detection For Preventing the Spread of COVID-19 at Politeknik Negeri Batam," 2020 3rd International Conference on Applied Engineering (ICAE), Batam, Indonesia, pp. [16] S. S. Walam, S. P. Teli, B. S. Thakur, R. R. Nevarekar and S. M. Patil, (2018) "Object Detection and seperation Using Raspberry PI," 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), Coimbatore, India, pp. 214 - 217. [17] Yair Meidan, Michael Bohadana, Asaf Shabatai, Juan David Guarnizo and NilsOle Tippenhauer and Yuval Elovici. (2017) ‘ProfilloT: a machine learning approach for IoT device identification of network traffic analysis’, proc.Sym. App. Comp., SAC, pp: 506 -509. [18] A comparative study of feature extraction techniques for identifying COVID-19 patients using chest X-rays image [19] Deep Convolutional Neural Network Model for COVID-19 Detection