SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
Bulletin of Electrical Engineering and Informatics
Vol. 8, No. 1, March 2019, pp. 239~245
ISSN: 2302-9285, DOI: 10.11591/eei.v8i1.1439  239
Journal homepage: http://beei.org/index.php/EEI
Face recognition attendance system using Local Binary
Pattern (LBP)
Shamsul J. Elias1
, Shahirah Mohamed Hatim2
, Nur Anisah Hassan3
, Lily Marlia Abd Latif4
, R.
Badlishah Ahmad5
, Mohamad Yusof Darus6
, Ahmad Zambri Shahuddin7
1
Universiti Teknologi MARA (UiTM), Malaysia
2,3,4,6,7
Faculty of Computer and Mathematical Sciences, Universti Teknologi MARA, Malaysia
5
Faculty of Informatics and Computing, Universiti Sultan Zainal Abidin (UniSZA), Malaysia
Article Info ABSTRACT
Article history:
Received Sep 30, 2018
Revised Nov 15, 2018
Accepted Dec 21, 2018
Attendance is important for university students. However, generic way of
taking attendance in universities may include various problems. Hence, a
face recognition system for attendance taking is one way to combat the
problem. This paper will present an automated system that will automatically
saves student’s attendance into the database using face recognition method.
The paper will elaborate on student attendance system, image processing,
face detection and face recognition. The face detection part will be done by
using viola-jones algorithm method while the face recognition part will be
carried on by using local binary pattern (LBP) method. The system will
ensure that the attendance taking process will be faster and more accurate.
Keywords:
Face detection
Face recognition
Local Binary Pattern
Student’s attendance system
Viola-jones algorithm Copyright © 2019 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Shahirah Mohamed Hatim,
Faculty of Computer and Mathematical Sciences,
Universti Teknologi MARA,
35400 Tapah, Malaysia.
Email: shahirah88@uitm.edu.my
1. INTRODUCTION
In today’s world, attendance taking is essential. Attendance would be counted as a part of student’s
mark in most universities. Usually, attendance is taken by using a piece of paper that contains student’s
information and act as student’s attendance register. Students will then put on their signature as a sign that
they are present on that particular day.
However, there are problem with this generic technique. Some of the problem includes student’s
forging signature of their close friend [1]. The attendance process takes a long time and many more problems
[2]. To counter these problems, an automated attendance system is needed to be done. In this paper, the
project will present the automated system which is face recognition in order to combat these problems. It is
an automated system that will save student’s attendance automatically into the database.
In order to automatically take student’s attendance, there are technologies that are readily built such
as Barcode Readers, Radio Frequency Identification System (RFID) and Bluetooth. Even though these
technologies may help to reduce the time taken for the attendance to be taken, it requires machine and
devices that are expensive and have limited usage as the device is easily broken [3].
There is also other method such as biometrics. However, biometrics application proposal mostly
involves the application to be used by the lecturer during class hour. This will eventually cause distraction as
the class will be interrupted every time the lecturer allows late students into the class [4]. Using biometrics, it
also will take a longer time as students need to queue in order to use the device [5].
 ISSN: 2302-9285
Bulletin of Electr Eng and Inf, Vol. 8, No. 1, March 2019 : 239 – 245
240
Face recognition system is a perfect way to solve these problems. Using face detection, student face
will be taken real time while the student is learning in class without them noticing and the learning process
will be smooth. Students also can be attentive without being disturbed in order to sign for their attendance
and lost some of the information that are given by the lecturer. As for the lecturer, there is no hassle in order
to keep all the student’s attendance registers for reports later because the attendance is automatically
generated by the system. The data generated for the report will be accurate and there will be no more
misleading data since the chances for students to forge the documents is eliminated.
Face recognition has been used for a long time in many fields. In today’s world, face recognition
can easily be done since cameras are readily and easily available in the market. Face images can easily be
captured in the daily life as there were rapid development of electric equipment such as surveillance camera
and cell phones [6].
One of the areas that face recognition plays important role in is security. In today’s world, many
premises such as houses use face recognition in order to enhance their house security. There are a face
detection and recognition system for Smart Home Security Application designed by Ana and Wati [7] in
order to fulfill the needs of home owners. It uses a directed face to decide whether or not a person is allowed
into the premises. It has a high accuracy of face recognition.
Other study is a study done on automated face recognition of rhesus macaques by Witham [8]. This
study is advantageous since it non–invasively identify rhesus macaques in videos to find out their group and
lastly, there is an application software called Doggelgangger [9] that is developed to compare and match a
canine with their possible human parents. This application shows that face recognition can also be used in
various applications.
2. ATTENDANCE SYSTEM
The word student can be defined as “a person who is studying at a school, college, or university”
according to Oxford Advance Learner’s Dictionary, while the word attendance is defined as “the act of being
present at a place” [10]. Referring to the definition earlier, student’s attendance system can be considered as a
system that are used in school, college or universities in order to mark or specify that a student is present or
absent on a particular day.
The general way of attendance taking is usually done by using a piece of paper that has student’s
information. This paper will act as registry and will be passed around the classroom [11]. For example, the
date on the registry will be filled up by the lecturer and the paper will be passing through the class.
Sometimes, the lecturer will let the paper be passed while they start teaching in order to save time. Another
way of taking attendance is lecturers will call the student’s name one by one. If they are present, the students
need to answer loudly enough for the lecturers or teacher to hear.
Both methods mentioned above have been practiced globally for a very long period of time.
However, problem often arise when the normal or traditional attendance taking method are being used. They
can be time consuming especially when students need to response when their names are being called by the
lecturer [12]. The attendance report also will be hard to maintain until it is needed to generate the report as
the attendance sheet or registry could have gone missing. Using the traditional method, teachers or lecturers
also required to correctly mark the student’s attendance [13], but then mistakes might happen while marking
the attendance. If these occurs, the data can be affected when report are being generated.
Another problem that can be found when using the general method of attendance taking is students
can deceive their lecturer by signing for their friends who is absent for the day [11]. This action can easily be
performed especially in a big hall where it is impossible for the lecturer to count the number of students. In
order to combat all these problem, the project propose an automated system using face recognition to
automatically collect and save student’s attendance.
3. IMAGE PROCESSING
Images can be taken from various sources. Some of the sources include cameras or sensors that are
placed on satellites, space probes and even air crafts [14]. The image that are produced by these sources are
called raw image. Image processing is a technique used to improve these raw images [15]. It can also be used
with normal images that are taken for many activities in our everyday life [16]. Image processing, is a form
of processing with image as its input and will produce characteristic or parameters that are related to the input
image as its output [17]. There are numerous field and areas that can be involve with image processing [16].
The areas and fields include remote sensing, medical imaging, textile and several others. In image
processing, there are three steps involved [15]. First step is importing the image using optical scanner or
Bulletin of Electr Eng and Inf ISSN: 2302-9285 
Face recognition attendance system using Local Binary Pattern (LBP) (Shahirah Mohamed Hatim)
241
digital photography. The next steps are to analyses and manipulate the image and the final step is to
get the output.
There are two different types of image processing. The first type is analog image processing and the
other is digital image processing. Analog image processing is when the image is altered through electrical
medium. A television image, adjusting the amplitude and reference of the video signal will result in the
brightening, darkening and alteration of the brightness range of the displayed image [16]. Different in analog
signal, digital image is being processed in two-dimensional image by using digital computer. A finite number
of bits which is actually an array of the actual number represent a digital image.
3.1. Segmentation
Segmentation process can be defined as a process where image is subdivided into some components
parts or object [18]. The subdivision of the level will be carried is depending on how the problem is being
solved [14]. For example, we are interested in identifying a person in an alley. We need to segment the alley
first from the image. Then, the content of the alley will be segmented to find the potential person. For image
segmentation, image thresholding techniques are used.
There are two categories in image segmentation which s Layer-Based Segmentation and
Block-Based Segmentation. In Layer-Based Segmentation, Layered Model is used in order to detect object
and define shape and mask. The appearance and depth ordering also will be explained. Class and instance
segmentation also will be evaluated by using image segmentation that composite the output of a bank of
object detectors. Block-Based segmentation method on the other hand is based on various features that can be
found in image. These features might be color information that is used to create histograms and could be the
information about the pixels that could indicate edges or boundary. The features also could be the texture
information [18]. Maintaining the Integrity of the Specifications.
4. FACE RECOGNITION
Face recognition can be referred as a process that requires facial images to be captured using a
camera and saving it automatically into the database [12]. Face recognition, generally are divided into two
stages. The first stage is face detection and the second stage is face recognition.
4.1. Face detection
In order to perform face recognition, the image captured must undergo face detection process first.
Face recognition is a process where human face image is detected using algorithms that are associated with
face detection. In face detection, there are many algorithms that are mostly used. Some of them are Ada
Boost Algorithm, S-Ada Boost Algorithm Support Vector Machines (SVM) and Float Boost Algorithm.
There are also other algorithms such as Bayes Classifier, HAAR Classifier and Viola Jones Algorithm [19].
Among the algorithms that are stated, Viola Jones Algorithm is said to have a low false detection a
high accuracy compared to other method [20]. By using Viola Jones method, the features of integral image
are computed and then classified. Instead of scaling the images, this method provides scaling of the features
instead. Viola Jones method also said to be advantageous since the feature computations are extremely fast
and it has efficient feature selection. Besides Viola Jones method, Ada Boost learning algorithm can also be
used to choose the significant features from the computed potential features.
4.2. Face recognition
After key feature of an image has been extracted, it will be compared to the image that is readily
stored in the database. This process is called face recognition process. In order to perform face recognition,
there are few things that need to be taken into consideration. This is because there are a lot of issues that are
associated with face recognition. Some of them are face pose, change in subject face such as eye glass, facial
hair and veil for women [13]. There are also challenges such as illumination challenge when performing the
face recognition in outdoor condition, face expression, face aging and dynamic background problems [21].
There are two parts of face recognition which is texture features and geometric feature [19]. Texture
feature is when the face recognition is applied to some specific regions or the whole face while geometric
feature includes parts such as eyes, nose, lips, eyebrows and other relation between those parts.
There are many types of technique and algorithm that can be use in order to perform face
recognition. Some of them are Local Binary Pattern (LBP), Eigen face methodology and alignment–free
partial face recognition algorithm [20]. Other methods that are available are Linear Discriminant Analysis
(LDA), Kernel Method, Principal Component Analysis (PCA) and Neural Network [19]. Nevertheless, after
comparing between PCA, LDA and LBP, it is said that LBP approach is the most effective algorithm [22].
Using LBP, a composition of small pattern will be formed by the facial image. The compositions are
 ISSN: 2302-9285
Bulletin of Electr Eng and Inf, Vol. 8, No. 1, March 2019 : 239 – 245
242
invariant to grey scale transformation. After the small patterns are combined, the whole description of facial
image will be obtained.
5. FLOW AND ALGORITHM PROCESS
Figure 1 shows the project’s architecture. The process will be initiated by image acquisition by
camera of student’s face image. The image then will be detected by using Viola–Jones algorithm. Then, the
image will be compared to the image that are already stored in the database. The output of the comparison
will be stored in the attendance database. Further explanation will be explained in step by step process below.
Figure 1. System architecture
5.1. Image acquisition
The initial step is the image will be captured from a camera that is positioned in the classroom.
Ideally, the camera used must be a high quality camera as it is said that a high quality camera can produced
much more features when being compared to a low quality camera. The camera can be positioned at the front
of the class where it can capture the image of the whole class. The image should contain all the faces of
students that are present in a particular class.
5.2. Face detection
In this research, face detection algorithm that will be used is Viola Jones Algorithm. In Viola Jones
algorithm, there are four phases that are involved which is Haar feature selection, Integral image, Adaboost
training and cascading [23].
In Haar Feature selection, the similarities of human face are represented by Haar feature. The
features are represented by two or three rectangles that are composed together. For example, the human faces
have similarities where normally, the nose bridge part will be brighter than the eyes. In this case, Haar
features that represent the dark and white area are choosen. By using this technique, it is easier to detect
whether face is present or not in an image.
Figure 2 shows the example of Haar feature. This Haar pattern usually can be obtain on the eyes part
on human face. The bright part of the Haar feature represents human nose-bridge which is between the darker
part of the Haar feature. In this figure, the darker part represents human eyes.
Bulletin of Electr Eng and Inf ISSN: 2302-9285 
Face recognition attendance system using Local Binary Pattern (LBP) (Shahirah Mohamed Hatim)
243
Figure 2. Example of haar feature
Each of the Haar features has their own value. The integral image is when the total summation of
the pixel values from the original image is computed. The integral image is used in order to make a rapid
computation of Haar features.
Since Viola Jones use a base window size of 24 x 24 window to evaluate the whole features in an
image, there are about 160,000+ features that can be evaluated [12]. Hence, it is important to use Adaboost in
order to select features that are useful and eliminate redundant features.
Finally, cascaded classifier classifies whether or not a sub-window is definitely not a face or it may
be a face. If it is classified as may be a face, it will be passed to the next stage of the cascade, while if it is
classified as not a face, it will be discarded.
5.3. Face recognition
Local Binary Pattern (LBP) will be used in order to perform face recognition. By thresholding the
surrounding of each pixel with the value of the center pixel, LBP labels the image pixels. The result is
considered as binary number [24].
When the bit pattern is circular and the binary pattern contains maximum of two bitwise transitions
from 0 to 1 or the other way around, it is called uniform [25]. In LBP histogram computation, it uses uniform
patterns so that the uniform and non-uniform pattern can be assigned to different bin.
5.4. Comparison of features
After the image has been through the face recognition stage, the features will be compared with the
stored features. If there are similarities detected, it will be saved in the face database as well as the attendance
database.
5.5. Attendance database
After the comparison has been completed, the attendance will be saved into the attendance database.
If a student is present on a particular day, their student id will be saved together with the date and the course
code of the class that the student participates in.
6. RESULTS AND DISCUSSIONS
As the project is a simple project, all the students that are already recognized will be marked their
attendance that will be presented by Figure 3.
After testing the system, the project finds out that under a controlled environment, the project shows
a promising results. Some of the controlled environment includes:
a. Background.
In order for the face recognition to work at it best, the background need to be static. It is harder to
recognize face in a dynamic background.
b. Lighting.
Lighting also impose an important aspect in recognizing face. An environment with adequate light shows
more accurate results rather than a dim environment.
c. Facial changes.
Some changes to the facial area may cause inconsistency in recognizing the student’s faces. For example,
students with veil and spectacle are harder to be recognize if they did not wear their veil or spectacle.
Hence, it is important to address these issues in the future in order to enhance the accuracy of the
face recognition process.
 ISSN: 2302-9285
Bulletin of Electr Eng and Inf, Vol. 8, No. 1, March 2019 : 239 – 245
244
Figure 3. Attendance marking page
7. CONCLUSION
For the conclusion, this paper presents the automated system that will aid attendance taking process
to be faster, more reliable and accurate. The project has already achieve all the traits that will make this
project becomes reliable and useful to be used in order to take student’s attendance. Using this system, the
attendance taking process does not take a longer time compared to the traditional method. This system also
assists the administration team by automatically save student’s attendance. However, there are some issues
that need to be address in the future. Some of them might include the background dynamics where the system
can recognize face even though the background moves. Other issues will be the changes to the student’s face
and also the illumination of the environment where it should have enough light for the recognition to work.
Hopefully, this research will satisfy the growing needs of technological advancement in attendance taking
process since the traditional process of attendance taking have many flaws that need to be covered.
REFERENCES
[1] J. Chin, E. Tsun, C. W. Jen, F. Choong, and C. Mei, “Automated Attendance Capture System,” 2014.
[2] M. G. Krishnan, Balaji, and S. Babu, “Implementation of Automated Attendance System using Face Recognition,”
International Journal of Scientific & Engineering Research. vol. 6, no. 3, pp. 30–33, 2015.
[3] U. A. Patel, “Computer Science and Management Studies Development of a Student Attendance Management
System Using RFID and Face Recognition: A Review,” Int. J. Adv Res., vol. 2, no. 8, pp. 109–119, 2014.
[4] F. Masalha, “A Students Attendance System Using QR Code,” vol. 5, no. 3, pp. 75–79, 2014.
[5] S. Aiswarya, J. Peter, M. Cyriac, and L. S. Mathew, “Automated Attendance Management System using Face
Recognition,” Int. J. Comput. Appl., no. ICWET 2015, pp. 10455–10457, 2015.
[6] Y. Li, W. Zheng, Z. Cui, and T. Zhang, “Face recognition based on recurrent regression neural network,”
Neurocomputing, vol. 297, pp. 50–58, 2018.
[7] D. A. R. Wati and D. Abadianto, "Design of face detection and recognition system for smart home security
application," 2017 2nd International conferences on Information Technology, Information Systems and Electrical
Engineering (ICITISEE), Yogyakarta, 2017, pp. 342-347.
[8] C. L. Witham, “Automated face recognition of rhesus macaques,” J. Neurosci. Methods, vol. 300,
pp. 157–165, 2017.
[9] “Doggelganger: Human to Canine Pairing Software-Dog Milk.” [Online]. Available: dog-milk.com/doggelganger-
human-to-canine-pairing-software/. [Accessed: 27-Apr-2018].
[10] Oxford Advanced Learner’s Dictionary, 8th ed. 2011.
[11] S. A. M. Noor, N. Zaini, M. F. A. Latip and N. Hamzah, "Android-based attendance management system," 2015
IEEE Conference on Systems, Process and Control (ICSPC), Bandar Sunway, 2015, pp. 118-122.
[12] M. Shirodkar, “Automated Attendance Management System using Face Recognition,” no. Icwet, pp. 23–28, 2015.
[13] M. Fuzail et al., “Face Detection System for Attendance of C lass’ Students,” 2014.
[14] G. Padmaja and P. Nirupama, “Analysis of various image compression techniques,” ARPN J. Sci., vol. 89, no. 86,
pp. 86–89, 2017.
[15] P. M. Monga and S. A. Ghogare, “Scrutiny on Image Processing,” Int. J. Adv. Res. Comput. Sci. Softw. Eng., vol. 5,
no. 1, pp. 411–416, 2015.
Bulletin of Electr Eng and Inf ISSN: 2302-9285 
Face recognition attendance system using Local Binary Pattern (LBP) (Shahirah Mohamed Hatim)
245
[16] S. Kaur et al., “Overview of Image Processing,” International J. Adv. Res. Electron. CS Commun. Eng., vol. 4, no.
2, p. 190, 2015.
[17] S. Ojha and S. Sakhare, “Image processing techniques for object tracking in video surveillance- A survey,” 2015
Int. Conf. Pervasive Comput., vol. 00, no. c, pp. 1–6, 2015.
[18] N. M. Zaitoun and M. J. Aqel, “Survey on Image Segmentation Techniques,” Procedia Comput. Sci., vol. 65, no.
Iccmit, pp. 797–806, 2015.
[19] K. S. Selvi, P. Chitrakala, and A. A. Jenitha, “Face Recognition Based Attendance Marking System
Abstract :”.International Journal of Computer Science and Mobile Computing. 2014, vol. 3, no. 2, pp. 337–342.
[20] N.K. Jayant, “Attendance Management System Using Hybrid Face Recognition Techniques,” pp. 412–417, 2016.
[21] S.Kumar Rath and S. Swarup Rautaray, “A Survey on Face Detection and Recognition Techniques in Different
Application Domain,” Int. J. Mod. Educ. Comput. Sci., vol. 6, no. 8, pp. 34–44, 2014.
[22] M. Sajid, R. Hussain and M. Usman, "A conceptual model for automated attendance marking system using facial
recognition," Ninth International Conference on Digital Information Management (ICDIM 2014), Phitsanulok,
2014, pp. 7-10.
[23] J. Kaur and A. Sharma, “Performance analysis of face detection by using Viola-Jones algorithm,” International
Journal of Computational Intelligence Research. 2017, vol. 13, no. 5, pp. 707–717.
[24] K. Kadir, M. K. Kamaruddin, H. Nasir, S. I. Safie, and Z. A. K. Bakti, “A comparative study between LBP and
Haar-like features for Face Detection using OpenCV,” 2014 4th Int. Conf. Eng. Technol. Technopreneuship,
ICE2T 2014, vol. 2014–Augus, pp. 335–339, 2014.
[25] P. K. Dhere, “Review of PCA , LDA and LBP algorithms used for 3D Face Recognition,” Int. J. Eng. Sci. Innov.
Technol., vol. 4, no. 1, pp. 2008–2011, 2015.

Contenu connexe

Tendances

Attendance Management System using Face Recognition
Attendance Management System using Face RecognitionAttendance Management System using Face Recognition
Attendance Management System using Face RecognitionNanditaDutta4
 
Face recognition attendance system
Face recognition attendance systemFace recognition attendance system
Face recognition attendance systemNaomi Kulkarni
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdarraihansikdar
 
A Real-time Classroom Attendance System Utilizing Viola–Jones for Face Detect...
A Real-time Classroom Attendance System Utilizing Viola–Jones for Face Detect...A Real-time Classroom Attendance System Utilizing Viola–Jones for Face Detect...
A Real-time Classroom Attendance System Utilizing Viola–Jones for Face Detect...Nischal Lal Shrestha
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionNikyaa7
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShashidhar Reddy
 
IRJET- Automated Attendance System using Face Recognition
IRJET-  	  Automated Attendance System using Face RecognitionIRJET-  	  Automated Attendance System using Face Recognition
IRJET- Automated Attendance System using Face RecognitionIRJET Journal
 
Online Examination System
Online Examination SystemOnline Examination System
Online Examination SystemAnkan Banerjee
 
Attendence management system using face detection
Attendence management system using face detectionAttendence management system using face detection
Attendence management system using face detectionSaurabh Sutone
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition SystemZara Tariq
 
Computer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and PythonComputer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and PythonAkash Satamkar
 
Online Attendance Management System
Online Attendance Management SystemOnline Attendance Management System
Online Attendance Management SystemRIDDHICHOUHAN2
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemKarmesh Maheshwari
 
Synopsis of online Attendance System
Synopsis of online Attendance SystemSynopsis of online Attendance System
Synopsis of online Attendance SystemShyam Sundar Pandey
 
15.project attendence managemnt system
15.project attendence managemnt system15.project attendence managemnt system
15.project attendence managemnt systemHaseeb Nasir
 
Automatic Attendance Using Face Recognition
Automatic Attendance Using Face RecognitionAutomatic Attendance Using Face Recognition
Automatic Attendance Using Face Recognitionrahulmonikasharma
 
Student Attendance Management System using Barcode
Student Attendance Management System using BarcodeStudent Attendance Management System using Barcode
Student Attendance Management System using BarcodeDharmesh
 

Tendances (20)

Attendance Management System using Face Recognition
Attendance Management System using Face RecognitionAttendance Management System using Face Recognition
Attendance Management System using Face Recognition
 
Face recognition attendance system
Face recognition attendance systemFace recognition attendance system
Face recognition attendance system
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
A Real-time Classroom Attendance System Utilizing Viola–Jones for Face Detect...
A Real-time Classroom Attendance System Utilizing Viola–Jones for Face Detect...A Real-time Classroom Attendance System Utilizing Viola–Jones for Face Detect...
A Real-time Classroom Attendance System Utilizing Viola–Jones for Face Detect...
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
IRJET- Automated Attendance System using Face Recognition
IRJET-  	  Automated Attendance System using Face RecognitionIRJET-  	  Automated Attendance System using Face Recognition
IRJET- Automated Attendance System using Face Recognition
 
Online Examinition System
Online Examinition SystemOnline Examinition System
Online Examinition System
 
Online Examination System
Online Examination SystemOnline Examination System
Online Examination System
 
Attendence management system using face detection
Attendence management system using face detectionAttendence management system using face detection
Attendence management system using face detection
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
 
Computer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and PythonComputer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and Python
 
Online Attendance Management System
Online Attendance Management SystemOnline Attendance Management System
Online Attendance Management System
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance System
 
Synopsis of online Attendance System
Synopsis of online Attendance SystemSynopsis of online Attendance System
Synopsis of online Attendance System
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
 
15.project attendence managemnt system
15.project attendence managemnt system15.project attendence managemnt system
15.project attendence managemnt system
 
Automatic Attendance Using Face Recognition
Automatic Attendance Using Face RecognitionAutomatic Attendance Using Face Recognition
Automatic Attendance Using Face Recognition
 
Student Attendance Management System using Barcode
Student Attendance Management System using BarcodeStudent Attendance Management System using Barcode
Student Attendance Management System using Barcode
 

Similaire à Face recognition attendance system using Local Binary Pattern (LBP)

ANALYZING THE IMPACT OF INTERDEPENDENT DIMENSION ON TARGET ATTRIBUTE
ANALYZING THE IMPACT OF INTERDEPENDENT DIMENSION ON TARGET ATTRIBUTEANALYZING THE IMPACT OF INTERDEPENDENT DIMENSION ON TARGET ATTRIBUTE
ANALYZING THE IMPACT OF INTERDEPENDENT DIMENSION ON TARGET ATTRIBUTEJournal For Research
 
Attendance management system using face recognition
Attendance management system using face recognitionAttendance management system using face recognition
Attendance management system using face recognitionIAESIJAI
 
IRJET - Smart Mirror for Student Attendance
IRJET -  	  Smart Mirror for Student AttendanceIRJET -  	  Smart Mirror for Student Attendance
IRJET - Smart Mirror for Student AttendanceIRJET Journal
 
Face Recognition based Smart Attendance System Using IoT
Face Recognition based Smart Attendance System Using IoTFace Recognition based Smart Attendance System Using IoT
Face Recognition based Smart Attendance System Using IoTIRJET Journal
 
IRJET - Smart Student Attendance Management System
IRJET - Smart Student Attendance Management SystemIRJET - Smart Student Attendance Management System
IRJET - Smart Student Attendance Management SystemIRJET Journal
 
Monitoring Students Using Different Recognition Techniques for Surveilliance ...
Monitoring Students Using Different Recognition Techniques for Surveilliance ...Monitoring Students Using Different Recognition Techniques for Surveilliance ...
Monitoring Students Using Different Recognition Techniques for Surveilliance ...IRJET Journal
 
Survey Paper on : College Automation System using Face Recognition with RFID
Survey Paper on : College Automation System using Face Recognition with RFIDSurvey Paper on : College Automation System using Face Recognition with RFID
Survey Paper on : College Automation System using Face Recognition with RFIDIRJET Journal
 
Integrated system for monitoring and recognizing students during class session
Integrated system for monitoring and recognizing students during class sessionIntegrated system for monitoring and recognizing students during class session
Integrated system for monitoring and recognizing students during class sessionijma
 
PBL_Face Recognize Attendance System.pptx
PBL_Face Recognize Attendance System.pptxPBL_Face Recognize Attendance System.pptx
PBL_Face Recognize Attendance System.pptxTusarBhootra
 
METandance: A Smart Classroom Management And Analysis
METandance: A Smart Classroom Management And AnalysisMETandance: A Smart Classroom Management And Analysis
METandance: A Smart Classroom Management And AnalysisIRJET Journal
 
IRJET- Survey on Various Techniques of Attendance marking and Attention D...
IRJET-  	  Survey on Various Techniques of Attendance marking and Attention D...IRJET-  	  Survey on Various Techniques of Attendance marking and Attention D...
IRJET- Survey on Various Techniques of Attendance marking and Attention D...IRJET Journal
 
Smart Attendance System using Face-Recognition
Smart Attendance System using Face-RecognitionSmart Attendance System using Face-Recognition
Smart Attendance System using Face-RecognitionIRJET Journal
 
SMART ATTENDANCE SYSTEM USING QR CODE WITH SMS.pptx
SMART ATTENDANCE SYSTEM USING QR CODE WITH SMS.pptxSMART ATTENDANCE SYSTEM USING QR CODE WITH SMS.pptx
SMART ATTENDANCE SYSTEM USING QR CODE WITH SMS.pptxDanielGuballo1
 
City i-Tick: The android based mobile application for students’ attendance at...
City i-Tick: The android based mobile application for students’ attendance at...City i-Tick: The android based mobile application for students’ attendance at...
City i-Tick: The android based mobile application for students’ attendance at...journalBEEI
 
Development of an Automatic & Manual Class Attendance System using Haar Casca...
Development of an Automatic & Manual Class Attendance System using Haar Casca...Development of an Automatic & Manual Class Attendance System using Haar Casca...
Development of an Automatic & Manual Class Attendance System using Haar Casca...IRJET Journal
 
IRJET- Automation Software for Student Monitoring System
IRJET-  	  Automation Software for Student Monitoring SystemIRJET-  	  Automation Software for Student Monitoring System
IRJET- Automation Software for Student Monitoring SystemIRJET Journal
 
Face detection based attendance system
Face detection based attendance systemFace detection based attendance system
Face detection based attendance systemIRJET Journal
 
College Result presentation report pdf and
College Result presentation report pdf andCollege Result presentation report pdf and
College Result presentation report pdf andbhagyavantrajapur88
 
Implementation of Automatic Attendance Management System Using Harcascade and...
Implementation of Automatic Attendance Management System Using Harcascade and...Implementation of Automatic Attendance Management System Using Harcascade and...
Implementation of Automatic Attendance Management System Using Harcascade and...IRJET Journal
 

Similaire à Face recognition attendance system using Local Binary Pattern (LBP) (20)

ANALYZING THE IMPACT OF INTERDEPENDENT DIMENSION ON TARGET ATTRIBUTE
ANALYZING THE IMPACT OF INTERDEPENDENT DIMENSION ON TARGET ATTRIBUTEANALYZING THE IMPACT OF INTERDEPENDENT DIMENSION ON TARGET ATTRIBUTE
ANALYZING THE IMPACT OF INTERDEPENDENT DIMENSION ON TARGET ATTRIBUTE
 
Attendance management system using face recognition
Attendance management system using face recognitionAttendance management system using face recognition
Attendance management system using face recognition
 
IRJET - Smart Mirror for Student Attendance
IRJET -  	  Smart Mirror for Student AttendanceIRJET -  	  Smart Mirror for Student Attendance
IRJET - Smart Mirror for Student Attendance
 
Face Recognition based Smart Attendance System Using IoT
Face Recognition based Smart Attendance System Using IoTFace Recognition based Smart Attendance System Using IoT
Face Recognition based Smart Attendance System Using IoT
 
IRJET - Smart Student Attendance Management System
IRJET - Smart Student Attendance Management SystemIRJET - Smart Student Attendance Management System
IRJET - Smart Student Attendance Management System
 
Monitoring Students Using Different Recognition Techniques for Surveilliance ...
Monitoring Students Using Different Recognition Techniques for Surveilliance ...Monitoring Students Using Different Recognition Techniques for Surveilliance ...
Monitoring Students Using Different Recognition Techniques for Surveilliance ...
 
Survey Paper on : College Automation System using Face Recognition with RFID
Survey Paper on : College Automation System using Face Recognition with RFIDSurvey Paper on : College Automation System using Face Recognition with RFID
Survey Paper on : College Automation System using Face Recognition with RFID
 
Integrated system for monitoring and recognizing students during class session
Integrated system for monitoring and recognizing students during class sessionIntegrated system for monitoring and recognizing students during class session
Integrated system for monitoring and recognizing students during class session
 
PBL_Face Recognize Attendance System.pptx
PBL_Face Recognize Attendance System.pptxPBL_Face Recognize Attendance System.pptx
PBL_Face Recognize Attendance System.pptx
 
METandance: A Smart Classroom Management And Analysis
METandance: A Smart Classroom Management And AnalysisMETandance: A Smart Classroom Management And Analysis
METandance: A Smart Classroom Management And Analysis
 
IRJET- Survey on Various Techniques of Attendance marking and Attention D...
IRJET-  	  Survey on Various Techniques of Attendance marking and Attention D...IRJET-  	  Survey on Various Techniques of Attendance marking and Attention D...
IRJET- Survey on Various Techniques of Attendance marking and Attention D...
 
Smart Attendance System using Face-Recognition
Smart Attendance System using Face-RecognitionSmart Attendance System using Face-Recognition
Smart Attendance System using Face-Recognition
 
SMART ATTENDANCE SYSTEM USING QR CODE WITH SMS.pptx
SMART ATTENDANCE SYSTEM USING QR CODE WITH SMS.pptxSMART ATTENDANCE SYSTEM USING QR CODE WITH SMS.pptx
SMART ATTENDANCE SYSTEM USING QR CODE WITH SMS.pptx
 
Event Hub
Event HubEvent Hub
Event Hub
 
City i-Tick: The android based mobile application for students’ attendance at...
City i-Tick: The android based mobile application for students’ attendance at...City i-Tick: The android based mobile application for students’ attendance at...
City i-Tick: The android based mobile application for students’ attendance at...
 
Development of an Automatic & Manual Class Attendance System using Haar Casca...
Development of an Automatic & Manual Class Attendance System using Haar Casca...Development of an Automatic & Manual Class Attendance System using Haar Casca...
Development of an Automatic & Manual Class Attendance System using Haar Casca...
 
IRJET- Automation Software for Student Monitoring System
IRJET-  	  Automation Software for Student Monitoring SystemIRJET-  	  Automation Software for Student Monitoring System
IRJET- Automation Software for Student Monitoring System
 
Face detection based attendance system
Face detection based attendance systemFace detection based attendance system
Face detection based attendance system
 
College Result presentation report pdf and
College Result presentation report pdf andCollege Result presentation report pdf and
College Result presentation report pdf and
 
Implementation of Automatic Attendance Management System Using Harcascade and...
Implementation of Automatic Attendance Management System Using Harcascade and...Implementation of Automatic Attendance Management System Using Harcascade and...
Implementation of Automatic Attendance Management System Using Harcascade and...
 

Plus de journalBEEI

Square transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipherSquare transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipherjournalBEEI
 
Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...journalBEEI
 
Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...journalBEEI
 
A secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networksA secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networksjournalBEEI
 
Plant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural networkPlant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural networkjournalBEEI
 
Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...journalBEEI
 
Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...journalBEEI
 
Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...journalBEEI
 
Wireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithmWireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithmjournalBEEI
 
Implementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antennaImplementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antennajournalBEEI
 
The calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human headThe calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human headjournalBEEI
 
Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...journalBEEI
 
Design of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting applicationDesign of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting applicationjournalBEEI
 
Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...journalBEEI
 
Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)journalBEEI
 
Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...journalBEEI
 
Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...journalBEEI
 
An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...journalBEEI
 
Parking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentationParking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentationjournalBEEI
 
Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...journalBEEI
 

Plus de journalBEEI (20)

Square transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipherSquare transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipher
 
Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...
 
Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...
 
A secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networksA secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networks
 
Plant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural networkPlant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural network
 
Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...
 
Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...
 
Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...
 
Wireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithmWireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithm
 
Implementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antennaImplementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antenna
 
The calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human headThe calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human head
 
Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...
 
Design of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting applicationDesign of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting application
 
Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...
 
Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)
 
Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...
 
Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...
 
An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...
 
Parking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentationParking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentation
 
Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...
 

Dernier

Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxchumtiyababu
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEselvakumar948
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxmaisarahman1
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxMuhammadAsimMuhammad6
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 

Dernier (20)

Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 

Face recognition attendance system using Local Binary Pattern (LBP)

  • 1. Bulletin of Electrical Engineering and Informatics Vol. 8, No. 1, March 2019, pp. 239~245 ISSN: 2302-9285, DOI: 10.11591/eei.v8i1.1439  239 Journal homepage: http://beei.org/index.php/EEI Face recognition attendance system using Local Binary Pattern (LBP) Shamsul J. Elias1 , Shahirah Mohamed Hatim2 , Nur Anisah Hassan3 , Lily Marlia Abd Latif4 , R. Badlishah Ahmad5 , Mohamad Yusof Darus6 , Ahmad Zambri Shahuddin7 1 Universiti Teknologi MARA (UiTM), Malaysia 2,3,4,6,7 Faculty of Computer and Mathematical Sciences, Universti Teknologi MARA, Malaysia 5 Faculty of Informatics and Computing, Universiti Sultan Zainal Abidin (UniSZA), Malaysia Article Info ABSTRACT Article history: Received Sep 30, 2018 Revised Nov 15, 2018 Accepted Dec 21, 2018 Attendance is important for university students. However, generic way of taking attendance in universities may include various problems. Hence, a face recognition system for attendance taking is one way to combat the problem. This paper will present an automated system that will automatically saves student’s attendance into the database using face recognition method. The paper will elaborate on student attendance system, image processing, face detection and face recognition. The face detection part will be done by using viola-jones algorithm method while the face recognition part will be carried on by using local binary pattern (LBP) method. The system will ensure that the attendance taking process will be faster and more accurate. Keywords: Face detection Face recognition Local Binary Pattern Student’s attendance system Viola-jones algorithm Copyright © 2019 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Shahirah Mohamed Hatim, Faculty of Computer and Mathematical Sciences, Universti Teknologi MARA, 35400 Tapah, Malaysia. Email: shahirah88@uitm.edu.my 1. INTRODUCTION In today’s world, attendance taking is essential. Attendance would be counted as a part of student’s mark in most universities. Usually, attendance is taken by using a piece of paper that contains student’s information and act as student’s attendance register. Students will then put on their signature as a sign that they are present on that particular day. However, there are problem with this generic technique. Some of the problem includes student’s forging signature of their close friend [1]. The attendance process takes a long time and many more problems [2]. To counter these problems, an automated attendance system is needed to be done. In this paper, the project will present the automated system which is face recognition in order to combat these problems. It is an automated system that will save student’s attendance automatically into the database. In order to automatically take student’s attendance, there are technologies that are readily built such as Barcode Readers, Radio Frequency Identification System (RFID) and Bluetooth. Even though these technologies may help to reduce the time taken for the attendance to be taken, it requires machine and devices that are expensive and have limited usage as the device is easily broken [3]. There is also other method such as biometrics. However, biometrics application proposal mostly involves the application to be used by the lecturer during class hour. This will eventually cause distraction as the class will be interrupted every time the lecturer allows late students into the class [4]. Using biometrics, it also will take a longer time as students need to queue in order to use the device [5].
  • 2.  ISSN: 2302-9285 Bulletin of Electr Eng and Inf, Vol. 8, No. 1, March 2019 : 239 – 245 240 Face recognition system is a perfect way to solve these problems. Using face detection, student face will be taken real time while the student is learning in class without them noticing and the learning process will be smooth. Students also can be attentive without being disturbed in order to sign for their attendance and lost some of the information that are given by the lecturer. As for the lecturer, there is no hassle in order to keep all the student’s attendance registers for reports later because the attendance is automatically generated by the system. The data generated for the report will be accurate and there will be no more misleading data since the chances for students to forge the documents is eliminated. Face recognition has been used for a long time in many fields. In today’s world, face recognition can easily be done since cameras are readily and easily available in the market. Face images can easily be captured in the daily life as there were rapid development of electric equipment such as surveillance camera and cell phones [6]. One of the areas that face recognition plays important role in is security. In today’s world, many premises such as houses use face recognition in order to enhance their house security. There are a face detection and recognition system for Smart Home Security Application designed by Ana and Wati [7] in order to fulfill the needs of home owners. It uses a directed face to decide whether or not a person is allowed into the premises. It has a high accuracy of face recognition. Other study is a study done on automated face recognition of rhesus macaques by Witham [8]. This study is advantageous since it non–invasively identify rhesus macaques in videos to find out their group and lastly, there is an application software called Doggelgangger [9] that is developed to compare and match a canine with their possible human parents. This application shows that face recognition can also be used in various applications. 2. ATTENDANCE SYSTEM The word student can be defined as “a person who is studying at a school, college, or university” according to Oxford Advance Learner’s Dictionary, while the word attendance is defined as “the act of being present at a place” [10]. Referring to the definition earlier, student’s attendance system can be considered as a system that are used in school, college or universities in order to mark or specify that a student is present or absent on a particular day. The general way of attendance taking is usually done by using a piece of paper that has student’s information. This paper will act as registry and will be passed around the classroom [11]. For example, the date on the registry will be filled up by the lecturer and the paper will be passing through the class. Sometimes, the lecturer will let the paper be passed while they start teaching in order to save time. Another way of taking attendance is lecturers will call the student’s name one by one. If they are present, the students need to answer loudly enough for the lecturers or teacher to hear. Both methods mentioned above have been practiced globally for a very long period of time. However, problem often arise when the normal or traditional attendance taking method are being used. They can be time consuming especially when students need to response when their names are being called by the lecturer [12]. The attendance report also will be hard to maintain until it is needed to generate the report as the attendance sheet or registry could have gone missing. Using the traditional method, teachers or lecturers also required to correctly mark the student’s attendance [13], but then mistakes might happen while marking the attendance. If these occurs, the data can be affected when report are being generated. Another problem that can be found when using the general method of attendance taking is students can deceive their lecturer by signing for their friends who is absent for the day [11]. This action can easily be performed especially in a big hall where it is impossible for the lecturer to count the number of students. In order to combat all these problem, the project propose an automated system using face recognition to automatically collect and save student’s attendance. 3. IMAGE PROCESSING Images can be taken from various sources. Some of the sources include cameras or sensors that are placed on satellites, space probes and even air crafts [14]. The image that are produced by these sources are called raw image. Image processing is a technique used to improve these raw images [15]. It can also be used with normal images that are taken for many activities in our everyday life [16]. Image processing, is a form of processing with image as its input and will produce characteristic or parameters that are related to the input image as its output [17]. There are numerous field and areas that can be involve with image processing [16]. The areas and fields include remote sensing, medical imaging, textile and several others. In image processing, there are three steps involved [15]. First step is importing the image using optical scanner or
  • 3. Bulletin of Electr Eng and Inf ISSN: 2302-9285  Face recognition attendance system using Local Binary Pattern (LBP) (Shahirah Mohamed Hatim) 241 digital photography. The next steps are to analyses and manipulate the image and the final step is to get the output. There are two different types of image processing. The first type is analog image processing and the other is digital image processing. Analog image processing is when the image is altered through electrical medium. A television image, adjusting the amplitude and reference of the video signal will result in the brightening, darkening and alteration of the brightness range of the displayed image [16]. Different in analog signal, digital image is being processed in two-dimensional image by using digital computer. A finite number of bits which is actually an array of the actual number represent a digital image. 3.1. Segmentation Segmentation process can be defined as a process where image is subdivided into some components parts or object [18]. The subdivision of the level will be carried is depending on how the problem is being solved [14]. For example, we are interested in identifying a person in an alley. We need to segment the alley first from the image. Then, the content of the alley will be segmented to find the potential person. For image segmentation, image thresholding techniques are used. There are two categories in image segmentation which s Layer-Based Segmentation and Block-Based Segmentation. In Layer-Based Segmentation, Layered Model is used in order to detect object and define shape and mask. The appearance and depth ordering also will be explained. Class and instance segmentation also will be evaluated by using image segmentation that composite the output of a bank of object detectors. Block-Based segmentation method on the other hand is based on various features that can be found in image. These features might be color information that is used to create histograms and could be the information about the pixels that could indicate edges or boundary. The features also could be the texture information [18]. Maintaining the Integrity of the Specifications. 4. FACE RECOGNITION Face recognition can be referred as a process that requires facial images to be captured using a camera and saving it automatically into the database [12]. Face recognition, generally are divided into two stages. The first stage is face detection and the second stage is face recognition. 4.1. Face detection In order to perform face recognition, the image captured must undergo face detection process first. Face recognition is a process where human face image is detected using algorithms that are associated with face detection. In face detection, there are many algorithms that are mostly used. Some of them are Ada Boost Algorithm, S-Ada Boost Algorithm Support Vector Machines (SVM) and Float Boost Algorithm. There are also other algorithms such as Bayes Classifier, HAAR Classifier and Viola Jones Algorithm [19]. Among the algorithms that are stated, Viola Jones Algorithm is said to have a low false detection a high accuracy compared to other method [20]. By using Viola Jones method, the features of integral image are computed and then classified. Instead of scaling the images, this method provides scaling of the features instead. Viola Jones method also said to be advantageous since the feature computations are extremely fast and it has efficient feature selection. Besides Viola Jones method, Ada Boost learning algorithm can also be used to choose the significant features from the computed potential features. 4.2. Face recognition After key feature of an image has been extracted, it will be compared to the image that is readily stored in the database. This process is called face recognition process. In order to perform face recognition, there are few things that need to be taken into consideration. This is because there are a lot of issues that are associated with face recognition. Some of them are face pose, change in subject face such as eye glass, facial hair and veil for women [13]. There are also challenges such as illumination challenge when performing the face recognition in outdoor condition, face expression, face aging and dynamic background problems [21]. There are two parts of face recognition which is texture features and geometric feature [19]. Texture feature is when the face recognition is applied to some specific regions or the whole face while geometric feature includes parts such as eyes, nose, lips, eyebrows and other relation between those parts. There are many types of technique and algorithm that can be use in order to perform face recognition. Some of them are Local Binary Pattern (LBP), Eigen face methodology and alignment–free partial face recognition algorithm [20]. Other methods that are available are Linear Discriminant Analysis (LDA), Kernel Method, Principal Component Analysis (PCA) and Neural Network [19]. Nevertheless, after comparing between PCA, LDA and LBP, it is said that LBP approach is the most effective algorithm [22]. Using LBP, a composition of small pattern will be formed by the facial image. The compositions are
  • 4.  ISSN: 2302-9285 Bulletin of Electr Eng and Inf, Vol. 8, No. 1, March 2019 : 239 – 245 242 invariant to grey scale transformation. After the small patterns are combined, the whole description of facial image will be obtained. 5. FLOW AND ALGORITHM PROCESS Figure 1 shows the project’s architecture. The process will be initiated by image acquisition by camera of student’s face image. The image then will be detected by using Viola–Jones algorithm. Then, the image will be compared to the image that are already stored in the database. The output of the comparison will be stored in the attendance database. Further explanation will be explained in step by step process below. Figure 1. System architecture 5.1. Image acquisition The initial step is the image will be captured from a camera that is positioned in the classroom. Ideally, the camera used must be a high quality camera as it is said that a high quality camera can produced much more features when being compared to a low quality camera. The camera can be positioned at the front of the class where it can capture the image of the whole class. The image should contain all the faces of students that are present in a particular class. 5.2. Face detection In this research, face detection algorithm that will be used is Viola Jones Algorithm. In Viola Jones algorithm, there are four phases that are involved which is Haar feature selection, Integral image, Adaboost training and cascading [23]. In Haar Feature selection, the similarities of human face are represented by Haar feature. The features are represented by two or three rectangles that are composed together. For example, the human faces have similarities where normally, the nose bridge part will be brighter than the eyes. In this case, Haar features that represent the dark and white area are choosen. By using this technique, it is easier to detect whether face is present or not in an image. Figure 2 shows the example of Haar feature. This Haar pattern usually can be obtain on the eyes part on human face. The bright part of the Haar feature represents human nose-bridge which is between the darker part of the Haar feature. In this figure, the darker part represents human eyes.
  • 5. Bulletin of Electr Eng and Inf ISSN: 2302-9285  Face recognition attendance system using Local Binary Pattern (LBP) (Shahirah Mohamed Hatim) 243 Figure 2. Example of haar feature Each of the Haar features has their own value. The integral image is when the total summation of the pixel values from the original image is computed. The integral image is used in order to make a rapid computation of Haar features. Since Viola Jones use a base window size of 24 x 24 window to evaluate the whole features in an image, there are about 160,000+ features that can be evaluated [12]. Hence, it is important to use Adaboost in order to select features that are useful and eliminate redundant features. Finally, cascaded classifier classifies whether or not a sub-window is definitely not a face or it may be a face. If it is classified as may be a face, it will be passed to the next stage of the cascade, while if it is classified as not a face, it will be discarded. 5.3. Face recognition Local Binary Pattern (LBP) will be used in order to perform face recognition. By thresholding the surrounding of each pixel with the value of the center pixel, LBP labels the image pixels. The result is considered as binary number [24]. When the bit pattern is circular and the binary pattern contains maximum of two bitwise transitions from 0 to 1 or the other way around, it is called uniform [25]. In LBP histogram computation, it uses uniform patterns so that the uniform and non-uniform pattern can be assigned to different bin. 5.4. Comparison of features After the image has been through the face recognition stage, the features will be compared with the stored features. If there are similarities detected, it will be saved in the face database as well as the attendance database. 5.5. Attendance database After the comparison has been completed, the attendance will be saved into the attendance database. If a student is present on a particular day, their student id will be saved together with the date and the course code of the class that the student participates in. 6. RESULTS AND DISCUSSIONS As the project is a simple project, all the students that are already recognized will be marked their attendance that will be presented by Figure 3. After testing the system, the project finds out that under a controlled environment, the project shows a promising results. Some of the controlled environment includes: a. Background. In order for the face recognition to work at it best, the background need to be static. It is harder to recognize face in a dynamic background. b. Lighting. Lighting also impose an important aspect in recognizing face. An environment with adequate light shows more accurate results rather than a dim environment. c. Facial changes. Some changes to the facial area may cause inconsistency in recognizing the student’s faces. For example, students with veil and spectacle are harder to be recognize if they did not wear their veil or spectacle. Hence, it is important to address these issues in the future in order to enhance the accuracy of the face recognition process.
  • 6.  ISSN: 2302-9285 Bulletin of Electr Eng and Inf, Vol. 8, No. 1, March 2019 : 239 – 245 244 Figure 3. Attendance marking page 7. CONCLUSION For the conclusion, this paper presents the automated system that will aid attendance taking process to be faster, more reliable and accurate. The project has already achieve all the traits that will make this project becomes reliable and useful to be used in order to take student’s attendance. Using this system, the attendance taking process does not take a longer time compared to the traditional method. This system also assists the administration team by automatically save student’s attendance. However, there are some issues that need to be address in the future. Some of them might include the background dynamics where the system can recognize face even though the background moves. Other issues will be the changes to the student’s face and also the illumination of the environment where it should have enough light for the recognition to work. Hopefully, this research will satisfy the growing needs of technological advancement in attendance taking process since the traditional process of attendance taking have many flaws that need to be covered. REFERENCES [1] J. Chin, E. Tsun, C. W. Jen, F. Choong, and C. Mei, “Automated Attendance Capture System,” 2014. [2] M. G. Krishnan, Balaji, and S. Babu, “Implementation of Automated Attendance System using Face Recognition,” International Journal of Scientific & Engineering Research. vol. 6, no. 3, pp. 30–33, 2015. [3] U. A. Patel, “Computer Science and Management Studies Development of a Student Attendance Management System Using RFID and Face Recognition: A Review,” Int. J. Adv Res., vol. 2, no. 8, pp. 109–119, 2014. [4] F. Masalha, “A Students Attendance System Using QR Code,” vol. 5, no. 3, pp. 75–79, 2014. [5] S. Aiswarya, J. Peter, M. Cyriac, and L. S. Mathew, “Automated Attendance Management System using Face Recognition,” Int. J. Comput. Appl., no. ICWET 2015, pp. 10455–10457, 2015. [6] Y. Li, W. Zheng, Z. Cui, and T. Zhang, “Face recognition based on recurrent regression neural network,” Neurocomputing, vol. 297, pp. 50–58, 2018. [7] D. A. R. Wati and D. Abadianto, "Design of face detection and recognition system for smart home security application," 2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE), Yogyakarta, 2017, pp. 342-347. [8] C. L. Witham, “Automated face recognition of rhesus macaques,” J. Neurosci. Methods, vol. 300, pp. 157–165, 2017. [9] “Doggelganger: Human to Canine Pairing Software-Dog Milk.” [Online]. Available: dog-milk.com/doggelganger- human-to-canine-pairing-software/. [Accessed: 27-Apr-2018]. [10] Oxford Advanced Learner’s Dictionary, 8th ed. 2011. [11] S. A. M. Noor, N. Zaini, M. F. A. Latip and N. Hamzah, "Android-based attendance management system," 2015 IEEE Conference on Systems, Process and Control (ICSPC), Bandar Sunway, 2015, pp. 118-122. [12] M. Shirodkar, “Automated Attendance Management System using Face Recognition,” no. Icwet, pp. 23–28, 2015. [13] M. Fuzail et al., “Face Detection System for Attendance of C lass’ Students,” 2014. [14] G. Padmaja and P. Nirupama, “Analysis of various image compression techniques,” ARPN J. Sci., vol. 89, no. 86, pp. 86–89, 2017. [15] P. M. Monga and S. A. Ghogare, “Scrutiny on Image Processing,” Int. J. Adv. Res. Comput. Sci. Softw. Eng., vol. 5, no. 1, pp. 411–416, 2015.
  • 7. Bulletin of Electr Eng and Inf ISSN: 2302-9285  Face recognition attendance system using Local Binary Pattern (LBP) (Shahirah Mohamed Hatim) 245 [16] S. Kaur et al., “Overview of Image Processing,” International J. Adv. Res. Electron. CS Commun. Eng., vol. 4, no. 2, p. 190, 2015. [17] S. Ojha and S. Sakhare, “Image processing techniques for object tracking in video surveillance- A survey,” 2015 Int. Conf. Pervasive Comput., vol. 00, no. c, pp. 1–6, 2015. [18] N. M. Zaitoun and M. J. Aqel, “Survey on Image Segmentation Techniques,” Procedia Comput. Sci., vol. 65, no. Iccmit, pp. 797–806, 2015. [19] K. S. Selvi, P. Chitrakala, and A. A. Jenitha, “Face Recognition Based Attendance Marking System Abstract :”.International Journal of Computer Science and Mobile Computing. 2014, vol. 3, no. 2, pp. 337–342. [20] N.K. Jayant, “Attendance Management System Using Hybrid Face Recognition Techniques,” pp. 412–417, 2016. [21] S.Kumar Rath and S. Swarup Rautaray, “A Survey on Face Detection and Recognition Techniques in Different Application Domain,” Int. J. Mod. Educ. Comput. Sci., vol. 6, no. 8, pp. 34–44, 2014. [22] M. Sajid, R. Hussain and M. Usman, "A conceptual model for automated attendance marking system using facial recognition," Ninth International Conference on Digital Information Management (ICDIM 2014), Phitsanulok, 2014, pp. 7-10. [23] J. Kaur and A. Sharma, “Performance analysis of face detection by using Viola-Jones algorithm,” International Journal of Computational Intelligence Research. 2017, vol. 13, no. 5, pp. 707–717. [24] K. Kadir, M. K. Kamaruddin, H. Nasir, S. I. Safie, and Z. A. K. Bakti, “A comparative study between LBP and Haar-like features for Face Detection using OpenCV,” 2014 4th Int. Conf. Eng. Technol. Technopreneuship, ICE2T 2014, vol. 2014–Augus, pp. 335–339, 2014. [25] P. K. Dhere, “Review of PCA , LDA and LBP algorithms used for 3D Face Recognition,” Int. J. Eng. Sci. Innov. Technol., vol. 4, no. 1, pp. 2008–2011, 2015.