Using Real Time Computer Vision Algorithms in Automatic Attendance Management Systems



Similar documents
International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014

AUTOMATED ATTENDANCE CAPTURE AND TRACKING SYSTEM

Development of Academic Attendence Monitoring System Using Fingerprint Identification

A Students Attendance System Using QR Code

LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE.

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

A secure face tracking system

Index Terms: Face Recognition, Face Detection, Monitoring, Attendance System, and System Access Control.

Automated Attendance Management System using Face Recognition

Framework for Biometric Enabled Unified Core Banking

Development of Attendance Management System using Biometrics.

Face Recognition For Remote Database Backup System

Computer Vision Based Employee Activities Analysis

Intelligent Database Monitoring System using ARM9 with QR Code

A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION

Fingerprint-Based Authentication System for Time and Attendance Management

An Active Head Tracking System for Distance Education and Videoconferencing Applications

INTEGRATING RADIO FREQUENCY IDENTIFICATION TECHNOLOGY IN ACADEMIC MANAGEMENT SYSTEM

FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM

Classroom Monitoring System by Wired Webcams and Attendance Management System

The Implementation of Face Security for Authentication Implemented on Mobile Phone

Fingerprint-Based Authentication System for Time and Attendance Management

Design and Implementation of Automatic Attendance Check System Using BLE Beacon

Dynamic Query Updation for User Authentication in cloud Environment

Multimodal Biometric Recognition Security System

Development of a Learning Content Management Systems

Database Migration over Network

Accessing the bank account without card and password in ATM using biometric technology

PSG College of Technology, Coimbatore Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.

RFID based Bill Generation and Payment through Mobile

REAL-TIME ATTENDANCE AND ESTIMATION OF PERFORMANCE USING BUSINESS INTELLIGENCE

Attendance monitoring as a context-aware service

Face Recognition in Low-resolution Images by Using Local Zernike Moments

ISSN: (Online) Volume 2, Issue 1, January 2014 International Journal of Advance Research in Computer Science and Management Studies

Fingerprint Identity User Manual for the Griaule Biometric Framework Rev 1.00

CS231M Project Report - Automated Real-Time Face Tracking and Blending

Application-Specific Biometric Templates

AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION

Efficient Attendance Management: A Face Recognition Approach

BIOMETRIC & MULTIPLE-TECHNNOLOGIES MOBILE SOLUTIONS IN HEALTHCARE.

Face Recognition Using Robotics

Organization Attendance Record System: Frauds and A Proposed Facial Recognition Technique

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

Assignment 1 Biometric authentication

Intrusion Detection System using Log Files and Reinforcement Learning

Navigation Aid And Label Reading With Voice Communication For Visually Impaired People

Architecture for Mobile based Face Detection / Recognition

Intinno: A Web Integrated Digital Library and Learning Content Management System

Graduate School of Informatics

Automatic Maritime Surveillance with Visual Target Detection

Design of a University Portal with Biometric Lecture Attendance Monitoring System

ABSTRACT I. INTRODUCTION

Automatic Biometric Student Attendance System: A Case Study Christian Service University College

Fingerprint Recognition Student Attendance Management System

DATA PROTECTION REQUIREMENTS FOR ATTENDANCE VERIFICATION SYSTEMS (AVSs)

FACE RECOGNITION FOR SOCIAL MEDIA WITH MOBILE CLOUD COMPUTING

Biometrics for Global Web Authentication: an Open Source Java/J2EE-Based Approach

Decision Trees for Mining Data Streams Based on the Gaussian Approximation

Information Security Course Specifications

Android-Based Mobile Payment System Using 3 Factor Authentication

Efficient Integrity Checking Technique for Securing Client Data in Cloud Computing

Adaptive Face Recognition System from Myanmar NRC Card

Game Programming for Complex System Development and ABET Accreditation Assessment

IDRBT Working Paper No. 11 Authentication factors for Internet banking

Identifying Data Integrity in the Cloud Storage

E-LEARNING DEVELOPMENT AS PUBLIC INFRASTRUCTURE OF CLOUD COMPUTING

THE EFFECTIVENESS OF USING LEARNING MANAGEMENT SYSTEMS AND COLLABORATIVE TOOLS IN WEB-BASED TEACHING OF PROGRAMMING LANGUAGES

Robust Real-Time Face Detection

Face Recognition Using Multi-Agent System

HANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT

Challenges of Online Exam, Performances and problems for Online University Exam

Design of Expanded Assessment Management System for Open-Source Moodle LMS Module

DETECTION OF SIGN-LANGUAGE CONTENT IN VIDEO THROUGH POLAR MOTION PROFILES

Adeoye Temitope Onaolamipo School of Computer Science, Mathematics & Information Technology Houdegbe North America University Republic of Benin

Identifying At-Risk Students Using Machine Learning Techniques: A Case Study with IS 100

Development of Hybrid Radio Frequency Identification and Biometric Security Attendance System

Support Vector Machines for Dynamic Biometric Handwriting Classification

3D PASSWORD. Snehal Kognule Dept. of Comp. Sc., Padmabhushan Vasantdada Patil Pratishthan s College of Engineering, Mumbai University, India

ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology

Parallelized Architecture of Multiple Classifiers for Face Detection

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

Automatic Extraction of Signatures from Bank Cheques and other Documents

Deposit Identification Utility and Visualization Tool

Installation and Configuration of Aadhaar Enrolment Client

WEB SERVICE FOR STUDENT ATTENDANCE MANAGEMENT SYSTEM

Adi Armoni Tel-Aviv University, Israel. Abstract

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and

A Real Time Driver s Eye Tracking Design Proposal for Detection of Fatigue Drowsiness

Online Gaming: Legalization with Protection for Minors, Adult Players, Problem Gamers

IMPLEMENTATION OF CLASSROOM ATTENDANCE SYSTEM BASED ON FACE RECOGNITION IN CLASS

An Algorithm for Electronic Money Transaction Security (Three Layer Security): A New Approach

Image Normalization for Illumination Compensation in Facial Images

Final Year Project Interim Report

An in-building multi-server cloud system based on shortest Path algorithm depending on the distance and measured Signal strength

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management

ERP / LOGISTICS TRAINING USING COMPUTER BASED TRAINING TOOLS: A VIRTUALIZATION MODEL FOR SAP

Traceable Physical Security Systems for a Safe and Secure Society

Indoor Surveillance Security Robot with a Self-Propelled Patrolling Vehicle

Strengthen RFID Tags Security Using New Data Structure

Comparative study of security parameters by Cloud Providers

Transcription:

Using Real Time Computer Vision Algorithms in Automatic Attendance Management Systems Visar Shehu 1, Agni Dika 2 Contemporary Sciences and Technologies - South East European University, Macedonia 1 Contemporary Sciences and Technologies - South East European University, Macedonia 2 v.shehu@seeu.edu.mk 1, a.dika@seeu.edu.mk 2 Abstract. This paper introduces a new approach in automatic attendance management systems, extended with computer vision algorithms. We propose using real time face detection algorithms integrated on an existing Learning Management System (LMS), which automatically detects and registers students attending on a lecture. The system represents a supplemental tool for instructors, combining algorithms used in machine learning with adaptive methods used to track facial changes during a longer period of time. This new system aims to be less time consuming than traditional methods, at the same time being nonintrusive and not interfere with the regular teaching process. The tool promises to offer accurate results and a more detailed reporting system which shows student activity and attendance in a classroom. Keywords. computer vision, object tracking, face recognition, machine learning, teaching 1. Introduction A key factor of improving the quality of education is having students attend classes regularly. Traditionally students are stimulated to attend classes using attendance points which at the end of a semester constitute a part of a students final grade. However, traditionally this presents additional effort from the teacher, who must make sure to correctly mark attending students, which at the same time wastes a considerable amount of time from the teaching process. Furthermore it can get much more complicated if one has to deal with large groups of students. This paper introduces a new automatic attendance management marking system, without any interference with the regular teaching process. The system can be used also during exam sessions or other teaching activities where attendance is obligatory. This system eliminates classical student identification such as calling student names, or checking respective identification cards, which can not only interfere with the teaching process, but also can be stressful for students during exam sessions. 2. Related work Most modern learning management systems, implement some type of attendance management. Moodle [9] automates the process by using RFID or barcode scanners. Classrooms are equiped with a barcode / RFID scanner which scans and enrolls students that enter the classroom. Other LMS systems such as Angel [3] require students to login in to a web page with a special one time temporary key in order to mark their presence on class. The problem with these approaches is that they interfere with the regular teaching process. Using face recognition in time attendance management systems in not new. There are few commercial solutions available to companies, that implement face recognition in work environments. Kawaguchi [11] proposes face recognition in attendance management systems. This system aims to detect the position of each student and capture an image for that particular student, which is latter identified. Related systems that use biometrics (fingerprint recognition, iris recognition etc) to identify users are time management systems used in many institutions. However, installing these systems in every classroom in a university would pose a bigger financial burden. It would also require from the university to record biometric information from all students, which would introduce further privacy concerns. These systems are also subject to physical damage from their users. Therefore they need additional maintenance costs. The idea proposed by us, removes physical access from anyone to the system. 3. General idea 397 Proceedings of the ITI 2010 32 nd Int. Conf. on Information Technology Interfaces, June 21-24, 2010, Cavtat, Croatia

This proposed system introduces a new automatic attendance marking sysem, which integrates computer vision and face recognition algorithms into the process of attendance management. The system is implemented using a non intrusive digital camera installed on a classroom, which scans the room, detects and extracts all faces from the acquired images. After faces have been extracted, they are compared with an existing database of student images and upon successful recognition a student attendance list is generated and saved on a database. This paper addresses problems such as real time face detection on environments with multiple objects, face recognition algorithms as well as social and pedagogical issues with the applied techniques. During the practical realization of this idea, it was decided to implement machine learning algorithms, which are commonly used in the field of computer vision. The first problem was to detect face like patterns in real time images. In order to achieve that, we used the HAAR classifiers [10], which were additionally trained with positive images acquired from classrooms full of students [8]. However, detecting face like patterns constitutes just a part of the problem. One must implement a face recognition algorithm which is used to positively identify a student from a database of students. 4. System architecture The system designed is part of an in-house built learning management suite (Libri) [5]. It is constructed in many modules: Image capturing, Face Detector and Face recognizer. The entire process is described in the pseudocode shown in Fig 1: scan room with digital camera for each detected object transfer the object in server next object for each face in server if face in students database record student as enrolled save face in students database else mark face as unrecognized next face The required infrastructure in classroom is a rotating camera positioned centrally in the front of the classroom (Fig. 2). Figure 2. Classroom setup Using this setup, the camera is capable to capture frontal images from students such as the one in Fig 3. Figure 3. A classroom with students A different approach would be to use a camera at the entrance of the classroom, which would individually detect faces for everyone entering the classroom. This way, the face detector would have much less work to do, but there would be only one chance to capture a good frame. A frontal camera in the middle of the classroom can take as many pictures as necessary. Physically the system is integrated on the existing South East European Universities infrastructure. To function, the system requires each classroom to have at least one internet connected computer. This computer communicates with the LMS server, where captured images are transferred. Fig 4 depicts the physical architecture of this system. Figure 1. System architecture pseudocode 398

Figure 4. Physical system architecture 4.1. Image capturing Images are captured using a module built in the LMS. The module is an application written in Windows Presentation Foundation (WPF) framework. After an image is captured, using a web services transfers the image on server for processing. Together with the image, the web service accepts the course code. Using this course code, the LMS is aware of which students are enrolled in that class and do face matching only for those students. The camera continuously takes pictures on a given interval (by default each five minutes), until all faces detected are successfully identified or until the system is told to stop. This means that in some cases, e.g., when a face cannot be successfully identified, the camera keeps taking pictures until the class finishes. classifier is implemented on Intel s Open CV library. The classifier works by training a model using positive face images and negative face images. A positive image is an image that contains the desired object to be detected, in our case this object is a face. A negative image is an image that does not contain the desired object. After the model is trained, it is able to identify face features, which is later stored on a XML file. A problem faced during this process was the large number of false-positives: objects mistakenly detected as faces. This was not such a big issue for us, since a false-positive does not result in a positive identification during the recognition phase. Because of this, we lowered the detection threshold, so all faces could be detected. After a face has been detected, the rectangle enclosing this face is cropped and processed later by the face recognition module. This rectangle represents a single face, and after being cropped as an image is transferred on server. Each file transferred is renamed to have a unique ID (GUID). Fig 5, shows the face detector in action where white rectangles show detected faces. Some of the extracted faces are shown in Fig 6. 4.2. Face detection Because of processor intensive job of the face detection algorithm, this tool is server based. Detecting a face is in essence an object detection task, where the object of interest in this case is the face. However, many factors can interfere with the face detection algorithms, factors such as face pose, scale, position, rotation, light, image colors etc. The same problems arise when one wants to identify (recognize) a face, with addition to some other obstacles which is discussed shortly. The process of detecting faces from still pictures containing multiple faces can be separated in few steps. There are plenty face detection algorithms which can effectively detect a face (or any other specific object) in a picture. In the system presented here, most students face the camera frontally hence we chose to use the HAAR classifier for face detection. This Figure 5. A typical classroom Figure 6. Extracted images from Fig. 2 4.3. Face recognition Recognizing a face means to identify that particular face from a list of faces on a database. Our university, upon enrollment takes pictures 399

from every student, and those images are stored in a database. Same as in face detection, there are many existing algorithms used to identify a face. Our system implements a server based module, programmed in Python (Pyfaces - http://pyfaces.blogspot.com/) which takes benefit of eigenfaces [6] to identify a face. This algorithm has many drawbacks: it depends on scale, pose and the color of the compared images. However the algorithm is very fast, and can compare only to images, thus we do not need to have multiple images of a person to train our system. Since our system is setup to capture only frontal images the pose of the face in not an issue. When a face is captured during the face detection phase, it is converted into gray scale. The same conversion is applied to faces on our student image database. We also do background subtraction on our images so other objects do not interfere during the process. Another issue is that faces are subject of change during time (facial hair, eyeglasses etc). Whenever we successfully identify a face, a copy of that face is stored in the database of faces for that student. Together with the image we store the time and date when this image was taken. This way even if a student gradually changes his appearance (e.g., grows a beard) the system is still capable to identify him, since it has multiple images of the same person. On each consequent scan for a student, the recognition module starts comparing images from this database, sorted by date in descending order. This approach was chosen since the latest image of a student on our database is most likely to be more similar to the current captured image. Of course, a drastic change on a student s look causes the system to not identify that particular student. To solve this issue, we have included a module, which lists all unidentified faces and the teacher is able to manually connect a captured face with a student from the list. This image is also stored on our database, as an updated picture of this particular student. This manual recognition process is performed only once. In a subsequent scan, this student is identified automatically by our system. To speed up the face recognition process we only compare images captured in a classroom, with the database of students enrolled for that course only. This ensures that we process only a small subset of images available on our server. 5. Experiment We applied our system in three courses with a total of ten groups. There were 147 students enrolled in those courses. From all of them we asked for consent and they were willing to join this experiment. We gained the following statistics: From each captured image, there were approximately 70% of successfully detected faces. From them only about 30% were successfully identified. When the experiment was conducted only with first year students, the successful identification rate was much higher (about 56 %). The main reason behind these disappointing results are old images of students stored when they first enroll in the university. For first year students, these images are still fresh, thus the results are more promising. However, second year and third year student facial appearance has changed since they registered; resulting with lower recognition rate. 6. Privacy concerns As mentioned previously, we store image data on server. This approach can always raise privacy concerns, regarding the safety of those images and access level to that server. Whenever one has to deal with this type of sensitive data, he must always offer means to protect data from unauthorized access. [4] In some countries, especially in EU, these privacy concerns are considered very seriously with regulations in place in their corresponding legislatures. [1] Since this is system is mainly done to explore the advantages and the feasibility of using face recognition in attendance management, it still does not offer any privacy protection. However, if the system proves to be usable one has to implement some type of secure means to ensure privacy. In password security one of the most popular approaches in this case is to encrypt data using a one way function. For us this means to encrypt images gotten from the camera and compare those images with existing (also encrypted) images on server. However, since biometric data is noisy, this approach is not feasible. Another approach can be to use one way encryption using a private / public key 400

approach. This way only the person in possession of the correct key is able to decrypt the data. 7. Conclusion An automatic attendance management system is a necessary tool for any LMS. Most of the existing systems are time consuming and require for a semi manual work from the teacher or students. Our approach aims to solve the issues by integrating face recognition in the process. Even though this system still lacks the ability to identify each student present on class, there is still much more room for improvement. Since we implement a modular approach we can improve different modules until we reach an acceptable detection and identification rate. Another issue that has to be taken in consideration in the future is a method to ensure users privacy. Whenever an image is stored on our servers, it must be impossible for a person to use that image. 8. Acknowledgement [6] M. Turk, A. Pentland, Eigenfaces for Recognition. Journal of Cognitive Neurosicence. Vol. 3. No. 1. 1991. p. 71-86 [7] Ming-Hsuan Yang, David J. Kriegman, Narendra Ahuja. Detecting Faces in Images: A Survey. IEEE Transactions on Pattern Analysis and Machine Intelligence. Vol. 24. NO 1.; 2002 [8] Phillip Ian Wilson, John Fernandez, Facial Feature Detection Using Haar Classifiers. Journal of Computing Sciences in Colleges; 2006 [9] Sourish Behera, Rajesh Kumar Kushwaha. RFID Based People Management System Using UHF Tags [10] Viola, P., Jones, M. Rapid Object Detection Using Boosted Cascade of Simple Features. IEEE Conference on Computer Vision and Pattern Recognition; 2001. [11] Yohei Kawaguchi, Tetsuo Shoji, Weijane Lin, Koh Kakusho, Michihiko Minoh. Face Recognition-based Lecture Attendance System The authors would like to thank students from the Computer Science and Business Informatics departments in South East European University for their contribution in this project. 9. References [1] Annemarie Sprokkereef. Data Protection and the Use of Biometric Data in the EU. IFIP International Federation for Information Processing. Springer Boston; 2008 [2] Alexander Kuranov, Rainer Lienhart, and Vadim Pisarevsky. An Empirical Analysis of Boosting Algorithms for Rapid Objects With an Extended Set of Haar-like Features. Intel Technical Report MRL-TR-July02-01; 2002 [3] Angel Learning. Learning Management System. http://www.angellearning.com/ [4/5/2010] [4] E. Verbitskiy, P. Tuyls, D. Denteneer, J. P. Linnart. Reliable Biometric Authentication with Privacy Protection. Philips Research Laboratories [5] Lejla Abazi-Bexheti. Development of a Learning Content Management System. WSEAS Transactions on Information Science and Applications 401

402