Major Poject Report
Major Poject Report
Major Poject Report
18MCA61
on
“FACE RECOGNITION WITH REALTIME
DATABASE”
Submitted by
VIVEK KUMAR
USN: 1RD19MCA38
Prof. Prashanth K.
Assistant Professor
Department of MCA
RV College of Engineering®
Bengaluru – 560059
DEPARTMENT OF
MASTER OF COMPUTER APPLICATIONS
Bengaluru– 560059
CERTIFICATE
Certified that the project work titled “FACE RECOGNITION WITH REALTIME DATABASE”
carried out by VIVEK KUMAR, USN: 1RD19MCA38, a bonafide student of RV College of
Engineering®, Bengalurusubmitted in partial fulfilment for the award of Master of Computer
Applicationsof RVCollege of Engineering®, Bengaluru affiliated to Visvesvaraya Technological
University, Belagavi during the year 2023-24.It is certified that all corrections/suggestions indicated
for internal assessment have been incorporated in the report deposited in the departmental library. The
project report has been approved as it satisfies the academic requirement in respect of project work
prescribed for the said degree.
i
RV COLLEGE OF ENGINEERING®
(Autonomous Institution Affiliated to Visvesvaraya Technological University, Belagavi)
DEPARTMENT OF
MASTER OF COMPUTER APPLICATIONS
Bengaluru– 560059
DECLARATION
24. The matter embodied in this report has not been submitted to any
diploma.
ii
USN: 1RD19MCA38
Department of Master of Computer Applications
RV College of Engineering®
Bengaluru-560059
ACKNOWLEDGEMENT
iii
VIVEK KUMAR
Department of MCA
RV College of Engineering®
B
e
n
g
a
l
u
r
u
-
5
9
ABSTRACT
In this study, a system for real-time face recognition was built using the
Open Face tools of the Open CV library. The article describes the methodology
for creating the system and the results of its testing. The Open CV library has
various modules that perform many tasks. In this paper, Open CV modules were
used for face recognition in images and face identification in real time. In
addition, It was used to detect a person by the front of his face. After performing
the face measurements were obtained using the image encoding method. A
convolution neural network was then used to identify people's faces using the
SVM linear classifier algorithm.
v
Table of Contents
Acknowledgement i
Abstract ii
Table of Contents iii
List of Tables Iv
List of Figures v
Chapter 1: Introduction
1.1Project Description
1
1.2Company Profile
3
Chapter 2: Literature Review
2.1Literature Survey
5
2.2Existing and Proposed
System
6
2.3 Tools and Technologies
used
8
2.4 Hardware and Software
Requirements
9
Chapter 3: Software Requirement Specifications
3.1Introduction
12
3.2General Description
13
3.3Functional Requirement
15
3.4External Interfaces Requirements
17
3.5 Non-Functional Requirements
18
3.6Design Constraints
22
3.7Other Requirements (If applicable)
23
vi
Chapter 4: System Design
4.1System Perspective /Architectural Design
25
4.2Context Diagram
27
Chapter 5: Detailed Design
5.1System Design
30
5.2Detailed design
33
Chapter 6:Implementation
6.1 Code Snippets / PDL
34
6.2 Implementation
35
Chapter 7: Explanation Code
7.1 Code
36
7.2 Testing and Validations
37
Chapter 8: Conclusion
Chapter 9: Future Enhancements
Bibliography
vii
List of Figures
Sl. No Feature Information
1 Overview
2 Setup
3 Webcam
4 Graphics
5 Encoding Generator
6 Database Setup
7 Add Data to the Database
viii
List of Tables
ix
Face Recognition System
CHAPTER 1
INTRODUCTION
A brief description about the project and the project domain overview has been mentioned in
this chapter.
There are many previous works on Face Recognition Security Systems but a robust
solution that will address the deficiencies of the current FRS remains elusive. In this
research, Face recognition algorithms were used to The application presented in this study
captures images of people’s faces using cameras and saves the images as training set into
a database. Then, it uses the saved images as the training set to train the system to
recognize a particular person in real time whenever he/she comes in front of the camera.
This new system has additional advantages that includes, easy to setup & install, high
portability and low startup costs. This project was done with this fantastic “Open Source
Computer Vision Library”, the OpenCV. On this tutorial, we will be focusing on Python,
but I also tested the code on my Mac and it also works fine.
OpenCV was designed for computational efficiency and with a strong focus on real-
time applications. So, it’s perfect for real-time face recognition using a camera.
Real-time face detection technology is a type of biometric software that uses mathematical
algorithms to identify individuals based on their unique facial characteristics. These
characteristics can include height, width, the distance between the eyes, nose shape, and
others.
There are two main types of face recognition technology: 2D and 3D. 2D face
recognition technology uses images taken from flat surfaces, such as a driver’s license or a
passport photo.
Recognition of a human face in an image is the main and key in the tasks of
recognizing emotions and automatically tracking people moving in the field of view of the
camera. The problem of optimal search and identification of a human face, based on
cybernetic vision systems, can be considered both in the light of the classical problem of
perception, and in the light of new methods. The issue of localization and face recognition
was studied at the early stages of computer vision.
CHAPTER 2
LITERATURE REVIEW
This chapter gives an overview about literature survey of the project paln with
outcome, existing and proposed system with feasibility study, technologies used in the project
and motivation to take up the project.
In the Face Recognition (FR) domain, various different methods were presented
and applied is one of the first successful and strongest approaches in the FR domain
[3]. This method takes a whole image as a vector and uses it to generate statistical
information. It combines all image vectors together and forms an image matrix and then
eigenvectors of this matrix will be calculated. The face images can then be expressed as a
linear solution.Another successful approach [4] is for facial feature extraction. The LBP
operator merges a region in the image and assigns a value as a central pixel.
Jyotshana Kanti [8] proposed a smart attendance marking system which combines two
differencing algorithms such Principal Component Analysis and Artificial Neural Network.
The purpose of the author is to solve the traditional attendance marking system and to resolve
the time-consuming. In the system implement with Principal Component Analysis, it does an
extraction and identify the similarities of the face database and acquire images. Artificial
Neural Network is used to solve the problem of the input data or learn from the input data,
and the expect value. In the system implemented by the author using back propagation
algorithm and combines with mathematical function to perform in that system. As a result,
written by the author research, it shows that the system can use to recognize in a different
environment.
[9] Student Attendance System using Face Recognition: Samridhi Dev, Tushar
Patnaikb(2020) In this paper the system was tested on three different algorithms out of which
the KNN algorithm proved to be better with the accuracy of 99.27 %. The system was tested
on various conditions which include illumination, head movements, expressions, the distance
of students from the camera. The system stands up to the expectations even when the image
contains faces with beards and spectacles and without beard and spectacles. proposed system
evinced to be magnificent to recognize faces having two years of difference.
In [18] Kawaguchi introduced a lecture attendance system with a new method called
continuous monitoring, and the student’s attendance marked automatically by the camera
which captures the photo of a student in the class. The architecture of the system is simple
since two cameras equipped with the wall of the class. The first one is a capturing camera
used to capture the image student in the class and the second camera is sensor camera is used
to getting the seat of a student inside the class and the camera capturing will snap the image of
the student. The system compares the picture taking from a camera capturing images and
faces in the database done much time to perfect the attendance.
Face recognition is a method to identify or verify the identity of an individual using their face.
Face recognition has been used for various applications such as automatic classroom
attendance management system in [1], surveillance of access restricted zones including living
spaces for intruder detection in [2], recognition of celebrities in public space [3], recognition
of house inmates by networked home automation system in [4] and many more.
i. PyCharm
ii FireBase
Firebase is an app development platform that helps you build and grow apps and
games users love. Backed by Google and trusted by millions of businesses around the world.
The most common set of parameters specified by any operating system or software
program is physical computer assets, also known as hardware. All computer applications must
have certain hardware components or other software resources on a computer for effective
use. Such preconditions are known as hardware and software requirements. The solution also
System Tools
Processor Dual Core
Hard Disk 40GB
RAM 512 MB
System Tools
Operating System Windows 7 & above
Front End Pycharm
Programming Python
Tools PyCharm
Cloud Firebase
CHAPTER 3
3.1 Introduction
The chapter provides details of the general description, functional requirements, non
functional requirements, various assumptions made, performance requirements, external user
interface and all the design constraints
Definition
There are many previous works on Face Recognition Security Systems but a robust
solution that will address the deficiencies of the current FRS remains elusive. In this
research, Face recognition algorithms were used to The application presented in this
study captures images of people’s faces using cameras and saves the images as
training set into a database
This new system has additional advantages that includes, easy to setup &
install, high portability and low startup costs. This project was done with this
fantastic “Open Source Computer Vision Library”, the OpenCV. On this
tutorial, we will be focusing on Python, but I also tested the code on my Mac
and it also works fine
This section explains about the proper description about the project. To present detail
description about Cloud access system for User and Admin to manage it. It explains the purpose and
features of the project undertaken and the interfaces of the system and what system will do and
constraint which it operates on
Product Perspective
Central repository: Cloud infrastructure serves as a central repository for digital file storage,
and is easy to use, Manage, find and share files, and archive them
Self-service: Cloud This program will help individuals build their own FDRT. This
application don't need a dedicated and knowledge person
Save time: The application allows us to reduce required time by avoiding repetitive activities
and reducing human effort. And avoid human errors
Product Function
The functional requirements for a system describe what the system should do. These
requirements depend on the type of software being developed; the general approach taken by
the organization when writing requirements. The functional system requirements describe the
system function in detail, its inputs and outputs, exceptions and so on. Functional
requirements are as follows:
• Face Detection.
• Face recognition
Non-Functional Requirements
Non-functional requirements, as the name suggests, are requirements that are not
directly concerned with the specific functions delivered by the system. They may relate to
emergent system properties such as reliability, response time and store occupancy.
Alternatively, they may define constraints on the system such as capabilities of I/O devices
and the data representations used in system interfaces. The non-functional requirements are as
follows:
User interface
o The Application solution user interface offers the option to build a
Python Project
Hardware Interface
o The application can run on any system but first it is to be installed on
the system where is being used as it is a stand-alone application
Software Interface
o The application makes use of the Pycharm, so the python is to be
available Editer is also required
3.5 Design Constraints
Standard compliance
Hardware limitations
CHAPTER 4
SYSTEM DESIGN
This chapter gives a detailed system level design and details of system perspective,
Block diagram, Context diagram, module specification and data flow diagram.
The system design gives the general description of the system perspective, which
comprises of the problem specification and context diagram.
Problem Specification
Cloud computing is a type of computing that does not rely on local servers or personal
computers for application management but on shared computing resources. When a project is
developed, a document is created for the internal use which include all the critical details of
the particular project called as " Face Recognition with Real Time Database ". Face
Recognition with Real Time Database automation involves automatically gathering project
information to reduce human effort and save time. The project is developed over the Firebase.
The built team must project by providing script for project. Once the FRWRTD is created, it
will be forwarded to the other team for the future use. The data is secured because without the
access details can be view. The automation will help in avoiding the repetitive task and evade
the human error.
Architecture Diagram
The Context Diagram describes the system as a single high-level mechanism and
displays the relationship of the system with other external entities. It shows the interaction as
system input and system output that is used by the users. Context Diagram does not provide
information about the timing, sequencing or synchronization of processes such as parallel or
sequential processes.
CHAPTER 5
DETAILED DESIGN
This chapter gives the detailed explanation of the system design with use case
diagram, activity diagram and all the data flow diagrams. It also explains the detailed design
of the systems implementation and the methodology used.
3) Face Recognition
Training and face recognition are done next. face_rec.py code does
everything.Face detection is the process of finding or locating one or more human faces in a
frame or image. Haar-like feature algorithm by Viola and Jones is used for face detection. In
Haar features, all human faces share some common properties.The project was tested on
Windows using OpenCV 2.4.10. The following shell script installs all dependencies required
for OpenCV and also install OpenCV 2.4.10.This will start the training, and the camera will
open up. Accuracy depends on the number of data sets as well as the quality and lighting
conditions.
2) Face Recognition
Face detection and Face Recognition are often used interchangeably but these are
quite different. In fact, Face detection is just part of Face Recognition. Face recognition is a
method of identifying or verifying the identity of an individual using their face. There are
various algorithms that can do face recognition but their accuracy might vary. Here I am
going to describe how we do face recognition using deep learning.In fact here is an article,
Face Recognition Python which shows how to implement Face Recognition.
Module Implement
#importing libraries
CHAPTER 6
IMPLEMENTATION
This chapter gives the explanation of front design of the system and the
implementation screenshots.
CHAPTER 7
SOFTWARE TESTING
7.1 Main.py
CHAPTER 8
CONCLUSION
By face recognition system we can fulfil the purpose of security. Detection of face is
done by image processing. Here we use Open CV with programming language Python.
Initially camera will capture the image and face detection algorithm will detect the
face in image. Then recognition algorithm is applied on this detected part. In this project we
have developed based face recognition system.
To achieve this goal computers must be able to reliably identify nearby people in a
manner that fits naturally within the pattern of normal human interactions. They must not
require special interactions and must conform to human intuitions about when recognition is
likely.
CHAPTER 9
FUTURE ENHANCEMENTS
Some industries have been harder hit than others by the COVID-19 pandemic and this
has meant that they have had to adapt much quicker and pivot to the use of new technologies
in order to prepare for the world opening up again.
Facial recognition devices are already being tested or implemented for airport
protection, and it is reported that their faceprint has now been produced by more than half the
United States populace. Information may be collected and processed by a facial recognition
program, and a person does not even recognize it. Then, a hacker might reach the details, and
the knowledge of a person would propagate without even realizing it. Government entities or
marketers may use this data to monitor individuals too. Worse still, a false positive may
include a person for a crime they are not.
Authentication systems: Various devices like mobile phones or even ATMs work
using facial recognition, thus making getting access or verification quicker and hassle free.
BIBLIOGRAPHY
[1] AdinMoseUllm97 “Adini, Y., Moses, Y., and Ullman, S. (July 1997).” Face Recognition: The
Problem of Compensating for Changes in Illumination Direction IEEE Transactions on Pattern
Analysis and Machine Intelligence, 19(7):721-732.
[2.] AibaOhueOshi93. “Aibara, T., Ohue, K., and Oshita, Y. (1993).” Human face profile recognition
by a P-Fourier descriptor Optical Engineering, 32(4):861-863.
[3] AlliElli92. “Allinson, N.M. and Ellis, A.W. (1992).” Face recognition: Combining cognitive
psychology and image engineering Electronics & Communication Engineering Journal, 4:291-300.
[4] Baro79 “Baron, R.J. (1979).” A bibliography on face recognition. The SISTM Quaterly
Incorporating the Brain Theory Newsletter, II(3):27-36.
[5] Baro81 “Baron, R.J. (1981).” Mechanisms of human facial recognition International Journal of
Man-Machine Studies, 15(2):137-178.
[6] BartSejn98. “Bartlett, M.S. and Sejnowski, T.J. (1998).” Learning viewpoint invariant face
representations from visual experience in an attractor network Network: Computation in Neural
Systems, 9(3):399-417. (.edu-abstract.html)
[7] BelhHespKrie97 “Belhumeur, P.N., Hespanha, J.P., and Kriegman, D.J. (July 1997). Eigenfaces
vs. Fisherfaces: Recognition Using Class Specific Linear Projection IEEE Transactions on Pattern
Analysis and Machine Intelligence, 19(7):711-720.
[8] BiedKalo97. “Biederman, I. and Kalocsai, P. (1997).” Neurocomputational Bases of Object and
Face Recognition Philosophical Transactions of the Royal Society of London, Series B, 352:1203-
1219.
[9] BrucBurtCraw92. “Bruce, V., Burton, A.M., and Craw, I.G. (1992).” Modelling face recognition
[10] BrunFala95. “Brunelli, R. and Falavigna, D. (October 1995).” Person Recognition Using
Multiple Cues IEEE Transactions on Pattern Analysis and Machine In telligence, 17(10):955-966.
PLAGIARSM REPORT