IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 498- 502

International Journal of Research in Information Technology (IJRIT) www.ijrit.com

ISSN 2001-5569

RFID Based Face Attendance System Shweta Patil1, Varsha Shinde2, Manisha Suryavanshi3 and Prof.Nidhi Sharma4 1

4

Student, Computer Engineering, Bharati Vidyapeeth College of Engineering Navi Mumbai, Maharashtra, India [email protected]

2

Student, Computer Engineering, Bharati Vidyapeeth College of Engineering Navi Mumbai, Maharashtra, India [email protected]

3

Student, Computer Engineering, Bharati Vidyapeeth College of Engineering Navi Mumbai, Maharashtra, India [email protected]

Professor, Computer Engineering, Bharati Vidyapeeth College of Engineering Navi Mumbai, Maharashtra, India [email protected]

Abstract This paper describes the development of a employee attendance system based on Radio Frequency Identification (RFID) technology. Radio-frequency identification (RFID) is a technology that uses radio waves to transfer data from an electronic tag, called RFID tag or label, attached to an object, through a reader for the purpose of identifying and tracking the object. RFID technology which is a matured technology that has been widely deployed by various organizations as part of their automation systems. It can be used to take attendance for workers in working places. Its ability to uniquely identify each person based on their RFID tag type of ID card make the process of taking the attendance easier, faster and secure as compared to conventional method. Students or workers only need to place their ID card on the reader and their attendance will be taken immediately. With real time clock capability of the system, attendance taken will be more accurate since the time for the attendance taken will be recorded. In this paper, an RFID based system has been built in order to produce employee attendance system. This system consists of two main parts which include: the hardware and the software. The hardware consists of the RFID reader and RFID tags. The system can be connected to the computer through RS232 or Universal Serial Bus (USB) port and store the attendance taken inside database. In addition to provide security we also use face recognition system, in this system we take the image of employee and store it. When the attendance is to be marked employee will face the camera his image will be taken and compared with stored image attendance will be marked if it matches. These will be done using Open CV Library. The Employee Attendance System provides the functionalities of the overall system such as registering ID, deleting ID, recording attendance and other minor functions. This interface was installed in the host computer.

Keywords: Radio-frequency identification, RFID technology, radio waves, USB serial adapter;

Shweta Patil,

IJRIT

498

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 498- 502

1. Introduction The two major problems faced by organizations are time consuming manual attendance and wastage of electrical power. Our project is going to solve these problems by using RFID technology. Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. So the RFID is a wireless identification. Normally the RFID system comprises of two main parts are RFID Reader and RFID Tag. Radio Frequency Identification (RFID) is one of the automatic identification technologies more in vogue nowadays. There is a wide research (RFID) is one of the automatic identification technologies more in vogue nowadays. There is a wide research and development in this area trying to take maximum advantage of this technology, and in coming years many new applications and research areas will continue to appear. This sudden interest in RFID also brings about some concerns, mainly the security and privacy of those who work with or use tags in their everyday life. In a developing country like ours, lot of latest technology that has been developed such as RFID, wireless, Bluetooth, robot and so on. Therefore, these technologies can be adopted to improve our daily routines so take our life more comfortable and easy. Attendance taking in firms should be done in more advanced method with using the latest technology. This attendance management system would be the best effective way to regulate the attendance in the regulatory Firm like student of university, Employee attendance Management system rather the tedious manual attendance system. As for system development and implementation, it should be able to help in managing their employee attendance systematically. The system must have database that contains employee/student information and it must be able to help admin to manipulate data, update database, alert manager accordingly, and also nice interface to make it easier to use. Finally, the attendance system must be user friendly for commercial purpose. It also can be used to take attendance for workers in working places. Its ability to uniquely identify each person based on their RFID tag type of ID card make the process of taking the attendance easier, faster and secure as compared to conventional method. Students or workers only need to place their ID card on the reader and their attendance will be taken immediately. With real time clock capability of the system, attendance taken will be more accurate since the time for the attendance taken will be recorded. The system can be connected to the computer through RS232 or Universal Serial Bus (USB) port and store the attendance taken inside database. Additionally we also use face recognition system, in this system we take the image of a employee and store it[1]. When the attendance is to be marked employee will face the camera his image will be taken and compared with stored image attendance will be marked if it matches. These will be done using Open CV Library. 1.1Reader and Tag RFID reader is the device capable of extracting or reading information stored inside RFID tags [2]. Two types of RFID reader available are active and passive RFID reader. Active RFID reader can detect the active RFID tag at few meters to line of sight while passive RFID reader can only detect passive RFID tag at a few centimetres from the reader. The RFID reader used in the system is a low cost reader for reading passive RFID tags. It operates at frequency of 125 kHz and 12V power supply. The effective detection range of the reader is around 5cm from the antenna [3]. The RFID reader is constructed based on the EM18 RFID transponder IC. Each RFID tag will have unique ID or serial number which makes it suitable for distinguishing among products. Some RFID tags even contain information that can only be read by RFID reader. There are three types of RFID tags, namely active, semi-passive and passive RFID tag. The main difference between these RFID tags is that active and semi-passive RFID tags contain internal battery while passive RFID tags do not have any internal battery.

Shweta Patil,

IJRIT

499

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 498- 502

Fig -1: Schematic of RFID Reader Radio Frequency Identification (RFID) Card Readers provide a low-cost solution to read passive RFID transponder tags up to 7 cm away. This RFID Card Reader can be used in a wide variety of hobbyist and commercial applications, including access control, automatic identification, robotics navigation, inventory tracking, payment systems, and car immobilization. The RFID card reader read the RFID tag in range and outputs unique identification code of the tag at baud rate of 9600. The data from RFID reader can be interfaced to be read by microcontroller or PC. 1.2 Database A database is defined as an organized collection of data and tailored to our system, our database is employed to mainly store the image captured by the camera. 1.3. Technique. 1.3.1 Haar Cascade Classifier The core basis for Haar classifier object detection is the Haar-like features. These features, rather than using the intensity values of a pixel, use the change in contrast values between adjacent rectangular groups of pixels. The contrast variances between the pixel groups are used to determine relative light and dark areas. Two or three adjacent groups with a relative contrast variance form a Haar-like feature. Haar-like features, as shown in Figure-2 are used to detect an image. Haar features can easily be scaled by increasing or decreasing the size of the pixel group being examined. This allows features to be used to detect objects of various sizes.

Fig -2: Face Detection Using Haar Classifier Classifiers Cascaded Although calculating a feature is extremely efficient and fast, calculating all 180,000 features contained within a 24 × 24 sub-image is impractical [Viola 2001, Wilson 2005]. Fortunately, only a tiny fraction of those features are needed to determine if a sub-image potentially contains the desired object. In order to eliminate as many sub-images as possible, only a few of the features that define an object are used when analysing sub-images. The goal is to eliminate a substantial amount, around 50%, of the sub-images that do not contain the object. This process continues, increasing the number of features used to analyse the subimage at each stage. The cascading of the classifiers allows only the sub-images with the highest Shweta Patil,

IJRIT

500

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 498- 502

probability to be analysed for all Haar-features that distinguish an object. It also allows one to vary the accuracy of a classifier. One can increase both the false alarm rate and positive hit rate by decreasing the number of stages. The inverse of this is also true. Viola and Jones were able to achieve a 95% accuracy rate for the detection of a human face using only 200 simple features. Using a 2 GHz computer, a Haar classifier cascade could detect human faces at a rate of at least five frames per second. 1.4 Training Classifiers for Facial Features Detecting human facial features, such as the mouth, eyes, and nose require that Haar classifier cascades first be trained. In order to train the classifiers, this gentle AdaBoost algorithm and Haar feature algorithms must be implemented. Fortunately, Intel developed an open source library devoted to easing the implementation of computer vision related programs called Open Computer Vision Library (Open CV). The Open CV library is designed to be used in conjunction with applications that pertain to the field of HCI, robotics, biometrics, image processing, and other areas where visualization is important and includes an implementation of Haar classifier detection and training. To train the classifiers, two set of images are needed. One set contains an image or scene that does not contain the object, in this case a facial feature, which is going to be detected. This set of images is referred to as the negative images. The other set of images, the positive images, contain one or more instances of the object. The location of the objects within the positive images is specified by: image name, the upper left pixel and the height, and width of the object. For training facial features 5,000 negative images with at least a mega-pixel resolution were used for training. These images consisted of everyday objects, like paperclips, and of natural scenery, like photographs of forests and mountains. 1.5 Regionalize Detection In order to regionalize the image, one must first determine the likely area where a facial feature might exist. The simplest method is to perform facial detection on the image first. The area containing the face will also contain facial features.

2. Result In Current System traditional method of maintaining an attendance register makes the job very tedious and prone to human errors. So to overcome this Drawback we are developed a system to automate attendance marking methods with the help of RFID technology and In addition to provide security to RFID we have used face reorganization technique. And combination of both technique reduce the chances of fake attendance

3. Conclusions Thus we conclude that our new system will automate and speed up attendance marking systems by overcoming the drawbacks of traditional Attendance system such as time consumes, inefficient, not secure, not automated. So it increase consistency in attendance system and also provide secure way to mark attendance by combination of RFID and face recognition. So, we can avoid chances of fake attendance. It achieves a great security in attendance marking system by providing many advantage such as maintain record electronically, efficiently.

4. References [1]. Mayodan , M.F. Employee Attendance Using RFID System. 2008 December 2012]; Available from: http://umpir.ump.edu.my. [2].Radio-frequency identification. Wikipedia (online). Wikimedia Foundation, Inc., 2009.

Shweta Patil,

IJRIT

501

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 498- 502

[3]. S. Sheppard, “RFID Radio Frequency Identification”, s.l.: MacGraw-Hill, 2005.

[4]. B. Simpson, et al, “Title of paper goes here if known,” unpublished. [5]. the Facial Recognition Technology (FERET) Database. National Institute of Standards and Technology 2003. http://www.itl.nist.gov/iad/humanid/feret/ [6] Menezes, P., Barreto , J.C. and Dias, J. Face tracking based on Haar-like features and eigenfaces. 5th IFAC Symposium on Intelligent Autonomous Vehicles, Lisbon, Portugal, July 5-7, 2004. [7]. Open Computer Vision Library Reference Manual. Intel Corporation, USA, 2001.

Shweta Patil,

IJRIT

502

RFID Based Face Attendance System RFID Based Face ... - IJRIT

ability to uniquely identify each person based on their RFID tag type of ID card make .... Fortunately, Intel developed an open source library devoted to easing the.

64KB Sizes 0 Downloads 291 Views

Recommend Documents

RFID Based Face Attendance System RFID Based Face ... - IJRIT
This paper describes the development of a employee attendance system .... One can increase both the false alarm rate and positive hit rate by decreasing the.

A Robust and Secure RFID-Based Pedigree System
by reading in the digital signature and unique id. The pharmacist decrypts the signature with the public key, and compares the value against the hashed result.

A Robust and Secure RFID-Based Pedigree System - CiteSeerX
A Robust and Secure RFID-Based Pedigree. System (Short Paper). Chiu C. Tan and Qun Li. Department of Computer Science. College of William and Mary.

Authorization of Face Recognition Technique Based On Eigen ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 2, ..... computationally expensive but require a high degree of correlation between the ...

Artificial Intelligence Based Robot Control Using Face and ... - IJRIT
artificial intelligence technique where robot control authentication process is done ... intelligence and face recognition system and hand gesture recognition and ...

RFID based Airport Logistics Management
these are referred to as “smart” and read-only tags, respectively. The cost and performance of tags can vary widely depending on which of these features are .... IBM WebSphere RFID Handbook: A Solution Guide. (www. ibm. com/redbooks). [8]. K. Fin

Authorization of Face Recognition Technique Based On Eigen ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 2, ..... computationally expensive but require a high degree of correlation between the ...

Artificial Intelligence Based Robot Control Using Face and ... - IJRIT
Human-computer interaction (HCI) get up as a field from tangled origins in computer graphics, ... is a discipline concerned with the design, evaluation and implementation of interactive computing systems for ... method, or may not the best method in

Integrated RFID-Biometric Based Students ...
IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: ... Department Of Computer Technology, RGCER, Nagpur.

Anti-Theft Security System Using GSM, GPS, RFID Technology ... - IJRIT
³ Head of the Department (Digital Systems Computer Applications), SLC's ..... using the Keil uVision integrated development environment, we must select a chip.

Anti-Theft Security System Using GSM, GPS, RFID Technology ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 2, Issue 9, ... ³ Head of the Department (Digital Systems Computer Applications), SLC's ..... [2] Garg, V. K., and Wilkes, J. E., Wireless and Personal Communication ...

Computationally Efficient Template-Based Face ... - IEEE Xplore
head poses, illuminations, ages and facial expressions. Template images could come from still images or video frames. Therefore, measuring the similarity ...

Appearance-Based Automated Face Recognition ...
http://sites.google.com/site/jcseuk/. Appearance-Based Automated Face. Recognition System: Multi-Input Databases. M.A. Mohamed, M.E. Abou-Elsoud, and M.M. Eid. Abstract—There has been significant progress in improving the performance of computer-ba

Design of SoC for Network Based RFID Applications
Apr 17, 2009 - Figure 5.11: Slight physical delay in assignament at clock edge after .... non-zero possibility of absence of peer nodes in the wireless range ... circuit, and technology resulted in three orders of magnitude power savings for.

34.RFID Technology for IoT-Based Personal.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. 34.

82.AN INTERACTIVE RFID BASED BRACELET FOR AIRPORT ...
AN INTERACTIVE RFID BASED BRACELET FOR AIRPORT LUGGAGE TRACKING.pdf. 82.AN INTERACTIVE RFID BASED BRACELET FOR AIRPORT ...

Design of SoC for Network Based RFID Applications
Figure 3.4: Power Savings in UDP and IP modules by datapath optimiza- tion algorithm . ...... Product Version: ISE 9.2i. ○ Updated: Fri Apr 17 22:32:42 2009.

Cloud-Based Iterative RFID Tag Search Protocol Using ...
1 School of Software Engineering, Tongji University, Shanghai, China. {lincolnmi1108,dqzhang,kefan}@tongji.edu. ... based service to rapidly conduct the searching process. Extensive experimental ..... During the simulation process, we assume that the

Face Recognition Based on Local Uncorrelated and ...
1State Key Laboratory for Software Engineering, Wuhan University, Wuhan, ... of Automation, Nanjing University of Posts and Telecommunications, 210046, ...

Three dimensional face recognition based on geodesic ...
dimensional face recognition systems, on the other hand, have been reported to be less .... to methods based on PCA applied to the 3D point clouds, fitting implicit ... surfaces, and PCA applied to range images.21 Its performance was equivalent to an

Weighting Estimation for Texture- Based Face ...
COMPUTING IN SCIENCE & ENGINEERING. S cientific I ... two faces by computing their local regional similarities. A novel ..... 399–458. Raul Queiroz Feitosa is an associate professor in the ... a computer engineer's degree from the Pontifical.

ECOC-Based Training of Neural Networks for Face ...
algorithm, BP, to adjust weights of the network. Experimental results for face recognition problem on Yale database demonstrate the effectiveness of our method.