Student Identification Detection INTRODUCTION The implementation and enforcement of dress codes are some of the steps that must be considered when it comes to security protocols of both public and private schools. Dress codes in such learning institutions are said to help socio-economic that affects the students who can’t afford the latest trends especially at urban schools. This could also instill discipline and sense of community among the students. It also helps the school staff and security to quickly spot the intruders and any other individuals who do not belong to the institution. As school uniforms are considered as an indicator of safety from school crimes caused by intrusion, though uniforms alone cannot solve all the issues with regards to security, they can still be a positive element to discipline. With the continuous innovations of technology in this present time, modern technologies are now being incorporated with these security protocols to develop devices to serve as an aid as camera surveillance with database. These innovations with advanced technological implementations will guarantee a stricter security through computer vision. Computers are now starting to imitate human abilities such as having vision, and that is where the notion of image detection and recognition takes the spotlight. Despite the advantages enjoyed by these advancements in mobile technology, there are threats that have been posed by their usage. Despite frisking of students before they enter into examination halls, some manage to smuggle mobile phones into the halls. Mobile phone usage in examination halls opens doors to examination irregularities as most phones have high definition cameras and can read PDF documents therefore class notes are easily accessed during the examination. The same can also be shared via Bluetooth, Wi-Fi and messaging. Due to this problem that has been experienced in the university for years, there is a need to design a system that can detect the presence and usage of mobile phones in the examination halls. This project is therefore aimed towards designing a cell phone detector that will be installed in the examination venues. This will curb the vice because even though some may manage to smuggle them into the halls, their usage and presence are continuously monitored by the system and offenders can be caught. This detector is not limited for use in examination halls only. It may be used in hospitals, conference halls, correctional institutions and other places where the use of mobile phones must be prohibited Every organization requires a robust and stable system to record the attendance of their students. and every organization have their own method to do so, some are taking attendance manually with a sheet of paper by calling their names during lecture hours and some have adopted biometrics system Dept Of CSE, SJCIT 4 2021-22 Student Identification Detection such as fingerprint, RFID card reader, Iris system to mark the attendance. The conventional method of calling the names of students manually is time consuming event. The proposed system is designed for automating the attendance of the different organization and reduces the flaws of existing manual system. The system calculate the attendance subject wise, that is the data of students and subjects are added manually by administrator, and whenever time for corresponding subject arrives the system automatically starts taking snaps and find whether human faces are appear in the given image or not. Dept Of CSE, SJCIT 5 2021-22 Student Identification Detection LITERATURE REVIEW 1.”Face ,Object And Color Identification System In Schools For Dress-Code Monitoring” The technology has been developed which can make interaction between the human and the computer very easy. The face recognition is the best example for that. For the past two decades the researches are made in the face recognition. The face recognition can involve in all the below mentioned process such as computer vision, pattern recognition, image processing and the machine learning. In this paper they mainly process the face recognition and the color identification. The faces are captured and the pattern segmentation, identification and comparison are made. Then the next stage is the color identification which uses the Neural Network Model which is applied in the color uniform of the college students. From the captured image of the color uniform the RGB color components are extracted. The color components of the resized images are scaled using SHM Simple Heuristic Method. From feature vector identification in the color uniform the rescaled image is extracted. The accuracy of the method is about 95%. The RGB and the neural network plays a main role in the color identification. Advantages: It has proposed a new method of face recognition in colleges and schools with color recognition of their corresponding uniform. Since the objects such as ID card, Belt and shoes are identified this makes our design more effective and highly appreciable. This new method is proposed to be used as a tool to make students follow the dress-code rules that improves a sense of professionalism in them. 2. “Uniform Recognition Activated Gate for Dress Code” Wearing of improper uniform has been one of the problems being faced due to a massive number of students entering the university. The security guards do not have the ability to monitor the student’s attire all the time. There are also some students who do not wear Identification Cards (ID) upon entering the school premise which is also important for the student’s or staff’s identification as well as the school’s security and integrity. This paper aims to plan and built a device whose main function is to monitor student’s attire for most of the Dept Of CSE, SJCIT 6 2021-22 Student Identification Detection time. Uniform recognition activated gate for dress code implementation focused on improving the security system upon entering the gate of the university. This device used biometrics, barcode scanner of the Identification (ID) card and image recognition for uniform to open the gate. The mechanism to open the gate uses a servo motor which is connected to the gate structure. Based on the evaluation done by the professionals and preferred users, the device has been considered very good for each criteria provided of its scores. The device will be available for further improvement to develop more functions necessary to the workplace of its application. Advantages: It had been tested each day per week to check if the schedules provided for the uniform classification and recognition are working. The data gathered shown that the school uniform images had been recognized by the system during Tuesdays, Wednesdays, Thursdays, and Fridays only. P.E. Uniforms had been recognized by the system any day of the week. The result from series of trials stated that the gate won’t provide an entry for any absence of requirements for its input. 3. “ Classification Of Dress Codes Using Convolution Neural Networks ” People now live in a world surrounded by corporate culture like workplaces and colleges, schools, hospitals. In particular educational institutions will ensure the students to follow dress code to obtain uniformity among the students. It is a tedious task to the management to identify the students who doesn’t follow the dress code. Manual observation requires more human involvement and it is not possible for the entire day. More over the campus is significantly large and monitoring students all over the campus manually increases the workload. To resolve those issues, the proposed model presents a neural network based classification system to identify and categorize the students. Data set consists of 270 pictures of understudies and professionals are used in the experimentation to recognize the dress code of individuals. The results gave us precise expectations utilizing some graphical portrayals just as ages of the different individuals. Advantages: The proposed model is developed to identify the dress code of the person in an institution. Based on 3 layer convolutional neural network architecture the images are classified to identify the formal and informal persons.. Proposed model classifies the dress code percentage Dept Of CSE, SJCIT 7 2021-22 Student Identification Detection accurately. Various images from webpages and real time images are used in the experimentation process to observe the robustness of the proposed model. In future the research work could be further extended by increasing the data size and training images. 4. “ Classroom Distraction Due to Mobile Phones Usage by Students: College Teachers’ Perceptions ” There are more than six billion users of mobile phones worldwide. Smart phones and other handheld devices are largely used by the students. Research indicates that increasing use of mobile phones by the students in the classroom is a big interruption. This paper presents the result of a study conducted on teachers of various institutes of higher education in Oman. Total 32 teachers from both the public and private colleges and universities were responded the questionnaire. The results of the study show that participants reported strong perceptions of mobile phones as a classroom distraction in teaching and learning environment and students’ misconduct. It has been strongly confirmed that mobile phones are misused and is potential source of stress among faculty and lack of concentration among students. Advantages: Based on participants’ data, the primary hypothesis was supported. Higher mean value reflect more support for guidelines restricting mobile phone use in the classroom, stronger perception regarding serious interruption in teaching and learning environment and students misconduct. It has been strongly confirmed that mobile phones are misused and is potential source of stress among faculty and lack of concentration among students. Most of the faculty members show negative attitudes about cell phones use in college classrooms during lectures. Although some past studies have explored college students’ cell phone usage, few studies have examined the perceptions of faculty or university staff. This study only covered teachers’ perceptions. However, the number of respondents was not large enough but included all type of institutions and teachers. A further study on the topic is needed to detect significant association between the variables. The study will help higher academic institution to identify the problems and challenges faced by teachers in the classroom due to use of mobile phone Dept Of CSE, SJCIT 8 2021-22 Student Identification Detection OBJECTIVES To provide additional measures for a more effective enforcement and monitoring of the university dress code policy compliance. To utilize the existing modern technology with identification and recognition of system for the benefit of the university dress code policy. To detect if students are not complying with the University Dress Code Policy. To detect if students are wearing Identification Card (ID) or not. To detect the usage of mobile phone during the class hours or in an examination hall. To send an automatic message to respective class teacher and proctor of student in case of violation of rules. Dept Of CSE, SJCIT 9 2021-22 Student Identification Detection STUDY AREA AND METHODOLOGY The proposed research method that would be adopted is as follows: i) Requirement Assessment: A thorough assessment of the current existing system will be carried out and the requirements of the new systems will be clearly defined by interviewing some students and lecturers. ii) Application Program: At this stage, the design work flow will be converted to code and debugged. iii) Testing and Development: The completed algorithm will be tested and deployed on remote web host, ready for use. 4.1 Methodology Since every class room would be already having existing cameras, we would utilize that one. As it captures the whole class, we can connect it our developed system to take automatic attendance system of respective classes, and also detect whether wearing mask, Identification Card (ID) and also usage of mobile during class hours or in an examination hall. 4.1.1 Face Recognition : The main aim of this is to recognize the face of the school/college student and to recognize the color of the uniform through the color identification algorithm method. The face recognition follows the identification, pattern segmentation and classification, comparison and extraction. The input is image is trained in the training set and the following process takes place. After the stage of face recognition, the color identification is made by the RGB and neural network method which measures the edges of the images and color of the images. The edges are measure when the image shows identical color. Dept Of CSE, SJCIT 10 2021-22 Student Identification Detection 4.1.1.1 Face Recognition Process Fig 2 : Block Diagram Face Detection and Extraction: Face detection is important as the image taken through the camera given to the system, face detection algorithm applies to identify the human faces in that image, the number of image processing algorithms are introduce to detect faces in an images and also the location of that detected faces. We have used HOG method to detect human faces in given image. Face Positioning: There are 68 specific points in a human face. In other words we can say 68 face landmarks. The main function of this step is to detect landmarks of faces and to position the image. A python script is used to automatically detect the face landmarks and to position the face as much as possible without distorting the image. Face Encoding: Once the faces are detected in the given image, the next step is to extract the unique identifying facial feature for each image. Basically whenever we get localization of Dept Of CSE, SJCIT 11 2021-22 Student Identification Detection face, the 128 key facial point are extracted for each image given input which are highly accurate and these 128-d facial points are stored in data file for face recognition. Face matching: This is last step of face recognition process. We have used the one of the best learning technique that is deep metric learning which is highly accurate and capable of outputting real value feature vector. Our system ratifies the faces, constructing the 128- d embedding (ratification) for each. Attendance Marking: Once the face is identify with the image stored in JSON file, python generate roll numbers of present students and return that, when data is returned, the system generates attendance table which includes the name, roll number, date, day and time with corresponding subject id. And then passes the data to python to store the table into an excel sheet automatically. Each sheet is saved according to the subjects which already entered by the administrator, for example when system generates excel sheet by sending the compiled sheet in an array to python, the python first checks whether there exit any excel sheet of that date, if yes then it create separate worksheet by subject id, so that attendance is differentiated for different subjects. faces function is used to compute the Euclidean distance between face in image and all faces in the dataset. If the current image is matched with the 60% threshold with the existing dataset, it will move to attendance marking. 4.1.2 Detection Of Mobile Phones The detectors already in the market employ different detection techniques. Each manufacturer has their design although the basic procedure how the detection is done may be common. 4.1.2.1 RF Spectrum Approach: Every mobile phone uses the frequency spectrum for communication. Manufacturers use different frequencies in their mobile phones for communication depending on the federal laws of the country and radiation regulations. A study carried out by Pacific Northwest National Laboratory for the United States Department of Energy on cell phone detection using this technique showed that different phones propagated using different frequency ranges. An LG cellular phone had distinctive signals from 260MHz to 300MHz. A Motorola cellular phone had distinct signals in the range of 240MHz and 400MHz. A Samsung cell phone had distinctive signals between 340MHz and 385MHz. Nokia cell phone had distinct signal at 245MHz In this detection approach, a passive circuit listens for any emissions from a cellular phone when it is either waiting for a call or transmitting and does not require an external signal to detect the phone. This is advantageous especially in areas where power emissions from electromagnetic sources are highly prohibited. Dept Of CSE, SJCIT 11 2021-22 Student Identification Detection The circuit implementation of this approach differs in so many ways. One of the approaches is in fig 3 as a block diagram. Fig 3: Block Diagram For versatility, an LCD can be interfaced to notify the person monitoring of a cell phone detected. This ensures that even when the power level is low, like in the case of standby phone, to drive the buzzer, a notification like “MOBILE PHONE DETECTED” will be of use as an alarm. Fig 4: LCD Integration Fig 4 : LCD Integration 4.1.3 Uniform Detection The complete process of proposed model is depicted in figure 5 as a convolutional neural network. Fig 5 : Convolution Neural Networks Dept Of CSE, SJCIT 12 2021-22 Student Identification Detection So far the building blocks for building the network model with the help of Convolution neural network has been shown above . Let us move to the next face that is constructing our network module as every model has a few steps for its implementation our model has four basic steps to train our network model ● The implication of data-Sets into our Model ● Validating our data sets ● Training our Model ● Processing the acquired data from Model Dept Of CSE, SJCIT 13 2021-22 Student Identification Detection 4.1.4 Flow Chart: Start Face captured Is face matches Create database Check for id, mask If no id or mask Wearing id, mask No mask or id mobile No mobile Use mobile Stop Dept Of CSE, SJCIT 14 2021-22 Student Identification Detection DESIGN:Block diagram – Workflow of Face Detection Loading Haar CascodeFace Algorithm Obtaining Face coordinates by passing algorithm Converting Color image into Greyscode image Recoding Frame from camera Initializing camera Drawing Rectangle on the Face Coordinates Display the output Frame Block Diagram – Workflow of Face recognition Loading face detection algorithm Face detection by its algorithm Dept Of CSE, SJCIT Loading Classifier for face recognition Tracking classifier for our dataset Predicting face by loading frame into model Recoding frame from camera & preprocessing Displays recognized class with its accuracy 14 2021-22 Student Identification Detection Block Diagram – Workflow of Color Object Tracking Recoding frame from camera Pre-processing image Finding centre of contour Area Finding counters Drawing Minimum enclosing circle Direction based on radius & Position Drawing circle & centre ObjectRecognition Object recognition is a computer vision technique for identifying objects in images or videos. Object recognition is a key output of deep learning and machine learning algorithms. When humans look at a photograph or watch a video, we can readily spot people, objects, scenes, and visual details. Dept Of CSE, SJCIT 14 2021-22 Student Identification Detection Block Diagram – Workflow of Attendance System Dataset Connection with CSY name & fallon Load Model, LE & CSV Dept Of CSE, SJCIT Preprocessing Face Detection Pre-processing 120-D embedding for ML Pre-process frame from Camera TrainingML-SVM Classification 14 2021-22 Student Identification Detection Block Diagram – Workflow of Dnn in OpenCV Load Model Select Backend Convert to Blob Dept Of CSE, SJCIT Recoding frame from camera Select target Post Process Forward 14 2021-22 Student Identification Detection IMPLEMENTATION :- Converting Color Image to Greyscale Image:- import cv2 image = cv2.imread(‘sample1.png’) greyImage = cv2.cvtColor(image,cv2.COLOR_BGR2GRAY) cv2.imwrite(‘grey_image.png’,greyImage) cv2.imshow(‘Color_image’,Image) cv2.imshow(‘Grey_image’,greyImage) cv2.watKey(0) cv2.destroyAllWi ndows() Dept Of CSE, SJCIT 14 2021-22 Student Identification Detection Creating Face Dataset import cv2 haar_file = ‘haarcascade_frontalface_default.xml’ datasets = ‘dataset’ sub_data = ‘champ’ path = os.path.join(datasets,cubdata) if not os.path.isdir(path) os.mkdir(path) (width,height) = (130,100) face_cascade = cv2.VideoCapture(haar_file) webcam= = cv2.VideoCapture(0) count = 1 Haar Cascade FrontalFace Algorithm It is based on the Haar Wavelet technique to analyse pixels in the image into squares by function. This uses machine learning techiques to get a high degree of accuracy from what is called “training data”. This uses “integral image” concepts to compute the “features”detected. Haar Cascades use the Adaboost learning algorithm which selects a small number of important features from a large set to give an efficient result of classifiers. Dept Of CSE, SJCIT 14 2021-22 Student Identification Detection Fisherface Recognizer : Fisherfaces algorithm extracts principle components that seperates one individual from another. So, now an individual’s Features can’t dominate another person’s features. Fisherface method will be applied to generate feature vector of facial image data used by system and then to match vector of traits of training image with vector characteristic of test image using Euclidean distance formula. Dept Of CSE, SJCIT 14 2021-22 Student Identification Detection LBPHFaceRecognizer : Local Binary Pattern(LBP) is a simple yet very efficient texture operator which labels the pixels of an image by thresholding the neighborhood of each pixel and considers the result as a binary number. It doesn’t look at image as a whole, but instead tries to find its local structure by comparing each pixels to its neighboring pixels. LBPH uses 4 parameters • Radius – to build the circular local binary pattern and represent the radius around the central pixel it is usually set to 1. • Neighbors – The more sample points you include, the higher the computational cost. It is usually set to 8. • X Grid – the number of cells in the horizontal direction. • Y Grid – the number of cells in the vertical direction. Dept Of CSE, SJCIT 14 2021-22 Student Identification Detection Algorithm for Image Scaling Algorithm 1:- Adaptive image scaling. Input: W and H are the width and height of the input image. TW and TH are the width and height of the object image of standard size. Begin scaling_ratio ← min{TW/W, TH/H} new_w ← W × scaling_ratio new_h ← H × scaling_ratio dw ← TW − new_w dh ← TH − new_h d ← mod(max(dw, dh ), 64) padding ← d/2 if (W, H) 6= (neww_, new_h): image ← resize(input_image,(new_w, new_h)) new_image ← add_border(image,(padding,padding)) End Output: new_image Algorithm 2 : Viola-Jones Face Detection Algorithm 1: Input : original test image 2: Output: image with face indicators as rectangles 3: for i <- 1 to num of scales in pyramid of images do 4: Downsample image to create image i 5: Compute integral image, image ii 6: for j <- 1 to num of shift steps of sub-window do 7: for k <- 1 to num of stages in cascade classifier do Dept Of CSE, SJCIT 14 2021-22 Student Identification Detection 8: for l <- 1 to num of filters of stage k do 9: Filter detection sub-window 10: Accumulate filter outputs 11: 12: end for if accumulation fails per-stage threshold then 13: Reject sub-window as face 14: Break this k for loop 15: end if 16: end for 17: if sub-window passed all per-stage checks then 18: 19: 20: 21: Accept this sub-window as a stage end if end for end for Algorithm 3 : Anomaly-Based Duplicate Detection Interval Method algorithm interval-method is input: set of feature vectors {ζ𝑖,𝑗 ∈ ℝ 𝑓 } in the dataset to be analysed set of feature vectors {ζ̂ 𝑖,𝑗 ∈ ℝ 𝑓 } in duplicate-free training data multidimensional interval 𝐼ℎ ⊂ ℝ 𝑓 number of samples 𝑁 Dept Of CSE, SJCIT 14 2021-22 Student Identification Detection output: duplicate probability 𝑃(𝐷|ζ𝑖,𝑗 ∈ 𝐼ℎ) for pairs of records in 𝐼ℎ 𝑚 ← |{ζ𝑖,𝑗 ∈ ℝ 𝑓 }| // sample size = size of the dataset to be analyzed 𝜚ℎ ← |{ζ𝑖,𝑗 |ζ𝑖,𝑗 ∈ 𝐼h}| // count of feature vectors in 𝐼ℎ for 𝑛=1 to 𝑁: {ζ̂ 𝑖,𝑗 𝑠 } ← sample of 𝑚 feature vectors from {ζ̂ 𝑖,𝑗 ∈ ℝ 𝑓 } 𝜚̂ℎ,𝑛 ← |{ζ̂ 𝑖,𝑗 𝑠 |ζ̂ 𝑖,𝑗 𝑠 ∈ 𝐼ℎ}| // count of feature vectors in 𝐼ℎ in sample 𝑛 for 𝑘=1 to 𝑚: 𝑃̂(𝜚̂ℎ = 𝑘) ← 1 𝑁 ∑ 𝕀{𝜚̂ℎ,𝑛=𝑘} 𝑁 𝑛=1 // probability of 𝑘 counts in training data 𝐸̂(𝜚̂ℎ) ← ∑ 𝑘 ⋅ 𝑃̂(𝜚̂ℎ = 𝑘) 𝑚 𝑘=1 // expected value in duplicate- free data if 𝜚ℎ > 𝐸̂(𝜚̂ℎ): // test for anomaly 𝑃(𝐷|ζ𝑖,𝑗 ∈ 𝐼ℎ) ← ∑ 𝑃̂(𝜚̂ℎ=𝜚ℎ−𝜚ℎ 𝐷)⋅𝜚ℎ 𝜚ℎ 𝐷 𝜚ℎ 𝐷=0 𝜚ℎ // estimated duplicate probability return 𝑃(𝐷|ζ𝑖,𝑗 ∈ 𝐼ℎ) else: return 0 // no anomaly, duplicate probability zero Dept Of CSE, SJCIT 14 2021-22 Student Identification Detection Dept Of CSE, SJCIT 14 2021-22 Student Identification Detection REQUIREMENTS Functional Requirements: The system should validate detected face with the database. The system should be able to identify the attire of the students. The system should be able to identify mask wearing by the students. The system must be able to detect the Identification Card of students. Non-Functional Requirements: The system should be easy to maintain. The system should be compatible with different platforms. The system should be fast as customers always need speed. The system should be secure. The system should be accessible to online users. The system should be easy to learn by both sophisticated and novice users. The system should provide easy, navigable and user-friendly interfaces. The system should produce reports in different forms such as tables and graphs for easy visualization by management. The system should have a standard graphical user interface that allows for the online data entry, editing, and deleting of data with much ease. Hardware Requirements Processor Monitor Keyboard Mouse : : : : intel core i7 LCD Normal Compatible Software Requirements: Operating system Front end Database Software Processor Monitor Keyboard Mouse Dept Of CSE, SJCIT : : : : : : : : windows 10 HTML, PHP my sql Pycharm intel core i7 LCD Normal Compatible Student Identification Detection Software Requirements: Operating system Front end Database Software Dept Of CSE, SJCIT : : : : windows 10 HTML, PHP my sql Pycharm 16 2021-22 Student Identification Detection EXPECTED OUT COME The proposed model is developed to identify the new method of face recognition in universities and organizations with color recognition of their corresponding uniform to classify based on formal and informal individuals. Since the objects such as identification card, face mask, usage of mobile phones etc. are identified which makes our design more effective and highly appreciable. This new method is proposed to be used as a tool to make individuals to follow certain etiquette rules that improves a sense of professionalism in them. In future the research work could be further extended by increasing the data size and training images. By using image processing and identity recognition, Pi camera is integrated together with the barcode scanner having the source code installed that will make the system run its functions. A monitor was placed that will display an interface for the user to be instructed by the system. The device had been tested each day per week to check if the schedules provide for the uniform classification and id card, face mask as well as usage of mobile phones recognition are working. The result from series of trials stated that the gate or the classrooms won’t provide an entry for any absence of requirements for its input. Dept Of CSE, SJCIT 16 2021-22 Student Identification Detection REFERENCES [1] Edgardo Manuel H. Mariveles, Jimwell G. Porcare, Jovelyn M. Regonay, Meryll R. Cruz, Engr. Mary Grace P. Beaño, Engr. Florante M. Andaya, Engr. Ericson A. Mandayo, Engr. Bernie B. Domingo, “Uniform Recognition Activated Gate for Dress Code “,2020 IEEE REGION 10 CONFERENCE (TENCON) Osaka, Japan, November 16-19, 2020. [2] Papineni Bhanu Kowshik, Annavarapu vamsi krishna, Purandhar reddy, P Syam Sundar, “Classification Of Dress Codes Using Convolution Neural Networks “,Proceedings of the Second International Conference on Inventive Research in Computing Applications (ICIRCA2020) IEEE Xplore Part Number: CFP20N67-ART; ISBN: 978-1-7281-5374-2. [3] Alka Shrivastava, Manish Shrivastava, “Classroom Distraction Due to Mobile Phones Usage by Students: College Teachers’ Perceptions “,International Journal of Computer and Information Technology (ISSN: 2279 – 0764) Volume 03 – Issue 03, May 2014. [4] B Prabhavathi, V Tanuja, V Madhu Viswanatham and M Rajashekhara Babu, “ A smart technique for attendance system to recognize faces through parallelism “,IOP Conf. Series: Materials Science and Engineering 263 (2017) 042095 doi:10.1088/1757-899X/263/4/042095. [5] Kaneez Laila Bhatti, Laraib Mughal, Faheem Yar Khuhawar, Sheeraz Ahmed Memon, “ Smart Attendance Management System Using Face Recognition”, doi: 10.4108/eai.13-72018.159713. [6] Boddu Praveen, P.Jagadeesh, “FACE ,OBJECT AND COLOUR IDENTIFICATION SYSTEM IN SCHOOLS FOR DRESS-CODE MONITORING”, https://www.researchgate.net/publication/339662636 Dept Of CSE, SJCIT 17 2021-22