SlideShare a Scribd company logo
The International Journal of Multimedia & Its Applications (IJMA) Vol.5, No.6, December 2013

INTEGRATED SYSTEM FOR MONITORING AND
RECOGNIZING STUDENTS DURING CLASS
SESSION
Mohammad A. Alia, Abdelfatah Aref Tamimi and Omaima N. A. AL-Allaf
Faculty of Science and Information Technology – Al Zaytoonah University of Jordan,
P.O.Box: 130 Amman (11733) Jordan

ABSTRACT
In this paper we propose a new student attendance system based on biometric authentication protocol. This
system is basically using the face detection and the recognition protocols to facilitate checking students’
attendance in the classroom. In the proposed system, the classroom’s camera is capturing the students’
photo, directly the face detection and recognition processes will be implemented to produce the instructor
attendance report. Actually, this system is more efficient than others student attendance methods since the
detection and the recognition are considered to be the best and fastest method for biometric attendance
system. Regarding to the students and instructor sides, the system is working without any preparation and
with no more effort.

KEYWORDS
Face Recognition, Face Detection, Monitoring, Attendance System, and System Access Control.

1. INTRODUCTION
Today, Face detection and recognition are very advanced in terms of computer authentication
technology. The technology of student attendance system is used to support the teacher for
checking his/her students’ attendance in modern way. Face detection and recognition are
considered to be the best and fastest method for biometric attendance system. They are secure to
use and working without any preparation since the camera can direct capture the student faces,
and then the report of attendant students will be produced immediately with no more effort.
Designing a trustworthy student attendance system based on face detection and recognition is
considered the faster and optimal way to manage the records for students’ attendance in institutes.
Furthermore, any business organization or educational institution has to maintain the attendance
of students or employees for effective functioning of business records. The important key of this
paper is to design a better student attendance system with ease interface and accurate results.
In the proposed attendance system, two individual authentications protocols were analysed in
terms of security properties. These protocols are the face detection protocol and face recognition
protocol. However, several potential weaknesses were discovered in these authentication
DOI : 10.5121/ijma.2013.5604

45
The International Journal of Multimedia & Its Applications (IJMA) Vol.5, No.6, December 2013

protocols. The weaknesses are defined according to the problem of the face detection or
recognition algorithms. These weaknesses include: problems resulting from human unreliability
in computer systems, algorithm accuracy, algorithm process time, and denial of service.
Therefore, the expectation of a well designed implementation and deployment may be able to
mitigate or even eliminate the impact of these weaknesses.

2. FACE DETECTION AND RECOGNITION SCHEMES
Face detection and recognition schemes are a complementary parties scheme, each party is a
complement to the other. Meanwhile, each party can work individually depending on regular
system. However, Face detection technology is a computer technology that is based on learning
algorithms to allocate human faces in digital images. As shown by Figure 1, face detection
algorithm determines the facial features and ignores anything else in the digital images[1].
Furthermore, many face detection techniques are proposed such as; Viola and Jones face
detection [2], face detection based Adaboost [3], semi-supervised learning for facial expression
recognition [4], and etc.

Figure 1: Face Detection

In the other hand, face recognition (refer to Figure 2) is a natural biological authentication process
technology according to the cognitive rule of human beings. It is used to identify any given
face image using the main features of this face [5]. Normally, face recognition process works
after face detection process to identify the detected face by comparing the detected faces with the
stored faces images. In authentication process, face recognition algorisms are more complex and
secure than other authentication algorithms such as fingerprint authentication algorithm.
Comparing face recognition to other techniques, face recognition is featured as: accurate and fast
Identification, and high usability and security however. Whereby, many face recognition
algorithms have been presented and based on different artificial neural network technologies such
as: feed forward back propagation neural network (FFBPNN), cascade forward back
propagation neural network (CFBPNN), function fitting neural network (FitNet) and pattern
recognition neural network (PatternNet) algorithms [5]. Among these are: Soon and Seiichi [6],
While Volkan [7], Weihua and WeiFu [8], and etc.

46
The International Journal of Multimedia & Its Applications (IJMA) Vol.5, No.6, December 2013

Figure 2: Face Recognition

3. IDENTIFICATION AND AUTHENTICATION
Identification and authentication [9] (I&A) is an important field in system access control process.
Identification and authentication is the process that can be used to identify and verify the entity on
the system. In multi-user system, the users must identify themselves firstly, and then the system
will authenticate the identity before using the system. Therefore, the identification and
authentication processes can be implemented by the following three classical techniques:
1. Something you know: password.
2. Something you have: smart card.
3. Something you are: face recognition, fingerprint, voice, retina, or iris characteristics.

4. ATTENDANCE SYSTEMS
In general manual attendance record is very limited. It is well enough for small number of
students. As well as, manual system causes some disadvantages such as time waste over students’
responses, waste of paper, and etc.
Student attendance system is a management system used to manage and report student attendance
in the classroom. It can monitor student attendance, generate reports with school, district, and
state attendance information. From the other hand, attendance system is not only dedicated for
educational institutions, since it can be applied in different organizations (refer to Figure 3, 4, and
5). In fact, organizations use time based attendance systems to manage their employees’ records
when employees start and stop work. However, the student attendance system provides many
benefits to the educational organizations by controlling all students attendance hours in the
classroom.

47
The International Journal of Multimedia & Its Applications (IJMA) Vol.5, No.6, December 2013

Figure 3: attendance system based single face detection[10]

Many automatic attendance systems have been proposed by using fingerprint verification
technique. Among these are the Efficient Automatic Attendance System using Fingerprint
Verification Technique [11], and the Attendance Monitoring System Using Biometrics [12], and
the Student Attendance System Based On Fingerprint Recognition and One-to-Many Matching
[13].

Figure 4: An Attendance Monitoring System Using Biometrics [12]
48
The International Journal of Multimedia & Its Applications (IJMA) Vol.5, No.6, December 2013

Figure 5: student attendance system [13]

5. THE PROPOSED INTEGRATED SYSTEM FOR MONITORING AND
RECOGNIZING STUDENTS DURING CLASS SESSION
As mentioned earlier, many previous studies on student attendance system have been done and
focused on facilitating the attendance method. These methods are basically depend on the
standard variant authentication schemes such as finger/ hand print, cards, or etc.
In this paper, the proposed attendance system is based on faces detection and recognition
processes. Therefore the proposed system is minimizing the instructor’ exhaustion since the
instructors can check their student’s attendance by using their own PCs and the required time to
collect and analyse the final results. However, the proposed system is based on face detection and
recognition authentication methods. Whereby, the face recognition method is the most natural
biological features recognition technology according to the cognitive rule of human beings.
Generally, the proposed system describes three steps for students attendance system (refer to
Figures 6). These steps are: the system access control step, the face detection and recognition
step, and collecting data step.

I. System Access Control Step
As mentioned earlier, system access control process is one of the cryptographic services, which is
used to authenticate the instructor in the student database server. As well the instructor can access
his/her students list. This process is the first step in the proposed students’ attendance system that
prepares the instructor to be authorized in the advanced students’ attendance process in the
classroom. Therefore, the system access control includes Identification phase which identify the
instructor on the system; and Authentication phase which authenticate the instructor on his
classroom’s students.

49
The International Journal of Multimedia & Its Applications (IJMA) Vol.5, No.6, December 2013

Moreover, the whole student attendance system is clarified in Figure 6 from the beginning to the
end. The instructor login to the attendance system by using his/her ID and password. Once the
students enter their classroom, the classroom camera will record and capture the students’ photos
as shown by Figure 6, Step 1. In Figure 6 Step 2 and 3, the instructor should request the faces
detection and recognition phase to check the attendant and absent students in his/her classroom
immediately.

Figure 6: the proposed system

II. Face Detection and Recognition Step
Typically, the system process is very critical since the face detection process is starting after
capturing the students’ photos’ by classroom’s camera, as shown by Figure 7. However, the
classroom’s instructor should upload the student photo, as well the system will filter the student
photo to detect all students’ faces (refer to Figure 7). Figure 7 Step 3 shows that the students’
faeces are already detected since the attendance list is open and recognize all the attendees.
However, the system enables the instructor to drag and drop the attendant student photo in case
his/her photo is not detected or recognized by the system as shown by Figure 7.

50
The International Journal of Multimedia & Its Applications (IJMA) Vol.5, No.6, December 2013

Figure 7: the proposed attendance system

III. Collecting Data Process
The third step in the proposed method is to collect data and produce the attendance report. After
the detection and recognition process, the data will be transmitted to the attendance system
database, whereby the instructor can immediately produce his/her students’ attendance report
(refer to Figure 7).
51
The International Journal of Multimedia & Its Applications (IJMA) Vol.5, No.6, December 2013

4. CONCLUSION
This paper has shown the possibility of establishing student attendance system based on face
detection and recognition authentication scheme. The system allows the instructor to check
his/her student attendance automatically by using personal computer (PC) without any extra cost
and effort. As new technology for student attendance system, this system is proposed to replace
the previous biometric attendance system, since attendance report can be created by the classroom
camera. As well as, the proposed system needs only the basic requirements such as; camera, PC,
and local network.

ACKNOWLEDGMENT
The authors would like to thank Al Zaytoonah University of Jordan for supporting this study.

REFERENCES
[1]
[2]
[3]

[4]

[5]

[6]

[7]

[8]

[9]
[10]
[11]

[12]

[13]

I. Marqu´es, and M. Gra˜na. Face Recognition Algorithms. Proyectos Fin de Carrera, Universidad
Carlos III de Madrid.2010.
P. Viola , and M. Jones.Rapid object detection using a boosted cascade of simple features. Accepted
Conference On Computer Vision And Pattern Recognition, 2001.
Yan-Wen Wu , and Xue-Yi Ai. Face Detection in Color Images Using AdaBoost Algorithm Based on
Skin Color Information. First International Workshop on Knowledge Discovery and Data Mining,
2008.
I. Cohen , N. Sebe , F. G. Cozman ,Thomas S. Huang . Semi-Supervised Learning for Facial
Expression Recognition. Proceedings of the 5th ACM SIGMM international workshop on Multimedia
information retrieval. ACM New York, NY, USA Pages 17 – 22.
O. N. A. AL-Allaf, A. Aref Tamimi , and M. A. Alia. Face Recognition System Based on Different
Artificial Neural Networks Models and Training Algorithms. International Journal of Advanced
Computer Science and Applications, Vol. 4, No. 6, 2013.
S. L.Toh and O. Seiichi. A Face Recognition System Using Neural Networks with Incremental
Learning Ability. Proceeding of the 8th Australian and New Zealand Conf. on Intelligent
Information Systems. pp.389-394. 2003.
A. Volkan . Face Recognition Using Eigenfaces and Neural Networks. Master of Science Thesis,
The Graduate School of Natural And Applied Sciences. The Middle East Technical University.
2003.
W. Weihua and W. WeiFu . A Gray-Scale Face Recognition Approach. Second International
Symposium on Intelligent Information Technology Application, 978-0-7695-3497-8/08, IEEE
computer society. 2008. DOI= 10.1109/IITA.2008.101.
R. Lehtinen,. Computer Security Basics, 2nd Edition, O'Reilly. 2006. ISBN-10: 0-596-00669-1.
Eye-tech. http://www.eye-tech.it/index.php?lang=en
C. Saraswat and A. Kumar. An Efficient Automatic Attendance System using Fingerprint Verification
Technique. Chitresh Saraswat et al. / (IJCSE) International Journal on Computer Science and
Engineering, Vol. 02, No. 02, Pp.264-269. 2010.
S. Rao, and K. J. Satoa. An Attendance Monitoring System Using Biometrics Authentication.
International Journal of Advanced Research in Computer Science and Software Engineering. Volume
3, Issue 4, pp. 379-383. 2013
R. Mishra and P. Trivedi. Student Attendance System Based On Fingerprint Recognition and One-toMany Matching. Department of Computer Science and Engineering National Institute of Technology
Rourkela Rourkela-769 008, Orissa, India. 2011.

52

More Related Content

PDF
Automated attendance system using Face recognition
PDF
IRJET- Automated Attendance System using Face Recognition
PDF
Face Recognition Based Attendance System using Machine Learning
PDF
Attendance Using Facial Recognition
PPTX
Face recognition attendance system
DOCX
Face Recognition Attendance System
PDF
A Real-time Classroom Attendance System Utilizing Viola–Jones for Face Detect...
PDF
Face Recognition Based Attendance System with Auto Alert to Guardian using Ca...
 
Automated attendance system using Face recognition
IRJET- Automated Attendance System using Face Recognition
Face Recognition Based Attendance System using Machine Learning
Attendance Using Facial Recognition
Face recognition attendance system
Face Recognition Attendance System
A Real-time Classroom Attendance System Utilizing Viola–Jones for Face Detect...
Face Recognition Based Attendance System with Auto Alert to Guardian using Ca...
 

What's hot (20)

PDF
IRJET- Implementation of Attendance System using Face Recognition
PDF
IRJET - Facial Recognition based Attendance Management System
PDF
ANALYZING THE IMPACT OF INTERDEPENDENT DIMENSION ON TARGET ATTRIBUTE
PDF
IRJET - Implementation of Conducting Online Certification Examination in ...
PPTX
Student online admission srs
PPTX
Attendance Management System using Face Recognition
PDF
Smart application for ams using face recognition
 
PDF
IRJET- Attendance Management System using Real Time Face Recognition
PDF
IRJET- Student Attendance Tracking System using Biometrics
PDF
Automated Certificate Issuing and Students’ Management System for College of ...
DOCX
Passport automation system
PPTX
Online course registration system development software engineering project pr...
PDF
Face recognition attendance system
PPT
Passport status tracking system (1)
PDF
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
 
PDF
Ignou MCA mini project report
PDF
Chapter 1 & 2 group2
DOCX
WEB Based claim processing sytem SRS
PPTX
Presentation on Online Admission System (OAS)
PDF
Case study of online examination platform eklavvya.in
IRJET- Implementation of Attendance System using Face Recognition
IRJET - Facial Recognition based Attendance Management System
ANALYZING THE IMPACT OF INTERDEPENDENT DIMENSION ON TARGET ATTRIBUTE
IRJET - Implementation of Conducting Online Certification Examination in ...
Student online admission srs
Attendance Management System using Face Recognition
Smart application for ams using face recognition
 
IRJET- Attendance Management System using Real Time Face Recognition
IRJET- Student Attendance Tracking System using Biometrics
Automated Certificate Issuing and Students’ Management System for College of ...
Passport automation system
Online course registration system development software engineering project pr...
Face recognition attendance system
Passport status tracking system (1)
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
 
Ignou MCA mini project report
Chapter 1 & 2 group2
WEB Based claim processing sytem SRS
Presentation on Online Admission System (OAS)
Case study of online examination platform eklavvya.in
Ad

Similar to Integrated system for monitoring and recognizing students during class session (20)

PDF
Attendance management system using face recognition
PDF
Development of an Automatic & Manual Class Attendance System using Haar Casca...
PDF
Face Recognition Based Automated Student Attendance System
 
PDF
V01 i010407
PDF
Automation Attendance Systems Approaches: A Practical Review
PDF
Face detection based attendance system
PDF
Implementation of Automatic Attendance Management System Using Harcascade and...
PDF
PDF
Smart Attendance System using Face-Recognition
PDF
Face recognition attendance system using Local Binary Pattern (LBP)
PPTX
PPT format.pptx for face recognition system using python and OpenCV
PDF
A Wireless Fingerpring Attendance System
PDF
Intelligent multimodal identification system based on local feature fusion be...
PDF
Intelligent solution for automatic online exam monitoring
PDF
MBA SYSTEMS To study on Public Safety through Innovative Face Recognition Tec...
PPTX
attendnece recommendation for requiewd.pptx
PDF
IRJET- Intelligent Automated Attendance System based on Facial Recognition
PDF
AUTOMATED PROCTORING SYSTEM
PDF
Face Recognition Technology
 
PPTX
hall tickettttttttttttttttttttttttttt.pptx
Attendance management system using face recognition
Development of an Automatic & Manual Class Attendance System using Haar Casca...
Face Recognition Based Automated Student Attendance System
 
V01 i010407
Automation Attendance Systems Approaches: A Practical Review
Face detection based attendance system
Implementation of Automatic Attendance Management System Using Harcascade and...
Smart Attendance System using Face-Recognition
Face recognition attendance system using Local Binary Pattern (LBP)
PPT format.pptx for face recognition system using python and OpenCV
A Wireless Fingerpring Attendance System
Intelligent multimodal identification system based on local feature fusion be...
Intelligent solution for automatic online exam monitoring
MBA SYSTEMS To study on Public Safety through Innovative Face Recognition Tec...
attendnece recommendation for requiewd.pptx
IRJET- Intelligent Automated Attendance System based on Facial Recognition
AUTOMATED PROCTORING SYSTEM
Face Recognition Technology
 
hall tickettttttttttttttttttttttttttt.pptx
Ad

Recently uploaded (20)

PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Machine learning based COVID-19 study performance prediction
PDF
Empathic Computing: Creating Shared Understanding
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Big Data Technologies - Introduction.pptx
PDF
KodekX | Application Modernization Development
 
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
 
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Encapsulation_ Review paper, used for researhc scholars
Per capita expenditure prediction using model stacking based on satellite ima...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Machine learning based COVID-19 study performance prediction
Empathic Computing: Creating Shared Understanding
Diabetes mellitus diagnosis method based random forest with bat algorithm
MIND Revenue Release Quarter 2 2025 Press Release
Big Data Technologies - Introduction.pptx
KodekX | Application Modernization Development
 
Spectral efficient network and resource selection model in 5G networks
Review of recent advances in non-invasive hemoglobin estimation
Building Integrated photovoltaic BIPV_UPV.pdf
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Mobile App Security Testing_ A Comprehensive Guide.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
 
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx

Integrated system for monitoring and recognizing students during class session

  • 1. The International Journal of Multimedia & Its Applications (IJMA) Vol.5, No.6, December 2013 INTEGRATED SYSTEM FOR MONITORING AND RECOGNIZING STUDENTS DURING CLASS SESSION Mohammad A. Alia, Abdelfatah Aref Tamimi and Omaima N. A. AL-Allaf Faculty of Science and Information Technology – Al Zaytoonah University of Jordan, P.O.Box: 130 Amman (11733) Jordan ABSTRACT In this paper we propose a new student attendance system based on biometric authentication protocol. This system is basically using the face detection and the recognition protocols to facilitate checking students’ attendance in the classroom. In the proposed system, the classroom’s camera is capturing the students’ photo, directly the face detection and recognition processes will be implemented to produce the instructor attendance report. Actually, this system is more efficient than others student attendance methods since the detection and the recognition are considered to be the best and fastest method for biometric attendance system. Regarding to the students and instructor sides, the system is working without any preparation and with no more effort. KEYWORDS Face Recognition, Face Detection, Monitoring, Attendance System, and System Access Control. 1. INTRODUCTION Today, Face detection and recognition are very advanced in terms of computer authentication technology. The technology of student attendance system is used to support the teacher for checking his/her students’ attendance in modern way. Face detection and recognition are considered to be the best and fastest method for biometric attendance system. They are secure to use and working without any preparation since the camera can direct capture the student faces, and then the report of attendant students will be produced immediately with no more effort. Designing a trustworthy student attendance system based on face detection and recognition is considered the faster and optimal way to manage the records for students’ attendance in institutes. Furthermore, any business organization or educational institution has to maintain the attendance of students or employees for effective functioning of business records. The important key of this paper is to design a better student attendance system with ease interface and accurate results. In the proposed attendance system, two individual authentications protocols were analysed in terms of security properties. These protocols are the face detection protocol and face recognition protocol. However, several potential weaknesses were discovered in these authentication DOI : 10.5121/ijma.2013.5604 45
  • 2. The International Journal of Multimedia & Its Applications (IJMA) Vol.5, No.6, December 2013 protocols. The weaknesses are defined according to the problem of the face detection or recognition algorithms. These weaknesses include: problems resulting from human unreliability in computer systems, algorithm accuracy, algorithm process time, and denial of service. Therefore, the expectation of a well designed implementation and deployment may be able to mitigate or even eliminate the impact of these weaknesses. 2. FACE DETECTION AND RECOGNITION SCHEMES Face detection and recognition schemes are a complementary parties scheme, each party is a complement to the other. Meanwhile, each party can work individually depending on regular system. However, Face detection technology is a computer technology that is based on learning algorithms to allocate human faces in digital images. As shown by Figure 1, face detection algorithm determines the facial features and ignores anything else in the digital images[1]. Furthermore, many face detection techniques are proposed such as; Viola and Jones face detection [2], face detection based Adaboost [3], semi-supervised learning for facial expression recognition [4], and etc. Figure 1: Face Detection In the other hand, face recognition (refer to Figure 2) is a natural biological authentication process technology according to the cognitive rule of human beings. It is used to identify any given face image using the main features of this face [5]. Normally, face recognition process works after face detection process to identify the detected face by comparing the detected faces with the stored faces images. In authentication process, face recognition algorisms are more complex and secure than other authentication algorithms such as fingerprint authentication algorithm. Comparing face recognition to other techniques, face recognition is featured as: accurate and fast Identification, and high usability and security however. Whereby, many face recognition algorithms have been presented and based on different artificial neural network technologies such as: feed forward back propagation neural network (FFBPNN), cascade forward back propagation neural network (CFBPNN), function fitting neural network (FitNet) and pattern recognition neural network (PatternNet) algorithms [5]. Among these are: Soon and Seiichi [6], While Volkan [7], Weihua and WeiFu [8], and etc. 46
  • 3. The International Journal of Multimedia & Its Applications (IJMA) Vol.5, No.6, December 2013 Figure 2: Face Recognition 3. IDENTIFICATION AND AUTHENTICATION Identification and authentication [9] (I&A) is an important field in system access control process. Identification and authentication is the process that can be used to identify and verify the entity on the system. In multi-user system, the users must identify themselves firstly, and then the system will authenticate the identity before using the system. Therefore, the identification and authentication processes can be implemented by the following three classical techniques: 1. Something you know: password. 2. Something you have: smart card. 3. Something you are: face recognition, fingerprint, voice, retina, or iris characteristics. 4. ATTENDANCE SYSTEMS In general manual attendance record is very limited. It is well enough for small number of students. As well as, manual system causes some disadvantages such as time waste over students’ responses, waste of paper, and etc. Student attendance system is a management system used to manage and report student attendance in the classroom. It can monitor student attendance, generate reports with school, district, and state attendance information. From the other hand, attendance system is not only dedicated for educational institutions, since it can be applied in different organizations (refer to Figure 3, 4, and 5). In fact, organizations use time based attendance systems to manage their employees’ records when employees start and stop work. However, the student attendance system provides many benefits to the educational organizations by controlling all students attendance hours in the classroom. 47
  • 4. The International Journal of Multimedia & Its Applications (IJMA) Vol.5, No.6, December 2013 Figure 3: attendance system based single face detection[10] Many automatic attendance systems have been proposed by using fingerprint verification technique. Among these are the Efficient Automatic Attendance System using Fingerprint Verification Technique [11], and the Attendance Monitoring System Using Biometrics [12], and the Student Attendance System Based On Fingerprint Recognition and One-to-Many Matching [13]. Figure 4: An Attendance Monitoring System Using Biometrics [12] 48
  • 5. The International Journal of Multimedia & Its Applications (IJMA) Vol.5, No.6, December 2013 Figure 5: student attendance system [13] 5. THE PROPOSED INTEGRATED SYSTEM FOR MONITORING AND RECOGNIZING STUDENTS DURING CLASS SESSION As mentioned earlier, many previous studies on student attendance system have been done and focused on facilitating the attendance method. These methods are basically depend on the standard variant authentication schemes such as finger/ hand print, cards, or etc. In this paper, the proposed attendance system is based on faces detection and recognition processes. Therefore the proposed system is minimizing the instructor’ exhaustion since the instructors can check their student’s attendance by using their own PCs and the required time to collect and analyse the final results. However, the proposed system is based on face detection and recognition authentication methods. Whereby, the face recognition method is the most natural biological features recognition technology according to the cognitive rule of human beings. Generally, the proposed system describes three steps for students attendance system (refer to Figures 6). These steps are: the system access control step, the face detection and recognition step, and collecting data step. I. System Access Control Step As mentioned earlier, system access control process is one of the cryptographic services, which is used to authenticate the instructor in the student database server. As well the instructor can access his/her students list. This process is the first step in the proposed students’ attendance system that prepares the instructor to be authorized in the advanced students’ attendance process in the classroom. Therefore, the system access control includes Identification phase which identify the instructor on the system; and Authentication phase which authenticate the instructor on his classroom’s students. 49
  • 6. The International Journal of Multimedia & Its Applications (IJMA) Vol.5, No.6, December 2013 Moreover, the whole student attendance system is clarified in Figure 6 from the beginning to the end. The instructor login to the attendance system by using his/her ID and password. Once the students enter their classroom, the classroom camera will record and capture the students’ photos as shown by Figure 6, Step 1. In Figure 6 Step 2 and 3, the instructor should request the faces detection and recognition phase to check the attendant and absent students in his/her classroom immediately. Figure 6: the proposed system II. Face Detection and Recognition Step Typically, the system process is very critical since the face detection process is starting after capturing the students’ photos’ by classroom’s camera, as shown by Figure 7. However, the classroom’s instructor should upload the student photo, as well the system will filter the student photo to detect all students’ faces (refer to Figure 7). Figure 7 Step 3 shows that the students’ faeces are already detected since the attendance list is open and recognize all the attendees. However, the system enables the instructor to drag and drop the attendant student photo in case his/her photo is not detected or recognized by the system as shown by Figure 7. 50
  • 7. The International Journal of Multimedia & Its Applications (IJMA) Vol.5, No.6, December 2013 Figure 7: the proposed attendance system III. Collecting Data Process The third step in the proposed method is to collect data and produce the attendance report. After the detection and recognition process, the data will be transmitted to the attendance system database, whereby the instructor can immediately produce his/her students’ attendance report (refer to Figure 7). 51
  • 8. The International Journal of Multimedia & Its Applications (IJMA) Vol.5, No.6, December 2013 4. CONCLUSION This paper has shown the possibility of establishing student attendance system based on face detection and recognition authentication scheme. The system allows the instructor to check his/her student attendance automatically by using personal computer (PC) without any extra cost and effort. As new technology for student attendance system, this system is proposed to replace the previous biometric attendance system, since attendance report can be created by the classroom camera. As well as, the proposed system needs only the basic requirements such as; camera, PC, and local network. ACKNOWLEDGMENT The authors would like to thank Al Zaytoonah University of Jordan for supporting this study. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] I. Marqu´es, and M. GraËśna. Face Recognition Algorithms. Proyectos Fin de Carrera, Universidad Carlos III de Madrid.2010. P. Viola , and M. Jones.Rapid object detection using a boosted cascade of simple features. Accepted Conference On Computer Vision And Pattern Recognition, 2001. Yan-Wen Wu , and Xue-Yi Ai. Face Detection in Color Images Using AdaBoost Algorithm Based on Skin Color Information. First International Workshop on Knowledge Discovery and Data Mining, 2008. I. Cohen , N. Sebe , F. G. Cozman ,Thomas S. Huang . Semi-Supervised Learning for Facial Expression Recognition. Proceedings of the 5th ACM SIGMM international workshop on Multimedia information retrieval. ACM New York, NY, USA Pages 17 – 22. O. N. A. AL-Allaf, A. Aref Tamimi , and M. A. Alia. Face Recognition System Based on Different Artificial Neural Networks Models and Training Algorithms. International Journal of Advanced Computer Science and Applications, Vol. 4, No. 6, 2013. S. L.Toh and O. Seiichi. A Face Recognition System Using Neural Networks with Incremental Learning Ability. Proceeding of the 8th Australian and New Zealand Conf. on Intelligent Information Systems. pp.389-394. 2003. A. Volkan . Face Recognition Using Eigenfaces and Neural Networks. Master of Science Thesis, The Graduate School of Natural And Applied Sciences. The Middle East Technical University. 2003. W. Weihua and W. WeiFu . A Gray-Scale Face Recognition Approach. Second International Symposium on Intelligent Information Technology Application, 978-0-7695-3497-8/08, IEEE computer society. 2008. DOI= 10.1109/IITA.2008.101. R. Lehtinen,. Computer Security Basics, 2nd Edition, O'Reilly. 2006. ISBN-10: 0-596-00669-1. Eye-tech. http://www.eye-tech.it/index.php?lang=en C. Saraswat and A. Kumar. An Efficient Automatic Attendance System using Fingerprint Verification Technique. Chitresh Saraswat et al. / (IJCSE) International Journal on Computer Science and Engineering, Vol. 02, No. 02, Pp.264-269. 2010. S. Rao, and K. J. Satoa. An Attendance Monitoring System Using Biometrics Authentication. International Journal of Advanced Research in Computer Science and Software Engineering. Volume 3, Issue 4, pp. 379-383. 2013 R. Mishra and P. Trivedi. Student Attendance System Based On Fingerprint Recognition and One-toMany Matching. Department of Computer Science and Engineering National Institute of Technology Rourkela Rourkela-769 008, Orissa, India. 2011. 52