Security of facial biometric authentication for attendance system

A Correction to this article is available

This article has been updated

Abstract

Face image processing has become one of the fields of computer vision in processing computerized image patterns; the face becomes one of the vital biometrics that stores essential information used in predicting the characteristics of a person. Biometric techniques with facial recognition systems are now required in various fields, including business, one of which is the attendance marking system that is a crucial repetitive transaction requirement because it relates to employee productivity. In terms of ethics, attendance recording using a person’s face has many benefits; one of them is removing the necessity to make direct contact with the scanning device. Before doing face recognition, one of the preprocessing stages is face detection as an effort to find the existence of a face image consisting of eyes, nose, mouth, and other facial features. This research employed Viola-Jones method for face detection, Gabor Wavelet for feature extraction, and Template Matching. Two scenarios are applied for attendance recording, individual face recording, and group face recording where several faces are captured simultaneously, and each face is extracted and recognized. For Individual attendance recognition, this research achieved an accuracy of 75%, recall 64%, and precision of 88%. The better result is shown on simultaneous/group face recognition, and the research achieved 88% accuracy, 75% of recall, and 97% of the precision score.

This is a preview of subscription content, access via your institution.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Change history

References

  1. 1.

    Alphonse AS, Starvin MS (2019) A novel maximum and minimum response-based Gabor (MMRG) feature extraction method for facial expression recognition. Multimed Tools Appl 78(16):23369–23397. https://doi.org/10.1007/s11042-019-7646-9

    Article  Google Scholar 

  2. 2.

    Banerjee SP, Woodard D (2012) Biometric authentication and identification using keystroke dynamics: a survey. J Pattern Recognit Res 7(1):116–139. https://doi.org/10.13176/11.427

    Article  Google Scholar 

  3. 3.

    Barina D (2016) Gabor wavelets in image processing. CoRR abs/1602.0(2):1–6. Available: http://arxiv.org/abs/1602.03308

  4. 4.

    Belhumeur PN, Hespanha JP, Kriegman DJ (1997) Eigenfaces vs. Fisherfaces: recognition using class specific linear projection. IEEE Trans Pattern Anal Mach Intell 19(7):711–720. https://doi.org/10.1109/34.598228

    Article  Google Scholar 

  5. 5.

    Bhattacharyya D, Ranjan R, FAA, Choi M (2009) Biometric authentication: A review. 2(3):13–28

  6. 6.

    Boka A, Morris B (2019) Person recognition for access logging. IEEE 9th Annu Comput Commun Work Conf CCWC. 2019, pp. 933–936, https://doi.org/10.1109/CCWC.2019.8666483.

  7. 7.

    Brunelli R (2009) Template matching techniques in computer vision: theory and practice. WILEY

  8. 8.

    Chatterjee D, Chandran S (2016, 2017) Comparative study of camshift and KLT algorithms for real time face detection and tracking applications. Proc. - 2016 2nd IEEE Int. Conf. Res. Comput. Intell. Commun. Networks, ICRCICN:62–65. https://doi.org/10.1109/ICRCICN.2016.7813552

  9. 9.

    Christou N, Kanojiya N (2019) Human facial expression recognition with convolution neural networks. Third International Congress on Information and Communication Technology:539–545. https://doi.org/10.1007/978-981-13-1165-9_49

  10. 10.

    Crisan S (2017) A novel perspective on hand vein patterns for biometric recognition: problems, challenges, and implementations. In: Jiang R, Al-maadeed S, Bouridane A, Crookes PD, Beghdadi A (eds) Biometric security and privacy: Opportunities & challenges in the big data era. Springer International Publishing, Cham, pp 21–49. https://doi.org/10.1007/978-3-319-47301-7_2

  11. 11.

    Dhall A, Goecke R, Lucey S, Gedeon T (2012) Collecting large, richly annotated facial-expression databases from movies. IEEE Multimed (3):34–41

  12. 12.

    Gao Q (2012) Biometric authentication in smart grid. Int Energy Sustain Conf IESC 2012. https://doi.org/10.1109/IESC.2012.6217197

  13. 13.

    Jain A, Hong L, Sharath P (2000) Biometric identification. Commun ACM 43(2): 90–98. https://doi.org/10.1145/328236.328110

  14. 14.

    Jain AK, Ross A, Prabhakar S (2004) An introduction to biometric recognition. IEEE Trans CIRCUITS Syst VIDEO Technol 14(1):4–20. https://doi.org/10.1109/TCSVT.2003.818349

  15. 15.

    Kim Y, Toh KA (2007) A method to enhance face biometric security. IEEE Conf Biometrics Theory, Appl Syst BTAS’07, no. i, https://doi.org/10.1109/BTAS.2007.4401913.

  16. 16.

    Kim KH, Lee S, Shim JB, Chang KH, Yang DS, Yoon WS, Park YJ, Kim CY, Cao YJ (2017) A text-based data mining and toxicity prediction modeling system for a clinical decision support in radiation oncology: a preliminary study. J Korean Phys Soc 71(4):231–237. https://doi.org/10.3938/jkps.71.231

    Article  Google Scholar 

  17. 17.

    Kristian Y, Purnama KE, Sutanto EH, Zaman L, Setiawan EI, Purnomo MH (2018) Klasifikasi Nyeri pada Video Ekspresi Wajah Bayi Menggunakan DCNN Autoencoder dan LSTM. JNTETI 7(3):308–316. https://doi.org/10.22146/jnteti.v7i3.440

  18. 18.

    Kumar PM, Gandhi U, Varatharajan R, Manogaran G Jr, Vadivel T (2019) Intelligent face recognition and navigation system using neural learning for smart security in internet of things. Cluster Comput 22:7733–7744. https://doi.org/10.1007/s10586-017-1323-4

    Article  Google Scholar 

  19. 19.

    Lecun Y, Bengio Y, Hinton G (2015) Deep learning. Nature 521(7553):436–444. https://doi.org/10.1038/nature14539

    Article  Google Scholar 

  20. 20.

    Nedjah N, Wyant RS, Mourelle LM, Gupta BB (2017) Efficient yet robust biometric Iris matching on smart cards for data high security and privacy. Futur Gener Comput Syst 76:18–32. https://doi.org/10.1016/j.future.2017.05.008

    Article  Google Scholar 

  21. 21.

    Nyein T, Oo AN (2019) University classroom attendance system using facenet and support vector machine. Int Conf Adv Inf Technol ICAIT 2019:171–176. https://doi.org/10.1109/AITC.2019.8921316

    Article  Google Scholar 

  22. 22.

    Ojala T, Pietikainen M, Maenpaa T (2002) Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Trans Pattern Anal Mach Intell 24(7):971–987. https://doi.org/10.1109/TPAMI.2002.1017623

  23. 23.

    Pato JN, Millett LI (2010) Biometric recognition: Challenges and opportunities. Washington (DC): www.nap.edu

  24. 24.

    Patro KK, Reddi SPR, Khalelulla SKE, Kumar PR, Shankar K (2020) ECG data optimization for biometric human recognition using statistical distributed machine learning algorithm. J Supercomput 76(2):858–875

    Article  Google Scholar 

  25. 25.

    Praveenbalaji D, Srinivas R, Roopa S, Suresh M, Gayathri A (2020) ID photo verification by face recognition. 6th Int Conf Adv Comput Commun Syst ICACCS 2020:1449–1453. https://doi.org/10.1109/ICACCS48705.2020.9074246

    Article  Google Scholar 

  26. 26.

    Sameem MSI, Qasim T, Bakhat K (2017) Real time recognition of human faces, ICOSST 2016–2016. Int Conf Open Source Syst Technol Proc:62–65. https://doi.org/10.1109/ICOSST.2016.7838578

  27. 27.

    Shoba VBT, Sam IS (2020) A hybrid features extraction on face for efficient face recognition. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-08997-1

  28. 28.

    Taloba AI, Sewisy AA, Dawood YA (2019) Accuracy enhancement scaling factor of viola-jones using genetic algorithms. ICENCO 2018 - 14th Int Comput Eng Conf Secur Smart Soc:209–212. https://doi.org/10.1109/ICENCO.2018.8636121

  29. 29.

    Viola P, Jones M (2001) Rapid object detection using a boosted cascade of simple features. Accepted Conference On Computer Vision And Pattern Recognition, pp 511–518. https://doi.org/10.1109/CVPR.2001.990517

  30. 30.

    Wati DAR, Abadianto D (2018) Design of face detection and recognition system for smart home security application. Proc. - 2017 2nd Int. Conf. Inf. Technol. Inf. Syst. Electr. Eng. ICITISEE 2017, vol. 2018-Janua, pp. 342–347, https://doi.org/10.1109/ICITISEE.2017.8285524.

  31. 31.

    Wati V, Kusrini, Al Fatta H (2019) Real time face expression classification using convolutional neural network algorithm. Int Conf Inf Commun Technol ICOIACT 2019, no. Clm, pp. 497–501, https://doi.org/10.1109/ICOIACT46704.2019.8938521.

Download references

Author information

Affiliations

Authors

Corresponding author

Correspondence to Kusrini Kusrini.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

The original online version of this article was revised: The corresponding author was incorrect.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Wati, V., Kusrini, K., Al Fatta, H. et al. Security of facial biometric authentication for attendance system. Multimed Tools Appl (2021). https://doi.org/10.1007/s11042-020-10246-4

Download citation

Keywords

  • Attendance
  • Authentication
  • Biometric
  • Face detection
  • Viola-jones
  • Gabor wavelet
  • Feature extraction