Exam Vision : An Intelligent Face Detection System for Automated Candidate Identification

DOI : 10.17577/IJERTCONV12IS03073
Download Full-Text PDF Cite this Publication
Text Only Version

 

Exam Vision : An Intelligent Face Detection System for Automated Candidate Identification

Mr.Balusamy R, M.Tech, Assistant Professor, Department of Computer Science And Engineering,

Shree Venkateshwara Hi Tech EngineeringCollege, Gobichettipalayam.

E-mail :spcbalu07@gmail.com

Mr.Albert Johnson R, Student, Department of Computer Science And Engineering, Shree Venkateshwara Hi Tech Engineering College, Gobichettipalayam.

E-mail:imperial.a2112001@gmail.com

Mr.Prabakaran T, Student, Department of Computer Science And Engineering, Shree Venkateshwara Hi

Tech Engineering College, Gobichettipalayam.

E-mail:kidookannamma@gmail.com

Mr.Rajaguru A, Student, Department of Computer Science And Engineering, Shree Venkateshwara Hi

Tech Engineering College, Gobichettipalayam.

E-mail:guru45963@gmail.com

Abstract In current educational settings, the process of disseminating exam hall details throughoffline means, such as notice boards, poses several challenges. The manual posting of examschedules,seatingarrangements,andrelatedinformationon noticeboardscanleadtoinaccuracies, delays, and potential information discrepancies. In this proposed develop tooutlinesasophisticatedsolutionforexamhallmanagementandse curity.EmployingConvolutional Neural Network (CNN) algorithms, the system ensures precise face detectionwithin the exam hall, facilitating accurate identification of individuals. This technology

notonlyenablessecureauthenticationthroughfacialrecognitionbu talsooffersreal-timemonitoring of exam hall details, including attendance and behavior

Keywords face detection, image processing, real-world conditions, face recognition .

  1. Introduction

    In the context of educational institutions, particularly duringexaminationperiods,theprocessofsheetalignmentinexa mhallsstandsasacruciallogisticaloperation.Thisoperationenco mpassesaseriesofmeticulousstepsdesignedtoensurethesmooth andorganized distribution of examination materials to candidates seated within the designatedexamination venue. Exam sheet alignment serves as the cornerstone of fair and standardizedtestingprocedures,facilitatingtheefficientadminis trationofexamswhileupholdingacademicintegrityand transparencythesignificanceofsheetalignmentintheexaminatio nprocesscannotbeoverstated.It represents the initial phase wherein examination papers, answer sheets, and other relevantmaterials are meticulously arranged anddistributed in a systematic manner. The aim is tocreate an environmentconducive toexamination conditions,minimizing disruptionsandirregularitiesthatcouldcompromise theintegrityoftheassessmentprocess.

    A.FACE DETECTION

    The face detection module receives some picture of some face after it has been captured bythe camera. The locations in a photograph wherehumans are themostprobably to be seenare found in this section. The extraction of features modules utilizes the face image as inputafter recognizing the face using a region proposal network (RPN) to determine the mostcrucialtraitsthatwillbeusedforcategorization.Averybriefv ectoroffeaturesthataccurately depicts the facial picture is

    created by the modules code. In this scenario, DCNNand a pattern classifier are used to contrast the recovered properties of the face picture tothose stored in the face databases. The face image is then classified as either recognized orunfamiliar. If the picture face is recognized, the specific persons test hall information isshown.including autonomous vehicles, medical imaging, and surveillance systems.

    B. FACE IDENTIFICATION

    By incorporating the ordered grid of vector-valued inputs into the kernel of an array of filtersin a particular layer, the CNN generates feature maps. The triggering events of the organizedfeature maps are then computedusinganon- linearcorrectedlinearunit(ReLU).Localresponse normalization, or LRN, is used to normalize the new feature map that the ReLUproduced. Spatial pooling (maximum or average pooling)is used to further calculate theresult of the normalizing. Then, certain unneeded weights are initialized to zero using thedropout normalization approach, and this process often happens inside the fully linked layersbefore the categorization layer.In the fully connectedlayer, the classificationofpicturelabelsisdoneusingthesoftmaxactivation feature.

    C.DEEP LEARNING

    However, we present an innovative approach leveraging deep learning techniques for the detection and mitigation of malware attacks, thereby enhancing system protection measures. Our project focuses on harnessing the power of deep neural networks to analyze intricate patterns within malicious code and network behaviors, enabling accurate identification of potential threats in real-time. By employing advanced deep learning architectures and novel feature representations, we achieve heightened sensitivity to subtle indicators of malware activity while minimizing false positives. Through comprehensive experimentation and evaluation on diverse datasets, our proposed methodology demonstrates robustness and effectiveness in safeguarding systems against evolving cyber threats, offering a promising solution for bolstering cybersecurity defenses in modern computing environments.

  2. PROPOSED MEASURE

    The proposed project aims to revolutionize exam hall management and security byintroducing a sophisticated solution powered by Convolutional Neural Network (CNN)algorithms. This innovative approach employs cutting-edge technology to ensure precisefacedetectionwithintheexamhall,therebyfacilitatingac curateidentificationof individuals. Through the integration of CNN algorithms, the system not only enables secureauthentication via facial recognition but also offers real-time monitoring of various examhalldetails,includingattendanceandbehavior.

    At the heart of the proposed solution lies the utilization of CNN algorithms, whichhave demonstrated remarkable efficiency and accuracy in various computer vision tasks,including facial recognition. By leveraging the power of CNNs, the system can analyzecomplex visual data captured by cameras installed throughout the exam hall, effectivelyidentifying individuals based on their facial features. This capability significantly enhancesthe reliability of the face recognition system, minimizing the risk of false identifications andensuringpreciseauthenticationofexamparticipants. In contrast to singular defense strategies, which may

    exhibit limited efficacy against evolving threats,multi-layered defenses offer a holistic approach, addressing diverse attack vectors through a combination of measures. Response and recovery layers play a crucial role in restoring normalcy post-attack, emphasizing the importance of a robust and adaptable defense framework. Ultimately, by embracing multilayered defenses, organizations can effectively navigate the ever-changing threat landscape, fortifying their resilience against emerging cybersecurity challenges.

    .

  3. EXISTING SYSTEM

    Manual matching is a traditional method employed in exam halls where invigilators oradministrators manually compare student IDs or other identifying information on exam sheetswith a list of registered students to determine ownership. This process, though widely used, isfraughtwith challenges, particularly inlarge exam halls with numerous participants. Thisbrief explanation delves into the intricacies of manual

    matching,highlightingitssignificance,challenges,andpotential improvements.

    At its core, manual matching serves as a fundamental mechanism for ensuring theintegrity and ccountability of the examination process. By verifying the identity ofeachstudentagainstarosterofregisteredparticipants,instituti onsaimtopreventfraud,impersonation, or other forms of academic misconduct. Moreover, manual matching plays acrucial role in maintaining order and organization within the exam hall, as it facilitates theefficientdistributionandcollectionofexammaterials. optimal hyperplane to separate different classes by maximizing the margin. Integrating these diverse approaches allows us to exploit their complementary advantages, ultimately leading to a more effective and reliable predictive system. Through careful integration and

    tuning of these algorithms within our ensemble framework, we aim to push the boundaries of our model’s performance, delivering superior results across various domains and datasets.

  4. PROPOSED METHODS
  1. The Convolutional Neural Network (CNN)

    algorithm has revolutionized the field ofimage recognition and processing. at its core, cnns are inspired by the organization of theanimal visual cortex, leveraging hierarchical layers of neurons to extract increasingly abstractfeatures from raw pixelinputs Set up a system to acquire video feeds from the surveillance cameras. This can be done using video capture hardware or software that

    INTERFACES WITH THE CAMERAS AND STREAMS THE VIDEO FOOTAGE TO THE SYSTEM.

  2. INPUT DATASET

    The input dataset for the project on malware attack identification and system protection comprises a diverse array of malware samples collected from various sources, including known malware repositories, honeypots, and real-world incident reports. Utilize computer vision techniques, such as object detection algorithms (e.g., YOLO, SSD, Faster R-CNN), to detect and track objects within the video feeds. Train the object detection model on a dataset that includes examples of both normal and abnormal activities.

  3. PREPROCESSING

    Preprocessing plays a crucial role in fortifying digital defenses. This preliminary stage involves a series of intricate steps aimed at preparing raw data forsubsequent analysis and classification. Initially, data collection mechanisms gather diverse sources of information, including network traffic logs, system event records, and file attributes. Subsequently, preprocessing techniques such as data cleaning, normalization, Preprocess the video feeds to enhance the quality of the footage and prepare it for analysis. This may involve tasks such as noise reduction, image stabilization, and frame rate normalization.

    V . ABBREVIATIONS AND ACRONYMS MAP – MEAN AVERAGE PRECISION

    CNNS – CONVOLUTIONAL NEURAL NETWORKS RNNS – RECURRENT NEURAL NETWORKS

    GANS – GENERATIVE ADVERSARIAL NETWORKS CUHK – FACE SKETCH DATABASE

    LBP – LOCAL BINARY PATTERNS

    VI .CONCLUSION AND FUTURE ENHANCEMENT

    It used to take a long time for pupils as well as instructors to manually record eachstudents attendance in the test room. A facial identification system, which is often used toverify users via identification verification services, operates by recognizing and

    quantifyingfacefeaturesinagivenimage.Acollectionoffeatures maybeusedtocompareanindividuals face to an electronic image or a video clip. A technology for recognizing faceshas been developed thatis prepared tobe usedin the proposed system for the purpose oflive examinee authentication with little to no human intervention to validate the candidate.Thissystemisastudyofthevariousattendance- takingtoolscurrentlyavailable.Additionally, a completely computerized system may take its place. The administration ofexam attendancemay beimproved with the use of thismethod

    1. .FIGURES AND TABLES

      Fig no : 1 FLOW DAGRAM

    2. . ACKNOWLEDGMENT

    We are very grateful to Dr.T.SENTHIL PRAKASH ME PhD, Professor and Head Department of Computer Science and Engineering , for the aspiring suggestion, invaluably constructive criticism and friendly advice.

    We wish to express our gratefulness to our guide Mr.R.BALUSAMY,M.Tech,Assistant Professor of Computer Science and Engineering, for his invaluable guidance and constructive suggestions

    References

    1. Ferdous, Jannatul, et al. “A Review of State-of-the- Art Malware Attack Trends and Defense Mechanisms.” IEEE Access 11 (2023): 121118121141.
    2. A. O. Christiana, B. A. Gyunka and A. Noah, “Android malware detection through machine learning techniques: A review”, Int. J. Online Biomed. Eng., vol. 16, no. 2, pp. 14, Feb. 2020.
    3. C. P. Obite, N. P. Olewuezi, G. U. Ugwuanyim and
  4. C. Bartholomew, “Multicollinearity effect in regression analysis: A feed forward artificial neural

network approach”, Asian J. Probab. Statist., vol. 6, no. 1, pp. 22-33, Jan. 2020.

  1. W. Wang, M. Zhao, Z. Gao, G. Xu, H. Xian, Y. Li, et al., “Constructing features for detecting Android malicious applications: Issues taxonomy and directions”, IEEE Access, vol. 7, pp. 67602-67631, 2019.
  2. J. Li, L. Sun, Q. Yan, Z. Li, W. Srisa-An and H. Ye, “Significant permission identification for machinelearning-based Android malware detection”, IEEE Trans. Ind. Informat., vol. 14, no. 7, pp. 3216- 3225, Jul. 2018.
  3. A. Mahindru and A. L. Sangal, “MLDroid Framework for Android malware detection using machine learning techniques”, Neural Comput. Appl., vol. 33, no. 10, pp. 5183-5240, May 2021.
  4. C. Alex, G. Creado, W. Almobaideen, O. A. Alghanam, and M. Saadeh,A comprehensive survey for IoT security datasets taxonomy, classification and machine learning mechanisms, Comput. Secur., vol. 132,Sep. 2023, Art. no.

    103283, doi: 10.1016/j.cose.2023.103283.

    Y. Ye, T. Li, D. Adjeroh, and S. S. Iyengar, A survey on malware detection using data mining techniques, ACM Comput. Surveys, vol50,no. 3, pp. 140, May 2018, doi: 10.1145/3073559.

  5. A. Abusitta, M. Q. Li, and B. C. M. Fung, Malware classification and composition analysis: A survey of recent developments, J. Inf. Secur. Appl., vol. 59, Jun. 2021, Art. no. 102828, doi:10.1016/j.jisa.2021.102828.
  6. C. Beaman, A. Barkworth, T. D. Akande, S. Hakak, and M. K. Khan,Ransomware: Recent advances, analysis, challenges and future research directions, Comput. Secur., vol. 111, Dec. 2021, Art. no. 102490, doi:10.1016/J.COSE.2021.102490.
  7. L. Caviglione, M. Choras, I. Corona, A. Janicki, W. Mazurczyk,M. Pawlicki, and K. Wasielewska, Tight arms race: Overview of current malware threats and trends in their detection, IEEE Access, vol. 9, pp. 53715396, 2021, doi:

    10.1109/ACCESS.2020.3048319.

  8. H. Orman, The Morris worm: A fifteen- year perspective,IEEESecur. Privacy, vol. 1, no. 5, pp. 3543, Sep. 2003, doi:10.1109/MSECP.2003.1236233
  9. T Senthil Prakash, V CP, RB Dhumale, A Kiran., “Auto-metric graph neural network for paddy leaf disease classification” – Archives of Phytopathology and Plant Protection, 2023.
  10. T Senthil Prakash, G Kannan, S Prabhakaran., “Deep convolutional spiking neural network fostered automatic detection and classification of breast cancer from mammography images”,2023.
  11. TS Prakash, SP Patnayakuni, S Shibu., “Municipal Solid Waste Prediction using Tree

    Hierarchical Deep Convolutional Neural Network Optimized with Balancing Composite Motion Optimization Algorithm” – Journal of Experimental & Theoretical Artificial , 2023/p>

  12. [TS Prakash, AS Kumar, CRB Durai, S Ashok., “Enhanced Elman spike Neural network optimized with flamingo search optimization algorithm espoused lung cancer classification from CT images” – Biomedical Signal Processing and Control, 2023.
  13. R. Senthilkumar, B. G. Geetha, (2020), Asymmetric Key Blum-Goldwasser Cryptography for Cloud Services Communication Security, Journal of Internet Technology, vol. 21, no. 4 , pp. 929-939.
  14. Senthilkumar, R., et al. “Pearson Hashing B-Tree With Self Adaptive Random Key Elgamal Cryptography For Secured Data Storage And

    Communication In Cloud.” Webology 18.5 (2021):

    4481-4497

  15. Anusuya, D., R. Senthilkumar, and T. Senthil Prakash. “Evolutionary Feature Selection for big data processing using Map reduce and APSO.” International Journal of Computational Research and Development (IJCRD) 1.2 (2017): 30-35.
  16. Farhanath, K., Owais Farooqui, and K. Asique. “Comparative Analysis of Deep Learning Models for PCB Defects Detection and Classification.” Journal of Positive School Psychology 6.5 (2022).