Você está na página 1de 7

RF TAGS WITH FACE RECOGNITION USING

EMBEDDED SYSTEM
#1 V.Sruthi, Student, Pre final Year, ECE department, K. Ramakrishnan College of Engineering, Contact: 9787479874 1shwethavardhan@gmail.com

Abstract

Radio-frequency identification (RFID) is a technology that uses radio waves to transfer data from an electronic tag, called RFID tag or label, attached to an object, through a reader for the purpose of identifying and tracking the object. Some RFID tags can be read from several meters away and beyond the line of sight of the reader. The application of bulk reading enables an almost-parallel reading of tags. This RF tags can also be done using face recognition for knowing whether the exact target is present or not.

I. INTRODUCTION
In the prevailing scenario there is no time to take attendance. Hence we started using RF tags which has bar codes to take automatic attendance by reading those barcodes. But the disadvantage here was that the readers read only the barcode but not identifies the person hence proxy attendance can be given. To overcome this demerit here we use face recognition along with these tags to find out whether the face and barcode matches with each other. This avoids the mishaps of the earlier technology.

II. RFID TAGS


RFID tags can be either passive, active or battery assisted passive. Passive RFID does not use a battery, while an active has an onboard battery that always broadcasts or beacons its signal. A battery assisted passive (BAP) has a small battery on board that is activated when in the presence of a RFID reader. Most RFID tags contain at least two parts: one is an integrated circuit for storing

and processing information, modulating and demodulating a radio-frequency (RF) signal, and other specialized functions; the other is an antenna for receiving and transmitting the signal.

III. BLOCK FIXED RFID

DIAGRAM

OF

Fig1: Block diagram of fixed Rfid

This device is fixed and do not move. i.e. Only the tag should go near it so as to read it. In other words, they do not generate Radio frequency waves within the region but only in the reader it is present.

IV. BLOCK DIAGRAM OF MOBILE RFID

Fig2: Block diagram of Mobile Rfid

This device is mobile and move. i.e. they generate waves within the specified range.

V. FACE RECOGNITION
The identification of a person by their facial image can be done in a number of different ways such as by capturing an image of the face in the visible spectrum using an

optical camera or by using the infrared patterns of facial heat emission. Facial recognition in visible light typically model key features from the central portion of a facial image. Using a wide assortment of cameras, the visible light systems extract features from the captured image(s) that do not change over time while avoiding superficial features such as facial expressions or hair. Major benefits of facial recognition are that it is nonintrusive, hands-free, continuous and accepted by most users. Facial recognition uses distinctive facial features, including upper outlines of eye sockets, areas around cheekbones, the sides of the mouth and the location of the nose and eyes. Most technologies avoid areas of the face near the hairline so that hairstyle changes won't affect recognition.

VI. BLOCK RECOGNITION

DIAGRAM

OF

FACE

Fig3: Block diagram of face recognition

Here there is a sensor to detect the presence of the person. Then there is a pre-processor in which the face and corresponding barcodes are already present.

VI. FACE RECOGNITION DEVICE

Fig4: Block diagram of face recognition device

This device is used to recognize the face and send report to the server end for comparing with the barcode read already.

VII. RFID FEATURES


Accuracy, reliability, increases in performance. Here since radio waves are used it is efficient.

VIII. FACE RECOGNITION ACCURACY

Fig5: Face recognition Accuracy

IX. FACE RECOGNITION SYSTEM


A facial recognition system is a computer application forautomatically identifying or v erifying aperson from a digital image or a video frame from a video source. One of the ways to do this is by comparing selected facial features from the image and a facial database. It is typically used in security systems and can be compared to other biometrics such as fingerprint or eye iris recognition systems.

VIII. FACIAL RECORD IDENTITIES

Fig6: Face record identities

Face recognition is thus done and compared with the authenticated person for confirmation.

IX. TAG STANDARDS


Near Fields: Near field uses method similar to transformer, and employs inductive coupling of the tag to the magnetic field circulating around the reader antenna.

Fig8: RF Tag near field

Far Field: Far field uses method similar to radar, backscatter reflection by coupling

with the electric field.

Fig9: RF Tag far field

The distinction between the RFID systems with far fields to the near fields is that the near fields use LF (lower frequency) and HF (higher frequency) bands [4,5]. While RFID systems with far fields usually use longer read range UHF and microwave [4].

IX. RESULTS
Here we are saying that instead of we can use face recognition along with rf id to avoid proxy attendance in business institutes.

X. FUTURE ENHANCEMENTS
We can introduce automatic attendance system by entering into the area itself instead of reading the barcode separately. It will save time.

XI. CONCLUSION
Hence by using this rf tag with face recognition we can avoid the proxy attendance and hence we can have the proof whether the person is present or not since it is stored in the data base.

XII. REFERENCES
1. J. Bohn, Prototypical implementation of location-aware services based on a middleware architecture for superdistributed RFID tag infrastructures, Pers Ubiquit omputing, (2008) Journal 12:155166. 2. J. Schwieren1, G. Vossen, A Design and Development Methodology for Mobile RFID Applications based on the ID-Services Middleware Architecture, IEEE Computer Society, (2009), Tenth International

Conference on Mobile Data Management: Systems, Service and Middleware. 3. Application Notes, Introduction to RFID Technology CAENRFID: The Art of Identification (2008). 4. Y. Meiller & S. Bureau, Logistics Projects: How to Assess the Right System? The Case of RFID Solutions in Healthcare, Americas Conference on Information Systems (AMCIS) 2009 Proceedings, Association for Information Systems Year 2009. 5. R. Parks, W. Yao & C. H. Chu, RFID Privacy Concerns: A Conceptual Analysis in the Healthcare Sector, Americas Conference on Information Systems (AMCIS) 2009 Proceedings, Association for Information Systems Year 2009.

XIII. WEBSITES
1. www.biometrics.gov/Documents/fac

erec.pdf 2. http://www.topnews.in/health/whyface-recognition-tough-task-somepeople-26186 3. http://news.bbc.co.uk/2/shared/spl/hi /guides/456900/456993/html/nn2pag e1.stm

Você também pode gostar