iFace Identification and Authentication Technology Based Collaborative Effort to Resolve the Security Problems

Main goal of this research paper, we stated that bio-metric and eye face identification and authentication of a human face. It highlights mouth, nose and upper part of face it is very sensitive technology, if a candidate stands in a different moods of facerather than the natural human face expression e.g. happy, angry, sad, etc. the system would not be able to identify their facial expression and finally the entity itself. The literature in the reference sections suggests that this area of research is gaining more customers in terms of organization and their concerns. Pakistan is one of the targetedareas of the different civilizations and people. It is very hard to handle anyone of them have the ill-will. UsingFace recognition algorithm, Eye Face type biometric machines can capture from the distance of less than one meter it controls and easy to locate a person identification. It is reliable technology and fast to identify candidate information, it is used for security purposes in organizations such as E-passport site, Banks automatic transition and authentication of person.


Introduction
Bio-metric and iFace Identification Technology is based to identify candidate which works in organization for the security purposes that he/she is original employee of organization and check their daily attendance in which time candidate check in and out. There is sustained and collaborative effort or resolve the security problems. Our research is based on iFace and bio-metric recognition application design algorithms and integrated with the hardware we design the application which resolve the real time face identification problem. iFace identification and bio-metric authentication that is based on iris recognition system, nose (e.g. half of the face), thumb and fingers based application. That means machine recognizes a candidate and identify information.
Bio-metric and iFace identification technology is based to identify candidate which works in organization for the security purposes that he/she is the original employee of organization and check his/her daily attendance in which candidate checks-in and checks-out. The goals of the sustainable development and meeting the human and natural systems to cope with the natural and ecosystem services and to help this system gain the goals of the sustainable development the end result is the living conditions would improve through this system that is to help check the premises according to the security and activities which is of the prime objectives. This system not only helps the logged in activities but also help organization to economically secure system more then the human based security system which is required more labour and less secure.
The modern era of the Pakistan is to develop and provide a sense of security in terms of handshaking with the super powers like China and other countries. The system is based on computers that are not gaining more electricity hence environmental protection is also taken care of by using that system.
The face detection and recognition is a creative approach, whichdetect, scan the image, fingerprints, and using a high level coding to detect the object and shows the better result of facial expressions and match the images one is stored image in database through machine and other the front face of person.
Number of Governmental and Non-governmental organizations in our country Pakistan needs the systems that can not only check the entrance and exit of the concerned organizations but also to check the activity of their employees who are working in their neighborhood. Such number is huge in the organizations of the Pakistan that require proper monitoring and control on who is currently in the office environment to safeguard the human lives in the event of a disaster.
The aim of research the system will help to monitor the entry and exit of the people in the organization and manage the pay roll system, security system who deals with bio-metric system and face identification and attendance system. Our country has less resource in terms of the coping with the problems of the terrorism activities, energy crises, educational system, unemployment, political system, environmental, and others. One of the major is the security and law enforcement that can be handled by the accurate check and balance of every person comes in and goes out of the organization. This system is the solution.
There are three approaches of facial recognition: 1. Hybrid approach, 2. Feature base method approach, 3. Holistic approach Hybrid approach: In this approach the whole face is detected and it is the combination of holistic and feature approaches.
Feature base method approach: In this approach the face is divided into parts like mouth, nose and eyes and get the input values of face detection and easy to recognize the face. It segments the face and detect the different part of face and easy to recognize faces.
Holistic approach: This approach defines the whole face detection get inputs of face and system recognizes the face.

Biometric Applications and Systems
Today bio-metric and face recognition application widely used for the sack of security issues and also controlling the threats of terrorist using smart cameras to detect the face and recognize easily to provide the data of person from the database then we can control easily unknown person. Mostly these systems used in airports, hospitals, government departments, schools and other private departments to verify their workers using face detection and bio-metric systems.

Face Recognition and Identification
The face recognition is a technique which identify the persons face, which is stored in database when the face will appear in front of system the identification process will start and recognize that person from given data. The flow chart describes the face recognition as shown in Figure 1

Related Work
Over the last forty years the research of face recognition is ongoing there are several approaches and methods are using in different researches such as machine learning, image processing, neural network, computer vision, recognition pattern, face identification and authentication, face detection algorithms, face recognition algorithms and many other approaches are using to solve the face expression and identify in easiest way because there is a problem in identification and recognition system with the different expressions of human face and the machines could not identify the mode of human face but the classification is the main problem, human is the best solution to recognition technology but here is a limited memory problem. So the problem solution there is the huge work on machine learning languages to easy recognize the human face, here is some problems to face the machine in recognition and identification of human face that are: 1. The automatic recognition of face is the complicated approach is involved which is face detection techniques, the facial recognition and face feature extraction. Face recognition algorithm which is divided into two sub classes to solve the problem one is image templet and feature based. The image based template defines the correlation among the image and image template which is stored in database 1 , Optimal strategy faces recognition 2 , Support vector machines 3 , Iris recognition 4 , In security technology dyadic wavelet transform zero-crossing algorithm using identification and recognition 4 , Pattern recognition workshop 5 , Biometric introduction 6 , Iris identification 7 . Digital watermarking to protecting iris images 8 , Linear analysis 11 , Kernel approach 12 , Image template saving suitable database 13 , Face verification results 11 . Quality matric based comparators iris technology 9 : Non cooperative iris and biometric recognition 10 , Automatic human face recognition 12 , Face detection feature 13 . Rotated face detection algorithm 14 , Attacks on machine learning models 15 , Attacks on deep learning models 16 , Object detection and semantic segmentation 17 , Neural network evaluates the robustness in privacy and security problems 18 , Assessment of image quality 19 , Defense competition and attacks 20 .

Research Design
In research model, we use a camera to detect the real human face and recognizer to recognize the face parts, which are mouth, nose and upper part of face, put the correct information of employee, and store it into database. This is easy way to identification of employee's with face recognition technique, and also generate the many dynamic reports of employee monthly and daily reports of attendance and many other reports. For security purpose we using SQL Server database system which is secure and easy to use to manage the data information and in GUI we use C sharp language easy to connect face recognition machine with IP address, control machine settings store employee information from system to machine and get the daily attendance logs generation daily attendance reports in CSV format. Here is a research model define in Figure 2.

Research Methodology
In this research article we implemented the recognition algorithm to detect the face verification and identification and generate the daily attendance reports and automatically logs save into database. Actually we developed and implement software in government and private sectors to detect the actual employee of company for security purposes and daily attendance and save it into database and generate the daily attendance reports into CSV files and also it saves the employee data and handle the pay role system we are using C# Language to develop the system and easy to connect face recognition machines and using SQL Server 2016 to store database of employees in Figure 3.

Recognition of Facial Expressions
The face expression is based on face detection technique. In this paper we describe the recognition of face expression. Face recognition as shown in Figure 4. Figure 4 showing the seven different modules. First module describes the video camera to capture the image.

Face Detection and Recognition Steps
The facial expressions to detect and recognition, identify the persons face, which is stored in database when the face will appear in front of system the identification process will start and recognize that person from given data. Face recognition algorithm is defines the following steps and shown in Figure 6.

Face detector objects.
3. Using face detector objects on image.

Insert image in database.
Comparing the images stored image and input image.

Conclusion
In this research paper, we focused on iFace Identification and Authentication Technology sustained and collaborative effort or resolve the security problems using face recognition algorithm to detect the face and match with database image and get the results of that person. There are many different application on face recognition are available but still lots of work needed to be done in term of the security of the information is concerned . In our design application,we developed the algorithm that directly detect the face of the employee and connected with the employee databases, which also connected with the payroll system of the organization. Our designed system connect the many different face, biometric machines that, and set password on machinegenerated everyday logs from machine and set the many other activities. We provide easy and secure user interface with admin authentication using C# Language to create application and for store information we using SQL Server 2016 database.