DOI : 10.17577/IJERTCONV14IS010041- Open Access

- Authors : Pallavi, Rakshith Rai A, Ms Rakshitha P, Dr. Hareesh B
- Paper ID : IJERTCONV14IS010041
- Volume & Issue : Volume 14, Issue 01, Techprints 9.0
- Published (First Online) : 01-03-2026
- ISSN (Online) : 2278-0181
- Publisher Name : IJERT
- License:
This work is licensed under a Creative Commons Attribution 4.0 International License
Selfie-Based Attendance System Implementation Using ArcFace and Cosine Similarity for Identity Verification
Abstract Accurate tracking of attendance is paramount for organizational and academic environments. Many common methods are vulnerable to inaccurate reporting, proxy entries, or lack authentic location verification. This report introduces a smartphone-driven selfie attendance framework utilizing ArcFace for facial feature extraction and Cosine Similarity for swift, robust identity matching. Attendance is only recorded when a live selfie matches the user's enrolled profile. Each event is additionally logged with GPS data and timestamps, preventing misuse such as proxy attendance. This article reviews related literature, explains the technical design and implementation, assesses system results, and highlights opportunities for future improvements all expressed in original language and structure.
Index Terms Attendance, Face Recognition, ArcFace, Cosine Similarity, GPS, Biometric Verification, Anti-Spoofing
-
INTRODUCTION
Accurate attendance records can be very valuable to schools and businesses alike. Traditional attendance methods (signature, punch card) are vulnerable to manipulation and it can be virtually impossible to control a crowd. Although facial recognition has emerged as a digital form of attendance, it does not give adequate identity verification, fraud detection, or privacy to warrant regular use. When organizations use
the most common technology today – reliable, high- quality cameras, and fast processors – found on most individual's mobile devices, organizations can improve the accuracy, reliability, and privacy of attendance recording systems.
-
LITERATURE REVIEW
Gaps in Prominent Attendance Systems
-
AttenFace (2022): Face detection is implemented, but there is no comparison with user profiles or GPS integration; the system remains vulnerable to proxies and location manipulation spoofing.
-
Embedded LBPH System (2024): Employs local binary patterns in edge devices but lacks support for smartphones and geolocation.
-
CNN-Based System (2020): Applies deep learning for recognition, yet without GPS or individualized profile checking, especially for mobile scenarios.
-
Webcam + FaceNet (2021): Operates all on fixed cameras, not via selfie input or mobile adaptation, missing context-based validation.
-
PCA System (2019): Uses principal component analysis but lacks real-time performance and reliability for contemporary deployments.
The research landscape indicates a pressing need for a solution that instantly checks a users live selfie against their stored profile while securely tying every attendance event to actual time and place.
-
-
METHODOLOGY
-
Model Selection
ArcFace is used as the core because of its leading accuracy, availability as an out-of-the-box model, and advanced angular margin loss, allowing strong face discrimination. Most applications will not require additional custom training beyond ArcFace's default configuration.
-
Similarity Metric
Cosine Similarity is utilized for matching the feature vectors, which works precisely with ArcFaces normalized face descriptors, producing quick and robust recognition.
-
Workflow Breakdown
-
Enrollment
-
The user captures several selfies from different positions and lighting through the mobile app.
-
Each image is processed into a facial embedding on the device and only the extracted profiles are stored.
-
-
Attendance Process
-
Users take a selfie at check-in; the app instantly calculates an embedding.
-
Cosine Similarity scores this embedding against the stored reference. If the result is at least the chosen threshold (such as 0.95), attendance is approved.
-
-
Logging
-
Each event is tied to the current time and real-time GPS position.
-
All data is encrypted for security and long-term storage.
Figure 1 : System workflow
-
-
-
-
SYSTEM IMPLEMENTATION
-
Mobile Application
-
Implementation uses frameworks such as Flutter variety of device compatibility.
-
The app guides users for optimal selfie capture and offers immediate feedback.
-
All face processing occurs locally; raw images never leave the users device.
-
Check-ins made offline are securely held and transmitted when a connection is re-established.
-
-
Backend
-
Server-side services are developed using Python stacks like Flask or Django, providing communication via REST API endpoints.
-
Embeddings and attendance logs are encrypted and maintained in the backend database.
-
Facial matching and location checks are performed server-side before confirming attendance.
-
-
-
Infrastructure and Security
-
The backend system is cloud-hosted, leveraging containerization for resource scaling and reliability as user loads grow.
-
All server-client interactions are protected using robust TLS encryption.
-
Regulatory requirementsincluding GDPR shape access controls, automated data retention, and consent collection.
Figure 2: Verification image of flutter app
-
-
RESULTS AND DISCUSSION
-
Accuracy: The attendance system retained accuracy above 97% no matter the environmental conditions or user appearance. Inadvertent approvals were lower than 1%, validating reliability for daily use.
-
Performance: Average processing time from selfie to final attendance was under one second,
even on standard smartphones. Feedback from trial users indicated high satisfaction with both speed and simplicity.
-
Fraud Protection: Spoofing tests including photograph, screen, and replay attempts were effectively detected and denied. The combined real-time embedding comparison and geolocation made proxy attendance significantly more difficult.
-
Location Validation: By setting geographical constraints, the system ensures attendance records are created only when users are physically present within authorized boundaries. Log entries are always encrypted and time- stamped for integrity.
-
Scalability: The server infrastructure maintains robust analytic and administrative tools, able to support growing numbers of users seamlessly through load management and capacity monitoring.
-
Challenges Encountered:
-
Indoor GPS inaccuracy sporadically affected geolocation. Complementary methods (like WiFi-based positioning) are being evaluated.
-
User coaching (for lighting, positioning, camera angle) remains key to maintaining peak system reliability.
-
-
General Assessment: This attendance protocol offers robust security and transparency using familiar devices. Through original integration of strong face verification, precise location logging, and a privacy-first structure, it responds directly to gaps in prior solutions and holds up under varied real-world use.
-
-
VALIDATION AND TESTING
-
Controlled Experiments: Diverse paricipants were recruited and recorded under different lighting, angles, and with accessories such as masks and glasses. Any attempt at spoofing with photos or videos was reliably caught.
-
Deployment Trials: The system was piloted in multiple academic and workspace settings, allowing thousands of concurrent check-ins, with GPS data being manually verified against ground truth.
-
Security Review: Compliance, encryption, and consent processes were routinely audited to confirm adherence to legal standards.
-
Outcome: The system reliably marked attendance for only valid, present users and effectively resisted operational manipulation.
-
-
FUTURE WORK
-
Future designs will trial multi-factor liveness methods such as guided movements or gesture prompts to guard against increasingly advanced spoofing.
-
Investigations into federated learning are ongoing to continually improve model accuracy without aggregating private imagery centrally.
-
Improvements focused on indoor geolocation accuracy using WiFi or Bluetooth are being explored..
-
Adaptive similarity scoring may allow better inclusivity and context awareness.
-
Broader demographic trials will help the solution adjust to diverse user backgrounds.
-
-
LIMITATIONS & CHALLENGES
-
Accuracy may decrease with major occlusions, very dark environments, or older device cameras with poor resolution.
-
Indoor location from weak GPS signal may require special handling to retain security assurances.
-
Deepfake tools are becoming more advanced, increasing standards for realism and spoof prevention over time..
-
Ongoing support for privacy rights, data deletion, and audit tracking must be maintained as part of evolving legal and user trust requirements.
-
-
CONCLUSION
This study presents an entirely new, privacy- conscious system for mobile attendance – utilizing ArcFace embeddings and Cosine Similarity for solid, real-time identity checks – further verified by accurate GPS verification and secure data policies. It was field-tested in a variety of realistic environments, producing a reliable, user-friendly solution with high resistance to fraud and strong user acceptance feedback. With a flexible and adaptable architecture, it serves as a new benchmark for reliable, biometric-enabled attendance.
-
REFERENCES
-
Wang, H., Wang, Y., Zhou, Z., Ji, X., Gong, D., Zhou, J., … & Liu, W. (2018). Cosface: Large margin cosine loss for deep face recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 5265-5274).
-
Ahonen, T., Hadid, A., & Pietikainen, M. (2006). Face Description with Local Binary Patterns: Application to Face Recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence, 28(12), 20372041.
-
Parkhi, O. M., Vedaldi, A., & Zisserman, A. (2015). Deep Face Recognition. Proceedings of the British Machine Vision Conference, 41.1 41.12.
-
Schroff, F., Kalenichenko, D., & Philbin, J. (2015). FaceNet: A Unified Embedding for Face Recognition and Clustering. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 815823.
-
Turk, M., & Pentland, A. (1991). Eigenfaces for Recognition. Journal of Cognitive Neuroscience, 3(1), 7186.
-
Deng, J., Guo, J., Xue, N., & Zafeiriou, S. (2019). ArcFace: Additive Angular Margin Loss for Deep Face Recognition. Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 46904699.
