Attendance and Security System Based on Building Video Surveillance

  • Kailai Sun
  • Qianchuan ZhaoEmail author
  • Jianhong Zou
  • Xiaoteng Ma
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 890)


The attendance system plays a very important role in the modern enterprise’s operation, and the security of the building has always been a matter of concern to the people. Based on networked surveillance video, this paper integrates the attendance and security functions and fuses video image processing, deep learning, and face recognition to design an intelligent attendance and security system. We propose a sliding average method to identify persons’ identities. The experimental results verify the effectiveness of our method. The false reject rate (FRR) in our system reaches 0.51%, the false accept rate (FAR) reaches 2.52%, and the correct identification rate reaches 98.85%. The system is applied to some video surveillance areas, with advantages of nonintrusive, passive attendance and multiple persons’ attendance at the same time.


Networked video surveillance Deep learning Face recognition Convolutional neural network Attendance and security system 


Acknowledgements, Ethic Approval, and Informed Consent

This work was supported by National Key Research and Development Project of China (No. 2016YFB0901900 and 2017YFC0704100 entitled new generation intelligent building platform techniques) and the National Natural Science Foundation of China (No. 61425027). This work was also supported by the National 111 International Collaboration Project (B06002, BP2018006) and Special Fund of Suzhou-Tsinghua Innovation Leading Action (Project Number: 2016SZ0202).

We appreciate constructive comments from the anonymous reviewers.

This study has been conducted with ethics approval obtained from Institutional Review Board of Tsinghua University, Beijing, China.

Informed consent was obtained from all individual participants included in the study.


  1. 1.
    Kamaraju, M., Kumar, P.A.: Wireless fingerprint attendance management system. In: IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), pp. 1–6. IEEE, Coimbatore, India (2015)Google Scholar
  2. 2.
    Banu, V.C., Cosea, I.M., Nemtanu, F.C., et al.: Intelligent video surveillance system. In: IEEE 23rd International Symposium for Design and Technology in Electronic Packaging (SIITME), pp. 208–212. IEEE, Constanta, Romania (2017)Google Scholar
  3. 3.
    Taigman, Y., Yang, M., Ranzato, M.A., et al.: DeepFace: closing the gap to human-level performance in face verification. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 1701–1708. IEEE, Columbus, USA (2014)Google Scholar
  4. 4.
    Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. Computer Science (2015). arXiv:1409.1556
  5. 5.
    Schroff, F., Kalenichenko, D., Philbin, J.: Facenet: a unified embedding for face recognition and clustering. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 815–823. IEEE, Boston, MA, USA (2015)Google Scholar
  6. 6.
    Ren, S., He, K., Girshick, R., et al.: Faster R-CNN: towards real-time object detection with region proposal networks. IEEE Trans. Pattern Anal. Mach. Intell. 39, 1137–1149 (2017)CrossRefGoogle Scholar
  7. 7.
    Liu, W., Anguelov, D., Erhan, D., et al.: SSD: single shot multibox detector. In: European Conference on Computer Vision, pp. 21–37. Springer International Publishing (2016)Google Scholar
  8. 8.
    Joseph, R., Ali, F., et al.: YOLOv3: an incremental improvement. Computer Science (2018). arXiv:1804.02767
  9. 9.
    Zhang, K., Zhang, Z., Li, Z., et al.: Joint face detection and alignment using multitask cascaded convolutional networks. IEEE Signal Process. Lett. (SPL) 23(10), 1499–1503 (2016)CrossRefGoogle Scholar
  10. 10.
    Szegedy, C., Liu, W., Jia, Y., et al.: Going deeper with convolutions. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1–9. IEEE, Boston, MA, USA (2015)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Kailai Sun
    • 1
  • Qianchuan Zhao
    • 1
    Email author
  • Jianhong Zou
    • 1
  • Xiaoteng Ma
    • 1
  1. 1.Tsinghua National Laboratory for Information Science and Technology (TNList), Department of AutomationCenter for Intelligent and Networked Systems (CFINS), Tsinghua UniversityBeijingChina

Personalised recommendations