IJSMT Journal

International Journal of Science, Strategic Management and Technology

An International, Peer-Reviewed, Open Access Scholarly Journal Indexed in recognized academic databases · DOI via Crossref The journal adheres to established scholarly publishing, peer-review, and research ethics guidelines set by the UGC

ISSN: 3108-1762 (Online)
webp (1)

Plagiarism Passed
Peer reviewed
Open Access

AI-DRIVEN GUEST IDENTIFICATION AND PHOTO RETRIEVAL SYSTEM

AUTHORS:
Thangamurugan R
Mentor
Dr. S.V. Anandhi , Dr. M. Kaliappan
Affiliation
Dept. of Artificial Intelligence and Data Science Ramco Institute of Technology, Rajapalayam, India
CC BY 4.0 License:
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract

There is a specific kind of let-down that follows big events. You know photos were taken. You were there. A professional was working all day. Two weeks later a gallery link arrives, 3,000 images in it, and the expectation is that each of the two hundred guests will scroll through until they find themselves. Most give up within ten minutes. The photos that were taken of them — professionally, at something they cared about — they never actually see. We built a system so that doesn't have to happen anymore. Guest scans a QR code at the venue entrance, uploads a selfie, and a personal email arrives after the event with every photo from the day where their face appeared. DeepFace handles recognition, MTCNN handles detection, Node.js runs the backend, cloud storage absorbs the volume. We tested it at four events: two weddings, a university tech festival, a corporate town hall. Matched at 95 percent accuracy, processed around 25 photos per second on a standard laptop. This paper describes how it works, what failed during development, what we changed, and where the gaps remain.


Keywords
Article Metrics
Article Views
33
PDF Downloads
1
HOW TO CITE
APA

MLA

Chicago

Copy

R, T. (2026). AI-Driven Guest Identification and Photo Retrieval System. International Journal of Science, Strategic Management and Technology, 02(03). https://doi.org/10.55041/ijsmt.v2i3.329

R, Thangamurugan. "AI-Driven Guest Identification and Photo Retrieval System." International Journal of Science, Strategic Management and Technology, vol. 02, no. 03, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i3.329.

R, Thangamurugan. "AI-Driven Guest Identification and Photo Retrieval System." International Journal of Science, Strategic Management and Technology 02, no. 03 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i3.329.

References
1.M. Parkhi, A. Vedaldi, and A. Zisserman, "Deep Face Recognition," in Proc. BMVC, 2015.

2.Taigman, M. Yang, M. Ranzato, and L. Wolf, "DeepFace: Closing the Gap to Human-Level Performance in Face Verification," in Proc. IEEE CVPR, 2014.

3.Schroff, D. Kalenichenko, and J. Philbin, "FaceNet: A Unified Embedding for Face Recognition and Clustering," in Proc. IEEE CVPR, 2015.

4.Simonyan and A. Zisserman, "Very Deep Convolutional Networks for Large-Scale Image Recognition," arXiv:1409.1556, 2014.

5.He, X. Zhang, S. Ren, and J. Sun, "Deep Residual Learning for Image Recognition," in Proc. IEEE CVPR, 2016.

6.Bradski, "The OpenCV Library," Dr. Dobb's Journal of Software Tools, 2000.

7.Wolf, "Automated Event Photo Management Using Face Recognition," Int. J. Comput. Appl., vol. 180, no. 47, pp. 1-7, 2018.S. Wang, L. Wang, and Y. Wang, "Cloud-Based Photo Management and Sharing System," in Proc. Int. Conf. Cloud Comput. Big Data Anal., 2017.

8.Abadi et al., "TensorFlow: Large-Scale Machine Learning on Heterogeneous Distributed Systems," arXiv:1603.04467, 2016.

9.E. King, "Dlib-ml: A Machine Learning Toolkit," J. Mach. Learn. Res., vol. 10, pp. 1755-1758, 2009.

10.Ren, K. He, R. Girshick, and J. Sun, "Faster R-CNN: Towards Real- Time Object Detection with Region Proposal Networks," IEEE Trans. PAMI, 2017.
Ethics and Compliance
✓ All ethical standards met
This article has undergone plagiarism screening and double-blind peer review. Editorial policies have been followed. Authors retain copyright under CC BY-NC 4.0 license. The research complies with ethical standards and institutional guidelines.
Indexed In
Similar Articles
Performance-Based Analysis of A G+6 Reinforced Concrete Shear Wall Structure under Earthquake Loads
string(9) "M Sharath" Sharath, M.et al.
(2026)
DOI: 10.55041/ijsmt.v2i3.128
Gender and Power Dynamics in Contemporary South Asian Women's Writing
string(13) "Meera V. Nair" Nair, M. V.et al.
(2026)
DOI: 10.55041/ijsmt.v1i3.005
Cryptocurrency Adoption Trends and Investment Behavior Among Indian Investors
string(18) "Vikram R. Malhotra" Malhotra, V. R.
(2026)
DOI: 10.55041/ijsmt.v1i3.003
Scroll to Top