SlideShare a Scribd company logo
1 of 21
PRISONER FACE DETECTION SYSTEM 
GROUP MEMBERS 
 FARHAN NAIK. 
 KANCHAN VAVA. 
 SHWETA FULWANI. 
 AKSHAY AUTI. 
UNDER THE GUIDANCE OF 
Miss. Suwarna Nimkarde.
POINTS TO DISCUSS 
 Existing System 
 Limitations of Existing System 
 Proposed System 
Working 
 Flow of System 
 Advantages of Proposed System 
 Application 
 Soft. & Hardware Specification 
System Design 
conclusion 
 References
EXISTING SYSTEM 
In existing system criminal information is stored in 
file format with outdated images and low quality 
images. 
Using this information it is not possible for eye 
witness to guess the criminal, so there is need to 
develop a better method for identifying criminals like 
finger print, DNA…Etc. 
Among all these methods face detection method is 
cost effective and more accurate.
LIMITATIONS OF EXISTING 
SYSTEM 
Using Existing System Its Difficult for eye 
witness to guess the criminal . 
It’s Difficult ToMaintain Data Physically. 
Human Interaction Required.
PROPOSED SYSTEM 
 Prisoner face detecting system can be used in police 
department. 
 This software contains front end and back end applications 
where front end is used to visualize the output and back 
end is used to store data. 
 Initially criminal images are stored in database along with 
his bio data. Every image is sliced by eyes, hair, lips and 
nose..etc and stored in database as separate record. 
 These images are shown to eye witness while investigation 
separately, if witness can judge any part of criminal we can 
recover entire criminal record based on that clue. 
 With this system police will provide better option to 
witness to judge criminal.
WORKING 
Capture Image 
Convert To Gray Image 
Edge Detection 
Comparison 
Report The Admin
FLOW OF SYSTEM
ADVANTAGES 
OF PROPOSED SYSTEM 
 Unlike many other identification methods (e.g., fingerprints, 
voiceprint, signature), they do not need to make direct contact 
with an individual in order to verify their identity 
 Less Complex Than OtherMethod.
APPLICATION 
IN MANY SERCURITY SYSTEM 
It can be used in VIDEO SURVEILENCE SYSTEM 
It can be used in CCTV(CLOSED CIRCUIT 
TELEVISION) 
It can be used in Criminal Investigations, Home 
Security, Military, Intelligence
REQUIREMENT SPECIFICATION 
SOFTWARE 
SPECIFICATIO 
N 
• Operating System 
Windows XP 
• Programming 
language : 
• JAVA 
SOFTWARE 
TOOLS 
• Backend 
• MS Access 
HARDWARE 
SPECIFICATION 
• PROCESSOR: Speed 
minimum: PIII 800 MHz 
• RAM: Minimum: 128 MB, 256 
MB
SYSTEM DESIGN 
E-RDIAGRAMS BETWEEN ADMINISTRATOR 
AND EMPLOYEE: 
User id 
Pwd User id 
Pwd 
Administrator Authentication Employee
E-R DIAGRAMS BETWEEN EMPLOYEE AND 
EYEWITNESS: 
Employee Viewing & 
selecting, 
images 
Eyewitness 
User 
id 
Pwd 
User 
id Pwd 
Criminal 
details 
Criminal 
images 
Criminal 
images
E-R DIAGRAM BETWEEN EYEWITNESS AND 
ADMINISTTRATOR 
Administrator 
Authen 
tication Eyewitness 
User id 
Pwd 
User id Pwd
USE CASE DIAGRAM 
Administrator: 
Login 
Inserting/Updating Criminal Details 
Splitting/Updating Images 
Inserting/Updating Face Details 
Already Existed Criminal 
New Criminal 
Deleting Images 
Administrator 
criminal
Client (Operator): 
operator Login 
retriving the images 
operator Criminal 
identifying the images
ACTIVITY DIAGRAM 
Administrator: 
Administrator 
check 
yes 
No 
Criminal Details Operations 
Insert Update Delete View splitting Merging
Operator: 
Operator 
check 
yes 
No 
Retrieve Image 
Identify Image
CONCLUSION 
This system seems to be working fine and 
successfully. This system can able to provide the 
proper training set of data and test input for 
recognition. The face matched or not is given in 
the form of picture image if matched and text 
message in case of any difference.
REFERENCES 
WEB REFERENCES 
• http://www.filestub.com 
• http://www.ebookee.org 
• http://www.google.com
Face detection system

More Related Content

What's hot

Hand Gesture Recognition Using OpenCV Python
Hand Gesture Recognition Using OpenCV Python Hand Gesture Recognition Using OpenCV Python
Hand Gesture Recognition Using OpenCV Python Arijit Mukherjee
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionNikyaa7
 
Currency recognition using image processing in MATLAB
Currency recognition using image processing in MATLABCurrency recognition using image processing in MATLAB
Currency recognition using image processing in MATLABthahani kunju
 
Face identification
Face  identificationFace  identification
Face identification27vipin92
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyranjit banshpal
 
Project Face Detection
Project Face Detection Project Face Detection
Project Face Detection Abu Saleh Musa
 
IRJET- Automated Criminal Identification System using Face Detection and Reco...
IRJET- Automated Criminal Identification System using Face Detection and Reco...IRJET- Automated Criminal Identification System using Face Detection and Reco...
IRJET- Automated Criminal Identification System using Face Detection and Reco...IRJET Journal
 
Image Processing Basics
Image Processing BasicsImage Processing Basics
Image Processing BasicsNam Le
 
Face recognition Face Identification
Face recognition Face IdentificationFace recognition Face Identification
Face recognition Face IdentificationKalyan Acharjya
 
Image segmentation ppt
Image segmentation pptImage segmentation ppt
Image segmentation pptGichelle Amon
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemKarmesh Maheshwari
 
Placement management system
Placement management systemPlacement management system
Placement management systemSurya Teja
 
Face detection ppt
Face detection pptFace detection ppt
Face detection pptPooja R
 
Image compression standards
Image compression standardsImage compression standards
Image compression standardskirupasuchi1996
 
Face detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedFace detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedSantu Chall
 
Criminal Detection System
Criminal Detection SystemCriminal Detection System
Criminal Detection SystemIntrader Amit
 
A study and comparison of different image segmentation algorithms
A study and comparison of different image segmentation algorithmsA study and comparison of different image segmentation algorithms
A study and comparison of different image segmentation algorithmsManje Gowda
 

What's hot (20)

Hand Gesture Recognition Using OpenCV Python
Hand Gesture Recognition Using OpenCV Python Hand Gesture Recognition Using OpenCV Python
Hand Gesture Recognition Using OpenCV Python
 
Image enhancement
Image enhancementImage enhancement
Image enhancement
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
 
Currency recognition using image processing in MATLAB
Currency recognition using image processing in MATLABCurrency recognition using image processing in MATLAB
Currency recognition using image processing in MATLAB
 
Face identification
Face  identificationFace  identification
Face identification
 
Age and Gender Detection.docx
Age and Gender Detection.docxAge and Gender Detection.docx
Age and Gender Detection.docx
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Project Face Detection
Project Face Detection Project Face Detection
Project Face Detection
 
IRJET- Automated Criminal Identification System using Face Detection and Reco...
IRJET- Automated Criminal Identification System using Face Detection and Reco...IRJET- Automated Criminal Identification System using Face Detection and Reco...
IRJET- Automated Criminal Identification System using Face Detection and Reco...
 
Image Processing Basics
Image Processing BasicsImage Processing Basics
Image Processing Basics
 
Face recognition Face Identification
Face recognition Face IdentificationFace recognition Face Identification
Face recognition Face Identification
 
Image segmentation ppt
Image segmentation pptImage segmentation ppt
Image segmentation ppt
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Face Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance SystemFace Recognition based Lecture Attendance System
Face Recognition based Lecture Attendance System
 
Placement management system
Placement management systemPlacement management system
Placement management system
 
Face detection ppt
Face detection pptFace detection ppt
Face detection ppt
 
Image compression standards
Image compression standardsImage compression standards
Image compression standards
 
Face detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedFace detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 edited
 
Criminal Detection System
Criminal Detection SystemCriminal Detection System
Criminal Detection System
 
A study and comparison of different image segmentation algorithms
A study and comparison of different image segmentation algorithmsA study and comparison of different image segmentation algorithms
A study and comparison of different image segmentation algorithms
 

Viewers also liked

UDBA THE STATE SECURITY ADMINISTRATION
UDBA THE STATE SECURITY ADMINISTRATIONUDBA THE STATE SECURITY ADMINISTRATION
UDBA THE STATE SECURITY ADMINISTRATIONOWTF
 
Digital technologies for learning in prison: what one Australian university i...
Digital technologies for learning in prison: what one Australian university i...Digital technologies for learning in prison: what one Australian university i...
Digital technologies for learning in prison: what one Australian university i...Helen Farley
 
Matching Sketches with Digital Face Images using MCWLD and Image Moment Invar...
Matching Sketches with Digital Face Images using MCWLD and Image Moment Invar...Matching Sketches with Digital Face Images using MCWLD and Image Moment Invar...
Matching Sketches with Digital Face Images using MCWLD and Image Moment Invar...iosrjce
 
Managing Church Information from Home and On-the-Go with Church360° Members
Managing Church Information from Home and On-the-Go with Church360° MembersManaging Church Information from Home and On-the-Go with Church360° Members
Managing Church Information from Home and On-the-Go with Church360° MembersConcordia Technology Solutions
 
Institute of Interfaith Dialog - Prison Conversion to Islam - Christianity
Institute of Interfaith Dialog - Prison Conversion to Islam - ChristianityInstitute of Interfaith Dialog - Prison Conversion to Islam - Christianity
Institute of Interfaith Dialog - Prison Conversion to Islam - Christianityrigsbyml
 
Overview of the proposed Photovoltaic Solar Quality Management System standard
Overview of the proposed Photovoltaic Solar Quality Management System standardOverview of the proposed Photovoltaic Solar Quality Management System standard
Overview of the proposed Photovoltaic Solar Quality Management System standardGovind Ramu
 
New Delhi Airport
New Delhi AirportNew Delhi Airport
New Delhi AirportRIIA
 
Airport IT&T 2013 Cornelious Bernard
Airport IT&T 2013 Cornelious BernardAirport IT&T 2013 Cornelious Bernard
Airport IT&T 2013 Cornelious BernardRussell Publishing
 
Adtec Mekanikal Nov 08
Adtec Mekanikal Nov 08Adtec Mekanikal Nov 08
Adtec Mekanikal Nov 08guestf204c
 
Web based Prison management system
Web based Prison management systemWeb based Prison management system
Web based Prison management systemFAKHRUN NISHA
 
Trace Criminal using IBM Watson
Trace Criminal using IBM WatsonTrace Criminal using IBM Watson
Trace Criminal using IBM WatsonAmitava Roy
 
Prison management system
Prison management system Prison management system
Prison management system SNOW WHITE
 
face recognition system using LBP
face recognition system using LBPface recognition system using LBP
face recognition system using LBPMarwan H. Noman
 

Viewers also liked (20)

Developing the SA Prison Library Service
Developing the SA Prison Library ServiceDeveloping the SA Prison Library Service
Developing the SA Prison Library Service
 
UDBA THE STATE SECURITY ADMINISTRATION
UDBA THE STATE SECURITY ADMINISTRATIONUDBA THE STATE SECURITY ADMINISTRATION
UDBA THE STATE SECURITY ADMINISTRATION
 
Digital technologies for learning in prison: what one Australian university i...
Digital technologies for learning in prison: what one Australian university i...Digital technologies for learning in prison: what one Australian university i...
Digital technologies for learning in prison: what one Australian university i...
 
Matching Sketches with Digital Face Images using MCWLD and Image Moment Invar...
Matching Sketches with Digital Face Images using MCWLD and Image Moment Invar...Matching Sketches with Digital Face Images using MCWLD and Image Moment Invar...
Matching Sketches with Digital Face Images using MCWLD and Image Moment Invar...
 
Managing Church Information from Home and On-the-Go with Church360° Members
Managing Church Information from Home and On-the-Go with Church360° MembersManaging Church Information from Home and On-the-Go with Church360° Members
Managing Church Information from Home and On-the-Go with Church360° Members
 
Institute of Interfaith Dialog - Prison Conversion to Islam - Christianity
Institute of Interfaith Dialog - Prison Conversion to Islam - ChristianityInstitute of Interfaith Dialog - Prison Conversion to Islam - Christianity
Institute of Interfaith Dialog - Prison Conversion to Islam - Christianity
 
Overview of the proposed Photovoltaic Solar Quality Management System standard
Overview of the proposed Photovoltaic Solar Quality Management System standardOverview of the proposed Photovoltaic Solar Quality Management System standard
Overview of the proposed Photovoltaic Solar Quality Management System standard
 
New Delhi Airport
New Delhi AirportNew Delhi Airport
New Delhi Airport
 
Airport IT&T 2013 Cornelious Bernard
Airport IT&T 2013 Cornelious BernardAirport IT&T 2013 Cornelious Bernard
Airport IT&T 2013 Cornelious Bernard
 
use case diagramHospital managment system
use case diagramHospital managment systemuse case diagramHospital managment system
use case diagramHospital managment system
 
Prison management system
Prison management systemPrison management system
Prison management system
 
Adtec Mekanikal Nov 08
Adtec Mekanikal Nov 08Adtec Mekanikal Nov 08
Adtec Mekanikal Nov 08
 
Srs
SrsSrs
Srs
 
Web based Prison management system
Web based Prison management systemWeb based Prison management system
Web based Prison management system
 
Face recognition with age
Face recognition with ageFace recognition with age
Face recognition with age
 
Trace Criminal using IBM Watson
Trace Criminal using IBM WatsonTrace Criminal using IBM Watson
Trace Criminal using IBM Watson
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Knn
KnnKnn
Knn
 
Prison management system
Prison management system Prison management system
Prison management system
 
face recognition system using LBP
face recognition system using LBPface recognition system using LBP
face recognition system using LBP
 

Similar to Face detection system

CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AICRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AIIRJET Journal
 
Motion based security alarm
Motion based security alarmMotion based security alarm
Motion based security alarmAkshay Surve
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face IdentificationIRJET Journal
 
Secure crime identification system
Secure crime identification systemSecure crime identification system
Secure crime identification systemSameer Telikicherla
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhavVaibhav P
 
Inttelix OnTime
Inttelix OnTimeInttelix OnTime
Inttelix OnTimeInttelix
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition SystemZara Tariq
 
Facial login System ppt in computr science and information technology
Facial login System ppt in computr science and information  technologyFacial login System ppt in computr science and information  technology
Facial login System ppt in computr science and information technologyrajeevs54785
 
Facial Recognition System For Access Control
Facial Recognition System For Access ControlFacial Recognition System For Access Control
Facial Recognition System For Access ControlMd. Saddam Hossain Noyon
 
Face detection & recognition
Face detection & recognitionFace detection & recognition
Face detection & recognitionMadhuri Negi
 
Face Recognition Proposal Presentation
Face Recognition Proposal PresentationFace Recognition Proposal Presentation
Face Recognition Proposal PresentationMd. Atiqur Rahman
 
Comparative Analysis of Face Recognition Methodologies and Techniques
Comparative Analysis of Face Recognition Methodologies and TechniquesComparative Analysis of Face Recognition Methodologies and Techniques
Comparative Analysis of Face Recognition Methodologies and TechniquesFarwa Ansari
 
AI Based Image Analysis & Analytics Solution-.pdf
AI Based Image Analysis & Analytics Solution-.pdfAI Based Image Analysis & Analytics Solution-.pdf
AI Based Image Analysis & Analytics Solution-.pdfVikki Choudhry
 
Human Face Identification
Human Face IdentificationHuman Face Identification
Human Face Identificationbhupesh lahare
 
foot crime final for awareness site .pptx
foot crime final for awareness site .pptxfoot crime final for awareness site .pptx
foot crime final for awareness site .pptxImmanImman6
 
Criminal Identification - Full PPT (1) (1).pptx
Criminal Identification - Full PPT (1) (1).pptxCriminal Identification - Full PPT (1) (1).pptx
Criminal Identification - Full PPT (1) (1).pptxMathanE5
 
Facial Recognition System
Facial Recognition SystemFacial Recognition System
Facial Recognition SystemArun ACE
 

Similar to Face detection system (20)

CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AICRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
 
Motion based security alarm
Motion based security alarmMotion based security alarm
Motion based security alarm
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face Identification
 
1 (1)
1 (1)1 (1)
1 (1)
 
Secure crime identification system
Secure crime identification systemSecure crime identification system
Secure crime identification system
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
Inttelix OnTime
Inttelix OnTimeInttelix OnTime
Inttelix OnTime
 
Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
 
Facial login System ppt in computr science and information technology
Facial login System ppt in computr science and information  technologyFacial login System ppt in computr science and information  technology
Facial login System ppt in computr science and information technology
 
Facial Recognition System For Access Control
Facial Recognition System For Access ControlFacial Recognition System For Access Control
Facial Recognition System For Access Control
 
Face detection & recognition
Face detection & recognitionFace detection & recognition
Face detection & recognition
 
Face Recognition Proposal Presentation
Face Recognition Proposal PresentationFace Recognition Proposal Presentation
Face Recognition Proposal Presentation
 
Comparative Analysis of Face Recognition Methodologies and Techniques
Comparative Analysis of Face Recognition Methodologies and TechniquesComparative Analysis of Face Recognition Methodologies and Techniques
Comparative Analysis of Face Recognition Methodologies and Techniques
 
Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
 
AI Based Image Analysis & Analytics Solution-.pdf
AI Based Image Analysis & Analytics Solution-.pdfAI Based Image Analysis & Analytics Solution-.pdf
AI Based Image Analysis & Analytics Solution-.pdf
 
Human Face Identification
Human Face IdentificationHuman Face Identification
Human Face Identification
 
foot crime final for awareness site .pptx
foot crime final for awareness site .pptxfoot crime final for awareness site .pptx
foot crime final for awareness site .pptx
 
Criminal Identification - Full PPT (1) (1).pptx
Criminal Identification - Full PPT (1) (1).pptxCriminal Identification - Full PPT (1) (1).pptx
Criminal Identification - Full PPT (1) (1).pptx
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Facial Recognition System
Facial Recognition SystemFacial Recognition System
Facial Recognition System
 

More from Akshay Surve

Women security application
Women security applicationWomen security application
Women security applicationAkshay Surve
 
Virus detection system
Virus detection systemVirus detection system
Virus detection systemAkshay Surve
 
Student feedback system
Student feedback systemStudent feedback system
Student feedback systemAkshay Surve
 
Shoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login systemShoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login systemAkshay Surve
 
Issue tracking system
Issue tracking systemIssue tracking system
Issue tracking systemAkshay Surve
 
Buget planning system
Buget planning systemBuget planning system
Buget planning systemAkshay Surve
 
Automatic attendance system
Automatic attendance systemAutomatic attendance system
Automatic attendance systemAkshay Surve
 
E notes application2.ppsx
E notes application2.ppsxE notes application2.ppsx
E notes application2.ppsxAkshay Surve
 

More from Akshay Surve (12)

Women security application
Women security applicationWomen security application
Women security application
 
Virus detection system
Virus detection systemVirus detection system
Virus detection system
 
Travel planning
Travel planningTravel planning
Travel planning
 
Student feedback system
Student feedback systemStudent feedback system
Student feedback system
 
Software security
Software securitySoftware security
Software security
 
Shoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login systemShoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login system
 
Pharming attack
Pharming attackPharming attack
Pharming attack
 
Issue tracking system
Issue tracking systemIssue tracking system
Issue tracking system
 
Buget planning system
Buget planning systemBuget planning system
Buget planning system
 
Automatic attendance system
Automatic attendance systemAutomatic attendance system
Automatic attendance system
 
E notes application2.ppsx
E notes application2.ppsxE notes application2.ppsx
E notes application2.ppsx
 
Attitude
AttitudeAttitude
Attitude
 

Recently uploaded

Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information SystemsAnge Felix NSANZIYERA
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesRashidFaridChishti
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)ChandrakantDivate1
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwaitjaanualu31
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...ronahami
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdfKamal Acharya
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelDrAjayKumarYadav4
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptAfnanAhmad53
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...HenryBriggs2
 

Recently uploaded (20)

Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information Systems
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdf
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata Model
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 

Face detection system

  • 1.
  • 2. PRISONER FACE DETECTION SYSTEM GROUP MEMBERS  FARHAN NAIK.  KANCHAN VAVA.  SHWETA FULWANI.  AKSHAY AUTI. UNDER THE GUIDANCE OF Miss. Suwarna Nimkarde.
  • 3. POINTS TO DISCUSS  Existing System  Limitations of Existing System  Proposed System Working  Flow of System  Advantages of Proposed System  Application  Soft. & Hardware Specification System Design conclusion  References
  • 4. EXISTING SYSTEM In existing system criminal information is stored in file format with outdated images and low quality images. Using this information it is not possible for eye witness to guess the criminal, so there is need to develop a better method for identifying criminals like finger print, DNA…Etc. Among all these methods face detection method is cost effective and more accurate.
  • 5. LIMITATIONS OF EXISTING SYSTEM Using Existing System Its Difficult for eye witness to guess the criminal . It’s Difficult ToMaintain Data Physically. Human Interaction Required.
  • 6. PROPOSED SYSTEM  Prisoner face detecting system can be used in police department.  This software contains front end and back end applications where front end is used to visualize the output and back end is used to store data.  Initially criminal images are stored in database along with his bio data. Every image is sliced by eyes, hair, lips and nose..etc and stored in database as separate record.  These images are shown to eye witness while investigation separately, if witness can judge any part of criminal we can recover entire criminal record based on that clue.  With this system police will provide better option to witness to judge criminal.
  • 7. WORKING Capture Image Convert To Gray Image Edge Detection Comparison Report The Admin
  • 9. ADVANTAGES OF PROPOSED SYSTEM  Unlike many other identification methods (e.g., fingerprints, voiceprint, signature), they do not need to make direct contact with an individual in order to verify their identity  Less Complex Than OtherMethod.
  • 10. APPLICATION IN MANY SERCURITY SYSTEM It can be used in VIDEO SURVEILENCE SYSTEM It can be used in CCTV(CLOSED CIRCUIT TELEVISION) It can be used in Criminal Investigations, Home Security, Military, Intelligence
  • 11. REQUIREMENT SPECIFICATION SOFTWARE SPECIFICATIO N • Operating System Windows XP • Programming language : • JAVA SOFTWARE TOOLS • Backend • MS Access HARDWARE SPECIFICATION • PROCESSOR: Speed minimum: PIII 800 MHz • RAM: Minimum: 128 MB, 256 MB
  • 12. SYSTEM DESIGN E-RDIAGRAMS BETWEEN ADMINISTRATOR AND EMPLOYEE: User id Pwd User id Pwd Administrator Authentication Employee
  • 13. E-R DIAGRAMS BETWEEN EMPLOYEE AND EYEWITNESS: Employee Viewing & selecting, images Eyewitness User id Pwd User id Pwd Criminal details Criminal images Criminal images
  • 14. E-R DIAGRAM BETWEEN EYEWITNESS AND ADMINISTTRATOR Administrator Authen tication Eyewitness User id Pwd User id Pwd
  • 15. USE CASE DIAGRAM Administrator: Login Inserting/Updating Criminal Details Splitting/Updating Images Inserting/Updating Face Details Already Existed Criminal New Criminal Deleting Images Administrator criminal
  • 16. Client (Operator): operator Login retriving the images operator Criminal identifying the images
  • 17. ACTIVITY DIAGRAM Administrator: Administrator check yes No Criminal Details Operations Insert Update Delete View splitting Merging
  • 18. Operator: Operator check yes No Retrieve Image Identify Image
  • 19. CONCLUSION This system seems to be working fine and successfully. This system can able to provide the proper training set of data and test input for recognition. The face matched or not is given in the form of picture image if matched and text message in case of any difference.
  • 20. REFERENCES WEB REFERENCES • http://www.filestub.com • http://www.ebookee.org • http://www.google.com