Submit Search
Upload
Automated Criminal Identification Using Face Detection and Recognition
•
0 likes
•
307 views
AI-enhanced title
IRJET Journal
Follow
https://www.irjet.net/archives/V6/i10/IRJET-V6I10160.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 5
Download now
Download to read offline
Recommended
Facial Expression Recognition System using Deep Convolutional Neural Networks.
Facial Expression Recognition System using Deep Convolutional Neural Networks.
Sandeep Wakchaure
Criminal Detection System
Criminal Detection System
Intrader Amit
Facial expression recognition based on image feature
Facial expression recognition based on image feature
Tasnim Tara
Facial recognition system
Facial recognition system
Divya Sushma
Face recognition
Face recognition
sandeepsharma1193
Facial Emotion Recognition: A Deep Learning approach
Facial Emotion Recognition: A Deep Learning approach
AshwinRachha
Face recognition
Face recognition
Satyendra Rajput
face detection
face detection
Smriti Tikoo
Recommended
Facial Expression Recognition System using Deep Convolutional Neural Networks.
Facial Expression Recognition System using Deep Convolutional Neural Networks.
Sandeep Wakchaure
Criminal Detection System
Criminal Detection System
Intrader Amit
Facial expression recognition based on image feature
Facial expression recognition based on image feature
Tasnim Tara
Facial recognition system
Facial recognition system
Divya Sushma
Face recognition
Face recognition
sandeepsharma1193
Facial Emotion Recognition: A Deep Learning approach
Facial Emotion Recognition: A Deep Learning approach
AshwinRachha
Face recognition
Face recognition
Satyendra Rajput
face detection
face detection
Smriti Tikoo
Human Emotion Recognition
Human Emotion Recognition
Chaitanya Maddala
Face Detection
Face Detection
Reber Novanta
Face recognition technology
Face recognition technology
ranjit banshpal
Face recognigion system ppt
Face recognigion system ppt
Ravi Kumar
Facial recognition technology by vaibhav
Facial recognition technology by vaibhav
Vaibhav P
Face Detection techniques
Face Detection techniques
Abhineet Bhamra
Face recognization
Face recognization
leenak770
EMOTION DETECTION USING AI
EMOTION DETECTION USING AI
Aantariksh Developers
Face recognition technology
Face recognition technology
ShubhamLamichane
Face Detection and Recognition System
Face Detection and Recognition System
Zara Tariq
Face Recognition
Face Recognition
Asif Muhammad
modeling and predicting cyber hacking breaches
modeling and predicting cyber hacking breaches
Venkat Projects
HUMAN EMOTION RECOGNIITION SYSTEM
HUMAN EMOTION RECOGNIITION SYSTEM
soumi sarkar
Automated Face Detection System
Automated Face Detection System
Abhiroop Ghatak
Facial Recognition System
Facial Recognition System
Arun ACE
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
JASHU JASWANTH
Facial Expression Recognition
Facial Expression Recognition
Rupinder Saini
Face Recognition
Face Recognition
laknatha
Face Recognition System/Technology
Face Recognition System/Technology
RahulSingh3034
Emotion recognition
Emotion recognition
Madhusudhan G
IRJET- Drive Assistance an Android Application for Drowsiness Detection
IRJET- Drive Assistance an Android Application for Drowsiness Detection
IRJET Journal
IRJET- Face Detection and Tracking Algorithm using Open CV with Raspberry Pi
IRJET- Face Detection and Tracking Algorithm using Open CV with Raspberry Pi
IRJET Journal
More Related Content
What's hot
Human Emotion Recognition
Human Emotion Recognition
Chaitanya Maddala
Face Detection
Face Detection
Reber Novanta
Face recognition technology
Face recognition technology
ranjit banshpal
Face recognigion system ppt
Face recognigion system ppt
Ravi Kumar
Facial recognition technology by vaibhav
Facial recognition technology by vaibhav
Vaibhav P
Face Detection techniques
Face Detection techniques
Abhineet Bhamra
Face recognization
Face recognization
leenak770
EMOTION DETECTION USING AI
EMOTION DETECTION USING AI
Aantariksh Developers
Face recognition technology
Face recognition technology
ShubhamLamichane
Face Detection and Recognition System
Face Detection and Recognition System
Zara Tariq
Face Recognition
Face Recognition
Asif Muhammad
modeling and predicting cyber hacking breaches
modeling and predicting cyber hacking breaches
Venkat Projects
HUMAN EMOTION RECOGNIITION SYSTEM
HUMAN EMOTION RECOGNIITION SYSTEM
soumi sarkar
Automated Face Detection System
Automated Face Detection System
Abhiroop Ghatak
Facial Recognition System
Facial Recognition System
Arun ACE
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
JASHU JASWANTH
Facial Expression Recognition
Facial Expression Recognition
Rupinder Saini
Face Recognition
Face Recognition
laknatha
Face Recognition System/Technology
Face Recognition System/Technology
RahulSingh3034
Emotion recognition
Emotion recognition
Madhusudhan G
What's hot
(20)
Human Emotion Recognition
Human Emotion Recognition
Face Detection
Face Detection
Face recognition technology
Face recognition technology
Face recognigion system ppt
Face recognigion system ppt
Facial recognition technology by vaibhav
Facial recognition technology by vaibhav
Face Detection techniques
Face Detection techniques
Face recognization
Face recognization
EMOTION DETECTION USING AI
EMOTION DETECTION USING AI
Face recognition technology
Face recognition technology
Face Detection and Recognition System
Face Detection and Recognition System
Face Recognition
Face Recognition
modeling and predicting cyber hacking breaches
modeling and predicting cyber hacking breaches
HUMAN EMOTION RECOGNIITION SYSTEM
HUMAN EMOTION RECOGNIITION SYSTEM
Automated Face Detection System
Automated Face Detection System
Facial Recognition System
Facial Recognition System
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
Facial Expression Recognition
Facial Expression Recognition
Face Recognition
Face Recognition
Face Recognition System/Technology
Face Recognition System/Technology
Emotion recognition
Emotion recognition
Similar to Automated Criminal Identification Using Face Detection and Recognition
IRJET- Drive Assistance an Android Application for Drowsiness Detection
IRJET- Drive Assistance an Android Application for Drowsiness Detection
IRJET Journal
IRJET- Face Detection and Tracking Algorithm using Open CV with Raspberry Pi
IRJET- Face Detection and Tracking Algorithm using Open CV with Raspberry Pi
IRJET Journal
Smart Doorbell System Based on Face Recognition
Smart Doorbell System Based on Face Recognition
IRJET Journal
IRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face Recognition
IRJET Journal
IRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face Recognition
IRJET Journal
IRJET- Autonamy of Attendence using Face Recognition
IRJET- Autonamy of Attendence using Face Recognition
IRJET Journal
Virtual Contact Discovery using Facial Recognition
Virtual Contact Discovery using Facial Recognition
IRJET Journal
Real time face recognition of video surveillance system using haar cascade c...
Real time face recognition of video surveillance system using haar cascade c...
nooriasukmaningtyas
IRJET- Smart Classroom Attendance System: Survey
IRJET- Smart Classroom Attendance System: Survey
IRJET Journal
A Real Time Advance Automated Attendance System using Face-Net Algorithm
A Real Time Advance Automated Attendance System using Face-Net Algorithm
IRJET Journal
IRJET- VISITX: Face Recognition Visitor Management System
IRJET- VISITX: Face Recognition Visitor Management System
IRJET Journal
IRJET- Driver’s Sleep Detection
IRJET- Driver’s Sleep Detection
IRJET Journal
IRJET- Digiyathra
IRJET- Digiyathra
IRJET Journal
IRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric Attendance
IRJET Journal
Security by user through application to lock/unlock machine by face detection
Security by user through application to lock/unlock machine by face detection
IRJET Journal
Effective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID Tags
IRJET Journal
IRJET- Credit Card Authentication using Facial Recognition
IRJET- Credit Card Authentication using Facial Recognition
IRJET Journal
IRJET- Object Detection in an Image using Convolutional Neural Network
IRJET- Object Detection in an Image using Convolutional Neural Network
IRJET Journal
IRJET- Face Detection and Recognition using OpenCV
IRJET- Face Detection and Recognition using OpenCV
IRJET Journal
Smart Surveillance System through Computer Vision
Smart Surveillance System through Computer Vision
IRJET Journal
Similar to Automated Criminal Identification Using Face Detection and Recognition
(20)
IRJET- Drive Assistance an Android Application for Drowsiness Detection
IRJET- Drive Assistance an Android Application for Drowsiness Detection
IRJET- Face Detection and Tracking Algorithm using Open CV with Raspberry Pi
IRJET- Face Detection and Tracking Algorithm using Open CV with Raspberry Pi
Smart Doorbell System Based on Face Recognition
Smart Doorbell System Based on Face Recognition
IRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face Recognition
IRJET- Autonamy of Attendence using Face Recognition
IRJET- Autonamy of Attendence using Face Recognition
Virtual Contact Discovery using Facial Recognition
Virtual Contact Discovery using Facial Recognition
Real time face recognition of video surveillance system using haar cascade c...
Real time face recognition of video surveillance system using haar cascade c...
IRJET- Smart Classroom Attendance System: Survey
IRJET- Smart Classroom Attendance System: Survey
A Real Time Advance Automated Attendance System using Face-Net Algorithm
A Real Time Advance Automated Attendance System using Face-Net Algorithm
IRJET- VISITX: Face Recognition Visitor Management System
IRJET- VISITX: Face Recognition Visitor Management System
IRJET- Driver’s Sleep Detection
IRJET- Driver’s Sleep Detection
IRJET- Digiyathra
IRJET- Digiyathra
IRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric Attendance
Security by user through application to lock/unlock machine by face detection
Security by user through application to lock/unlock machine by face detection
Effective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID Tags
IRJET- Credit Card Authentication using Facial Recognition
IRJET- Credit Card Authentication using Facial Recognition
IRJET- Object Detection in an Image using Convolutional Neural Network
IRJET- Object Detection in an Image using Convolutional Neural Network
IRJET- Face Detection and Recognition using OpenCV
IRJET- Face Detection and Recognition using OpenCV
Smart Surveillance System through Computer Vision
Smart Surveillance System through Computer Vision
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
slot gacor bisa pakai pulsa
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
ranjana rawat
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
upamatechverse
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
ranjana rawat
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
M Maged Hegazy, LLM, MBA, CCP, P3O
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
pranjaldaimarysona
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
upamatechverse
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
ranjana rawat
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Recently uploaded
(20)
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Automated Criminal Identification Using Face Detection and Recognition
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 910 Automated Criminal Identification System using Face Detection and Recognition Piyush Chhoriya UG Scholar, Computer Engineering Department, K. K. Wagh Institute of Engineering Education & Research, Nashik-422003, Maharashtra, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - As the world has seen exponential advancement over the last decade, there is an abnormal increase inthe crimerate and also the number of criminals are increasing at an alarming rate, this leads toward a great concern about the security issues. various causes of theft, stealing crimes, burglary, kidnapping, human trafficking etc. are left unsolved because the availability of police personnel is limited, many times there is no identification of the person who was involved in criminal activities. To avoid this situation an automated facial recognition system for criminal identification is proposed using Haar feature-based cascade classifier. This paper presents a real-time face recognition using an automated surveillance camera. This system will be able to detect and recognize face automatically in real-time. Key Words: Criminal Identification, Facial recognition, Haar Classifier, Real-time, Viola-jones. 1. INTRODUCTION The face is crucial for human identity. It is the feature which best distinguishes a person. Face detection and recognition is the technology which is used to identify a person from a video or image. The whole Face Detection and Recognitionprocesscanbe divided into four major steps: Fig.1 Face Detection and Recognition process In this paper, we propose a face detection and recognition system for criminal identification using python along with OpenCV package. The proposed system consists of 4 steps: (1) Training of images (2) Face detection using Haar cascade classifier (3) comparison of trained images with images captured from the surveillance camera (4)result based on the comparison. 2. METHODOLOGY: In this project, we can detect and recognize the faces of the criminals in a video stream obtained from a camera in real-time. The system consists of three databases. First is the citizen database, which will contain the images and unique-id of all the citizens living in that country. Second is local watch list database, which will have the images(min 10) and details(Unique-id, Name, Gender, Religion, Crimes done, etc) of each criminal who belongs to that country. Third is International watch list database, which will have the images (min 10) anddetails(Unique-id,Name,Gender, Religion,Crimesdone,etc)ofthecriminals who are not the citizens of that country. All the images are first preprocessed. Then it goes through feature extraction where Haar cascade is used. The video is captured from the surveillance camera which are converted into frames. When a face is detected in a frame, it is preprocessed. Then it goes through feature extraction where Haar cascade is used. The features of the processed real-time image is compared with the features of processed images which are stored in the citizen database. If a match is found, it is further compared with the features of images stored in a local watch list database to identify if the person is criminal or not. If
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 911 he is criminal a notification is sent to the police personnel with all the details and the time for which he was under the surveillance of the camera. If he is not a citizen of that country, it is then compared with the features of images stored in the international watch list database. If a match is found, a notification is sent to the police personnel with all the details and the time for which he was under the surveillance of the camera. If a match is not found in both the watch lists, he is innocent. Fig -2: Flowchart of proposed methodology 3. IMPLEMENTATION: 3.1 Modules required The Modules required to perform the facial recognition are cv2, image module and numpy. cv2 is the OpenCV module and contains various functions for face detection and recognition. The dataset images are in gif format and, OpenCV does not support gif format, Image module from PIL is used to read the image in grayscale format. Numpy is a python library used for scientific computing. NumPy arrays are used to store the images. 3.2 Load the detection Cascade To Load the face detection cascade the first step is to detect the face in eachframe. Oncewegettheregionofinterest containing the face in the image, we use it for training the recognizer. For the purpose of face detection, we will use the Haar Cascade provided by OpenCV. The haar cascades that come with OpenCV are located in the directory of OpenCV installation. Haar cascade frontal face default.xml is used for detecting the face. Cascade is loaded using the cv2CascadeClassifierfunctionwhich takes the path to the cascade xml file. If the xml file is in the current working directory, then the relative path is used. 3.3 Create the Face Recognizer Object The next step involves creating the face recognizer object [4]. The face recognizer object has functions like FaceRecognizer.train() to train the recognizer and FaceRecognizer.predict() to recognize a face. OpenCV currently provides Video surveillance Frames Pre-processing Feature Extraction Matching Citizen Database Local watch-list Database International watch-list Database Matching Matching Criminal Innocent Criminal Innocent Notification Notification Pre- processed images Unique- id Pre- processed images Details Pre- processed images Details No NoYes Yes No Yes
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 912 Eigenface Recognizer, Fisherface Recognizer and Local Binary Patterns Histograms(LBPH)FaceRecognizer[4]. Wehaveused LBPH recognizer because Real life isn’t perfect. We simply can’t guarantee perfect light settings in your images or10 different images of a person. LBPH focus on extracting local features from images. The idea is to not look at the whole image as a high- dimensional vector but describe only local features of an object. The basic idea of Local Binary Patterns is to summarize the local structure in an image by comparing each pixel with its neighbourhood. 3.4 Perform the training 3.5 Perform Testing 4. HAAR CASCEDE CLASSIFIER The face detection algorithm proposed by Viola and Jones is used as the basis of our design [1]. The face detection algorithm looks for specific Haar features and not pixels of a human face. This method consists of four steps- 4.1 Haar Feature Selection After the tremendous amount of training data (in the form of images) is fed into the system, the classifier begins by extracting Haar features from each image. Haar features are kind of convolutionkernelswhichprimarilydetect whethera suitablefeature is present on an image or not. Some examples of Haar features are mentioned below: These Haar Features are like windows and are placed upon images to compute a single feature. The feature is essentially a single value obtained by subtracting the sum of the pixels under the white region and that under the black. The process canbe easily visualized in the example below. For demonstration purpose, let's say we are only extracting two features, hence we have only two windows here. The first feature relies on the point that the eye region is darker than theadjacentcheeksandnoseregion.Thesecondfeaturefocuseson the fact that eyes are kind of darker as compared to the bridge of the nose. Thus, when the feature window moves over the eyes, it will calculate a single value. This value will then be compared to somethresholdandifitpassesthatitwill concludethat there is an edge here or some positive feature. 4.2 Creating Integral Images The algorithm proposed by Viola-Jones uses a 24X24 base window size, and that would result in more than 180,000 features being calculated in this window. Imagine calculating the pixel difference for all the features. The solution devised for this computationally intensive process is to go for the Integral Image concept. The integral image means thattofindthe sumofall pixels under any rectangle, we simply need the four corner values.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 913 This means, to calculate the sum of pixels in any feature window, we do not need to sum them up individually. All weneedisto calculate the integral image using the 4 corner values. 4.3 Adaboost training As pointed out above, more than 180,000 features values result within a 24X24 window. However, not all features are useful for identifying a face. To only select the best feature out of the entire chunk, a machine learning algorithm called Adaboost is used [2]. What it essentially does is that it selects only those features that help to improve the classifier accuracy. It does so by constructing a strong classifier which is a linear combination of several weak classifiers. This reduces the amount of features drastically to around 6000 from around 180,000. 4.4 Cascading Classifier Another way by which Viola Jones ensured that the algorithm performs fast is by employing a cascade of classifiers [3]. The cascade classifier essentially consists of stages where each stage consists of a strong classifier. This is beneficial since it eliminates the need to apply all features at once on a window. Rather, it groupsthefeatures intoseparatesub-windowsandthe classifier at each stage determines whether or not the sub-window is a face. In case it isnot,thesub-windowisdiscardedalong with the features in that window. If the sub-window moves past the classifier, it continues to the next stage where the second stage of features is applied. The process can be understood with the help of the diagram below. 3. CONCLUSION In this project, we can detect and recognize faces of the criminals in a video stream obtained from a camera in real time. We have used Haar feature-based cascade classifiers in OpenCV approach for face detection. It is a machine learning based approach where a cascade function is trained from a lot of positive and negative images. It is then used to detect objects in other images. Also, we have used Local Binary Patterns Histograms (LBPH) for face recognition. Several advantages of this algorithm are: Efficient selection of features, Scale and location invariant detector, instead of scaling the image itself, wescale the features. LBPH recognizer can recognize faces in different lighting conditions with highaccuracy.Also,LBPHcanrecognize efficiently even if single training image is used for each person. The real-timeautomatedfacedetectionandrecognitionsystem proposed would be ideal for crowd surveillance applications.
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 10 | Oct 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 914 REFERENCES [1] Viola, P. and Jones, M. Rapid object detection using boosted cascade of simple features. IEEE Conference on Computer Vision and Pattern Recognition, 2001. [2] Hui-Xing, J., Yu-Jin, Z.: Fast Adaboost Training Algorithm by Dynamic Weight Trimming. Chinese Journal of Computers (2009) [3] https://en.wikipedia.org/wiki/Cascading_classifiers [4] https://docs.opencv.org/2.4/modules/contrib/doc/facerec/facerec_tutorial.html#local-binary-patterns-histograms [5] https://opencv.org/ [6] Apoorva.P, Impana.H.C, Siri.S.L, “Automated criminal identification by face recognition using open computer vision classifiers”, 2019 3rd International Conference on Computing Methodologies and Communication (ICCMC) [7] http://docs.opencv.org/trunk/d7/d8b/tutorial_py_face_detection.html [8] Piyush Kakkar, Vibhor Sharma, “Criminal identification system using Face Detection and Recognition ”, IJARCCE, Vol. 7,issue 3, March 2018
Download now