SlideShare a Scribd company logo
AUTOMATED CRIMINAL IDENTIFICATION SYSTEM
USING FACE DETECTION AND RECOGNITION
Presented by : Under The Guidance Of :
CONTENTS
• ABSTRACT
• INTRODUCTION
• LITERATURE SURVEY
• PROPOSED METHOD
• BLOCK DIAGRAM
• SYSTEM REQUIREMENTS
• REFERENCES
ABSTRACT
As the world has seen exponential advancement over the last decade, there is an
abnormal increase in the crime rate and also the number of criminals are
increasing at an alarming rate, this leads toward a great concern about the
security issues. various causes of theft, stealing crimes, burglary, kidnapping,
human trafficking etc. are left unsolved because the availability of police
personnel is limited, many times there is no identification of the person who was
involved in criminal activities. To avoid this situation an automated facial
recognition system for criminal identification is proposed using Haar feature-
based cascade classifier. This paper presents a real-time face recognition using an
automated surveillance camera. This system will be able to detect and recognize
face automatically in real-time.
INTRODUCTION
• The face is crucial for human identity. It is the feature which best distinguishes a person. Face detection and
recognition is the technology which is used to identify a person from a video or image.
• we propose a face detection and recognition system for criminal identification using python along with
OpenCV package.
• Most of the common facial recognition techniques include target matching method, geometric feature
recognition method, and principal component analysis method and so on.
• Most of the criminals are mingled with us in our society and they are much hard to identify.
• Traditionally, repeated criminals are identified by their biometrics such as thumbprint. But criminals are
smart enough to not to leave their biometrics in crime scene.
• In developed countries, the government create dataset which is helpful for recognize the human face which
compares the suspicious act with trained dataset and information stored in database.
• Face recognition system built by using Principal Component Analysis (PCA) method. The two main
disadvantages of using the PCA method are that computational complexity is high and it can only process
the faces that have similar facial expressions.
• This technology is a widely used biometrics system for authentication, authorization, verification and
identification.
• Applying principal component analysis for finding distinguishable features from many images to get the
similarity for the target image.
LITERATURE SURVEY
SL.NO YEAR AUTHOR TITLE METHODOLOGY
1. 2017 Nurul Azma
Abdullah, Md.
Jamri Saidi and
Nurul Hidayah Ab
Rahman “
Face recognition for criminal
identification.
An implementation of principal
component analysis for face
recognition.
2. 2019 Apoorva.P,
Ramesh.B and
Varshitha.M.R “
Automatic face recognition. Automated criminal identification
by face recognition using open
computer vision classifiers.
3. 2018 Rasanayagam,
K.Kumarasiri,
S.D.D, Tharuka,
W. A. D.
Samaranayake, N.
Samarasinghe
and P.
Siriwardana
CIS : An Automated Criminal
Identification System.
Recognition with deep learning
approach based on Convolution
Neural Network (CNN) technique.
4. 2018 Mantoro, T., Ayu, Multi face recognition. Multi-Faces Recognition Process
5. 2018 Chang L , Yang J, Li S, Xu H,
Liu K & Huan, C.
Based on stacked conventional and
sparse representation.
Face Recognition Based
on Stacked Convolutional
Auto encoder and Sparse
Representation.
6. 2018 MING Ju-wang Intelligent image Face Feature Dynamic
Recognition Method
Based on Intelligent Image
7. 2015 Mohd Yusuf Firoz Siddiqui
and Sukesha
Face Recognition using Original and
Symmetrical Face Images.
Based on symmetrical and
mirror images by
reflecting the original face
using Principal
Component Analysis and
some fusion techniques.
8. 2015 Hyung-Il Kim, Seung Ho Lee,
and Yong Man R
Improved face recognition Face Image Assessment
Learned With Objective
and Relative Face Image
Qualities for Improved
Face Recognition
9. 2018 iyush Kakkar, Mr. Vibhor
Sharma
Using face detection recognition Criminal Identification
System Using Face
Detection and Recognition
METHODOLOGY
In this project, we can detect and recognize the faces of the criminals in a video stream obtained from a
camera in real-time. The system consists of three databases. First is the citizen database, which will
contain the images and unique-id of all the citizens living in that country. Second is local watch list
database, which will have the images(min 10) and details(Unique-id, Name, Gender, Religion, Crimes
done) etc. of each criminal who belongs to that country. Third is International watch list database, which
will have the images (min 10) and details(Unique-id, Name, Gender, Religion, Crimes done) etc. of the
criminals who are not the citizens of that country. All the images are first preprocessed. Then it goes
through feature extraction where Haar cascade is used. The video is captured from the surveillance
camera which are converted into frames. When a face is detected in a frame, it is preprocessed. Then it
goes through feature extraction where Haar cascade is used. The features of the processed real-time
image is compared with the features of processed images which are stored in the citizen database. If a
match is found, it is further compared with the features of images stored in a local watch list database to
identify if the person is criminal or not. If he is criminal a notification is sent to the police personnel with
all the details and the time for which he was under the surveillance of the camera. If he is not a citizen of
that country, it is then compared with the features of images stored in the international watch list
database. If a match is found, a notification is sent to the police personnel with all the details and the
time for which he was under the surveillance of the camera. If a match is not found in both the watch
lists, he is innocent.
SYSTEM REQUIREMENTS
software used
• Google fire base
• Python language
• MIT app
• Open CV
• Face detector camera
DIAGRAM
Google
fire base MIT app
camera
PROPOSED METHOD
• In this project, we can detect and recognize the faces of the criminals in a video stream obtained from a
camera in real-time. The system consists of three databases
• First is the citizen database, which will contain the images and unique-id of all the citizens living in that
country.
• Second is local watch list database, which will have the images (min 10) and of each criminal who
belongs to that country.
• Third is International watch list database, which will have the images (min 10) and details(Unique-id,
Name, Gender, Religion, Crimes done, etc) of the criminals who are not the citizens of that country.
• Open CV module and contains various functions for face detection and recognition.
• Then it goes through feature extraction where Haar cascade is used. The features of the processed real-
time image is compared with the features of processed images which are stored in the Google fire base.
• If a match is found, it is further compared with the features of images stored in a local watch list of
google fire base to identify if the person is criminal or not.
• Andriod app is used to get notification and details.
• If he is criminal a notification is sent to the mobile app with all the details and the time for which he
was under the surveillance of the camera.
• If a match is not found in both the watch lists, he is innocent.
REFERENCES
• 1] Nurul Azma Abdullah, Md. Jamri Saidi and Nurul Hidayah Ab Rahman “Face recognition for criminal
identification: An implementation of principal component analysis for face recognition”The 2nd
International Conference on Applied Science and Technology 2017 (ICAST’17)
• [2] Apoorva.P, Ramesh.B and Varshitha.M.R “Automated criminal identification by face recognition using
open computer vision classifiers” Third International Conference on Computing Methodologies and
Communication (ICCMC 2019).
• [3] Rasanayagam, K.Kumarasiri, S.D.D, Tharuka, W. A. D. Samaranayake, N. Samarasinghe and P.
Siriwardana “CIS: An Automated Criminal Identification System”. 2018 IEEE International Conference on
Information and Automation for Sustainability (ICIAfS)R. Nicole, “Title of paper with only first word
capitalized,” J. Name Stand. Abbrev., in press.
• [4] Mantoro, T., Ayu, M. A., & Suhendi. (2018).” Multi-Faces Recognition Process Using Haar Cascades and
Eigenface Methods” 2018 6th International Conference on Multimedia Computing and Systems (ICMCS).
• [5] Chang L , Yang J, Li S, Xu H, Liu K & Huan, C. (2018). ”Face Recognition Based on Stacked Convolutional
Autoencoder and Sparse Representation”. 2018 IEEE 23rd International Conference on Digital Signal
Processing (DSP).
• [6] MING Ju-wang (2018), “Face Feature Dynamic Recognition Method Based on Intelligent Image”.
International Conference on Virtual Reality and Intelligent Systems
[7] Mohd Yusuf Firoz Siddiqui and Sukesha (2015), “Face Recognition using Original and Symmetrical Face
Images”. 1st International Conference on Next Generation Computing Technologies (NGCT-2015)
[8] Hyung-Il Kim, Seung Ho Lee, and Yong Man R (2015), “Face Image Assessment Learned With Objective
and Relative Face Image Qualities for Improved Face Recognition.
[9] Piyush Kakkar, Mr. Vibhor Sharma (2018) “Criminal Identification System Using Face Detection and
Recognition”. International Journal of Advanced Research in Computer and Communication Engineering
[10] Lamiaa A. Elrefaei, Alaa Alharthi, Huda Alamoudi, Shatha Almutairi (2017) “Real-time Face Detection
and Tracking on Mobile Phones for Criminal Detection”.
THANK YOU

More Related Content

What's hot

Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
ranjit banshpal
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
Divya Sushma
 
Face detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedFace detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 edited
Santu Chall
 
Face recognization using artificial nerual network
Face recognization using artificial nerual networkFace recognization using artificial nerual network
Face recognization using artificial nerual network
Dharmesh Tank
 
Face recognition using artificial neural network
Face recognition using artificial neural networkFace recognition using artificial neural network
Face recognition using artificial neural networkSumeet Kakani
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
Mazin Alwaaly
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
Shashidhar Reddy
 
Computer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and PythonComputer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and Python
Akash Satamkar
 
Hand Gesture Recognition using Neural Network
Hand Gesture Recognition using Neural NetworkHand Gesture Recognition using Neural Network
Hand Gesture Recognition using Neural Network
Bhagwat Singh Rathore
 
Automatic Attendance Using Face Recognition
Automatic Attendance Using Face RecognitionAutomatic Attendance Using Face Recognition
Automatic Attendance Using Face Recognition
rahulmonikasharma
 
Face detection By Abdul Hanan
Face detection By Abdul HananFace detection By Abdul Hanan
Face detection By Abdul Hanan
Abdul Hanan
 
Face detection ppt
Face detection pptFace detection ppt
Face detection ppt
Pooja R
 
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII
 
Face recognisation system
Face recognisation systemFace recognisation system
Face recognisation system
Saumya Ranjan Behura
 
Face detection presentation slide
Face detection  presentation slideFace detection  presentation slide
Face detection presentation slide
Sanjoy Dutta
 
Image recognition
Image recognitionImage recognition
Image recognition
Aseed Usmani
 
FACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTFACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPT
Saghir Hussain
 
Face recognition attendance system
Face recognition attendance systemFace recognition attendance system
Face recognition attendance system
mohanaprasad_v
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
Pushkar Dutt
 

What's hot (20)

Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
 
Face detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 editedFace detection and recognition using surveillance camera2 edited
Face detection and recognition using surveillance camera2 edited
 
Face recognization using artificial nerual network
Face recognization using artificial nerual networkFace recognization using artificial nerual network
Face recognization using artificial nerual network
 
Face recognition using artificial neural network
Face recognition using artificial neural networkFace recognition using artificial neural network
Face recognition using artificial neural network
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
 
Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Computer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and PythonComputer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and Python
 
Hand Gesture Recognition using Neural Network
Hand Gesture Recognition using Neural NetworkHand Gesture Recognition using Neural Network
Hand Gesture Recognition using Neural Network
 
Automatic Attendance Using Face Recognition
Automatic Attendance Using Face RecognitionAutomatic Attendance Using Face Recognition
Automatic Attendance Using Face Recognition
 
Face detection By Abdul Hanan
Face detection By Abdul HananFace detection By Abdul Hanan
Face detection By Abdul Hanan
 
Face detection ppt
Face detection pptFace detection ppt
Face detection ppt
 
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
 
Face recognisation system
Face recognisation systemFace recognisation system
Face recognisation system
 
Face detection presentation slide
Face detection  presentation slideFace detection  presentation slide
Face detection presentation slide
 
Image recognition
Image recognitionImage recognition
Image recognition
 
FACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPTFACE RECOGNITION SYSTEM PPT
FACE RECOGNITION SYSTEM PPT
 
Face recognition attendance system
Face recognition attendance systemFace recognition attendance system
Face recognition attendance system
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 

Similar to 418 Automated Criminal Identification System using Face Detection and.pptx

Biometric Facial Recognition
Biometric Facial RecognitionBiometric Facial Recognition
Biometric Facial Recognition
Jennifer York
 
Survey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningSurvey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine Learning
IRJET Journal
 
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCE
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCECRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCE
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCE
vivatechijri
 
IRJET - Android based Application – Missing Person
IRJET -  	  Android based Application – Missing PersonIRJET -  	  Android based Application – Missing Person
IRJET - Android based Application – Missing Person
IRJET Journal
 
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AICRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
IRJET Journal
 
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
IJARIIT
 
Digital Ethics for Biometric Applications in a Smart City
Digital Ethics for Biometric Applications in a Smart CityDigital Ethics for Biometric Applications in a Smart City
Digital Ethics for Biometric Applications in a Smart City
Araz Taeihagh
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face Identification
IRJET Journal
 
Image Based Facial Recognition
Image Based Facial RecognitionImage Based Facial Recognition
Image Based Facial Recognition
ijtsrd
 
Facial Recognition System
Facial Recognition SystemFacial Recognition System
Facial Recognition SystemArun ACE
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
hyacinthshackley2629
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data mining
Venkat Projects
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data mining
Venkat Projects
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by Rohit
Rohit Shrivastava
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By Rohit
Rohit Shrivastava
 
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS .docx
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS          .docxRunning Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS          .docx
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS .docx
todd271
 
Comparative Analysis of Face Recognition Methodologies and Techniques
Comparative Analysis of Face Recognition Methodologies and TechniquesComparative Analysis of Face Recognition Methodologies and Techniques
Comparative Analysis of Face Recognition Methodologies and Techniques
Farwa Ansari
 
IRJET- Public Crime Reporting and Monitoring System Model using SDM
IRJET- Public Crime Reporting and Monitoring System Model using SDMIRJET- Public Crime Reporting and Monitoring System Model using SDM
IRJET- Public Crime Reporting and Monitoring System Model using SDM
IRJET Journal
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
Dhimankomal
 

Similar to 418 Automated Criminal Identification System using Face Detection and.pptx (20)

Biometric Facial Recognition
Biometric Facial RecognitionBiometric Facial Recognition
Biometric Facial Recognition
 
Survey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningSurvey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine Learning
 
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCE
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCECRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCE
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCE
 
IRJET - Android based Application – Missing Person
IRJET -  	  Android based Application – Missing PersonIRJET -  	  Android based Application – Missing Person
IRJET - Android based Application – Missing Person
 
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AICRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
 
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
 
Digital Ethics for Biometric Applications in a Smart City
Digital Ethics for Biometric Applications in a Smart CityDigital Ethics for Biometric Applications in a Smart City
Digital Ethics for Biometric Applications in a Smart City
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face Identification
 
Image Based Facial Recognition
Image Based Facial RecognitionImage Based Facial Recognition
Image Based Facial Recognition
 
Facial Recognition System
Facial Recognition SystemFacial Recognition System
Facial Recognition System
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data mining
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data mining
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by Rohit
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By Rohit
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
 
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS .docx
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS          .docxRunning Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS          .docx
Running Head CRIMINOLOGY USE OF COMPUTER APPLICATIONS .docx
 
Comparative Analysis of Face Recognition Methodologies and Techniques
Comparative Analysis of Face Recognition Methodologies and TechniquesComparative Analysis of Face Recognition Methodologies and Techniques
Comparative Analysis of Face Recognition Methodologies and Techniques
 
IRJET- Public Crime Reporting and Monitoring System Model using SDM
IRJET- Public Crime Reporting and Monitoring System Model using SDMIRJET- Public Crime Reporting and Monitoring System Model using SDM
IRJET- Public Crime Reporting and Monitoring System Model using SDM
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
 

Recently uploaded

一比一原版(UCSB毕业证)圣塔芭芭拉社区大学毕业证如何办理
一比一原版(UCSB毕业证)圣塔芭芭拉社区大学毕业证如何办理一比一原版(UCSB毕业证)圣塔芭芭拉社区大学毕业证如何办理
一比一原版(UCSB毕业证)圣塔芭芭拉社区大学毕业证如何办理
aozcue
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证如何办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证如何办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证如何办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证如何办理
aozcue
 
欧洲杯冠军-欧洲杯冠军网站-欧洲杯冠军|【​网址​🎉ac123.net🎉​】领先全球的买球投注平台
欧洲杯冠军-欧洲杯冠军网站-欧洲杯冠军|【​网址​🎉ac123.net🎉​】领先全球的买球投注平台欧洲杯冠军-欧洲杯冠军网站-欧洲杯冠军|【​网址​🎉ac123.net🎉​】领先全球的买球投注平台
欧洲杯冠军-欧洲杯冠军网站-欧洲杯冠军|【​网址​🎉ac123.net🎉​】领先全球的买球投注平台
andreassenrolf537
 
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR - Slides Onl...
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR - Slides Onl...Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR - Slides Onl...
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR - Slides Onl...
Peter Gallagher
 
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
PinkySharma900491
 
web-tech-lab-manual-final-abhas.pdf. Jer
web-tech-lab-manual-final-abhas.pdf. Jerweb-tech-lab-manual-final-abhas.pdf. Jer
web-tech-lab-manual-final-abhas.pdf. Jer
freshgammer09
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证如何办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证如何办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证如何办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证如何办理
peuce
 

Recently uploaded (7)

一比一原版(UCSB毕业证)圣塔芭芭拉社区大学毕业证如何办理
一比一原版(UCSB毕业证)圣塔芭芭拉社区大学毕业证如何办理一比一原版(UCSB毕业证)圣塔芭芭拉社区大学毕业证如何办理
一比一原版(UCSB毕业证)圣塔芭芭拉社区大学毕业证如何办理
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证如何办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证如何办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证如何办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证如何办理
 
欧洲杯冠军-欧洲杯冠军网站-欧洲杯冠军|【​网址​🎉ac123.net🎉​】领先全球的买球投注平台
欧洲杯冠军-欧洲杯冠军网站-欧洲杯冠军|【​网址​🎉ac123.net🎉​】领先全球的买球投注平台欧洲杯冠军-欧洲杯冠军网站-欧洲杯冠军|【​网址​🎉ac123.net🎉​】领先全球的买球投注平台
欧洲杯冠军-欧洲杯冠军网站-欧洲杯冠军|【​网址​🎉ac123.net🎉​】领先全球的买球投注平台
 
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR - Slides Onl...
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR - Slides Onl...Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR - Slides Onl...
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR - Slides Onl...
 
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
 
web-tech-lab-manual-final-abhas.pdf. Jer
web-tech-lab-manual-final-abhas.pdf. Jerweb-tech-lab-manual-final-abhas.pdf. Jer
web-tech-lab-manual-final-abhas.pdf. Jer
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证如何办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证如何办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证如何办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证如何办理
 

418 Automated Criminal Identification System using Face Detection and.pptx

  • 1. AUTOMATED CRIMINAL IDENTIFICATION SYSTEM USING FACE DETECTION AND RECOGNITION Presented by : Under The Guidance Of :
  • 2. CONTENTS • ABSTRACT • INTRODUCTION • LITERATURE SURVEY • PROPOSED METHOD • BLOCK DIAGRAM • SYSTEM REQUIREMENTS • REFERENCES
  • 3. ABSTRACT As the world has seen exponential advancement over the last decade, there is an abnormal increase in the crime rate and also the number of criminals are increasing at an alarming rate, this leads toward a great concern about the security issues. various causes of theft, stealing crimes, burglary, kidnapping, human trafficking etc. are left unsolved because the availability of police personnel is limited, many times there is no identification of the person who was involved in criminal activities. To avoid this situation an automated facial recognition system for criminal identification is proposed using Haar feature- based cascade classifier. This paper presents a real-time face recognition using an automated surveillance camera. This system will be able to detect and recognize face automatically in real-time.
  • 4. INTRODUCTION • The face is crucial for human identity. It is the feature which best distinguishes a person. Face detection and recognition is the technology which is used to identify a person from a video or image. • we propose a face detection and recognition system for criminal identification using python along with OpenCV package. • Most of the common facial recognition techniques include target matching method, geometric feature recognition method, and principal component analysis method and so on. • Most of the criminals are mingled with us in our society and they are much hard to identify. • Traditionally, repeated criminals are identified by their biometrics such as thumbprint. But criminals are smart enough to not to leave their biometrics in crime scene. • In developed countries, the government create dataset which is helpful for recognize the human face which compares the suspicious act with trained dataset and information stored in database. • Face recognition system built by using Principal Component Analysis (PCA) method. The two main disadvantages of using the PCA method are that computational complexity is high and it can only process the faces that have similar facial expressions. • This technology is a widely used biometrics system for authentication, authorization, verification and identification. • Applying principal component analysis for finding distinguishable features from many images to get the similarity for the target image.
  • 5. LITERATURE SURVEY SL.NO YEAR AUTHOR TITLE METHODOLOGY 1. 2017 Nurul Azma Abdullah, Md. Jamri Saidi and Nurul Hidayah Ab Rahman “ Face recognition for criminal identification. An implementation of principal component analysis for face recognition. 2. 2019 Apoorva.P, Ramesh.B and Varshitha.M.R “ Automatic face recognition. Automated criminal identification by face recognition using open computer vision classifiers. 3. 2018 Rasanayagam, K.Kumarasiri, S.D.D, Tharuka, W. A. D. Samaranayake, N. Samarasinghe and P. Siriwardana CIS : An Automated Criminal Identification System. Recognition with deep learning approach based on Convolution Neural Network (CNN) technique. 4. 2018 Mantoro, T., Ayu, Multi face recognition. Multi-Faces Recognition Process
  • 6. 5. 2018 Chang L , Yang J, Li S, Xu H, Liu K & Huan, C. Based on stacked conventional and sparse representation. Face Recognition Based on Stacked Convolutional Auto encoder and Sparse Representation. 6. 2018 MING Ju-wang Intelligent image Face Feature Dynamic Recognition Method Based on Intelligent Image 7. 2015 Mohd Yusuf Firoz Siddiqui and Sukesha Face Recognition using Original and Symmetrical Face Images. Based on symmetrical and mirror images by reflecting the original face using Principal Component Analysis and some fusion techniques. 8. 2015 Hyung-Il Kim, Seung Ho Lee, and Yong Man R Improved face recognition Face Image Assessment Learned With Objective and Relative Face Image Qualities for Improved Face Recognition 9. 2018 iyush Kakkar, Mr. Vibhor Sharma Using face detection recognition Criminal Identification System Using Face Detection and Recognition
  • 7. METHODOLOGY In this project, we can detect and recognize the faces of the criminals in a video stream obtained from a camera in real-time. The system consists of three databases. First is the citizen database, which will contain the images and unique-id of all the citizens living in that country. Second is local watch list database, which will have the images(min 10) and details(Unique-id, Name, Gender, Religion, Crimes done) etc. of each criminal who belongs to that country. Third is International watch list database, which will have the images (min 10) and details(Unique-id, Name, Gender, Religion, Crimes done) etc. of the criminals who are not the citizens of that country. All the images are first preprocessed. Then it goes through feature extraction where Haar cascade is used. The video is captured from the surveillance camera which are converted into frames. When a face is detected in a frame, it is preprocessed. Then it goes through feature extraction where Haar cascade is used. The features of the processed real-time image is compared with the features of processed images which are stored in the citizen database. If a match is found, it is further compared with the features of images stored in a local watch list database to identify if the person is criminal or not. If he is criminal a notification is sent to the police personnel with all the details and the time for which he was under the surveillance of the camera. If he is not a citizen of that country, it is then compared with the features of images stored in the international watch list database. If a match is found, a notification is sent to the police personnel with all the details and the time for which he was under the surveillance of the camera. If a match is not found in both the watch lists, he is innocent.
  • 8. SYSTEM REQUIREMENTS software used • Google fire base • Python language • MIT app • Open CV • Face detector camera
  • 10. PROPOSED METHOD • In this project, we can detect and recognize the faces of the criminals in a video stream obtained from a camera in real-time. The system consists of three databases • First is the citizen database, which will contain the images and unique-id of all the citizens living in that country. • Second is local watch list database, which will have the images (min 10) and of each criminal who belongs to that country. • Third is International watch list database, which will have the images (min 10) and details(Unique-id, Name, Gender, Religion, Crimes done, etc) of the criminals who are not the citizens of that country. • Open CV module and contains various functions for face detection and recognition. • Then it goes through feature extraction where Haar cascade is used. The features of the processed real- time image is compared with the features of processed images which are stored in the Google fire base. • If a match is found, it is further compared with the features of images stored in a local watch list of google fire base to identify if the person is criminal or not. • Andriod app is used to get notification and details. • If he is criminal a notification is sent to the mobile app with all the details and the time for which he was under the surveillance of the camera. • If a match is not found in both the watch lists, he is innocent.
  • 11. REFERENCES • 1] Nurul Azma Abdullah, Md. Jamri Saidi and Nurul Hidayah Ab Rahman “Face recognition for criminal identification: An implementation of principal component analysis for face recognition”The 2nd International Conference on Applied Science and Technology 2017 (ICAST’17) • [2] Apoorva.P, Ramesh.B and Varshitha.M.R “Automated criminal identification by face recognition using open computer vision classifiers” Third International Conference on Computing Methodologies and Communication (ICCMC 2019). • [3] Rasanayagam, K.Kumarasiri, S.D.D, Tharuka, W. A. D. Samaranayake, N. Samarasinghe and P. Siriwardana “CIS: An Automated Criminal Identification System”. 2018 IEEE International Conference on Information and Automation for Sustainability (ICIAfS)R. Nicole, “Title of paper with only first word capitalized,” J. Name Stand. Abbrev., in press. • [4] Mantoro, T., Ayu, M. A., & Suhendi. (2018).” Multi-Faces Recognition Process Using Haar Cascades and Eigenface Methods” 2018 6th International Conference on Multimedia Computing and Systems (ICMCS). • [5] Chang L , Yang J, Li S, Xu H, Liu K & Huan, C. (2018). ”Face Recognition Based on Stacked Convolutional Autoencoder and Sparse Representation”. 2018 IEEE 23rd International Conference on Digital Signal Processing (DSP). • [6] MING Ju-wang (2018), “Face Feature Dynamic Recognition Method Based on Intelligent Image”. International Conference on Virtual Reality and Intelligent Systems
  • 12. [7] Mohd Yusuf Firoz Siddiqui and Sukesha (2015), “Face Recognition using Original and Symmetrical Face Images”. 1st International Conference on Next Generation Computing Technologies (NGCT-2015) [8] Hyung-Il Kim, Seung Ho Lee, and Yong Man R (2015), “Face Image Assessment Learned With Objective and Relative Face Image Qualities for Improved Face Recognition. [9] Piyush Kakkar, Mr. Vibhor Sharma (2018) “Criminal Identification System Using Face Detection and Recognition”. International Journal of Advanced Research in Computer and Communication Engineering [10] Lamiaa A. Elrefaei, Alaa Alharthi, Huda Alamoudi, Shatha Almutairi (2017) “Real-time Face Detection and Tracking on Mobile Phones for Criminal Detection”.