Submit Search
Upload
Criminal Face Identification
•
0 likes
•
60 views
IRJET Journal
Follow
https://www.irjet.net/archives/V9/i5/IRJET-V9I5726.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 5
Download now
Download to read offline
Recommended
Person Acquisition and Identification Tool
Person Acquisition and Identification Tool
IRJET Journal
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCV
IRJET Journal
IRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using Android
IRJET Journal
Attendance System using Face Recognition
Attendance System using Face Recognition
IRJET Journal
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET Journal
ATTENDANCE BY FACE RECOGNITION USING AI
ATTENDANCE BY FACE RECOGNITION USING AI
IRJET Journal
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITION
Lisa Cain
Facial Recognition and Detection Technical Review
Facial Recognition and Detection Technical Review
Tkeyah Anderson
Recommended
Person Acquisition and Identification Tool
Person Acquisition and Identification Tool
IRJET Journal
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCV
IRJET Journal
IRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using Android
IRJET Journal
Attendance System using Face Recognition
Attendance System using Face Recognition
IRJET Journal
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET Journal
ATTENDANCE BY FACE RECOGNITION USING AI
ATTENDANCE BY FACE RECOGNITION USING AI
IRJET Journal
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITION
Lisa Cain
Facial Recognition and Detection Technical Review
Facial Recognition and Detection Technical Review
Tkeyah Anderson
IRJET-A Survey on Face Recognition based Security System and its Applications
IRJET-A Survey on Face Recognition based Security System and its Applications
IRJET Journal
Comparative Analysis of Face Recognition Methodologies and Techniques
Comparative Analysis of Face Recognition Methodologies and Techniques
Farwa Ansari
Smart Doorbell System Based on Face Recognition
Smart Doorbell System Based on Face Recognition
IRJET Journal
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
ijceronline
Facial Expression Identification System
Facial Expression Identification System
IRJET Journal
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET Journal
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
IRJET Journal
A survey paper on various biometric security system methods
A survey paper on various biometric security system methods
IRJET Journal
IRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe Model
IRJET Journal
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
ijiert bestjournal
G041041047
G041041047
ijceronline
Face Recognition System
Face Recognition System
StudentRocks
IRJET - Real Time Facial Analysis using Tensorflowand OpenCV
IRJET - Real Time Facial Analysis using Tensorflowand OpenCV
IRJET Journal
Face Recognition Based Payment Processing System
Face Recognition Based Payment Processing System
IRJET Journal
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AM Publications
IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...
IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...
IRJET Journal
Attendance management system using face recognition
Attendance management system using face recognition
IAESIJAI
IRJET - Emotionalizer : Face Emotion Detection System
IRJET - Emotionalizer : Face Emotion Detection System
IRJET Journal
IRJET- Emotionalizer : Face Emotion Detection System
IRJET- Emotionalizer : Face Emotion Detection System
IRJET Journal
IRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face Recognition
IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
More Related Content
Similar to Criminal Face Identification
IRJET-A Survey on Face Recognition based Security System and its Applications
IRJET-A Survey on Face Recognition based Security System and its Applications
IRJET Journal
Comparative Analysis of Face Recognition Methodologies and Techniques
Comparative Analysis of Face Recognition Methodologies and Techniques
Farwa Ansari
Smart Doorbell System Based on Face Recognition
Smart Doorbell System Based on Face Recognition
IRJET Journal
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
ijceronline
Facial Expression Identification System
Facial Expression Identification System
IRJET Journal
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET Journal
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
IRJET Journal
A survey paper on various biometric security system methods
A survey paper on various biometric security system methods
IRJET Journal
IRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe Model
IRJET Journal
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
ijiert bestjournal
G041041047
G041041047
ijceronline
Face Recognition System
Face Recognition System
StudentRocks
IRJET - Real Time Facial Analysis using Tensorflowand OpenCV
IRJET - Real Time Facial Analysis using Tensorflowand OpenCV
IRJET Journal
Face Recognition Based Payment Processing System
Face Recognition Based Payment Processing System
IRJET Journal
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AM Publications
IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...
IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...
IRJET Journal
Attendance management system using face recognition
Attendance management system using face recognition
IAESIJAI
IRJET - Emotionalizer : Face Emotion Detection System
IRJET - Emotionalizer : Face Emotion Detection System
IRJET Journal
IRJET- Emotionalizer : Face Emotion Detection System
IRJET- Emotionalizer : Face Emotion Detection System
IRJET Journal
IRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face Recognition
IRJET Journal
Similar to Criminal Face Identification
(20)
IRJET-A Survey on Face Recognition based Security System and its Applications
IRJET-A Survey on Face Recognition based Security System and its Applications
Comparative Analysis of Face Recognition Methodologies and Techniques
Comparative Analysis of Face Recognition Methodologies and Techniques
Smart Doorbell System Based on Face Recognition
Smart Doorbell System Based on Face Recognition
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Facial Expression Identification System
Facial Expression Identification System
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
A survey paper on various biometric security system methods
A survey paper on various biometric security system methods
IRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe Model
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
G041041047
G041041047
Face Recognition System
Face Recognition System
IRJET - Real Time Facial Analysis using Tensorflowand OpenCV
IRJET - Real Time Facial Analysis using Tensorflowand OpenCV
Face Recognition Based Payment Processing System
Face Recognition Based Payment Processing System
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...
IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...
Attendance management system using face recognition
Attendance management system using face recognition
IRJET - Emotionalizer : Face Emotion Detection System
IRJET - Emotionalizer : Face Emotion Detection System
IRJET- Emotionalizer : Face Emotion Detection System
IRJET- Emotionalizer : Face Emotion Detection System
IRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face Recognition
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
rehmti665
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
ranjana rawat
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
humanexperienceaaa
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
RajkumarAkumalla
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Asutosh Ranjan
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
upamatechverse
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
M Maged Hegazy, LLM, MBA, CCP, P3O
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
slot gacor bisa pakai pulsa
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Recently uploaded
(20)
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Criminal Face Identification
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3511 Criminal Face Identification Harsh Chaudhary, Ankit Shukla, Arusha Sharma, Alok Yadav Dr. Preeti Sharma, Dept. of information Technology, Inderprastha Engineering College, U.P, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Face Recognition/Identification has been a fast thriving, challenging and interesting domain in real time applications. A large number of face recognition algorithms have been developed in the recent decades. It has diverse application areas likesurveillance, security, entertainment etc. The software on face identification is useful in airports, banks, offices, educational institutions for screening the people who are entering and exiting these places. Most of the Countries like Germany, Australia, etcusethistechnology[1]. Authorities have placed booths for face identification at borders and customs for automating the control system for passport verification and this becomes animportantachievement in the context of ongoing covid-19 pandemic. Human face is a dynamic object that has a large degree of variability in its appearance as facial features of every individual aredifferent, and this makes face recognition a challenging and ready to improve problem in the computer vision field. As in the face recognition/identification field, accuracy and speedboth play an important role as well as it is the main issue. The goal of this paper is to evaluate different techniques of face recognition and provide a better solution forimage andvideo- based face detection with greater accuracy, better response time and a step forward in betterment of society and protection of the society. Key Words: Face, Recognition, algorithms, identification, image, software. 1.INTRODUCTION Over the years, a lot of security measures have been developed that help in holding confidential data securedand restricting the chances of a security breach.Facerecognition, which is one of the few biometric methods that acquire the merits of both high accuracy and low intrusiveness, it is a computer program that engages a person’s face to automatically identify and verify the person from a digital image or a video frame from a video source [2, 3 4]. It equates the selected facial featuresfromtheimageanda face database, or it can also be a hardware which is designed to authenticate a person. This technology is a commonly used biometrics system for authorization, authentication, verification and identification. A lot of companies have been adopting face recognition in their security cameras, access controls and many more. Facebook has been using face recognition in their website for creating a digital profile for the people using their website. In developed countries, the law enforcement creates a face database to be used with their face recognition system to compare any suspect with the database. On other hand, in Malaysia, thumbprint identification is used to identify any suspect for the case. However, because of infinite knowledge through internet usage, most criminals are informed of thumbprint identification. Therefore, they become charier of leaving a thumbprint by wearing gloves except for unpremeditated crimes.[5] A criminal record or any record consists of available distinct knowledge about an individual, it also consists of a photograph of the same. For identification of any criminal, we need to have knowledge regarding the person, which are given by witnesses. Identification can be done by using various modes like fingerprint scanning, DNA tests, etc [1]. Our paper focuses on the Face Identification method to extract information from the image of the individual and use it as a means of identification rather than any other identification method. A face identificationsystem will access the available database which consist of photographs and then compare those to the ones which it has captured or in real-time to find a match only if thematch exists. For every image, this can be done by measuring the width, height of the face, also the value of the eye colour by using various ratios, different formulas that can be used for identification of the face as well as it will help in finding the approx. age, gender, etc. also. The software will work in two phases. First is called face detection and the other is Comparison. Face detection is the ability of a machine (computer) to independently identify and extract the features of a face in an image or video. The otherphaseofthe process consists of creating a print like fingerprint, but it is of the image and then compares that imager print with available database accurately [2]. This System is used for pinpointing the criminals in spite of its location until he/she is captured by any cameras and aid government authority for further investigations. Also, we are storing these images of the criminals as a keep safe in our database along withthe personal details and we are also hell bent to keep this database at other different locations so if one gets corrupted or hacked, we can use the others which are stored at locations know to only some individuals around the world. This project intends to identify the criminal based on the existing record of the same and creating a new record if no previous record existed. 2. LITERATURE REVIEW The main purpose of research on computer vision is to develop an automated face identification system which canequally and will surpass human performance in future. This problem has been studied for the past two decades.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3512 The approaches that had been used so far can divided into two categories that is: 1) Model Based 2) Appearance Based The model based one attempts to find and mark the geometrical parametersbymeasuringthefacialpartsandthe appearance based on the intensity-basedparameterssuchas eigen coefficient for recording the face. Because of the changes in lighting, expression, etc. conditions the face of the human can be altered considerably [6]. The Face identification system is not a new field, as an early prototype whichusesfeature-basedapproachwasdeveloped over a 100 years ago by Alphonse Bertillon,ashedevelopeda system of measurement of the physical aspects of the criminals using which they can identify them. He takes photographs of separate aspects of the face like nose, eyes, chin, forehead, different profiles etc. of the criminal and stores them in his “database.” But this database was examined by humans not by computers, but still, it uses the same biometric approach that the modern recognizing system uses. These approachesare being used in object detectionsystems which also use computer vision for detection of any object and based on its featurespecifying it asaplant,ball,table,etc. Point to be noted is that face recognition isdifferentthanface detection: ● Face Detection: the main purpose in this is to findtheface i.e. Its location and size in a photograph and extract the same to be used in the recognition algorithm. ● Face Recognition: with the already extractedinformation which is also cropped, resized, and mostly converted to grayscale, this algorithm is accountable for finding the traits which can appropriately describe the image. The face recognition application can be operated in two modes: ● Verification or corroboration of the facial image: This estimates the input image with the facial image associated with the user who is requiring the corroboration. This is stated as 1x1 comparison [6]. ● Identification or Recognition of face: it compares the input image with the preloaded images in the database and aims to find the matching user. It is a 1xN comparison. 2.1 ALGORITHM There are many different types of face algorithm that exists,like [4]: ● Eigenface (1991) ● Fisherface (1997) ● Scale Invariant Feature Transform (SIFT) (1999) ● Speed Up Robust Feature Transform (SURF) ● Local Binary Pattern Histograms (LBPH) ● Etc, Each of the above-mentioned algorithms uses different approaches to extract the informationfromtheimageandfor performing the matching with the input image. However, methods used by Eigenface and Fisherfaces are mostly the sameand the sameis also true forSIFT and Surf methods [7]. ● Eigenface and Fisherfaces: Eigenface uses PCA (Principal Component Analysis) that is a dimensionality-reduction method which reduces the dimensions of thelarge datasetof images, by converting large set of variables into smaller ones but it still contains most of the info of the large dataset[8], whereas Fisherfaces uses FLD (Fisher Linear Discriminant) whose working is mostly same as Eigenface, but it works better for the classification of different aspects of the image or object[8]. ● SIFT and SURF: These methods extract the local feature points of the eyes and then classify theinvariantkeypointsin the image of the eyes and then indicate these points, create a local pattern around these points, and use them for identification. In this the KNN-Algo (K-nearest neighbor algorithm) is used for the classification purpose [9]. But for our system we are using the LBPH algorithm as we have found it to be much more efficient and has a large scope of improvement which can be done as it is easy too. ● LBPH (Local Binary Pattern Histogram): The LBP (local binary Pattern) is a simple but also very efficient texture operator as it labels the pixels of the photograph by thresholding the neighbor places of each pixel and regards the output result as a binarynumber[10].Thisalgorithmwas first stated in 1994 and till now it is recognized as the best and most powerful feature for texture classification. And further it is found that when this algorithm in combination with HOG (Histogram of Oriented Gradients) descriptor is used, its performance to detect the similarities improves for some datasets. But using the combination of LBP and histogram wecan represent the image of the face by a simple data vector. 2.2 METHODOLOGY Steps are as followed: 1. Parameters: this algorithm uses four parameters: a. Radius: radius is used to constructthelocal binarypattern in circular form and to represent radius around the central pixel. It is set to 1.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3513 b. Neighbor: it is the cluster of points that constructs the circular binary pattern. Point to note- the more sample points we include themorethecomputational costincreases. c. Grid X: the number of cells in the horizontal direction. More cells mean more finer the grid, and higher the dimensionality of the output feature vector. d. Grid Y: the number of cells in vertical direction. 2. Training: Firstly, we need to train the algorithm. And to do so, we need some training dataset that comprises the facial image of the person we want to recognize, and, in our case, we need the image of the criminal. And we also need to set an ID or some type of number for each image. 3. Applying the LBP: The first step in computation of the algo is to construct a swift image which describes the native image in a well manner, by playing up the facial features,and for doing all this the LBHP uses the concept of a sliding window, which mostly depends on the radiusandneighbour parameter. For example- 4. Histograms extraction: By using the image which was generated in the previousstep, weusetheparametersofGrid X and Y for dividing the image into multiple grids like the below given image: 5. At last, performing the recognition of face: Since the algorithm has already been trained in the previous steps. Every distinguished histogram that is created is used in the representation of each image from the training dataset. Similarly for every new image we perform the same steps. ● For finding the data of the criminal we just need to compare the input image with the histogram of every image and the which is closest is given as output. ● There are various approaches to calculate the distance between the histograms, like- Euclidean distance, cosine similarities, Manhattan distance, absolute value, chi-square, etc. Euclidean distance: Cosine similarity: Manhattan distance: Chi-square:
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3514 3. CONCLUSIONS As a result, we have developed a system that is capable of identifying, detecting, verifying the face of a criminal and showing its information after retrievingit fromthedatabase. Below are some screenshots which were taken whiletesting and training the system. In the above we are just trying to show the points or the parameters that the system is taking as a reference for making the histograms of the input image. No matter how well trained there’salwaysa scopeoferrorin Face recognition programs. Recklessly relying onthis model may turn out to be catastrophic for the Authorities. As the photographs are uploaded via the internet it makes the application severely crippled if there’s no access to the internet. Deploying and integrating this system to its fullest potential requires massive funding and research. Despite getting or having such drawbacks. Themorethis systemgets used, the more its database increases and the more useful it becomes along the line. Right now, face recognition programs are obviously far below what a human can do, but it’s also obvious that machine learning is improving every day and is already much better in some tasks than what a human can do. Therefore, it’s a plausible conclusion that facial recognition programs may someday surpass us. REFERENCES [1] Guillaumin, M., Verbeek, J.J., Schmid, C.: Is that you? metric learning approaches for face identification. In: ICCV. (2009). [2] S. H Lin, “An Introduction to Face Recognition Technology”,InformingScienceSpecial IssuesonMultimedia Informing Technologies, 3:1, (2000). [3] R. Rathi, M. Choudhary & B. Chandra, “An Application of Face Recognition System using Image Processing and Neural Networks”, International Journal Computer Technology Application, 3:1, (2012), pp. 45-49. [4] R. A. Hamid & J. A. Thom “Criteria that have an effect on users while making image relevance judgements”, in Proceedings of the fifteenth Australasian Document Computing Symposium, (2010), pp. 76-83.
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3515 [5] Nurul Azma Abdullaha,Md.JamriSaidi,Nurul HidayahAb Rahmanb, Chuah Chai Wenc, and Isredza Rahmi A. Hamidd “Face recognition for criminal identification: An implementation of principal component analysis for face recognition”,AIP Conference Proceedings 1891, 020002 (2017). [6] Adriana Kovashka Margaret Martonosi- Feature- Based Face Recognition for Identification of Criminals vs. Identification for Cashless Purchase. [7] Davis, J.V., Kulis, B., Jain, P., Sra, S., Dhillon, I.S.: Information-theoretic metric learning. In: ICML. (2007). [8] A Survey of Face Recognition TechniquesRabia Jafri*and Hamid R. Arabnia*. [9] Wang, X., Tang, X.: Bayesian face recognition using gabor features. (2003) 70–73. [10] Face Recognition with Learning-based Descriptor Zhimin Cao1 1 The ChineseUniversityofHong KongQiYin2∗ 2 ITCS, Tsinghua University Xiaoou Tang 1,3 3Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences, China Jian Sun 4 Microsoft Research Asia. [11] D. DeCarlos, D. Metaxas, and M. Stone. An anthropometric face model using variational techniques. In Computer Graphics Proceedings SIGGRAPH98,pages67–74, 1998. [12] S. DiPaola. Extending the range of facial types. Journal of Visualization and ComputerAnimation, 2(4):129–131,1991. [13] T.F. Cootes, G.J. Edwards, and C.J. Taylor. Active appearance models. In Burkhardt and Neumann, editors, Computer Vision – ECCV 98 Vol. II, Freiburg, Germany,1998. Springer, Lecture Notes in Computer Science 1407. [14] G.J. Edwards, A. Lanitis, C.J. Taylor, and T.F. Cootes. Modelling the variability in face images. In Proc. of the 2nd Int. Conf. on Automatic Face and Gesture Recognition, IEEE Comp. Soc. Press, Los Alamitos, CA, 1996. [15] Moghaddam, B., Jebara, T., Pentland, A.: Bayesian face recognition. Pattern Recognition 33 (2000) 1771–1782 [16] Phillips, P.J., Moon, H., Rizvi, S.A., Rauss, P.J.: The feret evaluation methodology for face- recognition algorithms. PAMI 22 (2000) 1090–1104 [17] Wang, X., Tang, X.: A unified framework for subspace face recognition. PAMI 26 (2004) 1222–1228 [18] Wang, X., Tang, X.: Subspace analysis using random mixture models. In: CVPR. (2005) [19] C.S. Choi, T. Okazaki, H. Harashima, and T. Takebe. A system of analyzing and synthesizing facial images. In Proc. IEEE Int. Symposium of Circuit and Systems (ISCAS91), pages 2665–2668, 1991. [20] Li, Z., Tang, X.: Bayesian face recognition using support vector machine and face clustering. In: CVPR. (2004) [21] Weinberger, K.Q., Blitzer, J., Saul, L.K.: Distance metric learning for large margin nearest neighbor classification. Volume (2005) 207–244 [22] D. Beymer, A. Shashua, and T. Poggio. Example- based image analysis and synthesis. A.I. Memo No. 1431, Artificial Intelligence Laboratory, Massachusetts Institute of Technology, 1993. [23] J. Sivic and A. Zisserman, “Video Google: A text retrieval approach to object matching in videos,” in Proc. ICCV, vol. 2, 2003, pp. 1470–1477. [24] Ying, Y., Li, P.: Distance metric learning with eigenvalue optimization. Journal of Machine Learning Research 13 (2012) 1–26 [25] Criminal Face Recognition System Alireza Chevelwalla[1] , Ajay Gurav[2] , Sachin Desai[3] , Prof. Sumitra Sadhukhan[4]DepartmentofComputerEngineering Rajiv Gandhi Institute of Technology. Versova, Andheri(W), Mumbai- 400053. [26] Rabia Jafri* and Hamid R. Arabnia* A Survey of Face Recognition Techniques. [27] Computational Vision: Archive.” 17 Mar 2005. http://www.vision.caltech.edu/htmlfiles/archive.html. [28] P.J. Burt and E.H. Adelson. Merging images through pattern decomposition. In Applications of Digital Image Processing VIII, number 575, pages 173–181. SPIE The International Society for Optical Engineering, 1985. [29] Cox, Ingemar J., Joumana Ghosn, and Peter N. Yianilos. “Feature-Based Face Recognition Using Mixture-Distance.
Download now