SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3511
Criminal Face Identification
Harsh Chaudhary, Ankit Shukla, Arusha Sharma, Alok Yadav
Dr. Preeti Sharma, Dept. of information Technology, Inderprastha Engineering College, U.P, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Face Recognition/Identification has been a fast
thriving, challenging and interesting domain in real time
applications. A large number of face recognition algorithms
have been developed in the recent decades. It has diverse
application areas likesurveillance, security, entertainment etc.
The software on face identification is useful in airports, banks,
offices, educational institutions for screening the people who
are entering and exiting these places. Most of the Countries
like Germany, Australia, etcusethistechnology[1]. Authorities
have placed booths for face identification at borders and
customs for automating the control system for passport
verification and this becomes animportantachievement in the
context of ongoing covid-19 pandemic. Human face is a
dynamic object that has a large degree of variability in its
appearance as facial features of every individual aredifferent,
and this makes face recognition a challenging and ready to
improve problem in the computer vision field. As in the face
recognition/identification field, accuracy and speedboth play
an important role as well as it is the main issue. The goal of
this paper is to evaluate different techniques of face
recognition and provide a better solution forimage andvideo-
based face detection with greater accuracy, better response
time and a step forward in betterment of society and
protection of the society.
Key Words: Face, Recognition, algorithms, identification,
image, software.
1.INTRODUCTION
Over the years, a lot of security measures have been
developed that help in holding confidential data securedand
restricting the chances of a security breach.Facerecognition,
which is one of the few biometric methods that acquire the
merits of both high accuracy and low intrusiveness, it is a
computer program that engages a person’s face to
automatically identify and verify the person from a digital
image or a video frame from a video source [2, 3 4]. It
equates the selected facial featuresfromtheimageanda face
database, or it can also be a hardware which is designed to
authenticate a person. This technology is a commonly used
biometrics system for authorization, authentication,
verification and identification. A lot of companies have been
adopting face recognition in their security cameras, access
controls and many more. Facebook has been using face
recognition in their website for creating a digital profile for
the people using their website. In developed countries, the
law enforcement creates a face database to be used with
their face recognition system to compare any suspect with
the database. On other hand, in Malaysia, thumbprint
identification is used to identify any suspect for the case.
However, because of infinite knowledge through internet
usage, most criminals are informed of thumbprint
identification. Therefore, they become charier of leaving a
thumbprint by wearing gloves except for unpremeditated
crimes.[5] A criminal record or any record consists of
available distinct knowledge about an individual, it also
consists of a photograph of the same. For identification of
any criminal, we need to have knowledge regarding the
person, which are given by witnesses. Identification can be
done by using various modes like fingerprint scanning, DNA
tests, etc [1]. Our paper focuses on the Face Identification
method to extract information from the image of the
individual and use it as a means of identification rather than
any other identification method. A face identificationsystem
will access the available database which consist of
photographs and then compare those to the ones which it
has captured or in real-time to find a match only if thematch
exists. For every image, this can be done by measuring the
width, height of the face, also the value of the eye colour by
using various ratios, different formulas that can be used for
identification of the face as well as it will help in finding the
approx. age, gender, etc. also. The software will work in two
phases. First is called face detection and the other is
Comparison. Face detection is the ability of a machine
(computer) to independently identify and extract the
features of a face in an image or video. The otherphaseofthe
process consists of creating a print like fingerprint, but it is
of the image and then compares that imager print with
available database accurately [2]. This System is used for
pinpointing the criminals in spite of its location until he/she
is captured by any cameras and aid government authority
for further investigations. Also, we are storing these images
of the criminals as a keep safe in our database along withthe
personal details and we are also hell bent to keep this
database at other different locations so if one gets corrupted
or hacked, we can use the others which are stored at
locations know to only some individuals around the world.
This project intends to identify the criminal based on the
existing record of the same and creating a new record if no
previous record existed.
2. LITERATURE REVIEW
The main purpose of research on computer vision is to
develop an automated face identification system which
canequally and will surpass human performance in future.
This problem has been studied for the past two decades.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3512
The approaches that had been used so far can divided into
two categories that is:
1) Model Based 2) Appearance Based
The model based one attempts to find and mark the
geometrical parametersbymeasuringthefacialpartsandthe
appearance based on the intensity-basedparameterssuchas
eigen coefficient for recording the face. Because of the
changes in lighting, expression, etc. conditions the face of the
human can be altered considerably [6].
The Face identification system is not a new field, as an early
prototype whichusesfeature-basedapproachwasdeveloped
over a 100 years ago by Alphonse Bertillon,ashedevelopeda
system of measurement of the physical aspects of the
criminals using which they can identify them. He takes
photographs of separate aspects of the face like nose, eyes,
chin, forehead, different profiles etc. of the criminal and
stores them in his “database.” But this database was
examined by humans not by computers, but still, it uses the
same biometric approach that the modern recognizing
system uses.
These approachesare being used in object detectionsystems
which also use computer vision for detection of any object
and based on its featurespecifying it asaplant,ball,table,etc.
Point to be noted is that face recognition isdifferentthanface
detection:
● Face Detection: the main purpose in this is to findtheface
i.e. Its location and size in a photograph and extract the same
to be used in the recognition algorithm.
● Face Recognition: with the already extractedinformation
which is also cropped, resized, and mostly converted to
grayscale, this algorithm is accountable for finding the traits
which can appropriately describe the image.
The face recognition application can be operated in two
modes:
● Verification or corroboration of the facial image: This
estimates the input image with the facial image associated
with the user who is requiring the corroboration. This is
stated as 1x1 comparison [6].
● Identification or Recognition of face: it compares the
input image with the preloaded images in the database and
aims to find the matching user. It is a 1xN comparison.
2.1 ALGORITHM
There are many different types of face algorithm that
exists,like [4]:
● Eigenface (1991)
● Fisherface (1997)
● Scale Invariant Feature Transform (SIFT) (1999)
● Speed Up Robust Feature Transform (SURF)
● Local Binary Pattern Histograms (LBPH)
● Etc,
Each of the above-mentioned algorithms uses different
approaches to extract the informationfromtheimageandfor
performing the matching with the input image. However,
methods used by Eigenface and Fisherfaces are mostly the
sameand the sameis also true forSIFT and Surf methods [7].
● Eigenface and Fisherfaces: Eigenface uses PCA (Principal
Component Analysis) that is a dimensionality-reduction
method which reduces the dimensions of thelarge datasetof
images, by converting large set of variables into smaller ones
but it still contains most of the info of the large dataset[8],
whereas Fisherfaces uses FLD (Fisher Linear Discriminant)
whose working is mostly same as Eigenface, but it works
better for the classification of different aspects of the image
or object[8].
● SIFT and SURF: These methods extract the local feature
points of the eyes and then classify theinvariantkeypointsin
the image of the eyes and then indicate these points, create a
local pattern around these points, and use them for
identification. In this the KNN-Algo (K-nearest neighbor
algorithm) is used for the classification purpose [9]. But for
our system we are using the LBPH algorithm as we have
found it to be much more efficient and has a large scope of
improvement which can be done as it is easy too.
● LBPH (Local Binary Pattern Histogram): The LBP (local
binary Pattern) is a simple but also very efficient texture
operator as it labels the pixels of the photograph by
thresholding the neighbor places of each pixel and regards
the output result as a binarynumber[10].Thisalgorithmwas
first stated in 1994 and till now it is recognized as the best
and most powerful feature for texture classification. And
further it is found that when this algorithm in combination
with HOG (Histogram of Oriented Gradients) descriptor is
used, its performance to detect the similarities improves for
some datasets. But using the combination of LBP and
histogram wecan represent the image of the face by a simple
data vector.
2.2 METHODOLOGY
Steps are as followed:
1. Parameters: this algorithm uses four parameters:
a. Radius: radius is used to constructthelocal binarypattern
in circular form and to represent radius around the central
pixel. It is set to 1.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3513
b. Neighbor: it is the cluster of points that constructs the
circular binary pattern. Point to note- the more sample
points we include themorethecomputational costincreases.
c. Grid X: the number of cells in the horizontal direction.
More cells mean more finer the grid, and higher the
dimensionality of the output feature vector.
d. Grid Y: the number of cells in vertical direction.
2. Training: Firstly, we need to train the algorithm. And to
do so, we need some training dataset that comprises the
facial image of the person we want to recognize, and, in our
case, we need the image of the criminal. And we also need to
set an ID or some type of number for each image.
3. Applying the LBP: The first step in computation of the
algo is to construct a swift image which describes the native
image in a well manner, by playing up the facial features,and
for doing all this the LBHP uses the concept of a sliding
window, which mostly depends on the radiusandneighbour
parameter.
For example-
4. Histograms extraction: By using the image which was
generated in the previousstep, weusetheparametersofGrid
X and Y for dividing the image into multiple grids like the
below given image:
5. At last, performing the recognition of face: Since the
algorithm has already been trained in the previous steps.
Every distinguished histogram that is created is used in the
representation of each image from the training dataset.
Similarly for every new image we perform the same steps.
● For finding the data of the criminal we just need to
compare the input image with the histogram of every image
and the which is closest is given as output.
● There are various approaches to calculate the distance
between the histograms, like- Euclidean distance, cosine
similarities, Manhattan distance, absolute value, chi-square,
etc.
Euclidean distance:
Cosine similarity:
Manhattan distance:
Chi-square:
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3514
3. CONCLUSIONS
As a result, we have developed a system that is capable of
identifying, detecting, verifying the face of a criminal and
showing its information after retrievingit fromthedatabase.
Below are some screenshots which were taken whiletesting
and training the system.
In the above we are just trying to show the points or the
parameters that the system is taking as a reference for
making the histograms of the input image.
No matter how well trained there’salwaysa scopeoferrorin
Face recognition programs. Recklessly relying onthis model
may turn out to be catastrophic for the Authorities. As the
photographs are uploaded via the internet it makes the
application severely crippled if there’s no access to the
internet. Deploying and integrating this system to its fullest
potential requires massive funding and research. Despite
getting or having such drawbacks. Themorethis systemgets
used, the more its database increases and the more useful it
becomes along the line. Right now, face recognition
programs are obviously far below what a human can do, but
it’s also obvious that machine learning is improving every
day and is already much better in some tasks than what a
human can do. Therefore, it’s a plausible conclusion that
facial recognition programs may someday surpass us.
REFERENCES
[1] Guillaumin, M., Verbeek, J.J., Schmid, C.: Is that you?
metric learning approaches for face identification. In: ICCV.
(2009).
[2] S. H Lin, “An Introduction to Face Recognition
Technology”,InformingScienceSpecial IssuesonMultimedia
Informing Technologies, 3:1, (2000).
[3] R. Rathi, M. Choudhary & B. Chandra, “An
Application of Face Recognition System using Image
Processing and Neural Networks”, International Journal
Computer Technology Application, 3:1, (2012), pp. 45-49.
[4] R. A. Hamid & J. A. Thom “Criteria that have an effect
on users while making image relevance judgements”, in
Proceedings of the fifteenth Australasian Document
Computing Symposium, (2010), pp. 76-83.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3515
[5] Nurul Azma Abdullaha,Md.JamriSaidi,Nurul HidayahAb
Rahmanb, Chuah Chai Wenc, and Isredza Rahmi A. Hamidd
“Face recognition for criminal identification: An
implementation of principal component analysis for face
recognition”,AIP Conference Proceedings 1891, 020002
(2017).
[6] Adriana Kovashka Margaret Martonosi- Feature- Based
Face Recognition for Identification of Criminals vs.
Identification for Cashless Purchase.
[7] Davis, J.V., Kulis, B., Jain, P., Sra, S., Dhillon, I.S.:
Information-theoretic metric learning. In: ICML. (2007).
[8] A Survey of Face Recognition TechniquesRabia Jafri*and
Hamid R. Arabnia*.
[9] Wang, X., Tang, X.: Bayesian face recognition using gabor
features. (2003) 70–73.
[10] Face Recognition with Learning-based Descriptor
Zhimin Cao1 1 The ChineseUniversityofHong KongQiYin2∗
2 ITCS, Tsinghua University Xiaoou Tang 1,3 3Shenzhen
Institutes of Advanced Technology Chinese Academy of
Sciences, China Jian Sun 4 Microsoft Research Asia.
[11] D. DeCarlos, D. Metaxas, and M. Stone. An
anthropometric face model using variational techniques. In
Computer Graphics Proceedings SIGGRAPH98,pages67–74,
1998.
[12] S. DiPaola. Extending the range of facial types. Journal of
Visualization and ComputerAnimation, 2(4):129–131,1991.
[13] T.F. Cootes, G.J. Edwards, and C.J. Taylor. Active
appearance models. In Burkhardt and Neumann, editors,
Computer Vision – ECCV 98 Vol. II, Freiburg, Germany,1998.
Springer, Lecture Notes in Computer Science 1407.
[14] G.J. Edwards, A. Lanitis, C.J. Taylor, and T.F. Cootes.
Modelling the variability in face images. In Proc. of the 2nd
Int. Conf. on Automatic Face and Gesture Recognition, IEEE
Comp. Soc. Press, Los Alamitos, CA, 1996.
[15] Moghaddam, B., Jebara, T., Pentland, A.: Bayesian face
recognition. Pattern Recognition 33 (2000) 1771–1782
[16] Phillips, P.J., Moon, H., Rizvi, S.A., Rauss, P.J.: The feret
evaluation methodology for face- recognition algorithms.
PAMI 22 (2000) 1090–1104
[17] Wang, X., Tang, X.: A unified framework for subspace
face recognition. PAMI 26 (2004) 1222–1228
[18] Wang, X., Tang, X.: Subspace analysis using random
mixture models. In: CVPR. (2005)
[19] C.S. Choi, T. Okazaki, H. Harashima, and T. Takebe. A
system of analyzing and synthesizing facial images. In Proc.
IEEE Int. Symposium of Circuit and Systems (ISCAS91),
pages 2665–2668, 1991.
[20] Li, Z., Tang, X.: Bayesian face recognition using support
vector machine and face clustering. In: CVPR. (2004)
[21] Weinberger, K.Q., Blitzer, J., Saul, L.K.: Distance metric
learning for large margin nearest neighbor classification.
Volume (2005) 207–244
[22] D. Beymer, A. Shashua, and T. Poggio. Example- based
image analysis and synthesis. A.I. Memo No. 1431, Artificial
Intelligence Laboratory, Massachusetts Institute of
Technology, 1993.
[23] J. Sivic and A. Zisserman, “Video Google: A text retrieval
approach to object matching in videos,” in Proc. ICCV, vol. 2,
2003, pp. 1470–1477.
[24] Ying, Y., Li, P.: Distance metric learning with eigenvalue
optimization. Journal of Machine Learning Research 13
(2012) 1–26
[25] Criminal Face Recognition System Alireza
Chevelwalla[1] , Ajay Gurav[2] , Sachin Desai[3] , Prof.
Sumitra Sadhukhan[4]DepartmentofComputerEngineering
Rajiv Gandhi Institute of Technology. Versova, Andheri(W),
Mumbai- 400053.
[26] Rabia Jafri* and Hamid R. Arabnia* A Survey of Face
Recognition Techniques.
[27] Computational Vision: Archive.” 17 Mar 2005.
http://www.vision.caltech.edu/htmlfiles/archive.html.
[28] P.J. Burt and E.H. Adelson. Merging images through
pattern decomposition. In Applications of Digital Image
Processing VIII, number 575, pages 173–181. SPIE The
International Society for Optical Engineering, 1985.
[29] Cox, Ingemar J., Joumana Ghosn, and Peter N. Yianilos.
“Feature-Based Face Recognition Using Mixture-Distance.

More Related Content

Similar to Criminal Face Identification

IRJET-A Survey on Face Recognition based Security System and its Applications
IRJET-A Survey on Face Recognition based Security System and its ApplicationsIRJET-A Survey on Face Recognition based Security System and its Applications
IRJET-A Survey on Face Recognition based Security System and its ApplicationsIRJET Journal
 
Comparative Analysis of Face Recognition Methodologies and Techniques
Comparative Analysis of Face Recognition Methodologies and TechniquesComparative Analysis of Face Recognition Methodologies and Techniques
Comparative Analysis of Face Recognition Methodologies and TechniquesFarwa Ansari
 
Smart Doorbell System Based on Face Recognition
Smart Doorbell System Based on Face RecognitionSmart Doorbell System Based on Face Recognition
Smart Doorbell System Based on Face RecognitionIRJET Journal
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...ijceronline
 
Facial Expression Identification System
Facial Expression Identification SystemFacial Expression Identification System
Facial Expression Identification SystemIRJET Journal
 
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET-  	  Secure Online Payment with Facial Recognition using CNNIRJET-  	  Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNNIRJET Journal
 
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AICRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AIIRJET Journal
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methodsIRJET Journal
 
IRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe ModelIRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe ModelIRJET Journal
 
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKHUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKijiert bestjournal
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition SystemStudentRocks
 
IRJET - Real Time Facial Analysis using Tensorflowand OpenCV
IRJET -  	  Real Time Facial Analysis using Tensorflowand OpenCVIRJET -  	  Real Time Facial Analysis using Tensorflowand OpenCV
IRJET - Real Time Facial Analysis using Tensorflowand OpenCVIRJET Journal
 
Face Recognition Based Payment Processing System
Face Recognition Based Payment Processing SystemFace Recognition Based Payment Processing System
Face Recognition Based Payment Processing SystemIRJET Journal
 
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONESAN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONESAM Publications
 
IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...
IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...
IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...IRJET Journal
 
Attendance management system using face recognition
Attendance management system using face recognitionAttendance management system using face recognition
Attendance management system using face recognitionIAESIJAI
 
IRJET - Emotionalizer : Face Emotion Detection System
IRJET - Emotionalizer : Face Emotion Detection SystemIRJET - Emotionalizer : Face Emotion Detection System
IRJET - Emotionalizer : Face Emotion Detection SystemIRJET Journal
 
IRJET- Emotionalizer : Face Emotion Detection System
IRJET- Emotionalizer : Face Emotion Detection SystemIRJET- Emotionalizer : Face Emotion Detection System
IRJET- Emotionalizer : Face Emotion Detection SystemIRJET Journal
 
IRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET Journal
 

Similar to Criminal Face Identification (20)

IRJET-A Survey on Face Recognition based Security System and its Applications
IRJET-A Survey on Face Recognition based Security System and its ApplicationsIRJET-A Survey on Face Recognition based Security System and its Applications
IRJET-A Survey on Face Recognition based Security System and its Applications
 
Comparative Analysis of Face Recognition Methodologies and Techniques
Comparative Analysis of Face Recognition Methodologies and TechniquesComparative Analysis of Face Recognition Methodologies and Techniques
Comparative Analysis of Face Recognition Methodologies and Techniques
 
Smart Doorbell System Based on Face Recognition
Smart Doorbell System Based on Face RecognitionSmart Doorbell System Based on Face Recognition
Smart Doorbell System Based on Face Recognition
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
 
Facial Expression Identification System
Facial Expression Identification SystemFacial Expression Identification System
Facial Expression Identification System
 
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET-  	  Secure Online Payment with Facial Recognition using CNNIRJET-  	  Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
 
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AICRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methods
 
IRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe ModelIRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe Model
 
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKHUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
 
G041041047
G041041047G041041047
G041041047
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition System
 
IRJET - Real Time Facial Analysis using Tensorflowand OpenCV
IRJET -  	  Real Time Facial Analysis using Tensorflowand OpenCVIRJET -  	  Real Time Facial Analysis using Tensorflowand OpenCV
IRJET - Real Time Facial Analysis using Tensorflowand OpenCV
 
Face Recognition Based Payment Processing System
Face Recognition Based Payment Processing SystemFace Recognition Based Payment Processing System
Face Recognition Based Payment Processing System
 
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONESAN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
 
IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...
IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...
IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...
 
Attendance management system using face recognition
Attendance management system using face recognitionAttendance management system using face recognition
Attendance management system using face recognition
 
IRJET - Emotionalizer : Face Emotion Detection System
IRJET - Emotionalizer : Face Emotion Detection SystemIRJET - Emotionalizer : Face Emotion Detection System
IRJET - Emotionalizer : Face Emotion Detection System
 
IRJET- Emotionalizer : Face Emotion Detection System
IRJET- Emotionalizer : Face Emotion Detection SystemIRJET- Emotionalizer : Face Emotion Detection System
IRJET- Emotionalizer : Face Emotion Detection System
 
IRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face RecognitionIRJET- Computerized Attendance System using Face Recognition
IRJET- Computerized Attendance System using Face Recognition
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

Criminal Face Identification

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3511 Criminal Face Identification Harsh Chaudhary, Ankit Shukla, Arusha Sharma, Alok Yadav Dr. Preeti Sharma, Dept. of information Technology, Inderprastha Engineering College, U.P, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Face Recognition/Identification has been a fast thriving, challenging and interesting domain in real time applications. A large number of face recognition algorithms have been developed in the recent decades. It has diverse application areas likesurveillance, security, entertainment etc. The software on face identification is useful in airports, banks, offices, educational institutions for screening the people who are entering and exiting these places. Most of the Countries like Germany, Australia, etcusethistechnology[1]. Authorities have placed booths for face identification at borders and customs for automating the control system for passport verification and this becomes animportantachievement in the context of ongoing covid-19 pandemic. Human face is a dynamic object that has a large degree of variability in its appearance as facial features of every individual aredifferent, and this makes face recognition a challenging and ready to improve problem in the computer vision field. As in the face recognition/identification field, accuracy and speedboth play an important role as well as it is the main issue. The goal of this paper is to evaluate different techniques of face recognition and provide a better solution forimage andvideo- based face detection with greater accuracy, better response time and a step forward in betterment of society and protection of the society. Key Words: Face, Recognition, algorithms, identification, image, software. 1.INTRODUCTION Over the years, a lot of security measures have been developed that help in holding confidential data securedand restricting the chances of a security breach.Facerecognition, which is one of the few biometric methods that acquire the merits of both high accuracy and low intrusiveness, it is a computer program that engages a person’s face to automatically identify and verify the person from a digital image or a video frame from a video source [2, 3 4]. It equates the selected facial featuresfromtheimageanda face database, or it can also be a hardware which is designed to authenticate a person. This technology is a commonly used biometrics system for authorization, authentication, verification and identification. A lot of companies have been adopting face recognition in their security cameras, access controls and many more. Facebook has been using face recognition in their website for creating a digital profile for the people using their website. In developed countries, the law enforcement creates a face database to be used with their face recognition system to compare any suspect with the database. On other hand, in Malaysia, thumbprint identification is used to identify any suspect for the case. However, because of infinite knowledge through internet usage, most criminals are informed of thumbprint identification. Therefore, they become charier of leaving a thumbprint by wearing gloves except for unpremeditated crimes.[5] A criminal record or any record consists of available distinct knowledge about an individual, it also consists of a photograph of the same. For identification of any criminal, we need to have knowledge regarding the person, which are given by witnesses. Identification can be done by using various modes like fingerprint scanning, DNA tests, etc [1]. Our paper focuses on the Face Identification method to extract information from the image of the individual and use it as a means of identification rather than any other identification method. A face identificationsystem will access the available database which consist of photographs and then compare those to the ones which it has captured or in real-time to find a match only if thematch exists. For every image, this can be done by measuring the width, height of the face, also the value of the eye colour by using various ratios, different formulas that can be used for identification of the face as well as it will help in finding the approx. age, gender, etc. also. The software will work in two phases. First is called face detection and the other is Comparison. Face detection is the ability of a machine (computer) to independently identify and extract the features of a face in an image or video. The otherphaseofthe process consists of creating a print like fingerprint, but it is of the image and then compares that imager print with available database accurately [2]. This System is used for pinpointing the criminals in spite of its location until he/she is captured by any cameras and aid government authority for further investigations. Also, we are storing these images of the criminals as a keep safe in our database along withthe personal details and we are also hell bent to keep this database at other different locations so if one gets corrupted or hacked, we can use the others which are stored at locations know to only some individuals around the world. This project intends to identify the criminal based on the existing record of the same and creating a new record if no previous record existed. 2. LITERATURE REVIEW The main purpose of research on computer vision is to develop an automated face identification system which canequally and will surpass human performance in future. This problem has been studied for the past two decades.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3512 The approaches that had been used so far can divided into two categories that is: 1) Model Based 2) Appearance Based The model based one attempts to find and mark the geometrical parametersbymeasuringthefacialpartsandthe appearance based on the intensity-basedparameterssuchas eigen coefficient for recording the face. Because of the changes in lighting, expression, etc. conditions the face of the human can be altered considerably [6]. The Face identification system is not a new field, as an early prototype whichusesfeature-basedapproachwasdeveloped over a 100 years ago by Alphonse Bertillon,ashedevelopeda system of measurement of the physical aspects of the criminals using which they can identify them. He takes photographs of separate aspects of the face like nose, eyes, chin, forehead, different profiles etc. of the criminal and stores them in his “database.” But this database was examined by humans not by computers, but still, it uses the same biometric approach that the modern recognizing system uses. These approachesare being used in object detectionsystems which also use computer vision for detection of any object and based on its featurespecifying it asaplant,ball,table,etc. Point to be noted is that face recognition isdifferentthanface detection: ● Face Detection: the main purpose in this is to findtheface i.e. Its location and size in a photograph and extract the same to be used in the recognition algorithm. ● Face Recognition: with the already extractedinformation which is also cropped, resized, and mostly converted to grayscale, this algorithm is accountable for finding the traits which can appropriately describe the image. The face recognition application can be operated in two modes: ● Verification or corroboration of the facial image: This estimates the input image with the facial image associated with the user who is requiring the corroboration. This is stated as 1x1 comparison [6]. ● Identification or Recognition of face: it compares the input image with the preloaded images in the database and aims to find the matching user. It is a 1xN comparison. 2.1 ALGORITHM There are many different types of face algorithm that exists,like [4]: ● Eigenface (1991) ● Fisherface (1997) ● Scale Invariant Feature Transform (SIFT) (1999) ● Speed Up Robust Feature Transform (SURF) ● Local Binary Pattern Histograms (LBPH) ● Etc, Each of the above-mentioned algorithms uses different approaches to extract the informationfromtheimageandfor performing the matching with the input image. However, methods used by Eigenface and Fisherfaces are mostly the sameand the sameis also true forSIFT and Surf methods [7]. ● Eigenface and Fisherfaces: Eigenface uses PCA (Principal Component Analysis) that is a dimensionality-reduction method which reduces the dimensions of thelarge datasetof images, by converting large set of variables into smaller ones but it still contains most of the info of the large dataset[8], whereas Fisherfaces uses FLD (Fisher Linear Discriminant) whose working is mostly same as Eigenface, but it works better for the classification of different aspects of the image or object[8]. ● SIFT and SURF: These methods extract the local feature points of the eyes and then classify theinvariantkeypointsin the image of the eyes and then indicate these points, create a local pattern around these points, and use them for identification. In this the KNN-Algo (K-nearest neighbor algorithm) is used for the classification purpose [9]. But for our system we are using the LBPH algorithm as we have found it to be much more efficient and has a large scope of improvement which can be done as it is easy too. ● LBPH (Local Binary Pattern Histogram): The LBP (local binary Pattern) is a simple but also very efficient texture operator as it labels the pixels of the photograph by thresholding the neighbor places of each pixel and regards the output result as a binarynumber[10].Thisalgorithmwas first stated in 1994 and till now it is recognized as the best and most powerful feature for texture classification. And further it is found that when this algorithm in combination with HOG (Histogram of Oriented Gradients) descriptor is used, its performance to detect the similarities improves for some datasets. But using the combination of LBP and histogram wecan represent the image of the face by a simple data vector. 2.2 METHODOLOGY Steps are as followed: 1. Parameters: this algorithm uses four parameters: a. Radius: radius is used to constructthelocal binarypattern in circular form and to represent radius around the central pixel. It is set to 1.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3513 b. Neighbor: it is the cluster of points that constructs the circular binary pattern. Point to note- the more sample points we include themorethecomputational costincreases. c. Grid X: the number of cells in the horizontal direction. More cells mean more finer the grid, and higher the dimensionality of the output feature vector. d. Grid Y: the number of cells in vertical direction. 2. Training: Firstly, we need to train the algorithm. And to do so, we need some training dataset that comprises the facial image of the person we want to recognize, and, in our case, we need the image of the criminal. And we also need to set an ID or some type of number for each image. 3. Applying the LBP: The first step in computation of the algo is to construct a swift image which describes the native image in a well manner, by playing up the facial features,and for doing all this the LBHP uses the concept of a sliding window, which mostly depends on the radiusandneighbour parameter. For example- 4. Histograms extraction: By using the image which was generated in the previousstep, weusetheparametersofGrid X and Y for dividing the image into multiple grids like the below given image: 5. At last, performing the recognition of face: Since the algorithm has already been trained in the previous steps. Every distinguished histogram that is created is used in the representation of each image from the training dataset. Similarly for every new image we perform the same steps. ● For finding the data of the criminal we just need to compare the input image with the histogram of every image and the which is closest is given as output. ● There are various approaches to calculate the distance between the histograms, like- Euclidean distance, cosine similarities, Manhattan distance, absolute value, chi-square, etc. Euclidean distance: Cosine similarity: Manhattan distance: Chi-square:
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3514 3. CONCLUSIONS As a result, we have developed a system that is capable of identifying, detecting, verifying the face of a criminal and showing its information after retrievingit fromthedatabase. Below are some screenshots which were taken whiletesting and training the system. In the above we are just trying to show the points or the parameters that the system is taking as a reference for making the histograms of the input image. No matter how well trained there’salwaysa scopeoferrorin Face recognition programs. Recklessly relying onthis model may turn out to be catastrophic for the Authorities. As the photographs are uploaded via the internet it makes the application severely crippled if there’s no access to the internet. Deploying and integrating this system to its fullest potential requires massive funding and research. Despite getting or having such drawbacks. Themorethis systemgets used, the more its database increases and the more useful it becomes along the line. Right now, face recognition programs are obviously far below what a human can do, but it’s also obvious that machine learning is improving every day and is already much better in some tasks than what a human can do. Therefore, it’s a plausible conclusion that facial recognition programs may someday surpass us. REFERENCES [1] Guillaumin, M., Verbeek, J.J., Schmid, C.: Is that you? metric learning approaches for face identification. In: ICCV. (2009). [2] S. H Lin, “An Introduction to Face Recognition Technology”,InformingScienceSpecial IssuesonMultimedia Informing Technologies, 3:1, (2000). [3] R. Rathi, M. Choudhary & B. Chandra, “An Application of Face Recognition System using Image Processing and Neural Networks”, International Journal Computer Technology Application, 3:1, (2012), pp. 45-49. [4] R. A. Hamid & J. A. Thom “Criteria that have an effect on users while making image relevance judgements”, in Proceedings of the fifteenth Australasian Document Computing Symposium, (2010), pp. 76-83.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3515 [5] Nurul Azma Abdullaha,Md.JamriSaidi,Nurul HidayahAb Rahmanb, Chuah Chai Wenc, and Isredza Rahmi A. Hamidd “Face recognition for criminal identification: An implementation of principal component analysis for face recognition”,AIP Conference Proceedings 1891, 020002 (2017). [6] Adriana Kovashka Margaret Martonosi- Feature- Based Face Recognition for Identification of Criminals vs. Identification for Cashless Purchase. [7] Davis, J.V., Kulis, B., Jain, P., Sra, S., Dhillon, I.S.: Information-theoretic metric learning. In: ICML. (2007). [8] A Survey of Face Recognition TechniquesRabia Jafri*and Hamid R. Arabnia*. [9] Wang, X., Tang, X.: Bayesian face recognition using gabor features. (2003) 70–73. [10] Face Recognition with Learning-based Descriptor Zhimin Cao1 1 The ChineseUniversityofHong KongQiYin2∗ 2 ITCS, Tsinghua University Xiaoou Tang 1,3 3Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences, China Jian Sun 4 Microsoft Research Asia. [11] D. DeCarlos, D. Metaxas, and M. Stone. An anthropometric face model using variational techniques. In Computer Graphics Proceedings SIGGRAPH98,pages67–74, 1998. [12] S. DiPaola. Extending the range of facial types. Journal of Visualization and ComputerAnimation, 2(4):129–131,1991. [13] T.F. Cootes, G.J. Edwards, and C.J. Taylor. Active appearance models. In Burkhardt and Neumann, editors, Computer Vision – ECCV 98 Vol. II, Freiburg, Germany,1998. Springer, Lecture Notes in Computer Science 1407. [14] G.J. Edwards, A. Lanitis, C.J. Taylor, and T.F. Cootes. Modelling the variability in face images. In Proc. of the 2nd Int. Conf. on Automatic Face and Gesture Recognition, IEEE Comp. Soc. Press, Los Alamitos, CA, 1996. [15] Moghaddam, B., Jebara, T., Pentland, A.: Bayesian face recognition. Pattern Recognition 33 (2000) 1771–1782 [16] Phillips, P.J., Moon, H., Rizvi, S.A., Rauss, P.J.: The feret evaluation methodology for face- recognition algorithms. PAMI 22 (2000) 1090–1104 [17] Wang, X., Tang, X.: A unified framework for subspace face recognition. PAMI 26 (2004) 1222–1228 [18] Wang, X., Tang, X.: Subspace analysis using random mixture models. In: CVPR. (2005) [19] C.S. Choi, T. Okazaki, H. Harashima, and T. Takebe. A system of analyzing and synthesizing facial images. In Proc. IEEE Int. Symposium of Circuit and Systems (ISCAS91), pages 2665–2668, 1991. [20] Li, Z., Tang, X.: Bayesian face recognition using support vector machine and face clustering. In: CVPR. (2004) [21] Weinberger, K.Q., Blitzer, J., Saul, L.K.: Distance metric learning for large margin nearest neighbor classification. Volume (2005) 207–244 [22] D. Beymer, A. Shashua, and T. Poggio. Example- based image analysis and synthesis. A.I. Memo No. 1431, Artificial Intelligence Laboratory, Massachusetts Institute of Technology, 1993. [23] J. Sivic and A. Zisserman, “Video Google: A text retrieval approach to object matching in videos,” in Proc. ICCV, vol. 2, 2003, pp. 1470–1477. [24] Ying, Y., Li, P.: Distance metric learning with eigenvalue optimization. Journal of Machine Learning Research 13 (2012) 1–26 [25] Criminal Face Recognition System Alireza Chevelwalla[1] , Ajay Gurav[2] , Sachin Desai[3] , Prof. Sumitra Sadhukhan[4]DepartmentofComputerEngineering Rajiv Gandhi Institute of Technology. Versova, Andheri(W), Mumbai- 400053. [26] Rabia Jafri* and Hamid R. Arabnia* A Survey of Face Recognition Techniques. [27] Computational Vision: Archive.” 17 Mar 2005. http://www.vision.caltech.edu/htmlfiles/archive.html. [28] P.J. Burt and E.H. Adelson. Merging images through pattern decomposition. In Applications of Digital Image Processing VIII, number 575, pages 173–181. SPIE The International Society for Optical Engineering, 1985. [29] Cox, Ingemar J., Joumana Ghosn, and Peter N. Yianilos. “Feature-Based Face Recognition Using Mixture-Distance.