SlideShare a Scribd company logo
PRISONER FACE DETECTION SYSTEM 
GROUP MEMBERS 
 FARHAN NAIK. 
 KANCHAN VAVA. 
 SHWETA FULWANI. 
 AKSHAY AUTI. 
UNDER THE GUIDANCE OF 
Miss. Suwarna Nimkarde.
POINTS TO DISCUSS 
 Existing System 
 Limitations of Existing System 
 Proposed System 
Working 
 Flow of System 
 Advantages of Proposed System 
 Application 
 Soft. & Hardware Specification 
System Design 
conclusion 
 References
EXISTING SYSTEM 
In existing system criminal information is stored in 
file format with outdated images and low quality 
images. 
Using this information it is not possible for eye 
witness to guess the criminal, so there is need to 
develop a better method for identifying criminals like 
finger print, DNA…Etc. 
Among all these methods face detection method is 
cost effective and more accurate.
LIMITATIONS OF EXISTING 
SYSTEM 
Using Existing System Its Difficult for eye 
witness to guess the criminal . 
It’s Difficult ToMaintain Data Physically. 
Human Interaction Required.
PROPOSED SYSTEM 
 Prisoner face detecting system can be used in police 
department. 
 This software contains front end and back end applications 
where front end is used to visualize the output and back 
end is used to store data. 
 Initially criminal images are stored in database along with 
his bio data. Every image is sliced by eyes, hair, lips and 
nose..etc and stored in database as separate record. 
 These images are shown to eye witness while investigation 
separately, if witness can judge any part of criminal we can 
recover entire criminal record based on that clue. 
 With this system police will provide better option to 
witness to judge criminal.
WORKING 
Capture Image 
Convert To Gray Image 
Edge Detection 
Comparison 
Report The Admin
FLOW OF SYSTEM
ADVANTAGES 
OF PROPOSED SYSTEM 
 Unlike many other identification methods (e.g., fingerprints, 
voiceprint, signature), they do not need to make direct contact 
with an individual in order to verify their identity 
 Less Complex Than OtherMethod.
APPLICATION 
IN MANY SERCURITY SYSTEM 
It can be used in VIDEO SURVEILENCE SYSTEM 
It can be used in CCTV(CLOSED CIRCUIT 
TELEVISION) 
It can be used in Criminal Investigations, Home 
Security, Military, Intelligence
REQUIREMENT SPECIFICATION 
SOFTWARE 
SPECIFICATIO 
N 
• Operating System 
Windows XP 
• Programming 
language : 
• JAVA 
SOFTWARE 
TOOLS 
• Backend 
• MS Access 
HARDWARE 
SPECIFICATION 
• PROCESSOR: Speed 
minimum: PIII 800 MHz 
• RAM: Minimum: 128 MB, 256 
MB
SYSTEM DESIGN 
E-RDIAGRAMS BETWEEN ADMINISTRATOR 
AND EMPLOYEE: 
User id 
Pwd User id 
Pwd 
Administrator Authentication Employee
E-R DIAGRAMS BETWEEN EMPLOYEE AND 
EYEWITNESS: 
Employee Viewing & 
selecting, 
images 
Eyewitness 
User 
id 
Pwd 
User 
id Pwd 
Criminal 
details 
Criminal 
images 
Criminal 
images
E-R DIAGRAM BETWEEN EYEWITNESS AND 
ADMINISTTRATOR 
Administrator 
Authen 
tication Eyewitness 
User id 
Pwd 
User id Pwd
USE CASE DIAGRAM 
Administrator: 
Login 
Inserting/Updating Criminal Details 
Splitting/Updating Images 
Inserting/Updating Face Details 
Already Existed Criminal 
New Criminal 
Deleting Images 
Administrator 
criminal
Client (Operator): 
operator Login 
retriving the images 
operator Criminal 
identifying the images
ACTIVITY DIAGRAM 
Administrator: 
Administrator 
check 
yes 
No 
Criminal Details Operations 
Insert Update Delete View splitting Merging
Operator: 
Operator 
check 
yes 
No 
Retrieve Image 
Identify Image
CONCLUSION 
This system seems to be working fine and 
successfully. This system can able to provide the 
proper training set of data and test input for 
recognition. The face matched or not is given in 
the form of picture image if matched and text 
message in case of any difference.
REFERENCES 
WEB REFERENCES 
• http://www.filestub.com 
• http://www.ebookee.org 
• http://www.google.com
Face detection system

More Related Content

What's hot

Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
Zara Tariq
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
Mazin Alwaaly
 
Fake Currency detction Using Image Processing
Fake Currency detction Using Image ProcessingFake Currency detction Using Image Processing
Fake Currency detction Using Image Processing
SavitaHanchinal
 
Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection System
Abhiroop Ghatak
 
Computer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and PythonComputer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and Python
Akash Satamkar
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
ShubhamLamichane
 
Face recognization
Face recognizationFace recognization
Face recognization
leenak770
 
Face detection and recognition
Face detection and recognitionFace detection and recognition
Face detection and recognition
Pankaj Thakur
 
Face recognition using neural network
Face recognition using neural networkFace recognition using neural network
Face recognition using neural network
Indira Nayak
 
Vehical Registration Plan
Vehical Registration PlanVehical Registration Plan
Vehical Registration Plan
Rizwan Qamar
 
Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
IBNC India - India's Biggest Networking Championship
 
IRJET- Fake Profile Identification using Machine Learning
IRJET-  	  Fake Profile Identification using Machine LearningIRJET-  	  Fake Profile Identification using Machine Learning
IRJET- Fake Profile Identification using Machine Learning
IRJET Journal
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
ranjit banshpal
 
Face Recognition Methods based on Convolutional Neural Networks
Face Recognition Methods based on Convolutional Neural NetworksFace Recognition Methods based on Convolutional Neural Networks
Face Recognition Methods based on Convolutional Neural Networks
Elaheh Rashedi
 
Eye Tracking Based Human - Computer Interaction
Eye Tracking Based Human - Computer InteractionEye Tracking Based Human - Computer Interaction
Eye Tracking Based Human - Computer Interaction
Sharath Raj
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
Ausaf khan
 
Face Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaFace Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun Sharma
Arjun Agnihotri
 
Driver Drowsiness Detection report
Driver Drowsiness Detection reportDriver Drowsiness Detection report
Driver Drowsiness Detection report
PurvanshJain1
 
iris recognition system as means of unique identification
iris recognition system as means of unique identification iris recognition system as means of unique identification
iris recognition system as means of unique identification
Being Topper
 
Emotion based music player
Emotion based music playerEmotion based music player
Emotion based music player
Nizam Muhammed
 

What's hot (20)

Face Detection and Recognition System
Face Detection and Recognition SystemFace Detection and Recognition System
Face Detection and Recognition System
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
 
Fake Currency detction Using Image Processing
Fake Currency detction Using Image ProcessingFake Currency detction Using Image Processing
Fake Currency detction Using Image Processing
 
Automated Face Detection System
Automated Face Detection SystemAutomated Face Detection System
Automated Face Detection System
 
Computer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and PythonComputer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and Python
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face recognization
Face recognizationFace recognization
Face recognization
 
Face detection and recognition
Face detection and recognitionFace detection and recognition
Face detection and recognition
 
Face recognition using neural network
Face recognition using neural networkFace recognition using neural network
Face recognition using neural network
 
Vehical Registration Plan
Vehical Registration PlanVehical Registration Plan
Vehical Registration Plan
 
Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
 
IRJET- Fake Profile Identification using Machine Learning
IRJET-  	  Fake Profile Identification using Machine LearningIRJET-  	  Fake Profile Identification using Machine Learning
IRJET- Fake Profile Identification using Machine Learning
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face Recognition Methods based on Convolutional Neural Networks
Face Recognition Methods based on Convolutional Neural NetworksFace Recognition Methods based on Convolutional Neural Networks
Face Recognition Methods based on Convolutional Neural Networks
 
Eye Tracking Based Human - Computer Interaction
Eye Tracking Based Human - Computer InteractionEye Tracking Based Human - Computer Interaction
Eye Tracking Based Human - Computer Interaction
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
 
Face Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun SharmaFace Detection Attendance System By Arjun Sharma
Face Detection Attendance System By Arjun Sharma
 
Driver Drowsiness Detection report
Driver Drowsiness Detection reportDriver Drowsiness Detection report
Driver Drowsiness Detection report
 
iris recognition system as means of unique identification
iris recognition system as means of unique identification iris recognition system as means of unique identification
iris recognition system as means of unique identification
 
Emotion based music player
Emotion based music playerEmotion based music player
Emotion based music player
 

Viewers also liked

Developing the SA Prison Library Service
Developing the SA Prison Library ServiceDeveloping the SA Prison Library Service
Developing the SA Prison Library Service
ALIA Community Information Australia Networkers
 
UDBA THE STATE SECURITY ADMINISTRATION
UDBA THE STATE SECURITY ADMINISTRATIONUDBA THE STATE SECURITY ADMINISTRATION
UDBA THE STATE SECURITY ADMINISTRATION
OWTF
 
Digital technologies for learning in prison: what one Australian university i...
Digital technologies for learning in prison: what one Australian university i...Digital technologies for learning in prison: what one Australian university i...
Digital technologies for learning in prison: what one Australian university i...
Helen Farley
 
Matching Sketches with Digital Face Images using MCWLD and Image Moment Invar...
Matching Sketches with Digital Face Images using MCWLD and Image Moment Invar...Matching Sketches with Digital Face Images using MCWLD and Image Moment Invar...
Matching Sketches with Digital Face Images using MCWLD and Image Moment Invar...
iosrjce
 
Managing Church Information from Home and On-the-Go with Church360° Members
Managing Church Information from Home and On-the-Go with Church360° MembersManaging Church Information from Home and On-the-Go with Church360° Members
Managing Church Information from Home and On-the-Go with Church360° Members
Concordia Technology Solutions
 
Institute of Interfaith Dialog - Prison Conversion to Islam - Christianity
Institute of Interfaith Dialog - Prison Conversion to Islam - ChristianityInstitute of Interfaith Dialog - Prison Conversion to Islam - Christianity
Institute of Interfaith Dialog - Prison Conversion to Islam - Christianity
rigsbyml
 
Overview of the proposed Photovoltaic Solar Quality Management System standard
Overview of the proposed Photovoltaic Solar Quality Management System standardOverview of the proposed Photovoltaic Solar Quality Management System standard
Overview of the proposed Photovoltaic Solar Quality Management System standard
Govind Ramu
 
New Delhi Airport
New Delhi AirportNew Delhi Airport
New Delhi Airport
RIIA
 
Airport IT&T 2013 Cornelious Bernard
Airport IT&T 2013 Cornelious BernardAirport IT&T 2013 Cornelious Bernard
Airport IT&T 2013 Cornelious Bernard
Russell Publishing
 
use case diagramHospital managment system
use case diagramHospital managment systemuse case diagramHospital managment system
use case diagramHospital managment system
Yaswanth Babu Gummadivelli
 
Prison management system
Prison management systemPrison management system
Prison management system
Tomásio De J. Leite Pilar
 
Adtec Mekanikal Nov 08
Adtec Mekanikal Nov 08Adtec Mekanikal Nov 08
Adtec Mekanikal Nov 08
guestf204c
 
Srs
SrsSrs
Web based Prison management system
Web based Prison management systemWeb based Prison management system
Web based Prison management system
FAKHRUN NISHA
 
Face recognition with age
Face recognition with ageFace recognition with age
Face recognition with age
Prabhat kumar Suman
 
Trace Criminal using IBM Watson
Trace Criminal using IBM WatsonTrace Criminal using IBM Watson
Trace Criminal using IBM Watson
Amitava Roy
 
Face recognition
Face recognitionFace recognition
Face recognition
Satyendra Rajput
 
Knn
KnnKnn
Prison management system
Prison management system Prison management system
Prison management system
SNOW WHITE
 
face recognition system using LBP
face recognition system using LBPface recognition system using LBP
face recognition system using LBP
Marwan H. Noman
 

Viewers also liked (20)

Developing the SA Prison Library Service
Developing the SA Prison Library ServiceDeveloping the SA Prison Library Service
Developing the SA Prison Library Service
 
UDBA THE STATE SECURITY ADMINISTRATION
UDBA THE STATE SECURITY ADMINISTRATIONUDBA THE STATE SECURITY ADMINISTRATION
UDBA THE STATE SECURITY ADMINISTRATION
 
Digital technologies for learning in prison: what one Australian university i...
Digital technologies for learning in prison: what one Australian university i...Digital technologies for learning in prison: what one Australian university i...
Digital technologies for learning in prison: what one Australian university i...
 
Matching Sketches with Digital Face Images using MCWLD and Image Moment Invar...
Matching Sketches with Digital Face Images using MCWLD and Image Moment Invar...Matching Sketches with Digital Face Images using MCWLD and Image Moment Invar...
Matching Sketches with Digital Face Images using MCWLD and Image Moment Invar...
 
Managing Church Information from Home and On-the-Go with Church360° Members
Managing Church Information from Home and On-the-Go with Church360° MembersManaging Church Information from Home and On-the-Go with Church360° Members
Managing Church Information from Home and On-the-Go with Church360° Members
 
Institute of Interfaith Dialog - Prison Conversion to Islam - Christianity
Institute of Interfaith Dialog - Prison Conversion to Islam - ChristianityInstitute of Interfaith Dialog - Prison Conversion to Islam - Christianity
Institute of Interfaith Dialog - Prison Conversion to Islam - Christianity
 
Overview of the proposed Photovoltaic Solar Quality Management System standard
Overview of the proposed Photovoltaic Solar Quality Management System standardOverview of the proposed Photovoltaic Solar Quality Management System standard
Overview of the proposed Photovoltaic Solar Quality Management System standard
 
New Delhi Airport
New Delhi AirportNew Delhi Airport
New Delhi Airport
 
Airport IT&T 2013 Cornelious Bernard
Airport IT&T 2013 Cornelious BernardAirport IT&T 2013 Cornelious Bernard
Airport IT&T 2013 Cornelious Bernard
 
use case diagramHospital managment system
use case diagramHospital managment systemuse case diagramHospital managment system
use case diagramHospital managment system
 
Prison management system
Prison management systemPrison management system
Prison management system
 
Adtec Mekanikal Nov 08
Adtec Mekanikal Nov 08Adtec Mekanikal Nov 08
Adtec Mekanikal Nov 08
 
Srs
SrsSrs
Srs
 
Web based Prison management system
Web based Prison management systemWeb based Prison management system
Web based Prison management system
 
Face recognition with age
Face recognition with ageFace recognition with age
Face recognition with age
 
Trace Criminal using IBM Watson
Trace Criminal using IBM WatsonTrace Criminal using IBM Watson
Trace Criminal using IBM Watson
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Knn
KnnKnn
Knn
 
Prison management system
Prison management system Prison management system
Prison management system
 
face recognition system using LBP
face recognition system using LBPface recognition system using LBP
face recognition system using LBP
 

Similar to Face detection system

CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AICRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
IRJET Journal
 
Motion based security alarm
Motion based security alarmMotion based security alarm
Motion based security alarm
Akshay Surve
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face Identification
IRJET Journal
 
1 (1)
1 (1)1 (1)
Secure crime identification system
Secure crime identification systemSecure crime identification system
Secure crime identification system
Sameer Telikicherla
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
Vaibhav P
 
Inttelix OnTime
Inttelix OnTimeInttelix OnTime
Inttelix OnTime
Inttelix
 
Facial login System ppt in computr science and information technology
Facial login System ppt in computr science and information  technologyFacial login System ppt in computr science and information  technology
Facial login System ppt in computr science and information technology
rajeevs54785
 
Facial Recognition System For Access Control
Facial Recognition System For Access ControlFacial Recognition System For Access Control
Facial Recognition System For Access Control
Md. Saddam Hossain Noyon
 
Face detection & recognition
Face detection & recognitionFace detection & recognition
Face detection & recognition
Madhuri Negi
 
Face Recognition Proposal Presentation
Face Recognition Proposal PresentationFace Recognition Proposal Presentation
Face Recognition Proposal Presentation
Md. Atiqur Rahman
 
Comparative Analysis of Face Recognition Methodologies and Techniques
Comparative Analysis of Face Recognition Methodologies and TechniquesComparative Analysis of Face Recognition Methodologies and Techniques
Comparative Analysis of Face Recognition Methodologies and Techniques
Farwa Ansari
 
AI Based Image Analysis & Analytics Solution-.pdf
AI Based Image Analysis & Analytics Solution-.pdfAI Based Image Analysis & Analytics Solution-.pdf
AI Based Image Analysis & Analytics Solution-.pdf
Vikki Choudhry
 
Human Face Identification
Human Face IdentificationHuman Face Identification
Human Face Identification
bhupesh lahare
 
foot crime final for awareness site .pptx
foot crime final for awareness site .pptxfoot crime final for awareness site .pptx
foot crime final for awareness site .pptx
ImmanImman6
 
Criminal Identification - Full PPT (1) (1).pptx
Criminal Identification - Full PPT (1) (1).pptxCriminal Identification - Full PPT (1) (1).pptx
Criminal Identification - Full PPT (1) (1).pptx
MathanE5
 
Face recognition
Face recognitionFace recognition
Face recognition
Avinash Prakash
 
Facial Recognition System
Facial Recognition SystemFacial Recognition System
Facial Recognition System
Arun ACE
 
Face Recognition System using OpenCV
Face Recognition System using OpenCVFace Recognition System using OpenCV
Face Recognition System using OpenCV
IRJET Journal
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median Filter
NIDHI SHARMA
 

Similar to Face detection system (20)

CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AICRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
 
Motion based security alarm
Motion based security alarmMotion based security alarm
Motion based security alarm
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face Identification
 
1 (1)
1 (1)1 (1)
1 (1)
 
Secure crime identification system
Secure crime identification systemSecure crime identification system
Secure crime identification system
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
Inttelix OnTime
Inttelix OnTimeInttelix OnTime
Inttelix OnTime
 
Facial login System ppt in computr science and information technology
Facial login System ppt in computr science and information  technologyFacial login System ppt in computr science and information  technology
Facial login System ppt in computr science and information technology
 
Facial Recognition System For Access Control
Facial Recognition System For Access ControlFacial Recognition System For Access Control
Facial Recognition System For Access Control
 
Face detection & recognition
Face detection & recognitionFace detection & recognition
Face detection & recognition
 
Face Recognition Proposal Presentation
Face Recognition Proposal PresentationFace Recognition Proposal Presentation
Face Recognition Proposal Presentation
 
Comparative Analysis of Face Recognition Methodologies and Techniques
Comparative Analysis of Face Recognition Methodologies and TechniquesComparative Analysis of Face Recognition Methodologies and Techniques
Comparative Analysis of Face Recognition Methodologies and Techniques
 
AI Based Image Analysis & Analytics Solution-.pdf
AI Based Image Analysis & Analytics Solution-.pdfAI Based Image Analysis & Analytics Solution-.pdf
AI Based Image Analysis & Analytics Solution-.pdf
 
Human Face Identification
Human Face IdentificationHuman Face Identification
Human Face Identification
 
foot crime final for awareness site .pptx
foot crime final for awareness site .pptxfoot crime final for awareness site .pptx
foot crime final for awareness site .pptx
 
Criminal Identification - Full PPT (1) (1).pptx
Criminal Identification - Full PPT (1) (1).pptxCriminal Identification - Full PPT (1) (1).pptx
Criminal Identification - Full PPT (1) (1).pptx
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Facial Recognition System
Facial Recognition SystemFacial Recognition System
Facial Recognition System
 
Face Recognition System using OpenCV
Face Recognition System using OpenCVFace Recognition System using OpenCV
Face Recognition System using OpenCV
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median Filter
 

More from Akshay Surve

Women security application
Women security applicationWomen security application
Women security application
Akshay Surve
 
Virus detection system
Virus detection systemVirus detection system
Virus detection system
Akshay Surve
 
Travel planning
Travel planningTravel planning
Travel planning
Akshay Surve
 
Student feedback system
Student feedback systemStudent feedback system
Student feedback system
Akshay Surve
 
Software security
Software securitySoftware security
Software security
Akshay Surve
 
Shoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login systemShoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login system
Akshay Surve
 
Pharming attack
Pharming attackPharming attack
Pharming attack
Akshay Surve
 
Issue tracking system
Issue tracking systemIssue tracking system
Issue tracking system
Akshay Surve
 
Buget planning system
Buget planning systemBuget planning system
Buget planning system
Akshay Surve
 
Automatic attendance system
Automatic attendance systemAutomatic attendance system
Automatic attendance system
Akshay Surve
 
E notes application2.ppsx
E notes application2.ppsxE notes application2.ppsx
E notes application2.ppsx
Akshay Surve
 
Attitude
AttitudeAttitude
Attitude
Akshay Surve
 

More from Akshay Surve (12)

Women security application
Women security applicationWomen security application
Women security application
 
Virus detection system
Virus detection systemVirus detection system
Virus detection system
 
Travel planning
Travel planningTravel planning
Travel planning
 
Student feedback system
Student feedback systemStudent feedback system
Student feedback system
 
Software security
Software securitySoftware security
Software security
 
Shoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login systemShoulder surfing resistant graphical and image based login system
Shoulder surfing resistant graphical and image based login system
 
Pharming attack
Pharming attackPharming attack
Pharming attack
 
Issue tracking system
Issue tracking systemIssue tracking system
Issue tracking system
 
Buget planning system
Buget planning systemBuget planning system
Buget planning system
 
Automatic attendance system
Automatic attendance systemAutomatic attendance system
Automatic attendance system
 
E notes application2.ppsx
E notes application2.ppsxE notes application2.ppsx
E notes application2.ppsx
 
Attitude
AttitudeAttitude
Attitude
 

Recently uploaded

132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
Mahmoud Morsy
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
gowrishankartb2005
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))
shivani5543
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
RamonNovais6
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 

Recently uploaded (20)

132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))gray level transformation unit 3(image processing))
gray level transformation unit 3(image processing))
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 

Face detection system

  • 1.
  • 2. PRISONER FACE DETECTION SYSTEM GROUP MEMBERS  FARHAN NAIK.  KANCHAN VAVA.  SHWETA FULWANI.  AKSHAY AUTI. UNDER THE GUIDANCE OF Miss. Suwarna Nimkarde.
  • 3. POINTS TO DISCUSS  Existing System  Limitations of Existing System  Proposed System Working  Flow of System  Advantages of Proposed System  Application  Soft. & Hardware Specification System Design conclusion  References
  • 4. EXISTING SYSTEM In existing system criminal information is stored in file format with outdated images and low quality images. Using this information it is not possible for eye witness to guess the criminal, so there is need to develop a better method for identifying criminals like finger print, DNA…Etc. Among all these methods face detection method is cost effective and more accurate.
  • 5. LIMITATIONS OF EXISTING SYSTEM Using Existing System Its Difficult for eye witness to guess the criminal . It’s Difficult ToMaintain Data Physically. Human Interaction Required.
  • 6. PROPOSED SYSTEM  Prisoner face detecting system can be used in police department.  This software contains front end and back end applications where front end is used to visualize the output and back end is used to store data.  Initially criminal images are stored in database along with his bio data. Every image is sliced by eyes, hair, lips and nose..etc and stored in database as separate record.  These images are shown to eye witness while investigation separately, if witness can judge any part of criminal we can recover entire criminal record based on that clue.  With this system police will provide better option to witness to judge criminal.
  • 7. WORKING Capture Image Convert To Gray Image Edge Detection Comparison Report The Admin
  • 9. ADVANTAGES OF PROPOSED SYSTEM  Unlike many other identification methods (e.g., fingerprints, voiceprint, signature), they do not need to make direct contact with an individual in order to verify their identity  Less Complex Than OtherMethod.
  • 10. APPLICATION IN MANY SERCURITY SYSTEM It can be used in VIDEO SURVEILENCE SYSTEM It can be used in CCTV(CLOSED CIRCUIT TELEVISION) It can be used in Criminal Investigations, Home Security, Military, Intelligence
  • 11. REQUIREMENT SPECIFICATION SOFTWARE SPECIFICATIO N • Operating System Windows XP • Programming language : • JAVA SOFTWARE TOOLS • Backend • MS Access HARDWARE SPECIFICATION • PROCESSOR: Speed minimum: PIII 800 MHz • RAM: Minimum: 128 MB, 256 MB
  • 12. SYSTEM DESIGN E-RDIAGRAMS BETWEEN ADMINISTRATOR AND EMPLOYEE: User id Pwd User id Pwd Administrator Authentication Employee
  • 13. E-R DIAGRAMS BETWEEN EMPLOYEE AND EYEWITNESS: Employee Viewing & selecting, images Eyewitness User id Pwd User id Pwd Criminal details Criminal images Criminal images
  • 14. E-R DIAGRAM BETWEEN EYEWITNESS AND ADMINISTTRATOR Administrator Authen tication Eyewitness User id Pwd User id Pwd
  • 15. USE CASE DIAGRAM Administrator: Login Inserting/Updating Criminal Details Splitting/Updating Images Inserting/Updating Face Details Already Existed Criminal New Criminal Deleting Images Administrator criminal
  • 16. Client (Operator): operator Login retriving the images operator Criminal identifying the images
  • 17. ACTIVITY DIAGRAM Administrator: Administrator check yes No Criminal Details Operations Insert Update Delete View splitting Merging
  • 18. Operator: Operator check yes No Retrieve Image Identify Image
  • 19. CONCLUSION This system seems to be working fine and successfully. This system can able to provide the proper training set of data and test input for recognition. The face matched or not is given in the form of picture image if matched and text message in case of any difference.
  • 20. REFERENCES WEB REFERENCES • http://www.filestub.com • http://www.ebookee.org • http://www.google.com