Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
9 views5 pages

Research Paper 3

Criminal face detector

Uploaded by

preranavu12
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views5 pages

Research Paper 3

Criminal face detector

Uploaded by

preranavu12
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

IJARCCE ISSN (O) 2278-1021, ISSN (P) 2319-5940

International Journal of Advanced Research in Computer and Communication Engineering


ICRTTC '23
International Conference on Recent Trends and Technologies in Computing
Department of Computer Science and Engineering, Arasu Engineering College
Vol. 12, Special Issue 1, April 2023

Criminal Face Detection Using Machine Learning-A


Project Report
Dharani1, Gayathri2, Sridharshini3, Mrs.Revathy4
U.G. Student, Department of Computer Engineering, Arasu Engineering College, Kumbakonam, India1
Associate Professor, Department of Computer Engineering, Arasu Engineering College, Kumbakonam, India2-4

Abstract: Criminal Face Detection project aims to build a automated Criminal Face Detection system by levering the human
ability to recall minute facial details. Identification of criminals at the scene of a crime can be achieved in many ways like
fingerprinting, DNA matching or eye witness accounts. Out of these methods eye witness accounts are preferred because it stands
scrutiny in court and it is a cost effective method. It is possible that witnesses to a crime have seen the criminal though in most
cases it may not be possible to completely see the face of the perpetrator. The Criminal Face Detection System will be built of an
existing criminal database. Input would be provided in the form of sketch or an image and matched against the existing database
and results would be provided. Criminal record generally contains personal information about particular person along with
photograph. This project is aimed to identify the criminals in any investigation department. Perhaps one of the most well-known
applications of facial recognition technology is law enforcement, where we can use it to find missing people, aid in solving crimes
and help monitor large crowds of people.

Keywords: DNA , Facial Recognition


I. INTRODUCTION

The idea of the project has been taken from the TV Series named PERSON OF INTEREST which is an American science fiction
crime drama television series in which a computer system were developed for the U.S. government named “THE MACHINE” that
is capable of collating all sources of information to predict and identify— in advance—people planning terrorist acts. As an
artificial super intelligence, its objective is to predict and prevent imminent terrorist attacks and does so by analysing immense
amounts of surveillance data. The Machine sorts through all available information and categorizes persons of interest into relevant
(national security risk) and irrelevant (ordinary risk) cases. It categorizes each POI based on their actions to determine whether
they are the victim or the perpetrator.

It uses various machine learning techniques to determine the identity, location, and intentions of monitored persons by infiltrating
domestic organizations such as the National Security Agency and foreign agencies including Interpol (“No Good Deed”) to
analyse their databases and data from various sources such as video footage, phone calls (landline, VOIP, mobile), GPS,
electronic transactions, e-mail, social media, etc. The Machine was created with the ability to simulate the outcomes of different
scenarios to aid it in making choices and to better fulfil its purpose. Finch taught it to how to play chess and the importance of
making good decisions. It can evaluate the outcomes of different strategies by way of simulating them. In a mere fraction of a
second, the Machine can create and process thousands of highly detailed, highly accurate simulations.

II. RELATED WORK

Human face recognition systems use unique mathematical patterns to store biometric data. Hence, they are among the safest and
most effective identification methods in biometric technology. Facial data can be anonymized and kept private to reduce the risk
of unauthorized access.

III. METHODOLOGY

Facial recognition uses computer-generated filters to transform face images into numerical expressions that can be compared to
determine their similarity. These filters are usually generated by using deep “learning,” which uses artificial neural networks to
process data.

© IJARCCE DOI: 10.17148/IJARCCE 6


IJARCCE ISSN (O) 2278-1021, ISSN (P) 2319-5940
International Journal of Advanced Research in Computer and Communication Engineering
ICRTTC '23
International Conference on Recent Trends and Technologies in Computing
Department of Computer Science and Engineering, Arasu Engineering College
Vol. 12, Special Issue 1, April 2023
IV. MODULES

1.Registration:
This is the first step of implementing criminal identification where criminal has to be registered to the database. The details of
criminal involve id, name, crime details and the photograph of criminal. This face can be used for identifying the criminal
captured through the surveillance camera.

2.Face detection:
The video captured from the surveillance camera are converted into frames. In this frames the model checks the presence or
absence of face in the image. Once face is detected its location is localized and only the face image is extracted.

© IJARCCE DOI: 10.17148/IJARCCE 7


IJARCCE ISSN (O) 2278-1021, ISSN (P) 2319-5940
International Journal of Advanced Research in Computer and Communication Engineering
ICRTTC '23
International Conference on Recent Trends and Technologies in Computing
Department of Computer Science and Engineering, Arasu Engineering College
Vol. 12, Special Issue 1, April 2023
3.Preprocessing Images:
The aim of pre-processing is an improvement of the image data that suppresses undesirable distortions or enhances some image
features significant for further processing. In this step the features that are to be extracted are processed, for improving the rate of
recognizing the face.

4.Feature extraction:
When a face is detected in a frame, it is pre-processed and then it goes through feature extraction. The performance of the entire
system depends on this step. Different facial features are extracted using the Haar cascade classifier.

5.Open CV:
Open CV is the vast open-source library for the computer vision, machine learning, and image processing and plays a major role
in real-time operation which is very important in today’s systems. Through Open CV, one can process images and videos to
identify objects, faces, or even handwriting of a human. Open Source Computer Vision Library is a library of programming
functions aimed at real-time computer vision. Classifier provides the differences between positive and negative image where the
positive image is for face and the negative image is for non-face image. Open CV trains the classifier on any chosen face as set in
the program and provides pre-trained and ready for implementing face detection classifier.

© IJARCCE DOI: 10.17148/IJARCCE 8


IJARCCE ISSN (O) 2278-1021, ISSN (P) 2319-5940
International Journal of Advanced Research in Computer and Communication Engineering
ICRTTC '23
International Conference on Recent Trends and Technologies in Computing
Department of Computer Science and Engineering, Arasu Engineering College
Vol. 12, Special Issue 1, April 2023

6.Classification:
The features of the processed real-time image are compared with the features of images which are stored in the criminal database.
Classification is performed using Haar Cascade Classifier.

7.Notification:
If a match is found between the real time image and database image of a criminal, an alert message along with the location and
real time image of the criminal would be sent to the authority. From this details the police can further track the criminal.

© IJARCCE DOI: 10.17148/IJARCCE 9


IJARCCE ISSN (O) 2278-1021, ISSN (P) 2319-5940
International Journal of Advanced Research in Computer and Communication Engineering
ICRTTC '23
International Conference on Recent Trends and Technologies in Computing
Department of Computer Science and Engineering, Arasu Engineering College
Vol. 12, Special Issue 1, April 2023

V. EXPERIMENTAL RESULTS

The face images which are used in experiment are based on different varieties including changes in pose and facial details and
variability in expressions. This end is achieved using the ORL face database. The database consists of 35 individual and
corresponding 350 images. All images in the ORL database is considered for experiment purpose. The performance measure is
based on accuracy of face recognition

VI. CONCLUSION

This upgraded version of the criminal detecting system not only provides a huge convenience to the Police in the identification of
criminals but also saves time for them as processes are automated in the system. The novelty of this Research Paper is face
detection done by using Face Encodings.

REFERENCES

[1] NurulAzma Abdullah, Md. JamriSaidi, NurulHidayahAb Rahman, Chuah Chai Wen, and IsredzaRahmi A. Hamid’s “FACE RECOGNITION FOR
CRIMINAL IDENTIFICATION: AN IMPLEMENTATION OF PRINCIPAL COMPONENT ANALYSIS FOR FACE RECOGNITION”, AIP Conference
Proceedings 1891, 020002 Electronic copy available at: https://ssrn.com/abstract=3884827 6 (2017); https://doi.org/10.1063/1.5005335
[2] Apoorva. P, Impana. H.C, Siri. S.L, Varshitha. M.R and Prof. Ramesh. B’s “AUTOMATED CRIMINAL IDENTIFICATION BY FACE RECOGNITION
USING OPEN COMPUTER VISION CLASSIFIERS”, Third International Conference on Computing Methodologies and Communication (ICCMC 2019),
DOI: 10.1109/ICCMC.2019.8819850
[3] Prof.Rupali T. Umbare, Ms.Janhavi S. Takalgavankar, Ms.Harshada S. Yadav, and Ms.Pruthvi A. Tilekar's “AIRPORT SECURITY USING FACE-
RECOGNITION”, International Journal of Future Generation Communication and Networking, vol. 13, No. 3, (2020).
[4] VikramMohanty, David Thames, Sneha Mehta, and Kurt Luther, “Photo Sleuth: Combining Human Expertise and Face Recognition to Identify Historical
Portraits”, Conference: the 24th International Conference, March 2019, https://doi.org/10.1145/3301275.3302301
[5] Dr. Asif Ali, RadhikaMandhanya, Shraddha Birla, UjjwalMandloi and Vipul Jain’s “Automatic Face Recognition Attendance System using Python and
OpenCV”, GRD Journals- Global Research and Development Journal for Engineering | Volume 6 | Issue 4 | March 2021.
[6] P. Kowsalya, J. Pavithra, G. Sowmiya and C.K. Shankar’s “ATTENDANCE MONITORING SYSTEM USING FACE DETECTION & FACE
RECOGNITION”, International Research Journal of Engineering and Technology (IRJET), Volume: 06 Issue: 03 | Mar 2019.
[7] Kian Raheem Qasim and Sara Salman Qasim’s, “Force Field Feature Extraction Using Fast Algorithm for Face Recognition Performance”, Iraqi Academics
Syndicate International Conference for Pure and Applied Sciences, https://doi.org/10.1088/1742- 6596/1818/1/012195.

© IJARCCE DOI: 10.17148/IJARCCE 10

You might also like