Criminal Face Recognition Using GAN
Criminal Face Recognition Using GAN
ISSN No:-2456-2165
Abstract:- Forensics and security at present often use distribution. The generative model can be thought of as
low technological resources. Security measures often fail analogous to a team of counterfeiters, trying to produce
to update with the upcoming technology. This project is fake currency and use it without detection, while the
based on implementing an automatic face recognition of discriminative model is analogous to the police, trying to
criminals or specific targets using machine-learning detect the counterfeit currency. Competition in this game
approach. Given a set of features to a Generative drives both teams to improve their methods until the
Adversarial Network(GAN), the algorithm generates an counterfeits are indistinguishable from the genuine articles.
image of the target with the specified feature set. The This framework can yield specific training algorithms for
input to the machine can either be a given set of features many kinds of model and optimization algorithms. The
or a set of portraits varying from frontals to side special case when the generative model generates samples
profiles from which these features can be extracted. The by passing random noise through a multilayer perceptron,
accuracy of the system is directly proportional to the and the discriminative model is also a multilayer perceptron
number of epochs trained in the network. The is explored. This special case is referred to as adversarial
generated output image can vary from primitive, low nets. In this case, training is performed on both models
resolution images to high quality images where features using only the highly successful backpropagation and
are more recognizable. This is then compared with a dropout algorithms and samples from the generative model
predefined database of existing people. Thus, the target using only forward propagation. No approximate inference
can immediately be recognized with the generation of or Markov chains are necessary.
an artificial image with the given biometric feature set,
which will be again compared by a discriminator II. DRAWBACKS OF EXISTING SYSTEM
network to check the true identity of the target.
Human-made sketches may be ambiguous and unclear.
I. INTRODUCTION The primitive sketches of a target may be black and
white or monochrome. Features which are colour
The promise of deep learning is to discover rich, dependent will not be significant.
hierarchical models that represent probability distributions Some features can be changed by culprit/target. E.g.
over the kinds of data encountered in artificial intelligence hair colour, hairstyle, etc.
applications, such as natural images, audio waveforms Face recognition by humans takes more time if the
containing speech, and symbols in natural language target face has to find a match without a database.
corpora. So far, the most striking successes in deep learning
have involved discriminative models, usually those that III. METHOD
map a high-dimensional, rich sensory input to a class label.
These striking successes have primarily been based on the The proposed method presents a detailed deep
backpropagation and dropout algorithms, using piecewise learning-based model for face identification and detection.
linear units which have a particularly well-behaved We are proposing this method specifically for criminal
gradient. Deep generative models have had less of an identification. An image of the person, who you want to
impact, due to the difficulty of approximating many identify is given as the input to the machine or generative
intractable probabilistic computations that arise in network. This image may be uploaded by the investigating
maximum likelihood estimation and related strategies, and crew through an android application which can be installed
due to difficulty of leveraging the benefits of piecewise into their mobile phones.
linear units in the generative context. A new generative
model estimation procedure is proposed that side-steps Our goal is to determine the target’s identity by
these difficulties. In the proposed adversarial nets utilizing the visual clues obtained via the camera. The input
framework, the generative model is pitted against an image is fed into the Generative Adversarial Network
adversary: a discriminative model that learns to determine (GAN) via android app. The image is taken into the
whether a sample is from the model distribution or the data generator first after preprocessing, the image features that
Generative Adversarial Networks are used to identify [1]. D. J. Robertson, R. S. Kramer, and A. M. Burton,
targets or criminals even with slightly different facial ``Fraudulent ID using face morphs: Experiments on
features, including hair colour, eye colour, facial hair human and automatic recognition,'' PLoS ONE, vol.
structure, etc. Thus, even when the target can disguise 12, no. 3, 2017, Art. no. e0173319.
themselves, they are identified using the adversarial [2]. J. Zhao, L. Xiong, P. K. Jayashree, J. Li, F. Zhao,
technique of machine learning. Generators can generate Z. Wang, P. S. Pranata, P. S. Shen, S. Yan, and J.
more realistically fake images with slightly tuned features Feng. Dual-agent gans for photorealistic and Identity
which the discriminator will extract features from and can preserving profile face synthesis. In NIPS, 2017.
further generate the corresponding identity code of the [3]. Karras, Tero, et al. "Progressive growing of GANS
target from the database. Thus face recognition is carried for improved quality, Stability, and variation," arXiv
out successfully. preprint arXiv:1710.10196, 2017.
[4]. T. Salimans, I. Goodfellow, W. Zaremba, V.
V. CONCLUSION Cheung, A. Radford, and X.Chen, “Improved
Techniques for Training GANs,” in Advances In
A system that can recover undisguised faces could be Neural Information Processing Systems, 2016, pp.
helpful for criminal investigation. In particular, witnesses 2234–2242.
should be able to make use of these processed images to [5]. X. Yu and F. Porikli, “Ultra-resolving face images
identify the criminals among a series of ID photos, which by discriminative generative networks,” in Proc.
typically include no disguise or in person among a number European Conf. Comput. Vis. Springer, 2016, pp.
of held suspects. People utilizing online dating apps could 318–333.
also utilize the system to reverse the real person behind the [6]. C. Peng, X. Gao, N. Wang, and J. Li, ``Face
facial disguise, a feature that many find useful. This project recognition from multiple stylistic sketches:
is built on current work related to GAN-based style Scenarios, datasets, and evaluation,'' Pattern
transform methods that are commonly employed for Recognit., vol. 84, pp. 262272, Dec. 2018.
applying facial disguise. There have been significant [7]. M. S. Sarfraz and R. Stiefelhagen, “Deep perceptual
improvements in machine capability to identify and verify mapping for cross modal face recognition,”
human faces over the past few years. Device makers are International Journal of Computer Vision, vol. 122,
already taking advantage of such development by no. 3, pp. 426–438, May 2017.
equipping their latest phones and tablets with AI co- [8]. I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu,
processor and powerful image processing algorithms. D. Warde-Farley, S. Ozair, A. Courville, and Y.
However, the recent trend has mostly focused on making Bengio, “Generative adversarial nets,” in Advances in
facial identification and verification invariant to facial neural information processing systems, 2014, pp.
features. These works certainly help machines recognize 2672– 26.
human faces. However, most humans are interested in
seeing people in the natural state without any facial
disguise.