Projece Report
Projece Report
Projece Report
FACE RECOGNITION:
A MODERN WAY OF SECURITY
A PROJECT REPORT
Submitted by
Patel Poojan Babubhai
AnikAli Zulfikar Mukhi
Makvana Shivansh Dineshbhi
Desai Neel Pradipkumar
In fulfillment for the award of the degree
of
BACHELOR OF ENGINEERING
in
Computer Engineering
CE-IT Department
CERTIFICATE
This is to certify that the Project Work entitled “FACE RECOGNITION: A MORDEN WAY
OF SECURITY” has been carried out by Patel Poojan Babubhai (20BECE30175), AnikAli
Zulfikar Mukhi (221SBECE30013), Makvana Shivansh Dineshbhi (221SBECE30010), Desai
Neel Pradipkumar (20BECE30203) under my guidance in fulfillment of the degree of Bachelor
of Engineering in Computer Engineering Semester-6 of Kadi Sarva Vishwavidyalaya University
during the academic year 2022-2023.
We take this opportunity to humbly express our gratitude to all those who are
concerned with our project. Working in a good environment and motivation
enhances the quality of the work and that’s what we got from our University
through our Software Engineering Project based on a combination of
Supervised Machine Learning, Data Science and Predictive Analysis.
We are glad to receive this golden opportunity under the expert guidance of
Prof. Pinkal Chauhan from Computer Engineering department of LDRP-ITR,
Gandhinagar. We are sincerely indebted to her for giving us the opportunity to
work on this project. Her continuous guidance and help have proved to play a
key role in our success in overcoming the challenges that we faced during the
course of our project work.
We are heartily thankful to her for guiding us and leading to the completion of
project successfully. She has provided us with her experience and expertise for
the seamless timeline of the project report. We are also thankful to the Head of
Department Dr. Sandeep Modha for providing us with such a wonderful
opportunity.
To conclude, we thank all the people who had directly or indirectly help as to
complete our project.
3
ABSTRACT
Face recognition systems are used in practically every industry in this digital
age. One of the most widely utilized biometrics is face recognition. Today’s
video surveillance camera system usually is not occupied with a face
recognition system. With some modification, a surveillance camera system can
be used as face detection and recognition that can be done in real-time. The
proposed system makes use of devices with cameras that can identify a person
automatically by using face recognition technology. It can be used for security,
authentication, and identity, among other things.
4
TABLE OF
CONTENTS
Acknowledgement 3
Abstract 4
Table of Contents 5
List of Figures 7
List of Tables 8
1 Introduction 9
1.1 Introduction 9
1.2 Aims and Objective of the work 9
1.3 Brief Literature Review 10
1.4 Problem Definition 11
5
4 System Diagrams 17
4.1 ER Diagram 17
5 Data Dictionary
24
6 References and Future Works
26
6.1 Conclusion 26
6.3 Bibliography 26
6
LIST OF FIGURES
NO NAME PAGE NO
7
LIST OF TABLES
NO NAME PAGE NO
1 User Table 25
2 Owner_Images Table 25
3 Stranger_Images Table 25
8
1) Introduction
1.1 Introduction
Nowadays, people want one sole thing that is to make them feel safe and secure.
The most commonly used security system is the CCTV (closed circuit
Television). It is usually installed in hospitals, malls, parking lots etc. However,
with the help of CCTV one can monitor the area 24/7, or the footage if stored in
a location can be retrieved when required. Although, it can be used to deter
crime and allows the authorities to identify and solve a crime, it doesn’t detect
neither recognize the person who is involved. So, we developed a system that
allow us to get significant features for identifying individuals and notifying the
user. Face recognition is started in this when any human face detected in the
radius of the device’s camera. The system will activate and automatically take
pictures. The taken image will be compared to the ones that are stored in the
backend database. If the face does not exist in the database, it will be stored as
newly detected, and the system will notify the user of captured image. The
mentioned functionality will only happen if user has turned on the secure mode
in our android application. The process of face detection and face recognition is
done with help of the Open-source computer vision (OpenCV).
9
To achieve this aim we have created facial detection system using python and
OpenCV, and for the user’s convenience we have developed an android
application which uses this facial detection system to notify the user of
unknown individuals.
Introduction:
10
1.4 Problem definition
• Detecting objects.
• Face detection.
• Sending Notification to the user.
• Storing Faces in Database Automatically.
• Simple Application UI.
11
2) Technology and Literature Review
2.1 Technology
Android:
In this project the main application is developed for android devices using java
as base programming language.
Python:
In our application the main machine learning code for facial recognition is
written in python programming language.
OpenCV:
In our application we use OpenCV library for its excellent video and image
analysis and facial detection and recognition capabilities.
12
Firebase:
In our application google’s firebase database is used for user authentication and
to store the major data which is used by the application.
NumPy:
NumPy is a Python library used for working with arrays. It also has functions
for working in domain of linear algebra, Fourier transform, and matrices.
In our project NumPy is used to create the value arrays that are used in our
facial recognition application.
Abstract: Nowadays the need for a safe and secure system is desired by each
and every individual in the society. The most commonly used system, Closed
Circuit Television (CCTV) is being implemented everywhere such as in
hospitals, warehouses, parking lots, buildings etc... However, this very system
though effective has its downside when it comes to cost. Thus, the need for a
cost-effective system is required. The existing system for surveillance is a
security camera with the night vision capabilities using raspberry pi and
OpenCV. This is a cost-effective method that uses a credit card sized chip RPI.
The image is captured and each frame is processed. The image is stored and an
email is sent if human is detected.
13
Limitations:
Limitations:
14
3) System Requirements Study
• User must know the technical terms used in the system for performing
different tasks specially related to facial recognition.
• User should be also being aware about the background running process of
the system.
Software Requirements:
Client:
Server:
15
Hardware Requirements:
Client:
Assumptions:
• User is the person having enough knowledge for the basic mobile apps.
• We will provide a user-friendly interface so that any user can easily
navigate through the system, but he/she should be capable of providing
valid faces for successful login.
• The server used for data storing is always secured.
Dependencies:
• The system is dependent upon the user’s valid credentials. If user inputs
wrong username or password, he/she will not be allowed to login to the
system. But user can reset his/her password.
16
4) System Diagrams
4.1 ER Diagram
17
4.2 Use Case Diagram
18
4.3 Data Flow Diagram
19
4.3.1 Context Level DFD
20
21
4.4 Activity Diagram
22
4.5 Sequence Diagram
The Sequence diagram is one of the most effective diagrams to model object
interactions in a system. A Sequence diagram is modeled for every Use Case.
Whereas the Use Case diagram enables modeling of a business view of the
scenario, the Sequence diagram contains implementation details of the scenario,
including the objects and classes that are used to implement the scenario, and
messages passed between the objects.
23
5) Data Dictionary
If a project team member wants to know the definition of a data item name or
the contents of a particular data flow, the information will be available in the
data dictionary. Descriptions of all data used in the system are given in a data
dictionary.
Our system heavily relies on google’s firebase, which is a noSQL database for
that reason our system contains less database tables and very simple entity
relationship-structure.
24
User Table:
2. Name varchar 40 -
Owner_Images Table:
Stranger_Images Table:
25
6) References and Future Works
6.1 Conclusion
6.3 Bibliography
www.geeksforgeeks.org/android-tutorial
www.geeksforgeeks.org/python-programming-language/learn-python-tutorial
www.geeksforgeeks.org/machine-learning
https://app.diagrams.net/
https://www.researchgate.net/publication/284253914_Face_detection_and_reco
gnition_application_for_Android
https://docs.google.com
https://console.firebase.google.com/
https://www.python.org/
https://developer.android.com/studio
https://www.researchgate.net/publication/303880721_Face_Detection_and_Fac
e_Recognition_in_Android_Mobile_Applications
26