0% found this document useful (0 votes)
30 views12 pages

Face Detection 1

face detect system

Uploaded by

Pavan Rajput
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views12 pages

Face Detection 1

face detect system

Uploaded by

Pavan Rajput
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODT, PDF, TXT or read online on Scribd
You are on page 1/ 12

Project Report On

Submitted to partial fulfillment of the requirement for the


award of degree of
Bachelor of Computer Application

Submitted to

Under Guidence of: Submitted by:


Mr. Mahboob Husain Gaurav Kumar
6BCA
Enroll No.AX1490500028
ROLL NO.

Study Center:
Subhash Academy
(College of IT and Management)

Awas Vikas Colony, Chhibramau (Kannauj) PIN-209721

E-mail: [email protected]

Ph: 05691-221589(0), Mob. 9415147186,9335939000

Sc Code:9050

Ref. No.: Gen/ Dated:

CERTIFICATE FROM STUDY CENTER


This is to certify that the dissertation entitled Face Detecting
System submitted by Gaurav Kumar having Enrollment Number
AX149050028 for the partial fulfillment of the requirements of BCA
degree of MAKHANLAL CHATURVEDI NATIONAL UNIVERSITY
OF JOURNALISM & COMMUNICATION, BHOPAL, embodies the
bonafide work done by him under my supervision.

Director System Manager


SELF CERTIFICATE

This to certify that the project report entitled “FACE DETECTING


SYSTEM” is done by me in authentic work carried out for the partial
fulfillment of the requirement for the award of the degree of
Bachelor of Computer Application under guidance of Mr.
Mahboob Husain (MCA) the matter embodied in this project work
has been submitted earlier for award of any degree or diploma to
the best of my knowledge and belief.

Name: Gaurav Kumar Signature of


Student
Class: 6BCA
Enrollment No. AX149050028
ACKNOWLEDGMENT

Praise to God, he beneficial it is he no one else who has given us


all the boundaries, which we see, in the world and given courage to
complete this project.

The project work in this report is an outcome of continual work over


a period of six months and drew intellectual support from various
sources. Obligations thus incurred in completing the work have
been many. It is there for almost impossible to express my gratitude
and appreciation to those who have been contributing to bring
about this project.

I take this opportunity to thanks Mr. Mahboob Hu sain, project


guide who has give me chance to work in development.
Last but not least, my sincere thanking to parents, who were
directly or indirectly instrumental in enabling to accomplish the
project successfully.

Date-:
Candidate-: GAURAV KUMAR
INDEX

1. Abstract

2. Introduction

3. System Analysis

a) Existing System

b) Proposed System

4. Feasibility Report

a) Technical Feasibility

b) Operational Feasibility

c) Economical Feasibility

5. System Requirement Specification Document

a) Modules Description

b) Process Flow

c) SDLC Methodology

d) Software Requirement

e) Hardware Requirement

6. System Design

a) E-R Diagram

b) DFD
c) UML

7. Technology Description

8. Coding

9. Testing & Debugging Techniques

10. Output Screens

11.Future Enhancements

12. Bibliography
Abstract:

Title:

Criminal Face Identification System

Objective:

Criminal record generally contains personal information about

particular person along with photograph. To identify any criminal we

need some identification regarding person, which are given by

eyewitness. In most cases the quality and resolution of the recorded

image segments in poor and hard to identify a face. To overcome

this sort of problem we are developing software. Identification can

be done in many ways like finger print, eyes, DNA etc. One of the

application is face identification. The face is our primary focus of

attention in social inters course playing a major role in in conveying

identify and emotion. Although the ability to infer intelligence or

character from facial appearance in suspect, the human ability to

recognize face is remarkable.


INTRODUCTION
PURPOSE OF THE PROJECT:
This project is aimed to Identify the crlmlnals In any
Investlgatlon department. Here the technique Is we already
store some Images of the criminals In our database along
with his details and that images are segmented Into many
slices say eyes, hairs, lips, nose, etc. These images are
again stored in another database
record so to identify any crminas; eyewitnesses will see the
images or slces that appear on the screen by using it we
develop the face, which may or may not be matched with
0
our images. If any image is matched up to 99 /o then we
predict that he is only the criminal. Thus using this project it
provides a very friendly environment for both operator and
eyewitness to easily design any face can identify
criminals very easy.

PROJECT OBJECTIVE:
This project is intended to identify a person using the images
previously taken. The identification will be done according the
previous images of different persons.

PROJECT SCOPE:
The scope of the project is confined to store the image
and store in the database. When a person has to be identifie
the images stored in the database are compared with the
existing details.
OVERVIEW OF THE PROJECT:
This project is aimed to identify
the criminals in any investigation department. Here the
technique is we already store some images of the
criminals in our database along with his details
and those images are segmented into many sllces say
eyes, halrs, Ilps, nose, etc. These Images are again
s t o r e d in another database record so to Identify any
crlmlnals; eyewltnesses wlll see tile images or slices that
appear on the screen by uslng it we develop the face, which
may or may not be matched with our Images. If any
image Is matched up to 99% then we predict that he is
only the criminal. Thus using this project it provides a
very friendly environment for both operator and
eyewitness to easily design any face can identify criminals
very easy.
PROBLEM AREA DESCRIPTION
The project is aimed at identify¡ng the criminals with the help of eye
witness. There are mainly four modules in our project. They
are Adding,

Deleting, Updating and identifying the criminals. There are mainly three
roles in our project. They are:
➢ Administrator
➢ Operator
➢ Eyewitness

The administrator is responsible for providing User id's and passwords.


He provides authentication to the users. He creates deletes and Updates
the User ids and Passwords.
The operator, who belongs to the investigating department, is
responsible for entering the criminal details and maintains them. He
adds, deletes and updates the criminal details. He also constructs the
criminal face with the help of eye witness.

The eyewitness identifies the criminals with the help


of cropped parts stored in a diffrent database by the operator. The
eyewitness selects a cropped part from the database and that
cropped part will be freeze by the operator in this way, complete
face of the criminal is constructed and the details of that criminal
is retrieved from the database. We can also construct a new image
from those cropped parts which we consider as an imaginary
face of the criminal.

SYSTEM ANALYSIS
The first step in developing anything is to state the
requirements. This applies just as much to leading edge researcla
as to -imple programs and to personal programs, as well as to
large team efforts. Being vague about your objective only
postpones decisions to a later stage where changes are much
more costly.
The problem statement should state what is to be done
and not how it is to be done. It should be a statement of
needs, not a proposal for a solution. A user manual for the
desired system is a good problem statement. The requestor
should indicate which features are mandatory and which are
optional, to avoid overly constraining design decisions. The
requestor should avoid describing system internals, as this
restricts implementation flexibility. Performance specifications
and protocols for interaction with externa I systems are
legitimate requirements. Software engineering standards, such
as modular construction, design for testability, and provision for
future extensions, are also proper.

Many problems statements dividuals, companies, and


government agencies, mixture requirements with design
decisions. There may sometimes be a compelling reason to
require a particular computer or language; there is rarely
justification to specify the use of a particular algorithm. The
analyst must separate the true requirements from design and
implementation decisions disguised as requirements. The
analyst should

You might also like