Mahi Proj
Mahi Proj
2
ABSTRACT
There is an abnormal increase in the traitor’s rate and also the number of missing person
rate is increasing, this leads towards a great concern about the security issues. Crime
preventions and criminal identification are the primary issues before the police
personnel, since property and lives protection are the basic concerns of the police but to
combat the crime, the availability of police personnel is limited. To avoid this situation
an automated facial recognition system for criminal identification is proposed using
Haar feature-based cascade classifier. This paper presents a real-time face recognition
with matching system using an automated surveillance camera. This system will be able
to detect and recognize face automatically in real-time. With the advent of security
technology, cameras especially CCTV have been installed in many public and private
areas to provide surveillance activities. The footage of the CCTV can be used to identify
suspects on scene. In this paper, an automated facial recognition system for criminal
database was proposed using known Haar feature-based cascade classifier. This system
will be able to detect face and recognize face automatically in real time. An accurate
location of the face is still a challenging task. Viola-Jones framework has been widely
used by researchers in order to detect the faces and objects with matching technology in
a given image. Face detection classifiers are shared by public communities, such as
OpenCV. Thus the criminal or the missing person will be known to the policemen where
they can catch them easily.
3
TABLE OF CONTENTS
CHAPTER
TITLE PAGE
NO.
ABSTRACT 4
LIST OF FIGURES 7
LIST OF ABBREVIATIONS 8
1 INTRODUCTION 8
2 LITERATURE SURVEY 13
3 SYSTEM ANALYSIS 16
4 SYSTEM REQUIREMENTS 23
5 SOFTWARE DESCRIPTION 30
6 MODULES DESCRIPTION 39
7 RESULT ANALYSIS 47
9 APPENDIXES 51
10 REFERENCES 73
5
LIST OF FIGURES
6
LIST OF ABBREVIATIONS
MF Matrix Factorization
NN Nearest Neighbour
RS Recommender System
7
CHAPTER 1
1 INTRODUCTION
9
1.5 FACE DETECTION AND RECOGNITION
In present world, security is the high rated concern of everybody. People can go to
every extent to safeguard themselves and their family. They hire security guards and
install cameras to protect themselves from theft. But sometimes installing cameras is not
sufficient. Hence, to ensure complete security, an integrated security system has been
10
proposed known as FRAS- Facial Recognition Alert System for home, bank, office etc.
1.7 METHODS OF FACE RECOGNITION
11
CHAPTER 2
LITERATURE SURVEY
2.1 Collaborative Filtering-Based Recommendation Of Online Social Voting
Xiwang Yang ; Chao Liang ; Miao Zhao ; Hongwei Wang ; Hao Ding ; Yong
Liu ; Yang Li ; Junlin Zhang
Social voting is an emerging new feature in online social networks. It poses unique
challenges and opportunities for recommendation. In this paper, we develop a set of matrix-
factorization (MF) and nearest-neighbor (NN)-based recommender systems (RSs) that
explore user social network and group affiliation information for social voting
recommendation. Through experiments with real social voting traces, we demonstrate that
social network and group affiliation information can significantly improve the accuracy of
popularity-based voting recommendation, and social network information dominates group
affiliation information in NN-based approaches. We also observe that social and group
information is much more valuable to cold users than to heavy users. In our experiments,
simple metapath-based NN models outperform computation-intensive MF models in hot-
voting recommendation, while users' interests for nonhot votings can be better mined by MF
models. We further propose a hybrid RS, bagging different single approaches to achieve the
best top-k hit rate.
12
CHAPTER 3
SYSTEM ANALYSIS
In the existing system, the identification of the spoofing user with matching the
database is analyzed with the generated system. Face presentation attack detection (PAD)
is essential for securing the widely used face recognition systems. UDA-Net performs
unsupervised adversarial domain adaptation in order to optimize the source domain and
target domain encoders jointly, and obtain a common feature space shared by both
domains.
Criminal record generally contains personal information about particular person
along with photograph. To identify any criminal we need some identification regarding
person, which are given by eyewitnesses [6]. Based on the details given by eyewitnesses,
the criminal who did the crime will be identified manually.
3.1.1 ALGORITHM
Principle Component Analysis (PCA)
Principal Component Analysis commonly uses the eigenfaces in which the probe
and gallery images must be the same size as well as normalized to line up the eyes and
mouth of the subjects whining the images. Approach is then used to reduce the dimension of
data by the means of image compression basics and provides most effective low dimensional
structure of facial pattern. This reduction drops the unuseful information and decomposes the
face structure into orthogonal (uncorrelated) components known as eigenfaces. Each face
image is represented as weighted sum feature vector of eigenfaces which are stored in 1-D
array. A probe image is compared against the gallery image by measuring the distance
between their respective feature vectors then matching result has been disclosed. The main
advantage of this technique is that it can reduce the data needed to identify the individual to
13
1/1000th of the data presented.
DRAWBACK
• In most cases the quality and resolution of the recorded image segments are poor and hard
to identify a face.
• If a eyewitnesses observe a criminal only from single direction, it may not be possible to
recognize him.
• The photograph, which is a hard copy, cannot be able to divide or split into different
modules. So it is very difficult to find, unless we get full-fledged details.
• Sometimes the eyewitness may not be able to draw, the face of criminal
• Sometimes, if we maintain the criminal details manually and physically. After a time
span, the photographs and other details may tend to tear out.
14
3.2 PROPOSED WORK
In our proposed system, a wide presentation of the face domain adaptation and
detection has been added. The implementation will be given with two order:
identification of the criminals and identification of the missing person with the face
recognition. Here the ordered frame based conversion is adapted with the HAAR
cascades feature point extraction system. Feature extraction domain has plenty of
collection of generalized face features from several images of the same subject. Then,
each face image is processed, features are extracted and the collection of features are
analyzed and combined into a single generalized features collection, which is written to
the database. The face is our primary focus of attention in social inter course playing a
major role in conveying identification and emotion. Although the ability to infer
intelligence or character from facial appearance is a guess but still the human ability to
recognize faces is remarkable. This analogy would give us enough scope to envisage a
new algorithm. There are mainly three important ways in construction of the face i.e., by
using the eyewitness function, adding details and clipping image. This offers us a face as
finally identification parameter to know who has committed the crime.
Advantages
• The image of the unauthorized person will be captured and intimate it to the user.
• The image can be captured in from the video thus user are not in need of watching
it continuously.
• Less amount of storage needed because only the captured image is stored in the
database.
• User can immediately alert the nearby friends because they can get intimation with
that picture.
15
3.3 BLOCK DIAGRAM
A block diagram of the proposed face recognition system is shown in fig. 3.1. In this
figure the three key steps of face recognition, namely, face detection, facial feature
extraction and face recognition are identified. Detailed descriptions of these steps are
addressed in the following sub-sections.
16
3.4 ARCHITECTURE DIAGRAM
System architecture can be defined as a structure composed of components, and rules
characterizing the interaction of these components. System architecture diagram is a
starting point of product description visualization – a product structure overview.
Three types of system architectures are identified, integrated, distributed and mixed,
(partly integrated and partly distributed). It is shown that the type of interfaces defines
the type of architecture. Integrated systems have more interfaces, which furthermore are
vaguely defined. An application architecture diagram provides a high-level graphical
view of the application architecture, and helps you identify applications, sub-applications,
components, databases, services, etc, and their interactions. See Application and Business
Services (EAM). System - A packaged application.
If you restricted yourself to four layers, they may be defined as:
1) Algorithm,
2) Programming language/compiler,
3) processor/memory,
4) I/O. Other abstraction definitions may contain three layers:
1) Application,
2) System software,
3) Hardware
Various organizations define systems architecture in different ways, including:
• An allocated arrangement of physical elements which provides the design solution
for a consumer product or life-cycle process intended to satisfy the requirements of the
functional architecture and the requirements baseline.
• Architecture comprises the most important, pervasive, top-level, strategic
inventions, decisions, and their associated rationales about the overall structure (i.e.,
essential elements and their relationships) and associated characteristics and behavior.
17
• If documented, it may include information such as a detailed inventory of current
hardware, software and networking capabilities; a description of long-range plans and
priorities for future purchases, and a plan for upgrading and/or replacing dated equipment
and software.
18
Fig 3.2 System Architecture of the proposed face detection
19
CHAPTER 4
SYSTEM REQUIREMENTS
4.1 HARDWARE REQUIREMENTS
• Processor : Intel processor 3.0GHz
• RAM : 2GB
• Server : WAMP
20
CHAPTER 5
SOFTWARE DESCRIPTION
Unlike most Linux distributions, Windows does not come with the Python programming
language by default. However, you can install Python on your Windows server or local
machine in just a few easy steps.
PREREQUISITES
• A system running Windows 10 with admin privileges
• Command Prompt (comes with Windows by default)
• A Remote Desktop Connection app (use if you are installing Python on a remote
Windows server)
MySQL is the world's most used open source relational database management system
(RDBMS) as of 2008 that run as a server providing multi-user access to a number of
databases. The MySQL development project has made its source code available under the
terms of the GNU General Public License, as well as under a variety of proprietary
agreements. MySQL was owned and sponsored by a single for-profit firm, the Swedish
company MySQL AB, now owned by Oracle Corporation.
MySQL is a popular choice of database for use in web applications, and is a central
component of the widely used LAMP open source web application software stack—LAMP
is an acronym for "Linux, Apache, MySQL, Perl/PHP/Python." Free-software-open source
projects that require a full-featured database management system often use MySQL.
For commercial use, several paid editions are available, and offer additional
functionality. Applications which use MySQL databases include: TYPO3, Joomla, Word
Press, phpBB, MyBB, Drupal and other software built on the LAMP software stack.
MySQL is also used in many high-profile, large-scale World Wide Web products, including
22
Wikipedia, Google (though not for searches), Imagebook, Twitter, Flickr, Nokia.com, and
YouTube.
Inter images
MySQL is primarily an RDBMS and ships with no GUI tools to administer MySQL
databases or manage data contained within the databases. Users may use the included
command line tools, or use MySQL "front-ends", desktop software and web applications
that create and manage MySQL databases, build database structures, back up data, inspect
status, and work with data records. The official set of MySQL front-end tools, MySQL
Workbench is actively developed by Oracle, and is freely available for use.
Graphical
Command line
MySQL ships with some command line tools. Third-parties have also developed tools
to manage a MySQL server, some listed below. Maatkit - a cross-platform toolkit for
MySQL, PostgreSQL and Memcached, developed in Perl Maatkit can be used to prove
replication is working correctly, fix corrupted data, automate repetitive tasks, and speed up
23
servers. Maatkit is included with several GNU/Linux distributions such as CentOS and
Debian and packages are available for Programming. MySQL works on many different
system platforms, including AIX, BSDi, FreeBSD, HP-UX, eComStation, i5/OS, IRIX,
Linux, Mac OS X, Microsoft Windows, NetBSD, Novell NetWare, OpenBSD, OpenSolaris,
OS/2 Warp, QNX, Solaris, Symbian, SunOS, SCO Open Server, SCO UnixWare, Sanos and
Tru64. A port of MySQL to OpenVMS also exists.
MySQL is written in C and C++. Its SQL parser is written in yacc, and a home-
brewed lexical analyzer. Many programming languages with language-specific APIs include
libraries for accessing MySQL databases. These include MySQL Connector/Net for
integration with Microsoft's Visual Studio (languages such as C# and VB are most
commonly used) and the JDBC driver for Java. In addition, an ODBC interim age called
MyODBC allows additional programming languages that support the ODBC inter image to
communicate with a MySQL database, such as ASP or ColdFusion. The HTSQL - URL-
based query method also ships with a MySQL adapter, allowing direct interaction between a
MySQL database and any web client via structured URLs.
Features
As of April 2009, MySQL offered MySQL 5.1 in two different variants: the open source
MySQL Community Server and the commercial Enterprise Server. MySQL 5.5 is offered
under the same licenses. They have a common code base and include the following features:
24
• Updatable Views
• Information schema
• Strict mode (ensures MySQL does not truncate or otherwise modify data to conform to an
underlying data type, when an incompatible value is inserted into that type)
• X/Open XAdistributed transaction processing (DTP) support; two phase commit as part
of this, using Oracle's InnoDB engine
• Transactions with the InnoDB, and Cluster storage engines
• SSL support
• Query caching
• Sub-SELECTs (i.e. nested SELECTs)
• Replication support (i.e. Master-Master Replication & Master-Slave Replication) with
one master per slave, many slaves per master, no automatic support for multiple masters per
slave.
• Full-text indexing and searching using MyISAM engine
• Embedded database library
• Partititoned tables with pruning of partitions in optimiser
• Shared-nothing clustering through MySQL Cluster
• Hot backup (via mysqlhotcopy) under certain conditions
Multiple storage engines, allowing one to choose the one that is most effective for each table
in the application (in MySQL 5.0, storage engines must be compiled in; in MySQL 5.1,
storage engines can be dynamically loaded at run time): Native storage engines (MyISAM,
Falcon, Merge, Memory (heap), Federated, Archive, CSV, Blackhole, Cluster, EXAMPLE,
Maria, and InnoDB, which was made the default as of 5.5). Partner-developed storage
engines (solidDB, NitroEDB, ScaleDB, TokuDB, Infobright (formerly Brighthouse),
Kickfire, XtraDB, IBM DB2). InnoDB used to be a partner-developed storage engine, but
with recent acquisitions, Oracle now owns both MySQL core and InnoDB
25
CHAPTER 6
MODULES DESCRIPTION
• Video Acquisition
• Frame Conversion
• Face registration
• Face capture
• Alert
27
weights of the weak classification functions are inversely proportional to their errors.
The goal of this stage is to train the most relevant features of the face and to disregard
redundant features. The last step of the Viola-Jones algorithm is a cascade of classifiers.
The classifiers constructed in the previous step form a cascade. In this set up structure,
the goal is to minimize the computation time and achieve high detection rate. Sub-
windows of the input image will be determined a face or non-face with classifiers of
increasing complexity. If a there is a positive result from the first classifier, it then gets
evaluated by a second more complex classifier, and so on and so forth until the sub-
window is rejected. By doing this, the structure utilizes the early stages of the cascade in
order to reject as many negatives as possible
Here the face detection technique is enhanced using the extracted features of the
human. Face detection is further classified as face detection in images and real-time face
detection. In this project we will attempt to detect faces in video based detection system.
To do this it would be useful to study the Haar cascades face detection. In this research,
we implement Haar Cascade Classifier to detect human faces using an Open Source
Computer Vision Library. For human face detection, haar features are the main part of
haar cascade classifier
29
non-face candidate immediately. Each stage contains different Haar features and each of
these features is classified by Haar feature classifier.
6.5 CRIMINALS AND MISSING PERSON DETECTION
After the database matching RNN classification system the matched features are
known. Thus the matched feature value will get the image of the missing person and
criminals details. The image analysis will give the complete details of the person.
6.5 ALERT
An, intimation will be sent to the user to their registered mail with that captured
image. Thus after the intimation the user can alert the nearby neighbor’s regarding these
suspicious activity occurring in the user home. The user intimation will be made only
when the user gets the person is unknown. Here the intimation is sent using the E-mail
method system where captured image will be sent. Here it makes an intimation system
so that the user can alert. The image of the unknown person given as a proof in their
email and they can alert their nearby people.
Face
Recognitionc
Traitor detection
riminal Police
and recognition
Database
31
Face
Police Criminal recognition
face
CCTV view matching Matching
TRAITOR DETECTION
AND MATCHING
32
6.7 UML DIAGRAM AND USE CASE DIAGRAM
The Unified Modeling Language (UML) is a general-purpose, developmental,
modeling language in the field of software engineering that is intended to provide a
standard way to visualize the design of a system.
Use case diagrams are usually referred to as behaviour diagrams used to describe
a set of actions (use cases) that some system or systems (subject) should or can perform
in collaboration with one or more external users of the system (actors).
33
CHAPTER 7
RESULT ANALYSIS
A face image database was created for the purpose of benchmarking the face
recognition system. The image database is divided into two subsets, for separate training
and testing purposes. During SOM training, 30 images were used, containing six subjects
and each subject having 5 images with different facial expressions. fig 7.1 shows the
training and testing image database constructed.
34
detectors are find the interest points in an image, and descriptors are used to extract the
feature vectors at each interest point just as in SIFT. RNN uses Hessian-matrix
approximation to locate the interest points instead of difference of Gaussians (DoG) filter
used in SIFT. RNN as a descriptor uses the first-order Haar wavelet responses in x and y,
whereas the gradient is used by SIFT. RNN usually uses 64 dimensions in Gaussian
extraction to reduce the time cost for both feature matching and computation. SURF has
three times better performance as compared to SIFT.
The process of identifying and spotting a criminal is slow and difficult. Criminals,
these days are getting smarter by not leaving any form of biological evidence or fingerprint
impressions on the crime scene. A quick and easy solution is using state-of-the-art face
identification systems. With the advancement in security technology, CCTV cameras are
being installed at most of the buildings and traffic lights for surveillance purposes. The
video footage from the camera can be used to identify suspects, criminals, runaways,
missing persons etc. This paper explores a way to develop a criminal identification system
using ML and deep neural networks. The following method can be used as an elegant way
to make law enforcement hassle-free.
36
CHAPTER 8
9.2 SCREENSHOT
37
38
39
40
41
CHAPTER 10
REFERENCES
1. Kirti Dang, Shanu Sharma, "Review and Comparison of Face Detection Algorithms ",
International Conference on Cloud Computing, Data Science & Engineering - Confluence,
2017
2. S.Z. Li, Juwei Lu, "Generalizing capacity of face database for face recognition", IEEE
International Conference on Automatic Face and Gesture Recognition, 2002
3. Quanyou Zhao, Shujun Zhang, A Face Detection Method Based on Corner Verifying ,
International Conference on Computer Science and Service System (CSSS),2011
4. Dr. P.Shanmugavadivu , Ashish Kumar , Rapid Face Detection and Annotation with
Loosely Face Geometry, 2016
5. Chang Huang, Haizhou Ai, "High-Performance Rotation Invariant Multiview Face
Detection" , Ieee Transactions On Pattern Analysis And Machine Intelligence, 2007
42