You are on page 1of 7

i

PROJECT DESIGN REPORT


ON
FACETEC: A EFFICIENT FACE RECOGNITION IN
MOBILES FOR THEFT DETECTION




Submitted by

Ashish S Kumar (11409008)
Sreedevi S (11409050)
Dhanya A D (11409058)
Prayaga T K (11409042)


DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
MOHANDAS COLLEGE OF ENGINEERING AND
TECHNOLOGY
ANAD, NEDUMANGAD
THIRUVANANTHAPURAM-695544

ii

MOHANDAS COLLEGE OF ENGINEERING
AND TECHNOLOGY
ANAD, NEDUMANGAD
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING



CERTIFICATE

This is to certify that the bonafide report of project design done by
ASHISH S KUMAR (11 409 008) of Computer Science and Engineering in
partial fulfillment of the requirement for the award of the Degree of
B-Tech in Computer Science and Engineering of University of Kerala during
the academic year 2014-2015.


Project Guide Project Coordinator HOD of CSE



Place: Anad
Date:




iii

ACKNOWLEDGEMENT

We would like to express our heartfelt gratitude to our respected Director
Dr. Ashalatha Thampuran and Principal Dr. Ibrahimkutty who have encouraged and
inspired us throughout our course of study in this college. We would also like to thank
Prof. Gangadharan K, Head of Department, Department of Computer Science and
Engineering for providing all the resources and supporting us in every way.
I have taken efforts in this project. However, it would not have been possible without
the kind support and help of many individuals and organizations. I would like to extend my
sincere thanks to all of them.
I am highly indebted to Mrs. Thamizharasi A, Assistant Professor, Department of
Computer Science and Engineering, for their guidance and constant supervision as well as for
providing necessary information regarding the project & also for their support in completing
the project.

I would like to express my gratitude towards my parents & staff members of
Mohandas college of Engineering and Technology for their kind co-operation and
encouragement which help me in completion of this project.

My thanks and appreciations also go to my friends in developing the project and
people who have willingly helped me out with their abilities.



DATE:
iv











ABSTRACT


















v


ABSTRACT


This project aims at utilizing the face recognition technique utilized in mobile phones
to detect and send an automated message to the utilizer about the unauthorized utilization of
the mobile phone. Untill now there is no such application in mobile phones that detects a
larceny. The application currently available only aims at detecting faces and sanctioning
persons. This project is aiming at engendering an incipient application that will detect
larceny and will take the obligatory steps in an efficient manner utilizing optimized
algorithms. Automatic face recognition in unconstrained environments is a challenging task.
Most face recognition algorithms rely on one or more of three types of features: local binary
patterns, Gabor wavelet responses including Gabor phases, and color information. This
project represents the face recognition approach that employs the local directional pattern
descriptor and two-dimensional principal analysis algorithms to achieve enhanced
recognition accuracy. It utilizes the transformed image obtained from local directional
pattern descriptor as the direct input image of two-dimensional principal analysis
algorithms, unlike that most of previous works employed the local pattern descriptors to
acquire the histogram features. Additionally, we assess the usability of the algorithms in
mobile devices with limited resources.





vi


LIST OF FIGURES

Sl. No. Diagram Page no.

Fig 1. DFD for FACETEC (level 0) 12
Fig 2. DFD for initial configurations (level 1) 13
Fig 3. DFD for authentication process (level 1) 14
Fig 4. UCD for User 16
























vii


LIST OF ABBREVIATION


LDP Local directional Patterns
2D-PCA 2 dimensional principal component analysis
SDK Software Development kit
DFD Data flow Diagram
IDE Integrated development Environment
UCD Use case Diagram
DB Database
EP Evolutionary Pursuit
LBP Local Binary Patterns
HMM Hidden Markov Models
EBGM Elastic Bunch Graph Matching

You might also like