Professional Documents
Culture Documents
Project Report
Project Work MIS(ECS 853)
Degree
BACHELOR OF TECHNOLOGY (CSE)
June, 2021
We here by declare that this Project Report titlel Identity Detector submitted by
us and approved by our project guide, Faculty of Engineering & Computing
Sciences. Teerthanker Mahaveer University, Moradabad, is a bonafide work
undertaken by us and it is not submitted to any other University or Institution for
the award of any degree diploma / certificate or published any time before.
Project ID :
Table of Contents
1 PROJECT TITLE............................................................................................................................................ 4
2 PROBLEM STATEMENT................................................................................................................................ 4
3 PROJECT DESCRIPTION................................................................................................................................ 4
3.1 SCOPE OF THE WORK..........................................................................................................................................4
3.2 PROJECT MODULES..........................................................................................................................................4
3.3 CONTEXT DIAGRAM (HIGH LEVEL)......................................................................................................................4
4 IMPLEMENTATION METHODOLOGY............................................................................................................ 4
5 TECHNOLOGIES TO BE USED........................................................................................................................ 4
5.1 SOFTWARE PLATFORM.....................................................................................................................................4
5.2 HARDWARE PLATFORM....................................................................................................................................5
5.3 TOOLS, IF ANY................................................................................................................................................ 5
6 ADVANTAGES OF THIS PROJECT.................................................................................................................. 5
7 ASSUMPTIONS, IF ANY................................................................................................................................ 5
8 FUTURE SCOPE AND FURTHER ENHANCEMENT OF THE PROJECT.................................................................5
9 PROJECT REPOSITORY LOCATION................................................................................................................ 5
10 DEFINITIONS, ACRONYMS, AND ABBREVIATIONS........................................................................................ 6
11 CONCLUSION.............................................................................................................................................. 6
12 REFERENCES............................................................................................................................................... 7
Appendix
A: Data Flow Diagram (DFD)
B: Entity Relationship Diagram (ERD)
C: Use Case Diagram (UCD)
D: Data Dictionary (DD)
E: Screen Shots
1 Project Title
Identity Detector
2 Problem Statement
It's an dynamic identity detector wher you will be able to detect the face of the person by
having their image on tge screen these can be widely used in public areas to detect the identity
of person
3 Project Description
CID is a application that helps to identify data bases information. It draws the image of person
based on user detection of person image and search the images from the database. It replaces
the work of forensic artist and saves the time of searching the criminal. It does this quickly and
accurately using deep learning algorithms.
1.2 Inputs
It requires face detection
• 1.3 Processing
After generating the image it search the image in the database.
• 1.4 Outputs
Searched Images.
4.2 Inputs
Customer image is entered.
4.3 Processing
4.4 Outputs
Database update successfully.
3.1.2 Inputs
This module requires images of database to apply algorithm.
• 3.1.3 Processing
Provided input is processed and data is updated in the database.
• 3.1.4 Outputs
All the images of databases updated.
face detection
Identity
User
Detector
4 Implementation Methodology
Step 1- Model and Dataset Building
Models- Stack GAN Stage 1 and Stage 2, Siamese Neural Network.
Dataset- 5000 Image caption with Image pair require for model training.
Step 2- Desktop GUI Building
Tkinter based GUI require to process input and give desire output.
5 Technologies to be used
5.1 Software Platform
a) Front-end
Python Tkinter
b) Back-end
Stack GAN Algorithm
Siamese Neural Network
PyTorch
Speech recognition API
7 Assumptions, if any
Assuming faces will change with time need to update the images face aging algorithm.
Abbreviation Description
CID Identity Detector
GAN Generative Adversarial Network
11 Conclusion
If we wants to implement this application on large scale then we has to hand over this project to
government then government can collect images at time of voter ID creation because it requires 18+
aged people who are legally consider for crime and after that age very our face gets slow changes. It
requires image updation within two to three year using face-aging GAN algorithm.
It is not for personal use , it will be used professionally by investigation teams.
12 References
3. arxiv.org
4. medium.com
5. towarddatascience.com
Annexure A
Data Flow Diagram (DFD)
(Mandatory)
Level-0
Identity Detector
Siamese
STACK GAN Neural Network
Model Model
Stage 1 Stage 3
Person Image
Image
Search
Output
Image DB 1mage
Annexure B
Entity-Relationship Diagram (ERD)
(Mandatory)
Databases
Fetching
Images
Annexure D
Data Dictionary (DD)
(Mandatory)
Example:
Fields Data type Description
USR-Voice Input Text l face description
User
Annexure E
Screen Shots
Testing-1
Home Page:
Stage 2 Page:
Stage 3 Page:
This stage comes after pressing search button. Below image is searched by Siamese neural
network model by comparing the above generated image with the images in database.
Testing-2
Stage 1 Page:
Stage 2 Page:
Stage 3 Page: