Professional Documents
Culture Documents
Project Report
Project Work Phase 2 (ECS 899)
Degree
BACHELOR OF TECHNOLOGY (CSE)
June, 2021
We here by declare that this Project Report titled Criminal Identity Detector
submitted by us and approved by our project guide, Faculty of Engineering &
Computing Sciences. Teerthanker Mahaveer University, Moradabad, is a bonafide
work undertaken by us and it is not submitted to any other University or
Institution for the award of any degree diploma / certificate or published any time
before.
Project ID : ECSP-13
Table of Contents
1 PROJECT TITLE............................................................................................................................................ 4
2 PROBLEM STATEMENT................................................................................................................................ 4
3 PROJECT DESCRIPTION................................................................................................................................ 4
3.1 SCOPE OF THE WORK..........................................................................................................................................4
3.2 PROJECT MODULES..........................................................................................................................................4
3.3 CONTEXT DIAGRAM (HIGH LEVEL)......................................................................................................................4
4 IMPLEMENTATION METHODOLOGY............................................................................................................ 4
5 TECHNOLOGIES TO BE USED........................................................................................................................ 4
5.1 SOFTWARE PLATFORM.....................................................................................................................................4
5.2 HARDWARE PLATFORM....................................................................................................................................5
5.3 TOOLS, IF ANY................................................................................................................................................ 5
6 ADVANTAGES OF THIS PROJECT.................................................................................................................. 5
7 ASSUMPTIONS, IF ANY................................................................................................................................ 5
8 FUTURE SCOPE AND FURTHER ENHANCEMENT OF THE PROJECT.................................................................5
9 PROJECT REPOSITORY LOCATION................................................................................................................ 5
10 DEFINITIONS, ACRONYMS, AND ABBREVIATIONS........................................................................................ 6
11 CONCLUSION.............................................................................................................................................. 6
12 REFERENCES............................................................................................................................................... 7
Appendix
A: Data Flow Diagram (DFD)
B: Entity Relationship Diagram (ERD)
C: Use Case Diagram (UCD)
D: Data Dictionary (DD)
E: Screen Shots
1 Project Title
Criminal Identity Detector
2 Problem Statement
Hand-drawn forensic sketch based on witness descriptions and searching of the criminal based
on sketch are both time consuming method. We can automate this work by using deep learning
algorithms which can identify criminal quickly and accurately.
3 Project Description
CID is a application that helps to identify criminal based on eye witness information. It draws
the image of criminal based on user voice input and search the images from the database. It
replaces the work of forensic artist and saves the time of searching the criminal. It does this
quickly and accurately using deep learning algorithms.
1.2 Inputs
It requires voice input from user.
• 1.3 Processing
After generating the image it search the image in the database.
• 1.4 Outputs
Searched Images.
4.2 Inputs
Customer voice input is entered.
4.3 Processing
4.4 Outputs
Database update successfully.
3.1.2 Inputs
This module requires images of database to apply algorithm.
• 3.1.3 Processing
Provided input is processed and data is updated in the database.
• 3.1.4 Outputs
All the images of databases updated.
Voice Input
Criminal
Identity
User
Detector
4 Implementation Methodology
Step 1- Model and Dataset Building
Models- Stack GAN Stage 1 and Stage 2, Siamese Neural Network.
Dataset- 5000 Image caption with Image pair require for model training.
Step 2- Desktop GUI Building
Tkinter based GUI require to process input and give desire output.
5 Technologies to be used
5.1 Software Platform
a) Front-end
Python Tkinter
b) Back-end
Stack GAN Algorithm
Siamese Neural Network
PyTorch
Speech recognition API
7 Assumptions, if any
Assuming faces will change with time need to update the images face aging algorithm.
Abbreviation Description
11 Conclusion
If we wants to implement this application on large scale then we has to hand over this project to
government then government can collect images at time of voter ID creation because it requires 18+
aged people who are legally consider for crime and after that age very our face gets slow changes. It
requires image updation within two to three year using face-aging GAN algorithm.
It is not for personal use , it will be used professionally by investigation teams.
12 References
4. medium.com
5. towarddatascience.com
Annexure A
Data Flow Diagram (DFD)
(Mandatory)
Level-0
Criminal Identity
Detector
Searched image
TMU-FOE&CS Version 5.0 T003A-Project Report
Speech Siamese
Recognition STACK GAN Neural Network
API Model Model
Annexure B
Entity-Relationship Diagram (ERD)
(Mandatory)
Voice to Text
Inputting
User
Voice
Converter
Passing
Text
Fetching
Images
Annexure D
Data Dictionary (DD)
(Mandatory)
Example:
User Table (USR)
Fields Data type Description
USR-Voice Input Text Criminal face description
Annexure E
Screen Shots
Testing-1
Home Page:
Here user gives voice input by pressing microphone button that converts to text by speech
recognition API.
Stage 2 Page:
This stage comes after pressing draw button on home page. It contains the image generated
from text by Stack GAN model.
Stage 3 Page:
This stage comes after pressing search button. Below image is searched by Siamese neural
network model by comparing the above generated image with the images in database.
Testing-2
Stage 1 Page:
Stage 2 Page:
Stage 3 Page: