Professional Documents
Culture Documents
Abstract - With the increase in development of Facial Recognition and Identification, Raspberry
modern technology, a smart way of living has pi, Python and OpenCV.
turned out to be a major necessity for humans to
Ⅰ. INTRODUCTION
progress. Security is a matter of great concern for
the people as well as the police personals. Security Facial recognition is an interesting and challenging
control plays a vital role in protecting resources problem, it impacts important applications in many
from damage and theft. Criminal identification and areas such as identification of law enforcement,
crime prevention are the primary issues for the authentication for banking and security system
police authority as lives and property protection are access. The best way to distinguish human is
the basic concerns for the common man. To tackle through facial characteristics. In current world,
the crime, availability of police personals, and the security matters and it is of great concern. Security
time taken by them to detect the crime would be a controls play a vital role in protecting resources
hurdle which they need to progress through. Our from espionage, sabotage, damage, theft, and
proposed system is to develop a security system illegal usage. The application of this project
with improved facilities, which tries to eliminate the involves safe and theft free environment as well as
problems faced by the police personals. To to provide better protection from the threat of
overcome the limitations of the existing security intruders. Nowadays, there is exponential usage of
systems like the CCTV cameras which have been face recognition systems which are used in various
installed in public as well as private places, an fields. However, camera angle variation from which
intelligent system is deployed where in a facial the input images or a video is taken, illumination
recognition model is trained and deployed on a and occlusion act as a factor to decrease in the
Raspberry pi. Here the facial identification is done performance while performing facial recognition
on the input image or live videos, and the face is and identification on the images or videos acquired
recognized. The facial recognition model is built from these devices. Here we are developing a
using Python and Open CV. If any suspect is found system that watches the environment, if any human
then it is notified to the respected authority with the activity is detected, then the system captures it.
image containing face. This system finds Automatic facial identification and detection is
application in areas such as banks, airports, in performed by the system. If any suspicious activity
homes as smart intruder system, etc. or event is detected then the system notifies the user
with the image containing the face and the location.
Keywords – Security, Smart Intruder System, Here, the system is nothing, but a robust facial
recognition model which is trained on a dataset was proposed by viola and jones. This proposed
containing a lot of images with a face captured algorithm finds specific Harr features and not pixel
from different angles and lighting conditions. After values of the human face. A simple Harr-like
training and testing of this model with desirable feature can be defined as the difference of the sum
accuracy, then the model is deployed on Raspberry of the pixels of areas inside the rectangle, which
pi which is used as a potable and standalone can be at any position and scale with the image.
embedded system. A database is created to detect
the criminals and notify the respective authority.
Ⅱ. LITERATURE SURVEY
In [1]: This paper describes the development of
robust face recognition system to overcome beaches
in security. The input to this system is taken from
various surveillance cameras that are installed in
various places. This is done to obtain facial features
to compare with the database.
6% 94% 3 48
Plagiarized
Plagiarism Unique Unique Sentences
Sentences
With the increase in development of modern technology, a smart way of living has turned out to be a major necessity
for humans to progress. Security is a matter of great concern for the people as well as the police personals. Security
control plays a vital role in protecting resources from damage and theft. Criminal identification and crime prevention are
the primary issues for the police authority as lives and property protection are the basic concerns for the common man.
To tackle the crime, availability of police personals and the time taken by them to detect the crime would be a hurdle
which they need to progress through. Our proposed system is to develop a security system with improved facilities,
which tries to eliminate the problems faced by the police personals. To overcome the limitations of the existing security
systems like the CCTV cameras which has been installed in public as well as private places, an intelligent system is
deployed where in a facial recognition model is trained and deployed on a Raspberry pi. Here the facial identification is
done on the input images or live videos and the face is recognized. The facial recognition model is built using Python
and OpenCV. If any suspect is found then it is notified to the respected authority with the image containing face. This
system finds application in areas such banks, airports, in homes as smart intruder system etc.
Facial recognition is an interesting and challenging problem, it impacts important applications in many areas such as
identification of law enforcement, authentication for banking and security system access. The best way to distinguish
human is through facial characteristics.
In current world, security matters and it is of great concern. Security controls play a vital role in protecting resources
from espionage, sabotage, damage, theft, and illegal usage. The application of this project involves safe and theft free
environment as well as to provide better protection from the threat of intruders.
Nowadays, there is exponential usage of face recognition systems which are used in various fields. However, camera
angle variation from which the input images or a video is taken, illumination and occlusion act as a factor to decrease in
the performance while performing facial recognition and identification on the images or videos acquired from these
devices.
Here we are developing a system that watches the environment, if any human activity is detected, then the system
captures it. Automatic facial identification and detection is performed by the system. If any suspicious activity or event is
detected then the system notifies the user with the image containing the face and the location.
Here, the system is nothing but a robust facial recognition model which is trained on a dataset containing a lot of
images with a face captured from different angles and lighting conditions. after training and testing of this model with
desirable accuracy, then the model is deployed on Raspberry pi which is used as a potable and standalone embedded
system. A database is created to detect the criminals and notify the respective authority.
This paper describes the development of robust face recognition system to overcome beaches in security. The input to
this system is taken from various surveillance cameras that are installed in various places. This is done in order to
obtain facial features to compare with the database.
Here the system is being trained using deep neural networks to disentangle the abstractions and to pick the features
that are most important and to increase the performance.
The system has been divided into following functional blocks. The Face Recognition Process can be divided into Three
Phases namely,
Enrolment Phase - Face Detection, Feature Extraction, Model Creation and database up-dation
Recognition Phase or Query Phase – Face Detection, Feature Extraction, Comparing with the models in DB.
Action Phase – Identification of unauthorized entry, Alert the person concerned using phone and alarm
The algorithm used here for face detection was proposed by viola and jones. This proposed algorithm finds specificPage 2
Harr features and not pixel values of the human face.
A simple Harr-like feature can be defined as the difference of the sum of the pixels of areas inside the rectangle, which
can be at any position and scale with the image.
The cascade classifier contains a list of stages, where
each stage consists of a list of weak learners. The required object is detected by sliding window over the pixels of the
image. Each stage of the classifier labels the specific region defined by the current location of the window as either
positive or negative where positive means that an object was found and negative means that the specified object was
not found in the image.
In this paper, a method has been proposed which is an image synthesis that uses statistical features that are different
from each pixel position due to occluders change.
Initially, the occlusion free images are collected, then the corresponding occlusion images with external gears such as
sunglass and scarf are collected. Secondly, the degree of change is analyzed according to the occludes statistics from
the collected image, then a pixel weights are defined which are the set of weights that is to be applied to each pixel
position from this statistical analysis. finally, by using this input image and pixel weights the occlusion image is
generated.
The design flow of this project contains two parts, one is training and the other is testing. The database of different
images generated is maintained during training, while in the testing part the real time images that are obtained from the
various sources like cameras
is compared with the stored database and accordingly the emotion is detected and displayed to the user.
Sources Similarity
recognition is an interesting and challenging problem, and impacts important applications in many areas such as
identification for law enforcement, authentication for banking and security system access, and also personal 7%
identification among others [1]. The face plays a major role in our...
https://www.scribd.com/document/160859798/1-Face-Recognition-Using-Local-BINARY-PATTERNS
A simple rectangular Haar-like feature can be defined as the difference of the sum of pixels of areas inside the
rectangle, which can be at any position and scale within the original image. This modified feature set is called 2- 3%
rectangle feature.
https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.685.1467
the cascade-classifier consist of few stages, where each stage consists of a list of weak learners. the system detects
objects in question by moving aeach stage of the classifier labels the specific region defined by the current location of 3%
the window as either positive or negative – positive meaning...
http://utpcc.blogspot.com/2017/05/facial-recognition-machine-learning.html
Page 1
0% 100% 0 16
Plagiarized
Plagiarism Unique Unique Sentences
Sentences
There are various categories of facial recognition algorithms such as using Neural networks, by feature analysis, by
graph matching and using information theory. This paper highlights the advantage of facial recognition over the
biometrics. Where in which in many biometrics the subject’s cooperation and awareness is required to perform
identification and verification such as looking into an eye, fingerprint. but by facial recognition the identification and
verification can be performed with the individual cooperation and knowledge.
Here different face recognition techniques have been discussed which includes:
PCA (Principal Components Analysis), LDA (Linear Discriminant Analysis), EBGM (Elastic Bunch Matching), The Viola-
Jones detector and The Scale invariant detector.
This paper introduces how the facial recognition technique can be put into use for various applications and needs.
Depending on the applications, here the facial detection technique is employed for automatic detection and tracking of
pedestrians in a restricted area, density based person detection and tracking in crowds, unconstrained face detection in
crowd, and for counting people in the crowd.
This paper describes different design flow of facial recognition model for various applications using different techniques.
In present days there is increase in crime and theft, and this has made the people’s living challenging and risky. taking
this into account. Our project aims to provide a better solution to reduce the crime rate and making the people’s living
much more easier. Here our project utilizes machine learning to train the face recognition model in identifying the
criminal faces. Raspberry pi is used as standalone system for performing facial recognition algorithm on the inputs
obtained from camera, where the input might be images or live videos.
The purpose of our project is to design cost efficient and portable security system which can be installed anywhere so
that the system can notify the required authority about the scenario at the earliest So that the necessary actions can be
taken in catching the criminals.
Sources Similarity