You are on page 1of 7

LITERATURE SURVEY ON CRIMINAL

IDENTIFICATION SYSTEM USING FACIAL


DETECTION AND IDENTIFICATION
[1]
P Karthikeyan, [2] Sridhar KH, [3] Tharun V, [4] Ullas U, [5] Dr. R Manjunath Prasad
[1][2][3][4]
BE Students, [5] Professor And HOD, Department of ECE,

Dayananda Sagar Academy of Technology and Management, Bengaluru-560082


[1] karthikprakash026@gmail.com , [2 ] khssridhar@gmail.com ,
[3] tharunv973@gmail.com , [4] ullasuu22@gmail.com , [5] hodec@dsatm.edu.in

Abstract - With the increase in development of Facial Recognition and Identification, Raspberry
modern technology, a smart way of living has pi, Python and OpenCV.
turned out to be a major necessity for humans to
Ⅰ. INTRODUCTION
progress. Security is a matter of great concern for
the people as well as the police personals. Security Facial recognition is an interesting and challenging
control plays a vital role in protecting resources problem, it impacts important applications in many
from damage and theft. Criminal identification and areas such as identification of law enforcement,
crime prevention are the primary issues for the authentication for banking and security system
police authority as lives and property protection are access. The best way to distinguish human is
the basic concerns for the common man. To tackle through facial characteristics. In current world,
the crime, availability of police personals, and the security matters and it is of great concern. Security
time taken by them to detect the crime would be a controls play a vital role in protecting resources
hurdle which they need to progress through. Our from espionage, sabotage, damage, theft, and
proposed system is to develop a security system illegal usage. The application of this project
with improved facilities, which tries to eliminate the involves safe and theft free environment as well as
problems faced by the police personals. To to provide better protection from the threat of
overcome the limitations of the existing security intruders. Nowadays, there is exponential usage of
systems like the CCTV cameras which have been face recognition systems which are used in various
installed in public as well as private places, an fields. However, camera angle variation from which
intelligent system is deployed where in a facial the input images or a video is taken, illumination
recognition model is trained and deployed on a and occlusion act as a factor to decrease in the
Raspberry pi. Here the facial identification is done performance while performing facial recognition
on the input image or live videos, and the face is and identification on the images or videos acquired
recognized. The facial recognition model is built from these devices. Here we are developing a
using Python and Open CV. If any suspect is found system that watches the environment, if any human
then it is notified to the respected authority with the activity is detected, then the system captures it.
image containing face. This system finds Automatic facial identification and detection is
application in areas such as banks, airports, in performed by the system. If any suspicious activity
homes as smart intruder system, etc. or event is detected then the system notifies the user
with the image containing the face and the location.
Keywords – Security, Smart Intruder System, Here, the system is nothing, but a robust facial
recognition model which is trained on a dataset was proposed by viola and jones. This proposed
containing a lot of images with a face captured algorithm finds specific Harr features and not pixel
from different angles and lighting conditions. After values of the human face. A simple Harr-like
training and testing of this model with desirable feature can be defined as the difference of the sum
accuracy, then the model is deployed on Raspberry of the pixels of areas inside the rectangle, which
pi which is used as a potable and standalone can be at any position and scale with the image.
embedded system. A database is created to detect
the criminals and notify the respective authority.

Ⅱ. LITERATURE SURVEY
In [1]: This paper describes the development of
robust face recognition system to overcome beaches
in security. The input to this system is taken from
various surveillance cameras that are installed in
various places. This is done to obtain facial features
to compare with the database.

Fig2: Common Harr features

The cascade classifier contains a list of stages,


where each stage consists of a list of weak learners.
The required object is detected by sliding window
over the pixels of the image. Each stage of the
classifier labels the specific region defined by the
current location of the window as either positive or
Fig1: Architecture of Watch Dog negative where positive means that an object was
found and negative means that the specified object
Here the system is being trained using deep neural was not found in the image.
networks to disentangle the abstractions and to
pick the features that are most important and to
increase the performance. The system has been
divided into following functional blocks. The Face
Recognition Process can be divided into Three
Phases namely, Enrolment Phase - Face Detection, Fig3: Example of Harr features
Feature Extraction, Model Creation and database
up-dation, Recognition Phase or Query Phase – In [3]: A method has been proposed which is an
Face Detection, Feature Extraction, Comparing image synthesis that uses statistical features that are
with the models in DB. Action Phase – different from each pixel position due to occluders
Identification of unauthorized entry, Alert the change. The below figure illustrates the design of
person concerned using phone and alarm. image synthesizer model that is being used to
generate the occluded images from the input
In [2]: The algorithm used here for face detection images.
maintained during training, while in the testing
part the real time images that are obtained from
various sources like cameras is compared with the
stored database and accordingly the emotion is
detected and displayed to the user.
Fig4: Flow chart of image synthesis
In [5]: There are various categories of facial
Initially, the occlusion free images are collected, recognition algorithms such as using Neural
then the corresponding occlusion images with networks, by feature analysis, by graph matching
external gears such as sun glass and scarf are and using information theory. This paper
collected. Secondly, the degree of change is highlights the advantage of facial recognition over
analyzed according to the occludes statistics from the bio metrics. Where in which in many bio
the collected image, then a pixel weights are metrics the subject’s cooperation, and awareness
defined which are the set of weights that are to be is required to perform identification and
applied to each pixel position from this statistical verification such as looking into an eye,
analysis. Finally, by using this input image and fingerprint. But by facial recognition the
pixel weights the occlusion image is generated. identification and verification can be performed
with the individual cooperation, and knowledge.
Here different face recognition techniques have
been discussed which includes: PCA (Principal
Components Analysis), LDA (Linear
Discriminant Analysis), EBGM (Elastic Bunch
Matching), The Viola-Jones detector and The
Scale invariant detector.

Fig5: (1st row) occlusion-free images, (2nd row) occlusion


images , (3rd row) synthetic images with scraf.

In [4]: The design flow of this project contains two


parts, one is training and the other is testing.

Fig7: PCA, face with their eigen values

Fig8: EBGM (Elastic Bunch Grphing)


Fig6: Data Flow
In [6]: This paper introduces how the facial
recognition technique can be put into use for
The database of different images generated is
various applications, and needs.Depending on the
applications, here the facial detection technique is be installed anywhere so that the system can notify
employed for automatic detection and tracking of the required authority about the scenario at the
pedestrians in a restricted area, density based earliest So that the necessary actions can be taken
person detection and tracking in crowds, in catching the criminals.
unconstrained face detection in crowd, and for
counting people in the crowd. This paper describes REFERENCES
different design flow of facial recognition model
for various applications using different techniques. [1] P Vasuki, Sesu Priya A, Soundarya R, ”A
Smart Watchdog - Intruder Detection
System”, in International Journal of
Engineering & Technology, 2018.
[2] Piyush Kakkar, Mr. Vibhor Sharma,
“Criminal Identification System Using
Face Detection and Recognition”,
International Journal of Advanced
Research in Computer and
Communication Engineering, Vol. 7, Issue
3, March 2018.
[3] Yonggeol LEE, JangMook KANG,
“Occlusion Images Generation from
Fig9: Individual head detection in the crowd Occlusion-Free Images for Criminals
Identification based on Artificial
this paper infers that while performing facial Intelligence Using Image”, International
recognition accuracy decreases with speed and also Journal of Engineering & Technology,
with the image quality and also this method can be 2018.
used to recognize criminals, crowd separation,
[4] Prof. V.D. Bharate, Shubham Sunil Phadatare,
audience detection and for robotics.
Suhas Panchbhai, Vishal Pawar, “Emotion
Ⅲ. CONCLUSION Detection using Raspberry Pi”, International
Research Journal of Engineering and
In present days there is a increase in crime and Technology (IRJET), Volume: 04 Issue: 05 |
theft, and this has made the people’s living May -2017.
challenging and risky. Taking this into account.
[5] Alireza Chevelwalla, Ajay Gurav, Sachin
Our project aims to provide a better solution to Desai, Prof. Sumitra Sadhukhan, “Criminal
reduce the crime rate and making the people’s Face Recognition System”, International
living much easier. Here our project utilizes Journal of Engineering Research &
machine learning to train the face recognition Technology (IJERT), Vol. 4 Issue 03, March-
model in identifying the criminal faces. Raspberry 2015.
pi is used as standalone system for performing
[6] Preeja Priji, Rashmi S Nair, “A Survey on
facial recognition algorithm on the inputs obtained
Multiple Face Detection and Tracking in
from camera, where the input might be images or Crowds”, International Journal of Innovations
live videos. in Engineering and Technology (IJIET),
The purpose of our project is to design cost- Volume 7 Issue 4 December 2016.
efficient and portable security system which can
Page 1

PLAGIARISM SCAN REPORT

Words 947 Date December 18,2020

Characters 5984 Exclude URL

6% 94% 3 48
Plagiarized
Plagiarism Unique Unique Sentences
Sentences

Content Checked For Plagiarism

With the increase in development of modern technology, a smart way of living has turned out to be a major necessity
for humans to progress. Security is a matter of great concern for the people as well as the police personals. Security
control plays a vital role in protecting resources from damage and theft. Criminal identification and crime prevention are
the primary issues for the police authority as lives and property protection are the basic concerns for the common man.
To tackle the crime, availability of police personals and the time taken by them to detect the crime would be a hurdle
which they need to progress through. Our proposed system is to develop a security system with improved facilities,
which tries to eliminate the problems faced by the police personals. To overcome the limitations of the existing security
systems like the CCTV cameras which has been installed in public as well as private places, an intelligent system is
deployed where in a facial recognition model is trained and deployed on a Raspberry pi. Here the facial identification is
done on the input images or live videos and the face is recognized. The facial recognition model is built using Python
and OpenCV. If any suspect is found then it is notified to the respected authority with the image containing face. This
system finds application in areas such banks, airports, in homes as smart intruder system etc.
Facial recognition is an interesting and challenging problem, it impacts important applications in many areas such as
identification of law enforcement, authentication for banking and security system access. The best way to distinguish
human is through facial characteristics.
In current world, security matters and it is of great concern. Security controls play a vital role in protecting resources
from espionage, sabotage, damage, theft, and illegal usage. The application of this project involves safe and theft free
environment as well as to provide better protection from the threat of intruders.
Nowadays, there is exponential usage of face recognition systems which are used in various fields. However, camera
angle variation from which the input images or a video is taken, illumination and occlusion act as a factor to decrease in
the performance while performing facial recognition and identification on the images or videos acquired from these
devices.
Here we are developing a system that watches the environment, if any human activity is detected, then the system
captures it. Automatic facial identification and detection is performed by the system. If any suspicious activity or event is
detected then the system notifies the user with the image containing the face and the location.
Here, the system is nothing but a robust facial recognition model which is trained on a dataset containing a lot of
images with a face captured from different angles and lighting conditions. after training and testing of this model with
desirable accuracy, then the model is deployed on Raspberry pi which is used as a potable and standalone embedded
system. A database is created to detect the criminals and notify the respective authority.
This paper describes the development of robust face recognition system to overcome beaches in security. The input to
this system is taken from various surveillance cameras that are installed in various places. This is done in order to
obtain facial features to compare with the database.
Here the system is being trained using deep neural networks to disentangle the abstractions and to pick the features
that are most important and to increase the performance.
The system has been divided into following functional blocks. The Face Recognition Process can be divided into Three
Phases namely,
Enrolment Phase - Face Detection, Feature Extraction, Model Creation and database up-dation
Recognition Phase or Query Phase – Face Detection, Feature Extraction, Comparing with the models in DB.
Action Phase – Identification of unauthorized entry, Alert the person concerned using phone and alarm
The algorithm used here for face detection was proposed by viola and jones. This proposed algorithm finds specificPage 2
Harr features and not pixel values of the human face.
A simple Harr-like feature can be defined as the difference of the sum of the pixels of areas inside the rectangle, which
can be at any position and scale with the image.
The cascade classifier contains a list of stages, where
each stage consists of a list of weak learners. The required object is detected by sliding window over the pixels of the
image. Each stage of the classifier labels the specific region defined by the current location of the window as either
positive or negative where positive means that an object was found and negative means that the specified object was
not found in the image.
In this paper, a method has been proposed which is an image synthesis that uses statistical features that are different
from each pixel position due to occluders change.
Initially, the occlusion free images are collected, then the corresponding occlusion images with external gears such as
sunglass and scarf are collected. Secondly, the degree of change is analyzed according to the occludes statistics from
the collected image, then a pixel weights are defined which are the set of weights that is to be applied to each pixel
position from this statistical analysis. finally, by using this input image and pixel weights the occlusion image is
generated.
The design flow of this project contains two parts, one is training and the other is testing. The database of different
images generated is maintained during training, while in the testing part the real time images that are obtained from the
various sources like cameras
is compared with the stored database and accordingly the emotion is detected and displayed to the user.

Sources Similarity

1 Face Recognition Using Local BINARY PATTERNS

recognition is an interesting and challenging problem, and impacts important applications in many areas such as
identification for law enforcement, authentication for banking and security system access, and also personal 7%
identification among others [1]. The face plays a major role in our...

https://www.scribd.com/document/160859798/1-Face-Recognition-Using-Local-BINARY-PATTERNS

Detection of Urdu Sign Language using Harr ... - CiteSeerX

A simple rectangular Haar-like feature can be defined as the difference of the sum of pixels of areas inside the
rectangle, which can be at any position and scale within the original image. This modified feature set is called 2- 3%
rectangle feature.

https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.685.1467

Facial Recognition Machine Learning with Python & OpenCV

the cascade-classifier consist of few stages, where each stage consists of a list of weak learners. the system detects
objects in question by moving aeach stage of the classifier labels the specific region defined by the current location of 3%
the window as either positive or negative – positive meaning...

http://utpcc.blogspot.com/2017/05/facial-recognition-machine-learning.html
Page 1

PLAGIARISM SCAN REPORT

Words 317 Date December 18,2020

Characters 2181 Exclude URL

0% 100% 0 16
Plagiarized
Plagiarism Unique Unique Sentences
Sentences

Content Checked For Plagiarism

There are various categories of facial recognition algorithms such as using Neural networks, by feature analysis, by
graph matching and using information theory. This paper highlights the advantage of facial recognition over the
biometrics. Where in which in many biometrics the subject’s cooperation and awareness is required to perform
identification and verification such as looking into an eye, fingerprint. but by facial recognition the identification and
verification can be performed with the individual cooperation and knowledge.
Here different face recognition techniques have been discussed which includes:
PCA (Principal Components Analysis), LDA (Linear Discriminant Analysis), EBGM (Elastic Bunch Matching), The Viola-
Jones detector and The Scale invariant detector.
This paper introduces how the facial recognition technique can be put into use for various applications and needs.
Depending on the applications, here the facial detection technique is employed for automatic detection and tracking of
pedestrians in a restricted area, density based person detection and tracking in crowds, unconstrained face detection in
crowd, and for counting people in the crowd.
This paper describes different design flow of facial recognition model for various applications using different techniques.
In present days there is increase in crime and theft, and this has made the people’s living challenging and risky. taking
this into account. Our project aims to provide a better solution to reduce the crime rate and making the people’s living
much more easier. Here our project utilizes machine learning to train the face recognition model in identifying the
criminal faces. Raspberry pi is used as standalone system for performing facial recognition algorithm on the inputs
obtained from camera, where the input might be images or live videos.
The purpose of our project is to design cost efficient and portable security system which can be installed anywhere so
that the system can notify the required authority about the scenario at the earliest So that the necessary actions can be
taken in catching the criminals.

Sources Similarity

You might also like