You are on page 1of 15

WELCOME

5/2/12

CRIMINAL FACE IDENTIFICATION SYSTEM


Submitted by: HARVINDER SINGH HARISH ASERI UDAY SINGH 5/2/12 PRASHANT GAUTAM

PROJECT NAME:-

Copyrights@it3r

OVERVIEW

Objective: Introduction process Modules Technology description Output

5/2/12

Introduction
This project is aimed to identify the criminals in any investigation department. Here the technique is we already store some images of the criminals in our database along with his details. These images are again stored in another directory so to identify any criminals; eyewitnesses will see the images which may or may not be matched with our images, for this we use Eigen faces. If any image is matched up to 99% then we predict that he is only the criminal. Thus using this project it provides a very friendly environment for both operator and eyewitness to easily design any face can identify criminals very easy.
5/2/12

Process

Firstly we may login as administrator Or operator in software to add new account In which data can be added.

5/2/12

After , login as administrator The interface will like this as shown in slide where we have facility to add ,delete and edit information to the database.

5/2/12

New user is added to database As ,output is showing in slide.

5/2/12

After following the above steps we also have an option to login as operator where We can add total information about the criminal identity.(name ,criminal-id,image,..)

5/2/12

Information about new criminal is added to database ..

5/2/12

Here new information in our database is added successfully.

5/2/12

MODULE
Module Description Well structured designs improve the maintainability of a system. A structured system is one that is developed from the top down and modular, that is, broken down into manageable components. In this project we modularized the system so that they have minimal effect on each other. This application is designed into five independent modules which take care of different tasks efficiently.

User Interface Module. Admin Module. Client Module. Database Operations Module. Splitting and Merging Module. Identify Module.

5/2/12

Now after adding new information to database , criminal face should be Recognized, and system will tell whether he/she is in criminal list or not?

5/2/12

When image is loaded in database software generates Eigen faces .

5/2/12

FUTURE SCOPE:We are working on software and hopefully we can use this software for other criminal Details like finger prints or eye ball length.

5/2/12

THANK U

5/2/12