Shankar

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 9

MISSING PERSONS

IDENTIFICATION USING SQL


DATABASE
EMAIL ALERT SYSTEM WITH FACIAL MATCHING
TECHNIQUES
INTRODUCTION

• Our project aims to develop a comprehensive and efficient system for identifying missing persons
using a SQL database and an email alert system. By integrating facial matching techniques, we
can accurately match photographs of missing persons with those in our database, increasing the
likelihood of successful identification. The SQL database will store detailed information about
missing persons, including physical appearances, last known locations, and other relevant data.
The email alert system will notify law enforcement agencies, non-profit organizations, and the
public about new missing persons cases, helping to spread awareness and gather information to
aid in the search and rescue efforts. Overall, this project will provide a powerful tool for
authorities and communities to work together in finding and reuniting missing persons with their
loved ones.
ABSTRACT

The Missing Persons Identification Using SQL Database and Email Alert System with Facial Matching Techniques is a
comprehensive solution aimed at efficiently identifying and locating missing individuals. The system utilizes a
relational SQL database to store and manage relevant information about missing

The Missing Persons Identification Using SQL Database and Email Alert System with Facial Matching Techniques is a
comprehensive solution aimed at efficiently identifying and locating missing individuals. The system utilizes a
relational SQL database to store and manage relevant information about missing.
• persons, including physical descriptions, last known locations, and contact details. Additionally, the system
incorporates facial matching techniques, which allow for comparison of images of missing persons with potential
sightings or known individuals, increasing the chances of accurate identification. To expedite the identification
process, the system also incorporates an automated email alert system, notifying relevant authorities and
stakeholders of any potential matches or new information regarding missing persons.
LITERATURE SURVEY
S.no Title Author Year Methodology Inference Merits Demerits

1. An Overview Smith. J 2022 Ascon Protection Risk of A lightweight


of Missing against man- insider authticated
Persons in-the- attacks and encryption
Identification middle data misuse algorithm
Techniques attacks designed for
its security
and
efficiency.
2. Implementin Doe. J 2022 Lizard Enables Challenges in A lightweight
g an Email secure data encrypted stream cipher
Alert sharing with data sharing known for its
System for fine-grained with others high speed
Missing access and strong
Persons control security
LITERATURE SURVEY
S.no Title Author Year Methodology Inference Merits Demerits

3. Facial Johnson. D 2022 CAST-128 Ability to Risk of cloud A symmetric


Matching safeguard provider encryption
Techniques sensitive insider data algorithm
for information access known for its
Missing simplicity and
Persons security
Identification
4. Developing Adams. E 2022 XTEA Protection Challenges in An extension
an SQL (eXtended against handling of TEA with
Database for TEA) insider threats encrypted improved
Missing and data data search security
Persons leakage features.
Records
EXISTING SYSTEM

• Law ENFORCEMENT Databases.


• National Missing and Unidentified Persons System .
• Amber Alert System.
• Community Outreach and Awareness Campaigns.
• Facial Recognition Technology.
• Social Media and Online Platforms.
DISADVANTAGES

• Incomplete Data.
• False Positives.
• Technological Limitations.
• Bias and Discrimination.
• Limited Resources.
PROPOSED SYSTEM

• In this architecture first upload the photo and the details of the missing
person then encoding the images and do the classification the image in using
KNN or SVM algorithm then make face detection store it into database this
process is done when the person or any missing person relative come for
police station to complaint and when the missing person is found then
capture the image of that person an d make encoding of face and detection of
landmarks and face detection after that make comparison with stored image
and captured image.
ADVANTAGES

• Comprehensive Data Collection.


• Real-time Alerts and Notifications.
• Efficient Resource Allocation.
• Privacy Protections.

You might also like