Professional Documents
Culture Documents
Criminal Detection Using Face (2) (1) MAIN
Criminal Detection Using Face (2) (1) MAIN
Pachal,Namakkal-637018
• To provide efficient facial recognition system for criminal database using Haar
& cascade classifier.
• Send immediate alert to the forensic department, when the criminal was
detected.
Introduction
• Face recognition is a rapidly growing field in machine learning, and it has a wide range of
• From security and surveillance to entertainment and social media, face recognition
• Face recognition is an identification method that uses the individual's face's distinctive
• A machine learning model can be trained to recognize faces by being fed a large dataset of
images of faces.
• Automatic face recognition is all about extracting those meaningful features from an
image, putting them into a useful representation and performing some classifications on
them.
Existing System
• Implement a video surveillance system based on a composable deep face recognition
method.
• A face detection method is proposed for processing video frames in real-time through
down-sampling.
• A precise facial landmark or segmented mask must be acquired, as a face boundary
needs to be estimated to perform face alignment.
• Deformable convolutional network (DCN) to construct a general deep CNN as the
feature extractor.
• Euclidean distance calculation between feature vectors can be vectorized for closely
matching feature identification.
• This system detects the faces of criminals in real time from videos captured by a
surveillance camera and notifies relevant institutions of the appearance of criminals.
Disadvantages
• When the resolution increases, the depth of the feature extractor and
• In face identification process, the number of targets has little impact on the
latency.
• Unable to define the answer label when multiple persons are caught in the
• When one of these features is found, the algorithm allows the face candidate to pass to the
• The feature are classified with dataset using Haar Cascade Feature Classification.
• It is further compared with the images stored in database to identify if the person is
criminal/suspect.
• If he is criminal/suspect the time for which he was under the surveillance of the camera is
• This application send SMS and Email notification to the authority and also generate alarm
• This method works very efficiently because face image of a person will not
change.
• The proposed system can successfully recognize more than one face which
is useful for quickly searching suspected persons as the computation time is
very low.
Hardware Requirements
• This is the process of collect and store criminal image for the detection of
criminals easily.
• The database will contain the images and details of the criminals and
suspects who involved in crimes.
• Feature Extraction
• The face detection algorithm looks for specific Haar features and not pixels
of a human face.
• When one of these features is found, the algorithm allows the face candidate
to pass to the next stage of detection.
• A face candidate is a rectangular section of the original image which is
called as a sub-window.
• A simple rectangular Haar-like feature can be defined as the difference of the
sum of pixels of areas inside the rectangle, which can be at any position and
scale within the original image.
Modules Description
• Criminal Detection
• The cascade classifier contains a list of stages, where each stage consists of a
list of weak learners.
• The system detects the required object by moving a window over the image.
• Each stage of the classifier labels the specific region defined by the current
location of the window as either positive or negative where positive means
that an object was found and negative means that the specified object was not
found in the image.
Module Description
• Alert System
• The automatic detection of abnormal activities can be used to alert the
related authority of potential criminal or dangerous behaviors, such as
automatic reporting of a person.
• In proposed system unknown event alert send to the predefined contact
numbers regarding particular officers.
• Here also implement image sharing for easy identification of criminals.
SCREENSHOTS
Conclusion