Face detection system
-
Upload
akshay-surve -
Category
Engineering
-
view
178 -
download
1
description
Transcript of Face detection system
PRISONER FACE DETECTION
SYSTEM
PRISONER FACE DETECTION SYSTEM
GROUP MEMBERS
FARHAN NAIK. KANCHAN VAVA. SHWETA FULWANI. AKSHAY AUTI.
UNDER THE GUIDANCE OF Miss. Suwarna Nimkarde.
POINTS TO DISCUSS Existing System Limitations of Existing System Proposed System Working Flow of System Advantages of Proposed System Application Soft. & Hardware SpecificationSystem Designconclusion References
EXISTING SYSTEMIn existing system criminal information is
stored in file format with outdated images and low quality images.
Using this information it is not possible for eye witness to guess the criminal, so there is need to develop a better method for identifying criminals like finger print, DNA…Etc.
Among all these methods face detection method is cost effective and more accurate.
LIMITATIONS OF EXISTING SYSTEM
Using Existing System Its Difficult for eye witness to guess the criminal .
It’s Difficult To Maintain Data Physically.
Human Interaction Required.
PROPOSED SYSTEMPrisoner face detecting system can be used in police
department. This software contains front end and back end applications
where front end is used to visualize the output and back end is used to store data.
Initially criminal images are stored in database along with his bio data. Every image is sliced by eyes, hair, lips and nose..etc and stored in database as separate record.
These images are shown to eye witness while investigation separately, if witness can judge any part of criminal we can recover entire criminal record based on that clue.
With this system police will provide better option to witness to judge criminal.
WORKING
Report The Admin
Comparison
Edge Detection
Convert To Gray Image
Capture Image
FLOW OF SYSTEM
ADVANTAGES OF PROPOSED SYSTEM
Unlike many other identification methods (e.g., fingerprints, voiceprint, signature), they do not need to make direct contact with an individual in order to verify their identity
Less Complex Than Other Method.
APPLICATIONIN MANY SERCURITY SYSTEM
It can be used in VIDEO SURVEILENCE SYSTEM
It can be used in CCTV(CLOSED CIRCUIT TELEVISION)
It can be used in Criminal Investigations, Home Security, Military, Intelligence
REQUIREMENT SPECIFICATION
SOFTWARE SPECIFICATION• Operating
System Windows XP
• Programming language :
• JAVA
SOFTWARE TOOLS• Backend • MS Access
HARDWARESPECIFICATION• PROCESSOR: Speed
minimum: PIII 800 MHz• RAM: Minimum: 128
MB, 256 MB
SYSTEM DESIGNE-RDIAGRAMS BETWEEN
ADMINISTRATOR AND EMPLOYEE:
Administrator Authentication Employee
User idPwd User id
Pwd
E-R DIAGRAMS BETWEEN EMPLOYEE AND EYEWITNESS:
Employee Viewing & selecting, images
Eyewitness
User id
PwdUser id Pwd
Criminal details
Criminal images
Criminal images
E-R DIAGRAM BETWEEN EYEWITNESS AND ADMINISTTRATOR
Administrator
Authentication Eyewitness
User idPwd
User id Pwd
USE CASE DIAGRAMAdministrator:
Login
Inserting/ Updating Criminal Details
Splitting/ Updating Images
Inserting/ Updating Face Details
Already Existed Criminal
New Criminal
Deleting Images
Administrator
criminal
Client (Operator):
operator Login
retriving the images
identifying the images
operator Criminal
ACTIVITY DIAGRAMAdministrator:
Administrator
Criminal Details Operations
Insert Update Delete View splitting Merging
check
yes
No
Operator:
Operator
check
yes
No
Retrieve Image
Identify Image
CONCLUSION
This system seems to be working fine and successfully. This system can able to provide the proper training set of data and test input for recognition. The face matched or not is given in the form of picture image if matched and text message in case of any difference.
REFERENCESWEB REFERENCES
• http://www.filestub.com• http://www.ebookee.org• http://www.google.com
THANK YOU