Sat - 81.Pdf - Criminal Identification and Weapon Detection
Sat - 81.Pdf - Criminal Identification and Weapon Detection
Sat - 81.Pdf - Criminal Identification and Weapon Detection
(VI)
TABLE OF CONTENTS
ABSTRACT vii
LIST OF FIGURES ix
LIST OF ABBREVIATIONS x
1. INTRODUCTION 10
3.4 Importance 22
REFERENCES 29
APPENDIX 30
A.SCREENSHOTS 30
B.SOURCE CODE 37
C.PLAGIARISM REPORT 42
LIST OF FIGURES
78
LIST OF
ABBREVIATIONS
ABBREVIATION EXPANSION
INTRODUCTION
Human beings have recognition capabilities that are unparalleled within the
modern computing era. These are mainly because of the high degree of
interconnectivity, adaptive nature, learning skills and generalization capabilities of the
system. The human brain has numerous highly interconnected biological neurons
which, on some specific tasks, can outperform supercomputers. Advancements in
computing capability over the past few decades have enabled comparable
recognition capabilities from such engineered systems quite successfully. Early
recognition algorithms used simple geometric models, but recently the popularity
process has now matured into a science of sophisticated mathematical
representations and matching processes. Major advancements and initiatives have
propelled face recognition technology into the spotlight. Recognition technology are
often employed in a wide selection of applications. Computers that detect and
recognize faces can be applied to a good type of practical applications including
criminal identification etc. Face detection and recognition is employed in many places
nowadays, verifying websites hosting images and social networking sites. Crime
recognition and detection is achieved using technologies associated with computing.
Features extracted from a weapon are processed and compared with similarly
processed faces present within the database. If a weapon is recognized it's known or
the system may show an identical weapon existing in the database else it's unknown.
In closed-circuit television if an unknown face appears quite just once then it's stored
in a database for further recognition. These steps are very useful in criminal
identification. In general, crime recognition techniques are divided into two groups
supporting the face representation: they use appearance-based, which uses holistic
texture features and is applied to either whole-face or specific face image and
feature-based, which uses geometric facial features and geometric relationships
between them.
The main goal of this project is to identify the criminal and register into the
database and also detect the video survillences crime which is going on in real time.
The advanced bringing up of security technology, this application is bringing forward
to implement the programs and software that are used to detect, record, preserved
and store the identities of the person and the facial features of the criminal The
system will consist of several basic elements
▪ Python IDLE
▪ OpenCV
▪ Database connectivity with MYSQL
▪ Kaggle Data set
▪ GUI interface
▪ Web cam
This section will house the users and stakeholders. The users are going to be
using the crime detection application and also the stakeholders will develop,
maintain, and test the crime detection and recognition application.
1.2.1 MYSELF
1.2.2 USERS
The users are anyone who has the program for the crime recognition and
detection. A user may also be a bystander who happens to surpass. This
person's body may have accidentally shown itself within the camera.
Nonetheless, he or she's going to even be detected if he or she possesses a
weapon.
These are the utilization cases for the client of the criminal identification and
detection program. The programmer has access to all or any of those cases
likewise.
The trainer program enables the user to coach his or her face by spotlight
before the camera. The python idle is employed to run this code. Half a second
is taken for the trainer program to run its course, during which period it takes
double the copies of the user's face and stores it within the database folder that
has a name of the criminal.
1.2.3.3 Users
The users are anyone who appears before the camera during execution time.
The user prompt is that the python is idle. It allows the user to enter into both the
modules. It has two buttons. One is for real time crime detection and the other is for
entering criminal information in a database.
In the year 2012 the face recognition “A Robust Face Recognition method
using edge based features”,was an IEEE Symposium on Computers and
Informatics. In this technique and algorithm on face feature extraction and face
recognition, the true positive means the portion of face image to be detected by the
system is the distance vector of the labeled edge between two vertices.
Paul Viola, Michael Jones, proposed a system on “Rapid Object Detection using a
Boosted Cascade of Simple Features”. This object detection was proposed by Paul Viola and
Michael Jones. Although it can be trained to detect a variety of object classes, it was motivated
primarily by the problem of face detection.
The features sought by the detection framework universally involve the sums of image
pixels within rectangular areas. As such, they bear some resemblance to Haar basis
functions, which have been used previously in the realm of image-based object
detection. However, since the features used by Viola and Jones all rely on more than
one rectangular area, they are generally more complex. The figure on the right
illustrates the four different types of features used in the framework. The value of any
given feature is the sum of the pixels within clear rectangles subtracted from the sum of
the pixels within shaded rectangles. Rectangular features of this sort are primitive
when compared to alternatives such as steerable filters. Although they are sensitive to
vertical and horizontal features, their feedback is considerably coarser.
Jyoti Nautiyal, Shivali Gahlot and Pawan Kumar Mishra, “An automated technique for
criminal face identification using biometric approach”, on Advances in Communication
and Control Systems 2013.This proposed system was using biometric to detect the
criminal .This takes a long process to identify the criminal by using his finger prints.
Fingerprints have been used in criminal investigations as a means of identification for
centuries. It is one of the most important tools of crime detection because of their
robustness and uniqueness. A fingerprint is the pattern of friction ridges and valleys on
the surface of a fingertip.
CHAPTER 2
This project aims to make a criminal identification and crime detection program
which will successfully detect crime along with providing a useful user interface with a
database for entering criminal information. This is done by using python and opencv
together with deep learning concepts.
The audience is someone who wants to use a crime recognition program that
occupies less space and is user friendly.
2.4.1 OPENCV