0% found this document useful (0 votes)
231 views24 pages

Criminal Face Recognition

This document describes a criminal face recognition system. It introduces face identification as a technique to identify criminals based on eyewitness descriptions. The proposed system uses hardware with an i7 processor, 1TB hard drive, and 8GB RAM running Windows 8. It utilizes a SQL Server backend and Java programming with a Swing framework. Modules include adding images to a database, clipping images into parts, constructing images from parts, and identifying criminals by comparing images. The system aims to automate and improve on the existing manual sketch-based identification process.

Uploaded by

VPLAN INFOTECH
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
231 views24 pages

Criminal Face Recognition

This document describes a criminal face recognition system. It introduces face identification as a technique to identify criminals based on eyewitness descriptions. The proposed system uses hardware with an i7 processor, 1TB hard drive, and 8GB RAM running Windows 8. It utilizes a SQL Server backend and Java programming with a Swing framework. Modules include adding images to a database, clipping images into parts, constructing images from parts, and identifying criminals by comparing images. The system aims to automate and improve on the existing manual sketch-based identification process.

Uploaded by

VPLAN INFOTECH
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 24

CRIMINAL FACE RECOGNITION

NAME:
ENROLL NO:
INTRODUCTION
 Face Identification is a technique that is mainly used to
identify criminals based on the clues given by the
eyewitnesses.
 Based on the clues we develop an image by using the image
that we have in our database and then we compare it with the
images already we have.
 To identify any criminals we must have a record that generally
contains name, age, location, previous crime, gender, photo,
etc.
HARDWARE SPECIFICATION

 Processor : I7

 Hard disk : 1000GB

 RAM : 8GB
SOFTWARE SPECIFICATION:

 Operating System : Windows 8


 
 Back End : SQL Server

 Programming Language : Java

 Frame Work : Swing


EXISTING SYSTEM
 The development of face identification has been past from the
year to years.
 In recent years to identify any criminal face they used to make
a sketch or draw a image based on the eyewitnesses.
 It used to take more amount of time and it was very difficult
task for any investigation department to easily catch the
criminals within a stipulated time.
 In order to catch the criminals first they used to search their
record whether to find out is there any record about that
particular person in the past.
DRAWBACKS IN EXISTING SYSTEM

 Need of extra manual effort.

 It used to take much time to find any criminals

 Not very much accurate.

 Danger of losing the files in some cases.

 Need Good Knowledge in drawing.


PROPOSED SYSTEM
 To overcome the drawbacks that were in the existing system
we develop a system that will be very useful for any
investigation department.
 Here the program keeps track of the record number of each
slice during the construction of identifiable human face and
calculate maximum number of slices of the similar record
number.
MODULES

 Add Image

 Clip Image

 Construct Image

 Identification
DATA FLOW DIAGRAM
MODULE DESCRIPTION
1. ADD IMAGE:

 Add Image is a module that is considered with adding image


along with the complete details of the person of whom we are
taking image.

2. CLIP IMAGE:

 This modules main function is to divide the images into


different pieces such as hairs, forehead, eyes, nose and lips
and store them in the database and also creates the files onto
our system.
  
3. CONSTRUCT IMAGE:

• Based on the eyewitnesses we are going to construct the


images.
• The witness will give us instruction by looking onto the
screen on which there will be the parts of the images like
eyes, hairs etc.
 
 
4. IDENTIFICATION:

• This module contains the interface to take the image from


above module and it compares or searches with the images
already there in the database
LOGIN SCREEN
MAIN SCREEN
FILE MENU
EDIT MENU
CONCLUSION
 The purpose of face identification system is to identify
criminals.
 In past years this process is carried out by humans.
 This process gives the exact image of the criminal but it is
very difficult to identify the criminal details and also it
requires much amount of human burden.
 The main aim of our project is to overcome the drawbacks of
human based system by using the machine based face
identification process.
FUTURE SCOPE
 The Future enhancements of this project include the
following:

1. The criminal photos may be of any size.

2. By selecting any one cropped part of the criminal, we can


get the full image of the criminals along with details.

3. New face constructed by different cropped parts can be


saved.
REFERENCE
BOOKS REFERRED

 1.”The Complete Reference Java2” Tata McGraw-Hill publishing


Company Limited. By Herbert Schildt.
 2.“Software Engineering, A Practitioner’s Approach” Tata McGraw-Hill
Publishing Company Limited. By Roger S. Pressman.

WEBSITES REFERRED

 http://www.java.sun.com/products\java
 http://www.jakarta.apache.org
 http://www.javaworld.com/
 http://www.java2s.com/
TABLE DESIGN
THANK YOU

You might also like