Sunteți pe pagina 1din 21

PRISONERFACEDETECTIONSYSTEM

GROUP MEMBERS

 FARHAN NAIK.
 KANCHAN VAVA.
 SHWETA FULWANI.
 AKSHAY AUTI.

UNDER THE GUIDANCE OF


Miss. Suwarna Nimkarde.
POINTS TO DISCUSS
 Existing System
 Limitations of Existing System
 Proposed System
 Working
 Flow of System
 Advantages of Proposed System
 Application
 Soft. & Hardware Specification
System Design
conclusion
 References
EXISTING SYSTEM
In existing system criminal information is stored in
file format with outdated images and low quality
images.
Using this information it is not possible for eye
witness to guess the criminal, so there is need to
develop a better method for identifying criminals like
finger print, DNA…Etc.
Among all these methods face detection method is
cost effective and more accurate.
LIMITATIONS OF EXISTING
SYSTEM
Using Existing System Its Difficult for eye
witness to guess the criminal .

It’s Difficult To Maintain Data Physically.

Human Interaction Required.


PROPOSED SYSTEM
 Prisoner face detecting system can be used in police
department.
 This software contains front end and back end applications
where front end is used to visualize the output and back
end is used to store data.
 Initially criminal images are stored in database along with
his bio data. Every image is sliced by eyes, hair, lips and
nose..etc and stored in database as separate record.
 These images are shown to eye witness while investigation
separately, if witness can judge any part of criminal we can
recover entire criminal record based on that clue.
 With this system police will provide better option to
witness to judge criminal.
WORKING
Capture Image

Convert To Gray Image

Edge Detection

Comparison

Report The Admin


FLOW OF SYSTEM
ADVANTAGES
OF PROPOSED SYSTEM
 Unlike many other identification methods (e.g., fingerprints,
voiceprint, signature), they do not need to make direct contact
with an individual in order to verify their identity

 Less Complex Than Other Method.


APPLICATION
IN MANY SERCURITY SYSTEM

It can be used in VIDEO SURVEILENCE SYSTEM

It can be used in CCTV(CLOSED CIRCUIT


TELEVISION)

It can be used in Criminal Investigations, Home


Security, Military, Intelligence
REQUIREMENT SPECIFICATION

SOFTWARE SOFTWARE HARDWARE


SPECIFICATIO TOOLS SPECIFICATION
N • Backend • PROCESSOR: Speed
• Operating System • MS Access minimum: PIII 800 MHz
Windows XP • RAM: Minimum: 128 MB, 256
MB
• Programming
language :
• JAVA
SYSTEM DESIGN
E-RDIAGRAMS BETWEEN ADMINISTRATOR
AND EMPLOYEE:

User id
Pwd User id
Pwd

Authentication Employee
Administrator
E-R DIAGRAMS BETWEEN EMPLOYEE AND
EYEWITNESS:

User Pwd Criminal


id images User
id Pwd

Viewing &
Employee selecting, Eyewitness
images

Criminal Criminal
details images
E-R DIAGRAM BETWEEN EYEWITNESS AND
ADMINISTTRATOR

User id
Pwd
User id Pwd

Authen
tication Eyewitness
Administrator
USE CASE DIAGRAM
Administrator:
Login

Inserting/Updating Criminal Details

Already Existed Criminal

criminal
Splitting/Updating Images
Administrator

New Criminal

Inserting/Updating Face Details

Deleting Images
Client (Operator):

operator Login

retriving the images

operator Criminal
identifying the images
ACTIVITY DIAGRAM
Administrator:

Administrator

check

No

yes

Criminal Details Operations

Insert Update Delete View splitting Merging


Operator:

Operator

check

No

yes

Retrieve Image

Identify Image
CONCLUSION

This system seems to be working fine and


successfully. This system can able to provide the
proper training set of data and test input for
recognition. The face matched or not is given in
the form of picture image if matched and text
message in case of any difference.
REFERENCES
WEB REFERENCES

• http://www.filestub.com
• http://www.ebookee.org
• http://www.google.com

S-ar putea să vă placă și