SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
International Journal of Trendy Research in Engineering andTechnology
Volume 4 Issue 4 August 2020
ISSN NO 2582-0958
www.trendytechjournals.com
8
THE LORE OF SPECULATION AND ANALYSIS USING
MACHINE LEARNING AND IMAGE MATCHING
K. Bharath1
, Paithankar Sumit1
, S. Amudha2
1,
UG Students, 2
Assistant professor, Department of Computer Science and Engineering,
Sriram Engineering College, Chennai-600044, INDIA.
kilaribharath007@gmail.com, sumitpaithankar2@gmail.com,amudhasaravanan@gmail.com
ABSTRACT
Now days the cases of missing kids are increasing. Many of them are left unfound. In this paper we propose an
Android application for finding missing kids.This android application will be used by General public for the
purpose of finding missing kids. This application contains functionality to add FIR complaint as well as photos of
the missing kid. Any anonymous kids photo can be uploaded to the application. By using IMT and neural
networks the photo will be traversed with the database. On finding the perfect match with higher precision
further actions will be processed.The face recognition model in our system will try to find a match in the database
with the help of face encodings. It is performed by comparing the face encodings of the uploaded image to the
face encodings of the images in the database. The face recognition model that we have used maintains an
accuracy of 99.38% on the Labelled Faces in the Wild Benchmark which comprises of 13,000 images.
Keyword: - Android, Face recognition, Image Labelling, Machine Learning, ML Kit.
I. INTRODUCTION
A missing person can be characterized as the one
who can be a child or an adult -- who is lost,
voluntarily or involuntarily. There are various
categories of missing cases of which only 43% of
missing cases’ reasons are known, 99% are juvenile
runways, 2500 cases are due to family problems and
around 500 cases are kidnapped by strangers (which
include both teens and adults). Women add about
52% of missing cases and males48%.
“In India, there are no budgets allocated to finding
missing people”, claimed by an officialsource.
A missing person faces many obstacles, few are
subjected to death (murder), rape or abuse. People
concerned with the missing person such as parents,
friends, relatives and guardians are exposed to stress
and worries from not knowing whether the missing
person is alive or dead.
In our system, the image of the person given by the
guardian at the time of missing is stored in the
database. The public is given authority to upload
photographs of any person in uncertain situations.
Automatic detection of match for this picture among
the already existing images in the database will be
done through our application. This helps the police
department to spot the missing person in any place in
India.
When a suspicious person is found, the picture at
that instance of time is compared with the images
uploaded by the guardian/police department at the
time of missing through the face recognition model.
If a match is found, it will be notified to the police
and the guardian in the form of an alert message
along with the location of where the person is
found.
If not found, a new record will be created in the
database with the uploaded picture. By this way, it
decreases the time taken to search for a person’s
detail after he is found.
0 20000 40000 60000
JAN
FEB
MAR
APRIL
Child
International Journal of Trendy Research in Engineering andTechnology
Volume 4 Issue 4 August 2020
ISSN NO 2582-0958
www.trendytechjournals.com
9
Fig1. Survey of Kid found in Delhi using Face
Recognition
Sometimes, the person has been missing for a long
period of time. The age gap is reflected in the
image as ageing affects the structure of the face,
including shape, texture, etc. The appearance of the
person can vary due to ageing, filters, pose,
lightings etc. All these factors were considered
before choosing the face recognitionalgorithm.
II. MACHINE LEARNING
Machine learning (ML) is the scientific
study of algorithms and statistical
models that computer systems use to perform a
specific task without using explicit instructions,
relying on patterns and inference instead. It is seen
as a subset of artificial intelligence. Machine
learning algorithms build a mathematical
model based on sample data, known as "training
data", in order to make predictions or decisions
without being explicitly programmed to perform
the task Machine learning algorithms are used in a
wide variety of applications, such as email
filtering and computer vision, where it is difficult
or infeasible to develop a conventional algorithm
for effectively performing the task.
Machine learning is closely related
to computational statistics, which focuses on
making predictions using computers. The study
of mathematical optimization delivers methods,
theory and application domains to the field of
machine learning. Data mining is a field of study
within machine learning, and focuses
on exploratory data analysis through unsupervised
learning. In its application across business
problems, machine learning is also referred to
as predictive analytics.
III. IMAGE MATCHING ALGORITHMS
1. SIFT (Scale-invariant Feature Transform)
It uses interesting key points of image using
difference in Gaussian method.The Scale
invariance is achieved via scanning key points
at different scaleRotation invariance is
achieved by obtaining the Orientation Assignment
of the key points using image gradient magnitude.
Fig2: Scale invariant transform feature working.
Fig 3: Scale invariant feature transform results.
2. SURF (Speeded Up Robust Features)
SIFT is quite effective but computationally
expensive, so the SURF was developed to improve
the speed of the scale invariant feature detector. It
uses Hessian Matrix approximation to detect
Not Found Kids Found
International Journal of Trendy Research in Engineering andTechnology
Volume 4 Issue 4 August 2020
ISSN NO 2582-0958
www.trendytechjournals.com
10
interesting points and use the sum of Haar wavelet
responses for orientation assignment.
3. BRIEF (Binary Robust Independent
Elementary Features)
Computes descriptor quickly (instead of using SIFT
and SURF). Faster as compared to SIFT and SURF
but fails in Orientation invariance.
4. ORB (Oriented Fast and BRIEF)
Developed out of OpenCV labs (not patent so free
to use). Provide faster orientation invariance with
BRIEF
IV. METHODOLOGY
The proposed system makes use of Face
Recognition for missing peoples’ identification. The
architecture of our framework is presented in figure
4.
Fig 4: The Architecture of the proposed People Identification
System
Here the public or police who finds a suspicious
person (child, mentally challenged person, etc.) on
the road uploads a picture of that person into the
portal. Our algorithm extracts the face encodings of
the image as shown inFigure 5 and compare with
that of the face encodings of the previously existing
images in the database. If a match is found, an alert
message will be sent to both the concerned police
officer and the parent/guardian of that person in the
image. If a match is not found, then the person will
be provided with the option of registering that face
asa new entry to our database with the location they
found and remarks.
Fig 5: Face Encodings generated from an input image
Whenever public or police upload an image, the
face encodings of the image are extracted and then
compared to the face encodings of the images
stored in the database. If the distance between the
encoding of the uploaded image and the encoding
of the image in the database is less than or equal to
the threshold, then the face in both the images is of
the same person as shown in Figure 3 and Figure 4.
If that is the case, the user is notified that a match is
found along with the picture from the database that
matched with the uploaded picture. If the distance
between the encodings is more than the threshold, it
means that the faces in the images are not of the
same person’s. By this way, our proposed system
will help in identifying the missingpeople.
Fig 6: Comparing Face encodings of two images
The model we have used involves three main
steps to perform face recognition.
STEP 1: Face detection – Firstly, face patterns are
generated using Histogram of Oriented Gradients
(HOG) algorithm. The images are made black and
white. Here, the part of the images that looks more
like the original HOG face pattern is found. Finally,
the detected face is bounded by a bounding box.
STEP 2: Sixty-eight specific points (landmarks)
that are existing on every face are figured out by
using the face landmark estimation algorithm.
From the landmarks found, image transformations
like scaling, shearing and rotation are used by the
OpenCV’s affine transformation to make the lips
International Journal of Trendy Research in Engineering andTechnology
Volume 4 Issue 4 August 2020
ISSN NO 2582-0958
www.trendytechjournals.com
11
and eyes appear in the same location on every
image.
STEP 3: The face images are then passed through
deep convolutional neural network. By doing this,
we obtain 128 measurements which are 128-
dimension hyper sphere. And no one knows which
parts of the face the 128 measurements representing.
All we know is that the network outputs the same
128 numbers for two different images of the same
person.
STEP 4: Finally, a linear SVM classifier is used to
recognize the face. The classifier has been trained in
such a way that it can take the measurements from a
test image and gives the closest match as output.
Fig 7: Interface for the system built using the Flask
framework
A Flask API interface accompanies our model to
give the user a better user experience as shown in
Figure 7. When the user opens our application they
will be asked to upload an image of the missing
person. If a match is found, they will have provided
with the image and details about the match. If match
is not found, they will be asked if they want to
register that image as a new entry into our database.
If they wish to register, they will be asked to enter
the details about the image as shown in figure8.
Fig 8: Face Registration form
V. RESULTS
The Face Recognition model we used has an
accuracy of 99.38% on the Labelled Faces in the
Wild Benchmark which comprises of 13,000
images The testing conducted by us yielded an
accuracy of 97.5% where the dataset included 82
images – 41 pairs which included images of kids,
teens, adults (male and female) with age gap,
different hairstyles, filters etc. The dataset we used
is taken from ML kit.
VI. CONCLUSION AND FUTURE SCOPE
By this way, the process of identifying the missing
people is fastened. Our system replaces the manual
method of scanning through the databases for each
picture to check the match, by an efficient face
recognition method which finishes the work in
notime.
Though our system has a small limitation i.e. when
the age of the person is between the age 0 and 10
the accuracy drops. This is due to the incomplete
growth of facial features at that age. We look
forward to overcome this limitation in the future.
VII. REFERENCES
1.Android Based Application on “Missing Person
Finder” Rahul Mote, PoojaRakate, DipaliThavare,
RahulPatil, Mrs. Sonali Pakhmode Department of
Information Technology Mumbai University,
Padmabhushan Vasantdada Patil Pratishthan’s
International Journal of Trendy Research in Engineering andTechnology
Volume 4 Issue 4 August 2020
ISSN NO 2582-0958
www.trendytechjournals.com
12
College of Engineering Sion, Chunabhatti,
Mumbai– 400022
2.An Image Matching Method Based On the
Analysis of Grey Correlation Degree and Feature
Points, Zishuo Ding, Shuo Qian, Yulin Li, Zhaohui
Li School of Software Engineering Beijing
University of Posts and Telecommunications
Beijing, China
3.Review of existing algorithms for face detection
and recognition. NURULHUDA ISMAIL, MAS
IDAYU MD. SABRI Department of System and
Computer Technology (Multimedia), Faculty of
Computer Science and Information Technology,
University of Malaya, 50603 LembahPantai, Kuala
Lumpur, MALAYSIA
4.Image Matching Using SIFT, SURF, BRIEF and
ORB: Performance Comparison for Distorted
Images. Ebrahim Karami, Siva Prasad, and
Mohamed Shehata Faculty of Engineering and
Applied Sciences, Memorial University, Canada.
5.Khoya –Paya Application and website.
http://khoyapaya.gov.in/mpp/home

Mais conteúdo relacionado

Mais procurados

IRJET - Augmented Reality: Social Profile Detection by Face Recognition
IRJET - Augmented Reality: Social Profile Detection by Face RecognitionIRJET - Augmented Reality: Social Profile Detection by Face Recognition
IRJET - Augmented Reality: Social Profile Detection by Face RecognitionIRJET Journal
 
Augmented reality application for chemical bonding based on android
Augmented reality application for chemical bonding based on androidAugmented reality application for chemical bonding based on android
Augmented reality application for chemical bonding based on androidIJECEIAES
 
Effective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID TagsEffective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID TagsIRJET Journal
 
Business Intelligence
Business Intelligence Business Intelligence
Business Intelligence Athari_1996
 
IRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric AttendanceIRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric AttendanceIRJET Journal
 
IRJET- Travel Sequence Application
IRJET- Travel Sequence ApplicationIRJET- Travel Sequence Application
IRJET- Travel Sequence ApplicationIRJET Journal
 
IRJET- Bus Monitoring System using Android Application
IRJET-  	  Bus Monitoring System using Android ApplicationIRJET-  	  Bus Monitoring System using Android Application
IRJET- Bus Monitoring System using Android ApplicationIRJET Journal
 
IRJET- Implementation of Handling Android Application using SMS(Short Mes...
IRJET-  	  Implementation of Handling Android Application using SMS(Short Mes...IRJET-  	  Implementation of Handling Android Application using SMS(Short Mes...
IRJET- Implementation of Handling Android Application using SMS(Short Mes...IRJET Journal
 
Attendance Management System using Face Recognition
Attendance Management System using Face RecognitionAttendance Management System using Face Recognition
Attendance Management System using Face RecognitionNanditaDutta4
 
Accessing remote android mobile contents
Accessing remote android mobile contentsAccessing remote android mobile contents
Accessing remote android mobile contentseSAT Journals
 
IRJET- Medicine Information Retrieval Application- Pharmaguide
IRJET- Medicine Information Retrieval Application- PharmaguideIRJET- Medicine Information Retrieval Application- Pharmaguide
IRJET- Medicine Information Retrieval Application- PharmaguideIRJET Journal
 
IRJET- Student Portal
IRJET-  	  Student PortalIRJET-  	  Student Portal
IRJET- Student PortalIRJET Journal
 
Designing the Process of Stores Management for Implementing ERP in Manufactur...
Designing the Process of Stores Management for Implementing ERP in Manufactur...Designing the Process of Stores Management for Implementing ERP in Manufactur...
Designing the Process of Stores Management for Implementing ERP in Manufactur...sushil Choudhary
 
IRJET- Logistics Network Superintendence Based on Knowledge Engineering
IRJET- Logistics Network Superintendence Based on Knowledge EngineeringIRJET- Logistics Network Superintendence Based on Knowledge Engineering
IRJET- Logistics Network Superintendence Based on Knowledge EngineeringIRJET Journal
 
Human Data Acquisition through Biometrics using LabVIEW
Human Data Acquisition through Biometrics using LabVIEW Human Data Acquisition through Biometrics using LabVIEW
Human Data Acquisition through Biometrics using LabVIEW Yayah Zakaria
 
IRJET - Visual E-Commerce Application using Deep Learning
IRJET - Visual E-Commerce Application using Deep LearningIRJET - Visual E-Commerce Application using Deep Learning
IRJET - Visual E-Commerce Application using Deep LearningIRJET Journal
 
Smart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry PiSmart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry Piijtsrd
 

Mais procurados (19)

AUTHENTICATED MEDICAL DOCUMENTS RELEASING WITH PRIVACY PROTECTION AND RELEAS...
AUTHENTICATED MEDICAL DOCUMENTS RELEASING  WITH PRIVACY PROTECTION AND RELEAS...AUTHENTICATED MEDICAL DOCUMENTS RELEASING  WITH PRIVACY PROTECTION AND RELEAS...
AUTHENTICATED MEDICAL DOCUMENTS RELEASING WITH PRIVACY PROTECTION AND RELEAS...
 
IRJET - Augmented Reality: Social Profile Detection by Face Recognition
IRJET - Augmented Reality: Social Profile Detection by Face RecognitionIRJET - Augmented Reality: Social Profile Detection by Face Recognition
IRJET - Augmented Reality: Social Profile Detection by Face Recognition
 
REVIEW ON: IOT BASED HEART DISEASE MONITORING SYSTEM
REVIEW ON: IOT BASED HEART DISEASE MONITORING SYSTEMREVIEW ON: IOT BASED HEART DISEASE MONITORING SYSTEM
REVIEW ON: IOT BASED HEART DISEASE MONITORING SYSTEM
 
Augmented reality application for chemical bonding based on android
Augmented reality application for chemical bonding based on androidAugmented reality application for chemical bonding based on android
Augmented reality application for chemical bonding based on android
 
Effective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID TagsEffective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID Tags
 
Business Intelligence
Business Intelligence Business Intelligence
Business Intelligence
 
IRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric AttendanceIRJET- IoT based Facial Recognition Biometric Attendance
IRJET- IoT based Facial Recognition Biometric Attendance
 
IRJET- Travel Sequence Application
IRJET- Travel Sequence ApplicationIRJET- Travel Sequence Application
IRJET- Travel Sequence Application
 
IRJET- Bus Monitoring System using Android Application
IRJET-  	  Bus Monitoring System using Android ApplicationIRJET-  	  Bus Monitoring System using Android Application
IRJET- Bus Monitoring System using Android Application
 
IRJET- Implementation of Handling Android Application using SMS(Short Mes...
IRJET-  	  Implementation of Handling Android Application using SMS(Short Mes...IRJET-  	  Implementation of Handling Android Application using SMS(Short Mes...
IRJET- Implementation of Handling Android Application using SMS(Short Mes...
 
Attendance Management System using Face Recognition
Attendance Management System using Face RecognitionAttendance Management System using Face Recognition
Attendance Management System using Face Recognition
 
Accessing remote android mobile contents
Accessing remote android mobile contentsAccessing remote android mobile contents
Accessing remote android mobile contents
 
IRJET- Medicine Information Retrieval Application- Pharmaguide
IRJET- Medicine Information Retrieval Application- PharmaguideIRJET- Medicine Information Retrieval Application- Pharmaguide
IRJET- Medicine Information Retrieval Application- Pharmaguide
 
IRJET- Student Portal
IRJET-  	  Student PortalIRJET-  	  Student Portal
IRJET- Student Portal
 
Designing the Process of Stores Management for Implementing ERP in Manufactur...
Designing the Process of Stores Management for Implementing ERP in Manufactur...Designing the Process of Stores Management for Implementing ERP in Manufactur...
Designing the Process of Stores Management for Implementing ERP in Manufactur...
 
IRJET- Logistics Network Superintendence Based on Knowledge Engineering
IRJET- Logistics Network Superintendence Based on Knowledge EngineeringIRJET- Logistics Network Superintendence Based on Knowledge Engineering
IRJET- Logistics Network Superintendence Based on Knowledge Engineering
 
Human Data Acquisition through Biometrics using LabVIEW
Human Data Acquisition through Biometrics using LabVIEW Human Data Acquisition through Biometrics using LabVIEW
Human Data Acquisition through Biometrics using LabVIEW
 
IRJET - Visual E-Commerce Application using Deep Learning
IRJET - Visual E-Commerce Application using Deep LearningIRJET - Visual E-Commerce Application using Deep Learning
IRJET - Visual E-Commerce Application using Deep Learning
 
Smart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry PiSmart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry Pi
 

Semelhante a THE LORE OF SPECULATION AND ANALYSIS USING MACHINE LEARNING AND IMAGE MATCHING

FIND MISSING PERSON USING AI (ANDROID APPLICATION)
FIND MISSING PERSON USING AI (ANDROID APPLICATION)FIND MISSING PERSON USING AI (ANDROID APPLICATION)
FIND MISSING PERSON USING AI (ANDROID APPLICATION)IRJET Journal
 
IRJET - Emotionalizer : Face Emotion Detection System
IRJET - Emotionalizer : Face Emotion Detection SystemIRJET - Emotionalizer : Face Emotion Detection System
IRJET - Emotionalizer : Face Emotion Detection SystemIRJET Journal
 
IRJET- Emotionalizer : Face Emotion Detection System
IRJET- Emotionalizer : Face Emotion Detection SystemIRJET- Emotionalizer : Face Emotion Detection System
IRJET- Emotionalizer : Face Emotion Detection SystemIRJET Journal
 
Facial image classification and searching –a survey
Facial image classification and searching –a surveyFacial image classification and searching –a survey
Facial image classification and searching –a surveyZac Darcy
 
Facial Image Classification And Searching - A Survey
Facial Image Classification And Searching - A SurveyFacial Image Classification And Searching - A Survey
Facial Image Classification And Searching - A SurveyZac Darcy
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methodsIRJET Journal
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...ijceronline
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognitionMazin Alwaaly
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face IdentificationIRJET Journal
 
Profile Identification through Face Recognition
Profile Identification through Face RecognitionProfile Identification through Face Recognition
Profile Identification through Face Recognitionijtsrd
 
An Iot Based Smart Manifold Attendance System
An Iot Based Smart Manifold Attendance SystemAn Iot Based Smart Manifold Attendance System
An Iot Based Smart Manifold Attendance SystemIJERDJOURNAL
 
IRJET- Age Analysis using Face Recognition with Hybrid Algorithm
IRJET-  	  Age Analysis using Face Recognition with Hybrid AlgorithmIRJET-  	  Age Analysis using Face Recognition with Hybrid Algorithm
IRJET- Age Analysis using Face Recognition with Hybrid AlgorithmIRJET Journal
 
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET-  	  Recognizing User Portrait for Fraudulent Identification on Online ...IRJET-  	  Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...IRJET Journal
 
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AICRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AIIRJET Journal
 
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCE
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCECRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCE
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCEvivatechijri
 
Real time voting system using face recognition for different expressions and ...
Real time voting system using face recognition for different expressions and ...Real time voting system using face recognition for different expressions and ...
Real time voting system using face recognition for different expressions and ...eSAT Publishing House
 

Semelhante a THE LORE OF SPECULATION AND ANALYSIS USING MACHINE LEARNING AND IMAGE MATCHING (20)

FIND MISSING PERSON USING AI (ANDROID APPLICATION)
FIND MISSING PERSON USING AI (ANDROID APPLICATION)FIND MISSING PERSON USING AI (ANDROID APPLICATION)
FIND MISSING PERSON USING AI (ANDROID APPLICATION)
 
IRJET - Emotionalizer : Face Emotion Detection System
IRJET - Emotionalizer : Face Emotion Detection SystemIRJET - Emotionalizer : Face Emotion Detection System
IRJET - Emotionalizer : Face Emotion Detection System
 
IRJET- Emotionalizer : Face Emotion Detection System
IRJET- Emotionalizer : Face Emotion Detection SystemIRJET- Emotionalizer : Face Emotion Detection System
IRJET- Emotionalizer : Face Emotion Detection System
 
Facial image classification and searching –a survey
Facial image classification and searching –a surveyFacial image classification and searching –a survey
Facial image classification and searching –a survey
 
Facial Image Classification And Searching - A Survey
Facial Image Classification And Searching - A SurveyFacial Image Classification And Searching - A Survey
Facial Image Classification And Searching - A Survey
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methods
 
G041041047
G041041047G041041047
G041041047
 
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face Identification
 
Profile Identification through Face Recognition
Profile Identification through Face RecognitionProfile Identification through Face Recognition
Profile Identification through Face Recognition
 
An Iot Based Smart Manifold Attendance System
An Iot Based Smart Manifold Attendance SystemAn Iot Based Smart Manifold Attendance System
An Iot Based Smart Manifold Attendance System
 
IRJET- Age Analysis using Face Recognition with Hybrid Algorithm
IRJET-  	  Age Analysis using Face Recognition with Hybrid AlgorithmIRJET-  	  Age Analysis using Face Recognition with Hybrid Algorithm
IRJET- Age Analysis using Face Recognition with Hybrid Algorithm
 
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET-  	  Recognizing User Portrait for Fraudulent Identification on Online ...IRJET-  	  Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
 
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AICRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AI
 
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCE
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCECRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCE
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCE
 
Real time voting system using face recognition for different expressions and ...
Real time voting system using face recognition for different expressions and ...Real time voting system using face recognition for different expressions and ...
Real time voting system using face recognition for different expressions and ...
 
Ijetcas14 465
Ijetcas14 465Ijetcas14 465
Ijetcas14 465
 
Facerecognition
FacerecognitionFacerecognition
Facerecognition
 
Facerecognition
FacerecognitionFacerecognition
Facerecognition
 

Mais de IJTRET-International Journal of Trendy Research in Engineering and Technology

Mais de IJTRET-International Journal of Trendy Research in Engineering and Technology (20)

A NOVEL STEP UP MISO CONVERTER FOR HYBRID ELECTRICAL VEHICLES APPLICATION
A NOVEL STEP UP MISO CONVERTER FOR HYBRID ELECTRICAL VEHICLES APPLICATIONA NOVEL STEP UP MISO CONVERTER FOR HYBRID ELECTRICAL VEHICLES APPLICATION
A NOVEL STEP UP MISO CONVERTER FOR HYBRID ELECTRICAL VEHICLES APPLICATION
 
PREDICTIVE DATA MINING ALGORITHMS FOR OPTIMIZED BEST CROP IN SOIL DATA CLASSI...
PREDICTIVE DATA MINING ALGORITHMS FOR OPTIMIZED BEST CROP IN SOIL DATA CLASSI...PREDICTIVE DATA MINING ALGORITHMS FOR OPTIMIZED BEST CROP IN SOIL DATA CLASSI...
PREDICTIVE DATA MINING ALGORITHMS FOR OPTIMIZED BEST CROP IN SOIL DATA CLASSI...
 
EFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATION
EFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATIONEFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATION
EFFECTIVE IN-HOUSE VOTING AND VERIFICATION USING BLOCK CHAIN IMPLEMENTATION
 
SAFETY NOTIFICATION AND BUS MONITORING SYSTEM
SAFETY NOTIFICATION AND BUS MONITORING SYSTEMSAFETY NOTIFICATION AND BUS MONITORING SYSTEM
SAFETY NOTIFICATION AND BUS MONITORING SYSTEM
 
PROVISION MULTI-VENDOR APPLICATION SYSTEM
PROVISION MULTI-VENDOR APPLICATION SYSTEMPROVISION MULTI-VENDOR APPLICATION SYSTEM
PROVISION MULTI-VENDOR APPLICATION SYSTEM
 
Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...
Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...
Integrative detection of Human, Object movement and Fire Sensing Using LoRaWA...
 
WARNING SYSTEM FROM THREAT OF WILD ANIMALS USING IOT
WARNING SYSTEM FROM THREAT OF WILD ANIMALS USING IOTWARNING SYSTEM FROM THREAT OF WILD ANIMALS USING IOT
WARNING SYSTEM FROM THREAT OF WILD ANIMALS USING IOT
 
Emission Control in CI Engine using Ethanol Emulsion
Emission Control in CI Engine using Ethanol EmulsionEmission Control in CI Engine using Ethanol Emulsion
Emission Control in CI Engine using Ethanol Emulsion
 
EXPERIMENTAL INVESTIGATION OF CuO NANOPARTICLES ON THERMOMECHANICAL PROPERTI...
EXPERIMENTAL INVESTIGATION OF CuO NANOPARTICLES ON  THERMOMECHANICAL PROPERTI...EXPERIMENTAL INVESTIGATION OF CuO NANOPARTICLES ON  THERMOMECHANICAL PROPERTI...
EXPERIMENTAL INVESTIGATION OF CuO NANOPARTICLES ON THERMOMECHANICAL PROPERTI...
 
OPTIMIZATION OF QUALITY ENHANCEMENT OF CNC MACHINING PROCESS BY USING NEURA...
OPTIMIZATION OF QUALITY ENHANCEMENT  OF CNC MACHINING PROCESS BY USING  NEURA...OPTIMIZATION OF QUALITY ENHANCEMENT  OF CNC MACHINING PROCESS BY USING  NEURA...
OPTIMIZATION OF QUALITY ENHANCEMENT OF CNC MACHINING PROCESS BY USING NEURA...
 
Analysis of Gravity Die Casted Aluminium parts using MAGMA
Analysis of Gravity Die Casted Aluminium parts  using MAGMAAnalysis of Gravity Die Casted Aluminium parts  using MAGMA
Analysis of Gravity Die Casted Aluminium parts using MAGMA
 
A review on Friction Stir Welding
A review on Friction Stir WeldingA review on Friction Stir Welding
A review on Friction Stir Welding
 
PREPARATION OF PURE AND AL SUBSTITUTED LANGANITE (LA3GA5.5NB0.5O14) CERAMICS...
PREPARATION OF PURE AND AL SUBSTITUTED LANGANITE  (LA3GA5.5NB0.5O14) CERAMICS...PREPARATION OF PURE AND AL SUBSTITUTED LANGANITE  (LA3GA5.5NB0.5O14) CERAMICS...
PREPARATION OF PURE AND AL SUBSTITUTED LANGANITE (LA3GA5.5NB0.5O14) CERAMICS...
 
AN IMPROVED NONINVASIVE AND MULTIMODEL PSO ALGORITHM FOR EXTRACTING ARTIFACT...
AN IMPROVED NONINVASIVE AND MULTIMODEL PSO ALGORITHM FOR  EXTRACTING ARTIFACT...AN IMPROVED NONINVASIVE AND MULTIMODEL PSO ALGORITHM FOR  EXTRACTING ARTIFACT...
AN IMPROVED NONINVASIVE AND MULTIMODEL PSO ALGORITHM FOR EXTRACTING ARTIFACT...
 
PRINCIPLE AND APPLICATIONS OF EJECTION SEAT IN AERONAUTICS
PRINCIPLE AND APPLICATIONS OF EJECTION SEAT IN AERONAUTICSPRINCIPLE AND APPLICATIONS OF EJECTION SEAT IN AERONAUTICS
PRINCIPLE AND APPLICATIONS OF EJECTION SEAT IN AERONAUTICS
 
IMAGE PROCESSING BASED INTRUDER DETECTION USING RASPBERRY PI
IMAGE PROCESSING BASED INTRUDER DETECTION USING RASPBERRY PIIMAGE PROCESSING BASED INTRUDER DETECTION USING RASPBERRY PI
IMAGE PROCESSING BASED INTRUDER DETECTION USING RASPBERRY PI
 
SENSOR DATA COMMUNICATION TO THNIGSPEAK IOT PLATFORM USING RASPBERRY P
SENSOR DATA COMMUNICATION TO THNIGSPEAK  IOT PLATFORM USING RASPBERRY PSENSOR DATA COMMUNICATION TO THNIGSPEAK  IOT PLATFORM USING RASPBERRY P
SENSOR DATA COMMUNICATION TO THNIGSPEAK IOT PLATFORM USING RASPBERRY P
 
A REVIEW ON FERRITES – ITS CLASSIFICATION AND APPLICATIONS
A REVIEW ON FERRITES – ITS CLASSIFICATION AND APPLICATIONSA REVIEW ON FERRITES – ITS CLASSIFICATION AND APPLICATIONS
A REVIEW ON FERRITES – ITS CLASSIFICATION AND APPLICATIONS
 
AUTOMATION IN ANESTHESIA ADMINISTRATION USING FIELD PROGRAMMABLE GATE ARRAY
AUTOMATION IN ANESTHESIA ADMINISTRATION  USING FIELD PROGRAMMABLE GATE ARRAYAUTOMATION IN ANESTHESIA ADMINISTRATION  USING FIELD PROGRAMMABLE GATE ARRAY
AUTOMATION IN ANESTHESIA ADMINISTRATION USING FIELD PROGRAMMABLE GATE ARRAY
 
A REVIEW ON PREPARATION METHODS OF NANOCOMPOSITES
A REVIEW ON PREPARATION METHODS OF NANOCOMPOSITESA REVIEW ON PREPARATION METHODS OF NANOCOMPOSITES
A REVIEW ON PREPARATION METHODS OF NANOCOMPOSITES
 

Último

BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLManishPatel169454
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSrknatarajan
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 

Último (20)

Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 

THE LORE OF SPECULATION AND ANALYSIS USING MACHINE LEARNING AND IMAGE MATCHING

  • 1. International Journal of Trendy Research in Engineering andTechnology Volume 4 Issue 4 August 2020 ISSN NO 2582-0958 www.trendytechjournals.com 8 THE LORE OF SPECULATION AND ANALYSIS USING MACHINE LEARNING AND IMAGE MATCHING K. Bharath1 , Paithankar Sumit1 , S. Amudha2 1, UG Students, 2 Assistant professor, Department of Computer Science and Engineering, Sriram Engineering College, Chennai-600044, INDIA. kilaribharath007@gmail.com, sumitpaithankar2@gmail.com,amudhasaravanan@gmail.com ABSTRACT Now days the cases of missing kids are increasing. Many of them are left unfound. In this paper we propose an Android application for finding missing kids.This android application will be used by General public for the purpose of finding missing kids. This application contains functionality to add FIR complaint as well as photos of the missing kid. Any anonymous kids photo can be uploaded to the application. By using IMT and neural networks the photo will be traversed with the database. On finding the perfect match with higher precision further actions will be processed.The face recognition model in our system will try to find a match in the database with the help of face encodings. It is performed by comparing the face encodings of the uploaded image to the face encodings of the images in the database. The face recognition model that we have used maintains an accuracy of 99.38% on the Labelled Faces in the Wild Benchmark which comprises of 13,000 images. Keyword: - Android, Face recognition, Image Labelling, Machine Learning, ML Kit. I. INTRODUCTION A missing person can be characterized as the one who can be a child or an adult -- who is lost, voluntarily or involuntarily. There are various categories of missing cases of which only 43% of missing cases’ reasons are known, 99% are juvenile runways, 2500 cases are due to family problems and around 500 cases are kidnapped by strangers (which include both teens and adults). Women add about 52% of missing cases and males48%. “In India, there are no budgets allocated to finding missing people”, claimed by an officialsource. A missing person faces many obstacles, few are subjected to death (murder), rape or abuse. People concerned with the missing person such as parents, friends, relatives and guardians are exposed to stress and worries from not knowing whether the missing person is alive or dead. In our system, the image of the person given by the guardian at the time of missing is stored in the database. The public is given authority to upload photographs of any person in uncertain situations. Automatic detection of match for this picture among the already existing images in the database will be done through our application. This helps the police department to spot the missing person in any place in India. When a suspicious person is found, the picture at that instance of time is compared with the images uploaded by the guardian/police department at the time of missing through the face recognition model. If a match is found, it will be notified to the police and the guardian in the form of an alert message along with the location of where the person is found. If not found, a new record will be created in the database with the uploaded picture. By this way, it decreases the time taken to search for a person’s detail after he is found. 0 20000 40000 60000 JAN FEB MAR APRIL Child
  • 2. International Journal of Trendy Research in Engineering andTechnology Volume 4 Issue 4 August 2020 ISSN NO 2582-0958 www.trendytechjournals.com 9 Fig1. Survey of Kid found in Delhi using Face Recognition Sometimes, the person has been missing for a long period of time. The age gap is reflected in the image as ageing affects the structure of the face, including shape, texture, etc. The appearance of the person can vary due to ageing, filters, pose, lightings etc. All these factors were considered before choosing the face recognitionalgorithm. II. MACHINE LEARNING Machine learning (ML) is the scientific study of algorithms and statistical models that computer systems use to perform a specific task without using explicit instructions, relying on patterns and inference instead. It is seen as a subset of artificial intelligence. Machine learning algorithms build a mathematical model based on sample data, known as "training data", in order to make predictions or decisions without being explicitly programmed to perform the task Machine learning algorithms are used in a wide variety of applications, such as email filtering and computer vision, where it is difficult or infeasible to develop a conventional algorithm for effectively performing the task. Machine learning is closely related to computational statistics, which focuses on making predictions using computers. The study of mathematical optimization delivers methods, theory and application domains to the field of machine learning. Data mining is a field of study within machine learning, and focuses on exploratory data analysis through unsupervised learning. In its application across business problems, machine learning is also referred to as predictive analytics. III. IMAGE MATCHING ALGORITHMS 1. SIFT (Scale-invariant Feature Transform) It uses interesting key points of image using difference in Gaussian method.The Scale invariance is achieved via scanning key points at different scaleRotation invariance is achieved by obtaining the Orientation Assignment of the key points using image gradient magnitude. Fig2: Scale invariant transform feature working. Fig 3: Scale invariant feature transform results. 2. SURF (Speeded Up Robust Features) SIFT is quite effective but computationally expensive, so the SURF was developed to improve the speed of the scale invariant feature detector. It uses Hessian Matrix approximation to detect Not Found Kids Found
  • 3. International Journal of Trendy Research in Engineering andTechnology Volume 4 Issue 4 August 2020 ISSN NO 2582-0958 www.trendytechjournals.com 10 interesting points and use the sum of Haar wavelet responses for orientation assignment. 3. BRIEF (Binary Robust Independent Elementary Features) Computes descriptor quickly (instead of using SIFT and SURF). Faster as compared to SIFT and SURF but fails in Orientation invariance. 4. ORB (Oriented Fast and BRIEF) Developed out of OpenCV labs (not patent so free to use). Provide faster orientation invariance with BRIEF IV. METHODOLOGY The proposed system makes use of Face Recognition for missing peoples’ identification. The architecture of our framework is presented in figure 4. Fig 4: The Architecture of the proposed People Identification System Here the public or police who finds a suspicious person (child, mentally challenged person, etc.) on the road uploads a picture of that person into the portal. Our algorithm extracts the face encodings of the image as shown inFigure 5 and compare with that of the face encodings of the previously existing images in the database. If a match is found, an alert message will be sent to both the concerned police officer and the parent/guardian of that person in the image. If a match is not found, then the person will be provided with the option of registering that face asa new entry to our database with the location they found and remarks. Fig 5: Face Encodings generated from an input image Whenever public or police upload an image, the face encodings of the image are extracted and then compared to the face encodings of the images stored in the database. If the distance between the encoding of the uploaded image and the encoding of the image in the database is less than or equal to the threshold, then the face in both the images is of the same person as shown in Figure 3 and Figure 4. If that is the case, the user is notified that a match is found along with the picture from the database that matched with the uploaded picture. If the distance between the encodings is more than the threshold, it means that the faces in the images are not of the same person’s. By this way, our proposed system will help in identifying the missingpeople. Fig 6: Comparing Face encodings of two images The model we have used involves three main steps to perform face recognition. STEP 1: Face detection – Firstly, face patterns are generated using Histogram of Oriented Gradients (HOG) algorithm. The images are made black and white. Here, the part of the images that looks more like the original HOG face pattern is found. Finally, the detected face is bounded by a bounding box. STEP 2: Sixty-eight specific points (landmarks) that are existing on every face are figured out by using the face landmark estimation algorithm. From the landmarks found, image transformations like scaling, shearing and rotation are used by the OpenCV’s affine transformation to make the lips
  • 4. International Journal of Trendy Research in Engineering andTechnology Volume 4 Issue 4 August 2020 ISSN NO 2582-0958 www.trendytechjournals.com 11 and eyes appear in the same location on every image. STEP 3: The face images are then passed through deep convolutional neural network. By doing this, we obtain 128 measurements which are 128- dimension hyper sphere. And no one knows which parts of the face the 128 measurements representing. All we know is that the network outputs the same 128 numbers for two different images of the same person. STEP 4: Finally, a linear SVM classifier is used to recognize the face. The classifier has been trained in such a way that it can take the measurements from a test image and gives the closest match as output. Fig 7: Interface for the system built using the Flask framework A Flask API interface accompanies our model to give the user a better user experience as shown in Figure 7. When the user opens our application they will be asked to upload an image of the missing person. If a match is found, they will have provided with the image and details about the match. If match is not found, they will be asked if they want to register that image as a new entry into our database. If they wish to register, they will be asked to enter the details about the image as shown in figure8. Fig 8: Face Registration form V. RESULTS The Face Recognition model we used has an accuracy of 99.38% on the Labelled Faces in the Wild Benchmark which comprises of 13,000 images The testing conducted by us yielded an accuracy of 97.5% where the dataset included 82 images – 41 pairs which included images of kids, teens, adults (male and female) with age gap, different hairstyles, filters etc. The dataset we used is taken from ML kit. VI. CONCLUSION AND FUTURE SCOPE By this way, the process of identifying the missing people is fastened. Our system replaces the manual method of scanning through the databases for each picture to check the match, by an efficient face recognition method which finishes the work in notime. Though our system has a small limitation i.e. when the age of the person is between the age 0 and 10 the accuracy drops. This is due to the incomplete growth of facial features at that age. We look forward to overcome this limitation in the future. VII. REFERENCES 1.Android Based Application on “Missing Person Finder” Rahul Mote, PoojaRakate, DipaliThavare, RahulPatil, Mrs. Sonali Pakhmode Department of Information Technology Mumbai University, Padmabhushan Vasantdada Patil Pratishthan’s
  • 5. International Journal of Trendy Research in Engineering andTechnology Volume 4 Issue 4 August 2020 ISSN NO 2582-0958 www.trendytechjournals.com 12 College of Engineering Sion, Chunabhatti, Mumbai– 400022 2.An Image Matching Method Based On the Analysis of Grey Correlation Degree and Feature Points, Zishuo Ding, Shuo Qian, Yulin Li, Zhaohui Li School of Software Engineering Beijing University of Posts and Telecommunications Beijing, China 3.Review of existing algorithms for face detection and recognition. NURULHUDA ISMAIL, MAS IDAYU MD. SABRI Department of System and Computer Technology (Multimedia), Faculty of Computer Science and Information Technology, University of Malaya, 50603 LembahPantai, Kuala Lumpur, MALAYSIA 4.Image Matching Using SIFT, SURF, BRIEF and ORB: Performance Comparison for Distorted Images. Ebrahim Karami, Siva Prasad, and Mohamed Shehata Faculty of Engineering and Applied Sciences, Memorial University, Canada. 5.Khoya –Paya Application and website. http://khoyapaya.gov.in/mpp/home