Web Content Display Web Content Display

Project Project

PROJECT PROPOSAL

Face Recognition System

BY:SIMMY AGARWAL,(15522)

REKHA,(15507)

        Face Identification is a technique that is mainly used to identify criminals based on the clues given by the eyewitnesses. Based on the clues we develop an image by using the image that we have in our database and then we compare it with the images already we have. To identify any criminals we must have a record that generally contains name, age, location, previous crime, gender, photo, etc.

 

                                                    The primary task at hand is, given still or video images require the identification of the one or more segmented and extracted from the scene, where upon it can be identified and matched. The word "image is defined as" an exact or analogous representation of a being or thing." The image or monochrome image such as black and white paragraph is represented as two-dimensional light intensity function f (x, y) where x and y denotes spatial co-ordinates. A digital image is an image of f (x, y) that has been digitized both in spatial co-ordinate and brightness. The elements of such a digital array are called image elements, picture elements and pixels or pels.

 

The purpose of face identification system is to identify criminals. In past years this process is carried out by humans. This process gives the exact image of the criminal but it is very difficult to identify the criminal details and also it requires much amount of human burden.

                      The main aim of our project is to overcome   the drawbacks of human based system by using the machine based face identification process. In this process we store the details of   criminal    into   the   database   along   with   his photo   or image. Then we make the image into different clips containing hair, forehead, eyes, nose, lips and chin   and store these clips into the database. When   any   crime occurs we compare the details given by the eyewitness with the clips already stored in the database and we will identify the criminal. This project can be extended to adjust the gaps between the clips after construction of the image to be a perfect photograph using Image processing Techniques.

WEBSITES REFERRED

 

The following links were searched and exploited extensively for the project development and implementation.

 

  1. http://www.java.sun.com/products\java
  2. http://www.jakarta.apache.org
  3. http://www.javaworld.com/
  4. http://www.java2s.com/

 

 

 

 

CONTENTS

 

 

List of figures and flowcharts…………………………………………………….iii

List of tables……………………………………………………………………..…iv

         

         CHAPTER1: INTRODUCTION…………………………………………...........01                              1.1Motivation behind the project………………………………………..…..02      

                   1.2Scope of project…………………………………………………….…....03

          1.3 Theoretical and technical aspects…………………………………..……03 

          CHAPTER 2: PROJECT DESCRIPTION ...................................................….09                   2.1Objective of the project………………………………………………..... 10

                   2.2Literary survey………………………………………………………...….11

                       2.2.1Technologies used……………………………………………..…….12

                       2.2.2Database used………………………………………………...……...16

       CHAPTER 3: REQUIREMENT ANALYSIS……..…………………………….19

                3.1SoftwareRequirementSpecification………………………………..……….20                         

                3.2 User Characteristics……………………………………………..…….......21  

                3.3 Constraints………………………………………………………….……21

                3.4 Hardware Requirements…………………………………………………..21                                          

                 3.5 Software requirements………………………………………………….21 

                     CHAPTER4:PROJECTDESIGN…………………………………….……………...23

             4.1 System design………………………………………………………...….…...24

                   4.1.1 Data flow diagrams……………..……………………….……...….…..24

            4.2 ER diagrams…………………..……………………………….……….……..29

                    4.2.1ER diagram for user……………………………………………………29

                    4.2.2ER diagram for admin………………………………………………….30

             4.3 Database structure……………………………………………………………31

CHAPTER5:CODING………………………………………………………….….…..35

           5.1Coding of the project………………………